10,786 research outputs found

    The complexities of technology-based care : telecare as perceived by care practitioners

    Get PDF
    Telecare, which offers ‘care at a distance’ (Pols, 2012) through a variety of remote monitoring technologies, has developed rapidly across health and social care policy in many developed countries. Nonetheless, approaches to this development differ; the focus of this paper is the United Kingdom, where implementation has been particularly rapid and ambitious in scope. The paper argues that, while there are clear and tangible benefits from the use of some telecare technologies, there is insufficient research about the complexities of implementation with end users. These complexities include ethical questions raised by the use of monitoring and surveillance equipment, the ability to fine tune technologies to the needs of individuals, and the way in which care relationships may be altered by remote care mediated through technologies. This paper addresses these issues through a particularly under researched area; that is, the perceptions of care practitioners who assess for, and interact with, these technologies. The research was conducted with practitioners using qualitative research methodology. The paper concludes that Telecare practice is uneven in the way it addresses complexities and that more needs to be done to understand the way in which technologies are discussed and utilised by those charged with their implementation

    Cloud computing contribution to manufacturing industry

    Get PDF
    Manufacturing industry has been always facing challenge to improve the production efficiency, product quality, innovation ability and struggling to adopt cost-effective manufacturing system. In recent years cloud computing is emerging as one of the major enablers for the manufacturing industry. Combining the emerged cloud computing and other advanced manufacturing technologies such as Internet of Things, service-oriented architecture (SOA), networked manufacturing (NM) and manufacturing grid (MGrid), with existing manufacturing models and enterprise information technologies, a new paradigm called cloud manufacturing is proposed by the recent literature. This study presents concepts and ideas of cloud computing and cloud manufacturing. The concept, architecture, core enabling technologies, and typical characteristics of cloud manufacturing are discussed, as well as the difference and relationship between cloud computing and cloud manufacturing. The research is based on mixed qualitative and quantitative methods, and a case study. The case is a prototype of cloud manufacturing solution, which is software platform cooperated by ATR Soft Oy and SW Company China office. This study tries to understand the practical impacts and challenges that are derived from cloud manufacturing. The main conclusion of this study is that cloud manufacturing is an approach to achieve the transformation from traditional production-oriented manufacturing to next generation service-oriented manufacturing. Many manufacturing enterprises are already using a form of cloud computing in their existing network infrastructure to increase flexibility of its supply chain, reduce resources consumption, the study finds out the shift from cloud computing to cloud manufacturing is feasible. Meanwhile, the study points out the related theory, methodology and application of cloud manufacturing system are far from maturity, it is still an open field where many new technologies need to be studied.siirretty Doriast

    Putting pharmaceuticals into the wider context of challenges to fish populations in rivers

    Get PDF
    The natural range of fish species in our rivers is related to flow, elevation, temperature, local habitat and connectivity. For over 2000 years, humans have altered to varying degrees the river habitat. In the past 200 years, we added to the environmental disruption by discharging poorly treated sewage, nutrients and industrial waste into our rivers. For many rivers, the low point arrived during the period of 1950s–1970s, when rapid economic development overrode environmental concerns and dissolved oxygen concentrations dropped to zero. In these more enlightened times, gross river pollution is a thing of the past in the Developed World. However, persistent legacy chemical contaminants can be found in fish long after their discharge ceased. Changes in habitat quality and morphology caused and continue to cause the disappearance of fish species. The range of fish stressors has now increased as temperatures rise, and non-native fish introductions bring new diseases. The threat from pharmaceuticals to fish populations remains hypothetical, and no studies have yet linked change in fish populations to exposure

    Verifying and Monitoring IoTs Network Behavior using MUD Profiles

    Full text link
    IoT devices are increasingly being implicated in cyber-attacks, raising community concern about the risks they pose to critical infrastructure, corporations, and citizens. In order to reduce this risk, the IETF is pushing IoT vendors to develop formal specifications of the intended purpose of their IoT devices, in the form of a Manufacturer Usage Description (MUD), so that their network behavior in any operating environment can be locked down and verified rigorously. This paper aims to assist IoT manufacturers in developing and verifying MUD profiles, while also helping adopters of these devices to ensure they are compatible with their organizational policies and track devices network behavior based on their MUD profile. Our first contribution is to develop a tool that takes the traffic trace of an arbitrary IoT device as input and automatically generates the MUD profile for it. We contribute our tool as open source, apply it to 28 consumer IoT devices, and highlight insights and challenges encountered in the process. Our second contribution is to apply a formal semantic framework that not only validates a given MUD profile for consistency, but also checks its compatibility with a given organizational policy. We apply our framework to representative organizations and selected devices, to demonstrate how MUD can reduce the effort needed for IoT acceptance testing. Finally, we show how operators can dynamically identify IoT devices using known MUD profiles and monitor their behavioral changes on their network.Comment: 17 pages, 17 figures. arXiv admin note: text overlap with arXiv:1804.0435
    corecore