A software system is described that uses the agent concept in the Cell Control layer. Important design goals are: the system continues as good as possible after a process crash, crashed processes are recreated whenever possible, and equivalent workstations are allocated dynamically. This project is carried out mainly to investigate whether the agent concept is applicable in such a situation. The system is not operational yet, but will be built in the period ahead. In addition, a graphic simulator for a small manufacturing system will be built for testing the agent structure.
DOCUMENT
De digitale revolutie voltrekt zich in hoog tempo. Naar verwachting zullen er in 2020 meer dan 20 miljard laptops, mobiele telefoons en tablets met elkaar verbonden zijn tot een gigantisch wereldwijd netwerk. Spoedig zullen we voortdurend en overal verbonden zijn met internet. De virtuele ruimte die ontstaat uit de complexe interactie van mensen, technologie, software, en dienstverlening over het internet wordt steeds vaker cyberspace genoemd
DOCUMENT
‘Bedrijfsprocessen uit de cloud, business rules als succesfactor’ is een publicatie van het Platform Outsourcing Nederland en is het verslag van een onderzoek van de Hogeschool Utrecht, Lectoraat Extended Enterprise Studies, die tot stand is gekomen met een subsidie van het PON (Platform Outsourcing Nederland).
MULTIFILE
The full potential of predictive maintenance has not yet been utilised. Current solutions focus on individual steps of the predictive maintenance cycle and only work for very specific settings. The overarching challenge of predictive maintenance is to leverage these individual building blocks to obtain a framework that supports optimal maintenance and asset management. The PrimaVera project has identified four obstacles to tackle in order to utilise predictive maintenance at its full potential: lack of orchestration and automation of the predictive maintenance workflow, inaccurate or incomplete data and the role of human and organisational factors in data-driven decision support tools. Furthermore, an intuitive generic applicable predictive maintenance process model is presented in this paper to provide a structured way of deploying predictive maintenance solutions https://doi.org/10.3390/app10238348 LinkedIn: https://www.linkedin.com/in/john-bolte-0856134/
DOCUMENT
Organisaties die belang hechten aan hun informatie moeten ervoor zorgen dat de informatiebeveiliging goed is geregeld. Als de informatiebeveiligingsprocessen niet voldoende zijn ingericht en er geen duidelijke afspraken en verantwoordelijkheden worden vastgelegd, is de kans aanwezig dat een incident (te) laat wordt gesignaleerd. Via een volwassenheidsmeting wordt inzicht verkregen op welk niveau de informatiebeveiliging is georganiseerd.
DOCUMENT
Computer security incident response teams (CSIRTs) respond to a computer security incident when the need arises. Failure of these teams can have far-reaching effects for the economy and national security. CSIRTs often have to work on an ad hoc basis, in close cooperation with other teams, and in time constrained environments. It could be argued that under these working conditions CSIRTs would be likely to encounter problems. A needs assessment was done to see to which extent this argument holds true. We constructed an incident response needs model to assist in identifying areas that require improvement. We envisioned a model consisting of four assessment categories: Organization, Team, Individual and Instrumental. Central to this is the idea that both problems and needs can have an organizational, team, individual, or technical origin or a combination of these levels. To gather data we conducted a literature review. This resulted in a comprehensive list of challenges and needs that could hinder or improve, respectively, the performance of CSIRTs. Then, semi-structured in depth interviews were held with team coordinators and team members of five public and private sector Dutch CSIRTs to ground these findings in practice and to identify gaps between current and desired incident handling practices. This paper presents the findings of our needs assessment and ends with a discussion of potential solutions to problems with performance in incident response. https://doi.org/10.3389/fpsyg.2017.02179 LinkedIn: https://www.linkedin.com/in/rickvanderkleij1/
MULTIFILE
IT organizations and CEO‟s are, and should be, concerned these days about the (lack of) data confidentiality and the usage of „shadow‟ IT systems by employees. Not only does the company risk monetary loss or public embarrassment, the senior management might also risk personal fines or even imprisonment. Several trends reinforce the attention for these subjects, including the fact that an increasing number of people perform parts of their work tasks from home (RSA, 2007) and the increasing bandwidth available to internet users which makes them rely on the Internet for satisfying their business and personal computing needs (Desisto et al. 2008). Employee compliance with the existing IT security policies is therefore essential. This paper presents a study on factors that influence non-compliance behavior of employees in organizations. The factors found in literature are tested in a survey study amongst employees of a big-four accountancy firm in the Netherlands and Belgium. The study concludes that stricter IT governance and cultural aspects are the most important factors influencing non-compliance behavior.
DOCUMENT
Pauses in speech may be categorized on the basis of their length. Some authors claim that there are two categories (short and long pauses) (Baken & Orlikoff, 2000), others claim that there are three (Campione & Véronis, 2002), or even more. Pause lengths may be affected in speakers with aphasia. Individuals with dementia probably caused by Alzheimer’s disease (AD) or Parkinson’s disease (PD) interrupt speech longer and more frequently. One infrequent form of dementia, non-fluent primary progressive aphasia (PPA-NF), is even defined as causing speech with an unusual interruption pattern (”hesitant and labored speech”). Although human listeners can often easily distinguish pathological speech from healthy speech, it is unclear yet how software can detect the relevant patterns. The research question in this study is: how can software measure the statistical parameters that characterize the disfluent speech of PPA-NF/AD/PD patients in connected conversational speech?
DOCUMENT
Dit artikel beschrijft een onderzoek waarbij gekeken is naar mogelijkheden die Business Rules Management-concepten bieden bij het aanbieden van bedrijfsprocessen as a service via een cloud-dienst. BRM helpt bedrijven door het gestructureerd vastleggen van organisatorische keuzes en regels waaraan organisaties moeten voldoen. http://intelligence.agconnect.nl/content/dynamisch-cloudsourcen-van-bedrijfsprocessen
DOCUMENT
This technical report describes "validation of the 'Target system definition"
DOCUMENT