3,037 research outputs found

    New Product Development Portfolio Web Interface version 2.0

    Get PDF
    This project involved the development of an interactive web interface for a new product portfolio assessment tool. The tool\u27s purpose is to assess the various new products that a company is developing in order to assist the company in making selection, prioritization, and resource allocation decisions. Users input numerical data about each project (e.g. unit price, unit cost, life cycle, etc) and score the project on 19 questions across four categories (competitive advantage, marketing resources, technical resources, and technical uncertainty) using a seven-point scale. The tool then makes a variety of calculations based on these inputs and allows the user to generate comparisons of the company\u27s projects based on several criteria (e.g. net present value, return on investment, etc)

    Reviewing effectivity in security approaches towards strengthening internet architecture

    Get PDF
    The usage of existing Internet architecture is shrouded by various security loopholes and hence is highly ineffective towards resisting potential threats over internet. Hence, it is claimed that future internet architecture has been evolved as a solution to address this security gaps of existing internet architecture. Therefore, this paper initiates its discussion by reviewing the existing practices of web security in conventional internet architecture and has also discussed about some recent solutions towards mitigating potentially reported threats e.g. cross-site scripting, SQL inject, and distributed denial-of-service. The paper has also discussed some of the recent research contribution towards security solution considering future internet architecture. The proposed manuscripts contributes to showcase the true effectiveness of existing approaches with respect to advantages and limitation of existing approaches along with explicit highlights of existing research problems that requires immediate attention

    The Cord Weekly (September 26, 2002)

    Get PDF

    The BG News August 3, 2005

    Get PDF
    The BGSU campus student newspaper August 3, 2005. Volume 95 - Issue 160https://scholarworks.bgsu.edu/bg-news/8457/thumbnail.jp

    The Legacy, November 16, 2011

    Get PDF
    Student Newspaper of Lindenwood Universityhttps://digitalcommons.lindenwood.edu/legacy/1082/thumbnail.jp

    Intertext 2016 ā€” Complete Issue

    Get PDF
    The complete issue of Intertext 24 (2016)

    Possession work on hosted digital consumption objects as consumer ensnarement

    Get PDF
    This paper extends prior critical discussions of digital prosumption by demonstrating that prosumer reliant online business models represent new ways to valorise consumer labour through the creation of multiple realities whereby digital consumption objects are simultaneously enacted as assests by companies, and as possessions by consumers. We argue that this ontological multiplicity means that consumersā€™ ā€˜possession workā€™ no longer serves to separate these objects from the market sphere, as in prior work. This produces a new form of consumer lock-in, or actually ensnarement as it is consumersā€™ own efforts to make objects meaningful that keep them in the market, similar to the psychological attachments seen in ā€˜brand loveā€™, but also incorporating aspects of proprietary tie-ins, and access-based market systems. We further consider the implications of such a system. For companies we portray such ensnarement as an attractive, emerging mechanism for ongoing valorization of ā€˜free labourā€™. Yet we also argue that this presents significant consequences for ensnared consumers who may be subject not only to the ongoing financial exploitation of their possession work, but also restrictions on possession. As a broader contribution we highlight how the examination of multiple, potentially conflicting
    • ā€¦
    corecore