Many software developers often confuse requirements engineering with software specification and, as a result, build unusable systems, despite meeting specifications.
When it comes to computer games, the numbers are astounding: the world's top professional gamer has won over half a million dollars shooting virtual monsters on-screen; online games claim literally millions of subscribers; while worldwide spending on computer gaming will top 24 billion by 2011.
Your organization can save and thrive in the cloud with this first non-technical guide to cloud computing for business leaders In less than a decade Google, Amazon, and Salesforce.
Your organization can save and thrive in the cloud with this first non-technical guide to cloud computing for business leaders In less than a decade Google, Amazon, and Salesforce.
A complete, comprehensive methodology and framework for adopting and managing a successful service oriented architecture environment Achieving Service-Oriented Architecture helps to set up an SOA Architecture Practice defining the policies, procedures, and standards that apply not just to IT developers but to the entire corporation as it relates to business applications.
A complete, comprehensive methodology and framework for adopting and managing a successful service oriented architecture environment Achieving Service-Oriented Architecture helps to set up an SOA Architecture Practice defining the policies, procedures, and standards that apply not just to IT developers but to the entire corporation as it relates to business applications.
Learn the essential tools for developing a sound service-oriented architecture SOA Modeling Patterns for Service-Oriented Discovery and Analysis introduces a universal, easy-to-use, and nimble SOA modeling language to facilitate the service identification and examination life cycle stage.
Learn the essential tools for developing a sound service-oriented architecture SOA Modeling Patterns for Service-Oriented Discovery and Analysis introduces a universal, easy-to-use, and nimble SOA modeling language to facilitate the service identification and examination life cycle stage.
A unique investigation of the state of the art in design, architectures, and implementations of advanced computational infrastructures and the applications they support Emerging large-scale adaptive scientific and engineering applications are requiring an increasing amount of computing and storage resources to provide new insights into complex systems.
Financial services institutions like international banks and insurance companies frequently need to adapt to changes in their environments, yet manage risk and ensure regulatory compliance.
A must-have guide for all companies undertaking service-oriented architecture (SOA) and IT governance Service-Oriented Architecture Governance for the Services Driven Enterprise expertly covers the business, organizational, process, compliance, security, and technology facets of SOA and IT governance.
This book places IT in perspective by tracing its development through time, covering its origins in business, the massive expansion of the role of IT at the end of the 20th century, the growth of the internet, and the successes and failures of companies involved in this development.
A must-have guide for all companies undertaking service-oriented architecture (SOA) and IT governance Service-Oriented Architecture Governance for the Services Driven Enterprise expertly covers the business, organizational, process, compliance, security, and technology facets of SOA and IT governance.
This book presents the impact and scope of Internet of Things (IoT), Artificial Intelligence (AI), and Machine Learning (ML) in the growth of intelligent digital farming and smart agriculture.
Based on the authors' experiences in developing and teaching Symbian OS, this practical guide is perfect for programmers and provides a series of example-based scenarios that show how to develop Symbian applications.
Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools.
Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools.
This book provides a critical overview of the changing ways people mourn, commemorate and interact with the remains of the dead, including bodies, materials and digital artefacts.
This book provides a critical overview of the changing ways people mourn, commemorate and interact with the remains of the dead, including bodies, materials and digital artefacts.
Technologies such as artificial intelligence have led to significant advances in science and medicine, but have also facilitated new forms of repression, policing and surveillance.
Technologies such as artificial intelligence have led to significant advances in science and medicine, but have also facilitated new forms of repression, policing and surveillance.