960 resultados para Generic Security Services Application Program Interface (GSS-API)
Resumo:
Thesis (Ph.D.)--University of Washington, 2016-06
Resumo:
This paper examines what is still a relatively new phenomenon in the literature, the outsourcing/offshoring of high-technology manufacturing and services. This has become a concern for both policy makers and academics for two reasons. Firstly, policy makers have become concerned that the offshoring of high-technology sectors in the West will follow the more labour intensive sectors, and move to lower cost locations. Secondly, international business theory has tended to view low costs, and high levels of indigenous technological development as being the two main drivers of location advantage in the attraction of FDI. We show that this may not be the case for offshored high-technology manufacturing or services.
Resumo:
This paper examines what is still a relatively new phenomenon in the literature, the outsourcing / offshoring of high technology manufacturing and services. This has become a concern for both policy makers and academics for two reasons. Firstly, policy makers have become concerned that the offshoring of high technology sectors in the West will follow the more labour intensive sectors, and move to lower cost locations. Secondly, international business theory has tended to view low costs, and high levels of indigenous technological development as being the two main drivers of location advantage in the attraction of FDI. We show that this may not be the case for offshored high technology manufacturing or services.
Resumo:
In a certain automobile factory, batch-painting of the body types in colours is controlled by an allocation system. This tries to balance production with orders, whilst making optimally-sized batches of colours. Sequences of cars entering painting cannot be optimised for easy selection of colour and batch size. `Over-production' is not allowed, in order to reduce buffer stocks of unsold vehicles. Paint quality is degraded by random effects. This thesis describes a toolkit which supports IKBS in an object-centred formalism. The intended domain of use for the toolkit is flexible manufacturing. A sizeable application program was developed, using the toolkit, to test the validity of the IKBS approach in solving the real manufacturing problem above, for which an existing conventional program was already being used. A detailed statistical analysis of the operating circumstances of the program was made to evaluate the likely need for the more flexible type of program for which the toolkit was intended. The IKBS program captures the many disparate and conflicting constraints in the scheduling knowledge and emulates the behaviour of the program installed in the factory. In the factory system, many possible, newly-discovered, heuristics would be awkward to represent and it would be impossible to make many new extensions. The representation scheme is capable of admitting changes to the knowledge, relying on the inherent encapsulating properties of object-centres programming to protect and isolate data. The object-centred scheme is supported by an enhancement of the `C' programming language and runs under BSD 4.2 UNIX. The structuring technique, using objects, provides a mechanism for separating control of expression of rule-based knowledge from the knowledge itself and allowing explicit `contexts', within which appropriate expression of knowledge can be done. Facilities are provided for acquisition of knowledge in a consistent manner.
Resumo:
Objectives: To conduct an independent evaluation of the first phase of the Health Foundation's Safer Patients Initiative (SPI), and to identify the net additional effect of SPI and any differences in changes in participating and non-participating NHS hospitals. Design: Mixed method evaluation involving five substudies, before and after design. Setting: NHS hospitals in United Kingdom. Participants: Four hospitals (one in each country in the UK) participating in the first phase of the SPI (SPI1); 18 control hospitals. Intervention: The SPI1 was a compound (multicomponent) organisational intervention delivered over 18 months that focused on improving the reliability of specific frontline care processes in designated clinical specialties and promoting organisational and cultural change. Results: Senior staff members were knowledgeable and enthusiastic about SPI1. There was a small (0.08 points on a 5 point scale) but significant (P<0.01) effect in favour of the SPI1 hospitals in one of 11 dimensions of the staff questionnaire (organisational climate). Qualitative evidence showed only modest penetration of SPI1 at medical ward level. Although SPI1 was designed to engage staff from the bottom up, it did not usually feel like this to those working on the wards, and questions about legitimacy of some aspects of SPI1 were raised. Of the five components to identify patients at risk of deterioration - monitoring of vital signs (14 items); routine tests (three items); evidence based standards specific to certain diseases (three items); prescribing errors (multiple items from the British National Formulary); and medical history taking (11 items) - there was little net difference between control and SPI1 hospitals, except in relation to quality of monitoring of acute medical patients, which improved on average over time across all hospitals. Recording of respiratory rate increased to a greater degree in SPI1 than in control hospitals; in the second six hours after admission recording increased from 40% (93) to 69% (165) in control hospitals and from 37% (141) to 78% (296) in SPI1 hospitals (odds ratio for "difference in difference" 2.1, 99% confidence interval 1.0 to 4.3; P=0.008). Use of a formal scoring system for patients with pneumonia also increased over time (from 2% (102) to 23% (111) in control hospitals and from 2% (170) to 9% (189) in SPI1 hospitals), which favoured controls and was not significant (0.3, 0.02 to 3.4; P=0.173). There were no improvements in the proportion of prescription errors and no effects that could be attributed to SPI1 in non-targeted generic areas (such as enhanced safety culture). On some measures, the lack of effect could be because compliance was already high at baseline (such as use of steroids in over 85% of cases where indicated), but even when there was more room for improvement (such as in quality of medical history taking), there was no significant additional net effect of SPI1. There were no changes over time or between control and SPI1 hospitals in errors or rates of adverse events in patients in medical wards. Mortality increased from 11% (27) to 16% (39) among controls and decreased from17%(63) to13%(49) among SPI1 hospitals, but the risk adjusted difference was not significant (0.5, 0.2 to 1.4; P=0.085). Poor care was a contributing factor in four of the 178 deaths identified by review of case notes. The survey of patients showed no significant differences apart from an increase in perception of cleanliness in favour of SPI1 hospitals. Conclusions The introduction of SPI1 was associated with improvements in one of the types of clinical process studied (monitoring of vital signs) and one measure of staff perceptions of organisational climate. There was no additional effect of SPI1 on other targeted issues nor on other measures of generic organisational strengthening.
Resumo:
In recent years, claims about children's developing brains have become central to the formation of child health and welfare policies in England. While these policies assert that they are based on neuro-scientific discoveries, their relationship to neuroscience itself has been debated. However, what is clear is that they portray a particular understanding of children and childhood, one that is marked by a lack of acknowledgment of child personhood. Using an analysis of key government-commissioned reports and additional advocacy documents, this article illustrates the ways that the mind of the child is reduced to the brain, and this brain comes to represent the child. It is argued that a highly reductionist and limiting construction of the child is produced, alongside the idea that parenting is the main factor in child development. It is concluded that this focus on children's brains, with its accompanying deterministic perspective on parenting, overlooks children's embodied lives and this has implications for the design of children's health and welfare services.
Resumo:
Objectives: To explore interactions between audiology patients and volunteers, to describe encounters and define the role of volunteers. Methods: Qualitative ethnographic and interview study of volunteer-patient interactions. Ten volunteer participants from two volunteer schemes in South West England were observed and interviewed. Three patient participants were interviewed. Results: Analysis of observational data showed that volunteers provided support relating to local services and hearing aids, but did not engage in discussions about hearing loss. Interviews with volunteers identified gaps in audiology provision, including accessible services and clear information and highlighted a need for more support from audiology services to enable them to fulfil their role. Volunteer interactions with patients mimicked a clinician-patient encounter and volunteers employed strategies and behaviours used by professional audiologists. Conclusions: Audiology volunteers could provide an accessible bridge between health services and the community but their care is limited to focus on hearing aids. Practice implications: Volunteers enable patients to use hearing aids appropriately and are a core element of current care arrangements. However, volunteers express a need for adequate support from audiology services. Volunteers have the potential to increase service capacity and to bridge the gaps between community and audiology healthcare services.
Resumo:
Health service accounting reforms are frequently promoted, explained or justified with reference to ageing populations, expensive medical technologies and their purported implications for the cost of health care. Drawing on Foucault’s genealogical method, we examine the emergence of concerns regarding health expenditure in the wake of the creation of the British National Health Service in 1948, and their relationship with health service accounting practices. We argue that concerns regarding the cost of health care are historically contingent rather than inescapable consequences of demographic and technological change, and that health service accounting practices are both constitutive and reflective of such concerns. We conclude by relating our analysis to current attempts to control costs and increase efficiency in the health services.
Resumo:
The manufacturing sector is leaving the West for Asia’s low wages and good working culture. Europe would be better off keeping these manufacturing activities, slowing down wage inflation and what is more, letting a young, cheaper workforce from the East settle down within their borders. This would aid in preserving the diverse economic structure which has been characteristic for Europe.Beside the economic growth there are two more concepts which have turned into the “holy cows” of economics during the last fifty years. One is the need to constantly improve labor productivity and the other is increasing competitiveness of nations. The high labor productivity of some countries, induces severe unemployment in the globalized world. In the other hand it is high time we understood that it is not competition, but cooperation that brings more happiness to humanity.Should we still opt for “happiness” and “sanity”, it is quite obvious that we all should, in economists’ terms, define our individual welfare functions corresponding to our own set of values, staying free from the influence of media, advertisements and fashion. The cornerstone to all this is the intelligent citizen who prefers local goods and services.
Resumo:
Charts outlining the College of Medicine's organizational hierarchy, planning phases, and student services.
Resumo:
A draft of the College of Medicine's Student Catalog. Details information on the history of Florida International University and the College of Medicine, as well as Admissions information, an overview of the College of Medicine's curriculum, requirements, and student services.
Resumo:
The purpose of this paper is to explore the use of automated inventory management systems (IMS) and identify the stage of technology adoption for restaurants in Aruba. A case study analysis involving twelve members of the Aruba Gastronomic Association was conducted using a qualitative research design to gather information on approaches currently used as well as the reasons and perceptions managers/owners have for using or not using automated systems in their facilities. This is the first study conducted using the Aruba restaurant market. Therefore, the application of two technology adoption models was used to integrate critical factors relevant to the study. Major findings indicated the use of an automated IMS in restaurants is limited, thus underscoring the lack of adoption of technology in this area. The results also indicated that two major reasons that restaurants are not adopting IMS technology are budgetary constraints and service support. This study is imperative for two reasons: (1) the results of this study can be used as a comparison for future IMS adoption, not only for Aruba’s restaurant industry but also for other Caribbean destinations and the U.S., (2) this study also provides insight into the additional training and support help needed in hospitality technology services.
Resumo:
Resorts in the future will be feeling the effect of a number of changes in the industry. Changing demographics, economic conditions and the changing priorities of resort guests will play major roles in the future success of resort properties. The authors stress that future resort marketing should emphasize the expansion of current market segments, the creation of new market segments, and hte expansion of qualirty services.
Resumo:
The Internet has become an integral part of our nation's critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a 'distance metric'. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.