Sciweavers

700 search results - page 13 / 140
» Enterprise Computing
Sort
View
COMPUTER
2007
72views more  COMPUTER 2007»
13 years 10 months ago
Enterprise Security for Web 2.0
Mary Ann Davidson, Elad Yoran
GI
2009
Springer
14 years 1 months ago
Bringing innovative Semantic Technology to Practice: The iQser Approach and its Use Cases
: This paper presents the iQser approach, a new semantic technology promising to overcome some of the shortcomings of current semantic enterprise solutions. The iQser technology is...
Jörg Wurzer, Bela Mutschler
COMPLEX
2009
Springer
14 years 4 months ago
Complex Phenomena in Orchestras - Metaphors for Leadership and Enterprise
This paper recognises that comparisons have been made between the role of the conductor of an orchestra and leaders of enterprises, but that little note has been taken of how the c...
Patrick Beautement, Christine Brönner
ACMSE
2006
ACM
14 years 4 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
ICDCS
2012
IEEE
12 years 16 days ago
eTransform: Transforming Enterprise Data Centers by Automated Consolidation
Abstract—Modern day enterprises have a large IT infrastructure comprising thousands of applications running on servers housed in tens of data centers geographically spread out. T...
Rahul Singh, Prashant J. Shenoy, K. K. Ramakrishna...