804 resultados para key management
Resumo:
La extrema competitividad derivada de la globalización, hace que los proyectos en Tecnologías de la Información (TI), no se valoren por si son buenos o malos. Se da por supuesto que el producto tecnológico es innovador, aporta un valor añadido y tiene un fundamento tecnológico sólido y bien construido. Europa es un gran exponente en Desarrollo e Investigación (I+D), pero todavía está por detrás de países como Estados Unidos o Japón en cuanto a Innovación (i). Nos falta conseguir llegar al mercado. No basta con conseguir con éxito una prueba de concepto. Hay que ir más allá. Partimos de la base de un proyecto: Secretify, un cliente de correo web multicuenta sencillo y atractivo que permite a los usuarios cifrar sus comunicaciones utilizando cuentas de correo electrónico ya existentes, sin la necesidad de saber nada sobre seguridad, criptografía o gestión de claves. La finalidad de este Trabajo es aplicar todos los conceptos aprendidos durante el Máster (en concreto en la rama de Gestión, Innovación y Negocio TI), para convertir Secretify en un producto que sacar al mercado con éxito, teniendo los conocimientos tanto técnicos como empresariales, para minimizar los riesgos y adecuarse al mercado.---ABSTRACT---The extreme competitiveness derived from globalization, makes projects in Information Technologies (IT) to not be evaluated for its goodness. It is assumed that the technology product is innovative, provides added value and has a solid technology basis and well constructed. Europe is a great exponent in Research & Development (R&D), but It is still far behind from countries like USA or Japan in terms of Innovation (i). We need to reach the market: it is not enough having a successful proof of concept. We must go further. We start from a project: Secretify, a simple and beautiful web-based multiaccount email client that allow users to cypher their communications using already existing email accounts, without the need to know about security, cryptography or key management. The purpose of this thesis is to apply all concepts learnt during the Master course (specifically in Management, Innovation and IT business), to turn Secretify into a successful market launch, having the technical and business knowledges, in order to reduce the risks and to adapt to the market.
Resumo:
The rapid growth of emerging markets’ multinational companies (MNCs) is a recent phenomenon and, as such, their nature and structure of key management processes, functions, and roles need further examination. While an abundance of low-cost labor is often the starting point of competitive advantage for many of the emerging markets’ MNCs, it is the optimum configuration of people, processes, and technology that defines how they leverage their intangible resources. Based on case studies of four Indian IT services MNCs, involving 51 in-depth interviews of business and human resource (HR) leaders at the corporate and subsidiary levels, we identify five key HR roles—namely, strategic business partner, guardian of culture, builder of global workforce and capabilities, champion of processes, and facilitator of employee development. The analysis also highlights that the HR function in Indian IT service MNCs faces several challenges in consolidating the early gains of internationalization, such as lack of decentralized decision making, developing a global mind-set, localization of the workforce, and developing a global leadership pipeline. Based on our exploratory findings, we propose a framework outlining the global HR roles pursued by emerging IT services MNCs, the factors influencing them, and the challenges facing their HR function for future research.
Resumo:
Tropical coastal marine ecosystems including mangroves, seagrass beds and coral reef communities are undergoing intense degradation in response to natural and human disturbances, therefore, understanding the causes and mechanisms present challenges for scientist and managers. In order to protect our marine resources, determining the effects of nutrient loads on these coastal systems has become a key management goal. Data from monitoring programs were used to detect trends of macroalgae abundances and develop correlations with nutrient availability, as well as forecast potential responses of the communities monitored. Using eight years of data (1996–2003) from complementary but independent monitoring programs in seagrass beds and water quality of the Florida Keys National Marine Sanctuary (FKNMS), we: (1) described the distribution and abundance of macroalgae groups; (2) analyzed the status and spatiotemporal trends of macroalgae groups; and (3) explored the connection between water quality and the macroalgae distribution in the FKNMS. In the seagrass beds of the FKNMS calcareous green algae were the dominant macroalgae group followed by the red group; brown and calcareous red algae were present but in lower abundance. Spatiotemporal patterns of the macroalgae groups were analyzed with a non-linear regression model of the abundance data. For the period of record, all macroalgae groups increased in abundance (Abi) at most sites, with calcareous green algae increasing the most. Calcareous green algae and red algae exhibited seasonal pattern with peak abundances (Φi) mainly in summer for calcareous green and mainly in winter for red. Macroalgae Abi and long-term trend (mi) were correlated in a distinctive way with water quality parameters. Both the Abi and mi of calcareous green algae had positive correlations with NO3−, NO2−, total nitrogen (TN) and total organic carbon (TOC). Red algae Abi had a positive correlation with NO2−, TN, total phosphorus and TOC, and the mi in red algae was positively correlated with N:P. In contrast brown and calcareous red algae Abi had negative correlations with N:P. These results suggest that calcareous green algae and red algae are responding mainly to increases in N availability, a process that is happening in inshore sites. A combination of spatially variable factors such as local current patterns, nutrient sources, and habitat characteristics result in a complex array of the macroalgae community in the seagrass beds of the FKNMS.
Resumo:
Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.
Resumo:
Dissertação (mestrado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2016.
Resumo:
Effective information and knowledge management (IKM) is critical to corporate success; yet, its actual establishment and management is not yet fully understood. We identify ten organizational elements that need to be addressed to ensure the effective implementation and maintenance of information and knowledge management within organizations. We define these elements and provide key characterizations. We then discuss a case study that describes the implementation of an information system (designed to support IKM) in a medical supplies organization. We apply the framework of organizational elements in our analysis to uncover the enablers and barriers in this systems implementation project. Our analysis suggests that taking the ten organizational elements into consideration when implementing information systems will assist practitioners in managing information and knowledge processes more effectively and efficiently. We discuss implications for future research.
Resumo:
With the increasing growth of cultural events both in Australia and internationally, there has also been an increase in event management studies; in theory and in practice. Although a series of related knowledge and skills required specifically by event managers has already been identified by many researchers (Perry et al., 1996; Getz, 2002 & Silvers et al., 2006) and generic event management models proposed, including ‘project management’ strategies in an event context (Getz, 2007), knowledge gaps still exist in relation to identifying specific types of events, especially for not-for-profit arts events. For events of a largely voluntary nature, insufficient resources are recognised as the most challenging; including finance, human resources and infrastructure. Therefore, the concepts and principles which are adopted by large scale commercial events may not be suitable for not-for-profit arts events aiming at providing professional network opportunities for artists. Building partnerships are identified as a key strategy in developing an effective event management model for this type of event. Using the 2008 World Dance Alliance Global Summit (WDAGS) in Brisbane 13-18 July, as a case study, the level, nature and relationship of key partners are investigated. Data is triangulated from interviews with organisers of the 2008 WDAGS, on-line and email surveys of delegates, participant observation and analysis of formal and informal documents, to produce a management model suited to this kind of event.
Resumo:
Delivering infrastructure projects involves many stakeholders. Their responsibilities and authorities vary over the course of the project lifecycle - from establishing the project parameters and performance requirements, to operating and maintaining the completed infrastructure. To ensure the successful delivery of infrastructure projects, it is important for the project management team to identify and manage the stakeholders and their requirements. This chapter discusses the management of stakeholders in delivering infrastructure projects, from their conception to completion. It includes managing the stakeholders for project selection and involving them to improve project constructability, operability and maintainability.
Resumo:
The cropping region of northern Australia has a diverse range of cropping systems and weed flora. A fallow phase is commonly required between crops to enable the accumulation of stored soil water in these farming systems dominated by reduced tillage. During the fallow phase, weed control is important and is heavily reliant on herbicides. The most commonly used herbicide has been glyphosate. As a result of over-reliance on glyphosate, there are now seven confirmed glyphosate-resistant weeds and several glyphosate-tolerant species common in the region. As a result, the control of summer fallow weeds is become more complex. This paper outlines project work investigating improved weed control for summer fallows in the northern cropping region. Areas of research include weed ecology, chemical and non-chemical tactics, glyphosate resistance and resistance surveys. The project also has an economic and extension component. As a result of our research we have a better understanding of the ecology of major northern weeds and spread of glyphosate resistance in the region. We have identified and defined alternative herbicide and non-chemical approaches for the effective control of summer fallow weeds and have extended our research effectively to industry.
Resumo:
What are the main elements of successful Key Account Management (KAM)? What is the nature of quality for the company and for the individual in business-to-business relationships? What kind of managerial practices are required at the company and individual level in Key Account Management? This paper focuses on these central aspects of KAM. It describes the main elements of KAM, which is a systematic marketing management approach in the business-to-business context with the objective to build profitable and long-lasting relationships with major accounts. Although paying customers in the business-to-business market are organizations, they are always represented by individuals. Thus, successful KAM requires appropriate handling of both the organizational and the individual levels. This paper describes the nature of quality for the company and for the individual in business-to-business relationships. As a synthesis, this paper suggests a framework for KAM practices deploying the main elements of KAM and the company and individual levels of business-to-business relationships. The weakness of the traditional quality management approach is that it pays little, if any, attention to customer importance. By providing similar quality to each customer, more important customers are penalized and less important customers are rewarded. This paper broadens the traditional quality management approach by introducing the concept of targeted quality based on customer importance.
Resumo:
What is the nature of customer commitment in business-to-business relationships and what are its antecedents? What Key Account Management practices help to build customer commitment? Commitment is an important element of Key Account Management since customer relationships are built upon a the foundation of commitment. Building long-term key account relationships occurs by enhancing and maintaining their commitment. Customer commitment has various antecedents, and managing commitment involves focusing on these antecedents. This paper explains the nature of commitment and describes its antecedents. It also suggests how to manage each of these antecedents to strengthen customer commitment.
Resumo:
Small-scale fisheries is traditional and rural based. Therefore, the paper is an over view of small-scale fisheries resources management in Nigeria. It provides about 80-90% employment to surrounding population. The small-scale fisheries are grouped in to two major sectors:- the artisanal or capture fisheries and aquaculture farming. The paper identified some management problems such as:- multi uses of the water bodies, lack of or inadequate data upon which sound management strategies are based, ownership of inland water bodies is a problem, uncontrolled exploitation hampers sustainable development, poor and low technology and lack of capital, land and credit facilities. The paper presented some management options for sustainable management. Measures to reduced fish spoilage have been advanced. Also highlighted is the role of fish culture in small-scale fisheries management
Resumo:
Some basic concepts of fishery economics and management, and fish population dynamics are recalled, as presented during a course held at the Instituto de Investigaçāo Pesqueira from 23 February to 15 March 1988 in Maputo, Mozambique. Also, some basic elements of length-based stock assessment are reviewed, with emphasis on their implementation through the “Compleat Elefan" package, used extensively during this course, when the participants analyzed their data and wrote first draft of manuscripts incorporating the results of these analyses. Some problems relative to sampling and to seasonal growth oscillations are discussed with special reference to conditions in Mozambique.