This book will dive into a diverse set of real-world scenarios to deliver sample business
solutions that can serve as the foundation for your own solutions. It draws from the
author's extensive experience with SharePoint to leverage the platform's underlying
services to provide solutions that can support social...
Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...
Hello and welcome to the fourth edition of Learning Web Design.
So much has happened since the previous edition! Just when it looked like
things were beginning to settle down with the adoption of web standards
by the browser creators and the development community, along comes the
“Mobile...
Flash’s evolution is unique, even for the fast-changing computer software world.
First released in 1996 under the name FutureSplash, it was a tool for creating
web-based animations. It’s still the go-to application for that job; however,
along the way it’s acquired new capabilities. Today, Flash...
This book breaks new ground by doing something for digital photographers that’s never been done before—it cuts through the bull and shows you exactly “how to do it.” It’s not a bunch of theory; it doesn’t challenge you to come up with your own settings or figure things out on your own. Instead, it does...
In my recent e-book #OccupyIT: A Technology Manifesto for the Cloud, Mobile,
and Social Era (http://www.aiim.org/occupyIT), I talk about the revolutionary
changes that are impacting how we make enterprise technology decisions.
On the one hand, we have "the business," awed and impressed by the changes and...
Since Princess Diana's car crash in August 1997, media interest in the crash as an event needing explanation has proliferated. A glut of documentaries on television have investigated the social and scientific history of our responses to the car crash, as well as showing the personal impact of the crash on individual lives. In trying to...
This book has accomplished a feat that’s valuable and rare: it comprehends
design and science fiction. Better yet, it’s found specific areas where they are
of practical use to one another.
This is a design book, and meant for designers. It concerns itself with
science fiction cinema. To my delight, it...
The supply chain of both manufacturing and commercial enterprises comprises a highly distributed environment,
in which complex processes evolve in a network of companies (see Figure 1). Such processes
include materials procurement and storage, production of intermediate and final products, warehousing,
sales, customer service, and...
This lecture summarizes the material in a tutorial we gave at AAAI2008 [Grauman and Leibe,
2008]1. Our goal is to overview the types of methods that figure most prominently in object
recognition research today, in order to give a survey of the concepts, algorithms, and representations
that one might use to build a...
The MintDuino is deceiving—this little tin of electronics is capable of providing
the brains for an unlimited number of devices limited only by your imagination…
and, of course, your bank account.
While the MintDuino is certainly capable of being used during a moment of
inspiration,...
You've read everything you can find about middleware, CORBA, transaction
monitors, message brokers, enterprise JavaBeans, and other distributed
technologies. Now it's time to put them to work. Time to build
your company's first multi-tiered application. But where do you start?
How do you structure the programs? How...