Synopsis: Ict: Computer: Computers:


Survey on ICT and Electronic Commerce Use in Companies (SPAIN-Year 2013-First quarter 2014).pdf.txt

Moreover, the use of computers has expanded to almost the entirety of these companies (99.2%).%)In turn, 87.3%had a Local area network (LAN) installed, and

-Computers 99.2 99.1 99.5 99.8 -Local area network 87.3 85.9 95.0 97.7 -Wireless Local area network 61.9 59.5 74.2 81.1

the internet for company use. 36.4%of these were laptop computers, and 49%were smartphones or PDA phones

72.3%of companies with fewer than 10 employees had computers, and 24.4%had a Local

-Computers 71.6 72.3 -Local area network 24.0 24.4 -Wireless Local area network 16.4 17.6 -Internet connection 65.7 67.7 -Broadband (fixed or mobile) Internet connection (1) 98.5 99.0


Survey regarding reistance to change in Romanian Innovative SMEs From IT Sector.pdf.txt

large companies and was implemented by means of computer-assisted telephone interviewing. Data collection was done over a 2 month period during September-October


Tepsie_A-guide_for_researchers_06.01.15_WEB.pdf.txt

and mobile devices, new ways of carrying out social innovation have become possible. Often this means the barriers to social innovation (e g. connectivity


The future internet.pdf.txt

SL 5 †Computer Communication Networks and Telecommuni -cations  The Editor (s)( if applicable) and the Author (s) 2011.

•Mobile devices †the Internet can now be accessed from a wide variety of mobile devices including smart phones, Internet radios,

The Internet has evolved from a remote access to mainframe computers and slow communication channel among scientists to the most important medium for informa

of nodes (computers, terminals mobile devices, sensors, etc. of the Internet will soon grow to more than 100 billion 1. Reliability, availability, and interoperability re

computers (e g.,, terminals, servers, etc. CPUS, etc. and handlers (software pro -grams/routines) that generate

ACM Computer Communications 33 (17), 2105†2115 (2010 19 Freedman, M.:Experiences with Coralcdn: A Five-Year Operational View.

ACM SIGCOMM Computer Com -munication Review 39 (5)( 2009 26 Eggert, L.:Quality-of-Service:

ACM SIGCOMM Computer Communication Review (Oct. 2010), http://www2. research. att. com/bala /papers/ccr10-priv. pdf

-tures, and Protocols For Computer Communications (Karlsruhe, Germany, SIGCOMM †03 Karlsruhe, Germany, August 25†29,2003, pp. 3†10.

The International Journal of Computer and Tele -communications Networking 54 (5)( 2010 15. Galis, A.,Denazis, S.,Bassi, A.,Berl, A.,Fischer, A.,de Meer, H.,Strassner, J.,Davy, S.,Ma

thanks to the success of novel, extremely practical smartphones, portable computers with easy-to-use 3g USB modems and attractive business models.

, keep track of the location of mobile devices and participate in GTP signaling between the GGSN and RNC

Journal of Computer Communications 31 (10), 2457†2467 (2008 J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 51†66,2011

Computer Communications (July 2010), 63 pp http://www1. cse. wustl. edu/jain/papers/ftp/i3survey. pdf

Computer Society Press, Los Alamitos (2009 19. Brennan, R.,Feeney, K.,Keeney, J.,O†Sullivan, D.,Fleck II, J.,Foley, S.,van der Meer

ACM SIGCOM Computer Communication Review 37 (3)( 2007 25. Strassner, J.,Agoulmine, N.,Lehtihet, E.:

host itself, for example, a computer in the network or an embedded server may act as the REP host for a resource,

PC IS w hi ch st or es W H A T W H ER

1 University of Rome â€oela Sapienzaâ€, Computer and System Sciences Department Via Ariosto 25,00185 Rome, Italy

growth of small and/or mobile devices and sensors, of services and of security re -quirements began to show that current Internet is becoming itself a bottleneck.

application layer, without extending to the middle and lower layers of computer networks. In this research area, this paper aims to contribute to advancing the

and translate them into functionality in computer networks Link Layer: This is the layer that has the responsibility to establish the link

International Journal of Human and Computer Studies, 43 (5†6: 907†928 (1995 16 ITU-T:

Proceedings of the Fall Joint Computer Conference. AFIPS November 14-16, Volume 31, pp. 525†534.

19th IEEE International Conference on Computer Communications and Net -works (ICCCN 2010), ZÃ rich, Switzerland (August 2010

ACM SIGCOMM Computer Communications Review 40 (2)( 2010 8. Kostopoulos, A.,Warma, H.,Leva, T.,Heinrich, B.,Ford, A.,Eggert, L.:

Computer Communication Review 35,2 (2005 20. Key, P.,Massoulie, P.,Towsley, D.:Combined Multipath Routing and Congestion Con

access to the Internet via mobile devices, an ever-growing number of broadband users worldwide, lower entry barriers for nontechnical users to become content and ser

-cal solutions that achieve efficient spectrum usage for mobile devices. Following the increasing consensus on benefits of incorporating economic incentive mechanisms in

IEEE Computer Society Press, Los Alamitos (2004 20. Carpenter, B.:rfc1958: Architectural Principles of the Internet.

European Conference on Computer Net -work Defence, EC2ND (2009 23. Miller, V. S.:Use of elliptic curves in cryptography.

IEEE Computer Society Press, Los Alamitos (1981 doi: 10.1109/SFCS. 1981.32 10. Erlingsson, U.,Schneider, F. B.:

IEEE Computer Society Press, Los Alamitos (2000 11. France, R.,Fleurey, F.,Reddy, R.,Baudry, B.,Ghosh, S.:

IEEE Computer Society Press, Los Alamitos (2007 12. Giorgini, P.,Mouratidis, H.,Zannone, N.:Modelling security and trust with secure

Google and the US Computer Emergency Readiness Team (US-CERT) were informed and the vulnerability was kept con

IEEE Computer Society Press, Los Alamitos (2001 8. Bodei, C.,Buchholtz, M.,Degano, P.,Nielson, F.,Nielson, H r.:

Computer Society Press, Los Alamitos (2008 12. Ciobaë ca, S.,Cortier, V.:Protocol composition for arbitrary primitives.

IEEE Computer Society Press, Los Alamitos (2010 13. Clarke, E. M.,Grumberg, O.,Peled, D. A.:

Computer and Communications security (CCS 2010), pp. 351†360. ACM Press New york (2010 22. Moâ dersheim, S.,Vigano`,L.:

IEEE Computer So -ciety Press, Los Alamitos (1977 26. T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol, Version

from the convergence of computer server power, storage and network bandwidth It is a new business

IEEE Computer Society Press, Los Alamitos (2010), doi: 10.1109/ICDCSW. 2010.39 4. Cabuk, S.,Dalton, C i.,Eriksson, K.,Kuhlmann, D.,Ramasamy, H. V.,Ramunno

8. Computer and Communication Industry Association (CCIA: Cloud comput -ing (2009), http://www. ccianet. org/CCIA/files/cclibraryfiles/Filename

-ings of the 16th ACM conference on Computer and communications security Chicago, Illinois, USA. CCS †09, pp. 199†212.

IEEE Computer, 34†41 (April 2005 6. Anerousis, N.,Hjlmtysson, G.:Service level routing on the Internet.

Computer Communication Review 35 (5), 71†74 (2005 20. Phuoc Tran-Gia. G-Lab: A Future Generation Internet Research Platform (2008

-ence on Ultra Modern Telecommunications (ICUMT-2009), pp. 1†6. IEEE Computer So -ciety Press, Los Alamitos (2009

PDAS, laptops and other network-enabled devices. Thus, a fitness function is pre -sented which is able to evaluate the eligibility of each candidate node

According to this scenario, a node which acts as a traffic source like a laptop or a camera is out of the coverage of the infrastructure.

-tional Conference on Computer Communications (2006 3. Rong, B.,Hafid, A.:A Distributed Relay Selection algorithm for Cooperative Multicast in

Computer Communications 31, 1763†1776 (2008 5. Verma, A.,Sawant, H.,Tan, J.:Selection and navigation of mobile sensor nodes using a

Computer Net -works 47, 445†487 (2005 9. Akyildiz, I.,Lee, W.,Chowdhury, K.:CRAHNS:

CCGRID †09, p. 1. IEEE Computer Society Press, Los Alamitos (2009 doi: 10.1109/CCGRID. 2009.97

took only a few seconds on a PC with Pentium D CPU 3. 40ghz and 2. 00gb of

IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 994†999 (1997 4. Chang, E.,Goh, K.,Sychay, G.,Wu, G.:

IEEE Computer Society Conference on Computer Vi -sion and Pattern Recognition, vol. 2 (2003 12.

IEEE Computer Society Con -ference on Computer Vision and Pattern Recognition, vol. 2 (2004 13.

Kherï, M. L.,Ziou, D.:Image collection organization and its application to in -dexing, browsing, summarization,

Signal Processing ICASSP€ 04, vol. 3, IEEE Computer Society Press, Los Alamitos 2004 16. Naphade, M. R.,Huang, T s.:

Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 1, pp. 200†206 (1999

there is an active entity (a person, an organization, a computer, a robot, etc. that provides the services, with a given cost and time (not to mention SLA, etc.

•Tangible entity, from computers to aircrafts, to buildings and furniture •Intangible entity, for which a digital image is mandatory

-cused on microprocessor design, computer design, power-on-demand architectures and virtual machine consolidation techniques. However, a micro-level energy effi

such as mobile devices (e g. smart phones), the semantic web, cloud computing, and the Internet of things (Iot) promot -ing real world user interfaces

Smart cities, from smart phones, mobile devices, sensors, embedded systems, smart envi -ronments, smart meters, and instrumentation sustaining the intelligence of cities

-connection of mobile devices, sensors and actuators allowing real-world urban data to be collected and analysed, will improve the ability to forecast

•Tourism information in different parts of the city through mobile devices using visual and interactive experiences and in different languages


The Impact of Innovation and Social Interactions on Product Usage - Paulo Albuquerque & Yulia Nevskaya.pdf.txt

and blogs in 2011 and 42%of tablet owners use them daily while watching TV (Nielsen, 2011.

with the study of consumer demand in the online computer gaming industry 3. 1 An Online Game

in 2004 and became the best-selling PC game of 2005 and 2006 worldwide. By 2011, Blizzard had

stereotypical gamer profile, †Journal of Computer-Mediated Communication, 13, pp. 993-1018 44. Yao, S.,C. F. Mela, J. Chiang,


The Relationship between innovation, knowledge, performance in family and non-family firms_ an analysis of SMEs.pdf.txt

Petrakis, PE, & Kostis, PC. 2012). ) The role of knowledge and trust in SMES. Journal of the Knowledge Economy, 1†20


The Young Foundation-for-the-Bureau-of-European-Policy-Advisors-March-2010.pdf.txt

commentary on claims of pending patent applications in computer architecture, software, and information security. The process goes through


the_open_book_of_social_innovationNESTA.pdf.txt

Examples include computers in classrooms, the use of assistive devices for the elderly, or implants to cut

work best (such as the discovery that giving computers to two children to share is more effective for education than giving them one each.


TOWARDS TOWARDS A NETWORK NETWORK OF DIGITAL BUSINESS ECOSYSTEMS_2002.pdf.txt

within a set of interconnected computer nodes based on the geographical areas which adopt the ecosystem concept.

Terry Winograd and Fernando Flores, Understanding Computer and Cognition, a new foundation for design 1986, Ablex Publishing Corporation, Norwood, NJ


Triple_Helix_Systems.pdf.txt

like computer networking winnowed from a larger collection (Miller, 1997 Yet another situation is when one space becomes the basis for the enhancement of the others

the making of the personal computer Mcgraw-hill, New york Galende, J.,Suarez I. 1999. A resource-based analysis of the factors determining a firm†s


Vincenzo Morabito (auth.)-Trends and Challenges in Digital Business Innovation-Springer International Publishing (2014) (1).pdf.txt

information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.

, MIT Sloan Management Review, IEEE Computer, or the Communications of the ACM (CACM) have such a mission of connecting

5. 4. 2 Bring Your Own Media Tablet...100 5. 4. 3 Bring Your Own Device for Vendors...

CSCW Computer-Supported Cooperative Work CSFS Critical Success Factors Cxo C-level Manager DDS Digital data stream

, Wii, ipad, ipod, among others, represent an artificial extension of their human being, allowing a seamless integration of the

It is worth noting that computer based information systems are a specific type of information system and not exhaustive 36.

) the latter referring to streams of real-time information by mobile devices and internet of things, that have to be ††captured†â€

Kharif O (2013) ATMS that look like ipads. Bloom Businessweek, pp 38†39 39. Han J, Haihong E, Le G, Du J (2011) Survey on Nosql database.

changed the way we use computers, how we access information, how businesses derive value from ICT

of the production process by using computer controlled machines. Moreover marketing has benefited from ICT in many ways such as analyzing the results of

Grid computing can be explained as the allocation of several computer systems in a parallel structure to solve one problem 1. Cloud computing is

resource from different platforms, such as mobile phones, laptops or PDAS 3. Improved accessibility, by providing the ability for the employees to access

which allows users to rent virtual computers on which to run their own computer applications.

It runs over HTTP, using REST and SOAP protocols. It gives the subscribers the ability to launch

of computer server resources for the sake of cost and electricity savings 7 However, despite the benefits of this approach, server consolidation, bear many

logic on which the modern computer is based, and Delphi Method, which is a type of a collective decision-making method 20, with several rounds of anonymous

IEEE symposium on computers and communications, pp 129†134 8. Khajeh-hosseini A, Greenwood D, Sommerville I (2010) Cloud migration:

days when mobile devices such as smartphones and tablets have overtaken the role of Personal computers (PCS) and their leadership in terms of market-share, a new

breed of technologies seem ready to take their place in a few years. As pointed out

smartphones, and tablets cycles respectively) we are entering, faster than before, a third Computing Cycle of ††Wearables/Drivables/Flyables/Scannables††devices

2. Considering smartphones and tablets, as reported by Infoworld 3, in 2013 a research company such as, e g.,

, IDC has predicted that tablet shipments will hit 229.3 million units in 2013, further expecting they will exceed PC shipments by

2015 This phenomenon can be related to other changes always noticed by Mary Meeker and Liang Wu for relevant players in the digital business, such as, e g

location-based application on mobile devices for marketing activities and social sensing (discussed in detail in the following Chap. 4) 15

However the diffusion of mobile devices, such as, e g.,, smart -phones and ipads or tablets, does not entail a consequent success of no matter

services provided through them and accessible to a correspondent wide audience Furthermore, also the adoption of the above technologies may still find resistance

+Smart mobile communications •iphone, ipad, Android OS Smartphones and tablets Cloud computing •Amazon, dropbox, Google, Salesforce. com, Windows

technology (in that case computers) and its use. In particular, Venkatesh 21 identified anchors related to constructs for individual control beliefs, motivation

•computer anxiety influence on perceived ease of use, when moderated by experience As said above the research of TAM has produced a vast literature, whose

Control Computer self-efficacy Perceptions of external control or facilitating conditions Intrinsic motivation Computer playfulness

Emotion Computer anxiety 6 With a ††feedback††effect also on the internal portfolio of technologies, due to the adoption of

personal devices by employees for work, as we are going to see in Chap. 5 on the IT Consu

Computer Self-Efficacy Perceptions of external control Computer Anxiety Computer Playfulness Adjustment Perceived Enjoyment Objective

Usability Technology Acceptance Model (TAM Experience Voluntariness Fig. 3. 1 Technology acceptance model 3 (TAM3.

Adapted from 17 Technology-specific Perceptions Perceived service availability Perceived monetary value General Technology Perceptions

mobile devices, applications, and services have to be related to other research streams investigating, e g.,, the difference of usage behavior between mobile

phones and personal computers. In particular, it is worth mentioning the work by Ghose et al. 28 which explores the difference in economics between the two

computer ones, in the following Section we are going to discuss which digital management solutions can be considered

Considering Mobile device Management solutions, they facilitate the man -agement of devices deployed across different mobile operators or service pro

through a control of the settings and configuration for all mobile devices (com -pany-owned as well as employee-owned) in the network of a given company.

available in streaming on the user†s mobile device, when eventually required by a given specific application context

Finally, Mobile device Virtualization solutions are a kind of hardware virtu -alization, allowing, e g.,, the use of two or more operating systems on the same

mobile device. These solutions, on the one hand, provide the user with a certain Table 3. 6 Solutions suitable to enable device security management

Mobile device management •Simple to install •Provide centralized management of the devices used by the user

Mobile device virtualization •The device can be used safely even for personal purposes without being subject to

different mobile devices, regardless of operating system, without losing the native capabilities, and synchronize with the corporate CRM and Inventory management

personal computer (which, however, required an active connection at the time the order). ) Furthermore, among other useful information to the sales force, the vendors

Force Automation mobile app for ios based tablets (ipad. The goal of the solution was to provide more useful information to sellers to increase the effec

camera of the tablet, and the access to historical cases of sales, the process of

Kymantm by Datalogic Mobile Wireless Handheld Computer and Barcode Scanner. Besides technology issues, the investment in this solution has covered

scan the barcode using the optical drive of the tablet supplied, thus, synchronizing the data on the availability of the product in a purchase order system by SAPÏ

increasing productivity and efficiency through the use of tablets and mobile applications development The last case study shows the relevance of mobile services for marketing and

10 Mobile devices designed to survive demanding environments, harsh conditions, rough handling, providing ergonomics that reduce operator effort.

PC shipments worse than predicted, tablet shipments get better Infoworld 4. Rai A, Sambamurthy V (2006) Editorial notes†the growth of interest in services

control, computer anxiety and enjoyment into the technology acceptance model. Inf Syst Res 11: 342†365

Datalogic (2012) Mobile computers connected to SAP ï inventory and warehouse management for Habasit 34.

and tablets, likewise (as seen in Chap. 3). However, mobile technologies are only one of the several facets of what

the ones in mobile device, but also social networks, and web technologies to infer data about people preferences, activities,

mobile phones and tablets or ipad. Always related to localization as a core feature, we point out the increasing relevance and interest into the applications of

mobile devices, providing services and solution for worldwide dynamics and evolving markets. Inside Nokia†s organization, benchmarking is used in order to

Pervasive Computer Communication Work PERCOM Work, pp 525†530 36. Aggarwal C, Abdelzaher T (2013) Social Sensing.

companies bring their own laptops to the work environment to use them to do their jobs.

or tablet devices, since employees can take them anywhere and access any variety of content, e g.,

A major driver of mobile device usage in the work environments has been the emergence of cloud computing. As mentioned before, both personal and business

host of smaller firms and the use of portable, mobile devices usage increases exponentially. In fact, a Gartner group prediction, reported by the Economist 4

PC Primary device is fixed IT department has the control One device, One task Management & Security

•Third section is about the technical issues concerned with mobile devices and security issues related to them

It shows that despite the results of a survey of 1, 500 mobile device users and IT decision-makers that have found that 95%of the corporations

already have policies that govern the use of mobile devices such as smartphones and tablets, only one third of the employees at those companies were aware of such

rules. Moreover, the guidelines that are currently in use within those businesses are inadequate to deal with situations

Furthermore, other survey results show that 63%of mobile devices that con -nect to enterprise networks regularly are used for both work and private purposes

2. The increased variety and complexity of personal and mobile devices as well as different operating systems and applications that all requiring management will

3. The possibility of losing mobile devices would likely increase when the organization uses more of these equipment,

measures and policies on application-rich mobile devices, especially when the device is owned by the employee

to a file created on hisher work computer, heshe can easily store the document using his personal cloud service.

Non-PC worker Generalist Road warrior Deskbound contributor Techrealist All star Technology engagement Low Low Medium Medium Medium High

Bring your own media tablet Business manager All star Bring your own device for contractors Contractor Road warrior

5. 4. 2 Bring Your Own Media Tablet A business manager handles hectic schedules and endless lists of tasks and

However, with the media tablet it is possible for that manager to accomplish a lot while being out of the office.

For example, the media tablet can connect to the corporate data center and can be used to answer all the emails that

by sharing the screen of hisher laptop. Moreover, additional colleagues can join the conference calls from their own devices

on the laptop to communicate with friends and family 16 100 5 IT Consumerization 5. 4. 4 The Boardroom

Executive decision makers are more and more adopting tablet computers for decision support. These roles are constrained extremely time and are often

reluctant to the use of computers in general. Tablet devices are replacing paper in fast-paced boardrooms

and can enable executives to attend meetings or conference calls with all the supporting documents they need,

The tablet is suited extremely well for sales conversations because it does not provide a physical barrier like opening a notebook to display the screen.

Also because media tablets and TABLET PCS are thinner, lighter, and have longer battery life, they are very convenient for these ultra-mobile roles.

A tablet is highly supportive when talking to a client because it can provide interactive, visual

information that supports the conversation. Examples of new opportunities enabled by tablets include making an immediate competitive analysis between businesses

or providing highly personalized information during the conversation, such as personalized mortgage information 16 5. 4. 6 Retail Sales

Tablets can provide local retailers with the opportunity to compete effectively with online stores. The types of devices that are used for retail applications vary

tablets can interfere with that experience. In addition, shoppers may spend too much time looking at the screen of a tablet or phone,

rather than interacting with products in the store 16 While kiosks remain popular if the customer needs to look for more information

to obtain recommendations from other consumers by using their tablets. Moreover cash registers are increasingly being replaced by tablets and other handheld

devices, which provide an opportunity to reduce costs 16 5. 4 Business Scenarios for IT Consumerization 101

going mobile, modernize the desktop, virtualize, and bring your own device. The key concerns about these strategies as well as the tech

in achieving productivity gains by using their own mobile devices, such as smartphones and media tablets. However, some key concerns about this strategy

have to be addressed. These include: managing a diverse mobile platform, pro -tecting information that flows across mobile devices, adopting applications for

mobile consumption, and defining data ownership. 3 Implementing mobile strategy includes enabling mobile device management infrastructure such as, for example, System Center Configuration Manager 2012

and Windows Intune, which is based a cloud management solution that can pro -vide a rich platform to manage Android, iphone, and Windows phone devices

IT consumerization by moving the desktop and/or applications into a data center This strategy makes it easier to provide new desktops,

but it requires investment in the infrastructure that supports it. The key concerns with this strategy include

Windows Intune, virtualized desktops or apps, application gateways to publish apps to devices, and cloud services to deliver apps to devices 16

since that mobile devices can access email and provide instant messaging service, calendar, voice, and other capabilities at any time and

own mobile devices. Thus, IT department is relieved of some time-consuming aspects of supporting an enterprise infrastructure,

and the support of different mobile devices Moreover, additional delivery options are associated with device options, as

Table 5. 4 Desktop delivery option On your own Bring your own Choose your own Here is your own

Virtual desktop Virtual workspace server or local Virtual workspace server or local Access to hosted desktop Access to hosted desktop

Moreover, around the world, social media and new and smart mobile devices are becoming very important in personal relationships among people in a way that

company†s computers. Moreover, a recent research claim that nearly half of all the workers (46%)surveyed have graded their employers with extremely low marks

first incarnation was sized a tablet desktop device, the value of it is in the software or

app that can also be used on desktop computers and other devices such as ipad Avaya†s strategy for mobility within the enterprise is to take advantage of the

as tablets and smartphones. Moreover, with its one-X software for smart phones Avaya also allows its employees to make the mobile phone acts as an extension of

Shell has started a period of six months rollout of a Mobile device Management (MDM) software-as-a-service (Saas) platform from Airwatch.

and tablets that meet its minimum operating system requirements POINT OF ATTENTION: It is necessary to realize the importance of

Also, Computer-Supported cooperative work (CSCW) is concerned centrally with teamwork, learning, problem solving knowledge building, task accomplishment and other cognitive achievements by

work collaboration Is supported Computer Cooperative Work (CSCW) 1, which V. Morabito, Trends and Challenges in Digital Business Innovation

-laboration systems include desktop and video conferencing systems, collaborative authorship applications, electronic mail as well as refinements and extensions, and

They are the computer applications that support creative and collaborative way of finding solutions for the

Electronic meeting systems form a class of applications for computer supported cooperative work. Based on their features, they can help to find solutions for many

In these systems, typically users have their own computers, and each one of them can participate in the current running session simultaneously.

formal term used in computer-facilitated communication, collaboration and learning is asynchronous conferencing and is used to define technologies that are

face-to-face meetings, are slowly being replaced by computer based systems where different kinds of socialization are enhanced through media sharing, reflection on

•cheap calls on landlines and mobile devices •instant text messaging from computer to computer •conduct meetings and conferences

Dropbox Dropbox is a file hosting service that offers many capabilities such as cloud storage and file synchronization.

they can create on their computers. Dropbox synchronizes those folders in order to appear the same folder (with the same contents) despite the media or the device

•immediate synchronization and sharing of files across computers and among users who are located in different geographical locations

computers cannot read using Optical Character Recognition (OCR) technology Consequently, as the people read and enter the two words into specified fields at

-nizable by computers. The creators of this project hope that recaptcha con -tinues to have a positive impact on modern society by helping to digitize human

2. Grudin J (1994) Computer-supported cooperative work: history and focus (Long beach Calif 27: 19†26

Schrire S (2004) Interaction and cognition in asynchronous computer conferencing. Instr Sci 32: 475†502. doi:

asynchronous computer conferences. In: Proceedings of 42nd Hawaii international conference on system sciences, pp 1†10

-forms, protecting information across different and heterogeneous mobile devices and defining data ownership. However, this is only a part of the current challenges

public and private spending should be focused less on defense of computer crime i e. antivirus, firewalls etc.

personal computers. The launch of the ipod, the portable media player, in com -bination with the itunes software, a system that allows users to access the Apple

ipod to a computer, corresponds to a formidable innovation of Apple†s business model. In summary,

redefined the value chain linked to the world of personal computers in the late nineties, ebay†s and Priceline†reverse auction system,

ways to make computers more flexible, capable, interactive, and empowering. The system designed for Minority report was considered futuristic at the time, but it

other than a pc and an internet connection 10.6.2 Applications The interactive and game-like experience of Tykoon make it a very appreciated

and, directly from his notebook, table or smartphone, he can complete the payment online with very few steps.

Computer-supported cooperative work CSCW), 113 Computing interfaces, 194 Confidentiality, 28 Consumerization, 89, 90†92,95, 98,99, 102

ipad, 4 ipod, 4 IT alignment, 146,150, 154,155, 159 IT consumerization, 134 IT governance, 145†149, 151†159

5. 4. 2 Bring Your Own Media Tablet 5. 4. 3 Bring Your Own Device for Vendors


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011