Ditemukan 7 dokumen yang sesuai dengan query
McClam, Tricia
Belmont: Thomson Brooks/Cole, 2005
361.002 MCC c
Buku Teks Universitas Indonesia Library
Abstrak :
This book is proceedings of the 7th FTRA International Conference on Future Information Technology (FutureTech 2012). The topics of FutureTech 2012 cover the current hot topics satisfying the world-wide ever-changing needs. The FutureTech 2012 is intended to foster the dissemination of state-of-the-art research in all future IT areas, including their models, services, and novel applications associated with their utilization. The FutureTech 2012 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in this area. In addition, the conference will publish high quality papers which are closely related to the various theories, modeling, and practical applications in many types of future technology.
The main scope of FutureTech 2012 is as follows : hybrid information technology cloud and cluster computing ubiquitous networks and wireless communications multimedia convergence intelligent and pervasive applications security and trust computing IT management and service bioinformatics and bio-inspired computing database and data mining knowledge system and intelligent agent human-centric computing and social networks.
Dordrecht, Netherlands: [Springer, ], 2012
e20399380
eBooks Universitas Indonesia Library
Abstrak :
This book is proceedings of the 7th FTRA International Conference on Future Information Technology (FutureTech 2012). The topics of FutureTech 2012 cover the current hot topics satisfying the world-wide ever-changing needs. The FutureTech 2012 is intended to foster the dissemination of state-of-the-art research in all future IT areas, including their models, services, and novel applications associated with their utilization. The FutureTech 2012 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in this area. In addition, the conference will publish high quality papers which are closely related to the various theories, modeling, and practical applications in many types of future technology.
The main scope of FutureTech 2012 is as follows : hybrid information technology cloud and cluster computing ubiquitous networks and wireless communications multimedia convergence intelligent and pervasive applications security and trust computing IT management and service bioinformatics and bio-inspired computing database and data mining knowledge system and intelligent agent human-centric computing and social networks.
Dordrecht, Netherlands: [, Springer], 2012
e20399397
eBooks Universitas Indonesia Library
Holler, Jan
Abstrak :
This book outlines the background and overall vision for the internet of things (IoT) and machine-to-machine (M2M) communications and services, including major standards. Key technologies are described, and include everything from physical instrumentation of devices to the cloud infrastructures used to collect data. Also included is how to derive information and knowledge, and how to integrate it into enterprise processes, as well as system architectures and regulatory requirements. Real-world service use case studies provide the hands-on knowledge needed to successfully develop and implement M2M and IoT technologies sustainably and profitably. Finally, the future vision for M2M technologies is described, including prospective changes in relevant standards. This book is written by experts in the technology and business aspects of Machine-to-Machine and Internet of Things, and who have experience in implementing solutions.
Oxford, UK: Academic Press, 2014
e20427056
eBooks Universitas Indonesia Library
London: Facet, 2005
028.7 INF
Buku Teks Universitas Indonesia Library
Artikel Jurnal Universitas Indonesia Library
Flynn, Nancy
Abstrak :
" Trillions of e-mails travel each year through corporate networks?and they're not all work-related. But for organizations wishing to protect themselves from liability, e-mail is no longer the only danger?they now have to contend with blogs, social networking sites, and other new technologies. Packed with electronic rules, step-by-step guidelines, sample policies, and e-disaster stories, this revised edition of The e-Policy Handbook helps readers: implement strategic electronic rules ? prevent security breaches and data theft ? safeguard confidential company and customer information ? manage new and emerging technologies ? write and implement effective policies ? train employees Updated to cover new technologies, including instant messaging, social networking, text messaging, video sites, and more, this is a comprehensive resource for developing clear, complete e-policies. "
New York: [American Management Association, ], 2009
e20438281
eBooks Universitas Indonesia Library