31 research outputs found

    Investigating Configuration Management Tools Usage in Large Infrastructure

    Get PDF
    The large variety of configuration management (CM) tools available makes it difficult for the customers to select the appropriate one for their needs. Thus this research investigated the users’ perception of CM tools in order to gain information useful for customers and CM tool developers. In total 72 system administrators were sampled and qualitative data was collected through structured questionnaires. Data was analyzed by Analytical Hierarchy Process (AHP) to find the best CM tool according to selected criteria. The most desired deployment properties were installability, configurability, scalability and stability and the most appreciated specification management properties were language, access control, monitoring and testing properties. Another important factor was whether the CM tool vendors provided good customer support. However, on the basis of people’s perception CFEngine was the best tool to use in large infrastructure

    Design Principles for A Big Data Platform: a Value Conscious Exploration

    Get PDF
    Problem space covering the design of Big Data is vast and multi-faceted. First and foremost, it relates to the disturbance caused by the Big Data phenomenon, affecting both the people and the processes of organizations. These disturbances are a result of design choices made, both relating to technology and to the approaches used in the exploitation of opportunities offered by Big Data. These design choices are, in the end, based on the values of the designers and processed either consciously or unconsciously. This problem space was explored with the methods of Design Science. The objective was to develop a continuously evolving and growing Big Data platform. To ensure the platform would be maintainable and developable during the whole life cycle, including situations that are impossible to foretell, it was hypothesized that by examining the purpose of the platform and by identifying consciously the values related to the platform, Big Data technologies, and to the actual usage in the envisioned environment, design principles could be created with integrating the identified values. These design princi-ples would guide the development of the platform in the unpredictable situations of the future. To discover the goals, benefits and the harms for the stakeholders created by the devel-opment and the usage of such a platform, methods of Value Sensitive Design were incorporated within the Design Science approach. These included empirical, conceptual, and technological investigations. During the technological investigations, two prototypes were built, the last of which will continue existence as the base of future development, and a cloud-based solution was briefly probed. Empirical investigations included project review of existing project documentation, organization of a workshop, employment of an empirical method to identify stakeholders, and the themed interviews of 16 stakeholders. Conceptual investigations were used in the identification of values. Based on these investigations and literature seven general design principles of Big Data platforms were identified and their instantiations in the case project were described. Application of these principles in the project was also documented.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    Space station systems: A bibliography with indexes (supplement 9)

    Get PDF
    This bibliography lists 1,313 reports, articles, and other documents introduced into the NASA scientific and technical information system between January 1, 1989 and June 30, 1989. Its purpose is to provide helpful information to researchers, designers and managers engaged in Space Station technology development and mission design. Coverage includes documents that define major systems and subsystems related to structures and dynamic control, electronics and power supplies, propulsion, and payload integration. In addition, orbital construction methods, servicing and support requirements, procedures and operations, and missions for the current and future Space Station are included

    Sensor Drive Mobile application for health awareness The SSURE (Software System for User Running Evaluation) app for Android: a design that won’t let you down

    Get PDF
    There has been a significant increase in the number of mobile applications concerned with health awareness due to the increase in the number of people who are concerned about their health and the raise in the number of people using smartphone/tablet devices. The development of applications related to health and exercise has become popular both in industry and academia. In this project we focus on development of a mobile application that can capture a user’s running movement and modify an audio file so that there is a synchronisation between the beats of the music and the kinetic data (cadence or Steps per Minute/SPM) to motivate and guide their exercise. Our approach applies time-frequency analysis to obtain the SPM value by using the Lomb Periodogram technique that can effectively process unevenly sampling data, which is a feature of the data captured from the built-in accelerometer sensor on a smartphone/tablet device. In order to process the time-stretched audio file that is adjusted with the running information, the Phase Vocoder technique was used to transform the sound to different speed without changing the pitch. Its sophisticated frequency-domain sound processing suits our project’s objective. To guide the implementation of these algorithms, several Software Engineering techniques have been used to manage our project. The Agile Development Lifecycle (SDLC) technique known as SCRUM was used throughout the development process in the design, testing, and implementation phases. This technique allowed us to change the plan if it was necessary, so it suited our project which was dealing with a new technology to be implemented within a short and limited timespan. Finally, we presented our evaluation to determine the accuracy of the results from our approaches and to assess the quality of our application. The results of evaluation showed that our approaches for the functional requirements were effective and gave us accurate response. However the non-functional requirements still needed to be improved and it was found that a new mobile-oriented approach for software metrics is needed if we wanted to achieve our goals fully

    Secure collaboration in onboarding

    Get PDF
    The process of onboarding a company is characterized by inter-enterprise collaboration between the acquiring and the acquired companies. Multiple cross-functional teams are formed to assimilate and integrate the processes, products, data, customers, and partners of the company under acquisition. Dynamic access control management in such inter-enterprise collaboration is the subject of this thesis. A problem in inter-enterprise collaboration in onboarding is that information assets shared by collaborating teams are not adequately protected. As a result, there is potential for accidental or malicious leakage of sensitive business information like the intellectual property, product roadmaps and strategy, customer lists etc. Also, the statically defined access control policies are not sufficient to address access control requirements of dynamic collaboration where there is a constant change in people, processes, and information assets in collaboration repository. This research proposes a new approach and model to integrate security in onboarding collaboration process. Research methods such as, literature review, field studies including direct experiential projects in onboarding and interviews with experts in Mergers and Acquisitions, and detailed data collection and analysis through surveys are used to identify the issues that need to be addressed in the onboarding process. Literature review enabled the identification of access control requirements from the perspective of statically defined policies and the need to determine access dynamically. From the field studies, it was deciphered that there is a need for a well-defined onboarding collaboration process. The data analysis and interpretation from the survey results provided insights into the needs for integrating security in all phases of onboarding collaboration. All these research methods essentially enabled identification of two key issues that this research addresses: 1) well-defined onboarding collaboration process and 2) building security in all phases of onboarding collaboration. A new approach and model called SCODA is developed to integrate security in all phases of onboarding collaboration. Onboarding collaboration process consists of four phases: create, operate, dissolve, and archive. These phases provide the basis for systematically addressing security and access control when the collaboration team is formed, while it is operating, when the team is dissolved after completing its tasks, and when shared information assets are archived. The research adapts role based access control (RBAC) and formally defines the enterprise, functional, and collaboration roles for making access control management decisions. New ideas are developed in trustbased access control management in dynamic collaboration. The change management aspects are also discussed. The SCODA model is validated and the refinements incorporated accordingly. This research contributed to both theory and practice of information security in general and access control in particular in the context of dynamic collaboration. It proposed a new approach of building security in, i.e. to integrate security in all phases of collaboration. In order to build security in, a new onboarding collaboration process is developed that is adaptable and customizable. It has also developed a new approach for trust based dynamic access control based on the new concepts of strong and weak trust relationships. These trust relationships are also adaptable and customizable. Finally, this research has potential for future research work in the design and implementation of multi-paradigm based enterprise security frameworks and interenterprise collaboration

    Mechanisms Driving Digital New Venture Creation & Performance: An Insider Action Research Study of Pure Digital Entrepreneurship in EdTech

    Get PDF
    Digitisation has ushered in a new era of value creation where cross border data flows generate more economic value than traditional flows of goods. The powerful new combination of digital and traditional forms of innovation has seen several new industries branded with a ‘tech’ suffix. In the education technology sector (EdTech), which is the industry context of this research, digitisation is driving double-digit growth into a projected $240 billion industry by 2021. Yet, despite its contemporary significance, the field of entrepreneurship has paid little attention to the phenomenon of digital entrepreneurship. As several scholars observe, digitisation challenges core organising axioms of entrepreneurship, with significant implications for the new venture creation process in new sectors such as EdTech. New venture creation no longer appears to follow discrete and linear models of innovation, as spatial and temporal boundaries get compressed. Given the paradigmatic shift, this study investigates three interrelated themes. Firstly, it seeks to determine how a Pure Digital Entrepreneurship (PDE) process develops over time; and more importantly, how the journey challenges extant assumptions of the entrepreneurial process. Secondly, it strives to identify and theorise the deep structures which underlie the PDE process through mechanism-based explanations. Consequently, the study also seeks to determine the causal pathways and enablers which overtly or covertly interrelate to power new venture emergence and performance. Thirdly, it aims to offer practical guidelines for nurturing the growth of PDE ventures, and for the development of supportive ecosystems. To meet the stated objectives, this study utilises an Insider Action Research (IAR) approach to inquiry, which incorporates reflective practice, collaborative inquiry and design research for third-person knowledge production. This three-pronged approach to inquiry allows for the enactment of a PDE journey in real-time, while acquiring a holistic narrative in the ‘swampy lowlands’ of new venture creation. The findings indicate that the PDE process is differentiated by the centrality of digital artifacts in new venture ideas, which in turn result in less-bounded processes that deliver temporal efficiencies – hence, the shorter new venture creation processes than in traditional forms of entrepreneurship. Further, PDE action is defined by two interrelated events – digital product development and digital growth marketing. These events are characterised by the constant forking, merging and termination of diverse activities. Secondly, concurrent enactment and piecemeal co-creation were found to be consequential mechanisms driving temporal efficiencies in digital product development. Meanwhile, data-driven operation and flexibility combine in digital growth marketing, to form higher order mechanisms which considerably reduce the levels of task-specific and outcome uncertainties. Finally, the study finds that digital growth marketing is differentiated from traditional marketing by the critical role of algorithmic agencies in their capacity as gatekeepers. Thus, unlike traditional marketing, which emphasises customer sovereignty, digital growth marketing involves a dual focus on the needs of human and algorithmic stakeholders. Based on the findings, this research develops a pragmatic model of pure digital new venture creation and suggests critical policy guidelines for nurturing the growth of PDE ventures and ecosystems

    Mycotoxin mixtures in food and feed: holistic, innovative, flexible risk assessment modelling approach: MYCHIF

    Get PDF
    Mycotoxins are toxic compounds mainly produced by fungi of the genera Aspergillus, Penicillium and Fusarium. They are present, often as mixtures, in many feed and food commodities including cereals, fruits and vegetables. Their ubiquitous presence represents a major challenge to the health and well being of humans and animals. Hundreds of compounds are listed as possible mycotoxins occurring in raw and processed materials destined for human food and animal feed. In this study, mycotoxins of major toxicological relevance to humans and target animal species were investigated in a range of crops of interest (and their derived products). Extensive Literature Searches (ELSs) were undertaken for data collection on: (i) ecology and interaction with host plants of mycotoxin producing fungi, mycotoxin production, recent developments in mitigation actions of mycotoxins in crop chains (maize, small grains, rice, sorghum, grapes, spices and nuts), (ii) analytical methods for native, modified and co-occurring mycotoxins (iii) toxicity, toxicokinetics, toxicodynamics and biomarkers relevant to humans and animals (poultry, suidae (pig, wild boar), bovidae (sheep, goat, cow, buffalo), rodents (rats, mice) and others (horses, dogs), (iv) modelling approaches and key reference values for exposure, hazard and risk modelling. Comprehensive databases were created using EFSA templates and were stored in the MYCHIF platform. A range of approaches were implemented to explore the modelling of external and internal exposure as well as dose-response of mycotoxins in chicken and pigs. In vitro toxicokinetic and in vivo toxicity databases were exploited, both for single compounds and mixtures. However, large data gaps were identified particularly with regards to absence of common statistical and study designs within the literature and constitute an obstacle for the harmonisation of internal exposure and dose-response modelling. Finally, risk characterisation was also performed for humans as well as for two animal species (i.e. pigs and chicken) using available tools for the modelling of internal dose and a component-based approach for selected mycotoxins mixtures

    Value-Driven Enterprise Architecture Evaluation for the Joint Force Protection Advanced Security System

    Get PDF
    The U.S. military has placed a strong focus on the importance of operating in a joint environment, where capabilities and missions are shared between service components. Protecting U.S. forces is a major consideration in the joint environment. The Joint Force Protection Advanced Security System (JFPASS) architecture has been created to fill a critical gap in Joint Force Protection guidance for systems acquisition. The systems engineering (SE) field has made wide use of system architectures to represent complex systems. As fundamental SE principles become more widespread, analysis tools provide an objective method for the evaluation of the resulting architectural products. This study used decision analysis to develop a standardized, yet adaptable and repeatable model to evaluate the capabilities of the JFPASS for any installation or facility belonging to the United States Department of Defense (DoD). Using the Value-Focused Thinking (VFT) methods, a value hierarchy was created by consulting with subject matter experts. The resulting model, named Value-Driven Enterprise Architecture (VDEA) score, provides an analysis tool, which enables DoD decision-makers to use JFPASS architecture products to quickly and easily evaluate the value provided by the system; VDEA provides insight into the overall quality and capability of the system. Through the scoring and sensitivity analysis functions, capability gaps and potential improvements can be identified. Future studies in this area will provide a vehicle for rating not only operational level systems, but also individual functional projects against other alternatives
    corecore