Showing 3,041 - 3,060 results of 10,490 for search '"business"', query time: 0.09s Refine Results
  1. 3041

    Directions, benefits, and digitalisation effectiveness determining by O. A. Zemlyanskiy

    Published 2022-06-01
    “…It will allow differentiating such interaction by groups of entities and detail the possibilities, and the ways of digital technologies using in all areas of implementation, and will contribute to achieving the benefits from digitalisation of business activities’ various types. Matrixes for the digital technologies using and matrixes for using the digital technologies’ effectiveness for authorities and business structures have been proposed. …”
    Get full text
    Article
  2. 3042

    Russian Legal Discourse by V. G. Orlov

    Published 2021-12-01
    “…Although Russian business law has been developed under the influence of Western law, the idea of the legislatively established legal surveillance of business activities, where written law is regarded as a progressive means of regulation, plays still an important role, and the breach of the law requirements is a sine qua non condition for civil liability (for damages) in Russia.…”
    Get full text
    Article
  3. 3043
  4. 3044

    DDNS + gateway separation method for interconnect of distributed data center by Sheng-jun XIE, Li-ping CAI, Feng YIN

    Published 2013-09-01
    “…The multi-campus university distributed data centers interconnected problems existing in the traditional gateway were analyzed and based on RHI + gateway unilateral separation methods on the Internet,a DDNS + gateway interconnection separation idea to front-end technology was proposed to achieve business traffic sites DDNS selection,using the device with the VMware SLB to achieve uninterrupted user access.In a lab environment,online or new on-line users drifting around in a virtual machine can fast access to the data center to the same kind of business,suitable for the business flow,IP planning complex continuous demanding scenarios.The interconnection method must increase DDNS equipments in the data center edge,hanging the SLB device next to the switch side of data centers in both places.…”
    Get full text
    Article
  5. 3045
  6. 3046
  7. 3047

    Traffic characteristic based privacy leakage assessment scheme for Android device by Zhu WANG, Kun HE, Xinyu WANG, Ben NIU, Fenghua LI

    Published 2020-02-01
    “…Aiming at the privacy leakage,which was caused by collecting user information by third-party host in Android operating system App,a privacy leakage evaluation scheme HostRisk was proposed.HostRisk was based on TF-IDF model and hierarchical clustering method,which was applied in mobile device.The TF-IDF model calculated the business relevance between Apps and hosts via the behavior characteristics of the hosts in these Apps.For the business related hosts that fail to express the business relevance characteristics,those hosts were adjusted and optimized via the average connected hierarchical agglomerative clustering method.Finally,the harmful degree of privacy leakage was evaluated based on the ranking of all hosts in the App.The experimental results verify the effectiveness and efficiency of the scheme.…”
    Get full text
    Article
  8. 3048
  9. 3049
  10. 3050
  11. 3051

    Evolved Programmable Network by Greg Smith, Greg Nehib

    Published 2014-09-01
    “…The communications industry has undergone radical change over the past 30 years, moving from a business model that was largely built around offering bandwidth at fixed locations to one delivering seamless internet and application access anywhere. …”
    Get full text
    Article
  12. 3052
  13. 3053
  14. 3054

    Impact of Digital Technologies on the Leasing Industry by O. A. Puito

    Published 2022-01-01
    “…The development of technologies in recent years has made it possible for enterprises and business entities in various industries and sectors of the economy to develop alternative business models that were previously considered impracticable or even impossible, as well as to provide a more complete and high-quality range of services, while reducing their costs. …”
    Get full text
    Article
  15. 3055

    NB-IoT network and service collaborative optimization by Bao GUO, IUYI L, Yang ZHANG

    Published 2018-11-01
    “…The preliminary construction of the NB-IoT network has been completed at this stage.The overall coverage is good,but there are more partial coverage holes,insufficient coverage of indoor difficult scenes,prominent interference problems and overlapping coverage.At present,the industry application of NB-IoT is low in maturity,and the application of the industry is in its infancy.Different terminal manufacturers have different specifications,which leads to major problems in the deployment process of network deployment.The NB-IoT network related indicators according to different business characteristics were analyzed,according to the main types of business of the internet of things.The coverage performance of such services was researched according to test data and statistical data.In-depth coverage analysis on the covers of manholes and poles was conducted.Overlapping coverage analysis gives an optimized solution to the business model with relatively concentrated service access.…”
    Get full text
    Article
  16. 3056

    The economy of digital contact in the conditions of geomarkets transformation by T. M. Rogulenko, R. S. Blizkiy, Z. Gong

    Published 2023-12-01
    “…At the regional level, changes are noted in corporate approaches of doing business, as well as in terms of business tactics and business strategies. …”
    Get full text
    Article
  17. 3057

    Dorothy C. Miller, Chase Manhattan and American Banking: Investing Art? by Christine Zumello

    Published 2023-07-01
    “…This article offers an exploration of the imbrications of “business and art” in the United States in the second half the 20th century. …”
    Get full text
    Article
  18. 3058
  19. 3059
  20. 3060