148,952 research outputs found

    BPM, Agile, and Virtualization Combine to Create Effective Solutions

    Full text link
    The rate of change in business and government is accelerating. A number of techniques for addressing that change have emerged independently to provide for automated solutions in this environment. This paper will examine three of the most popular of these technologies-business process management, the agile software development movement, and infrastructure virtualization-to expose the commonalities in these approaches and how, when used together, their combined effect results in rapidly deployed, more successful solutions

    KAPTUR: technical analysis report

    Get PDF
    Led by the Visual Arts Data Service (VADS) and funded by the JISC Managing Research Data programme (2011-13) KAPTUR will discover, create and pilot a sectoral model of best practice in the management of research data in the visual arts in collaboration with four institutional partners: Glasgow School of Art; Goldsmiths, University of London; University for the Creative Arts; and University of the Arts London. This report is framed around the research question: which technical system is most suitable for managing visual arts research data? The first stage involved a literature review including information gathered through attendance at meetings and events, and Internet research, as well as information on projects from the previous round of JISCMRD funding (2009-11). During February and March 2012, the Technical Manager carried out interviews with the four KAPTUR Project Officers and also met with IT staff at each institution. This led to the creation of a user requirement document (Appendix A), which was then circulated to the project team for additional comments and feedback. The Technical Manager selected 17 systems to compare with the user requirement document (Appendix B). Five of the systems had similar scores so these were short-listed. The Technical Manager created an online form into which the Project Officers entered priority scores for each of the user requirements in order to calculate a more accurate score for each of the five short-listed systems (Appendix C) and this resulted in the choice of EPrints as the software for the KAPTUR project

    Adaptive development and maintenance of user-centric software systems

    Get PDF
    A software system cannot be developed without considering the various facets of its environment. Stakeholders – including the users that play a central role – have their needs, expectations, and perceptions of a system. Organisational and technical aspects of the environment are constantly changing. The ability to adapt a software system and its requirements to its environment throughout its full lifecycle is of paramount importance in a constantly changing environment. The continuous involvement of users is as important as the constant evaluation of the system and the observation of evolving environments. We present a methodology for adaptive software systems development and maintenance. We draw upon a diverse range of accepted methods including participatory design, software architecture, and evolutionary design. Our focus is on user-centred software systems

    A survey of intrusion detection system technologies

    Get PDF
    This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the performance of an IDS are explored such as specification based IDS for protecting Supervisory Control And Data Acquisition (SCADA) and Cloud networks. Also by providing a review of varied studies ranging from issues in configuration and specific problems to custom techniques and cutting edge studies a reference can be provided to others interested in learning about and developing IDS solutions. Intrusion Detection is an area of much required study to provide solutions to satisfy evolving services and networks and systems that support them. This paper aims to be a reference for IDS technologies other researchers and developers interested in the field of intrusion detection

    STRATEGIC OUTLINES: BETWEEN VALUE AND DIGITAL ASSETS MANAGEMENT

    Get PDF
    Enterprise content management leverages digital asset management to supportbusiness channel diversity. Business asset management technology is targeted to products and finalservices. By capturing photos, videos, logos and other creative assets in a central repository itbecomes possible to control how, when and by whom these assets are used.The ability to locate different images enhances collaboration inside and outside the organization.To provide full value, the system links to technologies that deliver assets to real time.Managing Digital Assets is increasingly a core management discipline for both commercialcompanies and not for profit organizations.The authors propose some directions to be accomplished when it is used digital assets.Digital Assets Management (DAM), architecture of DAM, Strategy for DAM

    Composing features by managing inconsistent requirements

    Get PDF
    One approach to system development is to decompose the requirements into features and specify the individual features before composing them. A major limitation of deferring feature composition is that inconsistency between the solutions to individual features may not be uncovered early in the development, leading to unwanted feature interactions. Syntactic inconsistencies arising from the way software artefacts are described can be addressed by the use of explicit, shared, domain knowledge. However, behavioural inconsistencies are more challenging: they may occur within the requirements associated with two or more features as well as at the level of individual features. Whilst approaches exist that address behavioural inconsistencies at design time, these are overrestrictive in ruling out all possible conflicts and may weaken the requirements further than is desirable. In this paper, we present a lightweight approach to dealing with behavioural inconsistencies at run-time. Requirement Composition operators are introduced that specify a run-time prioritisation to be used on occurrence of a feature interaction. This prioritisation can be static or dynamic. Dynamic prioritisation favours some requirement according to some run-time criterion, for example, the extent to which it is already generating behaviour

    Installing, Running and Maintaining Large Linux Clusters at CERN

    Full text link
    Having built up Linux clusters to more than 1000 nodes over the past five years, we already have practical experience confronting some of the LHC scale computing challenges: scalability, automation, hardware diversity, security, and rolling OS upgrades. This paper describes the tools and processes we have implemented, working in close collaboration with the EDG project [1], especially with the WP4 subtask, to improve the manageability of our clusters, in particular in the areas of system installation, configuration, and monitoring. In addition to the purely technical issues, providing shared interactive and batch services which can adapt to meet the diverse and changing requirements of our users is a significant challenge. We describe the developments and tuning that we have introduced on our LSF based systems to maximise both responsiveness to users and overall system utilisation. Finally, this paper will describe the problems we are facing in enlarging our heterogeneous Linux clusters, the progress we have made in dealing with the current issues and the steps we are taking to gridify the clustersComment: 5 pages, Proceedings for the CHEP 2003 conference, La Jolla, California, March 24 - 28, 200

    Adaptive Governance and Evolving Solutions to Natural Resource Conflicts

    Get PDF
    New Zealand is facing increasing challenges in managing natural resources (land, freshwater, marine space and air quality) under pressures from domestic (population growth, agricultural intensification, cultural expectations) and international (climate change) sources. These challenges can be described in terms of managing ‘wicked problems’; i.e. problems that may not be understood fully until they have been solved, where stakeholders have different world views and frames for understanding the problem, the constraints affecting the problem and the resources required to solve it change over time, and no complete solution is ever actually found. Adaptive governance addresses wicked problems through a framework to engage stakeholders in a participative process to create a long term vision. The vision must identify competing goals and a process for balancing them over time that acknowledges conflicts cannot always be resolved in a single lasting decision. Circumstances, goals and priorities can all vary over time and by region. The Resource Management Act can be seen as an adaptive governance structure where frameworks for resources such as water may take years to evolve and decades to fully implement. Adaptive management is about delivery through an incremental/experimental approach, limits on the certainty that governments can provide and stakeholders can demand, and flexibility in processes and results. In New Zealand it also requires balancing central government expertise and resources, with local authorities which can reflect local goals and knowledge, but have varying resources and can face quite distinct issues of widely differing severity. It is important to signal the incremental, overlapping, iterative and time-consuming nature of the work involved in developing and implementing adaptive governance and management frameworks. Managing the expectations of those involved as to the nature of the process and their role in it, and the scope and timing of likely outcomes, is key to sustaining participation.Adaptive capacity; governance; resilience
    • …
    corecore