• No results found

Lock-in

The Lock-in Effect of Preliminary Injunctions

The Lock-in Effect of Preliminary Injunctions

... De-biasing is most important in those situations where the conflict or source of the bias is unavoidable. In the classic business investment example, it is difficult if not impossible to avoid the sequential decisions ...

44

Dealing with Vendor Lock in

Dealing with Vendor Lock in

... vendor lock-in, it has not been widely discussed in literature as vendor ...vendor lock-in in literature, there is mostly spoken about ex post monopolistic power of the supplier in the vendor lock-in ...

14

Ability Trade Lock in to Meta storage

Ability Trade Lock in to Meta storage

... There is preliminary work on Cloud storage systems to overcome vendor lock-in and to improve availability of stored data. Bunch et al. [23] extended the App Scale platform with unified access to diverse Cloud ...

10

Prisoners of our own Device – an evolutionary perspective on lock in, technology clusters and telecom regulation

Prisoners of our own Device – an evolutionary perspective on lock in, technology clusters and telecom regulation

... inefficient lock-in has been recognised, and can be mitigated (at least in theory) by spectrum trading; the idea is that a superior technology can gain access – when it is ready – by outbidding inferior ...

11

DSP based lock-in amplifier

DSP based lock-in amplifier

... a lock-in amplifier to operate effectively it must be set to detect the signal of ...the lock-in with a fixed reference voltage of the same frequency and phase as the experimental ...to lock onto the ...

65

Software Lock-In and Antitrust Tying Arrangements: The Lessons of Data General, 5 Computer L.J. 329 (1984)

Software Lock-In and Antitrust Tying Arrangements: The Lessons of Data General, 5 Computer L.J. 329 (1984)

... In Data General the plaintiffs based their proof of market power on the concept of software "lock-in." Software lock-in allegedly occurs when a customer creates [r] ...

19

Lock in, Path Dependence, and the Internationalization of QWERTY

Lock in, Path Dependence, and the Internationalization of QWERTY

... 22 would have built on performance outcomes and market incentives. Performance outcomes (such as here degrees of format/device compatibility) may be observable and readily communicable, while market incentives can be ...

26

MODIFICATION OF YOUR VEHICLE

MODIFICATION OF YOUR VEHICLE

... In addition to the automatic locking retrac- tors, the integrated child safety seat shoul- der harnesses are equipped with emer- gency locking retractors. The automatic locking mode is best to use, especially for ...

235

The smart door lock system

The smart door lock system

... door lock with the ideal mobile devices in providing a user interface for a home automation system, due to their portability and their wide range of capabilities which it can be control the door lock in ...

24

Hedging the Treasury Lock

Hedging the Treasury Lock

... Being the driver of the fixed rate paid by the borrower the sum of its credit spread and the benchmark interest rate, the goal of such pre-hedge strategy is locking, when deemed economical, the interest rate component a ...

24

Performance Evaluation of the Asymmetric Distributed Lock Management in Cloud Computing

Performance Evaluation of the Asymmetric Distributed Lock Management in Cloud Computing

... of lock managers is to permit clients to synchronize their activities and agree about their ...the lock management include availability and reliability of the distributed files and maintain the consistency ...

8

PRL RR 7 pdf

PRL RR 7 pdf

... Users modify packages following a lock/get/modify/ship/unlock paradigm. The user first locks and gets a copy of the package in a private directory. This is usually done through a single command, getpackage, which ...

20

Concurrency

Concurrency

... T 2 : lock-S(A); read (A); unlock(A); lock-S(B); read (B); unlock(B); display(A+B) ...

20

dtj v01 05 sep1987 pdf

dtj v01 05 sep1987 pdf

... the lock man­ agt:r checks on the blocking lock as each file function starts, this lock is managed in a n opti ­ mi zed fashion ...ng lock as a sys­ tem -owned loc k i n CR mode ...a ...

106

REVIEW COPY—2006 Altima (l30) Owners Manual—USA_English (nna)

REVIEW COPY—2006 Altima (l30) Owners Manual—USA_English (nna)

... When driving, the anti-lock brake system con- trols the wheels so they will not lock when brak- ing abruptly or when braking on a slippery road. Thus, difficult steering and swerving of the ve- hicle due to ...

304

Exalted Novel   Trilogy of the Second Age 01   Chosen of the Sun pdf

Exalted Novel Trilogy of the Second Age 01 Chosen of the Sun pdf

... RICHARD DANSKY “You are cleverer than most men, Rhadanthos.” The spirit bowed its head in acknowledgment, and Wren went smoothly on.. “Set in the stone is a lock, though not a lock that [r] ...

76

The lifecycle of axisymmetric internal solitary waves

The lifecycle of axisymmetric internal solitary waves

... 10 lock lengths (Rottman and Simpson, 1983), symmetric intrusions at sufficiently thick interfaces were found to propagate well beyond this distance at a constant speed (Mehta et ...

11

Designing and Implementation of a Fingerprint Lock System

Designing and Implementation of a Fingerprint Lock System

... The testing was done on each and every components/sections that make up the circuit to ensure proper and satisfactory operation of the fingerprint lock. The debugging was done using the Arduino 1.6.3; Each and ...

5

Prison Cell Lock Detection And Notification

Prison Cell Lock Detection And Notification

... door lock, prisoners are smart to escape from a prison ...door lock manipulation is by preventing the cell door from being closed after being in an open position for a certain period of ...door lock ...

24

Design and Implementation of Smart Lock for Vehicles

Design and Implementation of Smart Lock for Vehicles

... The proximity sensor is placed near the lock of the vehicle which is connected to A/D port in the microcontroller. The proximity sensor has transmitter and receiver which producea short range EM waves. When this ...

6

Show all 10000 documents...

Related subjects