The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Proxying is a simple and effective means of allowing network hosts to sleep while maintaining network presence. It is the use of a low-power entity to maintain presence on the network for a high-power device like a PC. The component that does this, the proxy, can be internal to a device (for example, in the network interface chip within a PC), in an immediately adjacent network switch or router, or...
Cybersecurity was the topic in this paper. The author mention that advancing cybersecurity begins by recognizing all its aspects as a vector quantity with four distinct forces shaping its evolution. Rebranding exercise, organizational imperative, cyberspace domain, national defense priority were the forces mentioned and discussed.
Auditors validate information about organizations and their business processes. Reliable information is needed to determine whether these processes are executed within certain boundaries set by managers, governments, and other stakeholders. Violations of specific rules enforced by law or company policies may indicate fraud, malpractice, risks, or inefficiencies. Traditionally, an audit can only provide...
In the absence of other published standards of care, it is reasonable for contractual parties to rely on an applicable, widely available code of conduct to guide expectations. The authors illustrate the current application of CoCs with a fictional enterprise resource planning (ERP) system implementation failure that is a compilation of real-life cases. Subject to binding panel arbitration, the plaintiff...
IT has matured rapidly and, thanks to an extremely active and tight-knit academic community, undergone a transition unlike any other computing discipline.
Cancer-care costs are increasing despite the expansion of disease management and prevention programs. While tremendous scientific progress has led to new tools for diagnosis, treatment, and follow-up, evidence is less complete on the comparative effectiveness of these interventions in actual community practice.
Design decisions made at one level of abstraction often conflict with decisions made at other levels, limiting or even eliminating the expected energy-efficiency increase.
The article discusses five perspectives expressing different facets of IT value. Each perspective has merit, with both proponents and detractors. Some deal more with the actual technology, while others focus on its artifacts. The best way to consider IT is to use multiple perspectives. A single measure such as net present value doesn't adequately explain IT's impact on an organization. Taken together,...
Computer scientists are working with biomedical researchers, policy specialists, and medical practitioners to usher in a new era in healthcare. A recently convened panel of experts considered various research opportunities for technology-mediated social participation in Health 2.0.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.