Fifteen years ago, Michael and I wrote the first version of this book. A little more than 400 pages, the book fulfilled our goal of surveying the field of data mining by bridging the gap between the technical and the practical, by helping business people understand the data mining techniques and by helping technical people understand the...
THE ROLE OF a user experience consultant, and specifi cally the user-centered design process,
is to help guide and shape the development of products and services based on what the
user understands and requires. To do this, the consultant needs to be a facilitator and communicator,
ensuring that the right user information is...
I was recently invited to participate in a cyber security dinner discussion by a few
members of a well-known Washington, DC, think tank. The idea was that we could
enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about
this “cyber warfare stuff.” It seems that the new...
Kernel development can be a daunting task and is very different from programming traditional user
applications. The kernel environment is more volatile and complex. Extraordinary care must be taken to
ensure that kernel code is free of bugs because any issue may have serious consequences to the stability,
security, and performance...
Large-scale information systems in public utility services depend on computing
infrastructure. Many research efforts are being made in related areas, such as
cloud computing, sensor networks, mobile computing, high-level user interfaces
and information accesses by Web users. Government agencies in many countries
plan to launch...
The Project Management Institute, Inc. (PMI) standards and guideline publications,
of which the document contained herein is one, are developed through a voluntary
consensus standards development process. This process brings together volunteers
and/or seeks out the views of persons who have an interest in the topic covered by
this...
Textbook surgical education usually follows a predictable format involving fairly
in-depth descriptions of various pathologic conditions including etiology, pathophysiology,
symptomatology, diagnostic procedures, conservative management, and
surgical treatment. Although there is variation in the emphasis different books place
on each...
With the introduction of multicore devices such as the iPad 2 and the quad-core Mac-
Book Pro, writing multithreaded apps that take advantage of multiple cores on a device
has become one of the biggest headaches for developers. Take, for instance, the introduction
of iPad 2. On the launch day, only a few applications, basically those...
If you’re reading this book, chances are you’ve already downloaded the free Instagram app for your iPhone, have snapped a few photos on your own, and probably posted a handful as well. Maybe you have some followers, maybe you don’t... perhaps you’ve found a few interesting Instagram photographers to follow and have...
In the last decade, multi-agent systems have both become widely applied and also
increasingly complex. The applications include the use of agents as automous decision
makers in often safety-critical, dangerous, or high impact scenarios (traffic
control, autonomous satellites, computational markets). The complexity arises from
the fact...
Congratulations. Simply by opening this book you have put yourself
a step ahead of most people. Yes. it's tough to think about what will
happen to your family afler you die, but confronting these issues is part of
taking care of your family.
My goal in writing this book Is to give you the information and resources you...
The origin of queueing theory and its application traces back to Erlang’s historical
work for telephony networks as recently celebrated by the Erlang Centennial, 100
Years of Queueing, Copenhagen, recalling his first paper in 1909. Ever since, the
simplicity and fundamental flavour of Erlang’s famous expressions, such as his...