The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Chaos Engineering is a discipline emerging from the practitioner community around experimenting on a distributed system in order to build confidence in the system’s capability to withstand turbulent conditions in production. This panel will bring together practitioners from a range of technology companies to discuss how they are running experiments on production systems in order to improve reliability.
This research realizes the needs for organizations to increase its readiness towards the implementation of knowledge management. This study specifically analyzes factors related to knowledge management tools utilization within the organization as antecedents towards knowledge management implementation readiness. Data were gathered from 57 respondents whom were employees of a leading software development...
In the current IT landscape, key challenges are to "un the business", "Outperform competition" & to expand the customer base to "Grow the business". This mandates an organization to constantly diversify the existing services provided and add new offerings. During such transformation initiatives, it is also imperative to ensure services are available 24/7 without interruption...
Organizational identification is a perception that individual is consistent with the organization. The purpose of this paper was to explore the status of university teachers' organizational identification and the influencing factors by applying the computational statistics software SPSS19.0 to analyze the data. Method: 535 university teachers were investigated with two questionnaires and the data...
Although critical for delivering resilient, secure, efficient, and easily changed IT systems, cross-technology, cross layer quality defect detection in IT systems still faces hurdles. Two hurdles involve the absence of an absolute target architecture and the difficulty of apprehending multi-component anti-patterns. However, Static analysis and measurement technologies are now able to both consume...
For some years now, the concept of Cloud Computing (CC) is presented as the new revolution of information technology. It presents not only a technical innovation for better IT system flexibility, improvement of working methods and cost control, but also a new economic model, built around the concept of IT Services that are identifiable, classifiable and countable for end users, who can benefit by...
With the shift in economy from products to services, there emerged an identical need for shift in focus in the literature from product quality to service quality. Unlike products, there are challenges associated with service quality as services are not easily identifiable and measurable. There are quite a few service quality models available in the current literature and subsequently there have been...
This paper addresses 30 major challenges faced by reliability engineers and managers in their work. The paper's title reflects problems and approaches collectively developed by four long-time members of an engineering services company upon the occasion of its 30th anniversary. These challenges are common in the Reliability/Safety/Maintenance Engineering community but not everyone recognizes them as...
This paper presents a comparative study of identity management tools, based on the principles of ISO/IEC 9126 standard, which establishes targets to be accomplished in order to obtain quality in software. The products compared in this study are Tivoli Identity Manager, from IBM, and Identity Manager 4 Standard Edition, from NetIQ-Novell. The choice of the products that underwent the evaluation was...
Quality, Timeliness and Reliability are key parameters to meet the business goals of any organization. Each parameter plays an important role in terms of making the product effective, reliable and is released to market for use on time. Quality, Timeliness and Reliability (QTR) are the most important KPIs (key performance indicator) used for improving operational excellence. Various measures (e.g....
The aim of our study is to examine whether the overall organization of behavior differs when people report truthful vs. deceptive messages within the framework of the T-pattern model. We tested the hypothesis that the differences between liars and truth tellers will be greater under high cognitive load conditions. We argue that recalling stories in reverse order will produce cognitive overloading...
This paper presents the SQALE (Software Quality Assessment Based on Lifecycle Expectations) method. We describe its Quality Model and Analysis Model which is used to estimate the Quality and the Technical Debt of an application source code. We provide recommendations and guidelines for using the SQALE indicators in order to analyse the structure and the impact of the Technical Debt.
Adoption of cloud computing has reached an important inflection point that is impacting IT and business strategies and models throughout the industry. There is lack of empirical evidence how cloud adoption and certain capabilities of cloud in particular, impact individual aspects of IT effectiveness like IT quality of service, user satisfaction, and IT helpfulness to users. The intent of this research...
The main purpose of this paper is to investigate the effects of KM infrastructure on knowledge sharing and KM performance. Knowledge sharing is the center of KM, so we take knowledge sharing as a mediator variable in the impact of KM infrastructure on KM performance. Based on the survey of enterprises from IT and software industry in Pearl River Delta, this paper examined the relationship between...
The purpose of this paper is to explore the problems of accounting information integration in integrated systems. Using data from a survey of 142 software users from UFIDA, Kingdee, Langchao Ltd. in China, this study tests a structural equation model that relates accounting business processes coordination and accounting information integration, which in turn are hypothesized to affect AIS performance...
The software independent verification and validation (IV&V) is essential, especially in the development of aerospace systems, to improve safety and reliability and to prevent system problems. We have used a hierarchical accident method. This method investigates the latent problems in the development process of a system that have not been thoroughly recognized in past IV&V. The National Transportation...
Studying on leadership effectiveness is extremely important for enhancing organizational performance and leadership capacity of individual leaders. Based on relevant theory and research results, this paper put forward the factors that influence leadership effectiveness in three dimensions, collecting data through questionnaire survey, using SPSS17.0 software for statistical analysis of data. The variable...
An efficient management of information/service workflows and their easy, highly-adaptive configuring in various distributed networked architectures enables reliable and effective performance a lot of applications. Among them are the distributed Web portals with related database networks for e/m-business, socio-commercial nets, corporate/enterprise networks, software of NGN architectural platforms...
Accuracy of the functional size is critical in software project management, since functional size is the most prevalent input for effort and cost estimation models. Functional size measurement is performed based on standardized manuals; however, the accuracy of FSM results is still based on the knowledge and cautions of the measurers. In this study we performed a multiple case study to identify the...
We present a brief report on a controlled experiment that provides valuable statistics to network-oriented defence analysts involved in threat identification. These statistics estimate the accuracy of the top-central actor findings that have been derived from relational data classically found in real-world datasets, such as those collected on distributed, covert organizations. Our experiment involved...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.