We are very pleased to present this fifth edition of Project Management for Information Systems. As with its predecessors, our ‘target audience’ fall into four groups:
IS project managers and systems developers who find themselves responsible for managing systems projects. Newcomers to this activity will find...
In contemporary globally competitive markets, the development of new products
is considered a critical success factor for organizations. Significant efforts have
been invested in the development of methods and tools for improving the management
of design processes, being a key element in development processes,
especially those related...
Cloud computing is on everyone’s lips: as an innovative technology, as the next
generation of the Internet, as a fundamental transformation of the entire IT landscape,
and as an auspicious opportunity to introduce new business ideas. But what is
actually at the heart of this notion?
This book has been created to serve the needs of many SAP Business One users. If
you have a chance to browse the SAP business One website between mid-2008 and mid-2011, you will find that my name is always on the top contributor's list. I have solved many SQL Query related problems faced by many users, and some such users have asked me...
Welcome to Introducing Autodesk Maya 2012 and the world of computer-generated imagery (CGI). Whether you’re new to 3D graphics or venturing into Autodesk’s powerhouse animation software from another 3D application, you’ll find this book a perfect primer. It introduces you to Maya and shows how you can work with Maya to...
The application framework of the presented research work is stablished in the area
of the low-power portable stand-alone devices. Considering as a paradigm application
the implementation of future portable terminals for telecommunications, two
opposed trends coexist that determine the need for an optimized energy management.
An...
Beautiful mathematical ideas abound in multimedia software! Some are not
encountered until late in undergraduate or even postgraduate study, whereas they
can be appreciated and used much earlier. This book presents a few dozen such
pearls, strung together by their ubiquity in many applications. It is based on
the course Topics in...
If wo try to identify those contributions of computer science which will be
long lasting, surely one of these will be the refinement of the concept called
algorithm. Ever since man invented the idea of a machine which could per
form basic mathematical operations, the study of what can be computed and
how it can be done well was...
After college I went to work for Intel in California and mainland China. Originally my plan was to go back to grad school after two years, but time flies when you are having fun, and two years turned into six. I realized I had to go back at that point, and I didn’t want to do night school or online learning, I wanted to sit on...
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
What a difference a decade makes. When Apple introduced the very first iPod back in October 2001, it was a bulky chunk of white plastic, chrome, and glass that held a mere 5 gigabytes of music. But its concept was simple and enticing: you could carry 1,000 songs around in your pocket. And people did.
In earlier definitions, organization’s competency is mainly addressing its
capabilities, for example Gallon (Gallon et al, 1995) defines competency as
“aggregation of capabilities, where synergy that is created has sustainable value and
broad applicability”. However participation of VBE members in general VBE...