Flylib.com
List of Tables
Previous page
Table of content
Chapter 2: Information Technology
Table 2.1: Performance Metrics Relevant to a Software Application
Table 2.2: Estimated Improvement in Performance per Unit Cost for the Information Technologies
Table 2.3: The Four Historical Overlapping Phases of Computing
Table 2.4: Scaling Laws for MOS Integrated Circuits with a Fixed Electric Field Intensity
Chapter 4: Creating Software
Table 4.1: Typical Phases in a Waterfall Model of Software Development
Table 4.2: Considerations in Choosing Single-Stage Compilation vs. Interpretation
Table 4.3: Examples of Middleware Services That Would Extend the Infrastructure Utility Model
Chapter 5: Management
Table 5.1: Stages of the Software Supply Value Chain and Their Generic Tasks
Table 5.2: Generic Types of Software Releases
Table 5.3: Characteristics Ascribed to Different Types of Releases
Table 5.4: Four Major Threats to Information as It Crosses a Network
Table 5.5: Issues to be Addressed in Privacy Policies
Table 5.6: Examples of Access Control Mechanisms Enforced in the Infrastructure
Chapter 6: Software Supply Industry
Table 6.1: Considerations in Choosing an Application and Its Supplier
Chapter 7: Software Creation Industry
Table 7.1: Description of Layers Shown in Figure 7.5
Table 7.2: Core Competencies Relating to the Software Industry
Table 7.3: Examples of infrastructure Defined by Application and Technology Dependence
Table 7.4: Methodologies for Building Software on an Existing Code Base
Table 7.5: Properties That Distinguish a Component
Table 7.6: Industrial Contexts for Development Methodologies
Chapter 8: Government
Table 8.1: Generic Types of Source Code Software Licenses
Table 8.2: Approaches to Copy Protection
Chapter 9: Economics
Table 9.1: Examples of Pricing Options for Software Applications
Table 9.2: Costs in Supplying Software to the End-User
Previous page
Table of content
Software Ecosystem: Understanding an Indispensable Technology and Industry
ISBN: 0262633310
EAN: 2147483647
Year: 2005
Pages: 145
Authors:
David G. Messerschmitt
,
Clemens Szyperski
BUY ON AMAZON
WebLogic: The Definitive Guide
Getting Started with WebLogic Server
Using JNDI and RMI
Configuring Trust Between Two Domains
Security
The Logging Architecture
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Review Questions
Configuring Cisco Gateways and Trunks
Review Questions
Working with Locally Significant Certificates
Review Questions
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Defining a Macro
Counting Instances of Each Word in a Text File
Determining if One Objects Class Is a Subclass of Another
Copying a File
Parsing a Complex XML Document
C++ GUI Programming with Qt 3
Making Connections
Using the Reference Documentation
Pointer-Based Containers
TCP Networking with QSocket
Session Management
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Command-Line Editing Keys
Virtual Terminals (VTYs)
The Auxiliary (AUX) Port
Frame Relay
How Packets Match a List Entry
Special Edition Using Crystal Reports 10
Filtering the Data in Your Report
Using the Formula Workshop
Multidimensional Reporting Against OLAP Data with Crystal Reports
Introduction to Crystal Analysis
Querying the Crystal Enterprise InfoStore
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies