نتایج جستجو برای: it flexibility

تعداد نتایج: 2884585  

2006
Daniel Beimborn Jochen Franke Heinz-Theo Wagner Tim Weitzel

The ability to outsource IT has been suggested as a major driver of IT productivity. At the same time, the literature on the business value of IT suggests that IT business alignment and IT flexibility are important drivers for the performance of IT. But what is, then, the impact of outsourcing on these key value drivers? In this paper, we empirically show that firms with internal IT exhibit sig...

Objectives Functional fitness is a concept that reflects an older adult’s ability to perform physical activities of daily living with relative ease. The aim of the present study is to assess and compare balance and flexibility in elderly men and women in the age group of 60-79 years in Khorramabad.  Methods & Materials In this descriptive and comparative study, 140 elderly people (3...

2006

Three-dimensional electron microscopy (3D-EM) is a powerful technology for imaging macromolecular complexes. Through a process known as singleparticle reconstruction, tens of thousands of separate images of a complex of interest are used to arrive at a single resolved structure. Although this method works sufficiently well for rigid macromolecular complexes, conformationally flexible complexes ...

Journal: :J. Symb. Log. 2015
Merlin Carl

Exploring further the properties of ITRM -recognizable reals started in [Ca], we provide a detailed analysis of recognizable reals and their distribution in Gödels constructible universe L. In particular, we show that new unrecognizables are generated at every index γ ≥ ω ω . We give a machine-independent characterization of recognizability by proving that a real r is recognizable iff it is Σ1-...

2012
G. Petruzzelli F. Pedron G. Gorini B. Pezzarossa E. Tassi M. Barbafieri

Phytoextraction may be applied at field scale when the removal of bioavailable metals is the specific target of the technology. Residual metals in soil can be considered substantially inert or to be evaluated by site specific risk analysis.

2014
Steffi Haag Andreas Eckhardt

Employees increasingly use cloud services of third party providers to efficiently perform their job. Interestingly, the majority adopts the cloud without approval of the organization. IT resources like that are commonly referred to as shadow IT. Although widespread in practice, the present literature on shadow IT is scarce lacking a clear definition of the phenomenon and exclusively focusing on...

2007
Ian Robertson

It is very difficult to get a realistic picture of organizational activity. Yet without such a picture it is well nigh impossible to design Information Technology (IT) systems to properly support the work of the healthcare professional. This article reports on a study undertaken in conjunction with Mancunian Community Health Trust to model certain Trust processes. A number of different professi...

Journal: :Organization Science 2011
Giacomo Negro Michael T. Hannan Hayagreeva Rao

When two groups of market actors differ in how to interpret a common label, each can make claims over the label. One categorical interpretation and the group that supports it risk disappearance if the rival interpretation gains ground. We argue that when members of the endangered category become partial defectors that span categories, their history presents challenges to the identity of nondefe...

Journal: :iJAC 2015
Kristen Giovanis

Creating effective global eLearning initiatives requires strategic planning and process development to avoid mistakes that can turn off global learners. In order to successfully implement a global training program in a cost effective, efficient way, corporations must consider budget, timing, design, and content relevancy. These factors become more complex when considering lingual, regional and ...

1994
Ross J. Anderson

The conventional wisdom is that security priorities should be set by risk analysis. However, reality is subtly different: many computer security systems are at least as much about shedding liability as about minimising risk. Banks use computer security mechanisms to transfer liability to their customers; companies use them to transfer liability to their insurers, or (via the public prosecutor) ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید