Essays about: "Business Objects"

Showing result 1 - 5 of 79 essays containing the words Business Objects.

  1. 1. Addressing the Climate Change in Europe: A Security Threat, or a Risk? : A Qualitative Content Analysis upon the European Commission's Addressing of the Climate Change

    University essay from Malmö universitet/Institutionen för globala politiska studier (GPS)

    Author : Özge Demirel; [2023]
    Keywords : Climate Change; Security Threat; Security Risk; European Commission; European Politics; European Union; Securitization; Discourse; Climate Policy;

    Abstract : Climate change not only corresponds to scientifically proven future implications, but also poses a politically relevant study of climate security analysis, affecting the study and practice of (international) politics in different ways. In the same vein, the EU as an international organization have been getting more involved in discussions of climate-related security risks, in which the European Commission (which represents the Union’s common interests) have been publishing a set of consecutive policy documents addressing the climate change since the early 2000’s. READ MORE

  2. 2. Exploring the Link Between Identity and Analogue Cameras

    University essay from Lunds universitet/Företagsekonomiska institutionen

    Author : Roos Jannetje Jacoba van der Borg; Greta Ezerskyte; [2023]
    Keywords : identity; nostalgia; authenticity; consumption; film cameras; Business and Economics;

    Abstract : This research aims to explore how identity is shaped through the consumption of film cameras. Identity can be formed in numerous ways, through norms and values, social relationships, and much more. In the digital era, there is a lot of pressure on creating and maintaining identity quickly, as social media speeds up identity building practices. READ MORE

  3. 3. Product Structures with Attribute Management for future PLM systems : A study for Ericsson BOM Management

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : PAWAN RAJ SINGH; [2023]
    Keywords : PLM; BOM; PRIM; 3DX; Attribute; Widget; Product Structure; WoW; OOTB; PLM; BOM; PRIM; 3DX; Attribute; Widget; Product Structure; WoW; OOTB;

    Abstract : Information Management in the database system for the Product Development process demands continuous evolution and digital transformation investigations with the PLM systems to explore the latest functionalities. Ericsson today has a main frame PDM system PRIM with various connected sub-systems to store the Product related data which serves limited functionality and does not fully track the complete lifecycle in the IT system landscape. READ MORE

  4. 4. Photovoltaics from a business perspective past, present, and future in Germany

    University essay from Lunds universitet/Produktionsekonomi

    Author : Love Ossler; [2023]
    Keywords : Business Model Canvas; Alexander Osterwalder; Business Model; Photovoltaics; Germany; Erneuerbare-Energien-Gesetz; Solar; Case Study; Enpal B.V; 1komma5 Grad GmbH; Energiekonzepte Deutschland GmbH; Enerparc AG; Belectric GmbH; renewable energy; EEG; Greenovative GmbH; 1komma5° GmbH; Wegatech Greenergy GmbH; DZ-4 GmbH; Sunlife-Montage GmbH; Vario green energy Concept GmbH; Vispiron EPC GmbH Co. KG; Pfalzsolar GmbH; Technology and Engineering;

    Abstract : Solar energy plays a vital role in the transition to a greener global energy supply. As a decentralized energy source, the expansion of solar energy is not driven by energy suppliers and government as in traditional energy sources but is proliferating through the market through a variety of business propositions. READ MORE

  5. 5. IMPERATIVE MODELS TO DECLARATIVE CONSTRAINTS : Generating Control-Flow Constraints from Business Process Models

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Arvid Bergman Thörn; [2023]
    Keywords : Business Process Management; Imperative modelling; Declarative constraints; Conformance checking; Process querying; Process Mining;

    Abstract : In complex information systems, it is often crucial to evaluate whether a sequence of activities obtained from a system log complies with behavioural rules. This process of evaluation is called conformance checking, and the most classical approach to specifying the behavioural rules is in the form of flow chartlike process diagrams, e.g. READ MORE