Sciweavers

1205 search results - page 227 / 241
» Mobile product customization
Sort
View
USS
2008
15 years 18 hour ago
Highly Predictive Blacklisting
The notion of blacklisting communication sources has been a well-established defensive measure since the origins of the Internet community. In particular, the practice of compilin...
Jian Zhang, Phillip A. Porras, Johannes Ullrich
FAST
2007
14 years 11 months ago
Disk Failures in the Real World: What Does an MTTF of 1, 000, 000 Hours Mean to You?
Component failure in large-scale IT installations is becoming an ever larger problem as the number of components in a single cluster approaches a million. In this paper, we presen...
Bianca Schroeder, Garth A. Gibson
73
Voted
ECIS
2004
14 years 11 months ago
Organizational Performance of a Firm in a Modular Business Network
The organizational capabilities to interact with others have been greatly improved as a result of modern information and communications technologies: Nowadays a company can mainta...
Diederik W. van Liere, Lorike Hagdorn van der Meij...
AUSFORENSICS
2003
14 years 11 months ago
Computer Forensics in the Global Enterprise
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow...
Melisa Bleasdale, Scott Mann, John Patzakis
IADIS
2003
14 years 11 months ago
E-Banking and the Older User: Toward an Inclusive Accessible Policy
Recent developments in information and communication technology have set in motion a revolution within the Banking sector which has resulted in a new channel for banking services ...
David Eddie