Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Corporate information systems

Corporate Information Systems Terms such as management information systems (MIS) and information technology (IT) are frequently used to designate the upper levels of computer systems within a corporation. From a control perspective, the functions performed at this level are normally long-term and/or strategic. For example, in a processing plant, long-term contracts are required with the providers of the feedstocks. A forecast must be developed for the demand for possible products from the plant. This demand must be translated into... [Pg.595]

For many specialized Cl tasks, data from various laboratory systems or other information sources are needed. Here, the CIDB serves as an interface to the research application landscape. This way, the Cl infrastructure is decoupled from the corporate Information systems (iSs) landscape and an efficient access to all relevant data is ensnred. In some cases, the CIDB actually rephcates data from partner systems to protect these from the high query loads generated during some Cl activities. During the analysis of large datasets, the CIDB can be used to store temporary data. [Pg.294]

Special Protocols. Special protocols occur on each VAN and online vendor system, and on the corporate information systems as well. The special protocols require different log-in procedures, prompts, and timings. Handling all the different error conditions that might occur increases the software developer s difficulty by an order of magnitude, at least. Conditions such as invalid user ID , invalid address , and system busy apply to all the networks and handling them may require many lines of code. [Pg.66]

Based on their corporate experience in supporting their own research and development projects as well as a number of government-sponsored activities, the development of scientific software at BBN grew out of a long history of support of a variety of scientific applications. For example, in the 1960 s, BBN developed a hospital information system for Massachusetts General Hospital which used an early minicomputer, the PDP-1, to support clinical research activities. Under the sponsorship of the National Institutes of Health, they developed a system called PROPHET (1) which provides a... [Pg.23]

Corporations have responded to the Toxic Substances Control Act (TSCA) by traditional means such as added personnel and facilities as well as by new and innovative initiatives such as new management functions, new expertise in toxicology, and new computerized information systems. The size of a corporation as measured by annual sales is the most important determiner of how an organization responds to TSCA s new demands large corporations generally add new personnel and facilities while smaller corporations tend to add TSCA requirements to existing jobs. None of these responses can be ascribed to TSCA alone since corporations are responding to a myriad of environmental/health laws with similar demands. [Pg.121]

H. Matuoka, H. Shimizu, S. the 14th Kyushu Branch meeting of the Pharmaceutical Society of Japan, 1997. Paper 2B-21 Japan Science and Technology Corporation Online Information System (http //www.jst.go.jp/EN/). CN99A0129771. [Pg.250]

Mobility is a frequent occurrence in our corporate environment. Laptops and the use of DHCP facilitate remote connections, as well as the generalization of VPN connectivity. However, this poses a problem when such a host is the subject of a security problem, particularly a viral or worm infection. We need to distinguish the case of laptops connected internally into a site that is not their home site, and laptops using VPN connections to access the information system. [Pg.361]

Another annoying feature of most audit assessment tools is that they provide information about the vulnerabilities found, and not the ones that do not exist in the information system. It is therefore difficult to practice anticorrelation and degrade the severity of events that are not security risks for the information system. To obtain this effect, we currently manually maintain a set of simple rules indicating which vulnerability sets cannot be found in our corporate network. For example, we exclude all IIS vulnerabilities from events coming from hosting zones, as we do not offer this platform in our services. Note that we do not consider here the case where the vulnerability assessment tool fails to discover the vulnerability. Audit information is considered trusted. [Pg.363]


See other pages where Corporate information systems is mentioned: [Pg.716]    [Pg.771]    [Pg.69]    [Pg.540]    [Pg.877]    [Pg.882]    [Pg.720]    [Pg.367]    [Pg.405]    [Pg.288]    [Pg.716]    [Pg.771]    [Pg.69]    [Pg.540]    [Pg.877]    [Pg.882]    [Pg.720]    [Pg.367]    [Pg.405]    [Pg.288]    [Pg.459]    [Pg.302]    [Pg.7]    [Pg.22]    [Pg.238]    [Pg.767]    [Pg.5]    [Pg.608]    [Pg.627]    [Pg.139]    [Pg.280]    [Pg.69]    [Pg.367]    [Pg.66]    [Pg.749]    [Pg.17]    [Pg.749]    [Pg.302]    [Pg.64]    [Pg.157]    [Pg.55]    [Pg.362]    [Pg.349]    [Pg.69]    [Pg.147]    [Pg.242]    [Pg.17]    [Pg.280]    [Pg.492]   


SEARCH



Corporate Information

Information system

© 2024 chempedia.info