8 research outputs found

    Volume 46 - Issue 01 - Friday, September 10, 2010

    Get PDF
    The Rose Thorn, Rose-Hulman\u27s independent student newspaper.https://scholar.rose-hulman.edu/rosethorn/1075/thumbnail.jp

    Factors That Affect The Adoption Of Cloud Computing For An Enterprise: A Case Study Of Cloud Adoption Within Intel Corporation

    Get PDF
    With so much hype about cloud computing, it’s easy to lose sight of why it’s such an important trend. Cloud Computing (CC) has the potential to offer enterprise IT management and their employee’s tremendous opportunities to solve critical challenges to better serve business. This research explores the current barriers to entries that are preventing wide scale enterprise adoption of Cloud services for critical business services and what is required to overcome such challenges and uses a case study approach to examine the actual adoption of Cloud Computing in Intel Corporation. The results of the study indicates the key factors that IT organisations and business leaders alike across an enterprise will need to consider when making Cloud Computing adoption more pervasive across their enterprise. Intel identified barriers to Cloud Adoption such as (i) the need to work closely with suppliers to commit to a timeline of when they will be in a position to support their applications in the cloud (ii) the presence of redundant configurations that are not fully proven in such highly virtual multi-tenant virtual environments that require load balanced highly available web front ends, and (iii) application security validation which is a big concern for enterprise IT organisation such as Intel in their private cloud, and (iv) having a complete understanding of application workloads and behaviours

    Technologically Competent: Ethical Practice for 21st Century Lawyering

    Get PDF
    The impact of technology and social media on litigation and the infiltration of technology into the U.S. and world markets are undeniable. Currently, ABA Model Rule 1.1 and its Comment include a broad requirement of technological competence for ethical practice. This Article will identify the obligations of technological competence embodied in Model Rule 1.1 and examine the current cases and ethical decisions that reveal the evolving national and state-specific technological competence standards. After reviewing the timeline of cases and current scholarly literature, this Article proposes a more specific ethical standard for baseline knowledge of various technologies according to current practice and use of ever-expanding technologies by today’s lawyers. The landscape is constantly changing in the field of legal technologies, and attorneys must follow the new professional norms of technological competence for their ethical practice. Overall, this goal may be achieved by more specific rules or guidelines, CLE requirements, and state ethical mandates or guidance that will create clarity for digital lawyering and boundaries for the ethical practice of law for a digital age. More robust technological guidelines and areas of ethical competence will prepare attorneys to practice law effectively and ethically in the ever-expanding digitized landscape of the 21st century

    Are backdoor mandates ethical? A position paper

    Get PDF
    Over the past several years, several governments have, at times, pushed for the idea that commercial software should be required to include a 'backdoor,' a deliberate vulnerability whose existence and exploitation mechanism are disclosed only to the appropriate authorities. This would enable the authorities to obtain access to the information contained in any device running this software when needed to react to criminal activity

    Modernizing process control system in pavement operations

    Get PDF

    Mitigating the Risk of Knowledge Leakage in Knowledge Intensive Organizations: a Mobile Device Perspective

    Full text link
    In the current knowledge economy, knowledge represents the most strategically significant resource of organizations. Knowledge-intensive activities advance innovation and create and sustain economic rent and competitive advantage. In order to sustain competitive advantage, organizations must protect knowledge from leakage to third parties, particularly competitors. However, the number and scale of leakage incidents reported in news media as well as industry whitepapers suggests that modern organizations struggle with the protection of sensitive data and organizational knowledge. The increasing use of mobile devices and technologies by knowledge workers across the organizational perimeter has dramatically increased the attack surface of organizations, and the corresponding level of risk exposure. While much of the literature has focused on technology risks that lead to information leakage, human risks that lead to knowledge leakage are relatively understudied. Further, not much is known about strategies to mitigate the risk of knowledge leakage using mobile devices, especially considering the human aspect. Specifically, this research study identified three gaps in the current literature (1) lack of in-depth studies that provide specific strategies for knowledge-intensive organizations based on their varied risk levels. Most of the analysed studies provide high-level strategies that are presented in a generalised manner and fail to identify specific strategies for different organizations and risk levels. (2) lack of research into management of knowledge in the context of mobile devices. And (3) lack of research into the tacit dimension of knowledge as the majority of the literature focuses on formal and informal strategies to protect explicit (codified) knowledge.Comment: The University of Melbourne PhD Thesi
    corecore