TITLE

Strategic IT Transformation

AUTHOR(S)
Dickinson, Clay
PUB. DATE
July 2005
SOURCE
Hospitality Upgrade;Summer2005, p186
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Describes the afflictions of information technology systems in hospitality companies. Improvement of cost competitiveness and high quality service delivery; Accommodation of network reliability and embedded security to accommodate both employees and customers; Identification of business domain and industry knowledge.
ACCESSION #
17423645

 

Related Articles

  • A Secured Architectural Model to Prevent DOS Attacks in Web-Based Embedded Applications. Calpakkam, Yaashuwanth; Ramadoss, Ramesh; Elangovan, Uma // European Journal of Scientific Research;10/1/2011, Vol. 61 Issue 2, p194 

    The main objective of the paper is to discuss the security issues in web based embedded systems and to develop the secured architectural model for a web based embedded application. As the result of recent advancement of high-speed networking and the single processor-computing environment has...

  • Guard your embedded secrets. Webb, Warren // EDN Europe;Jul2001, Vol. 46 Issue 7, p44 

    Discusses several desktop security-related problems affecting embedded computer systems (ECS). Limited processing and memory resources that make ECS more vulnerable to concentrated attacks; Proliferation of embedded operating systems and architectures; Lack of gateway computers that can isolate...

  • THREAT OF THE MONTH. Carey, Marcus // SC Magazine: For IT Security Professionals (15476693);Mar2012, Vol. 23 Issue 3, p13 

    The article presents questions and answers regarding compromised embedded systems as security threat of the month for March 2012, including what it is, how it works, and how to prevent it.

  • A Conceptual Approach for the Role of Technology in Service Value Creation. Hyungu Kang // Business Journal for Entrepreneurs;2011, Vol. 2011 Issue 4, p1 

    It has become increasingly critical for firms in various service industries to effectively manage the use and adoption of critical technologies. Technology as a source of building competitive advantage is playing an important role in many service industries. While various service classification...

  • Integration of data mining within a Strategic Knowledge Management framework: A platform for competitive advantage in the Australian mining sector. Moayer, Sanaz; Gardner, Scott // International Journal of Advanced Computer Science & Application;Aug2012, Vol. 3 Issue 8, p67 

    In today's globally interconnected economy, knowledge is recognised as a valuable intangible asset and source of competitive advantage for firms operating in both established and emerging industries. Within these contexts Knowledge Management (KM) manifests as set of organising principles and...

  • State of the Art: Embedding Security in Vehicles. Wolf, Marko; Weimerskirch, AndrĂ©; Wollinger, Thomas // EURASIP Journal on Embedded Systems;2007 Special Issue 5, p1 

    For new automotive applications and services, information technology (IT) has gained central importance. IT-related costs in car manufacturing are already high and they will increase dramatically in the future. Yet whereas safety and reliability have become a relatively well-established field,...

  • Embedded switching adds reliability. Hammond-Doel, Thomas // Network World;1/27/2003, Vol. 20 Issue 4, p41 

    Discusses how embedded storage switching increases storage system performance and reliability. Information technology managers' use of embedded switching a tool to deploy automatic maintenance, monitoring and repair; Description how embedded storage switching replaces a shared-bus architecture...

  • The enemy within. Connolly, P.J. // InfoWorld;11/11/2002, Vol. 24 Issue 45, p26 

    Presents an article on information technology security weaknesses. Findings of a survey on the challenges to securing systems; Actions needed to solve computer security problems.

  • How Real is Real Time?  // CIO Insight;Jan2003, Issue 22, p21 

    Examines the prospects for developing real-time enterprise. Use of embedded systems and safety-critical computing; Components of real-time systems; Development of information-based technologies; Implications for business management.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics