156,921 research outputs found

    User acceptance of open enterprise solution: the OSS-ERP case

    Get PDF
    Organizations implement Enterprise Resource Planning (ERP) systems with the objective of reaching operational efficiency and the incorporation to new markets through the information flow control on time of the entire organization. However, ERP systems are complex tools, mainly for the small and medium size enterprises (SMEs). For these reason, new ERP configurations have arisen for SMEs such as Open Source Software-ERP (OSS-ERP). OSS-ERP is a research topic barely analyzed by the literature. Specifically, this paper’s aim is to focus on the OSS-ERP users’ acceptance and use. The authors have developed a research model based on the Technology Acceptance Model (TAM) for testing the users’ behavior toward OSS-ERP.Las organizaciones implantan Sistemas Integrados de Gestión (ERP, acrónimo de Enterprise Resource Planning) con el objetivo de alcanzar eficiencias operativas y la incorporación a nuevos mercados mediante un mayor control del flujo de información de toda la empresa a tiempo real. Sin embargo, los sistemas ERP son herramientas complejas, principalmente la pequeña y mediana empresa (PYME). Por esta razón, están surgiendo nuevas configuraciones de sistemas ERP para PYME como los sistemas ERP de código abierto (OSS-ERP). OSS-ERP es un tópico de investigación escasamente analizado en la literatura. Concretamente, este artículo se centra en el y aceptación de los usuarios a los sistemas OSS-ERP. Los autores han desarrollado un modelo de investigación basado en Metamodelo de Aceptación de la Tecnología (TAM) para testar el comportamiento de los usuarios hacia los sistemas OSS-ERP

    JXTA-Overlay: a P2P platform for distributed, collaborative, and ubiquitous computing

    Get PDF
    With the fast growth of the Internet infrastructure and the use of large-scale complex applications in industries, transport, logistics, government, health, and businesses, there is an increasing need to design and deploy multifeatured networking applications. Important features of such applications include the capability to be self-organized, be decentralized, integrate different types of resources (personal computers, laptops, and mobile and sensor devices), and provide global, transparent, and secure access to resources. Moreover, such applications should support not only traditional forms of reliable distributing computing and optimization of resources but also various forms of collaborative activities, such as business, online learning, and social networks in an intelligent and secure environment. In this paper, we present the Juxtapose (JXTA)-Overlay, which is a JXTA-based peer-to-peer (P2P) platform designed with the aim to leverage capabilities of Java, JXTA, and P2P technologies to support distributed and collaborative systems. The platform can be used not only for efficient and reliable distributed computing but also for collaborative activities and ubiquitous computing by integrating in the platform end devices. The design of a user interface as well as security issues are also tackled. We evaluate the proposed system by experimental study and show its usefulness for massive processing computations and e-learning applications.Peer ReviewedPostprint (author's final draft

    The historical development and basis of human factors guidelines for automated systems in aeronautical operations

    Get PDF
    In order to derive general design guidelines for automated systems a study was conducted on the utilization and acceptance of existing automated systems as currently employed in several commercial fields. Four principal study area were investigated by means of structured interviews, and in some cases questionnaires. The study areas were aviation, a both scheduled airline and general commercial aviation; process control and factory applications; office automation; and automation in the power industry. The results of over eighty structured interviews were analyzed and responses categoried as various human factors issues for use by both designers and users of automated equipment. These guidelines address such items as general physical features of automated equipment; personnel orientation, acceptance, and training; and both personnel and system reliability

    An Applied Study on Educational Use of Facebook as a Web 2.0 Tool: The Sample Lesson of Computer Networks and Communication

    Full text link
    The main aim of the research was to examine educational use of Facebook. The Computer Networks and Communication lesson was taken as the sample and the attitudes of the students included in the study group towards Facebook were measured in a semi-experimental setup. The students on Facebook platform were examined for about three months and they continued their education interactively in that virtual environment. After the-three-month-education period, observations for the students were reported and the attitudes of the students towards Facebook were measured by three different measurement tools. As a result, the attitudes of the students towards educational use of Facebook and their views were heterogeneous. When the average values of the group were examined, it was reported that the attitudes towards educational use of Facebook was above a moderate level. Therefore, it might be suggested that social networks in virtual environments provide continuity in life long learning.Comment: 11 page

    Design and Experimental Validation of a Software-Defined Radio Access Network Testbed with Slicing Support

    Get PDF
    Network slicing is a fundamental feature of 5G systems to partition a single network into a number of segregated logical networks, each optimized for a particular type of service, or dedicated to a particular customer or application. The realization of network slicing is particularly challenging in the Radio Access Network (RAN) part, where multiple slices can be multiplexed over the same radio channel and Radio Resource Management (RRM) functions shall be used to split the cell radio resources and achieve the expected behaviour per slice. In this context, this paper describes the key design and implementation aspects of a Software-Defined RAN (SD-RAN) experimental testbed with slicing support. The testbed has been designed consistently with the slicing capabilities and related management framework established by 3GPP in Release 15. The testbed is used to demonstrate the provisioning of RAN slices (e.g. preparation, commissioning and activation phases) and the operation of the implemented RRM functionality for slice-aware admission control and scheduling

    How to promote informal learning in the workplace? The need for incremental design methods

    Full text link
    Informal Learning in the Workplace (ILW) is ensured by the everyday work activities in which workers are engaged. It accounts for over 75 per cent of learning in the workplace. Enterprise Social Media (ESM) are increasingly used as informal learning environments. According to the results of an implementation we have conducted in real context, we show that ESM are appropriate to promote ILW. Nevertheless, social aspects must be reconsidered to address users' needs regarding content and access, quality information indicators, moderation and control

    Integrating security solutions to support nanoCMOS electronics research

    Get PDF
    The UK Engineering and Physical Sciences Research Council (EPSRC) funded Meeting the Design Challenges of nanoCMOS Electronics (nanoCMOS) is developing a research infrastructure for collaborative electronics research across multiple institutions in the UK with especially strong industrial and commercial involvement. Unlike other domains, the electronics industry is driven by the necessity of protecting the intellectual property of the data, designs and software associated with next generation electronics devices and therefore requires fine-grained security. Similarly, the project also demands seamless access to large scale high performance compute resources for atomic scale device simulations and the capability to manage the hundreds of thousands of files and the metadata associated with these simulations. Within this context, the project has explored a wide range of authentication and authorization infrastructures facilitating compute resource access and providing fine-grained security over numerous distributed file stores and files. We conclude that no single security solution meets the needs of the project. This paper describes the experiences of applying X.509-based certificates and public key infrastructures, VOMS, PERMIS, Kerberos and the Internet2 Shibboleth technologies for nanoCMOS security. We outline how we are integrating these solutions to provide a complete end-end security framework meeting the demands of the nanoCMOS electronics domain

    Safe and Secure Wireless Power Transfer Networks: Challenges and Opportunities in RF-Based Systems

    Full text link
    RF-based wireless power transfer networks (WPTNs) are deployed to transfer power to embedded devices over the air via RF waves. Up until now, a considerable amount of effort has been devoted by researchers to design WPTNs that maximize several objectives such as harvested power, energy outage and charging delay. However, inherent security and safety issues are generally overlooked and these need to be solved if WPTNs are to be become widespread. This article focuses on safety and security problems related WPTNs and highlight their cruciality in terms of efficient and dependable operation of RF-based WPTNs. We provide a overview of new research opportunities in this emerging domain.Comment: Removed some references, added new references, corrected typos, revised some sections (mostly I-B and III-C
    corecore