Showing 141 - 160 results of 3,237 for search '((china OR (spike OR fine)) OR ((((spends OR fins) OR ping) OR pina) OR pin))', query time: 0.20s Refine Results
  1. 141

    Importance of guanxi in doing business in China by Lim, Rosalind Li Ying.

    Published 2008
    “…Investigate the importance of guanxi in China and identify important elements that contribute to good guanxi development such as flexibility, creativity, mutual trust, mianzi, renqing, mutual interest and benefits.…”
    Get full text
    Thesis
  2. 142

    Competition in trade between China and Asean. by Chew, Soon Beng., Liu, Yunhua.

    Published 2008
    “…This report discussed about the competition in trade between China and Asean.…”
    Get full text
    Research Report
  3. 143

    Introduction : interdisciplinary perspectives on English in China by Bolton, Kingsley, Tong, Q. S

    Published 2015
    “…Introduction: Interdisciplinary perspectives on English in China…”
    Get full text
    Get full text
    Journal Article
  4. 144

    Decoding China's cyber warfare strategies by Raska, Michael

    Published 2016
    “…While conventional, low-intensity, asymmetric, or non-linear conflict scenarios are plausible for East Asia’s strategic flashpoints, the next major conflict involving China will likely start in cyberspace.…”
    Get full text
    Get full text
    Commentary
  5. 145

    China's soft power: stuck in transition by Li, Mingjiang

    Published 2016
    “…Whilst China is excited about its rising soft power, the West is anxious over the impact of China’s soft power on the international order. …”
    Get full text
    Get full text
    Commentary
  6. 146

    The US and China: Dangers of Premature Extrapolation by Durodié, Bill

    Published 2016
    “…Many commentators assume that China will become the next world superpower. This may be a premature assessment. …”
    Get full text
    Get full text
    Commentary
  7. 147

    Growing Uighur Militancy: Challenges for China by Nodirbek, Soliev

    Published 2016
    “…With the emergence of a new generation of Uighur militants drawn to conflict in the Middle East, there has been a shift in the threat landscape of China. Chinese investments and citizens in conflict-ridden countries such as Afghanistan, Pakistan, and Iraq may become a potential target for the current transnational network of Uighur militants.…”
    Get full text
    Get full text
    Commentary
  8. 148
  9. 149
  10. 150
  11. 151

    Unilever China : keeping the magic alive. by Ong, Sher Hui., Tan, Karen., Yow, Deborah Shui Ji.

    Published 2008
    “…The objective of this project is to probe further into the China market and study the mechanisms of its business environment. …”
    Get full text
    Final Year Project (FYP)
  12. 152
  13. 153

    China's peaceful rise : till when? by Amanda, Huan

    Published 2015
    “…Has China risen? Amidst never-ending talks and discussion about a rising China, what are the indicators of a risen China?…”
    Get full text
    Get full text
    Commentary
  14. 154
  15. 155

    Motivation of the re-emergence of territorial disputes in the South China Sea : from an US and China regional strategies' perspective. by Huang, Huijianmei.

    Published 2013
    “…Despite the fact that 20th century has witnessed frequent and intense conflicts in the South China Sea, the first decade of 21st century enjoyed peace there. …”
    Get full text
    Thesis
  16. 156
  17. 157

    Effects of accelerated carbonation on fine incineration bottom ash: CO2 uptake, strength improvement, densification, and heavy metal immobilization by Sun, Xinlei, Xu, Bo, Yi, Yaolin

    Published 2024
    “…Due to the higher heavy metal contents, fine IBA can be removed from total IBA and treated separately to promote the use of IBA. …”
    Get full text
    Journal Article
  18. 158
  19. 159

    Multi-Cloud Strategy for Cloud Architects : Learn how to adopt and manage public clouds by leveraging BaseOps, FinOps, and DevSecOps / by Mulder, Jeroen, author 656258

    Published 2023
    “…This edition delves into the latest concepts of BaseOps, FinOps, and DevSecOps, including the use of the DevSecOps Maturity Model. …”
    Get full text
    Get full text
    software, multimedia
  20. 160