 |
|
 OpenCL Programming Guide
Industry pundits love drama. New products don’t build on the status quo
to make things better. They “revolutionize” or, better yet, define a “new
paradigm.” And, of course, given the way technology evolves, the results
rarely are as dramatic as the pundits make it seem.
Over the past decade,... |  |  Business Intelligence in Microsoft SharePoint 2010
Whether you are a SQL Server business intelligence (BI) developer or a SharePoint Administrator,
this book shows you how Microsoft is delivering on its commitment to provide useful, usable BI to
its customers. It provides a quick dive into new Microsoft SharePoint 2010 BI features and offerings
as well as new SQL Server BI... |  |  Architecture-Based Design of Multi-Agent Systems
One of the most important things an architect can do is reflection. That is, examine
systems, organizations, people and ask “What alternatives were considered and why
was that particular decision made?” Thinking about the response gives an architect
insight into the motivations and decision processes that others have used... |
|
|
 Critical Code: Software Producibility for Defense
The Committee for Advancing Software-Intensive Systems Producibility was appointed by the
National Research Council (NRC) and convened under the auspices of the NRC’s Computer Science and
Telecommunications Board (CSTB) to assess the nature of the national investment in software research
and, in particular, to consider ways to... |  |  Destroying the Village
Up until the mid-1950s President Dwight D. Eisenhower believed that waging all-out war against an enemy
threatening to end your national existence was right, natural, and necessary. In the wake of World War Two
this was hardly a controversial position, as memories of Munich, Pearl Harbor, and Adolf Hitler had made the
notion of just... |  |  Cryptography Engineering: Design Principles and Practical Applications
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.
Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the... |
|
|
Result Page: 406 405 404 403 402 401 400 399 398 397 396 395 394 393 392 391 390 389 388 |