WorldWideScience

Sample records for technology vendor information

  1. Health information technology vendor selection strategies and total factor productivity.

    Science.gov (United States)

    Ford, Eric W; Huerta, Timothy R; Menachemi, Nir; Thompson, Mark A; Yu, Feliciano

    2013-01-01

    The aim of this study was to compare health information technology (HIT) adoption strategies' relative performance on hospital-level productivity measures. The American Hospital Association's Annual Survey and Healthcare Information and Management Systems Society Analytics for fiscal years 2002 through 2007 were used for this study. A two-stage approach is employed. First, a Malmquist model is specified to calculate hospital-level productivity measures. A logistic regression model is then estimated to compare the three HIT adoption strategies' relative performance on the newly constructed productivity measures. The HIT vendor selection strategy impacts the amount of technological change required of an organization but does not appear to have either a positive or adverse impact on technical efficiency or total factor productivity. The higher levels in technological change experienced by hospitals using the best of breed and best of suite HIT vendor selection strategies may have a more direct impact on the organization early on in the process. However, these gains did not appear to translate into either increased technical efficiency or total factor productivity during the period studied. Over a longer period, one HIT vendor selection strategy may yet prove to be more effective at improving efficiency and productivity.

  2. A Database for Reviewing and Selecting Radioactive Waste Treatment Technologies and Vendors

    International Nuclear Information System (INIS)

    P. C. Marushia; W. E. Schwinkendorf

    1999-01-01

    Several attempts have been made in past years to collate and present waste management technologies and solutions to waste generators. These efforts have been manifested as reports, buyers' guides, and databases. While this information is helpful at the time it is assembled, the principal weakness is maintaining the timeliness and accuracy of the information over time. In many cases, updates have to be published or developed as soon as the product is disseminated. The recently developed National Low-Level Waste Management Program's Technologies Database is a vendor-updated Internet based database designed to overcome this problem. The National Low-Level Waste Management Program's Technologies Database contains information about waste types, treatment technologies, and vendor information. Information is presented about waste types, typical treatments, and the vendors who provide those treatment methods. The vendors who provide services update their own contact information, their treatment processes, and the types of wastes for which their treatment process is applicable. This information is queriable by a generator of low-level or mixed low-level radioactive waste who is seeking information on waste treatment methods and the vendors who provide them. Timeliness of the information in the database is assured using time clocks and automated messaging to remind featured vendors to keep their information current. Failure to keep the entries current results in a vendor being warned and then ultimately dropped from the database. This assures that the user is dealing with the most current information available and the vendors who are active in reaching and serving their market

  3. Hanford Tank Farm Vapors Abatement Technology and Vendor Proposals Assessment

    International Nuclear Information System (INIS)

    Burns, H. H.; Farrar, M. E.; Fink, S. D.

    2016-01-01

    Suspected chemical vapor releases from the Hanford nuclear waste tank system pose concerns for worker exposure. Washington River Protection Solutions (WRPS) contracted the Savannah River National Laboratory (SRNL) to explore abatement technologies and strategies to remediate the vapors emitted through the ventilation system. In response, SRNL conducted an evaluation of technologies to abate, or reduce, vapor emissions to below 10% of the recognized occupational exposure limits (OELs). The evaluation included a review of published literature and a broadly communicated Request for Information to commercial vendors through a Federal Business Opportunities (Fed Biz Opps) web posting. In addition, SRNL conducted a workshop and post-workshop conference calls with interested suppliers (vendors) to assess proposals of relevant technologies. This report reviews applicable technologies and summarizes the approaches proposed by the vendors who participated in the workshop and teleconference interviews. In addition, the report evaluates the estimated performance of the individual technologies for the various classes of chemical compounds present in the Hanford Chemicals of Potential Concern (COPCs) list. Similarly, the report provides a relative evaluation of the vendor proposed approaches against criteria of: technical feasibility (and maturity), design features, operational considerations, secondary waste generation, safety/regulatory, and cost / schedule. These rough order-of-magnitude (ROM) cost estimates are intended to provide a comparison basis between technologies and are not intended to be actual project estimates.

  4. Hanford Tank Farm Vapors Abatement Technology and Vendor Proposals Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Burns, H. H. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Farrar, M. E. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Fink, S. D. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2016-09-20

    Suspected chemical vapor releases from the Hanford nuclear waste tank system pose concerns for worker exposure. Washington River Protection Solutions (WRPS) contracted the Savannah River National Laboratory (SRNL) to explore abatement technologies and strategies to remediate the vapors emitted through the ventilation system. In response, SRNL conducted an evaluation of technologies to abate, or reduce, vapor emissions to below 10% of the recognized occupational exposure limits (OELs). The evaluation included a review of published literature and a broadly communicated Request for Information to commercial vendors through a Federal Business Opportunities (Fed Biz Opps) web posting. In addition, SRNL conducted a workshop and post-workshop conference calls with interested suppliers (vendors) to assess proposals of relevant technologies. This report reviews applicable technologies and summarizes the approaches proposed by the vendors who participated in the workshop and teleconference interviews. In addition, the report evaluates the estimated performance of the individual technologies for the various classes of chemical compounds present in the Hanford Chemicals of Potential Concern (COPCs) list. Similarly, the report provides a relative evaluation of the vendor proposed approaches against criteria of: technical feasibility (and maturity), design features, operational considerations, secondary waste generation, safety/regulatory, and cost / schedule. These rough order-of-magnitude (ROM) cost estimates are intended to provide a comparison basis between technologies and are not intended to be actual project estimates.

  5. Vendor Furnished Information (VFI); National Marine Standard VFI Guidelines

    Science.gov (United States)

    1999-02-28

    vendors have global marketing perspectives and are continuously monitoring and applying innovations in technology. They propose new opportunities from the...strategic impact on shipbuilding programs. These vendors have global marketing perspectives and are continuously monitoring and applying innovations in

  6. 77 FR 6579 - Vendor Outreach Workshop for Small Information Technology (IT) Businesses in the National Capitol...

    Science.gov (United States)

    2012-02-08

    ... Technology (IT) Businesses in the National Capitol Region of the United States AGENCY: Office of the Secretary, Interior. ACTION: Notice. SUMMARY: The Office of Small and Disadvantaged Business Utilization of the Department of the Interior is hosting a Vendor Outreach Workshop for small IT businesses in the...

  7. Impact of information technology on vendor objectives, capabilities, and competences in contract electronic manufacturing

    DEFF Research Database (Denmark)

    Perunovic, Zoran; Mefford, Robert; Christoffersen, Mads

    2012-01-01

    IT impacts vendor capabilities. The research framework integrates four concepts/theories: the resource-based view (RBV), the concept of manufacturing strategy, the concept of business performance, and the concept of IT impact on business performance. Two case companies are studied, one with a high level...... proposed. The method gives valuable insights into how IT enables competences, enhances capabilities, and contributes to the fulfillment of vendor objectives. A model of how IT affects a vendor's competitiveness is proposed. In addition, two initiatives for optimizing the utilization of IT are suggested....

  8. Library/vendor relationships

    CERN Document Server

    Brooks, Sam

    2014-01-01

    A view of the mutual dependence between libraries and vendorsAs technology advances, libraries are forced to reach beyond their own resources to find effective ways to maintain accuracy and superior service levels. Vendors provide databases and integrated library systems that perform those functions for profit. Library/Vendor Relationships examines the increasing cooperation in which libraries find they must participate in, and vice versa, with the vendors that provide system infrastructure and software. Expert contributors provide insights from all sides of this unique collaboration, offering

  9. Scaling of an information system in a public healthcare market--infrastructuring from the vendor's perspective.

    Science.gov (United States)

    Johannessen, Liv Karen; Obstfelder, Aud; Lotherington, Ann Therese

    2013-05-01

    The purpose of this paper is to explore the making and scaling of information infrastructures, as well as how the conditions for scaling a component may change for the vendor. The first research question is how the making and scaling of a healthcare information infrastructure can be done and by whom. The second question is what scope for manoeuvre there might be for vendors aiming to expand their market. This case study is based on an interpretive approach, whereby data is gathered through participant observation and semi-structured interviews. A case study of the making and scaling of an electronic system for general practitioners ordering laboratory services from hospitals is described as comprising two distinct phases. The first may be characterized as an evolving phase, when development, integration and implementation were achieved in small steps, and the vendor, together with end users, had considerable freedom to create the solution according to the users' needs. The second phase was characterized by a large-scale procurement process over which regional healthcare authorities exercised much more control and the needs of groups other than the end users influenced the design. The making and scaling of healthcare information infrastructures is not simply a process of evolution, in which the end users use and change the technology. It also consists of large steps, during which different actors, including vendors and healthcare authorities, may make substantial contributions. This process requires work, negotiation and strategies. The conditions for the vendor may change dramatically, from considerable freedom and close relationships with users and customers in the small-scale development, to losing control of the product and being required to engage in more formal relations with customers in the wider public healthcare market. Onerous procurement processes may be one of the reasons why large-scale implementation of information projects in healthcare is difficult

  10. Skills development in the informal sector in India: The case of street food vendors

    Science.gov (United States)

    Pilz, Matthias; Uma, Gengaiah; Venkatram, Rengan

    2015-04-01

    The informal sector dominates India's economic life, so issues of skills development are particularly important. On the basis of a survey of 49 street food vendors in the Indian cities of New Delhi and Coimbatore, the authors of this article demonstrate that informal learning is a particularly significant form of vocational education and training. Vendors do not acquire skills in formal vocational education and training (VET) settings; for them, opportunities for learning on the job in family businesses or in informal employment are especially important. Unlike other studies, the authors' findings show that street food vendors have a wide range of specialist knowledge, skills and expertise required to conduct their business which they deploy profitably. These skills are not confined to preparing and selling food but also extend to areas such as price setting and marketing. All the street food vendors interviewed identified strongly with their occupation and expressed pride in it. Around half voiced a wish for further training. In this context, the authors suggest promoting non-formal learning settings geared explicitly to street food vendors' difficult working conditions. In line with a few other international innovative schemes, they term this a "non-formal apprenticeship" approach.

  11. 48 CFR 804.1102 - Vendor Information Pages (VIP) Database.

    Science.gov (United States)

    2010-10-01

    ... (VIP) Database. 804.1102 Section 804.1102 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL ADMINISTRATIVE MATTERS Contract Execution 804.1102 Vendor Information Pages (VIP) Database. Prior to January 1, 2012, all VOSBs and SDVOSBs must be listed in the VIP database, available at http...

  12. Allegheny County Tobacco Vendors

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — The tobacco vendor information provides the location of all tobacco vendors in Allegheny County in 2015. Data was compiled from administrative records managed by...

  13. Costs and Benefits of Vendor Sponsored Learning Materials in Information Technology Education

    Science.gov (United States)

    Hua, David M.

    2013-01-01

    The demand for qualified information technology professionals remains high despite downturns in the economy. It is imperative to provide students with a curriculum that provides a broad foundation in information technology knowledge, skills, and abilities. Students also need access to specialized technologies and learning materials to develop the…

  14. Management information systems and the role of the nurse vendor.

    Science.gov (United States)

    Lenkman, S

    1985-09-01

    Nurse vendors have the ability and motivation to respond to market imperatives faster than most health care institutions. Vendors can contribute important knowledge to nursing literature about the consultant-expert vendor-client relationship and the expectations of both.

  15. The relationship between hospital and ehr vendor market dynamics on health information organization presence and participation.

    Science.gov (United States)

    Lin, Sunny C; Adler-Milstein, Julia

    2018-05-08

    Health Information Organizations (HIOs) are third party organizations that facilitate electronic health information exchange (HIE) between providers in a geographic area. Despite benefits from HIE, HIOs have struggled to form and subsequently gain broad provider participation. We sought to assess whether market-level hospital and EHR vendor dynamics are associated with presence and level of hospital participation in HIOs. 2014 data on 4523 hospitals and their EHR vendors were aggregated to the market level. We used multivariate OLS regression to analyze the relationship between hospital and vendor dynamics and (1) probability of HIO presence and (2) percent of hospitals participating in an HIO. 298 of 469 markets (64%) had HIO presence, and in those markets, 47% of hospitals participated in an HIO on average. In multivariate analysis, four characteristics were associated with HIO presence. Markets with more hospitals, markets with more EHR vendors, and markets with an EHR vendor-led HIE approach were more likely to have an HIO. Compared to markets with low hospital competition, markets with high hospital competition had a 25 percentage point lower probability of HIO presence. Two characteristics were associated with level of hospital HIO participation. Markets with more hospitals as well as markets with high vendor competition (compared to low competition) had lower participation. Both hospital and EHR vendor dynamics are associated with whether a market has an HIO as well as the level of hospital participation in HIOs.

  16. POLICY EVALUATION OF RESTRUCTURING STREET VENDORS IN SURAKARTA CITY (Study of Street Vendors in Monument Park Banjarsari and Street Vendors in Manahan Stadium

    Directory of Open Access Journals (Sweden)

    Frahlevi Prajasari

    2015-08-01

    Full Text Available This study examined the policy evaluation of restructuring street vendors in Surakarta city. Street vendors represent the economic actors in the informal sector of urban economic activity. The government of City/District usually removes these street vendors by disguising this activity behind the reason of structuring, . The study used descriptive research with a qualitative approach. The relocation of street vendors in Surakarta City is orderly and smooth without violence which may impact badly on physic and material because the government of Surakarta City, especially Surakarta Mayor, uses persuasive approach. Notoharjo Market is a relocation place for street vendors at Banjarsari Monument Park. In the beginning, Notoharjo Market is crowded with buyers but current days, street vendors who occupy Notoharjo Market complain about lack of buyers. The lack of buyers at Notoharjo Market is because the facilities previously provided by the government of Surakarta City are not well maintained. The government of Surakarta City must listening all complains of street vendors for the smoothness and orderliness of trading activity of street vendors. Not only listening, but the government of Surakarta City also gives appropriate and best solution to street vendors such that street vendors feel comfort in selling and their income is better than before.

  17. Y2K - an oil and gas software vendor's perspective

    International Nuclear Information System (INIS)

    Stewart, L.D.

    1998-01-01

    Oil and gas companies have begun to deal with third party software vendors to increase their efficiency and to concentrate on their core business. When it comes to dealing with year 2000 (Y2K) problems, information technology (IT) departments will have to deal with complex heterogeneous systems and long lists of independent software vendors and suppliers. This paper highlighted some of the unique issues that should be considered when testing any heterogeneous oil and gas system for Y2K. Most petroleum companies and vendors have established Y2K compliance teams with plans involving three major phases: (1) testing and identification of problems, (2) correction and avoidance of problems, and (3) preparation for recovery from unidentified problems

  18. What Vendors Wished You Knew

    Science.gov (United States)

    Weinstein, Margery

    2010-01-01

    The vendor-learning professional relationship is a delicate one. In the rush to scour the marketplace for the best products and services for learners, and secure a deal favorable to one's company, the learning vendor can be one of the greatest allies. Among the first steps to making a satisfying learning technology purchase is ensuring one's…

  19. Vendor-managed inventory

    DEFF Research Database (Denmark)

    Govindan, Kannan

    2013-01-01

    Vendor-managed inventory (VMI) represents the methodology through which the upstream stage of a supply chain (vendor) takes responsibility for managing the inventories at the downstream stage (customer) based on previously agreed limits. VMI is another method by which supply chains can be managed...... review, we have identified six dimensions of VMI: namely, inventory, transportation, manufacturing, general benefits, coordination/collaboration, and information sharing. In addition, there are, three methodological classifications: modelling, simulation, and case studies. Finally, we will consider...

  20. IPAD: A computer vendor's perspective

    Science.gov (United States)

    Feldman, H. D.

    1980-01-01

    The current IPAD technology and the state-of-the-art in computer technology are compared from the point of view of a computer vendor. Issues of engineering data management, distributed architectures, and user interfaces are covered.

  1. Making the Wild Wind Visible: Information Technology in a Brave New World.

    Science.gov (United States)

    Dillon, Dennis

    1999-01-01

    Examines present trends as well as the past history of information technology as it affects libraries. Topics include library vision and the need for a redefinition of their role as information middlemen between vendors and consumers; effects of the World Wide Web; and electronic information. (LRW)

  2. Using Object Storage Technology vs Vendor Neutral Archives for an Image Data Repository Infrastructure.

    Science.gov (United States)

    Bialecki, Brian; Park, James; Tilkin, Mike

    2016-08-01

    The intent of this project was to use object storage and its database, which has the ability to add custom extensible metadata to an imaging object being stored within the system, to harness the power of its search capabilities, and to close the technology gap that healthcare faces. This creates a non-disruptive tool that can be used natively by both legacy systems and the healthcare systems of today which leverage more advanced storage technologies. The base infrastructure can be populated alongside current workflows without any interruption to the delivery of services. In certain use cases, this technology can be seen as a true alternative to the VNA (Vendor Neutral Archive) systems implemented by healthcare today. The scalability, security, and ability to process complex objects makes this more than just storage for image data and a commodity to be consumed by PACS (Picture Archiving and Communication System) and workstations. Object storage is a smart technology that can be leveraged to create vendor independence, standards compliance, and a data repository that can be mined for truly relevant content by adding additional context to search capabilities. This functionality can lead to efficiencies in workflow and a wealth of minable data to improve outcomes into the future.

  3. Licensee contractor and vendor and vendor inspection status report. Quarterly report, July 1995--September 1995

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-12-01

    This periodical covers the results of inspections performed by the NRC`s Special Inspection Branch, Vendor Inspection Section, that have been distributed to the inspected organizations during the period from July 1995 through September 1995. Vendors inspected include: (1) Continental Disc Corporation, (2) Divesco, (3) Eaton, (4) General Electric Nuclear Energy, (5) ITT Barton, (6) Liberty Technologies, (7) Mid-South Nuclear, (8) Power Distribution Services, (9) Rosemount, (10) Target-Rock, and (11) Westinghouse Electric.

  4. Licensee contractor and vendor and vendor inspection status report. Quarterly report, July 1995--September 1995

    International Nuclear Information System (INIS)

    1995-12-01

    This periodical covers the results of inspections performed by the NRC's Special Inspection Branch, Vendor Inspection Section, that have been distributed to the inspected organizations during the period from July 1995 through September 1995. Vendors inspected include: (1) Continental Disc Corporation, (2) Divesco, (3) Eaton, (4) General Electric Nuclear Energy, (5) ITT Barton, (6) Liberty Technologies, (7) Mid-South Nuclear, (8) Power Distribution Services, (9) Rosemount, (10) Target-Rock, and (11) Westinghouse Electric

  5. Vendor Managed Consignment Inventory (Vmci) Model For Single Vendor Multi Retailers Under Probabilistic

    OpenAIRE

    Rosyida, Erly Ekayanti; Pujawan, I Nyoman; Kurniati, Nani

    2015-01-01

    Vendor managed consignment inventory (VMCI) adalah suatu strategi kolaborasi yang terjalin diantara pihak-pihak yang terkait dalam supply chain, dimana vendor sebagai supplier mempunyai wewenang untuk memutuskan order quantity yang harus dikirimkan ke buyernya serta menjadi pemilik barang tersebut sampai barang tersebut terjual atau dipakai. Integrasi pada sistem supply chain ini terjadi karena adanya information sharing dan business process reengineering. Pada penelitian ini akan dilakukan a...

  6. A case on vendor selection methodology: An integrated approach

    Directory of Open Access Journals (Sweden)

    Nikhil C. Shil

    2009-11-01

    Full Text Available Vendor selection methodology is a highly researched area in supply chain management l terature and a very significant decision taken by supply chain managers due to technological advances in the manufacturing process. Such research has two basic dimensions: one is related to the identification of variables affecting the performance of the vendors and the other deals with the methodology to be applied. Most of the research conducted in this area deal with the upfront selection of vendors. However, it is very common to have a list of dedicated vendors due to the development of sophisticated production technologies like just in time (JIT, a lean or agile manufacturing process where continuous flow of materials is a requirement. This paper addresses the issue of selecting the optimal vendor from the internal database of a company. Factor analysis, analytical hierarchy process and regression analysis is used in an integrated way to supplement the vendor selection process. The methodology presented here is simply a proposal where every possible room for adjustment is available.

  7. Licensee contractor and vendor inspection status report

    International Nuclear Information System (INIS)

    1994-04-01

    This periodical covers the results of inspections performed by the NRC's Vendor Inspection Branch that have been distributed to the inspected organizations during the period form January 1994 through March 1994. A list of selected bulletins and information notices involving vendor issues and copies of pertinent correspondence involving vendor issues are also included in this periodical

  8. Involving vendors in continuous quality improvement efforts.

    Science.gov (United States)

    McDevitt, M C

    1995-03-01

    In the hospital environment, vendors supply a wide range of items, from surgical sutures to the latest in high-cost technological equipment. Also, many clinical and support services, such as respiratory therapy, transcription, and computer databanks are now outsourced to commercial vendors. Interaction with such vendors is often less than satisfactory, with prolonged timelines and disruption of an important process that is being computerized. Although hospitals deal with very few vendors in long-term relationships, such as those seen in manufacturing, this should not preclude the formation of a supplier-customer relationship that goes beyond management's interaction with the sales representative in response to a request for proposal. This is especially true when a process improvement team has studied an internal process and defined a key quality characteristic.

  9. Patent medicine vendors are major providers antimalaria treatment

    African Journals Online (AJOL)

    management of malaria by this informal sector of healthcare delivery is however ... Methods: Fifty-five patent medicine vendors selected through a multistage sampling ... training of the patent medicine vendors, the overall appropriate treatment ...

  10. Site Specific Vendor's License

    Data.gov (United States)

    Montgomery County of Maryland — This dataset contains information of a site-specific vendor's license which is required if an individual sells or offers to sell goods or services from a stationary...

  11. A weighted possibilistic programming approach for sustainable vendor selection and order allocation in fuzzy environment

    DEFF Research Database (Denmark)

    Gupta, Pankaj; Govindan, Kannan; Mehlawat, Mukesh Kumar

    2016-01-01

    This paper focused on the analysis of imprecise information in terms of many critical parameters for a multi-objective multi-item vendor selection-order allocation problem with price-breaks. We used both quantitative and qualitative criteria taking into account the economic, technological, social...

  12. Health information technology workforce needs of rural primary care practices.

    Science.gov (United States)

    Skillman, Susan M; Andrilla, C Holly A; Patterson, Davis G; Fenton, Susan H; Ostergard, Stefanie J

    2015-01-01

    This study assessed electronic health record (EHR) and health information technology (HIT) workforce resources needed by rural primary care practices, and their workforce-related barriers to implementing and using EHRs and HIT. Rural primary care practices (1,772) in 13 states (34.2% response) were surveyed in 2012 using mailed and Web-based questionnaires. EHRs or HIT were used by 70% of respondents. Among practices using or intending to use the technology, most did not plan to hire new employees to obtain EHR/HIT skills and even fewer planned to hire consultants or vendors to fill gaps. Many practices had staff with some basic/entry, intermediate and/or advanced-level skills, but nearly two-thirds (61.4%) needed more staff training. Affordable access to vendors/consultants who understand their needs and availability of community college and baccalaureate-level training were the workforce-related barriers cited by the highest percentages of respondents. Accessing the Web/Internet challenged nearly a quarter of practices in isolated rural areas, and nearly a fifth in small rural areas. Finding relevant vendors/consultants and qualified staff were greater barriers in small and isolated rural areas than in large rural areas. Rural primary care practices mainly will rely on existing staff for continued implementation and use of EHR/HIT systems. Infrastructure and workforce-related barriers remain and must be overcome before practices can fully manage patient populations and exchange patient information among care system partners. Efforts to monitor adoption of these skills and ongoing support for continuing education will likely benefit rural populations. © 2014 National Rural Health Association.

  13. Cross-vendor quality monitoring in a multi-vendor Internet of Things

    NARCIS (Netherlands)

    Holtman, K.J.G.

    2015-01-01

    This note discusses several problems and solutions in quality monitoring of Internet of Things, when multiple products (devices, apps,) from different vendors interact with each other. It presents a cross-vendor quality monitoring system, which helps each individual vendor discover problems and

  14. Health information technology needs help from primary care researchers.

    Science.gov (United States)

    Krist, Alex H; Green, Lee A; Phillips, Robert L; Beasley, John W; DeVoe, Jennifer E; Klinkman, Michael S; Hughes, John; Puro, Jon; Fox, Chester H; Burdick, Tim

    2015-01-01

    While health information technology (HIT) efforts are beginning to yield measurable clinical benefits, more is needed to meet the needs of patients and clinicians. Primary care researchers are uniquely positioned to inform the evidence-based design and use of technology. Research strategies to ensure success include engaging patient and clinician stakeholders, working with existing practice-based research networks, and using established methods from other fields such as human factors engineering and implementation science. Policies are needed to help support primary care researchers in evaluating and implementing HIT into everyday practice, including expanded research funding, strengthened partnerships with vendors, open access to information systems, and support for the Primary Care Extension Program. Through these efforts, the goal of improved outcomes through HIT can be achieved. © Copyright 2015 by the American Board of Family Medicine.

  15. Technology, Incentives, or Both? Factors Related to Level of Hospital Health Information Exchange.

    Science.gov (United States)

    Lin, Sunny C; Everson, Jordan; Adler-Milstein, Julia

    2018-02-28

    To assess whether the level of health information exchange (HIE) in U.S. hospitals is related to technology capabilities, incentives to exchange, or both. A total of 1,812 hospitals attesting to stage 2 of Medicare's Meaningful Use Incentive Program through April 2016. Hospital-level, multivariate OLS regression with state fixed effects was used to analyze the relationship between technology capability and incentives measures, and percent of care transitions with summary of care records (SCRs) sent electronically to subsequent providers. Stage 2 hospitals reported sending SCRs electronically for an average of 41 percent (median = 33 percent) of transitions. HIE level is related to four capability measures, one incentive measure, and one measure that is related to both capability and incentive. Percent of transitions with SCRs sent electronically was 3 percentage points higher (95 percent CI: 0.1-5.1) for hospitals with a third-party HIE vendor, 3 percentage points higher (95 percent CI: 0.5-5.4) for hospitals with an EHR vendor as their HIE vendor, and 3 percentage points higher (95 percent CI: 0.4-5.4) for hospitals that automatically alert primary care providers. The direction and statistical significance of the relationships between specific EHR vendor and electronic SCR transmission level varied by vendor. Nonprofits and government hospitals performed 5 percentage points higher (95 percent CI: 1.5-9.1) and 8 percentage points higher (95 percent CI: 3.4-12.3) than for-profits. Hospitals in systems performed 3 percentage points higher (95 percent CI: 0.8-6.1). The overall level of HIE is low, with hospitals sending an SCR electronically for less than half of patient transitions. Specific hospital characteristics related to both technology capabilities and incentives were associated with higher levels of HIE. © Health Research and Educational Trust.

  16. Management of Enterprise Information Systems: call for a new technology landscape framework

    DEFF Research Database (Denmark)

    Møller, Charles

    2007-01-01

    Standardised Enterprise Information Systems (EIS) are increasingly setting the agenda and the pace for the development of many organisations. Organisations are required not only to establish effective business processes but also to accommodate for changing business conditions. The vendors...... important, EIS research needs to refocus on the EIS technology landscape and embrace this new challenge....

  17. Environmental factors and health information technology management strategy.

    Science.gov (United States)

    Menachemi, Nir; Shin, Dong Yeong; Ford, Eric W; Yu, Feliciano

    2011-01-01

    : Previous studies have provided theoretical and empirical evidence that environmental forces influence hospital strategy. : Rooted in resource dependence theory and the information uncertainty perspective, this study examined the relationship between environmental market characteristics and hospitals' selection of a health information technology (HIT) management strategy. : A cross-sectional design is used to analyze secondary data from the American Hospital Association Annual Survey, the Healthcare Information and Management Systems Society Analytics Database, and the Area Resource File. Univariate and multinomial logistic regression analyses are used. : Overall, 3,221 hospitals were studied, of which 60.9% pursed a single-vendor HIT management strategy, 28.9% pursued a best-of-suite strategy, and 10.2% used a best-of-breed strategy. Multivariate analyses controlling for hospital characteristics found that measures of environmental factors representing munificence, dynamism, and/or complexity were systematically associated with various hospital HIT management strategy use. Specifically, the number of generalist physicians per capita was positively associated with the single-vendor strategy (B = -5.64, p = .10). Hospitals in urban markets were more likely to pursue the best-of-suite strategy (B = 0.622, p < .001). Dynamism, measured as the number of managed care contracts for a given hospital, was negatively associated with the single-vendor strategy (B = 0.004, p = .049). Lastly, complexity, measured as market competition, was positively associated with the best-of-breed strategy (B = 0.623, p = .042). : By and large, environmental factors are associated with hospital HIT management strategies in mostly theoretically supported ways. Hospital leaders and policy makers interested in influencing the adoption of hospital HIT should consider how market conditions influence HIT management decisions as part of programs to promote meaningful use.

  18. Quality indicators in a computerized technology information system

    International Nuclear Information System (INIS)

    Mancuso, C.A.; Hyde, R.A.

    1992-01-01

    An environmental technology information system was developed by EG ampersand G Idaho, Inc. at the Idaho National Engineering Laboratory (INEL) for the Department of Energy (DOE). The purpose of the system is to reduce costs and time associated with evaluating potential remedial alternatives for a waste site. The information system is organized to aid in the CERCLA process by describing the implementability, effectiveness, and cost of many remedial technologies. Technology categories included in the information system include: Institutional Controls, Retrieval, Separation, Characterization, Physical/Chemical Treatment, Biological Treatment, Thermal Treatment, Storage, Transportation, Disposal, Migration Control (containment), Support Systems, Waste Minimization, and Remote Operations. Two hundred and sixty processes are summarized in these technology areas. Information on these processes was collected from EPA publications, books, journal articles, conference proceedings, vendors, DOE publications, and technical experts. The purpose of this paper is to familiarize readers with issues associated with the development of information systems. A major issue is the system and software quality, which can be controlled by configuration management. Another major issue is the documentation of data quality indicators in references used to collect data for the system, which can not be controlled but must be planned for in the review process

  19. Evaluation of innovative arsenic treatment technologies :the arsenic water technology partnership vendors forums summary report.

    Energy Technology Data Exchange (ETDEWEB)

    Everett, Randy L.; Siegel, Malcolm Dean; McConnell, Paul E.; Kirby, Carolyn (Comforce Technical Services, Inc.)

    2006-09-01

    The lowering of the drinking water standard (MCL) for arsenic from 50 {micro}g/L to 10 {micro}g/L in January 2006 could lead to significant increases in the cost of water for many rural systems throughout the United States. The Arsenic Water Technology Partnership (AWTP), a collaborative effort of Sandia National Laboratories, the Awwa Research Foundation (AwwaRF) and WERC: A Consortium for Environmental Education and Technology Development, was formed to address this problem by developing and testing novel treatment technologies that could potentially reduce the costs of arsenic treatment. As a member of the AWTP, Sandia National Laboratories evaluated cutting-edge commercial products in three annual Arsenic Treatment Technology Vendors Forums held during the annual New Mexico Environmental Health Conferences (NMEHC) in 2003, 2004 and 2005. The Forums were comprised of two parts. At the first session, open to all conference attendees, commercial developers of innovative treatment technologies gave 15-minute talks that described project histories demonstrating the effectiveness of their products. During the second part, these same technologies were evaluated and ranked in closed sessions by independent technical experts for possible use in pilot-scale field demonstrations being conducted by Sandia National Laboratories. The results of the evaluations including numerical rankings of the products, links to company websites and copies of presentations made by the representatives of the companies are posted on the project website at http://www.sandia.gov/water/arsenic.htm. This report summarizes the contents of the website by providing brief descriptions of the technologies represented at the Forums and the results of the evaluations.

  20. The sales and marketing practices of English-language internet alcohol vendors.

    Science.gov (United States)

    Williams, Rebecca S; Schmidt, Allison

    2014-03-01

    This study aimed to fill information gaps about the sales and marketing practices of internet alcohol vendors and their implications for addressing youth access and other legal violations. Further, it aimed to expand the limited scientific literature on internet alcohol sales using systematic survey methods to inform future efforts to regulate this industry and prevent sales to minors. The design was a cross-sectional website content analysis survey. [Not applicable]. A total of 105 internet alcohol vendor websites. Six key content analysis topics were explored: products offered, average prices and proportions of vendors using different promotions, policy statements and methods for age verification, payment and delivery. Websites sell and promote a variety of alcohol products, offered as cheaply as $1.93 for a 750-ml bottle. Vendors rely heavily upon age verification methods that are unlikely to prevent sales to minors. Many vendors advertise shipping of products via methods through which it is illegal or against delivery company policies to transport alcohol, and 99% of vendors accept credit cards. Limiting and enforcing delivery and payment options are types of policy interventions that have been used successfully with internet cigarette vendors that may be applicable to internet alcohol vendors as well. Internet alcohol vendor practices are insufficient to prevent sales to minors, and need further regulation and enforcement of existing policies. Their sales practices are similar to those of internet cigarette vendors prior to regulation, and similar regulatory approaches may be effective in reducing internet alcohol sales to minors. © 2013 Society for the Study of Addiction.

  1. Detection and Measurement of Sales Cannibalization in Information Technology Markets

    OpenAIRE

    Novelli, Francesco

    2015-01-01

    Characteristic features of Information Technology (IT), such as its intrinsic modularity and distinctive cost structure, incentivize IT vendors to implement growth strategies based on launching variants of a basic offering. These variants are by design substitutable to some degree and may contend for the same customers instead of winning new ones from competitors or from an expansion of the market. They may thus generate intra-organizational sales diversion – i.e., sales cannibalization. T...

  2. Safety of vendor-prepared foods: evaluation of 10 processing mobile food vendors in Manhattan.

    Science.gov (United States)

    Burt, Bryan M; Volel, Caroline; Finkel, Madelon

    2003-01-01

    Unsanitary food handling is a major public health hazard. There are over 4,100 mobile food vendors operating in New York City, and of these, approximately forty percent are processing vendors--mobile food units on which potentially hazardous food products are handled, prepared, or processed. This pilot study assesses the food handling practices of 10 processing mobile food vendors operating in a 38-block area of midtown Manhattan (New York City) from 43rd Street to 62nd Street between Madison and Sixth Avenues, and compares them to regulations stipulated in the New York City Health Code. Ten processing mobile food vendors located in midtown Manhattan were observed for a period of 20 minutes each. Unsanitary food handling practices, food storage at potentially unsafe temperatures, and food contamination with uncooked meat or poultry were recorded. Over half of all vendors (67%) were found to contact served foods with bare hands. Four vendors were observed vending with visibly dirty hands or gloves and no vendor once washed his or her hands or changed gloves in the 20-minute observation period. Seven vendors had previously cooked meat products stored at unsafe temperatures on non-heating or non-cooking portions of the vendor cart for the duration of the observation. Four vendors were observed to contaminate served foods with uncooked meat or poultry. Each of these actions violates the New York City Code of Health and potentially jeopardizes the safety of these vendor-prepared foods. More stringent adherence to food safety regulations should be promoted by the New York City Department of Health.

  3. Video Technology: Conveying Information Visually.

    Science.gov (United States)

    Bardes, D'Ellen

    1985-01-01

    Argues that videotaped communications, which provide timely information and cost savings, are beneficial to purchasers and vendors within the public and private library vertical market segment. Four distinct classifications of tapes used at the fall 1984 meeting of the Computer Dealer Exposition are discussed: marketing, informational,…

  4. What's in Your Techno-Future? Vendors Share Their Views.

    Science.gov (United States)

    Gerber, Carole

    1995-01-01

    Examines vendors' views on the future of CD-ROM technology. Topics include the library role, single point access, costs, tape backup, user-friendly library automation systems and databases, improved quality, the growth of Internet access, and perspectives on technology in schools. (AEF)

  5. The Library Automation Market: Why Do Vendors Fail? A History of Vendors and Their Characteristics.

    Science.gov (United States)

    Rush, James E.

    1988-01-01

    Documents the history of library automation from a business perspective, examining several topics relating to characteristics of vendors, the library automation marketplace, and the measurement of vendor performance and success. Tables list library automation system vendors and outline quantitative measures of vendor performance. (138 references)…

  6. Pengurangan Bullwhip Effect dengan Metode Vendor Managed Inventory

    Directory of Open Access Journals (Sweden)

    Fenny Rubbayanti Dewi

    2016-04-01

    Full Text Available Information distortion caused PT Multi Sarana Indotani got higher demand than the distributor. Demand variability in each echelon of the supply chain (bullwhip effect may occur due to lack of demand stability that the producer had difficulty in determining the amount of production. One of the collaboration methods that can be applied to overcome the information distortion as causes of the bullwhip effect is vendor managed inventory, where the needs of distributor and retailers monitored and controlled by the producer. In this case, vendor managed inventory applied to two echelons, producer, and distributor.

  7. Are all certified EHRs created equal? Assessing the relationship between EHR vendor and hospital meaningful use performance.

    Science.gov (United States)

    Holmgren, A Jay; Adler-Milstein, Julia; McCullough, Jeffrey

    2017-11-24

    The federal electronic health record (EHR) certification process was intended to ensure a baseline level of system quality and the ability to support meaningful use criteria. We sought to assess whether there was variation across EHR vendors in the degree to which hospitals using products from those vendors were able to achieve high levels of performance on meaningful use criteria. We created a cross-sectional national hospital sample from the Office of the National Coordinator for Health Information Technology EHR Products Used for Meaningful Use Attestation public use file and the Centers for Medicare & Medicaid Services Medicare EHR Incentive Program Eligible Hospitals public use file. We used regression models to assess the relationship between vendor and hospital performance on 6 Stage 2 Meaningful Use criteria, controlling for hospital characteristics. We also calculated how much variation in performance is explained by vendor choice. We found significant associations between specific vendor and level of hospital performance for all 6 meaningful use criteria. Epic was associated with significantly higher performance on 5 of the 6 criteria; relationships for other vendors were mixed, with some associated with significantly worse performance on multiple criteria. EHR vendor choice accounted for between 7% and 34% of performance variation across the 6 criteria. A nontrivial proportion of variation in hospital meaningful use performance is explained by vendor choice, and certain vendors are more often associated with better meaningful use performance than others. Our results suggest that policy-makers should improve the certification process by including more "real-world" scenario testing and provider feedback or ratings to reduce this variation. Hospitals can use these results to guide interactions with vendors. Vendor choice accounts for a meaningful proportion of variation in hospital meaningful use performance, and specific vendors are consistently associated

  8. Physician preference items: what factors matter to surgeons? Does the vendor matter?

    Directory of Open Access Journals (Sweden)

    Burns LR

    2018-01-01

    Full Text Available Lawton R Burns,1 Michael G Housman,2 Robert E Booth,3 Aaron M Koenig4 1Department of Health Care Management, The Wharton School, University of Pennsylvania, Philadelphia, PA, 2Singularity University, Moffett Field, CA, 33B Orthopaedics, Langhorne, PA, 4Harvard Medical School, Massachusetts General Hospital, Wang Ambulatory Care Center, Boston, MA, USA Background: The USA devotes roughly $200 billion (6% of annual national health expenditures to medical devices. A substantial proportion of this spending occurs during orthopedic (eg, hip and knee arthroplasties – two high-volume hospital procedures. The implants used in these procedures are commonly known as physician preference items (PPIs, reflecting the physician’s choice of implant and vendor used. The foundations for this preference are not entirely clear. This study examines what implant and vendor characteristics, as evaluated by orthopedic surgeons, are associated with their preference. It also examines other factors (eg, financial relationships and vendor tenure that may contribute to implant preference. Methods: We surveyed all practicing orthopedic surgeons performing 12 or more implant procedures annually in the Commonwealth of Pennsylvania. The survey identified each surgeon’s preferred hip/knee vendor as well as the factors that surgeons state they use in selecting that primary vendor. We compared the surgeons’ evaluation of multiple characteristics of implants and vendors using analysis of variance techniques, controlling for surgeon characteristics, hospital characteristics, and surgeon–vendor ties that might influence these evaluations. Results: Physician’s preference is heavily influenced by technology/implant factors and sales/service factors. Other considerations such as vendor reputation, financial relationships with the vendor, and implant cost seem less important. These findings hold regardless of implant type (hip vs knee and specific vendor. Conclusion: Our

  9. Poverty alleviation from the perspective of street vendors in Lesoth ...

    African Journals Online (AJOL)

    The aim of this paper was to examine from the perspective of street vendors how they are fighting poverty and the extent of winning this endemic cankerworm. The findings of this paper are informed by a study carried in 2007 on poverty and street vendors in Lesotho. Questionnaires and focus group discussions were used ...

  10. A structural model of customer satisfaction and trust in vendors involved in mobile commerce

    Directory of Open Access Journals (Sweden)

    Suki, N.M.

    2011-01-01

    Full Text Available The purpose of this paper is to provide an explanation of factors influencing customer satisfaction and trust in vendors involved in mobile commerce (m-commerce. The study sample consists of 200 respondents. Data were analyzed by employing structural equation modelling (SEM supported by AMOS 5.0 with maximum likelihood estimation in order to test the proposed hypotheses. The proposed model was empirically tested and results confirmed that users’ satisfaction with vendors in m-commerce was not significantly influenced by two antecedents of the vendor’s website quality: interactivity and customisation, and also two antecedents of mobile technology quality: usefulness and ease-of-use. Meanwhile, users’ trust towards the vendor in m-commerce is affected by users’ satisfaction with the vendor. Interestingly, vendor quality dimensions such as responsiveness and brand image influence customer satisfaction with vendors in m-commerce. Based on the findings, vendors in m-commerce should focus on the factors which generate more satisfaction and trust among customers. For vendors in general, the results can help them to better develop customer trust in m-commerce. Vendors of m-commerce can provide a more satisfying experience for customers.

  11. Health Information Technology, Patient Safety, and Professional Nursing Care Documentation in Acute Care Settings.

    Science.gov (United States)

    Lavin, Mary Ann; Harper, Ellen; Barr, Nancy

    2015-04-14

    The electronic health record (EHR) is a documentation tool that yields data useful in enhancing patient safety, evaluating care quality, maximizing efficiency, and measuring staffing needs. Although nurses applaud the EHR, they also indicate dissatisfaction with its design and cumbersome electronic processes. This article describes the views of nurses shared by members of the Nursing Practice Committee of the Missouri Nurses Association; it encourages nurses to share their EHR concerns with Information Technology (IT) staff and vendors and to take their place at the table when nursing-related IT decisions are made. In this article, we describe the experiential-reflective reasoning and action model used to understand staff nurses' perspectives, share committee reflections and recommendations for improving both documentation and documentation technology, and conclude by encouraging nurses to develop their documentation and informatics skills. Nursing issues include medication safety, documentation and standards of practice, and EHR efficiency. IT concerns include interoperability, vendors, innovation, nursing voice, education, and collaboration.

  12. Challenges in ethics, safety, best practices, and oversight regarding HIT vendors, their customers, and patients: a report of an AMIA special task force

    Science.gov (United States)

    Berner, Eta S; Dente, Mark A; Kaplan, Bonnie; Koppel, Ross; Rucker, Donald; Sands, Daniel Z; Winkelstein, Peter

    2010-01-01

    The current commercial health information technology (HIT) arena encompasses a number of competing firms that provide electronic health applications to hospitals, clinical practices, and other healthcare-related entities. Such applications collect, store, and analyze patient information. Some vendors incorporate contract language whereby purchasers of HIT systems, such as hospitals and clinics, must indemnify vendors for malpractice or personal injury claims, even if those events are not caused or fostered by the purchasers. Some vendors require contract clauses that force HIT system purchasers to adopt vendor-defined policies that prevent the disclosure of errors, bugs, design flaws, and other HIT-software-related hazards. To address this issue, the AMIA Board of Directors appointed a Task Force to provide an analysis and insights. Task Force findings and recommendations include: patient safety should trump all other values; corporate concerns about liability and intellectual property ownership may be valid but should not over-ride all other considerations; transparency and a commitment to patient safety should govern vendor contracts; institutions are duty-bound to provide ethics education to purchasers and users, and should commit publicly to standards of corporate conduct; and vendors, system purchasers, and users should encourage and assist in each others' efforts to adopt best practices. Finally, the HIT community should re-examine whether and how regulation of electronic health applications could foster improved care, public health, and patient safety. PMID:21075789

  13. Challenges in ethics, safety, best practices, and oversight regarding HIT vendors, their customers, and patients: a report of an AMIA special task force.

    Science.gov (United States)

    Goodman, Kenneth W; Berner, Eta S; Dente, Mark A; Kaplan, Bonnie; Koppel, Ross; Rucker, Donald; Sands, Daniel Z; Winkelstein, Peter

    2011-01-01

    The current commercial health information technology (HIT) arena encompasses a number of competing firms that provide electronic health applications to hospitals, clinical practices, and other healthcare-related entities. Such applications collect, store, and analyze patient information. Some vendors incorporate contract language whereby purchasers of HIT systems, such as hospitals and clinics, must indemnify vendors for malpractice or personal injury claims, even if those events are not caused or fostered by the purchasers. Some vendors require contract clauses that force HIT system purchasers to adopt vendor-defined policies that prevent the disclosure of errors, bugs, design flaws, and other HIT-software-related hazards. To address this issue, the AMIA Board of Directors appointed a Task Force to provide an analysis and insights. Task Force findings and recommendations include: patient safety should trump all other values; corporate concerns about liability and intellectual property ownership may be valid but should not over-ride all other considerations; transparency and a commitment to patient safety should govern vendor contracts; institutions are duty-bound to provide ethics education to purchasers and users, and should commit publicly to standards of corporate conduct; and vendors, system purchasers, and users should encourage and assist in each others' efforts to adopt best practices. Finally, the HIT community should re-examine whether and how regulation of electronic health applications could foster improved care, public health, and patient safety.

  14. Results of Aging Tests of Vendor-Produced Blended Feed Simulant

    International Nuclear Information System (INIS)

    Russell, Renee L.; Buchmiller, William C.; Cantrell, Kirk J.; Peterson, Reid A.; Rinehart, Donald E.

    2009-01-01

    The Hanford Tank Waste Treatment and Immobilization Plant (WTP) is procuring through Pacific Northwest National Laboratory (PNNL) a minimum of five 3,500 gallon batches of waste simulant for Phase 1 testing in the Pretreatment Engineering Platform (PEP). To make sure that the quality of the simulant is acceptable, the production method was scaled up starting from laboratory-prepared simulant through 15-gallon vendor prepared simulant and 250-gallon vendor prepared simulant before embarking on the production of the 3500-gallon simulant batch by the vendor. The 3500-gallon PEP simulant batches were packaged in 250-gallon high molecular weight polyethylene totes at NOAH Technologies. The simulant was stored in an environmentally controlled environment at NOAH Technologies within their warehouse before blending or shipping. For the 15-gallon, 250-gallon, and 3500-gallon batch 0, the simulant was shipped in ambient temperature trucks with shipment requiring nominally 3 days. The 3500-gallon batch 1 traveled in a 70-75 F temperature controlled truck. Typically the simulant was uploaded in a PEP receiving tank within 24-hours of receipt. The first uploading required longer with it stored outside. Physical and chemical characterization of the 250-gallon batch was necessary to determine the effect of aging on the simulant in transit from the vendor and in storage before its use in the PEP. Therefore, aging tests were conducted on the 250-gallon batch of the vendor-produced PEP blended feed simulant to identify and determine any changes to the physical characteristics of the simulant when in storage. The supernate was also chemically characterized. Four aging scenarios for the vendor-produced blended simulant were studied: (1) stored outside in a 250-gallon tote, (2) stored inside in a gallon plastic bottle, (3) stored inside in a well mixed 5-L tank, and (4) subject to extended temperature cycling under summer temperature conditions in a gallon plastic bottle. The following

  15. Utility-vendor partnerships for refurbishment projects

    Energy Technology Data Exchange (ETDEWEB)

    Newman, G.; Hall, H. [Bruce Power, Tiverton, Ontario (Canada)

    2012-07-01

    closely with our Vendor community to ensure that our policies, programs and procedures are rigorous, transparent and well understood such that these requirements can be implemented in a timely and cost effective manner. At Bruce Power we value the skills and products that our Vendor community brings to our business and it is our intention to work carefully through this process to ensure that we collectively achieve the quality level required to ensure safe, reliable operation of our plants. In the context of Utility – Vendor Partnerships from a commercial perspective; Bruce Power has established a Vendor Performance Management System (VPMS) to support a structured approach to identify supplier strengths and weaknesses and to assist in the selection and management of our vendor base. Utilizing field initiated Station Condition Reports (SCR’s) and Non Conformance Reports (NCR’s) to establish good, average and substandard performance data points by commodity and contract, the VPMS facilitates data mining of performance information to establish a profile of how a supplier performs. SCR’s and NCR’s are backstopped by commercially generated SCAR Supplier Corrective Action Reports which allows Bruce Power to monitor vendor corrective actions.The VPMS approach permits Bruce Power to have a data based evaluation vs. an opinion based performance scorecard. Although in it’s preliminary stages this system will eventually help Bruce Power verify by commodity how vendors are performing which will in turn allow Bruce Power to enable an exit strategy for a poor performing vendor while strategically developing vendors to fill identified gaps. This capability will act as a cornerstone segment in our approach to Utility – Vendor Partnerships for Refurbishment by establishing performance data points on cost, quality and schedule delivery. Our success in being able to strategically apply this model will depend upon stable outage, generation and capital improvement plans as well

  16. Utility-vendor partnerships for refurbishment projects

    International Nuclear Information System (INIS)

    Newman, G.; Hall, H.

    2012-01-01

    closely with our Vendor community to ensure that our policies, programs and procedures are rigorous, transparent and well understood such that these requirements can be implemented in a timely and cost effective manner. At Bruce Power we value the skills and products that our Vendor community brings to our business and it is our intention to work carefully through this process to ensure that we collectively achieve the quality level required to ensure safe, reliable operation of our plants. In the context of Utility – Vendor Partnerships from a commercial perspective; Bruce Power has established a Vendor Performance Management System (VPMS) to support a structured approach to identify supplier strengths and weaknesses and to assist in the selection and management of our vendor base. Utilizing field initiated Station Condition Reports (SCR’s) and Non Conformance Reports (NCR’s) to establish good, average and substandard performance data points by commodity and contract, the VPMS facilitates data mining of performance information to establish a profile of how a supplier performs. SCR’s and NCR’s are backstopped by commercially generated SCAR Supplier Corrective Action Reports which allows Bruce Power to monitor vendor corrective actions.The VPMS approach permits Bruce Power to have a data based evaluation vs. an opinion based performance scorecard. Although in it’s preliminary stages this system will eventually help Bruce Power verify by commodity how vendors are performing which will in turn allow Bruce Power to enable an exit strategy for a poor performing vendor while strategically developing vendors to fill identified gaps. This capability will act as a cornerstone segment in our approach to Utility – Vendor Partnerships for Refurbishment by establishing performance data points on cost, quality and schedule delivery. Our success in being able to strategically apply this model will depend upon stable outage, generation and capital improvement plans as well

  17. Exploratory survey of informal vendor-sold fast food in rural South ...

    African Journals Online (AJOL)

    2011-03-16

    Mar 16, 2011 ... transition, with increasing obesity prevalence mimicking that in urban areas. ... Understanding food availability within urban and rural contexts is important; of .... The reasons that vendors gave for the limited range of. Fast food ...

  18. Assessing mobile food vendors (a.k.a. street food vendors)--methods, challenges, and lessons learned for future food-environment research.

    Science.gov (United States)

    Lucan, S C; Varona, M; Maroko, A R; Bumol, J; Torrens, L; Wylie-Rosett, J

    2013-08-01

    Mobile food vendors (also known as street food vendors) may be important sources of food, particularly in minority and low-income communities. Unfortunately, there are no good data sources on where, when, or what vendors sell. The lack of a published assessment method may contribute to the relative exclusion of mobile food vendors from existing food-environment research. A goal of this study was to develop, pilot, and refine a method to assess mobile food vendors. Cross-sectional assessment of mobile food vendors through direct observations and brief interviews. Using printed maps, investigators canvassed all streets in Bronx County, NY (excluding highways but including entrance and exit ramps) in 2010, looking for mobile food vendors. For each vendor identified, researchers recorded a unique identifier, the vendor's location, and direct observations. Investigators also recorded vendors answers to where, when, and what they sold. Of 372 identified vendors, 38% did not answer brief-interview questions (19% were 'in transit', 15% refused; others were absent from their carts/trucks/stands or with customers). About 7% of vendors who ultimately answered questions were reluctant to engage with researchers. Some vendors expressed concerns about regulatory authority; only 34% of vendors had visible permits or licenses and many vendors had improvised illegitimate-appearing set-ups. The majority of vendors (75% of those responding) felt most comfortable speaking Spanish; 5% preferred other non-English languages. Nearly a third of vendors changed selling locations (streets, neighbourhoods, boroughs) day-to-day or even within a given day. There was considerable variability in times (hours, days, months) in which vendors reported doing business; for 86% of vendors, weather was a deciding factor. Mobile food vendors have a variable and fluid presence in an urban environment. Variability in hours and locations, having most comfort with languages other than English, and reluctance

  19. A framework for offshore vendor capability development

    Science.gov (United States)

    Yusuf Wibisono, Yogi; Govindaraju, Rajesri; Irianto, Dradjad; Sudirman, Iman

    2016-02-01

    Offshore outsourcing is a common practice conducted by companies, especially in developed countries, by relocating one or more their business processes to other companies abroad, especially in developing countries. This practice grows rapidly owing to the ease of accessing qualified vendors with a lower cost. Vendors in developing countries compete more intensely to acquire offshore projects. Indonesia is still below India, China, Malaysia as main global offshore destinations. Vendor capability is among other factors that contribute to the inability of Indonesian vendor in competing with other companies in the global market. Therefore, it is essential to study how to increase the vendor's capability in Indonesia, in the context of global offshore outsourcing. Previous studies on the vendor's capability mainly focus on capabilities without considering the dynamic of capabilities due to the environmental changes. In order to be able to compete with competitors and maintain the competitive advantage, it is necessary for vendors to develop their capabilities continuously. The purpose of this study is to develop a framework that describes offshore vendor capability development along the client-vendor relationship stages. The framework consists of three main components, i.e. the stages of client-vendor relationship, the success of each stage, and the capabilities of vendor at each stage.

  20. Survey of information technology in Intensive Care Units in Ontario, Canada

    Directory of Open Access Journals (Sweden)

    Hallett David

    2008-01-01

    Full Text Available Abstract Background The Intensive Care Unit (ICU is a data-rich environment where information technology (IT may enhance patient care. We surveyed ICUs in the province of Ontario, Canada, to determine the availability, implementation and variability of information systems. Methods A self-administered internet-based survey was completed by ICU directors between May and October 2006. We measured the spectrum of ICU clinical data accessible electronically, the availability of decision support tools, the availability of electronic imaging systems for radiology, the use of electronic order entry and medication administration systems, and the availability of hardware and wireless or mobile systems. We used Fisher's Exact tests to compare IT availability and Classification and Regression Trees (CART to estimate the optimal cut-point for the number of computers per ICU bed. Results We obtained responses from 50 hospitals (68.5% of institutions with level 3 ICUs, of which 21 (42% were university-affiliated. The majority electronically accessed laboratory data and imaging reports (92% and used picture archiving and communication systems (PACS (76%. Other computing functions were less prevalent (medication administration records 46%, physician or nursing notes 26%; medication order entry 22%. No association was noted between IT availability and ICU size or university affiliation. Sites used clinical information systems from15 different vendors and 8 different PACS systems were in use. Half of the respondents described the number of computers available as insufficient. Wireless networks and mobile computing systems were used in 23 ICUs (46%. Conclusion Ontario ICUs demontrate a high prevalence of the use of basic information technology systems. However, implementation of the more complex and potentially more beneficial applications is low. The wide variation in vendors utilized may impair information exchange, interoperability and uniform data collection.

  1. Selection of Vendor Based on Intuitionistic Fuzzy Analytical Hierarchy Process

    Directory of Open Access Journals (Sweden)

    Prabjot Kaur

    2014-01-01

    Full Text Available Business environment is characterized by greater domestic and international competitive position in the global market. Vendors play a key role in achieving the so-called corporate competition. It is not easy however to identify good vendors because evaluation is based on multiple criteria. In practice, for VSP most of the input information about the criteria is not known precisely. Intuitionistic fuzzy set is an extension of the classical fuzzy set theory (FST, which is a suitable way to deal with impreciseness. In other words, the application of intuitionistic fuzzy sets instead of fuzzy sets means the introduction of another degree of freedom called nonmembership function into the set description. In this paper, we proposed a triangular intuitionistic fuzzy number based approach for the vendor selection problem using analytical hierarchy process. The crisp data of the vendors is represented in the form of triangular intuitionistic fuzzy numbers. By applying AHP which involves decomposition, pairwise comparison, and deriving priorities for the various levels of the hierarchy, an overall crisp priority is obtained for ranking the best vendor. A numerical example illustrates our method. Lastly a sensitivity analysis is performed to find the most critical criterion on the basis of which vendor is selected.

  2. Coordinated clinical and financial analysis as a powerful tool to influence vendor pricing.

    Science.gov (United States)

    Logan, Catherine A; Wu, Roger Y; Mulley, Debra; Smith, Paul C; Schwaitzberg, Steven D

    2010-01-01

    As costs continue to outpace reimbursements, hospital administrators and clinicians face increasing pressure to justify new capital purchases. Massachusetts Health Care Reform has added further economic challenges for Disproportionate Share Hospitals (DSH), as resources formerly available to treat the uninsured have been redirected. In this challenging climate, many hospitals still lack a standardized process for technology planning and/or vendor negotiation. : The purpose of this study was to determine whether a simple, coordinated clinical and financial analysis of a technology, Endoscopic Carpal Tunnel Release (ECTR), is sufficient to impact vendor pricing at Cambridge Health Alliance (CHA), a disproportionate share hospital (DSH) in Cambridge, Massachusetts. This case study addressed the topic of technology adoption, a complex decision-making process every hospital administration faces. Taking note of other hospitals approaches to instill a strategic management culture, CHA combined a literature review on clinical outcomes and financial analysis on profitability. Clinical effectiveness was evaluated through a literature review. The financial analysis was based on a retrospective inquiry of fixed and variable costs, reimbursement rates, actual payer mix, and profitability of adopting ECTR over open carpal tunnel release at CHA. This clinical and financial analysis was then shared with the vendor. A literature review revealed that although there are short-term benefits to ECTR, there is little to no difference in long-term outcomes to justify a calculated incremental loss of $91.49 in revenue per case. Sharing this analysis with the vendor resulted in a 30% price reduction. A revised cost analysis demonstrated a $53.51 incremental gain in revenue per case. CHA has since elected to offer ECTR to its patients. Smaller hospital systems often have modest leverage in vendor negotiations. Our results suggest that the development of adoption criteria and an evidence

  3. Assessing mobile food vendors (a.k.a. street food vendors)—methods, challenges, and lessons learned for future food-environment research

    Science.gov (United States)

    Lucan, Sean C.; Varona, Monica; Maroko, Andrew R.; Bumol, Joel; Torrens, Luis; Wylie-Rosett, Judith

    2013-01-01

    OBJECTIVES Mobile food vendors (also known as street food vendors) may be important sources of food, particularly in minority and low-income communities. Unfortunately, there are no good data sources on where, when, or what vendors sell. The lack of a published assessment method may contribute to the relative exclusion of mobile food vendors from existing food-environment research. A goal of this study was to develop, pilot, and troubleshoot a method to assess mobile food vendors. STUDY DESIGN Cross-sectional assessment of mobile food vendors through direct observations and brief interviews. METHODS Using printed maps, investigators canvassed all streets in Bronx County, NY (excluding highways but including entrance and exit ramps) in 2010, looking for mobile food vendors. For each vendor identified, researchers recorded a unique identifier, the vendor’s location, and direct observations. Investigators also recorded vendors answers to where, when, and what they sold. RESULTS Of 372 identified vendors, 38% did not answer brief-interview questions (19% were “in transit”, 15% refused; others were absent from their carts/trucks/stands or with customers). About 7% of vendors who ultimately answered questions were reluctant to engage with researchers. Some vendors expressed concerns about regulatory authority; only 34% of vendors had visible permits or licenses and many vendors had improvised illegitimate-appearing set-ups. The majority of vendors (75% of those responding) felt most comfortable speaking Spanish; 5% preferred other non-English languages. Nearly a third of vendors changed selling locations (streets, neighborhoods, boroughs) day-to-day or even within a given day. There was considerable variability in times (hours, days, months) in which vendors reported doing business; for 86% of vendors, weather was a deciding factor. CONCLUSIONS Mobile food vendors have a variable and fluid presence in an urban environment. Variability in hours and locations, having

  4. Quick scan IMS vendors

    NARCIS (Netherlands)

    Norp, A.H.J.; Pals, H.; Walraven, F.A.

    2007-01-01

    IMS is gaining momentum in the market. First operators are deploying IMS, while other operators are considering buying IMS. Operators have two approaches for introducing IMS and building an IMS eco-system: • Buying IMS from a large vendor or system integrator. Vendors like Alcatel-Lucent, Ericsson

  5. Safety of vendor-prepared foods: evaluation of 10 processing mobile food vendors in Manhattan.

    OpenAIRE

    Burt, Bryan M.; Volel, Caroline; Finkel, Madelon

    2003-01-01

    OBJECTIVES: Unsanitary food handling is a major public health hazard. There are over 4,100 mobile food vendors operating in New York City, and of these, approximately forty percent are processing vendors--mobile food units on which potentially hazardous food products are handled, prepared, or processed. This pilot study assesses the food handling practices of 10 processing mobile food vendors operating in a 38-block area of midtown Manhattan (New York City) from 43rd Street to 62nd Street bet...

  6. Denver Reengineers: By Relying More on Vendors and Technology, Jo Sarling Explains How the Denver Public Library Shifted Resources to the Public

    Science.gov (United States)

    Sarling, Jo

    2005-01-01

    This article gives details of the developments and changes in the Denver Public Library (DPL). Through a review of advancements in technology, vendor capabilities, staffing levels and talent, as well as outsourcing opportunities, DPL reinvented its workflow and processing. The result? The once giant stacks of books, CDs, videos, and DVDs waiting…

  7. Vendors: Gifts Are the Exception to the Rule.

    Science.gov (United States)

    Natale, Jo Anna

    1992-01-01

    Informal interviews with several people working in different industries reveal that, without exception, the vendors say companies do not routinely offer school officials gifts and entertainment to sway purchasing decisions, but that it does happen. (MLF)

  8. Common QA/QM Criteria for Multinational Vendor Inspection

    International Nuclear Information System (INIS)

    2014-01-01

    This VICWG document provides the 'Common QA/QM Criteria' which will be used in Multinational Vendor Inspection. The 'Common QA/QM Criteria' provides the basic consideration when performing the Vendor Inspection. These criteria has been developed in conformity with International Codes and Standards such as IAEA, ISO and so on that MDEP member countries adopted. The purpose of the VICWG is to establish areas of co-operation in the Vendor Inspection practices among MDEP member countries as described in the MDEP issue-specific Terms of Reference (ToR). As part of this, from the beginning, a survey was performed to understand and to identify areas of commonality and differences between regulatory practices of member countries in the area of vendor inspection. The VICWG also collaborated by performing Witnessed Inspections and Joint Inspections. Through these activities, it was recognized that member countries commonly apply the IAEA safety standard (GS-R-3) to the vendor inspection criteria, and almost ail European member countries apply the ISO standard (ISO9001). In the US, the NRC regulatory requirement in 10 CFR, Part 50, Appendix B is used. South Korea uses the same criteria as in the US. As a result of the information obtained, a comparison table between codes and standards (IAEAGS-R-3, ISO 9001:2008.10CFR50 Appendix Band ASME NQA-1) has been developed in order to inform the development of 'Common QA/QM Criteria'. The result is documented in Table 1, 'MDEP CORE QA/QM Requirement and Comparison between Codes and Standards'. In addition, each country's criteria were compared with the US 10CFR50 Appendix B as a template. Table 2 shows VICWG Survey on Quality Assurance Program Requirements. Through these activities above, we considered that the core requirements should be consistent with both IAEA safety standard and ISO standard, and considered that the common requirements in the US 10CFR50 Appendix B used to the survey

  9. Selecting healthcare information systems provided by third-party vendors: a mind map beyond the manuals.

    Science.gov (United States)

    Gortzis, Lefteris G

    2010-01-01

    The selection of a new healthcare information system (HIS) has always been a daunting process for clinicians, health care providers and policy makers. The objective of this study is to present the lessons learned and the main findings from several relevant case studies to support this process. Data were collected by retrospectively reviewing the summative results of three well-established systems, acquiring feedback from two E.U. projects, and conducting semi-structured interviews with a number of collaborators involved in electronic healthcare interventions. Selection issues were identified and classified into the following five categories: (i) data creation, (ii) data management, (iii) data sharing, (iv) data presentation and (v) modules management. A mind map was also structured to provide a more manageable list of issues concerning the most common electronic clinical technologies (e-CT). The vendor manual is intended as an overview of the merchandise e-CT and therefore has limited potential in supporting effectively the selection process of a new HIS. The present classification and the mind map - based on lessons learned - provide a ready-to-use toolkit for supporting the HIS selection process when healthcare organisations are unable to employ research development groups to lay the groundwork for building a new HIS from scratch.

  10. Senior living technology.

    Science.gov (United States)

    Weiss, G

    1999-10-01

    The pros and cons of long term care's shift to a prospective payment system will be debated well into the next millennium, but its effects have already been profound. Not least has been the role PPS has played in dragging providers into the information age. Providers who were once steadfast in their refusal to participate in the computer revolution are now eager converts, implementing innovative information and clinical technologies to operate more efficiently and improve quality of care. Major changes rarely happen overnight. The long process of upgrading information systems and integrating new clinical technologies will remain arduous for years to come. But innovative technologies (including non-computerized devices and equipment ranging from lift systems to weightlifting equipment) will play an ever-increasing role as the industry takes a more consumer-driven approach to delivery of care. While some providers complain that vendors have been slow to develop the level of sophisticated, integrative systems they require, vendors fault providers for not being able or willing to invest the capital necessary to upgrade their platforms to support state-of-the-art software. But partnering rather than finger-pointing appears to be winning the day as facilities and vendors intensify their efforts to create more and better technology for long term care. In the following pages, we look at a number of innovative providers--from Bronx, New York, to Oshkosh, Wisconsin, from big chains to mom-and-pops--who have come up with creative solutions to common problems.

  11. Innovation in partnership sourcing from a vendor's pespective

    DEFF Research Database (Denmark)

    Barlach, Anders; Simonsen, Jesper

    2011-01-01

    -driven innovation at the IT vendor CSC Scandihealth A/S. CSC Scandihealth’s business strategy regarding effects-driven innovation is described and related to a partner sourcing model with a client, a hospital in the North Region of Denmark. The chapter analyses how innovation can be organized and the different......This chapter describes three generic categories of assets for technological innovation: 1) process innovative assets, 2) product innovative application assets, and 3) aesthetic design assets (Christensen, 1995). These different types of innovation are used as a framework for discussing effects...... stakeholders, contexts, and perspectives undertaken by the vendor and the client while engaging in partnership sourcing supported by effects-driven innovation. The experiences and challenges are discussed on the basis of a number of projects with the vendor’s clients....

  12. Responsible vendors, intelligent consumers: Silk Road, the online revolution in drug trading.

    Science.gov (United States)

    Van Hout, Marie Claire; Bingham, Tim

    2014-03-01

    Silk Road is located on the Deep Web and provides an anonymous transacting infrastructure for the retail of drugs and pharmaceuticals. Members are attracted to the site due to protection of identity by screen pseudonyms, variety and quality of product listings, selection of vendors based on reviews, reduced personal risks, stealth of product delivery, development of personal connections with vendors in stealth modes and forum activity. The study aimed to explore vendor accounts of Silk Road as retail infrastructure. A single and holistic case study with embedded units approach (Yin, 2003) was chosen to explore the accounts of vendor subunits situated within the Silk Road marketplace. Vendors (n=10) completed an online interview via the direct message facility and via Tor mail. Vendors described themselves as 'intelligent and responsible' consumers of drugs. Decisions to commence vending operations on the site centred on simplicity in setting up vendor accounts, and opportunity to operate within a low risk, high traffic, high mark-up, secure and anonymous Deep Web infrastructure. The embedded online culture of harm reduction ethos appealed to them in terms of the responsible vending and use of personally tested high quality products. The professional approach to running their Silk Road businesses and dedication to providing a quality service was characterised by professional advertising of quality products, professional communication and visibility on forum pages, speedy dispatch of slightly overweight products, competitive pricing, good stealth techniques and efforts to avoid customer disputes. Vendors appeared content with a fairly constant buyer demand and described a relatively competitive market between small and big time market players. Concerns were evident with regard to Bitcoin instability. The greatest threat to Silk Road and other sites operating on the Deep Web is not law enforcement or market dynamics, it is technology itself. Copyright © 2013 Elsevier

  13. Management of Globally Distributed Software Development Projects in Multiple-Vendor Constellations

    Science.gov (United States)

    Schott, Katharina; Beck, Roman; Gregory, Robert Wayne

    Global information systems development outsourcing is an apparent trend that is expected to continue in the foreseeable future. Thereby, IS-related services are not only increasingly provided from different geographical sites simultaneously but beyond that from multiple service providers based in different countries. The purpose of this paper is to understand how the involvement of multiple service providers affects the management of the globally distributed information systems development projects. As research on this topic is scarce, we applied an exploratory in-depth single-case study design as research approach. The case we analyzed comprises a global software development outsourcing project initiated by a German bank together with several globally distributed vendors. For data collection and data analysis we have adopted techniques suggested by the grounded theory method. Whereas the extant literature points out the increased management overhead associated with multi-sourcing, the analysis of our case suggests that the required effort for managing global outsourcing projects with multiple vendors depends among other things on the maturation level of the cooperation within the vendor portfolio. Furthermore, our data indicate that this interplay maturity is positively impacted through knowledge about the client that has been derived based on already existing client-vendor relationships. The paper concludes by offering theoretical and practical implications.

  14. Client-vendor knowledge transfer mechanisms in the context of information systems outsourcing

    CSIR Research Space (South Africa)

    Smuts, H

    2015-08-01

    Full Text Available and vendor, the organisation may be unable to derive maximum benefits from such partnerships. However, little research has been done up to date on how organisations deal with managing knowledge in outsourcing situations. In an attempt to quantify knowledge...

  15. The NASA Integrated Information Technology Architecture

    Science.gov (United States)

    Baldridge, Tim

    1997-01-01

    This document defines an Information Technology Architecture for the National Aeronautics and Space Administration (NASA), where Information Technology (IT) refers to the hardware, software, standards, protocols and processes that enable the creation, manipulation, storage, organization and sharing of information. An architecture provides an itemization and definition of these IT structures, a view of the relationship of the structures to each other and, most importantly, an accessible view of the whole. It is a fundamental assumption of this document that a useful, interoperable and affordable IT environment is key to the execution of the core NASA scientific and project competencies and business practices. This Architecture represents the highest level system design and guideline for NASA IT related activities and has been created on the authority of the NASA Chief Information Officer (CIO) and will be maintained under the auspices of that office. It addresses all aspects of general purpose, research, administrative and scientific computing and networking throughout the NASA Agency and is applicable to all NASA administrative offices, projects, field centers and remote sites. Through the establishment of five Objectives and six Principles this Architecture provides a blueprint for all NASA IT service providers: civil service, contractor and outsourcer. The most significant of the Objectives and Principles are the commitment to customer-driven IT implementations and the commitment to a simpler, cost-efficient, standards-based, modular IT infrastructure. In order to ensure that the Architecture is presented and defined in the context of the mission, project and business goals of NASA, this Architecture consists of four layers in which each subsequent layer builds on the previous layer. They are: 1) the Business Architecture: the operational functions of the business, or Enterprise, 2) the Systems Architecture: the specific Enterprise activities within the context

  16. Secure vendor environment (SVE) for PACS

    Science.gov (United States)

    Honeyman-Buck, Janice; Frost, Meryll

    2005-04-01

    A Secure Vendor Environment (SVE) was created to protect radiology modalities from network intrusion, worms, viruses, and other forms of damaging attacks. Many vendors do not attempt any form of network security and if an institution demands a non-standard and secure installation, a future system upgrade could and frequently does eliminate any security measures installed during the initial installation. The SVE isolates the vendor equipment behind a virtual firewall on a private network that is invisible to the outside world. All interactions must go though a device containing two network interface cards called an Application Processor that acts as a store-and forward router, performs DICOM repair, proxies modality worklist, and isolates the vendor modalities. A small VPN appliance can open the device temporarily for remote access by vendor engineers. Prior to the routine installation of the SVE, vendor equipment was often attacked by hostile network intruders and viruses or worms, sometimes rendering the equipment unusable until the vendor could reload the system. The resulted in considerable clinical downtime and loss of revenue. Since the relatively low cost SVE solution has routinely been installed with all new equipment, no intrusions have occurred, although our network sniffers and intrusion detectors indicate that we are constantly being scanned for vulnerability. Purpose: To provide a secure network for vendor equipment in a PACS environment while allowing vendor access for upgrades and system repairs. Method: The network administrators at our university believe that network security should be implemented at the machine level rather than relying on a firewall. A firewall solution could conceivably block unwanted intrusion from outside the university network, but would still allow literally thousands of potential network users to get through to the PACS network. All the PACS archive, display and routing systems are individually protected from intrusion, but

  17. Responding to an RFP: A Vendor's Viewpoint.

    Science.gov (United States)

    Kington, Robert A.

    1987-01-01

    Outlines factors used by online vendors to decide whether to bid on RFPs (requests for proposals) for library automation systems, including specifications for software, hardware or performance requirements not met by the vendor; specifications based on competitors' systems; the size and complexity of the request itself; and vendors' time…

  18. Why I Love Vendors

    Energy Technology Data Exchange (ETDEWEB)

    Wiley, H. S.

    2010-02-01

    In December, I attended the annual meeting of the American Society for Cell Biology, as I have done regularly for the last several decades. It is always a good way to catch up with old friends and look for the latest trends in cell biology. I rarely attend the talks, having found that they more reflect the fashion of the moment (or the past) than the direction of the field. Poster sessions are more to my liking, since they provide a chance to talk to enthusiastic young scientists in the trenches. But my favorite stop has always been the vendor booths. When I tell my friends that I love visiting vendor booths, most of them seem to think I am kidding. At meetings, many scientists seem to feel that vendors are necessary evils. They provide free candy and cheap pens in exchange for bombarding us with ads and scanning our badges. Like popup ads in web browsers, we have learned to both ignore and accept them as part of the landscape. It is unfortunate that we have become so inured to their presence. Talks and posters capture exciting research from the last few years or months, but vendor booths capture the future, offering one of the clearest visions of where a field is going.

  19. Management of Enterprise Information Systems: call for a new technology landscape framework

    DEFF Research Database (Denmark)

    Møller, Charles

    2007-01-01

    Standardised Enterprise Information Systems (EIS) are increasingly setting the agenda and the pace for the development of many organisations. Organisations are required not only to establish effective business processes but also to accommodate for changing business conditions. The vendors...... transformation cases. This paper discusses future challenges for research on EIS, and it concludes that the EIS industry has a significant and increasing impact on enterprises due to the EIS enabled transformation of the business. Consequently, continued management of EIS after going-live is required, but most...... important, EIS research needs to refocus on the EIS technology landscape and embrace this new challenge....

  20. Prevalence of oral lesions in pan vendor

    Directory of Open Access Journals (Sweden)

    Prakash Gadodia

    2011-01-01

    Full Text Available Background: Being a portal of entry to various smoking and smokeless tobacco products, oral cavity is prone to deleterious effects. Present study consist of epidemiological survey to elucidate oral lesions in pan vendors. Aims and objectives: To detect oral lesions in pan vendors and compare it with controls. To detect habit pattern and prevalence of OSMF and other lesions in pan vendors as compared to controls- To identify, recognize and evaluate the possible etiology for OSMF, encompassing various chewing and smoking habits. Materials and methods: Study population consist of 170 pan vendors with age ranging from 15 to 55 years and equal number of sex matched controls selected randomly. Results: Prevalence of oral lesions in pan vendors is statistically significantly higher as compared to controls. The habit of arecanut chewing in various forms was present in all cases. The habit of smoking and smokeless tobacco products was present in all cases. Conclusion: Pan vendors are at higher risk for oral lesions than controls. There is increase in relative risk with increase in duration and frequency of habit.

  1. Innovative Approach for IBS Vendor Selection Problem

    Directory of Open Access Journals (Sweden)

    Omar Mohd Faizal

    2016-01-01

    Full Text Available Supply chain management in Industrialised Building System (IBS construction management has significantly determined the successful of company and project performance. Due to the wide variety of criteria and vendor available, the vendor selection process for a specific project needs is becoming more difficult. The need of decision aid for vendor selection in other areas is widely discussed in previous research. However, study on vendor selection for IBS project is largely neglected. Decision Support System (DSS is proposed for this purpose. Yet, most of the DSS models are impractical since they are complicated and difficult for a layman such as project managers to use. Research indicates that the rapid development of ICT has highly potential towards simple and effective DSS. Thus, this paper highlights the importance and research approach for vendor selection in IBS project management. The study is based on Design Science Research Methodology with combination of case studies. It is anticipates that this study will yield an effective value-for-money decision making platform to manage vendor selection process.

  2. Leveraging health information technology to achieve the "triple aim" of healthcare reform.

    Science.gov (United States)

    Sheikh, Aziz; Sood, Harpreet S; Bates, David W

    2015-07-01

    To investigate experiences with leveraging health information technology (HIT) to improve patient care and population health, and reduce healthcare expenditures. In-depth qualitative interviews with federal government employees, health policy, HIT and medico-legal experts, health providers, physicians, purchasers, payers, patient advocates, and vendors from across the United States. The authors undertook 47 interviews. There was a widely shared belief that Health Information Technology for Economic and Clinical Health (HITECH) had catalyzed the creation of a digital infrastructure, which was being used in innovative ways to improve quality of care and curtail costs. There were however major concerns about the poor usability of electronic health records (EHRs), their limited ability to support multi-disciplinary care, and major difficulties with health information exchange, which undermined efforts to deliver integrated patient-centered care. Proposed strategies for enhancing the benefits of HIT included federal stimulation of competition by mandating vendors to open-up their application program interfaces, incenting development of low-cost consumer informatics tools, and promoting Congressional review of the The Health Insurance Portability and Accountability Act (HIPPA) to optimize the balance between data privacy and reuse. Many underscored the need to "kick the legs from underneath the fee-for-service model" and replace it with a data-driven reimbursement system that rewards high quality care. The HITECH Act has stimulated unprecedented, multi-stakeholder interest in HIT. Early experiences indicate that the resulting digital infrastructure is being used to improve quality of care and curtail costs. Reform efforts are however severely limited by problems with usability, limited interoperability and the persistence of the fee-for-service paradigm-addressing these issues therefore needs to be the federal government's main policy target. © The Author 2015

  3. Technical Evaluation Report 30: Vendor-Assisted Evaluation of a Learning Management System

    Directory of Open Access Journals (Sweden)

    Adrienne De Schutter

    2004-04-01

    Full Text Available A product evaluation was conducted of Desire2Learn, an online learning management system gaining popularity in educational institutions. Since an online trial version of the software was not available for evaluation, an inspection meeting with the vendor was arranged. This provided the evaluation team with an opportunity to examine the precautions necessary for ensuring the objectivity of a product evaluation based on vendor-supplied information. The report outlines the team’s use of evaluator-driven enquiry and a triangulated approach to information checking. The Desire2Learn product is assessed as a flexible and useful addition to the range of learning management system options.

  4. Vendor audits: A cooperative program

    International Nuclear Information System (INIS)

    White, S.C.

    1989-01-01

    The litany of recent problems with substandard, fraudulent, or counterfeit materials has led to much scrutiny regarding the adequacy and effectiveness of licensee-performed vendor audits. To address these problems in the audit process, most licensees have dedicated significant additional technical and qualitative resources. In response to the limited availability of sufficient resources and expertise to perform more comprehensive and effective vendor audits, many licensees have recognize the advantages of cooperative programs to perform joint audits with other licensees on a regional basis. The Nuclear Procurement Issues Council (NUPIC) provides such a program on a national level, which has proven to be of significant benefit not only to licensees but also to vendors of nuclear safety-related items and services

  5. Prediction of Safety Stock Using Fuzzy Time Series (FTS) and Technology of Radio Frequency Identification (RFID) for Stock Control at Vendor Managed Inventory (VMI)

    Science.gov (United States)

    Mashuri, Chamdan; Suryono; Suseno, Jatmiko Endro

    2018-02-01

    This research was conducted by prediction of safety stock using Fuzzy Time Series (FTS) and technology of Radio Frequency Identification (RFID) for stock control at Vendor Managed Inventory (VMI). Well-controlled stock influenced company revenue and minimized cost. It discussed about information system of safety stock prediction developed through programming language of PHP. Input data consisted of demand got from automatic, online and real time acquisition using technology of RFID, then, sent to server and stored at online database. Furthermore, data of acquisition result was predicted by using algorithm of FTS applying universe of discourse defining and fuzzy sets determination. Fuzzy set result was continued to division process of universe of discourse in order to be to final step. Prediction result was displayed at information system dashboard developed. By using 60 data from demand data, prediction score was 450.331 and safety stock was 135.535. Prediction result was done by error deviation validation using Mean Square Percent Error of 15%. It proved that FTS was good enough in predicting demand and safety stock for stock control. For deeper analysis, researchers used data of demand and universe of discourse U varying at FTS to get various result based on test data used.

  6. Prediction of Safety Stock Using Fuzzy Time Series (FTS and Technology of Radio Frequency Identification (RFID for Stock Control at Vendor Managed Inventory (VMI

    Directory of Open Access Journals (Sweden)

    Mashuri Chamdan

    2018-01-01

    Full Text Available This research was conducted by prediction of safety stock using Fuzzy Time Series (FTS and technology of Radio Frequency Identification (RFID for stock control at Vendor Managed Inventory (VMI. Well-controlled stock influenced company revenue and minimized cost. It discussed about information system of safety stock prediction developed through programming language of PHP. Input data consisted of demand got from automatic, online and real time acquisition using technology of RFID, then, sent to server and stored at online database. Furthermore, data of acquisition result was predicted by using algorithm of FTS applying universe of discourse defining and fuzzy sets determination. Fuzzy set result was continued to division process of universe of discourse in order to be to final step. Prediction result was displayed at information system dashboard developed. By using 60 data from demand data, prediction score was 450.331 and safety stock was 135.535. Prediction result was done by error deviation validation using Mean Square Percent Error of 15%. It proved that FTS was good enough in predicting demand and safety stock for stock control. For deeper analysis, researchers used data of demand and universe of discourse U varying at FTS to get various result based on test data used.

  7. The Effect of Vendor Trustworthiness toward Online Purchase Intention through Costumer Trust

    Directory of Open Access Journals (Sweden)

    Michael Adiwijaya

    2014-12-01

    Full Text Available The using of internet technology in business field facilitates the online product sales. There are many challenges and obstacles faced by customers when they would like to buy product via online, for instance the process of technology adoption, online crime activities, etc. This situation creates customer doubtfullness and worries for engaging in purchasing product via online. Trust plays significant role in affecting customer intention to purchase products via online. The previous research findings showed the antecedents of customer trust but those findings only explained the phenomenon based on one single perspective for example from the customer perspective, the technology perspective, and the vendor perspective. The focus of this research is analyzing the influence of vendor trustworthiness (ability, benevolence, and integrity towards individual features (customer trust and customer purchase intention. The research has been done in Surabaya through questionairre survey design by using the customers who had purchase product via online as the respondent. Structural equation modelling is used to analyze the research data. The findings revealed the antecendent of customer trust and its influence on customer online purchase intention comprehensively.

  8. Information technology resource management in radiation oncology.

    Science.gov (United States)

    Siochi, R Alfredo; Balter, Peter; Bloch, Charles D; Bushe, Harry S; Mayo, Charles S; Curran, Bruce H; Feng, Wenzheng; Kagadis, George C; Kirby, Thomas H; Stern, Robin L

    2009-09-02

    The ever-increasing data demands in a radiation oncology (RO) clinic require medical physicists to have a clearer understanding of the information technology (IT) resource management issues. Clear lines of collaboration and communication among administrators, medical physicists, IT staff, equipment service engineers and vendors need to be established. In order to develop a better understanding of the clinical needs and responsibilities of these various groups, an overview of the role of IT in RO is provided. This is followed by a list of IT related tasks and a resource map. The skill set and knowledge required to implement these tasks are described for the various RO professionals. Finally, various models for assessing one's IT resource needs are described. The exposition of ideas in this white paper is intended to be broad, in order to raise the level of awareness of the RO community; the details behind these concepts will not be given here and are best left to future task group reports.

  9. Outsourcing Maintenance Operations to Off-Shore Vendors: Some Lessons from the Field

    OpenAIRE

    Sam Ramanujan; Hal Lou

    1997-01-01

    Ever since Eastman Kodak announced that it was outsourcing its information systems (IS) function in 1988 to IBM, DEC and Businessland, large companies have found it acceptable to transfer their IS assets, leases and staff to third party vendors. In the recent past, there is a trend towards selective sourcing in which organizations opt to use third party vendors for certain IS functions which represent 20-60% of the IS budget while still retaining a substantial internal IS department. This pap...

  10. Materials management information systems.

    Science.gov (United States)

    1996-01-01

    The hospital materials management function--ensuring that goods and services get from a source to an end user--encompasses many areas of the hospital and can significantly affect hospital costs. Performing this function in a manner that will keep costs down and ensure adequate cash flow requires effective management of a large amount of information from a variety of sources. To effectively coordinate such information, most hospitals have implemented some form of materials management information system (MMIS). These systems can be used to automate or facilitate functions such as purchasing, accounting, inventory management, and patient supply charges. In this study, we evaluated seven MMISs from seven vendors, focusing on the functional capabilities of each system and the quality of the service and support provided by the vendor. This Evaluation is intended to (1) assist hospitals purchasing an MMIS by educating materials managers about the capabilities, benefits, and limitations of MMISs and (2) educate clinical engineers and information system managers about the scope of materials management within a healthcare facility. Because software products cannot be evaluated in the same manner as most devices typically included in Health Devices Evaluations, our standard Evaluation protocol was not applicable for this technology. Instead, we based our ratings on our observations (e.g., during site visits), interviews we conducted with current users of each system, and information provided by the vendor (e.g., in response to a request for information [RFI]). We divided the Evaluation into the following sections: Section 1. Responsibilities and Information Requirements of Materials Management: Provides an overview of typical materials management functions and describes the capabilities, benefits, and limitations of MMISs. Also includes the supplementary article, "Inventory Cost and Reimbursement Issues" and the glossary, "Materials Management Terminology." Section 2. The

  11. Information partnerships--shared data, shared scale.

    Science.gov (United States)

    Konsynski, B R; McFarlan, F W

    1990-01-01

    How can one company gain access to another's resources or customers without merging ownership, management, or plotting a takeover? The answer is found in new information partnerships, enabling diverse companies to develop strategic coalitions through the sharing of data. The key to cooperation is a quantum improvement in the hardware and software supporting relational databases: new computer speeds, cheaper mass-storage devices, the proliferation of fiber-optic networks, and networking architectures. Information partnerships mean that companies can distribute the technological and financial exposure that comes with huge investments. For the customer's part, partnerships inevitably lead to greater simplification on the desktop and more common standards around which vendors have to compete. The most common types of partnership are: joint marketing partnerships, such as American Airline's award of frequent flyer miles to customers who use Citibank's credit card; intraindustry partnerships, such as the insurance value-added network service (which links insurance and casualty companies to independent agents); customer-supplier partnerships, such as Baxter Healthcare's electronic channel to hospitals for medical and other equipment; and IT vendor-driven partnerships, exemplified by ESAB (a European welding supplies and equipment company), whose expansion strategy was premised on a technology platform offered by an IT vendor. Partnerships that succeed have shared vision at the top, reciprocal skills in information technology, concrete plans for an early success, persistence in the development of usable information for all partners, coordination on business policy, and a new and imaginative business architecture.

  12. CVFA: Coal vendor financial advisor

    International Nuclear Information System (INIS)

    Goote, W.G.; Andersen, S.

    1992-01-01

    An expert system for determining coal vendor financial viability in fuel purchasing contracts at an electric utility is described. The system blends rules, data objects, and financial knowledge to provide a rational basis for accepting or rejecting coal contracts given the financial capability of the coal vendor. The discussion concludes with a critique of managerial issues in the development of the system and its use in decision making. 3 refs., 1 fig

  13. How often and under which circumstances do Mexican pharmacy vendors recommend misoprostol to induce an abortion?

    Science.gov (United States)

    Lara, Diana; García, Sandra G; Wilson, Kate S; Paz, Francisco

    2011-06-01

    Misoprostol was used by women across Mexico to induce abortion even before 2007, when first-trimester abortion was legalized in Mexico City. Pharmacy vendors' misoprostol recommendation practices across subregions of Mexico after abortion legalization warrant examination. Overall, 192 pharmacies in four regions of Mexico were randomly selected and visited by simulated clients presenting three scenarios (a young woman, an adult woman and a male partner). Bivariate and multivariate analyses were used to explore associations between pharmacy, vendor and client characteristics and drug access. In 558 encounters with simulated clients, 78% of vendors provided information about misoprostol-18% recommended it spontaneously and 60% recommended it only after the client asked specifically for the drug. Fifteen percent of vendors recommended a potentially effective misoprostol dosing regimen. Mexico City-based pharmacies and those in the Central region were significantly less likely than those in the North region to require a prescription to sell misoprostol (odds ratios, 0.2 and 0.3, respectively). Independent pharmacies and those from low-?income areas were significantly more likely to sell misoprostol by the pill than chain pharmacies and those in medium-income areas (3.2 and 2.7, respectively). Access to misoprostol is influenced by neighborhood socioeconomic level, pharmacy location and pharmacy type. The frequently inaccurate and incomplete information provided to clients about using misoprostol for abortion suggests the need to improve pharmacy vendor training in medication abortion options and to develop ways to directly inform women about misoprostol use.

  14. DEVELOPING VENDOR IMPROVEMENT PROGRAM IN MALAYSIA AUTOMOTIVE COMPANY

    Directory of Open Access Journals (Sweden)

    SHUKRIAH ABDULLAH

    2016-04-01

    Full Text Available Improvement Program seek to do evaluation well, request to become sufficiently versed in evaluation or to integrate on improvement perspective in all phase of performance, from needs assessment to implementation and evaluation itself. The purpose of this program in the automotive company is to assist vendor as global manufacturer in preparation towards ASEAN Free Trade Agreement (AFTA 2015. This development vendor improvement program emphasize on the downtime reduction to below 200 minutes per month with the ultimate end of improving not only program or solutions but also the organizations and customer. A practical approach either planned or unplanned by the automotive company require policies and procedures that address the same consideration on the downtime identification. 20 top bottom rank vendor were determined based on the downtime performance, followed by classification into different group based on severity. To execute the vendor improvement program three among 20 top bottom rank vendors were selected due to willingness to participate and ease of data access in the program. Selected vendors have high ranking in terms of downtime. The case study method involved an interview and plant observation. The used of secondary data from the automotive company, and previous researcher are also utilised. This improvement program assists the automobile manufacturer to improve its supplier’s performance. The vendor improvement program is implemented through a whole supplier operation assessment.

  15. An Analysis of DOD Fraudulent Vendor Payments

    National Research Council Canada - National Science Library

    Jones-Oxendine, Shawn

    1999-01-01

    ...) known DoD fraudulent vendor cases in light of their management control weaknesses. A high risk of fraudulent vendor payments were present in the DoD, pre-DFAS finance and accounting systems and the current DFAS configuration...

  16. Pursuing a Vendor-Endorsed ERP Award for Better Job Prospect: Students' Perceptions

    Science.gov (United States)

    Kung, LeeAnn; Kung, Hsiang-Jui

    2017-01-01

    This paper identifies factors that motivate students to pursue a vendor-endorsed ERP award by integrating concepts from motivation theory and constructs from technology acceptance literature. We developed a web-based survey with closed- and open-ended questions to collect both quantitative and qualitative data, respectively. Students in…

  17. Implant vendors and hospitals: competing influences over product choice by orthopedic surgeons.

    Science.gov (United States)

    Burns, Lawton R; Housman, Michael G; Booth, Robert E; Koenig, Aaron

    2009-01-01

    Vendors of hip and knee implants court orthopedic surgeons to adopt their products. Hospitals, which have to pay for these products, now court the same surgeons to help reduce the number of vendors and contain implant costs. This study measures the surgeon's perceived alignment of interests with both vendors and hospitals and gauges surgeons' exposure and receptivity to hospital cost-containment efforts. We surveyed all practicing orthopedists performing 12 or more implant procedures annually in Pennsylvania. The survey identified the surgeon's preferred vendor, tenure with that vendor, use of the vendor during residency training, receipt of financial payments from the vendor, alignment of interests with both vendor and hospital stakeholders, and exposure and receptivity to hospital cost-containment efforts. Surgeons have long-standing relationships with implant vendors, but only a small proportion receive financial payments. Surgeons align most closely with the vendor's sales representative and least closely with the hospital's purchasing manager. Paradoxically, surgeons support hospital efforts to limit the number of vendors but report that their own choice of vendor is not constrained. The major drivers of surgeons' alignment and stance toward cost containment are their tenure with and receipt of financial payments from the vendor. Hospitals face a competitive disadvantage in capturing the attention of orthopedists, compared with implant vendors. The vendors' advantage stems from historical, financial, and service benefits offered to surgeons. Hospital executives now seek to offer comparable benefits to surgeons.

  18. MDEP Protocol VICWG-01. MDEP Protocol: Witnessed, Joint, and Multinational Vendor Inspection Protocol

    International Nuclear Information System (INIS)

    2014-01-01

    The Multinational Design Evaluation Programme (MDEP) was launched in 2006 by the US Nuclear Regulatory Commission (NRC) and the French Nuclear Safety Authority (ASN) with the aim of developing innovative approaches to leverage the resources and knowledge of national regulatory authorities reviewing new reactor designs. MDEP full members are regulators from Canada, People's Republic of China, Finland, France, India, Japan, Republic of Korea, Russian Federation, South Africa, Sweden, the United Kingdom and the United States of America. The United Arab Emirates and Turkey are associate members. The OECD Nuclear Energy Agency (NEA) acts as the Technical Secretariat for the MDEP. The International Atomic Energy Agency (IAEA) participates in many of the MDEP activities, including harmonisation efforts. The Vendor Inspection Cooperation Working Group (VICWG) is one of the issue-specific working groups that the MDEP members are undertaking with one long term goal of the VICWG being to maximize the use of the results obtained from other regulator's efforts in inspecting vendors. To accomplish this goal, it is vital that the regulators learn about each other's procedures, processes, and regulations. To facilitate the learning process the VICWG is coordinating vendor inspections among the involved regulatory authorities with the purpose of enhancing the understanding of each other's vendor inspection procedures. This programme is administered by the NEA. Involvement in specific inspections provides a number of opportunities for member state regulators to witness other regulators' inspection methods, gain useful information on the quality systems and manufacturing arrangements of specific vendors and where appropriate, actively participate in the inspection. The purpose of this protocol is to provide guidance to regulators that wish to carry out vendor inspections or participate in or witness other regulators' vendor inspections. It also provides

  19. Vendor neutral archive in PACS

    International Nuclear Information System (INIS)

    Agarwal, Tapesh Kumar; Sanjeev

    2012-01-01

    An archive is a location containing a collection of records, documents, or other materials of historical importance. An integral part of Picture Archiving and Communication System (PACS) is archiving. When a hospital needs to migrate a PACS vendor, the complete earlier data need to be migrated in the format of the newly procured PACS. It is both time and money consuming. To address this issue, the new concept of vendor neutral archive (VNA) has emerged. A VNA simply decouples the PACS and workstations at the archival layer. This is achieved by developing an application engine that receives, integrates, and transmits the data using the different syntax of a Digital Imaging and Communication in Medicine (DICOM) format. Transferring the data belonging to the old PACS to a new one is performed by a process called migration of data. In VNA, a number of different data migration techniques are available to facilitate transfer from the old PACS to the new one, the choice depending on the speed of migration and the importance of data. The techniques include simple DICOM migration, prefetch-based DICOM migration, medium migration, and the expensive non-DICOM migration. “Vendor neutral” may not be a suitable term, and “architecture neutral,” “PACS neutral,” “content neutral,” or “third-party neutral” are probably better and preferred terms. Notwithstanding this, the VNA acronym has come to stay in both the medical IT user terminology and in vendor nomenclature, and radiologists need to be aware of its impact in PACS across the globe

  20. Do vendors benefit from promotions in a multi-vendor loyalty program?

    NARCIS (Netherlands)

    Dorotic, Matilda; Fok, Dennis; Verhoef, Peter C.; Bijmolt, Tammo H. A.

    The growing trend of networking in recent years has led to an increase in number of loyalty program partnerships, most notably multi-vendor loyalty programs (MVLP). In an MVLP (as in other types of LPs), cardholders frequently receive promotional mailings intended to increase sales at the

  1. Do vendors benefit from promotions in a multi-vendor loyalty program?

    NARCIS (Netherlands)

    M. Dorotic (Matilda); D. Fok (Dennis); P.C. Verhoef (Peter); T.H.A. Bijmolt (Tammo)

    2011-01-01

    textabstractThe growing trend of networking in recent years has led to an increase in number of loyalty program partnerships, most notably multi-vendor loyalty programs (MVLP). In an MVLP (as in other types of LPs), cardholders frequently receive promotional mailings intended to increase sales at

  2. Do vendors benefit from promotions in a multi-vendor loyalty program?

    NARCIS (Netherlands)

    Dorotic, Matilda; Fok, Dennis; Verhoef, Peter C.; Bijmolt, Tammo H. A.

    2011-01-01

    The growing trend of networking in recent years has led to an increase in number of loyalty program partnerships, most notably multi-vendor loyalty programs (MVLP). In an MVLP (as in other types of LPs), cardholders frequently receive promotional mailings intended to increase sales at the

  3. Natural language processing-based COTS software and related technologies survey.

    Energy Technology Data Exchange (ETDEWEB)

    Stickland, Michael G.; Conrad, Gregory N.; Eaton, Shelley M.

    2003-09-01

    Natural language processing-based knowledge management software, traditionally developed for security organizations, is now becoming commercially available. An informal survey was conducted to discover and examine current NLP and related technologies and potential applications for information retrieval, information extraction, summarization, categorization, terminology management, link analysis, and visualization for possible implementation at Sandia National Laboratories. This report documents our current understanding of the technologies, lists software vendors and their products, and identifies potential applications of these technologies.

  4. OPC model generation procedure for different reticle vendors

    Science.gov (United States)

    Jost, Andrew M.; Belova, Nadya; Callan, Neal P.

    2003-12-01

    The challenge of delivering acceptable semiconductor products to customers in timely fashion becomes more difficult as design complexity increases. The requirements of current generation designs tax OPC engineers greater than ever before since the readiness of high-quality OPC models can delay new process qualifications or lead to respins, which add to the upward-spiraling costs of new reticle sets, extend time-to-market, and disappoint customers. In their efforts to extend the printability of new designs, OPC engineers generally focus on the data-to-wafer path, ignoring data-to-mask effects almost entirely. However, it is unknown whether reticle makers' disparate processes truly yield comparable reticles, even with identical tools. This approach raises the question of whether a single OPC model is applicable to all reticle vendors. LSI Logic has developed a methodology for quantifying vendor-to-vendor reticle manufacturing differences and adapting OPC models for use at several reticle vendors. This approach allows LSI Logic to easily adapt existing OPC models for use with several reticle vendors and obviates the generation of unnecessary models, allowing OPC engineers to focus their efforts on the most critical layers.

  5. Biodetection Technologies for First Responders: 2014 Edition

    Energy Technology Data Exchange (ETDEWEB)

    Ozanich, Richard M.; Baird, Cheryl L.; Bartholomew, Rachel A.; Colburn, Heather A.; Straub, Tim M.; Bruckner-Lea, Cindy J.

    2014-03-28

    This report summarizes commercially-available, hand-portable technologies that can be used by first responders in the field. This is not meant to be an exhaustive list, nor an endorsement of any technology described herein. Rather, this report is meant to provide useful information about available technologies to help end-users make informed decisions about biodetection technology procurement and use. Information listed in this report is primarily vendor-provided; however, where possible it has been supplemented with additional information obtained from publications, reports, and websites. Manufacturers were given the chance to review summaries of their technologies from August through November 2013 to verify the accuracy of technical specifications, available references, and pricing.

  6. Downsizing information systems : framing the issues for the Office of Naval Intelligence (ONI)

    OpenAIRE

    Hutson, Peter M.

    1994-01-01

    Downsizing information systems from large and centralized mainframe computing architectures to smaller and distributed desktop systems is one of the most difficult and critical strategic decisions facing both corporate and government organizations. Vendor advertisements and media hype often boast of huge cost savings and greater flexibility while retaining mainframe-strength performance. Cryptic terminology, biased vendor assistance, and rapidly changing technology complicate already difficul...

  7. Patient safety goals for the proposed Federal Health Information Technology Safety Center.

    Science.gov (United States)

    Sittig, Dean F; Classen, David C; Singh, Hardeep

    2015-03-01

    The Office of the National Coordinator for Health Information Technology is expected to oversee creation of a Health Information Technology (HIT) Safety Center. While its functions are still being defined, the center is envisioned as a public-private entity focusing on promotion of HIT related patient safety. We propose that the HIT Safety Center leverages its unique position to work with key administrative and policy stakeholders, healthcare organizations (HCOs), and HIT vendors to achieve four goals: (1) facilitate creation of a nationwide 'post-marketing' surveillance system to monitor HIT related safety events; (2) develop methods and governance structures to support investigation of major HIT related safety events; (3) create the infrastructure and methods needed to carry out random assessments of HIT related safety in complex HCOs; and (4) advocate for HIT safety with government and private entities. The convening ability of a federally supported HIT Safety Center could be critically important to our transformation to a safe and effective HIT enabled healthcare system. © The Author 2014. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  8. 34 CFR 395.33 - Operation of cafeterias by blind vendors.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 2 2010-07-01 2010-07-01 false Operation of cafeterias by blind vendors. 395.33... BLIND ON FEDERAL AND OTHER PROPERTY Federal Property Management § 395.33 Operation of cafeterias by blind vendors. (a) Priority in the operation of cafeterias by blind vendors on Federal property shall be...

  9. The changing refinery/vendor relationship: One tool for increased competitiveness

    International Nuclear Information System (INIS)

    Borowski, C.J.; Swett, G.H.

    1996-01-01

    The historic relationship between many petroleum refineries and vendors was adversarial. However, during the past 10 years, many industrial firms have found that working together with vendors is critical to reducing costs and improving quality--the two key elements required to maintain a competitive position. As refiners have begun working with their vendors more like partners, numerous benefits have accrued to the refining industry. This paper analyzes how the refiner-vendor relationship has changed. Specifically, the authors address the following issues: the competitive threat that has forced a different approach to contracting services and goods; how right-sizing and capacity creep have contributed to the need to re-examine historic practices; key elements in a successful refinery/vendor relationship; how does it work in real life; and implementing a partnering program

  10. Inventory Control System by Using Vendor Managed Inventory (VMI)

    Science.gov (United States)

    Sabila, Alzena Dona; Mustafid; Suryono

    2018-02-01

    The inventory control system has a strategic role for the business in managing inventory operations. Management of conventional inventory creates problems in the stock of goods that often runs into vacancies and excess goods at the retail level. This study aims to build inventory control system that can maintain the stability of goods availability at the retail level. The implementation of Vendor Managed Inventory (VMI) method on inventory control system provides transparency of sales data and inventory of goods at retailer level to supplier. Inventory control is performed by calculating safety stock and reorder point of goods based on sales data received by the system. Rule-based reasoning is provided on the system to facilitate the monitoring of inventory status information, thereby helping the process of inventory updates appropriately. Utilization of SMS technology is also considered as a medium of collecting sales data in real-time due to the ease of use. The results of this study indicate that inventory control using VMI ensures the availability of goods ± 70% and can reduce the accumulation of goods ± 30% at the retail level.

  11. 34 CFR 395.14 - The State Committee of Blind Vendors.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 2 2010-07-01 2010-07-01 false The State Committee of Blind Vendors. 395.14 Section... BLIND ON FEDERAL AND OTHER PROPERTY The State Licensing Agency § 395.14 The State Committee of Blind... Blind Vendors which, to the extent possible, shall be fully representative of all blind vendors in the...

  12. Strategic use of information and communication technology in valve program management

    International Nuclear Information System (INIS)

    Jakubaitis, V.; Lahey, C

    2012-01-01

    Today it is hard to imagine a time without the internet and the ability to access maintenance manuals, source qualified vendors and research OPEX from utilities a continent away. We do so daily from the comfort of our desk; a few clicks of our mouse and we find everything we need to efficiently plan and execute every aspect of operating and maintaining critical nuclear valves. We assemble our valve work ‘packages’ and print the resultant information for the technician in the field. At the point we hit print, we disconnect our technicians from that information and ourselves from their progress. Employing the paper copy, resources are tasked with the execution of complex valve work in the field. Cumbersome hand offs between stakeholders responsible for different processes jeopardize schedule adherence while front line supervisors attempt to keep everyone up to date, often removing them from a critical task. Occasionally these paper packages are lost or destroyed or found to be missing information, placing daily activities at risk. Leveraging information and communications technology in a Valve Program can significantly change how we operate. The technology exists to ensure field resources have the most up-to-date information. We can be auto-notified when crucial steps are completed, know in advance if additional resources are required or analyze the time it takes to complete critical evolutions. Quality can be improved lessening the need for expensive re-work, workface efficiency and general productivity can also greatly benefit. We can prevent ‘hold’ points from being missed; ensure the correct revision of a procedure is employed or accurately predict when other work can begin. All this accomplished without having our field staff redirect their focus to update management. Technology based tools are slowly moving into our powerhouses and its time we took advantage to properly manage our Valve Programs. (author)

  13. Information Technology Research Services: Powerful Tools to Keep Up with a Rapidly Moving Field

    Science.gov (United States)

    Hunter, Paul

    2010-01-01

    Marty firms offer Information Technology Research reports, analyst calls, conferences, seminars, tools, leadership development, etc. These entities include Gartner, Forrester Research, IDC, The Burton Group, Society for Information Management, 1nfoTech Research, The Corporate Executive Board, and so on. This talk will cover how a number of such services are being used at the Goddard Space Flight Center to improve our IT management practices, workforce skills, approach to innovation, and service delivery. These tools and services are used across the workforce, from the executive leadership to the IT worker. The presentation will cover the types of services each vendor provides and their primary engagement model. The use of these services at other NASA Centers and Headquarters will be included. In addition, I will explain how two of these services are available now to the entire NASA IT workforce through enterprise-wide subscriptions.

  14. Decontamination, decommissioning, and vendor advertorial issue, 2008

    Energy Technology Data Exchange (ETDEWEB)

    Agnihotri, Newal (ed.)

    2008-07-15

    The focus of the July-August issue is on Decontamination, decommissioning, and vendor advertorials. Articles and reports in this issue include: D and D technical paper summaries; The role of nuclear power in turbulent times, by Tom Chrisopher, AREVA, NP, Inc.; Enthusiastic about new technologies, by Jack Fuller, GE Hitachi Nuclear Energy; It's important to be good citizens, by Steve Rus, Black and Veatch Corporation; Creating Jobs in the U.S., by Guy E. Chardon, ALSTOM Power; and, and, An enviroment and a community champion, by Tyler Lamberts, Entergy Nuclear Operations, Inc. The Industry Innovations article is titled Best of the best TIP achievement 2008, by Edward Conaway, STP Nuclear Operating Company.

  15. Vendor-to-vendor education to improve malaria treatment by private drug outlets in Bungoma District, Kenya

    Directory of Open Access Journals (Sweden)

    Makama Sammy

    2003-05-01

    Full Text Available Abstract Background Private outlets are the main suppliers of uncomplicated malaria treatment in Africa. However, they are so numerous that they are difficult for governments to influence and regulate. This study's objective was to evaluate a low-cost outreach education (vendor-to-vendor programme to improve the private sector's compliance with malaria guidelines in Bungoma district, Kenya. The cornerstone of the programme was the district's training of 73 wholesalers who were equipped with customized job aids for distribution to small retailers. Methods Six months after training the wholesalers, the programme was evaluated using mystery shoppers. The shoppers posed as caretakers of sick children needing medication at 252 drug outlets. Afterwards, supervisors assessed the outlets' knowledge, drug stocks, and prices. Results The intervention seems to have had a significant impact on stocking patterns, malaria knowledge and prescribing practices of shops/kiosks, but not consistently on other types of outlets. About 32% of shops receiving job aids prescribed to mystery shoppers the approved first-line drug, sulfadoxine-pyremethamine, as compared to only 3% of the control shops. In the first six months, it is estimated that 500 outlets were reached, at a cost of about $8000. Conclusions Changing private sector knowledge and practices is widely acknowledged to be slow and difficult. The vendor-to-vendor programme seems a feasible district-level strategy for achieving significant improvements in knowledge and practices of shops/kiosks. However, alternate strategies will be needed to influence pharmacies and clinics. Overall, the impact will be only moderate unless national policies and programmes are also introduced.

  16. Comparison of Two Buyer-Vendor Coordination Models

    Science.gov (United States)

    Diar Astanti, Ririn; Ai, The Jin; Gong, Dah-Chuan; Luong, Hunyh Trung

    2018-03-01

    This paper develops and compares two mathematical models for describing situation in coordination of buyer and vendor. In this case the vendor which is an Original Equipment Manufacturers (OEMS) of automotive parts, are supplying different type of buyers, i.e. automotive industry, repair shop and automotive dealers. It is well known that automotive industries are operated in Just in Time (JIT) Production Environment, so that the demand behaviour from this buyer has different characteristics than the demand behaviour from other buyers. Two mathematical models are developed in order to depict two different manufacturing strategies as the vendor response dealing with different type of buyers. These strategies are dividing production lot size for each type of buyer and consolidating all buyer’s demand in to single production lot size.

  17. Structuring vendor-client relationships–a combinatorial approach

    DEFF Research Database (Denmark)

    Volani, Natalia; Herbert-Hansen, Zaza Nadja Lee

    a framework leading to a heuristically determined optimal solution for a company. Design/methodology/approach –Weighting Factor Comparison (WFC) and scale metrics are used in order to holistically determine a firm’s position regarding relationships with potential vendors. Each contributing factor is analyzed...... separately using different sub-frameworks, both qualitative and quantitative. Eventually a score is provided, which will be used as input for the holistic framework for the realization of the analysis. Data from a case study of a large multinational company and its relationship with three of its vendors has...... been used for validation purposes, whereas other factors have been compared to empirical data from literature research. Findings – The framework presented combines various approaches when handling vendor-client relationships and, therefore, minimizes subjectivity. The factors that have been proven...

  18. Deployment of vendor capabilities and competences throughout the outsourcing process

    DEFF Research Database (Denmark)

    Perunovic, Zoran; Christoffersen, Mads; Mefford, Robert N.

    2012-01-01

    Purpose - A vendor's capabilities are recognized as one of the most important factors for success in outsourcing. However, there is a lack of understanding of how vendors manage their capabilities throughout the outsourcing process. With an aim to contribute to filling this existing gap......, the purpose of this paper is to explore how vendors deploy their capabilities in order to win, run and renew the outsourcing contracts. Design/methodology/approach - The research question has been derived by integrating a resource-based view theory with a model of a vendor's process in outsourcing. A multiple......-case study of three contract electronic manufacturers has been employed to explore the research question. Findings - The results show that for achieving their outsourcing objectives, vendors use different capability mixes: the winning, the running, and the renewing. These mixes are created through...

  19. 29 CFR 99.210 - Subrecipient and vendor determinations.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Subrecipient and vendor determinations. 99.210 Section 99.210 Labor Office of the Secretary of Labor AUDITS OF STATES, LOCAL GOVERNMENTS, AND NON-PROFIT ORGANIZATIONS Audits § 99.210 Subrecipient and vendor determinations. (a) General. An auditee may be a recipient...

  20. 77 FR 42738 - Request for Information on Quality Measurement Enabled by Health IT

    Science.gov (United States)

    2012-07-20

    ... Information on Quality Measurement Enabled by Health IT AGENCY: Agency for Healthcare Research and Quality... diversified stakeholders (health information technology (IT) system developers, including vendors; payers... strategies and challenges regarding quality measurement enabled by health IT. Quality measurement--the...

  1. Energy Technology Solutions: Public-Private Partnerships Transforming Industry - December 2010

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2010-12-01

    AMO's research and development partnerships with industry have resulted in more than 220 technologies and other solutions that can be purchased today. This document includes a description of each solution, its benefits, and vendor contact information. The document also identifies emerging technologies and other resources to help industry save energy.

  2. Assessing market competition and vendors' size and scope on AlphaBay.

    Science.gov (United States)

    Paquet-Clouston, Masarah; Décary-Hétu, David; Morselli, Carlo

    2018-04-01

    Since 2011, drug market participants have traded illegal drugs through cryptomarkets, a user-friendly infrastructure in which drug market participants can conduct business transactions. This study assesses market competition and the size and scope of drug vendors' activities on one of the largest cryptomarkets, AlphaBay, in order to better understand the challenges that drug vendors face when selling on this venue. Relying on data collected from AlphaBay, we calculate the degree of competition within the drug market using the Herfindhal-Hirshmann Index (HHI). We then follow a micro analytical approach and assess the size and scope of vendors' accounts. This is done by evaluating each vendor's market share over time using a group-based trajectory model (GBTM). Results from the GBTM are then used to assess vendors' exposure, diversity and experience based on their selling position in the market. The HHI scores demonstrate that cryptomarkets offer a highly competitive environment that fits in a top-heavy market structure. However, the distribution of vendors' market share trajectories shows that only a small portion of vendors (referred to as high-level vendors) succeed in generating regular sales, whereas the majority of vendors are relegated to being mere market spectators with almost zero sales. This inequality is exacerbated by the aggressive advertising of high-level vendors who post many listings. Overall, product diversity and experience is limited for all market participants regardless of their level of success. We interpret these results through Reuter's work on traditional illegal markets, e-commerce studies and the growing field of cryptomarket research. We conclude that, while offering a new venue for illegal drug transactions, in many ways, the economics of cryptomarkets for drug dealing are consistent with Reuter's classic assessment of illegal markets and the consequences of product illegality that underlie it. Cryptomarkets conflicting features, a

  3. Deployment of vendor innovation capability in contract electronic manufacturing

    DEFF Research Database (Denmark)

    Perunovic, Zoran; Mefford, Robert N.

    2012-01-01

    This paper explores deployment of innovation capability in outsourcing from the vendor perspective. Vendor’s innovation-related competences are used to capture vendor innovativeness. A multiple-case study was applied with two Contract Electronic Manufacturers. Based on the data analysis we propose...

  4. Portfolio allocation under the vendor managed inventory: A Markov ...

    African Journals Online (AJOL)

    Portfolio allocation under the vendor managed inventory: A Markov decision process. ... Journal of Applied Sciences and Environmental Management ... This study provides a review of Markov decision processes and investigates its suitability for solutions to portfolio allocation problems under vendor managed inventory in ...

  5. The Effect of Vendor Trustworthiness toward Online Purchase Intention through Costumer Trust (P.189-197

    Directory of Open Access Journals (Sweden)

    Michael Adiwijaya

    2016-03-01

    Full Text Available The using of internet technology in business field facilitates the online product sales. There are many challenges and obstacles faced by customers when they would like to buy product via online, for instance the process of technology adoption, online crime activities, etc. This situation creates customer doubtfullness and worries for engaging in purchasing product via online. Trust plays significant role in affecting customer intention to purchase products via online. The previous research findings showed the antecedents of customer trust but those findings only explained the phenomenon based on one single perspective for example from the customer perspective, the technology perspective, and the vendor perspective. The focus of this research is analyzing the influence of vendor trustworthiness (ability, benevolence, and integrity towards individual features (customer trust and customer purchase intention. The research has been done in Surabaya through questionairre survey design by using the customers who had purchase product via online as the respondent. Structural equation modelling is used to analyze the research data. The findings revealed the antecendent of customer trust and its influence on customer online purchase intention comprehensively.Keywords: Ability, Benevolence, Integrity, Consumer Trust, Purchase Intention, Online

  6. An integrated vendor-buyer model with stock-dependent demand

    DEFF Research Database (Denmark)

    Sajadieh, Mohsen S.; Thorstenson, Anders; Akbari Jokar, Mohammad R.

    in a display area. The end-customer demand is assumed to be positively dependent on the amount of items shown in the display area. With the proposed model we determine the buyer's optimal shipment quantity and number of shipments, as well as the vendor's optimal production batch. The objective is to maximize...... total supply chain profit. The numerical analysis shows that it is more profitable for the buyer and the vendor to cooperate in situations when the demand is more stock-dependent. The analysis also shows the effect of double marginalization in this integrated vendor-buyer model....

  7. An integrated vendor-buyer model with stock-dependent demand

    DEFF Research Database (Denmark)

    Sajadieh, Mohsen S.; Thorstenson, Anders; Akbari Jokar, Mohammad R.

    2010-01-01

    We develop an integrated vendor-buyer model for a two-stage supply chain. The vendor manufactures the product and delivers it in a number of equal-sized batches to the buyer. The items delivered are presented to the end customers in a display area. Demand is assumed to be positively dependent...... on the amount of items displayed. The objective is to maximize total supply chain profit. The numerical analysis shows that buyer-vendor coordination is more profitable in situations when demand is more stock dependent. It also shows that the effect of double marginalization provides a link between the non...

  8. An Integrated Vendor-Buyer Model with Stock-Dependent Demand

    DEFF Research Database (Denmark)

    Thorstenson, Anders; Sajadieh, Mohsen S.; Akbari Jokar, Mohammad R.

    2009-01-01

    in the buyer's warehouse. The demand is assumed to be positively dependent on the amount of items shown in the display area. The proposed model determines the buyer's optimal shipment quantity and number of shipments, as well as the vendor's optimal production batch. The objective is to maximize total supply......-chain profit. The numerical analysis shows that as long as the maximum display area is not used, it is more valuable for the buyer and the vendor to cooperate in situations when the demand is more stock- dependent. It also shows the effect of double marginalization in this integrated vendor-buyer model....

  9. Allegheny County WIC Vendor Locations

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset contains the locations of Women, Infants, and Children (WIC) program vendors. If viewing this description on the Western Pennsylvania Regional Data...

  10. Blastocystis hominis among food vendors in Xochimilco markets.

    Science.gov (United States)

    Cruz Licea, Verónica; Plancarte Crespo, Agustín; Morán Alvarez, Cristina; Valencia Rojas, Silvia; Rodríguez Sásnchez, Gustavo; Vega Franco, Leopoldo

    2003-01-01

    Blastocystis hominis is a pathogenic protozoon that lives in the human bowel and causes diarrhea: the mode of transmission is a passive one, through the ingestion of stool-contaminated water or foods that contain infective forms of the parasite. The purpose of this study is to report the prevalence of Blastocystis hominis among food vendors in the markets within the Xochimilco jurisdiction, Mexico City, Mexico. A cross-sectional study was conducted in which food vendors answered an epidemiological questionnaire and underwent a serial stool culture. The frequency of the intestinal parasitoses reported was estimated and an analysis was carried out associating the presence of Blastocystis hominis with socio-economic and hygienic factors using the odds ratio at a 95% confidence interval. The frequency of intestinal parasites and commensals was 50.4%; Blastocystis hominis was found in 48 (41.7%) food vendors. The risk analysis showed that Blastocystis hominis was associated with: male gender, poor personal hygiene habits, personal history of parasitosis, and family history of parasitosis. The prevalence reported is high when compared with other populations studied. The relevance of this report lies on the fact that food vendors handle foods and could transmit the infection to consumers.

  11. Business challenges in the vendor community. Panel Discussion

    International Nuclear Information System (INIS)

    Stamm, Steve; Sauger, John; Marano, Mark; Shave, Dana; Pierce, Robert; Smiarowski, Michael W.

    2001-01-01

    Full text of publication follows: The nuclear business community is undergoing immense changes and challenges due to consolidation of the power industry and plant owners, shifts in the needs of plant owners, addition of new competitors, loss of old competitors, aging of the workforce, loss of personnel to competing industries, and the advances in electronic communications. These changes have significantly perturbed existing business models and relationships in the nuclear industry as well as the broader power, engineering, construction, equipment, and commodities fields. Vendors have responded to these challenges in a number of different ways. The participants for this panel have been selected from a diverse set of vendor organization types so that a broad spectrum of evaluation and approaches will be discussed. The participants in this panel discussion will provide insights into their views of the challenges to a successful nuclear business. They will provide insights into the expectations and approaches by each party in the client vendor relationship. Also discussed will be an overview of the strategies that each panelist views as potential success paths to nurture and grow the client-vendor relationship today with their insights into the future. (authors)

  12. User Manuals for a Primary Care Electronic Medical Record System: A Mixed Methods Study of User- and Vendor-Generated Documents.

    Science.gov (United States)

    Shachak, Aviv; Dow, Rustam; Barnsley, Jan; Tu, Karen; Domb, Sharon; Jadad, Alejandro R; Lemieux-Charles, Louise

    2013-06-04

    Tutorials and user manuals are important forms of impersonal support for using software applications including electronic medical records (EMRs). Differences between user- and vendor documentation may indicate support needs, which are not sufficiently addressed by the official documentation, and reveal new elements that may inform the design of tutorials and user manuals. What are the differences between user-generated tutorials and manuals for an EMR and the official user manual from the software vendor? Effective design of tutorials and user manuals requires careful packaging of information, balance between declarative and procedural texts, an action and task-oriented approach, support for error recognition and recovery, and effective use of visual elements. No previous research compared these elements between formal and informal documents. We conducted an mixed methods study. Seven tutorials and two manuals for an EMR were collected from three family health teams and compared with the official user manual from the software vendor. Documents were qualitatively analyzed using a framework analysis approach in relation to the principles of technical documentation described above. Subsets of the data were quantitatively analyzed using cross-tabulation to compare the types of error information and visual cues in screen captures between user- and vendor-generated manuals. The user-developed tutorials and manuals differed from the vendor-developed manual in that they contained mostly procedural and not declarative information; were customized to the specific workflow, user roles, and patient characteristics; contained more error information related to work processes than to software usage; and used explicit visual cues on screen captures to help users identify window elements. These findings imply that to support EMR implementation, tutorials and manuals need to be customized and adapted to specific organizational contexts and workflows. The main limitation of the study

  13. User Manuals for a Primary Care Electronic Medical Record System: A Mixed Methods Study of User- and Vendor-Generated Documents

    Science.gov (United States)

    Dow, Rustam; Barnsley, Jan; Tu, Karen; Domb, Sharon; Jadad, Alejandro R.; Lemieux-Charles, Louise

    2015-01-01

    Research problem Tutorials and user manuals are important forms of impersonal support for using software applications including electronic medical records (EMRs). Differences between user- and vendor documentation may indicate support needs, which are not sufficiently addressed by the official documentation, and reveal new elements that may inform the design of tutorials and user manuals. Research question What are the differences between user-generated tutorials and manuals for an EMR and the official user manual from the software vendor? Literature review Effective design of tutorials and user manuals requires careful packaging of information, balance between declarative and procedural texts, an action and task-oriented approach, support for error recognition and recovery, and effective use of visual elements. No previous research compared these elements between formal and informal documents. Methodology We conducted an mixed methods study. Seven tutorials and two manuals for an EMR were collected from three family health teams and compared with the official user manual from the software vendor. Documents were qualitatively analyzed using a framework analysis approach in relation to the principles of technical documentation described above. Subsets of the data were quantitatively analyzed using cross-tabulation to compare the types of error information and visual cues in screen captures between user- and vendor-generated manuals. Results and discussion The user-developed tutorials and manuals differed from the vendor-developed manual in that they contained mostly procedural and not declarative information; were customized to the specific workflow, user roles, and patient characteristics; contained more error information related to work processes than to software usage; and used explicit visual cues on screen captures to help users identify window elements. These findings imply that to support EMR implementation, tutorials and manuals need to be customized and

  14. Point-of-care technology: integration for improved delivery of care.

    Science.gov (United States)

    Gregory, Debbie; Buckner, Martha

    2014-01-01

    The growing complexity of technology, equipment, and devices involved in patient care delivery can be staggering and overwhelming. Technology is intended to be a tool to help clinicians, but it can also be a frustrating hindrance if not thoughtfully planned and strategically aligned. Critical care nurses are key partners in the collaborations needed to improve safety and quality through health information technology (IT). Nurses must advocate for systems that are interoperable and adapted to the context of care experiences. The involvement and collaboration between clinicians, information technology specialists, biomedical engineers, and vendors has never been more relevant and applicable. Working together strategically with a shared vision can effectively provide a seamless clinical workflow, maximize technology investments, and ultimately improve patient care delivery and outcomes. Developing a strategic integrated clinical and IT roadmap is a critical component of today's health care environment. How can technology strategy be aligned from the executive suite to the bedside caregiver? What is the model for using clinical workflows to drive technology adoption? How can the voice of the critical care nurse strengthen this process? How can success be assured from the initial assessment and selection of technology to a sustainable support model? What is the vendor's role as a strategic partner and "co-caregiver"?

  15. 11 CFR 100.78 - Sale of food or beverages by vendor.

    Science.gov (United States)

    2010-01-01

    ... 11 Federal Elections 1 2010-01-01 2010-01-01 false Sale of food or beverages by vendor. 100.78...) Exceptions to Contributions § 100.78 Sale of food or beverages by vendor. The sale of any food or beverage by... contribution, provided that the charge is at least equal to the cost of such food or beverage to the vendor, to...

  16. Inventory Control System by Using Vendor Managed Inventory (VMI

    Directory of Open Access Journals (Sweden)

    Dona Sabila Alzena

    2018-01-01

    Full Text Available The inventory control system has a strategic role for the business in managing inventory operations. Management of conventional inventory creates problems in the stock of goods that often runs into vacancies and excess goods at the retail level. This study aims to build inventory control system that can maintain the stability of goods availability at the retail level. The implementation of Vendor Managed Inventory (VMI method on inventory control system provides transparency of sales data and inventory of goods at retailer level to supplier. Inventory control is performed by calculating safety stock and reorder point of goods based on sales data received by the system. Rule-based reasoning is provided on the system to facilitate the monitoring of inventory status information, thereby helping the process of inventory updates appropriately. Utilization of SMS technology is also considered as a medium of collecting sales data in real-time due to the ease of use. The results of this study indicate that inventory control using VMI ensures the availability of goods ± 70% and can reduce the accumulation of goods ± 30% at the retail level.

  17. Ten factors to consider when developing usability scenarios and tasks for health information technology.

    Science.gov (United States)

    Russ, Alissa L; Saleem, Jason J

    2018-02-01

    The quality of usability testing is highly dependent upon the associated usability scenarios. To promote usability testing as part of electronic health record (EHR) certification, the Office of the National Coordinator (ONC) for Health Information Technology requires that vendors test specific capabilities of EHRs with clinical end-users and report their usability testing process - including the test scenarios used - along with the results. The ONC outlines basic expectations for usability testing, but there is little guidance in usability texts or scientific literature on how to develop usability scenarios for healthcare applications. The objective of this article is to outline key factors to consider when developing usability scenarios and tasks to evaluate computer-interface based health information technologies. To achieve this goal, we draw upon a decade of our experience conducting usability tests with a variety of healthcare applications and a wide range of end-users, to include healthcare professionals as well as patients. We discuss 10 key factors that influence scenario development: objectives of usability testing; roles of end-user(s); target performance goals; evaluation time constraints; clinical focus; fidelity; scenario-related bias and confounders; embedded probes; minimize risks to end-users; and healthcare related outcome measures. For each factor, we present an illustrative example. This article is intended to aid usability researchers and practitioners in their efforts to advance health information technologies. The article provides broad guidance on usability scenario development and can be applied to a wide range of clinical information systems and applications. Published by Elsevier Inc.

  18. IT vendor selection model by using structural equation model & analytical hierarchy process

    Science.gov (United States)

    Maitra, Sarit; Dominic, P. D. D.

    2012-11-01

    Selecting and evaluating the right vendors is imperative for an organization's global marketplace competitiveness. Improper selection and evaluation of potential vendors can dwarf an organization's supply chain performance. Numerous studies have demonstrated that firms consider multiple criteria when selecting key vendors. This research intends to develop a new hybrid model for vendor selection process with better decision making. The new proposed model provides a suitable tool for assisting decision makers and managers to make the right decisions and select the most suitable vendor. This paper proposes a Hybrid model based on Structural Equation Model (SEM) and Analytical Hierarchy Process (AHP) for long-term strategic vendor selection problems. The five steps framework of the model has been designed after the thorough literature study. The proposed hybrid model will be applied using a real life case study to assess its effectiveness. In addition, What-if analysis technique will be used for model validation purpose.

  19. Space Livability of Street Vendors in Simpang Lima Public Space, Semarang

    Science.gov (United States)

    Widjajanti, R.; Wahyono, H.

    2018-02-01

    Street vendors in Semarang have been growing rapidly and uncontrolled. They always use public space such as public roads, sidewalks, parks and fields as trading locations. The street vendors’ activities in the public space are considered as the cause of declining on environmental quality and aesthetics of the city. All these years, the government often evicted the street vendors than organized and provides adequate space for them. As one of the actual urban activities, the street vendors’ activities should be accommodated by the government and the location for them is managed in the urban spatial plan. Street vendors need spaces which livable and suitable to their activities’ requirements, has a relationship with users (street vendors’ doers and consumers) and the activities of street vendors themselves. Research on the aspect of space for street vendors is still less in quantity, whereas space for them is an urgent matter for the government in managing their activities. This study aims to identify the livability of space based on the street vendors’ behavior in their location. This research used descriptive quantitative method with questionnaires and GIS as the mapping tool for street vendors’ location. The result of the research shows that the livability of street vendor space is based on the activity of street vendors (type of merchandise, trading places’ size, trade place assessment, space dimension, trading time, duration and period) and space conditions (access, natural elements, safety and parking space).

  20. Hygiene practices among street food vendors in Tamale Metropolis ...

    African Journals Online (AJOL)

    The study noted that street food business in the Tamale Metropolis was women dominated (76%). Majority of vendors (78%) were aged 20-39 years. Public toilets (pit latrines) were accessible to all vending sites. Though high number of street food vendors had some form of formal education (66%) and knowledge of food ...

  1. Using information technology to support knowledge conversion processes

    Directory of Open Access Journals (Sweden)

    2001-01-01

    Full Text Available One of the main roles of Information Technology in Knowledge Management programs is to accelerate the speed of knowledge transfer and creation. The Knowledge Management tools intend to help the processes of collecting and organizing the knowledge of groups of individuals in order to make this knowledge available in a shared base. Due to the largeness of the concept of knowledge, the software market for Knowledge Management seems to be quite confusing. Technology vendors are developing different implementations of the Knowledge Management concepts in their software products. Because of the variety and quantity of Knowledge Management tools available on the market, a typology may be a valuable aid to organizations that are looking for answers to specific needs. The objective of this article is to present guidelines that help to design such a typology. Knowledge Management solutions such as intranet systems, Electronic Document Management (EDM, groupware, workflow, artificial intelligence-based systems, Business Intelligence (BI, knowledge map systems, innovation support, competitive intelligence tools and knowledge portals are discussed in terms of their potential contributions to the processes of creating, registering and sharing knowledge. A number of Knowledge Management tools (Lotus Notes, Microsoft Exchange, Business Objects, Aris Toolset, File Net, Gingo, Vigipro, Sopheon have been checked. The potential of each category of solutions to support the transfer of tacit and/or explicit knowledge and to facilitate the knowledge conversion spiral in the sense of Nonaka and Takeuchi (1995 is discussed.

  2. Expedited, uniform processing of multi-vendor gamma test data

    International Nuclear Information System (INIS)

    Zimmerman, R.E.

    2002-01-01

    Aim: Acceptance testing of gamma camera performance is time consuming. When data is collected from different vendors image format and methodology differences can result in disjointed and difficult to compare results. Even when performing NEMA specified tests consistent processing of data from multi-vendor cameras results in methodological inconsistencies. A more uniform and consistent method to process data collected from gamma cameras would be a boon to those involved in acquiring and processing such test data. Methods and Materials: Image J is an image processing program freely available on the Web at http://rsb.info.nih.gov/ij/. It can be run using a normal Web browser or installed on any computer. Since it is written in Java it is platform and operating system independent. Image J is very extensible, object based and has a large international user community in many imaging disciplines. Extensions to Image J are written using the Java programming language and the internal macro recording facility. Image J handles multiple image formats useful in nuclear medicine including DICOM, RAW, BMP, JPG, Interfile, AVI and QT. Extensions have been written to process and determine gamma camera intrinsic and extrinsic uniformity, COR errors, planar extrinsic resolution and reconstructed spatial resolution. The testing and processing adhere closely to NEMA specified procedures and result in quantitative measures of performance traceable to NEMA and manufacturers specifications. Results and Conclusions: Extensions to Image J written specifically to process gamma camera acceptance test data have resulted in considerable decrease in time to complete the analysis and allows a consistent, vendor independent, method to measure performance of cameras from multiple vendors. Quality control images from multiple camera vendors are also easily processed in a consistent fashion. The availability of this or similar platform and vendor independent software should lead to more complete

  3. Token ring technology report

    CERN Document Server

    2013-01-01

    Please note this is a Short Discount publication. This report provides an overview of the IBM Token-Ring technology and products built by IBM and compatible vendors. It consists of two sections: 1. A summary of the design trade-offs for the IBM Token-Ring. 2. A summary of the products of the major token-ring compatible vendors broken down by adapters and components, wiring systems, testing, and new chip technology.

  4. A Content Analysis of Library Vendor Privacy Policies: Do They Meet Our Standards?

    Science.gov (United States)

    Magi, Trina J.

    2010-01-01

    Librarians have a long history of protecting user privacy, but they have done seemingly little to understand or influence the privacy policies of library resource vendors that increasingly collect user information through Web 2.0-style personalization features. After citing evidence that college students value privacy, this study used content…

  5. Measuring Library Vendor Cyber Security: Seven Easy Questions Every Librarian Can Ask

    Directory of Open Access Journals (Sweden)

    Alex Caro

    2016-04-01

    Full Text Available This article is based on an independent cyber security risk management audit for a public library system completed by the authors in early 2015 and based on a research paper by the same group at Clark University in 2014. We stress that while cyber security must include raising public knowledge in regard to cyber security issues and resources, and libraries are indeed the perfect place to disseminate this knowledge, librarians are also in a unique position as the gatekeepers of information services provided to the public and should conduct internal audits to ensure our content partners and IT vendors take cyber security as seriously as the library and its staff. One way to do this is through periodic reviews of existing vendor relationships. To this end, the authors created a simple grading rubric you can adopt or modify to help take this first step towards securing your library data. It is intended to be used by both technical and non-technical staff as a simple measurement of what vendor agreements currently exist and how they rank, while at the same time providing a roadmap for which security features or policy statements the library can or should require moving forward.

  6. An analysis of vendor innovation capability in the contract electronics manufacturing industry

    DEFF Research Database (Denmark)

    Perunovic, Zoran; Mefford, Robert; Christoffersen, Mads

    2016-01-01

    the contract, vendors can use different configurations of the competitive priorities of cost, quality, delivery and flexibility. The research aggregates the capabilities that influence the innovative capability of a vendor into the innovation-related capabilities (IRCs) of design, new product introduction......Limited academic research has been given to analysing the innovation capabilities of vendors in outsourcing contracts. This paper seeks to address this gap in the literature by enhancing our understanding of how the innovation capability of vendors is deployed to win, run and renew outsourcing...... contracts with their customers. Employing the resource-based view as a theoretical basis and undertaking in-depth case study analysis of three vendors in the electronic manufacturing services industry, the research shows that to achieve the outsourcing objectives of winning, running and renewing...

  7. Using hub technology to facilitate information system integration in a health-care enterprise.

    Science.gov (United States)

    Gendler, S M; Friedman, B A; Henricks, W H

    1996-04-01

    The deployment and maintenance of multiple point-to-point interfaces between a clinical information system, such as a laboratory information system, and other systems within a healthcare enterprise is expensive and time consuming. Moreover, the demand for such interfaces is increasing as hospitals consolidate and clinical laboratories participate in the development of regional laboratory networks and create host-to-host links with laboratory outreach clients. An interface engine, also called a hub, is an evolving technology that could replace multiple point-to-point interfaces from a laboratory information system with a single interface to the hub, preferably HL7 based. The hub then routes and translates laboratory information to other systems within the enterprise. Changes in application systems in an enterprise where a centralized interface engine has been implemented then amount to thorough analysis, an update of the enterprise's data dictionary, purchase of a single new vendor-supported interface, and table-based parameter changes on the hub. Two other features of an interface engine, support for structured query language and information store-and-forward, will facilitate the development of clinical data repositories and provide flexibility when interacting with other host systems. This article describes the advantages and disadvantages of an interface engine and lists some problems not solved by the technology. Finally, early developmental experience with an interface engine at the University of Michigan Medical Center and the benefits of the project on system integration efforts are described, not the least of which has been the enthusiastic adoption of the HL7 standard for all future interface projects.

  8. MDEP Technical Report TR-VICWG-04. Technical Report: Assessment of Multinational Vendor Inspection of Valinox Nuclear

    International Nuclear Information System (INIS)

    2015-01-01

    From July 7-11, 2014, the NRC led a team of inspectors representing regulators from France, the United Kingdom, and the United States in performing the first Multinational Design Evaluation Program (MDEP) multinational inspection at Valinox Nuclear in Montbard, France. Valinox Nuclear's primary product line is steam generator tubes for the nuclear industry. The purpose of the inspection was to assess Valinox's compliance with the quality assurance/quality control (QA/QM) criteria described in the Multinational Design Evaluation Program (MDEP) Vendor Inspection Cooperation Working Group (VICWG) Technical Report, TR-VICWG-03, 'Common QA/QM Criteria for Multinational Vendor Inspection', Revision 1, dated January 20, 2014, and MDEP Protocol, VICWG-01, 'Witnessed, Joint, and Multinational Vendor Inspection Protocol', Revision 2, dated March 20, 2014, respectively. The inspection also offered the inspectors an opportunity to pilot the VICWG draft common position document to gain valuable insights into the effectiveness of application of the common QA/QM criteria to vendor inspections performed by a multinational inspection team. During this inspection, the inspection team evaluated implementation of Valinox's quality assurance (QA) program with respect to 15 specific criteria: 1. Quality management system; 2. Grading; 3. Documentation of the quality management system; 4. Control of documents and records; 5. Responsibility and Leadership; 6. Human resources; 7. Process Implementation; 8. Control of planning and implementation changes; 9. Purchasing (including aspects of CSFI); 10. Control of implementation including Control of special processes; 11. Monitoring and measurement of product and service; 12. Assessment; 13. Non-conformances; 14. Corrective and preventive actions; and 15. Safety culture. By letter dated 26 August 2014, the NRC issued a vendor inspection report to Valinox Nuclear, which documented four findings (Non

  9. Technology Information Center

    International Nuclear Information System (INIS)

    Emerson, E.L.; Shepherd, E.W.; Minor, E.E.

    1980-01-01

    A Transportation Technology Center (TTC) has been established at Sandia to address the transportation of nuclear waste and spent fuel. The Technology Information Center (TIC) acts as TTC's clearing house for nuclear material transportation information. TIC's activities are divided into three activities: public information, policy information, and technical information. Some of the uses of TIC's activities are briefly outlined

  10. Enrichment technology. Dependable vendor of gas centrifuges

    International Nuclear Information System (INIS)

    Anon.

    2011-01-01

    Enrichment Technology is an innovative, high-tech company that develops, manufactures and installs gas centrifuges for enriching uranium. In addition, Enrichment Technology designs enrichment plants that use gas centrifuge technology. This technology offers the most efficient and cost-effective method for enriching uranium yet: high-performance, safe technology that dominates the market with a global share of 45 percent. A determining factor in Enrichment Technology's success is its mission: supplying its customers with safe, reliable technology. Production of the centrifuges requires versatile know-how and collaboration between different departments as well as interdisciplinary teams at the various sites. More than 2000 operators at 8 sites in 5 countries contribute their individual knowledge and personal skills in order to produce this exceptional technology. The head office is in Beaconsfield near London and the operational headquarters are in Almelo in the Netherlands. There are other sites in Germany (Juelich und Gronau), Great Britain (Capenhurst) as well as project sites in the USA and France. Capenhurst is where experienced engineers design new enrichment plants and organise their construction. Centrifuge components are manufactured in Almelo and Juelich, while the pipework needed to connect up the centrifuges is produced at the site in Gronau. In Juelich, highly qualified scientists in interdisciplinary teams are continuously researching ways of improving the current centrifuges. Communication between specialists in the fields of chemistry, physics and engineering forms the basis for the company's success and the key to extending this leading position in the global enrichment market. (orig.)

  11. Vendor compliance with Ontario's tobacco point of sale legislation.

    Science.gov (United States)

    Dubray, Jolene M; Schwartz, Robert M; Garcia, John M; Bondy, Susan J; Victor, J Charles

    2009-01-01

    On May 31, 2006, Ontario joined a small group of international jurisdictions to implement legislative restrictions on tobacco point of sale promotions. This study compares the presence of point of sale promotions in the retail tobacco environment from three surveys: one prior to and two following implementation of the legislation. Approximately 1,575 tobacco vendors were randomly selected for each survey. Each regionally-stratified sample included equal numbers of tobacco vendors categorized into four trade classes: chain convenience, independent convenience and discount, gas stations, and grocery. Data regarding the six restricted point of sale promotions were collected using standardized protocols and inspection forms. Weighted estimates and 95% confidence intervals were produced at the provincial, regional and vendor trade class level using the bootstrap method for estimating variance. At baseline, the proportion of tobacco vendors who did not engage in each of the six restricted point of sale promotions ranged from 41% to 88%. Within four months following implementation of the legislation, compliance with each of the six restricted point of sale promotions exceeded 95%. Similar levels of compliance were observed one year later. Grocery stores had the fewest point of sale promotions displayed at baseline. Compliance rates did not differ across vendor trade classes at either follow-up survey. Point of sale promotions did not differ across regions in any of the three surveys. Within a short period of time, a high level of compliance with six restricted point of sale promotions was achieved.

  12. Sustaining "meaningful use" of health information technology in low-resource practices.

    Science.gov (United States)

    Green, Lee A; Potworowski, Georges; Day, Anya; May-Gentile, Rachelle; Vibbert, Danielle; Maki, Bruce; Kiesel, Leslie

    2015-01-01

    The implementation of electronic health records (EHRs) has been extensively studied, but their maintenance once implemented has not. The Regional Extension Center (REC) program provides implementation assistance to priority practices-those with limited financial, technical, and organizational resources-but the assistance is time limited. Our objective was to identify potential barriers to maintenance of meaningful use of EHRs in priority primary care practices using a qualitative observational study for federally qualified health centers (FQHCs) and priority practices in Michigan. We conducted cognitive task analysis (CTA) interviews and direct observations of health information technology implementation in FQHCs. In addition, we conducted semistructured interviews with implementation specialists serving priority practices to detect emergent themes relevant to maintenance. Maintaining EHR technology will require ongoing expert technical support indefinitely beyond implementation to address upgrades and security needs. Maintaining meaningful use for quality improvement will require ongoing support for leadership and change management. Priority practices not associated with larger systems lack access to the necessary technical expertise, financial resources, and leverage with vendors to continue alone. Rural priority practices are particularly challenged, because expertise is often not available locally. Priority practices, especially in rural areas, are at high risk for falling on the wrong side of a "digital divide" as payers and regulators enact increasing expectations for EHR use and information management. For those without affiliation to maintain the necessary expert staff, ongoing support will be needed for those practices to remain viable. © 2015 Annals of Family Medicine, Inc.

  13. A socioeconomic survey of kidney vendors in Pakistan.

    Science.gov (United States)

    Naqvi, Syed Ali Anwar; Ali, Bux; Mazhar, Farida; Zafar, Mirza Naqi; Rizvi, Syed Adibul Hasan

    2007-11-01

    In recent years, Pakistan has emerged as one of the largest centres for commerce and tourism in renal transplantation. Kidney vendors belong to Punjab in eastern Pakistan, the agricultural heartland, where 34% people live below poverty line. We report results of a socioeconomic and health survey of 239 kidney vendors. The mean age was 33.6 +/- 7.2 years (M:F 3.5:1). Mean nephrectomy period was 4.8 +/- 2.3 years. Ninety per cent of the vendors were illiterate. Sixty-nine per cent were bonded labourers who were virtual slaves to landlords, labourers 12%, housewives 8.5% and unemployed 11%. Monthly income was $US15.4 +/- 8.9 with 2-11 dependents per family. Majority (93%), vended for debt repayment with mean debt of $1311.4 +/- 819. The mean agreed sale price was $1737 +/- 262. However, they received $1377 +/- 196 after deduction for hospital and travel expenses. Postvending 88% had no economic improvement in their lives and 98% reported deterioration in general health status. Future vending was encouraged by 35% to pay off debts and freedom from bondage. This study gives a snapshot of kidney vendors from Pakistan. These impoverished people, many in bondage, are examples of modern day slavery. They will remain exploited until law against bondage is implemented and new laws are introduced to ban commerce and transplant tourism in Pakistan.

  14. VENDOR TRAINING AS NEW EDUCATIONAL PRODUCT

    Directory of Open Access Journals (Sweden)

    A. V. Ponachugin

    2016-01-01

    Full Text Available This article describes the history of the emergence of the current state and future prospects of vender's education, coupled with the development of computer technology and telecommunications. Obtained stages of development of vender's education in the foreign practice. The analysis of domestic and foreign sources for the problem moments in the formation of ideas about the authorized model of education. The article also takes into account the modern approaches, highlights the main characteristics by which we can talk about vender's education as an innovative educational form of education process for the Russian high school. The main prospects for the development, which allows to obtain measurable indicators to improve the quality of education are defined. Was analyzed the main aspects of the formation of innovative vender's Cisco's products in Russia. Noting the achievements and development trends vender's education in our country, as well as given the existing problems in this process. Experience of introduction of vendor courses in Minin University is described.

  15. Information Technology Resources Assessment

    Energy Technology Data Exchange (ETDEWEB)

    1993-04-01

    The Information Technology Resources Assessment (ITRA) is being published as a companion document to the Department of Energy (DOE) FY 1994--FY 1998 Information Resources Management Long-Range Plan. This document represents a collaborative effort between the Office of Information Resources Management and the Office of Energy Research that was undertaken to achieve, in part, the Technology Strategic Objective of IRM Vision 21. An integral part of this objective, technology forecasting provides an understanding of the information technology horizon and presents a perspective and focus on technologies of particular interest to DOE program activities. Specifically, this document provides site planners with an overview of the status and use of new information technology for their planning consideration.

  16. INFORMATION TECHNOLOGY, INTERNET, AND MARKETING

    OpenAIRE

    Mihane Berisha-Namani

    2013-01-01

    Information technology developed very fast, and today's marketing activities are not possible without the help of information technology. Furthermore, it is difficult to think of a policy domain not affected by usage of information technology. Information technology is making possible and creating connections between businesses and organizations. The implications of information technology usage in marketing activities are profound too. Using information technology, companies possess the poten...

  17. Future Information Technology

    CERN Document Server

    Stojmenovic, Ivan; Choi, Min; Xhafa, Fatos; FutureTech 2013

    2014-01-01

    Future technology information technology stands for all of continuously evolving and converging information technologies, including digital convergence, multimedia convergence, intelligent applications, embedded systems, mobile and wireless communications, bio-inspired computing, grid and cloud computing, semantic web, user experience and HCI, security and trust computing and so on, for satisfying our ever-changing needs. In past twenty five years or so, Information Technology (IT) influenced and changed every aspect of our lives and our cultures. These proceedings foster the dissemination of state-of-the-art research in all future IT areas, including their models, services, and novel applications associated with their utilization.

  18. Scanner OPC signatures: automatic vendor-to-vendor OPE matching

    Science.gov (United States)

    Renwick, Stephen P.

    2009-03-01

    As 193nm lithography continues to be stretched and the k1 factor decreases, optical proximity correction (OPC) has become a vital part of the lithographer's tool kit. Unfortunately, as is now well known, the design variations of lithographic scanners from different vendors cause them to have slightly different optical-proximity effect (OPE) behavior, meaning that they print features through pitch in distinct ways. This in turn means that their response to OPC is not the same, and that an OPC solution designed for a scanner from Company 1 may or may not work properly on a scanner from Company 2. Since OPC is not inexpensive, that causes trouble for chipmakers using more than one brand of scanner. Clearly a scanner-matching procedure is needed to meet this challenge. Previously, automatic matching has only been reported for scanners of different tool generations from the same manufacturer. In contrast, scanners from different companies have been matched using expert tuning and adjustment techniques, frequently requiring laborious test exposures. Automatic matching between scanners from Company 1 and Company 2 has remained an unsettled problem. We have recently solved this problem and introduce a novel method to perform the automatic matching. The success in meeting this challenge required three enabling factors. First, we recognized the strongest drivers of OPE mismatch and are thereby able to reduce the information needed about a tool from another supplier to that information readily available from all modern scanners. Second, we developed a means of reliably identifying the scanners' optical signatures, minimizing dependence on process parameters that can cloud the issue. Third, we carefully employed standard statistical techniques, checking for robustness of the algorithms used and maximizing efficiency. The result is an automatic software system that can predict an OPC matching solution for scanners from different suppliers without requiring expert intervention.

  19. Ordering E-Books From a Print Book Vendor

    OpenAIRE

    Culley, Jennifer R.; Human, Cindy

    2017-01-01

    The University of Southern Mississippi began ordering e-books through its primary print book vendor, Midwest Library Service, in 2016. The demand to purchase e-books has steadily increased, and when the opportunity arose to save valuable staff time searching over several vendor sites for e-books and print books by consolidating the search interface, a change was made. There were multiple steps to set up this program; however, the time invested was worth it. While there were challenges along t...

  20. Vendor-buyer ordering policy when demand is trapezoidal

    Directory of Open Access Journals (Sweden)

    Digeshkumar B. Shah

    2012-10-01

    Full Text Available A joint vendor-buyer strategy is analyzed which is beneficial to both the players in the supply chain. The demand is assumed to be trapezoidal. It is established numerically that the joint venture decreases the total cost of the supply chain when compared with the independent decision of the buyer. To entice the buyer to order more units, a permissible credit period is offered by the vendor to the buyer. A negotiation factor is incorporated to share the cost savings.

  1. Vendor-based restrictions on pesticide sales to prevent pesticide self-poisoning - a pilot study

    Directory of Open Access Journals (Sweden)

    Manjula Weerasinghe

    2018-02-01

    Full Text Available Abstract Background In South Asia, up to 20% of people ingesting pesticides for self-poisoning purchase the pesticide from a shop with the sole intention of self-harm. Individuals who are intoxicated with alcohol and/or non-farmers represent 72% of such high-risk individuals. We aimed to test the feasibility and acceptability of vendor-based restrictions on pesticide sales for such high-risk individuals. Methods We conducted a pilot study in 14 (rural = 7, urban = 7 pesticide shops in Anuradhapura District of Sri Lanka. A two-hour training program was delivered to 28 pesticide vendors; the aim of the training was to help vendors recognize and respond to customers at high risk of pesticide self-poisoning. Knowledge and attitudes of vendors towards preventing access to pesticides for self-poisoning at baseline and in a three month follow-up was evaluated by questionnaire. Vendors were interviewed to explore the practice skills taught in the training and their assessment of the program. Results The scores of knowledge and attitudes of the vendors significantly increased by 23% (95% CI 15%–32%, p < 0.001 and by 16% (95% CI 9%–23%, p < 0.001 respectively in the follow-up. Fifteen (60% vendors reported refusing sell pesticides to a high-risk person (non-farmer or intoxicated person in the follow-up compared to three (12% at baseline. Vendors reported that they were aware from community feedback that they had prevented at least seven suicide attempts. On four identified occasions, vendors in urban shops had been unable to recognize the self-harming intention of customers who then ingested the pesticide. Only 2 (8% vendors were dissatisfied with the training and 23 (92% said they would recommend it to other vendors. Conclusions Our study suggests that vendor-based sales restriction in regions with high rates of self-poisoning has the potential to reduce access to pesticides for self-poisoning. A large-scale study of the effectiveness

  2. What are the sales practices of internet cigar vendors in China?

    Science.gov (United States)

    Gao, Junling; Berg, Carla J; Huang, Lulu; Zheng, Pinpin; Fu, Hua

    2015-05-01

    To estimate the number of websites selling cigars in China and to examine their sales and marketing practices. Comprehensive searches were conducted using three keyword terms and two popular internet search engines. A total of 6000 sites were examined. Two raters examined the content of each site using a standardised coding instrument to assess geographic location, presence of warnings, products sold, and promotional strategies. We identified 106 internet cigar vendors, which were located in 16 cities, with most of them being located in developed cities (eg, Shanghai, Guangzhou, Hong Kong). Only 6.6% of internet cigar vendors featured health warnings, and 14.2% featured minimum age of sale warnings. More than 80% of sites sold large cigars, 34.9% sold small or mini cigars, 42.5% sold cigarettes, 28.3% sold tobacco leaves, and 73.6% sold cigar accessories. Third-party online payment was the most frequently accepted payment method. Scanned images of cigars or cigar boxes (92.5%), reduced prices (84.0%), and diffusion of cigar-related information (67.9%) were the most frequently used promotional strategies.+ Internet cigar vendors undermine tobacco control policies and pose many challenges for tobacco control advocates in China. New legislation and enforcement should address these issues. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  3. Hygiene practices among street food vendors

    African Journals Online (AJOL)

    User

    giene regulations to keep street food save for consumers. Journal of Medical ... UDS Publishers Limited All Right Reserved 2026-6294 ... authorities to enforce food safety regulations, unlike .... (50%) school food vendors sampled in Konongo.

  4. Strategies for Successful Information Technology Adoption in Small and Medium-sized Enterprises

    Directory of Open Access Journals (Sweden)

    Morteza Ghobakhloo

    2012-02-01

    Full Text Available Information Technology (IT adoption is an important field of study in a number of areas, which include small and medium-sized enterprises (SMEs. Due to the numerous advantages of IT, SMEs are trying to adopt IT applications to support their businesses. IT adoption by SMEs differs from larger organizations because of their specific characteristics, such as resources constraints. Therefore, this research aims to provide a better and clearer understanding of IT adoption within SMEs by reviewing and analyzing current IT literature. In this research, the review of literature includes theories, perspectives, empirical research and case studies related to IT adoption, in particular within SMEs from various databases such as Business Premier, Science Direct, JStor, Emerald Insight and Springer Link. The proposed model of effective IT adoption is believed to provide managers, vendors, consultants and governments with a practical synopsis of the IT adoption process in SMEs, which will in turn assist them to be successful with IT institutionalization within these businesses.

  5. The United States Department of Energy Office of Industrial Technology`s Technology Benefits Recording System

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, K.R.; Moore, N.L.

    1994-09-01

    The U.S. Department of Energy (DOE) Office of Industrial Technology`s (OIT`s) Technology Benefits Recording System (TBRS) was developed by Pacific Northwest Laboratory (PNL). The TBRS is used to organize and maintain records of the benefits accrued from the use of technologies developed with the assistance of OIT. OIT has had a sustained emphasis on technology deployment. While individual program managers have specific technology deployment goals for each of their ongoing programs, the Office has also established a separate Technology Deployment Division whose mission is to assist program managers and research and development partners commercialize technologies. As part of this effort, the Technology Deployment Division developed an energy-tracking task which has been performed by PNL since 1977. The goal of the energy-tracking task is to accurately assess the energy savings impact of OIT-developed technologies. In previous years, information on OIT-sponsored technologies existed in a variety of forms--first as a hardcopy, then electronically in several spreadsheet formats that existed in multiple software programs. The TBRS was created in 1993 for OIT and was based on information collected in all previous years from numerous industrial contacts, vendors, and plants that have installed OIT-sponsored technologies. The TBRS contains information on technologies commercialized between 1977 and the present, as well as information on emerging technologies in the late development/early commercialization stage of the technology life cycle. For each technology, details on the number of units sold and the energy saved are available on a year-by-year basis. Information regarding environmental benefits, productivity and competitiveness benefits, or impact that the technology may have had on employment is also available.

  6. Information technology acceptance in health information management.

    Science.gov (United States)

    Abdekhoda, M; Ahmadi, M; Dehnad, A; Hosseini, A F

    2014-01-01

    User acceptance of information technology has been a significant area of research for more than two decades in the field of information technology. This study assessed the acceptance of information technology in the context of Health Information Management (HIM) by utilizing Technology Acceptance Model (TAM) which was modified and applied to assess user acceptance of health information technology as well as viability of TAM as a research construct in the context of HIM. This was a descriptive- analytical study in which a sample of 187 personnel from a population of 363 personnel, working in medical records departments of hospitals affiliated to Tehran University of Medical Sciences, was selected. Users' perception of applying information technology was studied by a researcher-developed questionnaire. Collected data were analyzed by SPSS software (version16) using descriptive statistics and regression analysis. The results suggest that TAM is a useful construct to assess user acceptance of information technology in the context of HIM. The findings also evidenced the perceived ease of use (PEOU) and perceived usefulness (PE) were positively associated with favorable users' attitudes towards HIM. PU was relatively more associated (r= 0.22, p = 0.05) than PEOU (r = 0.014, p = 0.05) with favorable user attitudes towards HIM. Users' perception of usefulness and ease of use are important determinants providing the incentive for users to accept information technologies when the application of a successful HIM system is attempted. The findings of the present study suggest that user acceptance is a key element and should subsequently be the major concern of health organizations and health policy makers.

  7. Information technology ethics

    DEFF Research Database (Denmark)

    Hongladarom, Soraj; Ess, Charles

    This book was the first publication to take a genuinely global approach to the diverse ethical issues evoked by Information and Communication Technologies and their possible resolutions. Readers will gain a greater appreciation for the problems and possibilities of genuinely global information...... ethics, which are urgently needed as information and communication technologies continue their exponential growth...

  8. Análise estratégica na aplicabilidade do Vendor Managed Inventory (VMI na cadeia de abastecimento

    Directory of Open Access Journals (Sweden)

    Hugo Pissaia Júnior

    2012-01-01

    Full Text Available In this paper, we present the results of research on the strategic aspects in the business applicability of vendor-managed inventory (VMI for the supply chain. Given that companies' logistical challenges are related to the supply chain, management, planning, and control of the supply chain, the qualitative research performed by collecting data from ten customers of national distributors allowed the results obtained to point out the effectiveness of systemic resources in the supply chain of a company in the aftermarket. We describe comprehensively the competitive levels and environments in which the company operates and point out the heightened importance of planning the implementation of vendor-managed inventory to alleviate the cultural obstacles existing in information, thus avoiding barriers to the effectiveness of information exchange and to the efficiency of its results.

  9. A Proposed Information Architecture for Telehealth System Interoperability

    Energy Technology Data Exchange (ETDEWEB)

    Craft, R.L.; Funkhouser, D.R.; Gallagher, L.K.; Garica, R.J.; Parks, R.C.; Warren, S.

    1999-04-20

    We propose an object-oriented information architecture for telemedicine systems that promotes secure `plug-and-play' interaction between system components through standardized interfaces, communication protocols, messaging formats, and data definitions. In this architecture, each component functions as a black box, and components plug together in a ''lego-like'' fashion to achieve the desired device or system functionality. Introduction Telemedicine systems today rely increasingly on distributed, collaborative information technology during the care delivery process. While these leading-edge systems are bellwethers for highly advanced telemedicine, most are custom-designed and do not interoperate with other commercial offerings. Users are limited to a set of functionality that a single vendor provides and must often pay high prices to obtain this functionality, since vendors in this marketplace must deliver en- tire systems in order to compete. Besides increasing corporate research and development costs, this inhibits the ability of the user to make intelligent purchasing decisions regarding best-of-breed technologies. This paper proposes a reference architecture for plug-and-play telemedicine systems that addresses these issues.

  10. Teaching Information Technology Law

    Science.gov (United States)

    Taylor, M. J.; Jones, R. P.; Haggerty, J.; Gresty, D.

    2009-01-01

    In this paper we discuss an approach to the teaching of information technology law to higher education computing students that attempts to prepare them for professional computing practice. As information technology has become ubiquitous its interactions with the law have become more numerous. Information technology practitioners, and in particular…

  11. 19 CFR 24.34 - Vouchers; vendors' bills of sale; invoices.

    Science.gov (United States)

    2010-04-01

    ... that the above bill is correct and just and that payment has not been received. Vouchers, vendors... employee, in which case the voucher may be in the name of the officer or employee who made the payment. (c... 19 Customs Duties 1 2010-04-01 2010-04-01 false Vouchers; vendors' bills of sale; invoices. 24.34...

  12. A framework for evaluating electronic health record vendor user-centered design and usability testing processes.

    Science.gov (United States)

    Ratwani, Raj M; Zachary Hettinger, A; Kosydar, Allison; Fairbanks, Rollin J; Hodgkins, Michael L

    2017-04-01

    Currently, there are few resources for electronic health record (EHR) purchasers and end users to understand the usability processes employed by EHR vendors during product design and development. We developed a framework, based on human factors literature and industry standards, to systematically evaluate the user-centered design processes and usability testing methods used by EHR vendors. We reviewed current usability certification requirements and the human factors literature to develop a 15-point framework for evaluating EHR products. The framework is based on 3 dimensions: user-centered design process, summative testing methodology, and summative testing results. Two vendor usability reports were retrieved from the Office of the National Coordinator's Certified Health IT Product List and were evaluated using the framework. One vendor scored low on the framework (5 pts) while the other vendor scored high on the framework (15 pts). The 2 scored vendor reports demonstrate the framework's ability to discriminate between the variabilities in vendor processes and to determine which vendors are meeting best practices. The framework provides a method to more easily comprehend EHR vendors' usability processes and serves to highlight where EHR vendors may be falling short in terms of best practices. The framework provides a greater level of transparency for both purchasers and end users of EHRs. The framework highlights the need for clearer certification requirements and suggests that the authorized certification bodies that examine vendor usability reports may need to be provided with clearer guidance. © The Author 2016. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  13. An Improved Unsupervised Modeling Methodology For Detecting Fraud In Vendor Payment Transactions

    National Research Council Canada - National Science Library

    Rouillard, Gregory

    2003-01-01

    ...) vendor payment transactions through Unsupervised Modeling (cluster analysis) . Clementine Data Mining software is used to construct unsupervised models of vendor payment data using the K-Means, Two Step, and Kohonen algorithms...

  14. Transportation Costs and Carbon Emissions in a Vendor Managed Inventory Situation

    DEFF Research Database (Denmark)

    Turkensteen, Marcel; Larsen, Christian

    2014-01-01

    Recently, there has been much focus on carbon emissions and fuel consumption from road transport. In this paper, we consider a vendor deciding on the degree to which deliveries to geographically dispersed retailers should be consolidated. The vendor can consolidate shipments over time and deliver...

  15. Information Technology Service

    International Nuclear Information System (INIS)

    Ageron, M.; Boninchi, V.; Chartoire, M.; Combroux, A.; Giraud, N.; Jacquet, G.; Lagrange, B.; Malleret, S.; Martin, C.; Mas, J.; Morgue, M.; Ollivier, T.

    1998-01-01

    The information technology service works out the choices concerning the information technology systems of general use in the laboratory: computers, network, peripherals, workstations, software. It intervenes at the same time in the definition of the procedures and equipment specific to the research groups. The entire data acquisition is centralized by the service. The personnel is sharing the following two large directions of activities: - management of information technology park (setup, configuration and maintenance of the materials and soft ensemble, training and assistance afforded to users); - participation in software projects either in elaboration of applications or in realization and maintenance of specific tools

  16. A Theoretical Bayesian Game Model for the Vendor-Retailer Relation

    Directory of Open Access Journals (Sweden)

    Emil CRIŞAN

    2012-06-01

    Full Text Available We consider an equilibrated supply chain with two equal partners, a vendor and a retailer (also called newsboy type products supply chain. The actions of each partner are driven by profit. Given the fact that at supply chain level are specific external influences which affect the costs and concordant the profit, we use a game theoretic model for the situation, considering costs and demand. At theoretical level, symmetric and asymmetric information patterns are considered for this situation. There are at every supply chain’s level situations when external factors (such as inflation, raw-material rate influence the situation of each partner even if the information is well shared within the chain. The model we propose considers both the external factors and asymmetric information within a supply chain.

  17. Information technology in health promotion.

    Science.gov (United States)

    Lintonen, T P; Konu, A I; Seedhouse, D

    2008-06-01

    eHealth, the use of information technology to improve or enable health and health care, has recently been high on the health care development agenda. Given the vivid interest in eHealth, little reference has been made to the use of these technologies in the promotion of health. The aim of this present study was to conduct a review on recent uses of information technology in health promotion through looking at research articles published in peer-reviewed journals. Fifteen relevant journals with issues published between 2003 and June 2005 yielded altogether 1352 articles, 56 of which contained content related to the use of information technology in the context of health promotion. As reflected by this rather small proportion, research on the role of information technology is only starting to emerge. Four broad thematic application areas within health promotion were identified: use of information technology as an intervention medium, use of information technology as a research focus, use of information technology as a research instrument and use of information technology for professional development. In line with this rather instrumental focus, the concepts 'ePromotion of Health' or 'Health ePromotion' would come close to describing the role of information technology in health promotion.

  18. [The nutritional and dietary intake among community-dwelling elderly female users of mobile vendor vehicles].

    Science.gov (United States)

    Yoshimura, Yukio; Ito, Hideki; Yoshimura, Hidenori; Kamada, Chiemi; Okumura, Ryota; Shinno, Yuki; Suzuki, Taro; Horie, Kazumi; Takaya, Koji; Omi, Hideaki

    2018-01-01

    We compared the nutritional and dietary intakes of users of mobile vendor vehicles and users of stores to clarify the problems in the nutritional intake of users of mobile vendor vehicles. We conducted a questionnaire about the food accessibility among 257 elderly women (age: ≥65 years) who used mobile vendor vehicles and/or stores to shop. The nutritional intake was assessed using the 24-hour recall method. We used an analysis of covariance (ANCOVA) to calculate the age-adjusted mean values for the total nutritional intake. The nutritional intake among users of mobile vendor vehicles included significantly lower intakes of energy (168 kcal), green vegetables, other vegetables, and meats. Furthermore, those who only shopped at mobile vendor vehicles consumed less energy and fewer nutrients than those who shopped at places other than mobile vendor vehicles. The comparison of the shopping frequency and nutritional intake of the subjects who used mobile vendor vehicles alone revealed that the energy and protein intakes of those who shopped once per week was significantly lower in comparison to those who shopped twice per week. Users of mobile vendor vehicles had lower intakes of macronutrients and various minerals and vitamins. Among the food groups, intakes of vegetables, meat, and dairy products were low. These findings suggest that the lack of means of shopping other than mobile vendor vehicles and shopping once per week may be associated with an inadequate dietary intake among users of mobile vendor vehicles. It would be desirable to develop the shopping environment is desirable.

  19. Licensee contractor and vendor inspection status report. Quarterly progress report, April 1996--June 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-08-01

    The federal government and nuclear industry have established a system for the inspection of commercial nuclear facilities to provide for multiple levels of inspection and verification. The Vendor Inspection System (VIS) of the Special Inspection Branch reviews and inspects the quality and suitability of vendor products, licensee-vendor interface, environmental qualification of equipment, and review of equipment problems found during operation and their corrective action. This report contains copies of all vendor inspection reports issued during the calendar year for which it is published.

  20. Licensee contractor and vendor inspection status report. Quarterly progress report, April 1996--June 1996

    International Nuclear Information System (INIS)

    1996-08-01

    The federal government and nuclear industry have established a system for the inspection of commercial nuclear facilities to provide for multiple levels of inspection and verification. The Vendor Inspection System (VIS) of the Special Inspection Branch reviews and inspects the quality and suitability of vendor products, licensee-vendor interface, environmental qualification of equipment, and review of equipment problems found during operation and their corrective action. This report contains copies of all vendor inspection reports issued during the calendar year for which it is published

  1. Social support in the practices of informal providers: The case of patent and proprietary medicine vendors in Nigeria.

    Science.gov (United States)

    Sieverding, Maia; Liu, Jenny; Beyeler, Naomi

    2015-10-01

    The social and institutional environments in which informal healthcare providers operate shape their health and business practices, particularly in contexts where regulatory enforcement is weak. In this study, we adopt a social capital perspective to understanding the social networks on which proprietary and patent medicine vendors (PPMVs) in Nigeria rely for support in the operation of their shops. Data are drawn from 70 in-depth interviews with PPMVs in three states, including interviews with local leaders of the PPMV professional association. We find that PPMVs primarily relied on more senior colleagues and formal healthcare professionals for informational support, including information about new medicines and advice on how to treat specific cases of illness. For instrumental support, including finance, start-up assistance, and intervention with regulatory agencies, PPMVs relied on extended family, the PPMVs with whom they apprenticed, and the leaders of their professional association. PPMVs' networks also provided continual reinforcement of what constitutes good PPMV practice through admonishments to follow scope of practice limitations. These informal reminders, as well as monitoring activities conducted by the professional association, served to reinforce PPMVs' concern with avoiding negative customer health outcomes, which were perceived to be detrimental to their business reputations. That PPMVs' networks both encouraged practices to reduce the likelihood of poor health outcomes, and provided advice regarding customers' health conditions, highlights the potential impact of informal providers' access to different forms of social capital on their delivery of health services, as well as their success as microenterprises. Copyright © 2015 Elsevier Ltd. All rights reserved.

  2. Licensee Contractor and vendor inspection status report

    International Nuclear Information System (INIS)

    1992-01-01

    This periodical covers the results of inspections performed by the NRC's Vendor Inspection Branch that have been distributed to the inspected organization during the period from October through December 1991

  3. Licensee contractor and vendor inspection status report

    International Nuclear Information System (INIS)

    1993-08-01

    This periodical covers the results of inspections performed by the NRC's Vendor Inspection Branch that have been distributed to the inspected organizations during the period from April through June 1993

  4. Licensee contractor and Vendor Inspection status report

    International Nuclear Information System (INIS)

    1992-05-01

    This periodical covers the results of inspections performed by the NRC's Vendor Inspection Branch that have been distributed to the inspected organizations during the period from January through March 1992

  5. Strategic Repositioning for Convection Business Case Study: AR Vendor

    OpenAIRE

    Anindita, Pratisara Satwika; Toha, Mohamad

    2013-01-01

    The study aims to determine suitable position and strategy in order to reach superiority in convection business based on the company strengths and weaknesses. A study conducted in late 2012 at AR Vendor, a home-based convection company which focus on the t-shirt screen printing service. In response to the issue of the below average profit margin, the company has to rethink their position and strategy in handling the convection business environment. While AR Vendor business may growth in accor...

  6. Guide for developing an information technology investment road map for population health management.

    Science.gov (United States)

    Hunt, Jacquelyn S; Gibson, Richard F; Whittington, John; Powell, Kitty; Wozney, Brad; Knudson, Susan

    2015-06-01

    Many health systems recovering from a massive investment in electronic health records are now faced with the prospect of maturing into accountable care organizations. This maturation includes the need to cooperate with new partners, involve substantially new data sources, require investment in additional information technology (IT) solutions, and become proficient in managing care from a new perspective. Adding to the confusion, there are hundreds of population health management (PHM) vendors with overlapping product functions. This article proposes an organized approach to investing in PHM IT. The steps include assessing the organization's business and clinical goals, establishing governance, agreeing on business requirements, evaluating the ability of current IT systems to meet those requirements, setting time lines and budgets, rationalizing current and future needs and capabilities, and installing the new systems in the context of a continuously learning organization. This article will help organizations chart their position on the population health readiness spectrum and enhance their chances for a successful transition from volume-based to value-based care.

  7. Licensee contractor and vendor inspection status report

    International Nuclear Information System (INIS)

    1991-05-01

    This periodical covers the results of inspections performed by the NRC's Vendor Inspection Branch that have been distributed to the inspected organization during the period from January 1991 through March 1991

  8. Licensee contractor and vendor inspection status report

    International Nuclear Information System (INIS)

    1991-02-01

    This periodical covers the results of inspections performed by the NRC's Vendor Inspection Branch that have been distributed to the inspected organizations during the period from October 1990 through December 1990

  9. Licensee contractor and vendor inspection status report

    International Nuclear Information System (INIS)

    1993-05-01

    This periodical covers the results of inspections performed by the NRC's Vendor Inspection Branch that have been distributed to the inspected organizations during the period from January 1993 through March 1993

  10. Licensee contractor and vendor inspection status report

    International Nuclear Information System (INIS)

    1991-09-01

    This periodical covers the results of inspections performed by the NRC's Vendor Inspection Branch that have been distributed to the inspected organization during the period from April 1991 through June 1991

  11. Licensee contractor and Vendor Inspection status report

    International Nuclear Information System (INIS)

    1993-01-01

    This periodical covers the results of inspections performed by the NRC's Vendor Inspection Branch that have been distributed to the inspected organizations during the period from October 1992 through December 1992

  12. Licensee contractor and vendor inspection status report

    International Nuclear Information System (INIS)

    1989-12-01

    This periodical covers the results of inspections performed by the NRC's Vendor Inspection Branch that have been distributed to the inspected organizations during the period from July 1989 through September 1989

  13. Licensee contractor and vendor inspection status report

    International Nuclear Information System (INIS)

    1990-07-01

    This periodical covers the results of inspections performed by the NRC's Vendor Inspection Branch that have been distributed to the inspected organization during the period from January 1990 through March 1990

  14. Licensee contractor and vendor inspection status report

    International Nuclear Information System (INIS)

    1990-01-01

    This periodical covers the results of inspections performed by the NRC's Vendor Inspection Branch that have been distributed to the inspected organizations during the period from October 1989 through December 1989

  15. Licensee contractor and vendor inspection status report

    International Nuclear Information System (INIS)

    1992-11-01

    This periodical covers the results of inspections performed by the NRC's Vendor Inspection Branch that have been distributed to the inspected organization during the period from July 1992 through September 1992

  16. Licensee contractor and vendor inspection status report

    International Nuclear Information System (INIS)

    1991-10-01

    This periodical covers the results of inspections performed by the NRC's Vendor Inspection Branch that have been distributed to the inspected organization during the period from July 1991 through September 1991

  17. Licensee contractor and vendor inspection status report

    International Nuclear Information System (INIS)

    1990-11-01

    This periodical covers the results of inspections performed by the NRC's Vendor Inspection Branch that have been distributed to the inspected organization during the period from April 1990 through June 1990

  18. A Proposed Information Architecture for Telehealth System Interoperability

    Energy Technology Data Exchange (ETDEWEB)

    Warren, S.; Craft, R.L.; Parks, R.C.; Gallagher, L.K.; Garcia, R.J.; Funkhouser, D.R.

    1999-04-07

    Telemedicine technology is rapidly evolving. Whereas early telemedicine consultations relied primarily on video conferencing, consultations today may utilize video conferencing, medical peripherals, store-and-forward capabilities, electronic patient record management software, and/or a host of other emerging technologies. These remote care systems rely increasingly on distributed, collaborative information technology during the care delivery process, in its many forms. While these leading-edge systems are bellwethers for highly advanced telemedicine, the remote care market today is still immature. Most telemedicine systems are custom-designed and do not interoperate with other commercial offerings. Users are limited to a set of functionality that a single vendor provides and must often pay high prices to obtain this functionality, since vendors in this marketplace must deliver entire systems in order to compete. Besides increasing corporate research and development costs, this inhibits the ability of the user to make intelligent purchasing decisions regarding best-of-breed technologies. We propose a secure, object-oriented information architecture for telemedicine systems that promotes plug-and-play interaction between system components through standardized interfaces, communication protocols, messaging formats, and data definitions. In this architecture, each component functions as a black box, and components plug together in a lego-like fashion to achieve the desired device or system functionality. The architecture will support various ongoing standards work in the medical device arena.

  19. An intutionistic fuzzy optimization approach to vendor selection problem

    Directory of Open Access Journals (Sweden)

    Prabjot Kaur

    2016-09-01

    Full Text Available Selecting the right vendor is an important business decision made by any organization. The decision involves multiple criteria and if the objectives vary in preference and scope, then nature of decision becomes multiobjective. In this paper, a vendor selection problem has been formulated as an intutionistic fuzzy multiobjective optimization where appropriate number of vendors is to be selected and order allocated to them. The multiobjective problem includes three objectives: minimizing the net price, maximizing the quality, and maximizing the on time deliveries subject to supplier's constraints. The objection function and the demand are treated as intutionistic fuzzy sets. An intutionistic fuzzy set has its ability to handle uncertainty with additional degrees of freedom. The Intutionistic fuzzy optimization (IFO problem is converted into a crisp linear form and solved using optimization software Tora. The advantage of IFO is that they give better results than fuzzy/crisp optimization. The proposed approach is explained by a numerical example.

  20. Comparison of advanced reactors program of different international vendors

    International Nuclear Information System (INIS)

    Agnihotri, N.K.

    2001-01-01

    The full text follows. Proposal for presenting a paper on Advanced Reactor Program Given below is the abstract for Track 6 session on Advanced Reactor at the ninth International Conference on Nuclear Engineering being held in Nice, France from April 8. through 12. 2001. This paper will provide an update on Advanced Reactor Program of different vendors in the United States, Japan, and Europe. Specifically the paper will look at the history of different Advanced Reactor Programs, international experience, aspect of economy due to standardization, and the highlights of technical specifications. The paper will also review aspects of Economy due to standardization, public acceptance, required construction time, and the experience of different vendors. The objective of the presentation is to underscore the highlights of the Reactor Program of different vendors in order to keep the attendees of the conference up-to-date. The presentation will be an impartial overview from an outsider's (not part of the Nuclear Steam Supply System's staff). (author)

  1. Dynamics of vendor innovation capability: Evidence from the Electronics Manufacturing Services industry

    DEFF Research Database (Denmark)

    Perunovic, Zoran; Mefford, Robert; Christoffersen, Mads

    2012-01-01

    and innovation. The first is the realization that vendor capabilities have been recognized as one of the most important factors for the success of outsourcing. The second refers to the fact that, even though innovation capability is required, vendors are still being selected, and their performance evaluated......, by traditional manufacturing capabilities, such as cost, quality, delivery, and flexibility. Taking a vendor’s perspective in outsourcing, we develop and present a conceptual framework for studying vendor innovation capability. We propose to test this framework in the Electronic Manufacturing Services Industry....

  2. Enabling Logistics With Portable and Wireless Technology Study. Volume 1

    Science.gov (United States)

    2004-08-06

    Players41 Tag Vendors Reader Vendors Software Players Early Adopters Alien Technology Corporation Intermec Technologies Corp. Descartes Systems...e at pa ion rt s s /st be an co d m ar e ds s rene l availability of interopera le s e demands of EPC isc ot a bro f a er b labl as te is, c...Intermec Technologies Corp. Descartes Systems Boeing Intermec Technologies Corp. Matrics Inc. EXE Technologies CHEP Matrics Inc. Psion Teklogix Inc

  3. Respiratory symptoms of vendors in an open-air hawker center in brunei darussalam.

    Science.gov (United States)

    Nazurah Bt Abdul Wahid, Nurul Nor; Balalla, N B P; Koh, David

    2014-01-01

    We studied respiratory problems among vendors exposed to cooking fumes in an open-air hawker center. Exposure to cooking fumes from either the use of fossil fuels or liquefied petroleum gas (LPG) has been shown to be associated with adverse respiratory health effects. We conducted a cross-sectional study among 67 food vendors exposed to cooking fumes as well as 18 merchandise sellers at an open-air hawker center in Brunei Darussalam. Past medical and smoking history and exposure to cooking fumes were obtained. The validated American Thoracic Society Questionnaire with a translated Malay version was used to ask for respiratory symptoms. Compared to merchandise sellers (n = 18), cooking vendors (n = 67) had a higher self-reported respiratory symptoms (50.7% for those cooking and 33.3% for merchandise sellers). Cough (28.3%) was the main respiratory symptom experienced in cooking vendors and breathlessness (22.2%) among merchandise sellers. Half (50.0%) of cooking vendors who worked for more than 10 years had cough and 27.3% had phlegm. Those cooking with charcoal were two times more likely to have cough than those cooking with LPG. Cooking vendors with a job duration of more than 10 years were thrice more likely to have cough. Cooking vendors in the open-air hawker center exposed to cooking fumes had more respiratory symptoms compared to non-exposed merchandise sellers. The type of fuel used for cooking and duration of work was associated with increased prevalence of cough.

  4. Correlation Between Information Technology And Management Information Systems Quality

    Directory of Open Access Journals (Sweden)

    Annisa Fitri Anggraeni

    2015-08-01

    Full Text Available The aim of this research is to find out the correlation between Information Technology and Management Information System Quality. This research applies literature review from various theories and previously conducted research where controversies between Information Technology and Management Information Systems. The result of this research shows that Information Technology is a part of Management Information System and supports the performance of Management Information Systems.

  5. The Disintegrating World of Library Automation: Working Together, Librarians and Vendors Can Solve the Problems that Hamper Innovation

    Science.gov (United States)

    Dietz, Roland; Grant, Carl

    2005-01-01

    Innovations from Google[TM] and Amazon[R] are clear wake-up calls that as a profession and an industry things need to be done differently. Automation vendors and librarians must work together to ensure that the profession is positioned to take advantage of changing culture and technology to assume a rightful place at the table where rich and…

  6. 11 CFR 100.138 - Sale of food and beverages by vendor.

    Science.gov (United States)

    2010-01-01

    ... 11 Federal Elections 1 2010-01-01 2010-01-01 false Sale of food and beverages by vendor. 100.138...) Exceptions to Expenditures § 100.138 Sale of food and beverages by vendor. The sale of any food or beverage..., is not an expenditure, provided that the charge is at least equal to the cost of such food or...

  7. Information technology equipment cooling method

    Science.gov (United States)

    Schultz, Mark D.

    2015-10-20

    According to one embodiment, a system for removing heat from a rack of information technology equipment may include a sidecar indoor air to liquid heat exchanger that cools air utilized by the rack of information technology equipment to cool the rack of information technology equipment. The system may also include a liquid to liquid heat exchanger and an outdoor heat exchanger. The system may further include configurable pathways to connect and control fluid flow through the sidecar heat exchanger, the liquid to liquid heat exchanger, the rack of information technology equipment, and the outdoor heat exchanger based upon ambient temperature and/or ambient humidity to remove heat generated by the rack of information technology equipment.

  8. Information technology made simple

    CERN Document Server

    Carter, Roger

    1991-01-01

    Information Technology: Made Simple covers the full range of information technology topics, including more traditional subjects such as programming languages, data processing, and systems analysis. The book discusses information revolution, including topics about microchips, information processing operations, analog and digital systems, information processing system, and systems analysis. The text also describes computers, computer hardware, microprocessors, and microcomputers. The peripheral devices connected to the central processing unit; the main types of system software; application soft

  9. EXAMINING FACTORS IN FLUENCING CUSTOMER SATISFACTION AND TRUST TOWARDS VENDORS ON THE MOBILE INTERNET

    OpenAIRE

    Norazah Mohd Suki

    2012-01-01

    This study aims to examine factors influencing customer satisfaction and trust towards vendors on the mobile Internet. Data were analysed among 200 respondents who completed the questionnaire by employing multiple regression analysis. Results revealed that customer satisfaction towards the vendor was significantly influenced by ease-of-use, responsiveness, and brand image. Meanwhile, customer trust towards the vendor in m-commerce is affected by responsiveness, brand image and...

  10. Computing handbook information systems and information technology

    CERN Document Server

    Topi, Heikki

    2014-01-01

    Disciplinary Foundations and Global ImpactEvolving Discipline of Information Systems Heikki TopiDiscipline of Information Technology Barry M. Lunt and Han ReichgeltInformation Systems as a Practical Discipline Juhani IivariInformation Technology Han Reichgelt, Joseph J. Ekstrom, Art Gowan, and Barry M. LuntSociotechnical Approaches to the Study of Information Systems Steve Sawyer and Mohammad Hossein JarrahiIT and Global Development Erkki SutinenUsing ICT for Development, Societal Transformation, and Beyond Sherif KamelTechnical Foundations of Data and Database ManagementData Models Avi Silber

  11. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  12. ALLOCATING VENDOR RISKS IN THE HANFORD WASTE CLEANUP

    International Nuclear Information System (INIS)

    Keisler, Jeff M.; Buehring, William A.; McLaughlin, Peter D.; Robershotte, Mark A.; Whitfield, Ronald G.

    2004-01-01

    Organizations may view outsourcing as a way to eliminate risk. This application uses a decision analytic approach to determine which risks can be shared or shifted to vendors and which ones should be borne by the buyer. In this case, we found that allocating risks incorrectly could increase costs dramatically. This approach was used to develop the Request for Proposals (RFP) for the U.S. Department of Energy's (DOE's) privatization initiative for the Hanford Tank Waste Remediation System (TWRS). We describe this application and/SUMmarize technical and organizational lessons learned in the years following. The model used an assessment protocol to predict how vendors would react to proposed risk allocations in terms of their actions and their pricing

  13. Building Relationships between Small Manufacturing Enterprises and Vendors: Findings from the TIDE Program

    National Research Council Canada - National Science Library

    Estrin, Len; Foreman, John

    2003-01-01

    .... Additionally, vendors and value-added resellers (VARs) are reluctant to target this market. For vendor/VAR-SME relationships to succeed, both parties must redefine many of the roles and rules that guide the sales process...

  14. Information and Innovation Management within Information Technology Enterprises

    OpenAIRE

    Geoff D. Skinner

    2010-01-01

    Australia, while being a large and eager consumer of innovative and cutting edge Information and Communication Technologies (ICT), continues to struggle to remain a leader in Technological Innovation. This paper has two main contributions to address certain aspects of this complex issue. The first being the current findings of an ongoing research project on Information and Innovation Management in the Australian Information and Communication Technologies (ICT) sector. The...

  15. Corporate environmental management and information technology

    DEFF Research Database (Denmark)

    Rikhardsson, Pall M.

    2001-01-01

    software, the Internet, computer networks, telecommunications devices, etc. Information technology also has an impact on how companies perform environmental management. This paper looks at the relations between corporate environmental management and information technology. First it presents a framework...... for mapping information technology. Using this framework it focuses on the use of information technology in corporate environmental management, describes the market for standard environmental management information systems and implementation experiences from one large international company.......Information technology has changed, is changing and will continue to change the face of business as we further enter the Information Society. Today it would be difficult for a company to function effectively without the aid of various information technologies such as accounting software, production...

  16. Licensing Strategies of the Entreprising - But Vulnerable - `Intellectual property' Vendors

    DEFF Research Database (Denmark)

    Davis, Lee N.

    This paper investigates in an exploratory manner the licensing strategies pursued by firms whose business model is based on developing and licensing out their intellectual property rights (IPRs). These are not traditional suppliers, since they do not engage in production or commercialization...... be differentiated along two main dimensions: whether the driving force behind the inventive process is "technology push" or "market pull", and the degree to which the innovative activities carried out by the IP vendor are mutually dependent upon the innovative activities of the other relevant market players....... On this basis, four main licensing strategies are identified. We investigate the relative benefits and costs of these four strategies, and the factors affecting licensing choices.Key words: Intellectual property, licensing, strategyJEL Codes: O31, OO34...

  17. Dissolution of FFTF vendor fuel

    International Nuclear Information System (INIS)

    Lerch, R.E.

    1979-08-01

    Dissolution experiments were performed on FFTF vendor fuel (both mechanically mixed and coprecipitated) during 1974, 1975, and 1976. A marked improvement was noted in the completeness of fuel dissolution from 1974 to 1976. The reason for this is unknown but may have been attributable to slight changes in fuel fabrication conditions. In general, the bulk of the fuel pellets tested dissolved to greater than 99.9% in nitric acid alone

  18. Dissolution of FFTF vendor fuel

    Energy Technology Data Exchange (ETDEWEB)

    Lerch, R.E.

    1979-08-01

    Dissolution experiments were performed on FFTF vendor fuel (both mechanically mixed and coprecipitated) during 1974, 1975, and 1976. A marked improvement was noted in the completeness of fuel dissolution from 1974 to 1976. The reason for this is unknown but may have been attributable to slight changes in fuel fabrication conditions. In general, the bulk of the fuel pellets tested dissolved to greater than 99.9% in nitric acid alone.

  19. Information Technology Management

    OpenAIRE

    Patru Catalin; Petrache Alina

    2011-01-01

    Most of the Information technology management programs are designed to educate and develop managers who can effectively manage the planning, design, selection, implementation, use, and administration of emerging and converging information and communications technologies. The IT Manager and the Project Manager are not at odds. The Project Manager’s ability to focus knowledge, skills, tools and techniques on the temporary endeavor frees the IT Manager to focus on keeping the wheels of commerce ...

  20. Information and Communication Technology

    DEFF Research Database (Denmark)

    Kaila, Heidi Kristiina

    2017-01-01

    The emergence and development of the information and communication sector has been rapid in rural Viet Nam over 2006–14, and a true information and communication technology (ICT) revolution has taken place. This chapter examines household ownership and use of ICT. It studies the geographic and de...... wealthier and more educated than households with phones on average, the adoption patterns of these two technologies are very similar. ICT adoption is driven by education and income, as well as wealth and ownership of other technology.......The emergence and development of the information and communication sector has been rapid in rural Viet Nam over 2006–14, and a true information and communication technology (ICT) revolution has taken place. This chapter examines household ownership and use of ICT. It studies the geographic...... and demographic differences across ownership of technology, especially phones and the Internet, and the determinants of ICT adoption. First, it finds that expansion of telephones has been much more rapid than the expansion of the Internet. Second, it finds that even though in 2014 internet users were relatively...

  1. DEVELOPMENT OF A SPREADSHEET BASED VENDOR MANAGED INVENTORY MODEL FOR A SINGLE ECHELON SUPPLY CHAIN: A CASE STUDY

    Directory of Open Access Journals (Sweden)

    Karanam Prahlada Rao

    2010-11-01

    Full Text Available Vendor managed inventory (VMI is a supply chain initiative where the supplier assumes the responsibility for managing inventories using advanced communication means such as online messaging and data retrieval system. A well collaborated vendor manage inventory system can improve supply chain performance by decreasing the inventory level and increasing the fill rate. This paper investigates the implementation of vendor managed inventory systems in a consumer goods industry. We consider (r, Q policy for replenishing its inventory. The objective of work is to minimize the inventory across the supply chain and maximize the service level. The major contribution of this work is to develop a spreadsheet model for VMI system, Evaluation of Total inventory cost by using spreadsheet based method and Analytical method, Quantifying inventory reduction, Estimating service efficiency level, and validating the VMI spread sheet model with randomly generated demand. In the application, VMI as an inventory control system is able to reduce the inventory cost without sacrificing the service level. The results further more show that the inventory reduction obtained from analytical method is closer to the spread sheet based approach, which reveals the VMI success. However the VMI success is impacted by the quality of buyersupplier relationships, the quality of the IT system and the intensity of information sharing, but not by the quality of information shared.

  2. Information technology resources assessment

    Energy Technology Data Exchange (ETDEWEB)

    Loken, S.C. [ed.

    1993-01-01

    The emphasis in Information Technology (IT) development has shifted from technology management to information management, and the tools of information management are increasingly at the disposal of end-users, people who deal with information. Moreover, the interactive capabilities of technologies such as hypertext, scientific visualization, virtual reality, video conferencing, and even database management systems have placed in the hands of users a significant amount of discretion over how these resources will be used. The emergence of high-performance networks, as well as network operating systems, improved interoperability, and platform independence of applications will eliminate technical barriers to the use of data, increase the power and range of resources that can be used cooperatively, and open up a wealth of possibilities for new applications. The very scope of these prospects for the immediate future is a problem for the IT planner or administrator. Technology procurement and implementation, integration of new technologies into the existing infrastructure, cost recovery and usage of networks and networked resources, training issues, and security concerns such as data protection and access to experiments are just some of the issues that need to be considered in the emerging IT environment. As managers we must use technology to improve competitiveness. When procuring new systems, we must take advantage of scalable resources. New resources such as distributed file systems can improve access to and efficiency of existing operating systems. In addition, we must assess opportunities to improve information worker productivity and information management through tedmologies such as distributed computational visualization and teleseminar applications.

  3. Cloud Challenges for an ERP Vendor

    DEFF Research Database (Denmark)

    Rebsdorf, Mads; Hedman, Jonas

    2014-01-01

    . In this paper, we present a case study of small and mid-sized Nordic ERP vendor. The case study describes company evolution and challenges when starting to compete strategically with SaaS offerings. We conclude by presenting a phased business model that deals with the old on-premises business as well...... as the companies’ new SaaS initiatives....

  4. Childcare needs of female street vendors in Mexico City.

    Science.gov (United States)

    Hernandez, P; Zetina, A; Tapia, M; Ortiz, C; Soto, I C

    1996-06-01

    This article reports on strategies developed by female street vendors (vendedoras ambulantes) in Mexico City to ensure the care of their young children in the absence of a specific and operational government policy to fulfil this need. The information concerning child care and health was gathered by a survey of 426 street traders selected by multi-stage random cluster sampling in four of the administrative districts (delegaciones politicas) of Mexico City during 1990. It was found that, as mothers of young children, street vendors most frequently looked after their children personally on the street or left them with other members of the family. Related factors were availability of alternative child care providers in the family, the age of the children and working conditions of the mother. Children who remained on the streets with their mothers suffered more frequently from gastro-intestinal diseases and accidents than the national average. The incidence of acute respiratory diseases, however, was similar in the cases of maternal care in the street and care by family members in another environment. Existing public health measures show a greater concern for the health of food consumers than that of workers in this area. Current public policy seeks to regulate street vending activities and to concentrate traders in ad hoc areas and facilities. Our research results document the need for actions that can contribute to an improvement in the care and health conditions of these young children.

  5. Information technology investments must deliver value

    International Nuclear Information System (INIS)

    Schulz, Y.

    1998-01-01

    The value of information technology (IT) management for the petroleum industry was discussed. There are currently two points of view regarding the subject. Adherents of one view hold that the strategic uses of information technology are relevant to the oil and gas industry, while those opposed find no demonstrated connection between information technology investments and business results. This paper addresses the impact of the information paradox, but maintains that information technology is not only valuable but essential to the oil and gas industry. This paper maintains that whenever it is perceived as being of limited use and too expensive, it is usually because it is not well managed. Value management can and should lead to superior outcomes. Neither exploration, nor drilling nor production, nor marketing could exist without information technology as the value is imperative. To further make the case, the nature of information technology value management and the strategies required to achieve value from information technology are reviewed. figs

  6. Study of locations’characteristics for stabilization of street vendors in Surakarta City

    Science.gov (United States)

    Rahayu, M. J.; Buchori, I.; Widjajanti, R.

    2018-01-01

    Street vendors are usually centered around particular areas where they have made adaptations based on their activities, instead of scattered all over the city. These locations tend to be close to street vendors’ primary activities and consumers, occupy the public lands, and are productive and accessible. The Municipality of Surakarta has managed the street vendors in the form of stabilization and relocation. In Surakarta, there are 24 areas used for stabilization of street vendors varying in characteristics and quantities. This study uses a spatial analysis aiming to explain the characteristics of locations used for stabilization of street vendors and to identify their physical condition and arrangement. Furthermore, all of the research results will be used as the criteria in choosing the new locations that are suitable for the street vendors’ characteristics and consumers’ preference. The results show that the locations are on the roadsides of the neighborhood, local, and secondary collector roads. The traffic conditions in the stabilization areas are ranging from the very busy until relatively busy level since they are close to activities for trade, education, recreation, offices, and settlements.

  7. Food Safety Knowledge, Behavior, and Attitudes of Vendors of Poultry Products Sold at Pennsylvania Farmers' Markets

    Science.gov (United States)

    Scheinberg, Joshua; Radhakrishna, Rama; Cutter, Catherine N.

    2013-01-01

    A needs assessment survey was developed to assess the knowledge and attitudes of poultry vendors at farmers' markets in Pennsylvania, on food safety, regulation, and poultry production. Vendors were administered a 32-question paper survey, in person, during market hours. The results revealed critical vendor practices and identified important…

  8. INFORMATION TECHNOLOGIES IN ECONOMIC EDUCATION

    OpenAIRE

    I.A. Kinash

    2011-01-01

    In the article the basic aspects of the use of modern information technologies in an educational process are examined. Described directions of introduction of information technologies in economic education. Problems which are related to practice of professional preparation of specialists of economic specialities are examined. The role of information technologies in professional activity of specialists of economic type is underlined.

  9. INFORMATION TECHNOLOGIES IN ECONOMIC EDUCATION

    Directory of Open Access Journals (Sweden)

    I.A. Kinash

    2011-11-01

    Full Text Available In the article the basic aspects of the use of modern information technologies in an educational process are examined. Described directions of introduction of information technologies in economic education. Problems which are related to practice of professional preparation of specialists of economic specialities are examined. The role of information technologies in professional activity of specialists of economic type is underlined.

  10. The development of information technologies

    Directory of Open Access Journals (Sweden)

    Kostúr Karol

    2002-12-01

    Full Text Available The contribution analyses the tasks information technologies in industry. At present time is the problem of connecting mutual variously levels of management. Therefore, first priority is an integration of information technologies. The information technologies for enterprise management are analysed. The product SAP R/3 appears as suitable for top management. The SAP R/3 Enterprise has a new technology so call web-server. This server enables the integration with e-business. The development my SAP is based on application of Business information warehouse (BW and Strategic enterprise management (SEM. The cheaper products (SPIN + EVIS are characterized too. Whitness Miner is very interesting system. The contribution this technology is programming realization of method KDD – knowledge discovery in databases.

  11. Diverse basal and stress-related phenotypes of Sprague Dawley rats from three vendors

    NARCIS (Netherlands)

    Pecoraro, Norman; Ginsberg, Abigail B.; Warne, James P.; Gomez, Francisca; la Fleur, Susanne E.; Dallman, Mary F.

    2006-01-01

    Based on observed phenotypic differences in growth and ACTH responses to stress in Sprague Dawley rats obtained from different vendors, we ran head-to-head comparisons on rats obtained from three different vendors, Harlan, Charles River, and Simonsen, with respect to baseline phenotypic differences

  12. Corporate Environmental Management and Information Technology

    DEFF Research Database (Denmark)

    Rikhardsson, Pall M.

    2000-01-01

    software, the internet, computer networks, telecommunications devices, etc. Information technology also has an impact on how companies perform environmental management. This paper explores the relations between environmental management and information technology in general terms. It offers a classification...... framework for the use of information technology in corporate environmental management (CEM), describes the market for standard environmental management information systems solutions, what main functionalities are available and what main trends are visible.......Information technology has changed, is changing and will continue to change the face of business as we further enter the Information Society. Today it would be difficult for a company to function effectively without the aid of various information technologies such as accounting software, production...

  13. Information technology equipment cooling system

    Science.gov (United States)

    Schultz, Mark D.

    2014-06-10

    According to one embodiment, a system for removing heat from a rack of information technology equipment may include a sidecar indoor air to liquid heat exchanger that cools warm air generated by the rack of information technology equipment. The system may also include a liquid to liquid heat exchanger and an outdoor heat exchanger. The system may further include configurable pathways to connect and control fluid flow through the sidecar heat exchanger, the liquid to liquid heat exchanger, the rack of information technology equipment, and the outdoor heat exchanger based upon ambient temperature and/or ambient humidity to remove heat from the rack of information technology equipment.

  14. Initial results of strand produced in Phase 2 of the SSCL Vendor Qualification Program

    International Nuclear Information System (INIS)

    Erdmann, M.; Capone, D. II; Coleman, S.; Jones, B.; Seuntjens, J.

    1993-05-01

    In 1991, the Superconducting Super Collider Laboratory (SSCL) instituted a program to qualify specific superconductor manufacturers for production of cable acceptable for use in both Collider Dipole (CDM) and Quadrupole (CQM) magnets. The SSCL Vendor Qualification Program (VQP) was designed with two Phases. Phase 1 was divided into two additional phases, 1A and 1B, which ran concurrently. In Phase 1B, each vendor was directed to manufacture roughly 3000 kg of cable using a ''baseline'' process. The baseline process was agreed to by both the SSCL and the vendor at the beginning of the VQP. In this phase, process control was closely monitored with the use of statistical methods and each vendor was graded based on these results. Phase 1A, known as the R ampersand D phase, was developed to allow each vendor an opportunity to optimize and improve on their baseline process in terms of both cost and manufacturability. In this phase, multifilament billets were designed to explore several key variables such as alternate alloy sources, process modifications and improved billet designs. At the end of Phase 1, the results from both 1A and 1B were evaluated at a review between the SSCL and each vendor, and a final Phase 2 process was generated and fixed using the best results. In Phase 2, each vendor is required to manufacture roughly 6000 kg of superconducting cable under a firm fixed price contract which can then be used to create an accurate price estimate for competitive bidding on the full rate production CDM and CQM contracts. At the end of Phase 2, each vendor must meet the minimum requirements outlined in the contract to become a qualified superconducting cable supplier. For one requirement, critical process variables identified by the SSCL Conductor Department at the beginning of the VQP will be evaluated to determine the quality and uniformity of the material produced during Phase 2 of the program

  15. Industry participation workshop: Chromium electroplating of superconductor strand. Proceedings

    International Nuclear Information System (INIS)

    1994-01-01

    The primary objective of the workshop was to inform US plating vendors about the opportunity to participate in the effort on Cr plating of large quantities of superconducting wires required for the ITER and the TPX projects and DOE's interest in developing several reliable and high quality suppliers of Chromium plating services for the superconducting strand industry. The objective was also to inform plating vendors about the Cr plating technology developed in LLNL and invite interested plating vendors to get the technology. Finally the workshop was intended to inform the plating vendors about the plan to get verification of capability of two to four vendors for Cr plating of superconducting strands

  16. 76 FR 78009 - Information Collection; Implementation of Information Technology Security Provision

    Science.gov (United States)

    2011-12-15

    ...] Information Collection; Implementation of Information Technology Security Provision AGENCY: General Services... collection requirement regarding Implementation of Information Technology Security Provision. Public comments... Information Collection 3090- 0294, Implementation of Information Technology Security Provision, by any of the...

  17. APPLICATION OF INFORMATION TECHNOLOGY IN SPORT

    Directory of Open Access Journals (Sweden)

    Šemsudin Plojović

    2006-06-01

    Full Text Available Information technology (IT is conception which integrates modern techniques integrated with modern computer systems and communications. The basic conception of IT makes: knowledge, intelligent system, communication and softer. Conception of IT is wader then conception of equipment (hardware. Information technology was made joining together three basic technologies: microelectronics, communications and PC equipment. Integration of those technologies starts somewhere around fifties – together with commercial computers and after that brings development of several new technologies but most important are: • sensor technologies (industrial sensor, keyboards, mousses, digital cameras, • biotechnology and genetic engineering technology, • robotic (industrial robots • artificial intelligence (for us very important part of experts systems • images technologies (modern monitors and printers, LCD displays, high resolution TV monitors In this paper we compare sports club which is using information technologies and club which is organized in more traditional way. Compeering those two clubs we’re getting data which are showing to us that appliance of information technology is absolutely necessary if our aim are better sports results and investing in information technology is absolutely justified.

  18. Innovation Value of Information Technology: Impact of Information Technology--Intensity on Innovation Capability and Firm Performance

    Science.gov (United States)

    Ramamani, Mahesh Kumar

    2010-01-01

    Though information technology adoptions have been always referred to as innovations in firms, much of the business value literature has concentrated on the tangible and immediately measurable impacts of information technology (IT) adoptions. This study aims to explore the impact of information technology investments on the innovativeness of a…

  19. Best practice vendor risk management in today's interconnected world.

    Science.gov (United States)

    Beale, Ian

    2017-01-01

    This paper explains why vendor/third-party risk is so important to all organisations, as well as the principal risks that organisations must consider. It describes the responsibility of management to manage these risks with support from risk experts at the selection phase and through the ongoing relationship. Different sources of information about the management of the key risks and alternative ways of collecting the data are evaluated. The paper concludes by discussing how both customer and supplier organisations benefit from a balanced approach to risk management. The approach described in the paper applies to organisations of all types and sizes and can be applied to varied supply chains. The data and insights are based on research conducted by CEB.

  20. Coordinating vendor-buyer decisions for imperfect quality items considering trade credit and fully backlogged shortages

    Science.gov (United States)

    Khanna, Aditi; Gautam, Prerna; Jaggi, Chandra K.

    2016-03-01

    Supply chain management has become a critical issue for modern business environments. In today's world of cooperative decision-making, individual decisions in order to reduce inventory costs may not lead to an overall optimal solution. Coordination is necessary among participants of supply chain to achieve better performance. There are legitimate and important efforts from the vendor to enhance the relation with buyer; one such effort is offering trade credit which has been a driver of growth and development of business between them. The cost of financing is a core consideration in effective financial management, in general and in context of business. Also, due to imperfect production a vendor may produce defective items which results in shortages. Motivated with these aspects, an integrated vendor-buyer inventory model is developed for imperfect quality items with allowable shortages; in which the vendor offers credit period to the buyer for payment. The objective is to minimize the total joint annual costs incurred by the vendor and the buyer by using integrated decision making approach. The expected total annual integrated cost is derived and a solution procedure is provided to find the optimal solution. Numerical analysis shows that the integrated model gives an impressive cost reduction, in comparison to independent decision policies by the vendor and the buyer.

  1. Exploring Value Cocreation in Relationships Between an ERP Vendor and its Partners

    DEFF Research Database (Denmark)

    Sarker, Suprateek; Sarker, Saonee; Sahaym, Arvin

    2012-01-01

    cocreation within business-to business(B2B) contexts. Using a revelatory case study of the relationship between an ERP vendor with a global reputation and its partners, and informed by the resource-based view of the firm and related theoretical perspectives, we develop an understanding of value cocreation...... in B2B alliances associated with selling, extending, and implementing packaged software, specifically ERP systems. Our study reveals that there are different mechanisms underlying value cocreation within B2B alliances, and also points to several categories of contingency factors that influence...

  2. Emulating Industrial Control System Field Devices Using Gumstix Technology

    Science.gov (United States)

    2012-06-01

    Security mechanisms (e.g., intrusion detection systems, antivirus and honeypots) are employed in traditional Information Technology (IT) systems to detect...can be used to determine the vendor of the device if the fingerprinting is done on a local segment. 2.8 Emulation Emulation is software or...Each of the honeypots in the network can be different systems ranging from Windows workstations to IIS web servers to Cisco routers. Honeynets rely

  3. Information technology resources assessment

    Energy Technology Data Exchange (ETDEWEB)

    Stevens, D.F. [ed.

    1992-01-01

    This year`s Information Technology Resources Assessment (ITRA) is something of a departure from traditional practice. Past assessments have concentrated on developments in fundamental technology, particularly with respect to hardware. They form an impressive chronicle of decreasing cycle times, increasing densities, decreasing costs (or, equivalently, increasing capacity and capability per dollar spent), and new system architectures, with a leavening of operating systems and languages. Past assessments have aimed -- and succeeded -- at putting information technology squarely in the spotlight; by contrast, in the first part of this assessment, we would like to move it to the background, and encourage the reader to reflect less on the continuing technological miracles of miniaturization in space and time and more on the second- and third-order implications of some possible workplace applications of these miracles. This Information Technology Resources Assessment is intended to provide a sense of technological direction for planners in projecting the hardware, software, and human resources necessary to support the diverse IT requirements of the various components of the DOE community. It is also intended to provide a sense of our new understanding of the place of IT in our organizations.

  4. Information technology resources assessment

    Energy Technology Data Exchange (ETDEWEB)

    Stevens, D.F. (ed.)

    1992-01-01

    This year's Information Technology Resources Assessment (ITRA) is something of a departure from traditional practice. Past assessments have concentrated on developments in fundamental technology, particularly with respect to hardware. They form an impressive chronicle of decreasing cycle times, increasing densities, decreasing costs (or, equivalently, increasing capacity and capability per dollar spent), and new system architectures, with a leavening of operating systems and languages. Past assessments have aimed -- and succeeded -- at putting information technology squarely in the spotlight; by contrast, in the first part of this assessment, we would like to move it to the background, and encourage the reader to reflect less on the continuing technological miracles of miniaturization in space and time and more on the second- and third-order implications of some possible workplace applications of these miracles. This Information Technology Resources Assessment is intended to provide a sense of technological direction for planners in projecting the hardware, software, and human resources necessary to support the diverse IT requirements of the various components of the DOE community. It is also intended to provide a sense of our new understanding of the place of IT in our organizations.

  5. MODEL PEMILIHAN VENDOR TRUCKING PRIORITAS DAN ALOKASI ORDER UNTUK DELIVERY PROJECT ACCOUNT PERFETTI VAN MELLE INDONESIA (CASE STUDY : PT DAMCO INDONESIA

    Directory of Open Access Journals (Sweden)

    Erna Mulyati

    2014-01-01

    trucking lainnya. Metode Vogell’s Aproximation Method (VAM dan Modified Distribution Method yang digunakan untuk pengalokasiannya menghasilkan biaya distribusi yang telah optimal dengan total biaya Rp8.467.347, di mana PT Adi Sarana Armada terpilih sebagai vendor prioritas untuk wilayah kiriman Banten, Lampung, dan Tanggerang, sementara Muna Jaya Express terpilih sebagai vendor prioritas untuk wilayah kiriman Surabaya, Malang, dan Jember. Kata Kunci : vendor, trucking, fuzzy synthetic evaluation, vogell’s aproximation method, modified distribution method   Abstract Vendor selection process is very important to be considered and implemented as possible in an effort to provide and improve services provided for the creation of customer satisfaction to the fullest. Damco PT Indonesia must be able to pick and choose the best partner that has the quality of performance in accordance with standards set by the company, particularly in choosing a vendor. Vendors may choose errors cause harm to the company, so it is necessary to assess the performance of trucking vendors who have been cooperating with Damco PT Indonesia, so the company can continue to maintain the quality of service. Fuzzy Synthetic Evaluation is a method used to assess the performance of vendors provide flexibility to accommodate the uncertainty due to information held vague and subjective elements of the preferences that can be used in decision-making problems. This method is expected to be able to effectively and efficiently enable the company to be able to take the best decision in selecting a vendor trucking so that earned Third Party Logistic (3PL that will be used to allocate the order to the customer. Order allocator is done by applying the transport algorithm. The author uses two methods in this algorithm is Vogell's Aproximation Method (VAM for determining the initial table and Modified Distribution Method for a test of the initial table is created to look optimalization. This method was chosen

  6. Information technology road map 2015

    International Nuclear Information System (INIS)

    2009-09-01

    This book introduces information technology road map 2015 with presentation, process, plan and conclusion of it. It also has introduction of IT road map by field : information technology road map 2015 on the next-generation of semiconductor, display, light emitting diode and light industry, home network and home electronic appliances, digital TV and broadcasting, radio technology, satellite communications, mobile communication for the next-generation, BcN field, software, computer for the next-generation and security of knowledge information.

  7. The US Army Corps of Engineers Roadmap for Life-Cycle Building Information Modeling (BIM)

    Science.gov (United States)

    2012-11-01

    that have been incorporated into BIM technologies marketed by competing vendors (e.g., Industry Foundation Class [IFC], Construction Operations...ER D C SR -1 2- 2 The US Army Corps of Engineers Roadmap for Life-Cycle Building Information Modeling ( BIM ) En gi ne er R es ea rc h an...Information Modeling ( BIM ) US Army Corps of Engineers Directorate of Civil Works Engineering and Construction Branch Washington, DC 20314-1000 Final

  8. 48 CFR 39.104 - Information technology services.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Information technology... SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.104 Information technology services. When acquiring information technology services, solicitations must not describe any...

  9. Architecture academic by information technologies utilization ...

    African Journals Online (AJOL)

    This research aims at studying teaching modern architecture with information technology approach. Today, information technology is used to transmit knowledge in many universities of the world. Information technology tools are potentially capable of providing engineering students with a broad continuum of curriculum in ...

  10. Patent medicine vendors are major providers antimalaria treatment

    African Journals Online (AJOL)

    pre-intervention value (5.5% versus 3.6%; p>0.05) and significantly lower than the post training values. (p<0.001). ... Profit was the core factor underlying the negative practices among the patent medicine vendors. .... Give cheaper drugs.

  11. Revolutionizing Healthcare Through Information Technology

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The Presidents Information Technology Advisory Committee PITAC is appointed by the President to provide independent expert advice on maintaining Americas preeminence...

  12. Gaining Leverage Over Vendor Lock to Improve Acquisition Performance and Cost Efficiencies

    Science.gov (United States)

    2014-04-30

    Virginia Wydler, MITRE Corporation Open Systems Architecture License Rights: A New Era for the Public– Private Market -Place Nickolas Guertin, DASN RDT...if only one vendor can replace or upgrade those key components, that de facto monopolist may be able to exert excess negotiating leverage over...instead of sole source subcontractor procurement. The Program Office should have the prime vendor to provide a full market research data in accordance

  13. Value analysis for advanced technology products

    Science.gov (United States)

    Soulliere, Mark

    2011-03-01

    Technology by itself can be wondrous, but buyers of technology factor in the price they have to pay along with performance in their decisions. As a result, the ``best'' technology may not always win in the marketplace when ``good enough'' can be had at a lower price. Technology vendors often set pricing by ``cost plus margin,'' or by competitors' offerings. What if the product is new (or has yet to be invented)? Value pricing is a methodology to price products based on the value generated (e.g. money saved) by using one product vs. the next best technical alternative. Value analysis can often clarify what product attributes generate the most value. It can also assist in identifying market forces outside of the control of the technology vendor that also influence pricing. These principles are illustrated with examples.

  14. The relationship between telehealth and information technology ranges from that of uneasy bedfellows to creative partnerships.

    Science.gov (United States)

    Wade, Victoria A; Hamlyn, Jeremy S

    2013-10-01

    The relationship between the clinical and technical aspects of a telehealth operation is frequently problematic, and technically-driven projects often fail to achieve sustainability. Qualitative data from a study of 37 Australian telehealth services were analysed to understand how the relationship between telehealth providers and information technology (IT) departments helps or hinders the development of telehealth. The most frequent difficulties reported were between telehealth services and the internal IT departments of health services, rather than with external vendors. The difficulties included barriers to installing telehealth over IT networks, a lack of priority given to telehealth services, and IT departments insisting on standardised approach. Alternatively, when IT staff were assigned to supporting clinical staff and had a close working relationship with them, they were major enablers of telehealth services. Authorising dedicated IT support and encouraging joint problem solving should provide a strong foundation for a healthy relationship which contributes to the growth and sustainability of telehealth.

  15. [Information technology in medical education].

    Science.gov (United States)

    Ramić, A

    1999-01-01

    The role of information technology in educational models of under-graduate and post-graduate medical education is growing in 1980's influenced by PC's break-in in medical practice and creating relevant data basis, and, particularly, in 1990's by integration of information technology on international level, development of international network, Internet, Telemedicin, etc. The development of new educational information technology is evident, proving that information in transfer of medical knowledge, medical informatics and communication systems represent the base of medical practice, medical education and research in medical sciences. In relation to the traditional approaches in concept, contents and techniques of medical education, new models of education in training of health professionals, using new information technology, offer a number of benefits, such as: decentralization and access to relevant data sources, collecting and updating of data, multidisciplinary approach in solving problems and effective decision-making, and affirmation of team work within medical and non-medical disciplines. Without regard to the dynamics of change and progressive reform orientation within health sector, the development of modern medical education is inevitable for all systems a in which information technology and available data basis, as a base of effective and scientifically based medical education of health care providers, give guarantees for efficient health care and improvement of health of population.

  16. Realistic Vendor-Specific Synthetic Ultrasound Data for Quality Assurance of 2-D Speckle Tracking Echocardiography: Simulation Pipeline and Open Access Database.

    Science.gov (United States)

    Alessandrini, Martino; Chakraborty, Bidisha; Heyde, Brecht; Bernard, Olivier; De Craene, Mathieu; Sermesant, Maxime; D'Hooge, Jan

    2018-03-01

    Two-dimensional (2-D) echocardiography is the modality of choice in the clinic for the diagnosis of cardiac disease. Hereto, speckle tracking (ST) packages complement visual assessment by the cardiologist by providing quantitative diagnostic markers of global and regional cardiac function (e.g., displacement, strain, and strain-rate). Yet, the reported high vendor-dependence between the outputs of different ST packages raises clinical concern and hampers the widespread dissemination of the ST technology. In part, this is due to the lack of a solid commonly accepted quality assurance pipeline for ST packages. Recently, we have developed a framework to benchmark ST algorithms for 3-D echocardiography by using realistic simulated volumetric echocardiographic recordings. Yet, 3-D echocardiography remains an emerging technology, whereas the compelling clinical concern is, so far, directed to the standardization of 2-D ST only. Therefore, by building upon our previous work, we present in this paper a pipeline to generate realistic synthetic sequences for 2-D ST algorithms. Hereto, the synthetic cardiac motion is obtained from a complex electromechanical heart model, whereas realistic vendor-specific texture is obtained by sampling a real clinical ultrasound recording. By modifying the parameters in our pipeline, we generated an open-access library of 105 synthetic sequences encompassing: 1) healthy and ischemic motion patterns; 2) the most common apical probe orientations; and 3) vendor-specific image quality from seven different systems. Ground truth deformation is also provided to allow performance analysis. The application of the provided data set is also demonstrated in the benchmarking of a recent academic ST algorithm.

  17. Electronic health record usability: analysis of the user-centered design processes of eleven electronic health record vendors.

    Science.gov (United States)

    Ratwani, Raj M; Fairbanks, Rollin J; Hettinger, A Zachary; Benda, Natalie C

    2015-11-01

    The usability of electronic health records (EHRs) continues to be a point of dissatisfaction for providers, despite certification requirements from the Office of the National Coordinator that require EHR vendors to employ a user-centered design (UCD) process. To better understand factors that contribute to poor usability, a research team visited 11 different EHR vendors in order to analyze their UCD processes and discover the specific challenges that vendors faced as they sought to integrate UCD with their EHR development. Our analysis demonstrates a diverse range of vendors' UCD practices that fall into 3 categories: well-developed UCD, basic UCD, and misconceptions of UCD. Specific challenges to practicing UCD include conducting contextually rich studies of clinical workflow, recruiting participants for usability studies, and having support from leadership within the vendor organization. The results of the study provide novel insights for how to improve usability practices of EHR vendors. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  18. Licensee contractor and vendor inspection status report. Quarterly report, January-March 1986. Volume 10, No. 1

    International Nuclear Information System (INIS)

    1986-05-01

    The NRC vendor inspection focus has been shifted to vendor activities associated with nuclear plant operation, maintenance, and modifications, more than firms designing nuclear steam supply systems, architect engineering firms designing nuclear plants, and major equipment vendors. Results of 16 inspections are reported, giving for each organization inspected, their activity, inspection bases and scope, and any violations, nonconformances, or unresolved items found. The status of previous inspection findings are also given

  19. Review and Assessment of Commercial Vendors/Options for Feeding and Pumping Biomass Slurries for Hydrothermal Liquefaction

    Energy Technology Data Exchange (ETDEWEB)

    Berglin, Eric J.; Enderlin, Carl W.; Schmidt, Andrew J.

    2012-11-01

    The National Advanced Biofuels Consortium is working to develop improved methods for producing high-value hydrocarbon fuels. The development of one such method, the hydrothermal liquefaction (HTL) process, is being led by the Pacific Northwest National Laboratory (PNNL). The HTL process uses a wet biomass slurry at elevated temperatures (i.e., 300 to 360°C [570 to 680°F]) and pressures above the vapor pressure of water (i.e., 15 to 20 MPa [2200 to 3000 psi] at these temperatures) to facilitate a condensed-phase reaction medium. The process has been successfully tested at bench-scale and development and testing at a larger scale is required to prove the viability of the process at production levels. Near-term development plans include a pilot-scale system on the order of 0.5 to 40 gpm, followed by a larger production-scale system on the order of 2000 dry metric tons per day (DMTPD). A significant challenge to the scale-up of the HTL process is feeding a highly viscous fibrous biomass wood/corn stover feedstock into a pump system that provides the required 3000 psi of pressure for downstream processing. In October 2011, PNNL began investigating commercial feed and pumping options that would meet these HTL process requirements. Initial efforts focused on generating a HTL feed and pump specification and then providing the specification to prospective vendors to determine the suitability of their pumps for the pilot-scale and production-scale plants. Six vendors were identified that could provide viable equipment to meet HTL feed and/or pump needs. Those six vendors provided options consisting three types of positive displacement pumps (i.e., diaphragm, piston, and lobe pumps). Vendors provided capabilities and equipment related to HTL application. This information was collected, assessed, and summarized and is provided as appendices to this report.

  20. Networking activities and perceptions of HIV risk among male migrant market vendors in China.

    Science.gov (United States)

    Wang, Wenqing; Muessig, Kathryn E; Li, Mingqiang; Zhang, Ying-Xia; Zhang, Yingxia

    2014-02-01

    HIV research among internal migrants in China has not fully explored the contexts and perceptions of "risk". In 2011, urban markets in Liuzhou, China were mapped, and sixty male vendors, age 22-56, were selected for in-depth interviews on migration, social and family life, and perceptions and practices of sexual risk behavior. Participants were evenly divided among higher income shop and small stall vendors. All men were sexually active. Only the shop vendors reported non-marital sexual partners, including concurrent partners (n = 15), commercial partners (n = 10), and other sexual relationships (n = 11). Shop vendors engaged in networking activities that facilitated commercial and non-commercial high-risk sex. Perceptions of HIV risk from commercial sex led some men to doubt the protective ability of condoms and rely on local (unproven) self-protection techniques. Networking activities played a role in high-risk sex and shaping migrants' risk perceptions and health practices. The networks created through these processes could also be used to facilitate health promotion activities.

  1. 77 FR 55217 - Health Information Technology Implementation

    Science.gov (United States)

    2012-09-07

    ... Information Technology Implementation AGENCY: Health Resources and Services Administration (HRSA), Department... effective use of Health Information Technology (HIT). SUPPLEMENTARY INFORMATION: Former Grantee of Record... advance information technology resources of Virginia's medically underserved communities, HCHC has...

  2. Internet cigarette vendor compliance with credit card payment and shipping bans.

    Science.gov (United States)

    Williams, Rebecca S; Ribisl, Kurt M

    2014-02-01

    Most Internet cigarette sales have violated taxation and youth access laws, leading to landmark 2005 agreements with credit card companies, PayPal, and private shippers (United Parcel Service, Federal Express, DHL) to cease participation in these transactions. Despite their promise at the time, loopholes allowed for check payment and U.S. Postal Service (USPS) shipping. This study assessed actual vendor compliance with the payment and shipping bans using a purchase survey. In late 2007 and early 2008, an adult buyer attempted to order cigarettes from the 97 most popular Internet cigarette vendors (ICVs) using banned payment and shipping methods. When banned payment or shipping methods were unavailable, purchases were attempted with alternate methods (e.g., checks, e-checks, USPS). Twenty-seven of 100 orders were placed with (banned) credit cards; 23 were successfully received. Seventy-one orders were placed with checks (60 successfully received). Four orders were delivered using banned shippers; 79 of 83 successfully received orders were delivered by the USPS. About a quarter of ICVs violated the payment ban, others adapted by accepting checks. Most vendors complied with the shipping ban, perhaps because USPS was an easy substitute shipping option. Better enforcement of the bans is needed; the 2009 Prevent All Cigarette Trafficking Act closed the USPS loophole by making cigarettes nonmailable material; evaluation of enforcement efforts and adaptations by vendors are needed. These sorts of bans are a promising approach to controlling the sale of restricted goods online.

  3. Understanding computer and information technology

    International Nuclear Information System (INIS)

    Choi, Yun Cheol; Han, Tack Don; Im, Sun Beom

    2009-01-01

    This book consists of four parts. The first part describes IT technology and information community understanding of computer system, constitution of software system and information system and application of software. The second part is about computer network, information and communication, application and internet service. The third part contains application and multi media, application of mobile computer, ubiquitous computing and ubiquitous environment and computer and digital life. The last part explains information security and ethics of information-oriented society, information industry and IT venture, digital contents technology and industry and the future and development of information-oriented society.

  4. Willingness of Herbal Medicine Practitioners and Herbs Vendors to ...

    African Journals Online (AJOL)

    Willingness of Herbal Medicine Practitioners and Herbs Vendors to Contribute Financially to Conservation of Medicinal Plants in Ibadan, ... PROMOTING ACCESS TO AFRICAN RESEARCH ... The earlier version of this paper had some errors.

  5. Information Technology and Literacy Assessment.

    Science.gov (United States)

    Balajthy, Ernest

    2002-01-01

    Compares technology predictions from around 1989 with the technology of 2002. Discusses the place of computer-based assessment today, computer-scored testing, computer-administered formal assessment, Internet-based formal assessment, computerized adaptive tests, placement tests, informal assessment, electronic portfolios, information management,…

  6. The Dynamic Environment of Crypto Markets: The Lifespan of New Psychoactive Substances (NPS and Vendors Selling NPS

    Directory of Open Access Journals (Sweden)

    Elle Wadsworth

    2018-03-01

    Full Text Available The Internet has played a major role in the distribution of New Psychoactive Substances (NPS, and crypto markets are increasingly used for the anonymous sale of drugs, including NPS. This study explores the availability of individual NPS and vendors on the crypto markets and considers whether crypto markets are a reliable platform for the sale of NPS. Data was collected from 22 crypto markets that were accessed through the hidden web using the Onion Router (Tor. Data collection took place bimonthly from October 2015 to October 2016 as part of the CASSANDRA (Computer Assisted Solutions for Studying the Availability aNd DistRibution of novel psychoActive substances project. In seven snapshots over 12 months, 808 unique vendors were found selling 256 unique NPS. The total number of individual NPS and vendors increased across the data collection period (increase of 93.6% and 71.6%, respectively. Only 24% (n = 61 of the total number of NPS and 4% (n = 31 of vendors appeared in every snapshot over the 12 months, whereas 21% (n = 54 of NPS and 45% (n = 365 of vendors only appeared once throughout the data collection. The individual NPS and vendors did not remain the same over the 12 months. However, the availability of NPS and vendors selling NPS grew. NPS consistently available on crypto markets could indicate popular substances.

  7. Choosing a Vendor: Where to Buy a Micro.

    Science.gov (United States)

    Mason, Robert M.

    1983-01-01

    Examines options for buying microcomputers (the manufacturer or his/her representative, computer stores, general retail stores, mail order, system integrators, traditional vendors, second-hand). Three major factors are considered: support before sale; price/cost; and support after sale. Advantages and disadvantages of each option and…

  8. CITY POLLUTION: THE CASE STUDY OF VENDORS AND ...

    African Journals Online (AJOL)

    User

    2017-12-15

    Dec 15, 2017 ... He noted that some beg holding a cup or plate in their hands ... Beggars and vendors have been accused of causing a number of conflicts in streets .... Since we sleep on street pavements, we empty bins in search of boxes, ...

  9. Competitiveness through cooperation between electricity and information technology. TESLA - Information technology and electric power systems technology programme 1998-2002

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-01

    The electricity markets are being opened up to competition all round the world. To succeed in competition electricity sellers want new information technology tools to use in managing the sale of electricity. The network companies are aiming to step up utilization of their distribution capacity and to optimize power quality and the reliability of supply. Consumers need solutions with which they can manage their own power consumption and tendering sellers. The Nordic countries have been the first to deregulate their electricity markets. This head start in time is being made use of to generate a head start in technology. Tekes has initiated a technology programme for the years 1998 to 2002, named TESLA - Information Technology and Electric Power Systems, to promote the competitiveness of the Finnish electricity industry in changing conditions. The objective of the programme is to adapt information technology extensively to power distribution and thus develop the potential for Finland`s electricity industry to succeed on world markets. At the moment power distribution technology forms about one third of Finland`s energy technology exports. The programme is also aimed at developing new data transfer and data processing applications for companies in information technology clusters. For Finnish parties in the electricity markets the programme will produce ways and means of (1) improving management and use of distribution networks, (2) implementing competition in electricity sales, and (3) increasing the efficiency of electricity use

  10. Enrichment technology. Dependable vendor of gas centrifuges; Enrichment Technology. Zuverlaessiger Lieferant von Gaszentrifugen

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2011-10-15

    Enrichment Technology is an innovative, high-tech company that develops, manufactures and installs gas centrifuges for enriching uranium. In addition, Enrichment Technology designs enrichment plants that use gas centrifuge technology. This technology offers the most efficient and cost-effective method for enriching uranium yet: high-performance, safe technology that dominates the market with a global share of 45 percent. A determining factor in Enrichment Technology's success is its mission: supplying its customers with safe, reliable technology. Production of the centrifuges requires versatile know-how and collaboration between different departments as well as interdisciplinary teams at the various sites. More than 2000 operators at 8 sites in 5 countries contribute their individual knowledge and personal skills in order to produce this exceptional technology. The head office is in Beaconsfield near London and the operational headquarters are in Almelo in the Netherlands. There are other sites in Germany (Juelich und Gronau), Great Britain (Capenhurst) as well as project sites in the USA and France. Capenhurst is where experienced engineers design new enrichment plants and organise their construction. Centrifuge components are manufactured in Almelo and Juelich, while the pipework needed to connect up the centrifuges is produced at the site in Gronau. In Juelich, highly qualified scientists in interdisciplinary teams are continuously researching ways of improving the current centrifuges. Communication between specialists in the fields of chemistry, physics and engineering forms the basis for the company's success and the key to extending this leading position in the global enrichment market. (orig.)

  11. Democratic Model of Public Policy Accountability. Case Study on Implementation of Street Vendors Empowerment Policy in Makassar City

    Directory of Open Access Journals (Sweden)

    Rulinawaty Kasmadsi

    2015-08-01

    Full Text Available Policy accountability is a form of manifestation of public officials responsible to the people. One form of policy accountability that is discussed here is street vendors policy accountability, because they are a group of citizens who have the economic activities in public spaces. The existence of this policy how-ever, the number of street vendors from year to year increase in Makassar City. Therefore, this study seeks to uncover and explain the democratic policy ac-countability through the street vendors’ responses and expectations to the implementation of street ven-dors empowerment policy in Makassar City; and to uncover and explain the democratic policy account-ability through the stakeholders’ responses and ex-pectations to the implementation of street vendors empowerment policy in Makassar City. To achieve these objectives, the study uses democracy theory, in which this theory focuses on togetherness in dis-cussing solutions to the various problems of street vendors and in the policy implementation as well.This study used a qualitative design and case studies strat-egy. Data collection techniques used was observa-tion, interview, and documentation. Data were ana-lyzed with case description its settings. The results of this study pointed out that the interests and needs of the street vendors are not met through the empow-erment policies vendors. This is caused by the ab-sence of accountability forum as a place of togeth-erness all of street vendors empowerment stakehold-ers’. Street vendors empowerment policy in Makassar City are designed base on a top-down approach, so they are considered as objects, which must accept all government programs aimed at them.

  12. Telemedicine technologies information technologies in medicine and telehealth

    CERN Document Server

    Fong, Bernard; Li, CK

    2010-01-01

    This book brings together a broad range of topics demonstrating how information and wireless technologies can be used in healthcare. In this book, the authors focus on how medical information can be reliably transmitted through wireless communication networks. It explains how they can be optimized to carry medical information in various situations by utilizing readily available traditional wireless local area network (WLAN) and broadband wireless access (BWA) systems. In addition, the authors discuss consumer healthcare technology, which is becoming more popular as reduction in manufacturing c

  13. Technologies for information skills in web

    Directory of Open Access Journals (Sweden)

    Isa Maria Freire

    2012-12-01

    Full Text Available It presents and discusses the results of Information Project Skills – Tutorials for Intellectual Technology for dissemination of information in Web developed in Intellectuals Laboratory Technology at Department of Information Science, University Federal of Paraíba. Discusses proposed extension action, in partnership with university education areas in Library and Archival, to develop skills to search, organization, production and dissemination of information in the Web. Reports the development of tutorials to transfer intellectual technology in Web technology for community interested as well experience with face workshops held during the I- International Book Exhibition of Paraíba, in 2010. Discusses results and activities for information skills, from reflection on the experience in this first year the Project.

  14. Geographic and socioeconomic distribution of food vendors: a case study of a municipality in the Southern Brazil

    Directory of Open Access Journals (Sweden)

    Elizabeth Nappi Correa

    Full Text Available Abstract: The objective of this study was to identify the food vendor distribution profile of the city of Florianópolis, Santa Catarina State, Brazil, and investigate its association with the socioeconomic and demographic characteristics of different municipal regions. This descriptive, cross-sectional study obtained the location of food vendors from secondary data from different institutional sources. The density of different types of food vendors per 1,000 inhabitants in each municipal weighted area was calculated. The Kruskal-Wallis test compared the mean density of food vendors and the weighted income areas. The lowest-income regions had the lowest density of butchers, snack bars, supermarkets, bakeries/pastry shops, natural product stores, juice bars, and convenience stores. The identification of these areas may encourage the creation of public policies that facilitate healthy food startups and/or maintenance of healthy food vendors, especially in the lowest-income regions.

  15. Information Communication Technology and Politics: A Synthesized Analysis of the Impacts of Information Technology on Voter Participation in Kenya

    Science.gov (United States)

    Tsuma, Clive Katiba

    2011-01-01

    The availability of political information throughout society made possible by the evolution of contemporary information communication technology has precipitated conflicting debate regarding the effects of technology use on real life political participation. Proponents of technology argue that the use of new information technology stimulates…

  16. INFORMATION TECHNOLOGIES IN TOURISM

    Directory of Open Access Journals (Sweden)

    Radka Tosheva

    2016-12-01

    Full Text Available In this article the focus is on the role of information technology in tourism, tourism business, electronic payments, software used by tourist companies, new technologies for online advertising and shopping, software for mobile devices.

  17. Information Technology Budgets and Costs: Do You Know What Your Information Technology Costs Each Year?

    Science.gov (United States)

    Dugan, Robert E.

    2002-01-01

    Discusses yearly information technology costs for academic libraries. Topics include transformation and modernization activities that affect prices and budgeting; a cost model for information technologies; life cycle costs, including initial costs and recurring costs; cost benchmarks; and examples of pressures concerning cost accountability. (LRW)

  18. The Dynamic Environment of Crypto Markets: The Lifespan of New Psychoactive Substances (NPS) and Vendors Selling NPS.

    Science.gov (United States)

    Wadsworth, Elle; Drummond, Colin; Deluca, Paolo

    2018-03-16

    The Internet has played a major role in the distribution of New Psychoactive Substances (NPS), and crypto markets are increasingly used for the anonymous sale of drugs, including NPS. This study explores the availability of individual NPS and vendors on the crypto markets and considers whether crypto markets are a reliable platform for the sale of NPS. Data was collected from 22 crypto markets that were accessed through the hidden web using the Onion Router (Tor). Data collection took place bimonthly from October 2015 to October 2016 as part of the CASSANDRA ( C omputer A ssisted S olutions for S tudying the A vailability a N d D ist R ibution of novel psycho A ctive substances) project. In seven snapshots over 12 months, 808 unique vendors were found selling 256 unique NPS. The total number of individual NPS and vendors increased across the data collection period (increase of 93.6% and 71.6%, respectively). Only 24% ( n = 61) of the total number of NPS and 4% ( n = 31) of vendors appeared in every snapshot over the 12 months, whereas 21% ( n = 54) of NPS and 45% ( n = 365) of vendors only appeared once throughout the data collection. The individual NPS and vendors did not remain the same over the 12 months. However, the availability of NPS and vendors selling NPS grew. NPS consistently available on crypto markets could indicate popular substances.

  19. 77 FR 2734 - Health Information Technology Implementation

    Science.gov (United States)

    2012-01-19

    ... Information Technology Implementation AGENCY: Health Resources and Services Administration, HHS. ACTION... advance information technology resources of the Tennessee's medically underserved communities, TPCA has... advancement and effective use of Health Information Technology. These advancements will result in measurable...

  20. Westinghouse Savannah River Site vendor forum: An innovative cooperative technology development success

    International Nuclear Information System (INIS)

    Sturm, H.F. Jr.

    1996-01-01

    The Westinghouse Savannah River Company (WSRC) Supplier Environmental and Waste Management Information Exchange Forum was held August 31 - September 1, 1993. The forum, which was planned and conducted in concert with the Department of Energy Savannah River Operations Office (DOE-SROO), was held to foster a technical exchange in which new, innovative technologies were proposed by suppliers, to identify more cost-effective methods to apply to future and on-going activities, to increase use of the private sector, and to promote partnerships with other industries. The two day forum provided the opportunity for WSRC and DOE-SR to review program activities and challenges in five major areas, Savannah River Technology Center, Solid Waste Facilities, Environmental Restoration, Environmental Monitoring, and Decontamination and Decommissioning through formal presentations. The second day was designed to provide suppliers the opportunity to talk about current and future activities and challenges with representatives of each of these areas at display booths, special high interest topic interactive sessions, and site tours. Each attendee was then invited to submit pre-proposals relative to the abstracts presented in The Special Consolidate Solicitation for Environmental and Waste Management Basic and Applied Research and Research-Related Development and/or Demonstration No. E10600-E1 document. Twenty-five contracts totaling $12 million were awarded. Twenty-four contracts have now been completed. This paper provides an overview of the pre forum activities, the forum, post-forum and proposal review process, and most importantly a description of the technologies demonstrated, the benefits and savings derived, and future use potential from a DOE perspective, as well as technology transfer and industrial partnership potential

  1. Multi-vendor loyalty programs: influencing customer behavioral loyalty?

    Directory of Open Access Journals (Sweden)

    Teresa eVillacé-Molinero

    2016-02-01

    Full Text Available Loyalty programs are a consolidated marketing instrument whose adoption in many sectors has not been associated with appropriate comprehension of either their management elements or their effects. The purpose of this research is to contribute to knowledge about the effect of loyalty programs on repeat purchase behavior. More specifically, it seeks to see discover whether joining a program changes the buying behavior of its members, and, if so, to study the profile of those whose behavior changes most. The intention was also to provide new study variables pertaining to multi-vendor loyalty programs, such as where they are joined or purchases in associated outlets as a result of behavioral loyalty. Research was carried out using a sample of 1,200 individuals (31,746 purchases belonging to a multi-vendor loyalty program. The study period was 13 years, 4 months, and split into two phases: before and after the joining the program. Different methodological approaches, such as the use of transactional databases that included pre-program-enrollment data and of the same sampling units throughout the study, were incorporated into the research with the aim of advancing academic knowledge regarding multi-vendor loyalty programs. Moreover, a type of program and market hardly dealt with in the relevant literature was analyzed. The results showed while the loyalty program had managed to reduce the time between purchases, it had not affected purchase volume or average expenditure. They also demonstrated the existence of a differential profile of customers who had changed their buying behavior to a greater extent. Finally, recency was identified as being the decisive variable in behavioral change.

  2. Multi-Vendor Loyalty Programs: Influencing Customer Behavioral Loyalty?

    Science.gov (United States)

    Villacé-Molinero, Teresa; Reinares-Lara, Pedro; Reinares-Lara, Eva

    2016-01-01

    Loyalty programs are a consolidated marketing instrument whose adoption in many sectors has not been associated with appropriate comprehension of either their management elements or their effects. The purpose of this research is to contribute to knowledge about the effect of loyalty programs on repeat purchase behavior. More specifically, it seeks to discover whether joining a program changes the buying behavior of its members, and, if so, to study the profile of those whose behavior changes most. The intention was also to provide new study variables pertaining to multi-vendor loyalty programs, such as where they are joined or purchases in associated outlets as a result of behavioral loyalty. Research was carried out using a sample of 1200 individuals (31,746 purchases) belonging to a multi-vendor loyalty program. The study period was 13 years, 4 months, and split into two phases: before and after the joining the program. Different methodological approaches, such as the use of transactional databases that included pre-program-enrollment data and of the same sampling units throughout the study, were incorporated into the research with the aim of advancing academic knowledge regarding multi-vendor loyalty programs. Moreover, a type of program and market hardly dealt with in the relevant literature was analyzed. The results showed while the loyalty program had managed to reduce the time between purchases, it had not affected purchase volume or average expenditure. They also demonstrated the existence of a differential profile of customers who had changed their buying behavior to a greater extent. Finally, recency was identified as being the decisive variable in behavioral change.

  3. Multi-Vendor Loyalty Programs: Influencing Customer Behavioral Loyalty?

    Science.gov (United States)

    Villacé-Molinero, Teresa; Reinares-Lara, Pedro; Reinares-Lara, Eva

    2016-01-01

    Loyalty programs are a consolidated marketing instrument whose adoption in many sectors has not been associated with appropriate comprehension of either their management elements or their effects. The purpose of this research is to contribute to knowledge about the effect of loyalty programs on repeat purchase behavior. More specifically, it seeks to discover whether joining a program changes the buying behavior of its members, and, if so, to study the profile of those whose behavior changes most. The intention was also to provide new study variables pertaining to multi-vendor loyalty programs, such as where they are joined or purchases in associated outlets as a result of behavioral loyalty. Research was carried out using a sample of 1200 individuals (31,746 purchases) belonging to a multi-vendor loyalty program. The study period was 13 years, 4 months, and split into two phases: before and after the joining the program. Different methodological approaches, such as the use of transactional databases that included pre-program-enrollment data and of the same sampling units throughout the study, were incorporated into the research with the aim of advancing academic knowledge regarding multi-vendor loyalty programs. Moreover, a type of program and market hardly dealt with in the relevant literature was analyzed. The results showed while the loyalty program had managed to reduce the time between purchases, it had not affected purchase volume or average expenditure. They also demonstrated the existence of a differential profile of customers who had changed their buying behavior to a greater extent. Finally, recency was identified as being the decisive variable in behavioral change. PMID:26941677

  4. Exploratory Study into the Microbiological Quality of Spinach and Cabbage Purchased from Street Vendors and Retailers in Johannesburg, South Africa.

    Science.gov (United States)

    Plessis, Erika M du; Govender, Sarasha; Pillay, Bala; Korsten, Lise

    2017-10-01

    Knowledge of the microbiological quality and prevalence of antibiotic resistance and virulence genes in bacterial isolates from leafy green vegetables supplied by formal suppliers (retailers) and informal suppliers (street vendors) in South Africa is limited. Because leafy vegetables have been implicated in foodborne disease outbreaks worldwide, 180 cabbage and spinach samples were collected from three major retailers and nine street vendors in Johannesburg, South Africa. Escherichia coli and coliforms were enumerated using Petrifilm plates. The prevalence of Listeria monocytogenes, Salmonella, and Shigella was determined using real-time PCR analysis. Identities of presumptive E. coli isolates from the fresh produce were confirmed using matrix-assisted laser desorption-ionization time of flight mass spectroscopy. Isolates were characterized using phenotypic (antibiotic resistance) and genotypic (phylogenetic and virulence gene) analysis. Hygiene indicator bacteria levels on spinach from formal and informal retailers exceeded the maximum level specified by the Department of Health guidelines for fresh fruit and vegetables. E. coli counts for street vendor spinach were higher (P analysis; Shigella was not detected. Of the 29 spinach E. coli isolates, 37.9% were multidrug resistant. Virulence genes eae and stx 1 were present in 14 and 3% of the spinach E. coli isolates, respectively; the stx 2 gene was not detected. Eighty-six percent of these isolates belonged to phylogroup A, 3% belonged to group C, 7% belonged to group E, and 3% belonged to clade 1. The results from the current exploratory study on the microbiological quality of spinach bought from selected retailers highlight the need for continued surveillance on a larger scale, especially in the informal sector, to characterize the potential health risks to the consumer.

  5. Tobacco Taxation, Smuggling, and Street Tobacco Vendors in Eritrea

    International Development Research Centre (IDRC) Digital Library (Canada)

    The bulk of the smuggled cigarettes are sold by street vendors, many of them women and children, ... and its implications for government revenue;; identify the reasons why people sell on the streets; and, ... Agent(e) responsable du CRDI.

  6. An overview of in situ waste treatment technologies

    International Nuclear Information System (INIS)

    Walker, S.; Hyde, R.A.; Piper, R.B.; Roy, M.W.

    1992-01-01

    In situ technologies are becoming an attractive remedial alternative for eliminating environmental problems. In situ treatments typically reduce risks and costs associated with retrieving, packaging, and storing or disposing-waste and are generally preferred over ex situ treatments. Each in situ technology has specific applications, and, in order to provide the most economical and practical solution to a waste problem, these applications must be understood. This paper presents an overview of thirty different in situ remedial technologies for buried wastes or contaminated soil areas. The objective of this paper is to familiarize those involved in waste remediation activities with available and emerging in situ technologies so that they may consider these options in the remediation of hazardous and/or radioactive waste sites. Several types of in situ technologies are discussed, including biological treatments, containment technologies, physical/chemical treatments, solidification/stabilization technologies, and thermal treatments. Each category of in situ technology is briefly examined in this paper. Specific treatments belonging to these categories are also reviewed. Much of the information on in situ treatment technologies in this paper was obtained directly from vendors and universities and this information has not been verified

  7. Internet technologies and information services

    CERN Document Server

    Miller, Joseph

    2014-01-01

    Internet Technologies and Information Services: Second Edition is a vital asset to students preparing for careers in library and information science and provides expanded coverage to important new developments while still covering Internet foundations. In addition to networking, the Internet, HTML, web design, web programming, XML, and web searching, this new edition covers additional topics such as cloud computing, content management systems, eBook technologies, mobile technologies and applications, relational database management systems (RDMS), open source software, and virtual priva

  8. Tobacco Products Sold by Internet Vendors Following Restrictions on Flavors and Light Descriptors

    Science.gov (United States)

    Williams, Rebecca S.; Ribisl, Kurt M.

    2015-01-01

    Introduction: The 2009 Family Smoking Prevention and Tobacco Control Act bans characterizing flavors (e.g., grape, strawberry) in cigarettes, excluding tobacco and menthol, and prohibits companies from using misleading descriptors (e.g., light, low) that imply reduced health risks without submitting scientific data to support the claim and obtaining a marketing authorization from the U.S. Food and Drug Administration. This observational study examines tobacco products offered by Internet cigarette vendors (ICV) pre- and postimplementation of the ban on characterizing flavors in cigarettes and the restriction on misleading descriptors. Methods: Cross-sectional samples of the 200 most popular ICVs in 2009, 2010, and 2011 were identified. Data were analyzed in 2012 and 2013. Results: In 2011 the odds for selling cigarettes with banned flavors or misleading descriptors were 0.40 times that for selling the products in 2009 (95% confidence interval [CI] = 0.18, 0.88). However, 89% of vendors continued to sell the products, including 95.8% of international vendors. Following the ban on characterizing flavors, ICVs began selling potential alternative products. In 2010, the odds for selling flavored little cigars were 1.71 (95% CI = 1.09, 2.69) times that for selling the product in 2009 and, for clove cigars, were 5.50 (95% CI = 2.36, 12.80) times that for selling the product in 2009. Conclusions: Noncompliance with the ban on characterizing flavors and restriction on misleading descriptors has been high, especially among international vendors. Many vendors appear to be circumventing the intent of the flavors ban by selling unbanned flavored cigars, in some cases in lieu of flavored cigarettes. PMID:25173777

  9. Utilizing Information Technology to Facilitate Rapid Acquisition

    Science.gov (United States)

    2006-06-01

    PAGES 109 14. SUBJECT TERMS Rapid Acquisition, eCommerce , eProcurement, Information Technology, Contracting, Global Information Network...Agency. 5 eCommerce and eProcurement, and possess an adequate knowledge of information technology. D. RESEARCH QUESTIONS 1. Primary Research... eCommerce , Information Technology, and eProcurement knowledge, and government and private industry reports utilizing numerous library and Internet

  10. The optimal replenishment policy for time-varying stochastic demand under vendor managed inventory

    DEFF Research Database (Denmark)

    Govindan, Kannan

    2015-01-01

    A Vendor Managed Inventory (VMI) partnership places the responsibility on the vendor (rather than on buyers) to schedule purchase orders for inventory replenishment in the supply chain system. In this research, the supply chain network considers the Silver-Meal heuristic with an augmentation...... quantity replenishment policy between both traditional and VMI systems. We consider time-varying stochastic demand in two-echelon (one vendor, multiple retailers) supply chains. This paper seeks to find the supply chain that minimizes system cost through comparing performance between traditional and VMI...... systems. A mathematical model is developed, and total supply chain cost is used as the measure of comparison. The models are applied in both traditional and VMI supply chains based on pharmaceutical industry data, and we focus on total cost difference compared through the use of Adjusted Silver-Meal (ASM...

  11. Analytical review of modern information education technologies

    OpenAIRE

    Светлана Викторовна Зенкина; О П Панкратова

    2014-01-01

    This article discusses and analyzes the modern information education technologies, which are seen as the priority to use in the modern information educational environment (Internet-based educational technologies, distance education, media education, e-Learning technologies, smart-education technologies).

  12. System Engineering Analysis For Improved Scout Business Information Systems

    Energy Technology Data Exchange (ETDEWEB)

    Van Slyke, D. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-01-30

    The project uses system engineering principles to address the need of Boy Scout leaders for an integrated system to facilitate advancement and awards records, leader training and planning for meetings and activities. Existing products to address needs of Scout leaders and relevant stakeholders function to support record keeping and some communication functions but opportunity exists for a better system to fully integrate these functions with training delivery and recording, activity planning along with feedback and information gathering from stakeholders. Key stakeholders for the sytem include Scouts and their families, leaders, training providers, sellers of supplies and awards, content generators and facilities that serve Scout activities. Key performance parameters for the system are protection of personal information, availability of current information, information accuracy and information content that has depth. Implementation concepts considered for the system include (1) owned and operated by Boy Scouts of America, (2) Contracted out to a vendor (3) distributed system that functions with BSA managed interfaces. The selected concept is to contract out to a vendor to maximize the likelihood of successful integration and take advantage of the best technology. Development of requirements considers three key use cases (1) System facilitates planning a hike with training needed satisfied in advance and advancement recording real time (2) Scheduling and documenting in-person training, (3) Family interested in Scouting receives information and can request follow-up. Non-functional requirements are analyzed with the Quality Function Deployment tool. Requirement addressing frequency of backup, compatibility with legacy and new technology, language support, software update are developed to address system reliability and intuitive interface. System functions analyzed include update of activity database, maintenance of advancement status, archive of documents, and

  13. Information Systems Outsourcing Relationship Model

    Directory of Open Access Journals (Sweden)

    Richard Flemming

    2007-09-01

    Full Text Available Increasing attention is being paid to what determines the success of an information systems outsourcing arrangement. The current research aims to provide an improved understanding of the factors influencing the outcome of an information systems outsourcing relationship and to provide a preliminary validation of an extended outsourcing relationship model by interviews with information systems outsourcing professionals in both the client and vendor of a major Australian outsourcing relationship. It also investigates whether the client and the vendor perceive the relationship differently and if so, how they perceive it differently and whether the two perspectives are interrelated.

  14. PHYSICAL RESOURCES OF INFORMATION PROCESSES AND TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    Mikhail O. Kolbanev

    2014-11-01

    Full Text Available Subject of study. The paper describes basic information technologies for automating of information processes of data storage, distribution and processing in terms of required physical resources. It is shown that the study of these processes with such traditional objectives of modern computer science, as the ability to transfer knowledge, degree of automation, information security, coding, reliability, and others, is not enough. The reasons are: on the one hand, the increase in the volume and intensity of information exchange in the subject of human activity and, on the other hand, drawing near to the limit of information systems efficiency based on semiconductor technologies. Creation of such technologies, which not only provide support for information interaction, but also consume a rational amount of physical resources, has become an actual problem of modern engineering development. Thus, basic information technologies for storage, distribution and processing of information to support the interaction between people are the object of study, and physical temporal, spatial and energy resources required for implementation of these technologies are the subject of study. Approaches. An attempt is made to enlarge the possibilities of traditional cybernetics methodology, which replaces the consideration of material information component by states search for information objects. It is done by taking explicitly into account the amount of physical resources required for changes in the states of information media. Purpose of study. The paper deals with working out of a common approach to the comparison and subsequent selection of basic information technologies for storage, distribution and processing of data, taking into account not only the requirements for the quality of information exchange in particular subject area and the degree of technology application, but also the amounts of consumed physical resources. Main findings. Classification of resources

  15. METHODS FOR EVALUATION OF COMPANIES’ INFORMATION SYSTEMS AND TECHNOLOGIES EFFICIENCY AND CONTROL IN TEACHING COURSE "INFORMATION TECHNOLOGY GOVERNANCE"

    Directory of Open Access Journals (Sweden)

    Samchynska Yaroslava

    2014-10-01

    Full Text Available The use of the information systems and technologies in economic activity is called to represent companies’ corporate principles, aims, traditions, to help in realization of the planned strategies, thanks to that the management efficiency and the cost of enterprise increases. Teaching for educational discipline «IT Governance» is directed on a study and research of these intercommunications by students of the 5th course on specialties «Computer Science», «Software Engineering» for educational level Specialist (Past Bachelor Degree, Master degree. The auditing services belong to the actual methods for evaluation of the information systems and technologies efficiency and control, which are studied according to the course «IT Governance». The article deals with the methodological basis of providing auditing services for evaluation of efficiency and control of information systems (technologies for the purpose of satisfaction of growing informational needs of companies and functional activation in their information resources. The main task of auditing services for control of information systems (information communication technologies efficiency is to evaluate independently and objectively if the information technologies provide the necessary services. The basic criteria, data ware, subject and object of audit necessary for drawing up an audit report and assurance declaring are established. The program and a detailed list of auditing procedures for evaluation of efficiency of information systems and technologies have been presented

  16. Integrating Information & Communications Technologies into the Classroom

    Science.gov (United States)

    Tomei, Lawrence, Ed.

    2007-01-01

    "Integrating Information & Communications Technologies Into the Classroom" examines topics critical to business, computer science, and information technology education, such as: school improvement and reform, standards-based technology education programs, data-driven decision making, and strategic technology education planning. This book also…

  17. Buyer-vendor coordination for fixed lifetime product with quantity discount under finite production rate

    Science.gov (United States)

    Zhang, Qinghong; Luo, Jianwen; Duan, Yongrui

    2016-03-01

    Buyer-vendor coordination has been widely addressed; however, the fixed lifetime of the product is seldom considered. In this paper, we study the coordination of an integrated production-inventory system with quantity discount for a fixed lifetime product under finite production rate and deterministic demand. We first derive the buyer's ordering policy and the vendor's production batch size in decentralised and centralised systems. We then compare the two systems and show the non-coordination of the ordering policies and the production batch sizes. To improve the supply chain efficiency, we propose quantity discount contract and prove that the contract can coordinate the buyer-vendor supply chain. Finally, we present analytically tractable solutions and give a numerical example to illustrate the benefits of the proposed quantity discount strategy.

  18. Consumer Attitudes Regarding Information Technology Usage

    Directory of Open Access Journals (Sweden)

    Durmus YORUK

    2010-08-01

    Full Text Available This paper intends to formulate the hypotheses for the factors that influence individuals to adopt Information Technology as a mean to conduct the traditional services. The hypotheses are developed based on previous works utilizing the theories on technology acceptance and on related findings from empirical studies on information technologies,e-commerce and e-banking.

  19. Application of information technology in agricultural extension ...

    African Journals Online (AJOL)

    ... particularly with the impact of Information Communication Technology. Information technologies have the potential to support the agri-food sector in coping ... as the drive towards globalization builds on modern communication technology.

  20. Leveraging Relational Technology through Industry Partnerships.

    Science.gov (United States)

    Brush, Leonard M.; Schaller, Anthony J.

    1988-01-01

    Carnegie Mellon University has leveraged its technological expertise with database management systems (DBMS) into joint technological and developmental partnerships with DBMS and application software vendors. Carnegie's relational database strategy, the strategy of partnerships and how they were formed, and how the partnerships are doing are…

  1. Information persistence using XML database technology

    Science.gov (United States)

    Clark, Thomas A.; Lipa, Brian E. G.; Macera, Anthony R.; Staskevich, Gennady R.

    2005-05-01

    The Joint Battlespace Infosphere (JBI) Information Management (IM) services provide information exchange and persistence capabilities that support tailored, dynamic, and timely access to required information, enabling near real-time planning, control, and execution for DoD decision making. JBI IM services will be built on a substrate of network centric core enterprise services and when transitioned, will establish an interoperable information space that aggregates, integrates, fuses, and intelligently disseminates relevant information to support effective warfighter business processes. This virtual information space provides individual users with information tailored to their specific functional responsibilities and provides a highly tailored repository of, or access to, information that is designed to support a specific Community of Interest (COI), geographic area or mission. Critical to effective operation of JBI IM services is the implementation of repositories, where data, represented as information, is represented and persisted for quick and easy retrieval. This paper will address information representation, persistence and retrieval using existing database technologies to manage structured data in Extensible Markup Language (XML) format as well as unstructured data in an IM services-oriented environment. Three basic categories of database technologies will be compared and contrasted: Relational, XML-Enabled, and Native XML. These technologies have diverse properties such as maturity, performance, query language specifications, indexing, and retrieval methods. We will describe our application of these evolving technologies within the context of a JBI Reference Implementation (RI) by providing some hopefully insightful anecdotes and lessons learned along the way. This paper will also outline future directions, promising technologies and emerging COTS products that can offer more powerful information management representations, better persistence mechanisms and

  2. Tobacco products sold by Internet vendors following restrictions on flavors and light descriptors.

    Science.gov (United States)

    Jo, Catherine L; Williams, Rebecca S; Ribisl, Kurt M

    2015-03-01

    The 2009 Family Smoking Prevention and Tobacco Control Act bans characterizing flavors (e.g., grape, strawberry) in cigarettes, excluding tobacco and menthol, and prohibits companies from using misleading descriptors (e.g., light, low) that imply reduced health risks without submitting scientific data to support the claim and obtaining a marketing authorization from the U.S. Food and Drug Administration. This observational study examines tobacco products offered by Internet cigarette vendors (ICV) pre- and postimplementation of the ban on characterizing flavors in cigarettes and the restriction on misleading descriptors. Cross-sectional samples of the 200 most popular ICVs in 2009, 2010, and 2011 were identified. Data were analyzed in 2012 and 2013. In 2011 the odds for selling cigarettes with banned flavors or misleading descriptors were 0.40 times that for selling the products in 2009 (95% confidence interval [CI] = 0.18, 0.88). However, 89% of vendors continued to sell the products, including 95.8% of international vendors. Following the ban on characterizing flavors, ICVs began selling potential alternative products. In 2010, the odds for selling flavored little cigars were 1.71 (95% CI = 1.09, 2.69) times that for selling the product in 2009 and, for clove cigars, were 5.50 (95% CI = 2.36, 12.80) times that for selling the product in 2009. Noncompliance with the ban on characterizing flavors and restriction on misleading descriptors has been high, especially among international vendors. Many vendors appear to be circumventing the intent of the flavors ban by selling unbanned flavored cigars, in some cases in lieu of flavored cigarettes. © The Author 2014. Published by Oxford University Press on behalf of the Society for Research on Nicotine and Tobacco. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  3. Advanced Information Technology Investments at the NASA Earth Science Technology Office

    Science.gov (United States)

    Clune, T.; Seablom, M. S.; Moe, K.

    2012-12-01

    The NASA Earth Science Technology Office (ESTO) regularly makes investments for nurturing advanced concepts in information technology to enable rapid, low-cost acquisition, processing and visualization of Earth science data in support of future NASA missions and climate change research. In 2012, the National Research Council published a mid-term assessment of the 2007 decadal survey for future spacemissions supporting Earth science and applications [1]. The report stated, "Earth sciences have advanced significantly because of existing observational capabilities and the fruit of past investments, along with advances in data and information systems, computer science, and enabling technologies." The report found that NASA had responded favorably and aggressively to the decadal survey and noted the role of the recent ESTO solicitation for information systems technologies that partnered with the NASA Applied Sciences Program to support the transition into operations. NASA's future missions are key stakeholders for the ESTO technology investments. Also driving these investments is the need for the Agency to properly address questions regarding the prediction, adaptation, and eventual mitigation of climate change. The Earth Science Division has championed interdisciplinary research, recognizing that the Earth must be studied as a complete system in order toaddress key science questions [2]. Information technology investments in the low-mid technology readiness level (TRL) range play a key role in meeting these challenges. ESTO's Advanced Information Systems Technology (AIST) program invests in higher risk / higher reward technologies that solve the most challenging problems of the information processing chain. This includes the space segment, where the information pipeline begins, to the end user, where knowledge is ultimatelyadvanced. The objectives of the program are to reduce the risk, cost, size, and development time of Earth Science space-based and ground

  4. Future Research in Health Information Technology: A Review.

    Science.gov (United States)

    Hemmat, Morteza; Ayatollahi, Haleh; Maleki, Mohammad Reza; Saghafi, Fatemeh

    2017-01-01

    Currently, information technology is considered an important tool to improve healthcare services. To adopt the right technologies, policy makers should have adequate information about present and future advances. This study aimed to review and compare studies with a focus on the future of health information technology. This review study was completed in 2015. The databases used were Scopus, Web of Science, ProQuest, Ovid Medline, and PubMed. Keyword searches were used to identify papers and materials published between 2000 and 2015. Initially, 407 papers were obtained, and they were reduced to 11 papers at the final stage. The selected papers were described and compared in terms of the country of origin, objective, methodology, and time horizon. The papers were divided into two groups: those forecasting the future of health information technology (seven papers) and those providing health information technology foresight (four papers). The results showed that papers related to forecasting the future of health information technology were mostly a literature review, and the time horizon was up to 10 years in most of these studies. In the health information technology foresight group, most of the studies used a combination of techniques, such as scenario building and Delphi methods, and had long-term objectives. To make the most of an investment and to improve planning and successful implementation of health information technology, a strategic plan for the future needs to be set. To achieve this aim, methods such as forecasting the future of health information technology and offering health information technology foresight can be applied. The forecasting method is used when the objectives are not very large, and the foresight approach is recommended when large-scale objectives are set to be achieved. In the field of health information technology, the results of foresight studies can help to establish realistic long-term expectations of the future of health information

  5. Integration of gamma cameras and PET devices of multiple vendors in several locations

    International Nuclear Information System (INIS)

    Dresel, S.; Vollmar, C.; Sengupta, S.; Hahn, K.

    2002-01-01

    Full text: The Department of Nuclear Medicine of the University of Munich consists of four independently operated locations with a total of 18 gamma cameras (of three vendors), one PET scanner and one coincidence gamma camera. Recent hardware improvements, the installation and development of fast networks and new technologies for storage of large data volumes all contribute to the propagation of digital reading and reporting of nuclear medicine studies. Thus, the vision of a fully digitized nuclear medicine department becomes reality. In 1997 the department started with a strategy to fully integrate the entire number of imaging devices into one network for filmless reading, archiving and distributing nuclear medicine studies throughout the hospitals. The decision was made to use HERMES workstations (Nuclear Diagnostics, Sweden) to connect all primary imaging modalities. The purpose of the workstations located in the Nuclear Medicine departments is threefold: postprocessing, reading and archiving of all data. The workstations are networked throughout the different hospitals and are able to read the proprietary or DICOM data of the vendors of the gamma camera and PET equipment. The HERMES system is connected via DICOM interface to a long term storage device (AGFA, Germany). Additionally a JAVA (SUN Microsystems, USA) based software (JARVIS, Nuclear Diagnostics) is available to view all data from any computer using a web browser. Furthermore all data is linked to the hospital information system and selected imaging data are distributed throughout the hospitals. After commencement of full service of the network in 2000 the department is over 95 % filmfree. The high costs of purchasing hardware- and software-components are compensated for by saving costs of films and by the improvement of the work flow. Independently from these issues, filmless reporting proves to be advantageous over conventional film reading in many facts that justify to switch to a digital department

  6. Information section of evolution of new technology

    Directory of Open Access Journals (Sweden)

    Straka Martin

    2001-12-01

    Full Text Available When the new technology is developed, the large amount of information is needed, at the beginning, also through development and there is large amount of data, information at the output, which create a manual, design procedure of the new technology. Evolution the new technology goes out from one primary original idea, or by the help of sectional or piecemeal solution come near into the bargain what we want to achieve research. Attempts and collection of information get in possession to results not only after information section, but also after technical - technological section. Another important of information source is quantity data receives from books, magazines, old planning documentation and nowadays also from Internet. This article contains the information gaining and the sources, which we have in disposal and which are necessary for developing the new technology from primary data at the beginning to data, which are gathered through development.

  7. Internet little cigar and cigarillo vendors: Surveillance of sales and marketing practices via website content analysis.

    Science.gov (United States)

    Williams, Rebecca S; Derrick, Jason C

    2018-04-01

    Cigar sales have nearly doubled as cigarette sales have dropped, and large cigars have been replaced by little cigars and cigarillos (LCCs). Many LCCs are flavored, are perceived as less harmful than cigarettes, and have become increasingly available from e-commerce sources. We conducted surveillance of the online retail environment in 2013 and 2014 for LCCs in order to describe characteristics of Internet tobacco vendors selling LCCs and their sales and marketing practices, youth access practices, and their practices in relation to cigarette and other tobacco product sales. In 2013, we identified and manually screened 32,446 websites, yielding 500 unique Internet LCC vendors. In 2014, we identified 511 vendors selling LCCs from a list of 31,239 manually screened websites. We then selected 249 in 2013 and 263 in 2014 for content analysis focusing on six domains including demographics, youth access, payment and delivery, products for sale, promotions and claims, and prices. Just over half of vendors in both years were located solely in the U.S. with 70.1% of those selling flavored LCCs in 2013 and 76.1% in 2014. Nearly half only used proven ineffective age verification strategies and another 10% made no attempts to verify age at all. Most vendors accepted credit cards and advertised using the United States Postal Service. Half of vendors featured a variety of health warnings and most featured promotions. Federal bans on flavored cigarettes and restrictions on age verification, payment, and shipping for Internet tobacco sales should be extended to include LCCs. Copyright © 2018 Elsevier Inc. All rights reserved.

  8. Computing, Information and Communications Technology (CICT) Website

    Science.gov (United States)

    Hardman, John; Tu, Eugene (Technical Monitor)

    2002-01-01

    The Computing, Information and Communications Technology Program (CICT) was established in 2001 to ensure NASA's Continuing leadership in emerging technologies. It is a coordinated, Agency-wide effort to develop and deploy key enabling technologies for a broad range of mission-critical tasks. The NASA CICT program is designed to address Agency-specific computing, information, and communications technology requirements beyond the projected capabilities of commercially available solutions. The areas of technical focus have been chosen for their impact on NASA's missions, their national importance, and the technical challenge they provide to the Program. In order to meet its objectives, the CICT Program is organized into the following four technology focused projects: 1) Computing, Networking and Information Systems (CNIS); 2) Intelligent Systems (IS); 3) Space Communications (SC); 4) Information Technology Strategic Research (ITSR).

  9. Can information technology improve my ambulatory practice ...

    African Journals Online (AJOL)

    eHealth is the use of information and communication technologies for health. mHealth is the use of mobile technology in health. As with all information technology (IT), advances in development are rapidly taking place. The application of such technology to individual ambulatory anaesthesia practice should improve the ...

  10. Family Caregivers and Consumer Health Information Technology.

    Science.gov (United States)

    Wolff, Jennifer L; Darer, Jonathan D; Larsen, Kevin L

    2016-01-01

    Health information technology has been embraced as a strategy to facilitate patients' access to their health information and engagement in care. However, not all patients are able to access, or are capable of using, a computer or mobile device. Although family caregivers assist individuals with some of the most challenging and costly health needs, their role in health information technology is largely undefined and poorly understood. This perspective discusses challenges and opportunities of engaging family caregivers through the use of consumer-oriented health information technology. We compile existing evidence to make the case that involving family caregivers in health information technology as desired by patients is technically feasible and consistent with the principles of patient-centered and family-centered care. We discuss how more explicit and purposeful engagement of family caregivers in health information technology could advance clinical quality and patient safety by increasing the transparency, accuracy, and comprehensiveness of patient health information across settings of care. Finally, we describe how clarifying and executing patients' desires to involve family members or friends through health information technology would provide family caregivers greater legitimacy, convenience, and timeliness in health system interactions, and facilitate stronger partnerships between patients, family caregivers, and health care professionals.

  11. Transformation of Operations Management through Information Technology and Information System in Suning

    Institute of Scientific and Technical Information of China (English)

    SHEN Houcai; YAN Xiaojun

    2004-01-01

    Information technology and information system today play major roles in companies who are competitive in the global market. In this paper, we will study how Suning Appliance Chain changes her operations by using information technology and information system. Suning's Strategy,operations structure, especially her logistics system are discussed firstly; how information technology and information system support her operation and logistics to gain competitive capabilities are further discussed. Finally, the operation system transformation through IT/IS in Suning is studied by the use of a stochastic inventory model.

  12. Understanding attitudes toward information and communication technology in home-care: Information and communication technology as a market good within Norwegian welfare services.

    Science.gov (United States)

    Øyen, Karianne Røssummoen; Sunde, Olivia Sissil; Solheim, Marit; Moricz, Sara; Ytrehus, Siri

    2018-09-01

    The aim of this study was to better understand nurses' and other staff members' attitudes toward the usefulness of information and communication technology in home-care settings. Research has found that beliefs about the expected benefits of information and communication technology impact the use of technology. Furthermore, inexperience with using information and communication technology may cause negative attitudes. This article is based on a questionnaire to 155 nurses and other staff members in home-care in Sogn og Fjordane county in Norway. The results revealed minimal use of information and communication technology at work; however, participants had positive attitudes regarding the potential benefits of information and communication technology use in home-care. Individuals' extensive use of and familiarity with different solutions in private lives could be an important context for explaining employees' attitudes. Given that information and communication technology is both a welfare service and a market good, this may explain individuals' positive attitudes toward information and communication technology despite their lack of experience with it at work. Experiences with information and communication technology as a market good and the way new technologies can affect work routines will affect the implementation of information and communication technology in home-care.

  13. What's the matter with the information technology workforce?

    OpenAIRE

    Subramaniam, Manimegalai M.; Burnett, Kathleen

    2006-01-01

    Information technology and the information technology workforce are essential to Internet innovation, infrastructure, development, and maintenance. A comprehensive and dynamic definition of information technology will help develop and coordinate interventions to ensure that a viable, diverse, and talented workforce is available to support information technology innovation, development, implementation, maintenance and application. A viable, diverse, and talented workforce is essential if the U...

  14. 75 FR 76986 - Office of the National Coordinator for Health Information Technology; Health Information...

    Science.gov (United States)

    2010-12-10

    ... Technology; Health Information Technology; Request for Information Regarding the President's Council of... Information Technology To Improve Healthcare for Americans: The Path Forward'' AGENCY: Office of the National Coordinator for Health Information Technology (ONC), Department of Health and Human Services (HHS). ACTION...

  15. The role of water vendors in water service delivery in developing countries: a case of Dala local government, Kano, Nigeria

    Science.gov (United States)

    Ahmad, Muhammad Tajuri

    2017-06-01

    In Nigeria, more than 60 million people are required to meet Millennium Development Goals (MDGs) target for improved water by 2015 and is unlikely to be achieved only by public supply. To cover these water availability gaps water vendors exist and ignoring their role is potentially deceptive. The aim of this paper is to assess the role of water vendors in meeting these peoples' need and elicit household's willingness-to-pay for improved supply. The research includes cross-sectional mixed method in which questionnaire survey was performed to 218 households; and interviews and focus group discussion were conducted with water vendors. Findings reveal that water vendors supplied most households irrespective of season. Retail vendors buy 25 l at ₦4.00 (0.013) from wholesale vendors and resale at ₦20.08 (0.07) during dry and at ₦14.02 (0.05) in wet season. The price is 28 and 40 times the cost of in-house connection from Kano State Water Board (KNSWB) during rainy and dry season, respectively. Vendors who buy from hand-dug wells pay ₦100.00 (0.33) per day and draw as much water within that day. Furthermore, willingness-to-pay for in-house connection was elicited as ₦367.00 (1.20), lower than monthly flat fixed tariff set by KNSWB. The study recommends recognizing vendors formally in form of public private partnership so that technical and financial support be given, thus their activities and charges be regulated. People's perception on water should be changed through education and enlightening. Further research should focus on estimating total volume of water supplied by water vendors.

  16. Older Adults' Acceptance of Information Technology

    Science.gov (United States)

    Wang, Lin; Rau, Pei-Luen Patrick; Salvendy, Gavriel

    2011-01-01

    This study investigated variables contributing to older adults' information technology acceptance through a survey, which was used to find factors explaining and predicting older adults' information technology acceptance behaviors. Four factors, including needs satisfaction, perceived usability, support availability, and public acceptance, were…

  17. A study of VHI scores and acoustic features in street vendors as occupational voice users.

    Science.gov (United States)

    Natour, Yaser S; Darawsheh, Wesam B; Bashiti, Sara; Wari, Majd; Taha, Juhayna; Odeh, Thair

    to investigate acoustic features of phonation and perception of voice handicap in street vendors. Eighty-eight participants (44 street vendors, 44 controls) were recruited. The mean age of the group was 38.9±16.0 years (range: 20-78 years). Scores of the Arabic version of the Voice Handicap Index (VHI-Arab) were used for analysis. Acoustic measures of fundamental frequency (F 0 ), jitter, shimmer, and signal-to-noise ratio (SNR) were also analyzed. Analysis showed a significant difference between street vendors and controls in the total score of the VHI-Arab (p<0.001) as well as scores of all three VHI-Arab subsections: functional (p<0.001), physical (p<0.001), and emotional (p=0.025). Weak correlations were found among all of the VHI scores and acoustic measures (-0.219≤ r≤0.355), except for SNR where a moderate negative correlations were found (r=-0.555; -0.4) between the VHI (physical and total) scores and SNR values. Significant differences also were found in F 0 , jitter, and SNR among specific subgroups of street vendors when stratified by weekly hours worked (p<0.05), and in jitter (p=0.39) when stratified by educational level. Perception of voice handicap and a possible effect on vocal quality in street vendors were noted. The effect of factors, namely work hours and educational level, on voice quality should be further studied. Copyright © 2017. Published by Elsevier Inc.

  18. The Center for Environmental Technology Innovative Technology Screening Process

    International Nuclear Information System (INIS)

    Bertrand, C.M.

    1995-02-01

    The Center for Environmental Technology's (CET) mission is to provide a fully integrated system for accelerated evaluation, development, commercialization, and public acceptance of creative environmental solutions which match the foremost demands in today's environmentally sensitive world. In short, CET will create a means to provide quick, effective solutions for environmental needs. To meet this mission objective, CET has created a unique and innovative approach to eliminating the usual barriers in developing and testing environmental technologies. The approach paves the way for these emerging, cutting-edge technologies by coordinating environmental restoration and waste management activities of industry, universities, and the government to: efficiently and effectively transfer technology to these users, provide market-driven, cost-effective technology programs to the public and DOE, and aid in developing innovative ideas by initiating efforts between DOE facilities and private industry. The central part to this mission is selecting and evaluating specific innovative technologies for demonstration and application at United States Department of Energy (DOE) installations. The methodology and criteria used for this selection, which is called the CET Innovative Technology Screening Process, is the subject of this paper. The selection criteria used for the screening process were modeled after other DOE technology transfer programs and were further developed by CET's Technology Screening and Evaluation Board (TSEB). The process benefits both CET and the proposing vendors by providing objective selection procedures based on predefined criteria. The selection process ensures a rapid response to proposing vendors, all technologies will have the opportunity to enter the selection process, and all technologies are evaluated on the same scale and with identical criteria

  19. Scientific and technological information: analysis of periodic publications of information science

    OpenAIRE

    Mayara Cintya do Nascimento Vasconcelos; Gabriela Belmont de Farias

    2017-01-01

    The research analyzes the articles published in national scientific journals of the area of Information Science, classified with Qualis A1, having as parameter the term "scientific and technological information". It presents concepts about scientific and technological information and the processes that involve its uses, as well as scientific communication, information flows and sources of information. The methodology used is a descriptive study with a quantitative-qualitative approach, using ...

  20. PENGELOLAAN KNOWLEDGE MANAGEMENT CAPABILITY DALAM MEMEDIASI DUKUNGAN INFORMATION TECHNOLOGY RELATEDNESS TERHADAP KINERJA PERUSAHAAN

    Directory of Open Access Journals (Sweden)

    Luluk Muhimatul Ifada

    2011-06-01

    Full Text Available The study examines whether or not and how information technology (IT relatedness influences corporate performance. This study proposes that knowledge management (KM is a critical organizational capability through which IT influences firm performance. Measurement of IT relatedness and KM capability uses a reflective second-order factor modeling approach for capturing complementarities among the four dimensions of IT relatedness (IT strategy making processes, IT vendor management processes, IT human resource management processes and IT infrastructure and for capturing complementarities among the three dimensions of KM capability (product KM capability, customer KM capability, and managerial KM capability. A survey was conducted among 93 branch managers of banking in Central Java. Structural Equation Model (SEM was used to analyze the data using the software program of SmartPLS (Partial Least Square. The findings support for the hypotheses of the study. IT relatedness of business units enhances the cross unit KM capability of the corporate. The KM capability creates and exploits cross-unit synergies from the product, customer, and managerial knowledge resources of the corporate. These synergies increase the corporate performance. IT relatedness of business units positively influences corporate performance. IT relatedness also has significant indirect effects on corporate performance through the mediation of KM capability.

  1. Towards a quantum information technology industry

    International Nuclear Information System (INIS)

    Spiller, T P; Munro, W J

    2006-01-01

    The research fields of quantum information processing and communication are now well established, although still growing and developing. It was realized early on that there is significant potential for new technologies and applications, leading to the vision of a whole new quantum information technology industry. The vision is not yet reality, and there are many open questions with regard to how it might become so. This article raises some of these questions, and gives a viewpoint on how we might proceed, from where we are today towards a quantum information technology industry in the future. (viewpoint)

  2. Effective technology transfer through regional information teams

    International Nuclear Information System (INIS)

    Wicks, D.E.; Gahan, B.; Hoyle, G.

    1997-01-01

    Communication and the transfer of technical information is critical to the international gas industry. The technical research results developed through Gas Research Institute's natural gas supply program have been disseminated through a number of vehicles. Two primary vehicles are GRI's Information Centers and Regional Technology Transfer Agents (RTTA). The Information Centers serve as repositories for GRI information as well as provide no-cost literature searching expertise. The RTTAs actively communicate and interface with area producers, introducing potential technology adopters with GRI technology managers and/or the appropriate licensed product or service distributors. The combination of Information Centers and RTTAs continues to help independent producers break through the barriers of technology and accelerate the benefits of lower cost natural gas recovery. (au)

  3. Salmonellae carrier status of food vendors in Kumasi, Ghana | Feglo ...

    African Journals Online (AJOL)

    230 females of 28 males) healthy food vendors for Salmonella typhi, and S. paratyphi A, B, and C, using stool culture, the widal test, and standard microbiological identification methods. Main outcome measures: Prevalence of chronic typhoidal ...

  4. 2015 World Conference on Information Systems and Technologies

    CERN Document Server

    Correia, Ana; Costanzo, Sandor; Reis, Luis

    2015-01-01

    This book contains a selection of articles from The 2015 World Conference on Information Systems and Technologies (WorldCIST'15), held between the 1st and 3rd of April in Funchal, Madeira, Portugal, a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges of modern Information Systems and Technologies research, technological development and applications. The main topics covered are: Information and Knowledge Management; Organizational Models and Information Systems; Intelligent and Decision Support Systems; Big Data Analytics and Applications; Software Systems, Architectures, Applications and Tools; Multimedia Systems and Applications; Computer Networks, Mobility and Pervasive Systems; Human-Computer Interaction; Health Informatics; Information Technologies in Education; Information Technologies in Radiocommunications.

  5. Socio - demographic characteristics of child street vendors in Nnewi ...

    African Journals Online (AJOL)

    Background: Involvement of children in street trading is inimical, contrary to the Rights of the Child, and threatens holistic child development. Objective: To describe the sociodemographic characteristics of child street vendors in Nnewi. Method: A cross-sectional questionnaire survey of children selling wares on the streets of ...

  6. 76 FR 66327 - Iron Mountain Information Management, Inc., Corporate Service Group, Information Technology (IT...

    Science.gov (United States)

    2011-10-26

    ... Management, Inc., Corporate Service Group, Information Technology (IT) Division, Including On-Site Leased... Information Management, Inc., Corporate Service Group, Information Technology (IT) Division, including on-site... location of Iron Mountain Information Management, Inc., Corporate Service Group, Information Technology (IT...

  7. Wireless Technology Application to Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, Jeong Kweon; Jeong, See Chae; Jeong, Ki Hoon; Oh, Do Young; Kim, Jae Hack

    2009-01-01

    Wireless technologies are getting widely used in various industrial processes for equipment condition monitoring, process measurement and other applications. In case of Nuclear Power Plant (NPP), it is required to review applicability of the wireless technologies for maintaining plant reliability, preventing equipment failure, and reducing operation and maintenance costs. Remote sensors, mobile technology and two-way radio communication may satisfy these needs. The application of the state of the art wireless technologies in NPPs has been restricted because of the vulnerability for the Electromagnetic Interference and Radio Frequency Interference (EMI/RFI) and cyber security. It is expected that the wireless technologies can be applied to the nuclear industry after resolving these issues which most of the developers and vendors are aware of. This paper presents an overview and information on general wireless deployment in nuclear facilities for future application. It also introduces typical wireless plant monitoring system application in the existing NPPs

  8. Information technologies in technical education

    OpenAIRE

    Кравченя, Э. М.

    2013-01-01

    The purpose of researches is working out of the concept of filling of discipline «Information and computer technologies in formation» the first step of higher education entered into curricula was at engineering-pedagogical faculty BNTU. It is shown that as a result of discipline studying there is an expansion of outlook and formation at students of technical college of independent thinking in the field of modern and perspective information technology.

  9. Information and communication technology

    Science.gov (United States)

    Edelson, Burton I.; Pelton, Joseph N.; Bostian, Charles W.; Brandon, William T.; Chan, Vincent W. S.; Hager, E. Paul; Helm, Neil R.; Jennings, Raymond D.; Kwan, Robert K.; Mahle, Christoph E.

    1994-01-01

    NASA and the National Science Foundation (NSF) commissioned a panel of U.S. experts to study the international status of satellite communications systems and technology. The study covers emerging systems concepts, applications, services, and the attendant technologies. The panel members traveled to Europe, Japan, and Russia to gather information firsthand. They visited 17 sites in Europe, 20 in Japan, and 4 in Russia. These included major manufacturers, government organizations, service providers, and associated research and development facilities. The panel's report was reviewed by the sites visited, by the panel, and by representatives of U.S. industry. The report details the information collected and compares it to U.S. activities.

  10. What's Your Money Worth? Materials Budgets and the Selection and Evaluation of Book and Serial Vendors.

    Science.gov (United States)

    Barker, Joseph W.

    1992-01-01

    Discusses budgets for library materials and how to select and evaluate book and serial vendors. Trends in automation, publishing, and economics that affect both libraries and vendors are discussed; and examples from the University of California at Berkeley that include serials service charges and approval plan discounts are presented. (six…

  11. HEMISPHERIC CENTER FOR ENVIRONMENTAL TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    M.A. Ebadian

    1999-03-30

    A vendor was selected for the diamond wire technology demonstration scheduled for this summer at Princeton Plasma Physics Laboratory (PPPL). A team consisting of personnel from FIU-HCET, PPPL, and AEA Technology reviewed the submitted bids. FIU-HCET will contract this vendor. At the SRS Ninth ICT teleconference, the ICT team discussed the status of the following demonstrations: LRAD; x-ray, K-edge; Strippable Coatings; Thermal Spray Vitrification; Cutting/Shearing/Dismantlement/Size Reduction; and Electrets. The LRAD demo is complete, and the x-ray/K-edge, Strippable Coatings, and Electrets demos are ongoing. The Asbestos and Thermal Spray Vitrification demos require more laboratory testing. The Cutting/Shearing/Dismantlement/Size Reduction demo is undergoing procurement. Five FIU-HCET staff members took the 1S0 14000 environmental auditor training course February 22-26, 1999, given by ASC. The test plan for the Facility Dismantlement Technology Assessment is finished and ready for internal review.

  12. Center Director Bridges visits Disability Awareness and Action working Group Technology Fair

    Science.gov (United States)

    1999-01-01

    Center Director Roy Bridges stops to pet one of the dogs that serves with Canine Companions for Independence, a vendor displaying its capabilities at the Disability Awareness and Action Working Group (DAAWG) 1999 Technology Fair being held Oct. 20-21 at Kennedy Space Center. Standing at the right is Carol Cavanaugh, with KSC Public Services; behind Bridges is Nancie Strott (left), a multi-media specialist with Dynacs and chairperson of the Fair, and Sterling Walker (right), director of Engineering Development and chairman of DAAWG. The Fair is highlighting vendors demonstrating mobility, hearing, vision and silent disability assistive technology. The purpose is to create an awareness of the types of technology currently available to assist people with various disabilities in the workplace. The theme is that of this year's National Disability Employment Awareness Month, 'Opening Doors to Ability.' Some of the other vendors participating are Goodwill Industries, Accessible Structures, Division of Blind Services, Space Coast Center for Independent Living, KSC Fitness Center and Delaware North Parks Services.

  13. Shopping in Hospitality: Situational Constructions of Customer-Vendor Relationships among Shopping Tourists at a Bazaar on the German-Polish Border

    Science.gov (United States)

    Busch, Dominic

    2010-01-01

    This article presents an analysis of a short customer-vendor dialogue between a German couple and a Polish vendor at a food bazaar on the Polish border with Germany. In this situation, interactants have to negotiate and construct framings of hospitality abroad, customer-vendor relations, as well as intercultural relations. It is assumed that…

  14. 2014 World Conference on Information Systems and Technologies

    CERN Document Server

    Correia, Ana; Tan, Felix; Stroetmann, Karl

    2014-01-01

    This book contains a selection of articles from The 2014 World Conference on Information Systems and Technologies (WorldCIST'14), held between the 15th and 18th of April in Funchal, Madeira, Portugal, a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges of modern Information Systems and Technologies research, technological development and applications. The main topics covered are: Information and Knowledge Management; Organizational Models and Information Systems; Intelligent and Decision Support Systems; Software Systems, Architectures, Applications and Tools; Computer Networks, Mobility and Pervasive Systems; Radar Technologies; Human-Computer Interaction; Health Informatics; and Information Technologies in Education.

  15. Information technology: management issues in outsource contracts.

    OpenAIRE

    2008-01-01

    This study concerns the investigation of management issues within information technology outsourcing contracts. The information technology outsourcing life cycle is used as the flow structure for the investigation. The associated user expectations that occur in each of the phases of the information technology outsourcing life cycle are identified. Following the identification of the management and user expectation issues in each phase of the outsource life cycle, the “Coetzee solution framewo...

  16. Influence of Information Technology on Organization Strategy

    OpenAIRE

    Sibanda Mabutho; Ramrathan Durrel

    2017-01-01

    The exponential development of information technology has presented many opportunities to organizations; however, it has also presented several challenges. A key challenge is how do organizations effectively use information technology and incorporate it into their strategies to make full use of its capabilities as an enabler. The fast-changing nature of information technology has resulted in little empirical evidence on how it influences organization strategy. The Strategic Alignment Model wa...

  17. 29 CFR 1615.135 - Electronic and information technology requirements.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Electronic and information technology requirements. 1615... INFORMATION TECHNOLOGY § 1615.135 Electronic and information technology requirements. (a) Development, procurement, maintenance, or use of electronic and information technology.—When developing, procuring...

  18. 76 FR 4350 - Health Information Technology Extension Program

    Science.gov (United States)

    2011-01-25

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Health Information Technology Extension Program ACTION: Public Notice. SUMMARY: This notice announces changes to the Health Information Technology Extension... of the National Coordinator for Health Information Technology, 200 Independence Ave, SW., Suite 729D...

  19. Patent Medicine Vendors in Rural Areas of Lagos Nigeria ...

    African Journals Online (AJOL)

    Purpose: To determine the compliance of patent medicine vendors (PMVs) in rural areas of Lagos State, Nigeria with set guidelines to regulate their practice and its implications for malaria control. Methods: A baseline cross-sectional study was conducted as part of an intervention study in two rural local government areas ...

  20. An evaluation of vendor managed inventory practices from small and medium indian enterprises

    DEFF Research Database (Denmark)

    Shen, Lixin; Govindan, Kannan; Borade, Atul B.

    2013-01-01

    Vendor managed inventory has proven to be an effective tool for improving the supply chain performance by decreasing inventory-related costs and increasing customer service. It is quite evident from the literature that vendor managed inventory (VMI) has been successfully implemented in small...... and medium enterprises (SMEs). However, studies related to the implementation of VMI in Indian SMEs are very limited. Therefore, this study presents an empirical investigation of VMI practices in Indian SMEs using survey methodology. The paper evaluates the benefits, barriers, and effects of adopting VMI...

  1. 77 FR 70444 - Office of the National Coordinator for Health Information Technology; Health Information...

    Science.gov (United States)

    2012-11-26

    ... Technology; Health Information Technology; HIT Policy Committee: Request for Comment Regarding the Stage 3 Definition of Meaningful Use of Electronic Health Records (EHRs) AGENCY: Health Information Technology (HIT) Policy Committee, Office of the National Coordinator for Health Information Technology (ONC), Department...

  2. Online Information Technologies Certificate Program

    Directory of Open Access Journals (Sweden)

    Erman YUKSELTURK

    2005-01-01

    Full Text Available Online Information Technologies Certificate Program Res. Ass. Erman YUKSELTURK Middle East Technical University Department of Computer Education and Instructional Technology, Faculty of Education, Ankara, TURKEY ABSTRACT In this study, Information Technologies Certificate Program which is based on synchronous and asynchronous communication methods over the Internet offered by cooperation of Middle East Technical University, Computer Engineering Department and Continuing Education Center were examined. This online certificate program started in May 1998 and it is still active. The program includes eight fundamental courses of Computer Engineering Department and comprised of four semesters lasting totally nine months. The main aim of this program is to train the participants in IT field to meet demand in the field of computer technologies in Turkey. As a conclusion, the properties of this program were discussed in a detailed way.

  3. The role of private drug vendors as malaria treatment providers in selected malaria endemic areas of Sri Lanka

    DEFF Research Database (Denmark)

    Rajakaruna, R S; Weerasinghe, M; Alifrangis, M

    2006-01-01

    was applied taking all response variables as binary outcome. RESULTS: Vendors' knowledge on antimalarials was poor with 58% of the vendors being unaware of the government malaria drug policy in the country. Also, the advice provided to customers buying antimalarials was limited. However, the majority......BACKGROUND AND OBJECTIVES: The involvement of private drug vendors in malaria treatment is particularly high in developing countries and understanding their practices and knowledge about antimalarials and malaria treatment will aid in devising strategies to increase the correct use of antimalarials...... and improve adherence to the government's malaria drug policy. Results of a study on the knowledge and practices of the private drug vendors conducted in seven districts in Sri Lanka, mostly in malarious areas are presented. METHODS: Data on awareness of government's malaria drug policy, practice of issuing...

  4. 7 CFR 2902.6 - Providing product information to Federal agencies.

    Science.gov (United States)

    2010-01-01

    ... manufacturers and vendors to provide product, business contacts, and product information for designated items... characteristics, including verification of such characteristics if requested. (b) Advertising, labeling and marketing claims. Manufacturers and vendors are reminded that their advertising, labeling, and other...

  5. Comparing image quality of print-on-demand books and photobooks from web-based vendors

    Science.gov (United States)

    Phillips, Jonathan; Bajorski, Peter; Burns, Peter; Fredericks, Erin; Rosen, Mitchell

    2010-01-01

    Because of the emergence of e-commerce and developments in print engines designed for economical output of very short runs, there are increased business opportunities and consumer options for print-on-demand books and photobooks. The current state of these printing modes allows for direct uploading of book files via the web, printing on nonoffset printers, and distributing by standard parcel or mail delivery services. The goal of this research is to assess the image quality of print-on-demand books and photobooks produced by various Web-based vendors and to identify correlations between psychophysical results and objective metrics. Six vendors were identified for one-off (single-copy) print-on-demand books, and seven vendors were identified for photobooks. Participants rank ordered overall quality of a subset of individual pages from each book, where the pages included text, photographs, or a combination of the two. Observers also reported overall quality ratings and price estimates for the bound books. Objective metrics of color gamut, color accuracy, accuracy of International Color Consortium profile usage, eye-weighted root mean square L*, and cascaded modulation transfer acutance were obtained and compared to the observer responses. We introduce some new methods for normalizing data as well as for strengthening the statistical significance of the results. Our approach includes the use of latent mixed-effect models. We found statistically significant correlation with overall image quality and some of the spatial metrics, but correlations between psychophysical results and other objective metrics were weak or nonexistent. Strong correlation was found between psychophysical results of overall quality assessment and estimated price associated with quality. The photobook set of vendors reached higher image-quality ratings than the set of print-on-demand vendors. However, the photobook set had higher image-quality variability.

  6. Influence of Information Technology on Organization Strategy

    Directory of Open Access Journals (Sweden)

    Sibanda Mabutho

    2017-02-01

    Full Text Available The exponential development of information technology has presented many opportunities to organizations; however, it has also presented several challenges. A key challenge is how do organizations effectively use information technology and incorporate it into their strategies to make full use of its capabilities as an enabler. The fast-changing nature of information technology has resulted in little empirical evidence on how it influences organization strategy. The Strategic Alignment Model was a popular model created to assist organizations to align their information technology and their business strategy; however, the growth of technology may have made this model irrelevant in this age. Therefore, organizations need to determine what factors drive this alignment. Using hermeneutic phenomenology, 12 in-depth interviews were conducted within IBM South Africa to determine real-life drivers that help create this alignment. The themes derived from the interview texts reveal that consumers are becoming more empowered; therefore, organizations need to be more flexible in their business models and strategies. Furthermore, the integration of cross-functional roles in the organization at the management level allow for improved alignment between information technology and strategy as better integrated roles bring a combination of these two elements.

  7. Scale to Measure Attitudes toward Information Technology

    Science.gov (United States)

    Gokhale, Anu A.; Paul E. Brauchle; Kenton F. Machina

    2013-01-01

    The current post-secondary graduation rates in computing disciplines suggest American universities are only training enough students to fill one third of the projected 1.4 million technology and computing jobs available (National Center for Women and Information Technology, 2011). Pursuit of information technology (IT) majors depends, to a great…

  8. Information Technology in Sport Management Curricula

    Science.gov (United States)

    Barneva, Reneta P.; Hite, Penny D.

    2017-01-01

    We study the breadth of inclusion of information technology in sport management (SM) programs, surveying program sponsoring colleges and universities within a prominent state-university system. Our results indicate a very low number of SM programs require any type of information technology courses as part of their core requirements. In fact, only…

  9. 2016 World Conference on Information Systems and Technologies

    CERN Document Server

    Correia, Ana; Adeli, Hojjat; Reis, Luis; Teixeira, Marcelo

    2016-01-01

    This book contains a selection of articles from The 2016 World Conference on Information Systems and Technologies (WorldCIST'16), held between the 22nd and 24th of March at Recife, Pernambuco, Brazil. WorldCIST is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges of modern Information Systems and Technologies research, together with their technological development and applications. The main topics covered are: Information and Knowledge Management; Organizational Models and Information Systems; Software and Systems Modeling; Software Systems, Architectures, Applications and Tools; Multimedia Systems and Applications; Computer Networks, Mobility and Pervasive Systems; Intelligent and Decision Support Systems; Big Data Analytics and Applications; Human-Computer Interaction; Health Informatics; Information Technologies in Education; Information Technologies in Radiocommunications.

  10. International Center for Gas Technology Information

    International Nuclear Information System (INIS)

    Gad, L.H.

    1993-01-01

    Based on an acknowledgement of the growing importance of natural gas, a number of European countries, USA, Japan and the Russian Federation have worked together in order to establish a common center of information on natural gas technology under the auspices of the International Energy Agency. Centers were to be established in Washington and in Denmark. The centers will concern themselves with establishing an international information center for gas technology, effecting natural gas technology transfer between global regions, carrying out analytical studies on the energy market and the development of technology within the field of natural gas. The structure of the decision-making processes that will be employed is explained in addition to the organization and economy. The centers should build up a global information network between the relevant countries, their gas companies, institutions etc. (AB)

  11. Information technology boosts contractor's economic success

    International Nuclear Information System (INIS)

    Penny, M.; Vasey, G.M.

    1995-01-01

    This article will discuss the advantages of Information Technology (IT) and how one drilling contractor, Global Marine, has applied this technology. The company has applied it in an efficient manner which has provided business benefits and cost reductions that have helped its operations be more successful. The following are the different aspects of information technology that led to the contractor's success: cost reduction measures; migration to a client/server IT infrastructure; IT business benefits; and keys to obtaining business benefits from IT

  12. Validation of the Information/Communications Technology Literacy Test

    Science.gov (United States)

    2016-10-01

    Technical Report 1360 Validation of the Information /Communications Technology Literacy Test D. Matthew Trippe Human Resources Research...TITLE AND SUBTITLE Validation of the Information /Communications Technology Literacy Test 5a. CONTRACT OR GRANT NUMBER W91WAS-09-D-0013 5b...validate a measure of cyber aptitude, the Information /Communications Technology Literacy Test (ICTL), in predicting trainee performance in Information

  13. Nuclear technology databases and information network systems

    International Nuclear Information System (INIS)

    Iwata, Shuichi; Kikuchi, Yasuyuki; Minakuchi, Satoshi

    1993-01-01

    This paper describes the databases related to nuclear (science) technology, and information network. Following contents are collected in this paper: the database developed by JAERI, ENERGY NET, ATOM NET, NUCLEN nuclear information database, INIS, NUclear Code Information Service (NUCLIS), Social Application of Nuclear Technology Accumulation project (SANTA), Nuclear Information Database/Communication System (NICS), reactor materials database, radiation effects database, NucNet European nuclear information database, reactor dismantling database. (J.P.N.)

  14. On-line Technology Information System (OTIS): Solid Waste Management Technology Information Form (SWM TIF)

    Science.gov (United States)

    Levri, Julie A.; Boulanger, Richard; Hogan, John A.; Rodriguez, Luis

    2003-01-01

    Contents include the following: What is OTIS? OTIS use. Proposed implementation method. Development history of the Solid Waste Management (SWM) Technology Information Form (TIF) and OTIS. Current development state of the SWM TIF and OTIS. Data collection approach. Information categories. Critiques/questions/feedback.

  15. U.S. EPA Water Technology Innovation Cluster Leaders Meeting - "Successfully Supporting Early-Stage Companies: The Role of Technology Testing" Meeting Summary Report

    Science.gov (United States)

    The goals of this workshop were to: (1) increase the cluster leaders’ level of knowledge regarding past and current water technology testing programs, facilities and requirements; (2) learn from the experiences of technology vendors in getting innovative, commercial-ready product...

  16. A Critical Examination of IT-21: Thinking Beyond Vendor-Based Standards

    National Research Council Canada - National Science Library

    Trupp, Travis

    1999-01-01

    .... This thesis takes a critical look at the IT-21 policy from an economic, security, availability, procurement, and practical level, and explores the role of vendor-based standards in the Navy computing architecture...

  17. No borders for Information Technology

    CERN Multimedia

    2009-01-01

    The technology gap between first world countries and developing nations is growing at an ever-increasing rate. An organization founded at CERN, Informaticiens Sans Frontières (ISF), hopes to alter this trend with their current project, MANGO NET. Starting in Africa, they aim to lead these nations to use Information Technologies to positively influence their economy, education and lifestyle. Information Technology has long since been introduced within African countries, but there are many daunting problems that have stalled widespread application. The literacy rate within small African communities is very low. "The interface used to operate a computer requires literacy", explains Silvano De Gennaro," member of the CERN Communication Group and President of ISF. "Technology alone is not the solution, you have to adapt it to the cultural level and the abilities of the people who receive it." Also, the price of purchasing and operating a c...

  18. VENDOR SELECTION AND DETERMINING PROCUREMENT QUOTAS IN CONDITIONS WHEN DISCOUNTS ARE OFFERED ON THE TOTAL VALUE OF THE CONTRACTED PROCUREMENT OF MANY DIFFERENT PRODUCTS

    Directory of Open Access Journals (Sweden)

    Zoran Babic

    2012-04-01

    Full Text Available Vendor selection is a very significant business problem for ensuring the competitiveness on the market. That is why companies pay great attention to this problem. To solve the vendor selection problems can be applied to a number of quantitative methods. Depending on the goals of the company the vendor selection can be a mono-criterion or multi-criterion programming problem. This paper deals with the problem of vendor selection and determining procurement quotas from selected vendors under conditions where vendors offer discounts to the total order value within a specified period where the buyer buys more products from the vendors. The total value of procurement costs in a given period is taken as an optimization criterion. In this paper the specific flour purchase problem is solved for a company that manufactures bakery products

  19. VENDOR SELECTION AND DETERMINING PROCUREMENT QUOTAS IN CONDITIONS WHEN DISCOUNTS ARE OFFERED ON THE TOTAL VALUE OF THE CONTRACTED PROCUREMENT OF MANY DIFFERENT PRODUCTS

    Directory of Open Access Journals (Sweden)

    Zoran Babić

    2012-04-01

    Full Text Available Vendor selection is a very significant business problem for ensuring the competitiveness on the market. That is why companies pay great attention to this problem. To solve the vendor selection problems can be applied to a number of quantitative methods. Depending on the goals of the company the vendor selection can be a mono-criterion or multi-criterion programming problem. This paper deals with the problem of vendor selection and determining procurement quotas from selected vendors under conditions where vendors offer discounts to the total order value within a specified period where the buyer buys more products from the vendors. The total value of procurement costs in a given period is taken as an optimization criterion. In this paper the specific flour purchase problem is solved for a company that manufactures bakery products.

  20. SU-E-T-138: Automated Chart Review Module Including Cross-Vendor Data Transfer Verification Developed for IHE-RO Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Brewer, M; Gordon, C [Franciscan St Margaret Health, Hammond, IN (United States); Tien, C [Community Hospital, Munster, IN (United States)

    2015-06-15

    Purpose: To follow the Integrating Healthcare Enterprise - Radiation Oncology (IHE-RO) initiative of proper cross-vendor technology integration, an automated chart checker (ACC) was developed. ACC compares extracted data from an approved patient plan in the Eclipse treatment planning system (TPS) against data existing in the Mosaiq treatment management system (TMS). ACC automatically analyzes these parameters using built-in quality checklists to provide further aid in chart review. Methods: Eclipse TPS data are obtained using Eclipse scripting API (ESAPI) while Mosaiq TMS data are obtained from a radiotherapy-treatment-planning (RTP) file. Using this information, ACC identifies TPS-TMS discrepancies in 18 primary beam parameters including MU, energy, jaw positions, gantry angle, table angle, accessories, and bolus for up to 31 beams. Next, approximately 40 items from traditional quality checklists are evaluated such as prescription consistency, DRR graticule placement, plan approval status, global max dose, and dose tracking coefficients. Parameters were artificially modified to determine if ACC would detect an error in data transfer and to test each component of quality checklists. Results: Using ESAPI scripting and RTP file-processing, ACC was able to properly aggregate data from TPS and TMS for up to 31 beams. Errors were artificially introduced into each plan parameter, and ACC was able to successfully detect all of them within seconds. Next, ACC was able to successfully detect mistakes in the chart by identifying deviations with its quality checklists, within seconds. Conclusion: ACC effectively addresses the potential issue of faulty cross-vendor data transfer, as described by IHE-RO. In addition, ACC was also able to detect deviations from its built-in quality checklists. ACC is already an invaluable tool for efficient and standardized chart review and will continue to improve as its incorporated checklists become more comprehensive.

  1. SU-E-T-138: Automated Chart Review Module Including Cross-Vendor Data Transfer Verification Developed for IHE-RO Initiative

    International Nuclear Information System (INIS)

    Brewer, M; Gordon, C; Tien, C

    2015-01-01

    Purpose: To follow the Integrating Healthcare Enterprise - Radiation Oncology (IHE-RO) initiative of proper cross-vendor technology integration, an automated chart checker (ACC) was developed. ACC compares extracted data from an approved patient plan in the Eclipse treatment planning system (TPS) against data existing in the Mosaiq treatment management system (TMS). ACC automatically analyzes these parameters using built-in quality checklists to provide further aid in chart review. Methods: Eclipse TPS data are obtained using Eclipse scripting API (ESAPI) while Mosaiq TMS data are obtained from a radiotherapy-treatment-planning (RTP) file. Using this information, ACC identifies TPS-TMS discrepancies in 18 primary beam parameters including MU, energy, jaw positions, gantry angle, table angle, accessories, and bolus for up to 31 beams. Next, approximately 40 items from traditional quality checklists are evaluated such as prescription consistency, DRR graticule placement, plan approval status, global max dose, and dose tracking coefficients. Parameters were artificially modified to determine if ACC would detect an error in data transfer and to test each component of quality checklists. Results: Using ESAPI scripting and RTP file-processing, ACC was able to properly aggregate data from TPS and TMS for up to 31 beams. Errors were artificially introduced into each plan parameter, and ACC was able to successfully detect all of them within seconds. Next, ACC was able to successfully detect mistakes in the chart by identifying deviations with its quality checklists, within seconds. Conclusion: ACC effectively addresses the potential issue of faulty cross-vendor data transfer, as described by IHE-RO. In addition, ACC was also able to detect deviations from its built-in quality checklists. ACC is already an invaluable tool for efficient and standardized chart review and will continue to improve as its incorporated checklists become more comprehensive

  2. Public libraries, information society and technology: communication

    Directory of Open Access Journals (Sweden)

    Elsa Barber

    2001-01-01

    Full Text Available The research team focuses in the influence that Argentinian public libraries (popular and public have with library automation and public services oriented to the use of information technologies, and the acquisition of communitarian information skills within the information society. The methodology consists of a survey already successfully approved in previous investigations by the research team (UBACYT FI013 and TF06. The questionnaire focuses on related variables. On one hand, the variables were related to libraries automation processes (equipment, information systems,working modules, retrospective conversion, digitization, networks,and so on. And on the other hand, with given information technologies services (access to networks and documents in every media, Web navigation assistance, information technology local server, services to minorities, and so on. Data would be gathered with specific applications from the social sciences field. The final stage would be to study specific aspects of the automation processes of the libraries surveyed, in order to verify the reciprocal relationship between the automation level reached. And subsequently, to examine the likelihood of establishing new services that respond to the community information trends within the information technology and telecommunications development context.

  3. NASA's Advanced Information Systems Technology (AIST) Program: Advanced Concepts and Disruptive Technologies

    Science.gov (United States)

    Little, M. M.; Moe, K.; Komar, G.

    2014-12-01

    NASA's Earth Science Technology Office (ESTO) manages a wide range of information technology projects under the Advanced Information Systems Technology (AIST) Program. The AIST Program aims to support all phases of NASA's Earth Science program with the goal of enabling new observations and information products, increasing the accessibility and use of Earth observations, and reducing the risk and cost of satellite and ground based information systems. Recent initiatives feature computational technologies to improve information extracted from data streams or model outputs and researchers' tools for Big Data analytics. Data-centric technologies enable research communities to facilitate collaboration and increase the speed with which results are produced and published. In the future NASA anticipates more small satellites (e.g., CubeSats), mobile drones and ground-based in-situ sensors will advance the state-of-the-art regarding how scientific observations are performed, given the flexibility, cost and deployment advantages of new operations technologies. This paper reviews the success of the program and the lessons learned. Infusion of these technologies is challenging and the paper discusses the obstacles and strategies to adoption by the earth science research and application efforts. It also describes alternative perspectives for the future program direction and for realizing the value in the steps to transform observations from sensors to data, to information, and to knowledge, namely: sensor measurement concepts development; data acquisition and management; data product generation; and data exploitation for science and applications.

  4. The deployment of information systems and information technology in field hospitals.

    Science.gov (United States)

    Crowe, Ian R J; Naguib, Raouf N G

    2010-01-01

    Information systems and related technologies continue to develop and have become an integral part of healthcare provision and hospital care in particular. Field hospitals typically operate in the most austere and difficult of conditions and have yet to fully exploit related technologies. This paper addresses those aspects of healthcare informatics, healthcare knowledge management and lean healthcare that can be applied to field hospitals, with a view to improving patient care. The aim is to provide a vision for the deployment of information systems and information technology in field hospitals, using the British Army's field hospital as a representative model.

  5. Qualitative Education Management Based on Information Technologies

    OpenAIRE

    Natal'ya M. Obolyaeva

    2012-01-01

    The article deals with the qualitative education management through information technologies. Different approaches to defining the quality of education are considered. The interpretation for qualitative assessment of education is analyzed. The qualitative education management in details on the basis of information technologies is shown. The key advantages of appliance such technologies at the institutions of higher learning are analyzed.

  6. Biological and Chemical Information Technologies

    DEFF Research Database (Denmark)

    Amos, Martyn; Dittrich, Peter; McCaskill, John

    2011-01-01

    Biological and chemical information technologies (bio/chem IT) have the potential to reshape the scientific and technological landscape. In this paper we briefly review the main challenges and opportunities in the field, before presenting several case studies based on ongoing FP7 research projects....

  7. Information Technology Industry 2004

    National Research Council Canada - National Science Library

    Altieri, Richard; Buccheit, Nathan; Burke, Kyle; Dillard, Norvel; Dolan, Patrick; Edwards, Gregory; Elins, Daniel; Gaines, Leonard; Goodwin, Steven; Lawrence, Michael

    2004-01-01

    Forging an unprecedented partnership between the public and private sectors is essential to protect the vital interests of the United States in the wake of the ongoing Information Technology Revolution...

  8. Performance outcomes and success factors of vendor managed inventory (VMI)

    NARCIS (Netherlands)

    Claassen, M.J.T.; Weele, van A.J.; Raaij, van E.M.

    2008-01-01

    Purpose – The purpose of this paper is to seek to investigate performance outcomes of vendor managed inventory (VMI) from a buyer's perspective and enablers for its successful application. Design/methodology/approach – Structural equation modelling through Partial Least Squares (PLS) is used to

  9. Process Control/SCADA system vendor security awareness and security posture.

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Lüders, S.

    2009-01-01

    A starting point for the adequate security of process control/SCADA systems is the security awareness and security posture by the manufacturers, vendors, system integrators, and service organisations. The results of a short set of questions indicate that major security improvements are required in

  10. THE INFORMATION TECHNOLOGY AS A SUPPORT FOR STRATEGIC INFORMATION MANAGEMENT IN SMALL COMPANIES

    Directory of Open Access Journals (Sweden)

    Giseli Diniz de Almeida Moraes

    2006-11-01

    Full Text Available The present article aims to discuss the contribution of information technology (IT as a support to the strategic management of information in small businesses. This is a relevant subject to this sector, in which the information on the subjects is scarce and there is little knowledge of its relevance in the strategic process. Thus, most entrepreneurs do not visualize the information technology as a tool capable of aiding in the decision and strategic process, using it, many times, just in administrative and operational tasks. Another reason that contributes to a minor dissemination of the information technology in the small businesses segment is its lack of adaptation to the environment, where it is implemented without considering the principal management specificities of the small enterprises. The literature about the use of information technology in the strategic process of small organizations shows a series of obstacles to be overcome, such as: implementing financially accessible technologies, involving the entrepreneur in the implementation process and supplying adapted training to employees and entrepreneurs. Therefore, for small businesses it is relevant to develop researches that allow the adaptation of information technology to its needs to improve the strategic management.

  11. A comparison of surface topography characterization technologies for use in comparing spent bullet and cartridge case signatures

    Energy Technology Data Exchange (ETDEWEB)

    Batishko, C.R.; Hickman, B.J.; Cuta, F.M.

    1992-11-01

    The Pacific Northwest Laboratory was tasked by the US Department of Energy to provide technical assistance to the Federal Bureau of Investigation in evaluating and ranking technologies potentially useful in high-speed comparison of unique spent bullet and cartridge case surface signatures. Information sources included vendor input, current relevant literature, vendor phone contacts, other FBI resources, relevant PNL reports, and personal contact with numerous PNL technical staff. A comprehensive list of technologies was reduced to a list of 38 by grouping very similar methodologies, and further reduced to a short list of six by applying a set of five minimum functional requirements. A total of 14 primary criteria, many having secondary criteria, were subsequently used to evaluate each technology. The ranked short list results are reported and supported in this document, and their scores normalized to a hypothetical ideal system are as follows: (1) confocal microscopy 82.13; (2) laser dynamic focusing 72.04; (3)moire interferometry V70.94; (4)fringe field capacitance;(5)laser triangulation 66.18; (6)structured/sectioned light 65.55. Information available within the time/budget constraints which was used for the evaluation and ranking was not sufficiently detailed to evaluate specific implementations of the technologies. Each of the technologies in the short list was judged potentially capable of meeting the minimum requirements. Clever, novel engineering solutions resulting in a more cost-effective system, or a closer fit to the ``ideal system,`` could result in a reordering of the short list when actual technical proposals are evaluated. Therefore, it is recommended that a Request for Proposal not be limited to only the highest ranked technology, but include all six technologies in the short list.

  12. Conjoint Management of Business Processes and Information Technologies

    DEFF Research Database (Denmark)

    Siurdyban, Artur

    and improve business processes. As a consequence, there is a growing need to address managerial aspects of the relationships between information technologies and business processes. The aim of this PhD study is to investigate how the practice of conjoint management of business processes and information...... technologies can be supported and improved. The study is organized into five research papers and this summary. Each paper addresses a different aspect of conjoint management of business processes and information technologies, i.e. problem development and managerial practices on software...... and information technologies in a project environment. It states that both elements are intrinsically related and should be designed and considered together. The second case examines the relationships between information technology management and business process management. It discusses the multi-faceted role...

  13. Investigating the Challenges and Opportunities in Home Care to Facilitate Effective Information Technology Adoption.

    Science.gov (United States)

    Koru, Güneş; Alhuwail, Dari; Topaz, Maxim; Norcio, Anthony F; Mills, Mary Etta

    2016-01-01

    As home care utilization increases, information technology (IT) becomes a critical tool for providing quality home care. However, most home health agencies (HHAs) in the United States are in a position to adopt and leverage IT solutions in budget-constrained settings, where it is crucial to address important and pressing challenges and opportunities for achieving effectiveness in IT adoption. (1) Explore HHAs' challenges and opportunities related to delivering home care as well as performing administrative functions and conducting business, (2) learn about current IT implementation levels and activities in home care, and (3) make recommendations to facilitate efforts and initiatives designed for adopting IT in home care effectively. Semistructured interviews were conducted to elicit rich contextual information from the participants recruited from 13 local HHAs in one of the states in the United States. Established systems analysis techniques were used to ask questions during the interviews. Framework, a qualitative research method, was used to analyze the qualitative data obtained from the interviews. Coordinating clinical and administrative workflows was an important challenge. Inadequate access to patients' medical history and difficulties with medication reconciliation detracted from the quality of care. Hiring, training, scheduling, and retaining qualified personnel constituted another important challenge. Training and educating patients, caregivers, and families hold important opportunities for improving the quality of care. All except one HHA adopted electronic health records (EHR) but many continued to struggle considerably in their day-to-day functions. Health information exchange (HIE) seems to be the most needed technology. Telehealth solutions were perceived to be promising but their added value and financial viability in the long run were questioned. The recommendations for effective IT adoption include keeping a quality improvement focus, keeping a

  14. Impact of Information Technology and Internet in Businesses

    OpenAIRE

    Afërdita Berisha-Shaqiri

    2015-01-01

    In the past few decades there has been a revolution in computing and communications, and all indications are that technological progress and use of information technology will continue. The revolution in information and communication technology has changed not only our lives but also the way how people do business. Using information technology, companies possess the potential to reach more customers, introduce new products and services quickly, and collaborate with suppliers and business part...

  15. Mozambique Information and Communication Technology : Micro ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The goals of the Mozambique Information and Communication Technology Micro and Small Enterprises Incubator (MICTI Incubator) are twofold: to identify sustainable opportunities for technology-based businesses in priority development areas; and to test the assumption that technology-based businesses can mentor the ...

  16. 45 CFR 170.210 - Standards for health information technology to protect electronic health information created...

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Standards for health information technology to... Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH INFORMATION TECHNOLOGY HEALTH INFORMATION... FOR HEALTH INFORMATION TECHNOLOGY Standards and Implementation Specifications for Health Information...

  17. Qualitative Education Management Based on Information Technologies

    Directory of Open Access Journals (Sweden)

    Natal'ya M. Obolyaeva

    2012-12-01

    Full Text Available The article deals with the qualitative education management through information technologies. Different approaches to defining the quality of education are considered. The interpretation for qualitative assessment of education is analyzed. The qualitative education management in details on the basis of information technologies is shown. The key advantages of appliance such technologies at the institutions of higher learning are analyzed.

  18. The public role in promoting child health information technology.

    Science.gov (United States)

    Conway, Patrick H; White, P Jonathan; Clancy, Carolyn

    2009-01-01

    The public sector plays an important role in promoting child health information technology. Public sector support is essential in 5 main aspects of child health information technology, namely, data standards, pediatric functions in health information systems, privacy policies, research and implementation funding, and incentives for technology adoption. Some innovations in health information technology for adult populations can be transferred to or adapted for children, but there also are unique needs in the pediatric population. Development of health information technology that addresses children's needs and effective adoption of that technology are critical for US children to receive care of the highest possible quality in the future.

  19. Management of Health Information in Malawi: Role of Technology

    Directory of Open Access Journals (Sweden)

    Patrick Albert Chikumba

    2017-01-01

    Full Text Available This paper is an extended version of the conference paper presented at IST Africa Week Conference 2016 and it discusses in detail the existing technology gaps using DHIS2 (District Health Information System 2.0 as an example, and how Geographic Information System (GIS and mobile application, as specific examples of technology, can enhance health management information system (HMIS in Malawi. The paper focuses on management of health information. When organisation information is made available, it is expected that the decision-makers use it objectively making rational decisions. This can be achieved by how the information is organized, integrated and presented probably through technology. Along with the increase in strengthening HMIS, questions of how to support the management of information at various organizational levels arise. Research on technologies in health management in developing countries has been on single technologies. Therefore, in this paper, the interest is on multiple technologies and how they support each other to enhance health information management. It has been observed that when it comes to health information management, HMIS employs a mix of paper-based and technology-based practices. Taking into account the infrastructure in Malawi, as in many developing countries, this is probably the most feasible approach. Hence, discussions of existing technology gaps include both paper-based and technology-based practices and how to better support health information management practices through this mixed use of media. The case study confirms that technology plays a role in strengthening HMIS. However, this should be supported by enhancing a culture of information management. It has been noted that DHIS2 is the main information system but it requires the enhancement through inclusions of other technologies. The DHIS2 alone cannot do everything.

  20. Geothermal Greenhouse Information Package

    Energy Technology Data Exchange (ETDEWEB)

    Rafferty, K. [P.E.; Boyd, T. [ed.

    1997-01-01

    This package of information is intended to provide a foundation of background information for developers of geothermal greenhouses. The material is divided into seven sections covering such issues as crop culture and prices, operating costs for greenhouses, heating system design, vendors and a list of other sources of information.

  1. Database of Information technology resources

    OpenAIRE

    Barzda, Erlandas

    2005-01-01

    The subject of this master work is the internet information resource database. This work also handles the problems of old information systems which do not meet the new contemporary requirements. The aim is to create internet information system, based on object-oriented technologies and tailored to computer users’ needs. The internet information database system helps computers administrators to get the all needed information about computers network elements and easy to register all changes int...

  2. Mobile-Based Dictionary of Information and Communication Technology

    Science.gov (United States)

    Liando, O. E. S.; Mewengkang, A.; Kaseger, D.; Sangkop, F. I.; Rantung, V. P.; Rorimpandey, G. C.

    2018-02-01

    This study aims to design and build mobile-based dictionary of information and communication technology applications to provide access to information in the form of glossary of terms in the context of information and communication technologies. Applications built in this study using the Android platform, with SQLite database model. This research uses prototype model development method which covers the stages of communication, Quick Plan, Quick Design Modeling, Construction of Prototype, Deployment Delivery & Feedback, and Full System Transformation. The design of this application is designed in such a way as to facilitate the user in the process of learning and understanding the new terms or vocabularies encountered in the world of information and communication technology. Mobile-based dictionary of Information And Communication Technology applications that have been built can be an alternative to learning literature. In its simplest form, this application is able to meet the need for a comprehensive and accurate dictionary of Information And Communication Technology function.

  3. 75 FR 52508 - Proposed Information Collection; Comment Request; Information and Communication Technology Survey

    Science.gov (United States)

    2010-08-26

    ... conduct the 2010 through 2012 Information and Communication Technology Survey (ICTS). The annual survey... payments) for four types of information and communication technology equipment and software (computers and... and Communication Technology Survey AGENCY: U.S. Census Bureau. ACTION: Notice. SUMMARY: The...

  4. Hospital information technology in home care.

    Science.gov (United States)

    Zhang, Xiao-Ying; Zhang, Pei-Ying

    2016-10-01

    The utilization of hospital information technology (HIT) as a tool for home care is a recent trend in health science. Subjects gaining benefits from this new endeavor include middle-aged individuals with serious chronic illness living at home. Published data on the utilization of health care information technology especially for home care in chronic illness patients have increased enormously in recent past. The common chronic illnesses reported in these studies were primarily on heart and lung diseases. Furthermore, health professionals have confirmed in these studies that HIT was beneficial in gaining better access to information regarding their patients and they were also able to save that information easily for future use. On the other hand, some health professional also observed that the use of HIT in home care is not suitable for everyone and that individuals cannot be replaced by HIT. On the whole it is clear that the use of HIT could complement communication in home care. The present review aims to shed light on these latest aspects of the health care information technology in home care.

  5. Utilisation of information technology to support information and knowledge management by lawyers in Polokwane City

    Directory of Open Access Journals (Sweden)

    Solomon Bopape

    2010-01-01

    Full Text Available A revolution in information and communication technology is taking place in the world. With this technological revolution, information and knowledge are also considered as crucial assets for every organization. Law firms are regarded as one of the industries which are information and knowledge-intensive. The utilization of information technology can play an essential role in supporting information and knowledge management in law firms. An investigation into the extent to which lawyers or law firms in Polokwane city utilize information technology to support information and knowledge management was conducted through a survey questionnaire based on the Technology Acceptance Model. The findings of this research showed that lawyers utilise information technology systems or applications that are common, such as word processing, e-mail, client billing and online databases for searching legal information. Other information and knowledge management tools, such as Intranets, extranets and web portals, were the least and non-utilised applications by these lawyers. The main reason for non-utilization of such systems may be linked to non- exposure to information technology and unfamiliarity with information and knowledge management tools. It is, therefore, recommended that legal schools should include, in their curriculum, modules on the application and role of information technology in the legal practice. Recommendations for future research related to this subject are also provided.

  6. Corporate governance and the adoption of health information technology within integrated delivery systems.

    Science.gov (United States)

    Baird, Aaron; Furukawa, Michael F; Rahman, Bushra; Schneller, Eugene S

    2014-01-01

    Although several previous studies have found "system affiliation" to be a significant and positive predictor of health information technology (IT) adoption, little is known about the association between corporate governance practices and adoption of IT within U.S. integrated delivery systems (IDSs). Rooted in agency theory and corporate governance research, this study examines the association between corporate governance practices (centralization of IT decision rights and strategic alignment between business and IT strategy) and IT adoption, standardization, and innovation within IDSs. Cross-sectional, retrospective analyses using data from the 2011 Health Information and Management Systems Society Analytics Database on adoption within IDSs (N = 485) is used to analyze the correlation between two corporate governance constructs (centralization of IT decision rights and strategic alignment) and three IT constructs (adoption, standardization, and innovation) for clinical and supply chain IT. Multivariate fractional logit, probit, and negative binomial regressions are applied. Multivariate regressions controlling for IDS and market characteristics find that measures of IT adoption, IT standardization, and innovative IT adoption are significantly associated with centralization of IT decision rights and strategic alignment. Specifically, centralization of IT decision rights is associated with 22% higher adoption of Bar Coding for Materials Management and 30%-35% fewer IT vendors for Clinical Data Repositories and Materials Management Information Systems. A combination of centralization and clinical IT strategic alignment is associated with 50% higher Computerized Physician Order Entry adoption, and centralization along with supply chain IT strategic alignment is significantly negatively correlated with Radio Frequency Identification adoption : Although IT adoption and standardization are likely to benefit from corporate governance practices within IDSs, innovation is

  7. Towards safe information technology in health care

    NARCIS (Netherlands)

    J.E.C.M. Aarts (Jos)

    2011-01-01

    textabstractHealth information technology is widely accepted to increase patient safety and reduce medical errors. The widespread implementation makes evident that health information technology has become of a complex sociotechnical system that is health care. Design and implementation may result in

  8. 2017 World Conference on Information Systems and Technologies

    CERN Document Server

    Correia, Ana; Adeli, Hojjat; Reis, Luís; Costanzo, Sandra

    2017-01-01

    This book presents a selection of papers from the 2017 World Conference on Information Systems and Technologies (WorldCIST'17), held between the 11st and 13th of April 2017 at Porto Santo Island, Madeira, Portugal. WorldCIST is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges involved in modern Information Systems and Technologies research, together with technological developments and applications. The main topics covered are: Information and Knowledge Management; Organizational Models and Information Systems; Software and Systems Modeling; Software Systems, Architectures, Applications and Tools; Multimedia Systems and Applications; Computer Networks, Mobility and Pervasive Systems; Intelligent and Decision Support Systems; Big Data Analytics and Applications; Human–Computer Interaction; Ethics, Computers & Security; Health Informatics; Information Technologies in Education; and Information Tec...

  9. Advanced information science and object-oriented technology for information management applications

    Energy Technology Data Exchange (ETDEWEB)

    Hummel, J.R.; Swietlik, C.E.

    1996-10-01

    The role of the military has been undergoing rapid change since the fall of the Berlin Wall. The kinds of missions the US military has been asked to participate in have often fallen into the category of {open_quotes}Military Operations Other Than War{close_quotes} and those involving military responses have been more of a surgical nature directed against different kinds of threats, like rogue states or in response to terrorist actions. As a result, the requirements on the military planner and analyst have also had to change dramatically. For example, preparing response options now requires rapid turnaround and a highly flexible simulation capability. This in turn requires that the planner or analyst have access to sophisticated information science and simulation technologies. In this paper, we shall discuss how advanced information science and object-oriented technologies can be used in advanced information management applications. We shall also discuss how these technologies and tools can be applied to DoD applications by presenting examples with a system developed at Argonne, the Dynamic Information Architecture System (DIAS). DIAS has been developed to exploit advanced information science and simulation technologies to provide tools for future planners and analysts.

  10. What can information technology do for environmental protection?

    International Nuclear Information System (INIS)

    Trauboth, H.

    1987-01-01

    Information technology plays an important role in the accomplishment of an effective environmental protection. Prerequisite for its comprehensive implementation is the legal and economic achievement of closed material cycles for supply and waste discharge in production and consumption as well as in nuclear technology. Modern information processing may be used for the inventory of natural and emission sources, to gain knowledge on the functioning mechanisms of nature, for the planning of a considerate exploitation of natural recources and for the ecology-oriented monitoring and control of industrial plants. The state of the art of the corresponding information technology and new areas of research especially in measurement technology are shown. The breadth of the great opportunities of information technology for environmental protection is discribed. (orig.) [de

  11. THE ROLE OF INFORMATION TECHNOLOGY IN ORGANIZATIONS

    OpenAIRE

    Ramin Bashir Khodaparasti

    2012-01-01

    Development of organization started in period with agriculture and industrial during the period came and information. Today in period of competition, information is very important needed. So competitive advantage in the information provided to achieve goals is necessary. Entrance of this technology in organizations conjectural attitude changed and evolved functions their managers. The purpose of this paper is to define the correct information and the role technology has in improving the situa...

  12. Advances in Computing and Information Technology : Proceedings of the Second International Conference on Advances in Computing and Information Technology

    CERN Document Server

    Nagamalai, Dhinaharan; Chaki, Nabendu

    2013-01-01

    The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, ...

  13. The impact of health information technology on patient safety

    Directory of Open Access Journals (Sweden)

    Yasser K. Alotaibi

    2017-12-01

    Full Text Available Since the original Institute of Medicine (IOM report was published there has been an accelerated development and adoption of health information technology with varying degrees of evidence about the impact of health information technology on patient safety. This article is intended to review the current available scientific evidence on the impact of different health information technologies on improving patient safety outcomes. We conclude that health information technology improves patient’s safety by reducing medication errors, reducing adverse drug reactions, and improving compliance to practice guidelines. There should be no doubt that health information technology is an important tool for improving healthcare quality and safety. Healthcare organizations need to be selective in which technology to invest in, as literature shows that some technologies have limited evidence in improving patient safety outcomes.

  14. The impact of health information technology on patient safety.

    Science.gov (United States)

    Alotaibi, Yasser K; Federico, Frank

    2017-12-01

    Since the original Institute of Medicine (IOM) report was published there has been an accelerated development and adoption of health information technology with varying degrees of evidence about the impact of health information technology on patient safety.  This article is intended to review the current available scientific evidence on the impact of different health information technologies on improving patient safety outcomes. We conclude that health information technology improves patient's safety by reducing medication errors, reducing adverse drug reactions, and improving compliance to practice guidelines. There should be no doubt that health information technology is an important tool for improving healthcare quality and safety. Healthcare organizations need to be selective in which technology to invest in, as literature shows that some technologies have limited evidence in improving patient safety outcomes.

  15. Networking and Information Technology Workforce Study: Final Report

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — This report presents the results of a study of the global Networking and Information Technology NIT workforce undertaken for the Networking and Information...

  16. The Impact of Subsistence Prime Vendor on the Subsistence Supplier Base

    National Research Council Canada - National Science Library

    Sanders, David

    2000-01-01

    .... This research will focus on one of these innovations, the Subsistence Prime Vendor (SPV) Program. The SPV program was implemented to reduce the inventories and to improve the quality of food products purchased to support military dining facilities...

  17. Information technology and global change science

    Energy Technology Data Exchange (ETDEWEB)

    Baxter, F.P.

    1990-01-01

    The goal of this paper is to identify and briefly describe major existing and near term information technologies that cold have a positive impact on the topics being discussed at this conference by helping to manage the data of global change science and helping global change scientists conduct their research. Desktop computer systems have changed dramatically during the past seven years. Faster data processing can be expected in the future through full development of traditional serial computer architectures. Some other proven information technologies may be currently underutilized by global change scientists. Relational database management systems and good organization of data through the use of thoughtful database design would enable the scientific community to better share and maintain quality research data. Custodians of the data should use rigorous data administration to ensure integrity and long term value of the data resource. Still other emerging information technologies that involve the use of artificial intelligence, parallel computer architectures, and new sensors for data collection will be in relatively common use in the near term and should become part of the global science community's technical toolkit. Consideration should also be given to the establishment of Information Analysis Centers to facilitate effective organization and management of interdisciplinary data and the prototype testing and use of advanced information technology to facilitate rapid and cost-effective integration of these tools into global change science. 8 refs.

  18. The Street Vendors of Bangkok: Alternatives to Indoor Retailers at a Time of Economic Crisis

    OpenAIRE

    John Walsh

    2010-01-01

    Problem statement: During an economic crisis, consumers will use different techniques to make their money go as far as possible: More carefully comparing prices at point of sale locations, bringing out the coins they previously left unused in saving banks, switching to lower cost options and choosing to shop in less convenient locations in order to find discounts. One such option is to use street vendors rather than regular indoor retailers. Street vendors can provide cheaper goods because, i...

  19. 78 FR 24749 - Health Information Technology Policy Committee Appointment

    Science.gov (United States)

    2013-04-26

    ... GOVERNMENT ACCOUNTABILITY OFFICE Health Information Technology Policy Committee Appointment AGENCY... Recovery and Reinvestment Act of 2009 (ARRA) established the Health Information Technology Policy Committee to make recommendations on the implementation of a nationwide health information technology...

  20. Information technology research and development critical trends and issues

    CERN Document Server

    1985-01-01

    Information Technology Research and Development: Critical Trends and Issues is a report of the Office of Technology Assessment of the United States Government on the research and development in the area of information technology. The report discusses information technology research and development - its goals, nature, issues, and strategies; environment and its changes; the roles of the participants; and the health of its field. The book then goes on to four selected case studies in information technology: advanced computer architecture; fiber optic communications; software engineering; and ar

  1. Impact of Information Technology and Internet in Businesses

    Directory of Open Access Journals (Sweden)

    Afërdita Berisha-Shaqiri

    2015-03-01

    Full Text Available In the past few decades there has been a revolution in computing and communications, and all indications are that technological progress and use of information technology will continue. The revolution in information and communication technology has changed not only our lives but also the way how people do business. Using information technology, companies possess the potential to reach more customers, introduce new products and services quickly, and collaborate with suppliers and business partners from all over the world. Transformation from industrial society to information society and industrial economy to knowledge economy is a result of the impact of ICT and Internet use. Main objective of this paper is to describe information technology; opportunities of Internet usage for businesses to achieve strategic advantages compared to their competition and how they can facilitate the movement of goods and services from producers to customers.

  2. Investigating unlicensed retail drug vendors' preparedness and knowledge about malaria: An exploratory study in rural Uganda.

    Science.gov (United States)

    Liow, Eric; Kassam, Rosemin; Sekiwunga, Richard

    2017-10-01

    Despite major efforts to increase the uptake of preventive measures and timely use of the first line antimalarial treatment artemisinin-based combination therapies (ACT), Uganda continues to fall short of meeting its national malaria control targets. One of the challenges has been scaling up effective measures in rural and remote areas where the unlicensed private retail sector remains the first point of contact and a common source of treatment. The current paper discusses unlicensed vendors' (1) training related to malaria case management for children aged five and under, and (2) knowledge related to the cause of malaria, preventive measures, common signs, and symptoms, diagnostic procedures, and best treatment options. A qualitative study using semi-structured interviews was conducted in the rural district of Butaleja, Uganda in 2011. All 88 unlicensed drug outlets enumerated in the study area were visited by six locally recruited research assistants, with one vendor from each outlet invited to participate. The transcripts were analyzed using acceptable qualitative research protocols. About half of the 75 vendors interviewed had received some sort of formal training on malaria at a post-secondary institution, although only 6.7% had qualifications which met licensure requirements. The study found widespread misconceptions relating to the cause, as well as prevention and treatment of malaria. A large majority of the vendors relied primarily on non-specific symptoms and limited physical exams for diagnoses, with less than one-tenth of the vendors recognizing that rapid or microscopic blood testing was necessary to confirm a clinical diagnosis of malaria. While most recognized mosquitoes as the primary vector for malaria, over two-fifths of the vendors held misconceptions about the factors that could increase the risk of malaria, and nearly a third believed that malaria could not be prevented. With respect to acute case management, three-quarters viewed as the best

  3. 75 FR 47631 - Swets Information Services, Operations Department, Information Technology Group, Marketing Group...

    Science.gov (United States)

    2010-08-06

    ... DEPARTMENT OF LABOR Employment and Training Administration [TA-W-73,668] Swets Information Services, Operations Department, Information Technology Group, Marketing Group, Finance Group, Runnemede..., Information Technology (IT) Group, Marketing Group and the Finance Group into one entity instead of...

  4. Information Communication Technology Planning in Developing Countries

    Science.gov (United States)

    Malapile, Sandy; Keengwe, Jared

    2014-01-01

    This article explores major issues related to Information Communication Technology (ICT) in education and technology planning. Using the diffusion of innovation theory, the authors examine technology planning opportunities and challenges in Developing countries (DCs), technology planning trends in schools, and existing technology planning models…

  5. Sanitization and Disposal of Excess Information Technology Equipment

    Science.gov (United States)

    2009-09-21

    Report No. D-2009-104 September 21, 2009 Sanitization and Disposal of Excess Information Technology Equipment...2009 2. REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Sanitization and Disposal of Excess Information Technology ...Defense (Networks and Information Integration)/DOD Chief Information Officer DRMS Defense Reutilization and Marketing Service IT Information

  6. 75 FR 71137 - Vendor Outreach Workshop for Women Owned Small Businesses in the National Capitol Region of the...

    Science.gov (United States)

    2010-11-22

    ... the Interior is hosting a Vendor Outreach Workshop for women owned small businesses in the National... meeting its business goals for small, small disadvantaged, 8(a), woman-owned, HUBZone, and service... DEPARTMENT OF THE INTERIOR Office of the Secretary Vendor Outreach Workshop for Women Owned Small...

  7. The role of private pesticide vendors in preventing access to pesticides for self-poisoning in rural Sri Lanka

    DEFF Research Database (Denmark)

    Weerasinghe, Manjula; Pearson, Melissa; Peiris, Ravi

    2014-01-01

    they did want to help to improve identification of such customers. The community did not blame vendors when pesticides used for self-poison were purchased from their shops. Vendors have already taken steps to restrict access, including selling low toxic products, counselling and asking customer to return...

  8. 75 FR 48986 - Vendor Outreach Workshop for Small Businesses in the National Capitol Region of the United States

    Science.gov (United States)

    2010-08-12

    ... DEPARTMENT OF THE INTERIOR Office of the Secretary Vendor Outreach Workshop for Small Businesses in the National Capitol Region of the United States AGENCY: Office of the Secretary, Interior. ACTION... Interior are hosting a Vendor Outreach Workshop for small businesses in the National Capitol region of the...

  9. Center Director Bridges visits Disability Awareness and Action working Group Technology Fair

    Science.gov (United States)

    1999-01-01

    Center Director Roy Bridges (standing, center) poses with members of the Disability Awareness and Action Working Group (DAAWG), which is holding the 1999 Technology Fair Oct. 20-21 at Kennedy Space Center. The Fair is highlighting vendors demonstrating mobility, hearing, vision and silent disability assistive technology. The purpose is to create an awareness of the types of technology currently available to assist people with various disabilities in the workplace. The theme is that of this year's National Disability Employment Awareness Month, 'Opening Doors to Ability.' Some of the vendors participating are Canine Companions for Independence, Goodwill Industries, Accessible Structures, Division of Blind Services, Space Coast Center for Independent Living, KSC Fitness Center and Delaware North Parks Services.

  10. 16 CFR 6.152 - Program accessibility: Electronic and information technology.

    Science.gov (United States)

    2010-01-01

    ... information technology. 6.152 Section 6.152 Commercial Practices FEDERAL TRADE COMMISSION ORGANIZATION... information technology. (a) When developing, procuring, maintaining, or using electronic and information... electronic and information technology allows, regardless of the type of medium of the technology: (1...

  11. Participatory Design & Health Information Technology

    DEFF Research Database (Denmark)

    Health Information Technology (HIT) continues to increase in importance as a component of healthcare provision, but designing HIT is complex. The creation of cooperative learning processes for future HIT users is not a simple task. The importance of engaging end users such as health professionals......, in collaboration with a wide range of people, a broad repertoire of methods and techniques to apply PD within multiple domains has been established. This book, Participatory Design & Health Information Technology, presents the contributions of researchers from 5 countries, who share their experience and insights......, patients and relatives in the design process is widely acknowledged, and Participatory Design (PD) is the primary discipline for directly involving people in the technological design process. Exploring the application of PD in HIT is crucial to all those involved in engaging end users in HIT design and...

  12. Information Technology Industry 2004

    National Research Council Canada - National Science Library

    Altieri, Richard; Buccheit, Nathan; Burke, Kyle; Dillard, Norvel; Dolan, Patrick; Edwards, Gregory; Elins, Daniel; Gaines, Leonard; Goodwin, Steven; Lawrence, Michael

    2004-01-01

    .... This study will define the Information Technology Industry, give an overview of current domestic and international conditions, and then analyze the state of national network security and challenges faced by the U.S. government and U.S...

  13. Computing, Information, and Communications Technology (CICT) Program Overview

    Science.gov (United States)

    VanDalsem, William R.

    2003-01-01

    The Computing, Information and Communications Technology (CICT) Program's goal is to enable NASA's Scientific Research, Space Exploration, and Aerospace Technology Missions with greater mission assurance, for less cost, with increased science return through the development and use of advanced computing, information and communication technologies

  14. 11 CFR 116.3 - Extensions of credit by commercial vendors.

    Science.gov (United States)

    2010-01-01

    ... of credit to nonpolitical debtors that are of similar risk and size of obligation. (b) Incorporated... similar to extensions of credit to nonpolitical debtors that are of similar risk and size of obligation... 11 Federal Elections 1 2010-01-01 2010-01-01 false Extensions of credit by commercial vendors. 116...

  15. 48 CFR 939.7002 - Contractor acquisition of information technology.

    Science.gov (United States)

    2010-10-01

    ... information technology. 939.7002 Section 939.7002 Federal Acquisition Regulations System DEPARTMENT OF ENERGY SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Implementing DOE Policies and Procedures 939.7002 Contractor acquisition of information technology. (a) Management and operating (M&O...

  16. Does food vendor density mediate the association between neighborhood deprivation and BMI?: a G-computation mediation analysis.

    Science.gov (United States)

    Zhang, Y Tara; Laraia, Barbara A; Mujahid, Mahasin S; Tamayo, Aracely; Blanchard, Samuel D; Warton, E Margaret; Kelly, N Maggi; Moffet, Howard H; Schillinger, Dean; Adler, Nancy; Karter, Andrew J

    2015-05-01

    In previous research, neighborhood deprivation was positively associated with body mass index (BMI) among adults with diabetes. We assessed whether the association between neighborhood deprivation and BMI is attributable, in part, to geographic variation in the availability of healthful and unhealthful food vendors. Subjects were 16,634 participants of the Diabetes Study of Northern California, a multiethnic cohort of adults living with diabetes. Neighborhood deprivation and healthful (supermarket and produce) and unhealthful (fast food outlets and convenience stores) food vendor kernel density were calculated at each participant's residential block centroid. We estimated the total effect, controlled direct effect, natural direct effect, and natural indirect effect of neighborhood deprivation on BMI. Mediation effects were estimated using G-computation, a maximum likelihood substitution estimator of the G-formula that allows for complex data relations such as multiple mediators and sequential causal pathways. We estimated that if neighborhood deprivation was reduced from the most deprived to the least deprived quartile, average BMI would change by -0.73 units (95% confidence interval: -1.05, -0.32); however, we did not detect evidence of mediation by food vendor density. In contrast to previous findings, a simulated reduction in neighborhood deprivation from the most deprived to the least deprived quartile was associated with dramatic declines in both healthful and unhealthful food vendor density. Availability of food vendors, both healthful and unhealthful, did not appear to explain the association between neighborhood deprivation and BMI in this population of adults with diabetes.

  17. Information and Communication Technology and School Based ...

    African Journals Online (AJOL)

    Information and Communication technology and school based assessment (SBA) is practice that broadens the form mode, means and scope of assessment in the school using modern technologies in order to facilitate and enhance learning. This study sought to ascertain the efficacy of Information and Communication ...

  18. Health information technology: help or hindrance?

    Science.gov (United States)

    Ketchersid, Terry

    2014-07-01

    The practice of medicine in general and nephrology in particular grows increasingly complex with each passing year. In parallel with this trend, the purchasers of health care are slowly shifting the reimbursement paradigm from one based on rewarding transactions, or work performed, to one that rewards value delivered. Within this context, the health-care value equation is broadly defined as quality divided by costs. Health information technology has been widely recognized as 1 of the foundations for delivering better care at lower costs. As the largest purchaser of health care in the world, the Centers for Medicare and Medicaid Services has deployed a series of interrelated programs designed to spur the adoption and utilization of health information technology. This review examines our known collective experience in the practice of nephrology to date with several of these programs and attempts to answer the following question: Is health information technology helping or hindering the delivery of value to the nation's health-care system? Through this review, it was concluded overall that the effect of health information technology appears positive; however, it cannot be objectively determined because of the infancy of its utilization in the practice of medicine. Copyright © 2014 National Kidney Foundation, Inc. Published by Elsevier Inc. All rights reserved.

  19. Exploring the organizational impact of software-as-a-Service on software vendors the role of organizational integration in software-as-a-Service development and operation

    CERN Document Server

    Stuckenberg, Sebastian

    2014-01-01

    Software-as-a-Service has gained momentum as a software delivery and pricing model within the software industry. Existing practices of software vendors are challenged by a potential paradigm shift. This book analyzes the implications of Software-as-a-Service on software vendors using a business model and value chain perspective. The analysis of qualitative data from software vendors highlights the role of organizational integration within software vendors. By providing insights regarding the impact of Software-as-a-Service on organizational structures and processes of software vendors, this st

  20. Information Technology (IT) and applied domain education in West ...

    African Journals Online (AJOL)

    Information Technology (IT) is one of the important name in today's world. Information Technology (IT) is important factor for buzzword, education, societal application and development, mass communication, politics, hospitality, health. Information Technology (IT) is an interdisciplinary domain which is mainly combination of ...

  1. Vendor Managed Inventory:Retail Industry Perspective of Malaysia

    OpenAIRE

    Madjlesi Taklimi, Zahra

    2011-01-01

    The concept of Vendor Managed Inventory (VMI) radically changes a traditional inventory management. Under the typical business model, the buyer or retailer is in total control of the timing and volume of the order, in order placing and managing the inventory plan. Whereas VMI is a supply chain initiative where the supplier is responsible for all decisions regarding inventories at the retailers, i.e. under VMI program the supplier is authorized to manage inventories of agreed-upon stock-keepin...

  2. Survey of network and information security technology

    International Nuclear Information System (INIS)

    Liu Baoxu; Wang Xiaozhen

    2007-01-01

    With the rapidly development of the computer network technology and informationize working of our Country, Network and Information Security issues becomes the focal point problem that people shows solicitude for. On the basis analysing security threat and challenge of network information and their developing trend. This paper briefly analyses and discusses the main relatively study direction and content about the theory, technology and practice of Network and Information Security. (authors)

  3. Open Source Software Tool Skyline Reaches Key Agreement with Mass Spectrometer Vendors | Office of Cancer Clinical Proteomics Research

    Science.gov (United States)

    The full proteomics analysis of a small tumor sample (similar in mass to a few grains of rice) produces well over 500 megabytes of unprocessed "raw" data when analyzed on a mass spectrometer (MS). Thus, for every proteomics experiment there is a vast amount of raw data that must be analyzed and interrogated in order to extract biological information. Moreover, the raw data output from different MS vendors are generally in different formats inhibiting the ability of labs to productively work together.

  4. 48 CFR 2452.239-71 - Information Technology Virus Security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...

  5. 48 CFR 1352.239-71 - Electronic and information technology.

    Science.gov (United States)

    2010-10-01

    ... Electronic and information technology. As prescribed in 48 CFR 1339.270(a), insert the following provision: Electronic and Information Technology (APR 2010) (a) To be considered eligible for award, offerors must propose electronic and information technology (EIT) that meet the applicable Access Board accessibility...

  6. Impact of Healthcare Information Technology on Nursing Practice.

    Science.gov (United States)

    Piscotty, Ronald J; Kalisch, Beatrice; Gracey-Thomas, Angel

    2015-07-01

    To report additional mediation findings from a descriptive cross sectional study to examine if nurses' perceptions of the impact of healthcare information technology on their practice mediates the relationship between electronic nursing care reminder use and missed nursing care. The study used a descriptive design. The sample (N = 165) was composed of registered nurses working on acute care hospital units. The sample was obtained from a large teaching hospital in Southeast Michigan in the fall of 2012. All eligible nursing units (n = 19) were included. The MISSCARE Survey, Nursing Care Reminders Usage Survey, and the Impact of Healthcare Information Technology Scale were used to collect data to test for mediation. Mediation was tested using the method described by Baron and Kenny. Multiple regression equations were used to analyze the data to determine if mediation occurred between the variables. Missed nursing care, the outcome variable, was regressed on the predictor variable, reminder usage, and the mediator variable impact of technology on nursing practice. The impact of healthcare information technology (IHIT) on nursing practice negatively affected missed nursing care (t = -4.12, p information technology mediates the relationship between nursing care reminder use and missed nursing care. The findings are beneficial to the advancement of healthcare technology in that designers of healthcare information technology systems need to keep in mind that perceptions regarding impacts of the technology will influence usage. Many times, information technology systems are not designed to match the workflow of nurses. Systems built with redundant or impertinent reminders may be ignored. System designers must study which reminders nurses find most useful and which reminders result in the best quality outcomes. © 2015 Sigma Theta Tau International.

  7. Work of scientific and technological information under network environment

    International Nuclear Information System (INIS)

    Chen Yingxi; Huang Daifu; Yang Lifeng

    2010-01-01

    With the development of internet and information technology, the work of scientific and technological information is faced with great challenge. This article expounds the new changes of scientific and technological information in enterprise under network environment by giving a minute description on the situation the work faced and characteristic of the work. Not only does it carry out enthusiastic discussion upon problems which are present in the work of scientific and technological information in the company, but puts forward proposals and specific measures as well. Service theory is also offered by adjusting and reforming the resources construction, service ways and the job of providing contents. We should take vigorous action to the research work of scientific and technological information, changing the information directional service into knowledge providing service. (authors)

  8. Information technology and computational physics

    CERN Document Server

    Kóczy, László; Mesiar, Radko; Kacprzyk, Janusz

    2017-01-01

    A broad spectrum of modern Information Technology (IT) tools, techniques, main developments and still open challenges is presented. Emphasis is on new research directions in various fields of science and technology that are related to data analysis, data mining, knowledge discovery, information retrieval, clustering and classification, decision making and decision support, control, computational mathematics and physics, to name a few. Applications in many relevant fields are presented, notably in telecommunication, social networks, recommender systems, fault detection, robotics, image analysis and recognition, electronics, etc. The methods used by the authors range from high level formal mathematical tools and techniques, through algorithmic and computational tools, to modern metaheuristics.

  9. (CICT) Computing, Information, and Communications Technology Overview

    Science.gov (United States)

    VanDalsem, William R.

    2003-01-01

    The goal of the Computing, Information, and Communications Technology (CICT) program is to enable NASA's Scientific Research, Space Exploration, and Aerospace Technology Missions with greater mission assurance, for less cost, with increased science return through the development and use of advanced computing, information and communications technologies. This viewgraph presentation includes diagrams of how the political guidance behind CICT is structured. The presentation profiles each part of the NASA Mission in detail, and relates the Mission to the activities of CICT. CICT's Integrated Capability Goal is illustrated, and hypothetical missions which could be enabled by CICT are profiled. CICT technology development is profiled.

  10. Investing Wisely in Information Technology: Asking the Right Questions.

    Science.gov (United States)

    Breivik, Patricia Senn

    1993-01-01

    College administrators are offered a series of questions to ask in evaluating the appropriateness of information technology for their campuses. Issues addressed include defining institutional goals and the role of information technology in them, determining the most effective organization of information resources and technology, and allocation of…

  11. HEALTH INFORMATION TECHNOLOGY IN EXCHANGE OF HEALTH INFORMATION

    Directory of Open Access Journals (Sweden)

    Jordan Deliversky

    2016-06-01

    Full Text Available Health information technology involves the exchange of health information in an electronic environment. Data protection is comprised of many elements, including where the data resides, how it is used, and who has access to it. Individually identifiable health information should be protected with reasonable administrative, technical, and physical safeguards to ensure its confidentiality, integrity, and availability and to prevent unauthorized access, use, or disclosure. Health records are among the most sensitive records available containing information concerning an individual. The unauthorized disclosure of a medical condition or diagnosis could negatively impact an individual’s personal and professional life.

  12. Traceability information carriers. The technology backgrounds and consumers' perceptions of the technological solutions.

    Science.gov (United States)

    Chrysochou, Polymeros; Chryssochoidis, George; Kehagia, Olga

    2009-12-01

    The implementation of traceability in the food supply chain has reinforced adoption of technologies with the ability to track forward and trace back product-related information. Based on the premise that these technologies can be used as a means to provide product-related information to consumers, this paper explores the perceived benefits and drawbacks of such technologies. The aim is to identify factors that influence consumers' perceptions of such technologies, and furthermore to advise the agri-food business on issues that they should consider prior to the implementation of such technologies in their production lines. For the purposes of the study, a focus group study was conducted across 12 European countries, while a set of four different technologies used as a means to provide traceability information to consumers was the focal point of the discussions in each focus group. Results show that the amount of and confidence in the information provided, perceived levels of convenience, impact on product quality and safety, impact on consumers' health and the environment, and potential consequences on ethical and privacy liberties constitute important factors influencing consumers' perceptions of technologies that provide traceability.

  13. Information technology security system engineering methodology

    Science.gov (United States)

    Childs, D.

    2003-01-01

    A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.

  14. A comparison of surface topography characterization technologies for use in comparing spent bullet and cartridge case signatures

    Energy Technology Data Exchange (ETDEWEB)

    Batishko, C.R.; Hickman, B.J.; Cuta, F.M.

    1992-11-01

    The Pacific Northwest Laboratory was tasked by the US Department of Energy to provide technical assistance to the Federal Bureau of Investigation in evaluating and ranking technologies potentially useful in high-speed comparison of unique spent bullet and cartridge case surface signatures. Information sources included vendor input, current relevant literature, vendor phone contacts, other FBI resources, relevant PNL reports, and personal contact with numerous PNL technical staff. A comprehensive list of technologies was reduced to a list of 38 by grouping very similar methodologies, and further reduced to a short list of six by applying a set of five minimum functional requirements. A total of 14 primary criteria, many having secondary criteria, were subsequently used to evaluate each technology. The ranked short list results are reported and supported in this document, and their scores normalized to a hypothetical ideal system are as follows: (1) confocal microscopy 82.13; (2) laser dynamic focusing 72.04; (3)moire interferometry V70.94; (4)fringe field capacitance;(5)laser triangulation 66.18; (6)structured/sectioned light 65.55. Information available within the time/budget constraints which was used for the evaluation and ranking was not sufficiently detailed to evaluate specific implementations of the technologies. Each of the technologies in the short list was judged potentially capable of meeting the minimum requirements. Clever, novel engineering solutions resulting in a more cost-effective system, or a closer fit to the ideal system,'' could result in a reordering of the short list when actual technical proposals are evaluated. Therefore, it is recommended that a Request for Proposal not be limited to only the highest ranked technology, but include all six technologies in the short list.

  15. Licensee contractor and vendor inspection status report. Quarterly report, October--December 1995

    International Nuclear Information System (INIS)

    1996-02-01

    This periodical covers the results of inspections performed by the NRC's Special Inspection Branch, Vendor Inspection Section, that have been distributed to the inspected organizations during the period from October 1995 through December 1995

  16. Licensee contractor and vendor inspection status report. Quarterly report, October--December 1996

    International Nuclear Information System (INIS)

    1997-03-01

    This periodical covers the results of inspections performed by the NRC's Special Inspection Branch, Vendor Inspection Section, that have been distributed to the inspected organizations during the period from October 1996 through December 1996

  17. Concept-oriented research and development in information technology

    CERN Document Server

    Mori, Kinji

    2014-01-01

    This book thoroughly analyzes the relationships between concept, technology, and market-which are the main factors in shifting information technology research and development (R&D) to a new approach. It discusses unconventional methods and viewpoints of concept creation, technology innovation, and market cultivation. Featuring contributions from international experts and case studies from IBM and Hitachi, this book is perfect for graduate students in information technology, engineering, technology management, operation research, and business-as well as for R&D researchers, directors, strategis

  18. Information sensing and interactive technology of Internet of Things

    Science.gov (United States)

    Xiao, Zhiliang

    2017-11-01

    With the rapid development of economic, the Internet of Things based on Internet technology is more and more concerned by all circles of society, and the Internet of Things begins to penetrate into various fields of society. The Internet of things is an extension of the Internet, the difference between the Internet and the Internet of Things is that the purpose of things aims to achieve the exchange and exchange of information and data, contract the people and goods through a variety of technologies and equipment from items to items. Information perception and interaction technology are two very important technologies in the development of things, but also is the important technology in the history of the development of network technology. This paper briefly analyzes the characteristics of the original information perception, and the difference between the interactive technology of the Internet of Things and the human-computer interaction technology. On this basis, this paper mainly elaborates from the two aspects of information perception and interactive technology.

  19. 17 CFR 200.26a - Office of Information Technology.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Office of Information Technology. 200.26a Section 200.26a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Organization § 200.26a Office of Information Technology. The Office of Information Technology is responsible...

  20. Factors affecting the adoption of healthcare information technology

    OpenAIRE

    Naenna, Thanakorn; Phichitchaisopa, Nisakorn

    2013-01-01

    In order to improve the quality and performance of healthcare services, healthcare information technology is among the most important technology in healthcare supply chain management. This study sets out to apply and test the Unified Theory of Acceptance and Use of Technology (UTAUT), to examine the factors influencing healthcare Information Technology (IT) services. A structured questionnaire was developed and distributed to healthcare representatives in each province surveyed in Thailand...

  1. Factors affecting the adoption of healthcare information technology

    OpenAIRE

    Phichitchaisopa, Nisakorn; Naenna, Thanakorn

    2013-01-01

    In order to improve the quality and performance of healthcare services, healthcare information technology is among the most important technology in healthcare supply chain management. This study sets out to apply and test the Unified Theory of Acceptance and Use of Technology (UTAUT), to examine the factors influencing healthcare Information Technology (IT) services. A structured questionnaire was developed and distributed to healthcare representatives in each province surveyed in Thailand. D...

  2. 77 FR 48169 - The Information Technology Agreement: Advice and Information on the Proposed Expansion: Part 1...

    Science.gov (United States)

    2012-08-13

    ... Information Technology Agreement: Advice and Information on the Proposed Expansion: Part 1; The Information Technology Agreement: Advice and Information on the Proposed Expansion: Part 2 AGENCY: United States... Technology Agreement: Advice and Information on the Proposed Expansion: Part 1, and investigation No. 332-536...

  3. Knowledge Attitude And Practice Of Street Food Vendors In Selected Schools Within Bo City Southern Sierra Leone

    Directory of Open Access Journals (Sweden)

    P.T. Lamin-Boima

    2017-12-01

    Full Text Available This paper attempts to investigate the lack of knowledge attitude and practices of street food vendors in Bo the Southern Province of Sierra Leone. A cross sectional study conducted among eighty-seven respondents vendors in forty-four in Bo City. Data was collected using a structured and semi structured questionnaire. The collected data is analysed using a simple descriptive statistics with the help Excel Microsoft ware. A statistical significance was found in relation to knowledge. Attitude towards food safety was negative self-reported practices by Street Food Vendors were statistically significant with low hygiene standards while predisposing factors showed relatively low personal hygiene poor environmental sanitation and low food safety practice. The realize consequences are utmost health risks of consuming street foods as food contamination has caused food borne diseases and outbreaks. It is recommended that standard training be provided for these vendors by the Bo City Council in collaboration with Njala University. It is essential that poor people in a developing country such as Sierra Leone be allowed to earn their livelihood by means of an easy-to-enter business such as street food vending when hygiene standards are sustained.

  4. Evaluating the Release, Delivery, and Deployment Processes of Eight Large Product Software Vendors applying the Customer Configuration Update Model

    NARCIS (Netherlands)

    Jansen, S.R.L.; Brinkkemper, S.

    2006-01-01

    For software vendors the processes of release, delivery, and deployment to customers are inherently complex. However, software vendors can greatly improve their product quality and quality of service by applying a model that focuses on customer interaction if such a model were available. This

  5. INTRODUCTION OF INTERNET OF THING TECHNOLOGY BASED ON PROTOTYPE

    Directory of Open Access Journals (Sweden)

    Anthony Sutera Genadiarto

    2017-01-01

    Full Text Available Internet of thing has been able to attract people compete to create various devices. Devices developed have various benefits, but the point is to make life easier. So many vendors create products related to the internet of things, so the user gets confused to determine which is good and appropriate for the needs. To simplify the user in choosing IoT product, this research will discuss about technology that is widely used in IoT, the advantages of each technology, in terms of security, operating system, microcontroller, IoT platform, tools and communication technology. This research makes prototype with one of existing technology. The results of this research provide knowledge, skills and experience in the field of IoT as well as information related to IoT technology, which is widely in the market. Furthermore, the prototype also has the expected functionalities, but it does not close the opportunity for further improvements. The results of this research provide knowledge, skills and experience in the field of IoT as well as information related to IoT technology, which is widely in the market. Furthermore, the prototype also has the expected functionalities, but it does not close the opportunity for further improvements.

  6. Using modern information technologies in continuing education

    Directory of Open Access Journals (Sweden)

    Магомедхан Магомедович Ниматулаев

    2012-06-01

    Full Text Available Article opens problems of formation of system of continuous education and improvement of professional skill for effective realization of professional work of the teacher in the conditions of use of modern information technology. Possibilities and necessities of use of information-communication technologies, Web-technologies for an intensification and giving of additional dynamics to educational process are considered. In this connection new forms and methods of the organization of educational activity for development and perfection of this activity are defined.

  7. FACTORS INFLUENCING INFORMATION TECHNOLOGY ADPOTION: A CROSS-SECTIONAL ANALYSIS

    OpenAIRE

    Stroade, Jeri L.; Schurle, Bryan W.

    2003-01-01

    This project will explore information technology adoption issues. The unique characteristics of information technology will be discussed. Advantages and disadvantages to adoption will also be identified. Finally, a statistical model of Internet adoption will be developed to estimate the impacts of certain variables on the underlying process of information technology adoption.

  8. Outsourcing information communication technology services in ...

    African Journals Online (AJOL)

    Outsourcing is a management strategy that is gradually proving its worth in library ... such as cost cutting, knowledge and skills acquisition and economies of scale. ... Keywords: Information Communication Technology, Information Systems, ...

  9. Reproducibility of quantitative susceptibility mapping in the brain at two field strengths from two vendors.

    Science.gov (United States)

    Deh, Kofi; Nguyen, Thanh D; Eskreis-Winkler, Sarah; Prince, Martin R; Spincemaille, Pascal; Gauthier, Susan; Kovanlikaya, Ilhami; Zhang, Yan; Wang, Yi

    2015-12-01

    To assess the reproducibility of brain quantitative susceptibility mapping (QSM) in healthy subjects and in patients with multiple sclerosis (MS) on 1.5 and 3T scanners from two vendors. Ten healthy volunteers and 10 patients were scanned twice on a 3T scanner from one vendor. The healthy volunteers were also scanned on a 1.5T scanner from the same vendor and on a 3T scanner from a second vendor. Similar imaging parameters were used for all scans. QSM images were reconstructed using a recently developed nonlinear morphology-enabled dipole inversion (MEDI) algorithm with L1 regularization. Region-of-interest (ROI) measurements were obtained for 20 major brain structures. Reproducibility was evaluated with voxel-wise and ROI-based Bland-Altman plots and linear correlation analysis. ROI-based QSM measurements showed excellent correlation between all repeated scans (correlation coefficient R ≥ 0.97), with a mean difference of less than 1.24 ppb (healthy subjects) and 4.15 ppb (patients), and 95% limits of agreements of within -25.5 to 25.0 ppb (healthy subjects) and -35.8 to 27.6 ppb (patients). Voxel-based QSM measurements had a good correlation (0.64 ≤ R ≤ 0.88) and limits of agreements of -60 to 60 ppb or less. Brain QSM measurements have good interscanner and same-scanner reproducibility for healthy and MS subjects, respectively, on the systems evaluated in this study. © 2015 Wiley Periodicals, Inc.

  10. Laboratory automation: trajectory, technology, and tactics.

    Science.gov (United States)

    Markin, R S; Whalen, S A

    2000-05-01

    Laboratory automation is in its infancy, following a path parallel to the development of laboratory information systems in the late 1970s and early 1980s. Changes on the horizon in healthcare and clinical laboratory service that affect the delivery of laboratory results include the increasing age of the population in North America, the implementation of the Balanced Budget Act (1997), and the creation of disease management companies. Major technology drivers include outcomes optimization and phenotypically targeted drugs. Constant cost pressures in the clinical laboratory have forced diagnostic manufacturers into less than optimal profitability states. Laboratory automation can be a tool for the improvement of laboratory services and may decrease costs. The key to improvement of laboratory services is implementation of the correct automation technology. The design of this technology should be driven by required functionality. Automation design issues should be centered on the understanding of the laboratory and its relationship to healthcare delivery and the business and operational processes in the clinical laboratory. Automation design philosophy has evolved from a hardware-based approach to a software-based approach. Process control software to support repeat testing, reflex testing, and transportation management, and overall computer-integrated manufacturing approaches to laboratory automation implementation are rapidly expanding areas. It is clear that hardware and software are functionally interdependent and that the interface between the laboratory automation system and the laboratory information system is a key component. The cost-effectiveness of automation solutions suggested by vendors, however, has been difficult to evaluate because the number of automation installations are few and the precision with which operational data have been collected to determine payback is suboptimal. The trend in automation has moved from total laboratory automation to a

  11. The effect of virtual sales agent (VSA) gender – product gender congruence on product advice credibility, trust in VSA and online vendor, and purchase intention

    NARCIS (Netherlands)

    Beldad, Ardion Daroca; Hegner, Sabrina; Hegner, Sabrina; Hoppen, Jip

    2016-01-01

    Online vendors are increasingly using virtual sales assistants (VSA), either in the form of an animated picture or a photograph of a real person, to help customers with their product-related information needs. Currently, what is known is that the use of a VSA in an online web shop results in

  12. Photonic quantum information: science and technology.

    Science.gov (United States)

    Takeuchi, Shigeki

    2016-01-01

    Recent technological progress in the generation, manipulation and detection of individual single photons has opened a new scientific field of photonic quantum information. This progress includes the realization of single photon switches, photonic quantum circuits with specific functions, and the application of novel photonic states to novel optical metrology beyond the limits of standard optics. In this review article, the recent developments and current status of photonic quantum information technology are overviewed based on the author's past and recent works.

  13. Techno-Human Mesh: The Growing Power of Information Technologies.

    Science.gov (United States)

    West, Cynthia K.

    This book examines the intersection of information technologies, power, people, and bodies. It explores how information technologies are on a path of creating efficiency, productivity, profitability, surveillance, and control, and looks at the ways in which human-machine interface technologies, such as wearable computers, biometric technologies,…

  14. Aligning Learner Preferences for Information Seeking, Information Sharing and Mobile Technologies

    Science.gov (United States)

    Mills, Leila A.; Knezek, Gerald; Khaddage, Ferial

    2012-01-01

    This paper reports on the development of a new information communications technology (ICT) learning preference survey, its cross-validation with attitudes towards mobile learning, and new perspectives on information seeking, information sharing, and mobile access derived from the relationships uncovered. The Information and Communications…

  15. Industrial communication technology handbook

    CERN Document Server

    Zurawski, Richard

    2014-01-01

    Featuring contributions from major technology vendors, industry consortia, and government and private research establishments, the Industrial Communication Technology Handbook, Second Edition provides comprehensive and authoritative coverage of wire- and wireless-based specialized communication networks used in plant and factory automation, automotive applications, avionics, building automation, energy and power systems, train applications, and more.New to the Second Edition:46 brand-new chapters and 21 substantially revised chaptersInclusion of the latest, most significant developments in spe

  16. Information technology for patient empowerment in healthcare

    CERN Document Server

    Grando, Maria Adela; Bates, David

    2015-01-01

    The authors explore novel information-based mechanisms that are changing the way patients are involved in their own health care. The book covers models, frameworks and technologies to improve patient-to-provider communication, patient interaction with information technologies, patient education and involvement in health care decision processes, and patient access, understanding and control over their clinical data.

  17. CSPMS supported by information technology

    Science.gov (United States)

    Zhang, Hudan; Wu, Heng

    This paper will propose a whole new viewpoint about building a CSPMS(Coal-mine Safety Production Management System) by means of information technology. This system whose core part is a four-grade automatic triggered warning system achieves the goal that information transmission will be smooth, nondestructive and in time. At the same time, the system provides a comprehensive and collective technology platform for various Public Management Organizations and coal-mine production units to deal with safety management, advance warning, unexpected incidents, preplan implementation, and resource deployment at different levels. The database of this system will support national related industry's resource control, plan, statistics, tax and the construction of laws and regulations effectively.

  18. International Conference on Advances in Information and Communication Technology

    CERN Document Server

    Nguyen, Thanh-Thuy; Vu, Duc-Thai; Phung, Trung-Nghia; Huynh, Van-Nam

    2017-01-01

    This book features papers presented at the International Conference on Advances in Information and Communication Technology (ICTA 2016), which was held in Thai Nguyen city, Vietnam, from December 1 to 13, 2016. The conference was jointly organized by Thai Nguyen University of Information and Communication Technology (ICTU), the Institute of Information Technology – Vietnam Academy of Science and Technology (IoIT), Feng Chia University, Taiwan (FCU), the Japan Advanced Institute of Science and Technology (JAIST) and the National Chung Cheng University, Taiwan (CCU) with the aim of bringing together researchers, academics, practitioners and students to not only share research results and practical applications but also to foster collaboration in information and communication technology research and education. The book includes the 66 best peer-reviewed papers, selected from the 150 submissions received.

  19. Informational technologies in modern educational structure

    Science.gov (United States)

    Fedyanin, A. B.

    2017-01-01

    The article represents the structure of informational technologies complex that is applied in modern school education, describes the most important educational methods, shows the results of their implementation. It represents the forms and methods of educational process informative support usage, examined in respects of different aspects of their using that take into account also the psychological features of students. A range of anxious facts and dangerous trends connected with the usage and distribution of the informational technologies that are to be taken into account in the educational process of informatization is also indicated in the article. Materials of the article are based on the experience of many years in operation and development of the informational educational sphere on the basis of secondary school of the physics and mathematics specialization.

  20. Customer Discovery as the First Essential Step for Successful Health Information Technology System Development.

    Science.gov (United States)

    Thamjamrassri, Punyotai; Song, YuJin; Tak, JaeHyun; Kang, HoYong; Kong, Hyoun-Joong; Hong, Jeeyoung

    2018-01-01

    Customer discovery (CD) is a method to determine if there are actual customers for a product/service and what they would want before actually developing the product/service. This concept, however, is rather new to health information technology (IT) systems. Therefore, the aim of this paper was to demonstrate how to use the CD method in developing a comprehensive health IT service for patients with knee/leg pain. We participated in a 6-week I-Corps program to perform CD, in which we interviewed 55 people in person, by phone, or by video conference within 6 weeks: 4 weeks in the United States and 2 weeks in Korea. The interviewees included orthopedic doctors, physical therapists, physical trainers, physicians, researchers, pharmacists, vendors, and patients. By analyzing the interview data, the aim was to revise our business model accordingly. Using the CD approach enabled us to understand the customer segments and identify value propositions. We concluded that a facilitating tele-rehabilitation system is needed the most and that the most suitable customer segment is early stage arthritis patients. We identified a new design concept for the customer segment. Furthermore, CD is required to identify value propositions in detail. CD is crucial to determine a more desirable direction in developing health IT systems, and it can be a powerful tool to increase the potential for successful commercialization in the health IT field.

  1. Information Integration Technology Demonstration (IITD)

    National Research Council Canada - National Science Library

    Loe, Richard

    2001-01-01

    The objectives of the Information Integration Technology Demonstration (IITD) were to investigate, design a software architecture and demonstrate a capability to display intelligence data from multiple disciplines...

  2. Information resources for assessing health effects from chemical exposure: Challenges, priorities, and future issues

    Energy Technology Data Exchange (ETDEWEB)

    Seigel, S. [National Library of Medicine, Bethesda, MD (United States)

    1990-12-31

    Issues related to developing information resources for assessing the health effects from chemical exposure include the question of how to address the individual political issues relevant to identifying and determining the timeliness, scientific credibility, and completeness of such kinds of information resources. One of the important ways for agencies to share information is through connection tables. This type of software is presently being used to build information products for some DHHS agencies. One of the challenges will be to convince vendors of data of the importance of trying to make data files available to communities that need them. In the future, information processing will be conducted with neural networks, object-oriented database management systems, and fuzzy-set technologies, and meta analysis techniques.

  3. Traceability information carriers. The technology backgrounds and consumers' perceptions of the technological solutions

    DEFF Research Database (Denmark)

    Chrysochou, Polymeros; Chryssochoidis, George; Kehagia, Olga

    2009-01-01

    of and confidence in the information provided, perceived levels of convenience, impact on product quality and safety, impact on consumers' health and the environment, and potential consequences on ethical and privacy liberties constitute important factors influencing consumers' perceptions of technologies......The implementation of traceability in the food supply chain has reinforced adoption of technologies with the ability to track forward and trace back product-related information. Based on the premise that these technologies can be used as a means to provide product-related information to consumers...... in their production lines. For the purposes of the study, a focus group study was conducted across 12 European countries, while a set of four different technologies used as a means to provide traceability information to consumers was the focal point of the discussions in each focus group. Results show that the amount...

  4. Collaborating to optimize nursing students' agency information technology use.

    Science.gov (United States)

    Fetter, Marilyn S

    2009-01-01

    As the learning laboratory for gaining actual patient care experience, clinical agencies play an essential role in nursing education. With an information technology revolution transforming healthcare, nursing programs are eager for their students to learn the latest informatics systems and technologies. However, many healthcare institutions are struggling to meet their own information technology needs and report limited resources and other as barriers to nursing student training. In addition, nursing students' information technology access and use raise security and privacy concerns. With the goal of a fully electronic health record by 2014, it is imperative that agencies and educational programs collaborate. They need to establish educationally sound, cost-effective, and secure policies and procedures for managing students' use of information technology systems. Strategies for evaluating options, selecting training methods, and ensuring data security are shared, along with strategies that may reap clinical, economic, and educational benefits. Students' information technology use raises numerous issues that the nursing profession must address to participate in healthcare's transformation into the digital age.

  5. 77 FR 58871 - Agency Information Collection Activities: Proposed Collection; Comment Request

    Science.gov (United States)

    2012-09-24

    ... about our intention to request the OMB's approval of the vendor information collection method that is... purchase documents. In order to ensure that licensees are meeting the regulatory requirements in this area... vendors to register with the NRC. This collection will assist the NRC in assessing the number and variety...

  6. 39 CFR 255.4 - Accessibility to electronic and information technology.

    Science.gov (United States)

    2010-07-01

    ... AND INFORMATION TECHNOLOGY § 255.4 Accessibility to electronic and information technology. (a) In... burden, that the electronic and information technology the agency procures allows— (1) Individuals with... 39 Postal Service 1 2010-07-01 2010-07-01 false Accessibility to electronic and information...

  7. 16 CFR 1000.23 - Office of Information and Technology Services.

    Science.gov (United States)

    2010-01-01

    ... COMMISSION ORGANIZATION AND FUNCTIONS § 1000.23 Office of Information and Technology Services. The Office of Information and Technology Services houses the Commission's Secretariat, which facilitates the preparation of... agency's Chief Freedom of Information Act Officer. The Office of Information and Technology Services is...

  8. S5: Information Technology for Science Missions

    Science.gov (United States)

    Coughlan, Joe

    2017-01-01

    NASA Missions and Programs create a wealth of science data and information that are essential to understanding our earth, our solar system and the universe. Advancements in information technology will allow many people within and beyond the Agency to more effectively analyze and apply these data and information to create knowledge. The desired end result is to see that NASA data and science information are used to generate the maximum possible impact to the nation: to advance scientific knowledge and technological capabilities, to inspire and motivate the nation's students and teachers, and to engage and educate the public.

  9. Health information technology adoption in U.S. acute care hospitals.

    Science.gov (United States)

    Zhang, Ning Jackie; Seblega, Binyam; Wan, Thomas; Unruh, Lynn; Agiro, Abiy; Miao, Li

    2013-04-01

    Previous studies show that the healthcare industry lags behind many other economic sectors in the adoption of information technology. The purpose of this study is to understand differences in structural characteristics between providers that do and that do not adopt Health Information Technology (HIT) applications. Publicly available secondary data were used from three sources: American Hospital Association (AHA) annual survey, Healthcare Information and Management Systems Society (HIMSS) analytics annual survey, and Healthcare Cost and Utilization Project (HCUP) Nationwide Inpatient Sample (NIS) databases. Fifty-two information technologies were grouped into three clusters: clinical, administrative, and strategic decision making ITs. Negative binomial regression was applied with adoption of technology as the dependent variables and eight organizational and contextual factors as the independent variables. Hospitals adopt a relatively larger proportion of administrative information technology as compared to clinical and strategic IT. Large size, urban location and HMO penetration were found to be the most influential hospital characteristics that positively affect information technology adoption. There are still considerable variations in the adoption of information technology across hospitals and in the type of technology adopted. Organizational factors appear to be more influential than market factors when it comes to information technology adoption. The future research may examine whether the Electronic Health Record (EHR) Incentive Program in 2011 would increase the information technology uses in hospitals as it provides financial incentives for HER adoptions and uses among providers.

  10. From information technology to informatics: the information revolution in dental education.

    Science.gov (United States)

    Schleyer, Titus K; Thyvalikakath, Thankam P; Spallek, Heiko; Dziabiak, Michael P; Johnson, Lynn A

    2012-01-01

    The capabilities of information technology (IT) have advanced precipitously in the last fifty years. Many of these advances have enabled new and beneficial applications of IT in dental education. However, conceptually, IT use in dental schools is only in its infancy. Challenges and opportunities abound for improving how we support clinical care, education, and research with IT. In clinical care, we need to move electronic dental records beyond replicating paper, connect information on oral health to that on systemic health, facilitate collaborative care through teledentistry, and help clinicians apply evidence-based dentistry and preventive management strategies. With respect to education, we should adopt an evidence-based approach to IT use for teaching and learning, share effective educational content and methods, leverage technology-mediated changes in the balance of power between faculty and students, improve technology support for clinical teaching, and build an information infrastructure centered on learners and organizations. In research, opportunities include reusing clinical care data for research studies, helping advance computational methods for research, applying generalizable research tools in dentistry, and reusing research data and scientific workflows. In the process, we transition from a focus on IT-the mere technical aspects of applying computer technology-to one on informatics: the what, how, and why of managing information.

  11. Marine information technology - Indian Ocean scenario

    Digital Repository Service at National Institute of Oceanography (India)

    Nayak, M.R.; Gouveia, A.D.; Navelkar, G.S.; Singh, K.

    Marine and coastal information is necessary for sound decision making about sustainable utilisation of our oceanic and coastal resources. Due to inadequate data management tools, lack of information technology benefits in the minds of the ocean...

  12. Environmental Decision Making and Information Technology: Issues Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Barg, S.; Fletcher, T.; Mechling, J.; Tonn, B.; Turner, R.

    1999-05-01

    This report presents a summary of the Information Technology and Environmental Decision Making Workshop that was held at Harvard University, October 1-3, 1998. Over sixty participants from across the US took part in discussions that focused on the current practice of using information technology to support environmental decision making and on future considerations of information technology development, information policies, and data quality issues in this area. Current practice is focusing on geographic information systems and visualization tools, Internet applications, and data warehousing. In addition, numerous organizations are developing environmental enterprise systems to integrate environmental information resources. Plaguing these efforts are issues of data quality (and public trust), system design, and organizational change. In the future, much effort needs to focus on building community-based environmental decision-making systems and processes, which will be a challenge given that exactly what needs to be developed is largely unknown and that environmental decision making in this arena has been characterized by a high level of conflict. Experimentation and evaluation are needed to contribute to efficient and effective learning about how best to use information technology to improve environmental decision making.

  13. Information and consulting center in plasma technologies

    International Nuclear Information System (INIS)

    Vizireanu, S.; Aldea, E.; Mitu, B.; Dinescu, G.

    2001-01-01

    Plasma technologies are clean, non-expensive, and easy to adapt to small-scale production. They are largely used in various modern sectors of research, industry, medicine, biology and environmental protection. At the present time a pressure to transfer the knowledge from education and research sectors toward the industrial ones was established by the financing policies at national and European levels. Nevertheless, mainly in the last decade, an informational gap sets up in Romania between the suppliers of know-how in the plasma technologies and their beneficiaries. The newly appearing companies have little knowledge about the possibilities of our research and education. In turn, the research and education sectors do not know what companies are using nowadays plasma technologies, what kinds of technologies are needed and what aspects should be stressed in educational activity. The Information and Consulting Center in Plasma Technologies is an infrastructure project aiming at gathering information and expertise in plasma technologies with emphasizing on the Romanian capabilities. The information is accessible via Internet at the address http://www.alpha2.infim.ro. By accessing the center web page one enters into the main menu or it is possible to navigate by choosing key words, as for instance: objectives, plasma diagnostics, plasma technologies, which are listed in a dedicated search box. The information is organized in databases. In the database frame there are three main categories, which lead to detailed information about: - Users of plasma technologies, the technology type, the address; - Suppliers of plasma technologies, including the main research institutes with links to the relating Internet sites; - Education and training centers including the universities and their departments dedicated to plasma physics. The expertise is organized in three categories. They are instrumentation and equipment, plasma diagnostics and plasma technologies. In the

  14. Taming Disruptive Technologies, or How To Remain Relevant in the Digital Age.

    Science.gov (United States)

    Blackwell, Philip

    2001-01-01

    Discusses electronic books as a disruptive technology, that is, a technology that has appeal to its users but upsets the traditional models. Highlights include a history of print technology; types of electronic books; reader devices; stakeholders, including users, librarians, and publishers; and how vendors can remain relevant. (LRW)

  15. Determinants of information technology outsourcing among health maintenance organizations.

    Science.gov (United States)

    Wholey, D R; Padman, R; Hamer, R; Schwartz, S

    2001-09-01

    We analyze the determinants of HMO information technology outsourcing using two studies. Study 1 examines the effect of asset specificity on outsourcing for development and operation activities, using HMO specific fixed effects to control for differences between HMOs. Study 2 regresses the HMO specific fixed effects from Study 1, which measure an HMO's propensity to outsource, on HMO characteristics. The data comes from a 1995 InterStudy survey about information technology organization of HMOs. While HMOs split roughly equally in outsourcing information technology development activities, they are extremely unlikely to outsource the day-to-day operation of information systems. The greater an HMO's information technology capability and the complexity of information systems supported, the less likely is an HMO to outsource. While HMOs less than two years old, for-profit HMOs, local or Blue Cross-affiliated HMOs, and mixed HMOs are more likely to outsource, federally qualified HMOs are less likely to outsource. Policy and managerial implications for the adoption and diffusion of new ways of organizing information technology, such as application service providers (ASPs), are discussed.

  16. The issue: Innovation, information technology and climate change

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-01-06

    This position paper by the Information Technology Association of Canada (ITAC) outlines the information technology community's position vis-a-vis the Federal Government's 'Climate Change Plan for Canada'. In general, the ITAC is in favour of the Government's plan, however, it asserts that the Plan falls short by not acknowledging the significant contributions that present and emerging information and communications technologies can make to the achievements of Canadian climate change goals. In this regard the paper draws attention to, and explains the significance of the actual and potential contributions made to climate change efforts by teleconferencing, video-conferencing, telecommuting, electronic commerce, and smart buildings technologies. 4 refs.

  17. A preliminary study of current multimedia information technology

    Energy Technology Data Exchange (ETDEWEB)

    Lee, J.C.

    1997-03-01

    This paper surveys more than 70 articles published in the IEEE Multimedia journal and other journals. The survey summarizes aspects of multimedia information technology and categorizes application areas of multimedia information technology and interesting research areas related to it.

  18. Selecting practice management information systems.

    Science.gov (United States)

    Worley, R; Ciotti, V

    1997-01-01

    Despite enormous advances in information systems, the process by which most medical practices select them has remained virtually unchanged for decades: the request for proposal (RFP). Unfortunately, vendors have learned ways to minimize the value of RFP checklists to where purchasers now learn little about the system functionality. The authors describe a selection methodology that replaces the RFP with scored demos, reviews of vendor user manuals and mathematically structured reference checking. In a recent selection process at a major medical center, these techniques yielded greater user buy-in and favorable contract terms as well.

  19. Licensee contractor and vendor inspection status report: Quarterly report, January 1989--March 1989

    International Nuclear Information System (INIS)

    1989-04-01

    This periodical covers the results of inspection performed by the NRC's Vendor Inspection Branch that have been distributed to the inspected organization during the period from January 1989 through March 1989

  20. Licensee contractor and vendor inspection status report: Quarterly report, October 1988--December 1988

    International Nuclear Information System (INIS)

    1989-04-01

    This periodical covers the results of inspections performed by the NRC's Vendor Inspection Branch that have been distributed to the inspected organization during the period from October 1988 through December 1988

  1. Information Technology and the Cognitive Sciences

    DEFF Research Database (Denmark)

    Rasmussen, Jens

    -computer interaction' studies have been focused on analysis of interface communication. These approaches have, quite naturally, resulted in a rather technology driven, bottom-up research strategy. Application of advanced information technology in large scale installation, however, also calls for a more system oriented......Different approaches to the study of cognitive systems can be identified. The AI related'cognitive science' is based on the information processing metaphor of human cognition in an attempt to reach 'computational' models for behaviour in well-formed micro worlds. Within the field of 'human...

  2. 78 FR 17418 - Rural Health Information Technology Network Development Grant

    Science.gov (United States)

    2013-03-21

    ... Information Technology Network Development Grant AGENCY: Health Resources and Services Administration (HRSA...-competitive replacement award under the Rural Health Information Technology Network Development Grant (RHITND... relinquishing its fiduciary responsibilities for the Rural Health Information Technology Network Development...

  3. Philosophy of computing and information technology

    OpenAIRE

    Brey, Philip A.E.; Soraker, Johnny; Meijers, A.

    2009-01-01

    Philosophy has been described as having taken a “computational turn,” referring to the ways in which computers and information technology throw new light upon traditional philosophical issues, provide new tools and concepts for philosophical reasoning, and pose theoretical and practical questions that cannot readily be approached within traditional philosophical frameworks. As such, computer technology is arguably the technology that has had the most profound impact on philosophy. Philosopher...

  4. SAM: Secure Access of Media Independent Information Service with User Anonymity

    Directory of Open Access Journals (Sweden)

    Li Guangsong

    2010-01-01

    Full Text Available Seamless handover across different access technologies is very important in the future wireless networks. To optimize vertical handover in heterogeneous networks, IEEE 802.21 standard defines Media Independent Handover (MIH services. The MIH services can be a new target to attackers, which will be the main concern for equipment vendors and service providers. In this paper, we focus specifically on security of Media Independent Information Service (MIIS and present a new access authentication scheme with user anonymity for MIIS. The protocol can be used to establish a secure channel between the mobile node and the information server. Security and performance of the protocol are also analyzed in this paper.

  5. Information Technology Management: Hurricane Katrina Disaster Recovery Efforts Related to Army Information Technology Resources

    National Research Council Canada - National Science Library

    Jolliffe, Richard B; Burton, Bruce A; Wicecarver, Jacqueline L; Kince, Therese M; Ryan, Susan R; Price, Matthew J; Cleveland, Karma J; N. Pugh, Jacqueline; Milner, Jillisa H; Johnson, Meredith H

    2006-01-01

    ... of Louisiana, Mississippi, Alabama, and Florida with Category 3 winds and torrential rain. This audit report is the first in a planned series of audits on the effects of Hurricane Katrina on DoD information technology resources...

  6. Vendor-based laser damage metrology equipment supporting the National Ignition Facility

    International Nuclear Information System (INIS)

    Campbell, J. H; Jennings, R. T.; Kimmons, J. F.; Kozlowski, M. R.; Mouser, R. P.; Schwatz, S.; Stolz, C. J.; Weinzapfel, C. L.

    1998-01-01

    A sizable laser damage metrology effort is required as part of optics production and installation for the 192 beam National Ignition Facility (NIF) laser. The large quantities, high damage thresholds, and large apertures of polished and coated optics necessitates vendor-based metrology equipment to assure component quality during production. This equipment must be optimized to provide the required information as rapidly as possible with limited operator experience. The damage metrology tools include: (1) platinum inclusion damage test systems for laser amplifier slabs, (2) laser conditioning stations for mirrors and polarizers, and (3) mapping and damage testing stations for UV transmissive optics. Each system includes a commercial Nd:YAG laser, a translation stage for the optics, and diagnostics to evaluate damage. The scanning parameters, optical layout, and diagnostics vary with the test fluences required and the damage morphologies expected. This paper describes the technical objectives and milestones involved in fulfilling these metrology requirements

  7. Effect of information and communication technology on nursing performance.

    Science.gov (United States)

    Fujino, Yuriko; Kawamoto, Rieko

    2013-05-01

    The aim of this study was to investigate the influence of information and communication technology use and skills on nursing performance. Questionnaires were prepared relating to using the technology, practical skills in utilizing information, the Six-Dimension Scale of Nursing Performance, and demographics. In all, 556 nurses took part (response rate, 72.6%). A two-way analysis of variance was used to determine the influence of years of nursing experience on the relationship between nursing performance and information and communication technology use. The results showed that the group possessing high technological skills had greater nursing ability than the group with low skills; the level of nursing performance improved with years of experience in the former group, but not in the latter group. Regarding information and communication technology use, the results showed that nursing performance improved among participants who used computers for sending and receiving e-mails, but it decreased for those who used cell phones for e-mail. The results suggest that nursing performance may be negatively affected if information and communication technology are inappropriately used. Informatics education should therefore be provided for all nurses, and it should include information use relating to cell phones and computers.

  8. Xenophobic attacks on foreign shop owners and street vendors in Louis Trichardt Central Business District, Limpopo Province

    Directory of Open Access Journals (Sweden)

    Kholofelo Mothibi

    2015-12-01

    Full Text Available Xenophobic attacks in South Africa in 2008 and 2015 sent shockwaves through the country and the world. In these events, around 70 people were killed while thousands were displaced; and, property and products of street vendors and shop owners were destroyed. This phenomenological research project is confined to Louis Trichardt in Limpopo Province wherefrom a cohort of foreign street vendors and shop owners were interviewed. The lived experiences of being verbally and physically abused as well as of some acquaintances being killed, has clearly left them traumatised and living in fear. The article finds that contributory factors to xenophobic attacks experienced by foreign shop owners and street vendors range from competition over scarce resources, stereotypes and inter-group anxiety. Finally, it offers some recommendations about education for South Africans and measured police action.

  9. Atomic Information Technology Safety and Economy of Nuclear Power Plants

    CERN Document Server

    Woo, Taeho

    2012-01-01

    Atomic Information Technology revaluates current conceptions of the information technology aspects of the nuclear industry. Economic and safety research in the nuclear energy sector are explored, considering statistical methods which incorporate Monte-Carlo simulations for practical applications. Divided into three sections, Atomic Information Technology covers: • Atomic economics and management, • Atomic safety and reliability, and • Atomic safeguarding and security. Either as a standalone volume or as a companion to conventional nuclear safety and reliability books, Atomic Information Technology acts as a concise and thorough reference on statistical assessment technology in the nuclear industry. Students and industry professionals alike will find this a key tool in expanding and updating their understanding of this industry and the applications of information technology within it.

  10. Enterprise Model for Vendor Development: A Study at Selected Technology Park

    Directory of Open Access Journals (Sweden)

    Abdul Aziz Ab. Latif

    2012-01-01

    Full Text Available The study addresses the issues of skills enhancement that need be implemented in three distinct phases of enterprise development. Phase I is the developmental phase where potential entrepreneurs are provided with skills needed for venture take-off or start-up. Phase II is the enterprise creation phase while Phase III is the market development phase. This paper also discusses the multiple roles of the Techno Center during each of these distinct phases. Based on the analysis, the study found that there are gaps across industrial sub-sectors in term of various skills needed to create sustainable enterprise and entrepreneur development. Those gaps are cognitive, interpersonal, technical, creativity, computation, communication, intrapersonal, conceptual, managerial, analytical, technological, acoustic, design, self-management, innovative, basic managerial, supervisory, and marketing. The Techno Centre Enterprise Development Model highlights the central and multiple roles required of The Techno Centre in order to effectively provide support and services during various phases of enterprise development. The services include skill development, networking and linkages services; technology transfer and consultancy services; advisory services; and after-care services have different contents at different stages of the enterprise development.Key words: technology park, sustainable enterprise, technology transfer

  11. Teaching Information Systems Technologies: a New Approach based on Virtualization and Hosting Technologies

    Directory of Open Access Journals (Sweden)

    Carmelo R. García

    2012-11-01

    Full Text Available This paper describes how to provide suitable computing systems for information systems technologies learning using virtualization and hosting technologies. The main functionalities and components of an university learning lab based on these technologies are presented. All the software components used in its development are open source. Also, the use of this lab, providing the computing systems required for the learning activities of different matters related to the information systems technologies, is illustrated. The model of computing lab proposed is a more sustainable and scalable alternative than the traditional academic computing lab.

  12. Women Technology Leaders: Gender Issues in Higher Education Information Technology

    Science.gov (United States)

    Drury, Marilyn

    2011-01-01

    Women working in higher education information technology (IT) organizations and those seeking leadership positions in these organizations face a double challenge in overcoming the traditionally male-dominated environments of higher education and IT. Three women higher education chief information officers (CIOs) provided their perspectives,…

  13. International Conference on Information Technology and Agricultural Engineering (ICITAE 2011)

    CERN Document Server

    Sambath, Sabo; Information Technology and Agricultural Engineering

    2012-01-01

    This volume comprises the papers from 2011 International Conference on Information Technology and Agricultural Engineering (ICITAE 2011).  2011 International Conference on Information Technology and Agricultural Engineering (ICITAE 2011) has been held in Sanya, China, December 1-2, 2011. All the papers have been peer reviewed by the selected experts. These papers represent the latest development in the field of materials manufacturing technology, spanning from the fundamentals to new technologies and applications. Specially, these papers cover the topics of Information Technology and Agricultural Engineering. This book provides a greatly valuable reference for researchers in the field of Information Technology and Agricultural Engineering who wish to further understand the underlying mechanisms and create innovative and practical techniques, systems and processes. It should also be particularly useful for engineers in information technology and agriculture who are responsible for the efficient and effective ...

  14. Licensee contractor and vendor inspection status report. Quarterly report, October 1997--December 1997

    International Nuclear Information System (INIS)

    1998-04-01

    The periodical covers the results of inspections performed between October 1997 and December 1997 by the NRC's Quality Assurance, Vendor Inspection and Maintenance Branch that have been distributed to the inspected organizations

  15. Dupont Analysis of An Information Technology Enabled Competitive Advantage

    OpenAIRE

    Nustini, Yuni

    2009-01-01

    The transformation of business caused by e-business and e-commerce applications of the internet and related technologies demonstrates that information systems and information technologies are essential ingredients for business survival and success. The most often cited benefit of IT are integrating business process, increasing efficiency, sales, productivity, and competitiveness. This study is designed for determining where managers considering investment in information technology (IT) projec...

  16. Dupont Analysis of an Information Technology Enabled Competitive Advantage

    OpenAIRE

    Nustini, Yuni

    2003-01-01

    The transformation of business caused by e-business and e-commerce applications of the internet and related technologies demonstrates that information systems and information technologies are essential ingredients for business survival and success. The most often cited benefit of IT are integrating business process, increasing efficiency, sales, productivity, and competitiveness. This study is designed for determining where managers considering investment in information technology (IT) projec...

  17. Microfinance and Information and Communication Technologies ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Microfinance and Information and Communication Technologies : HIVOS STAR Program (Eastern and Southern Africa) ... Studies. Management information systems for microfinance background to the workshop ... In this ROSSA bulletin: Meet Kathryn Toure, the new regional director of IDRC's sub-Saharan Africa office.

  18. Faeco-oral parasitic infection in street food vendors in Tamale, Ghana

    African Journals Online (AJOL)

    Poor environmental sanitation, personal and food hygiene practices of food vendors are major causes of street food contamination and outbreak of foodborne illness. The unregulated and rapid growth of the street food industry in the Tamale Metropolis with its associated health risk calls for strict public health surveillance to ...

  19. Libraries, Self-Censorship, and Information Technologies.

    Science.gov (United States)

    Buschman, John

    1994-01-01

    Explores the theme of self-censorship in libraries in relation to new technologies. Highlights include the results of investing in high-cost electronic resources at the expense of traditional, lower-status formats; the effect of information technologies on literacy and historical records; and market censorship, including centralization and…

  20. Health information technology adoption in New Zealand optometric practices.

    Science.gov (United States)

    Heidarian, Ahmadali; Mason, David

    2013-11-01

    Health information technology (HIT) has the potential to fundamentally change the practice of optometry and the relationship between optometrists and patients and to improve clinical outcomes. This paper aims to provide data on how health information technology is currently being used in New Zealand optometric practices. Also this paper aims to explore the potential benefits and barriers to the future adoption of health information technology in New Zealand. One hundred and six New Zealand optometrists were surveyed about their current use of health information technology and about potential benefits and barriers. In addition, 12 semi-structured interviews were carried out with leaders of health information technology in New Zealand optometry. The areas of interest were the current and intended use of HIT, the potential benefits of and barriers to using HIT in optometric offices and the level of investment in health information technology. Nearly all optometrists (98.7 per cent) in New Zealand use computers in their practices and 93.4 per cent of them use a computer in their consulting room. The most commonly used clinical assessment technology in optometric practices in New Zealand was automated perimeter (97.1 per cent), followed by a digital fundus/retinal camera (82.6 per cent) and automated lensometer (62.9 per cent). The pachymeter is the technology that most respondents intended to purchase in the next one to five years (42.6 per cent), followed by a scanning laser ophthalmoscope (36.8 per cent) and corneal topographer (32.9 per cent). The main benefits of using health information technology in optometric practices were improving patient perceptions of ‘state of the art’ practice and providing patients with information and digital images to explain the results of assessment. Barriers to the adoption of HIT included the need for frequent technology upgrades, cost, lack of time for implementation, and training. New Zealand optometrists are using HIT