Home | Amazing | Today | Tags | Publishers | Years | Search 
PowerShell and WMI
PowerShell and WMI
I am glad that Richard Siddaway decided to sit down and write a book on WMI. I have had the privilege of working with Richard over the last several years since becoming the Microsoft Scripting Guy, and I have long been impressed by his technical prowess. Whether Richard is speaking at a user group or conference or...
Learn Windows PowerShell 3 in a Month of Lunches
Learn Windows PowerShell 3 in a Month of Lunches
We’ve been teaching and writing about Windows PowerShell for a long time. When Don began contemplating the first edition of this book, he realized that most Power- Shell writers and teachers—including himself—were forcing our students to approach the shell as a kind of programming language. Most...
SAP HANA Starter
SAP HANA Starter

SAP HANA is SAP's in-memory database technology, and the focal point of their next generation strategy. Using column-based storage to provide highly compressed and rapidly accessed data, a SAP HANA application can be several hundred times faster than the same application on previous generation database technology.

SAP HANA...

Good to Great: Why Some Companies Make the Leap... and Others Don't
Good to Great: Why Some Companies Make the Leap... and Others Don't

The Challenge:
Built to Last, the defining management study of the nineties, showed how great companies triumph over time and how long-term sustained performance can be engineered into the DNA of an enterprise from the verybeginning.

But what about the company that is not born with great DNA? How can good...

Deadline Fitness: Tone Up and Slim Down When Every Minute Counts
Deadline Fitness: Tone Up and Slim Down When Every Minute Counts

When I moved to Los Angeles from the East Coast, I was thrilled to have the opportunity to work in the entertainment industry. As I was studying and building my fitness business, my day job was as an assistant account executive at a Beverly Hills public relations firm. I spent lots of time with up-and-comers as well as with the most...

MacBook Air Portable Genius (Bible)
MacBook Air Portable Genius (Bible)

You'll fly through your work with these MacBook Air tips and tricks

Packed with tips and techniques on everything from how to get started with the MacBook Air notebook to getting the most out of all its latest features and accessories, this fun, hip, and portable guide has just what you need to take flight. Veteran...

Programming Language Concepts (Undergraduate Topics in Computer Science)
Programming Language Concepts (Undergraduate Topics in Computer Science)

Programming Language Concepts uses a functional programming language (F#) as the metalanguage in which to present all concepts and examples, and thus has an operational flavour, enabling practical experiments and exercises. It includes basic concepts such as abstract syntax, interpretation, stack machines, compilation, type checking, and...

Web Analytics Action Hero: Using Analysis to Gain Insight and Optimize Your Business
Web Analytics Action Hero: Using Analysis to Gain Insight and Optimize Your Business
This astounding declaration was made by the former PepsiCo executive and Apple CEO John Sculley, the same visionary responsible for ousting Steve Jobs in 1985. While some traditional marketers might still agree with his statement, today most marketing executives recognize data-driven decisions will shape the future of...
Microsoft Office 365: Connect and Collaborate Virtually Anywhere, Anytime
Microsoft Office 365: Connect and Collaborate Virtually Anywhere, Anytime

Train. Coffee shop. Soccer field. Now you can connect, collaborate, and get things done—virtually anywhere—using Microsoft Office 365. Guided by business productivity expert Katherine Murray, you’ll get a running start with Office 365 cloud-based business services. And you’ll take wing as you learn best...

Managed Code Rootkits: Hooking into Runtime Environments
Managed Code Rootkits: Hooking into Runtime Environments

We live in a world in which we can’t trust our computers. For example, how can we know for sure that our hardware manufacturer did not hide malicious code in the system’s microchip? Or that our freshly installed operating system does not contain backdoors created by a rogue developer from the OS development team?

...

Microsoft Office 365: Exchange Online Implementation and Migration
Microsoft Office 365: Exchange Online Implementation and Migration
In the middle of 2006, I was preparing for an important executive review for Jeff Raikes to seek approval to kick off the project to build "CCS"—a communication and collaboration service from Microsoft. As was Jeff's approach to big decision meetings, he would ask for the PowerPoint slides in advance so he could review the...
Understanding Complex Datasets: Data Mining with Matrix Decompositions
Understanding Complex Datasets: Data Mining with Matrix Decompositions
Many data-mining algorithms were developed for the world of business, for example for customer relationship management. The datasets in this environment, although large, are simple in the sense that a customer either did or did not buy three widgets, or did or did not fly from Chicago to Albuquerque.

In contrast,
...
Result Page: 17 16 15 14 13 12 11 10 9 8 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy