Flylib.com
Index_K
Previous page
Table of content
Next page
K
knowledge, distinction from information and learning, 134
knowledge asymmetries, 197 “199
knowledge-based trust, 250 “251
knowledge management, 240 “241
knowledge rearticulation, 224
knowledge sharing
see
knowledge transfer
knowledge transfer, 36 “37, 209, 221 “225
and identity, 212, 222 “223
and standardization, 222, 224
between individuals, 132
between institutions, 132
in project teams , 132
over time, 133
Korea, 43, 44, 47, 209, 257
Previous page
Table of content
Next page
Global IT Outsourcing: Software Development across Borders
ISBN: 0521039487
EAN: 2147483647
Year: 2003
Pages: 91
Authors:
Sundeep Sahay
,
Brian Nicholson
,
S. Krishna
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
Key Terms
Algorithms
Steganography
Footprinting
Glossary
Documenting Software Architectures: Views and Beyond
P.6. Seven Rules for Sound Documentation
Overview
Chunking Information: View Packets, Refinement, and Descriptive Completeness
How to Document Behavior: Notations and Languages
For Further Reading
The Complete Cisco VPN Configuration Guide
VPNs: Choosing a Solution
Introduction to Accessing a Concentrator
Verifying and Troubleshooting Concentrator Connections
Cisco VPN Client Overview
Summary
C++ How to Program (5th Edition)
Default Arguments
Self-Review Exercises
Terminology
G.11. Class Withdrawal
Summary
Java How to Program (6th Edition) (How to Program (Deitel))
(Optional) GUI and Graphics Case Study: Displaying Text and Images Using Labels
Introduction
Common GUI Event Types and Listener Interfaces
Summary
JPopupMenu
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Wire and Cable Basics
Computer Network Hardware
Designing and Installing Distributed Audio Systems
Designing and Installing a Home Telephone System
Designing a Home Security System
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies