Submitted by Anonymous (not verified) on Fri, 2006-09-08 12:36
"Unleashing the Killer App," describes how digital strategy integrates the new rules with an organization's planning processes. Our focus is on the early stages: the learning, collaborating, prototyping, and strategy design rather than the actual implementation and deployment of killer apps.
Submitted by Anonymous (not verified) on Fri, 2006-09-08 12:23
Adaptive Programming ideas have been re-invented in many different domains (software engineering, data bases, meta-object protocols, attribute grammars, functional programming, digital signal processing) and since the idea has been used successfully it is time to formulate it in terms of patterns to isolate the key ideas and to make them easier to teach.
Submitted by Anonymous (not verified) on Thu, 2006-09-07 10:22
This book, the first entirely devoted to this important form of human/computer interaction, provides detailed theoretical and empirical information of interest to software designers and human/computer interaction specialists and researchers.
Submitted by Anonymous (not verified) on Thu, 2006-09-07 09:23
The purpose of this IBM Redpaper is to provide discussion material about grid computing, concepts, use, and architecture. Grid computing represents unlimited opportunities in terms of business and technical aspects.
Submitted by Anonymous (not verified) on Thu, 2006-09-07 05:59
The USENIX conferences have become the essential meeting grounds for the presentation and discussion of the most advanced information on the developments of all aspects of computing systems and the proceedings from each USENIX conference and the magazine are available on its Online Library and Index.
Submitted by Anonymous (not verified) on Thu, 2006-09-07 05:40
The Online Books Page is a website that facilitates access to books that are freely readable over the Internet. It also aims to encourage the development of such online books, for the benefit and edification of all.
Submitted by Anonymous (not verified) on Thu, 2006-09-07 02:57
Cybersecurity Today and Tomorrow: Pay Now or Pay Later-WHAT DO WE KNOW ABOUT CYBERSECURITY? With the above perspective in mind, here are some of the main messages about cybersecurity that emerge from a review of CSTB reports. In the United States, information system vulnerabilities, from the standpoint of both operations and technology, are growing faster than the country’s ability (and willingness) to respond . Security is expensive, not only in dollars but especially in interference with daily work .
Submitted by Anonymous (not verified) on Thu, 2006-09-07 02:44
Driven by the increasing capabilities and ever declining costs of computing and communications devices, IT is being embedded into a growing range of physical devices linked together through networks and will become ever more pervasive as the component technologies become smaller, faster, and cheaper.