Digitization and friendly artificial intelligence for future life
Assessment of the impact of digitalization on society, economy and business. Ensuring the protection of individual data and commercial secrets. The use of artificial intelligence in everyday life. Integration of digital tools into the management system.
Подобные документы
Происхождение и эволюция инструмента управления эффективностью бизнеса Business Performance Management, этапы его методологических и информационных составляющих. Классы программного обеспечения для автоматизации и контроля управленческих бизнес-процессов.
контрольная работа, добавлен 16.07.2014Характеристика отдела снабжения и построение модели «как есть (as-is)» бизнес-процессов. Формирование требований пользователя к функциональному модулю по учету закупок сырья и материалов ООО "Mebele Life", характеристика основных объектов автоматизации.
курсовая работа, добавлен 17.12.2011Processes of ordering and delivery of the ingredients to the warehouse and the costumers. Overview of the ERP system’s logistic unit. Management system for solving a variety of transport logistics problems. Application solution "1С: Enterprise 8".
реферат, добавлен 20.03.2016Development of software applications, tools settings of the information system. The connection of additional interfaces and applications, tools to create, configure and manage database tools to generate reports in MS Word, edit them on the server side.
дипломная работа, добавлен 02.05.2015Анализ эффективности деятельности компаний на рынке лизинга. Проектирование информационно-аналитической модели поддержки корпоративного управления лизинговой организации. Реализация динамического изменения топологии портала корпоративной аналитики.
дипломная работа, добавлен 19.08.2020Error correction and the cascade protocol. Individual attacks in an realistic environment. Dynamic initial block-size. Statistical analysis of QKD networks in real-life environment. Quantum-cryptographic networks from a prototype to the citizen.
книга, добавлен 08.03.2014Social network analysis as a modern theoretical approach to studying various processes of human life. Application SNA to fields of science. Application exact and approximate Shapley values in the assessment of centrality measures of nodes in networks.
дипломная работа, добавлен 02.09.2016- 108. Relational Databases
One of the important functions of science is the organization of information storage for searching some data. The basic principle of the database and Relational Database Management System. The SQL Language, Web-page, Macros and Integrity Constraints.
презентация, добавлен 07.03.2018 This history on key moments of evolution electronic digital computer: the transformation of the computer from a specialized scientific instrument to a commercial product; the beginning of personal computing and the spread of networking after 1980s.
книга, добавлен 25.11.2013Introduce the basic principles of digital video compression,focusing on the main techniques used in various video coding standards and applies the rotation and reversion operations to increase the security of the secret images and the utilization.
книга, добавлен 08.03.2014The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.
реферат, добавлен 20.03.2016Interaction in agent-oriented systems. Separation of sets of agents into families in accordance with the tasks of the stages of situational management. Development of the model for the integration of behavioral and coordination aspects in agents.
статья, добавлен 28.09.2016Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.
статья, добавлен 28.05.2021- 114. CISSP Certification
Information security and risk management. Business continuity and disaster recovery. Legal, regulations, compliance and investigations. Operating system architecture. Information technology security evaluation criteria. LAN media access technologies.
учебное пособие, добавлен 08.03.2014 The problem of constructing a system of operational dispatch management for agricultural enterprises. The choice of the functionality of the control plane, allowing to minimize the losses due to delays and poor implementation of the Executive plan.
статья, добавлен 25.12.2016The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.
книга, добавлен 18.09.2012The structure of an information security program. Creation and implementation of policies and standards. Activity of federal sentencing guidelines for criminal convictions. System and network access control. Conducting a business impact analysis.
книга, добавлен 08.03.2014Mobile devices as an integral part of a person’s daily life. Familiarize yourself with the basics for getting started developing applications, such as choosing an IDE and installing Java. Analysis of the history of creating the Android operating system.
статья, добавлен 12.02.2019The means of digital communications in the field of public administration and cyber education. The definition of "Instant messages" and "chatbot" is defined. The impact of the COVID-19 pandemic on the development of digital communication systems.
статья, добавлен 03.02.2021Подход к интеграции систем PDM (Product Data Management - управление данными об изделии) и MES (Manufacturing Execution System - управление производственной деятельностью) для формирования электронного определения изделия на этапах его жизненного цикла.
статья, добавлен 28.10.2018- 121. Decrypted Secrets
The prerequisites for the emergence and formation of areas of computer science that explores the possibilities of electronic encryption devices using large-scale integrated computer circuits. The structure of cryptographic techniques to explore data.
книга, добавлен 08.03.2014 The comparative analysis of multiple commonly used approaches of the analysis of system logs, and streaming data massively generated by company IT infrastructure with an unattended anomaly detection feature. Hierarchical temporary memory algorithms.
статья, добавлен 18.09.2020Анализ языков моделирования, характеристика программного обеспечения Business Process Management System. Процесс построения имитационной модели бизнес-процесса "Перевод студента". Разработка и реализация модели бизнес-процесса в системе "Runa WFE".
магистерская работа, добавлен 11.08.2017The article reviews the contemporary land information systems of land management. The current problems of information support for land management are identified. Suggestions how to improve the information systems using technologies are presented.
статья, добавлен 28.09.2016Analytical modeling of typical documents about education, for integration in a computerized learning environment KoHaC. Scheme of the analytical modeling training documentation. The components of the analytical apparatus of a computerized training system.
статья, добавлен 14.09.2016