![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
The concept of the user is not a well-established sociological concept even though the
This book focuses on the adoption of new technologies led by information and communication technologies by SMEs in developing countries. It identifies several factors that augment competitiveness of firms in the era of globalization. Contrary to the general belief, these factors are not uniform across developing world. Based on the empirical evidence from firms located in Malaysia, India, Nigeria, Jamaica, and Costa Rica, the study concludes that firms cannot remain competitive without institutional support. Since firms operate in different institutional and economic environment, form of support varies from one country to another.
In the arena of Parasitic-Aware Design of CMOS RF Circuits, efforts are aimed at the realization of true single-chip radios with few, if any, off-chip components. Ironically, the on-chip passive components required for RF integration pose miore serious challenges to SOC integration than the active CMOS and BJT devices. This is not surprising since modern digital IC designs are dominated as much, or more, by interconnectg characteristics than by active device properties. In any event, the co-integration of active and passive devices in RFIC design represents a serious design problem and an even more daunting manufacturing challenge. If conventional mixed-signal design techniques are employed, parasitics associated with passive elements (resistors, capacitors, inductors, transformers, pads, etc.) and the package effectively de-tune RF circuits rendering them sub-optimal or virtually useless. Hence, dealing with parasitics in an effective way as part of the design process is an essential emerging methodology in modern SOC design. The parasitic-aware RF circuit synthesis techinques described in this book effectively address this critical problem.
This volume presents an overview of computer forensics perfect for beginners. A distinguished group of specialist authors have crafted chapters rich with detail yet accessible for readers who are not experts in the field. Tying together topics as diverse as applicable laws on search and seizure, investigating cybercrime, and preparation for courtroom testimony, Handbook of Digital and Multimedia Evidence is an ideal overall reference for this multi-faceted discipline.
This volume considers the theme of the protection of the user in the field of information technology, and more specifically in relation to software licences, electronic information services and Internet access services. Litigation in IT usually stems from the users' feeling that their expectations have been frustrated at performance. When dealing with such cases, the courts seem to increasingly take the objective of user protection into account. How is this protection implemented? Is this trend generally desirable? Is this judicial protection excessive? What are the constraints met by IT providers that should be taken into account in litigation? How can the user's position be improved? "User Protection in IT Contracts" extensively presents the reasons why, and the ways in which national courts may decide a case in favour of the user. Many practical issues are considered in this respect. Which factors appear relevant to deal with liability claims in IT? Are exemption clauses always enforceable? What are the implications of information duties for IT providers? How can general conditions be safely incorporated to a contract? What is the validity of shrinkwrap licences? Is it safe to rely on an entire-agreement clause? This book exhaustively reviews these issues in English, Dutch and French law.
Due to the rise of digital crime and the pressing need for methods of combating these forms of criminal activities, there is an increasing awareness of the importance of digital forensics and investigation. The Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions addresses a broad range of electronic devices and software for crime prevention and investigation. This defining body of research covers a wide spectrum of topics useful to a broad cross-sectional and multi-disciplinary readership ranging from academic and professional research communities to industry consultants and practitioners.
This book describes the current state of the art in big-data analytics, from a technology and hardware architecture perspective. The presentation is designed to be accessible to a broad audience, with general knowledge of hardware design and some interest in big-data analytics. Coverage includes emerging technology and devices for data-analytics, circuit design for data-analytics, and architecture and algorithms to support data-analytics. Readers will benefit from the realistic context used by the authors, which demonstrates what works, what doesn’t work, and what are the fundamental problems, solutions, upcoming challenges and opportunities. Provides a single-source reference to hardware architectures for big-data analytics; Covers various levels of big-data analytics hardware design abstraction and flow, from device, to circuits and systems; Demonstrates how non-volatile memory (NVM) based hardware platforms can be a viable solution to existing challenges in hardware architecture for big-data analytics.
This comprehensive overview of the history of computing and its industry, and of commercial applications of the computer also outlines the history of how computing operations were managed within American companies. Based on extensive research in the contemporary business literature, this work is one of the few which looks at computing as business history, and it is the first to look at the broad scope of computing from the perspective of the business historian. The work is also directed at business managers to help them appreciate and understand the uses of the computer in their firms.
The lack of adequate and timely IT involvement in the merger and
acquisition process costs companies millions of dollars every year.
Current research shows that IT accounts for 20-30% of the
post-acquisition benefits in a merger or acquisition, and it is
growing. With M&A activity back on an upwards trend, the need
to get IT right has never being greater.
Back of book copy: For professionals: For consumers: All purpose:
Information technology will be the most pervasive and important influence on individuals and organizations in the next 10 years. Impression management is a growing field of study in the management and organizational sciences, which studies the self-presentational approach of individuals and the organizations. This collection of papers is both exploratory and innovative, examining new ways for the corporation to effect its strategy, its organizational design and its development as they are stimulated by the introduction and evolution of information technology. Understanding impression management theory as it moves further into the mainstream of research and practice is critical to corporate strategists, academics, and students.
Good and Schultz demonstrate how the careful identification and management of technologies provide significant advantages that for many managers and firms far outweigh the disadvantages imposed through the invention of these technologies. As part of this exploration, the strategic, organizational, and managerial impacts of technology are explored in a variety of venues. The book discusses such topics as the roots and directions of technology, how technology will change organizational teamwork, its influence on internal and external (e.g., supplier and customer) relationships, opportunities provided technological entrepreneurs, and the influence of technology on marketing, employees, customer partnerships, information systems, and resource strategies. To demonstrate the practical application and to bring in real-life scenarios, a host of business applications are introduced. As a result, this book provides managers a strategic roadmap to using technology for a competitive advantage, while remaining free from the entanglement of specific technologies. |
You may like...
The Humanities and the Modern Politics…
Anders Ekstroem, Hampus Oesth Gustafsson
Hardcover
R3,796
Discovery Miles 37 960
Writing History! - A Companion for…
Jeannette Kamp, Susan Legene, …
Paperback
R605
Discovery Miles 6 050
Memory and the Future - Transnational…
Yifat Gutman, Adam D. Brown, …
Hardcover
R1,402
Discovery Miles 14 020
New Directions in Social and Cultural…
Sasha Handley, Rohan McWilliam, …
Hardcover
R3,187
Discovery Miles 31 870
|