15 resultados para McKinnon Dash and Hardware Company
em CentAUR: Central Archive University of Reading - UK
Resumo:
This article examines Corporate Social Responsibility (CSR) and mining community development, sustainability and viability. These issues are considered focussing on current and former company-owned mining towns in Namibia. Historically company towns have been a feature of mining activity in Namibia. However, the fate of such towns upon mine closure has been and remains controversial. Declining former mining communities and even ghost mining towns can be found across the country. This article draws upon research undertaken in Namibia and considers these issues with reference to three case study communities. This article examines the complexities which surround decision-making about these communities, and the challenges faced in efforts to encourage their sustainability after mining. In this article, mine company engagements through CSR with the development, sustainability and viability of such communities are also critically discussed. The role, responsibilities, and actions of the state in relation to these communities are furthermore reflected upon. Finally, ways forward for these communities are considered.
Resumo:
This paper describes the development and first results of the “Community Integrated Assessment System” (CIAS), a unique multi-institutional modular and flexible integrated assessment system for modelling climate change. Key to this development is the supporting software infrastructure, SoftIAM. Through it, CIAS is distributed between the community of institutions which has each contributed modules to the CIAS system. At the heart of SoftIAM is the Bespoke Framework Generator (BFG) which enables flexibility in the assembly and composition of individual modules from a pool to form coupled models within CIAS, and flexibility in their deployment onto the available software and hardware resources. Such flexibility greatly enhances modellers’ ability to re-configure the CIAS coupled models to answer different questions, thus tracking evolving policy needs. It also allows rigorous testing of the robustness of IA modelling results to the use of different component modules representing the same processes (for example, the economy). Such processes are often modelled in very different ways, using different paradigms, at the participating institutions. An illustrative application to the study of the relationship between the economy and the earth’s climate system is provided.
Resumo:
We describe a compositional framework, together with its supporting toolset, for hardware/software co-design. Our framework is an integration of a formal approach within a traditional design flow. The formal approach is based on Interval Temporal Logic and its executable subset, Tempura. Refinement is the key element in our framework because it will derive from a single formal specification of the system the software and hardware parts of the implementation, while preserving all properties of the system specification. During refinement simulation is used to choose the appropriate refinement rules, which are applied automatically in the HOL system. The framework is illustrated with two case studies. The work presented is part of a UK collaborative research project between the Software Technology Research Laboratory at the De Montfort University and the Oxford University Computing Laboratory.
Resumo:
Between 1972 and 2001, the English late-modernist poet Roy Fisher provided the text for nine separate artist's books produced by Ron King at the Circle Press. Taken together, as Andrew Lambirth has written, the Fisher-King collaborations represent a sustained investigation of the various ways in which text and image can be integrated, breaking the mould of the codex or folio edition, and turning the book into a sculptural object. From the three-dimensional pop-up designs of Bluebeard's Castle (1973), each representing a part of the edifice (the portcullis, the armoury and so on), to ‘alphabet books’ such as The Half-Year Letters (1983), held in an ingenious french-folded concertina which can be stretched to over a metre long or compacted to a pocketbook, the project of these art books is to complicate their own bibliographic codes, and rethink what a book can be. Their folds and reduplications give a material form to the processes by which meanings are produced: from the discovery, in Top Down, Bottom Up (1990), of how to draw on both sides of the page at the same time, to the developments of The Left-Handed Punch (1987) and Anansi Company (1992), where the book becomes first a four-dimensional theatre space, in which a new version of Punch and Judy is played out by twelve articulated puppets, and then a location for characters that are self-contained and removable, in the form of thirteen hand-made wire and card rod-puppets. Finally, in Tabernacle (2001), a seven-drawer black wooden cabinet that stands foursquare like a sculpture (and sells to galleries and collectors for over three thousand pounds), the conception of the book and the material history of print are fully undone and reconstituted. This paper analyses how the King-Fisher art books work out their radically material poetics of the book; how their emphasis on collaboration, between artist and poet, image and text, and also book and reader – the construction of meaning becoming a co-implicated process – continuously challenges hierarchies and fixities in our conception of authorship; and how they re-think the status of poetic text and the construction of the book as material object.
Resumo:
This work presents two schemes of measuring the linear and angular kinematics of a rigid body using a kinematically redundant array of triple-axis accelerometers with potential applications in biomechanics. A novel angular velocity estimation algorithm is proposed and evaluated that can compensate for angular velocity errors using measurements of the direction of gravity. Analysis and discussion of optimal sensor array characteristics are provided. A damped 2 axis pendulum was used to excite all 6 DoF of the a suspended accelerometer array through determined complex motion and is the basis of both simulation and experimental studies. The relationship between accuracy and sensor redundancy is investigated for arrays of up to 100 triple axis (300 accelerometer axes) accelerometers in simulation and 10 equivalent sensors (30 accelerometer axes) in the laboratory test rig. The paper also reports on the sensor calibration techniques and hardware implementation.
Resumo:
The problem of technology obsolescence in information intensive businesses (software and hardware no longer being supported and replaced by improved and different solutions) and a cost constrained market can severely increase costs and operational, and ultimately reputation risk. Although many businesses recognise technological obsolescence, the pervasive nature of technology often means they have little information to identify the risk and location of pending obsolescence and little money to apply to the solution. This paper presents a low cost structured method to identify obsolete software and the risk of their obsolescence where the structure of a business and its supporting IT resources can be captured, modelled, analysed and the risk to the business of technology obsolescence identified to enable remedial action using qualified obsolescence information. The technique is based on a structured modelling approach using enterprise architecture models and a heatmap algorithm to highlight high risk obsolescent elements. The method has been tested and applied in practice in three consulting studies carried out by Capgemini involving four UK police forces. However the generic technique could be applied to any industry based on plans to improve it using ontology framework methods. This paper contains details of enterprise architecture meta-models and related modelling.
Resumo:
Using a variation of the Nelson-Siegel term structure model we examine the sensitivity of real estate securities in six key global markets to unexpected changes in the level, slop and curvature of the yield curve. Our results confirm the time-sensitive nature of the exposure and sensitivity to interest rates and highlight the importance of considering the entire term structure of interest rates. One issue that is of particular of interest is that despite the 2007-9 financial crisis the importance of unanticipated interest rate risk weakens post 2003. Although the analysis does examine a range of markets the empirical analysis is unable to provide definitive evidence as to whether REIT and property-company markets display heightened or reduced exposure.
Resumo:
The availability of a network strongly depends on the frequency of service outages and the recovery time for each outage. The loss of network resources includes complete or partial failure of hardware and software components, power outages, scheduled maintenance such as software and hardware, operational errors such as configuration errors and acts of nature such as floods, tornadoes and earthquakes. This paper proposes a practical approach to the enhancement of QoS routing by means of providing alternative or repair paths in the event of a breakage of a working path. The proposed scheme guarantees that every Protected Node (PN) is connected to a multi-repair path such that no further failure or breakage of single or double repair paths can cause any simultaneous loss of connectivity between an ingress node and an egress node. Links to be protected in an MPLS network are predefined and an LSP request involves the establishment of a working path. The use of multi-protection paths permits the formation of numerous protection paths allowing greater flexibility. Our analysis will examine several methods including single, double and multi-repair routes and the prioritization of signals along the protected paths to improve the Quality of Service (QoS), throughput, reduce the cost of the protection path placement, delay, congestion and collision.
Resumo:
We present a novel way of interacting with an immersive virtual environment which involves inexpensive motion-capture using the Wii Remote®. A software framework is also presented to visualize and share this information across two remote CAVETM-like environments. The resulting applications can be used to assist rehabilitation by sending motion information across remote sites. The application’s software and hardware components are scalable enough to be used on desktop computer when home-based rehabilitation is preferred.
Resumo:
Ubiquitous healthcare is an emerging area of technology that uses a large number of environmental and patient sensors and actuators to monitor and improve patients’ physical and mental condition. Tiny sensors gather data on almost any physiological characteristic that can be used to diagnose health problems. This technology faces some challenging ethical questions, ranging from the small-scale individual issues of trust and efficacy to the societal issues of health and longevity gaps related to economic status. It presents particular problems in combining developing computer/information/media ethics with established medical ethics. This article describes a practice-based ethics approach, considering in particular the areas of privacy, agency, equity and liability. It raises questions that ubiquitous healthcare will force practitioners to face as they develop ubiquitous healthcare systems. Medicine is a controlled profession whose practise is commonly restricted by government-appointed authorities, whereas computer software and hardware development is notoriously lacking in such regimes.
Resumo:
We present a novel way of interacting with an immersive virtual environment which involves inexpensive motion-capture using the Wii Remote®. A software framework is also presented to visualize and share this information across two remote CAVETM-like environments. The resulting application can be used to assist rehabilitation by sending motion information across remote sites. The application’s software and hardware components are scalable enough to be used on a desktop computer when home-based rehabilitation is preferred.
Resumo:
Purpose – The purpose of this paper is to explore, from a practical point-of-view, a number of key strategic issues that critically influence organisations' competitiveness. Design/methodology/approach – The paper is based on a semi-structured interview with Mr Paul Walsh, CEO of Diageo. Diageo is a highly successful company and Mr Walsh has played a central role in making Diageo the number one branded drink company in the world. Findings – The paper discusses the key attributes of successful merger, lessons from a complex cross boarder acquisition, rationale for strategic alliance with competitors, distinctive resources, and the role of corporate social responsibility. Research limitations/implications – It is not too often that management scholars have the opportunity to discuss with the CEOs of large multinationals the rational of key strategic decisions. In this paper these issues are explored from the perspective of a CEO of a large and successful company. The lessons, while not generalisable, offer unique insights to students of management and management researchers. Originality/value – The paper offers a bridge between theory and practice. It demonstrates that from Diageo's perspective the distinctive capabilities are intangible. It also offers insight into how to successfully execute strategic decision. In terms of originality it offers a view from the top, which is often missing from strategy research.
Resumo:
In this paper, we aim to distil myriad stakeholder voices through a Foucaudian theoretical apparatus in the establishment of ethical stakeholder voices amidst a takeover of a Ghanaian National Bank with ownership control by the state National Pension Fund and Insurance Company. Resonating with Foucault’s position that, the prove and an actual practice of ethical principles despite risk is non-existent within a democracy, this paper reveals how stakeholders in a takeover further their own interest to the neglect of the very germane societal expectation of a salient stakeholder role. We further fill an existing gap within the stakeholder literature that posit of stakeholders as always possessing the right and ethical voices. We conclude that, despite Foucault’s last lecture of The Courage of Truth: The Government of the Self and others having proven of a robust apparatus in distilling ethical voices from non-ethical within the realm of a democratic field, its idealist nature demands a counterfactual position.
Resumo:
The problem of technology obsolescence in information intensive businesses (software and hardware no longer being supported and replaced by improved and different solutions) and a cost constrained market can severely increase costs and operational, and ultimately reputation risk. Although many businesses recognise technological obsolescence, the pervasive nature of technology often means they have little information to identify the risk and location of pending obsolescence and little money to apply to the solution. This paper presents a low cost structured method to identify obsolete software and the risk of their obsolescence where the structure of a business and its supporting IT resources can be captured, modelled, analysed and the risk to the business of technology obsolescence identified to enable remedial action using qualified obsolescence information. The technique is based on a structured modelling approach using enterprise architecture models and a heatmap algorithm to highlight high risk obsolescent elements. The method has been tested and applied in practice in two consulting studies carried out by Capgemini involving three UK police forces. However the generic technique could be applied to any industry based on plans to improve it using ontology framework methods. This paper contains details of enterprise architecture meta-models and related modelling.
Resumo:
The extensive use of cloud computing in educational institutes around the world brings unique challenges for universities. Some of these challenges are due to clear differences between Europe and Middle East universities. These differences stem from the natural variation between people. Cloud computing has created a new concept to deal with software services and hardware infrastructure. Some benefits are immediately gained, for instance, to allow students to share their information easily and to discover new experiences of the education system. However, this introduces more challenges, such as security and configuration of resources in shared environments. Educational institutes cannot escape from these challenges. Yet some differences occur between universities which use cloud computing as an educational tool or a form of social connection. This paper discusses some benefits and limitations of using cloud computing and major differences in using cloud computing at universities in Europe and the Middle East, based on the social perspective, security and economics concepts, and personal responsibility.