Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Visual Basic for Applications Unleashed
Visual Basic for Applications Unleashed
Other Office products were slowly brought into the VBA fold, but it’s only with the release of Office 97 that Microsoft has finally achieved its goal. Now all of the Big Four—Word, Excel, Access, and PowerPoint—have a VBA development environment at their core. Not only that, but just about ...
Microsoft SQL Server 2012 with Hadoop
Microsoft SQL Server 2012 with Hadoop

With the explosion of data, the open source Apache Hadoop ecosystem is gaining traction, thanks to its huge ecosystem that has arisen around the core functionalities of its distributed file system (HDFS) and Map Reduce. As of today, being able to have SQL Server talking to Hadoop has become increasingly important because the two are indeed...

Toward Artificial Sapience: Principles and Methods for Wise Systems
Toward Artificial Sapience: Principles and Methods for Wise Systems
The current attempt to emulate human sapience (wisdom) by artificial means should be a step in the right direction beyond the Artificial/Computational Intelligence and Soft Computing disciplines, but is it warranted? Have humans achieved a level of modeling smart systems that justifies talking about sapience-wisdom?

This book presents...

Running Mac OS X Panther
Running Mac OS X Panther
Apple® has shown no mercy to the Macintosh® power user---that dedicated individual who knows their Mac® inside and out: what makes it tick, and what makes it tick better. In the rapid evolution of Mac OS® X, there have been three major releases, and each new release challenges the power user to once more stay ahead of the learning...
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
I was sitting at my desk when my phone rang. I answered the phone and it was a
large pharmaceutical company who was interested in consulting services.They
started off the conversation stating that they had some problems and thought that
my company might be able to help.They had noticed a trend with one of their foreign...
Flow-Based Programming: A New Approach to Application Development
Flow-Based Programming: A New Approach to Application Development
Imagine that you have a large and complex application running in your shop, and you discover that you need what looks like fairly complex changes made to it in a hurry. You consult your programmers and they tell you that the changes will probably take several months, but they will take a look. A meeting is called of all the people involved - not...
Collective Intelligence in Action
Collective Intelligence in Action
There's a great deal of wisdom in a crowd, but how do you listen to a thousand people talking at once? Identifying the wants, needs, and knowledge of internet users can be like listening to a mob.

In the Web 2.0 era, leveraging the collective power of user contributions, interactions, and feedback is the key to market dominance. A new...

System Architecture with XML
System Architecture with XML
"The whole world is talking XML, and the ramifications of its universal adoption are only beginning to surface. Whole business models will be affected by it; whole new business interests are being pursued because of it. The software industry itself will be rocked by it more than it cares to admit. This is so because XML brings us into the...
PC Magazine - February 7 2006
PC Magazine - February 7 2006
February 7, 2006

First Looks
Envision EN7600
...
Computer Vision - ACCV 2010: 10th Asian Conference on Computer Vision, Queenstown, New Zealand
Computer Vision - ACCV 2010: 10th Asian Conference on Computer Vision, Queenstown, New Zealand

The 2010 Asian Conference on Computer Vision took place in the southern hemisphere, in “The Land of the Long White Cloud” in Maori language, also known as New Zealand, in the beautiful town of Queenstown. If we try to segment the world we realize that New Zealand does not belong officially to any continent. Similarly, in computer...

Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Voice-of-the-Customer Marketing: A Revolutionary 5-Step Process to Create Customers Who Care, Spend, and Stay
Voice-of-the-Customer Marketing: A Revolutionary 5-Step Process to Create Customers Who Care, Spend, and Stay

Learn how you can use the revolutionary five-step marketing process that helped Microsoft, NBC Universal, and IBM achieve double-digit increases in sales.

"When HP uses the Voice of the Customer methodology, our marketing campaign results improve dramatically: response rates improve 3X to 10x, sales
...

Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy