Capturing Value in Global Networks: Apple’s iPad and iPhone [PDF]
Monday, December 26th, 2011Interesting paper from UCI shows how the final $400 value of the iPhone is distributed. Interesting fact is that total value of manufacturing is about 10%
Interesting paper from UCI shows how the final $400 value of the iPhone is distributed. Interesting fact is that total value of manufacturing is about 10%
Posted in apple, economics, enconomics, management, manufacturing, paper | Comments Off | permalink
Interesting paper from UCI shows how the final $400 value of the iPhone is distributed. Interesting fact is that total value of manufacturing is about 10%
Posted in apple, economics, enconomics, management, manufacturing, paper | Comments Off | permalink
Guide to Computer Security – Log Management, NIST Publication 800-92 (SEP-2006) / Describes enterprise log management, collection & analysis from policy and technology perspectives.
Posted in analysis, compliance, enterprise, infosec, it, log, management, policy | Comments Off | permalink
Guide to Computer Security – Log Management, NIST Publication 800-92 (SEP-2006) / Describes enterprise log management, collection & analysis from policy and technology perspectives.
Posted in analysis, compliance, enterprise, infosec, it, log, management, policy | Comments Off | permalink
Posted in configuration, for:@twitter, for:collidr, has:for, management, policy, site-config, sysadmin | Comments Off | permalink
All sysadmins: take a note: Wikipedia opened access to it’s site configuration management: a git repository with config files for various system software
Posted in configuration, management, policy, site-config, sysadmin | Comments Off | permalink
All sysadmins: take a note: Wikipedia opened access to it’s site configuration management: a git repository with config files for various system software
Posted in configuration, management, policy, site-config, sysadmin | Comments Off | permalink
Posted in hacking, infosec, management, Microsoft, reference, Security | Comments Off | permalink
Posted in hacking, infosec, management, Microsoft, reference, Security | Comments Off | permalink
Original paper [report] by Watts Humphrey, which is later become the famost CMM book. (Managing the Software Process, by Watts Humphrey, originally published in 1989) . Also see http://www.amazon.com/s?ie=UTF8&tag=mozilla-20&index=blended&link_code=q…
Posted in business, cmm, it, management, process, software, watts_humphrey | Comments Off | permalink
You are currently browsing the archives for the management category.
Konstantin Antselovich (c) 2004-2011
powered by WordPress
Entries (RSS)
and Comments (RSS).