818 resultados para Distributed Denial-of-service (DDoS)
Resumo:
The study concerns service management, and specifically the action service firms take with regard to customer dissatisfaction, customer complaints and complaining customers in high touch services. Customer dissatisfaction, customer complaints and complaining customers are called negative incidents in the study. The study fills a research gap in service management studies by investigating negative incidents as a part of an open service system. In contrast to main stream service management studies defining service quality as how the customer as a consumer defines it, in the present study, the concept of interactive service quality is adopted. The customer is considered as a co-producer of service who thus has a role to play in service quality and productivity. Additionally, the study juxtaposes the often opposed perspectives of the manager and the customer as well as the often forgotten silent voices of service employees and supervisors. The study proposes that the service firm as an entity does not act but it is the actors at the different hierarchical layers who act. Additionally, it is acknowledged in the study that the different actors at the different hierarchical layers have different knowledge of the service system and different objectives for service encounters. Therefore, they interpret the negative incidents from different perspectives and their actions upon negative incidents are subsequently guided by their interpretations. The research question is: how do service firms act upon negative incidents in high touch services? In order to answer to the research question a narrative research approach was chosen. The actors at the different hierarchical layers acted as informants of the study and provided stories about customer dissatisfaction, customer complaining and complaint handling in high touch services. Through storytelling, access to the socially constructed reality of service firms’ action was achieved. Stemming from the literature review, analysis of empirical data and my theoretical thinking, a theory about service firms’ action upon negative incidents in high touch services was developed and the research question was answered. The study contributes to service recovery and complaint management studies as well as to studies on customer orientation and its implementation in service firms. Additionally, the study has a methodological contribution to service management studies since it reflects service firms’ action with narratives from multiple perspectives. The study is positioned in the tradition of the Nordic School of Marketing Thought and presents service firms’ action upon negative incidents in high touch services as a complex human-centered phenomenon in which the actors at the different hierarchical layers have crucial roles to play. Ritva Höykinpuro is associated with CERS, the Centre for Relationship Marketing and Service Management at Hanken School of Economics.
Resumo:
The IEEE 802.1le medium access control (MAC) standard provides distributed service differentiation or Quality-of- Service (QoS) by employing a priority system. In 802.1 le networks, network traffic is classified into different priorities or access categories (ACs). Nodes maintain separate queues for each AC and packets at the head-of-line (HOL) of each queue contend for channel access using AC-specific parameters. Such a mechanism allows the provision of differentiated QoS where high priority, performance sensitive traffic such as voice and video applications will enjoy less delay, greater throughput and smaller loss, compared to low priority traffic (e. g. file transfer). The standard implicitly assumes that nodes are honest and will truthfully classify incoming traffic into its appropriate AC. However, in the absence of any additional mechanism, selfish users can gain enhanced performance by selectively classifying low priority traffic as high priority, potentially destroying the QoS capability of the system.
Resumo:
Scholarly research has produced conceptual knowledge that is based on real-life marketing phenomena. An initial aim of past research has been to produce marketing knowledge as a base for efficient business operation and for the improvement of productivity. Thus, an assumption has been that the knowledge would be applied by organisations. This study focuses on understanding the use of marketing knowledge within the field of service marketing. Hence, even if marketing knowledge about service-oriented principles and marketing of services is based on empirical research, there is a lack of knowledge on how this marketing knowledge is in fact applied by businesses. The study focuses on four essential concepts of services marketing knowledge, namely service quality, servicescape, internal marketing, and augmented service offering. The research involves four case companies. Data is based on in depth interviews and questionnaire-based surveys conducted with managers, employees, and customers of these companies. All organisations were currently developing in a service-oriented and customer-oriented direction. However, we found limitations, gaps, and barriers for the implementation of service-oriented and customer-oriented principles. Hence, we argue that the organisations involved in the study exploited conceptual knowledge symbolically and conceptually, but the instrumental use of knowledge was limited. Due to the shortcomings found, we also argue that the implementation of the various practices and processes that are related to becoming service-oriented and customer-oriented has not been fully successful. Further, we have come to the conclusion that the shortcomings detected were at least in some respect related to the fact that the understanding and utilisation of conceptual knowledge of service-oriented principles and marketing of services were somewhat limited.
Resumo:
Purpose –This paper explores and expands the roles of customers and companies in creating value by introducing a new a customer-based approach to service. The customer’s logic is examined as being the foundation of a customer-based marketing and business logic. Design/methodology/approach – The authors argue that both goods-dominant logics and service-dominant logics are provider-dominant. Contrasting the customer-dominant logic with provider-dominant logics, the paper examines the creation of service value from the perspectives of value-in-use, the customer’s own context, and the customer’s experience of service. Findings –Moving from a provider-dominant logic to a customer-dominant logic uncovered five major challenges to service marketers: Company involvement, company control in co-creation, visibility of value creation, locus of customer experience, and character of customer experience. Research limitations/implications – The paper is exploratory. It presents and discusses a conceptual model and suggests implications for research and practice. Practical implications –Awareness of the mechanisms of customer logic will provide businesses with new perspectives on the role of the company in their customer’s lives. We propose that understanding the customer’s logic should represent the starting-point for the marketer’s business logic. Originality/value – The paper increases the understanding of how the customer’s logic underpins the customer-dominant business logic. By exploring consequences of applying a customer-dominant logic, we suggest further directions for theoretical and empirical research.
Resumo:
Represented by approximately 85 species, Hemidactylus is one of the most diverse and widely distributed genera of reptiles in the world. In the Indian subcontinent, this genus is represented by 28 species out of which at least 13 are endemic to this region. Here, we report the phylogeny of the Indian Hemidactylus geckos based on mitochondrial and nuclear DNA markers sequenced from multiple individuals of widely distributed as well as endemic congeners of India. Results indicate that a majority of the species distributed in India form a distinct clade whose members are largely confined to the Indian subcontinent thus representing a unique Indian radiation. The remaining Hemidactylus geckos of India belong to two other geographical clades representing the Southeast Asian and West-Asian arid zone species. Additionally, the three widely distributed, commensal species (H. brookii, H. frenatus and H. flaviviridis) are nested within the Indian radiation suggesting their Indian origin. Dispersal-vicariance analysis also supports their Indian origin and subsequent dispersal out-of-India into West-Asian arid zone and Southeast Asia. Thus, Indian subcontinent has served as an important arena for diversification amongst the Hemidactylus geckos and in the evolution and spread of its commensal geckos. (C) 2010 Elsevier Inc. All rights reserved.
Resumo:
States regularly deploy elements of their armed forces abroad. When that happens, the military personnel concerned largely remain governed by the penal law of the State that they serve. This extraterritorial extension of national criminal law, which has been treated as axiomatic in domestic law and ignored by international law scholarship, is the subject of this dissertation. The first part of the study considers the ambit of national criminal law without any special regard to the armed forces. It explores the historical development of the currently prevailing system of territorial law and looks at the ambit that national legal systems claim today. Turning then to international law, the study debunks the oddly persistent belief that States enjoy a freedom to extend their laws to extraterritorial conduct as they please, and that they are in this respect constrained only by some specific prohibitions in international law. Six arguments historical, empirical, ideological, functional, doctrinal and systemic are advanced to support a contrary view: that States are prohibited from extending the reach of their legal systems abroad, unless they can rely on a permissive principle of international law for doing so. The second part of the study deals specifically with State jurisdiction in a military context, that is to say, as applied to military personnel in the strict sense (service members) and various civilians serving with or accompanying the forces (associated civilians). While the status of armed forces on foreign soil has transformed from one encapsulated in the customary concept of extraterritoriality to a modern regulation of immunities granted by treaties, elements of armed forces located abroad usually do enjoy some degree of insulation from the legal system of the host State. As a corollary, they should generally remain covered by the law of their own State. The extent of this extraterritorial extension of national law is revealed in a comparative review of national legislation, paying particular attention to recent legal reforms in the United States and the United Kingdom two states that have sought to extend the scope of their national law to cover the conduct of military contractor personnel. The principal argument of the dissertation is that applying national criminal law to service members and associated civilians abroad is distinct from other extraterritorial claims of jurisdiction (in particular, the nationality principle or the protective principle of jurisdiction). The service jurisdiction over the armed forces has a distinct aim: ensuring the coherence and indivisibility of the forces and maintaining discipline. Furthermore, the exercise of service jurisdiction seeks to reduce the chances of the State itself becoming internationally liable for the conduct of its service members and associated civilians. Critically, the legal system of the troop-deploying State, by extending its reach abroad, seeks to avoid accountability gaps that might result from immunities from host State law.
Resumo:
Male flowering was studied at the canopy level in 10 silver birch (Betula pendula Roth) stands from 8 localities and in 14 downy birch (B. pubescens Ehrh.) stands from 10 localities in Finland from 1963 to 1973. Distributions of cumulative pollen catches were compared to the normal Gaussian distribution. The basis for the timing of flowering was the 50 per cent point of the anthesis-fitted normal distribution. To eliminate effects of background pollen, only the central, normally distributed part of the cumulative distribution was used. Development up to the median point of the distribution was measured and tested in calendar days, in degree days (> 5 °C) and in period units. The count of each parameter began on and included March 19. Male flowering in silver birch occurred from late April to late June depending on latitude, and flowering in downy birch took place from early May to early July. The heat sums needed for male flowering varied in downy birch stands latitudinally but there was practically no latitudinal variation in heat sums needed for silver birch flowering. The amount of male flowering in stands of both birch species were found to have a large annual variation but without any clear periodicity. The between years pollen catch variation in stands of either birch species did not show any significant latitudinal correlation in contrast to Norway spruce stands. The period unit heat sum gave the most accurate forecast of the timing of flowering for 60 per cent of the silver birch stands and for 78.6 per cent of the for downy birch stands. Calendar days, however, gave the best forecast for silver birch in 25 per cent of the cases, while degree days gave the best forecast for downy birch in 21.4 per cent of the cases. Silver birch seems to have a local inclination for a more fixed flowering date compared to downy birch, which could mean a considerable photoperiodic influence on flowering time of silver birch. Silver birch and downy birch had different geographical correlations. Frequent hybridization of birch species occurs more often in northern Finland in than in more southern latitudes. The different timing in flowering caused increasing scatter in flowering times in the north, especially in the case of downy birch. The chance of simultaneous flowering of silver birch and downy birch so increased northwards due to a more variable climate and also higher altitudinal variations. Compared with conifers, the reproduction cycles of both birch species were found to be well protected from damage by frost.
Resumo:
The high cost and extraordinary demands made on sophisticated air defence systems, pose hard challenges to the managers and engineers who plan the operation and maintenance of such systems. This paper presents a study aimed at developing simulation and systems analysis techniques for the effective planning and efficient operation of small fleets of aircraft, typical of the air force of a developing country. We consider an important aspect of fleet management: the problem of resource allocation for achieving prescribed operational effectiveness of the fleet. At this stage, we consider a single flying-base, where the operationally ready aircraft are stationed, and a repair-depot, where the planes are overhauled. An important measure of operational effectiveness is ‘ availability ’, which may be defined as the expected fraction of the fleet fit for use at a given instant. The tour of aircraft in a flying-base, repair-depot system through a cycle of ‘ operationally ready ’ and ‘ scheduled overhaul ’ phases is represented first by a deterministic flow process and then by a cyclic queuing process. Initially the steady-state availability at the flying-base is computed under the assumptions of Poisson arrivals, exponential service times and an equivalent singleserver repair-depot. This analysis also brings out the effect of fleet size on availability. It defines a ‘ small ’ fleet essentially in terms of the important ‘ traffic ’ parameter of service rate/maximum arrival rate.A simulation model of the system has been developed using GPSS to study sensitivity to distributional assumptions, to validate the principal assumptions of the analytical model such as the single-server assumption and to obtain confidence intervals for the statistical parameters of interest.
Resumo:
The open development model of software production has been characterized as the future model of knowledge production and distributed work. Open development model refers to publicly available source code ensured by an open source license, and the extensive and varied distributed participation of volunteers enabled by the Internet. Contemporary spokesmen of open source communities and academics view open source development as a new form of volunteer work activity characterized by hacker ethic and bazaar governance . The development of the Linux operating system is perhaps the best know example of such an open source project. It started as an effort by a user-developer and grew quickly into a large project with hundreds of user-developer as contributors. However, in hybrids , in which firms participate in open source projects oriented towards end-users, it seems that most users do not write code. The OpenOffice.org project, initiated by Sun Microsystems, in this study represents such a project. In addition, the Finnish public sector ICT decision-making concerning open source use is studied. The purpose is to explore the assumptions, theories and myths related to the open development model by analysing the discursive construction of the OpenOffice.org community: its developers, users and management. The qualitative study aims at shedding light on the dynamics and challenges of community construction and maintenance, and related power relations in hybrid open source, by asking two main research questions: How is the structure and membership constellation of the community, specifically the relation between developers and users linguistically constructed in hybrid open development? What characterizes Internet-mediated virtual communities and how can they be defined? How do they differ from hierarchical forms of knowledge production on one hand and from traditional volunteer communities on the other? The study utilizes sociological, psychological and anthropological concepts of community for understanding the connection between the real and the imaginary in so-called virtual open source communities. Intermediary methodological and analytical concepts are borrowed from discourse and rhetorical theories. A discursive-rhetorical approach is offered as a methodological toolkit for studying texts and writing in Internet communities. The empirical chapters approach the problem of community and its membership from four complementary points of views. The data comprises mailing list discussion, personal interviews, web page writings, email exchanges, field notes and other historical documents. The four viewpoints are: 1) the community as conceived by volunteers 2) the individual contributor s attachment to the project 3) public sector organizations as users of open source 4) the community as articulated by the community manager. I arrive at four conclusions concerning my empirical studies (1-4) and two general conclusions (5-6). 1) Sun Microsystems and OpenOffice.org Groupware volunteers failed in developing necessary and sufficient open code and open dialogue to ensure collaboration thus splitting the Groupware community into volunteers we and the firm them . 2) Instead of separating intrinsic and extrinsic motivations, I find that volunteers unique patterns of motivations are tied to changing objects and personal histories prior and during participation in the OpenOffice.org Lingucomponent project. Rather than seeing volunteers as a unified community, they can be better understood as independent entrepreneurs in search of a collaborative community . The boundaries between work and hobby are blurred and shifting, thus questioning the usefulness of the concept of volunteer . 3) The public sector ICT discourse portrays a dilemma and tension between the freedom to choose, use and develop one s desktop in the spirit of open source on one hand and the striving for better desktop control and maintenance by IT staff and user advocates, on the other. The link between the global OpenOffice.org community and the local end-user practices are weak and mediated by the problematic IT staff-(end)user relationship. 4) Authoring community can be seen as a new hybrid open source community-type of managerial practice. The ambiguous concept of community is a powerful strategic tool for orienting towards multiple real and imaginary audiences as evidenced in the global membership rhetoric. 5) The changing and contradictory discourses of this study show a change in the conceptual system and developer-user relationship of the open development model. This change is characterized as a movement from hacker ethic and bazaar governance to more professionally and strategically regulated community. 6) Community is simultaneously real and imagined, and can be characterized as a runaway community . Discursive-action can be seen as a specific type of online open source engagement. Hierarchies and structures are created through discursive acts. Key words: Open Source Software, open development model, community, motivation, discourse, rhetoric, developer, user, end-user
Resumo:
We develop new scheduling algorithms for the IEEE 802.16d OFDMA/TDD based broadband wireless access system, in which radio resources of both time and frequency slots are dynamically shared by all users. Our objective is to provide a fair and efficient allocation to all the users to satisfy their quality of service.
Resumo:
This paper reports new results concerning the capabilities of a family of service disciplines aimed at providing per-connection end-to-end delay (and throughput) guarantees in high-speed networks. This family consists of the class of rate-controlled service disciplines, in which traffic from a connection is reshaped to conform to specific traffic characteristics, at every hop on its path. When used together with a scheduling policy at each node, this reshaping enables the network to provide end-to-end delay guarantees to individual connections. The main advantages of this family of service disciplines are their implementation simplicity and flexibility. On the other hand, because the delay guarantees provided are based on summing worst case delays at each node, it has also been argued that the resulting bounds are very conservative which may more than offset the benefits. In particular, other service disciplines such as those based on Fair Queueing or Generalized Processor Sharing (GPS), have been shown to provide much tighter delay bounds. As a result, these disciplines, although more complex from an implementation point-of-view, have been considered for the purpose of providing end-to-end guarantees in high-speed networks. In this paper, we show that through ''proper'' selection of the reshaping to which we subject the traffic of a connection, the penalty incurred by computing end-to-end delay bounds based on worst cases at each node can be alleviated. Specifically, we show how rate-controlled service disciplines can be designed to outperform the Rate Proportional Processor Sharing (RPPS) service discipline. Based on these findings, we believe that rate-controlled service disciplines provide a very powerful and practical solution to the problem of providing end-to-end guarantees in high-speed networks.
Resumo:
We provide a comparative performance evaluation of packet queuing and link admission strategies for low-speed wide area network Links (e.g. 9600 bps, 64 kbps) that interconnect relatively highspeed, connectionless local area networks (e.g. 10 Mbps). In particular, we are concerned with the problem of providing differential quality of service to interLAN remote terminal and file transfer sessions, and throughput fairness between interLAN file transfer sessions. We use analytical and simulation models to study a variety of strategies. Our work also serves to address the performance comparison of connectionless vs. connection-oriented interconnection of CLNS LANS. When provision of priority at the physical transmission level is not feasible, we show, for low-speed WAN links (e.g. 9600 bps), the superiority of connection-oriented interconnection of connectionless LANs, with segregation of traffic streams with different QoS requirements into different window flow controlled connections. Such an implementation can easily be obtained by transporting IP packets over an X.25 WAN. For 64 kbps WAN links, there is a drop in file transfer throughputs, owing to connection overheads, but the other advantages are retained, The same solution also helps to provide throughput fairness between interLAN file transfer sessions. We also provide a corroboration of some of our modelling results with results from an experimental test-bed.
Resumo:
In this paper we consider an N x N non-blocking, space division ATM switch with input cell queueing. At each input, the cell arrival process comprises geometrically distributed bursts of consecutive cells for the various outputs. Motivated by the fact that some input links may be connected to metropolitan area networks, and others directly to B-ISDN terminals, we study the situation where there are two classes of inputs with different values of mean burst length. We show that when inputs contend for an output, giving priority to an input with smaller expected burst length yields a saturation throughput larger than if the reverse priority is given. Further, giving priority to less bursty traffic can give better throughput than if all the inputs were occupied by this less bursty traffic. We derive the asymptotic (as N --> infinity) saturation throughputs for each priority class.
Resumo:
Analytical and numerical solutions have been obtained for some moving boundary problems associated with Joule heating and distributed absorption of oxygen in tissues. Several questions have been examined which are concerned with the solutions of classical formulation of sharp melting front model and the classical enthalpy formulation in which solid, liquid and mushy regions are present. Thermal properties and heat sources in the solid and liquid regions have been taken as unequal. The short-time analytical solutions presented here provide useful information. An effective numerical scheme has been proposed which is accurate and simple.
Resumo:
Service discovery is vital in ubiquitous applications, where a large number of devices and software components collaborate unobtrusively and provide numerous services without user intervention. Existing service discovery schemes use a service matching process in order to offer services of interest to the users. Potentially, the context information of the users and surrounding environment can be used to improve the quality of service matching. To make use of context information in service matching, a service discovery technique needs to address certain challenges. Firstly, it is required that the context information shall have unambiguous representation. Secondly, the devices in the environment shall be able to disseminate high level and low level context information seamlessly in the different networks. And thirdly, dynamic nature of the context information be taken into account. We propose a C-IOB(Context-Information, Observation and Belief) based service discovery model which deals with the above challenges by processing the context information and by formulating the beliefs based on the observations. With these formulated beliefs the required services will be provided to the users. The method has been tested with a typical ubiquitous museum guide application over different cases. The simulation results are time efficient and quite encouraging.