 |
|
 Expert One-on-One OracleTom Kyte is of a rare breed. To begin, he's technically expert in his subject (administration of and development of applications for Oracle database management systems). What's more (and what distinguishes him from the ranks of the super-competent), he is both able and willing to share his considerable store of wisdom with Oracle users via... |  |  Open Text Metastorm ProVision® 6.2 Strategy Implementation
Look around you. Everything that is made has been designed, with one exception: we don't design the very organizations that make the things you see, hear, feel, touch and taste. This is a very curious omission.
Now all this is changing. Visionary organizations have started to do just that – they are designing their... |  |  Frommer's New York City 2011 (Frommer's Complete)
We all have our personal tastes: what we like to listen to in terms of music, what kind of food we enjoy, what we relate to in art and architecture. Personal taste is a subjective matter, and I (Brian) only pay attention to raves, whether they are for a restaurant, artist, musician, or fi lm, if they are universal. If everyone likes it, it... |
|
|
|
 Osgi in Action: Creating Modular Applications in Java
When I started working with OSGi technology back in 2000, I would’ve never guessed I’d still be working with it a decade later. Back then, OSGi was targeting the embedded market niche, but that wasn’t my area of interest. I wanted to create highly dynamic, modular applications, and OSGi gave me the possibility of... |  |  Windows Server 2008 R2 Hyper-V: Insiders Guide to Microsoft's Hypervisor
Get the inside scoop on Hyper-V for Windows Server 2008 R2
Virtualization is a top priority for thousands of companies all over the world. Written by an author team that is part of the Windows virtualization group at Microsoft, Windows Server 2008 R2 Hyper-V will walk you through Hyper-V essentials so you can get you up to... |  |  Moodle Security
Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys... |
|
Result Page: 143 142 141 140 139 138 137 136 135 134 |