Library-Vendor Relations

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RFC 3925 Vendor - Identifying Vendor Options

Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract The Dynamic Host Configuration P...

متن کامل

A Content Analysis of Library Vendor Privacy Policies: Do They Meet Our Standards?

Trina J. Magi is Library Associate Professor in Bailey/Howe Library at the University of Vermont; e-mail: [email protected]. Acknowledgment: The author gratefully acknowledges the assistance and support of Douglas Dunbebin, Alan Howard, Milton Crouch, and Martin Garnar. © Trina J. Magi Librarians have a long history of protecting user privacy, but they have done seemingly little to understand ...

متن کامل

Managing Vendor Relations: A Case Study of Two HPC Network Issues

High performance computing requires fast networks to move large amounts of data between compute nodes and disk storage. For a variety of reasons, however, the fast speeds achieved by bleeding edge network technology tend to come along with a higher risk of system failure. When designing and building high end computing systems using the fastest available network equipment, a good relationship wi...

متن کامل

The vendor location problem

The vendor location problem is the problem of locating a given number of vendors and determining the number of vehicles and the service zones necessary for each vendor to achieve at least a given profit. We consider two versions of the problem with different objectives: maximizing the total profit and maximizing the demand covered. The demand and profit generated by a demand point are functions...

متن کامل

Approach to vendor authentication

1 Background With the remarkable and ever increasing technology growth, we need various products and services from different vendors, such as: • Home appliances • Furniture • Mobile • Internet To deliver these products and provide services, representatives from concerned companies visit our place. We somehow need to ascertain if the person visiting is an authentic representative from the concer...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Against the Grain

سال: 1990

ISSN: 2380-176X

DOI: 10.7771/2380-176x.2285