Xem 1-20 trên 94 kết quả Architectural issues
  • This chapter presents globalization aspects of electronic commerce, describes the key issues in each area, and then analyzes approaches that could be Used to address these issues. Globalization is the marketing and selling of a product outside a companys home country, and the most effective way to do that on the Internet is via localization of Web content. Localization is the process and product of customizing Web content so that it is most understandable and usable to a person residing in a particular locale.

    pdf420p nguyen2 10-11-2009 76 40   Download

  • The telecom industry is on the rebound and the demand for more and newer wireless services is ever increasing. To meet these market demands, wireless providers have to deploy advanced radio access networks to enhance the mobile communications infrastructure. This forward-looking book delivers a comprehensive overview of the evolution of mobile radio access networks, focusing on high-level architectural issues that engineers and managers need to understand.

    pdf263p transang5 23-11-2012 29 8   Download

  • The role of Database Administrator (DBA) has become a key to success in today’s highly complex database systems. The best DBAs work behind the scenes, but are in the spotlight when critical issues arise. They plan, create, and maintain databases to ensure that the databases meet the data manage- ment needs of the business. DBAs also monitor the databases for perfor- mance issues and work to prevent unscheduled downtime. Being an effective DBA requires a broad understanding of the architecture of Oracle databases and expertise in solving system-related problems.

    pdf840p minhthanh 11-08-2009 159 19   Download

  • Internet Routing Architectures, Second Edition expands on the highly successful first edition, with new updates on BGP4 and current perspectives on internetworking routing architectures. This book is intended for any organization needing to build an efficient, reliable, enterprise network accessing the Internet. Its purpose is to make you an expert on integrating your network into the global Internet. It is written to address real routing issues, using real scenarios, in a comprehensive and accessible manner.

    pdf50p ken333 28-06-2012 41 11   Download

  • There is an invisible elephant in this book: your application. And, it sits at the center of every topic we touch in each chapter we present. This book is for systems architects who are interested in building security into their applications. The book is designed to be useful to architects in three ways: as an introduction to security architecture, as a handbook on security issues for architecture review, and as a catalog of designs to look for within a security product.

    pdf433p ptng13 16-05-2012 33 6   Download

  • New Concepts such as agile modeling, extreme programming, knowledge management, and organizational memory are stimulating new research ideas amoung researchers, and prompting new applications and software. Revolution and evolution are common in the areas of information systemsdevelopment and database. Research Issues in Systems Analysis is a collection of the most up-to-date research-oriented chapters on information systems development and database.

    pdf296p suthebeo 17-07-2012 33 6   Download

  • This book is for students of building design: architecture, architectural tech-nology, building, construction management, interior design and surveying. By ‘students’ I refer to those just embarking on a course of study related to building, and the professionals who deal with detail design issues on a daily basis.

    pdf272p htphau1 22-09-2014 14 5   Download

  • Architectural Forensics would not have been possible without the support and assistance of numerous in-dividuals—friends, colleagues, architects/engineers and contractors who have contributed greatly to the formation and crystallization of my thoughts and insights on many of the topics and issues discussed dur-ing the preparation of this book.

    pdf457p htphau1 22-09-2014 15 3   Download

  • This study is one of a series of RAND publications that address ACS issues in implementing the EAF. Other reports in the series include the following: • Supporting Expeditionary Aerospace Forces: An Integrated Strategic Agile Combat Support Planning Framework, Robert S. Tripp et al. (MR-1056-AF). This report describes an ...

    pdf0p xuan2013 29-01-2013 18 2   Download

  • Software Architectures: Lecture 3 presents about Common Architectural Idioms, Architectural solutions for KWIC, KWIC design issues, Main Program/Subroutine with shared data, KWIC – shared data solution, Shared data, pro and cons, Abstract data types (ADT).

    pdf69p cocacola_17 12-12-2015 8 1   Download

  • Ebook Cisco security architectures focus presents basic issues such as: The TCP/IP protocol suite, the internet protocol, TCP and UDP, netware, router hardware and software overview.

    pdf114p dienham63 12-12-2015 6 1   Download

  • Part 1 of the book serial ebook Cisco security architectures to part 2 of you will continue to learn about relevant issues such as: Cisco router access lists, advanced cisco router security features, Non-IP access lists, the cisco PIX.

    pdf176p dienham63 12-12-2015 5 1   Download

  • This book is based on material from the first 12 issues of the Green Building Digest. We began to publish the digest in 1995 in an attempt to distribute information abuot the enviromental impact of building material and techniques to a wide range of people conectned with the built environment in England...

    pdf383p quitkudo 16-07-2010 215 143   Download

  • This book is a quick-reference guide for Recovery Manager (RMAN), Oracle's utility to manage all of your Oracle database backup and recovery activities. This book is not a comprehensive backup and recovery book. It contains an overview of RMAN architecture, shows briefly how to backup and restore databases using RMAN, describes catalog setup issues, and provides quick-reference syntax diagrams of RMAN commands.

    pdf114p nghianguyenluong 30-06-2009 271 82   Download

  • When it comes to providing architects with quick, accurate guidance for a complete range of on-the-job issues, no book matches The Architect's Portable Handbook from McGraw-Hill. And now, with the updated and expanded Third Edition, The Architect's Portable Handbook delivers the latest code and cost information--along with a wealth of easy-to-follow diagrams, charts, tables, and checklists for building materials, components, and assemblies.

    pdf705p transang5 23-11-2012 66 31   Download

  • This is a survey paper on Quality-of-Service(QoS) based routing. In this paper, we first introduce the concept of Quality-of-Service and its background. Second, we discuss the concepts of QoS-based routing, its objectives and main issues. After that, several types of QoS based routing algorithms are compared, and the advantages and disadvantages of each type discussed. Then, the relations between QoS based routing and some relevant techniques are studied, including traffic engineering, high level admission control, resource reservation protocols(e.g.

    pdf27p trinhhiephoa 30-12-2010 87 23   Download

  • The objective of this book is to cover the advances of mobile robotic systems and related technologies applied especially for multi robot systems' design and development. The design of mobile robots control system is an important and complex issue, requiring the application of information technologies to link the robots into a single network. In recent years, a great number of studies of mobile robot applications have been proposed but still there is a need to provide software tools to integrate hardware and software of the robotic platforms....

    pdf402p bi_bi1 06-07-2012 90 18   Download

  • This book is about database security and auditing. You will learn many methods and techniques that will be helpful in securing, monitoring and auditing database environments. It covers diverse topics that include all aspects of database security and auditing - including network security for databases, authentication and authorization issues, links and replication, database Trojans, etc. You will also learn of vulnerabilities and attacks that exist within various database environments or that have been used to attack databases (and that have since been fixed).

    pdf433p suthebeo 17-07-2012 66 17   Download

  • The umbrella term Social Sciences and Humanities refers to a plurality of fields outside the Natural or Physical Sciences. Disciplines as different as anthropology, archaeology, architecture, art, cultural studies, economics, education, geography and environmental studies, history, law, languages and linguistics, political science, philosophy, psychology, sociology or translation studies, all share the concern for human relations and socio-cultural practices.

    pdf519p xunu1311 02-11-2012 112 12   Download

  • Recent studies indicate that e-government initiatives have not held their promise of improving government services. The majority of efforts to benchmark e-government have had central government as the unit of analysis. This study employs the MeGAP-3 (The Municipal E-Government Assessmen Project) assessment tool to assess the status of municipal e-government in the Agder region in southern Norway, an area with high Internet penetration and mature information and communication technology (ICT) use....

    pdf44p hothang82 09-10-2012 44 10   Download

Đồng bộ tài khoản