Green Technologies 2011
DOI: 10.4018/978-1-60960-472-1.ch605
|View full text |Cite
|
Sign up to set email alerts
|

Green Information Technology and Virtualization in Corporate Environmental Management Information Systems

Abstract: Businesses today must not only be concerned with their day-to-day operations and the making of profit, but also with a set of challenges related to the public perception, the environment, and the costs of energy consumption. The image of the company from the perspective of customers and the public in general must be carefully monitored as it relates to the environment and the use of natural resources and energy. The demonstration of effective strategies that allow for “greener” and more ecological awareness, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 36 publications
0
0
0
Order By: Relevance
“…Web filtering is handled: for users to browse the pages to be replaced or modified to become the designated page, or is it illegal after the masked words and then provided to the user, at the same time, the way to get through the script executes the corresponding warning message. Implementation of the above links include the following key operations: Operation First, in the "Invoke" Among the functions of the "pDispParams" parameter extraction in whole or in part, in order to grasp the user is browsing the Web; operate two, by "get-Document "The function of the HTML source document information extraction; operate three, by" get-parentWindow "The function of the window object pointer information extraction; operation Fourth, through the" page replacement operation put-innerHTML "This function is completed; Operation V. script execution by "execScript" This function is completed [5].…”
Section: Key Issues and Solutionsmentioning
confidence: 99%
“…Web filtering is handled: for users to browse the pages to be replaced or modified to become the designated page, or is it illegal after the masked words and then provided to the user, at the same time, the way to get through the script executes the corresponding warning message. Implementation of the above links include the following key operations: Operation First, in the "Invoke" Among the functions of the "pDispParams" parameter extraction in whole or in part, in order to grasp the user is browsing the Web; operate two, by "get-Document "The function of the HTML source document information extraction; operate three, by" get-parentWindow "The function of the window object pointer information extraction; operation Fourth, through the" page replacement operation put-innerHTML "This function is completed; Operation V. script execution by "execScript" This function is completed [5].…”
Section: Key Issues and Solutionsmentioning
confidence: 99%