|
|
Books > Computing & IT > Computer software packages > General
A practical guide for developers, development teams, and managers
to successfully implement remote pair programming techniques and
styles that better fit their organization's environment Key
Features Implement remote pair programming best practices in your
organization to increase productivity in software development teams
Overcome the challenges in communication while working with
distributed teams across the globe Explore remote pair programming
tools and learn smart ways to use them efficiently Book
DescriptionRemote pair programming takes pair programming practices
to the next level by allowing you and your team members to work
effectively in distributed teams. This helps ensure that you
continuously improve code quality, share equal ownership of the
code, facilitate knowledge sharing, and reduce bugs in your code.
If you want to adopt remote pair programming within your
development team, this book is for you. Practical Remote Pair
Programming takes you through various techniques and best practices
for working with the wide variety of tools available for remote
pair programming. You'll understand the significance of pair
programming and how it can help improve communication within your
team. As you advance, you'll get to grips with different remote
pair programming strategies and find out how to choose the most
suitable style for your team and organization. The book will take
you through the process of setting up video and audio tools, screen
sharing tools, and the integrated development environment (IDE) for
your remote pair programming setup. You'll also be able to enhance
your remote pair programming experience with source control and
remote access tools. By the end of this book, you'll have the
confidence to drive the change of embracing remote pair programming
in your organization and guide your peers to improve productivity
while working remotely. What you will learn Develop a structured
organizational approach to implementing pair programming and using
it effectively Understand how pair programming fosters better
communication inside and outside the team Organize remote pair
programming and choose the right style for your organization Set up
screen sharing, IDE, source control rules, audio, and video for
your remote pair programming setup Use various pair programming
techniques and styles in the context of a remote environment
Enhance your remote pair programming experience with source control
and remote access tools Who this book is forThis book is for any
developer who wants to understand the different practical aspects
involved in remote pair programming and adopt them in their
existing development teams. If you're a team leader or technical
manager, this book will serve as a manual for implementing remote
pair programming covering the best resources for you to manage
communication and collaboration using pair programming with your
team members working remotely in distributed teams.
RFID is a key technology for Europe. Today there is a noticeable
shift away from the days of RFID pilot projects, and towards a time
where organisations are looking to RFID to drive efficiency and
innovation. Although Europe is a leading player in the world of
RFID technology, several challenges which are preventing RFID from
reaching its full potential need to be addressed. To further the
advancement of this technology, coordinated European efforts need
to be promoted, specifically in the areas of standardisation, user
guidelines, legislation, technology development, and research and
development. These themes have been analysed, and clear
recommendations have been derived, stating what the different RFID
stakeholders can do to support the technology. This book is aimed
at decision makers in all fields of society, e.g. in companies,
politics, business associations, etc. The publication is a summary
of the results of the coordination action CE RFID - "Coordinating
European Efforts in the RFID Value Chain" - and is a network of
European RFID technology providers, vendors and end users. It aims
at promoting the use of RFID technology and supporting further
development. The project was funded by the European Commission
under the 6th Framework Programme.
Intelligent Decision Technologies (IDT) seeks an interchange of
research on intelligent systems and intelligent technologies which
enhance or improve decision making in industry, government and
academia. The focus is interdisciplinary in nature, and includes
research on all aspects of intelligent decision technologies, from
fundamental development to the applied system. This volume
represents leading research from the Second KES International
Symposium on Intelligent Decision Technologies (KES IDT'10), hosted
and organized by the Sellinger School of Business and Management,
Loyola University Maryland, USA, in conjunction with KES
International. The symposium was concerned with theory, design
development, implementation, testing and evaluation of intelligent
decision systems. Topics include decision making theory,
intelligent agents, fuzzy logic, multi-agent systems, Bayesian
networks, optimization, artificial neural networks, genetic
algorithms, expert systems, decision support systems, geographic
information systems, case-based reasoning, time series, knowledge
management systems, Kansei communication, rough sets, spatial
decision analysis, and multi-criteria decision analysis. These
technologies have the potential to revolutionize decision making in
many areas of management, healthcare, international business,
finance, accounting, marketing, military applications, ecommerce,
network management, crisis response, building design, information
retrieval, and disaster recovery.
 |
Research and Practical Issues of Enterprise Information Systems
- 10th IFIP WG 8.9 Working Conference, CONFENIS 2016, Vienna, Austria, December 13-14, 2016, Proceedings
(Paperback, 1st ed. 2016)
A. Min Tjoa, Li Da Xu, Maria Raffai, Niina Maarit Novak
|
R2,291
Discovery Miles 22 910
|
Ships in 18 - 22 working days
|
|
|
This book constitutes the proceedings of the 10th International
IFIP WG 8.9 Working Conference on Research and Practical Issues of
Enterprise Information Systems, CONFENIS 2016, held in Vienna,
Austria, in December 2016. The conference provided an international
forum for the broader IFIP community to discuss the latest research
findings in the area of EIS and specifically aimed at facilitating
the exchange of ideas and advances on all aspects and developments
of EIS. The 25 papers presented in this volume were carefully
reviewed and selected from 63 submissions. They were organized in
topical sections on: semantic concepts and open data; customer
relationship management; security and privacy issues; advanced
manufacturing and management aspects; business intelligence and big
data; decision support in EIS; and EIS-practices.
 |
Financial Cryptography and Data Security
- FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers
(Paperback, Softcover reprint of the original 1st ed. 2010)
Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M Miret, …
|
R1,408
Discovery Miles 14 080
|
Ships in 18 - 22 working days
|
|
|
This volume contains the workshopproceedings of the accompanying
workshops of the 14th Financial Cryptograpy and Data Security
International Conference 2010, held on Tenerife, Canary Islands,
Spain, January 25-28, 2010. FinancialCryptographyandData Securityis
a majorinternationalforumfor research, advanced development,
education, exploration, and debate regarding information assurance,
with a speci?c focus on commercial contexts. The c- ference covers
all aspects of securing transactions and systems and especially
encourages original work focusing on both fundamental and applied
real-world deployments on all aspects surrounding commerce
security. Three workshops were co-located with FC 2010: the
Workshop on Real-Life
CryptographicProtocolsandStandardization(RLCPS),theWorkshoponEthics
in Computer Security Research (WECSR), and the Workshop on
Lightweight Cryptography for Resource-Constrained Devices (WLC).
Intimate and colorful by tradition, the high-quality program was
not the only attraction of FC. In the past, FC conferences have
been held in highly research-synergistic locations such as Tobago,
Anguilla, Dominica, Key West, Guadelupe, Bermuda, the Grand Cayman,
and Cozumel Mexico. 2010 was the ?rst year that the conference was
held on European soil, in the Spanish Canary Islands, in Atlantic
waters, a few miles across Morocco. Over 100 researchers from more
than 20 countries were in attendance.
The need for information privacy and security continues to grow and
gets increasingly recognized. In this regard, Privacy-preserving
Attribute-based Credentials (Privacy-ABCs) are elegant techniques
to provide secure yet privacy-respecting access control. This book
addresses the federation and interchangeability of Privacy-ABC
technologies. It defines a common, unified architecture for
Privacy-ABC systems that allows their respective features to be
compared and combined Further, this book presents open reference
implementations of selected Privacy-ABC systems and explains how to
deploy them in actual production pilots, allowing provably
accredited members of restricted communities to provide anonymous
feedback on their community or its members. To date, credentials
such as digitally signed pieces of personal information or other
information used to authenticate or identify a user have not been
designed to respect the users' privacy. They inevitably reveal the
identity of the holder even though the application at hand often
needs much less information, e.g. only the confirmation that the
holder is a teenager or is eligible for social benefits. In
contrast, Privacy-ABCs allow their holders to reveal only their
minimal information required by the applications, without giving
away their full identity information. Privacy-ABCs thus facilitate
the implementation of a trustworthy and at the same time
privacy-respecting digital society. The ABC4Trust project as a
multidisciplinary and European project, gives a technological
response to questions linked to data protection. Viviane Reding
(Former Vice-president of the European Commission, Member of
European Parliament)
Today, supply chain transformation for creating customer value
continues to be a priority for many companies, as it enables them
to gain a competitive advantage. While value creation is shaped by
external drivers such as market volatility, technology, product and
service offering and disruption, it can be stymied by the internal
stresses arising from the need to minimize costs, limitations in
process redesign, waste minimization and the unavailability of
knowledge capital. Therefore, for companies to survive and prosper,
the relevant questions to ask would be how to identify the
external/internal forces driving changes and how to map the
business drivers to the attributes of transformation. While the
contemporary supply chain is well-structured, the evolving economic
system is causing disruptions to this structure. The emergence of
novel business paradigms - non applicability of the traditional
laws of supply and demand, dominance of negative externality
effects and anomalies of high growth rate coexisting with high
supply side uncertainty - must be recognized in transforming supply
chains. For example, healthcare delivery and humanitarian relief do
not follow known supply/demand relationships; the negative
externality effects are increasing sustainability concerns; and
emerging economies, with dysfunctional business infrastructure,
must manage high growth rates. This book delves into the
transformation issues in supply chains and extends the concepts to
incorporate emerging issues. It does so through ten chapters,
divided into three sections. The first section establishes the
framework for transformation, while the second focuses on the
transformation of current chains in terms of products, processes,
supply base, procurement, logistics and fulfillment. Section three
is devoted to capturing the key issues in transforming supply
chains for emerging economies, humanitarian relief, sustainability
and healthcare delivery. This work will be of interest to both
academics and industrial practitioners and will be of great value
to graduate students in business and engineering. It raises many
questions, some provocative and provides many leads for in-depth
research. Several approaches are suggested for new problems along
with a discussion of case studies and examples from different
industries.
Learn the agile philosophy of lean processes, incremental delivery,
deep client participation, decentralized authority, and
just-in-time planning to bring speed, creativity, empowerment and
increased productivity to product development. This book is your
guide to becoming the go-to advisor for the enterprise agile
transition. Many organizations have brought in agile coaches and
achieved great progress in software development productivity, only
to find teams slipping back into old methods as they encounter
enterprise resistance and dysfunction. The consultative skills
required to engage at the enterprise level differ greatly from
those needed to coach teams in agile practices. Agile coaches and
consultants need to up their game to successfully partner with
executives, managers, and PMOs to evolve from traditional methods
to a lean, agile mindset. The Agile Consultant, by former Intel
Worldwide Project Management Director and agile expert Rick
Freedman, author of Amazon best-seller The IT Consultant, shows how
to overcome transition challenges and move beyond team-level
practice coaching to guide the entire organization to enterprise
agility. Agile methods are displacing traditional, process-heavy
project management techniques, and are poised to migrate from
software development to the rest of IT, and to the entire
enterprise. Agile's rapid adoption proves a simple truth: agility
works! Agile methods are here to stay, and will continue to expand
within the organization. Enterprises are rapidly moving beyond
agile development to agile IT, agile marketing, and agile strategic
planning. Enterprises need agile coaches and consultants to guide
them towards achieving the benefits of agility. What You'll Learn
Instill effective agile practices across the enterprise Coach
teams, managers, and executives in learning, adopting, and
practicing lean and agile strategies Diagnose the roadblocks and
obstacles most organizations encounter during the transition to
agile Use recognized change-management techniques to guide the
enterprise to agility while minimizing disruption and resistance
Navigate the many challenges that can derail the transition to
agility Demonstrate the critical mix of facilitation,
interpersonal, and relationship skills to help organizations
succeed with agile Guide the corporate culture toward agility from
the top down and the bottom up Evolve from old school project
management thinking to a lean, agile mindset Who This Book Is For
Besides IT consultants, The Agile Consultant will also appeal to
developer teams, internal IT staffers and their managers, and to
executives leading the transition to agile development.
The introduction of public key cryptography (PKC) was a critical
advance in IT security. In contrast to symmetric key cryptography,
it enables confidential communication between entities in open
networks, in particular the Internet, without prior contact. Beyond
this PKC also enables protection techniques that have no analogue
in traditional cryptography, most importantly digital signatures
which for example support Internet security by authenticating
software downloads and updates. Although PKC does not require the
confidential exchange of secret keys, proper management of the
private and public keys used in PKC is still of vital importance:
the private keys must remain private, and the public keys must be
verifiably authentic. So understanding so-called public key
infrastructures (PKIs) that manage key pairs is at least as
important as studying the ingenious mathematical ideas underlying
PKC. In this book the authors explain the most important concepts
underlying PKIs and discuss relevant standards, implementations,
and applications. The book is structured into chapters on the
motivation for PKI, certificates, trust models, private keys,
revocation, validity models, certification service providers,
certificate policies, certification paths, and practical aspects of
PKI. This is a suitable textbook for advanced undergraduate and
graduate courses in computer science, mathematics, engineering, and
related disciplines, complementing introductory courses on
cryptography. The authors assume only basic computer science
prerequisites, and they include exercises in all chapters and
solutions in an appendix. They also include detailed pointers to
relevant standards and implementation guidelines, so the book is
also appropriate for self-study and reference by industrial and
academic researchers and practitioners.
In this volume, the authors apply insights from a variety of
perspectives to explore the alignment among strategy, organization
design, process and human resource management, and e-business
practices on developing successful social networking programs-with
particular regard to applying such initiatives against the backdrop
of the global financial crisis and challenges to traditional
business models. Showcasing in-depth case studies, the authors
present emerging approaches to analyze the impact of investment in
social networking sites, aligning internal resources, and measuring
effects on positioning, branding, and new business creation. The
fact that a growing proportion of the world population has a
relationship with social networking sites could prove very valuable
for companies. The question is whether this represents a business
opportunity, whether companies know how to make the most of it and
if they will make the necessary efforts to adapt to these new
platforms. In the modern world, social networking sites have
enormous potential for large as well as small and medium-sized
enterprises (SMEs); most companies are aware of the need for a
presence on social networking sites, but at present their
e-business strategies are part of their medium and long-term
strategic planning and only a small percentage have been put into
practice. In short, this book attempts to answer the following
questions: Is there a business opportunity for companies on social
networking sites? Do they know how to make the most of it? Are they
willing to make the necessary effort to adapt? Can e-business
strategies contribute to company creation and the success of
already existing businesses? And if so, how?
 |
Privacy Technologies and Policy
- Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers
(Paperback, 1st ed. 2016)
Bettina Berendt, Thomas Engel, Demosthenes Ikonomou, Daniel Le Metayer, Stefan Schiffner
|
R1,963
Discovery Miles 19 630
|
Ships in 18 - 22 working days
|
|
|
This book constitutes the thoroughly refereed post-conference
proceedings of the Third Annual Privacy Forum, APF 2015, held in
Luxembourg, Luxembourg, in October 2015. The 11 revised full papers
presented in this volume were carefully reviewed and selected from
24 submissions. The topics focus on privacy by design (PbD), i.e.
the attempt to combine technical and organizational measures to
ensure the basic rights of the individual. The papers are organized
in three sessions: measuring privacy; rules and principles; legal
and economic perspectives on privacy.
 |
Financial Cryptography and Data Security
- FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers
(Paperback, 2014 ed.)
Rainer Boehme, Michael Brenner, Tyler Moore, Matthew Smith
|
R2,058
Discovery Miles 20 580
|
Ships in 18 - 22 working days
|
|
|
This books constitutes the thoroughly refereed papers and poster
abstracts from the FC 2014 Workshops, the First Workshop on Bitcoin
Research, BITCOIN 2014, and the Second Workshop on Applied
Homomorphic Cryptography and Encrypted Computing, WAHC 2014,
co-located with the 18th International Conference on Financial
Cryptography and Data Security, held in Christ Church, Barbados, on
March 7, 2014. The 15 full papers and 3 poster abstracts presented
were carefully reviewed and selected from 30 submissions. They are
grouped in topical sections on Bitcoin transactions, policy and
legal issues; Bitcoin security; improving digital currencies;
posters, and WAHC papers.
This book tells you everything you need to know to help your
organization implement DevOps on the Microsoft platform. You will
learn how to use Visual Studio, Visual Studio Team Services, and
Azure to implement a complete DevOps process in your company. You
will learn about Agile Project Management, Continuous Integration,
Continuous Delivery, Technical Debt Management, Automatic Testing
and Monitoring, and see how all these areas fit together. DevOps is
important for organizations that want to make the best use of their
resources and avoid costly mistakes. Teams that embrace DevOps
deploy code up to 30 times more frequently than their competition
and less than 50% of their deployments fail according to Puppet
Labs State of DevOps survey. DevOps on the Microsoft Stack shows
you how to help your organization implement DevOps, covering the
tooling they will need and how to make everything work together
while following best practices. The focus is not only on technology
but also on the cultural issues that teams will face when
implementing DevOps. The author's goal is to not only show you
which tooling there is but help you to successfully use everything
together to implement DevOps in your projects and organization. In
this book, you'll learn: What DevOps is and how it can help
development teams How to use Visual Studio, Visual Studio Team
Services, and Azure to setup a DevOps process How to introduce
DevOps to your organization and how to overcome problems
 |
PRIMA 2014: Principles and Practice of Multi-Agent Systems
- 17th International Conference, Gold Coast, QLD, Australia, December 1-5, 2014, Proceedings
(Paperback, 2014 ed.)
Hoa Khanh Dam, Jeremy Pitt, Yang Xu, Guido Governatori, Takayuki Ito
|
R2,629
Discovery Miles 26 290
|
Ships in 18 - 22 working days
|
|
|
This book constitutes the refereed proceedings of the 17th
International Conference on Principles and Practice of Multi-Agent
Systems, PRIMA 2014, held in Gold Coast, QLD, Australia, in
December 2014. The conference was co-located with the 13th Pacific
RIM International Conference on Artificial Intelligence, PRICAI
2014. The 21 revised full papers presented together with 15 short
papers were carefully reviewed and selected from 77 submissions.
The papers are organized in topical sections on self organization
and social networks/crowdsourcing; logic and argumentation;
simulation and assurance; interaction and applications; norms,
games and social choice; and metrics, optimisation, negotiation and
learning.
This book constitutes the proceedings of the 7th International
Workshop on Enterprise Applications and Services in the Finance
Industry, FinanceCom 2014, held in Sydney, Australia, on December
12, 2014. The workshop spans multiple disciplines, including
technical, service, economic, sociological, and behavioral
sciences. It reflects on technologically enabled opportunities,
implications, and changes due to the introduction of new business
models or regulations related to the financial services industry
and the financial markets. The nine papers presented were carefully
reviewed and selected from numerous submissions.
This book constitutes the revised proceedings of the 16th
International Conference on Electronic Commerce and Web
Technologies (EC-Web) held in Valencia, Spain, in September 2015.
The 10 full papers included in this volume were carefully reviewed
and selected from 28 submissions. The papers are organized in
topical sections on recommender systems, multimedia recommendation,
social and semantic web; and process management.
This book constitutes revised selected papers from the 10th
International Conference on Web Information Systems and
Technologies, WEBIST 2014, held in Barcelona, Spain, April 2014,
organized by the Institute for Systems and Technologies of
Information, Control and Communication (INSTICC), and technically
sponsored by the European Research Center for Information Systems
(ERCIS). The purpose of the WEBIST series of conferences is to
bring together researches, engineers and practitioners interested
in technological advances and business applications of web-based
information systems. The 21 papers presented in this volume were
carefully reviewed and selected originally 153 paper submissions.
They were organized in topical sections names, internet technology;
web interfaces and applications; society, e-business and
e-government; web intelligence; and mobile information systems. The
book also contains two invited talks in full-paper length.
Sitecore was recently recognized as one of the most
reputable/reliable web content management solutions (WCMS) in the
marketplace. Thousands of companies use Sitecore to help manage
their web and mobile digital properties. Sitecore is a very large,
complex platform that performs many robust functions and
capabilities. As such, marketers and end users often have a hard
time coming up to speed on the technology. Practical Sitecore 8
Configuration and Strategy: A User Guide for Sitecore's Content and
Marketing Capabilities provides that opportunity. The flow of the
book will take newbies step-by-step on how to configure Sitecore
content, personalization, and marketing automation capabilities.
Sprinkled in through the book will be callouts that highlight
strategies and best practices-taking the book beyond just the "how
to" step-by-step procedures that can be found elsewhere. Practical
Sitecore 8 Configuration and Strategy: Brings you up to speed on
Sitecore without requiring a training class. Provides the
information in a clear, logical outline that takes users from
simple, foundational concepts to more advanced concepts at the end.
Rounds out existing sources of documentation with strategies and
best practices from real-world experience. What You'll Learn How to
manage content in Sitecore How to create web forms and landing
pages How to optimize the site through personalization and A/B/N
testing How to use Sitecore for your marketing campaigns How to
leverage analytics for custom measurement/engagement strategies How
to create a robust governance plan for your Sitecore properties Who
This Book Is For The key target audience for this book are content
administrators (content authoring, forms development, etc.) and
digital marketers (campaigns, analytics, marketing automation,
experience optimization, etc.) using the Sitecore platform.
 |
HCI in Business
- Second International Conference, HCIB 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015, Proceedings
(Paperback, 2015 ed.)
Fiona Fui-Hoon Nah, Chuan-Hoo Tan
|
R1,545
Discovery Miles 15 450
|
Ships in 18 - 22 working days
|
|
|
This volume constitutes the refereed proceedings of the Second
International Conference on HCI in Business, HCIB 2015, held as
part of the 17th International Conference on Human-Computer
Interaction, HCII 2015, which took place in Los Angeles, CA, USA,
in August 2015. HCII 2015 received a total of 4843 submissions, of
which 1462 papers and 246 posters were accepted for publication
after a careful reviewing process. The papers address the latest
research and development efforts and highlight the human aspects of
design and use of computing systems. They thoroughly cover the
entire field of human-computer interaction, addressing major
advances in knowledge and effective use of computers in a variety
of application areas. The 72 papers presented in this volume
address the following topics: social media for business, enterprise
systems, business and gamification, analytics, visualization and
decision- making, industry, academia, innovation, and market.
|
|