The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cutting-edge technologies play major roles in our daily lives and businesses. They are used by businesses to gain competitive advantage even as individuals use them to simplify their routine activities. However, these technologies are driven by cutting-edge applications (simply called Apps) that are deployed on devices like iPhone, iPad, laptop computers, desktop computers and the like. Just like...
This paper proposes an alternative of configuration management system development using IT ontology and semantic technology. To make the IT service management more effective especially the configuration management, the manager needs the appropriate and ad-hoc analysis for decision making. Our approach proposes a knowledge base to accompany the conventional database system in order to flexibly cope...
In recent years there has been a great deal of academic and practitioner interest in the role of ‘benefits realisation management’ [BRM] approaches, as a means of proactively leveraging value from IT investments. However, as automated technologies are increasingly being introduced on the basis that they deliver more cost-efficient solutions than their human counterparts, important questions needs...
In the professional context of accountants and auditors there is a permanent need of executing data verification tasks due to the need to check data coherence. Software houses have specific computer-assisted audit tools to execute those procedures: those tools are presented as user friendly and no need of specific background in Information Technologies. CaseWare IDEA is among those tools. Additionally,...
Some of the greatest challenges for Software requirements elicitation are related with the identification of what is needed to be developed and with the understanding of the organization business rules. In this context, this paper aims to suggest the use of Comic Books in the process of requirements elicitation within a business model and evaluate the results of applying this technique. To reach this...
Goal: This work aims to identify metrics to estimate the effort to develop Business Intelligence (BI) system. Methodology: It was conducted a secondary study in order to identify metrics related to BI and to business process complexity. The results conducted to a hypothesis that relates business process complexity to effort required to implement it on BI System. This hypothesis was developed on a...
Heterogeneous rectangular dissections are frequently used in information processing such as multiple paged books in spread sheet languages and multi-layer image data. In previous studies, a hexadecimal grid graph model was proposed for multilayer rectangular dissections and certain algorithms were provided. In this paper, we propose a 16-ary list structure to implement their algorithms for the hexadecimal...
AngularJS is one of the widely used frameworks for modern single-page web application development which is designed to support dynamic views in the applications. To further assist AngularJS developers, this research proposes how the concept of model-driven development can be applied to AngularJS-based development. We propose a UML profile for AngularJS for building a model of an AngularJS web application,...
Authorization in workflow systems is usually built on top of role-based access control (RBAC), security policies on workflows are then expressed as constraints on the users performing a set of tasks and the roles assigned to them. Unfortunately, when role administration is distributed and potentially untrusted users contribute to the role assignment process, like in the case of Administrative RBAC...
Software Development Ecosystems (ECOS) involves several external factors and consists of systems and business subsystems that interact in a specific market niche. The objective of this research is to understand the factors that are involved with the interconnection of systems and subsystems into a Software Ecosystem in the public context. In this context, through interviews and document analysis identified...
Telemedicine is recognized by the World Health Organization (WHO) as a tool to improve access and quality in healthcare. Its benefits are undeniable: breaking physical, geographical and temporal barriers between health services and its users. The improvement of the ICT had revolutionized the acting and the strategic planning of healthcare organizations, especially on that effectiveness, efficiency...
The objective of this paper is to propose a model to assist in monitoring the software development process in distributed environments. For an initial validation of the model was developed an experiment with IT professionals and were used as tools Kanban and BPMN.
UML is the only language which clearly distinguishes a higher level design and lower level design diagrams. While designing UML diagrams, the same semantics can be implemented with different pragmatics. This created the commotion in the SDLC design stages. This commotion leads to the gorge between the higher level and lower level designs. This is resolved by the redesign of new higher level diagrams...
Informatics is a relatively young discipline which is very dynamically developing at present. Since its implementation and applications are important in all areas it has become a regular school subject. Probably because of unpredictable development and impact in the future, there are many questions concerning the content and methods of informatics education. The paper intends to find the way how to...
The Siyakhula Living Lab in the rural Eastern Cape province of South Africa has been in existence for over a decade now. In this time, several software artefacts have been developed by students and partners with the aim of providing contextually-relevant services to the rural community. However, reliance on different platforms and paradigms has meant that the deployment of such services would be difficult...
This is the eighth time that the annual International Conference on Cyber Conflict (CyCon 2016), organised by the NATO Cooperative Cyber Defence Centre of Excellence, is held in the historic city of Tallinn, the capital of Estonia. Over the years the CyCon conferences have proved to be world-recognised forums addressing cyber conflict and security and their implications for society, business and world...
Tactical military networks present a challenging environment for the delivery of information services. A tactical network must support a dynamically changing force in the face of physical and electronic threats and where bandwidth is scarce. The network manager faces an almost impossible task to deliver vital information with the required quality of service in the face of changing operational priorities...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.