Data management systems
-
The article discloses methodological approaches to quantifying the level of penetration of block chain technologies into the regional socioeconomic environment in comparison to the supply chain strategies. Based on the methods of mathematical and statistical analysis, it allows you to formalize and convert a large array of data of a qualitative order into a single scale for measuring the process under study - the level of demand in the regional socio-economic environment for block chain technology.
6p longtimenosee09 08-04-2024 1 1 Download
-
Bachelor's thesis of Business (Business Information Systems): CRM as a tool for IT strategy planning
CRM is a relative new technology in which allows organisations to capture data, and improve customer service capabilities. IT strategy planning is the process of planning, and implementing changes, to ensure organisations have best practise in regards to decision making and infrastructure. At the current moment there is little information domestically available in Australia about CRM systems. This thesis provides some insight, in-regards to CRM and IT strategy planning practice, in Australia.
160p runthenight07 01-03-2023 6 3 Download
-
The aim of the research is to explore the effects of Thai culture on the efficacy of Western modelled performance management (PM) in a cross-cultural setting. Thailand is becoming increasingly important to Australian businesses, particularly in view of the ASEAN Economic Community Plan, which is now in its final stages implementation (ASEAN 2015). The primary data for this study was sourced from 43 semistructured and in-depth interviews with 30 participants.
264p runthenight04 02-02-2023 8 2 Download
-
This research develops a rich theoretical and empirical understanding of embeddedness by way of three dimensions (structural, relational and cultural), and investigates its implications for actors’ value co-creation behaviours and value-in-context outcomes. In addition, the research refines co-creation perspectives by examining a central boundary condition of co-creation processes. The data was collected in an online service environment and was analysed using structural equation modelling techniques.
183p runthenight04 02-02-2023 9 2 Download
-
Enterprise Resource Planning (ERP) system is one of the most popular forms of IT for businesses at present. Deriving from efforts to rationalize lead times and possession stock costs, the 80’s manufacturing resource planning (MRP II) is developed into ERP system considered as the standard that integrates business processes throughout the organization, which in turn enhances operational efficiency (Akkermans, Bogerd, Yücesan, & Van Wassenhove, 2003; Davenport, 1998). Callaway (1999) states that the ERP system promises to achieve benefits in both tangible (e.g.
270p kequaidan6 15-07-2020 19 2 Download
-
This paper uses Systematic Literature Review (SLR) to find the trends of usability of Big Data in education sector.
8p lucastanguyen 01-06-2020 13 3 Download
-
Pest control practices in the vegetable crops have been heavily dominated by the routine use of broad-spectrum insecticides to control pests. Concerns have emerged about the adverse consequences of over use of pesticide. These consequences include short and longterm health hazards, contamination and environmental degradation. To minimize the pest losses farmers heavily depend on the chemical pesticides and accessing pest management information from the pesticide dealers due to weak state extension support system.
9p nguaconbaynhay5 16-05-2020 19 3 Download
-
Module 11: Managing and monitoring network access. This module provides you with the knowledge and skills to manage and monitor network access. After completing this module, students will be able to: Manage the network access services, configure logging on the network access server, collect and monitor network access data.
16p nomoney2 10-02-2017 35 4 Download
-
In this chapter you will: To understand how firms create an internal database, to learn about building a database from a Web site, to become familiar data mining, to understand the advantages and disadvantages of of using secondary data, to understand the role of the Internet in obtaining secondary data, to learn about types of information management systems.
13p allbymyself_06 28-01-2016 63 4 Download
-
After completing this lesson, you should be able to do the following: Describe different system architectures Describe the primary steps of OS tuning Identify similarities between OS and DB tuning Understand virtual memory and paging Explain the difference between a process and a thread
14p trinh02 28-01-2013 47 5 Download
-
Users and Security Security domain The database administrator defines the names of the users who are allowed to access a database. A security domain defines the settings that apply to the user. Authentication mechanism A user who requires access to the database can be authenticated by one of the following: Data dictionary Operating system Network The means of authentication is specified at the time the user is defined in the database and can be altered later. This lesson covers authentication by database and by operating system only.
20p trinh02 28-01-2013 81 3 Download
-
Built-In Database Objects In addition to creating the database files, several other structures are created. Data dictionary: Contains descriptions of the objects in the database Dynamic performance tables: Contains information used by the database administrator (DBA) to monitor and tune the database and instance PL/SQL packages: Program units adding functionality to the database. These packages are created when the catproc.sql script is run after the CREATE DATABASE command. PL/SQL packages will not be discussed within the scope of this course.
20p trinh02 28-01-2013 63 4 Download
-
Before a database is created, the UNIX environment must be configured and the Oracle9i server must have already been installed. Four environment variables must be set: ORACLE_HOME, ORACLE_SID, PATH, LD_LIBRARY_PATH. ORACLE_HOME is the full path to the top directory in which the Oracle9i Server is installed. The directory for ORACLE_HOME should be supplied by the person who installed the server, usually the UNIX administrator or the DBA. ORACLE_SID is a user-definable name assigned to an instance of a database.
10p trinh02 28-01-2013 62 6 Download
-
.This lesson includes the following sections: • Average Access Time • File Compression • Data-Transfer Rate • Drive-Interface Standards .Average Access Time • In storage devices, average access
9p trada85 18-01-2013 72 3 Download
-
Since 1978, Intel's processors have evolved from the 8086 and the 8088 to the 80286, 80386, and 80486, to the Pentium family of processors. All are part of the 80x86 line. Intel's Pentium family of processors includes the Pentium, Pentium Pro, Pentium with MMX, Pentium II, Pentium III, Celeron, and Xeon processors. The earliest Intel processors included only a few thousand transistors. Today's Pentium processors include 9.5 million transistors or more.
17p trada85 18-01-2013 53 5 Download
-
With a pen-based system, you use an electronic pen to write on the screen and choose commands. Pens are common input devices for handheld computers, like “personal digital assistants (PDAs).” Pens are handy for making notes or selecting commands, not for inputting a lot of text.
20p trada85 18-01-2013 40 5 Download
-
• Microsoft’s latest database object model • Allows VB programmers to use a standard set of objects to refer to data from any source • .NET approach uses disconnected datasets with common data representation (data types) from multiple sources Visual
15p rose_12 04-12-2012 41 3 Download
-
Frank Eyermann – Frank.Eyermann@unibw.de – Information Systems Laboratory – Faculty for Computer Science – Universität der Bundeswehr, Munich Create the following scenario – Two nodes, link in between – Sender agent: Agent/UDP – Receiver agent: Agent/Null – Connect agents – Data source: Application/Traffic/CBR – Run from 0.5 to 4.5 sec, finish at 5.0 sec
14p dhvbkhn 17-10-2012 58 4 Download
-
Các phiên bản của SQL Server: Enterprise, Personal, Desktop, Developer,.. Các bộ phận của SQL Server: Enterprise Manager, Query Analyzer, Books Online,.. Các loại tập tin của SQL Server: data file (primary, secondary), log file Các loại cơ sở dữ liệu của SQL Server: system database, user database
10p whylove1020 06-04-2011 131 25 Download
-
Trên cơ sở dữ liệu (database): Các phiên bản của SQL Server: Enterprise, Personal, Desktop, Developer,.. Các bộ phận của SQL Server: Enterprise Manager, Query Analyzer, Books Online,.. Các loại tập tin của SQL Server: data file (primary, secondary), log file; Các loại cơ sở dữ liệu của SQL Server: system database, user database.
10p trinhhiephoa 30-12-2010 272 111 Download