Development of the world market of information technologies in the conditions of trans nationalization of international business

Study of the activities of leading companies operating in the global information technology market in the context of the transnationalization of international business. The current trends in the development of international production are determined.

Подобные документы

  • Description of martial law, compliance conditions. Analysis of regulatory legal acts and judicial practice in the field of information protection under martial law. Features of ensuring information security in Ukraine as a direction of state policy.

    статья, добавлен 08.08.2021

  • Communicating over long distances. The Telegraph and commercial Growth of the Telephone. The Emergence of Broadcasting. International Telecommunications Networks. Hand-Held Radio Transceivers. History and development of communications satellites.

    реферат, добавлен 24.12.2013

  • A number of different techniques that people can use to hide information. The sound files and images that float about the network today. Measuring and encrypting information. Error correction and white noise. Analysis of hiding information in JPEG files.

    книга, добавлен 08.03.2014

  • Development of software and algorithm of the information system for monitoring fires. Possibilities detecting fire from sensor, predicting its spread and assessing the source of ignition. Realization of information through sound and visual signals.

    статья, добавлен 22.12.2016

  • Definition of information security. Methods and means of information protection. Access Control - information protection regulation of the use of all resources of IP and IT. Protection of data and programs from unauthorized access, copying, modification.

    реферат, добавлен 04.04.2016

  • Usage of the term Anonymous on imagebords, particularly the board of chan, dedicated to random content. Idea of exposing corruption within the system. Limiting information and enlarging author rights. Hacked many oil companies servers in order.

    презентация, добавлен 19.12.2014

  • Development of an algorithm for identifying potential clients of factoring services based on information from databases of Russian banks. Its implementation in the VBA programming language. Recommendations for improving the efficiency of sales staff.

    дипломная работа, добавлен 01.12.2019

  • Search for opportunities to ensure the security of the state in view of the formation of a new field of confrontation - cyberspace. Consideration of factors influencing the country's cybersecurity situation and protection of information objects.

    статья, добавлен 18.09.2020

  • Quantum coherence and information processing. Expectation values and the von Neumann projection. Quantum relative and conditional entropies. Information and the foundations of physics. Application quantum coding, error detection, and correction.

    книга, добавлен 08.03.2014

  • Description of technology of off-wire computer networks with the productivity 100 Mb/s in the point of output and maintenance of information. Description of parameters of middle access and determination of multiple entrance. Physical layer, radio, WLAN.

    методичка, добавлен 10.08.2011

  • Development of software applications, tools settings of the information system. The connection of additional interfaces and applications, tools to create, configure and manage database tools to generate reports in MS Word, edit them on the server side.

    дипломная работа, добавлен 02.05.2015

  • Information Retrieval as finding material of an unstructured nature that satisfies an information need from within large collections. Unstructured (text) and structured (database) data in 1996 and 2006. Basic assumptions of Information Retrieval.

    презентация, добавлен 19.02.2014

  • Classical and quantum physics and information theory. Von Neumann entropy and relevant measures. Accessible classical and quantum information. Data processing. Real-life applications of information theory. A commercial quantum cryptographic device.

    книга, добавлен 15.09.2012

  • The possibilities of the MS Excel spreadsheet processing system for visualization of large data sets in an easy-to-understand form. Development of tools for practical implementation for visualization of large data arrays by selecting the required range.

    статья, добавлен 29.09.2023

  • Using C ++ Builder to create a binary file. The development of a dynamic array structure of the binary data using the individual functions, located in the library user. The general analysis of the data. Create screensaver with information about the task.

    курсовая работа, добавлен 13.07.2014

  • Value of the term "information warfare". Analiz the concept information warfare. The social network "Facebook" in information war. Establishment existence of promotion in a social network. Types of propaganda in social networks. Propaganda against Russia.

    реферат, добавлен 26.12.2014

  • The concept of e-learning, its advantages, flexibility of time and place in comparison with formal learning. Creation of a hybrid information system that integrates computer vision and machine learning technologies for visual and interactive systems.

    статья, добавлен 10.05.2018

  • Основные функциональные возможности и области применения Congos & Business Intelligence - программного продукта, способного охватить деятельность целого предприятия. Структура и ключевые особенности платформы. Системные требования для его установки.

    реферат, добавлен 23.12.2012

  • This paper presents a comprehensive algorithm for creating an automated system to collect, store, analyze and research data from a business. Its main features include synchronization with, and output to, an application installed on a PC or smartphone.

    статья, добавлен 26.10.2020

  • The problem of digital inequality, imbalance in the use of digital technologies in the public sector at central and local levels is analyzed. Features of intellectual communication of power and society in the context of global informatization in Ukraine.

    статья, добавлен 19.02.2021

  • Problems of security of biometric authentication systems and analysis of the author's approach to increasing their reliability. Features and conditions of use of these systems for the security of information resources, their advantages and disadvantages.

    статья, добавлен 06.05.2018

  • The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.

    реферат, добавлен 20.03.2016

  • Application of an autotyped rasterization method to protect text, table and graphic information. Use of the method in question to protect information on tangible media. Develop a modified amplitude-modulated screening method to improve print quality.

    статья, добавлен 28.09.2016

  • Theoretical information on personal computers, the structure of Windows XP as the operating system. Examples of projects in C ++ Builder to calculate complex mathematical formulas and solving problems with the branch. Programming in C ++ Builder.

    методичка, добавлен 11.10.2014

  • Пакет бізнес-застосувань Oracle E-Business Suite. Основні можливості функціональних блоків. Аналітичні застосування рішення mySAP ВІ. Надійність системи Sike. Захист від несанкціонованого доступу. Система управління підприємством Business Control.

    доклад, добавлен 28.07.2017

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.