University of Oregon

Displaying 1-13 of 13 results

  • White Papers // May 2011

    Poster: Secure Provenance for Cloud Storage

    Organizations are increasingly turning to the cloud for data processing and storage. Storing data in the cloud is advantageous for numerous reasons: the elasticity of cloud environments ensures that only storage used is paid for, while tasks such as backup, replication, and geographic diversification of data are effectively outsourced to...

    Provided By University of Oregon

  • White Papers // May 2011

    Strategic Sourcing, Markups And Labor Demand Elasticities

    The authors examine how multinational firms strategically source production to mitigate the consequences of wage bargaining with workers. When production in one country requires negotiating with workers over wages, firms allocate production of goods with high markups toward countries with relatively competitive labor markets. This strategy allows multinationals to raise...

    Provided By University of Oregon

  • White Papers // Jan 2011

    The Scalability of Swarming Peer-to-Peer Content Delivery

    Most web sites are unable to serve content to a large number of users due to the inherent limitations of client-server le transfer. Recent peer-to-peer content delivery protocols have demonstrated the feasibility of spreading this load among the clients themselves, giving small web sites the possibility of serving large audiences...

    Provided By University of Oregon

  • White Papers // Sep 2010

    Realizing a Source Authentic Internet

    An innate deficiency of the Internet is its susceptibility to IP spoofing. Whereas a router uses a forwarding table to determine where it should send a packet, previous research has found that a router can similarly employ an incoming table to verify where a packet should come from, thereby detecting...

    Provided By University of Oregon

  • White Papers // Feb 2010

    Cloud Computing: Key IT-Related Risks and Mitigation Strategies for Consideration by IT Security Practitioners

    Although the benefits of cloud computing are well known, safety concerns have received less attention (Rash, 2009). This review of selected literature, published between 2007 and 2009, identifies key IT-related cloud computing risks that should be considered by security practitioners. Three types of cloud computing risks are examined: policy and...

    Provided By University of Oregon

  • White Papers // Oct 2009

    Using Ontology Databases for Scalable Query Answering, Inconsistency Detection, and Data Integration

    An ontology database is a basic relational database management system that models an ontology plus its instances. To reason over the transitive closure of instances in the subsumption hierarchy, for example, an ontology database can either unfold views at query time or propagate assertions using triggers at load time. In...

    Provided By University of Oregon

  • White Papers // Jul 2009

    Implementation of Effective Change Management for Successful Integration of Health Information Technology (HIT) Systems in Hospitals

    The purpose of this literature review is to examine change management strategies that Chief Information Officers (CIO) and Chief Medical Informatics Officers (CMIO) need to understand to best implement Health Information Technology (HIT) systems to effectively produce health services in hospitals. Two systems are examined: Electronic Medical Record (EMR) and...

    Provided By University of Oregon

  • White Papers // Mar 2009

    A Holistic Approach for Performance Measurement and Analysis for Petascale Applications

    Contemporary high-end Terascale and Petascale systems are composed of hundreds of thousands of commodity multi-core processors interconnected with high-speed custom networks. Performance characteristics of applications executing on these systems are a function of system hardware and software as well as workload parameters. Therefore, it has become increasingly challenging to measure,...

    Provided By University of Oregon

  • White Papers // Feb 2009

    Key Stages of Disaster Recovery Planning for Time-Critical Business Information Technology Systems

    When disasters interrupt services provided by vital Information Technology (IT) systems, many businesses never recover (Decker, 2005). This review of literature published between 2001 and 2008 identifies key stages for consideration when performing IT Disaster Recovery (DR) planning to ensure business viability if disasters occur. Planning stages, presented as a...

    Provided By University of Oregon

  • White Papers // Feb 2009

    Reducing IT Costs and Increasing IT Efficiency by Integrating Platform-Virtualization in the Enterprise

    Selected literature, published between 1999 and 2009, is examined in relation to reducing IT cost and increasing IT efficiency through implementation of platform-virtualization within the enterprise. Virtualization can reduce IT cost through server consolidation, test and development agility, licensing consolidation, standardization, and/or power and physical space consolidation. It can also...

    Provided By University of Oregon

  • White Papers // Dec 2008

    Monetary And Fiscal Policy Under Learning In The Presence Of A Liquidity Trap

    This paper reports on the findings of Evans, Guse, and Honkapohja (2007) concerning the global economic dynamics under learning in a New Keynesian model in which the interest rate rule is subject to the zero lower bound. Under normal monetary and fiscal policy, the intended steady state is locally but...

    Provided By University of Oregon

  • White Papers // Aug 2008

    A Note On Bilateral Trade Agreements In The Presence Of Irreversible Investment And Deferred Negotiations

    A common result in the trade literature is that a small country will realize gains from a bilateral free trade agreement with a large country. McLaren (1997) casts aspersions on this traditional belief by demonstrating that irreversible investment in the small country, with the possibility of re-negotiation by the large...

    Provided By University of Oregon

  • White Papers // Jun 2004

    Will the NFL's Bubble Burst ?

    This paper discusses the financial health of National Football League. The league has certainly earned its current position on the top of the American sports heap. TV revenue has been the engine driving the league's ascension to the most popular and most-watched sport in America. Another equally important result of...

    Provided By University of Oregon

  • White Papers // Mar 2009

    A Holistic Approach for Performance Measurement and Analysis for Petascale Applications

    Contemporary high-end Terascale and Petascale systems are composed of hundreds of thousands of commodity multi-core processors interconnected with high-speed custom networks. Performance characteristics of applications executing on these systems are a function of system hardware and software as well as workload parameters. Therefore, it has become increasingly challenging to measure,...

    Provided By University of Oregon

  • White Papers // Feb 2009

    Key Stages of Disaster Recovery Planning for Time-Critical Business Information Technology Systems

    When disasters interrupt services provided by vital Information Technology (IT) systems, many businesses never recover (Decker, 2005). This review of literature published between 2001 and 2008 identifies key stages for consideration when performing IT Disaster Recovery (DR) planning to ensure business viability if disasters occur. Planning stages, presented as a...

    Provided By University of Oregon

  • White Papers // Jul 2009

    Implementation of Effective Change Management for Successful Integration of Health Information Technology (HIT) Systems in Hospitals

    The purpose of this literature review is to examine change management strategies that Chief Information Officers (CIO) and Chief Medical Informatics Officers (CMIO) need to understand to best implement Health Information Technology (HIT) systems to effectively produce health services in hospitals. Two systems are examined: Electronic Medical Record (EMR) and...

    Provided By University of Oregon

  • White Papers // May 2011

    Strategic Sourcing, Markups And Labor Demand Elasticities

    The authors examine how multinational firms strategically source production to mitigate the consequences of wage bargaining with workers. When production in one country requires negotiating with workers over wages, firms allocate production of goods with high markups toward countries with relatively competitive labor markets. This strategy allows multinationals to raise...

    Provided By University of Oregon

  • White Papers // Aug 2008

    A Note On Bilateral Trade Agreements In The Presence Of Irreversible Investment And Deferred Negotiations

    A common result in the trade literature is that a small country will realize gains from a bilateral free trade agreement with a large country. McLaren (1997) casts aspersions on this traditional belief by demonstrating that irreversible investment in the small country, with the possibility of re-negotiation by the large...

    Provided By University of Oregon

  • White Papers // Dec 2008

    Monetary And Fiscal Policy Under Learning In The Presence Of A Liquidity Trap

    This paper reports on the findings of Evans, Guse, and Honkapohja (2007) concerning the global economic dynamics under learning in a New Keynesian model in which the interest rate rule is subject to the zero lower bound. Under normal monetary and fiscal policy, the intended steady state is locally but...

    Provided By University of Oregon

  • White Papers // May 2011

    Poster: Secure Provenance for Cloud Storage

    Organizations are increasingly turning to the cloud for data processing and storage. Storing data in the cloud is advantageous for numerous reasons: the elasticity of cloud environments ensures that only storage used is paid for, while tasks such as backup, replication, and geographic diversification of data are effectively outsourced to...

    Provided By University of Oregon

  • White Papers // Jun 2004

    Will the NFL's Bubble Burst ?

    This paper discusses the financial health of National Football League. The league has certainly earned its current position on the top of the American sports heap. TV revenue has been the engine driving the league's ascension to the most popular and most-watched sport in America. Another equally important result of...

    Provided By University of Oregon

  • White Papers // Feb 2010

    Cloud Computing: Key IT-Related Risks and Mitigation Strategies for Consideration by IT Security Practitioners

    Although the benefits of cloud computing are well known, safety concerns have received less attention (Rash, 2009). This review of selected literature, published between 2007 and 2009, identifies key IT-related cloud computing risks that should be considered by security practitioners. Three types of cloud computing risks are examined: policy and...

    Provided By University of Oregon

  • White Papers // Feb 2009

    Reducing IT Costs and Increasing IT Efficiency by Integrating Platform-Virtualization in the Enterprise

    Selected literature, published between 1999 and 2009, is examined in relation to reducing IT cost and increasing IT efficiency through implementation of platform-virtualization within the enterprise. Virtualization can reduce IT cost through server consolidation, test and development agility, licensing consolidation, standardization, and/or power and physical space consolidation. It can also...

    Provided By University of Oregon

  • White Papers // Jan 2011

    The Scalability of Swarming Peer-to-Peer Content Delivery

    Most web sites are unable to serve content to a large number of users due to the inherent limitations of client-server le transfer. Recent peer-to-peer content delivery protocols have demonstrated the feasibility of spreading this load among the clients themselves, giving small web sites the possibility of serving large audiences...

    Provided By University of Oregon

  • White Papers // Sep 2010

    Realizing a Source Authentic Internet

    An innate deficiency of the Internet is its susceptibility to IP spoofing. Whereas a router uses a forwarding table to determine where it should send a packet, previous research has found that a router can similarly employ an incoming table to verify where a packet should come from, thereby detecting...

    Provided By University of Oregon

  • White Papers // Oct 2009

    Using Ontology Databases for Scalable Query Answering, Inconsistency Detection, and Data Integration

    An ontology database is a basic relational database management system that models an ontology plus its instances. To reason over the transitive closure of instances in the subsumption hierarchy, for example, an ontology database can either unfold views at query time or propagate assertions using triggers at load time. In...

    Provided By University of Oregon