107,332 research outputs found

    Selling Technology: The Changing Shape of Sales in an Information Economy

    Get PDF
    [Excerpt] This book describes and explains the changing nature of sales through the daily experiences of salespeople, engineers, managers, and purchasing agents who construct markets for emergent technologies through their daily engagement in sales interactions… [It] provides a grounded empirical account of sales work in an area that has been the subject of insufficient study, namely contemporary industrial markets where firms trade with other firms

    Crossroads Rhode Island: Proposed Social Enterprise Business Plan

    Get PDF
    Crossroads Rhode Island provides their clients with a continuum of care that includes basic emergency needs, shelter, housing, case management and vocational services for individuals and families. In order to provide these services they rely on the generosity of their donors and supporters who have helped Crossroads to become the largest homeless services organization in Rhode Island. It is important to Crossroads that they stick to their core values of safety, respect, and effectiveness when helping the homeless or at-risk individuals and families secure stable homes

    Shortest Path Computation with No Information Leakage

    Get PDF
    Shortest path computation is one of the most common queries in location-based services (LBSs). Although particularly useful, such queries raise serious privacy concerns. Exposing to a (potentially untrusted) LBS the client's position and her destination may reveal personal information, such as social habits, health condition, shopping preferences, lifestyle choices, etc. The only existing method for privacy-preserving shortest path computation follows the obfuscation paradigm; it prevents the LBS from inferring the source and destination of the query with a probability higher than a threshold. This implies, however, that the LBS still deduces some information (albeit not exact) about the client's location and her destination. In this paper we aim at strong privacy, where the adversary learns nothing about the shortest path query. We achieve this via established private information retrieval techniques, which we treat as black-box building blocks. Experiments on real, large-scale road networks assess the practicality of our schemes.Comment: VLDB201
    corecore