Information sharing
-
READING 1. Work in groups. Share information on how you use computers in your free time. Compare answers with other groups and make a list of uses for your class. PRE-READING 2. You are going to hear four people talk about how they use computers. Before you listen, try to predict the uses they describe.
66p lamphong_424 02-07-2013 235 53 Download
-
"Dynamo: Visual Programming for Design" will demonstrate how to use Dynamo Visual Programming forautodesk® revit® software and autodesk vasari. The lab will provide users with resources and step by step examples for automating geometry creation, adjusting family parameters using external data, and sharing information with different design platforms.
56p nhatvykts 01-10-2014 362 61 Download
-
Overview Access Control Matrix model Discretionary Access Control (DAC) Mandatory Access Control (MAC) and an example model Role Based Access Control (RBAC) Access Control in Unix Sep 2009 Information Security by Van K Nguyen Hanoi University of Technology 2 .What is AC Quote from Ross Anderson (text “Security Engineering”) Its function is to control which principals (persons, processes, machines, …) have access to which resources in the system -- which files they can read, which programs they can execute, and how they share data with other principals, and so on....
58p trinhvietnambk 29-05-2013 75 9 Download
-
This study reconsiders current public lighting design and suggests alternative practices that were determined through a case study involving a main street shopping strip. Using design as an investigative method this thesis seeks to inform and inspire practitioners and decision makers by illustrating the possibilities of change. Australian cities are witnessing an unprecedented growth in urban density and if we do not change our thinking, the quality of our urban spaces will not match this growth.
141p runthenight07 01-03-2023 7 3 Download
-
This research is a single case study of the impact of the introduction of both information technology (software, hardware and Internet) and a company policy about IT use on the internal operations of a fire truck assembly company and its supply chain relationships. Using Action Research, the research focuses on a fire truck assembly company in Thailand, where supply chain efficiency was not improving and where costs of, and relationships with, both upstream suppliers and downstream clients in the supply chain were increasing.
306p runthenight04 02-02-2023 9 2 Download
-
This thesis is divided into six chapters. The current chapter has introduced the thesis. Chapter 2 discusses the background of the institutional features of the Indian IPO market, including the grey market. Chapter 3 (Study 1) introduces an integrated conceptual framework of information sharing, with and without allocation discretion to underwriters. Chapter 4 (Study 2) applies signaling theory in the Indian IPO market setting to understand the effect of the information asymmetry between IPO investors.
234p runthenight04 02-02-2023 9 3 Download
-
The thesis is designed to evaluate the reality of knowledge sharing among lecturers in universities; offering a number of suggestions to help lecturers, university administrators enhance knowledge sharing for teaching and learning.
14p mmlemmlem_124 22-12-2020 12 0 Download
-
The study determines factors such as trust, enjoyment in helping others, knowledge self-efficacy, management support, using information and communication technology significantly influence knowledge donation and collection.
16p tohitohi 22-05-2020 64 2 Download
-
The purpose of this study is to determine the mediating role of Information Sharing Strategy (ISS) on Agile Supply Chain (ASC) practices for achieving Supply Chain Performance (SCP) in medium size manufacturing companies in UAE.
12p tohitohi 22-05-2020 14 0 Download
-
Lecture Marketing channel strategy - Chapter 3: Channel analysis - Auditing marketing channels" has contents: Auditing marketing channels, physical possession, inventory holding costs, information sharing,... And other contents.
10p tieu_vu08 05-05-2018 60 1 Download
-
Module 12: Implementing ISA Server 2004 enterprise edition: back-to-back firewall scenario. The primary focus of this module is the lab where the students will implement ISA Server Enterprise Edition in a back-to-back firewall configuration that includes network load balancing and shared caching. The module information will introduce the complexities of implementing a back-to-back firewall configuration and then provide guidelines for deploying this configuration. In the lab, the students will implement and test a back-to-back firewall scenario.
10p nomoney2 10-02-2017 47 3 Download
-
Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Modeling bee swarming behavior through diffusion adaptation with asymmetric information sharing
26p sting06 16-02-2012 52 7 Download
-
Tuyển tập các báo cáo nghiên cứu khoa học ngành toán học được đăng trên tạp chí toán học quốc tế đề tài: Modeling bee swarming behavior through diffusion adaptation with asymmetric information sharing
26p dauphong11 04-02-2012 43 4 Download
-
The University of Aberdeen conducts advanced technological research in various fields of science. In a move to facilitate sharing of information and resources amongst faculty members, the university has decided to implement an intranet communication system. Each faculty member would be given a unique username and password to log on to the intranet.
1p vudung75 20-04-2011 94 4 Download
-
Which BGP routers will become peers and share routing information? BGP routers that are configured with the same network command BGP routers share routing information with all routers in the same AS by default. BGP routers that are configured with the neighbor command BGP routers that are configured with the same peer command
11p danhson1409 26-12-2010 128 13 Download
-
The ATM Switch Model The B-ISDN envisioned by ITU-T is expected to support a heterogeneous set of narrowband and broadband services by sharing as much as possible the functionalities provided by a unique underlying transport layer based on the ATM characteristics. As already discussed in Section 1.2.
9p tienvovan 11-09-2010 79 6 Download
-
Welcome to Crystal Reports 8.5, the world standard in high-performance reporting. Deliver rich, interactive content from virtually any data source with Crystal Reports. With Developer and Professional Editions, and the addition of powerful design and formatting capabilities with interactive analysis tools, you can create reports that meet your exact needs. Rapidly deploy your reporting solution to the Web with our powerful new web-publishing system for easy information sharing.
8p viettuan1080 04-05-2010 153 55 Download
-
Database you say—now there's a word you hear all the time! In a nutshell, a database is an electronic collection of information designed to meet a handful of needs: Databases provide one-stop shopping for all your data storage requirements. The database contains any amount of data, from the small to the huge. Databases must provide mechanisms to retrieve data quickly as applications interact with their contents. Databases allow the sharing of corporate data such that personnel data is shared amongst one's payroll, benefits, and pension systems....
6p saviour 24-02-2010 165 26 Download
-
CRITICAL SKILL 1.1: Define a Database Database you say—now there's a word you hear all the time! In a nutshell, a database is an electronic collection of information designed to meet a handful of needs:
Databases provide one-stop shopping for all your data storage requirements. The database contains any amount of data, from the small to the huge.
Databases must provide mechanisms to retrieve data quickly as applications interact with their contents.6p saviour 08-12-2009 151 38 Download