排序方式: 共有65条查询结果,搜索用时 0 毫秒
51.
ERRAN CARMEL 《The Information Society》2013,29(1):125-142
United States-based companies continue to dominate the global market in packaged software. Although many have predicted this U.S. dominance will wane, particularly as a result of competitive threats from Japan, and more recently from low-wage, developing nations, erosion has yet to be significant. The United States benefits from nine factors that sustain its advantage in this industry: skilled labor, favorable capital conditions, sophisticated customers, close association with hardware vendors, a competitive marketplace, geographic concentrations, first-mover advantage, a strong intellectual property regime, and English as the software lingua franca. Industry-specific strengths and weaknesses vis-a-vis Europe, Japan, and other nations are also discussed. In addition to these nine better known U.S. competitive advantages, two culturally linked assertions are presented that have received scant attention vis-a-vis competitive analysis. First, the industrial evolution of software development is at an immature stage-still a cottage industry practiced by craftsmen in a cultural milieu of artisans-and thus does not track other global high-technology trends. Second, packaged software is part of the copyright industry (e.g., film and music) in which United States-based firms have a sustained advantage. While manufacturing capabilities are significant for technology industries, culturally related factors, such as creativity, are more important for copyright industries. The U.S. ''culture of software,'' which helps explain U.S. hegemony, is introduced and discussed. The three elements of this culture are the culture of individuals as manifested by the individualistic computer hacker; the entrepreneurial culture and its risk-taking ethos; and the software development culture with its embrace of ad hoc, innovation-driven development as opposed to routinized, production-driven development. 相似文献
52.
文智成 《赣南师范学院学报》2012,33(2):52-59
壬辰倭乱期间(1592-1598),陈璘受命率部进入朝鲜半岛抗倭,与朝鲜名将李舜臣紧密合作,取得平定倭寇的赫赫战功。陈璘回国后,在李舜臣军营里发现一些物品,即所谓"八赐品",现被指定为国家级宝物。韩国人认为,八赐品是陈璘建议神宗皇帝而下赐给李舜臣的礼品。八赐品给李舜臣的生平带来光环,也激发了当今韩国人的自信。近几十年来,韩国文化界对李舜臣的追慕日益加深,对八赐品的关注度很高,神宗皇帝八赐品构成当今韩国人对陈璘的回忆机制。 相似文献
53.
浅议网络安全及防范 总被引:6,自引:0,他引:6
高颖 《成都教育学院学报》2006,20(3):100-101
通过对威胁网络安全的诸多因素的分析,从而使用户做到“知己知彼,百战不殆”,为其制定相应的防范措施,使网络安全地应用在各行各业中。 相似文献
54.
提出一种基于竞争关联优化的无线网络入侵图谱种类划分方法。在大量检测热点中,通过竞争关系,选取无线网络簇头,利用加入竞争因子的蚁群方法,对无线网络入侵的种类进行分类处理。实验结果表明,利用本文算法能够对无线网络的各种入侵进行图谱分簇处理,从而有效提高无线网络通信的安全性。 相似文献
55.
"网络三客"艺术论 总被引:6,自引:0,他引:6
黄鸣奋 《南京师范大学文学院学报》2004,22(2):176-183
黑客艺术、博客艺术与闪客艺术都是伴随计算机与网络技术的应用而出现的艺术新品。它们印证了后现代主义、极简主义与概念主义等理念,具有自己的价值。 相似文献
56.
构筑图书馆网络安全防护系统 总被引:6,自引:0,他引:6
介绍了关于网络安全的有关知识、概念和重要性,分析了主流网络安全防护系统的组成,说明了如何构筑完整的网络安全防护体系,并分析了中国科学院文献情报中心的网络安全情况与防护体系建设情况。 相似文献
57.
58.
黑客入侵网络的案件和事件近年来频繁发生.对互联网的安全构成了严重威胁.只有在分析黑客入侵技术手段后.采取强有力的安全策略.才能保障计算机的安全. 相似文献
59.
60.
蒋萍 《洛阳工业高等专科学校学报》2000,(1)
当前随着计算机与网络技术在金融领域的迅速推广,我国金融领域计算机网络面临着严重的安全性问题,作者通过对计算机网络物理性能安全分析以及网络安全功能机制的探讨,就如何提高金融计算机网络安全性提出了相关对策,主要从健全法制打击计算机网络犯罪、加强全社会网络安全意识教育和安全人才培养、规范操作程式(操作系统安全、数据库安全技术、应用程序安全、加强和完善资源管理、监督与留痕技术)、加大投入力度研制改进网络技术四个方面进行了探讨。 相似文献