Enterprise Interoperability

Author(s):  
Ejub Kajan

Many interoperable frameworks have been suggested, developed and implemented in the past. Most of them are based on XML, Web services and Semantic Web technologies. In the meantime, globalization, and the further development of Internet and Web have raised new challenges and opportunities. New form of networked organizations, known as virtual enterprises, seeks for knowledge sharing around common goals. The raise of social and ubiquitous world, where everything is going to be connected gives a lot of technical opportunities for electronic business, but at same time makes new barriers due to increasing heterogeneity issues. This article gives an overview of main challenges, obstacles, approaches, recent research efforts, and forecasts in order to overcome recent interoperability problems.

Author(s):  
Ejub Kajan

Many interoperable frameworks have been suggested, developed, and implemented in the past. Most of them are based on XML, web services, and semantic web technologies. In the meantime, globalization and the further development of internet and web have raised new challenges and opportunities. New form of networked organizations, known as virtual enterprises, seeks for knowledge sharing around common goals. The rise of the social and ubiquitous world, where everything is going to be connected, gives a lot of technical opportunities for electronic business, but at the same time makes new barriers due to increasing heterogeneity issues. This chapter gives an overview of main challenges, obstacles, approaches, recent research efforts, and forecasts in order to overcome recent interoperability problems.


Author(s):  
Zhang Zhehua

In the era of education information and globalization, a new mode of teaching and micro class has emerged in the background of the Internet, which brings new challenges and opportunities to the teaching of the classroom. MOOCs has been piloted and applied in many universities in the form of SPOC. As a new form of curriculum, micro course has been applied to the teaching and learning process. The integration of Moor and micro class resources helps to turn the classroom into a mixed mode. This article will focus on this hot topic to analyse the characteristics of the class, the characteristics of the micro class and the influence on the students and teachers, to improve the quality of teaching and to realize the individualized and active study of the students. The article summarizes the results of blended teaching mode at home and abroad, and explores the development and application of MOOC and micro class resources.


2018 ◽  
Vol 21 (2) ◽  
pp. 66
Author(s):  
Riste Stojanov ◽  
Vladimir Zdraveski ◽  
Dimitar Trajanov

The increased number of IoT devices results in continuously generated massive amounts of raw data. Parts of this data are private and highly sensitive as they reflect owner’s behavior, obligations, habits, and preferences. In this paper, we point out that flexible and comprehensive access control policies are “a must” in the IoT domain. The Semantic Web technologies can address many of the challenges that the IoT access control is facing with today. Therefore, we analyze the current state of the art in this area and identify the challenges and opportunities for improved access control in a semantically enriched IoT environment. Applying semantics to IoT access control opens a lot of opportunities, such as semantic inference and reasoning, easy data sharing, data trading, new approaches to authentication, security policies based on a natural language and enhances the interoperability using a common ontology.


Author(s):  
Stavros T. Ponis ◽  
George Vagenas ◽  
Ilias P. Tatsiopoulos

The new globalized and demanding business environment of the 21st century has created a shift from traditional organizations to more loose and flexible business schemes shaped in the form of Virtual Enterprises. This transformation would never have been successful without the support of Information Technologies and particularly the Web. Internet, in the last decade, has become the universal medium of interactions between distributed entities. In this chapter, the issue of Knowledge Management support for Virtual Enterprises is discussed. Building upon the current state of the art, this chapter aims to identify the major knowledge requirements of VEs, in an effort to provide a roadmap towards a holistic Knowledge Management framework that will satisfy the excessive knowledge needs of Virtual Enterprises at the interorganizational level. In that context, the role of supporting Web and Semantic Web technologies for the enactment of KM in VEs is described in detail.


2013 ◽  
Vol 14 (3) ◽  
pp. 206-213 ◽  
Author(s):  
Gábor Bohács ◽  
Ivett Frikker ◽  
Gabor Kovács

Nowadays, modern companies operate in a common logistics network. In a modern approach, these networks of companies are called virtual enterprises, whose main purpose is the maximal fulfillment of customer needs and process optimization. The electronic freight and warehouse exchange is a good basis for building virtual enterprises, and that may be a new way to support the reorganization of the supply chains, and to rethink the connections within the intermodal network. Firstly, the paper presents the need of intermodality. On the other hand, it details the benefits and the critical evaluation of intermodality. It presents the general transshipment processes and techniques then evaluates the containers based on their main features. On this basis, the paper describes the electronic freight and warehouse exchange as a member of cloud supply chain. Moreover, the paper contains the new challenges and opportunities of electronic freight and warehouse exchanges as complex logistics providers.


Author(s):  
INNA VERSHININA ◽  
TATYANA MARTYNENKO

The article discusses the features of freelance as a new form of employment. Particular attention is paid to the reasons for the spread of freelance, its forms, social consequences and the accompanying formation of coworking spaces. Coworking spaces contribute to the formation of new social ties in the context of the spread of individualized forms of labor and represent not only a way to minimize rental costs, but also are a new communication space in the digital age.


Informatica ◽  
2015 ◽  
Vol 26 (2) ◽  
pp. 221-240 ◽  
Author(s):  
Valentina Dagienė ◽  
Daina Gudonienė ◽  
Renata Burbaitė

Author(s):  
Nadiia Ponomareva

As a result of the analysis of domestic and foreign standards of key competencies, basic and complete secondary education, teachers’ training (in particular, mathematics teachers’ training) and information technology specialists training, the system of informatics competencies of a mathematics teacher, developed by Yu. S. Ramskyi, was updated in terms of the structure, content and indicators of competencies formation. It has been found out that the formation of the informatics competencies of a mathematics teacher begins with basic informatics competencies, the further development of which occurs primarily in the competencies in system administration, web technologies, programming and systems analysis.


2021 ◽  
Vol 11 (9) ◽  
pp. 4105
Author(s):  
Luis Daniel Samper-Escalante ◽  
Octavio Loyola-González ◽  
Raúl Monroy ◽  
Miguel Angel Medina-Pérez

The reach and influence of social networks over modern society and its functioning have created new challenges and opportunities to prevent the misuse or tampering of such powerful tools of social interaction. Twitter, a social networking service that specializes in online news and information exchange involving billions of users world-wide, has been infested by bots for several years. In this paper, we analyze both public and private databases from the literature of bot detection on Twitter. We summarize their advantages, disadvantages, and differences, recommending which is more suitable to work with depending on the necessities of the researcher. From this analysis, we present five distinct behaviors in automated accounts exhibited across all the bot datasets analyzed from these databases. We measure their level of presence in each dataset using a radar chart for visual comparison. Finally, we identify four challenges that researchers of bot detection on Twitter have to face when using these databases from the literature.


Sign in / Sign up

Export Citation Format

Share Document