L'edi Vu Par Wikipedia.Fr Transfert Et Transformation Table Des Matières

Total Page:16

File Type:pdf, Size:1020Kb

L'edi Vu Par Wikipedia.Fr Transfert Et Transformation Table Des Matières L'EDI vu par Wikipedia.fr Transfert et transformation Table des matières 1 Introduction 1 1.1 Échange de données informatisé .................................... 1 1.1.1 Définition ........................................... 1 1.1.2 Quelques organisations .................................... 1 1.1.3 Quelques normes EDI .................................... 2 1.1.4 Quelques protocoles de communication ........................... 2 1.1.5 Quelques messages courants ................................. 2 1.1.6 Articles connexes ....................................... 4 2 Organismes de normalisation 5 2.1 Organization for the Advancement of Structured Information Standards ............... 5 2.1.1 Membres les plus connus de l'OASIS ............................ 5 2.1.2 Standards les plus connus édictés par l'OASIS ........................ 6 2.1.3 Lien externe ......................................... 7 2.2 GS1 .................................................. 7 2.2.1 Notes et références ...................................... 7 2.2.2 Annexes ........................................... 7 2.3 GS1 France .............................................. 7 2.3.1 Lien externe .......................................... 8 2.4 Comité français d'organisation et de normalisation bancaires ..................... 8 2.4.1 Liens externes ........................................ 8 2.5 Groupement pour l'amélioration des liaisons dans l'industrie automobile ............... 9 2.5.1 Présentation ......................................... 9 2.5.2 Notes et références ...................................... 9 2.5.3 Voir aussi ........................................... 9 2.6 VDA .................................................. 10 2.7 EDI-Optique .............................................. 10 2.7.1 Voir aussi ........................................... 10 3 Formats de données 11 3.1 Échange de données informatisées pour l'administration, le commerce et le transport ........ 11 3.1.1 Organisations sectorielles ................................... 11 3.1.2 Voir aussi ........................................... 12 i ii TABLE DES MATIÈRES 3.2 electronic Business using XML .................................... 12 3.2.1 Introduction ......................................... 12 3.2.2 Historique .......................................... 13 3.2.3 Travail actuel ......................................... 13 3.2.4 Vue d'ensemble conceptuelle d'architecture d'ebXML .................... 15 3.2.5 Les secteurs d'activité concernés ............................... 16 3.2.6 Utilisations dans le cadre gouvernemental .......................... 18 3.2.7 Notes et références ...................................... 18 3.2.8 Voir aussi ........................................... 18 3.3 Electronic Data Interchange for the Electric Industry ......................... 19 3.3.1 Messages ........................................... 20 3.3.2 Voir aussi ........................................... 20 3.3.3 Liens externes ........................................ 20 3.4 Échange télématique banque-clients .................................. 20 3.4.1 Notes et références ...................................... 21 3.5 Electronic Banking Internet Communication Standard ........................ 21 3.5.1 Origines ........................................... 21 3.5.2 Aspects techniques ...................................... 21 3.5.3 Versions ........................................... 22 3.5.4 Notes et références ...................................... 22 3.5.5 Liens externes ........................................ 22 3.6 Edificas ................................................ 22 3.6.1 Historique .......................................... 22 3.6.2 EDI, technique de communication .............................. 23 3.6.3 Normes UN/CEFACT Edifact ................................ 23 3.6.4 Normes UN/CEFACT XML ................................. 23 3.6.5 Procédure d'attestation de conformité ............................ 23 3.6.6 Liens externes ........................................ 24 4 Protocoles de communications 25 4.1 Protocole de communication ..................................... 25 4.1.1 Concept ........................................... 25 4.1.2 Exemple d'utilisation ..................................... 25 4.1.3 Voir aussi ........................................... 26 4.2 Réseau à valeur ajoutée ........................................ 26 4.3 European Network Exchange (ENX) Association ........................... 26 4.3.1 Historique .......................................... 26 4.3.2 Utilisation du réseau ENX .................................. 28 4.3.3 Fonctionnement du réseau ENX ............................... 28 4.3.4 Disponibilité mondiale .................................... 29 4.3.5 Liens ............................................. 30 4.3.6 Références .......................................... 31 TABLE DES MATIÈRES iii 4.4 X.25 .................................................. 32 4.4.1 Histoire ............................................ 33 4.4.2 Couches ........................................... 33 4.4.3 Notes et références ...................................... 33 4.5 X.400 ................................................. 34 4.5.1 Liens externes ........................................ 34 4.6 EDIINT ................................................ 34 4.6.1 Certification Drummond ................................... 34 4.6.2 Autres sources d'information ................................. 34 4.7 Simple Mail Transfer Protocol .................................... 35 4.7.1 Principes d'envoi ....................................... 35 4.7.2 Syntaxe type d'une session ESMTP ............................. 36 4.7.3 Les codes retour SMTP ................................... 36 4.7.4 Sécurité et problème du spam ................................ 36 4.7.5 Blocage du port 25 par les fournisseurs d'accès ....................... 37 4.7.6 Notes et références ...................................... 37 4.7.7 Voir aussi ........................................... 37 4.8 File Transfer Protocol ......................................... 38 4.8.1 Histoire ............................................ 39 4.8.2 Interopérabilité ........................................ 39 4.8.3 Utilisation .......................................... 39 4.8.4 Implémentations ....................................... 39 4.8.5 Le protocole ......................................... 40 4.8.6 Notes et références ...................................... 43 4.8.7 Voir aussi ........................................... 43 4.9 File Transfer Protocol Secure ..................................... 44 4.9.1 Fonctionnement ........................................ 44 4.9.2 Voir aussi ........................................... 45 4.10 Secure File Transfer Protocol ..................................... 45 4.10.1 Voir aussi ........................................... 45 4.11 SSH File Transfer Protocol ...................................... 45 4.11.1 Logiciels ........................................... 46 4.11.2 Voir aussi ........................................... 46 4.11.3 Liens externes ........................................ 46 4.12 Applicability Statement 2 ....................................... 47 4.12.1 Avantages ........................................... 47 4.12.2 Inconvénients ......................................... 47 4.12.3 Introduction technique d'AS2 ................................ 47 4.12.4 Voir aussi ........................................... 47 4.12.5 Implémentations Open Source ................................ 48 5 Quelques acteurs 49 iv TABLE DES MATIÈRES 5.1 Axway ................................................. 49 5.1.1 Présentation ......................................... 49 5.1.2 Évolution du chiffre d'affaires ................................ 49 5.1.3 Notes et références ...................................... 50 5.1.4 Voir aussi ........................................... 50 5.2 Generix ................................................ 50 5.2.1 Historique .......................................... 51 5.2.2 Logiciels ........................................... 51 5.2.3 Notes et références ...................................... 52 5.2.4 Lien externe ......................................... 52 5.3 International Business Machines .................................... 52 5.3.1 Historique .......................................... 52 5.3.2 Activités ........................................... 54 5.3.3 Culture d’entreprise ..................................... 61 5.3.4 Présidence de la société ................................... 62 5.3.5 Logo ............................................. 64 5.3.6 Principaux actionnaires .................................... 65 5.3.7 Résultats financiers ...................................... 65 5.3.8 Critiques ........................................... 66 5.3.9 Notes et références ...................................... 66 5.3.10 Voir aussi ........................................... 69 5.4 Seeburger ............................................... 69 5.4.1 Historique .......................................... 70 5.4.2 Produits ........................................... 71 5.4.3 Liens externes ........................................ 71 5.5 Tibco Software ............................................ 71 5.5.1 Principaux produits ...................................... 71 5.5.2 Principales acquisitions .................................... 72 5.5.3 Notes et références ...................................... 72
Recommended publications
  • Hieroglyphs for the Information Age: Images As a Replacement for Characters for Languages Not Written in the Latin-1 Alphabet Akira Hasegawa
    Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 5-1-1999 Hieroglyphs for the information age: Images as a replacement for characters for languages not written in the Latin-1 alphabet Akira Hasegawa Follow this and additional works at: http://scholarworks.rit.edu/theses Recommended Citation Hasegawa, Akira, "Hieroglyphs for the information age: Images as a replacement for characters for languages not written in the Latin-1 alphabet" (1999). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by the Thesis/Dissertation Collections at RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Hieroglyphs for the Information Age: Images as a Replacement for Characters for Languages not Written in the Latin- 1 Alphabet by Akira Hasegawa A thesis project submitted in partial fulfillment of the requirements for the degree of Master of Science in the School of Printing Management and Sciences in the College of Imaging Arts and Sciences of the Rochester Institute ofTechnology May, 1999 Thesis Advisor: Professor Frank Romano School of Printing Management and Sciences Rochester Institute ofTechnology Rochester, New York Certificate ofApproval Master's Thesis This is to certify that the Master's Thesis of Akira Hasegawa With a major in Graphic Arts Publishing has been approved by the Thesis Committee as satisfactory for the thesis requirement for the Master ofScience degree at the convocation of May 1999 Thesis Committee: Frank Romano Thesis Advisor Marie Freckleton Gr:lduate Program Coordinator C.
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Désengagement De La Communication X25 Au Profit D’Une Solution Web, Pour La Récupération Des Appels Synchrones Par Les Fournisseurs
    Désengagement de la communication X25 au profit d’une solution web, pour la récupération des appels synchrones par les fournisseurs. Migration de l’application de suivi et de pilotage des centres de production de Mulhouse, Palomar et Mangualde Julien Courtout To cite this version: Julien Courtout. Désengagement de la communication X25 au profit d’une solution web, pour la récupération des appels synchrones par les fournisseurs. Migration de l’application de suivi et de pi- lotage des centres de production de Mulhouse, Palomar et Mangualde. Réseaux et télécommunications [cs.NI]. 2010. dumas-00529975 HAL Id: dumas-00529975 https://dumas.ccsd.cnrs.fr/dumas-00529975 Submitted on 27 Oct 2010 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. CENTRE REGIONAL ASSOCIE DU NORD FRANCHE-COMTE à BELFORT _______________ M E M O I R E Présenté en vue d’obtenir Le Diplôme d’Ingénieur C.N.A.M. En Informatique Par Julien COURTOUT _______________ Désengagement de la communication X25 au profit d’une solution web, pour la récupération des appels synchrones par les fournisseurs Migration de l’application de suivi et de pilotage des centres de production de Mulhouse, Palomar et Mangualde Soutenu le _______________ J U R Y Président : Membres : Monsieur Christophe ANDRIES Monsieur Philippe RANVIER Monsieur Alain-Jérôme FOUGERES Julien COURTOUT / Mémoire d’Ingénieur C.N.A.M.
    [Show full text]
  • The Python/C API Release 3.6.0
    The Python/C API Release 3.6.0 Guido van Rossum and the Python development team March 05, 2017 Python Software Foundation Email: [email protected] CONTENTS 1 Introduction 3 1.1 Include Files...............................................3 1.2 Objects, Types and Reference Counts..................................4 1.3 Exceptions................................................7 1.4 Embedding Python............................................9 1.5 Debugging Builds............................................ 10 2 Stable Application Binary Interface 11 3 The Very High Level Layer 13 4 Reference Counting 19 5 Exception Handling 21 5.1 Printing and clearing........................................... 21 5.2 Raising exceptions............................................ 22 5.3 Issuing warnings............................................. 24 5.4 Querying the error indicator....................................... 25 5.5 Signal Handling............................................. 26 5.6 Exception Classes............................................ 27 5.7 Exception Objects............................................ 27 5.8 Unicode Exception Objects....................................... 28 5.9 Recursion Control............................................ 29 5.10 Standard Exceptions........................................... 29 6 Utilities 33 6.1 Operating System Utilities........................................ 33 6.2 System Functions............................................. 34 6.3 Process Control.............................................. 35
    [Show full text]
  • M&A Transaction Spotlight
    2012 AWARD WINNER: Capstone Partners GLOBAL INVESTMENT BANKING Investment Banking Advisors BOUTIQUE FIRM OF THE YEAR SaaS & Cloud M&A and Valuation Update Q2 2013 BOSTON CHICAGO LONDON LOS ANGELES PHILADELPHIA SAN DIEGO SILICON VALLEY Capstone Partners 1 CapstoneInvestment BankingPartners Advisors Investment Banking Advisors WORLD CLASS WALL STREET EXPERTISE.1 BUILT FOR THE MIDDLE MARKET.TM Table of Contents Section Page Introduction Research Coverage: SaaS & Cloud 4 Key Takeaways 5-6 M&A Activity & Multiples M&A Dollar Volume 8 M&A Transaction Volume 9-11 LTM Revenue Multiples 12-13 Highest Revenue Multiple Transactions for LTM 14 Notable M&A Transactions 15 Most Active Buyers 16-17 Public Company Valuation & Operating Metrics SaaS & Cloud 95 Public Company Universe 19-20 Recent IPOs 21-27 Stock Price Performance 28 LTM Revenue, EBITDA & P/E Multiples 29-31 Revenue, EBITDA and EPS Growth 32-34 Margin Analysis 35-36 Best / Worst Performers 37-38 Notable Transaction Profiles 40-49 Public Company Trading & Operating Metrics 51-55 Technology & Telecom Team 57-58 Capstone Partners 2 CapstoneInvestment BankingPartners Advisors Investment Banking Advisors 2 Capstone Partners Investment Banking Advisors Observations and Introduction Recommendations Capstone Partners 3 CapstoneInvestment BankingPartners Advisors Investment Banking Advisors WORLD CLASS WALL STREET EXPERTISE.3 BUILT FOR THE MIDDLE MARKET.TM Research Coverage: SaaS & Cloud Capstone’s Technology & Telecom Group focuses its research efforts on the following market
    [Show full text]
  • Professional Skills in Computer Science Lecture 3: Historical Aspects of Computing
    Professional Skills in Computer Science Lecture 3: Historical Aspects of Computing Ullrich Hustadt Department of Computer Science School of Electrical Engineering, Electronics, and Computer Science University of Liverpool Ullrich Hustadt COMP110 Professional Skills in Computer Science L3 { 1 Further milestones The Future Contents 1 Further milestones 2 The Future Fundamental questions Model-View-Controller Relevant learning outcome: 1 Ability to describe and discuss economic, historic, organisational, research, and social aspects of computing as a discipline and computing in practice; Ullrich Hustadt COMP110 Professional Skills in Computer Science L3 { 2 Further milestones The Future What have computers been used for? (Summary) • 1600 { now: Calculation Manipulation of numbers • 1960 { now: Information Processing Manipulation of numbers, text, images, audio, video • 1960 { now: Cognition (Reasoning) Manipulation of knowledge via reasoning / inference • 1970 { now: Interaction Allowing people to communicate, cooperate, compete • 1970 { now: Automation Computer-controlled machines and robots Hypotheses: • The wave of innovation in the 60s and 70s is due to the increased availability of computing resources to more and more researchers • Leadership is mostly due to early exposure to state-of-the-art systems and due to hard work Ullrich Hustadt COMP110 Professional Skills in Computer Science L3 { 3 Further milestones The Future What have computers been used for? What important milestones in the development and use of computers were not covered
    [Show full text]
  • Software Equity Group's 2012 M&A Survey
    The Software Industry Financial Report Software Equity Group, L.L.C. 12220 El Camino Real Suite 320 San Diego, CA 92130 [email protected] (858) 509-2800 Unmatched Expertise. Extraordinary Results Overview Deal Team Software Equity Group is an investment bank and M&A advisory firm serving the software and technology sectors. Founded in 1992, our firm has guided and advised companies on five continents, including Ken Bender privately-held software and technology companies in the United States, Canada, Europe, Asia Pacific, Managing Director Africa and Israel. We have represented public companies listed on the NASDAQ, NYSE, American, (858) 509-2800 ext. 222 Toronto, London and Euronext exchanges. Software Equity Group also advises several of the world's [email protected] leading private equity firms. We are ranked among the top ten investment banks worldwide for application software mergers and acquisitions. R. Allen Cinzori Managing Director Services (858) 509-2800 ext. 226 [email protected] Our value proposition is unique and compelling. We are skilled and accomplished investment bankers with extraordinary software, internet and technology domain expertise. Our industry knowledge and experience span virtually every software product category, technology, market and delivery model. We Dennis Clerke have profound understanding of software company finances, operations and valuation. We monitor and Executive Vice President analyze every publicly disclosed software M&A transaction, as well as the market, economy and (858) 509-2800 ext. 233 technology trends that impact these deals. We offer a full complement of M&A execution to our clients [email protected] worldwide. Our capabilities include:. Brad Weekes Sell-Side Advisory Services – leveraging our extensive industry contacts, skilled professionals and Vice President proven methodology, our practice is focused, primarily on guiding our client s wisely toward the (858) 509-2800 ext.
    [Show full text]
  • Plain Text & Character Encoding
    Journal of eScience Librarianship Volume 10 Issue 3 Data Curation in Practice Article 12 2021-08-11 Plain Text & Character Encoding: A Primer for Data Curators Seth Erickson Pennsylvania State University Let us know how access to this document benefits ou.y Follow this and additional works at: https://escholarship.umassmed.edu/jeslib Part of the Scholarly Communication Commons, and the Scholarly Publishing Commons Repository Citation Erickson S. Plain Text & Character Encoding: A Primer for Data Curators. Journal of eScience Librarianship 2021;10(3): e1211. https://doi.org/10.7191/jeslib.2021.1211. Retrieved from https://escholarship.umassmed.edu/jeslib/vol10/iss3/12 Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 License. This material is brought to you by eScholarship@UMMS. It has been accepted for inclusion in Journal of eScience Librarianship by an authorized administrator of eScholarship@UMMS. For more information, please contact [email protected]. ISSN 2161-3974 JeSLIB 2021; 10(3): e1211 https://doi.org/10.7191/jeslib.2021.1211 Full-Length Paper Plain Text & Character Encoding: A Primer for Data Curators Seth Erickson The Pennsylvania State University, University Park, PA, USA Abstract Plain text data consists of a sequence of encoded characters or “code points” from a given standard such as the Unicode Standard. Some of the most common file formats for digital data used in eScience (CSV, XML, and JSON, for example) are built atop plain text standards. Plain text representations of digital data are often preferred because plain text formats are relatively stable, and they facilitate reuse and interoperability.
    [Show full text]
  • Introduction to Smartphones Beginners Guide TOPIC INTRODUCTION to SMARTPHONES
    Tech Savvy Seniors Introduction to Smartphones Beginners Guide TOPIC INTRODUCTION TO SMARTPHONES OVERVIEW Phones used to be all about making calls, but now your mobile can do so much more. The range of new touchscreen smartphones allows you to access the internet, use social media, get live news updates, play music and video, and much more. They almost universally use touchscreens for control, however, which can be a challenge for people new to the technology. WHO IS THIS Maybe you’ve never owned a mobile and are curious WORKSHOP FOR? about why you’d choose a smartphone. Perhaps you want a mobile phone that does more than your current keypad-style handset, or are looking to learn more about the smartphone you already own. This workshop has something to satisfy each of you. WHAT YOU’LL An internet-connected smartphone; either your NEED own or supplied by the workshop organisers. You may need to share a smartphone with others in the workshop. An existing Apple account (or Apple ID), for downloading apps to an iPhone smartphone. An existing Google account (or Google ID), for downloading apps to an Android smartphone. WHAT YOU’LL In this workshop, you will learn the basics of how LEARN to navigate your way around a smartphone with a touchscreen. You will learn how to turn the phone on and off, make and receive calls, add a contact and look up a contact, and change the volume on the phone. You will also learn briefly about apps, what they are, how to download them, and the costs associated with them.
    [Show full text]
  • The Ways Young Adults Access Digital Information Cydney Lauren Palmer Louisiana State University and Agricultural and Mechanical College, [email protected]
    Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2011 There's an app for that: the ways young adults access digital information Cydney Lauren Palmer Louisiana State University and Agricultural and Mechanical College, [email protected] Follow this and additional works at: https://digitalcommons.lsu.edu/gradschool_theses Part of the Mass Communication Commons Recommended Citation Palmer, Cydney Lauren, "There's an app for that: the ways young adults access digital information" (2011). LSU Master's Theses. 711. https://digitalcommons.lsu.edu/gradschool_theses/711 This Thesis is brought to you for free and open access by the Graduate School at LSU Digital Commons. It has been accepted for inclusion in LSU Master's Theses by an authorized graduate school editor of LSU Digital Commons. For more information, please contact [email protected]. THERE’S AN APP FOR THAT: THE WAYS YOUNG ADULTS ACCESS DIGITAL INFORMATION A Thesis Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements for the degree of Master in Mass Communication in The Manship School of Mass Communication by Cydney Lauren Palmer B.A., Louisiana State University, 2008 December 2011 ACKOWLEDGMENTS First, I would like to thank my parents, Allan and Karin Palmer, for their support and encouragement while pursuing my master’s degree. I would also like to thank Dr. Yongick Jeong for his continuous guidance and support throughout the tedious development of this academic research project. Finally, I would like to thank my additional thesis committee members, Dr. Lance Porter and Dr.
    [Show full text]
  • Running IBM Websphere Application Server on System P and AIX: Optimization and Best Practices
    Front cover Running IBM WebSphere Application Server on System p and AIX: Optimization and Best Practices System p and AIX configuration strategies for WebSphere Application Server How JVM runtime and WebSphere Application Server interact with AIX Implementation scenarios Lutz Werner Denefleh Anderson de Sousa Ribeiro Dias Simon Kapadia Monty Poppe Colin Renouf Kwan-Ming Wan ibm.com/redbooks International Technical Support Organization Running IBM WebSphere Application Server on System p and AIX: Optimizaton and Best Practices September 2008 SG24-7347-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition September 2008 This edition applies to IBM WebSphere Application Server Version 6.1, IBM AIX Version 5.3, and IBM AIX Version 6.1. © Copyright International Business Machines Corporation 2008. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . x Preface . xi The team that wrote this book . xi Acknowledgements . xiii Become a published author . xiii Comments welcome. xiv Chapter 1. Introduction to running WebSphere Application Server on System p and AIX . 1 1.1 The whole system view: WebSphere, JVM, AIX, and System p . 2 1.1.1 Points of view . 2 1.1.2 A holistic system approach . 3 1.2 System layers and points of view . 3 1.2.1 Points of view and terminology . 4 1.3 The remainder of this book . 5 Chapter 2. WebSphere on System p and AIX 5 strategies . 7 2.1 Scalability considerations .
    [Show full text]
  • Die Meilensteine Der Computer-, Elek
    Das Poster der digitalen Evolution – Die Meilensteine der Computer-, Elektronik- und Telekommunikations-Geschichte bis 1977 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 und ... Von den Anfängen bis zu den Geburtswehen des PCs PC-Geburt Evolution einer neuen Industrie Business-Start PC-Etablierungsphase Benutzerfreundlichkeit wird gross geschrieben Durchbruch in der Geschäftswelt Das Zeitalter der Fensterdarstellung Online-Zeitalter Internet-Hype Wireless-Zeitalter Web 2.0/Start Cloud Computing Start des Tablet-Zeitalters AI (CC, Deep- und Machine-Learning), Internet der Dinge (IoT) und Augmented Reality (AR) Zukunftsvisionen Phasen aber A. Bowyer Cloud Wichtig Zählhilfsmittel der Frühzeit Logarithmische Rechenhilfsmittel Einzelanfertigungen von Rechenmaschinen Start der EDV Die 2. Computergeneration setzte ab 1955 auf die revolutionäre Transistor-Technik Der PC kommt Jobs mel- All-in-One- NAS-Konzept OLPC-Projekt: Dass Computer und Bausteine immer kleiner, det sich Konzepte Start der entwickelt Computing für die AI- schneller, billiger und energieoptimierter werden, Hardware Hände und Finger sind die ersten Wichtige "PC-Vorläufer" finden wir mit dem werden Massenpro- den ersten Akzeptanz: ist bekannt. Bei diesen Visionen geht es um die Symbole für die Mengendarstel- schon sehr früh bei Lernsystemen. iMac und inter- duktion des Open Source Unterstüt- möglichen zukünftigen Anwendungen, die mit 3D-Drucker zung und lung. Ägyptische Illustration des Beispiele sind: Berkley Enterprice mit neuem essant: XO-1-Laptops: neuen Technologien und Konzepte ermöglicht Veriton RepRap nicht Ersatz werden.
    [Show full text]