987 resultados para Computer Sciences Corporation
Resumo:
Based on the report for the unit “Sociology of New Information Technologies” of the Master on Computer Sciences at FCT/University Nova Lisbon in 2015-16. The responsible of this curricular unit is Prof. António Moniz
Resumo:
This paper analyzes the formation of Research Corporations as an alternative governance structure for performing R&D compared to pursuing in-house R&D projects. Research Corporations are privatefor-profit research centers that bring together several firms with similar research goals. In a Research Corporation formal authority over the choice of projects is jointly exercised by the top management of the member firms. A private for-profit organization cannot commit not to interfere with the project choice of the researchers. However, increasing the number of member firms of the Research Corporation reduces the incentive of member firms to meddle with the research projects of researchers because exercising formal authority over the choice of research projects is a public good. The Research Corporation thus offers researchers greater autonomy than a single firm pursuing an identical research program in its in-house R&D department. This attracts higher ability researchers to the Research Corporation compared to the internal R&D department. The paper uses the theoretical model to analyze the organization of the Microelectronics and Computer Technology Corporation (MCC). The facts of this case confirm the existence of a tension between control over the choice of research projects and the ability of researchers that the organization is able to attract or hold onto.
Resumo:
This thesis aims to find an effective way of conducting a target audience analysis (TAA) in cyber domain. There are two main focal points that are addressed; the nature of the cyber domain and the method of the TAA. Of the cyber domain the object is to find the opportunities, restrictions and caveats that result from its digital and temporal nature. This is the environment in which the TAA method is examined in this study. As the TAA is an important step of any psychological operation and critical to its success, the method used must cover all the main aspects affecting the choice of a proper target audience. The first part of the research was done by sending an open-ended questionnaire to operators in the field of information warfare both in Finland and abroad. As the results were inconclusive, the research was completed by assessing the applicability of United States Army Joint Publication FM 3-05.301 in the cyber domain via a theory-based content analysis. FM 3- 05.301 was chosen because it presents a complete method of the TAA process. The findings were tested against the results of the questionnaire and new scientific research in the field of psychology. The cyber domain was found to be “fast and vast”, volatile and uncontrollable. Although governed by laws to some extent, the cyber domain is unpredictable by nature and not controllable to reasonable amount. The anonymity and lack of verification often present in the digital channels mean that anyone can have an opinion, and any message sent may change or even be counterproductive to the original purpose. The TAA method of the FM 3-05.301 is applicable in the cyber domain, although some parts of the method are outdated and thus suggested to be updated if used in that environment. The target audience categories of step two of the process were replaced by new groups that exist in the digital environment. The accessibility assessment (step eight) was also redefined, as in the digital media the mere existence of a written text is typically not enough to convey the intended message to the target audience. The scientific studies made in computer sciences and both in psychology and sociology about the behavior of people in social media (and overall in cyber domain) call for a more extensive remake of the TAA process. This falls, however, out of the scope of this work. It is thus suggested that further research should be carried out in search of computer-assisted methods and a more thorough TAA process, utilizing the latest discoveries of human behavior. ---------------------------------------------------------------------------------------------------------------------------------- Tämän opinnäytetyön tavoitteena on löytää tehokas tapa kohdeyleisöanalyysin tekemiseksi kybertoimintaympäristössä. Työssä keskitytään kahteen ilmiöön: kybertoimintaympäristön luonteeseen ja kohdeyleisöanalyysin metodiin. Kybertoimintaympäristön osalta tavoitteena on löytää sen digitaalisesta ja ajallisesta luonteesta juontuvat mahdollisuudet, rajoitteet ja sudenkuopat. Tämä on se ympäristö jossa kohdeyleisöanalyysiä tarkastellaan tässä työssä. Koska kohdeyleisöanalyysi kuuluu olennaisena osana jokaiseen psykologiseen operaatioon ja on onnistumisen kannalta kriittinen tekijä, käytettävän metodin tulee pitää sisällään kaikki oikean kohdeyleisön valinnan kannalta merkittävät osa-alueet. Tutkimuksen ensimmäisessä vaiheessa lähetettiin avoin kysely informaatiosodankäynnin ammattilaisille Suomessa ja ulkomailla. Koska kyselyn tulokset eivät olleet riittäviä johtopäätösten tekemiseksi, tutkimusta jatkettiin tarkastelemalla Yhdysvaltojen armeijan kenttäohjesäännön FM 3-05.301 soveltuvuutta kybertoimintaympäristössä käytettäväksi teorialähtöisen sisällönanalyysin avulla. FM 3-05.301 valittiin koska se sisältää kokonaisvaltaisen kohdeyleisöanalyysiprosessin. Havaintoja verrattiin kyselytutkimuksen tuloksiin ja psykologian uusiin tutkimuksiin. Kybertoimintaympäristö on tulosten perusteella nopea ja valtava, jatkuvasti muuttuva ja kontrolloimaton. Vaikkakin lait hallitsevat kybertoimintaympäristöä jossakin määrin, on se silti luonteeltaan ennakoimaton eikä sitä voida luotettavasti hallita. Digitaalisilla kanavilla usein läsnäoleva nimettömyys ja tiedon tarkastamisen mahdottomuus tarkoittavat että kenellä tahansa voi olla mielipide asioista, ja mikä tahansa viesti voi muuttua, jopa alkuperäiseen tarkoitukseen nähden vastakkaiseksi. FM 3-05.301:n metodi toimii kybertoimintaympäristössä, vaikkakin jotkin osa-alueet ovat vanhentuneita ja siksi ne esitetään päivitettäväksi mikäli metodia käytetään kyseisessä ympäristössä. Kohdan kaksi kohdeyleisökategoriat korvattiin uusilla, digitaalisessa ympäristössä esiintyvillä ryhmillä. Lähestyttävyyden arviointi (kohta 8) muotoiltiin myös uudestaan, koska digitaalisessa mediassa pelkkä tekstin läsnäolo ei sellaisenaan tyypillisesti vielä riitä halutun viestin välittämiseen kohdeyleisölle. Tietotekniikan edistyminen ja psykologian sekä sosiologian aloilla tehty tieteellinen tutkimus ihmisten käyttäytymisestä sosiaalisessa mediassa (ja yleensä kybertoimintaympäristössä) mahdollistavat koko kohdeyleisöanalyysiprosessin uudelleenrakentamisen. Tässä työssä sitä kuitenkaan ei voida tehdä. Siksi esitetäänkin että lisätutkimusta tulisi tehdä sekä tietokoneavusteisten prosessien että vielä syvällisempien kohdeyleisöanalyysien osalta, käyttäen hyväksi viimeisimpiä ihmisen käyttäytymiseen liittyviä tutkimustuloksia.
Resumo:
Additive manufacturing, or 3D printing, is globally one of most interesting area in developing of manufacturing technologies. This technology is suitable for fabrication off industrial products and it interests actors in fields of computer sciences, economics, medical sciences and design&arts. Additive manufacturing is often referred as third industrial revolution: first revolution was invention of steam engines in 18th century and second was industrial revolution started by Henry Ford in 1920s. Companies should be able to test suitability of their products for additive manufacturing and 3D printing but also how much better products could be when products are totally re-designed so that all potential of this new technology can be utilized. This is where education has its importance; new generations who enter working life should be educated to know of additive manufacturing and 3D printing, its advantages but also of it limits. There has to be also possibility to educate industry and people already working there, so that industrial implementation could be done successfully. This is especially very valid for Finland. Education is strongly needed so that Finnish industry can maintain its competence in global markets. Role of education is extremely important when a new technology is industrially implemented. Additive manufacturing and 3D printing offers freedom to design new products, production and generally ways of doing things. Development, planning and execution of education for additive manufacturing and 3D printing is challenging as this area develops very fast. New innovations are coming almost every month. Planning of education for additive manufacturing and 3D printing requires collection pieces of data from various of sources. Additive manufacturing and 3D printing industry and its development has to be followed frequently, and material for additive manufacturing and 3D printing has to be renewed frequently.
Resumo:
Award winning student essay. This essay won the Student Writing Award Scheme via the HE Academy Subject Network for Information and Computer Sciences.
Resumo:
Con la creciente popularidad de las soluciones de IT como factor clave para aumentar la competitividad y la creación de valor para las empresas, la necesidad de invertir en proyectos de IT se incrementa considerablemente. La limitación de los recursos como un obstáculo para invertir ha obligado a las empresas a buscar metodologías para seleccionar y priorizar proyectos, asegurándose de que las decisiones que se toman son aquellas que van alineadas con las estrategias corporativas para asegurar la creación de valor y la maximización de los beneficios. Esta tesis proporciona los fundamentos para la implementación del Portafolio de dirección de Proyectos de IT (IT PPM) como una metodología eficaz para la gestión de proyectos basados en IT, y una herramienta para proporcionar criterios claros para los directores ejecutivos para la toma de decisiones. El documento proporciona la información acerca de cómo implementar el IT PPM en siete pasos, el análisis de los procesos y las funciones necesarias para su ejecución exitosa. Además, proporciona diferentes métodos y criterios para la selección y priorización de proyectos. Después de la parte teórica donde se describe el IT PPM, la tesis aporta un análisis del estudio de caso de una empresa farmacéutica. La empresa ya cuenta con un departamento de gestión de proyectos, pero se encontró la necesidad de implementar el IT PPM debido a su amplia cobertura de procesos End-to-End en Proyectos de IT, y la manera de asegurar la maximización de los beneficios. Con la investigación teórica y el análisis del estudio de caso, la tesis concluye con una definición práctica de un modelo aproximado IT PPM como una recomendación para su implementación en el Departamento de Gestión de Proyectos.
Resumo:
Resumen tomado de la publicaci??n
Resumo:
External interferences can severely degrade the performance of an Over-the-horizon radar (OTHR), so suppression of external interferences in strong clutter environment is the prerequisite for the target detection. The traditional suppression solutions usually began with clutter suppression in either time or frequency domain, followed by the interference detection and suppression. Based on this traditional solution, this paper proposes a method characterized by joint clutter suppression and interference detection: by analyzing eigenvalues in a short-time moving window centered at different time position, Clutter is suppressed by discarding the maximum three eigenvalues at every time position and meanwhile detection is achieved by analyzing the remained eigenvalues at different position. Then, restoration is achieved by forward-backward linear prediction using interference-free data surrounding the interference position. In the numeric computation, the eigenvalue decomposition (EVD) is replaced by values decomposition (SVD) based on the equivalence of these two processing. Data processing and experimental results show its efficiency of noise floor falling down about 10-20 dB.
Resumo:
The use of online social networking tools (SNTs) has become commonplace within higher education. In this paper a definition and a typology of educational affordance of social networking service (SNS) are presented. The paper also explores the educational affordances whilst examining how university lecturers and students use SNTs to support their educational activities. The data presented here were obtained through a survey in which 38 participants from three universities took part; two universities in Uganda and one in the United Kingdom. The results show that Facebook is the most popular tool with 75 % of participants having profiles. Whilst most participants perceived the educational significance of these tools, social affordances remain more pronounced compared to pedagogical and technological affordances. The limitations of this study have also been discussed.
Resumo:
Although social networking sites (SNSs) present a great deal of opportunities to support learning, the privacy risk is perceived by learners as a friction point that affects their full use for learning. Privacy risks in SNSs can be divided into risks that are posed by the SNS provider itself and risks that result from user’s social interactions. Using an online survey questionnaire, this study explored the students’ perception of the benefits in using social networking sites for learning purposes and their perceived privacy risks. A sample of 214 students from Uganda Christian University in Africa was studied. The results show that although 88 % of participants indicated the usefulness of SNSs for learning, they are also aware of the risks associated with these sites. Most of the participants are concerned with privacy risks such as identity theft, cyber bullying, and impersonation that might influence their online learning participation in SNSs.