The Internet plays a significant and growing role in real-time industrial manufacturing, scheduling and management. A considerable research effort has led to the development of new technologies that make it possible to use the Internet for supervision and control of industrial processes.
With the availability of chips offering constantly increasing computational performance and
functionality, design of more and more complex applications becomes possible. This is particularly
true for the domain of image processing, which is characterized by huge computation
efforts. Unfortunately, this evolution risks to be stopped by...
BIS 2011 held in Pozna´n, Poland, was the 14th in a series of international conferences
on business information systems. The BIS conference series has been
recognized by professionals from the very beginning as a forum for the exchange
and dissemination of topical research in the development, implementation, application
and...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are...
Get the brutal truth about coding, testing, and project management—from a Microsoft insider who tells it like it is. I. M. Wright's deliberately provocative column "Hard Code" has been sparking debate amongst thousands of engineers at Microsoft for years. And now (despite our better instincts), we're making...
After being shrouded in esoterica for a long time, Global Navigation Satellite
Systems (GNSS) have become part of everyday life, especially the Global Positioning
System (GPS). Having spent 40 years involved with the subject, it
became clear to me that it would be useful to have a book about the business
aspects of these systems. This...
Computers are very common today, and just about any computer is connected to a network. People with the knowledge and expertise to configure and maintain networks are needed in any organization.
IT administration starts with network administration in most organizations. If the computers can’t communicate on the network,...
Social media can be an incredibly powerful marketing tool that brings a company or organization huge rewards. But for beginners in this new world, the potential risks are also high. Consumers are particularly passionate in the online world; the most active social networkers are poised to be your brand's gushing fans—or your most...
The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention
Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....
Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of...
Agile methodologies attack risk at its core. To identify risk early and often is the
premise of agile security. Risk comes in many forms. Organizations face security
threats every day. Risks are in the delivery and maintenance of the countermeasures.
Agile IT Security focuses on the details of the steps in delivering and maintaining...
Do you find yourself asking for more time whenever you work on a project? Do you ever get the extra time you asked for? Well, if you’re like me, you rarely get the extra time you need from your customers. This got me thinking about how I can buy more time for my projects. I decided to find out if I could gain more time by reducing...