Summary

HandWiki is the world's largest wiki-style encyclopedia dedicated to science, technology and computing. It allows you to create and edit articles as long as you have external citations and login account. In addition, this is a content management environment that can be used for collaborative editing of original scholarly content, such as books, manuals, monographs and tutorials.

Expand All
Entries
Topic Review
Proactive Contracting
Proactive Contracting is akin to Proactive Law and focuses on the same properties, namely to prevent problems and promote relationships. The legal area of research developed in Scandinavia in the 1990s and has gradually gained attention. Proactive Contracting deals with Contract Management, Relational Management, Risk Management and Business Process Management. The word proactive is the opposition to reactive and refers to acting in anticipation of future problems, needs, or changes. A survey conducted by IACCM shows that businesses urge a paradigm shift in contracting, favoring a more relational approach. Thus, the focus of future contracting becomes more relational. Businesses may therefore face increased complexity as trading is done not only across physical boundaries, but also across religious, cultural, and ethical boundaries. The IACCM survey has underpinned the need for re-thinking contracts and the approach to business relationships, as international, and long relationships, make it hard to draft and agree upon every single event that might occur in the future. Proactive Contracting is moving away from the path of responding to these complex relationships with complex contracts. However, as it is hard to imagine realistic alternatives to contracts, Proactive Contracting suggest businesses to change perception of contracts to meet the needs of the future. Add to this the increased complexity of products due to technological evolution and it becomes clear that businesses need to actively deal with the danger of increasing complexity and uncertainty. In fact, a survey conducted by IBM Corporation revealed that 79% of Chief Executive Officers (CEOs) see increased global complexity as a major challenge over the coming years. As the legal framework increases in complexity, it becomes apparent that there is a need for creating certainty in order to support future trading. Businesses need to manage this complexity in order to avoid unnecessary losses, but also in order to exploit all the possibilities deriving from global interaction. Empirical studies on contracting capabilities and research on dynamic capabilities have shown that promoting proactive behavior in businesses is a key in the quest of future success. As globalization increases, sustainability and certainty become more urgent, resulting in decentralization of the traditional legal environment. The reason for this decentralization is that the traditional legal environment does not fulfill the task of creating the certainty and sustainability that businesses need in order to prosper. After the launch of the United Nations Decade of Education for Sustainable Development, mechanisms have evolved through which future development is achieved. According to these mechanisms, a sound development must be focusing on ethically acceptable, morally fair and economically sound processes. Management tools for global value chains have already been developed, and focus is especially on self- and private regulation instruments and standards - this is where proactive contracting and proactive law is coming to the fore.
  • 1.3K
  • 08 Nov 2022
Topic Review
Crowds
Crowds is a proposed anonymity network for anonymous web browsing. The main idea behind Crowds anonymity protocol is to hide each user's communications by routing them randomly within a group of similar users. Neither the collaborating group members nor the end receiver can therefore be sure where in the group the packet originated. Crowds was designed by Michael K. Reiter and Aviel D. Rubin. It defends against internal attackers and a corrupt receiver, but provides no anonymity against a global attacker or a local eavesdropper (see "Crowds: Anonymity For Web Transactions"). Crowds is vulnerable to the predecessor attack; this was discussed in Reiter and Rubin's paper and further expanded in "The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems" by Matthew K. Wright, Micah Adler, And Brian Neil Levine. Crowds introduced the concept of users blending into a crowd of computers.
  • 1.1K
  • 08 Nov 2022
Topic Review
Folklore Studies
Folklore studies, also known as folkloristics, and occasionally tradition studies or folk life studies in the United Kingdom , is the branch of anthropology devoted to the study of folklore. This term, along with its synonyms,[note 1] gained currency in the 1950s to distinguish the academic study of traditional culture from the folklore artifacts themselves. It became established as a field across both Europe and North America, coordinating with Volkskunde (German), folkeminner (Norwegian), and folkminnen (Swedish), among others.
  • 4.6K
  • 09 Nov 2022
Topic Review
Host
In biology and medicine, a host is a larger organism that harbours a smaller organism; whether a parasitic, a mutualistic, or a commensalist guest (symbiont). The guest is typically provided with nourishment and shelter. Examples include animals playing host to parasitic worms (e.g. nematodes), cells harbouring pathogenic (disease-causing) viruses, a bean plant hosting mutualistic (helpful) nitrogen-fixing bacteria. More specifically in botany, a host plant supplies food resources to micropredators, which have an evolutionarily stable relationship with their hosts similar to ectoparasitism. The host range is the collection of hosts that an organism can use as a partner.
  • 1.5K
  • 08 Nov 2022
Topic Review
Kounotori 2
Kounotori 2 (こうのとり2号機, "white stork" ), also known as HTV-2, was launched in January 2011 and was the second Japan ese H-II Transfer Vehicle to resupply the International Space Station (ISS). It was launched by the H-IIB Launch Vehicle No. 2 (H-IIB F2) manufactured by Mitsubishi Heavy Industries (MHI) and JAXA. After the supplies were unloaded, Kounotori 2 was loaded with waste material from ISS, including used experiment equipment and used clothes. Kounotori 2 was then unberthed and separated from the ISS and burned up upon reentering the atmosphere on 30 March 2011.
  • 1.1K
  • 08 Nov 2022
Topic Review
Green Tea
Green tea is a type of tea that is made from Camellia sinensis leaves that have not undergone the same withering and oxidation process used to make oolong teas and black teas. Green tea originated in China , but its production and manufacture has spread to many other countries in Asia. Several varieties of green tea exist, which differ substantially based on the variety of C. sinensis used, growing conditions, horticultural methods, production processing, and time of harvest. Although there has been considerable research on the possible health effects of consuming green tea regularly, there is little evidence that drinking green tea has any effects on health.
  • 4.5K
  • 08 Nov 2022
Topic Review
List of Paleobiota of the Morrison Formation
The Morrison Formation is a distinctive sequence of Late Jurassic sedimentary rock that is found in the western United States, which has a wide assortment of taxa represented in its fossil record, including dinosaur fossils in North America. It is composed of mudstone, sandstone, siltstone and limestone and is light grey, greenish gray, or red. Most of the fossils occur in the green siltstone beds and lower sandstones, relics of the rivers and floodplains of the Jurassic period. (mostly from Foster ; the higher-level classifications will vary as new finds are made.
  • 2.4K
  • 09 Nov 2022
Topic Review
Fiat G.50
The Fiat G.50 Freccia ("Arrow") was a World War II Italian fighter aircraft developed and manufactured by aviation company Fiat. Upon entering service, the type became Italy’s first single-seat, all-metal monoplane that had an enclosed cockpit and retractable undercarriage. On 26 February 1937, the G.50 conducted its maiden flight. During early 1938, the Freccias served in the Regia Aeronautica (the Italian Air Force) and with its expeditionary arm, the Aviazione Legionaria, in Spain, where they proved to be relatively fast and very manoeuvrable in comparison to its adversaries in the theatre. Early in the Second World War, it was determined that the G.50 possessed inadequate armament, comprising a pair of Breda-SAFAT 12.7-mm machine guns. The fighter was extensively used on various fronts by Italy, including in Northern Europe, North Africa, the Balkans, and the Italian mainland. The G.50 commonly came up against the British Hawker Hurricane, which was fast enough to frequently outrun and out-range the Italian opponent. Later models of the fighter had improvements, including a substantial increase in range. The G.50 was exported to several overseas customers, small numbers being flown by the Air Force of the Independent State of Croatia while 35 G.50 fighters were shipped to Finland , where they served with distinction during both the Winter War of 1940 and the Continuation War of 1941–1944 against the Soviet Union. In Finnish service, the type reportedly achieved an unprecedented kill/loss ratio of 33/1.
  • 2.0K
  • 08 Nov 2022
Topic Review
Denormal Number
In computer science, subnormal numbers are the subset of denormalized numbers (sometimes called denormals) that fill the underflow gap around zero in floating-point arithmetic. Any non-zero number with magnitude smaller than the smallest normal number is subnormal. In a normal floating-point value, there are no leading zeros in the significand or mantissa; rather, leading zeros are removed by adjusting the exponent (for example, the number 0.0123 would be written as 1.23 × 10−2). Conversely, a denormalized floating point value has a significand with a leading digit of zero. Of these, the subnormal numbers represent values which if normalized would have exponents below the smallest representable exponent (the exponent having a limited range). The significand (or mantissa) of an IEEE floating-point number is the part of a floating-point number that represents the significant digits. For a positive normalised number it can be represented as m0.m1m2m3...mp−2mp−1 (where m represents a significant digit, and p is the precision) with non-zero m0. Notice that for a binary radix, the leading binary digit is always 1. In a subnormal number, since the exponent is the least that it can be, zero is the leading significant digit (0.m1m2m3...mp−2mp−1), allowing the representation of numbers closer to zero than the smallest normal number. A floating-point number may be recognized as subnormal whenever its exponent is the least value possible. By filling the underflow gap like this, significant digits are lost, but not as abruptly as when using the flush to zero on underflow approach (discarding all significant digits when underflow is reached). Hence the production of a subnormal number is sometimes called gradual underflow because it allows a calculation to lose precision slowly when the result is small. In IEEE 754-2008, denormal numbers are renamed subnormal numbers and are supported in both binary and decimal formats. In binary interchange formats, subnormal numbers are encoded with a biased exponent of 0, but are interpreted with the value of the smallest allowed exponent, which is one greater (i.e., as if it were encoded as a 1). In decimal interchange formats they require no special encoding because the format supports unnormalized numbers directly. Mathematically speaking, the normalized floating-point numbers of a given sign are roughly logarithmically spaced, and as such any finite-sized normal float cannot include zero. The subnormal floats are a linearly spaced set of values, which span the gap between the negative and positive normal floats.
  • 1.9K
  • 08 Nov 2022
Topic Review
FLITs
FLITs is an acronym for FLow control unITs (or FLow control digITs). Large network packets are broken into small pieces called flits (flow control units). The first flit, called the header flit holds information about this packet's route (namely the destination address) and sets up the routing behavior for all subsequent flits associated with the packet. The head flit is followed by zero or more body flits, containing the actual payload of data. The final flit, called the tail flit, performs some book keeping to close the connection between the two nodes. A virtual connection holds the state needed to coordinate the handling of the flits of a packet. At a minimum, this state identifies the output port of the current node for the next hop of the route and the state of the virtual connection (idle, waiting for resources, or active). The virtual connection may also include pointers to the flits of the packet that are buffered on the current node and the number of flit buffers available on the next node.:237
  • 2.7K
  • 08 Nov 2022
  • Page
  • of
  • 863
>>