Home

Results 21 - 30 of 451,214 for involving. Search took 4.825 seconds.  
Sort by date/Sort by relevance
Workers Workers directly involved and workers indirectly involved. In addition to regular paid employees, including part-time workers, the statistics cover temporary, casual and seasonal workers. (...) Types of data collected number of strikes number of economic units involved number of workers involved time not worked Information on the duration, the matter in dispute, the types of action, methods of settlement, trade unions involved, etc. is collected by another directorate, and does not form part of the monthly compilation of data. (...) No information is collected on economic units involved in generalized strikes. Workers involved The number of workers involved is the maximum number of workers that took part during the course of the stoppage, even if some workers participated for only part of the duration.
Language:English
Score: 377131.57 - http://www.ilo.org/ilostat-files/SSM/SSM7/E/FR.html
Data Source: un
Minimum threshold: 10 workers involved. Economic activities: All economic activities and sectors. (...) The number of establishments involved is counted for all types of strike covered. Workers involved: The number of workers involved relates to workers directly involved and workers indirectly involved.
Language:English
Score: 377131.57 - http://www.ilo.org/ilostat-files/SSM/SSM7/E/hu.html
Data Source: un
Workers Workers directly involved, workers indirectly involved and workers rendered idle in economic units other than those directly involved in the strikes or lockouts. (...) Types of data collected number of strikes and lockouts number of economic units involved number of workers involved duration time not worked matter in dispute outcome of dispute characteristics of workers involved Concepts and definitions Strike All spontaneous work stoppages. (...) It is characterized by a single activity being carried out at a given location (factory, workshop, worksite, etc.). Workers involved The number of workers involved is the maximum number of workers that took part during the course of the stoppage, even if some workers participated for only part of the duration.
Language:English
Score: 377099.83 - http://www.ilo.org/ilostat-files/SSM/SSM7/E/MG.html
Data Source: un
Page 496 - 2015 Security in Telecommunications and Information Technology           Basic HTML Version Table of Contents View Full Version Page 496 - 2015 Security in Telecommunications and Information Technology P. 496 5 Unleashing the potential of the Internet of Things 8.5.5 Capabilities fulfilling the IoT manageability requirements The capabilities fulfilling the IoT manageability requirements specified in [ITU-T Y.2066] include managing devices, managing networks, managing services, managing data operations, managing security operations, managing privacy protection, managing user operations, and plug and play capabilities. • The capability of managing devices involves the abilities of configuring, monitoring, diagnosing and recovering devices of the IoT, and updating device software to enhance capabilities of devices of the IoT [C-5-15]. • The capability of managing networks involves the abilities of configuring, monitoring, accounting and charging, optimizing, diagnosing and recovering networks of the IoT [ITU-T Y.2060], and updating network software to enhance capabilities of networks of the IoT [C-5-16]. • The capability of managing services involves the abilities of describing, configuring, monitoring, accounting and charging, optimizing, recovering, and updating services of the IoT [C-5-17]. • The capability of managing data operations involves the abilities of configuring, monitoring, accounting and charging, optimizing and recovering data operations, and updating software related with data operations to enhance capabilities of the IoT [C-5-18]. • The capability of managing security operations involves the abilities of configuring, monitoring, auditing, diagnosing and recovering security operations, and updating software related with security operations to enhance capabilities of the IoT [C-5-19]. • The capability of managing privacy protection involves the abilities of configuring, monitoring, auditing and recovering privacy protection, and updating software related with privacy protection to enhance capabilities of the IoT [C-5-20]. • The capability of managing user operations involves the abilities of configuring, monitoring, accounting and charging, optimizing, diagnosing and recovering operations of IoT users, and updating software related with operations of IoT users to enhance capabilities of IoT [C-5-21]. • Plug and play capability involves the abilities of automatic configuring, connecting and activating devices of the IoT to enable on-the-fly semantic-based configuration and activation of IoT devices [C-5-22]. 8.6 Connectivity capabilities The connectivity group includes identification-based connectivity, things' status notification device mobility capability, and adaptable connectivity capabilities. • The capability of identification-based connectivity involves the abilities of establishing the connectivity based on the identification of things [C-6-1]. • The capability of things' status notification involves the abilities of automatic notification of the status of things and its changes based on predefined rules [C-6-2]. • The capability of device mobility involves the abilities of keeping the connectivity with the IoT when a device moves [C-6-3]. • The capability of adaptable connectivity involves the abilities of extending connectivity configurations to enable connectivity of new types of devices to the IoT in order to be adaptable to different device technologies [C-6-4]. 482 Rec.
Language:English
Score: 376852.88 - https://www.itu.int/wftp3/Publ.../files/basic-html/page496.html
Data Source: un
This activity involves: – creating storage management metadata of DSF data; – updating storage management metadata on changes; – deleting storage management metadata. 7.1.4 Manage data storage policy This activity involves management of data storage policy. (...) This activity involves: – performing data operation (see clause 6.1). (...) This activity involves: – creating data operation metadata of DSF data; – updating data operation metadata on changes; – deleting data operation metadata. 7.2.3 Manage data manipulation policy This activity involves management of data manipulation policy.
Language:English
Score: 376773.44 - https://www.itu.int/en/publica.../files/basic-html/page270.html
Data Source: un
This activity involves: – creating storage management metadata of DSF data; – updating storage management metadata on changes; – deleting storage management metadata. 7.1.4 Manage data storage policy This activity involves management of data storage policy. (...) This activity involves: – performing data operation (see clause 6.1). (...) This activity involves: – creating data operation metadata of DSF data; – updating data operation metadata on changes; – deleting data operation metadata. 7.2.3 Manage data manipulation policy This activity involves management of data manipulation policy.
Language:English
Score: 376773.44 - https://www.itu.int/en/publica.../files/basic-html/page129.html
Data Source: un
Page 495 - 2015 Security in Telecommunications and Information Technology           Basic HTML Version Table of Contents View Full Version Page 495 - 2015 Security in Telecommunications and Information Technology P. 495 Unleashing the potential of the Internet of Things 5 • The capability of managing service description involves the abilities of creating, querying and updating service description for support of service interoperability [C-5-2]. • The capability of managing network configuration involves the abilities of creating, querying and updating network configuration for support of network interoperability [C-5-3]. • The capability of managing device configuration involves the abilities of creating, querying and updating network configuration for support of device interoperability [C-5-4]. • The capability of managing security policy involves the abilities of creating, querying and updating security policy for support of interoperability between different implementations of security policy [C-5-5]. • The capability of managing privacy protection policy involves the abilities of creating, querying and updating privacy protection policy for support of interoperability between different implementations of privacy protection policy [C-5-6]. 8.5.2 Capabilities fulfilling the IoT scalability requirements The capabilities fulfilling the IoT scalability requirements specified in [ITU-T Y.2066] include managing distributed processing and managing multiple domains. • The capability of managing distributed processing involves the abilities of managing IoT functional components in a distributed way for support of IoT scalability [C-5-7]. • The capability of managing multiple domains involves the abilities of managing IoT functional components in multiple domains for support of IoT scalability [C-5-8]. 8.5.3 Capabilities fulfilling the IoT reliability requirements The capabilities fulfilling the IoT reliability requirements specified in [ITU-T Y.2066] include redundant deployment enablement capability. • The capability of redundant deployment enablement involves the abilities of enabling deployment of redundant functional components of the IoT to guarantee reliability required in communication, service provision and data management [C-5-9]. 8.5.4 Capabilities fulfilling the IoT high availability requirements The capabilities fulfilling the IoT high availability requirements specified in [ITU-T Y.2066] include service integrity check, data integrity check, device integrity check, security integrity check and user integrity check capabilities. • The capability of service integrity check involves the abilities of checking the service lifetime, the available resources required to provide the service in order to guarantee the high availability of service provisioning [C-5-10]. • The capability of data integrity check involves the abilities of checking the data lifetime, the available attributes of the data, and the consistency of data in order to guarantee the high availability of data management [C-5-11]. • The capability of device integrity check involves the abilities of checking the status of all functions of device to guarantee the high availability of IoT devices [C-5-12]. • The capability of security integrity check involves the abilities of checking the consistency of security policies deployed in all functional components of the IoT to guarantee the high availability of security in the IoT [C-5-13]. • The capability of user profile integrity check involves the abilities of checking the lifetime, subscription, privacy protection and availability of services subscribed to by users to guarantee the high availability of service provisioning and privacy protection for users [C-5-14].
Language:English
Score: 376690.45 - https://www.itu.int/wftp3/Publ.../files/basic-html/page495.html
Data Source: un
The number of establishments involved is counted for all types of strikes and lockouts. Workers involved: The number of workers involved relates to workers directly involved and workers indirectly involved. (...) Analytical measures amount of time not worked per 1,000 workers; number of workers involved per 1,000 workers; average number of workers involved per strike or lockout; average amount of time not worked per strike or lockout.
Language:English
Score: 376551.37 - http://www.ilo.org/ilostat-files/SSM/SSM7/E/sk.html
Data Source: un
Degrees of Stakeholder Involvement  in SWM Decision Making After: Wiedemann and Femers 1993 • Stakeholders can be  involved in SWM decisions  at different stages and to  different degrees • For major decisions, higher  forms of involvement are  likely to be needed for good  outcomes • However, many developing  countries do not even have  legislations on public right to  know… Common Obstacles to Involvement • Traditional policy culture. (...) Lack of awareness  and unwillingness to make efforts. • Representation.Whom to involve – Difficult to find legitimate  representatives of large and diverse communities. • “Lobbying”. Pressure from the private sector not to involve other  stakeholders if they see their interests being threatened.
Language:English
Score: 376133.67 - https://www.un.org/esa/dsd/sus...cm0310/1e_Magnus_Bengtsson.pdf
Data Source: un
Participatory approaches in public policy in Mongolia are emerging together with the democratic process wherein the emphasis is placed on participation of people in public affairs and on the need to involve as many groups in policy making as possible. Public involvement in sustainable forestry is difficult to apply because of traditional pastoral experiences of local herding communities with the engagement of different environmental NGOs in nature protection activities in Mongolia. (...) Therefore, it is essential that the public is involved in forestry planning at the forest management unit level.
Language:English
Score: 375874.73 - https://www.un.org/esa/forests...11/Mongolia_input_AHEG2016.pdf
Data Source: un