Vajad kellegagi rääkida?
Küsi julgelt abi LasteAbi
Logi sisse

Case Google (0)

1 Hindamata
Punktid
Vasakule Paremale
Case Google #1 Case Google #2 Case Google #3 Case Google #4
Punktid 50 punkti Autor soovib selle materjali allalaadimise eest saada 50 punkti.
Leheküljed ~ 4 lehte Lehekülgede arv dokumendis
Aeg2014-10-14 Kuupäev, millal dokument üles laeti
Allalaadimisi 1 laadimist Kokku alla laetud
Kommentaarid 0 arvamust Teiste kasutajate poolt lisatud kommentaarid
Autor sandrapoldma123 Õppematerjali autor

Sarnased õppematerjalid

thumbnail
215
docx

Steve Krug-Dont Make Me Think 2014

Don’t Make Me Think, Revisited A Common Sense Approach to Web Usability Steve Krug Don’t Make Me Think, Revisited A Common Sense Approach to Web Usability Copyright © 2014 Steve Krug New Riderswww.newriders.com To report errors, please send a note [email protected] New Riders is an imprint of Peachpit, a division of Pearson Education. Editor: Elisabeth Bayle Project Editor: Nancy Davis Production Editor: Lisa Brazieal Copy Editor: Barbara Flanagan Interior Design and Composition: Romney Lange Illustrations by Mark Matcho and Mimi Heft Farnham fonts provided by The Font Bureau, Inc. (www.fontbureau.com) Notice of Rights All rights reserved. No part of this book may be reproduced or transmitted in any form by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. For information on getting permission for reprints and excerpts, [email protected]. Notice of Liability Th

Kategoriseerimata
thumbnail
16
docx

Social media information and data collection and security

friends. They track web pages you visit, add-ons, analytical information. Using cookies they provide ads and services for devices. Log files, when accessing their services, IP, browser type, viewed pages, device identifiers. It may be that Instagram have less choices what to do with the data.The third platform i would like to mention is Snapchat. At a glance snapchat seems most secure platform. You send an image, vide or text and later it disappears. That might not be the case. According to their policy, snapchat collects information about users contact list, who are you friends with, and to whom you talk to. Your name – this one is a bit weird, but apparently it is important to them. Using your name they can look you up on other people’s address book. Since snapchat needs access to you mobile photo album, they collect these photos aswell on the go. Of course, location, for using some geo filters but also for tracking

Inglise keel
thumbnail
9
docx

Big data in cloud

could map the entire data landscape across the company, thus allowing the individual to analyze the threats faced internally [18]. Making big data somewhat secure as in whole and also allowing different algorithms to function. In fact, nowadays, every bigger company, who has to deal with massive amounts of users, has its own big data database or at least access to one. List of some used based ones: YouTube, Facebook, Instagram, Amazon, Google, Netflix. The ones mentioned above all share common features, such as: - Having enormous databases. - Collecting user data and classifying them in groups, where they share similar traits like age, what they like and how they see the world. - Selling and exchanging user information to reap personal benefit. Profit is accomplished by classifying people in groups by their similarities and then relevant ads are displayed for them

Algoritmid ja andmestruktuurid
thumbnail
23
pdf

Games Programming with Java and Java 3D

Games Programming with Java and Java 3D Andrew Davison Dept. of Computer Engineering Prince of Songkla University HatYai, Songkhla 90112 E-mail: [email protected] Draft: 14th January 2003, #2 Abstract This article looks at the advantages and disadvantages of using Java and Java 3D for games programming. It assumes the reader is familiar with Java, but presents short overviews of gaming, the low-level APIs OpenGL and DirectX, and Java 3D. No programming examples are included here, although links to online code are supplied. 1. Background to Gaming Giving a definition for `computer game' is problematic, due to the wide range of game types. For example, the ArcadePod site (http://www.arcadePod.com) divides its hundreds of Java games into more than ten categories: 3D games, multiplayer, action

Java programmeerimine
thumbnail
140
pdf

Thesis Kivimaa August 2022

2018, should require all companies and CSP-s to have cyber insurance to be able to afford the penalties if a breach occurs (Official Journal of the European Union, 2016). Similar issue plagues insurance companies that provide cyber security insurance to companies. As far as we can assume, they are basing their premium and amounts that will be paid out, mostly on guesswork. They can get from a company their potential losses in case of a data breach and an auditor’s assessment on security standing. That will always be an expert opinion and not something quantitative - easily measurable and comparable. For a company basically only way to protect themselves against huge GDPR enforced fines is to acquire cybersecurity insurance. And without knowing the security level of a CSP and especially how CSP will determine if they were to blame for the breach or the customer… 9

Infotehnoloogia
thumbnail
1
docx

Infotehnoloogiast ja suhtlusvõrgud

It is really nice to be able to connect with someone in a second but people should watch more carefully how these networks affect their real life relationships. On the other side, the internet is the biggest brain that exists in the world. It has the most knowledge in it but people should be careful what are they using it for. The internet is the best and quickest way to learn about the things you want to know. It is very easy today to find the information you need. Google is the biggest search engine in the web and it was firstly known in 1996. Today, Google receives about a billions search requests per day. But it is sure that not all of the requests are not sent because the person wants exactly to learn something. One more big question lies on the e-system, which is for example largely used in Estonia. There is e-school, e-banking, e-election and so on. It is very honorable that everything has evolved here where we can be very comfortable to do our

Inglise keel
thumbnail
580
pdf

CHANGE YOUR THINKING CHANGE YOUR LIFE

When she awoke, she was in the hospital with a mild concussion and complete memory loss. She could still speak, but she had no recollection of any part of her past life. She was a total amnesiac. At first, the doctors thought it would be temporary. But weeks passed and no trace of her memory returned. Her husband and children visited her daily, but she did not know them. This was such an unusual case that other doctors and specialists came to visit her as well, to test her and ask her questions about her condition. 1 ccc_tracy_1_1-17.qxd 6/23/03 2:46 PM Page 2 2 ➤ CHANGE YOUR THINKING, CHANGE YOUR LIFE ■ STARTING OVER Eventually, she went home, her memory a complete blank. Deter-

Inglise keel
thumbnail
40
doc

Introduction of SCM

acceptance among your employees. New supply chain systems process data as they are programmed to do, but the technology cannot absorb a company's history and processes in the first few months after an implementation. Forecasters and planners need to understand that the first bits of information they get from a system might need some tweaking. If they are not warned about the system's initial naiveté (simplicity), they will think it is useless. In one case, just before a large automotive industry supplier installed a new supply chain forecasting application to predict demand for a product, an automaker put in an order for an unusually large number of units. The system responded by predicting huge demand for the product based largely on one unusual order. Blindly following the system's numbers could have led to inaccurate orders for materials being sent to suppliers within the chain. The

Kategoriseerimata




Kommentaarid (0)

Kommentaarid sellele materjalile puuduvad. Ole esimene ja kommenteeri



Sellel veebilehel kasutatakse küpsiseid. Kasutamist jätkates nõustute küpsiste ja veebilehe üldtingimustega Nõustun