The Internet Encyclopedia (Volume 3)

(coco) #1

P1: IML


WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0


INDEX 937

Subscription models,V1: 604
Subtractive color model,V2: 644
Suncor Energy Inc.,V1: 125
Sun Microsystems,V1:109, 112;V2: 379
Sun Microsystems Resource Management
Suite,V1: 149
Sun ONE,V3: 759
SuperMontage order book,V3: 280
Supernets,V2: 253
Supplemental Register, of USPTO,
V3:449, 450
Supplementary news site model,V2: 766
Supplier benefits, e-procurement and,
V1: 655
Supplier costs,V1: 652
Supplier Relationship Management
(SRM),V1: 127
Supplier sites,V2: 773
Supplier systems,V3: 392
Supply chain,V1:118, 216, 485, 491.See
alsoE-sourcing; Inventory
management; Materials flow
management
integration of,V1: 108
inventory management and,V2:368–369
management key challenges in,V2: 558
problems with,V1: 206
strategic partners and,V3: 343
Supply chain collaboration, management
issues in,V3:377–379
Supply Chain Management (SCM),
V1:125, 204, 658;V2:553;
V3:365–373.See alsoSupply chain
collaboration; Supply chain
management technologies
coordination in,V3:369–371
e-procurement and,V1:649, 650 –651
future trends in,V3:383–384
information technology and,V3:371–372
international,V2:233–243
Internet and,V3:374 –386
planning process,V3:390 –392
quality principles in,V2:175–176
strategic and tactical issues in,
V3:366 –369
value chain and,V3:388–389
Supply chain management technologies,
V3:387–397.See alsoSupply Chain
Management (SCM)
areas of,V3:389–390
case studies concerning,V3:381–383
IT infrastructure and,V3:394 –395
networks and,V3: 395
optimization approaches for,
V3:392–394
trends in,V3:395–396
Supply chain models,V3: 389
Supply network behavior,V3:409– 410
Supply network operations strategy,
V3:406 – 408
customizing,V3:408– 410
Supply network perspective, benefits of,
V3:404 – 405
Supply network relationships,
V3:402– 406
customizing,V3:406 – 410
importance of,V3: 410
Supply networks,V1:731;V3:398– 411.
See alsoSupply network relationships
demand complexity and,V3:398– 401

key tactical activities in,V3:407– 408
mass customization and,V3:401– 402
research on,V3: 410
Supporter sites, religious,V2: 803
SurfAID,V1: 406
Surge protectors,V3:74 –75
Surrogate records,V2: 485
Surveillance technology,V2: 225
Sustainability, in developing nations,
V1: 437
Sweden, e-business in,V1: 809
Swedlow, Tracy,V1: 700
Swedorski, Scott,V1: 97
Sweepstakes,V2: 570
Switched Virtual Circuits (SVCs),V2: 188
Switching costs,V1: 611
Switching technologies,V3:782–785
switchstatement, C/C++,V1:169, 170
Symbian Operating System (Symbian
OS),V2:637–638
Symbol Error Rate (SER),V1: 461
Symbol Technologies mobile devices,
V2: 631
Symmetrical Multiprocessing (SMP)
architecture,V1: 420
Symmetric DSL (SDSL),V2: 300
Symmetric encryption,V1:694;V3: 266
Symmetric key encryption,V1:527,
686 –689
security of,V1: 689
Symmetric keys,V1: 628
Synchronization,V1:466;V2: 67
Synchronous communication
technologies,V1: 554
virtual teams and,V3:603–604
Synchronous Digital Hierarchy (SDH),
V2:670, 673
Synchronous groupware,V2:66, 70 –72
Synchronous Learning Networks (SLNs),
V1: 552
Synchronous messaging,V1: 661
Synchronous Optical Network (SONET),
V2:669–670, 673;V3:172, 778–779
Synchronous Transfer Mode (STM),
V2: 181
Syndicated data, intranets and,V2: 348
Synergy,V1: 193
in systems,V1: 513
SYN flooding attack,V1:428;V3: 432
SYSKEY encryption,V3:5, 9
System analysis,V3: 135
intelligent agents and,V2: 194
System availability.SeeAvailability
modeling
System backup and testing ASPs
(Application Service Providers),V1: 40
“System caching,”V1: 311
System management ASPs (Application
Service Providers),V1: 40
System operations, Perl,V3:39– 40
System outage,V1: 547
System performance,V1: 141
Systems.See alsoOperating systems
entries
configuration of,V1: 148
cost of,V1: 141
design of,V3: 135
infector viruses in,V1: 328
logs for,V2: 524
maintenance of,V3:135–136

software for,V1: 238
technologies in,V1: 141
testing of,V3:135–136
System.Xml parser,V1: 740
SysTrust,V1:126;V3: 147

T-1 carrier,V2:667–669
Tables:
Web page,V2: 135
WML,V3:811–812
Tablet PDAs,V3: 829
Tabu search process,V3:393–394
Tactical thinking,V1: 423
Tagged Image File Format (TIFF),V1: 821
Tag handlers,V2: 424
Tag information, use of,V3: 741
Tag libraries:
descriptors for,V2: 424
JSP,V2:423– 425
Tags,V1: 10
Talkomatic,V1: 665
Tanenbaum, Andrew,V2:492– 493
Tapestry system,V2: 533
Target market research,V2:576 –578
Tarnishment, trademark,V3: 451
Task analysis,V2:146;V3: 518
Tax applications, for accounting
technology,V3: 148
Tax assistance, by banks,V2:724 –725
Taxation,V1:100;V3:413– 423.See also
State income tax
administrative considerations in,V3: 420
authority to tax,V3: 417
codes,V2: 57
constitutional constraints on,V3: 416
e-commerce law and,V1:343–344;
V3:413– 414
of Internet transactions,V3:153–154,
413– 414
online auctions and,V2: 706
reports,V3: 421
resolving issues in,V3: 421
tax base for,V3:418– 419
Taxation law,V2:458– 459
Tax information,V3:148–149
Taxing jurisdictions, compliance with
rules of,V3: 415
Tax moratorium,V3:418– 419
Tax policy,V3: 416
Tax treaties,V3:417– 418, 419
Taxonomy,V3: 692
knowledge and,V2:434 – 436
XBRL,V3:870 –873
T-commerce business model,V1: 704
TCP connection hop,V2:507.See also
Transmission Control Protocol (TCP)
TCP flags,V3: 432
TCP handoff,V2: 507
TCP handshakes,V3:429– 430
TCP/IP model,V1:177, 184.See also
Transmission Control
Protocol/Internet Protocol (TCP/IP)
for internetworking,V3:323–324
TCP/IP protocol suites,V3:324 –325
TCP/IP software,V2: 119
TCP/IP stacks,V1: 142
TCP sequence number prediction,
V3:432– 433
TCP splicing,V2: 506
TCP timers,V3:430 – 431
Free download pdf