Generative Internet Clusters

Size: px
Start display at page:

Download "Generative Internet Clusters"

Transcription

1 Generative Internet Clusters Innovation and the Evolution of the Internet Economy Project outline from Author Ole Hanseth - I think the next century will be the century of complexity, Stephen Hawkins in The evolving Internet economy/ecology The key feature of the Internet has been the amount of innovations continuously emerging both related to its core technologies and ways of using it. An obvious consequence of this amount of innovations is, of course, the fact that the Internet is very different in important ways today compared to what it was previously. And this changing nature of the Internet has impacts on how, what kinds of, and amount of innovations that will emerge in the future. Important changes in the Internet ecology includes Opportunities for criminal activities for those who are interested and security threats for ordinary users New business models and alliances which implies that the overall architecture of the Internet is changing 1

2 Increased number and heterogeneity among Internet Service Providers (Content Delivery Networks, Eyeballs, ) which implies that the traditional organizational and technological arrangements for data transfer (peering and transit) is challenged The emergence of clusters The society is on all levels becoming dependent of the Internet and rapidly increasingly so which implies increased individual and societal vulnerability related to Internet breakdowns These changes generates demands for more changes for instance related to Implementation of security and quality of service mechanisms in the core network which may have significant negative impact on the Internet s architecture New models for Internet governance and regulation to sustain competition as well as security New architecture to enable future innovations while maintaining Internet s sustainability and resilience Clusters and clustering All this implies that the context and conditions for innovations related to the Internet is changing. Based on this we will take clusters and clustering processes as our starting points. Ongoing clustering processes, through which groups of actors integrate their networks, platforms, and services at the technological level and establish closer collaborative arrangements on the organizational level, seems to accelerate. Based on this we believe that it will be fruitful to look at 2

3 the Internet as changing from a two layer to a three layer structure. The two layer model sees the Internet as composed of Internet Service Providers (from the small local up to the big global ones linked together in a hierarchical structure) one the first layer and the whole Internet on the second. The three layer model includes an additional one in between this: clusters. So the overall Internet is then seen as ecology of clusters. Future competition and data exchange arrangements will then be related to clusters rather than individual ISPs. Regarding innovation, we will then focus on innovation on all three levels but with a focus on how clusters innovate, compare them, and identify the characteristics that separates the most innovative clusters from the less innovative ones. 3. Innovation and infrastructures The research literature makes several distinctions between various kinds of innovations: radical versus incremental innovations, component versus architectural innovations, product versus service innovations, etc. We believe that it is crucial to identify yet another unique domain of innovations: Infrastructural innovations, i.e. the innovation processes related to the development of new infrastructures. In this case we focus on one kind of infrastructures information infrastructures. Infrastructures, just like systems, come in a nested structure, i.e. one infrastructure may be composed of other infrastructures recursively. Infrastructures are socio-material (or sociotechnical) including technological and material components as well as human, political, legal, and organizational ones. According to the three layer model presented above we will focus on three kinds of infrastructures: individual ISPs and other kinds of SPs, clusters, and the overall Internet. The Internet is unique among infrastructures when in comes to speed and breath of innovations. This can partly be explained by the fact that the Internet is digital rather than physical. But we need a more elaborate understanding of how innovations have and are emerging related to the Internet. And this issue has been addressed by a number of scholars, and new models or theories of 3

4 innovations have been proposed based on this like Chesbrough s theory of Open Innovations and Tuomi s of Networks of Innovation. Others have focused more specifically on the Internet. This includes in particular discussions among some cyberlaw scholars discussing regulation of cyberspace. An issue of interest for some of these has been how to regulate cyberspace or the Internet so that unwanted use (for instance distribution of child pornography and music, and film and software piracy) is constrained at the same time as the qualities of the Internet that has made it so successful is maintained. The qualities of the Internet that these scholars have identified as important to maintain is exactly the speed and scope of innovations that the Internet has allowed and triggered regarding both the Internet itself and its use. We will here introduce three cyberlaw scholars and the aspects of the Internet they have highlighted and discussed End-to-end architectures, programmable terminals, generativity The end-to-end architecture is widely held to be a prime and distinguishing feature of the Internet compared to traditional telecommunication (Saltzer et al. 1984; Abbate 1994, 1999). This means that the functionality ( intelligence ) of the overall network is located in the ends, its terminals (i.e. computers in the Internet case), as opposed to the traditional telecom architecture where the functionality was located in the network. The end-to-end architecture made the Internet extremely flexible: Anybody having a computer could develop and provide a new service. Abbate (1998) also illustrates how the successful development of Internet services has been based on an approach where each layer of services established served as a platform for experimental development of the next layer. The importance of the end-to-end architecture has also been forcefully argued by Lawrence Lessig (2001) in debates about issues like network neutrality. He has argued that if network neutrality is not maintained, the Internet s architecture will not be based on the end-2-end principle any more and, further, that this will have serious negative impact on future Internet innovations. 4

5 Yochai Benkler (2006) develop this end-to-end argument one step further by underscoring the mutual dependence of the end-to-end architecture of the network and (easily) programmable terminals in terms of general purpose computers. Benkler (ibid.) makes a conceptual contrast between programmable computers and appliances. An appliance is a device with a limited and well defined set of functions which (normally) cannot be modified after the users have bought it. Typical examples include washing machines, radios, phones (traditional ones, at least). Most such devices have computers inside, but their software cannot (normally at least) be modified by its users. Benkler argues that many proposed arrangements for improving Internet security, like various models and implementations of trusted computing will not only do harm to the Internet s architecture but, may be even more importantly, the programmability of its terminals (i.e. computers connected). Benkler argues that a combination of certain proposed security mechanisms would do substantial harm to both (architecture and programmability) and effectively turn the whole Internet into an appliance and block almost all future innovations. Benkler has combined his analysis of the role of the Internet s architecture and programmability with an analysis of its open source licensing policy and distributed and loosely connected organizing into a theory of what he calls social production name Commons Based Peer Production (CBPP) which can very well be seen as an innovation theory. In this he explores the conditions for CBPP to work successfully. Among these is the granularity of the technologies modules. Jonathan Zittrain (2006) also sees Internet in contrast to appliances and develops the Lessig/Benkler argument yet one step further by means of the concept of generative technology. Generativity is 5

6 the essential quality animating the trajectory of information technology innovation. (ibid., p. 1980). It denotes a technology s overall capacity to produce unprompted change driven by large, varied, and uncoordinated audiences (ibid.). Zittrain argues that the grid of PCs connected by the Internet has developed in such a way that it is consummately generative. Zittrain defines generativity more detailed as a function of a technology s capacity for leverage across a range of tasks, adaptability to a range of different tasks, ease of mastery, and accessibility. Leverage describes the extent to which these objects enable valuable accomplishments that otherwise would be either impossible or not worth the effort to achieve. Adaptability refers to the breath of a technology s use without change and the readiness with which it might be modified to broaden its range of uses. A technology s ease of mastery reflects how easy it is for broad audiences to adopt and adapt it: how much skill is necessary to make use of its leverage for tasks they care about, regardless of whether the technology was designed with those tasks in mind. Accessibility the more readily people can come to use and control a technology, along with what information might be required to master it, the more accessible the technology is The end of end-to-end? Even though the Internet s end-to-end architecture has contributed significantly to the net s successful evolution, its future is uncertain. The Internet s growth has generated new demands. For instance, security, illegal distribution of spam, music and child pornography has become major 6

7 issues. Many actors are arguing that these issues demand technological mechanisms (filters and security technologies like trusted computing) to be put into the net. Network providers are also arguing that they have to implement quality of service mechanisms to guarantee better services for those who are willing to pay for it to afford further expansion of their bandwidth capacities. Scholars like Benkler (2006), David (2005), Lemley and Lessig (2000), Wu (2010) and Zittrain (2006) are worried that that the proposals for addressing these issues will destroy the end-to-end architecture and turn the Internet into an appliance and dramatically reduce the rate of innovations related to the Internet in the future. Other researchers are arguing that the Internet s architecture has to change to allow further growth (Clark et al 2002, 2003; Faratin et al. 2008). This relates to tussles in cyberspace emerging out of the growth in number and variety of Internet Service Providers. This makes their relationships complex and the conditions for sustainable and coordinated growth of the Internet are eroding. A new architecture is also considered necessary to maintain, or preferably enhance, the Internet s resilience. For an extensive description of the Internet s current ecology and a discussion of its resilience see (Trimintzios et al. 2001) Strategic architecting and architectural control points. Jason Woodward (2006) has also addressed the role of technological architectures related to the growing complexities of the contemporary ICT field. He has focused more on PC and software companies and identifies ways in which actors may related strategically towards the design of architectures, i.e. what he calls strategic architecting. For instance, he demonstrates how actors may design an architecture in a way so that they can control the evolution of the whole ecology if the control one single component, i.e. designing what he calls architectural control points. 7

8 4. Research questions and aims Our research will focus on clusters and clustering processes by seeing clusters as evolving information infrastructures where their evolution is driven by innovation processes. We will in particular look at the role played by the architectures (and other technological aspects) of the clusters in the way they are linked non-technological elements like legal artefacts and organizational, economic and political elements. We will do so bay using a combination of Zittrain s concept of Generative Technology and Benkler s concept of Commons Based Peer Production as our main theoretical lens. Our research questions are 1. What are the key elements driving clustering processes? 2. What distinguishes a generative cluster from a less generative one? 3. How are ongoing clustering processes changing the competition between actors in the Internet economy? 4. How are clusters competing and how is this competition shaping their evolution as well as the development of the whole Internet 5. How is clustering changing the Internet s architecture and how is this shaping future innovation processes as well as the overall Internet and its resilience and sustainability 6. How should the Internet s architecture change to enable future innovations and maintain sustainability? 5. Research design and methodology Our research will primarily be based on case studies of clusters. We will look at different kinds of clusters. In the early phase of the projects we will concentrate on clusters related to cloud computing. The overall approach will be exploratory in the sense that we will start by identifying 8

9 and looking into a few clusters starting from specific actors. Such actors could be providers of cloud based services like Visma, user organizations like DnBNOR, basic cloud service providers like Amazon, Google, or HP, etc. In the very first phase (i.e. now) we will trace a cluster starting with Visma. Our main resource in the project will be a postdoc. We are currently in contact with a couple of excellent candidates. In addition, Gisle Hannemyr, Ole Hanseth and a number of master students will be involved. At the moment two enthusiastic students have expressed their strong interest in this and will start immediately. We will try to recruit a few more as soon as possible. References and litterature Abbate, J.: The Internet Challenge: Conflict and Compromise in Computer Networking. In Summerton, J (Ed) Changing large technical systems. Boulder: Westview Press, pp , 1994 Abbate, J. Inventing the Internet. MIT Press, Aanestad, M., Jensen, T.B. Building nation-wide information infrastructures in healthcare through modular implementation strategies. J. Strateg. Inform. Syst. (2011), doi: /j.jsis Arthur, W. B. The Nature of Technology. What It is and How it Evolves. Penguin Books, Benkler, Y The Wealth of Networks. How Social Production Transforms Markets and Freedom. Yale University Press, Clark, D. D., Sollins, K., Wroclawski, J., and Braden, R.Tussle in Cyberspace: Defining Tomorrow s Internet. SIGCOMM 02, August 19-23, 2002, Pittsburgh, Pennsylvania, USA. Clark, D. D., Sollins, K., Wroclawski, J., and Faber, T. Addressing Reality: An Architectural Response to Real-World Demands on the Evolving Internet. ACM SIGCOMM 2003 Workshops, August 25&27, 2003, Karlsruhe, Germany. David, Paul A "The Beginnings and Prospective Ending of End-to-End : An Evolutionary Perspective on the Internet s Architecture." Industrial Organization , Economics Working Paper Archive EconWPA. DeLanda, M. (2006). A New Philosophy of Society. London, Continuum. Edwards, P. N., S. J. Jackson, G. C. Bowker, C. P. Knobel Understanding infrastructure: Dynamics, tensions, and design. Report, History and Theory of Infrastructure: Lessons for New Scientific Cyberinfrastructures. Workshop Report, University of Michigan, Ann Arbor. Edwards, Paul N.; Bowker, Geoffrey C.; Jackson, Steven J.; and Williams, Robin (2009) "Introduction: An Agenda for Infrastructure 9

10 Studies," Journal of the Association for Information Systems: Vol. 10: Iss. 5, Article 6. Faratin, Peyman, Clark, David D., Bauer, Steven, Lehr, William, Gilmore, Patrick W. and Berger, Arthur, The Growing Complexity of Internet Interconnection (December 31, 2008). Communications & Strategies, No. 72, p. 51, 4th Quarter Gaver, A. (ed.) Platforms, Markets and Innovation. Edvard Elgar, Gerring, J. (2007) Case Study Research. Principles and Practices. Cambridge University Press. Hanseth, O., and Ciborra, C. Complexity, Risk, and ICT. Edvard Elgar, Hanseth, O., and Lyytinen, K. (2010) Design Theory for Dynamic Complexity in Information Infrastructures: The Case of building Internet. Journal of Information Technology. Hanseth, O., Jacucci, E., Grisot, M., and Aanestad, M. REFLEXIVE STANDARDIZATION. SIDE-EFFECTS AND COMPLEXITY IN STANDARD-MAKING. MISQ Vol. 30, Special Issue on Standardization Aug. 2006, pp Hanseth, O., and Monteiro, E. Inscribing Behaviour in Information Infrastructure Standards, Accounting Management & Information Technology (7:4), 1997, pp Hanseth, O., Monteiro, E., Hatling, M. Developing Information Infrastructure: The Tension Between Standardization and Flexibility, Science, Technology, & Human Values, (21: 4), 1996, pp Hitt, M. A., Beamish, P. W., Jackson S. E., Mathieu J. E. (2007). Building Theoretical and Empirical Bridges Across Levels: Multilevel Research in Management. Academy of Management Journal 50(6) Hughes, T. P. Networks of Power: Electrification in Western Society, , John Hopkins University Press, Lemley, M. A. and Lessig, L., The End of End-to-End: Preserving the Architecture of the Internet in the Broadband Era (October 1, 2000). UCLA Law Review, Vol. 48, p. 925, 2001; Stanford Law and Economics Olin Working Paper No. 207; UC Berkeley Public Law Research Paper No. 37. Available at SSRN: or doi: /ssrn Lessig, L The future of ideas: the fate of the commons in a connected world. New York: Random House. Lyytinen, K. and Damsgaard, J. What's Wrong with the Diffusion of Innovation Theory. Proceedings of the IFIP TC8 WG8.1 Fourth Working Conference on Diffusing Software Products and Process Innovations. Kluwer, B.V. Deventer, The Netherlands, The Netherlands, 2001 Lyytinen, K., J. L. King Standard making: A critical research frontier for information systems research. MIS Quart. 30(Special Issue) Miles, M. B., and Huberman, A. M. (1994). Qualitative Data Analysis, Thousand Oaks: Sage Publications. Monteiro, E. Scaling information infrastructure: the case of the next generation IP in Internet. The Information Society. 14(3): , Nielsen, P. A Conceptual Framework of Information Infrastructure Building. A Case Study of the Development of a Content Service Platform for Mobile Phones in Norway. Ph.D. Thesis, University of Oslo,

11 Ribes, D. and Charlotte P. Lee. Sociotechnical Studies of Cyberinfrastructure and e-research: Current Themes and Future Trajectories. Computer Supported Cooperative Work (2010) 19: Tilson,D., Kalle Lyytinen, and Carsten Sørensen. Research Commentary Digital Infrastructures: The Missing IS Research Agenda. INFORMATION SYSTEMS RESEARCH : ; Tiwana et al.: Research Commentary: Coevolution of Platform Architecture, Governance, and Environmental Dynamics. Information Systems Research 21(4), pp Tiwana, A., Benn Konsynski. Complementarities Between Organizational IT Architecture and Governance Structure. INFORMATION SYSTEMS RESEARCH. Vol. 21, No. 2, June 2010, pp Trimintzios, P., Hall, C., Clayton, R., Anderson, R. and Ouzounis, E. Resilience of the Internet Interconnection Ecosystem. European Network and Information Security Agency (ENISA), April Pollock, N., and Williams, R. Software and Organisations: The Biography of the Enterprise-Wide System. Or how SAP Conquered the World (Routledge 2009) Walls, J.G., Widmeyer, G.R. and El Sawy, O.A. (1992). Building an Information System Design Theory for Vigilant EIS, Information Systems Research 3(1): Winner, L. Autonomous Technology. MIT Press, Woodward, C. J. Architectural Control Points. Proceedings of the Third International Conference on Design Science. Research in Information Systems and Technology. (V. Vaishnavi & R. Baskerville, Eds). May 7-9, 2008, Atlanta, Georgia: Georgia State University Wu, T. (2010), The Master Switch: The Rise and Fall of Information Empires: Knopf Publishing Group. Yoo, Y "Computing in Everyday Life: A Call for Research on Experiential Computing," MIS Quarterly, (34: 2) pp Yoo, Y., Henfridsson, O., Lyytinen, K. "The New Organizing Logic of Digital Innovation: An Agenda for Information Systems Research" Information Systems Research, (21:4), 2010, pp Zittrain, J The Generative Internet. Harward Law Review, Vol. 119, p

SPECIAL ISSUE: CRITICAL REALISM IN IS RESEARCH. Ola Henfridsson

SPECIAL ISSUE: CRITICAL REALISM IN IS RESEARCH. Ola Henfridsson SPECIAL ISSUE: CRITICAL REALISM IN IS RESEARCH THE GENERATIVE MECHANISMS OF DIGITAL INFRASTRUCTURE EVOLUTION Ola Henfridsson Warwick Business School, The University of Warwick, Coventry CV4 7AL UNITED

More information

Infrastructural Innovation. Flexibility, Generativity and the Mobile Internet

Infrastructural Innovation. Flexibility, Generativity and the Mobile Internet 1/29 Infrastructural Innovation. Flexibility, Generativity and the Mobile Internet Ole Hanseth Department of Informatics, University of Oslo, Norway oleha@ifi.uio.no Petter Nielsen Telenor R&I, Norway

More information

INF5890 IT and Management. Introduction. 26 th January 2015

INF5890 IT and Management. Introduction. 26 th January 2015 INF5890 IT and Management Introduction 26 th January 2015 About the course Practicalities Course overview (format, important dates etc) About the project Course content IT and management at what level?

More information

THE GENERATIVE MECHANISMS OF DIGITAL INFRASTRUCTURE EVOLUTION

THE GENERATIVE MECHANISMS OF DIGITAL INFRASTRUCTURE EVOLUTION THE GENERATIVE MECHANISMS OF DIGITAL INFRASTRUCTURE EVOLUTION Presentation INF5210 OCTOBER 2014 Bendik Bygstad, University of Oslo Digital infrastructures What are they? Networks of technology, humans

More information

Bootstrapping networks, communities and infrastructures. On the evolution of ICT solutions in health care

Bootstrapping networks, communities and infrastructures. On the evolution of ICT solutions in health care Bootstrapping networks, communities and infrastructures. On the evolution of ICT solutions in health care Ole Hanseth & Margunn Aanestad Department of Informatics, University of Oslo, Norway. Email: ole.hanseth@ifi.uio.no,

More information

SharePoint-based digital infrastructure in an oil service company! Knut H. Rolland"

SharePoint-based digital infrastructure in an oil service company! Knut H. Rolland SharePoint-based digital infrastructure in an oil service company Knut H. Rolland" Overview" Theory Installed base cultivation Understanding digital infrastructures in the making as combinatorial evolution

More information

A CONCEPTUAL FRAMEWORK OF INFORMATION INFRASTRUCTURE BUILDING:

A CONCEPTUAL FRAMEWORK OF INFORMATION INFRASTRUCTURE BUILDING: A CONCEPTUAL FRAMEWORK OF INFORMATION INFRASTRUCTURE BUILDING: A CASE STUDY OF THE DEVELOPMENT OF A CONTENT SERVICE PLATFORM FOR MOBILE PHONES IN NORWAY by Petter Nielsen A thesis submitted in partial

More information

INTRODUCTION: WHAT DO WE KNOW ABOUT INDUSTRIAL DYNAMICS?

INTRODUCTION: WHAT DO WE KNOW ABOUT INDUSTRIAL DYNAMICS? INTRODUCTION: WHAT DO WE KNOW ABOUT INDUSTRIAL DYNAMICS? Jackie Krafft Today, industrial dynamics is considered to be among the most interesting and rewarding fields of research. There are various reasons

More information

Design theory for dynamic complexity in information infrastructures: the case of building internet

Design theory for dynamic complexity in information infrastructures: the case of building internet Research article Design theory for dynamic complexity in information infrastructures: the case of building internet Ole Hanseth 1, Kalle Lyytinen 2 Journal of Information Technology (2010) 25, 1 19 & 2010

More information

Panel: The Identity and Dynamics of MIS

Panel: The Identity and Dynamics of MIS Panel: The Identity and Dynamics of MIS Tor J. Larsen and Linda Levine Norwegian School of Management, Norway Software Engineering Insitute, Carnegie Mellon University, U.S.A. e-mail: Tor.J.Larsen@BI.NO

More information

Smart Grid. System of Systems Architectures

Smart Grid. System of Systems Architectures Smart Grid System of Systems Architectures Systems Evolution to Guide Strategic Investments in Modernizing the Electric Grid K. Mani Chandy, California Institute of Technology Jeff Gooding, Southern California

More information

E13 Children and Youth at Risk. in a European perspective

E13 Children and Youth at Risk. in a European perspective Children and youth at risk in a European perspective Teachers Caroline Vink Senior Advisor at Netherlands Youth Institute C.Vink@nji.nl Ida Skytte Jakobsen,MSc in Psychology, PhD. in Social Science idja@ucl.dk

More information

MASTER OF SCIENCE (MSc) IN ENGINEERING (SOFTWARE ENGINEERING) (Civilingeniør, Cand. Polyt. i Software Engineering)

MASTER OF SCIENCE (MSc) IN ENGINEERING (SOFTWARE ENGINEERING) (Civilingeniør, Cand. Polyt. i Software Engineering) Chapter 9 The programme specific part of the curriculum for: MASTER OF SCIENCE (MSc) IN ENGINEERING (SOFTWARE ENGINEERING) (Civilingeniør, Cand. Polyt. i Software Engineering) Applicable to students admitted

More information

IBM Perspective on Cloud Computing. The next big thing or another fad?

IBM Perspective on Cloud Computing. The next big thing or another fad? IBM Perspective on Cloud Computing The next big thing or another fad? Table of contents 4 Potential benefits of cloud computing 4 Public and private clouds 5 Technology behind cloud computing 6 IBM leadership

More information

Design of an Interface for Technology Supported Collaborative Learning the RAFT Approach

Design of an Interface for Technology Supported Collaborative Learning the RAFT Approach Design of an Interface for Technology Supported Collaborative Learning the RAFT Approach Lucia Terrenghi 1, Marcus Specht 1, Moritz Stefaner 2 1 Fraunhofer FIT, Institute for Applied Information Technology,

More information

Scholarship Programme

Scholarship Programme Department of Children and Youth Affairs Scholarship Programme Note No. 7 Research Briefing Consuming Talk: Youth Culture and the Mobile Phone 1. What is the study s background? This study was the subject

More information

Integration Complexity Risk: The Making of Information Systems out-ofcontrol.

Integration Complexity Risk: The Making of Information Systems out-ofcontrol. Chapter 1: Introduction Integration Complexity Risk: The Making of Information Systems out-ofcontrol. Ole Hanseth 1. Integration, complexity and risk ICT has been closely related to risk throughout its

More information

Digital Innovation Challenges

Digital Innovation Challenges Digital Innovation Challenges The Distributed Tuning of Apple s ios Dr Carsten Sørensen London School of Economics and Political Science Department of Management The Information Systems and Innovation

More information

INFRASTRUCTURAL ISSUES IN DESIGN OF TECHNOLOGY ENHANCED LEARNING ENVIRONMENTS

INFRASTRUCTURAL ISSUES IN DESIGN OF TECHNOLOGY ENHANCED LEARNING ENVIRONMENTS INFRASTRUCTURAL ISSUES IN DESIGN OF TECHNOLOGY ENHANCED LEARNING ENVIRONMENTS Submitted to the Psychnology Journal KURT RYSJEDAL & RUNE BAGGETUN InterMedia and IFI, University of Bergen, Norway {kurt.rysjedal}{rune.baggetun}@intermedia.uib.no

More information

Models of Dissertation Research in Design

Models of Dissertation Research in Design Models of Dissertation Research in Design S. Poggenpohl Illinois Institute of Technology, USA K. Sato Illinois Institute of Technology, USA Abstract This paper is a meta-level reflection of actual experience

More information

4G LTE Wireless Local Loop:

4G LTE Wireless Local Loop: 4G LTE Wireless Local Loop: Meeting the Challenges of a Changing Rural Marketplace NetAmerica Alliance Background Remarkable changes are taking place throughout the rural telecommunications industry. A

More information

EDS Innovation Research Programme DISCUSSION PAPER SERIES. No.005 Media, Connectivity, Literacies and Ethics

EDS Innovation Research Programme DISCUSSION PAPER SERIES. No.005 Media, Connectivity, Literacies and Ethics EDS Innovation Research Programme DISCUSSION PAPER SERIES No.005 Media, Connectivity, Literacies and Ethics Security Challenges of Networks: Cyber Trust and Cyber Crime Robin Mansell March 2006 EDS Innovation

More information

Telecom Italia Group s Submission for NETmundial

Telecom Italia Group s Submission for NETmundial Telecom Italia Group s Submission for NETmundial (7 March 2014) Abstract: Telecom Italia Group is pleased to provide this submission on Global Internet Governance Principles and a Roadmap for the further

More information

Examining a Thesis in the Visual Arts

Examining a Thesis in the Visual Arts Examining a Thesis in the Visual Arts Dr George Petelin, Convenor, Higher Degrees by Research, Queensland College of Art 1. How do Higher Degrees by Research with a Visual Arts creative component vary

More information

Lucas Logan Texas A&M University SUMMMARY: The IPR GPR: The Emergence of a Global Prohibition Regime to Regulate Intellectual Property Infringement

Lucas Logan Texas A&M University SUMMMARY: The IPR GPR: The Emergence of a Global Prohibition Regime to Regulate Intellectual Property Infringement 1 Lucas Logan Texas A&M University SUMMMARY: The IPR GPR: The Emergence of a Global Prohibition Regime to Regulate Intellectual Property Infringement This research is guided by the following question:

More information

White Paper: Optimizing the Cloud Infrastructure for Enterprise Applications

White Paper: Optimizing the Cloud Infrastructure for Enterprise Applications White Paper: Optimizing the Cloud Infrastructure for Enterprise Applications 2010 Ashton, Metzler, & Associates. All rights reserved. Executive Summary Given the technological and organizational risks

More information

Virtualized Security: The Next Generation of Consolidation

Virtualized Security: The Next Generation of Consolidation Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the

More information

Doing Online Relearning through Information Skills (DORIS):

Doing Online Relearning through Information Skills (DORIS): (DORIS): A Mutual Shaping Perspective for Information Literacy Research and Practice Juan D. Machin-Mastromatteo and Tallinn University, Institute of Information Studies Introduction Snapshots This PhD

More information

Integrating Multi-Modal Messages across Heterogeneous Networks.

Integrating Multi-Modal Messages across Heterogeneous Networks. Integrating Multi-Modal Messages across Heterogeneous Networks. Ramiro Liscano, Roger Impey, Qinxin Yu * and Suhayya Abu-Hakima Institute for Information Technology, National Research Council Canada, Montreal

More information

Jonathon N. Cummings

Jonathon N. Cummings Jonathon N. Cummings Duke University December, 2012 Fuqua School of Business 100 Fuqua Drive, Box 90120 Durham, NC 27708-0120 Phone: 919-660-7756 / Fax: 919-681-6245 jonathon.cummings@duke.edu http://www.fuqua.duke.edu/faculty_research/faculty_directory/cummings/

More information

2 Computer Science and Information Systems Research Projects

2 Computer Science and Information Systems Research Projects 2 Computer Science and Information Systems Research Projects This book outlines a general process for carrying out thesis projects, and it embraces the following components as fundamentally important:

More information

Umbrella for Research into Human Resource Development (HRD)

Umbrella for Research into Human Resource Development (HRD) Human Resource Development International, Vol. 10, No. 1, 99 106, March 2007 Umbrella for Research into Human Resource Development (HRD) LIDEWEY E. C. VAN DER SLUIS Vrije Universiteit What may be the future

More information

Why you should opt for an external data centre: 10 no-brainers LCL WHITE PAPER. LCL, your partner in data center outsourcing 1

Why you should opt for an external data centre: 10 no-brainers LCL WHITE PAPER. LCL, your partner in data center outsourcing 1 Why you should opt for an external data centre: 10 no-brainers LCL WHITE PAPER LCL, your partner in data center outsourcing 1 A data centre, even a small one, is a huge investment for any organisation.

More information

The Road to Convergence

The Road to Convergence A UBM TECHWEB WHITE PAPER SEPTEMBER 2012 The Road to Convergence Six keys to getting there with the most confidence and the least risk. Brought to you by The Road to Convergence Six keys to getting there

More information

Preface. A Plea for Cultural Histories of Migration as Seen from a So-called Euro-region

Preface. A Plea for Cultural Histories of Migration as Seen from a So-called Euro-region Preface A Plea for Cultural Histories of Migration as Seen from a So-called Euro-region The Centre for the History of Intercultural Relations (CHIR), which organised the conference of which this book is

More information

Facility Usage Scenarios

Facility Usage Scenarios Facility Usage Scenarios GDD-06-41 GENI: Global Environment for Network Innovations December 22, 2006 Status: Draft (Version 0.1) Note to the reader: this document is a work in progress and continues to

More information

Revolutionary Scholarship: Innovation of Community Engagement Models

Revolutionary Scholarship: Innovation of Community Engagement Models Revolutionary Scholarship: Innovation of Community Engagement Models Welcome to Boston, where tradition meets innovation! Boston is home to historic Faneuil Hall and The Old State House, places where revolution

More information

Communication Department Spring 2016 Course Offerings

Communication Department Spring 2016 Course Offerings Communication Department Spring 2016 Course Offerings Comm 25 Intro. To Communication (2) Comm 27 Public Speaking (3) Comm 31 Media & Society (3) Comm 43 Intro. To Interpersonal Communication (3) Comm

More information

Research on Operation Management under the Environment of Cloud Computing Data Center

Research on Operation Management under the Environment of Cloud Computing Data Center , pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering

More information

Open government data practices: Producing open publics through civic hacking. Juliane Jarke, PhD.

Open government data practices: Producing open publics through civic hacking. Juliane Jarke, PhD. Open government data practices: Producing open publics through civic hacking Juliane Jarke, PhD. My project Develop an understanding of open government data practices as performing associations across

More information

A study into the entrepreneurial marketing of high technology based small firms.

A study into the entrepreneurial marketing of high technology based small firms. Title A study into the entrepreneurial marketing of high technology based small firms. Introduction Contemporary business to business (B2B) marketing approaches are focused mainly on relationship development

More information

The aim of this paper is to study the scope of business education and development strategies for its expansion in Kazakhstan.

The aim of this paper is to study the scope of business education and development strategies for its expansion in Kazakhstan. Business education in Kazakhstan is flourishing before our eyes, the formation of this new market sector involves thousands of people and hundreds of organizations across the country. Almost every manager

More information

Business Process Outsourcing: Implications for Process and Information Integration

Business Process Outsourcing: Implications for Process and Information Integration Business Process Outsourcing: Implications for Process and Information Integration A project proposal to the Industrial Advisory Board of the UCI NSF Industry/University Cooperative Research Center by

More information

Control as a Strategy for the Development of Generativity in Business Models for Mobile Platforms

Control as a Strategy for the Development of Generativity in Business Models for Mobile Platforms Control as a Strategy for the Development of Generativity in Business Models for Mobile Platforms S.M. Elaluf-Calderwood, B.D. Eaton, and C.Sørensen Information Systems and Innovation Group Department

More information

INTRODUCING A MODEL FOR SOCIAL IMPACT ASSESSMENT OF PUBLIC ADMINISTRATION REFORM IN ROMANIA * Raluca ANTONIE

INTRODUCING A MODEL FOR SOCIAL IMPACT ASSESSMENT OF PUBLIC ADMINISTRATION REFORM IN ROMANIA * Raluca ANTONIE INTRODUCING A MODEL FOR SOCIAL IMPACT ASSESSMENT OF PUBLIC ADMINISTRATION REFORM IN ROMANIA * Raluca ANTONIE Raluca ANTONIE Lecturer, Public Administration Department, Faculty of Political, Administrative

More information

Governing through Architecture Generative Architectures

Governing through Architecture Generative Architectures Governing through Architecture Generative Architectures Ole Hanseth Department of Informatics University of Oslo, Norway Strategic Architecting Morris and Ferguson: Architectures win technology wars! Architectural

More information

Programme Curriculum for Master Programme in Information Systems

Programme Curriculum for Master Programme in Information Systems Programme Curriculum for Master Programme in Information Systems 1. Identification Name of programme Scope of programme Level Programme code Master Programme in Information Systems 60 ECTS credits Master

More information

Degree Programme in International Business Management (Masters Degree) Management and Business Research Strategies

Degree Programme in International Business Management (Masters Degree) Management and Business Research Strategies Page 1 of 13 Degree Programme in International Business Management (Masters Degree) Management and Business Research Strategies Code: MGT2LG011 Extent: 6 ECTS 1st semester English core studies compulsory

More information

Shaping the crazy future in the IT sector through directed evolution of software systems

Shaping the crazy future in the IT sector through directed evolution of software systems Shaping the crazy future in the IT sector through directed evolution of software systems Stelian Brad, PhD (Engg.), PhD (Econ.) President Cluj IT Cluster the crazy future my risky job for today to introduce

More information

The Real Questions about. Social Media Monitoring/Web Listening

The Real Questions about. Social Media Monitoring/Web Listening The Real Questions about Social Media Monitoring/Web Listening Should this new marketing discipline be called social media monitoring or web listening? Or any of the other 10 terms identified in this paper?

More information

IoT Week 2015 Lisbon June 16th 18th

IoT Week 2015 Lisbon June 16th 18th IoT Week 2015 Lisbon June 16th 18th Towards Large- Scale Internet- of- Things deployments IoT IS LIFE, LIFE IS ART: The role of artistic practices as catalysts of innovation in IoT. of the Roundtable Discussion

More information

ATLAS Internet Observatory 2009 Annual Report

ATLAS Internet Observatory 2009 Annual Report ATLAS Internet Observatory 2009 Annual Report C. Labovitz, S. Iekel-Johnson, D. McPherson Arbor Networks, Inc. J. Oberheide, F. Jahanian University of Michigan M. Karir Merit Network, Inc. ATLAS Internet

More information

Workshop on Infrastructure Security and Operational Challenges of Service Provider Networks

Workshop on Infrastructure Security and Operational Challenges of Service Provider Networks Workshop on Infrastructure Security and Operational Challenges of Service Provider Networks Farnam Jahanian University of Michigan and Arbor Networks IFIP Working Group 10.4 June 29-30, 2006 What s the

More information

On the attributes of a critical literature review. Saunders, Mark N. K. 1 & Rojon, Céline 2. United Kingdom.

On the attributes of a critical literature review. Saunders, Mark N. K. 1 & Rojon, Céline 2. United Kingdom. On the attributes of a critical literature review Saunders, Mark N. K. 1 & Rojon, Céline 2 1 School of Management, University of Surrey, Guildford, GU2 7XH, United Kingdom; 2 Department of Psychology &

More information

Cloud Computing - Architecture, Applications and Advantages

Cloud Computing - Architecture, Applications and Advantages Cloud Computing - Architecture, Applications and Advantages 1 Arun Mani Tripathi 2 Rizwan Beg NIELIT Ministry of C&I.T., Govt. of India 2 Prof. and Head, Department 1 of Computer science and Engineering,Integral

More information

The Science of Cyber Security. Peter Weinberger (Google Inc) (based on a study for DDR&E s Steven King, with no any conneceon to Google at all)

The Science of Cyber Security. Peter Weinberger (Google Inc) (based on a study for DDR&E s Steven King, with no any conneceon to Google at all) The Science of Cyber Security Peter Weinberger (Google Inc) (based on a study for DDR&E s Steven King, with no any conneceon to Google at all) Sponsor arranged a workshop S. King (OSD, sponsor) F. Schneider

More information

Project Knowledge Management Based on Social Networks

Project Knowledge Management Based on Social Networks DOI: 10.7763/IPEDR. 2014. V70. 10 Project Knowledge Management Based on Social Networks Panos Fitsilis 1+, Vassilis Gerogiannis 1, and Leonidas Anthopoulos 1 1 Business Administration Dep., Technological

More information

THE CULTURE OF INNOVATION AND THE BUILDING OF KNOWLEDGE SOCIETIES. - Issue Paper -

THE CULTURE OF INNOVATION AND THE BUILDING OF KNOWLEDGE SOCIETIES. - Issue Paper - THE CULTURE OF INNOVATION AND THE BUILDING OF KNOWLEDGE SOCIETIES - Issue Paper - UNESCO, Bureau of Strategic Planning September 2003 1 I. The past and present scope of innovation During the last two decades,

More information

The Relationship Between Information Systems Management and

The Relationship Between Information Systems Management and The Relationship Between Information Systems Management and Organizational Culture Jakobus Smit Utrecht University of Applied Science, Netherlands kobus.smit@hu.nl Marielle Dellemijn CRM Excellence, Netherlands

More information

Western European Organizations Turn to the Cloud for UCaaS

Western European Organizations Turn to the Cloud for UCaaS IDC TOP LINE Western European Organizations Turn to the Cloud for UCaaS Commissioned by: Verizon and Cisco Jason Andersson July 2015 INTRODUCTION Unified communications as a service (UCaaS) is a fast-growing

More information

ANANDHI S. BHARADWAJ

ANANDHI S. BHARADWAJ ANANDHI S. BHARADWAJ Office Home Goizueta Business School 1578 Crestline Drive Emory University Atlanta, GA 30345 Phone: (404) 727-1184 (404) 634-2807 Email: Anandhi_Bharadwaj@BUS.EMORY.EDU Academic 2002-1995

More information

How the emergence of OpenFlow and SDN will change the networking landscape

How the emergence of OpenFlow and SDN will change the networking landscape How the emergence of OpenFlow and SDN will change the networking landscape Software-defined networking (SDN) powered by the OpenFlow protocol has the potential to be an important and necessary game-changer

More information

Seminar in Software and Service Engineering: Software Ecosystems and Infrastructures Lecture 1: Background to the topic area

Seminar in Software and Service Engineering: Software Ecosystems and Infrastructures Lecture 1: Background to the topic area Seminar in Software and Service Engineering: Software Ecosystems and Infrastructures Lecture 1: Background to the topic area Kari Smolander kari.smolander@aalto.fi Course details Topic area Objectives

More information

Research IT Plan. UCD IT Services. Seirbhísí TF UCD

Research IT Plan. UCD IT Services. Seirbhísí TF UCD Research IT Plan UCD IT Services Research IT Plan The main goal of this plan is to provide a sustainable and evolving campus Cyberinfrastructure for the UCD research community. We will continue the development

More information

Understanding and Supporting Intersubjective Meaning Making in Socio-Technical Systems: A Cognitive Psychology Perspective

Understanding and Supporting Intersubjective Meaning Making in Socio-Technical Systems: A Cognitive Psychology Perspective Understanding and Supporting Intersubjective Meaning Making in Socio-Technical Systems: A Cognitive Psychology Perspective Sebastian Dennerlein Institute for Psychology, University of Graz, Universitätsplatz

More information

How to bridge the gap between business, IT and networks

How to bridge the gap between business, IT and networks ericsson White paper Uen 284 23-3272 October 2015 How to bridge the gap between business, IT and networks APPLYING ENTERPRISE ARCHITECTURE PRINCIPLES TO ICT TRANSFORMATION A digital telco approach can

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

How the Emergence of OpenFlow and SDN will Change the Networking Landscape

How the Emergence of OpenFlow and SDN will Change the Networking Landscape How the Emergence of OpenFlow and SDN will Change the Networking Landscape Software-Defined Networking (SDN) powered by the OpenFlow protocol has the potential to be an important and necessary game-changer

More information

Note: The modules offered and their timing are conditional upon the availability of faculty and may be subject to change.

Note: The modules offered and their timing are conditional upon the availability of faculty and may be subject to change. Cambridge Judge Business School PhD pathway: Strategic Management (Stream A) Contents Contents... 0 Strategic Management pathway (Stream A): Course outline... 1 Coursework... 1 Research seminars... 1 Foundational

More information

CALL FOR PARTICIPATION. The 14th biennial Participatory Design Conference (PDC) PARTICIPATORY DESIGN IN AN ERA OF PARTICIPATION"

CALL FOR PARTICIPATION. The 14th biennial Participatory Design Conference (PDC) PARTICIPATORY DESIGN IN AN ERA OF PARTICIPATION CALL FOR PARTICIPATION The 14th biennial Participatory Design Conference (PDC) PARTICIPATORY DESIGN IN AN ERA OF PARTICIPATION" The Participatory Design Conference (PDC) is a premier venue for presenting

More information

AC 2010-1485: DEVELOPMENT AND IMPLEMENTATION OF A MASTERS PROGRAM IN COMPUTER INFORMATION TECHNOLOGY

AC 2010-1485: DEVELOPMENT AND IMPLEMENTATION OF A MASTERS PROGRAM IN COMPUTER INFORMATION TECHNOLOGY AC 2010-1485: DEVELOPMENT AND IMPLEMENTATION OF A MASTERS PROGRAM IN COMPUTER INFORMATION TECHNOLOGY Hetal Jasani, Northern Kentucky University Hetal Jasani is an assistant professor in the Department

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK SOFTWARE DEFINED NETWORKING A NEW ARCHETYPE PARNAL P. PAWADE 1, ANIKET A. KATHALKAR

More information

Bridging Micro and Macro Domains: Workforce Differentiation and Strategic Human Resource Management

Bridging Micro and Macro Domains: Workforce Differentiation and Strategic Human Resource Management Special Issue: Bridging Micro and Macro Domains Journal of Management Vol. 37 No. 2, March 2011 421-428 DOI: 10.1177/0149206310373400 The Author(s) 2011 Reprints and permission: http://www. sagepub.com/journalspermissions.nav

More information

Free and Effective Software Piracy Prevention

Free and Effective Software Piracy Prevention Free and Open Source Software Effective Tool to Reduce/Overcome Software Piracy Rate in Central Asia Intellectual Property Rights and Internet in Central Asia Content New Countries of New (Virtual) Silk

More information

10th International EUREDOCS Conference. Equity and Diversity in Contemporary Higher Education. Call for Proposals

10th International EUREDOCS Conference. Equity and Diversity in Contemporary Higher Education. Call for Proposals 10th International EUREDOCS Conference Equity and Diversity in Contemporary Higher Education Call for Proposals Society for Research into Higher Education London 27-28 May 2016 The 10th EUREDOCS Conference

More information

PROPOSED ACADEMIC PROGRAMS:

PROPOSED ACADEMIC PROGRAMS: PROPOSED ACADEMIC PROGRAMS: The Pre-College program, Advanced Certificate program, M.A. program, and Masters of Design Practice program are conceptualized by faculty around the principles of the mission.

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN LIBRARY AND INFORMATION MANAGEMANT (MSc[LIM])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN LIBRARY AND INFORMATION MANAGEMANT (MSc[LIM]) 268 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN LIBRARY AND INFORMATION MANAGEMANT (MSc[LIM]) (See also General Regulations) Any publication based on work approved for a higher degree should contain

More information

Information Infrastructure for Crisis Response Coordination: A Study of Local Emergency Management in Norwegian Municipalities

Information Infrastructure for Crisis Response Coordination: A Study of Local Emergency Management in Norwegian Municipalities Information Infrastructure for Crisis Response Coordination: A Study of Local Emergency Management in Norwegian Municipalities Torbjørg Meum Department of Information Systems University of Agder torbjorg.t.meum@uia.no

More information

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission

More information

Introduction: Why do we need computer networks?

Introduction: Why do we need computer networks? Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February

More information

How To Protect Your Organization From Insider Threats

How To Protect Your Organization From Insider Threats Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security FINANCIAL SERVICES EDITION #2015InsiderThreat RESEARCH BRIEF US FINANCIAL SERVICES SPOTLIGHT ABOUT

More information

Hunting for the Treasure at the End of the Rainbow: Standardizing Corporate IT Infrastructure

Hunting for the Treasure at the End of the Rainbow: Standardizing Corporate IT Infrastructure Computer Supported Cooperative Work 10: 261 292, 2001. 2001 Kluwer Academic Publishers. Printed in the Netherlands. 261 Hunting for the Treasure at the End of the Rainbow: Standardizing Corporate IT Infrastructure

More information

Submission to the Government of Canada s Digital Economy Consultation. Building a Digital Media Arts Culture for Canada

Submission to the Government of Canada s Digital Economy Consultation. Building a Digital Media Arts Culture for Canada Submission to the Government of Canada s Digital Economy Consultation Submitted by: Independent Media Arts Alliance Alliance des arts médiatiques independents (Montréal, QC) July 13, 2010 Discussion themes

More information

CONFIOUS * : Managing the Electronic Submission and Reviewing Process of Scientific Conferences

CONFIOUS * : Managing the Electronic Submission and Reviewing Process of Scientific Conferences CONFIOUS * : Managing the Electronic Submission and Reviewing Process of Scientific Conferences Manos Papagelis 1, 2, Dimitris Plexousakis 1, 2 and Panagiotis N. Nikolaou 2 1 Institute of Computer Science,

More information

Development (60 ЕCTS)

Development (60 ЕCTS) Study program Faculty Cycle Software and Application Development (60 ЕCTS) Contemporary Sciences and Technologies Postgraduate ECTS 60 Offered in Tetovo Description of the program The objectives of the

More information

CISCO SYSTEM S STRATEGIC USE OF THE INTERNET AND BUSINESS APPLICATIONS

CISCO SYSTEM S STRATEGIC USE OF THE INTERNET AND BUSINESS APPLICATIONS CISCO SYSTEM S STRATEGIC USE OF THE INTERNET AND BUSINESS APPLICATIONS Abdurrahman Celebi 1 and Raju Vijaya 2 1 Department of Computer Engineering, Epoka University, Tirana, Albania acelebi@epoka.edu.al

More information

GENI Network Virtualization Concepts

GENI Network Virtualization Concepts GENI Network Virtualization Concepts Alexander Gall 22.2.2007 EFNI Workshop, Amsterdam 2007 SWITCH The GENI initiative GENI: Global Environment for Network Innovations. Initiative planned

More information

IHTE-1800 Research methods: Case and action research. Sari Kujala, spring 2007

IHTE-1800 Research methods: Case and action research. Sari Kujala, spring 2007 IHTE-1800 Research methods: Case and action research Sari Kujala, spring 2007 Contents Introduction Case study research - What it is? When to apply? - Process - Improving the quality Action study - What

More information

FOCUS ON IT-ENABLED CHANGE ST. GALLEN S MASTER OF BUSINESS ENGINEERING PROGRAM

FOCUS ON IT-ENABLED CHANGE ST. GALLEN S MASTER OF BUSINESS ENGINEERING PROGRAM FOCUS ON IT-ENABLED CHANGE ST. GALLEN S MASTER OF BUSINESS ENGINEERING PROGRAM Robert Winter Institute of Information Management and Master of Business Engineering Program, University of St. Gallen Mail:

More information

How to make impact with journal publications on Software Process Improvement

How to make impact with journal publications on Software Process Improvement How to make impact with journal publications on Software Process Improvement! Profes Doctoral Consortium, 10 December 2014! Torgeir Dingsøyr Senior scientist, SINTEF Adjunct professor, Norwegian University

More information

Multi-Platform Distribution

Multi-Platform Distribution www.avid.com Audiences expect content to be available when and wherever they want it. In effect, they are engaging with and personalizing the content in a way that is unique and makes most sense to them.

More information

Enhancing the Sales Function through the Effective Adoption of CRM Applications: Lessons Learned and Future Research Directions

Enhancing the Sales Function through the Effective Adoption of CRM Applications: Lessons Learned and Future Research Directions Enhancing the Sales Function through the Effective Adoption of CRM Applications: Lessons Learned and Future Research Directions Adam Vrechopoulos Lecturer & Scientific Coordinator ELTRUN-IMES (Interactive

More information

KPIs to Manage Innovation Processes in VEEs Initial Thoughts and Results

KPIs to Manage Innovation Processes in VEEs Initial Thoughts and Results KPIs to Manage Innovation Processes in VEEs Initial Thoughts and Results Benjamin Knoke, Jens Eschenbaecher BIBA - Bremer Institut für Produktion und Logistik GmbH, Bremen, Germany {kno, esc}@biba.uni.bremen.de

More information

and responding to the concerns of their constituents and of the general public in order to take advantage of new opportunities and to anticipate and

and responding to the concerns of their constituents and of the general public in order to take advantage of new opportunities and to anticipate and introduction For more than a century the business corporation has been a successful and widely adopted institutional arrangement for creating and distributing wealth. But the power and purpose of corporations

More information

Starting up COST 290 "Wi-QoST: Traffic and QoS Management in Wireless Multimedia Networks"

Starting up COST 290 Wi-QoST: Traffic and QoS Management in Wireless Multimedia Networks Starting up COST 290 "Wi-QoST: Traffic and QoS Management in Wireless Multimedia Networks" Koucheryavy Yevgeni, PhD Tampere University of Technology Finland Outline COST 290 Action Motivation, Technical

More information

Cloud security architecture

Cloud security architecture ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide

More information

Net Neutrality and the Open Internet: The Consumer Perspective

Net Neutrality and the Open Internet: The Consumer Perspective Presentation Net Neutrality and the Open Internet: The Consumer Perspective UK market and regulatory context 7 th October 2010 Net Neutrality and Traffic Management Net neutrality is about whether and

More information

Constellation Technology Overview

Constellation Technology Overview Constellation Technology Overview October, 2014 William Simmons Cloud EcoSystems Specialist A Unique Set of Network Assets Over 30,000 local and regional fiber route miles across 80 markets Nearly 21,000

More information

Entrepreneurial Marketing in Small Software Technology Firms: Use of Networks and Relationships

Entrepreneurial Marketing in Small Software Technology Firms: Use of Networks and Relationships Entrepreneurial Marketing in Small Software Technology Firms: Use of Networks and Relationships Keywords marketing, entrepreneurship, networks, relationships, technology, SMEs. Introduction This paper

More information