首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 817 毫秒
1.
无论是在欧美发达国家,还是在东方社会,方便面成了忙碌的上班族们快速解决肚了“造反”问题的最佳选择。方便面与我们的生活朝夕相关,对它,无人不知,无人不晓,然而,对它的发明者吴百福有所了解的人却寥若晨星,对其高超的经营智慧熟悉者更少,其实,他的发家历程,他的经营理念,他那允满了锐气的营销策略对我们今天的创业者仍是一笔足可受益终身的财富。  相似文献   

2.
以企业废水处理试验结果为例,分析含高浓度硫酸盐废水处理的可行方法,由于国家对废水排放执行比较严格的标准,这在一定程度上对制药企业提出了比较高的要求,在实际工作中,多数制药企业很难稳定达标。随着水资源越来越紧张,水价不断上涨,各企业节水工作力度也越来越大,用水量和排水量大幅度减少,这也对达标排放造成了越来越大的压力,对废水处理的程度和水平也提出了更高的要求。  相似文献   

3.
本文选用我国中小板上市制造业企业为研究样本,利用2010—2016年的面板数据,探讨了供应链集中度、产权性质对企业研发投入强度的影响。研究结果表明,供应链集中度的两个维度,即供应商集中度和客户集中度,对企业研发投入强度的影响存在差异,客户集中度能够显著促进研发投入强度,而供应商集中度对研发投入强度产生负向影响。进一步地,考虑我国存在不同产权性质的企业,在非国有企业中,客户集中度对企业研发投入强度的促进作用更加明显,同时一定程度上缓和了供应商集中度对研发投入强度的负向影响;而国有企业中,供应商集中度对企业研发投入强度的抑制作用更加显著。本研究从企业供应链的视角探讨了影响企业研发投入强度的因素,重新认识了供应链集中度对企业研发投入强度的影响。研究结论对企业如何看待供应链集中度以及如何评估供应链集中度对企业研发活动的影响,具有理论和实践意义。  相似文献   

4.
《科技新时代》2007,(3):100-100
天梭天思系列情侣对表,豪利时Williams F1 Team对表,天梭PRC100石英对表,宝铂表2007情人节限量款,  相似文献   

5.
文章以某高钛渣冶炼企业为例,对该企业的能源消费构成及消费量进行了梳理,对企业能源效率进行了诊断,根据诊断结果和企业需求,结合企业的实际情况,对企业节能节水潜力进行了分析,并提出了节能节水改造建议。  相似文献   

6.
日前,我国97%以上的企业是中小型企业。迫于国内外竞争的需要,中小企业需要在管理、信息化方面不断的提高,需要ERP的支持。而另外一方面,各大ERP厂商良莠不齐,竞争激烈,宣传铺天盖地,对于信息不对称的中小企业来说,势必造成ERP选型的困难。成功的ERP选型在很大程度上决定了ERP实施的成败。本文拟通过对SAP和用友这两个目前国内最大的ERP厂商比较,使中小企业能对中外的ERP有所了解,从而做到成功的选型,另外,本文从工程角度对ERP的实施提出了一些建议,希望能对中小企业ERP的建设提供一定的参考。  相似文献   

7.
本文通过对金融危机下城市街道清洁工人生活态度的调查,了解到城市清洁工需要我们的关心,需要我们从心理上给予关怀,改变对环卫工人的看法,给他们肯定,我相信他们对未来一定会充满信心的。  相似文献   

8.
从宏观和微观两个层面,对国内外有关企业集团的内部管理控制研究进行了综述,并指出,国内外学者对企业集团控制方式的研究主要集中在财务控制方面,而近年来又主要集中在对财务总监委派制的研究上,最后指出,尽管企业集团的研究已成为学术界的新兴领域,但关于企业集团管理控制的研究还处于起步阶段,因此,开展相应的实证研究是未来的一个研究方向。  相似文献   

9.
完全学分制下高校奖学金评定方式创新探索   总被引:2,自引:0,他引:2  
奖学金的评定关系到学生的切身利益,也对学生在各方面的引导起到非常关键的作用,完全学分制的推进,对奖学金的评定方式提出了新的要求。本文通过对传统奖学金评定方式的比较研究,结合完全学分制的特点,提出适合新形势下奖学金评定方式,以期进一步完善奖学金评定的量化方法.  相似文献   

10.
肖春梅 《中国科技信息》2007,(4):228-229,231
基础教育数学课程改革对数学教师的专业知识与能力提出了更高的要求,这些要求主要包括:具备足够的数学专业知识,对知识融会贯通的能力,运用现代信息技术的能力,对学生进行发展性评价的能力,对数学教学进行反思的能力。  相似文献   

11.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

12.
This paper examines the category of "Woman" within the metastructure of a system of knowledge organization. We trace the subject scheme used to list books about women in a standard bibliographic guide over the first three-quarters of the twentieth century.Building on the feminist critique of subject representation, our analysis documents how the category was continually constructed over time, providing evidence of multiplication, isolation, and confusion in the process. The outcome is a framework that fails to capture the complex nature of knowledge about women and conceals relationships to the larger body of knowledge. The case of this legacy system exemplifies problems associated with representing the complexity and integration of knowledge and provides a basis for considering the potential residual impacts of current information organization and navigation systems.  相似文献   

13.
结合元极学三元学说,剖析《管子》的基本概念如道、宙合、精、德、中、智等的内涵,揭示时间、空间、精等是天地万物的共同特征或本质,注重时、空、精的层次性、无限性,以及人的生命本和本性展发。  相似文献   

14.
The main premise of this article is that in information societies generally, and in virtual social contexts particularly, a distinctive style of interaction to facilitate the communication of difference, heterotopic communication , has emerged. It rests on two cultural foundations: an ideological belief in the positive, socially integrating power of communication, and a prevailing ethic of instrumental rationality, subjective individualism, and strategically practiced self-interest. The former is demonstrated by the use of simulation and spectacle as sources of information; exhibitionism/voyeurism as a communicative style; and the awareness of surveillance. The latter is seen in the competitive use of knowledge as a commodity; a surface globalism masking deep parochialism; lateral as well as vertical information inequity; and the use of public versus private as strategies for engagement rather than as spaces. Those who engage in heterotopic communication resort to their 'own devices' both in the sense of personal agendas, strategies, interests, and interpretations, and in the form of the telecommunication tools that help realize them. These personal and technological devices allow individuals with the right educational and technical resources to avoid exposure to disagreement, difference, or other information that does not serve their direct purposes or reflect their particular views of the world; yet they also help convey the appearance of openness, availability, and cooperation. This style of interaction is used strategically in combination with information and communication technologies to gain social or economic advantages, but it may encourage social separatism and parochialism, inhibit the negotiation of disputes, and emphasize competing interests.  相似文献   

15.
Contrary to the "retro" image often awarded them, and despite their continuing enthusiasm and responsibility for the organization of printed materials, librarians are upbeat about the prospects of an information society driven primarily by electronic technologies, but in which libraries can play an important part. Public librarians detect a natural correlation between the historic democratic mission of their institution and the increased accessibility made possible by digitalized sources. The library community's acceptance of the information society idea as a "given" social phenomenon supports discourses that play down historical continuities and herald the dawn of a new age. Such discourses ignore or reject historical evidence that points to the existence of past information societies, revolutions, and infrastructures defined, in part, by the operation of indirect surveillance, constituted by the bureaucratic information systems of modernity. Victorian Britain serves as a good example of an early information society, to which public libraries, themselves micro-information societies, contributed significantly. The role played by public librarians in the Victorian information society, illustrated in this article by evidence drawn from the contemporary library press, is seen in their preoccupation with the surveillance and ordering of knowledge; their adoption for library operations of the businesslike, bureaucratic procedures described recently by business historians; and their panoptic tracking of users and their activities.  相似文献   

16.
This article presents an account of the process of development of the NSFNET and its significance for the emergence of the Internet of the 1990s. The fact that the development of the interconnected system of computer networks occurred within the realm of academic research is not incidental. The dynamics of the world of scientific research were intimately related to the shaping of the network and to the way in which it spread to other sectors of society. The construction of computer networks crossed the boundaries between science and society in order to build the scientific realm by transforming the world in which it is embedded.  相似文献   

17.
中德海洋学核心期刊论文国际合著的比较分析   总被引:1,自引:0,他引:1  
万琪  华薇娜 《现代情报》2016,36(2):150-156
本研究选取Web of Science数据库,收集中国和德国发表的海洋学论文,将论文分为国际合著组与非国际合著组,利用文献计量学的方法,借助EXCEL、SPSS和UCINET软件,比较两国各年的发文量、论文的篇均作者和篇均参考文献数、收录期刊的影响因子、论文的被引频次以及合著国家。研究结果显示,中国海洋学领域的国际合著起步晚于德国,但发展迅速,近年来中国海洋学国际合著的论文量已超过德国;同时中国海洋学国际合著论文的质量和学术影响力都弱于德国,并且中国海洋学论文合著国家的范围也小于德国海洋学的合著国家。  相似文献   

18.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

19.
Trust between transaction partners in cyberspace has come to be considered a distinct possibility. In this article the focus is on the conditions for its creation by way of assuming, not inferring trust. After a survey of its development over the years (in the writings of authors like Luhmann, Baier, Gambetta, and Pettit), this mechanism of trust is explored in a study of personal journal blogs. After a brief presentation of some technicalities of blogging and authors’ motives for writing their diaries, I try to answer the question, ‘Why do the overwhelming majority of web diarists dare to expose the intimate details of their lives to the world at large?’ It is argued that the mechanism of assuming trust is at play: authors simply assume that future visitors to their blog will be sympathetic readers, worthy of their intimacies. This assumption then may create a self-fulfilling cycle of mutual admiration. Thereupon, this phenomenon of blogging about one’s intimacies is linked to Calvert’s theory of ‘mediated voyeurism’ and Mathiesen’s notion of ‘synopticism’. It is to be interpreted as a form of ‘empowering exhibitionism’ that reaffirms subjectivity. Various types of ‘synopticon’ are distinguished, each drawing the line between public and private differently. In the most ‘radical’ synopticon blogging proceeds in total transparency and the concept of privacy is declared obsolete; the societal gaze of surveillance is proudly returned and nullified. Finally it is shown that, in practice, these conceptions of blogging are put to a severe test, while authors often have to cope with known people from ‘real life’ complaining, and with ‘trolling’ strangers.  相似文献   

20.
The Principles of Fair Information Practice are almost three decades old and need to be broadened to take account of new technologies for collecting personal information such as drug testing, video cameras, electronic location monitoring, and the Internet. I argue that the ethics of a surveillance activity must be judged according to the means, the context and conditions of data collection, and the uses/goals, and suggest 29 questions related to this. The more one can answer these questions in a way that affirms the underlying principle (or a condition supportive of it), the more ethical the use of a tactic is likely to be. Four conditions are identified that, when breached, are likely to violate an individual's reasonable expectation of privacy. Respect for the dignity of the person is a central factor and emphasis is put on the avoidance of harm, validity, trust, notice, and permission when crossing personal borders.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号