The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The objective of our research is to define a requirements model for Adaptive Multi-organizational Systems. Our work considers the functional complexity of contemporary internet-based, multi-organizational systems. Not only the business functions, but also the interactions between the components of such systems are highly dynamic and global. Furthermore, these systems function in extremely uncertain...
Inside of any organization, the acquisition process of product or service is extremely important and if not done properly can cause uncountable damage. In this way, the software acquisition isn't different and can cause uncountable problems too, like delays in existing contracts or even the dependence on the company contracted to code the product. Thus, the objective of this work is provide a software...
Rick Cassell has 19 years experience working with MLS. He has extensive experience in analyzing MLS integrity and continuity of service. He has worked for the last ten years as an advisor to the U.S. representative on the International Civil Aviation Organization All Weather Operations Panel. He has a Bachelor's Degree in Electrical Engineering from Villanova University.
In the near future, die-stacked DRAM will be increasingly present in conjunction with off-chip memories in hybrid memory systems. Research on this subject revolves around using the stacked memory as a cache or as part of a flat address space. This paper proposes MemPod, a scalable and efficient memory management mechanism for flat address space hybrid memories. MemPod monitors memory activity and...
Currently, the market dynamics compels organizations to have another position in relation to the management of its projects, since most of them have been created in an attempt to create something creative and innovative. Project plans are complex and bureaucratic documents. In this scenario, occupy the time of the parties involved in drawing up and reading these plans no longer makes sense. This article...
This paper discusses the use of analytical software solutions in microfinance institutions and how it can improve the operations of the organization. The study has been conducted through a survey from MFIs located in various countries of Africa, Europe and Asia. The survey questions have been based on the kind of software solutions MFIs use and if they are able to benefit from it. Moreover, with this...
Continuous Delivery is an agile software development practice in which developers frequently integrate changes into the main development line and produce releases of their software. An automated Continuous Integration infrastructure builds and tests these changes. Claimed advantages of CD include early discovery of (integration) errors, reduced cycle time, and better adoption of coding standards and...
From the importance of the portfolio management process has gained by its inclusion in quality models and standards, the amount of organization looking to implement this process effectively and efficiently has increased. Thus, this research seeks to assist in the implementation of portfolio management in small and medium-sized enterprises, reducing the difficulties and excessive documentation required...
This paper proposes an approach for adopting alternative workforce in an organization. Alternative workforce refers to a pool of workers who work for the organization as contract workers or as crowd workers for a set of specific tasks or duration. Adoption of crowd workers as an alternative workforce is gaining a lot of attention these days. However, it is still not widely adopted by big organizations...
In the current IT landscape, key challenges are to "un the business", "Outperform competition" & to expand the customer base to "Grow the business". This mandates an organization to constantly diversify the existing services provided and add new offerings. During such transformation initiatives, it is also imperative to ensure services are available 24/7 without interruption...
Network, Storage, Resources, Application services monitoring is becoming increasingly important for provision of QoS (Quality of services) in IT. So to manage the huge data centers servers resources and installed application on it required more human resources and time to check every server status by login to it. So in this paper we are introducing the new network and application services monitoring...
Many organizations today still manage mid or large in-house data centers that require very expensive maintenance efforts, including fault detection. Common monitoring frameworks used to quickly detect faults are complex to deploy/maintain, expensive, and intrusive as they require the installation of probes on monitored hw/sw to collect raw data. Such intrusiveness can be problematic as it imposes...
The aim of this study is to answer the question about risk factors for the information system (IS) projects in public organizations in Poland. These factors were identified based on a critical review of literature, practical collaboration, the case study and logical deduction. The paper continues as follows. Firstly, a relationship between risk factors and a project success is explained and risk factors...
While the advent of big data technologies has raised challenges in the data management landscape but it has also created new opportunities for acquiring and harnessing data to its greater potential. Marketing has gone beyond traditional means. Digital channels including social media and blogs have become persuasive to an extent that they are not only seen as a means of entertainment and networking...
The dynamic and increasingly stealthy techniques used by cyber criminals to target critical computing infrastructure of an organization requires appropriate response mechanism on the part of the organization. Government agencies and regulatory bodies are imposing the requirements of risk assessments on a continuous basis. One important aspect of continuous risk monitoring is using a suitable risk...
In recent years, due to the intensive use of information technology, the information security has become a crucial and strategic issue in organizational management. Various standards and guidelines for security information as ISO/IEC 27001, ISO/IEC 27002, and COBIT have been developed; however, organizations still face difficulties in their implementation. This paper presents the current situation...
Current paper proposes a custom solution for detecting deviations in process execution by analyzing event logs of running cases. The monitored business processes are extracted with process mining techniques. The behavior of the current alert system is illustrated on a case study, the event process logs resulted from the execution of a software development process used in the IT department of a large...
The focus of this paper is a discussion on the organizational integration of BDIM activities into an IT infrastructure. In particular, this paper provides a definition of the usefulness of a center of excellence within information systems, its structure and measurement of capabilities. The organizational capabilities pertaining to BDIM can be measured through the introduction of a maturity model,...
In this paper we discuss our experience of implementation of Data Loss Prevention (DLP) system at our University. The DLP system helps to analyze, control, monitor, block and protect data at the University. With the help of the DLP system and encryption we are able to protect and control the confidential data about our users, HR data, intellectual ownership data, legal and financial documentation,...
This paper presents a maturity model for strategic planning of IS/IT called MMPE-SI/TI (Gov). The model has 5 maturity levels, 6 capability levels, 16 processes and 124 best practices for strategic planning of IS/IT directed by governmental organizations Brazilian. Among these processes, the process of Project Manage will be more fully defined in this paper, including best practices and the results...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.