852 resultados para Business information
Resumo:
In recent years there has been a personal and organizational trend toward mobility and the use of mobile technologies such as laptops, mobile phones and tablets. With this proliferation of devices, the desire to combine as many functions as possible into one device has also arisen. This concept is commonly called convergence. Generally, device convergence has been segmented between devices for work and devices for home use. Recently, however, the concept of Bring Your Own Device (BYOD) has emerged as organizations attempt to bridge the work/home divide in hopes of increasing employee productivity and reducing corporate technology costs. This paper examines BYOD projects at IBM, Cisco, Citrix, and Intel and then integrates this analysis with current literature to develop and present a BYOD Implementation Success model.
Resumo:
As one of the largest and most complex organizations in the world, the Department of Defense (DoD) faces many challenges in solving its well-documented financial and related business operations and system problems. The DoD is in the process of implementing modern multifunction enterprise resource planning (ERP) systems to replace many of its outdated legacy systems. This paper explores the ERP implementations of the DoD and seeks to determine the impact of the ERP implementations on the alignment of the DoD’s business and IT strategy. A brief overview of the alignment literature and background on ERP are followed by case study analysis of the DoD ERP development and current implementation status. Lastly, the paper explores the current successes and failures of the ERP implementation and the impact on the DoD’s goal of strategic alignment.
Resumo:
Behavioral reflection is crucial to support for example functional upgrades, on-the-fly debugging, or monitoring critical applications. However the use of reflective features can lead to severe problems due to infinite metacall recursion even in simple cases. This is especially a problem when reflecting on core language features since there is a high chance that such features are used to implement the reflective behavior itself. In this paper we analyze the problem of infinite meta-object call recursion and solve it by providing a first class representation of meta-level execution: at any point in the execution of a system it can be determined if we are operating on a meta-level or base level so that we can prevent infinite recursion. We present how meta-level execution can be represented by a meta-context and how reflection becomes context-aware. Our solution makes it possible to freely apply behavioral reflection even on system classes: the meta-context brings stability to behavioral reflection. We validate the concept with a robust implementation and we present benchmarks.
Resumo:
To quickly localize defects, we want our attention to be focussed on relevant failing tests. We propose to improve defect localization by exploiting dependencies between tests, using a JUnit extension called JExample. In a case study, a monolithic white-box test suite for a complex algorithm is refactored into two traditional JUnit style tests and to JExample. Of the three refactorings, JExample reports five times fewer defect locations and slightly better performance (-8-12\%), while having similar maintenance characteristics. Compared to the original implementation, JExample greatly improves maintainability due the improved factorization following the accepted test quality guidelines. As such, JExample combines the benefits of test chains with test quality aspects of JUnit style testing.
Resumo:
Conventional debugging tools present developers with means to explore the run-time context in which an error has occurred. In many cases this is enough to help the developer discover the faulty source code and correct it. However, rather often errors occur due to code that has executed in the past, leaving certain objects in an inconsistent state. The actual run-time error only occurs when these inconsistent objects are used later in the program. So-called back-in-time debuggers help developers step back through earlier states of the program and explore execution contexts not available to conventional debuggers. Nevertheless, even back-in-time debuggers do not help answer the question, ``Where did this object come from?'' The Object-Flow Virtual Machine, which we have proposed in previous work, tracks the flow of objects to answer precisely such questions, but this VM does not provide dedicated debugging support to explore faulty programs. In this paper we present a novel debugger, called Compass, to navigate between conventional run-time stack-oriented control flow views and object flows. Compass enables a developer to effectively navigate from an object contributing to an error back-in-time through all the code that has touched the object. We present the design and implementation of Compass, and we demonstrate how flow-centric, back-in-time debugging can be used to effectively locate the source of hard-to-find bugs.
Resumo:
Virtual machines (VMs) emulating hardware devices are generally implemented in low-level languages for performance reasons. This results in unmaintainable systems that are difficult to understand. In this paper we report on our experience using the PyPy toolchain to improve the portability and reduce the complexity of whole-system VM implementations. As a case study we implement a VM prototype for a Nintendo Game Boy, called PyGirl, in which the high-level model is separated from low-level VM implementation issues. We shed light on the process of refactoring from a low-level VM implementation in Java to a high-level model in RPython. We show that our whole-system VM written with PyPy is significantly less complex than standard implementations, without substantial loss in performance.
Resumo:
The increasing practice of offshore outsourcing software maintenance has posed the challenge of effectively transferring knowledge to individual software engineers of the vendor. In this theoretical paper, we discuss the implications of two learning theories, the model of work-based learning (MWBL) and cognitive load theory (CLT), for knowledge transfer during the transition phase. Taken together, the theories suggest that learning mechanisms need to be aligned with the type of knowledge (tacit versus explicit), task characteristics (complexity and recurrence), and the recipients’ expertise. The MWBL proposes that learning mechanisms need to include conceptual and practical activities based on the relative importance of explicit and tacit knowledge. CLT explains how effective portfolios of learning mechanisms change over time. While jobshadowing, completion tasks, and supportive information may prevail at the outset of transition, they may be replaced by the work on conventional tasks towards the end of transition.
Resumo:
In future, the so called “sensing enterprise”, as part of the Future Internet, will play a crucial role in the success or the failure of an enterprise. We present our vision of an enterprise interacting with the physical world based on a retail scenario. One of the main challenges is the interoperability not only between the enterprise IT systems themselves, but also between these systems and the sensing devices. We will argue that semantically enriched service descriptions, the so called linked services will ease interoperability between two or more enterprises IT systems, and between enterprise systems and the physical environment.
Resumo:
Maintaining a loyal customer base is challenging for “Deal of the Day” (DoD) platforms. DoD providers market and sell deals on products and services, yet it is the merchants who ultimately deliver those to consumers. Low entry and switching costs drive competition in this market. However, research on the determinants of user loyalty in the DoD context is limited. This study uses Grounded Theory and Structural Equation Modeling to explore the phenomenon of DoD platform loyalty. Particularly, monetary benefits, signal-to-noise ratio, perceived risk, and service friendliness during a merchant encounter emerge as powerful determinants of loyalty in this novel context.
Resumo:
Social Networking Sites (SNSs) have become extremely popular around the world. They rely on user-generated content to offer engaging experience to its members. Cultural differences may influence the motivation of users to create and share content on SNS. This study adopts the privacy calculus perspective to examine the role of culture in individual self-disclosure decisions. The authors use structural equation modeling and multi-group analysis to investigate this dynamics. The findings reveal the importance of cultural dimensions of individualism and uncertainty avoidance in the cognitive processes of SNS users.
Resumo:
The emergence of cloud datacenters enhances the capability of online data storage. Since massive data is stored in datacenters, it is necessary to effectively locate and access interest data in such a distributed system. However, traditional search techniques only allow users to search images over exact-match keywords through a centralized index. These techniques cannot satisfy the requirements of content based image retrieval (CBIR). In this paper, we propose a scalable image retrieval framework which can efficiently support content similarity search and semantic search in the distributed environment. Its key idea is to integrate image feature vectors into distributed hash tables (DHTs) by exploiting the property of locality sensitive hashing (LSH). Thus, images with similar content are most likely gathered into the same node without the knowledge of any global information. For searching semantically close images, the relevance feedback is adopted in our system to overcome the gap between low-level features and high-level features. We show that our approach yields high recall rate with good load balance and only requires a few number of hops.
Resumo:
We introduce the need for a distributed guideline-based decision sup-port (DSS) process, describe its characteristics, and explain how we implement-ed this process within the European Union?s MobiGuide project. In particular, we have developed a mechanism of sequential, piecemeal projection, i.e., 'downloading' small portions of the guideline from the central DSS server, to the local DSS in the patient's mobile device, which then applies that portion, us-ing the mobile device's local resources. The mobile device sends a callback to the central DSS when it encounters a triggering pattern predefined in the pro-jected module, which leads to an appropriate predefined action by the central DSS, including sending a new projected module, or directly controlling the rest of the workflow. We suggest that such a distributed architecture that explicitly defines a dialog between a central DSS server and a local DSS module, better balances the computational load and exploits the relative advantages of the cen-tral server and of the local mobile device.
Resumo:
O trabalho tem como proposta avaliar a postura das organizações nas mídias sociais digitais, considerando o fato de que esses novos ambientes virtuais têm modificado drasticamente a maneira pela qual elas promovem o relacionamento com seus públicos estratégicos. O objetivo principal da pesquisa é identificar e compreender como as organizações se posicionam diante de comentários desfavoráveis nas mídias sociais digitais que possam impactar sua imagem e reputação, bem como mostrar a importância de monitorar constantemente o consumidor e dialogar com ele nos canais digitais para evitar riscos à marca. A metodologia aplicada denomina-se Estudo de Casos Múltiplos, por meio da qual analisaram-se os comentários desfavoráveis às marcas: Vivo, Tim e Oi, na página do Facebook, durante o mês de setembro de 2015. Construiu-se um protocolo de pesquisa, e realizou-se o acompanhamento dessas marcas analisando-lhes os posts e os comentários desfavoráveis coletados no período. Constatou-se, após tais procedimentos que as operadoras apresentam frequentemente dificuldades para se relacionar com os públicos nas mídias sociais digitais, o que as coloca em risco quanto à sua imagem e reputação.
Resumo:
En este trabajo se presenta el primero de una serie de dos artículos en la que se ofrece una revisión de la aplicación de ciertos conceptos gráficos del equilibrio líquido-vapor y líquido-líquido-vapor al diseño y síntesis de procesos de separación de mezclas ternarias. Se destacan las características más relevantes de los mapas de curvas de residuo y de los mapas de líneas de destilación, que están cobrando un interés creciente debido a su utilidad en el estudio de procesos de destilación azeotrópica.
Resumo:
En este trabajo se completa la serie de dos artículos en la que se ofrece una revisión de la aplicación de los mapas de curvas de residuo y mapas de líneas de destilación para determinar las regiones de posibles productos en la separación de mezclas ternarias no ideales (azeotrópicas). Con este objetivo, se discuten los criterios para establecer los límites de dichas regiones, a reflujo total y a razón de reflujo finita, y se presentan ejemplos que muestran la aplicación de estos conceptos en la síntesis de secuencias de columnas de destilación para separar mezclas azeotrópicas.