Humans receive the great majority of information about their environment through
sight, and at least 50% of the human brain is dedicated to vision. Vision is also a key
component for building artificial systems that can perceive and understand their environment.
Computer vision is likely to change society in many ways; for example,
it...
Microsoft Visual Basic for Applications (VBA) is an exceptional programming language and
environment. The language has grown out of a need to have a programming language that
would allow more business-focused individuals to write programs, but equally support the
programming features that developers look for in a product. The...
Mention the word audit to IT professionals and you will probably see their eyes glaze over as
they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run
ning around and pointing out all of the things they have done wrong to their manager. The
purpose of a security audit is not to place blame or pick...
Engineering and technical graphics have gone through
significant changes in the last decade, due to the use of
computers and CAD software. It seems as if some new
hardware or software development that impacts technical
graphics is occurring every year. Although these changes
are important to the subject of technical graphics, there...
PowerShell is becoming the de facto administration tool for Microsoft
Server products. The ability to script out reusable steps and code makes life
easier for administrators, developers, and managers alike. With the latest
release of Microsoft SharePoint Server 2010, PowerShell is the recommended
administration...
Privacy is a basic human need, and losing privacy is perceived as an extremely
threatening experience. Privacy embraces solitude, personal space, or intimacy with
family and friends and as such, it is a ubiquitous and trans-cultural phenomenon.
Privacy leverages well-being; without privacy we are at risk of becoming physically
or...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are...
Studying the history of consumer electronics is nothing short of fascinating. The landscape is filled
with countless stories of product successes and failures— fickle consumer adoptions, clever marketing
campaigns that outsmart the best technologies, better packaging winning over better technology,
and products that are simply...
Service Manager 2010 is without a doubt the most customizable and extensible product in
the System Center suite. The ability to customize and extend the product is enabled by
the common technology platform born in Operations Manager that now underlies other
Microsoft products such as System Center Essentials, Windows InTune, Virtual...
E-mail isn’t a new technology any more, but you can do a lot
of new things with e-mail marketing. E-mail can be delivered
to mobile devices and can integrate nicely into a social media
marketing strategy.
Still, the same challenges that existed in the past apply to the
new world of e-mail marketing. Namely,...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are...
In the last three decades, machine learning research and practice have
focused on batch learning usually using small datasets. In batch learning, the
whole training data is available to the algorithm, which outputs a decision
model after processing the data eventually (or most of the times) multiple
times. The rationale behind this...