Algorithm-embedded IT applications for an emerging knowledge city: Istanbul, Turkey

2014 ◽  
Vol 41 (12) ◽  
pp. 5625-5635 ◽  
Author(s):  
Melih Bulu ◽  
Muhammed Ali Önder ◽  
Vural Aksakalli
Keyword(s):  
2013 ◽  
Vol 82 (11) ◽  
pp. 1035-1036 ◽  
Author(s):  
David Sammon ◽  
John O’Donoghue ◽  
John Herbert ◽  
Kieran A. O’Connor

2011 ◽  
Vol 28 (2) ◽  
pp. 9-15 ◽  
Author(s):  
Veeramani Marimuthu ◽  
Vinayagamoorthy Paraman

10.28945/3025 ◽  
2006 ◽  
Author(s):  
Fernando Jose Barbin Laurindo ◽  
Renato de Oliveira Moraes

In the highly competitive nowadays markets, many companies actions assume the project form. In special, Information Technology (IT) projects assume great importance, enabling the dynamic actions that organisations need (Porter, 2001; Tapscott, 2001). However, IT applications assume different roles, from operational support to strategic, according to companies’ strategies and operations, besides the peculiarities of the industry in which they compete (McFarlan, 1984; Porter & Millar, 1985). According to this role (appraised by McFarlan’s Strategic Grid), ex-ante evaluation practices for selecting IT projects to be implemented can vary (Jiang & Klein, 1999). The objective of this paper is to analyse practices for selecting IT projects in Brazilian companies classified in different quadrants of the Strategic Grid and to observe any differences in ex-ante evaluation practices among them. The adopted methodological approach was qualitative research, more specifically case study (Claver, Gonzalez & Llopis, 2000; Yin, 1991) performed in four companies.


2018 ◽  
Vol 35 (5) ◽  
pp. 1461-1472 ◽  
Author(s):  
Nebojša Stanković ◽  
Živadin Micić

Author(s):  
Israa Al_Barazanchi ◽  
Aparna Murthy ◽  
Ahmad AbdulQadir Al Rababah ◽  
Ghadeer Khader ◽  
Haider Rasheed Abdulshaheed ◽  
...  

Blockchain innovation has picked up expanding consideration from investigating and industry over the later a long time. It permits actualizing in its environment the smart-contracts innovation which is utilized to robotize and execute deals between clients. Blockchain is proposed nowadays as the unused specialized foundation for a few sorts of IT applications. Blockchain would aid avoid the duplication of information because it right now does with Bitcoin and other cryptocurrencies. Since of the numerous hundreds of thousands of servers putting away the Bitcoin record, it’s impossible to assault and alter. An aggressor would need to change the record of 51 percent of all the servers, at the precise same time. The budgetary fetched of such an assault would distantly exceed the potential picks up. The same cannot be said for our private data that lives on single servers possessed by Google and Amazon. In this paper, we outline major Blockchain technology that based as solutions for IOT security. We survey and categorize prevalent security issues with respect to IoT data privacy, in expansion to conventions utilized for organizing, communication, and administration. We diagram security necessities for IoT together with the existing scenarios for using blockchain in IoT applications.


Sign in / Sign up

Export Citation Format

Share Document