首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
不久前有媒体报道家住北京通州的林先生发现,小区底商开了一家名为"嘿客"的门店,进去后发现,这家店里没有食品、饮料、衣服等商品,只有各种商品的纸板广告。店员介绍称,顾客可以预购店内展示商品,通过电子触摸屏平板电脑下单,快递就会送货上门。此外该店可以帮客户代缴水电费、购买飞机票火车票,寄取快递等等。经过询问得知,这家"嘿客"属于顺丰速运旗下。  相似文献   

2.
《网友世界》2013,(23):4-5
原本定位高端商务快递市场的顺丰速递,正在想办法分食电商快递这一高速增长的市场,除了自建电商做经验探索、推出电商类客户特惠产品,顺丰还悄然与腾讯旗下电商易迅达成深度合作,目前顺丰已经接下易迅30%订单量。  相似文献   

3.
前不久,继业务体量超过顺丰后,中通的盈利能力也开始直逼顺丰。为此,顺丰最近召开了一次高管会议,王卫(顺丰总裁)传达的信号很明确,就是要转型,要改革,要突破。但顺丰转型和改革依旧绕不开电商。  相似文献   

4.
如何评判这场物流与电商的跨界战甲企业自身的布局、行业发展的前景,构成预测和评判的纵横坐标,或可如此盖棺定论:京东自建物流是扩充产业链,顺丰进军电商是追逐多元化;但若要从规避国内快递困境、扫清电商发展的物流瓶颈角度来看,二者的跨界均是贡献寥寥。  相似文献   

5.
不甘心受制于电商约束,而是要充分利用自己的送货渠道优势,建立属于自己的交易平台,物流业巨头,正在纷纷编织着自己的"电商梦"。国内快递业的领头羊——顺丰快递获得第三方支付牌照的信息,在电子商务领域产生了一系列的猜想,这也使得电商行业的格局变得愈发扑朔迷离。不仅仅是被动地将商品送货到家,还要涉足前  相似文献   

6.
一刻钟电商     
黄浩 《中国信息化》2013,(18):54-57
物流的“最后一公里”是电商最难突破的一个环节,围绕这个问题.产生了两种不同的解决途径,一是电商自建提货点,将提货点布局到社区这样的微单位体;二是围绕各城市针对社区打造的”一刻钟服务圈”进行电商平台化改造。前者.以物流企业顺丰为代表,而后者.则以城市社区为代表。同时.这种趋势,也让社区便利店,开始触碰电商这种新经营思路。  相似文献   

7.
正今年,随着冷链物流和储存保鲜技术的发展,越来越多的电商企业或传统企业都纷纷切入生鲜电商。目前,整个行业还存在冷链物流设备不足,生鲜物流标准化不够,百姓信任度不高的一些问题。各企业也在纷纷为之努力,京东、天猫等正在搭建自己的冷链配送体系,顺丰更是将冷链物流分拆为独立品  相似文献   

8.
近期,物流备受关注:因为物流,马云和菜鸟火了;因为物流,永辉的"半边天"倒了;因为物流,顺丰进军生鲜电商了……1、马云联合了银泰集团、复星集团、富春集团、顺丰、申通、圆通、中通、韵达组建了一个新公司,名为"菜鸟网络科技有限公司",成立了"中国智能骨干网"物流项目。这是继"物流宝"之后,阿里巴巴集团在物流系统上又一次具有战略意味的举动。2010  相似文献   

9.
近期,马云联合了银泰集团、复星集团、富春集团、顺丰、申通、圆通、中通、韵达组建了一个新公司,名为"菜鸟网络科技有限公司",成立了"中国智能骨干网"物流项目。很明显,马云从淘宝的电商平台向建设物流平台过渡。2012年,淘宝加天猫的销售额超过万亿,在销售数据日创新高的同时,消费者对电商物流的投诉也日渐增多,要么送货非常  相似文献   

10.
正2014年,阿里巴巴的上市在某种程度上意味着中国互联网零售业的老阶段可能正在结束,新阶段可能已经开始孕育,与之相呼应的则是中国零售业互联网综合服务水平需提高到一个新的水平。在今年的互联网零售业中,除了传统的淘宝、天猫、京东、亚马逊等综合性电商巨头的业绩一如既往比较抢眼之外,聚美优品、唯品会等垂直类电商的活跃度和影响力也都处在提升过程中。此外,中粮我买、本来生活、顺丰优  相似文献   

11.
对酒店用电系统进行智能化控制,设计一款基于单片机的节能用电控制装置。该装置以单片机AT89C51为主控芯片,分为走廊、过道等公共区域节能用电控制和客房节能用电控制2个模块。通过光敏电阻、热释电红外传感器、步进电机的巧妙配合,完成光照度和人体存在信息的采集。这种新装置真正达到了在公共区域“人在灯亮,人走灯灭”,客房无人时自动关闭电源的目的。   相似文献   

12.
e-Commerce companies acknowledge that customers are their most important asset and that it is imperative to estimate the potential value of this asset. In conventional marketing, one of the widely accepted methods for evaluating customer value uses models known as Customer Lifetime Value (CLV). However, these existing models suffer from two major shortcomings: They either do not take into account significant attributes of customer behavior unique to e-Commerce, or they do not provide a method for generating specific models from the large body of relevant historical data that can be easily collected in e-Commerce sites. This paper describes a general modeling approach, based on Markov Chain Models, for calculating customer value in the e-Commerce domain. This approach extends existing CLV models, by taking into account a new set of variables required for evaluating customers value in an e-Commerce environment. In addition, we describe how data-mining algorithms can aid in deriving such a model, thereby taking advantage of the historical customer data available in such environments. We then present an application of this modeling approach—the creation of a model for online auctions—one of the fastest-growing and most lucrative types of e-Commerce. The article also describes a case study, which demonstrates how our model provides more accurate predictions than existing conventional CLV models regarding the future income generated by customers. Opher Etzion is a research staff member and the manager of the active management technology group in IBM Research Laboratory in Haifa, Israel, and a visiting research scientist at the Technion—Israel Institute of Technology. He received BA degree in Philosophy from Tel-Aviv University and Ph.D. degree in Computer Science from Temple University, Prior to joining IBM in 1997, he has been a faculty member at the Technion, where he has served as the founding head of the information systems engineering area and graduate program. Prior to his graduate studies, he held professional and managerial positions in industry and in the Israel Air-Force, receiving the air-force highest award in 1982. His research interests include active technology (active databases and beyond), temporal databases, middleware systems and rule-base systems. He is a member of the editorial board of the IIE Transactions Journal, was a guest editor in the Journal of Intelligent Information Systems in 1994, and a guest editor in the International Journal of Cooperative Information Systems (2001). He served as a coordinating organizer of the Dagstuhl seminar on Temporal databases in 1997, has been the coeditor of the book “Temporal Databases—Research and Practice” published by Springer-Verlag, in 2000 he has been program chair of CoopIS'2000, and demo and panel chair of VLDB'2000. He also served in many conferences program committees (e.g. VLDB, ICDE, ER) as well as national committees and has been program and general chair in the NGITS workshop series. Amit Fisher is a research staff member in the active management technology group in IBM Research Laboratory in Haifa, Israel. He received B.Sc. degree in Industrial Engineering and Management and M.Sc. degree in Information System Engineering from the Technion—Israel institute of Technology. Prior to joining IBM research, Amit held a professional position in Israel Air-Force. He's research interests include Customer Behavior Analysis, CRM, Data Mining and Business Process Management. Segev Wasserkrug is a research staff member at IBM's Haifa Research lab (HRL). He has a M.Sc. in computer science, in the area of neural networks. In addition, he has significant experience in modeling of various types, automatic model derivation, and optimization, gained from leading the development of a technology in HRL that deals with optimization of an IT infrastructure according to business objectives. He is also currently studying towards a Ph.D. in information systems at the Technion, Israel Institute of Technology, in the area of uncertainty handling, based on Bayesian network techniques  相似文献   

13.
Xen硬件虚拟化(HVM)是运行于Xen Hypervisor上, 无需修改客户操作系统内核便可实现虚拟化的技术. 但Xen HVM在提升用户体验的同时, 也造成了VMM对客户机的干涉和理解程度的降低, 丧失了进程粒度级别的管理能力. 鉴于此, 提出了一种针对Xen HVM客户机的轻量级进程追踪技术原型Xen HPT. 借助VMM掌握的客户机ESP寄存器信息, 从客户机外部隐式捕获其实时进程信息. 实验证明, 该技术是一种追踪客户机进程的有效方法.  相似文献   

14.
针对Xen虚拟机系统执行网络I/O密集型负载时容易耗尽Domain0的CPU资源而过载和执行计算密集型负载时在客户域平均性能与数目之间存在线性规划的问题,提出了两个负载类型相关的性能模型。首先,通过分析Xen虚拟机系统处理网络I/O操作的CPU资源消耗规律,建立了CPU核共享和CPU核隔离两种情况下的客户域网络I/O操作请求次数计算模型;然后,通过分析多个相同客户域并行执行计算密集型负载的平均性能与一个相同客户域执行相同负载的性能表现之间的关系,建立了并行执行计算密集型负载的客户域平均性能分析模型。实验结果表明,两个性能模型能够有效地限制客户域提交的网络I/O操作请求次数以防止Xen虚拟机系统过载,并求解给定资源配置情况下执行计算密集型负载的Xen虚拟机系统客户域伸缩性数目。  相似文献   

15.
On virtualization platforms, peak memory demand caused by hotspot applications often triggers page swapping in guest OS, causing performance degradation inside and outside of this virtual machine (VM). Even though host holds sufficient memory pages, guest OS is unable to utilize free pages in host directly due to the semantic gap between virtual machine monitor (VMM) and guest operating system (OS). Our work aims at utilizing the free memory scattered in multiple hosts in a virtualization environment to improve the performance of guest swapping in a transparent and implicit way. Based on the insightful analysis of behavioral characteristics of guest swapping, we design and implement a distributed and scalable framework HybridSwap. It dynamically constructs virtual swap pools using various policies, and builds up a synthetic swapping mechanism in a peer-to-peer way, which can adaptively choose different virtual swap pools.We implement the prototype of HybridSwap and evaluate it with some benchmarks in different scenarios. The evaluation results demonstrate that our solution has the ability to promote the guest swapping efficiency indeed and shows a double performance promotion in some cases. Even in the worst case, the system overhead brought by HybridSwap is acceptable.  相似文献   

16.
云计算技术已飞速发展并被广泛应用,虚拟化作为云计算的重要支撑,提高了平台对资源的利用效率与管理能力。作为一款开源虚拟化软件,Xen独特的设计思想与优良的虚拟化性能使其被许多云服务商采用,然而Xen虚拟机监视器同样面临着许多安全问题。Xen为虚拟机提供的特权接口可能被虚拟机恶意代码利用,攻击者可以借此攻击Xen或者运行其上的虚拟机。文章针对Xen向虚拟机提供的超级调用接口面临被恶意虚拟机内核代码利用的问题,提出了一种基于执行路径的分析方法,用以追溯发起该超级调用的虚拟机执行路径,与一个最初的路径训练集进行对比,可以避免超级调用被恶意虚拟机内核代码利用。该方法通过追溯虚拟机内核堆栈信息,结合指令分析与虚拟机内核符号表信息,实现了虚拟化平台下对虚拟机执行路径的动态追踪与重构。在Xen下进行实验,通过创建新的虚拟机并让其单独运行来获得训练集,训练集中包含所有发起该超级调用的虚拟机路径信息。在随后虚拟机运行过程中针对该超级调用动态构造出对应的虚拟机执行路径,将其与训练集对比,避免非正常执行路径的超级调用发生。  相似文献   

17.
We present the design, implementation, and performance evaluation of a suite of resource policing mechanisms that allow guest processes to efficiently and unobtrusively exploit otherwise idle workstation resources. Unlike traditional policies that harvest cycles only from unused machines, we employ fine-grained cycle stealing to exploit resources even from machines that have active users. We developed a suite of kernel extensions that enable these policies to operate without significantly impacting host processes: 1) a new starvation-level CPU priority for guest jobs, 2) a new page replacement policy that imposes hard bounds on physical memory usage by guest processes, and 3) a new I/O scheduling mechanism called rate windows that throttle guest processes' usage of I/O and network bandwidth. We evaluate both the individual impacts of each mechanism, and their utility for our fine-grain cycle stealing.  相似文献   

18.
Abstract

This paper presents a combinatorial method of grouping objects into guest families, and of providing accommodation in a system of host cells. The method maximises the amount of hospitality extended by the hosts towards the guests. A guest job requiring few facilities will have a greater chance of finding a host cell than a more demanding guest job, and not all the host cells will be equally busy. As a consequence, there will be greater scheduling flexibility and better cell utilisation.  相似文献   

19.
互联网网站的发展为人类知识与信息的传播提供了前所未有的便利,但是,人们在正常浏览的同时,也有人恶意下载或非法下载,甚至非法修改网站,损害了网站拥有者的合法权益。针对客户对网站的访问,本文提出了网站服务器客户行为模糊监控方法。对于客户浏览网页链接跳转所用的时间,运用模糊分析技术,确定客户的操作行为是正常浏览还是下载,对恶...  相似文献   

20.
This study considers those questions posed by students during e-mail “tutorials” to elicit information from “guest lecturers” and the use of that information by students in their essays. The “tutorials” were conducted for students in the U.K. by a “guest lecturer” in France. The “guest lecturer” was accredited as a tutor on the module for which the students were enrolled, and participated in the module by the provision of lecture notes prior to the e-mail tutorials. Data for the study, drawn from a comparative education assignment set for undergraduate students enrolled on the module, comprised surveys of students' perceived IT capabilities and attitudes towards IT, analyses of students' questions and analyses of students' essays. The findings of the study indicate (1) that tutees tend to pose questions to elicit information or clarification rather than to elicit the viewpoint or opinions of the “guest lecturer” and (2) that two-thirds of tutees' essays cited information elicited from the “guest lecturer”.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号