Home | Amazing | Today | Tags | Publishers | Years | Search 
Product and Systems Development: A Value Approach
Product and Systems Development: A Value Approach

A thorough treatment of product and systems development in terms of value to all stakeholders

Product and Systems Development compiles more than twenty years of research and practice from a value perspective, from vision and marketing to design, manufacturing, delivery, operations, and maintenance. It defines...

Gradle Beyond the Basics
Gradle Beyond the Basics

If you’re familiar with Gradle’s basics elements—possibly through the author’s previous O’Reilly book, Building and Testing with Gradle—this more advanced guide provides the recipes, techniques, and syntax to help you master this build automation tool. With clear, concise explanations and...

Analyzing the Analyzers: An Introspective Survey of Data Scientists and Their Work
Analyzing the Analyzers: An Introspective Survey of Data Scientists and Their Work

There has been intense excitement in recent years around activities labeled "data science," "big data," and "analytics." However, the lack of clarity around these terms and, particularly, around the skill sets and capabilities of their practitioners has led to inefficient communication between "data...

Uncertain Schema Matching (Synthesis Lectures on Data Management)
Uncertain Schema Matching (Synthesis Lectures on Data Management)
Schema matching is the task of providing correspondences between concepts describing the meaning of data in various heterogeneous, distributed data sources. Schema matching is one of the basic operations required by the process of data and schema integration, and thus has great effect on its outcomes. Schema matching research has...
Models and Analysis for Distributed Systems (ISTE)
Models and Analysis for Distributed Systems (ISTE)
Verification and hence modeling are a mandatory but intricate problem for engineers developing embedded distributed real-time systems that are entrusted with critical safety applications like medical care, transportation, energy production, industrial processes, military operations. Therefore, while emerging 40 years ago, first for...
Introduction to Real Analysis
Introduction to Real Analysis

Assuming minimal background on the part of students, this text gradually develops the principles of basic real analysis and presents the background necessary to understand applications used in such disciplines as statistics, operations research, and engineering. The text presents the first elementary exposition of the gauge integral and...

Functional Analysis Methods for Reliability Models (Pseudo-Differential Operators)
Functional Analysis Methods for Reliability Models (Pseudo-Differential Operators)
People are often concerned with the reliability of products they use and of the friends and associates with whom they interact daily in a myriad of ways. Although the term “reliability” may not occur in the description of a given product or interaction, it is often the attribute that the individual means in expression of...
HBase in Action
HBase in Action

I got my start with HBase in the fall of 2008. It was a young project then, released only in the preceding year. As early releases go, it was quite capable, although not without its fair share of embarrassing warts. Not bad for an Apache subproject with fewer than 10 active committers to its name! That was the height of the NoSQL...

The Marketing Agency Blueprint: The Handbook for Building Hybrid PR, SEO, Content, Advertising, and Web Firms
The Marketing Agency Blueprint: The Handbook for Building Hybrid PR, SEO, Content, Advertising, and Web Firms

When I started HubSpot in June 2006 with my business partner, Dharmesh Shah, our experiences with marketing agencies led us to almost entirely avoid working with them. In fact, we designed our original business model around selling our marketing software directly to end customers, and developed an internal marketing team that would not be...

Virtualization Security: Protecting Virtualized Environments
Virtualization Security: Protecting Virtualized Environments

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices,...

Supply Chain Optimization, Design, and Management: Advances and Intelligent Methods (Premier Reference Source)
Supply Chain Optimization, Design, and Management: Advances and Intelligent Methods (Premier Reference Source)
The supply chain of both manufacturing and commercial enterprises comprises a highly distributed environment, in which complex processes evolve in a network of companies (see Figure 1). Such processes include materials procurement and storage, production of intermediate and final products, warehousing, sales, customer service, and...
International Marketing
International Marketing
Thank you for reading our book! Practicing international marketing and writing a text on the subject have much in common. The focus is on delighting the customer; it is a lot of work; the competition is tough; and it’s fun to succeed. It is therefore with great pleasure that we present the eighth edition of International...
Result Page: 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy