148,749 research outputs found

    ORACLE DATABASE SECURITY

    Get PDF
    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user accounts that require a login password to be authenticated to access the data.data security, password administration, Oracle HTTP Server, OracleAS, access control

    Architecture for Provenance Systems

    No full text
    This document covers the logical and process architectures of provenance systems. The logical architecture identifies key roles and their interactions, whereas the process architecture discusses distribution and security. A fundamental aspect of our presentation is its technology-independent nature, which makes it reusable: the principles that are exposed in this document may be applied to different technologies

    Boundary Objects and their Use in Agile Systems Engineering

    Full text link
    Agile methods are increasingly introduced in automotive companies in the attempt to become more efficient and flexible in the system development. The adoption of agile practices influences communication between stakeholders, but also makes companies rethink the management of artifacts and documentation like requirements, safety compliance documents, and architecture models. Practitioners aim to reduce irrelevant documentation, but face a lack of guidance to determine what artifacts are needed and how they should be managed. This paper presents artifacts, challenges, guidelines, and practices for the continuous management of systems engineering artifacts in automotive based on a theoretical and empirical understanding of the topic. In collaboration with 53 practitioners from six automotive companies, we conducted a design-science study involving interviews, a questionnaire, focus groups, and practical data analysis of a systems engineering tool. The guidelines suggest the distinction between artifacts that are shared among different actors in a company (boundary objects) and those that are used within a team (locally relevant artifacts). We propose an analysis approach to identify boundary objects and three practices to manage systems engineering artifacts in industry

    A new approach to collaborative frameworks using shared objects

    Get PDF
    Multi-user graphical applications currently require the creation of a set of interface objects to maintain each participating display. The concept of shared objects allows a single object instance to be used in multiple contexts concurrently. This provides a novel way of reducing collaborative overheads by requiring the maintenance of only a single set of interface objects. The paper presents the concept of a shared-object collaborative framework and illustrates how the concept can be incorporated into an existing object-oriented toolkit

    Managing the KM Trade-Off: Knowledge Centralization versus Distribution

    Get PDF
    KM is more an archipelago of theories and practices rather than a monolithic approach. We propose a conceptual map that organizes some major approaches to KM according to their assumptions on the nature of knowledge. The paper introduces the two major views on knowledge ­objectivist, subjectivist - and explodes each of them into two major approaches to KM: knowledge as a market, and knowledge as intellectual capital (the objectivistic perspective); knowledge as mental models, and knowledge as practice (the subjectivist perspective). We argue that the dichotomy between objective and subjective approaches is intrinsic to KM within complex organizations, as each side of the dichotomy responds to different, and often conflicting, needs: on the one hand, the need to maximize the value of knowledge through its replication; on the other hand, the need to keep knowledge appropriate to an increasingly complex and changing environment. Moreover, as a proposal for a deeper discussion, such trade-off will be suggested as the origin of other relevant KM related trade-offs that will be listed. Managing these trade-offs will be proposed as a main challenge of KM

    An Architecture for Provenance Systems

    No full text
    This document covers the logical and process architectures of provenance systems. The logical architecture identifies key roles and their interactions, whereas the process architecture discusses distribution and security. A fundamental aspect of our presentation is its technology-independent nature, which makes it reusable: the principles that are exposed in this document may be applied to different technologies

    Towards Exascale Scientific Metadata Management

    Full text link
    Advances in technology and computing hardware are enabling scientists from all areas of science to produce massive amounts of data using large-scale simulations or observational facilities. In this era of data deluge, effective coordination between the data production and the analysis phases hinges on the availability of metadata that describe the scientific datasets. Existing workflow engines have been capturing a limited form of metadata to provide provenance information about the identity and lineage of the data. However, much of the data produced by simulations, experiments, and analyses still need to be annotated manually in an ad hoc manner by domain scientists. Systematic and transparent acquisition of rich metadata becomes a crucial prerequisite to sustain and accelerate the pace of scientific innovation. Yet, ubiquitous and domain-agnostic metadata management infrastructure that can meet the demands of extreme-scale science is notable by its absence. To address this gap in scientific data management research and practice, we present our vision for an integrated approach that (1) automatically captures and manipulates information-rich metadata while the data is being produced or analyzed and (2) stores metadata within each dataset to permeate metadata-oblivious processes and to query metadata through established and standardized data access interfaces. We motivate the need for the proposed integrated approach using applications from plasma physics, climate modeling and neuroscience, and then discuss research challenges and possible solutions

    Transfer of brand knowledge in business-to-business markets: A qualitative study

    Get PDF
    This is the author's accepted manuscript (under the provisional title "Transfer of brand knowlede in business-to-business markets by brand when personified as a human: A qualitative study"). The final published article is available from the link below. This article is (c) Emerald Group Publishing and permission has been granted for this version to appear here (http://bura.brunel.ac.uk/handle/2438/8377). Emerald does not grant permission for this article to be further copied/distributed or hosted elsewhere without the express permission from Emerald Group Publishing Limited.Purpose – This paper presents the approach of a one-to-one relationship for branding in business-to-business markets. With qualitative evidence, the paper seeks to clarify the links between branding, relationship marketing and purchase intention of resellers and to discuss the contribution of brand personified as brand representatives to the brand knowledge of resellers. The aim of this paper is to understand how this transfer of knowledge by brand personified as representatives of the brand is reflected in the selection process of brand for resale by resellers. Design/methodology/approach – The theory is used to develop a testable model. Information from the field was gathered through 12 in-depth interviews of brand managers of international IT brands. These interviews helped to give a deeper insight into the topic and contributed to the categorization of different themes to be developed into constructs. Components that emerged from the interviews were from different disciplines and were useful in making linkages between these disciplines. Findings – Interviewees associated the role of brand personified (as brand representative) as a conduit between brand and resellers. Given the findings, brand when personified as a human can be used to manage reseller relationships in a business-to-business network. The brand personified with its metaphorical properties enables the resellers not only to clearly understand brand-related information but also to make positive evaluations about the brand. Empirical research would be helpful to establish the indicators of brand personification and to enhance the understanding of the concept. Practical implications – The study will be useful for senior managers of brands operating in competitive and complex business-to-business networks. It will enable them to use the categories and components to ensure that their brand is the preferred brand for resellers operating in the network. Originality/value – The approach will be helpful in linking different functions of the organization to measure the contribution made by employees representing the brand to resellers in competitive markets by imparting knowledge about the brand to resellers

    Don’t throw rocks from the side-lines: A sociomaterial exploration of organizational blogs as boundary objects

    Get PDF
    Purpose Social media such as blogs are being widely used in organizations in order to undertake internal communication and share knowledge, rendering them important boundary objects. A root metaphor of the boundary object domain is the notion of relatively static and inert objects spanning similarly static boundaries. A strong sociomaterial perspective allows the immisciblity of object and boundary to be challenged, since a key tenet of this perspective is the ongoing and mutually-constituted performance of the material and social. Design/methodology/approach The aim of our research is to draw upon sociomateriality to explore the operation of social media platforms as intra-organizational boundary objects. Given the novel perspective of this study and its social constructivist ontology, we adopt an exploratory, interpretivist research design. This is operationalized as a case study of the use of an organizational blog by a major UK government department over an extended period. A novel aspect of the study is our use of data released under a Freedom of Information request. Findings We present three exemplar instances of how the blog and organizational boundaries were performed in the situated practice of the case study organization. We draw on literature on boundary objects, blogs and sociomateriality in order to provide a theoretical explication of the mutually-constituted performance of the blog and organizational boundaries. We also invoke the notion of ‘extended chains of intra-action’ to theorise changes in the wider organization. Originality/value Adoption of a sociomaterial lens provides a highly novel perspective of boundary objects and organizational boundaries. The study highlights the indeterminate and dynamic nature of boundary objects and boundaries, with both being in an intra-active state of becoming, challenging conventional conceptions. The study demonstrates that specific material-discursive practices arising from the situated practice of the blog at the respective boundaries were performative, reconfiguring the blog and boundaries and being generative of further changes in the organization
    • 

    corecore