Information technologies within the system of novel factors of labour productivity growth: trends and paradoxes
The role of information technologies as one of the key factors in labour productivity growth under current conditions. The contribution of information technologies into the average annual growth of labour productivity in a range of some countries.
Подобные документы
- 76. Anonymous
Usage of the term Anonymous on imagebords, particularly the board of chan, dedicated to random content. Idea of exposing corruption within the system. Limiting information and enlarging author rights. Hacked many oil companies servers in order.
презентация, добавлен 19.12.2014 Replacing symbolic information, such as a sequence of bits or a message written in a natural language, by another message using different symbols. The properties of arithmetic coding. The problem of reliable communication. Coding natural languages.
книга, добавлен 08.03.2014Identify and select fragments of developed software products and applied technologies that contribute to the formation and development of professional competencies of professionals. Reviews software applications and fragments of their software code.
статья, добавлен 16.08.2023The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.
статья, добавлен 15.04.2024The article pays attention to the requirements for information support for controlling the operational activities of trade enterprises: significance, completeness, reliability, timeliness, comprehensibility, relevance, comparability and efficiency.
статья, добавлен 14.09.2022Suggestion information model of environment of computer-aided design, consisting of a сontrol processor, thematic coprocessors and executing processors. The scheme of processors control in the information model. Interaction of thematic coprocessors.
статья, добавлен 22.12.2016The concept features and nature of IT piracy and effect of information society on the emergence and spread of piracy on the Internet. Problems of the spread and speed of persistent violations, commission of acts of piracy, plagiarism in the Internet.
статья, добавлен 08.05.2018The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.
реферат, добавлен 20.03.2016- 84. Providing access to information systems of higher education in the case of loss of key information
Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.
статья, добавлен 06.05.2018 The role of analysis in enterprise management. An overview of the workflow methods used to solve cloud-based enterprise operations management tasks. Substantiation of the relevance of the introduction of cloud technologies based on serverless computing.
статья, добавлен 22.02.2023Assessment of fire threat in Ukraine. Creation of an information database of classes of fire protection of buildings and premises. Prediction of the spread of fire in time and space. Modeling the behavior and movement of people in an emergency situation.
статья, добавлен 22.12.2016The description of the mechanisms of learning and assessment of the quality of the classifier of the developed system of the automated processing of large amounts of information. The classifier based on the LibSVM library and the support vector machine.
статья, добавлен 25.12.2016Consideration of various information security standards in the Russian commercial organizations. Methods of data protection. Potential application of international standards in information security activities of the Russian commercial organization.
статья, добавлен 13.02.2016- 89. Strategies of information and innovation activity development at enterprise in digital conditions
The robotics complex as a strategy for the development of information and innovation activity in the enterprise in terms of digitalization. The digital recording, chronology, accessibility and openness, globality - the main benefits of blockchain.
статья, добавлен 08.04.2022 Distance learning using spreadsheets. The introduction of Excel-documents in electronic educational resources. Access to information resources of various types using the "cloud" services. Design and implementation of the "ExcelReader" software module.
статья, добавлен 05.04.2019Analysis of information technology monitoring and correction of the functional state of students in the process learning created based on developed models, complex criteria classification of constituent states models, algorithms normalized estimates.
статья, добавлен 23.06.2016The support was the key to effective implementation of advanced technologies and systemic implementation scale of China’s digital policy. A comparative analysis of the transformational processes of digitalization of China and Ukraine was carried out.
статья, добавлен 21.08.2022Результаты сотрудничества компаний GEFCO и XJ Technologies в сфере логического моделирования. Применение современного метода имитационного моделирования. Направления деятельности GEFCO. Комплекс имитационных моделей обслуживания компании General Motors.
статья, добавлен 09.09.2012Faster explicit formulas for computing pairings over ordinary curves. Secure authentication from a weak key, without leaking information. Towards a game theoretic view of secure computation. Concurrent composition in the bounded quantum storage model.
книга, добавлен 08.03.2014Cyberspace as a medium through which people engage in more complex processes. The history and development of information security principles in the World Wide Web, an assessment of their effectiveness in practice, the prospects for further development.
реферат, добавлен 24.03.2015The terminology and requirements for safe, reliable operation of critical IT infrastructure were defined. The generalized structure of critical information technology infrastructure, by its basic level, sub levels and functionality were described.
статья, добавлен 07.12.2016Investigation of a person's ability to work with information. Study of the neural executive mechanisms of the brain. Creation of a multicomponent model of short-term memory of Russian students, the development of their creative and intellectual abilities.
статья, добавлен 07.04.2021The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.
книга, добавлен 18.09.2012Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.
лабораторная работа, добавлен 17.03.2016The possibilities of the MS Excel spreadsheet processing system for visualization of large data sets in an easy-to-understand form. Development of tools for practical implementation for visualization of large data arrays by selecting the required range.
статья, добавлен 29.09.2023