首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 10 毫秒
1.
《ITNOW》2000,42(4):24
  相似文献   

2.
The key to this enterprise-level strategic positioning is understanding the scope of the product line. A product line's scope states what systems an organization would be willing to build as part of its product line and what systems it would not. In other words, it defines what's in and what's out. Explicitly scoping the product line lets us examine regions in the neighborhood that are underrepresented by actual products in the marketplace, make small extensions to the product line, and move quickly to fill the gap. In short, a consciously preplanned, proactive product line scope helps organizations take charge of their own fate. The scope feeds other product line artifacts; the requirements, architecture, and components all take their cues for the variabilities they need to provide from the scope statement.  相似文献   

3.
4.
投影机,一定会是个越来越令人兴奋的产品,虽然不会像手机一样和人们的生活息息相关,但却能给你带来超乎想象的视觉享受和便利。当投影机不再笨重,当投影机不再是一个操作复杂的设备,投影就会等于随身+随时+随意+随心的快乐。  相似文献   

5.
Summary. We present a simple and efficient wait-free implementation of Lazy Large Load-Linked/Store-Conditional (Lazy-LL/SC), which can be used to atomically modify a dynamically-determined set of shared variables in a lock-free manner. The semantics of Lazy-LL/SC is weaker than that of similar objects used by us previously to design lock-free and wait-free constructions, and as a result can be implemented more efficiently. However, we show that Lazy-LL/SC is strong enough to be used in existing non-blocking universal constructions and to build new ones. Received: December 2000 / Accepted: September 2001  相似文献   

6.
7.
Agile development approaches emphasize working software, customer collaboration, adaptation, and a strong commitment to achieving business results. In this article, we use the Human Capital Theory as the rationale for why IT professionals possessing agile skills garner salary benefits. We then employ a Human Capital Model to estimate the benefits. Further, we investigate two specific categories of IT job types: software application development professionals and IT professionals at the strategic level of organizations. Our Human Capital Model was fit using a data set from an online survey of IT professionals with 12,893 respondents. Our results confirm the Agile benefits with an overall salary premium of 22.6%. We also specifically discuss the various premiums across application development job titles as well as strategic positions. Based on our findings, we draw practical implications for both IT professionals and management.  相似文献   

8.
9.
《Software, IEEE》2007,24(1):14-15
Software systems usually have the same basic architectural pattern as their earlier incarnations, manifesting in decreasingly refined forms as we move back in time. Similarly, when a new problem confronts us, we try many different approaches, but over time, for the same kind of problem, solutions tend to converge to the same, more constrained, solution space  相似文献   

10.
Chip talk     
  相似文献   

11.
What we talk about when we talk about context   总被引:7,自引:1,他引:6  
The emergence of ubiquitous computing as a new design paradigm poses significant challenges for human-computer interaction (HCI) and interaction design. Traditionally, HCI has taken place within a constrained and well-understood domain of experience—single users sitting at desks and interacting with conventionally-designed computers employing screens, keyboards and mice for interaction. New opportunities have engendered considerable interest in context-aware computing—computational systems that can sense and respond to aspects of the settings in which they are used. However, considerable confusion surrounds the notion of context—what it means, what it includes and what role it plays in interactive systems. This paper suggests that the representational stance implied by conventional interpretations of context misinterprets the role of context in everyday human activity, and proposes an alternative model that suggests different directions for design.
Paul DourishEmail: URL: http://www.ics.uci.edu/~jpd
  相似文献   

12.
13.
14.
由于当前对于Web应用系统安全性的研究仅仅停留在服务安全的实现方面,对于安全测试性技术研究依然薄弱。随着Web应用的普及,越来越多的技术研究人员开始重视Web应用系统的安全性检测,越来越多的检查工具被开发了出来。本文基于Web常见的安全性问题,分析Web服务安全性测试框架,以此来探讨安全性测试技术,希望能够提升Web应用系统的安全性。  相似文献   

15.
在保护网络信息安全和抵御黑客攻击的行为中,端口扫描和检测技术存在紧密的关系。一方面,通过端口扫描获取目标主机的端口号和基本信息已经成为Hacker最主要的手段,另一方面,检测技术研究是一种主动的防御措施,能够弥补杀毒软件、防火墙等产品的不足。本文将通过对网络端口扫描技术的基本原理分析,探讨相关的检测技术及防范问题。  相似文献   

16.
International Journal of Computer-Supported Collaborative Learning - High-quality talk about issues that raise high-intensity emotions in the public sphere is timely needed. Still, researchers...  相似文献   

17.
本文简要介绍了嗅探器的工作原理及其可能造成的危害,最后给出了发现及防范嗅探器的方法.  相似文献   

18.
In IT circles, converting systems to the euro is considered the next “Y2K.” Whereas Y2K involved correcting a set of dates, euro conversion involves currency regulations of the European Monetary Union (EMU) as well as those of the EMU member countries. Thus, migrating to the euro is far more complex than solving Y2K. To help IT managers cope with the difficulties of converting systems to the euro, the Euro Working Group (EWG) was formed. in this article, the chairman of the EWG presents the group's strategies for switching information systems to the new currency.  相似文献   

19.
Multimedia CD-ROMs carry enormous quantities of textual, video and graphical information, connected by numbers of hypertext links. With no clear, linear narrative, this mass of information can be baffling for novice users. Using case study methodology, this paper examines how pairs of first time student users navigated through a multimedia geography disc together. The students and their on-screen actions were videotaped and their discussions analysed to reveal three initial categories of talk, entitled route, function and content. These categories describe the students' overall comprehension of the content design, the functionality of the individual screen, and its relevance to the set task. In conclusion, recommendations are made for teachers wishing to introduce similar materials to their classrooms.  相似文献   

20.
网络,在传播信息、便捷生活的同时,对青少年的身心发展也产生了深刻影响,目前,我国尚无一部较为系统的立法针对青少年网络安全问题做出规范.本文将青少年网络安全问题作为立足点,剖析了网络安全出现问题的具体原因,诸如信息多且杂、个人信息容易泄露、利用网络诱导青少年犯罪、网瘾等,这些因素正不断威胁着青少年的人身和财产安全.因此,本文认为,制定有关网络安全的立法,切实保护青少年上网安全,保护祖国未来的身心健康迫在眉睫,我国必须制定专门立法并对相关法律法规加以完善,发挥法律强有力的社会规范作用,为保障青少年有一个健康良好的上网环境.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号