摘要 :
This article defines and describes the numerous types of “clients” for picture archiving and communication systems (PACS). A radiologist uses a client to view images stored in the system. Many PACS are available in the market, a...
展开
This article defines and describes the numerous types of “clients” for picture archiving and communication systems (PACS). A radiologist uses a client to view images stored in the system. Many PACS are available in the market, and each offers different methods by which a client can view images from the server. The terminology used to describe these different methods can cause confusion and lead to poor choice for those imaging team members who are given the task of purchasing, implementing, and supporting the PACS. We propose a classification of clients with respect to their impact on client work stations, an effect often referred to as the application’s thickness. The thinner the client, the less effect it has on the hosting work station. In contrast, a thick client consumes the work station’s resources and often prevents a work station from being used to effectively run anything other than the client application. Functionality and supportability are highlighted as key and interacting metrics in determining optimal correct PACS solutions. The importance of a clear understanding of the needs and requirements of all users as well as the client application is emphasized. This relationship between supportability and functionality becomes increasingly important as the industry shifts to enterprise information technology solutions.
收起
摘要 :
This study focuses on examining client citizenship behaviors (CCBs) from a psychological contract perspective in enterprise systems (ES) vendor-client relationships. Using polynomial modeling to capture the discrepancy between exp...
展开
This study focuses on examining client citizenship behaviors (CCBs) from a psychological contract perspective in enterprise systems (ES) vendor-client relationships. Using polynomial modeling to capture the discrepancy between expected obligations and delivered fulfillments, this stud unpacks psychological contract and investigates the impacts of psychological contract under-fulfillment, fulfillment, and over-fulfillment on CCBs. The results show that both under-fulfillment and over-fulfillment of psychological contract are negatively related to CCBs. CCBs are shown to be higher when expected obligation and delivered fulfillment are both high than when both are low. The theoretical contributions and practical implications are discussed.
收起
摘要 :
The rapid developments in the field of information technology - from e-business via CRM to Data "Warehouse - implicate real competitive advantages for the enterprise only by complete integration of all parts of computer applicatio...
展开
The rapid developments in the field of information technology - from e-business via CRM to Data "Warehouse - implicate real competitive advantages for the enterprise only by complete integration of all parts of computer applications. Thereby technical and planning challenges are to be solved.
收起
摘要 :
Die rasanten Entwicklungen in der IT-Landschaft - von E-Business uber CRM bis Data Warehouse - bringen Unternehmen erst dann wirkliche Wettbewerbsvorteile, wenn eine Komplettintegration aller in einer EBV-Lo-sung vorhandenen Baust...
展开
Die rasanten Entwicklungen in der IT-Landschaft - von E-Business uber CRM bis Data Warehouse - bringen Unternehmen erst dann wirkliche Wettbewerbsvorteile, wenn eine Komplettintegration aller in einer EBV-Lo-sung vorhandenen Bausteine gelingt. Ein technischer und planerischer Spagat, der Anbieter von IT-Losungen ebenso wie IT-Entscheider vor neue und anspruchsvolle Herausforderungen stellt.
收起
摘要 :
The implementation of enterprise systems (ES) is an IT-enabled collaboration between vendors and clients. This collaboration contributes to the economy of developing countries by offering high added value with low resource consump...
展开
The implementation of enterprise systems (ES) is an IT-enabled collaboration between vendors and clients. This collaboration contributes to the economy of developing countries by offering high added value with low resource consumption. Researchers and practitioners in the ES service industry believe that the citizenship behavior of clients is critical to the success of such a collaboration. However, despite this recognition, current knowledge on how to improve the citizenship behavior of clients through the benefits provided by ES remains unclear. The present study uses social exchange theory in proposing a model for examining the effects of ES benefits (i.e. ES task efficiency and ES coordination improvement) on client citizenship behavior in China through guanxi (i.e. renqing and ganqing). The data collected from 112 client firms of a focal ES vendor support most of the hypotheses. ES task efficiency and ES coordination improvement positively affect renqing, which in turn influences client citizenship behavior. ES coordination improvement positively influences ganqing and sequentially client citizenship behavior. Implications and suggestions for future research are provided.
收起
摘要 :
This article defines the significance of tourism and the main subjects of tourism activities, the competitiveness of the tourism company and effective strategies for increasing customer loyalty.
摘要 :
Switching to an enterprise e-business architecture requires hard decisions, but promises many benefits. The paper considers e-business architecture design issues, client server and thin client architectures and the logical services model.
摘要 :
In this paper, we address the security challenges for wireless mesh enterprise networks (WMENs). The topology and communication characteristics of WMEN include the following: (a) deployment of the network devices are not planar, r...
展开
In this paper, we address the security challenges for wireless mesh enterprise networks (WMENs). The topology and communication characteristics of WMEN include the following: (a) deployment of the network devices are not planar, rather, devices are deployed over three-dimensional space (e.g., office buildings, shopping malls, grocery stores, etc.); (b) messages, generated/received by a mesh client, traverse through mesh routers in a multihop fashion; and (c) mesh clients, being mostly mobile in nature, may result in misbehaving or be spurious during communications. We propose a security scheme for WMEN in order to ensure that only authorized users are granted network access. Particularly, our scheme includes: (a) a deterministic key distribution technique that perfectly suits the network topology, (b) an efficient session key establishment protocol to achieve the client-router and router-router communications security, and (c) a distributed detection mechanism to
identify malicious clients in the network. Analytical and simulation results are presented to verify our proposed solutions.
收起
摘要 :
In this paper, we address the security challenges for wireless mesh enterprise networks (WMENs). The topology and communication characteristics of WMEN include the following: (a) deployment of the network devices are not planar, r...
展开
In this paper, we address the security challenges for wireless mesh enterprise networks (WMENs). The topology and communication characteristics of WMEN include the following: (a) deployment of the network devices are not planar, rather, devices are deployed over three-dimensional space (e.g., office buildings, shopping malls, grocery stores, etc.); (b) messages, generated/received by a mesh client, traverse through mesh routers in a multihop fashion; and (c) mesh clients, being mostly mobile in nature, may result in misbehaving or be spurious during communications. We propose a security scheme for WMEN in order to ensure that only authorized users are granted network access. Particularly, our scheme includes: (a) a deterministic key distribution technique that perfectly suits the network topology, (b) an efficient session key establishment protocol to achieve the client–router and router–router communications security, and (c) a distributed detection mechanism to identify malicious clients in the network. Analytical and simulation results are presented to verify our proposed solutions. Keywords Wireless mesh enterprise networks - Key distribution - Communications security - Malicious client detection
收起
摘要 :
Deliberating on Enterprise Resource Planning (ERP) software sourcing and provision, this paper contrasts the corporate environment with the small business environment. The paper is about Enterprise Resource Planning client (ERPc) ...
展开
Deliberating on Enterprise Resource Planning (ERP) software sourcing and provision, this paper contrasts the corporate environment with the small business environment. The paper is about Enterprise Resource Planning client (ERPc) expectations and Enterprise Resource Planning vendor (ERPv) value propositions as a mutually compatible process for achieving acceptable standards of ERP software performance. It is suggested that a less-than-equitable vendor-client relationship would not contribute to the implementation of the optimum solution. Adapting selected theoretical concepts and models, the researchers analyse ERPv to ERPc relationship. This analysis is designed to discover if the provision of the very large ERP vendors who market systems such as SAP, and the provision of the smaller ERP vendors (in this instance Eshbel Technologies Ltd who market an ERP software solution called Priority) when framed as a value proposition (Walters, D. (2002) Operations Strategy. Hampshire, UK: Palgrave), is at all comparable or distinctive.
收起