Synopsis: Ict: Computer: Computers:


The 2013 EU SURVEY on R&D Investment Business Trends.pdf

Million euros in 2011.5%0%5%10%Software & Computer Services Pharmaceuticals & Biotechnology Technology Hardware & Equipment Health care Equipment & Services Electronic & Electrical Equipment General

Technology Hardware & Equipment, Software & Computer Services, and Health care Equipment & Services 49 47%Medium R&d intensity Industrial Engineering, Electronic & Electrical Equipment, Automobiles & Parts, Chemicals, Aerospace & Defence, General Industrials

-5%0%5%10%15%Software & Computer Services Pharmaceuticals & Biotechnology Technology Hardware & Equipment Health care Equipment & Services Electronic & Electrical Equipment General

%In the high R&d intensity sectors, pharmaceuticals & biotechnology and software & computer services are the drivers of expectations in the US and Canada, China and India.

pharmaceuticals & biotechnology, technology hardware & equipment, software & computer services, health care equipment & services,

sector group**Pharmaceuticals & Biotechnology 24 108 22.2%above 40%High technology Hardware & Equipment 10 47 21.3%above 40%High Software & Computer Services 8


The future internet.pdf

SL 5 Computer Communication Networks and Telecommunications The Editor (s)( if applicable) and the Author (s) 2011.

Mobile devices the Internet can now be accessed from a wide variety of mobile devices including smart phones

Internet Architecture, Limitations, Processing, Handling, Storage, Transmission, Control, Design Objectives, EC FIARCH group. 1 Introduction The Internet has evolved from a remote access to mainframe computers and slow

It is expected that the number 8 T. Zahariadis et al. of nodes (computers, terminals mobile devices, sensors, etc.

computers (e g.,, terminals, servers, etc. CPUS, etc. and handlers (software programs/routines) that generate and treat as well as query

ACM Computer Communications 33 (17), 2105 2115 (2010) 19 Freedman, M.:Experiences with Coralcdn: A Five-Year Operational View.

ACM SIGCOMM Computer Communication Review 39 (5)( 2009) 26 Eggert, L.:Quality-of-Service: An End System Perspective.

ACM SIGCOMM Computer Communication Review (Oct. 2010), http://www2. research. att. com/bala/papers/ccr10-priv. pdf 33 W3c Workshop

and Protocols For Computer Communications (Karlsruhe, Germany, SIGCOMM'03, Karlsruhe, Germany, August 25 29,2003, pp. 3 10.

The International Journal of Computer and Telecommunications Networking 54 (5)( 2010) 15. Galis, A.,Denazis, S.,Bassi, A.,Berl, A.,Fischer, A.,de Meer, H.,Strassner, J.,Davy, S.,Macedo, D.,Pujolle, G.,Loyola, J. R

and operators thanks to the success of novel, extremely practical smartphones, portable computers with easy-to-use 3g USB modems and attractive business models.

, keep track of the location of mobile devices and participate in GTP signaling between the GGSN and RNC.

Journal of Computer Communications 31 (10), 2457 2467 (2008) J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 51 66,2011.

Computer Communications (July 2010), 63 pp. http://www1. cse. wustl. edu/jain/papers/ftp/i3survey. pdf 12.

1st IFIP/IEEE Manfi Intl Workshop, In conjunction 11th IEEE IM2009, Long island, NY, USA, June 2009, IEEE Computer Society Press, Los

ACM SIGCOM Computer Communication Review 37 (3)( 2007) 25. Strassner, J.,Agoulmine, N.,Lehtihet, E.:

a computer in the network or an embedded server may act as the REP host for a resource,

and Vincenzo Suraci2 1 University of Rome La Sapienza, Computer and System Sciences Department Via Ariosto 25,00185 Rome, Italy {castrucci, dellipriscoli, pietrabissa}@ dis

when the exponential growth of small and/or mobile devices and sensors, of services and of security requirements began to show that current Internet is becoming itself a bottleneck.

International Journal of Human and Computer Studies, 43 (5 6): 907 928 (1995) 16 ITU-T:

Proceedings of the Fall Joint Computer Conference. AFIPS November 14-16, Volume 31, pp. 525 534.

19th IEEE International Conference on Computer Communications and Networks (ICCCN 2010), Zürich, Switzerland (August 2010) 11.

for example mobile devices have multiple interfaces. MPTCP supports the use of multiple paths between source and destination.

ACM SIGCOMM Computer Communications Review 40 (2)( 2010) 8. Kostopoulos, A.,Warma, H.,Leva, T.,Heinrich, B.,Ford, A.,Eggert, L.:

Computer Communication Review 35,2 (2005) 20. Key, P.,Massoulie, P.,Towsley, D.:Combined Multipath Routing and Congestion Control:

Furthermore, the Internet is increasingly pervading society 3. Widespread access to the Internet via mobile devices, an ever-growing number of broadband users worldwide,

and WIMAGIC try to design technical solutions that achieve efficient spectrum usage for mobile devices. Following the increasing consensus on benefits of incorporating economic incentive mechanisms in technical solutions, several projects like Trilogy, Smoothit, ETICS,

IEEE Computer Society Press, Los Alamitos (2004) 20. Carpenter, B.:rfc1958: Architectural Principles of the Internet.

IEEE Computer Society Press, Los Alamitos (1981), doi: 10.1109/SFCS. 1981.32 10. Erlingsson, U.,Schneider, F. B.:

IEEE Computer Society Press, Los Alamitos (2000) 11. France, R.,Fleurey, F.,Reddy, R.,Baudry, B.,Ghosh, S.:

IEEE Computer Society Press, Los Alamitos (2007) 12. Giorgini, P.,Mouratidis, H.,Zannone, N.:Modelling security and trust with secure tropos.

Google and the US Computer Emergency Readiness Team (US-CERT) were informed and the vulnerability was kept confidential until Google developed a new version of the authentication service

IEEE Computer Society Press, Los Alamitos (2001) 8. Bodei, C.,Buchholtz, M.,Degano, P.,Nielson, F.,Nielson, H r.:

Proceedings of the 17th ACM conference on Computer and Communications security (CCS 2010), pp. 260 269.

IEEE Computer Society Press, Los Alamitos (2008) 12. Ciob aca, S.,Cortier, V.:Protocol composition for arbitrary primitives.

IEEE Computer Society Press, Los Alamitos (2010) 13. Clarke, E. M.,Grumberg, O.,Peled, D. A.:

Proceedings of 17th ACM conference on Computer and Communications security (CCS 2010), pp. 351 360. ACM Press, New york (2010) 22.

IEEE Computer Society Press, Los Alamitos (1977) 26. T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol, Version 1. 2. IETF RFC 5246 (Aug. 2008) 27.

Cloud computing goes beyond technological infrastructure that derives from the convergence of computer server power, storage and network bandwidth.

IEEE Computer Society Press, Los Alamitos (2010), doi: 10.1109/ICDCSW. 2010.39 4. Cabuk, S.,Dalton, C i.,Eriksson, K.,Kuhlmann, D.,Ramasamy, H. V.,Ramunno, G.,Sadeghi, A r.,Schunter

Top threats to cloud computing, version 1. 0. March 2010), http://www. cloudsecurityalliance. org/topthreats/csathreats. v1. 0. pdf 8. Computer and Communication

Proceedings of the 16th ACM conference on Computer and communications security, Chicago, Illinois, USA. CCS'09, pp. 199 212.

IEEE Computer, 34 41 (April 2005) 6. Anerousis, N.,Hjlmtysson, G.:Service level routing on the Internet.

ACM SIGCOMM Computer Communication Review 35 (5), 71 74 (2005) 20. Phuoc Tran-Gia. G-Lab:

Proceedings of the International Conference on Ultra Modern Telecommunications (ICUMT-2009), pp. 1 6. IEEE Computer Society Press, Los Alamitos (2009) 32.

laptops and other network-enabled devices). Thus, a fitness function is presented which is able to evaluate the eligibility of each candidate node

According to this scenario, a node which acts as a traffic source like a laptop or a camera is out of the coverage of the infrastructure.

INFOCOM 2006, 25th IEEE International Conference on Computer Communications (2006) 3. Rong, B.,Hafid, A.:

Computer Communications 31,1763 1776 (2008) 5. Verma, A.,Sawant, H.,Tan, J.:Selection and navigation of mobile sensor nodes using a sensor network.

CCGRID'09, p. 1. IEEE Computer Society Press, Los Alamitos (2009), doi: 10.1109/CCGRID. 2009.97 20 Mintotalpower:

Computer 38 (4), 34 41 (2005) 11. Chowdhury, N m.,Boutaba, R.:Network Virtualization: State of the art and Research Challenges.

and this process 398 Q. Zhang and E. Izquierdo took only a few seconds on a PC with Pentium D CPU 3. 40ghz and 2. 00gb of RAM.

IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 994 999 (1997) 4. Chang, E.,Goh, K.,Sychay, G.,Wu, G.:

IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 2 (2003) 12. Hoiem, D.,Sukthankar, R.,Schneiderman, H.,Huston, L.:

IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 2 (2004) 13. Kherfi, M. L.,Ziou, D.:

and Signal Processing ICASSP'04, vol. 3, IEEE Computer Society Press, Los Alamitos (2004) 16.

Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 1, pp. 200 206 (1999) 19.

'there is an active entity (a person, an organization, a computer, a robot, etc. that provides the services, with a given cost and time (not to mention SLA, etc.

Tangible entity, from computers to aircrafts, to buildings and furniture. Intangible entity, for which a digital image is mandatory.

summarised in the sentence‘The Network is the Computer'.'As it happens with early intuitions,

As a next prophecy we propose the Enterprise is the Computer, meaning that an enterprise,

Research projects following this direction have focused on microprocessor design, computer design, power-on-demand architectures and virtual machine consolidation techniques.

such as mobile devices (e g. smart phones), the semantic web, cloud computing, and the Internet of things (Iot) promoting real world user interfaces.

Smart cities, from smart phones, mobile devices, sensors, embedded systems, smart environments, smart meters, and instrumentation sustaining the intelligence of cities.

with the help of instrumentation and interconnection of mobile devices, sensors and actuators allowing real-world urban data to be collected

Tourism information in different parts of the city through mobile devices using visual and interactive experiences and in different languages.


The Impact of Innovation and Social Interactions on Product Usage - Paulo Albuquerque & Yulia Nevskaya.pdf

and social communities through smartphones, computers, and their gaming consoles (Williams, Yee, and Caplan, 2008),

and blogs in 2011 and 42%of tablet owners use them daily while watching TV (Nielsen, 2011).

We demonstrate its application with the study of consumer demand in the online computer gaming industry. 3. 1 An Online Game We use data from the online game World of Warcraft developed by Blizzard Entertainment, a division

and became the best-selling PC game of 2005 and 2006 worldwide. By 2011, Blizzard had launched three full-fledged expansions

Debunking the stereotypical gamer profile, Journal of Computer-Mediated Communication, 13, pp. 993-1018.44. Yao, S.,C. F. Mela, J. Chiang,


The Relationship between innovation, knowledge, performance in family and non-family firms_ an analysis of SMEs.pdf

Petrakis, PE, & Kostis, PC. 2012). ) The role of knowledge and trust in SMES. Journal of the Knowledge Economy, 1 20. doi:


the_open_book_of_social_innovationNESTA.pdf

Examples include computers in classrooms, the use of assistive devices for the elderly, or implants to cut teenage pregnancy.

Through experiment it is discovered then how these work best (such as the discovery that giving computers to two children to share is more effective for education than giving them one each.


TOWARDS TOWARDS A NETWORK NETWORK OF DIGITAL BUSINESS ECOSYSTEMS_2002.pdf

The technological infrastructure, the components, the services lives within a set of interconnected computer nodes based on the geographical areas

The realization of living, 1980, D. Reidel Publishing company, Dordrecht, Holland Terry Winograd and Fernando Flores, Understanding Computer and Cognition, a new foundation for design, 1986, Ablex


Triple_Helix_Systems.pdf

like computer networking, winnowed from a larger collection (Miller, 1997). Yet another situation is when one space becomes the basis for the enhancement of the others,

the making of the personal computer. Mcgraw-hill, New york. Galende, J.,Suarez I. 1999. A resource-based analysis of the factors determining a firm's R&d activities.


U-Multirank Final Report - June 2011.pdf

(compulsory or recommended) Data easily available. 14 Computer Facilities: internet access Index including: hardware; internet access, including WLAN;(

access to computer support Data easily available. 15 Student gender balance Number of female students as a percentage of total enrolment Indicates social equity (a balanced situation is considered preferable.

One may mention audio visual recordings, computer software and databases, technical drawings, designs or working models, major works in production or exhibition and/or award-winning

Social climate A a Quality of courses A a Support by teacher A a Computer facilities A a Overall judgment A a Libraries B A Laboratories B A There are no major

"On Doctors, Mechanics, and Computer Specialists: The Economics of Credence Goods"Journal of Economic Literature 44 (1): 5-42.


Vincenzo Morabito (auth.)-Trends and Challenges in Digital Business Innovation-Springer International Publishing (2014) (1).pdf

and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.

, MIT Sloan Management Review, IEEE Computer, or the Communications of the ACM (CACM) have such a mission of connecting research and industry practices,

100 5. 4. 2 Bring Your Own Media Tablet...100 5. 4. 3 Bring Your Own Device for Vendors...

Maturity Model Integration COBIT Control Objectives for Information and related Technology COC Cross Organizational Collaboration Cop Community of Practice CRM Customer relationship management CSCW Computer

, Wii, ipad, ipod, among others, represent an artificial extension of their human being, allowing a seamless integration of the virtual world of social networks and playground as part of their own everyday life.

It is worth noting that computer based information systems are a specific type of information system and not exhaustive 36.

Thus, DDSS refer to streams of real-time information by mobile devices and internet of things, that have to be captured

the latter referring to streams of real-time information by mobile devices and internet of things, that have to be captured

Kharif O (2013) ATMS that look like ipads. Bloom Businessweek, pp 38 39 39. Han J, Haihong E, Le G, Du J (2011) Survey on Nosql database.

we use computers, how we access information, how businesses derive value from ICT and how consumers live their daily lives.

and allows improved automation of the production process by using computer controlled machines. Moreover, marketing has benefited from ICT in many ways such as analyzing the results of market research in more effective ways by utilizing the capabilities of Business intelligence (BI),

which enables the user to access the cloud computing resource from different platforms, such as mobile phones, laptops or PDAS. 3. Improved accessibility,

which allows users to rent virtual computers on which to run their own computer applications.

It runs over HTTP using REST and SOAP protocols. It gives the subscribers the ability to launch

Server consolidation is an approach to the efficient usage of computer server resources for the sake of cost and electricity savings 7. However,

which the modern computer is based, and Delphi Method, which is a type of a collective decision-making method 20,

IEEE symposium on computers and communications, pp 129 134 8. Khajeh-hosseini A, Greenwood D, Sommerville I (2010) Cloud migration:

Indeed, in the days when mobile devices such as smartphones and tablets have overtaken the role of Personal computers (PCS) and their leadership in terms of market-share,

and tablets cycles respectively) we are entering, faster than before, a third Computing Cycle of‘‘Wearables/Drivables/Flyables/Scannables''devices 2. Considering smartphones and tablets,

IDC has predicted that tablet shipments will hit 229.3 million units in 2013, further expecting they will exceed PC shipments by 2015.

This phenomenon can be related to other changes always noticed by Mary Meeker and Liang Wu for relevant players in the digital business, such as, e g.:

for example, consider the growing importance of location-based application on mobile devices for marketing activities and social sensing (discussed in detail in the following Chap. 4) 15.

However the diffusion of mobile devices such as, e g.,, smartphones and ipads or tablets, does not entail a consequent success of no matter services provided through them and accessible to a correspondent wide audience.

Furthermore, also the adoption of the above technologies may still find resistance by final users

+Smart mobile communications iphone, ipad, Android OS Smartphones and tablets Cloud computing Amazon, dropbox, Google, Salesforce. com, Windows Azure, etc.

Accordingly, the analyses of 21 have been based on anchors and adjustments related to individuals'general beliefs regarding a technology (in that case computers) and its use.

computer anxiety influence on perceived ease of use, when moderated by experience. As said above the research of TAM has produced a vast literature,

elaborated from 21 Constructs Anchors Control Computer self-efficacy Perceptions of external control or facilitating conditions Intrinsic motivation Computer playfulness Emotion Computer anxiety 6 With a‘‘feedback''effect also on the internal portfolio of technologies, due to the adoption of personal devices by employees for work,

as we are going to see in Chap. 5 on the IT Consumerization phenomenon. 52 3 Mobile Services use and perceived usefulness), classified as‘‘general technology perceptions,

Demonstrability Anchor Computer Self-Efficacy Perceptions of external control Computer Anxiety Computer Playfulness Adjustment Perceived Enjoyment Objective Usability Technology Acceptance Model

in particular, referring to mobile devices, applications, and services have to be related to other research streams investigating, e g.,

, the difference of usage behavior between mobile phones and personal computers. In particular, it is worth mentioning the work by Ghose et al. 28

, the desktop or personal computer ones, in the following Section we are going to discuss which digital management solutions can be considered

Considering Mobile device Management solutions, they facilitate the management of devices deployed across different mobile operators

and configuration for all mobile devices (company-owned as well as employee-owned) in the network of a given company.

which kept applications on corporate servers with only core parts or a subset of an application's code installed on the device, making the other packages available in streaming on the user's mobile device,

Finally, Mobile device Virtualization solutions are a kind of hardware virtualization, allowing, e g.,, the use of two or more operating systems on the same mobile device.

These solutions on the one hand, provide the user with a certain Table 3. 6 Solutions suitable to enable device security management Solutions Benefits Drawbacks Mobile device management Simple to install Provide centralized management of the devices used by the user

Manage only devices, so the IT department of a company has to define policies to regulate the practices of users Application streaming The data is stored not directly on the device as well as a part of the application code,

thus, not guaranteeing fast delivery of the service Mobile device virtualization The device can be used safely, even for personal purposes,

To this end, the adopted solution should have been able to operate on different mobile devices, regardless of operating system,

the acquisition and processing of the orders were carried out on paper forms or by personal computer (which,

and implemented with Vodafone a Sales force Automation mobile app for ios based tablets (ipad). The goal of the solution was to provide more useful information to sellers to increase the effectiveness of the sales (historical data on the customer, complete catalog, real time inventory, etc.

Thanks to the optical scanning of product codes, using the camera of the tablet, and the access to historical cases of sales, the process of acquisition of orders has been streamlined, likewise.

Indeed, goods receipts have been carried then out automatically with Kymantm by Datalogic Mobile Wireless Handheld Computer and Barcode Scanner.

Indeed, the operators have to be able to scan the barcode using the optical drive of the tablet supplied,

reducing time, increasing productivity and efficiency through the use of tablets and mobile applications development.

we refer the reader to the discussion on social sensing in Chap. 4. 10 Mobile devices designed to survive demanding environments, harsh conditions,

PC shipments worse than predicted, tablet shipments get better. Infoworld 4. Rai A, Sambamurthy V (2006) Editorial notes the growth of interest in services management:

integrating perceived behavioral control, computer anxiety and enjoyment into the technology acceptance model. Inf Syst Res 11: 342 365 22.

Datalogic (2012) Mobile computers connected to SAP: wireless inventory and warehouse management for Habasit 34.

and tablets, likewise (as seen in Chap. 3). However, mobile technologies are only one of the several facets of

, the ones in mobile device, but also social networks, and web technologies to infer data about people preferences, activities,

and minimize the cost, focusing on a high degree of automation (see also Chap. 1 of this book for storage issues for Big data) 4. 5 Social Sensing 79 mobile phones and tablets or ipad.

Nokia works in the international telecomm market, producing mobile devices, providing services and solution for worldwide dynamics

IEEE International Conference Pervasive Computer Communication Work PERCOM Work, pp 525 530 36. Aggarwal C, Abdelzaher T (2013) Social Sensing.

and strategies that concern this trend as well as to understand its implications on the businesses. 5. 1 Introduction It is very common nowadays to see workers from different levels in different companies bring their own laptops to the work environment to use them to do

example of this phenomenon is the use of the personal smartphones or tablet devices, since employees can take them anywhere

A major driver of mobile device usage in the work environments has been the emergence of cloud computing. As mentioned before

mobile devices usage increases exponentially. In fact, a Gartner group prediction, reported by the Economist 4, states 1 billion smartphones will be sold in 2015, up from 468 million in 2012.

thus, it Limited connectivity Email or IM Communications IT Department Chooses the PC Primary device is fixed IT department has the control One device, One task Management & Security inside the Firewall Moving from Moving

Third section is about the technical issues concerned with mobile devices and security issues related to them.

500 mobile device users and IT decision-makers that have found that 95%of the corporations already have policies that govern the use of mobile devices such as smartphones and tablets,

Furthermore, other survey results show that 63%of mobile devices that connect to enterprise networks regularly are used for both work and private purposes

, Dropbox. 2. The increased variety and complexity of personal and mobile devices as well as different operating systems and applications that all requiring management will lead to increased costs. 3. The possibility of losing mobile devices would likely increase when the organization uses

3. the risk of losing corporate data as a result of difficulty in applying security measures and policies on application-rich mobile devices,

if an employee knows he she may later need access to a file created on his her work computer,

and attributes Non-PC worker Generalist Road warrior Deskbound contributor Techrealist All star Technology engagement Low Low Medium Medium Medium High Need

and work styles Business scenario Role Work style Work from your phone Corporate attorney Tech realist Bring your own media tablet Business manager All star

while in their offices because of security restrictions. 5. 4. 2 Bring Your Own Media Tablet A business manager handles hectic schedules and endless lists of tasks and responsibilities.

However, with the media tablet it is possible for that manager to accomplish a lot while being out of the office.

For example, the media tablet can connect to the corporate data center and can be used to answer all the emails that are related to work

and discusses proposed changes by sharing the screen of his her laptop. Moreover additional colleagues can join the conference calls from their own devices.

Additionally, throughout each day, he she can use Facebook on the laptop to communicate with friends

and family 16.100 5 IT Consumerization 5. 4. 4 The Boardroom Executive decision makers are more and more adopting tablet computers for decision support.

and are often reluctant to the use of computers in general. Tablet devices are replacing paper in fast-paced boardrooms

and can enable executives to attend meetings or conference calls with all the supporting documents they need,

so he she can focus on preparing more effectively on making decisions 16.5.4.5 High-performance Sales The tablet is suited extremely well for sales conversations

because it does not provide a physical barrier like opening a notebook to display the screen.

Also, because media tablets and TABLET PCS are thinner, lighter, and have longer battery life, they are very convenient for these ultra-mobile roles.

A tablet is highly supportive when talking to a client because it can provide interactive,

Examples of new opportunities enabled by tablets include making an immediate competitive analysis between businesses,

such as personalized mortgage information 16.5.4.6 Retail Sales Tablets can provide local retailers with the opportunity to compete effectively with online stores.

or both hands and tablets can interfere with that experience. In addition, shoppers may spend too much time looking at the screen of a tablet or phone

rather than interacting with products in the store 16. While kiosks remain popular if the customer needs to look for more information such as finding an out of stock-stock item online at another store,

some shoppers prefer to obtain recommendations from other consumers by using their tablets. Moreover, cash registers are increasingly being replaced by tablets and other handheld devices,

which provide an opportunity to reduce costs 16.5.4 Business Scenarios for IT Consumerization 101 5. 5 Strategies for IT Consumerization The previously explained business scenarios can be associated with one of the following strategies:

going mobile, modernize the desktop, virtualize, and bring your own device. The key concerns about these strategies as well as the technologies that address the raised issues are explained in the following sub-sections. 5. 5. 1 Going Mobile Strategy Many of the nowadays employees are exploring this strategy.

They are interested in achieving productivity gains by using their own mobile devices, such as smartphones and media tablets.

managing a diverse mobile platform, protecting information that flows across mobile devices, adopting applications for mobile consumption,

and defining data ownership. 3 Implementing mobile strategy includes enabling mobile device management infrastructure such as, for example, System Center Configuration Manager 2012 and Windows Intune,

Moreover, Windows Server 8 and Dynamic Access will provide an even more compelling solution 16.5.5.2 Modernize the Desktop Strategy This strategy is needed

and associated application software from the physical client device that is used to access it 5. 5. 3 Virtualization Strategy This strategy enables enterprises to quickly achieve business benefits gained from IT consumerization by moving the desktop and/or applications into a data center.

This strategy makes it easier to provide new desktops but it requires investment in the infrastructure that supports it.

Examples of these include productivity apps from the cloud, such as Office 365, IT management services from the cloud, such as Windows Intune, virtualized desktops or apps,

since that mobile devices can access email and provide instant messaging service, calendar, voice, and other capabilities at any time and place 8. Refocusing IT on strategic initiatives.

and supporting their own mobile devices. Thus, IT department is relieved of some time-consuming aspects of supporting an enterprise infrastructure,

the needed changes in the infrastructure to be able to support a consumerization of IT strategy and the support of different mobile devices.

Table 5. 4 Desktop delivery option On your own Bring your own Choose your own Here is your own Consumer desktop Enterprise desktop Consumer OS Consumer OS Enterprise OS

Enterprise OS Local workspace Local workspace Local workspace Local workspace Session roaming Session roaming Virtual desktop Virtual workspace (server

Moreover, around the world, social media and new and smart mobile devices are becoming very important in personal relationships among people in a way that makes it challenging to make separation between the technology and personal social networks.

However, at work places, 56%of employers do not allow access to non-work related resources or websites and 63%ban their employees from saving personal data and files on company's computers.

''because even though its first incarnation was sized a tablet desktop device, the value of it is in the software

or app that can also be used on desktop computers and other devices such as ipad. Avaya's strategy for mobility within the enterprise is to take advantage of the consumer gadgets that executives

and employees are already bringing to work such as tablets and smartphones. Moreover, with its one-X software for smart phones, Avaya also allows its employees to make the mobile phone acts as an extension of the corporate network.

Shell has started a period of six months rollout of a Mobile device Management (MDM) software-as-a-service (Saas) platform from Airwatch.

and tablets that meet its minimum operating system requirements. POINT OF ATTENTION: It is necessary to realize the importance of engaging people from all departments at the company

Computer-Supported cooperative work (CSCW) is concerned centrally with teamwork, learning, problem solving, knowledge building, task accomplishment and other cognitive achievements by small groups of people.

Another term that can be considered as the synonym for digital work collaboration Is supported Computer Cooperative Work (CSCW) 1

Examples of the collaboration systems include desktop and video conferencing systems, collaborative authorship applications, electronic mail as well as refinements and extensions,

They are the computer applications that support creative and collaborative way of finding solutions for the emerging problem and for decision-making of people inside a single organization or across several ones 4. The term is synonymous with Group Support systems (GSS) and essentially synonymous with Group

Electronic meeting systems form a class of applications for computer supported cooperative work. Based on their features, they can help to find solutions for many harmful

In these systems, typically users have their own computers, and each one of them can participate in the current running session simultaneously.

or over the time using tools such as bulletin board systems 4. The formal term used in computer-facilitated communication,

such as telephones, mail and even face-to-face meetings, are slowly being replaced by computer based systems where different kinds of socialization are enhanced through media sharing, reflection on past experiences and a bundle of additional services, supporting

cheap calls on landlines and mobile devices; instant text messaging from computer to computer; conduct meetings and conferences.

Dropbox Dropbox is a file hosting service that offers many capabilities such as cloud storage and file synchronization.

which they can create on their computers. Dropbox synchronizes those folders in order to appear the same folder (with the same contents)

immediate synchronization and sharing of files across computers and among users who are located in different geographical locations;

which computers cannot read using Optical Character Recognition (OCR) technology. Consequently, as the people read

and media that are not recognizable by computers. The creators of this project hope that recaptcha continues to have a positive impact on modern society by helping to digitize human knowledge 24.128 6 Digital Work

10.1007/s10606-013-9193-7 2. Grudin J (1994) Computer-supported cooperative work: history and focus (Long beach Calif) 27:19 26 3. Kay R (2004) Roots of digital collaboration.

Schrire S (2004) Interaction and cognition in asynchronous computer conferencing. Instr Sci 32: 475 502. doi:

King K, Ellis TJ (2009) Comparison of social presence in voice-based and text-based asynchronous computer conferences.

, managing diverse mobile platforms, protecting information across different and heterogeneous mobile devices, and defining data ownership.

a conclusion from the study is that public and private spending should be focused less on defense of computer crime (i e. antivirus, firewalls etc.)

most of its business operations were taking place in the field of personal computers. The launch of the ipod, the portable media player, in combination with the itunes software, a system that allows users to access the Apple store to buy online music

and transfer them from an ipod to a computer, corresponds to a formidable innovation of Apple's business model.

which redefined the value chain linked to the world of personal computers in the late nineties,

The core purpose of Oblong is to find ways to make computers more flexible, capable, interactive,

The infrastructure is ready as there is no need for anything other than a pc and an internet connection. 10.6.2 Applications The interactive and game-like experience of Tykoon make it a very appreciated application by those who are using it.

and, directly from his notebook, table or smartphone, he can complete the payment online with very few steps.

Community cloud, 34 Community coordinator (CC), 118 Community of practice, 117 Comparative sentiment analysis, 70 Computer-supported cooperative work (CSCW), 113

Internet of things, 5 Interoperability, 34 ipad, 4 ipod 4 IT alignment, 146,150, 154,155, 159 IT consumerization, 134 IT governance, 145 149,151 159 ITIL, 150 KKEY performance indicators (KPI), 151 Key-/value


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011