 |
|
 Collective Intelligence in ActionThere's a great deal of wisdom in a crowd, but how do you listen to a thousand people talking at once? Identifying the wants, needs, and knowledge of internet users can be like listening to a mob.
In the Web 2.0 era, leveraging the collective power of user contributions, interactions, and feedback is the key to market dominance. A new... |  |  Encyclopedia of Multimedia Technology and NetworkingMultimedia technology and networking are changing at a remarkable rate. Despite the telecoms crash of 2001, innovation in networking applications, technologies, and services has continued unabated. The exponential growth of the Internet, the explosion of mobile communications, the rapid emergence of electronic commerce, the restructuring of... |  |  Digital Photography: 99 Easy Tips To Make You Look Like A Pro!Get tips and advice for taking better pictures with your digital camera from expert photographer Ken Milburn. Discover all the cool things you can do--like making panoramas, short movies, rapid shot sequences for Web animations, instant greeting cards (both in print and for the Web), restoring and retouching photos--and much more. ... |
|
 Next Generation SSH2 Implementation: Securing Data in MotionThe most up-to-date information on the next generation of SSH and how to incorporate into your organization's security environment.
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book... |  |  Mule 2: A Developer's Guide (Firstpress)Published with the developer in mind, firstPress technical briefs explore emerging technologies that have the potential to be critical for tomorrow's industry. Apress keeps developers one step ahead by presenting key information as early as possible in a PDF of 150 pages or less. Explore the future through Apress...
Mule 2: A... |  |  Software Architecture (Advanced Topics in Science and Technology in China)Part of the new series, Advanced Topics in Science and Technology in China, this book aims to introduce the theoretical foundations, various sub-fields, current research, and practical methods of software architecture. Readers can acquire basic knowledge of software architecture, including why software architecture is necessary, how we can describe... |
|
|
 Information Warfare: How to Survive Cyber Attacks"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust... |  |  Search Engine Optimization For Dummies (Computer/Tech)"…cuts through the nonsense, providing a clear, simple and concise explanation of how websites reach top positions in search engines ..." (PC Advisor, September 2006)
Why do some sites pop to the top when you search? How do you make yours one of them? You create sites that make search... |  |  Hibernate Search in ActionI joined an e-commerce company in 2000, nothing unusual I suppose. We were quite annoyed by the quality of Amazon’s search engine results compared to ours. A few years later, we reimplemented our search engine from scratch using Lucene. That’s where I learned that a good search engine is 50% kick-ass technology and 50% deep... |
|
| Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 |