865 resultados para IT Service Management


Relevância:

90.00% 90.00%

Publicador:

Resumo:

Forskningen visar att förändringar av informationsteknologin och en ökande anskaffning av nya programvaror har lett till underliggande problem som kan drabba heterogena programvarulicensmiljöer och stora organisationer. Underliggande problem i den stora kontexten är mjukvaruhantering. Licenshantering av programvaror är just en förgrening av det stora problemet. Stora organisationer som en kommunal verksamhet är drabbad av det här underliggande problemet på grund av komplexitet hos organisationens miljö. Att tillämpa förändringar i området programvarulicens är omöjligt utan att göra förändringar i hela den organisationsprocess som följer med det. Fallstudiens uppdrag är ett nytt omfattande område kring licenshantering av programvaror som kan vara väldigt lärorikt och en bra erfarenhet att ta del av. Uppsatsen beskriver hur en kommunal verksamhets licenshantering av programvaror ser ut och de problem som finns med den nuvarande licenshanteringsprocessen. Förarbetet med en litteraturstudie tillsammans med datagenereringsmetoderna intervjuer, dokumentstudier och observationer används för att studera fallet på djupet. Målet är att kunna ta fram de nuvarande problem som finns, analysera dem och ge rekommendation för åtgärder som det studerade fallobjektet, Falu Kommuns IT-kontor, kan använda. En rekommendation för en tydlig licenshanteringsprocessmodell anses vara ett bra akademiskt bidrag eftersom problemet med licenshanteringen av programvaror är ett generellt problem. Uppsatsens resultat är en processmodell om licenshantering av programvaror för organisationer med IT-tjänstkunder. Det är en generisk lösning som skulle kunna användas av andra kommunverksamheter och liknande organisationer.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

As empresas no mercado atual estão em um ambiente de agressiva concorrência, e sua sobrevivência depende de fatores como a produtividade, inovação e atingimento de resultados, contudo, sem haver o comprometimento da qualidade. Os departamentos de Tecnologia da Informação possuem grande influência na operação e nos resultados da empresa, pois a importância da tecnologia, tanto no suporte, quanto na própria atividade fim das companhias, é vital. Diante deste contexto, este trabalho analisou as melhores práticas de mercado na gestão de tecnologia da informação como o framework Cobit (Control Objectives for Information Technology) analisada em conjunto com as ferramentas consagradas de mensuração de percepção de qualidade de serviços, de forma a identificar os fatores críticos de sucesso para qualidades de serviços em TI. Utilizou-se a metodologia SERVQUAL em um caso específico de uma empresa de comunicação e assessoria de imprensa, através de um questionário dividido em duas partes e vinte e duas perguntas cada, permitindo identificar as lacunas entre a expectativa e a percepção dos serviços fornecidos em cada uma das cinco dimensões da qualidade de serviço: tangibilidade, confiabilidade, responsabilidade, segurança e empatia. Foram identificados como fatores críticos as dimensões de confiabilidade e de empatia, e para cada uma delas, relacionou-se um conjunto de objetivos de controle do Cobit que permitem a atuação na melhoria das avaliações destes elementos.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The present study has got as its aim to show how the impressions management is being used by the hotels in Paraiba State. For that, the dramma or role play perspective has been adopted as a model for service management. From the theater metaphor, the physical environment and its components can be seen as a scenery of the service show. We conduct the reader to notice the importance of the consummer about the service quality demand and its influence on his satisfaction. A methodology with exploring and qualifying nature has been adopted by using the analyses of content technique in interviews applied to hotel managers lebeled as having 4 and 5 stars in the State, trying to check how impression management takes place, identifying impression management tools used in relation to the physical evidences and to contacting people, as well as checking managers views in the survey about the use of impression management for client satisfaction make. The information revealed that managers, maybe for being unaware about impression management theory, haven t considered neither the physical evidences yet, nor contacting people as marketing tools. About the physical evidences, we could see that hotels take actions in a pulverized way referring to environment decoration and colors, however there isn t a global usage of physical evidences to highlight the service. Contacting people by their turn, receive better importance and attention. It was possible to make sure that managers are aware about the influence of the employee over the attendance quality. This way, we may come into a conclusion that impression management at Paraiba hotels has been under used, as long as managers seem to be, most times, turned to actions related to contacting people, not having realized the planning importance and national-wide use of service scenery in a genaral way yet

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This research aims to analyze the FIC Course of Assistant Technician in Service Management and Quality, integrated to elementary education / EJA form developed by IFRN MO Campus between 2011 and 2013 in the form of a PROEJA FIC / AT ELEMENTARY SCHOOL LEVEL. We seek to understand the adhesion between the national guidelines postulated for the Program, established in PPC and mediations with the process conceived in the run of the course. Guiding by the socio-critical approach and the dialogical paradigm, the theoretical-epistemological mark is especially buoyed by the theoretical contributions of Ciavatta (2005) , Rock (2011) , Haddad and Di Pierro (2000), Freire (2005), Marx (1982), Ramos (2005), Frigotto; Ciavatta; Ramos (2005), Moura (2012), and also on education in prisons by Onofre (2007, 2011), Bueno (2007), Julião (2011) and Foucault (2001). We assume that an action that enables professional qualification as FIC courses articulated to the EJA in the context of education in prisons have conceptual, methodological, political and pedagogical implications for it focuses challenges, weaknesses and opportunities on the same area of education., We have developed four techniques of data collection based on procedures and tools of qualitative research, such as document analysis, a student survey, the conduction of focus groups with teachers and administrators of the course and on-site observation. Mediated by the investigated context, results showed that the consolidation of PROEJA FIC / AT ELEMENTARY SCHOOL LEVEL goes beyond the intentions officially declared. It is inferred that after seven years of its creation, even though it keeps some potential, this program is not being satisfactorily developed and it shows weaknesses national and locally, it is set at low capillarity, it has a limited scope, and dissolved essential public commitments to the course development. The effectiveness of PROEJA FIC / AT ELEMENTARY SCHOOL LEVEL as part of an emancipatory inclusion social policy, according to official statement, entails approximating the legal logic with social logic, so as not only to propagate discourses and enforce worship to specific and successful experiences that reach only a minority, but to provide actual and necessary conditions to promote the breadth and social quality of the offered deals in this program format

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The purpose of this study is to analyze, from the point of view of nurses, changes that took place in the process of providing health services after the introduction of the Family Health Program (FHP). It is na investigation of qualitative nature that uses semi-structured interviews as a main empirical approach tool. Six nurses from the city of Caicó, Rio Grande do Norte, who were working with basic care before the introduction of the FHP, within basic care, were: adscription and ties with the community; hospitality and the humanizacion of care-giving; decrease in cases of inpatient treatment; strengthening of the prevention of injuries and health promotion; improvemente of health indicatiors, finally, actions that point towads meeting the principles of wholeness, equity and universality as a declaration of the Brazilian National Health Care System (SUS). Nevertheless, in spite of all recognizable positive aspects, the FHP has some weaknesses, such as: the difficulty posed by colletive work; the mismatch between professional education and the demands of the current health standard; a poor physical infrastructure of the Basic Health Units; a high heath staff turnover and precarious work conditions. In addition to this, some strategies that can be used to help improve the process of providing health services have been pointed out, such as, coordination between sectors, continuous education, making work conditions less precarious and improving the means whereby heathy service management is conveyed,Tthus, finally, we understand that the FHP does bring forward meaningful changes to the process of provinding health services to strengthen the Brasilian National Health Care System (SUS), in spite of the fact that it lies within a scenario of adversities that can be overcome through the collective endeavor of the several social actors

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Includes bibliography

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Pós-graduação em Agronomia (Energia na Agricultura) - FCA

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

90.00% 90.00%

Publicador:

Resumo:

With research on Wireless Sensor Networks (WSNs) becoming more and more mature in the past five years, researchers from universities all over the world have set up testbeds of wireless sensor networks, in most cases to test and evaluate the real-world behavior of developed WSN protocol mechanisms. Although these testbeds differ heavily in the employed sensor node types and the general architectural set up, they all have similar requirements with respect to management and scheduling functionalities: as every shared resource, a testbed requires a notion of users, resource reservation features, support for reprogramming and reconfiguration of the nodes, provisions to debug and remotely reset sensor nodes in case of node failures, as well as a solution for collecting and storing experimental data. The TARWIS management architecture presented in this paper targets at providing these functionalities independent from node type and node operating system. TARWIS has been designed as a re-usable management solution for research and/or educational oriented research testbeds of wireless sensor networks, relieving researchers intending to deploy a testbed from the burden to implement their own scheduling and testbed management solutions from scratch.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This paper discusses several issues of Service-Centric Networking (SCN) as an extension of the Information-Centric Networking (ICN) paradigm. SCN allows extended caching, where not exactly the same content as requested can be read from caches, but similar content can be used to produce the content requested, e.g., by filtering or transcoding. We discuss the issue of naming and routing for general dynamic services for both tightly coupled and decoupled ICN approaches. Challenges and solutions for service management are identified, in particular for composed services, which allow distributed in-network processing of service requests. We introduce the term Software-Defined Service-Centric Networking as an extension of Software-Defined Networking. A prototype implementation for SCN proofs its validity and feasibility and underlines its potential benefits.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

En la actualidad no se concibe una empresa, por pequeña que esta sea, sin algún tipo de servicio TI. Se presenta para cada empresa el reto de emprender proyectos para desarrollar o contratar servicios de TI que soporten los diferentes procesos de negocio de la empresa. Por otro lado, a menos que los servicios de TI estén aislados de toda red, lo cual es prácticamente imposible en la actualidad, no existe un servicio o un proyecto que lo desarrolle garantizando el 100% de seguridad. Así la empresa maneja una dualidad entre desarrollar productos/servicios de TI seguros y el mantenimiento constante de sus servicios TI en estado seguro. La gestión de los proyectos para el desarrollo de los servicios de TI se aborda, en la mayoría de las empresas, aplicando distintas prácticas, utilizadas en otros proyectos y recomendadas, a tal efecto, por marcos y estándares con mayor reconocimiento. Por lo general, estos marcos incluyen, entre sus procesos, la gestión de los riesgos orientada al cumplimiento de plazos, de costes y, a veces, de la funcionalidad del producto o servicio. Sin embargo, en estas prácticas se obvian los aspectos de seguridad (confidencialidad, integridad y disponibilidad) del producto/servicio, necesarios durante el desarrollo del proyecto. Además, una vez entregado el servicio, a nivel operativo, cuando surge algún fallo relativo a estos aspectos de seguridad, se aplican soluciones ad-hoc. Esto provoca grandes pérdidas y, en ocasiones, pone en peligro la continuidad de la propia empresa. Este problema, se va acrecentando cada día más, en cualquier tipo de empresa y, son las PYMEs, por su la falta de conocimiento del problema en sí y la escasez de recursos metodológicos y técnicos, las empresas más vulnerables. Por todo lo anterior, esta tesis doctoral tiene un doble objetivo. En primer lugar, demostrar la necesidad de contar con un marco de trabajo que, integrado con otros posibles marcos y estándares, sea sencillo de aplicar en distintos tipos y envergaduras de proyectos, y que guíe a las PYMEs en la gestión de proyectos para el desarrollo seguro y posterior mantenimiento de la seguridad de sus servicios de TI. En segundo lugar, cubrir esta necesidad desarrollando un marco de trabajo que ofrezca un modelo de proceso genérico aplicable sobre distintos patrones de proyecto y una librería de activos de seguridad que sirva a las PYMEs de guía durante el proceso de gestión del proyecto para el desarrollo seguro. El modelo de proceso del marco propuesto describe actividades en los tres niveles organizativos de la empresa (estratégico, táctico y operativo). Está basado en el ciclo de mejora continua (PDCA) y en la filosofía Seguridad por Diseño, propuesta por Siemens. Se detallan las prácticas específicas de cada actividad, las entradas, salidas, acciones, roles, KPIs y técnicas aplicables para cada actividad. Estas prácticas específicas pueden aplicarse o no, a criterio del jefe de proyecto y de acuerdo al estado de la empresa y proyecto que se quiera desarrollar, estableciendo así distintos patrones de proceso. Para la validación del marco se han elegido dos PYMEs. La primera del sector servicios y la segunda del sector TIC. El modelo de proceso ha sido aplicado sobre un mismo patrón de proyecto que responde a necesidades comunes a ambas empresas. El patrón de proceso ha sido valorado en los proyectos elegidos en ambas empresas, antes y después de su aplicación. Los resultados del estudio, después de su aplicación en ambas empresas, han permitido la validación del patrón de proceso, en la mejora de la gestión de proyecto para el desarrollo seguro de TI en las PYMEs. ABSTRACT Today a company without any IT service is not conceived, even if it is small either. It presents the challenge for each company to undertake projects to develop or contract IT services that support the different business processes of the company. On the other hand, unless IT services are isolated from whole network, which is virtually impossible at present, there is no service or project, which develops guaranteeing 100% security. So the company handles a duality, develop products / insurance IT services and constant maintenance of their IT services in a safe state. The project management for the development of IT services is addressed, in most companies, using different practices used in other projects and recommended for this purpose by frameworks and standards with greater recognition. Generally, these frameworks include, among its processes, risk management aimed at meeting deadlines, costs and, sometimes, the functionality of the product or service. However, safety issues such as confidentiality, integrity and availability of the product / service, necessary for the project, they are ignored in these practices. Moreover, once the service delivered at the operational level, when a fault on these safety issues arise, ad-hoc solutions are applied. This causes great losses and sometimes threatens the continuity of the company. This problem is adding more every day, in any kind of business and SMEs are, by their lack of knowledge of the problem itself and the lack of methodological and technical resources, the most vulnerable companies. For all these reasons, this thesis has two objectives. Firstly demonstrate the need for a framework that integrated with other possible frameworks and standards, it is simple to apply in different types and wingspans of projects, and to guide SMEs in the management of development projects safely, and subsequent maintenance of the security of their IT services. Secondly meet this need by developing a framework that provides a generic process model applicable to project different patterns and a library of security assets, which serve to guide SMEs in the process of project management for development safe. The process model describes the proposed activities under the three organizational levels of the company (strategic, tactical and operational). It is based on the continuous improvement cycle (PDCA) and Security Design philosophy proposed by Siemens. The specific practices, inputs, outputs, actions, roles, KPIs and techniques applicable to each activity are detailed. These specific practices can be applied or not, at the discretion of the project manager and according to the state of the company and project that the company wants to develop, establishing different patterns of process. Two SMEs have been chosen to validate the frame work. The first of the services sector and the second in the ICT sector. The process model has been applied on the same pattern project that responds to needs common to both companies. The process pattern has been valued at the selected projects in both companies before and after application. The results of the study, after application in both companies have enabled pattern validation process, improving project management for the safe development of IT in SMEs.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Las metodologías de desarrollo ágiles han sufrido un gran auge en entornos industriales durante los últimos años debido a la rapidez y fiabilidad de los procesos de desarrollo que proponen. La filosofía DevOps y específicamente las metodologías derivadas de ella como Continuous Delivery o Continuous Deployment promueven la gestión completamente automatizada del ciclo de vida de las aplicaciones, desde el código fuente a las aplicaciones ejecutándose en entornos de producción. La automatización se ve como un medio para producir procesos repetibles, fiables y rápidos. Sin embargo, no todas las partes de las metodologías Continuous están completamente automatizadas. En particular, la gestión de la configuración de los parámetros de ejecución es un problema que ha sido acrecentado por la elasticidad y escalabilidad que proporcionan las tecnologías de computación en la nube. La mayoría de las herramientas de despliegue actuales pueden automatizar el despliegue de la configuración de parámetros de ejecución, pero no ofrecen soporte a la hora de fijar esos parámetros o de validar los ficheros que despliegan, principalmente debido al gran abanico de opciones de configuración y el hecho de que el valor de muchos de esos parámetros es fijado en base a preferencias expresadas por el usuario. Esto hecho hace que pueda parecer que cualquier solución al problema debe estar ajustada a una aplicación específica en lugar de ofrecer una solución general. Con el objetivo de solucionar este problema, propongo un modelo de configuración que puede ser inferido a partir de instancias de configuración existentes y que puede reflejar las preferencias de los usuarios para ser usado para facilitar los procesos de configuración. El modelo de configuración puede ser usado como la base de un proceso de configuración interactivo capaz de guiar a un operador humano a través de la configuración de una aplicación para su despliegue en un entorno determinado o para detectar cambios de configuración automáticamente y producir una configuración válida que se ajuste a esos cambios. Además, el modelo de configuración debería ser gestionado como si se tratase de cualquier otro artefacto software y debería ser incorporado a las prácticas de gestión habituales. Por eso también propongo un modelo de gestión de servicios que incluya información relativa a la configuración de parámetros de ejecución y que además es capaz de describir y gestionar propuestas arquitectónicas actuales tales como los arquitecturas de microservicios. ABSTRACT Agile development methodologies have risen in popularity within the industry in recent years due to the speed and reliability of the processes they propose. The DevOps philosophy and specifically the methodologies derived from it such as Continuous Delivery and Continuous Deployment push for a totally automated management of the application lifecycle, from the source code to the software running in production environment. Automation in this regard is used as a means to produce repeatable, reliable and fast processes. However, not all parts of the Continuous methodologies are completely automatized. In particular, management of runtime parameter configuration is a problem that has increased its impact in deployment process due to the scalability and elasticity provided by cloud technologies. Most deployment tools nowadays can automate the deployment of runtime parameter configuration, but they offer no support for parameter setting o configuration validation, as the range of different configuration options and the fact that the value of many of those parameters is based on user preference seems to imply that any solution to the problem will have to be tailored to a specific application. With the aim to solve this problem I propose a configuration model that can be inferred from existing configurations and reflect user preferences in order to ease the configuration process. The configuration model can be used as the base of an interactive configuration process capable of guiding a human operator through the configuration of an application for its deployment in a specific environment or to automatically detect configuration changes and produce valid runtime parameter configurations that take into account those changes. Additionally, the configuration model should be managed as any other software artefact and should be incorporated into current management practices. I also propose a service management model that includes the configuration information and that is able to describe and manage current architectural practices such as the microservices architecture.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

En la actualidad, cualquier compañía de telecomunicaciones que posea su propia red debe afrontar el problema del mantenimiento de la misma. Ofrecer un mínimo de calidad de servicio a sus clientes debe ser uno de sus objetivos principales. Esta calidad debe mantenerse aunque ocurran incidencias en la red. El presente trabajo pretende resolver el problema de priorizar el orden en que se restauran los cables, caminos y circuitos, dañados por una incidencia, dentro de una red troncal de transporte perteneciente a una operadora de telecomunicaciones. Tras un planteamiento detallado del problema y de todos los factores que influirán en la toma de decisión, en primer lugar se acomete una solución basada en Métodos Multicriterio Discretos, concretamente con el uso de ELECTRE I y AHP. A continuación se realiza una propuesta de solución basada en Redes Neuronales (con dos aproximaciones diferentes al problema). Por último se utiliza un método basado en la Optimización por Enjambre de Partículas (PSO), adaptado a un problema de permutación de enteros (ordenación), y con una forma particular de evaluar la mejor posición global del enjambre. Complementariamente se realiza una exposición de lo que es una empresa Operadora de telecomunicaciones, de sus departamentos y procesos internos, de los servicios que ofrece, de las redes sobre las que se soportan, y de los puntos clave a tener en cuenta en la implementación de sus sistemas informáticos de gestión integral. ABSTRACT: Nowadays, any telecommunications company that owns its own network must face the problem of maintaining it (service assurance). Provide a minimum quality of service to its customers must be one of its main objectives. This quality should be maintained although any incidents happen to occur in the network. This thesis aims to solve the problem of prioritizing the order in which the damaged cables, trails, path and circuits, within a backbone transport network, should be restored. This work begins with a detailed explanation about network maintenance issues and all the factors that influence decision-making problem. First of all, one solution based on Discrete Multicriteria methods is tried (ELECTRE I and AHP algorithms are used). Also, a solution based on neural networks (with two different approaches to the problem) is analyzed. Finally, this thesis proposes an algorithm based on Particle Swarm Optimization (PSO), adapted to a problem of integers permutation, and a particular way of evaluating the best overall position of the swarm method. In addition, there is included an exhibition about telecommunications companies, its departments, internal processes, services offered to clients, physical networks, and key points to consider when implementing its integrated management systems.