Agile-management 3.0 concept as a factor of technological progress development in the digital society
Philosophy of Agile-management 3.0 as a factor in the development of technological progress in the context of a digital society. The concept of Agile management 3.0, its role in the preparation of a coach. The evolution of platforms in the service sector.
Подобные документы
- 76. Identifying the suitable program for queue management through analysis: Apache Kafka or RabbitMQ
Comparative analysis of prominent message queuing solutions Apache Kafka and RabbitMQ, aimed at identifying the most suitable program for queue management. Evaluation of technology's capability to handle high-throughput scenarios and fault resilience.
статья, добавлен 09.12.2024 Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.
статья, добавлен 14.01.2017- 78. Digital automatic telephone station SI2000 for building up urban and rural communication networks
Under current conditions telecommunication as the most rapidly-developing branch of engineering. Functional scheme digital commutation system for building communication networks. Distinctive features of hardware tools which are used in the system.
статья, добавлен 27.06.2016 With the help of business intelligence (an analytical report of Power BI)tools developed visualization of rating indicators of lecturers and departments for making successful management decisions that will contribute to the quality of higher education.
статья, добавлен 10.08.2023Cryptology from the romans to world war II. Word perfect encryption as a modern example. Exchanging keys with and without a public key. Key management and authentication in GSM networks. The end of the crypto-monopoly and the role of politics today.
книга, добавлен 08.03.2014Definition of the concept "сybercrime". Analysis of history and cyber threat evolution. Study of the types of cybercrime. Characteristic of hacking, denial of service attack, virus dissemination, computer vandalism, cyber terrorism and software piracy.
презентация, добавлен 24.01.2017Review digital communication and traditional computer-based technologies. The European Telecommunications Standards Institute. Computer and network hardware and software. Features of use of information and communication technologies in modern society.
презентация, добавлен 06.02.2017- 83. Development of an advanced SS platform based on the OAuth2 protocol for unified system authorization
Examination of the significance of authentication and authorization in Software as a Service platforms, with a specific focus on the OAuth2 protocol. Analysis of potential vulnerabilities, complexities, and the ever-evolving nature of the protocol.
статья, добавлен 08.12.2024 This systematic literature review aims to identify the impact of artificial intelligence in foreign language learning using learning management systems by systematically reviewing studies related to the area. Application of the PRISMA block diagram.
статья, добавлен 16.01.2024The article deals with the notion of concept and cognitive conceptual components in the Internet users' names. The basis conceptual spheres and concrete concepts created by the Internet users in the process of communication have been identified.
статья, добавлен 09.05.2020This paper explores the development and application of a long-short-term memory model for virtual distributed system control optimization using the TensorFlow and Keras frameworks. In the context of the rapid development of information technologies.
статья, добавлен 18.09.2024Digital technologies in the field of personnel selection - the use of automated systems, various web resources and information systems for the digitalization of personnel selection processes. ATS (Applicant Tracking System) - applicant tracking system.
статья, добавлен 21.03.2024Discuss and characteristic ways of hermeneutical assistance in studying. Explaining hermeneutics as a mind understanding method of humanitarian manifestations, texts and techniques, their meaning and their applications in modern educational process.
статья, добавлен 29.04.2019Introduce the basic principles of digital video compression,focusing on the main techniques used in various video coding standards and applies the rotation and reversion operations to increase the security of the secret images and the utilization.
книга, добавлен 08.03.2014The issue of necessity of monitoring circumstance of software systems implemented through service-based principle in conditions of continuous development and enhancement. Pattern and antipattern detection. Metric calculation algorithms. Response time.
дипломная работа, добавлен 31.10.2016Designing technological processes for information support for decision-making in integrated modular avionics for modern aircraft is a complex multi-stage procedure. The implementation of which involves the cooperation of aviation industry enterprises.
статья, добавлен 11.07.2022The analises widespread adoption of data-driven business intelligence techniques at the operational, tactical, and strategic levels in the mobile industry, coupled with the integration of user-centric metrics, has brought about a paradigm shift.
статья, добавлен 25.06.2024- 93. RSA Labs FAQ 4.0
Some of the more popular techniques in cryptography. The advantages and disadvantages of public-key cryptography compared with secret-key cryptography. Digital signature applications exportable from the United States. Proactive security techniques.
книга, добавлен 08.03.2014 The concept features and nature of IT piracy and effect of information society on the emergence and spread of piracy on the Internet. Problems of the spread and speed of persistent violations, commission of acts of piracy, plagiarism in the Internet.
статья, добавлен 08.05.2018Ubiquitous computing - filling the real world with computers. Challenging HCI Assumptions. Implications for device size as well as relationship to people. Defining the Interaction Experience. Multi-scale and distributed output. Merging Digital Worlds.
презентация, добавлен 28.12.2013A computational complexity based theory of modern encryption. Generating pseudo-random bit or number sequences. Generic encryption with pseudorandom functions. Problems with deterministic encryption in general. Required properties for digital cash.
книга, добавлен 08.03.2014Protection from disclosure to unauthorised persons integrity. Maintaining data consistency. Assurance of identity of person or originator of data non-repudiation. Conventional encryption: uses a shared key. Digital Signatures and especially their use.
учебное пособие, добавлен 08.03.2014Automation of the process of keeping a diary and converting it into digital form. Software solutions that allow the user to systematize their hobby experience and find something new for themselves. Evaluation of the functionality of compared systems.
статья, добавлен 19.03.2024Функциональные требования концепции персонификации в компаниях. Перспективы формирования инструментов digital-аналитики для определения возможностей развития системы. Проектирование технологической архитектуры системы. Описание интерфейса программы.
дипломная работа, добавлен 09.08.2018An Introduction to Cryptography: Simple substitution ciphers, Divisibility and Common Divisors. Discrete Logarithms and Diffie–Hellman. The index calculus and discrete logarithms. Combinatorics, Probability and Information Theory, Digital Signatures.
книга, добавлен 08.03.2014