Přínos Studentů Vysokých Škol K Rozvoji Naší Společnosti

Total Page:16

File Type:pdf, Size:1020Kb

Přínos Studentů Vysokých Škol K Rozvoji Naší Společnosti EVROPSKÝ POLYTECHNICKÝ INSTITUT, s.r.o., Kunovice SBORNÍK „PŘÍNOS STUDENT Ů VYSOKÝCH ŠKOL K ROZVOJI NAŠÍ SPOLE ČNOSTI“ Část 2 – Informatika VI. MEZINÁRODNÍ VIRTUÁLNÍ STUDENTSKÁ KONFERENCE 28. b řezna 2012, Kunovice, Česká Republika Kolektiv autor ů „P ŘÍNOS STUDENT Ů VYSOKÝCH ŠKOL K ROZVOJI NAŠÍ SPOLE ČNOSTI“ VI. MEZINÁRODNÍ VIRTUÁLNÍ STUDENTSKÁ KONFERENCE Část 2 - Informatika Vydavatel, nositel autorských práv, vyrobil: (C) Evropský polytechnický institut, s.r.o., 2012 Publikace neprošla jazykovou úpravou. Za obsahovou správnost odpovídají auto ři. ISBN 978-80-7314-283-4 “PŘÍNOS STUDENT Ů VYSOKÝCH ŠKOL K ROZVOJI NAŠÍ SPOLE ČNOSTI” Část 2 - Informatika VI. MEZINÁRODNÍ VIRTUÁLNÍ STUDENTSKÁ KONFERENCE Organizována EVROPSKÝM POLYTECHNICKÝM INSTITUTEM, s.r.o., Kunovice Předseda programového výboru konference Honorary professor, Ing. Old řich Kratochvíl, Ph.D., Dr.h.c., MBA PROGRAMOVÝ VÝBOR KONFERENCE Prof. Viktor Ivanovi č Grišin, Dr.Sc. Prof. PhDr. Beata Kosová, CSc. Prof. Ing. Tatiana Čorejová, Ph.D. Doc. Ing. Viera Cibáková, CSc Prof. Ruslan Imranovich Khasbulatov, Dr.Sc. Ass. Prof. Mikhail Manylich, Ph.D. Assoc. Prof. Yaroslav Vyklyuk, CSc. Prof. Dr. Irina Stukalova, Dr.Sc. Prof. Ing. Jozef Ben čo, Ph.D., Dr.h.c. Ing. Vladimír Hiadlovský, Ph.D. Prof. Ing. Vladimír Mikula, CSc. Prof. Ing. Imrich Rukovanský, CSc. Doc. Ing. Miroslav Me čár, CSc. Ing. Jind řich Petrucha, Ph.D. Ing. Jan Pracha ř, Ph.D. Oponentní rada: Doc. Ing. Jozef Strišš, CSc. – Evropský polytechnický institut, s.r.o. Prof. PhDr. Karel Lacina, DrSc. – Evropský polytechnický institut, s.r.o. Prof. Ing. Pavel Ošmera, CSc. – Vysoké u čení technické v Brn ě Prof. Ing. Ivan Hanuliak, CSc. – Žilinská univerzita v Žilině Prof. Ing. Petr Dostál, CSc. – Vysoké u čení technické v Brn ě Ing. Juraj Dubovec, Ph.D. – Žilinská univerzita v Žilin ě Ing. Jozef Habánik, Ph.D. – Tren čanská univerzita Alexandera Dub čeka v Tren čín ě Obsah ÚVODNÍ SLOVO TESTOVACÍ SYSTÉM PRO ANGLICKÝ JAZYK S VYUŽITÍM ZVUKOVÝCH INFORMACÍ V PROST ŘEDÍ INTERNETU................................................................................................................9 TOMÁŠ BERKA .............................................................................................................................................................. 11 VÝVOJ REALIZÁCIA PRACOVISKA PRE VÝCVIK ŠPECIALISTOV SIÉTI S OPERA ČNÝM SYSTÉMOM NOVELL NETWARE.................................................................................................................................................... 13 STANISLAV CAPÁK ........................................................................................................................................................13 RIZIKA A ZABEZPE ČENÍ ON-LINE TESTOVACÍHO SYSTÉMU .....................................................................17 MICHAL ČERNÝ ............................................................................................................................................................. 17 PROGRAMOVÉ ŘÍZENÍ JASU PRVK Ů LED .......................................................................................................... 19 JIŘÍ GREBENÍ ČEK ........................................................................................................................................................... 19 VYTVO ŘENÍ GRAFICKÉ DATABÁZE, STRUKTUR PRVK Ů ATOM Ů PERIODICKÉ TABULKY.............. 25 SYLVA SUMERAUEROVÁ , JAROSLAV HEJTMÁNEK ......................................................................................................... 25 SÍ ŤOVÉ PROST ŘEDÍ LINUX ..................................................................................................................................... 29 LIBOR HOL ČÍK ............................................................................................................................................................... 29 TÝMOVÁ SPOLUPRÁCE S POMOCÍ OPEN PROGRAMU DOTPROJECT ...................................................... 31 ROMAN JAHODA ............................................................................................................................................................ 31 VÝVOJ A REALIZACE PRACOVIŠT Ě PRO M ĚŘ ENÍ NA DIGITÁLNÍCH OBVODECH............................... 35 ROMAN KÁŇA ............................................................................................................................................................... 35 SOFTWARE PRO ŘÍZENÍ PROCESU ORGANIZACE BAKALÁ ŘSKÝCH PRACÍ .......................................... 39 RADIM KOLÍSEK ............................................................................................................................................................ 39 POJEM E-LEARNING.................................................................................................................................................. 45 LUKÁŠ KON ČETÍK ......................................................................................................................................................... 45 TÝMOVÁ SPOLUPRÁCE S POMOCÍ PROGRAMU A TECHNOLOGIE E-GROUPWARE............................ 47 JIŘÍ SLOVÁK ..................................................................................................................................................................47 DÁLKOVÉ M ĚŘENÍ PR ŮTOKU VODY POMOCÍ SYSTÉMU QUIDO............................................................... 51 IGOR VALENTA .............................................................................................................................................................. 51 ZÁKLADNÉ ČASTI A ICH NASTAVENIE PRE ZAVEDENIE CVI ČNÉHO SERVERA DO PREVÁDZKY.. 55 JURAJ ČERVIENKA , DIS .................................................................................................................................................55 MOBILNÍ OPERÁTORI V SLOVENSKEJ REPUBLIKE ....................................................................................... 61 VLADIMÍR ĎUR ČANSKÝ .................................................................................................................................................61 REALIZÁCIA INTERNETOVÉHO VÝHERNÉHO OBCHODU............................................................................ 65 ANDREJ KEKLÁK ........................................................................................................................................................... 65 REDAK ČNÍ SYSTÉMY ................................................................................................................................................ 69 OND ŘEJ NAVRÁTIL ........................................................................................................................................................69 CLOUD COMPUTING.................................................................................................................................................. 73 ROMAN PAVLÍK ............................................................................................................................................................. 73 REALIZOVÁNÍ VÝVOJOVÉHO PRACOVIŠT Ě PRO JEDNO ČIPOVÉ PROCESORY NA PRACOVIŠTI EPI KUNOVICE .................................................................................................................................................................... 77 MARTIN SISKA .............................................................................................................................................................. 77 PARALELNÍ PROCESY, MULTITHREADING A MULTITASKING .................................................................. 81 OND ŘEJ ŠENKY ŘÍK ........................................................................................................................................................81 GROUPWAROVÉ SYSTÉMY, GROUPWARE A TÝMOVÁ KOMUNIKACE.................................................... 85 MILAN URBÁNEK .......................................................................................................................................................... 85 PROGRAMOVACÍ JAZYK JAVA.............................................................................................................................. 89 KLÁRA HOPANOVÁ .......................................................................................................................................................89 MODELOVÁNÍ VÝKONNOSTI PARALELNÍCH PO ČÁTA ČŮ V OBLASTECH SÍTÍ SMP............................93 FRANTIŠEK OHLÍDAL .....................................................................................................................................................93 DÁLKOVÉ M ĚŘ ENÍ ELEKTRICKÝCH PARAMETR Ů FOTOREZISTORU POMOCÍ JEDNO ČIPOVÉHO MIKROPO ČÍTA ČE.......................................................................................................................................................99 JIŘÍ BARTOŠ ..................................................................................................................................................................99 DÁLKOVÉ M ĚŘ ENÍ PR ŮTOKU KAPALINY........................................................................................................ 103 MARTIN MAJER ........................................................................................................................................................... 103 DÁLKOVÉ M ĚŘ ENÍ NA ČÍTA ČÍCH......................................................................................................................
Recommended publications
  • Twenty Years of Berkeley Unix : from AT&T-Owned to Freely
    Twenty Years of Berkeley Unix : From AT&T-Owned to Freely Redistributable Marshall Kirk McKusick Early History Ken Thompson and Dennis Ritchie presented the first Unix paper at the Symposium on Operating Systems Principles at Purdue University in November 1973. Professor Bob Fabry, of the University of California at Berkeley, was in attendance and immediately became interested in obtaining a copy of the system to experiment with at Berkeley. At the time, Berkeley had only large mainframe computer systems doing batch processing, so the first order of business was to get a PDP-11/45 suitable for running with the then-current Version 4 of Unix. The Computer Science Department at Berkeley, together with the Mathematics Department and the Statistics Department, were able to jointly purchase a PDP-11/45. In January 1974, a Version 4 tape was delivered and Unix was installed by graduate student Keith Standiford. Although Ken Thompson at Purdue was not involved in the installation at Berkeley as he had been for most systems up to that time, his expertise was soon needed to determine the cause of several strange system crashes. Because Berkeley had only a 300-baud acoustic-coupled modem without auto answer capability, Thompson would call Standiford in the machine room and have him insert the phone into the modem; in this way Thompson was able to remotely debug crash dumps from New Jersey. Many of the crashes were caused by the disk controller's inability to reliably do overlapped seeks, contrary to the documentation. Berkeley's 11/45 was among the first systems that Thompson had encountered that had two disks on the same controller! Thompson's remote debugging was the first example of the cooperation that sprang up between Berkeley and Bell Labs.
    [Show full text]
  • Relevé Des Frais Annuels De L'entente De Licence Destinée À L
    Relevé des frais annuels de l’entente de licence destinée à l’enseignement postsecondaire AOÛT 2016 Les Informations de Programme scolaire Relient Les Instructions de Sélection de produit : As part of the compliance and annual order process, this worksheet must be sent to [email protected] (for Europe, Middle East, Africa) or [email protected] (rest of world). Sélectionnez un seul modèle : ___ Modèle ETP; ___ Modèle par poste de travail; ___ Modèle par poste de travail de service EMBALLER CALCUL INSTRUCTIONS : A. Place une marque dans le Modèle de colonne A Choisi la boîte des produits que vous souhaitez acheter OU choisir un Paquet de Valeur. Si un Paquet de Valeur n'est pas choisi, au moins quatre (4) les produits doivent être choisis. B. Calcule le Total A Emballé le Prix (TBP) en ajoutant les prix appropriés des produits choisis et le modèle d'évaluation approprié. C. Le Total A Emballé le Prix sera utilisé pour calculer les Frais annuels. Vous ne pouvez pas utiliser le modèle de FTE dans calculer vos Frais annuels à moins que votre population de FTE dépasse votre compte de poste de travail. POUR EMPECHER DES RETARDS DANS TRAITER VOTRE ORDRE DE RENOUVELLEMENT, S'IL VOUS PLAIT SOUMETTRE VOTRE FACTURE D'ACHAT ET VOTRE FEUILLE DE TRAVAIL COMPLETEE ENSEMBLE MOBILE DEVICE LICENSE: Upon purchase of a license for Novell ZENworks Mobile Management, the following terms become part of Your ALA. To acquire a Mobile Device License, You must purchase a license for each Mobile Device. To acquire a FTE license, you must purchase a license for all FTE.
    [Show full text]
  • United States Court of Appeals for the FOURTH CIRCUIT
    Case: 10-1482 Document: 35 Date Filed: 09/17/2010 Page: 1 No. 10-1482 IN THE United States Court of Appeals FOR THE FOURTH CIRCUIT dNOVELL, INCORPORATED, Plaintiff-Appellant, —v.— MICROSOFT CORPORATION, Defendant-Appellee. ON APPEAL FROM THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND BRIEF OF APPELLEE MICROSOFT CORPORATION RICHARD J. WALLIS DAVID B.TULCHIN STEVEN J. AESCHBACHER Counsel of Record MICROSOFT CORPORATION STEVEN L. HOLLEY One Microsoft Way SULLIVAN & CROMWELL LLP Redmond, Washington 98052 125 Broad Street (425) 882-8080 New York, New York 10004 (212) 558-4000 G. S TEWART WEBB VENABLE LLP 750 East Pratt Street, Suite 900 Baltimore, Maryland 21202 (410) 244-7400 Attorneys for Microsoft Corporation September 17, 2010 Case: 10-1482 Document: 35 Date Filed: 09/17/2010 Page: 2 UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT DISCLOSURE OF CORPORATE AFFILIATIONS AND OTHER INTERESTS Only one form needs to be completed for a party even if the party is represented by more than one attorney. Disclosures must be filed on behalf of all parties to a civil, agency, bankruptcy or mandamus case. Corporate defendants in a criminal or post-conviction case and corporate amici curiae are required to file disclosure statements. Counsel has a continuing duty to update this information. No. _______ Caption: __________________________________________________ Pursuant to FRAP 26.1 and Local Rule 26.1, ______________________ who is _______________________, makes the following disclosure: (name of party/amicus) (appellant/appellee/amicus) 1. Is party/amicus a publicly held corporation or other publicly held entity? YES NO 2. Does party/amicus have any parent corporations? YES NO If yes, identify all parent corporations, including grandparent and great-grandparent corporations: 3.
    [Show full text]
  • OES 2015 SP1: Installation Guide Is Available at the Open Enterprise Server 2015 SP1 Documentation Website
    Open Enterprise Server 2015 SP1 Installation Guide June 2016 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.novell.com/company/legal/. Copyright © 2016 Novell, Inc., a Micro Focus company. All Rights Reserved. Contents About This Guide 9 1 What’s New or Changed in the OES Install 11 1.1 What’s New (Update 28-OES 2015 SP1). .11 1.2 What’s New (OES 2015 SP1) . 11 1.3 What’s New (January 2016 eDirectory 8.8 SP8 Patch 6 Hot Patch 1). 12 1.4 What’s New (OES 2015) . 12 2 Preparing to Install OES 2015 SP1 15 2.1 Before You Install . 15 2.2 Meeting All Server Software and Hardware Requirements . 15 2.2.1 Server Software . 15 2.2.2 Server Hardware . 16 2.3 NetIQ eDirectory Rights Needed for Installing OES. 17 2.3.1 Rights to Install the First OES Server in a Tree . 17 2.3.2 Rights to Install the First Three Servers in an eDirectory Tree . 17 2.3.3 Rights to Install the First Three Servers in any eDirectory Partition . 17 2.4 Installing and Configuring OES as a Subcontainer Administrator . 17 2.4.1 Rights Required for Subcontainer Administrators . 18 2.4.2 Providing Required Rights to the Subcontainer Administrator for Installing and Managing Samba. 20 2.4.3 Starting a New Installation as a Subcontainer Administrator . 22 2.4.4 Adding/Configuring OES Services as a Different Administrator.
    [Show full text]
  • School License Agreement Annual Fee Worksheet - EMEA MAY 2016 Academic Program Information Link Product Selection & Bundle Calculation Instructions
    School License Agreement Annual Fee Worksheet - EMEA MAY 2016 Academic Program Information Link Product Selection & Bundle Calculation Instructions: As part of the compliance and annual order process, this worksheet must be sent to [email protected] (for Europe, Middle East, Africa) or [email protected] (rest of world). 1. Select any of the bundles or products below by checking the box in the Model Selected column. Any combination of products or bundles may be selected for a minimum price of $2.36 USD per enrollment or $35.70 USD per Workstation. $1000 minimum total purchase price. 2. Compute the Total Price based on the total cost of the products selected and compute the Annual Fee by multiplying the total Enrollment/Workstation/Mobile Device number by the total price. For example: 1 Bundle @ 2.25 plus 2 Additional products ($0.60 ea) = $3.45 total price x enrollment of 1,000 = Annual Fee $3,450. MOBILE DEVICE LICENSE: Upon purchase of a license for Novell ZENworks Mobile Management, the following terms become part of Your SLA. To acquire a Mobile Device License, You must purchase a license for each Mobile Device. To acquire a FTE license, you must purchase a license for all FTE. Subject to the terms and conditions of this Agreement, the license purchase authorizes You to install and use one copy of the Mobile Management Application on each Mobile Device (for an FTE license, for each Mobile Device used by an FTE person). This license allows You to use the Software solely to manage licensed Mobile Devices. You may not use or allow the use of the Software other than for Your own internal purposes.
    [Show full text]
  • Motivations of Participating in Open Source Projects
    Proceedings of the 34th Hawaii International Conference on System Sciences - 2001 Working for Free? – Motivations of Participating in Open Source Projects Alexander Hars Shaosong Ou IOM Department IOM Department Marshall School of Business Marshall School of Business University of Southern California University of Southern California [email protected] [email protected] Abstract the public, including the right to use, to redistribute and to The success of the Linux operating system has modify the software free of charge. This is a direct demonstrated the viability of an alternative form of challenge to the established assumptions about software software development – open source software – that markets that threatens the position of commercial challenges traditional assumptions about software software vendors. markets. Understanding what drives open source The open source phenomenon raises many interesting developers to participate in open source projects is questions. Its proponents regard it as a paradigmatic crucial for assessing the impact of open source software. change where the economics of private goods built on the This article identifies two broad types of motivations that scarcity of resources are replaced by the economics of account for their participation in open source projects. public goods where scarcity is not an issue. Critics argue The first category includes internal factors such as that open source software will always be relegated to intrinsic motivation and altruism, and the second niche areas, that it cannot compete with their commercial category focuses on external rewards such as expected opponents in terms of product stability and reliability future returns and personal needs. This article also [15], and that open source projects lack the capability to reports the results of a survey administered to open innovate.
    [Show full text]
  • Netiq Securelogin User Guide About This Guide
    User Guide SecureLogin 8.0 October, 2013 Legal Notice NetIQ Product Name is protected by United States Patent No(s): nnnnnnnn, nnnnnnnn, nnnnnnnn. THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON‐DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON‐DISCLOSURE AGREEMENT, NETIQ CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ʺAS ISʺ WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU. For purposes of clarity, any module, adapter or other similar material (ʺModuleʺ) is licensed under the terms and conditions of the End User License Agreement for the applicable version of the NetIQ product or software to which it relates or interoperates with, and by accessing, copying or using a Module you agree to be bound by such terms. If you do not agree to the terms of the End User License Agreement you are not authorized to use, access or copy a Module and you must destroy all copies of the Module and contact NetIQ for further instructions. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of NetIQ Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non‐disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of NetIQ Corporation.
    [Show full text]
  • UNIX History Page 1 Tuesday, December 10, 2002 7:02 PM
    UNIX History Page 1 Tuesday, December 10, 2002 7:02 PM CHAPTER 1 UNIX Evolution and Standardization This chapter introduces UNIX from a historical perspective, showing how the various UNIX versions have evolved over the years since the very first implementation in 1969 to the present day. The chapter also traces the history of the different attempts at standardization that have produced widely adopted standards such as POSIX and the Single UNIX Specification. The material presented here is not intended to document all of the UNIX variants, but rather describes the early UNIX implementations along with those companies and bodies that have had a major impact on the direction and evolution of UNIX. A Brief Walk through Time There are numerous events in the computer industry that have occurred since UNIX started life as a small project in Bell Labs in 1969. UNIX history has been largely influenced by Bell Labs’ Research Editions of UNIX, AT&T’s System V UNIX, Berkeley’s Software Distribution (BSD), and Sun Microsystems’ SunOS and Solaris operating systems. The following list shows the major events that have happened throughout the history of UNIX. Later sections describe some of these events in more detail. 1 UNIX History Page 2 Tuesday, December 10, 2002 7:02 PM 2 UNIX Filesystems—Evolution, Design, and Implementation 1969. Development on UNIX starts in AT&T’s Bell Labs. 1971. 1st Edition UNIX is released. 1973. 4th Edition UNIX is released. This is the first version of UNIX that had the kernel written in C. 1974. Ken Thompson and Dennis Ritchie publish their classic paper, “The UNIX Timesharing System” [RITC74].
    [Show full text]
  • Oes 2018 Sp2)
    Open Enterprise Server 2018 SP2 Installation Guide August 2020 Legal Notices Copyright © 2017 - 2020 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are as may be set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Contents About This Guide 9 1 What’s New or Changed in the OES Install 11 1.1 What’s New or Changed (OES 2018 SP2) . .11 1.2 What’s New or Changed (OES 2018 SP1) . .11 1.3 What's New or Changed (Update 6 - OES 2018 - Recommended) . 12 1.4 What’s New or Changed (OES 2018) . 12 2 Preparing to Install OES 2018 SP2 13 2.1 Before You Install . 13 2.2 Meeting All Server Software and Hardware Requirements . 13 2.2.1 Server Software . 13 2.2.2 Server Hardware . 14 2.3 NetIQ eDirectory Rights Needed for Installing OES. .15 2.3.1 Rights to Install the First OES Server in a Tree . 15 2.3.2 Rights to Install the First Three Servers in an eDirectory Tree . 15 2.3.3 Rights to Install the First Three Servers in any eDirectory Partition . 15 2.4 Installing and Configuring OES as a Subcontainer Administrator . 15 2.4.1 Rights Required for Subcontainer Administrators . 16 2.4.2 Providing Required Rights to the Subcontainer Administrator for Installing and Managing Samba.
    [Show full text]
  • The Trademark History of Linux, the Operating System by Tonya Gisselberg Copyright ©2010 by Tonya Gisselberg
    The Trademark History of Linux, the Operating System by Tonya Gisselberg Copyright ©2010 by Tonya Gisselberg I. Introduction Despite its name, this article is about more than the trademark history of Linux. It begins at the prehistory of Linux and incorporates other areas of intellectual property on the theory that looking at the subject from its all-inclusive intellectual property context adds depth and understanding to the trademark discussion. A good portion of this article is devoted to telling the Linux story - a fascinating and inspirational story. Telling the Linux story is also a necessary component of describing the history of Linux trademarks. A trademark is used by the trademark owner “to identify and distinguish his or her goods, including a unique product, from those manufactured or sold by others and to indicate the source of the goods, even if that source is unknown.”1 A trademark can identify a particular technology, such as Dolby® Surround technology. 2 Under the statutory definition, a trademark cannot have an existence independent from a good or service. “There is no such thing as property in a trade- mark except as a right appurtenant to an established business or trade in connection with which the mark is employed.”3 If there is no identifiable good or protectable technology, but instead, a public domain good or technology that anyone can freely copy and use, then there is nothing to trademark. This is particularly true when the product is something as functional and commoditized as software. Ubuntu 4 Linux and Red Hat 5 Linux are valid trademarks apart from the software because the companies that own those trademarks also sell services.
    [Show full text]
  • Novell Zenworks Mobile Management Datasheet
    Data Sheet Endpoint Management Novell ZENworks Mobile Management Extend your endpoint management to all the mobile devices in your IT environment from a single administrative console. Protect yourself from risk with security policies and manage both employee-owned and company-owned devices. Product Overview If you answered yes to any of these questions, System Requirements Novell® ZENworks® Mobile Management pro- you already know how valuable ZENworks Please visit www.novell.com/zmm for detailed vides advanced device controls and policy Mo bile Management can be: It meets all of product specifications and system requirements. man­­­agement for iOS and Android, and other these management challenges and many Ac tiveSync -enabled devices—all from a sin- more. track device use and the applications gle administrative console. The product ad- that users download onto their devices. dresses all of the pain points administrators Key Benefits BYOD support that helps you optimize and managers face to day, including bring- Novell ZENworks Mobile Management helps user productivity on a variety of device your-own-device policies (BYOD), security, your organization with: platforms—including iOS and Android, application management, asset and inventory and most other ActiveSync devices. management and compliance issues. Centralized management tools Security and compliance capabilities that make it easy to deploy new mobile that provide auditing and compliance Are your users bringing in their own iPads, devices in the workforce, whether the management tools so you know who is Androids and other devices, then asking devices are company issued or privately controlling what and how they are doing it. for access to corporate email? owned.
    [Show full text]
  • In Search of Stupidity: Over 20 Years of High-Tech Marketing Disasters
    CYAN YELLOW MAGENTA BLACK PANTONE 123 CV Chapman “A funny AND grim read that explains why so many of the high-tech sales departments I’ve trained and written about over the years frequently have Merrill R.Chapman homicidal impulses towards their marketing groups. A must read.” Foreword by Eric Sink —Mike Bosworth Author of Solution Selling, Creating Buyers in Difficult Selling Markets and coauthor of Customer Centric Selling In Search of Stupidity In Search OVER 20 YEARS OF HIGH-TECH MARKETING DISASTERS 20 YEARS OF HIGH-TECH OVER n 1982 Tom Peters and Robert Waterman Ikicked off the modern business book era with In Search of Excellence: Lessons from America’s Best-Run Companies. Unfortunately, as time went by it became painfully obvious that many of the companies Peters and Waterman had profiled, particularly the high-tech ones, were something less than excellent. Firms such as Atari, DEC, IBM, Lanier, Wang, Xerox and others either crashed and burned or underwent painful and wrenching traumas you would have expected excellent companies to avoid. What went wrong? Merrill R. (Rick) Chapman believes he has the answer (and the proof is in these pages). He’s observed that high-tech companies periodically meltdown because they fail to learn from the lessons of the past and thus continue to make the same completely avoidable mistakes again and again and again. To help teach you this, In Search of Stupidity takes you on a fascinating journey from yesterday to today as it salvages some of high-tech’s most famous car wrecks. You will be there as MicroPro, once the industry’s largest desktop software company, destroys itself by committing a fundamental positioning mistake.
    [Show full text]