Flylib.com
List of Tables
Previous page
Table of content
Chapter 2: Information Technology
Table 2.1: Performance Metrics Relevant to a Software Application
Table 2.2: Estimated Improvement in Performance per Unit Cost for the Information Technologies
Table 2.3: The Four Historical Overlapping Phases of Computing
Table 2.4: Scaling Laws for MOS Integrated Circuits with a Fixed Electric Field Intensity
Chapter 4: Creating Software
Table 4.1: Typical Phases in a Waterfall Model of Software Development
Table 4.2: Considerations in Choosing Single-Stage Compilation vs. Interpretation
Table 4.3: Examples of Middleware Services That Would Extend the Infrastructure Utility Model
Chapter 5: Management
Table 5.1: Stages of the Software Supply Value Chain and Their Generic Tasks
Table 5.2: Generic Types of Software Releases
Table 5.3: Characteristics Ascribed to Different Types of Releases
Table 5.4: Four Major Threats to Information as It Crosses a Network
Table 5.5: Issues to be Addressed in Privacy Policies
Table 5.6: Examples of Access Control Mechanisms Enforced in the Infrastructure
Chapter 6: Software Supply Industry
Table 6.1: Considerations in Choosing an Application and Its Supplier
Chapter 7: Software Creation Industry
Table 7.1: Description of Layers Shown in Figure 7.5
Table 7.2: Core Competencies Relating to the Software Industry
Table 7.3: Examples of infrastructure Defined by Application and Technology Dependence
Table 7.4: Methodologies for Building Software on an Existing Code Base
Table 7.5: Properties That Distinguish a Component
Table 7.6: Industrial Contexts for Development Methodologies
Chapter 8: Government
Table 8.1: Generic Types of Source Code Software Licenses
Table 8.2: Approaches to Copy Protection
Chapter 9: Economics
Table 9.1: Examples of Pricing Options for Software Applications
Table 9.2: Costs in Supplying Software to the End-User
Previous page
Table of content
Software Ecosystem: Understanding an Indispensable Technology and Industry
ISBN: 0262633310
EAN: 2147483647
Year: 2005
Pages: 145
Authors:
David G. Messerschmitt
,
Clemens Szyperski
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Passing Null Values to Parameters
Retrieving Update Errors
Determining the Differences in Data Between Two DataSet Objects
Retrieving Constraints from a SQL Server Database
Refreshing a DataSet Automatically Using Extended Properties
Building Web Applications with UML (2nd Edition)
Distributed Objects
The Artifacts
Requirements
Activities
Analysis Model Classes
MySQL Clustering
Startup Phases
Management Nodes
Using Multiple Management Nodes
Query Execution
Logging Commands
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Internet Protocol (IP) Addressing
Internet Protocol (IP) Routing
Internet Control Message Protocol (ICMP)
Internet Protocol Version 6 (IPv6)
Transmission Control Protocol (TCP) Basics
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Credibility and Computers
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
File System Forensic Analysis
Summary
File System Metadata Files
File Name Category
Group Descriptor Tables
The Big Picture
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies