Добірка наукової літератури з теми "Reengineering of corporate computer networks"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Reengineering of corporate computer networks".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Reengineering of corporate computer networks"

1

Butler, Charles W., Earl D. Hodil, and Gary L. Richardson. "Software reengineering." Data Processing 28, no. 6 (July 1986): 303–7. http://dx.doi.org/10.1016/0011-684x(86)90231-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

BERZTISS, ALFS T. "REVERSE ENGINEERING, REENGINEERING, AND CONCURRENT ENGINEERING OF SOFTWARE." International Journal of Software Engineering and Knowledge Engineering 05, no. 02 (June 1995): 299–324. http://dx.doi.org/10.1142/s0218194095000150.

Повний текст джерела
Анотація:
This survey reviews four classes of reengineering of software systems: code restructuring and translation of code into a new language, design recovery for corrective maintenance, design recovery for software enhancement, and software reengineering as part of radical business process reengineering. Special attention is given to the reengineering of data bases and user interfaces. We also consider concurrent software engineering, its place in the software reengineering process, and groupware in support of this process.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Hoekstra, Rinke. "The knowledge reengineering bottleneck." Semantic Web 1, no. 1,2 (2010): 111–15. http://dx.doi.org/10.3233/sw-2010-0004.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Solomon, Esther. "The dynamics of corporate change: management's evaluation of stakeholder characteristics." Human Systems Management 20, no. 3 (September 3, 2001): 257–65. http://dx.doi.org/10.3233/hsm-2001-20308.

Повний текст джерела
Анотація:
In an era of globalization, rapid technological changes and intense competition, new forms of organizational designs and networks have replaced traditional forms of organizations. Interconnections among businesses and their various stakeholders including suppliers, customers providers, employees and others are now more rapid and complex as they are facilitated by advanced information technology and systems. This research addresses these changes by examining managers' perceptions of the stakeholders that were viewed as responsible for initiating change and innovation in their respective organizations. This paper presents the results of an empirical research project of 218 managers from major companies. Particular focus is placed on identifying which specific groups were critical stakeholders for the changes, and assessing their legitimacy, power and authority in relation to specific change initiatives and outcomes. Implications of the findings are discussed regarding process changes and reengineering within organizations and business networks.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Richardson, Ted. "Future for corporate networks." Data Processing 27, no. 6 (July 1985): 37–40. http://dx.doi.org/10.1016/0011-684x(85)90271-0.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Beskorovainyi, Vladimir V., Lubomyr B. Petryshyn, and Vasyl О. Honcharenko. "Mathematical models of a multi-criteria problem of reengineering topological structures of ecological monitoring networks." Applied Aspects of Information Technology 5, no. 1 (April 17, 2022): 11–24. http://dx.doi.org/10.15276/aait.05.2022.1.

Повний текст джерела
Анотація:
The article deals with the theoretical aspects of the problem of reengineering the topological structures of terrestrial ecological monitoring networks. As a result of the analysis of the current state of the problem, it was revealed the need to change the network of monitoring points, to increase requirements for the efficiency and accuracy of observations, as well as to do the more advanced technologies for collecting, processing, storing and transmitting information. All this is possible due to reengineering of existing monitoring networks. This requires the improvement of network system optimization technologies and their software in terms of taking into account the features of the reengineering problem, as well as the mathematical models and methods used for this. To solve the problem of reengineering of terrestrial monitoring networks, an aggregative-decomposition approach is proposed. The approach is divided into a set of tasks considering their interconnections in terms of input and output data. This made it possible to define a set of tasks that form the basis of reengineering procedures. To increase the efficiency of technologies for computer-aided design and reengineering of networks, a set of mathematical models is proposed that covers the main stages of their life cycles. The article discusses: a systemological model of iterative technology for obtaining design solutions; analytical models for evaluating the properties of network reengineering options in terms of efficiency, reliability, survivability and costs; models for identifying effective options for network reengineering based on Karlin and Germeier theorems; a model for evaluating the local properties of options in the form of a utility function of local criteria; model of scalar multicriteria estimation of network reengineering options based on utility theory. The utility function makes it possible to implement both linear and non-linear (including Z- and S-shaped) dependencies on their values. For the practical implementation of models of multicriteria problems of reengineering of topological structures of networks, it is proposed to use the method of generation of effective design solutions in parallel with the generation and the method of comparator parametric synthesis of the scalar multicriteria estimation function. The performance and efficiency of the proposed mathematical models and methods are demonstrated by examples of solving the problems of subset selection of Paretooptimal options for building networks and parametric synthesis of the scalar multicriteria estimation function. The application in practice of the proposed set of models and methods will increase the degree of automation of network reengineering processes, reduce the time for solving the problem of multi-criteria choice due to the reduction in the time complexity of the analysis procedures, and increase the stability of the decisions made by compromising their choice only from a subset of effective ones.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Best, Eike, and Raymond Devillers. "Synthesis and reengineering of persistent systems." Acta Informatica 52, no. 1 (November 29, 2014): 35–60. http://dx.doi.org/10.1007/s00236-014-0209-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

CANFORA, GERARDO, ANDREA DE LUCIA, and GIUSEPPE A. DI LUCCA. "AN INCREMENTAL OBJECT-ORIENTED MIGRATION STRATEGY FOR RPG LEGACY SYSTEMS." International Journal of Software Engineering and Knowledge Engineering 09, no. 01 (February 1999): 5–25. http://dx.doi.org/10.1142/s0218194099000036.

Повний текст джерела
Анотація:
We present a strategy for incrementally migrating legacy systems to object-oriented platforms. The migration process consists of six sequential phases and encompasses reverse engineering and reengineering activities. The aim of reverse engineering is to decompose programs into components implementing the user interface and components implementing application domain objects. The identification of objects is centred around persistent data stores and exploits object-oriented design metrics. Wrapping is the core of the reengineering activities. It makes new systems able to exploit existing resources, thus allowing an incremental and selective replacement of the identified objects. The migration strategy has been defined and experimented within the project ERCOLE (Encapsulation, Reengineering and Coexistence of Object with Legacy) on legacy systems developed in RPG for the IBM AS/400 environment.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Newman, P. "ATM technology for corporate networks." IEEE Communications Magazine 30, no. 4 (April 1992): 90–101. http://dx.doi.org/10.1109/35.135793.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Barua, Anitesh, C. H. Sophie Lee, and Andrew B. Whinston. "The Calculus of Reengineering." Information Systems Research 7, no. 4 (December 1996): 409–28. http://dx.doi.org/10.1287/isre.7.4.409.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Reengineering of corporate computer networks"

1

Siroin, A. J. "Securing the corporate network." Menomonie, WI : University of Wisconsin--Stout, 2005. http://www.uwstout.edu/lib/thesis/2005/2005siroina.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Posthumus, Shaun Murray. "Corporate information risk : an information security governance framework." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/814.

Повний текст джерела
Анотація:
Information Security is currently viewed from a technical point of view only. Some authors believe that Information Security is a process that involves more than merely Risk Management at the department level, as it is also a strategic and potentially legal issue. Hence, there is a need to elevate the importance of Information Security to a governance level through Information Security Governance and propose a framework to help guide the Board of Directors in their Information Security Governance efforts. IT is a major facilitator of organizational business processes and these processes manipulate and transmit sensitive customer and financial information. IT, which involves major risks, may threaten the security if corporate information assets. Therefore, IT requires attention at board level to ensure that technology-related information risks are within an organization’s accepted risk appetite. However, IT issues are a neglected topic at board level and this could bring about enronesque disasters. Therefore, there is a need for the Board of Directors to direct and control IT-related risks effectively to reduce the potential for Information Security breaches and bring about a stronger system of internal control. The IT Oversight Committee is a proven means of achieving this, and this study further motivates the necessity for such a committee to solidify an organization’s Information Security posture among other IT-related issues.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Kwok, Kwing-sun Steven. "The issue of corporate computing strategy : centralization versus decentralization /." [Hong Kong : University of Hong Kong], 1987. http://sunzi.lib.hku.hk/hkuto/record.jsp?B12336233.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Stuckert, Donald H. "A study of corporate intranets and their impacts on current and future training needs." Online version, 2000. http://www.uwstout.edu/lib/thesis/2000/2000stuckertd.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Mayisela, Simphiwe Hector. "Data-centric security : towards a utopian model for protecting corporate data on mobile devices." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011094.

Повний текст джерела
Анотація:
Data-centric security is significant in understanding, assessing and mitigating the various risks and impacts of sharing information outside corporate boundaries. Information generally leaves corporate boundaries through mobile devices. Mobile devices continue to evolve as multi-functional tools for everyday life, surpassing their initial intended use. This added capability and increasingly extensive use of mobile devices does not come without a degree of risk - hence the need to guard and protect information as it exists beyond the corporate boundaries and throughout its lifecycle. Literature on existing models crafted to protect data, rather than infrastructure in which the data resides, is reviewed. Technologies that organisations have implemented to adopt the data-centric model are studied. A utopian model that takes into account the shortcomings of existing technologies and deficiencies of common theories is proposed. Two sets of qualitative studies are reported; the first is a preliminary online survey to assess the ubiquity of mobile devices and extent of technology adoption towards implementation of data-centric model; and the second comprises of a focus survey and expert interviews pertaining on technologies that organisations have implemented to adopt the data-centric model. The latter study revealed insufficient data at the time of writing for the results to be statistically significant; however; indicative trends supported the assertions documented in the literature review. The question that this research answers is whether or not current technology implementations designed to mitigate risks from mobile devices, actually address business requirements. This research question, answered through these two sets qualitative studies, discovered inconsistencies between the technology implementations and business requirements. The thesis concludes by proposing a realistic model, based on the outcome of the qualitative study, which bridges the gap between the technology implementations and business requirements. Future work which could perhaps be conducted in light of the findings and the comments from this research is also considered.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Kwok, Kwing-sun Steven, and 郭烱燊. "The issue of corporate computing strategy: centralization versus decentralization." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1987. http://hub.hku.hk/bib/B31263793.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Lenaburg, Allen Gregg. "Intranet concept for small business." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2710.

Повний текст джерела
Анотація:
The purpose of this project is to build a working intranet containing core applications that create the framework for a small business intranet. Small businesses may benefit from an intranet because of its ability to effectively streamline the processes for retrieving and distributing information. Intranets are internal networks using TCP/IP protocols, Web server software, and browser client software to share information created in HTML within an organization, and to access company databases.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Millar, Gary Engineering &amp Information Technology Australian Defence Force Academy UNSW. "The viable governance model (VGM) : a theoretical model of IT governance with a corporate setting." Awarded by:University of New South Wales - Australian Defence Force Academy. Engineering & Information Technology, 2009. http://handle.unsw.edu.au/1959.4/44262.

Повний текст джерела
Анотація:
Empirical studies into IT governance have considerably advanced our understanding of the mechanisms and practices used by contemporary organisations to govern their current and future use of IT. However, despite the progress made in identifying the various elements employed by contemporary IT governance arrangements, there has been relatively little research into the formulation of a holistic model of IT governance that integrates the growing collection of parts into a coherent whole. To further advance the concept of IT governance, the Viable Governance Model (VGM) is proposed. The VGM is a theoretical model of IT governance within a corporate setting that is based on the laws and principles of cybernetics as embodied in Stafford Beer's Viable System Model (VSM). Cybernetics, the science of control and communication in biological and artificial systems, establishes a firm theoretical foundation upon which to design a system that directs and controls the IT function in a complex enterprise. The VGM is developed using an approach based on design science. Given the theoretical nature of the artefact that is being designed, the development and evaluation activities are primarily conceptual in nature. That is, the development activity involves the design of a theoretical model of IT governance using theoretical concepts and constructs drawn from several reference disciplines including cybernetics, organisation theory, and complexity theory. The conceptual evaluation of the VGM indicates that the model is sufficiently robust to incorporate many of the empirical findings arising from academic and professional research. The resultant model establishes a "blueprint", or set of design principles, that can be used by IS practitioners to design and implement a system of IT governance that is appropriate to their organisational contingencies. Novel aspects of this research include: the integration of corporate and IT governance; the reinterpretation of the role of the enterprise architecture (EA) within a complex enterprise; the exposition of the relationship between the corporate and divisional IT groups; and the resolution of the centralisation versus decentralisation dilemma that confront designers of IT governance arrangements.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Ibarra, Olivares Rebeca. "Social mechanisms of tax behaviour." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:2893069a-a2bf-46ff-a769-e9ec4ec58b48.

Повний текст джерела
Анотація:
The main goal of this thesis is to provide a sociologically informed analysis of tax avoidance and tax evasion in contemporary Mexico and Sweden, focusing particular attention on the explanatory role of social networks, social interactions, and positive feedback mechanisms. Two major data sources are used: (1) A panel dataset that includes all persons, 16 years or older, who resided in Stockholm County during at least one of the years 1990 to 2003 (N=1,967,993). The dataset includes detailed information on the socio-demographic characteristics, kinship networks, and criminal offences of these individuals; (2) A random sample of 36,949 firms that appeared in the Mexican Federal Register of Taxpayers for the year 2002. The records of the Mexican Federal Administrative Fiscal Tribunal provided data on all types of tax claims appealed before them during the 2002-2008 period. A variety of approaches and techniques are used such as agent-based simulation models, discrete time event history models, random effect logit models, and hierarchical linear models. These models are used to test different hypotheses related to the role of social networks, social interactions, and positive feedback mechanisms in explaining tax behaviour. There are five major empirical findings. (1) Networks seem to matter for individuals' tax behaviour because exposure to tax crimes of family members appears to increase a person’s likelihood of committing a tax crime. (2) Positive feedback mechanisms appear relevant because if a person commits a tax crime, it seems to increase the likelihood that the person will commit more tax crimes in the future. (3) Positive feedback mechanisms are also important for explaining corporate tax behaviour because a firm that has engaged in legal tax avoidance in the past appears to be more likely to engage in tax avoidance in the future. (4) Network effects are important in the corporate world because exposure to the tax avoidance of other firms increase the propensity of a firm to engage in tax avoidance. (5) Substitution effects between tax evasion and tax avoidance are likely to exist because when tax evasion becomes more prevalent in a firm’s environment, their likelihood of engaging in legal tax avoidance is lowered. The results underscore the importance of a sociological perspective on tax behaviour that takes into account social interactions and positive feedback mechanisms. In order to understand microscopic as well as macroscopic tax evasion patterns, the results presented in this thesis suggest that much more attention must be given to mechanisms through which taxation crimes breed more taxation crimes.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Depauw, Jeremy. "Qualité de l'information et vigilance collective sur le web: étude des stratégies d'évaluation des sources en ligne par les professionnels de la gestion de l'information dans les organisations." Doctoral thesis, Universite Libre de Bruxelles, 2009. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210263.

Повний текст джерела
Анотація:
La complexité de l'environnement dans lequel évoluent les organisations se traduit par la coexistence permanente d'interprétations multiples et contradictoires de la situation. Perturbées dans leurs capacités de décision et d'action, les organisations déploient des dispositifs sophistiqués de vigilance collective qui permettent de faire face à cette complexité, restaurant leur capacité à dégager du sens et à orienter leur action. La gestion de l'information en fait partie. Parmi toutes les sources disponibles, internet en général, et le web en particulier, constituent les principaux points d'accès à l’information, faisant désormais partie intégrante de ces processus de création de sens. L'évolution récente du paysage informationnel, tant du point de vue des outils que de celui des pratiques, suscite de nouveaux défis. Par leur facilité d’utilisation et leur accessibilité croissante, de nouveaux types de sources en ligne ont remis en question la façon dont les utilisateurs partagent, consomment et produisent du contenu. 

Cette thèse examine la remise en cause des processus habituels de vigilance collective, et en particulier celle de l'adaptation, chez les spécialistes de l'information, des stratégies d'évaluation de la qualité de l'information provenant des sources en ligne. La question de recherche mobilise trois éléments principaux :les professionnels de la gestion de l'information, l'évaluation de la qualité de l'information et l'évolution du paysage informationnel, qu'on appelle communément le Web 2.0. Pour répondre à cette question, une enquête de terrain a été menée auprès de 53 professionnels de la gestion de l'information en Belgique, entre novembre 2007 et juillet 2008. En l'absence de bases théoriques stables et largement acceptées, un cadre conceptuel spécifique a été développé pour assurer l'adéquation entre les éléments de la question de recherche et le dispositif. Ce cadre conceptuel a permis de faire la lumière sur ces éléments. Le recours à une approche sociopsychologique a permis de les articuler, notamment par emprunt aux travaux de Karl Weick et au concept de sensemaking. 

La gestion de l'information (GI), considérée comme un processus de vigilance collective, est un concept générique, comprenant les activités de surveillance, de veille ou encore d'intelligence (économique, stratégique, compétitive, etc.).

Sa conceptualisation, construite par une analyse de définitions des principaux termes qui lui sont associés, a mis en évidence l'importance de son rôle de médiateur d'information dans l'organisation, qui s'articule autour des étapes récurrentes de collecte, de traitement et de distribution de l'information. Le recours au concept d'organizational learning a permis de dépasser les approches purement mécaniques, mettant en évidence sa capacité à créer du de sens. 

C'est au coeur de cette médiation, à l'intersection de la collecte et du traitement de l'information, qu'intervient un autre type de sensemaking: l'évaluation de la qualité de l'information. Elle est envisagée comme un processus de réduction de l'ambiguïté, dont l'action permet la sélection (ou non) d'une source ou d'une information dans la suite de la médiation. La qualité de l'information est abordée sous l'angle de l'information seeking qui permet de faire la lumière sur cette création de sens. Elle est généralement traitée dans la littérature en termes de pertinence, de crédibilité ou de fitness for use. Des études de terrain et des contributions émanant des praticiens ont permis de mettre en évidence les attributs et les critères de la qualité qui peuvent être mobilisés pour construire un jugement de qualité des sources en ligne. Dans le cadre de l'enquête de terrain, une check-list composée de 72 critères renvoyant à 9 attributs a été choisie comme cadre de référence pour l'observer: les objectifs de la source, sa couverture, son autorité et sa réputation, sa précision, sa mise à jour, son accessibilité, sa présentation, sa facilité d'utilisation et sa comparaison avec d'autres sources. 

 

Pour pouvoir mettre en évidence de manière concrète les aspects du paysage informationnel en transformation, une analyse des définitions et descriptions du Web 2.0 a permis de construire une description morphologique qui reprend ses caractéristiques principales. Il peut ainsi être considéré comme un ensemble d'outils, de pratiques et de tendances. Les outils permettent d'identifier cinq types de sources qui lui sont spécifiques: les blogs, les wikis, les podcasts, les plates-formes de partage de fichiers et les sites de réseaux sociaux. Ces types de sources sont éclairés dans cette recherche sous l'angle du concept de genre et, ensemble, sont positionnés en tant que répertoire, qu'il est nécessaire de comparer avec celui des genres "classiques" de sources en ligne. 

L'examen du changement des stratégies d'évaluation de la qualité de l'information a été concrétisé à l'aide d'un questionnaire administré par téléphone, qui visait à croiser les critères de qualité de la liste choisie comme référence avec les cinq genres typiques du Web 2.0. C'est l'importance relative accordée à un critère pour évaluer une information qui a été choisie comme indicateur à observer. Les répondants ont été invités à indiquer s'ils considèrent que l'importance des critères "change" ("≠") ou "ne change pas" ("=") quand ils évaluent un de ces genres, en comparaison de celle qu'ils accorderaient à un genre classique de source en ligne. En cas de changement, le questionnaire a prévu la possibilité de noter s'il s'agissait d'une hausse (">") ou d'une baisse ("<") d'importance. Pour compléter ce dispositif, 14 entretiens semi-dirigés en face à face ont été menés avec des répondants à ce questionnaire, de manière à pouvoir saisir les éléments explicatifs de leurs réponses. 

L'analyse des données a montré qu'une majorité des réponses (57% de "=") indiquent que l'importance des critères d'évaluation ne change pas quand une information est mise à disposition par l'intermédiaire d'un genre Web 2.0, plutôt que par celui d'un genre classique de source en ligne. Pourtant, cela implique que 43% des critères changent d'une manière ou d'une autre. C'est sur base de ce constat que cette recherche soutient l'existence d'un changement perçu qui, s'il ne remet pas fondamentalement en cause le processus de jugement de qualité, suscite néanmoins une adaptation de ce dernier par les professionnels de la GI interrogés. La lecture des données à l'aide de variables secondaires a montré notamment une forte disparité des distributions de réponses entre les répondants; ce qui plaide en faveur du caractère subjectif, personnel et dépendant du contexte du processus d'évaluation. De même, elle a permis de déterminer l'existence de deux groupes d'attributs qui se différencient par le fait que le premier comporte des attributs liés au contenu de la source (les objectifs, l'autorité, la précision, etc.) alors que le second est composé d'attributs liés à la forme (présentation, facilité, etc.).

Les entretiens de la seconde phase de l'enquête ont permis d'affiner l'analyse en éclairant, d'une part, sur la nature du changement et, d'autre part, sur les raisons de celui-ci. Les répondants ont indiqué que fondamentalement le processus d'évaluation est identique quel que soit le répertoire envisagé. Ils admettent toutefois que les genres typiques du Web 2.0 peuvent être à l'origine d'une perte de repères. Elle s'explique par la perception d'une familiarité moins grande à l'égard des sources et se traduit par une perte de la confiance qu'ils accordent aux sources et à leur jugement. Le changement perçu se manifeste donc par une hausse d'importance de certains attributs, qui aide les répondants à restaurer cette confiance. L'élément explicatif de ce changement peut être considéré comme un flou dans les modalités de création de contenu. Ce flou comporte trois dimensions: la façon dont est créé le contenu (How?), l'identité de celui qui le crée (Who?) et sa nature (What?). Ces dimensions peuvent être synthétisées par l'idée selon laquelle n'importe qui peut publier n'importe quoi. 

Les entretiens approfondis confirment que les groupes d'attributs liés au contenu d'une part, et ceux liés à la forme d'autre part, sont bien des éléments explicatifs de la manière dont se manifeste le changement.  Dans le cas des attributs qui augmentent d'importance, les raisons invoquées renvoient au fait que la facilité de création de contenu à l'aide de ces genres permet à "n'importe qui" de créer du contenu. C'est pour cette raison que l'autorité et les objectifs de la source peuvent faire l'objet d'une attention plus forte que sur les genres classiques de sources en ligne. Le fait que n'importe qui puisse publier "n'importe quoi" renvoie à la nature du contenu créé par ces genres. Il est considéré comme dynamique, personnel, indicateur de tendances, source de signaux faibles, subjectifs, etc. Cela pousse les répondants qui sont sensibles à ces questions à remettre plus sérieusement en cause la précision par exemple. C'est aussi en raison de la facilité de création de contenu, et du fait que les outils du Web 2.0 réduisent la responsabilité de l'auteur dans la qualité de la conception de sa source, que des attributs de forme, quand ils changent d'importance, voient leur niveau baisser. Le second groupe a été signalé par les répondants comme étant davantage des indicateurs de sérieux et des arbitres dans leur processus d'évaluation.

Que ce soit pour discuter des divergences de vue entre répondants ou pour déterminer les spécificités des genres, il apparaît qu'un aspect capital de la qualité de l'information tient à sa capacité à répondre aux besoins du moment, le fitness for use. Cette notion est intimement liée à celle de pertinence et toutes deux ont été résolument présentées comme déterminantes dans les stratégies, à la fois du point de vue du jugement d'une information ponctuelle, que dans l'attitude face à aux sources en général. Dans tous les cas, c'est d'abord les besoins d'information qui guident le choix. Toutes observations permettent d'apporter une réponse claire, riche et nuancée à la question de recherche.
Doctorat en Information et communication
info:eu-repo/semantics/nonPublished

Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Reengineering of corporate computer networks"

1

Reengineering IBM networks. New York: Wiley, 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Network reengineering: The new technical imperative. New York: McGraw-Hill, 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

R, Panko Raymond, ed. Corporate computer security. 3rd ed. Boston: Prentice Hall, 2013.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

1964-, Roehr Andrew J., and Bernard Benjamin 1971-, eds. Managing the corporate intranet. New York: Wiley, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Bernard, Ryan. The corporate Intranet. 2nd ed. New York: Wiley Computer Publishing, 1997.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Bernard, Ryan. The corporate Intranet. 2nd ed. New York: John Wiley, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Building a corporate intranet. Rocklin, CA: Prima Publishing, 1997.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

IP multicasting: The complete guide to interactive corporate networks. New York: Wiley, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Corporate computer and network security. 2nd ed. Boston: Prentice Hall, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Mittelstaedt, Ted. The FreeBSD corporate networker's guide. Boston: Addison-Wesley, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Reengineering of corporate computer networks"

1

Beskorovainyi, V., and V. Russkin. "DIRECTED SEARCH OF VARIANTS IN TECHNOLOGIES FOR REENGINEERING OF CORPORATE COMPUTER NETWORKS." In Intelligent information systems for decision support in project and program management, 15–24. Kharkiv, Ukraine: Press of the Kharkiv National University of Radioelectronics, 2021. http://dx.doi.org/10.30837/mmp.2021.015.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Lysenko, Sergii, Oleg Savenko, Kira Bobrovnikova, Andrii Kryshchuk, and Bohdan Savenko. "Information Technology for Botnets Detection Based on Their Behaviour in the Corporate Area Network." In Computer Networks, 166–81. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59767-6_14.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Rajavat, Anand, and Vrinda Tokekar. "ReeRisk –A Decisional Risk Engineering Framework for Legacy System Rejuvenation through Reengineering." In Computer Networks and Information Technologies, 152–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19542-6_24.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Pomorova, Oksana, Oleg Savenko, Sergii Lysenko, and Andrii Kryshchuk. "Multi-agent Based Approach for Botnet Detection in a Corporate Area Network Using Fuzzy Logic." In Computer Networks, 146–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38865-1_16.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Lysenko, Sergii, Oleg Savenko, Kira Bobrovnikova, and Andrii Kryshchuk. "Self-adaptive System for the Corporate Area Network Resilience in the Presence of Botnet Cyberattacks." In Computer Networks, 385–401. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92459-5_31.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Xie, Ji-Gang, Jing Wang, and Zheng-Ding Qiu. "Effectiveness of Neural Networks for Prediction of Corporate Financial Distress in China." In Lecture Notes in Computer Science, 994–99. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-28648-6_158.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Nehinbe, Joshua Ojo. "A Simple Method for Improving Intrusion Detections in Corporate Networks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 111–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11530-1_13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Creamer, Germán. "Portfolio Optimization and Corporate Networks: Extending the Black Litterman Model." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 83–94. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-03473-7_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Rodriguez Rodriguez, Jorge Enrique, Víctor Hugo Medina Garcia, and Miguel Angel Ospina Usaquén. "Corporate Networks Traffic Analysis for Knowledge Management Based on Random Interactions Clustering Algorithm." In Communications in Computer and Information Science, 523–36. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-95204-8_44.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Brand, Jay L., Gabor Nagy, and Haijie Ding. "Using Embedded Technology Badges to Derive Social Networks, Patterns of Interaction and Space Utilization in a Corporate Headquarters." In Lecture Notes in Computer Science, 353–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21660-2_39.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Reengineering of corporate computer networks"

1

Bose, Pradip, and Philip Emma. "Computer architecture education in a corporate reengineering program." In the 1996 workshop. New York, New York, USA: ACM Press, 1996. http://dx.doi.org/10.1145/1275152.1275158.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Kapustyan, Maria. "Corporate Networks: Information Security." In 2006 International Conference - Modern Problems of Radio Engineering, Telecommunications, and Computer Science. IEEE, 2006. http://dx.doi.org/10.1109/tcset.2006.4404596.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Walkowski, Michal, Maciej Krakowiak, Jacek Oko, and Slawomir Sujecki. "Distributed Analysis Tool for Vulnerability Prioritization in Corporate Networks." In 2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2020. http://dx.doi.org/10.23919/softcom50211.2020.9238286.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Feng, Bojing, Wenfang Xue, Bindang Xue, and Zeyu Liu. "Every Corporation Owns Its Image: Corporate Credit Ratings via Convolutional Neural Networks." In 2020 IEEE 6th International Conference on Computer and Communications (ICCC). IEEE, 2020. http://dx.doi.org/10.1109/iccc51575.2020.9344973.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Dutkevych, Taras, and Andrian Piskozub. "Application Features of Commercial and Open Source Intrusion Detection Systems in the High-speed Corporate Networks." In 2006 International Conference - Modern Problems of Radio Engineering, Telecommunications, and Computer Science. IEEE, 2006. http://dx.doi.org/10.1109/tcset.2006.4404486.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Leonard, A. C. "A grounded theory research investigation into the importance of social relationships and networks within corporate information systems projects." In the South African Institute of Computer Scientists and Information Technologists Conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2072221.2072260.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Matulčíková, Marta, and Daniela Breveníková. "DISTANCE EDUCATION IN FURTHER PROFESSIONAL TRAINING IN ENTERPRISES DURING PANDEMIC PERIOD." In NORDSCI International Conference. SAIMA Consult Ltd, 2020. http://dx.doi.org/10.32008/nordsci2020/b1/v3/04.

Повний текст джерела
Анотація:
Constraints on our personal and professional life imposed by the COVID 19 pandemic have radically influenced our approach to forms of education, including those used in further professional training of employees. This shift means the focus on distance education as a managed educational form, which is suitable for further professional training. The aim of the paper is to present the implementation of distance education in further professional training in enterprises and based on the empirical research propose ways of improving options of education. Distance education is characterised in terms of its principles and developmental stages. Its first generation was correspondence education. The Learning Management System (LMS) and Learning Content Management System (LCMS) are described as the systems applied in further professional training. The research was conducted by means of the questionnaire method, combined with the pre-research survey. Results of empirical research are presented in tables. Separate parts of the paper deal with ICT application in corporate education (correspondence education, Computer-based training (CBT), Web-based training (WBT), Technology Based Training (TBT) and with the utilisation of Learning Management Systems (LMS). Analysis of respondent opinions shows that respondents tend to prefer the face-to-face form of corporate education. The length of the pandemic is going to affect the spread of e-learning in corporate education and its role in education. The learners’ interest may be expected to be shifted to LCM and LCMS utilisation. The paper is a partial result of the research scheme VEGA No. 1/0309/18 “Social networks in human resource management” supported by the Ministry of Education, Science and Research and Sports, Slovakia
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Yoshimura, Masataka, and Hideyuki Kondo. "Group Decision Making in Product Design and Manufacturing." In ASME 1997 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/detc97/dac-3729.

Повний текст джерела
Анотація:
Abstract Reconciling the different desires and requirements of individuals within decision making groups is becoming increasingly important, as corporate structures tend to embody flat relationships more than hierarchical ones, and as computer networks gain ever more utility. In this paper, a computer aided decision making support system is proposed, that such groups of decision makers can rely on, in order to arrive at the best possible cooperative decisions. First, weighting coefficients for the factors to be evaluated are determined by pair comparisons based on the AHP (Analytic Hierarchy Process) method. The preference structures of the decision makers for these factors are expressed by single-attribute satisfaction functions. Next, these satisfaction functions are classified into two groups having opposite tendencies (positive, and negative) so that when graphed, the intersection of the two curves can be defined as a solution point where the decision makers can compromise. Then, improvement procedures are conducted based on compromise processes, so that the satisfaction levels at the solution point becomes as high as possible. Finally, these decision making procedures are demonstrated by analyzing the decision making problems encountered when designing an industrial robot.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Cader, Tahir, Ratnesh Sharma, Cullen Bash, Les Fox, Vaibhav Bhatia, and Mohandas Mekanapurath. "Operational Benefits of Real-Time Monitoring and Visualization in Data Centers." In ASME 2009 InterPACK Conference collocated with the ASME 2009 Summer Heat Transfer Conference and the ASME 2009 3rd International Conference on Energy Sustainability. ASMEDC, 2009. http://dx.doi.org/10.1115/interpack2009-89379.

Повний текст джерела
Анотація:
The 2007 US EPA report to Congress (US EPA, 2007) on the state of energy consumption in data centers brought to light the true energy inefficiencies built into today’s data centers. Marquez et al. (2008) conducted an initial analysis on the productivity of a Pacific Northwest National Lab computer using The Green Grid’s Data Center Energy Productivity metric (The Green Grid, 2008). Their study highlights how the Top500 ranking of computers disguises the serious energy inefficiency of today’s High Performance Computing data centers. In the rapidly expanding Cloud Computing space, the race will be won by the providers that deliver the lowest cost of computing — such cost is heavily influenced by the operational costs incurred by data centers. As a means to address the urgent need to lower the cost of computing, solution providers have been intensely focusing on real-time monitoring, visualization, and control/management of data centers. The monitoring aspect involves the widespread use of networks of sensors that are used to monitor key data center environmental variables such as temperature, relative humidity, air flow rate, pressure, and energy consumption. Such data is then used to visualize and analyze data center problem areas (e.g., hotspots), which is then followed by control/management actions designed to alleviate such problem areas. The authors have been researching the operational benefits of a network of sensors tied in to a software package that uses the data to visualize, analyze, and control/manage the data center cooling system and IT Equipment for maximum operational efficiency. The research is being conducted in a corporate production data center that is networked in to the authors’ company’s global network of data centers. Results will be presented that highlight the operational benefits that are realizable through real-time monitoring and visualization.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії