615 research outputs found

    A Flexible Framework For Implementing Multi-Nested Software Transaction Memory

    Get PDF
    Programming with locks is very difficult in multi-threaded programmes. Concurrency control of access to shared data limits scalable locking strategies otherwise provided for in software transaction memory. This work addresses the subject of creating dependable software in the face of eminent failures. In the past, programmers who used lock-based synchronization to implement concurrent access to shared data had to grapple with problems with conventional locking techniques such as deadlocks, convoying, and priority inversion. This paper proposes another advanced feature for Dynamic Software Transactional Memory intended to extend the concepts of transaction processing to provide a nesting mechanism and efficient lock-free synchronization, recoverability and restorability. In addition, the code for implementation has also been researched, coded, tested, and implemented to achieve the desired objectives

    Potentials of Traceability Systems - A Cross-Industry Perspective

    Get PDF
    Recently, traceability systems have become more common, but their prevalence and design vary significantly depending on the industry. Different law and customer-based requirements for traceability systems have led to diverse standards. This contribution offers a framework to compare the state of traceability systems in different industries. A comparison of industry characteristics, motivations for traceability system implementation, common data management, and identification systems are offered. Upon that analysis, the potential of cross-industry traceability systems and approaches is identified. This extended usage of traceability systems supports the quality assurance, process management and counterfeit protection and thus expands customer value

    Analyzing the Effectiveness of Legal Regulations and Social Consequences for Securing Data

    Get PDF
    There is a wide range of concerns and challenges related to stored data security – which range from privacy and management to operations readiness, These challenges span from financial to personal and public impact. With an abundance of regulations for the enforcement of data security and emerging requirements proposed every year, organizations cannot avoid the legal or social implications of inadequate data protection. Today, public spotlight and awareness are challenging organizations to enhance how data is protected more than at any other time. For this reason, organizations have made significant efforts to improve security. When looking at precautions or changes, the factors considered are costs associated with such action, a potential consequence of not acting, impact on users, the effort required, and the scope. For this reason, leaders need to make the hard decisions of which risks they can live with and which need to be reduced because it is unrealistic to think that data security can be guaranteed. However, it is essential to have physical, administrative, and technical controls to mitigate data risks. Data protection regulations define requirements, create procedures to identify the associated risks, determine the extent of the impact, and identify what precautions should be taken. This dissertation defined seven areas for consideration related to stored data security. The research facilitated developing a measurement tool to gather and analyze the knowledge and opinions of working professionals within the United States. The study was performed from July to October 2020, which resulted in a quantitative data sample used to analyze the effectiveness of legal regulations and social consequences for securing data

    Review on Main Memory Database

    Get PDF
    The idea of using Main Memory Database (MMDB) as physical memory is not new but is in existence quite since a decade. MMDB have evolved from a period when they were only used for caching or in high-speed data systems to a time now in twenty first century when they form a established part of the mainstream IT. Early in this century, although larger main memories were affordable but processors were not fast enough for main memory databases to be admired. However, today’s processors are faster, available in multicore and multiprocessor configurations having 64-bit memory addressability stocked with multiple gigabytes of main memory. Thus, MMDBs definitely call for a solution for meeting the requirements of next generation IT challenges. To aid this swing, database systems are reconsidered to handle implementation issues adjoining the inherent differences between disk and memory storage and gain performance benefits. This paper is a review on Main Memory Databases (MMDB)

    Review of Quantitative Methods for Supply Chain Resilience Analysis

    Get PDF
    Supply chain resilience (SCR) manifests when the network is capable to withstand, adapt, and recover from disruptions to meet customer demand and ensure performance. This paper conceptualizes and comprehensively presents a systematic review of the recent literature on quantitative modeling the SCR while distinctively pertaining it to the original concept of resilience capacity. Decision-makers and researchers can benefit from our survey since it introduces a structured analysis and recommendations as to which quantitative methods can be used at different levels of capacity resilience. Finally, the gaps and limitations of existing SCR literature are identified and future research opportunities are suggested

    Review of Quantitative Methods for Supply Chain Resilience Analysis

    Get PDF
    Supply chain resilience (SCR) manifests when the network is capable to withstand, adapt, and recover from disruptions to meet customer demand and ensure performance. This paper conceptualizes and comprehensively presents a systematic review of the recent literature on quantitative modeling the SCR while distinctively pertaining it to the original concept of resilience capacity. Decision-makers and researchers can benefit from our survey since it introduces a structured analysis and recommendations as to which quantitative methods can be used at different levels of capacity resilience. Finally, the gaps and limitations of existing SCR literature are identified and future research opportunities are suggested
    • …
    corecore