273,139 research outputs found

    CHORUS Deliverable 3.4: Vision Document

    Get PDF
    The goal of the CHORUS Vision Document is to create a high level vision on audio-visual search engines in order to give guidance to the future R&D work in this area and to highlight trends and challenges in this domain. The vision of CHORUS is strongly connected to the CHORUS Roadmap Document (D2.3). A concise document integrating the outcomes of the two deliverables will be prepared for the end of the project (NEM Summit)

    Exploring the connection between relational capital and female entrepreneurs

    Get PDF
    .Among intangible assets of contemporary companies, relational capital (RC) is a relevant strategic asset as well as a dimension of intellectual capital. In this scenario, micro-enterprises are key drivers of economic growth, and woman entrepreneurs are key developers of these businesses. So, the purpose of this study is to carry out a literature review analyzing how RC contributes to the startup phase of women-owned micro-enterprises. Another purpose is to understand whether and to what extent the studies conducted so far have addressed some issues such as “How and why women entrepreneurs use relational capital? What are the main benefits they get using relational capital? What are the main obstacles they face?” A literature search on Scopus was conducted, using a set of selected keywords. Scopus was used since it has quality publications. Selected papers were analyzed and classified, in an attempt to identify the main topics and results obtained from the research and analysis carried out so far. The contribution of the present research is to make the international literature focus on the connection between gender studies and RC. Particularly, the literature review emphasizes the topic proposed as emerging issue, which gives us the opportunity to identify new trends and future directions of research. This paper aims to advance knowledge and practice in the area of gender and management, using RC based on empirical research, theoretical developments, practice and current issues. The main evidences are related to a better understanding of the debate on gender and relational capital, considering that female entrepreneurship is central to the development and welfare of economies. Deep knowledge on how women entrepreneurs manage business relation can contribute to improving the effectiveness policies that promote the participation of female entrepreneurs in the economy

    Security monitoring tool system using threat intelligence vs threat hunting

    Get PDF
    This project is about developing a Security Monitoring Tool System using Graylog SIEM (Security Information Event Management) with a combination of Threat Intelligence and an expected outcome for Threat Hunting results. This is built in accordance to specific ruleset been made for threat hunting purposes with an automation of logs from Windows endpoint host and Network activity. A datasets of Threat Intelligence enrichment will be integrated to the provided platform which is Graylog. Main objective is to ensure Security Analyst or Network Analyst to have a look at any suspicious behavior of attacks by hackers and act to it in a timely manner. Most organizations normally ingesting network and endpoint logs to the SIEM tools and integrating with some commercial tools to detect or trigger anomalies and directly send them notifications via email or 3rd party channel like Slack channel. Bear in mind that, the commercial tools is highly expensive and not really cost effective, however with this development definitely will help them to deploy the same approach with very limited budget or could be at zero cost for small medium enterprise but for big enterprise it will only cost $1500 at fixed price which considered as cheaper than the other tools. There are many developments out there whereby they are using wellknown open-source IDS like Suricata and open source SIEM like elastic stack comprises of Elasticsearch, Kibana and Logstash. However, in this development, Graylog been used with the usage of Elasticsearch and MongoDB as a database server and to store, search and analyze huge volumes of data ingested. Generally, the Graylog is introduced as a powerful logging tool with a simple user-friendly interface visualized with Grafana as well as offering minimal effort to configure with very low maintenance. Due to that, creating a ruleset for Threat Hunting and Threat Intelligence enrichment, it will be much easier to configure and straight forward to compare with other competitors in the market. (Abstract by author

    The challenge of management of multidimensional enterprises analysed from a logo-poietic perspective

    Get PDF
    The challenge to multidimensional farm management is analysed and discussed from the perspective of the farm enterprise, explored within a logo-poietic framework as a self-organising system/network. In conclusion, development of management of multidimensional farming takes: a reconstruction of the values, ideas, and meaning around which the farm enterprises are organised, a new way of increase of nonredundant complexity, shifting from dimension reduction to contextualisation, and a development of interactive relationships that facilitate network building of multidimensional farming

    The Research of Technological Approach to the Modeling of Information and Analytic Provision of Managing an Enterprise

    Get PDF
    The article is devoted to the solution of actual problems of innovative development of information and analytical provision of managing an enterprise according to the newest technology. A number of recommendations concerning technological upgrading foundation of modernization of information and analytic provision of managing an enterprise are elaborated. Technological approach to the modeling of information provision of business management is substantiated. Actualizing information and analytic provision of managing an enterprise has been carried out in developed flexible information system that is organized as internal network structure. Technological foundation of information and analytical process enterprise to modernize has been considered based on the modern tools of information and communication decisions. Information and analytical provision of managing have been developed through internal and external parallels of impact, which interconnection coordinates theory, methodology and organization of information processes with actualization of its model. The model of information and analytic provision of managing an enterprise according to the individual characteristics of corporate culture, and information environment and development strategy of business entity on the basis of characteristics of technological provision of information process is developed. Information complex has been suggested as developed system with technological process of forming initial data and modernizing processing, transmission and storage of information in accordance with distinctive characteristics of enterprise and general tendencies of its developmen

    Mapping Big Data into Knowledge Space with Cognitive Cyber-Infrastructure

    Full text link
    Big data research has attracted great attention in science, technology, industry and society. It is developing with the evolving scientific paradigm, the fourth industrial revolution, and the transformational innovation of technologies. However, its nature and fundamental challenge have not been recognized, and its own methodology has not been formed. This paper explores and answers the following questions: What is big data? What are the basic methods for representing, managing and analyzing big data? What is the relationship between big data and knowledge? Can we find a mapping from big data into knowledge space? What kind of infrastructure is required to support not only big data management and analysis but also knowledge discovery, sharing and management? What is the relationship between big data and science paradigm? What is the nature and fundamental challenge of big data computing? A multi-dimensional perspective is presented toward a methodology of big data computing.Comment: 59 page
    corecore