Monitoring technology and firm boundaries: Physician–hospital integration and technology utilization

2010 ◽  
Vol 29 (3) ◽  
pp. 457-467 ◽  
Author(s):  
Jeffrey S. McCullough ◽  
Eli M. Snir
2018 ◽  
Vol 1 (1) ◽  
pp. 67-73
Author(s):  
Zelivieska Bintang Maharani ◽  
Ratna Pratiwi ◽  
Qory Anissa ◽  
Dwi Ratnasari ◽  
Sugeng Waluyo ◽  
...  

In South Tangerang city, there are many home industries producing charcoal shell. One of the industry is practiced by Mr. Abdul Razak in Ciputat District. According to some studies, in general the home industry is facing many problems, one of which is a weak in marketing strategy. Based the information, this article reports the marketing strategies implemented by the industry. With SWOT approach, we informed that the position of industrial strength lies in good relationships with suppliers. And the weakness is that the marketing activities carried out only through word of mouth. We recommend that the industry need to consider the using of banners or internet-based technology utilization for the marketing strategies.


Author(s):  
Qingtao Wu ◽  
Zaihui Cao

: Cloud monitoring technology is an important maintenance and management tool for cloud platforms.Cloud monitoring system is a kind of network monitoring service, monitoring technology and monitoring platform based on Internet. At present, the monitoring system is changed from the local monitoring to cloud monitoring, with the flexibility and convenience improved, but also exposed more security issues. Cloud video may be intercepted or changed in the transmission process. Most of the existing encryption algorithms have defects in real-time and security. Aiming at the current security problems of cloud video surveillance, this paper proposes a new video encryption algorithm based on H.264 standard. By using the advanced FMO mechanism, the related macro blocks can be driven into different Slice. The encryption algorithm proposed in this paper can encrypt the whole video content by encrypting the FMO sub images. The method has high real-time performance, and the encryption process can be executed in parallel with the coding process. The algorithm can also be combined with traditional scrambling algorithm, further improve the video encryption effect. The algorithm selects the encrypted part of the video data, which reducing the amount of data to be encrypted. Thus reducing the computational complexity of the encryption system, with faster encryption speed, improve real-time and security, suitable for transfer through mobile multimedia and wireless multimedia network.


Author(s):  
Tim Whitmarsh

Chariton’s Callirhoe is the earliest extant example of the Greek novel. What preceding texts are there that resemble it? Martin Braun demonstrated in the 1930s that many of the motifs that we think of as characteristically novelistic are found in Josephus’s retelling of the story of Joseph and Potiphar’s wife. Does that tell us that Josephus was influenced by now-lost novels? Or that Jewish storytelling influenced the course of the novel? Or that these motifs were shared between Greek and Jewish culture, without firm boundaries of genre?


2019 ◽  
Vol 102 (4) ◽  
pp. 413-418 ◽  
Author(s):  
C. Tarantini ◽  
P. Brouqui ◽  
R. Wilson ◽  
K. Griffiths ◽  
P. Patouraux ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document