Home | Amazing | Today | Tags | Publishers | Years | Search 
Expert Oracle GoldenGate
Expert Oracle GoldenGate

Oracle Corporation acquired GoldenGate in 2009 as part of future strategy to implement advanced replication technologies within the product suite of data warehousing and real-time transaction management. Before the advent of Oracle GoldenGate technology, data replication was performed using Oracle Streams and third-party replication...

Oracle E-Business Suite 12 Financials Cookbook
Oracle E-Business Suite 12 Financials Cookbook

Oracle E-Business Suite 12 Financials is a solution that provides out-of-the-box features to meet global financial reporting and tax requirements with one accounting, tax, banking, and payments model, and makes it easy to operate shared services across businesses and regions. You may have read what EBS Financials does, but with this book on...

Grid and Cloud Database Management
Grid and Cloud Database Management

Since the 1960s, database systems have been playing a relevant role in the information technology field. By the mid-1960s, several systems were also available for commercial purposes. Hierarchical and network database systems provided two different perspectives and data models to organize data collections. In 1970, E. Codd wrote a...

NHibernate 3 Beginner's Guide
NHibernate 3 Beginner's Guide

NHibernate 3 Beginner's Guide examines all of the topics required to get a functional data-access layer implemented while writing the least amount of code possible, presenting options along the way to handle particular edge cases or situations as they arise. The book begins with an introduction to NHibernate 3 and then moves on to...

Managing Web Usage in the Workplace: A Social, Ethical, and Legal Perspective
Managing Web Usage in the Workplace: A Social, Ethical, and Legal Perspective

The ubiquitous nature of the Internet is dramatically revolutionizing the manner in which organizations and individuals share information. Developed out of necessity during the cold war, the Internet was created as a means to help governmental institutions and collegiate institutions send documents and research materials electronically...

Video Segmentation and Its Applications
Video Segmentation and Its Applications

Video segmentation has been a key technique for visual information extraction and plays an important role in digital video processing, pattern recognition, and computer vision. A wide range of video-based applications will benefit from advances in video segmentation including security and surveillance, bank transactions monitoring,...

Real-Time Database Systems - Architecture and Techniques
Real-Time Database Systems - Architecture and Techniques

In recent years, tremendous research has been devoted to the design of database systems for real-time applications, called real-time database systems (RTDBS), where transactions are associated with deadlines on their completion times, and some of the data objects in the database are associated with temporal constraints on their validity....

Transactions on Data Hiding and Multimedia Security VI
Transactions on Data Hiding and Multimedia Security VI
This issue consists mainly of a Special Section on “Content Protection and Forensics” with four papers edited by Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma and Li Zhao. For a detailed introduction of these four papers, please refer to the Preface written by the organizers...
packetC Programming
packetC Programming

This book covers a vast array of information related to packetC. It is a complete language reference and contains background information on many unique parts of packetC. As packetC shares much of its grammar with C, the book focuses on being an instructional language reference and not a general C programming introduction, since extensive...

Oracle Core: Essential Internals for DBAs and Developers
Oracle Core: Essential Internals for DBAs and Developers

When I wrote Practical Oracle 8i, there was a three-week lag between publication and the first e-mail asking me when I was going to produce a 9i version of the book—thanks to Larry Ellison’s timing of the

launch of 9i. That question has been repeated many times (with changes in version number) over the last 12
...
Adobe Business Catalyst: Design full-featured websites without the hassles of development
Adobe Business Catalyst: Design full-featured websites without the hassles of development
The Internet has completely transformed the way products are marketed and sold. Technology is evolving very quickly and businesses are constantly reinventing themselves. Customers want more for their money. They have learned to shop around to find the best value. They compare reviews to purchase the highest-rated items. As the...
Cryptography and Network Security
Cryptography and Network Security
The Internet, as a worldwide communication network, has changed our daily life in many ways. A new paradigm of commerce allows individuals to shop online. The World Wide Web (WWW) allows people to share information. The E-mail technology conned people in far-flung corners of the world. 'ITiis inevitable evolution has also cre-...
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy