841 resultados para implementation of organizational values
Resumo:
The main objective for this degree project is to implement an Application Availability Monitoring (AAM) system named Softek EnView for Fujitsu Services. The aim of implementing the AAM system is to proactively identify end user performance problems, such as application and site performance, before the actual end users experience them. No matter how well applications and sites are designed and nomatter how well they meet business requirements, they are useless to the end users if the performance is slow and/or unreliable. It is important for the customers to find out whether the end user problems are caused by the network or application malfunction. The Softek EnView was comprised of the following EnView components: Robot, Monitor, Reporter, Collector and Repository. The implemented system, however, is designed to use only some of these EnView elements: Robot, Reporter and depository. Robots can be placed at any key user location and are dedicated to customers, which means that when the number of customers increases, at the sametime the amount of Robots will increase. To make the AAM system ideal for the company to use, it was integrated with Fujitsu Services’ centralised monitoring system, BMC PATROL Enterprise Manager (PEM). That was actually the reason for deciding to drop the EnView Monitor element. After the system was fully implemented, the AAM system was ready for production. Transactions were (and are) written and deployed on Robots to simulate typical end user actions. These transactions are configured to run with certain intervals, which are defined collectively with customers. While they are driven against customers’ applicationsautomatically, transactions collect availability data and response time data all the time. In case of a failure in transactions, the robot immediately quits the transactionand writes detailed information to a log file about what went wrong and which element failed while going through an application. Then an alert is generated by a BMC PATROL Agent based on this data and is sent to the BMC PEM. Fujitsu Services’ monitoring room receives the alert, reacts to it according to the incident management process in ITIL and by alerting system specialists on critical incidents to resolve problems. As a result of the data gathered by the Robots, weekly reports, which contain detailed statistics and trend analyses of ongoing quality of IT services, is provided for the Customers.
Resumo:
The aim was to evaluate results and experiences from development of new technology, a training program and implementation of strategies for the use of a video exposure monitoring method, PIMEX. Starting point of this study is an increased incidence of asthma among workers in the aluminium industry. Exposure peaks of fumes are supposed to play an important role. PIMEX makes it possible to link used work practice, use of control technology, and so forth to peaks. Nine companies participated in the project, which was divided into three parts, development of PIMEX technology, production of training material, and training in use of equipment and related strategies. The use of the video exposure monitoring method PIMEX offers prerequisites supporting workers participation in safety activities. The experiences from the project reveal the importance of good timing of primary training, technology development, technical support, and follow up training. In spite of a delay of delivery of the new technology, representatives from the participating companies declared that the experiences showed that PIMEX gave an important contribution for effective control of hazards in the companies. Eight out of nine smelters used the PIMEX method as a part of a strategy for control of workers exposure to fumes in potrooms. Possibilities to conduct effective control measures were identified. This article describes experiences from implementation of a, for this branch, new method supporting workers participation for workplace improvements.
Resumo:
BACKGROUND: Even though Swedish national guidelines for stroke care (SNGSC) have been accessible for nearly a decade access to stroke rehabilitation in out-patient health care vary considerably. In order to aid future interventions studies for implementation of SNGSC, this study assessed the feasibility and acceptability of study procedures including analysis of the context in out-patient health care settings. METHODS: The feasibility and acceptability of recruitment, observations and interviews with managers, staff and patients were assessed, as well as the feasibility of surveying health care records. RESULTS: To identify patients from the the hospitals was feasible but not from out-patient care where a need to relieve clinical staff of the recruitment process was identified. Assessing adherence to guidelines and standardized evaluations of patient outcomes through health care records was found to be feasible and suitable assessment tools to evaluate patient outcome were identified. Interviews were found to be a feasible and acceptable tool to survey the context of the health care setting. CONCLUSION: In this feasibility study a variety of qualitative and quantitative data collection procedures and measures were tested. The results indicate what can be used as a set of feasible and acceptable data collection procedures and suitable measures for studying implementation of stroke guidelines in an out-patient health care context.
Resumo:
First-order temporal logic is a concise and powerful notation, with many potential applications in both Computer Science and Artificial Intelligence. While the full logic is highly complex, recent work on monodic first-order temporal logics has identified important enumerable and even decidable fragments. In this paper, we develop a clausal resolution method for the monodic fragment of first-order temporal logic over expanding domains. We first define a normal form for monodic formulae and then introduce novel resolution calculi that can be applied to formulae in this normal form. We state correctness and completeness results for the method. We illustrate the method on a comprehensive example. The method is based on classical first-order resolution and can, thus, be efficiently implemented.