Search
All categories
Results 81 - 104 of about 578
  • Conducting a meeting

    Introduction Meetings are a way of sharing, within a group of individuals, the same level of knowledge of a subject or a problem and of making decisions collectively. Additionally, decisions made collectively, with representatives of the ... Read more

    Project management
    October 16, 2008 at 09:43 AM
  • Information systems governance (IT Governance)

    The Concept of Governance The term "Governance" specifies the ability of an organization to be able to control and regulate its own operation so as to avoid conflicts of interest related to the division between beneficiaries (shareholders) ... Read more

    Information System
    October 16, 2008 at 09:43 AM
  • ASCII Code

    Data coding What is ASCII code? ASCII Character Chart Extended ASCII Character Chart EBCDIC code Unicode Data coding Morse code was the first code used for long-distance communication. Samuel F.B. Morse invented it in 1844. This code is ... Read more

    Encoding
    November 12, 2012 at 12:40 PM
  • The HTTP protocol

    Introduction to the HTTP protocol Since 1990 HTTP protocol (HyperText Transfer Protocol) has been the most widely used protocol on the Internet. Version 0.9 was only intended to transfer data over the Internet (in particular Web pages ... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • RTP/RTCP protocols

    Document written by Nico VanHaute, Julien Barascud and Jean-Roland Conca Introduction: What are RTP and RTCP? The spread of computers, added to the availability of cheap audio/video computer hardware, and the availability of higher ... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • Graphics cards - Video cards

    2D Accelerator Cards A graphics card, sometimes called a graphics adapter, video card or graphics accelerator, is a computer component which converts digital data into a graphical form which can be displayed on a monitor. The initial role ... Read more

    Computer
    October 16, 2008 at 09:43 AM
  • FAT16 and FAT32

    The FAT16 file system The first file system to be used on a Microsoft operating system was the FAT system, which uses a file allocation table. The file allocation table is actually an index which lists the content of the disk in order to ... Read more

    Computer: maintenance
    October 16, 2008 at 09:43 AM
  • Style classes (CSS)

    Classes and IDs Classes A web designer might want to assign different styles to the same tags. For this reason, the CSS specifications introduced the concept of classes. The definition of classes is as simple as that of styles. It involves ... Read more

    CSS
    October 16, 2008 at 09:43 AM
  • Introduction to power line communications (PLC)

    Introduction to PLC "Power Line Communications" basically means any technology that enables data transfer at narrow or broad band speeds through power lines by using advanced modulation technology. Depending on the country, the institution ... Read more

    Power Line Communications
    October 16, 2008 at 09:43 AM
  • Positioning elements in CSS

    Using style sheets along with the and tags, you can specify the location of text or images down to the pixel. This is possible with versions 4 and higher of Netscape and Internet Explorer; however, the technique is still problematic and may ... Read more

    CSS
    October 16, 2008 at 09:43 AM
  • Quality - Process Management

    The Concept of Processes The process model consists in considering a company's goal to be to provide products and/or services that meet client expectations. Thus, the company is modeled as a series of processes that allows the company to ... Read more

    Quality
    October 16, 2008 at 09:43 AM
  • Webmastering - Website Ergonomics

    The Concept of Ergonomics Ergonomics is the use of scientific knowledge about humans (psychology, physiology, medicine) with the aim of improving the workplace environment. Ergonomics is generally characterized by two components: ... Read more

    Webmastering
    October 16, 2008 at 09:43 AM
  • E-mail scams - Fund transfer scams

    Scams A "scam" is a fraudulent practice of African origin that involves extorting funds from internet users by enticing them with a sum of money and promising them a share of it. The use of scams originated in Nigeria, which has also given ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • MIME (Multipurpose Internet Mail Extensions)

    Introduction to MIME MIME (Multipurpose Internet Mail Extensions) is a standard which was proposed by Bell Communications in 1991 in order to expand upon the limited capabilities of email, and in particular to allow documents (such as ... Read more

    Email
    October 16, 2008 at 09:43 AM
  • Employee Relationship Management (ERM)

    The term "Employee Relationship Management" (acronym ERM), translate as "management of the relationship with the employees" refers to the use of technologies in the management of human resources. This concept is based on client ... Read more

    e-Business
    October 16, 2008 at 09:43 AM
  • Preparatory phase of a project

    The preparatory phase The term preliminary project is generally used to refer to all preparatory stages necessary for the launch of the project. Thus, the idea is to precisely define the nature of the project in order to finalize the ... Read more

    Project management
    October 16, 2008 at 09:43 AM
  • Web server attacks

    Vulnerability of web services The first network attacks exploited vulnerabilities related to the implementation of TCP/IP protocol suites. With the gradual correction of these vulnerabilities, attacks have shifted to application layers and ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Network equipment - Router

    Router A router is a device for connecting computer networks to one another, used for handling the routing of packets between two networks, or to determine the path that a data packet shall take. When a user enters a URL, the Web client ( ... Read more

    Local Area Network
    October 16, 2008 at 09:43 AM
  • Spreadsheets - Mathematical Functions

    Standard Functions Function Description ABS() This function returns the absolute value of a number. It therefore returns the number, if it is positive, or the opposite (positive) if it is negative ODD(value) Rounds a number up to the ... Read more

    Spreadsheet
    October 16, 2008 at 09:43 AM
  • Telnet protocol

    Introduction to the Telnet protocol The Telnet protocol is a standard internet protocol enabling terminals and applications to interface over the Internet. This protocol provides the basic rules making it possible to link a client (system ... Read more

    Internet (protocols)
    October 29, 2012 at 03:45 PM