Skip to main content

Home/ Groups/ ncushu
Wesley Shu

VRML - Wikipedia, the free encyclopedia - 0 views

  • Virtual Reality Modeling Language
tiffanyshu

Taxonomy - Wikipedia, the free encyclopedia - 0 views

  • Taxonomy is the practice and science of classification.
  • usage within "Knowledge Management",
  • Some have argued that the human mind naturally organizes its knowledge of the world into such systems. This view is often based on the epistemology of Immanuel Kant.
  • ...1 more annotation...
  • Taxonomy
Wesley Shu

Mass Customization & Open Innovation News: An interview with Eric von Hippel, M... - 0 views

  • to integrate customers in the innovation process by the means of co-design toolkits.
Wesley Shu

Scripting language - Wikipedia, the free encyclopedia - 0 views

  • Scripts remain in their original form and are interpreted command-by-command each time they are run.
Wesley Shu

Multitier architecture - Wikipedia, the free encyclopedia - 0 views

  • Three-tier' is a client-server architecture in which the user interface, functional process logic ("business rules"), data storage and data access are developed and maintained as independent modules, most often on separate platforms.
  • multitier architectures
  • The 3-Tier architecture has the following 3-tiers. 1. Presentation Tier 2. Application Tier/Logic Tier/Business Logic Tier 3. Data Tier
  • ...6 more annotations...
  • Web Development usage
  • A front end Web server serving static content A middle dynamic content processing and generation level Application server, for example Java EE platform. A back end Database, comprising both data sets and the Database management system or RDBMS software that manages and provides access to the data.
  • client-server architecture in which the user interface, functional process logic ("business rules"), computer data storage and data access are developed and maintained as independent modules, most often on separate platforms.
  • Presentation Tier
  • Application Tier (Business Logic/Logic Tier)
  • Data Tier
Wesley Shu

Online File W2.4: - 0 views

  • Foundation services: These are the core services commonly used to build Web applications, including business integration, collaboration, content management, identity management, and search. These services vary by customer, and may include others. Integration products: These are components that integrate content, application services, and security from existing systems, such as groupware, ERP, and CRM systems. Portal platform: The platform consists of the personalization, administrative, and knowledge management framework that brings together a broad range of electronic resources in different Web experiences. Composite applications: These are Web applications hosted within the portal that combine services from different systems, which the portal orchestrates in custom business processes.
Wesley Shu

Communications protocol - Wikipedia, the free encyclopedia - 0 views

  • the set of standard rules for data representation, signalling, authentication and error detection required to send information over a communications channel.
Wesley Shu

TCP/IP model - Wikipedia, the free encyclopedia - 0 views

  • The five layer TCP/IP model
  • Layer 4 - Process Layer or Application Layer - This is where the "higher level" protocols such as SMTP, FTP, SSH, HTTP, etc. operate. Layer 3 - Host-To-Host (Transport) Layer - This is where flow-control and connection protocols exist, such as TCP. This layer deals with opening and maintaining connections, ensuring that packets are in fact received. Layer 2 - Internet or Internetworking Layer - This layer defines IP addresses, with many routing schemes for navigating packets from one IP address to another. Layer 1 - Network Access Layer - This layer describes the physical equipment necessary for communications, such as twisted pair cables, the signalling used on that equipment, and the low-level protocols using that signalling.
Wesley Shu

Internet media type - Wikipedia, the free encyclopedia - 0 views

  • An Internet media type,[1]
Wesley Shu

RSS - Wikipedia, the free encyclopedia - 0 views

  • the reader can then check the user's subscribed feeds to see if any of those feeds have new content since the last time it checked, and if so, retrieve that content and present it to the user. >
Wesley Shu

Demilitarized zone (computing) - Wikipedia, the free encyclopedia - 0 views

  • The DMZ is typically used for connecting servers that need to be accessible from the outside world, such as e-mail, web and DNS servers.
  • A DMZ is often created through a configuration option on the firewall, where each network is connected to a different port on the firewall - this is called a three-legged firewall set-up.
unicornz

大公網-首頁新聞 - 0 views

  • 甲骨文公司在大連設立的全球支持中心
  • 取代東京公司在亞太的地位,成為亞太地區的服務中心。
  • 甲骨文大連全球支持中心是其18個全球支持中心之一
Wesley Shu

Local area network - Wikipedia, the free encyclopedia - 0 views

  • A local area network is a computer network covering a small geographic area, like a home, office, or group of buildings.
Wesley Shu

Firewall (networking) - Wikipedia, the free encyclopedia - 0 views

  • A firewall is an information technology (IT) security device which is configured to permit, deny or proxy data connections set and configured by the organization's security policy.
  • 3 Types 3.1 Network layer 3.2 Application-layer 3.3 Proxies
chuchu444

Web marketers hunt濳he perfect online ad - March 1, 2007 - 0 views

  • But consider this little-known fact: Internet users spend a mere 5 percent of their time actually searching. The rest of the time, they're trolling the vast expanse of Internet space, leaving marketers ever more opportunity to fill it with display ads.
  • "Marketers now all have to understand the power of algorithms," she says. Today everything about a fully realized Web campaign - how the creative messages look, what color the ads are, what sites they're placed on and where on each site, what time of day they run and how frequently - is determined at least in part by software applications known as "creative optimizers."
  • And every big media company is paying attention. The fact that Google doesn't (yet) dominate the market for display ads is only accelerating the arms race for faster, smarter, more efficient ways of building and deploying display ads. Yahoo, the perennial No. 2 in paid search, already brings in an estimated $1.5 billion from selling ad space mainly on its own sites, and would love to see that number surge. Analysts estimate that Time Warner's AOL unit, long the ugly stepchild of its corporate parent (which is also Business 2.0's parent), will generate $1.6 billion from display ads this year, much of that from selling ads on third-party sites. From mighty Microsoft (Charts) to a host of tiny startups, everyone is racing to build a better display ad.
  • ...6 more annotations...
  • As the most visited destination on the Web, Yahoo has an estimated 131 million monthly unique visitors to its sites. By dropping cookie files onto every Web browser that calls up one of its sites, Yahoo has amassed a staggering amount of data about its users. Fayyad rides herd on the 12 terabytes of user information that flow into Yahoo's servers every day, more than the entire inventory of the Library of Congress. The data is crunched, blended with information about what people do on Yahoo's search engine, and fed into models that predict consumer behavior.
  • This has led Fayyad to an important conclusion: What you do on the Web reveals far more about you than what you type into a search box.
  • What you do when you aren't searching - the other 95 percent of the time you spend online - is gold to advertisers. Yahoo often sells ad space based not on a site's content but on a consumer's online behavior, a growing practice known as behavioral targeting.
  • But the company also sells ad space for about 3,000 smaller sites through its Advertising.com business, which it bought in 2004 for $435 million.
  • While Google has served up ads that use all sorts of images - including animated ads and, just recently, click-to-play video ads - media buyers say most of Google's display ads are short text ads similar to what you'd see beside search results.
  • For now, Google is in a difficult spot. As the leading search engine, it could certainly track its users' behavior to develop super-targeting capabilities for display ads.
  •  
    nice highlights :)
Wesley Shu

Internet protocol suite - Wikipedia, the free encyclopedia - 0 views

  • The > > Internet protocol suite is the set of > communications protocols > that implements the > protocol stack > on which the > Internet > and many commercial networks run. It is part of the > TCP/IP > protocol suite > , which is named after two of the most important protocols in it: the > Transmission Control Protocol > > (TCP) and the > > Internet Protocol > (IP) > >,
  • The Internet protocol suite — like many protocol suites — can be viewed as a set of layers. Each layer solves a set of problems involving the transmission of data, and provides a well-defined service to the upper layer protocols based on using services from some lower layers. Upper layers are logically closer to the user and deal with more abstract data, relying on lower layer protocols to translate data into forms that can eventually be physically transmitted.
Wesley Shu

《數位之牆》Web 2.0 革命(二)新媒體初成 - 0 views

  • 拉高「每訪客平均頁面瀏覽量」,就必 須延長用戶停留在搜尋引擎的時間,提升「網站總頁面瀏覽量」。因 此「準備多一點內容給用戶看」就成了理所當然的思維。
  • 拉高「每訪客平均頁面瀏覽量」,就必 > 須延長用戶停留在搜尋引擎的時間,提升「網站總頁面瀏覽量」。因 > 此「準備多一點內容給用戶看」就成了理所當然的思維。 >
  • ...3 more annotations...
  • 針對少數重度搜尋使用 者來經營
  • 只是市場區隔永遠只會發生在市場飽和時
Wesley Shu

Wiki - Wikipedia, the free encyclopedia - 0 views

  • in a simple markup language using a web browser
  • Sometimes session log-in is requested to acquire a "wiki-signature" cookie for autosigning edits.
  • A defining characteristic of wiki technology is the ease with which pages can be created and updated.
  • ...3 more annotations...
  • a means to verify the validity of recent additions to the body of pages.
  • The most prominent, on almost every wiki, is the "Recent Changes" page
  • The approach of making damage easy to undo rather than attempting to prevent damage has been characterized as soft security.[7]
Wesley Shu

Yahoo! gives up quest for search dominance - 0 views

  • Yahoo! handled 19 percent of global Internet searches in November, a drop from 27 percent a year earlier, according to Web tracker ComScore Networks Inc. Google's share, by contrast, rose to 60 percent from 47 percent.
« First ‹ Previous 81 - 100 Next › Last »
Showing 20 items per page