Dr. Dobb's Developer Update
Author :
Publisher :
Page : 12 pages
File Size : 41,54 MB
Release : 1996
Category : Computer programming
ISBN :
Author :
Publisher :
Page : 12 pages
File Size : 41,54 MB
Release : 1996
Category : Computer programming
ISBN :
Author :
Publisher :
Page : pages
File Size : 23,13 MB
Release : 2003-07
Category : Microcomputers
ISBN :
Author :
Publisher :
Page : 108 pages
File Size : 48,96 MB
Release : 1999-01-18
Category :
ISBN :
InfoWorld is targeted to Senior IT professionals. Content is segmented into Channels and Topic Centers. InfoWorld also celebrates people, companies, and projects.
Author : Dirk Homscheid
Publisher : Springer Nature
Page : 251 pages
File Size : 23,65 MB
Release : 2020-10-21
Category : Business & Economics
ISBN : 3658314788
This research aims at synthesizing literature on social capital theory and OSS communities to arrive at a conceptual model of social capital and individuals' value creation in OSS communities. Accordingly, it targets at replicating prior research that used social capital to predict diverse forms of outcome by using alternative operationalizations of the different social capital dimensions as well as forms of outcome and includes firm-sponsorship as moderator into the models. As a result of this research, it can be noted that the proven relationship between an OSS contributor's social capital and his created value is affected by firm-sponsorship. Furthermore, it could be shown that the proven relationship between an OSS contributor's social capital and associated individual outcomes is not affected by firm-sponsorship.
Author : Dimitrios Serpanos
Publisher : Springer
Page : 102 pages
File Size : 33,74 MB
Release : 2017-11-24
Category : Technology & Engineering
ISBN : 3319697153
This book covers essential topics in the architecture and design of Internet of Things (IoT) systems. The authors provide state-of-the-art information that enables readers to design systems that balance functionality, bandwidth, and power consumption, while providing secure and safe operation in the face of a wide range of threat and fault models. Coverage includes essential topics in system modeling, edge/cloud architectures, and security and safety, including cyberphysical systems and industrial control systems.
Author :
Publisher :
Page : 80 pages
File Size : 26,90 MB
Release : 1998-06-08
Category :
ISBN :
For more than 20 years, Network World has been the premier provider of information, intelligence and insight for network and IT executives responsible for the digital nervous systems of large organizations. Readers are responsible for designing, implementing and managing the voice, data and video systems their companies use to support everything from business critical applications to employee collaboration and electronic commerce.
Author : United States. Congress. Senate. Committee on Appropriations. Subcommittee on Energy and Water Development
Publisher :
Page : 682 pages
File Size : 22,38 MB
Release : 1992
Category : Energy development
ISBN :
Author :
Publisher :
Page : 96 pages
File Size : 33,29 MB
Release : 1998-06-08
Category :
ISBN :
For more than 40 years, Computerworld has been the leading source of technology news and information for IT influencers worldwide. Computerworld's award-winning Web site (Computerworld.com), twice-monthly publication, focused conference series and custom research form the hub of the world's largest global IT media network.
Author : United States. Congress. Senate. Committee on Appropriations. Subcommittee on Energy and Water Development
Publisher :
Page : 708 pages
File Size : 21,31 MB
Release : 1992
Category : Nature
ISBN :
Author : William R. Simpson
Publisher : CRC Press
Page : 413 pages
File Size : 18,80 MB
Release : 2016-04-27
Category : Computers
ISBN : 1498764479
Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived fro