31 resultados para Keys to Database Searching
em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland
Resumo:
Unsuccessful mergers are unfortunately the rule rather than the exception. Therefore it is necessary to gain an enhanced understanding of mergers and post-merger integrations (PMI) as well as learning more about how mergers and PMIs of information systems (IS) and people can be facilitated. Studies on PMI of IS are scarce and public sector mergers are even less studied. There is nothing however to indicate that public sector mergers are any more successful than those in the private sector. This thesis covers five studies carried out between 2008 and 2011 in two organizations in higher education that merged in January 2010. The most recent study was carried out two years after the new university was established. The longitudinal case-study focused on the administrators and their opinions of the IS, the work situation and the merger in general. These issues were investigated before, during and after the merger. Both surveys and interviews were used to collect data, to which were added documents that both describe and guide the merger process; in this way we aimed at a triangulation of findings. Administrators were chosen as the focus of the study since public organizations are highly dependent on this staff category, forming the backbone of the organization and whose performance is a key success factor for the organization. Reliable and effective IS are also critical for maintaining a functional and effective organization, and this makes administrators highly dependent on their organizations’ IS for the ability to carry out their duties as intended. The case-study has confirmed the administrators’ dependency on IS that work well. A merger is likely to lead to changes in the IS and the routines associated with the administrators’ work. Hence it was especially interesting to study how the administrators viewed the merger and its consequences for IS and the work situation. The overall research objective is to find key issues for successful mergers and PMIs. The first explorative study in 2008 showed that the administrators were confident of their skills and knowledge of IS and had no fear of having to learn new IS due to the merger. Most administrators had an academic background and were not anxious about whether IS training would be given or not. Before the merger the administrators were positive and enthusiastic towards the merger and also to the changes that they expected. The studies carried out before the merger showed that these administrators were very satisfied with the information provided about the merger. This information was disseminated through various channels and even negative information and postponed decisions were quickly distributed. The study conflicts with the theories that have found that resistance to change is inevitable in a merger. Shortly after the merger the (third) study showed disappointment with the fact that fewer changes than expected had been implemented even if the changes that actually were carried out sometimes led to a more problematic work situation. This was seen to be more prominent for routine changes than IS changes. Still the administrators showed a clear willingness to change and to share their knowledge with new colleagues. This knowledge sharing (also tacit) worked well in the merger and the PMI. The majority reported that the most common way to learn to use new ISs and to apply new routines was by asking help from colleagues. They also needed to take responsibility for their own training and development. Five months after the merger (the fourth study) the administrators had become worried about the changes in communication strategy that had been implemented in the new university. This was perceived as being more anonymous. Furthermore, it was harder to get to know what was happening and to contact the new decision makers. The administrators found that decisions, and the authority to make decisions, had been moved to a higher administrative level than they were accustomed to. A directive management style is recommended in mergers in order to achieve a quick transition without distracting from the core business. A merger process may be tiresome and require considerable effort from the participants. In addition, not everyone can make their voice heard during a merger and consensus is not possible in every question. It is important to find out what is best for the new organization instead of simply claiming that the tried and tested methods of doing things should be implemented. A major problem turned out to be the lack of management continuity during the merger process. Especially problematic was the situation in the IS-department with many substitute managers during the whole merger process (even after the merger was carried out). This meant that no one was in charge of IS-issues and the PMI of IS. Moreover, the top managers were appointed very late in the process; in some cases after the merger was carried out. This led to missed opportunities for building trust and management credibility was heavily affected. The administrators felt neglected and that their competences and knowledge no longer counted. This, together with a reduced and altered information flow, led to rumours and distrust. Before the merger the administrators were convinced that their achievements contributed value to their organizations and that they worked effectively. After the merger they were less sure of their value contribution and effectiveness even if these factors were not totally discounted. The fifth study in November 2011 found that the administrators were still satisfied with their IS as they had been throughout the whole study. Furthermore, they believed that the IS department had done a good job despite challenging circumstances. Both the former organizations lacked IS strategies, which badly affected the IS strategizing during the merger and the PMI. IS strategies deal with issues like system ownership; namely who should pay and who is responsible for maintenance and system development, for organizing system training for new IS, and for effectively run IS even during changing circumstances (e.g. more users). A proactive approach is recommended for IS strategizing to work. This is particularly true during a merger and PMI for handling issues about what ISs should be adopted and implemented in the new organization, issues of integration and reengineering of IS-related processes. In the new university an ITstrategy had still not been decided 26 months after the new university was established. The study shows the importance of the decisive management of IS in a merger requiring that IS issues are addressed in the merger process and that IS decisions are made early. Moreover, the new management needs to be appointed early in order to work actively with the IS-strategizing. It is also necessary to build trust and to plan and make decisions about integration of IS and people.
Resumo:
The aim of this study is to explore longing and its implication for health. The overall purpose is to develop a theory model of longing. The research question is: What is the substance of longing in a caring science perspective? The model is developed based on theoretical and empirical studies, which contains three different research materials; hermeneutic reading of texts by Augustine and Kierkegaard, and interpretation of research interviews with nine women in a cancer context. The design of the study is explorative and the ontological hermeneutics of Gadamer is chosen as a guidance for understanding. The main standpoint of the study is performed within the systematic caring science, which through basic research, generates knowledge about the human desire as crucial for the deeper health processes. Through the contextual study there is a link to the clinical caring science. In the ontology of the systematic caring science, the character of longing is in touch with two different aspects. Longing is rooted in the inner source of love of the ethos of the human where the inscrutable depth exists and contains the reality beyond the visible. Further, longing is essential for human being becoming in health and suffering, through holiness as a unit of body, soul and spirit. The results of the study are presented in a theory model. The model has by abduction provided new and deeper understanding of dimensions of longing related to health. On a general level the forces in longing unfolds in two perspectives; suffering and the basis of love. There appears to be a relationship between human and the source of love in all three materials. When human opens up his life in a larger perspective, resting in love, he can manage to stand in the thrill, and acknowledge loss and emptiness. In the transparency of an inner dialogue unfolding dispair, deeper longing can be opened up so that lives are released from the source of love. The holiness of the human desire has such appeal because the holiness of the source of love is always more than the suffering and the particular. The holiness in longing seems to satisfy the hearts deepest searching. The directon of longing is performed in relation to human and the source of love. The study reveals how longing is associated with the source of love, where the holiness of longing seems to drag the human and by that gives the answer to the seeking of the heart. Dynamics forces have direction from the human suffering in the foundation and a release of the power is given back to transform, deepen and reconcile life and suffering. The movements of the power released by longing are keys to understand the suffering of human in relation to the source of love, becoming in health. By this study, results contribute to deepen the ontological core of caring science. Firstly, human in his longing is connected to the inner ethos and by that the most sacred and absolute in itself so that parts of the potential of love can be released to health. Secondly, longing is the road of reconciliation and can further expand to authentic reconciliation, where human is becoming towards unity and holiness. Thirdly, the spirituality is unfolding through longing and the transcendental is received. In longing, human is in touch with the mystery, the longing exceeds the present and moving towards eternity and infinity, and is in what is yet to come. Such deep experience of longing moments leave an impression and show the longing fulfilled.
Resumo:
Pk-yrityksen kansainvälistyminen on aina haasteellinen prosessi. Tähän haasteeseen on nyt tarttunut teräsohutlevyjen jatkojalostaja Metehe Oy, joka on patentoinut uuden julkisivujärjestelmän. Tutkimuksen tavoitteena on analysoida ja määrittää kansainvälisen kilpailukyvyn perusteet Metehe Oy:ssä uuden tuotteen osalta ja selvittää, mitä yritysominaisuuksia sen tulee priorisoida kansainvälistymisessään. Diplomityö pohjautuu strategisen johtamisen prosessiin.Ensin luodaan strategiset analyysit liiketoimintaympäristön ja sisäisten tekijöiden osalta. Sen jälkeen valitaan kilpailustrategia sekä kansainvälisen kaupan operaatiomuoto. Lopuksi suoritetaan strategian toimeenpano, jossa esitellään onnistumisen edellytyksiä ja kansainvälistymistoimenpiteitä. Metehe Oy:n uusi tuote on erittäin innovatiivinen, ja Metehe Oy:n kansainvälistymismahdollisuudet ovat hyvät sekä yrityksen sisäiset että ulkoiset tekijät huomioiden. Pk-yrityksenä Metehe Oy:n resurssit ovat kuitenkin rajalliset, mikä täytyy huomioida muun muassa kansainvälisen kaupan operaatiomuotoa valittaessa. Avaintekijäksi nousee tällöin resurssien allokointi eli kriittisimmät yritysominaisuudettulee tunnistaa.
Resumo:
Ohjelmistotuotteen hallinta (SCM)on tärkeä osa ohjelmistoprojekteja. Se koostuu ohjelmistotuotteen hallinnan suunnittelusta, muutoksen hallinnasta, version hallinnasta, kääntämisestä, paketoinnista, kokoonpanon tilanteen seurannasta ja sen tarkistuksesta. Ohjelmistotuotteen hallintatietokanta (SCM DB) on tarkoitettu SCM:n liittyvändatan tallettamiseen yhteen paikkaan, jossa data on kaikkien löydettävissä. SCMDB on relaatiotietokanta ja WWW-käyttöliittymä sille. Tietokantaan talletetaan SCM - infrastruktuuri, SCM -resurssit, SCM -työskentelypaikat, integrointisuunnitteludata, paketoinnin raportit ja ohjeistukset, muutoksenhallintadata ja työkalujen hallintadata. Tietokannalla on monta käyttäjää. SCM managerit tallettavat tietokantaa yleiset tiedot, Integrointimanagerit tallettavat kantaan integrointisuunnitelmaa varten julkaisua koskevat tiedot. Paketointivastuulliset tallettavat kantaan paketointiraportit. Ohj elmistosuunnittelijat tekevät muutosvaatimuksia tietokantaan, jotka muutoksenhallintaelin käsittelee. He näkevät kannan kautta myös virheraportit. Työkalujen koordinointi tapahtuu myös kantaan talletettujen tietojen avulla. Lukemiseen tietokantaa voivat käyttää kaikki testauksesta suunnittelijoihin aikataulujen osalta. Tietokannasta voidaan lukea myös paketointityökalujen tallettamia tietoja ohjelmalohkoista eri pakettiversioissa. Paketointityökalut tai paketointivastuulliset saavat kannasta myös suoraan lähdetiedon paketointityökaluille.
Resumo:
Työn tavoite oli löytää malli, joka mahdollistaisi kaikkien tilaus- toimitusprosessin operatiivisten järjestelmien integroimisen keskenään siten, että niitä voidaan hyödyntää valmistuksen ohjaukseen. Vaneritehtaissa ei ole keskitettyä tietojärjestelmää, joten tavoiteasetanta edellytti vaneritehtaan tietoverkon rakentamiseen liittyvän ongelmakentän periaatteellista ratkaisua.Koska tilaus- toimitusprosessi, tuotantoa lukuunottamatta, oli kohdeyrityksessä katettu tietojärjestelmillä, loivat nämä jo olemassa olevat järjestelmät reunaehdot ratkaisulle myös tuotannon tietoverkon kehittämisessä. Työssä etsittiin ja kiinnitettiin avaimet, joilla tuote- sekä henkilötieto saadaan identifioitua keskenään integroiduissa järjestelmissä niin, että informaatioketju ei katkea siirryttäessä järjestelmästä toiseen.Työssä ratkaistiin tietoverkon liityntä tuotantolaitteisiin valvomotuotteen avulla. Liittymisratkaisuja esiteltiin neljä. Nämä mallit kattavat suurimman osan vaneritehtaassa eteen tulevista tapauksista. Näiden lisäksi päädyttiin suosittamaan erään mekaanisen metsäteollisuuden laitetoimittajan luomaa tiedonkeruu- ja tuotannonsuunnitteluohjelmistoa, joka valmiina ratkaisuna edesauttaa tietoverkon nopeaa implementointia.
Resumo:
Lyhyen kantaman radiotekniikoiden hyödyntäminen mahdollistaa uudenlaisten paikallisten palveluiden käytön ja vanhojen palveluiden kehittämisen. Kulunvalvonta on päivittäisenä palveluna valittu työn esimerkkisovellukseksi. Useita tunnistus- ja valtuutustapoja tutkitaan, ja julkisen avaimen infrastruktuuri on esitellään tarkemmin. Langattomat tekniikat Bluetooth, Zigbee, RFID ja IrDA esitellän yleisellä tasolla langattomat tekniikat –luvussa. Bluetooth-tekniikan rakennetta, mukaan lukien sen tietoturva-arkkitehtuuria, tutkitaan tarkemmin. Bluetooth-tekniikkaa käytetään työssä suunnitellun langattoman kulunvalvontajärjestelmän tietojen siirtoon. Kannettava päätelaite toimii käyttäjän henkilökohtaisena luotettuna laitteena, jota voi käyttää avaimena. Käyttäjän tunnistaminen ja valtuuttaminen perustuu julkisen avaimen infrastruktuuriin. Ylläpidon allekirjoittamat varmenteet sisältävät käyttäjän julkisen avaimen lisäksi tietoa hänestä ja hänen oikeuksistaan. Käyttäjän tunnistaminen kulunvalvontapisteissä tehdään julkisen ja salaisen avaimen käyttöön perustuvalla haaste-vastaus-menetelmällä. Lyhyesti, järjestelmässä käytetään Bluetooth-päätelaitteita langattomina avaimina.
Resumo:
Päättötyössäni tutkin, kuinka yritys voi yhdistää monimuotoista tietoa tietojärjestelmässään sekä millainen vaikutus yhdistämisellä on yrityksen tietojohtamiseen. Työni perustuu ongelman ratkaisuun. Selvitän alussa eri muotoisen tiedon yhdistämisen teoriaa ja käsitteitä sekä yritysten verkostoitumisen periaatetta, tietovirtoja, tietojohtamista, tietopääomaa. Keskeisin seikka yhdistämisessä on konvertointi. Käsittelen laajasti SGML :n suomia mahdollisuuksia, koska tavoitteena on laite- ja ohjelmistoympäristöistä riippumaton dokumentin esitysmuoto sekä rakenteen ja tulostusasun erottaminen toisistaan. Rakenteisella lähestymistavalla on useita etuja, kuten tiedon organisointi dokumentissa, tiedon uudelleenkäytön mahdollistaminen sekä dokumenttien pitkäikäisyys. Rakenteen merkkaus mahdollistaa dokumentin muuntamisen useisiin eri esitysmuotoihin. Empiirisessä osassa tutkin ja ratkaisen Televirmi Oy:lle tekemäni sovelluksen avulla, kuinka eri muodossa olevat tiedostot yhdistetään relaatiotietokantaan ja otetaan käyttöön tietojärjestelmässä. Yhdistämisen jälkeen analysoin yhdistämisen vaikutuksia yrityksen tietojohtamiseen yleisellä tasolla sekä tiedon hyödyntämisen mahdollisuuksia.
Resumo:
Tämän tutkielman tarkoituksena on ollut kartoittaa pankkien yrityksille tarjoamien elektronisten pankkipalveluiden nykytilaa suhteessa aiheesta kirjoitettuun teoriaan. Yrityspuolella pankkipalvelun käyttäjä ei välttämättä ole samalla omistaja, kuten yksityishenkilöille tarkoitetuissa palveluissa. Tästä johtuen tämä kenttä tarjoaa aivan uutta tutkittavaa vanhempien, lähinnä yksityishenkilöiden suhteen tehtyjen tutkimusten rinnalle. Yrityksille tarkoitetut elektroniset pankkipalvelut ovat pohjautuneet pitkälti vuosikymmeniä vanhoihin eräsiirtojärjestelmiin, joita aletaan vasta nyt muuttaa internetpohjaisiksi. Yritysten tarpeet sekä vaatimukset pankkien verkkopalveluiden suhteen tulevat olemaan moninaisia ja poikkeamaan paljonkin aiemmin rakennetuista yksityisten verkkopalveluista. Avainsanoja tällä saralla tulevat olemaan personointi, kustomointi, tehokkuus, turvallisuus, reaaliaikainen tieto sekä kommunikointi.Tutkielmaan on tuotu lisäsyvyyttä arvioimalla elektronisen kaupankäynnin tulevaisuutta, jossa myös pankkien rooli tulee olemaan todennäköisesti merkittävä. Tätä tukee yritysten siirtyminen mm. elektroniseen laskutukseen, sekä –kaupankäyntiin. Pankkien tulisikin löytää jokin luonteva (välittäjän) rooli kehittyvillä business to business sekä business to consumer markkinoilla. Tämä alue voi pitää ratkaisun avaimet käsissä siihen, kuinka katetaan esimerkiksi netotuspalveluiden aiheuttamat tulonmenetykset. Nämä ovat strategisia kysymyksiä, jolloin tulee päättää minne asti tarjottavia palveluita voidaan venyttää pankkipalveluiden nimissä ja mitkä taas selkeästi toteuttaa vaikkapa partneripalveluina. Tulevaisuudessa verkossa surffaaminen tulee kuitenkin keskittymään suuriin portaaleihin, ja näin ollen onkin syytä varmistaa jo ajoissa että on itse luomassa riittävän houkuttavaa kokonaisuutta omien ja partnerien tarjoamien palveluiden osalta, sekä varmistaa myös näkyvyys muissa kriittisissä keskittymissä verkossa.
Resumo:
Tässä työssä on pyritty kartoittamaan mahdollisuudet omatoimiseen Voyager-kirjastojärjestelmän aineistotietokantojen ja asiakasrekisterien yhdistelyyn. Lähtökohtana on ollut oletus, että kohdejärjestelmän tietokantaan ei ole oikeuksia eikä sopimusteknistä mahdollisuuttakaan kirjoittaa tietoja suoraan kyselykielellä. Järjestelmän dokumentaatiota sekä verkostoa hyödyntämällä olen pyrkinyt kartoittamaan mahdollisuudet kaiken toiminnallisuuden vaatiman datan siirtoon. Hyödyntämällä järjestelmän rajapintoja, voidaan saavuttaa kustannussäästöjä sekä joustavuutta työn suorittamisen aikataulutukseen. Bibliografisen datan siirtoon Voyager-kirjastojärjestelmässä on mahdollisuus hyödyntää palvelimella eräajona suoritettavaa ohjelmaa. Tässä eräajossa voidaan siirtää sekä bibliografiset tietueet että varastotietueet. Nidetietojen kirjoittamiseksi kohteena olevaan tietokantaan käytetään Visual Studio -sovellusta, joka hyödyntää luettelointirajapintaa. Asiakastietojen siirtoon on mahdollista hyödyntää palvelimella suoritettavaa eräajoa, jonka syötteeksi kirjoitetaan määrämittainen syötetiedosto. Asiakastietueisiin sidotut lainatiedot voidaan siirtää kohdetietokantaan asiakasohjelman offline-lainaustoiminnolla.
Resumo:
1. Introduction "The one that has compiled ... a database, the collection, securing the validity or presentation of which has required an essential investment, has the sole right to control the content over the whole work or over either a qualitatively or quantitatively substantial part of the work both by means of reproduction and by making them available to the public", Finnish Copyright Act, section 49.1 These are the laconic words that implemented the much-awaited and hotly debated European Community Directive on the legal protection of databases,2 the EDD, into Finnish Copyright legislation in 1998. Now in the year 2005, after more than half a decade of the domestic implementation it is yet uncertain as to the proper meaning and construction of the convoluted qualitative criteria the current legislation employs as a prerequisite for the database protection both in Finland and within the European Union. Further, this opaque Pan-European instrument has the potential of bringing about a number of far-reaching economic and cultural ramifications, which have remained largely uncharted or unobserved. Thus the task of understanding this particular and currently peculiarly European new intellectual property regime is twofold: first, to understand the mechanics and functioning of the EDD and second, to realise the potential and risks inherent in the new legislation in economic, cultural and societal dimensions. 2. Subject-matter of the study: basic issues The first part of the task mentioned above is straightforward: questions such as what is meant by the key concepts triggering the functioning of the EDD such as presentation of independent information, what constitutes an essential investment in acquiring data and when the reproduction of a given database reaches either qualitatively or quantitatively the threshold of substantiality before the right-holder of a database can avail himself of the remedies provided by the statutory framework remain unclear and call for a careful analysis. As for second task, it is already obvious that the practical importance of the legal protection providedby the database right is in the rapid increase. The accelerating transformationof information into digital form is an existing fact, not merely a reflection of a shape of things to come in the future. To take a simple example, the digitisation of a map, traditionally in paper format and protected by copyright, can provide the consumer a markedly easier and faster access to the wanted material and the price can be, depending on the current state of the marketplace, cheaper than that of the traditional form or even free by means of public lending libraries providing access to the information online. This also renders it possible for authors and publishers to make available and sell their products to markedly larger, international markets while the production and distribution costs can be kept at minimum due to the new electronic production, marketing and distributionmechanisms to mention a few. The troublesome side is for authors and publishers the vastly enhanced potential for illegal copying by electronic means, producing numerous virtually identical copies at speed. The fear of illegal copying canlead to stark technical protection that in turn can dampen down the demand for information goods and services and furthermore, efficiently hamper the right of access to the materials available lawfully in electronic form and thus weaken the possibility of access to information, education and the cultural heritage of anation or nations, a condition precedent for a functioning democracy. 3. Particular issues in Digital Economy and Information Networks All what is said above applies a fortiori to the databases. As a result of the ubiquity of the Internet and the pending breakthrough of Mobile Internet, peer-to-peer Networks, Localand Wide Local Area Networks, a rapidly increasing amount of information not protected by traditional copyright, such as various lists, catalogues and tables,3previously protected partially by the old section 49 of the Finnish Copyright act are available free or for consideration in the Internet, and by the same token importantly, numerous databases are collected in order to enable the marketing, tendering and selling products and services in above mentioned networks. Databases and the information embedded therein constitutes a pivotal element in virtually any commercial operation including product and service development, scientific research and education. A poignant but not instantaneously an obvious example of this is a database consisting of physical coordinates of a certain selected group of customers for marketing purposes through cellular phones, laptops and several handheld or vehicle-based devices connected online. These practical needs call for answer to a plethora of questions already outlined above: Has thecollection and securing the validity of this information required an essential input? What qualifies as a quantitatively or qualitatively significant investment? According to the Directive, the database comprises works, information and other independent materials, which are arranged in systematic or methodical way andare individually accessible by electronic or other means. Under what circumstances then, are the materials regarded as arranged in systematic or methodical way? Only when the protected elements of a database are established, the question concerning the scope of protection becomes acute. In digital context, the traditional notions of reproduction and making available to the public of digital materials seem to fit ill or lead into interpretations that are at variance with analogous domain as regards the lawful and illegal uses of information. This may well interfere with or rework the way in which the commercial and other operators have to establish themselves and function in the existing value networks of information products and services. 4. International sphere After the expiry of the implementation period for the European Community Directive on legal protection of databases, the goals of the Directive must have been consolidated into the domestic legislations of the current twenty-five Member States within the European Union. On one hand, these fundamental questions readily imply that the problemsrelated to correct construction of the Directive underlying the domestic legislation transpire the national boundaries. On the other hand, the disputes arisingon account of the implementation and interpretation of the Directive on the European level attract significance domestically. Consequently, the guidelines on correct interpretation of the Directive importing the practical, business-oriented solutions may well have application on European level. This underlines the exigency for a thorough analysis on the implications of the meaning and potential scope of Database protection in Finland and the European Union. This position hasto be contrasted with the larger, international sphere, which in early 2005 does differ markedly from European Union stance, directly having a negative effect on international trade particularly in digital content. A particular case in point is the USA, a database producer primus inter pares, not at least yet having aSui Generis database regime or its kin, while both the political and academic discourse on the matter abounds. 5. The objectives of the study The above mentioned background with its several open issues calls for the detailed study of thefollowing questions: -What is a database-at-law and when is a database protected by intellectual property rights, particularly by the European database regime?What is the international situation? -How is a database protected and what is its relation with other intellectual property regimes, particularly in the Digital context? -The opportunities and threats provided by current protection to creators, users and the society as a whole, including the commercial and cultural implications? -The difficult question on relation of the Database protection and protection of factual information as such. 6. Dsiposition The Study, in purporting to analyse and cast light on the questions above, is divided into three mainparts. The first part has the purpose of introducing the political and rationalbackground and subsequent legislative evolution path of the European database protection, reflected against the international backdrop on the issue. An introduction to databases, originally a vehicle of modern computing and information andcommunication technology, is also incorporated. The second part sets out the chosen and existing two-tier model of the database protection, reviewing both itscopyright and Sui Generis right facets in detail together with the emergent application of the machinery in real-life societal and particularly commercial context. Furthermore, a general outline of copyright, relevant in context of copyright databases is provided. For purposes of further comparison, a chapter on the precursor of Sui Generi, database right, the Nordic catalogue rule also ensues. The third and final part analyses the positive and negative impact of the database protection system and attempts to scrutinize the implications further in the future with some caveats and tentative recommendations, in particular as regards the convoluted issue concerning the IPR protection of information per se, a new tenet in the domain of copyright and related rights.
Resumo:
Despite the complexity of the Chinese culture consumer product businesses should apply them in building brands for Chinese markets. There are reasons to believe that cultural values and attitudes affect the buying behavior of Chinese consumers. Companies that wish to create brands in China should therefore be aware of the prevailing cultural values and consumer attitudes. This thesis will examine which values and attitudes mostly affect Chinese consumers of health food products. The study will be done by conducting a netnography. Because netnography is actually a collection methods rather than a single method, other auxiliary methods will also be applied. These methods are emotion, language and sentiment analysis (ELS analysis). Emotion analysis will be conducted because cultural values are mostly built on emotional basis. Sentiment analysis will assist in recognizing the key factors that help to locate values and attitudes. Because the netnography will be conducted in Chinese web forums by a non-native researcher, linguistic aspects should also be analyzed in parallel with emotions and sentiment analysis. The study shows that the Chinese consumers of health food products put much importance on functional, analytical and collectivistic attitudes as well as social and psychological values. Of all the twelve cultural values defined, the role of family rose above all. Also perseverance, frugality, guanxi and harmony were highly presented. The attitudes were found by recognizing certain attitude factors. Of all the factors, health foods’ functional benefits and aesthetic content together with consumers’ value consciousness surpassed other factors. Besides these results that can be applied by foreign health food companies willing to enter Chinese consumer markets, also academia can benefit this new approach for conducting ethnographies online.
Resumo:
With the growth in new technologies, using online tools have become an everyday lifestyle. It has a greater impact on researchers as the data obtained from various experiments needs to be analyzed and knowledge of programming has become mandatory even for pure biologists. Hence, VTT came up with a new tool, R Executables (REX) which is a web application designed to provide a graphical interface for biological data functions like Image analysis, Gene expression data analysis, plotting, disease and control studies etc., which employs R functions to provide results. REX provides a user interactive application for the biologists to directly enter the values and run the required analysis with a single click. The program processes the given data in the background and prints results rapidly. Due to growth of data and load on server, the interface has gained problems concerning time consumption, poor GUI, data storage issues, security, minimal user interactive experience and crashes with large amount of data. This thesis handles the methods by which these problems were resolved and made REX a better application for the future. The old REX was developed using Python Django and now, a new programming language, Vaadin has been implemented. Vaadin is a Java framework for developing web applications and the programming language is extremely similar to Java with new rich components. Vaadin provides better security, better speed, good and interactive interface. In this thesis, subset functionalities of REX was selected which includes IST bulk plotting and image segmentation and implemented those using Vaadin. A code of 662 lines was programmed by me which included Vaadin as the front-end handler while R language was used for back-end data retrieval, computing and plotting. The application is optimized to allow further functionalities to be migrated with ease from old REX. Future development is focused on including Hight throughput screening functions along with gene expression database handling
Resumo:
Music archives and composition manuscripts from the Viola database.
Resumo:
Diplomityössä on tutkittu reaaliaikaisen toimintolaskennan toteuttamista suomalaisen lasersiruja valmistavan PK-yrityksen tietojärjestelmään. Lisäksi on tarkasteltu toimintolaskennan vaikutuksia operatiiviseen toimintaan sekä toimintojen johtamiseen. Työn kirjallisuusosassa on käsitelty kirjallisuuslähteiden perusteella toimintolaskennan teorioita, laskentamenetelmiä sekä teknisessä toteutuksessa käytettyjä teknologioita. Työn toteutusosassa suunniteltiin ja toteutettiin WWW-pohjainen toimintolaskentajärjestelmä case-yrityksen kustannuslaskennan sekä taloushallinnon avuksi. Työkalu integroitiin osaksi yrityksen toiminnanohjaus- sekä valmistuksenohjausjärjestelmää. Perinteisiin toimintolaskentamallien tiedonkeruujärjestelmiin verrattuna case-yrityksessä syötteet toimintolaskentajärjestelmälle tulevat reaaliaikaisesti osana suurempaa tietojärjestelmäintegraatiota.Diplomityö pyrkii luomaan suhteen toimintolaskennan vaatimusten ja tietokantajärjestelmien välille. Toimintolaskentajärjestelmää yritys voi hyödyntää esimerkiksi tuotteiden hinnoittelussa ja kustannuslaskennassa näkemällä tuotteisiin liittyviä kustannuksia eri näkökulmista. Päätelmiä voidaan tehdä tarkkaan kustannusinformaatioon perustuen sekä määrittää järjestelmän tuottaman datan perusteella, onko tietyn projektin, asiakkuuden tai tuotteen kehittäminen taloudellisesti kannattavaa.
Resumo:
In this thesis author approaches the problem of automated text classification, which is one of basic tasks for building Intelligent Internet Search Agent. The work discusses various approaches to solving sub-problems of automated text classification, such as feature extraction and machine learning on text sources. Author also describes her own multiword approach to feature extraction and pres-ents the results of testing this approach using linear discriminant analysis based classifier, and classifier combining unsupervised learning for etalon extraction with supervised learning using common backpropagation algorithm for multilevel perceptron.