Designing the Obvious belongs in the toolbox of every person charged with the design and development of Web-based software, from the CEO to the programming team. Designing the Obvious explores the character traits of great Web applications and uses them as guiding principles of application design so the end result of every project...
By the time you’re reading this in a bookstore, BizTalk will have celebrated its tenth birthday. Over the past decade, there have been seven releases of Microsoft’s enterprise integration server, and it has become the most broadly deployed integration middleware technology in the industry, with over 10,000 customers worldwide....
Social Networking has quickly become a very popular activity on the Internet, particularly with the emergence of sites like Facebook and MySpace. PHP is a flexible web development language used on a wide variety of sites, including Facebook and Yahoo! But building a social networking site from scratch using PHP involves some complex logic,...
Multiagent systems are systems composed of multiple interacting computing elements, known as agents. Agents are computer systems with two important capabilities. First, they are at least to some extent capable of autonomous action - of deciding for themselves what they need to do in order to satisfy their design objectives. Second, they are...
Data Engineering has become a necessary and critical activity for business, engineering, and scientific organizations as the move to service oriented architecture and web services moves into full swing. Notably, the US Department of Defense is mandating that all of its agencies and contractors assume a defining presence on the Net-centric...
Techniques of vision-based motion analysis aim to detect, track, identify, and generally understand the behavior of objects in image sequences. With the growth of video data in a wide range of applications from visual surveillance to human-machine interfaces, the ability to automatically analyze and understand object motions from video...
Our excessive use of natural resources − fuelled by population increases and a relentless pursuit of economic growth and material possessions − is causing alarming damage to the environment.
Human activity, such as burning fossil fuels, is causing a build-up of greenhouse gases such as carbon dioxide (CO2) in the...
ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristic, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor the activity on your web sites and protect them from attack. Situated between your web sites and the...
It is not often that we can welcome the advent of a new theory of programming. Twelve years ago, E.W. Dijkstra published his Discipline of Programming, which is still a definitive source-book on the development of sequential algorithms. And now Chandy and Misra have shown how Dijkstra's methods, and other more recent developments, can be...
This book stems from my experience over the last few years in designing high-speed digital logic using ASIC design flows. I discovered that while it is possible to significantly improve performance in ASIC implementations with deep pipelining and careful physical design, a speed penalty still had to be paid due to their exclusive use of...
Increased levels of chip integration combined with physical limitations of heat
removal devices, cooling mechanisms and battery capacity, have established
energy-efficiency as an important design objective in the implementation flow of
modern electronic products. To meet these low energy objectives, new low
power techniques, including...
The Extract-Transform-Load (ETL) system is the foundation of the data
warehouse. A properly designed ETL system extracts data from the source
systems, enforces data quality and consistency standards, conforms data
so that separate sources can be used together, and finally delivers data
in a presentation-ready format so that...