I still remember deploying my first Microsoft Access application 10 years ago for a head hunting agency.
They had a user base of about 200 users (I can already hear some of you groan) and they needed a
system to manage job applicants and the companies that want to hire them. And they tossed my meager
development team of two an...
This book provides an overview of steganography and digital watermarking, two areas of research which are
generally referred to as "information hiding." Steganography studies ways to make communication invisible by
hiding secrets in innocuous messages, whereas watermarking originated from the need for copyright protection of...
For a long time computer scientists have distinguished between fast and slow algorithms. Fast (or good) algorithms are the algorithms that run in polynomial time, which means that the number of steps required for the algorithm to solve a problem is bounded by some polynomial in the length of the input. All other algorithms are slow (or bad)....
Apache Maven is more than just build automation. When positioned at the very heart of your development strategy, Apache Maven can become a force multiplier not just for individual developers but for Agile teams and managers. This book covers implementation of Apache Maven with popular enterprise technologies/frameworks and introduces Agile...
For half a century, computer scientists have been working on systems for discovering
lawful patterns in letters, numbers, words and images. The research
has expanded into the computational study of the process of scientific discovery,
producing such well-known AI programs as BACON and DENDRAL. However,
autonomous discovery systems...
Programmers may spend a good part of their careers scripting code to conform to commercial
statistics packages, visualization tools, and domain-specific third-party software.
The same tasks can force end users to spend countless hours in copy-paste purgatory,
each minor change necessitating another grueling round of formatting tabs and...
The digital revolution is in full force but many public and private sector leaders are stymied: How can they maximize the full potential of digital technology? This hesitancy puts a brake on the transformational power of digital technology and means private companies and governmental bodies fall well behind other digital pioneers....
How badly will IPv6 break your application? What do you need to consider to make
your application “IPv6-ready”? What questions should you ask?
In the ideal world, your application should “just work” on IPv6, just as it does on IPv4.
However, in the real world, application issues crop up. These could be...
In The Art and Science of Java, Stanford professor and well-known leader in Computer Science Education Eric Roberts emphasizes the reader-friendly exposition that led to the success of The Art and Science of C. By following the recommendations of the Association of Computing Machinery’s Java Task Force, this first edition...
Think of all the popular data visualization works out there—the ones that you always hear in lectures or read about in blogs, and the ones that popped into your head as you were reading this sentence. What do they all have in common? They all tell an interesting story. Maybe the story was to convince you of something. Maybe it was to...
Information technologies impact every aspect of accounting, including financial reporting,
managerial accounting, auditing, and tax. The nature of the work done by accountants
continues to evolve as these technologies advance. For example, less than 30 years
ago, accountants could have spent much of their day footing ledgers and making...
Haptic devices allow users to feel their interfaces and interactions. This has the
potential to radically change the way we use computers. Haptic interaction is
interaction related to the sense of touch. This could be based on force-feedback or
tactile devices. We can take advantage of our powerful sense of touch as an
alternative...