24 resultados para Advanced Application of Geographical Information Systems
Resumo:
The practice of information systems (IS) outsourcing is widely established among organizations. Nonetheless, evidence suggests that organizations differ considerably in the extent to which they deploy IS outsourcing. This variation has motivated research into the determinants of the IS outsourcing decision. Most of this research is based on the assumption that a decision on the outsourcing of a particular IS function is made independently of other IS functions. This modular view ignores the systemic nature of the IS function, which posits that IS effectiveness depends on how the various IS functions work together effectively. This study proposes that systemic influences are important criteria in evaluating the outsourcing option. It further proposes that the recognition of systemic influences in outsourcing decisions is culturally sensitive. Specifically, we provide evidence that systemic effects are factored into the IS outsourcing decision differently in more individualist cultures than in collectivist ones. Our results of a survey of United States and German firms indicate that perceived in-house advantages in the systemic impact of an IS function are, indeed, a significant determinant of IS outsourcing in a moderately individualist country (i.e., Germany), whereas insignificant in a strongly individualist country (i.e., the United States). The country differences are even stronger with regard to perceived in-house advantages in the systemic view of IS professionals. In fact, the direction of this impact is reversed in the United States sample. Other IS outsourcing determinants that were included as controls, such as cost efficiency, did not show significant country differences.
Resumo:
Cloud Computing is an enabler for delivering large-scale, distributed enterprise applications with strict requirements in terms of performance. It is often the case that such applications have complex scaling and Service Level Agreement (SLA) management requirements. In this paper we present a simulation approach for validating and comparing SLA-aware scaling policies using the CloudSim simulator, using data from an actual Distributed Enterprise Information System (dEIS). We extend CloudSim with concurrent and multi-tenant task simulation capabilities. We then show how different scaling policies can be used for simulating multiple dEIS applications. We present multiple experiments depicting the impact of VM scaling on both datacenter energy consumption and dEIS performance indicators.
Resumo:
In recent years, Geographic Information Systems (GIS) have increasingly been used in a wide array of application contexts for development cooperation in lowlands and mountain areas. When used for planning, implementation, and monitoring, GIS is a versatile and highly efficient tool, particularly in mountain areas characterized by great spatial diversity and inaccessibility. However, the establishment and application of GIS in mountain regions generally presents considerable technical challenges. Moreover, it is necessary to address specific institutional and organizational issues regarding implementation.
Resumo:
OBJECTIVE: To evaluate the ease of application of two-piece, graduated, compression systems for the treatment of venous ulcers. METHODS: Four kits used to provide limb compression in the management of venous ulcers were evaluated. These have been proven to be non-inferior to various types of bandages in clinical trials. The interface pressure exerted above the ankle by the under-stocking and the complete compression system and the force required to pull the over-stocking off were assessed in vitro. Ease of application of the four kits was evaluated in four sessions by five nurses who put stockings on their own legs in a blinded manner. They expressed their assessment of the stockings using a series of visual analogue scales (VASs). RESULTS: The Sigvaris Ulcer X((R)) kit provided a mean interface pressure of 46 mmHg and required a force in the range of 60-90 N to remove it. The Mediven((R)) ulcer kit exerted the same pressure but required force in the range of 150-190 N to remove it. Two kits (SurePress((R)) Comfort and VenoTrain((R)) Ulcertec) exerted a mean pressure of only 25 mmHg and needed a force in the range of 100-160 N to remove them. Nurses judged the Ulcer X and SurePress kits easiest to apply. Application of the VenoTrain kit was found slightly more difficult. The Mediven kit was judged to be difficult to use. CONCLUSIONS: Comparison of ease of application of compression-stocking kits in normal legs revealed marked differences between them. Only one system exerted a high pressure and was easy to apply. Direct comparison of these compression kits in leg-ulcer patients is required to assess whether our laboratory findings correlate with patient compliance and ulcer healing.
Resumo:
We present the results of an investigation into the nature of information needs of software developers who work in projects that are part of larger ecosystems. This work is based on a quantitative survey of 75 professional software developers. We corroborate the results identified in the sur- vey with needs and motivations proposed in a previous sur- vey and discover that tool support for developers working in an ecosystem context is even more meager than we thought: mailing lists and internet search are the most popular tools developers use to satisfy their ecosystem-related information needs.
Resumo:
Information systems (IS) outsourcing projects often fail to achieve initial goals. To avoid project failure, managers need to design formal controls that meet the specific contextual demands of the project. However, the dynamic and uncertain nature of IS outsourcing projects makes it difficult to design such specific formal controls at the outset of a project. It is hence crucial to translate high-level project goals into specific formal controls during the course of a project. This study seeks to understand the underlying patterns of such translation processes. Based on a comparative case study of four outsourced software development projects, we inductively develop a process model that consists of three unique patterns. The process model shows that the performance implications of emergent controls with higher specificity depend on differences in the translation process. Specific formal controls have positive implications for goal achievement if only the stakeholder context is adapted, while they are negative for goal achievement if in the translation process tasks are unintendedly adapted. In the latter case projects incrementally drift away from their initial direction. Our findings help to better understand control dynamics in IS outsourcing projects. We contribute to a process theoretic understanding of IS outsourcing governance and we derive implications for control theory and the IS project escalation literature.
Resumo:
Technology advances in hardware, software and IP-networks such as the Internet or peer-to-peer file sharing systems are threatening the music business. The result has been an increasing amount of illegal copies available on-line as well as off-line. With the emergence of digital rights management systems (DRMS), the music industry seems to have found the appropriate tool to simultaneously fight piracy and to monetize their assets. Although these systems are very powerful and include multiple technologies to prevent piracy, it is as of yet unknown to what extent such systems are currently being used by content providers. We provide empirical analyses, results, and conclusions related to digital rights management systems and the protection of digital content in the music industry. It shows that most content providers are protecting their digital content through a variety of technologies such as passwords or encryption. However, each protection technology has its own specific goal, and not all prevent piracy. The majority of the respondents are satisfied with their current protection but want to reinforce it for the future, due to fear of increasing piracy. Surprisingly, although encryption is seen as the core DRM technology, only few companies are currently using it. Finally, half of the respondents do not believe in the success of DRMS and their ability to reduce piracy.