fields & frames

Ochiva, Dan
November 2004
Millimeter;Nov2004, Vol. 32 Issue 11, p65
Trade Publication
Reports on developments involving companies in the field of digital technology in the U.S. Announcement made by Microsoft regarding the formation of a group in developing relationships with the media and entertainment industries; Launch of a rental facility in California by Dalsa; Advantage of Orb Networks' new service.


Related Articles

  • Performance Study of Two Phase Locking in Single-Site Database Systems. Pun, K. H.; Belford, Geneva G. // IEEE Transactions on Software Engineering;Dec87, Vol. 13 Issue 12, p1311 

    Many database systems guarantee the consistency of the database for concurrent transaction processing by a standard locking protocol called two phase locking. The performance of such systems is dependent on various factors, among which are the choices of locking granularity (the amount of data...

  • OCTAVE.  // Network Dictionary;2007, p349 

    A definition of the term "octave" is presented. It refers to a methodology for evaluating the security risks associated with information systems.

  • Using Recommendation Systems in Course Management Systems to Recommend Learning Objects. Itmazi, Jamil; MegĂ­as, Miguel // International Arab Journal of Information Technology (IAJIT);Jul2008, Vol. 5 Issue 3, p234 

    Recommendation systems have been widely used in many internet activities and their importance is increasing due to the information overload problem arising from internet. This paper gives background and some example of the RS current usage domains, the different recommendation systems...

  • Comments on "A Method for Representing Data Items of Unlimited Length in a Computer Memory". Horspool, R. Nigel; Hehner, Eric C. R. // IEEE Transactions on Software Engineering;Nov82, Vol. 8 Issue 6, p620 

    A scheme for representing data items with unlimited length is presented. The idea of prefixing data with its length and that the length may itself need similar encoding is not new. Fixed-length address formates used in computers mus inherently limit the sizes of usable data items. An alterantive...

  • Multidimensional Timestamp Protocols for Concurrency Control. Leu, Pei-Jyun; Bhargava, Bharat // IEEE Transactions on Software Engineering;Dec87, Vol. 13 Issue 12, p1238 

    We propose multidimensional timestamp protocols for concurrency control in database systems where each transaction is assigned a timestamp vector containing multiple elements. The time- stamp vectors for two transactions can be equal if timestamp elements are assigned the same values. The...

  • Even Data Bases That Lie Can Be Compromised. Demillo, Richard A.; Dobkin, David; Lipton, Richard J. // IEEE Transactions on Software Engineering;Jan78, Vol. 4 Issue 1, p73 

    Users can compromise data bases by asking a series of questions, even when the data bases are allowed to lie.

  • NetSupport DNA.  // Database & Network Journal;Oct2004, Vol. 34 Issue 5, p23 

    This article seeks to report the release of NetSupport DNA 2.0. With NetSupport DNA, IT departments at small and medium-sized firms can know what hardware and software they have in place, monitor application usage, budget more accurately for upgrades, improve their in-house IT support and even...

  • On the Execution of Large Batch Programs in Unreliable Computing Systems. Leung, Clement H. C.; Qui Hoon Choo // IEEE Transactions on Software Engineering;Jul84, Vol. 10 Issue 4, p444 

    The execution of long-running batch programs imposes severe reliability constraints on a computing system since the occurrence of a failure during its execution is mote likely and that once occurred, a failure would destroy all the processing performed thus fax. This paper studies the execution...

  • Merging the Best of Two Worlds. Sailor, Scott // Athletic Therapy Today;Jul2005, Vol. 10 Issue 4, p28 

    This article focuses on the mail-merge function in Microsoft Word. This facility enables the user to create a set of documents that are essentially the same except where each document contains unique elements. When using mail merge, it is as simple as creating one document that contains the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics