The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The use of hardware description languages in British industries and universities is presented here, including both linguistic and graphical forms of representation.
Most French manufacturers have been using computer languages to describe logic circuits and microprograms and to simulate them in order to check out computer designs. Several languages have been developed at the Compagnie des Machines Bull1 and at the Compagnie C.A.E.2 More recently, the Compagnie Telemecanique Electrique has developed a macrolanguage for describing and generating microprogram sequences...
Not too long ago, Bob Moody's idea of a computer store was a warehouse full of used 360's. At least, that's what first came into his mind when Paul Terrell suggested they pool their resources to open shop. Now just two years after the two of them founded the original Byte Shop (there are currently over 40 individually owned Byte Shops across the country), Moody is, one of the most seasoned entrepreneurs...
The authors discuss the need for protection in commercial organizations, and the way in which control principles have met this need, despite having evolved before computer systems came into use. The basis for these principles is the concept of authority and how it is designated within an organization. A simulation model for access control, written in Prolog, is presented.<<ETX>>
Many people associate peer-to-peer technology with file-sharing applications such as BitTorrent, Gnutella, Kazaa, and Napster and with concerns about the unauthorized, free distribution of video, audio, and other copyrighted content. These concerns have led the entertainment industry to crack down on P2P systems. For example, the US Recording Industry Association of America (RIAA) has taken numerous...
Recent developments in the continuing migration from physical to electronic entertainment media will have far-reaching implications. Amazon's Kindle points to one possibility with its EVDO-based wireless network capability. With this feature, consumers can buy and download new e-books anytime, anywhere.
Social networks such as Bebo, Flickr, Facebook, Friendster, Linkedln, MySpace, and Orkut have attracted millions of users who are involved in blogging, participatory book reviewing, personal networking, photo sharing, and other similar activities. The users have freely submitted personal data to proprietary databases so that they can communicate and share with other participants. However, some have...
Increasingly popular for more than a decade, massively multiplayer online role-playing games now generate remarkable revenues. The current king of MMORPGs, World of Warcraft, boasts 10 million active subscribers as of early 2008. Developed by Blizzard, WoW hosts a virtual population larger than the real-world populations of countries such as Sweden and Hungary.
Collaborating centers in time zones six to eight hours apart can transfer work so that every center is working during the daytime. Although this concept avoids the hazards of night work, it requires careful planning and a way to automatically capture evolving knowledge.
Example digital wallet applications support secure P2P mobile cash transactions and alleviate point-of-sale confusion for consumers using multiple payment, discount, and loyalty cards.
Developing a green IT strategy for any organization, large or small, is critical to establishing a culture where the focus is on reducing cost and addressing both imminent regulatory pressure and increased scrutiny of carbon-neutral strategies. This paper discusses the "green practices" that can be used by organisations for energy efficiency improvements and also to avoid potential disruptions...
The software engineering code of ethics and professional practice encourages software engineers to undertake positive actions and to resist pressures to act unethically.
In this paper, the issues regarding computing professionals and their personal skill required in industry is discussed. A study commissioned by a Spanish private university analyzed the social and organizational image of professional graduates in various fields. This study found that computing people tend to be considered technically competent and efficient, but were seen as outliers in the game of...
Internships help students determine their future career paths while providing companies with creative and energetic contributors who offer fresh perspectives and innovative skills.
The article discusses the Web 2.0 software and open innovation. Open innovation enables companies to share the costs of research while capitalizing on the creativity they harness. Technologies such as service-oriented architectures and service delivery platforms (SDP) enable service providers to achieve open innovation. The SDP serves as a controlled environment for services coming from the network,...
Traditionally, business intelligence provides companies with important, but not real-time or predictive, analysis. Moreover, only technical specialists have typically run BI tools and have done so just for the benefit of management. Pervasive BI remedies these limitations.
The role of HP Labs, the central research arm of Hewlett-Packard, is to look beyond the roadmap of currently offered products and services and solve some exciting technical problems that will be critical to customers. The paper mentions that active collaboration with academic, commercial, and government partners augments and accelerates knowledge creation and technology transfer.
Users' computing behavior is very complex, and capturing it fully is a true Grand Challenge. Yet it seems obvious that if we can predict that behavior more accurately, we could design more energy-efficient systems. We must leverage behavioral information in both directions. On one hand, we need to understand how people interact with computers and design software and hardware that make interaction...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.