This article identifies the role of library and information science (LIS) education in the development of community health information services for people living with HIV/AIDS (PLWHA). Preliminary findings are present...This article identifies the role of library and information science (LIS) education in the development of community health information services for people living with HIV/AIDS (PLWHA). Preliminary findings are presented from semi- structured qualitative interviews that were conducted with eleven directors and managers of local branches in the Knox County Public Library (KCPL) System that is located in the East Tennessee region in the United States. Select feedback reported by research participants is summarized in the article about strategies in LIS education that can help local public librarians and others in their efforts to become more responsive information providers to PLWHA. Research findings help better understand the issues and concerns regarding the development of digital and non-digital health information services for PLWHA in local public library institutions.展开更多
In recent years,there are some problems in science and technology management,such as untimely task supervision and independent information system,which makes it difficult to achieve accurate,quantitative and standardi...In recent years,there are some problems in science and technology management,such as untimely task supervision and independent information system,which makes it difficult to achieve accurate,quantitative and standardized management.The storage of scientific research test data is scattered,and there are many deficiencies in the management,promotion and use of existing intellectual property.In this paper,on the basis of the knowledge economy,intelligence economy under the conditions of knowledge management concept and cutting-edge technology,technology management and service management related data,information,knowledge,method of blend together.Based on science and technology management,knowledge management as the core of management and service platform of science and technology technical route,main function,construction principles and standards.In order to realize the management systematization of science and technology,intelligent,better educated,multi-level and multi-angle application services.展开更多
This paper proposed a digital municipal management platform based on service-oriented architecture. It aims to realize data sharing and system integration between the municipal enterprises. This platform adopts spatia...This paper proposed a digital municipal management platform based on service-oriented architecture. It aims to realize data sharing and system integration between the municipal enterprises. This platform adopts spatial information knowledge, network and database techniques, which includes hardware and software background layer, data layer, basic management layer, operation service layer and application layer. It supports multi-scale and multi-size data management, distributed multi structures, information updating, and application building and operation cooperation. The result shows that this platform with multi layers and diversified information service provides solid background for municipal enterprises and has been one the most important infrastructures for the digital municipal development and the combination of SOA and Grid Computing will be the trend for the municipal informationized development.展开更多
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor...Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.展开更多
文摘This article identifies the role of library and information science (LIS) education in the development of community health information services for people living with HIV/AIDS (PLWHA). Preliminary findings are presented from semi- structured qualitative interviews that were conducted with eleven directors and managers of local branches in the Knox County Public Library (KCPL) System that is located in the East Tennessee region in the United States. Select feedback reported by research participants is summarized in the article about strategies in LIS education that can help local public librarians and others in their efforts to become more responsive information providers to PLWHA. Research findings help better understand the issues and concerns regarding the development of digital and non-digital health information services for PLWHA in local public library institutions.
基金supported by Research on Construction of Green Building Material Information Management Platform(Grant 2016024).
文摘In recent years,there are some problems in science and technology management,such as untimely task supervision and independent information system,which makes it difficult to achieve accurate,quantitative and standardized management.The storage of scientific research test data is scattered,and there are many deficiencies in the management,promotion and use of existing intellectual property.In this paper,on the basis of the knowledge economy,intelligence economy under the conditions of knowledge management concept and cutting-edge technology,technology management and service management related data,information,knowledge,method of blend together.Based on science and technology management,knowledge management as the core of management and service platform of science and technology technical route,main function,construction principles and standards.In order to realize the management systematization of science and technology,intelligent,better educated,multi-level and multi-angle application services.
文摘This paper proposed a digital municipal management platform based on service-oriented architecture. It aims to realize data sharing and system integration between the municipal enterprises. This platform adopts spatial information knowledge, network and database techniques, which includes hardware and software background layer, data layer, basic management layer, operation service layer and application layer. It supports multi-scale and multi-size data management, distributed multi structures, information updating, and application building and operation cooperation. The result shows that this platform with multi layers and diversified information service provides solid background for municipal enterprises and has been one the most important infrastructures for the digital municipal development and the combination of SOA and Grid Computing will be the trend for the municipal informationized development.
文摘Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.