To improve our database!
Are you aware of other useful links or (knowledge) articles which should be included in our database? Please let us know by clicking on CONTRIBUTE below and fill out the form.
By doing so you are actively supporting our cause.
3 KEY METRICS EVERYONE IN IOT SHOULD CARE ABOUT
The article addresses the infinite benefits to connecting products for users but also the barriers faced by the companies preventing them from defining the key metrics that are vital to their business success.
6 Reasons Platforms Fail
The article eleborates on the successes and failures experienced by platforms such as Alibaba, Airbnb and Uber to highlight key reasons why platforms fail and how they operate and compete.
A COMPARATIVE APPROACH TO WEB EVALUATION AND WEBSITE EVALUATION METHODS
This study proposes a novel approach to view and select evaluation methods based on the purpose and platforms of the evaluation.
A guide for selecting Monitoring and Evaluation Tools
This guide provides information on how to select monitoring and evaluation tools for the analysis and assessment of a program or invention and how far they have met their objectives.
A Study of More Than 250 Platforms Reveals Why Most Fail
Platforms have become one of the most important business models of the 21st century. The problem is that platforms fail at an alarming rate. By identifying the sources of failure, managers can avoid the obvious mistakes. To understand why and how platforms fail, this study tried to identify as many failed American platforms as possible over the last twenty years that competed with the 43 successful platforms.
A Survey of Blockchain-Based Strategies for Healthcare
This study aims to address research into the applications of the blockchain healthcare area. It sets out by discussing the management of medical information, as well as the sharing of medical records, image sharing, and log management
A survey on healthcare data security in wireless body area networks
This paper presents the systematic literature review (SLR) of the multiple security schemes for WBAN. We have identified a research question to analyses the possibility of several attacks while preserving the memory constraints