834 resultados para security outsourcing
Resumo:
In East Africa, Uganda is one of the major producers of organic pineapples for export. These pineapples are mainly produced in central Uganda and have to meet stringent quality standards before they can be allowed on international markets. These quality standards may put considerable strain on farmers and may not be wholly representative of their quality interpretation. The aim of this paper is therefore, to determine the Ugandan organic pineapple farmers’ quality perception, the activities they carry out in order to attain that quality and challenges (production, postharvest & marketing) faced on the same. Qualitative semi-structured interviews were carried out among 28 organic pineapple farmers in Kayunga district, central Uganda. Findings suggest that quality of organic pineapples is mainly perceived in terms of product attributes particularly appearance followed by food security provision. Certification plays a minor role in what farmers describe as organic quality. High production input costs (labour and coffee husks) coupled with a stagnant premium are some of the major challenges faced by farmers in attaining organic quality. The paper argues that currently there are concealed negative food security effects embroiled in these pineapple schemes. It is recommended that the National Organic Agricultural Movement of Uganda (NOGAMU) works with all relevant stakeholders to have the farmer premium price raised and an official organic policy enacted.
Resumo:
Durante la última década hemos presenciado una revolución tecnológica que nos ha llevado a interconectarnos globalmente, desde las redes sociales como mecanismo de unión entre las personas hasta los servicios mercerizados prestados a través de la web que cada día van logrando un tejido empresarial mas informado y en contacto, en donde la información es en tiempo real y de gran ayuda para la toma de decisiones diarias. En el siguiente texto podremos observar de forma más detenida y detallada la forma en que se están generando unidades de negocio estratégicas que surgen a medida que la conectividad comienza a ser prioridad en muchas organizaciones, en donde buscan generar ventajas competitivas por medio de la tercerización de procesos, lo que ha llevado que Colombia quiera ser pionera en dicha materia. Pero para lograr consolidar un aparato productivo que incursione en el mundo digital y preparar la fuerza laboral para que pueda prestar dichos servicios tercer izados el gobierno ha ubicado los puntos críticos en donde se deben focalizar los recursos y los esfuerzos, de esta forma este texto busca aclarar y generar nuevas ideas en torno a la tercerización de los servicios, pasando por los modelos de negocios en la tercerización, los medios y la realidad actual de Colombia en este mercado.
Resumo:
student created resource collection, poster, slide set, ref list
Resumo:
Content related to the second INFO2009 assignment for Group 6's radio interview on data security and the DPA
Resumo:
This contains a poster advertising the resources. The resource is a profile folder on five topics, as well as a website, a quiz, and an interactive game.
Resumo:
Background reading for coursework to prepare a technical report as part of the orientation phase. These items are business documents (i.e. grey literature) which might be read as a prelude or complement to finding information in peer reviewed academic publications. grey literature links and articles to be used in preparation of technical report. See also overview guidance document for this assignment http://www.edshare.soton.ac.uk/8017/
Resumo:
This is the INFO2009 project for group 17 Our topic is Security. Our resource is a website that contains links to different questionnaires we created to help educate people in various subtopics of Security
Resumo:
Contains visually-appealing and informative "infographics" containing descriptions of common security vulnerabilities and general information about security. Suitable for use in a blog post or printed out and on the wall in an educational area. Also contains video podcasts demonstrating common security exploits in realistic web systems, and offering practical advice on fixing them. Created by "Am and the Raging Otters".
Resumo:
By antipirates
Resumo:
These slides cover aspects of network design and technology relevant to a campus network deployment such as that at the University of Southampton.
Resumo:
A run through various aspects of Distributed Denial of Service attacks