Home | Amazing | Today | Tags | Publishers | Years | Search 
e-Transformation: Enabling New Development Strategies (Innovation, Technology, and Knowledge Management)
e-Transformation: Enabling New Development Strategies (Innovation, Technology, and Knowledge Management)

Could information and communication technology (ICT) become the transformative tool for a new style of global development? Could ICT promote knowledge-based, innovation-driven, and smart, adaptive, participatory development? As countries seek a way out of the present period of economic contraction, they are trying to weave ICT into their...

Oracle E-Business Suite Development & Extensibility Handbook (Osborne ORACLE Press Series)
Oracle E-Business Suite Development & Extensibility Handbook (Osborne ORACLE Press Series)

Extend and Customize Oracle E-Business Suite

Transform your Oracle E-Business Suite infrastructure to suit enterprise requirements using the comprehensive development methods in this Oracle Press guide. Oracle E-Business Suite Development & Extensibility Handbook lays out each tool alongside reusable...

Digital Economies: SMEs and E-Readiness
Digital Economies: SMEs and E-Readiness
Several studies have been made to determine the effectiveness of information and communication technologies within small business enterprises, but the focus on e-readiness assessments have been very limited.

Digital Economies: SMEs and E-Readiness provides valuable insights into the current state of the digital economy and the...

Shared Source CLI Essentials
Shared Source CLI Essentials
Microsoft's Shared Source CLI (code-named "Rotor") is the publicly available implementation of the ECMA Common Language Infrastructure (CLI) and the ECMA C# language specification. Loaded with three million lines of source code, it presents a wealth of programming language technology that targets developers interested in the internal...
Next-Generation Business Intelligence Software with Silverlight 3
Next-Generation Business Intelligence Software with Silverlight 3

Business Intelligence (BI) software aims to bring together different pieces of a business into views that can make comprehending mountains of data easier. BI is everywhere. Applications that include reports, analytics, statistics, and historical and predictive modeling are all examples of BI applications. Currently, we are in the second...

REST in Practice: Hypermedia and Systems Architecture
REST in Practice: Hypermedia and Systems Architecture

Why don't typical enterprise projects go as smoothly as projects you develop for the Web? Does the REST architectural style really present a viable alternative for building distributed systems and enterprise-class applications?

In this insightful book, three SOA experts provide a down-to-earth explanation of REST and...

Regulation and the Evolution of the Global Telecommunications Industry
Regulation and the Evolution of the Global Telecommunications Industry

After decades of liberalization of the telecommunications industry around the world and technological convergence that allows for increasing competition, sector-specific regulation of telecommunications has been on the decline. As a result, the telecommunications industry stands in the middle of a debate that calls for either a total...

Handbook of Cloud Computing
Handbook of Cloud Computing

Cloud computing has become a significant technology trend. Experts believe cloud computing is currently reshaping information technology and the IT marketplace. The advantages of using cloud computing include cost savings, speed to market, access to greater computing resources, high availability, and scalability.

Handbook of Cloud...

A Developer's Guide to Amazon SimpleDB
A Developer's Guide to Amazon SimpleDB

The Complete Guide to Building Cloud Computing Solutions with Amazon SimpleDB

 

Using SimpleDB, any organization can leverage Amazon Web Services (AWS), Amazon’s powerful cloud-based computing platform–and dramatically reduce the cost...

Cyber Terrorism: A Guide for Facility Managers
Cyber Terrorism: A Guide for Facility Managers

In the current climate of terrorism, the facility manager is in a more critical position than ever before. Protecting the organization's infrastructure from cyber-based attacks that are designed to disrupt and/or destroy business operations is becoming increasingly important for facility managers.This book will address cyberterrorism and...

Seven Deadliest Wireless Technologies Attacks
Seven Deadliest Wireless Technologies Attacks

Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? Then you need Seven Deadliest Wireless Technologies Attacks. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, inluding how to make your system more...

Mobile Government: An Emerging Direction in E-government
Mobile Government: An Emerging Direction in E-government

Mobility is no longer a technological revolution. It is more about how businesses and governments can provide a better social infrastructure through mobile applications and services. While e-government was an important step taken by many governments, provision of services through mobile technologies is now inevitable. Public demand for...

Result Page: 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy