104 resultados para software management infrastructure


Relevância:

40.00% 40.00%

Publicador:

Resumo:

The desire to reduce carbon emissions due to transportation sources has led over the past decade to the development of new propulsion technologies, focused on vehicle electrification (including hybrid, plug-in hybrid and battery electric vehicles). These propulsion technologies, along with advances in telecommunication and computing power, have the potential of making passenger and commercial vehicles more energy efficient and environment friendly. In particular, energy management algorithms are an integral part of plug-in vehicles and are very important for achieving the performance benefits. The optimal performance of energy management algorithms depends strongly on the ability to forecast energy demand from the vehicle. Information available about environment (temperature, humidity, wind, road grade, etc.) and traffic (traffic density, traffic lights, etc.), is very important in operating a vehicle at optimal efficiency. This article outlines some current technologies that can help achieving this optimum efficiency goal. In addition to information available from telematic and geographical information systems, knowledge of projected vehicle charging demand on the power grid is necessary to build an intelligent energy management controller for future plug-in hybrid and electric vehicles. The impact of charging millions of vehicles from the power grid could be significant, in the form of increased loading of power plants, transmission and distribution lines, emissions and economics (information are given and discussed for the US case). Therefore, this effect should be considered in an intelligent way by controlling/scheduling the charging through a communication based distributed control.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The worldwide increase of patent applications and the important role patents play in economic development make the management of intellectual property (IP) an important area for many companies. At the same time, the complexity in decision-making and IP process management necessitates a high degree of collaboration between various enterprise divisions such as strategy and policy making and market research. In this paper we present an ongoing case study at a large international automotive manufacturer that is exploring the potential of social software to support patent management. We conducted 31 semi-structured interviews to identify relevant patent processes at the company as well as typical operational problems within these processes. This leads us to derive four propositions on how social software can support patent processes. We conclude by providing an overview of the next steps in our research project. Our results present a first step in understanding the role of emerging social software services in enabling collaborative patent management.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Internet has become an integral part of our everyday lives and it is often difficult to imagine how we ever functioned without it. This chapter presents experiences of two entrepreneurial companies, one of which has survived the 'dot-com bubble burst.' The chapter identifies current and future online business environments especially in light of open source software (OSS)   being accepted globally. Unlike proprietary software (such as Windows), OSS comes with its internal implementation details (source code) visible both to its developers and users, along with the freedom to change and redistribute this source. The significant implications of this unique style of software distribution for e-entrepreneurs are examined. Having a flexible  strategic plan; possessing management skills; providing excellent service; and having patience are some of the recommendations provided by  interviewed e-entrepreneurs. When made part of the decision making  process, these recommendations would enhance current and future e_entrepreneurs in sustaining their business.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Nowadays web services technology is widely used to integrate heterogeneous systems and develop new applications. In this paper, an application of integration of hotel management systems by web services technology is presented. The Group Hotel Integration Reservation System (GHIRS) integrates lots of systems of hotel industry such as Front Office system, Property Management system, Enterprise Information System (EIS), Enterprise Information Portal system (EIP), Customer Relationship Management system (CRM) and Supply Chain Management system (SCM) together. This integration solution can add or expand hotel software system in any size of hotel chains environment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The risk of failure of the software development process remains high despite many attempts to improve the quality of software engineering. Contemporary approaches to process assurance, such as the capability maturity model have not prevented systemic failures, nor have project management methodologies provided guarantees of software quality. The paper proposes an approach to software quality assurance based on a knowledge mediated concurrent audit, which incorporates essential feedback processes. Through a tightly integrated approach to quality audit, programmers would be empowered to use any chosen methodology to advantage, supported by intelligent monitoring of the essential interactions which occur in the development process. An experimental application implementing some aspects of the proposal is described

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper outlines an introductory course in software engineering undertaken by computing students at Deakin University. The course focuses on areas of that are often not emphasized in introductory software engineering. These areas include formal problem solving, management of software development, communication, and working in groups. The approach includes the application of concepts in a collaborative group setting. Enhancements to the course have been made over a number of semesters and evidence suggests that our overall approach is working. The skills acquired by students taking this course can be applied to later courses in software engineering, particularly the capstone project course, and to professional life

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent advances in technology and new software applications are steadily transforming human civilization into what is called the Information Society. This is manifested by the new terminology appearing in our daily activities. E-Business, E-Government, E-Learning, E-Contracting, and E-Voting are just a few of the ever-growing list of new terms that are shaping the Information Society. Nonetheless, as "Information" gains more prominence in our society, the task of securing it against all forms of threats becomes a vital and crucial undertaking. Addressing the various security issues confronting our new Information Society, this volume is divided into 13 parts covering the following topics: Information Security Management; Standards of Information Security; Threats and Attacks to Information; Education and Curriculum for Information Security; Social and Ethical Aspects of Information Security; Information Security Services; Multilateral Security; Applications of Information Security; Infrastructure for Information Security Advanced Topics in Security; Legislation for Information Security; Modeling and Analysis for Information Security; Tools for Information Security. Security in the Information Society: Visions and Perspectives comprises the proceedings of the 17th International Conference on Information Security (SEC2002), which was sponsored by the International Federation for Information Processing (IFIP), and jointly organized by IFIP Technical Committee 11 and the Department of Electronics and Electrical Communications of Cairo University. The conference was held in May 2002 in Cairo, Egypt. This volume is essential reading for scholars, researchers, and practitioners interested inkeeping pace with the ever-growing field of Information Security.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wilh the protection of critical information infrastructure becoming a priority for all levels of management. there is a need for a new security methodology to deal with the new and unique attack threats and vulnerabilities associated with the new information technology security paradigm. The fourth generation security risk analysis melhod which copes wilh the shift from computer/information security to critical information iinfrastructure protectionl is lhe next step toward handling security risk at all levels. The paper will present the methodology of
fourth generation models and their application to critical information infrastructure protection and the associated advantagess of this methodology.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The demolition activities of buildings produce numerous environmental pressures as a large proportion of demolition waste materials are sent to landfill directly in many projects. Web-based waste exchange systems could provide right solutions for releasing these pressures. Because the approaches adopted in current waste exchange systems are inefficient, these systems cannot generate waste exchange, not achieving their final goal, environmental protection. The Just-in-time (JIT) philosophy has been applied in the manufacture industry for decades and it is proven to be effective to eliminate or minimise inventory during production. This research aims to adopt the JIT philosophy into a demolition project management informapon system so that the system is more efficient in handling waste exchange. The system structure, key components and Just-in-time adoption are proposed and identified. Finally, a proto typed system is demonstrated.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Critical Information Infrastructure (CII) has become a priority for all levels of management, It is one of the key components of efficient business and business continuity plans. There is a need for a new security methodology to deal with the new and unique attack threats and vulnerabilities associated with the new information technology security paradigm. Critical Information Infrastructure Protection - Risk Analysis Methodology
(ClIP-RAM), is a new security risk analysis method which copes with the shift from computer/information security to critical information infrastructure protection. This type of methodology is the next step toward handling information technology security risk at all levels from upper management information security down to firewall configurations. The paper will present the methodology of the new techniques and their application to critical information infrastructure protection. The associated advantages of this methodology will also be discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Early in 2001, after a damning public report by the Auditor-General, the Australian Federal Government abandoned its highly promoted “whole of government” IT infrastructure outsourcing initiative. This about-face was greeted in the press with reports that the initiative was a “fiasco”. Yet a four-year case study conducted by the authors suggests a more complex picture. Like many other “selective” outsourcers of IT, the Federal Government had been led to believe that it was adopting a relatively low risk strategy that would, if well managed, lead to significant cost savings and operational benefits. Instead, despite having implemented many widely promoted “best practices”, the Federal Government found a substantial discrepancy between what outsourcing promised to deliver, and what was actually achieved. In this respect their experiences were no different from those of many other large IT organizations engaged in selective IT outsourcing, who responded to a substantial contemporaneous survey. This case study examines why the Government’s expectations were not achieved, and arrives at conclusions that have important implications for decision makers confronted with choices about sourcing IT service delivery.