This book examines issues related to the alignment of business strategies and analytics. Vast amounts of data are being generated, collected, stored, processed, analyzed, distributed and used at an ever-increasing rate by organizations. Simultaneously, managers must rapidly and thoroughly understand the factors driving their business....
This book teaches the key techniques used in SSADM and is an ideal starting text for first-year undergraduate computing students or those at Foundation or HND level. It is not intended to be an SSADM manual; instead, it strips SSADM down to the key techniques and explains these in simple terms without the common repetition and...
Most of the challenges facing the environment are due to the fact that the human population is straining the Earth's finite resources. Fortunately, preteens and teens are in a stage in life where they can embrace idealistic goals and get involved in causes that are important to them. Science teachers have the opportunity to empower their...
Transgender studies, broadly defined, has become increasingly prominent as a field of study over the past several decades, particularly in the last ten years. The experiences and rights of trans people have also increasingly become the subject of news coverage, such as the ability of trans people to access restrooms, their...
In the SOA world, managing distributed services and service infrastructures is critical. Oracle Enterprise Manager - an all-encompassing management product - facilitates increased management capabilities for databases, application servers, and packaged applications. BPEL PM and OSB are two compelling, market leading products that are driving...
In 1976, fresh out of library school, I landed an impressive first professional
gig. Hired to lead a team of scientists from the Franklin Institute in
creating an online database on carcinogen research for Stanford University,
I was in absolute awe of the knowledge and expertise of my project partners.
But it was...
Uncover the Threats Lurking in the Darkness of Your Family's Computer
Many people have no idea of the evils that exist across the Internet or the danger that can result from simply answering an innocent-sounding e-mail or participating in a chat. Your loved ones could unknowingly be putting themselves in grave risk. By using...
As a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some...
Ambient Intelligence (AmI) is a recent paradigm emerging from Artificial Intelligence (AI), where computers are used as proactive tools assisting people with their day-to-day activities, making everyone’s life more comfortable.
Another main concern of AmI originates from the human computer interaction domain and focuses on...
This book is an introduction to real-time systems. It is intended not as a cookbook, but, rather, as a stimulus for thinking about hardware and software in a different way. It is necessarily broader than deep. It is a survey book, designed to heighten the reader’s awareness of real-time issues.
Social networking plus small business is a slam dunk! Small Business Smarts: Building Buzz with Social Media explains why that's so and helps small business owners decide whether social media tools are right for them. Assuming the answer is yes, the book offers concrete advice and implementation suggestions that make using tools to...