"Bogost challenges humanists and technologists to pay attention to one another, something they desperately need to do as computation accelerates us into the red zones of widespread virtual reality. This book gives us what we need to meet that challenge: a general theory for understanding creativity under computation, one that will apply...
Alex Dmitrienko Business Intelligence SAS Users Group This book provides a detailed, useful overview with several excellent examples to engage the reader and grasp more complex concepts.
Now it's easy to manage data and create reports without writing any SAS code using SAS...
Linux has grown in popularity and is increasingly being adopted by home users and others who laud this nearly un-crashable, free operating system. But setting up a Linux OS can be tricky and time consuming. And managing a Linux system can be even more difficult if you don't have the right knowledge. Degunking Linux expertly shows readers...
Hypermedia systems may be one of the most significant contributions to the Internet in recent years. This powerful new technology has revolutionized the delivery of e-content through the Internet. However, as the needs of users have changed, the hypermedia systems...
"Project Sponsorship addresses vital ingredients that resonate with my recipe for project success—identifying the right people to sponsor projects, taking care of them, describing how to create an environment that leads to excellence in project sponsorship, and...
Effective Software Testing explores fifty critically important best practices, pitfalls, and solutions. Gleaned from the author's extensive practical experience, these concrete items will enable quality assurance professionals and test managers to immediately enhance their understanding and skills, avoid costly...
E-Business is on the rise, but so are the likelihood and severity of computer attacks. Melissa, the Love Bug, Nimda, and Reezak all caught the e-Business community off guard, costing billions of dollars in lost productivity and damage. Maintaining enterprise security is now, without question, a crucial aspect of doing business in today's...
Special Edition Using EJB 2.0 starts with a description of how EJB fits into the big picture of J2EE development, then covers such topics as:
* Locating EJB's using JNDI * Managing data with EJB Query Language * Building JMS applications using the new Message-driven Bean * Planning EJB applications using design patterns ...
The Origin and Evolution of the Solar System begins by describing historical, i.e. pre-1950, theories and illustrating why they became unacceptable. The main part then critically examines five extant theories, including the current paradigm, the Solar Nebula Theory, to determine how well they fit with accepted scientific principles and...
Modern Control Technology: Components and Systems, 2nd Edition provides an introduction to automatic control systems and components that is both comprehensive and up-to-date. Logically organized, this book takes the reader on a journey through a control system. Each chapter examines a different functional part, followed by discussion of control...
Whether it is called shrink-wrapped software or given an acronym like COTS (commercial off the shelf), there is no doubt that the use of packaged software is an important part of most information technology (IT) departments’ application development strategy. Companies have embraced the concept of vendor-supplied software,...
Lean software development: applying agile principles to your organization
In Lean Software Development, Mary and Tom Poppendieck identify seven fundamental "lean" principles, adapt them for the world of software development, and show how they can serve as the foundation for agile development...