943 resultados para Third-Party Knowledge
Resumo:
The paper presents the development of a decision support system for the management of geotechnical and environmental risks in oil pipelines using a geographical information system. The system covers a 48.5 km long section of the So Paulo to Brasilia (OSBRA) oil pipeline, which crosses three municipalities in the northeast region of the So Paulo state (Brazil) and represents an area of 205.8 km(2). The spatial database was created using geo-processing procedures, surface and intrusive investigations and geotechnical reports. The risk assessment was based mainly on qualitative models (relative numeric weights and multicriteria decision analysis) and considered pluvial erosion, slope movements, soil corrosion and third party activities. The maps were produced at a scale of 1:10,000.
Resumo:
Since the 1990s several large companies have been publishing nonfinancial performance reports. Focusing initially on the physical environment, these reports evolved to consider social relations, as well as data on the firm`s economic performance. A few mining companies pioneered this trend, and in the last years some of them incorporated the three dimensions of sustainable development, publishing so-called sustainability reports. This article reviews 31 reports published between 2001 and 2006 by four major mining companies. A set of 62 assessment items organized in six categories (namely context and commitment, management, environmental, social and economic performance, and accessibility and assurance) were selected to guide the review. The items were derived from international literature and recommended best practices, including the Global Reporting Initiative G3 framework. A content analysis was performed using the report as a sampling unit, and using phrases, graphics, or tables containing certain information as data collection units. A basic rating scale (0 or 1) was used for noting the presence or absence of information and a final percentage score was obtained for each report. Results show that there is a clear evolution in report`s comprehensiveness and depth. Categories ""accessibility and assurance"" and ""economic performance"" featured the lowest scores and do not present a clear evolution trend in the period, whereas categories ""context and commitment"" and ""social performance"" presented the best results and regular improvement; the category ""environmental performance,"" despite it not reaching the biggest scores, also featured constant evolution. Description of data measurement techniques, besides more comprehensive third-party verification are the items most in need of improvement.
Resumo:
Background The development of products and services for health care systems is one of the most important phenomena to have occurred in the field of health care over the last 50 years. It generates significant commercial, medical and social results. Although much has been done to understand how health technologies are adopted and regulated in developed countries, little attention has been paid to the situation in low- and middle-income countries (LMICs). Here we examine the institutional environment in which decisions are made regarding the adoption of expensive medical devices into the Brazilian health care system. Methods We used a case study strategy to address our research question. The empirical work relied on in-depth interviews (N = 16) with representatives of a wide range of actors and stakeholders that participate in the process of diffusion of CT (computerized tomography) scanners in Brazil, including manufacturers, health care organizations, medical specialty societies, health insurance companies, regulatory agencies and the Ministry of Health. Results The adoption of CT scanners is not determined by health policy makers or third-party payers of public and private sectors. Instead, decisions are primarily made by administrators of individual hospitals and clinics, strongly influenced by both physicians and sales representatives of the medical industry who act as change agents. Because this process is not properly regulated by public authorities, health care organizations are free to decide whether, when and how they will adopt a particular technology. Conclusions Our study identifies problems in how health care systems in LMICs adopt new, expensive medical technologies, and suggests that a set of innovative approaches and policy instruments are needed in order to balance the institutional and professional desire to practise a modern and expensive medicine in a context of health inequalities and basic health needs.
Resumo:
A large and growing amount of software systems rely on non-trivial coordination logic for making use of third party services or components. Therefore, it is of outmost importance to understand and capture rigorously this continuously growing layer of coordination as this will make easier not only the veri cation of such systems with respect to their original speci cations, but also maintenance, further development, testing, deployment and integration. This paper introduces a method based on several program analysis techniques (namely, dependence graphs, program slicing, and graph pattern analysis) to extract coordination logic from legacy systems source code. This process is driven by a series of pre-de ned coordination patterns and captured by a special purpose graph structure from which coordination speci cations can be generated in a number of di erent formalisms
Resumo:
This paper is part of the results from the project "Implementation Strategies and Development of an Open and Distance Education System for the University of the Azores" funded by the European Social Fund. http://hdl.handle.net/10400.3/2327
Resumo:
Um dos temas mais debatidos na sociedade actual é a segurança. Os níveis de segurança e as ferramentas para os alcançar entram em contraponto com os métodos usados para os quebrar. Como no passado, a razão qualidade/serviço mantém-se hoje, e manter-se-á no futuro, assegurando maior segurança àqueles que melhor se protejam. Problemas simples da vida real como furtos ou uso de falsa identidade assumem no meio informático uma forma rápida e por vezes indetectável de crime organizado. Neste estudo são investigados métodos sociais e aplicações informáticas comuns para quebrar a segurança de um sistema informático genérico. Desta forma, e havendo um entendimento sobre o Modus Operandi das entidades mal-intencionadas, poderá comprovar-se a instabilidade e insegurança de um sistema informático, e, posteriormente, actuar sobre o mesmo de tal forma que fique colocado numa posição da segurança que, podendo não ser infalível, poderá estar muito melhorada. Um dos objectivos fulcrais deste trabalho é conseguir implementar e configurar um sistema completo através de um estudo de soluções de mercado, gratuitas ou comerciais, a nível da implementação de um sistema em rede com todos os serviços comuns instalados, i.e., um pacote “chave na mão” com serviços de máquinas, sistema operativo, aplicações, funcionamento em rede com serviços de correio electrónico, gestão empresarial, anti-vírus, firewall, entre outros. Será possível então evidenciar uma instância de um sistema funcional, seguro e com os serviços necessários a um sistema actual, sem recurso a terceiros, e sujeito a um conjunto de testes que contribuem para o reforço da segurança.
Resumo:
O telemóvel tem-se transformado numa ferramenta essencial no nosso dia-a-dia, constantemente são lançadas novas tecnologias que potenciam o uso do telemóvel nas tarefas do nosso quotidiano. Atualmente a grande tendência passa por fazer o download de aplicações com o objetivo de obter mais e diferentes tipos de informação, existe o desejo de ler de forma simples e intuitiva o mundo que nos rodeia, como se cada elemento fosse um objeto sobre o qual conseguiremos obter informação através do telemóvel. A tecnologia Near Field Communication (NFC) ajuda a transformar este desejo ou necessidade numa realidade de simples alcance. Podemos anexar “identificadores” nos objetos e “ver” estes identificadores através do telemóvel recorrendo a aplicações que fazem a ponte com os sistemas que nos permitem obter mais informação, por exemplo, internet. O NFC especifica um padrão de comunicação de redes sem fios, que permite a transferência de dados entre dois dispositivos separados por uma distância máxima de 10cm. NFC foi desenhado para ser integrado em telemóveis, que podem comunicar com outros telemóveis equipados com NFC ou ler informação de cartões ou tags. A dissertação avalia as oportunidades que a tecnologia NFC oferece ao mundo das telecomunicações móveis, nomeadamente na realidade do operador Vodafone Portugal, principalmente numa relação Empresa - Cliente. Esta tecnologia reúne o interesse dos fabricantes dos telemóveis, dos operadores e de parceiros críticos que vão ajudar a potenciar o negócio, nomeadamente entidades bancárias e interbancárias. A tecnologia NFC permite utilizar o telemóvel como um cartão de crédito/debito, ticketing, ler informação de posters (Smart Poster) que despoletem navegação contextualizada para outras aplicações ou para a internet para obter mais informação ou concretizar compras, estes são alguns cenários identificados que mais valor o NFC consegue oferecer. A dissertação foca-se na avaliação técnica do NFC na área de Smart Posters e resulta na identificação num conjunto de novos cenários de utilização, que são especificados e complementados com o desenvolvimento de um protótipo.
Resumo:
Mobile applications are becoming increasingly more complex and making heavier demands on local system resources. Moreover, mobile systems are nowadays more open, allowing users to add more and more applications, including third-party developed ones. In this perspective, it is increasingly expected that users will want to execute in their devices applications which supersede currently available resources. It is therefore important to provide frameworks which allow applications to benefit from resources available on other nodes, capable of migrating some or all of its services to other nodes, depending on the user needs. These requirements are even more stringent when users want to execute Quality of Service (QoS) aware applications, such as voice or video. The required resources to guarantee the QoS levels demanded by an application can vary with time, and consequently, applications should be able to reconfigure themselves. This paper proposes a QoS-aware service-based framework able to support distributed, migration-capable, QoS-enabled applications on top of the Android Operating system.
Resumo:
The Janssen-Cilag proposal for a risk-sharing agreement regarding bortezomib received a welcome signal from NICE. The Office of Fair Trading report included risk-sharing agreements as an available tool for the National Health Service. Nonetheless, recent discussions have somewhat neglected the economic fundamentals underlying risk-sharing agreements. We argue here that risk-sharing agreements, although attractive due to the principle of paying by results, also entail risks. Too many patients may be put under treatment even with a low success probability. Prices are likely to be adjusted upward, in anticipation of future risk-sharing agreements between the pharmaceutical company and the third-party payer. An available instrument is a verification cost per patient treated, which allows obtaining the first-best allocation of patients to the new treatment, under the risk sharing agreement. Overall, the welfare effects of risk-sharing agreements are ambiguous, and care must be taken with their use.
Resumo:
Mestrado em Contabilidade e Análise Financeira
Resumo:
Paper developed for the unit “Innovation Economics and Management” of the PhD programme in Technology Assessment at the Universidade Nova de Lisboa in 2009-10 under the supervision of Prof. Maria Luísa Ferreira
Resumo:
O mercado de smartphones tem vindo a crescer massivamente nos últimos anos, bem como a diversi cação das suas funcionalidades no dia-a-dia de cada pessoa. O mercado aberto de aplicações para estes equipamentos também tem sofrido uma forte evolução o que permite uma maior qualidade e competitividade pela apresentação de produtos. O conceito de casas inteligentes está cada vez mais presente e é algo que as pessoas se estão a acomodar de forma gradual. Para acompanhar tal feito, é necessário desenvolver as capacidades dos equipamentos que estas pessoas mais usam para que estes possam dar resposta a estas necessidades. Para o caso atual irão ser estudadas as fechaduras inteligentes. Os sistemas comercializados atualmente, são tipicamente sistemas proprietários e apresentam algumas limitações ou faltas (ex: ao nível da segurança, incapacidade de abranger um largo número de dispositivos móveis ou mesmo ao nível do preço). Neste contexto, e com base na caracterização das soluções de controlo de acesso atuais, foi estudada a viabilidade de, usando uma abordagem assente em tecnologias não proprietárias (i.e., abertas), desenvolver soluções de controlo de acesso com características comparáveis com os sistemas proprietários actuais e, eventualmente, ultrapassando os limites e falhas identi cados. Dadas estas premissas o sistema de controlo de acesso móvel pensado envolve um computador BeagleBone Black e a tecnologia sem os Bluetooth. Este sistema permite a fácil integração do computador com qualquer smartphone atual e é dotado de fortes características de segurança e privacidade. O sistema foi concebido inicialmente para ser implementado em fechaduras de portas mas com possibilidade de expansão para outros equipamentos. Além disso, o sistema permitirá também o acesso a terceiros após a devida autorização do dono.
Resumo:
Dissertação para obtenção do Grau de Mestre em Engenharia Informática
Resumo:
Concurrent programming is a difficult and error-prone task because the programmer must reason about multiple threads of execution and their possible interleavings. A concurrent program must synchronize the concurrent accesses to shared memory regions, but this is not enough to prevent all anomalies that can arise in a concurrent setting. The programmer can misidentify the scope of the regions of code that need to be atomic, resulting in atomicity violations and failing to ensure the correct behavior of the program. Executing a sequence of atomic operations may lead to incorrect results when these operations are co-related. In this case, the programmer may be required to enforce the sequential execution of those operations as a whole to avoid atomicity violations. This situation is specially common when the developer makes use of services from third-party packages or modules. This thesis proposes a methodology, based on the design by contract methodology, to specify which sequences of operations must be executed atomically. We developed an analysis that statically verifies that a client of a module is respecting its contract, allowing the programmer to identify the source of possible atomicity violations.
Resumo:
In his Answer to the Question: What is Enlightenment (1784), Kant puts forward his belief that the vocation to think freely, which humankind is endowed with, is bound to make sure that “the public use of reason” will at last act “even on the fundamental principles of government and the state [will] find it agreeable to treat man – who is now more than a machine – in accord with his dignity”. The critical reference to La Mettrie (1747), by opposing the machine to human dignity, will echo, in the dawn of the 20th century, in Bergson’s attempt to explain humor. Besides being exclusive to humans, humor is also a social phenomenon. Freud (1905) assures that pleasure originated by humor is collective, it results from a “social process”: jokes need an audience, a “third party”, in order to work and have fun. Assuming humor as a social and cultural phenomenon, this paper intends to sustain that it played a role in the framing of the public sphere and of public opinion in Portugal during the transition from Absolute Monarchy to Liberalism. The search for the conditions which made possible the critical exercise of sociability is at the root of the creation of the public sphere in the sense developed by Habermas (1962), whose perspective, however, has been questioned by those who point 2 out the alleged idealism of the concept – as opposed, for example, to Bakhtin (1970), whose work stresses diversity and pluralism. This notwithstanding, the concept of public sphere is crucial to the building of public opinion, which is, in turn, indissoluble from the principle of publicity, as demonstrated by Bobbio (1985). This paper discusses the historical evolution of the concept of public opinion from Ancient Greece doxa, through Machiavelli’s “humors” (1532), the origin of the expression in Montaigne (1580) and the contributions of Hobbes (1651), Locke (1690), Swift (1729), Rousseau (1762) or Hume (1777), up to the reflection of Lippman (1922) and Bourdieu’s critique (1984). It maintains that humor, as it appears in Portuguese printed periodicals from 1797 (when Almocreve de Petas was published for the first time) to the end of the civil war (1834) – especially in those edited by José Daniel Rodrigues da Costa but also in O Piolho Viajante, by António Manuel Policarpo da Silva, or in the ones written by José Agostinho de Macedo, as well as in a political “elite minded” periodical such as Correio Braziliense –, contributed to the framing of the public sphere and of public opinion in Portugal.