Browse Results

Showing 53,226 through 53,250 of 53,904 results

Stop IT Project Failures

by Dan Remenyi

This book is about information systems development failures and how to avoid them. It considers what goes wrong with information systems development projects and what actions may be taken to avoid potential difficulties.The reduction of the impact,or even the elimination of the problems,is discussed in terms of an information systems risk management programme.Stop I.T.Project failure helps to ensure that IS project managers are successful in helping to deliver application systems. However, IS development risk can never be entirely eliminated and consequently the practitioner needs to bear in mind that an IS development project is never without risk, and hence there is a continuing potential for something to go wrong.The book covers the key issues and variables and makes specific practical suggestions about the good management practice that is required to implement IS project risk processes. Dr. Dan Remenyi has spent more than 25 years working in the field of corporate computers and information systems. He has worked with computers as an IS professional, business consultant and user. In all these capacities he has been primarily concerned with benefit realisation and obtaining the maximum value for money from the organisations' information systems investment and effort. He has worked extensively in the field of information systems project management, specialising in the area of project risk identification and management. He has written a number of books and papers in the field of IT management and regularly conducts courses and seminars as well as working as a consultant in this area. Dr.Dan Remenyi holds a B.Soc.Sc., an MBA and a PhD. He is a Visiting Professor at Chalmers University of Technology in Gothenberg, Sweden and an associate member of faculty at Henley Management College in the United Kingdom.

Strategic Information Management: Challenges And Strategies In Managing Information Systems (Management Reader Ser.)

by Robert D. Galliers Dorothy E Leidner

'Strategic Information Management' has been completely up-dated to reflect the rapid changes in IT and the business environment since the publication of the second edition. Half of the readings in the book have been replaced to address current issues and the latest thinking in Information Management. It goes without saying that Information technology has had a major impact on individuals, organizations and society over the past 50 years or so. There are few organizations that can afford to ignore IT and few individuals who would prefer to be without it. As managerial tasks become more complex, so the nature of the requiredinformation systems (IS) changes - from structured, routine support to ad hoc, unstructured, complex enquiries at the highest levels of management.As with the first and second editions, this third edition of 'Strategic Information Management: Challenges and strategies in managing informationsystems' aims to present the many complex and inter-related issues associated with the management of information systems. The book provides a rich source of material reflecting recent thinking on the key issues facing executives in information systems management. It draws from a wide range of contemporary articles written by leading experts from North America and Europe.'Strategic Information Management' is designed as a course text for MBA, Master's level students and senior undergraduate students taking courses in information management. It provides a wealth of information and references for researchers in addition.

Summary of a Workshop on Information Technology Research for Crisis Management

by Committee on Computing Communications Research to Enable Better Use of Information Technology in Government

This workshop summary was produced in the course of a broader study that is exploring how information technology research can foster new and improved government services, operations, and interactions with citizens. This workshop summary examines how this technology can contribute to more-effective response and recovery efforts to crises such as natural disasters or terrorist attacks, as well as to mitigation and preparedness in order to reduce the impact of these events.

Superwrite: Alphabetic Writing System, Office Professional (Volume 1, 2nd Edition)

by A. James Lemaster John Baer

Volume One introduces SuperWrite theory and beginning transcription principles. The step-by-step approach to writing principles guides students to alphabetic writing success. Eight lessons develop personal success factors such as goal-setting, problem-solving, time management, attendance, and promptness. Updated keyboarding style references reflect current business practices.

Swarm Intelligence

by Marco Dorigo Mauro Birattari Xiaodong Li Manuel López-Ibáñez Kazuhiro Ohkura Carlo Pinciroli Thomas Stützle

Social insects-ants, bees, termites, and wasps-can be viewed as powerful problem-solving systems with sophisticated collective intelligence. Composed of simple interacting agents, this intelligence lies in the networks of interactions among individuals and between individuals and the environment. A fascinating subject, social insects are also a powerful metaphor for artificial intelligence, and the problems they solve-finding food, dividing labor among nestmates, building nests, responding to external challenges-have important counterparts in engineering and computer science. This book provides a detailed look at models of social insect behaviour and how to apply these models in the design of complex systems. The book shows how these models replace an emphasis on control, preprogramming, and centralization with designs featuring autonomy, emergence, and distributed functioning. These designs are proving immensely flexible and robust, able to adapt quickly to changing environments and to continue functioning even when individual elements fail. In particular, these designs are an exciting approach to the tremendous growth of complexity in software and information. ; Swarm Intelligence draws on up-to-date research from biology, neuroscience, artificial intelligence, robotics, operations research, and computer graphics, and each chapter is organized around a particular biological example, which is then used to develop an algorithm, a multiagent system, or a group of robots. The book will be an invaluable resource for a broad range of disciplines.

Understanding Intelligence

by Rolf Pfeifer Christian Scheier

By the mid-1980s researchers from artificial intelligence, computer science, brain and cognitive science, and psychology realized that the idea of computers as intelligent machines was inappropriate. The brain does not run "programs"; it does something entirely different. But what? Evolutionary theory says that the brain has evolved not to do mathematical proofs but to control our behavior, to ensure our survival. Researchers now agree that intelligence always manifests itself in behavior--thus it is behavior that we must understand. An exciting new field has grown around the study of behavior-based intelligence, also known as embodied cognitive science, "new AI," and "behavior-based AI." This book provides a systematic introduction to this new way of thinking. After discussing concepts and approaches such as subsumption architecture, Braitenberg vehicles, evolutionary robotics, artificial life, self-organization, and learning, the authors derive a set of principles and a coherent framework for the study of naturally and artificially intelligent systems, or autonomous agents. This framework is based on a synthetic methodology whose goal is understanding by designing and building. The book includes all the background material required to understand the principles underlying intelligence, as well as enough detailed information on intelligent robotics and simulated agents so readers can begin experiments and projects on their own. The reader is guided through a series of case studies that illustrate the design principles of embodied cognitive science.

Unix Backup and Recovery

by W. Curtis Preston

This guide provides a complete overview of all facets of Unix backup and recovery and offers practical, affordable backup and recovery solutions for environments of all sizes and budgets. It explains everything from freely available backup systems to large-scale commercial utilities.

UNIX in a Nutshell: System V Edition

by Arnold Robbins

The bestselling, most informative Unix reference book is now more complete and up to date. Not a scaled-down quick reference of common commands, UNIX in a Nutshell is a complete reference containing all commands and options, with descriptions and examples that put the commands in context. For all but the thorniest Unix problems, this one reference should be all you need. Covers System V Release 4 and Solaris 7.

View Camera Technique

by Leslie Stroebel

Now in its seventh edition, View Camera Technique is a unique, comprehensive book that presents clearly and precisely the features, operations and applications of view cameras. It details camera movements, image formation, exposure control, and information concerning lenses and accessories. Diagrams, comparison charts, and more than 500 photographs and illustrations by distinguished professional photographers provide the reader with the tools necessary to analyze a picture situation, set up and manipulate the camera, and portray the subject to meet the expectations of the professional photographer. This text has been completely revised and updated to include over 100 brand-name view cameras, and offers comparison tables to assist readers in choosing cameras, lenses, and view-camera digital backs. This latest edition offers expanded coverage of the newest technology, including electronic features that simplify the use of view cameras for conventional photography and digital view cameras that eliminate the need for film and make it possible to modify the digital images with image-processing computer software programs

Virtual Private Networks, Second Edition

by Mike Erwin Charlie Scott Paul Wolfe

This book explains how to plan and build a Virtual Private Network (VPN), a collection of technologies that creates secure connections or "tunnels" over regular Internet lines. It discusses costs, configuration, and how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH). New features in the second edition include SSH and an expanded description of the IPSec standard.

Virtually Perfect

by Dan Gutman

Yip Turner spends more time playing computer games than with other kids. For him, virtual reality usually beats reality! So when his dad, a movie special-effects designer, brings home new software for creating virtual actors, Yip is psyched. He and his sister create "Victor," a boy who is smart, handsome, and charming-perfect in everyway. But when Victor leaves cyberspace and invades their world, Yip realizes that there are bugs in the virtual-actor software. Now his family-and possibly the whole country!-may be in danger..

Vote.com

by Dick Morris

this book explains how, by means of the Internet, the Fifth Estate--a new political force--is about to transform American politics. The Fifth Estate is a sort of committee of the whole, made up of all citizens online. The author will probe how the rise of Internet democracy represents the triumph of people's politics over the power of intermediaries, particularly the power of the press and broadcast media, who make up the Fourth Estate. For the first time since the early nineteenth century, the United States is departing from the Madisonian model of representative government to return to Jefferson's radical concept of direct democracy.

Web Design in a Nutshell

by Jennifer Niederst Robbins

Web Design in a Nutshell contains the nitty-gritty on everything you need to know to design Web pages. It's the good stuff, without the fluff, written and organized so that answers can be found quickly. Written by veteran Web designer Jennifer Niederst, this book provides quick access to the wide range of front-end technologies and techniques from which Web designers and authors must draw. It is an excellent reference for HTML 4.0 tags (including tables, frames, and Cascading Style Sheets) with special attention given to browser support and platform idiosyncrasies. The HTML section is more than a reference work, though. It details strange behavior in tables, for instance, and gives ideas and workarounds for using tables and frames on your site. Web Design in a Nutshell also covers multimedia and interactivity, audio and video, and emerging technologies like Dynamic HTML, XML, embedded fonts, and internationalization. The book includes: Discussions of the Web environment, monitors, and browsers A complete reference to HTML and Server Side Includes, including browser support for every tag and attribute Chapters on creating GIF, JPEG and PNG graphics, including designing with the Web Palette Information on multimedia and interactivity, including audio, video, Flash, Shockwave, and JavaScript Detailed tutorial and reference on Cascading Style Sheets, including an appendix of browser compatibility information Appendices detailing HTML tags, attributes, deprecated tags, proprietary tags, and CSS compatibility

World War 3.0: Microsoft and Its Enemies

by Ken Auletta

The Internet Revolution, like all great industrial changes, has made the world's elephantine media companies tremble that their competitors--whether small and nimble mice or fellow elephants--will get to new terrain first and seize its commanding heights. In a climate in which fear and insecurity are considered healthy emotions, corporate violence becomes commonplace. In the blink of an eye--or the time it has taken slogans such as "The Internet changes everything" to go from hyperbole to banality--"creative destruction" has wracked the global economy on an epic scale. No one has been more powerful or felt more fear or reacted more violently than Bill Gates and Microsoft. Afraid that any number of competitors might outflank them--whether Netscape or Sony or AOL Time Warner or Sun or AT&T or Linux-based companies that champion the open-source movement or some college student hacking in his dorm room--Microsoft has waged holy war on all foes, leveraging its imposing strengths. In World War 3.0, Ken Auletta chronicles this fierce conflict from the vantage of its most important theater of operations: the devastating second front opened up against Bill Gates's empire by the United States government. The book's narrative spine is United States v. Microsoft, the government's massive civil suit against Microsoft for allegedly stifling competition and innovation on a broad scale. With his superb writerly gifts and extraordinary access to all the principal parties, Ken Auletta crafts this landmark confrontation into a tight, character- and incident-filled courtroom drama featuring the best legal minds of our time, including David Boies and Judge Richard Posner. And with the wisdom gleaned from covering the converging media, software, and communications industries for The New Yorker for the better part of a decade, Auletta uses this pivotal battle to shape a magisterial reckoning with the larger war and the agendas, personalities, and prospects of its many combatants.

The World Wide Web: A Mass Communication Perspective

by Barbara K. Kaye Norman J. Medoff

Through an approach that is both conceptual and practical, this text helps mass communication and broadcast students understand the value and commercial uses of the World Wide Web in the mass communication professions. Students will learn to think critically about social, legal, and ethical issues related to the world wide Web, and they will get practical information about how different media domains (radio, TV, public relations, advertising) are currently using the Web for both marketing and content purposes.

Writing Apache Modules with Perl and C

by Doug Maceachern Lincoln Stein

This guide to web programming shows how to extend the capabilities of the Apache web server. It explains the design of Apache, mod_perl, and the Apache API, then demonstrates how to use them to rewrite CGI scripts, filter HTML documents on the server-side, enhance server log functionality, convert file formats on the fly, and more.

Writing Essentials: A Norton Pocket Guide

by Dawn Rodriguez Myron C. Tuman

Writing Essentials combines the essentials of grammar, punctuation, mechanics, and documentation with practical suggestions for writing online.<P> From online prewriting, drafting, group workshopping, revising, and editing, to database searching, navigating the Internet, documenting online sources, and designing documents, Writing Essentials offers practical, hands-on advice for using computers throughout the writing process.

Adobe Pagemaker 6.5 Illustrated Projects

by Carol M. Cram

Part of the Illustrated Projects Series, this text offers a quick, visual way to apply Adobe PageMaker 6.5 skills. Covers beginning through intermediate skills.

Advanced Data Communications and Networks

by Bill Buchanan

The use of data communications and computer networks is constantly increasing, bringing benefits to most of the countries and peoples of the world, and serving as the lifeline of industry. Now there is a textbook that discusses data communications and networking in a readable form that can be easily understood by students who will become the IS professionals of the future.Advanced Data Communications and Networks provides a comprehensive and practical treatment of rapidly evolving areas. The text is divided into seven main sections and appendices:"General data compression"Video, images, and sound"Error coding and encryption"TCP/IP and the Internet"Network operating systems"LANs/WANs"Cables and connectorsOther topics include error detection/correction, image/video compression, digital video, digital audio, TCP/IP, HTTP, electronic mail, HTML, Windows NT, NetWare, UNIX, Fast Ethernet, ATM, FDDI, and much more.Written by a respected academician who is also an accomplished engineer, this textbook uses the author's wide practical experience in applying techniques and theory toward solving real engineering problems. It also includes an accompanying Web site that contains software, source code, and other supplemental information.

Avatars of the Word: From Papyrus to Cyberspace

by James J. O'Donnell

Considers the future of the printed word given the growth of electronic communication as a modern medium for information and culture. In investigating past cultural transitions, such as from the spoken to the written word, or from manuscript to the printing press, O'Donnell (classical studies, U. of Pennsylvania) reveals the contemporary crossroads between media as contiguous with the history of communication. Annotation c. by Book News, Inc. , Portland, Or.

The Biotech Century: Harnessing the Gene and Remaking the World

by Jeremy Rifkin

In this seminal book, Jeremy Rifkin explores the epic marriage between computer technology and genetic engineering, and the historic transition into the Age of Biotechnology. Already, Rifkin explains, our economy is undergoing a massive shift away from the Industrial Age and into an era in which giant life-science corporations are fashioning a bioindustrial world. Humanity is on the brink of wielding greater control over the shape of life--how we are born; how our food supply is created; the traits our children may have--than has ever been imagined. But with each step into this new era, we must ask ourselves: At what cost?

Blind Image Deconvolution: Theory and Applications

by Patrizio Campisi Karen Egiazarian

Blind image deconvolution is constantly receiving increasing attention from the academic as well the industrial world due to both its theoretical and practical implications. The field of blind image deconvolution has several applications in different areas such as image restoration, microscopy, medical imaging, biological imaging, remote sensing, astronomy, nondestructive testing, geophysical prospecting, and many others. Blind Image Deconvolution: Theory and Applications surveys the current state of research and practice as presented by the most recognized experts in the field, thus filling a gap in the available literature on blind image deconvolution.Explore the gamut of blind image deconvolution approaches and algorithms that currently exist and follow the current research trends into the future. This comprehensive treatise discusses Bayesian techniques, single- and multi-channel methods, adaptive and multi-frame techniques, and a host of applications to multimedia processing, astronomy, remote sensing imagery, and medical and biological imaging at the whole-body, small-part, and cellular levels. Everything you need to step into this dynamic field is at your fingertips in this unique, self-contained masterwork.For image enhancement and restoration without a priori information, turn to Blind Image Deconvolution: Theory and Applications for the knowledge and techniques you need to tackle real-world problems.

Building Object Applications That Work: Your Step-by-Step Handbook for Developing Robust Systems with Object Technology

by Scott W. Ambler

A must-have resource for designers and testers of today's OO applications, the book takes you thru the entire process of building object applications.

Capron's Pocket Internet 2001 Sites

by H. L. Capron

Want to find the best sites on the Net for your topic of interest? More than 2000 carefully selected websites so start discovering!

Causes And Consequences Of Map Generalization

by Elsa Joao

This text describes late-1990s understanding of map generalisation in the context of paper maps and GIS. Its particular value should be in helping to further automate and measure the process of map generalisation.; The research has concentrated on quantifying generalisation effects and on analysing how these effects of generalisation locked into the maps were measured. Elsa Joao's book covers the background to the problems of map generlasation; the methodology developed by the author to investigate the consequences of the map generalisation; a detailed description of results, and a conclusion that draws together consequences for the broader applications to GIS.

Refine Search

Showing 53,226 through 53,250 of 53,904 results