![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer programming > Software engineering
In IT divisions and organizations, the need to execute in a competitive and complex technical environment while demonstrating personal integrity can be a significant personal and organizational challenge. Supplying concrete guidelines for those at an ethical crossroads, Ethics in IT Outsourcing explores the complex challenges of aligning IT outsourcing programs with ethical conduct and standards. This one-stop reference on the ethical structure and execution of IT outsourcing incorporates an easy-to-apply checklist of principles for outsourcing executives and managers. It examines certification programs, such as the online ethics training and certification offered by the Code of Ethics and Business Practice Standards for Outsourcing Professionals established by the International Association of Outsourcing Professionals (IAOP). Based upon significant research on the economic impact of outsourcing at a micro, macro, and corporate level, this volume defines a comprehensive set of ethical program components to ensure your program is aligned with ethical guidelines. Based on a solid foundation of documented research and analysis Examines the ethical impact of outsourcing on individuals, corporations, and society Outlines a new corporate capability-the Ethics PMO Includes a list of tools to help readers establish their own Ethics PMO Filled with authoritative insights based on the author's decades of experience working with large firms in IT and outsourcing, this book is suitable for both veteran IT practitioners and stakeholders new to the topic. A must-read for anyone seeking to understand the underlying issues in this area of growing importance, it will bring you up to speed on the recent developments you need to be aware of to ensure ethical personal, corporate, and societal decision-making. Readers are invited to participate in the growing dialog of business ethics, and IT outsourcing ethics in particular, at the author's website: www.ethicsinit.com
A commitment to usability in user interface design and
development offers enormous benefits, including greater user
productivity, more competitive products, lower support costs, and a
more efficient development process. But what does it mean to be
committed to usability? Inside, a twenty-year expert answers this
question in full, presenting the techniques of Usability
Engineering as a series of product lifecycle tasks that result
directly in easier-to-learn, easier-to-use software.
With the majority of IT projects being delivered late, over budget, or cancelled altogether, it is clear that traditional project management methodologies do not provide an effective framework for today's IT projects. It is evident that a new Return-on-Investment (ROI) oriented approach is required that focuses on the ROI of a project from its inception. Maximizing Benefits from IT Project Management: From Requirements to Value Delivery provides comprehensive guidelines for determining an accurate ROI before the project has progressed to the point where it's over budget and over-run. It applies an iterative approach to the entire project management life cycle that re-visits the ROI, re-assesses the value delivered, defines the project scope, and allows the project to be planned as successive iterations based on the value delivered. This book details a systematic and simplified approach for effectively and efficiently selecting and evaluating IT projects for your organization. Filled with equations, tables, and figures that facilitate understanding, it explains how to evaluate subsequent success of a project so that it is simpler to manage, more efficient, and yields the ROI estimated at the outset. Using the novel approach outlined in the book, you will be able to deliver value throughout the project life cycle and make sure your projects are delivered on time, on budget, and within the constraints of the resources available.
Although the precepts of software engineering have been around for decades, the field has failed to keep pace with rapid advancements in computer hardware and software. Modern systems that integrate multiple platforms and architectures, along with the collaborative nature of users who expect an instantaneous global reach via the Internet, require updated software engineering methods. Social Software Engineering: Development and Collaboration with Social Networking examines the field through the spectrum of the social activities that now compose it. Supplying an up-to-date look at this ever-evolving field, it provides comprehensive coverage that includes security, legal, and privacy issues in addition to workflow and people issues. Jessica Keyes, former managing director of R&D for the New York Stock Exchange and noted columnist, correspondent, and author with more than 200 articles published, details the methodology needed to bring mission-critical software projects to successful conclusions. She provides readers with the understanding and tools required to fuse psychology, sociology, mathematics, and the principles of knowledge engineering to develop infrastructures capable of supporting the collaborative applications that today's users require.
Although enterprise mobility is in high demand across domains, an absence of experts who have worked on enterprise mobility has resulted in a lack of books on the subject. A Comprehensive Guide to Enterprise Mobility fills this void. It supplies authoritative guidance on all aspects of enterprise mobility-from technical aspects and applications to implementation. The book introduces basic concepts such as enterprise mobility adoption strategy and user requirements in mobility. Illustrating the technical aspects of enterprise mobility, it analyzes the key features and challenges in developing mobility solutions for various domains. The text is organized into four sections: Mobility Concepts: supplies a solid foundation in enterprise mobility, from strategy definition to deployment of enterprise mobility solutions Mobile Solutions and Case Studies: introduces readers to the applications of enterprise mobility across a wide range of industry sectors Mobile Application Development: supplies an overview of popular mobile platforms and mobile programming languages Technology Considerations in Mobility: details hybrid and supporting technologies in enterprise mobility The book's case studies illustrate the complete lifecycle in the development of mobility solutions, including the high level requirements, architecture, and design principles for each use case. Demonstrating how to put the concepts covered into practice, the text details the application of mobility solutions across various domains, including the healthcare, retail, airline, and pharmaceutical industries.
This book presents a coherent, novel vision of Smart Cities, built around a value-driven architecture. It describes the limitations of the contemporary notion of the Smart City and argues that the next developmental step must actively include not only the physical infrastructure, but information technology and human infrastructure as well, requiring the intensive integration of technical solutions from the Internet of Things (IoT) and social computing. The book is divided into five major parts, the first of which provides both a general introduction and a coherent vision that ties together all the components that are required to realize the vision for Smart Cities. Part II then discusses the provisioning and governance of Smart City systems and infrastructures. In turn, Part III addresses the core technologies and technological enablers for managing the social component of the Smart City platform. Both parts combine state-of-the-art research with cutting-edge industrial efforts in the respective fields. Lastly, Part IV details a road map to achieving Cyber-Human Smart Cities. Rounding out the coverage, it discusses the concrete technological advances needed to move beyond contemporary Smart Cities and toward the Smart Cities of the future. Overall, the book provides an essential overview of the latest developments in the areas of IoT and social computing research, and outlines a research roadmap for a closer integration of the two areas in the context of the Smart City. As such, it offers a valuable resource for researchers and graduate students alike.
Database technology and entity-relationship (ER) modeling have meanwhile reached the level of an established technology. This book presents the achievements of research in this field in a comprehensive survey. It deals with the entity-relationship model and its extensions with regard to an integrated development and modeling of database applications and, consequently, the specification of structures, behavior and interaction. Apart from research on the ER model and the syntax, semantics, and pragmatics of database modeling the book also presents techniques for the translation of the ER model into classical database models and languages such as relational, hierarchical, and network models and languages, and also into object-oriented models. The book is of interest for all database theoreticians as well as practitioners who are provided with the relevant foundations of database modeling.
While there are sporadic journal articles on socio-technical networks, there's long been a need for an integrated resource that addresses concrete socio-technical network (STN) design issues from algorithmic and engineering perspectives. Filling this need, Socio-Technical Networks: Science and Engineering Design provides a complete introduction to the fundamentals of one of the hottest research areas across the social sciences, networking, and computer science-including its definition, historical background, and models. Covering basic STN architecture from a physical/technological perspective, the book considers the system design process in a typical STN, including inputs, processes/actions, and outputs/products. It covers current applications, including transportation networks, energy systems, tele-healthcare, financial networks, and the World Wide Web. A group of STN expert contributors addresses privacy and security topics in the interdependent context of critical infrastructure, which include risk models, trust models, and privacy preserving schemes. Covers the physical and technological designs in a typical STN Considers STN applications in popular fields, such as healthcare and the virtual community Details a method for mapping and measuring complexity, uncertainty, and interactions among STN components The book examines the most important STN models, including graph theory, inferring agent dynamics, decision theory, and information mining. It also explains structural studies, behavioral studies, and agent/actor system studies and policy studies in different STN contexts. Complete with in-depth case studies, this book supplies the practical insight needed to address contemporary STN design issues.
Open Source Data Warehousing and Business Intelligence is an all-in-one reference for developing open source based data warehousing (DW) and business intelligence (BI) solutions that are business-centric, cross-customer viable, cross-functional, cross-technology based, and enterprise-wide. Considering the entire lifecycle of an open source DW & BI implementation, its comprehensive coverage spans from basic concepts all the way through to customization. Highlighting the key differences between open source and vendor DW and BI technologies, the book identifies end-to-end solutions that are scalable, high performance, and stable. It illustrates the practical aspects of implementing and using open source DW and BI technologies to supply you with valuable on-the-project experience that can help you improve implementation and productivity. Emphasizing analysis, design, and programming, the text explains best-fit solutions as well as how to maximize ROI. Coverage includes data warehouse design, real-time processing, data integration, presentation services, and real-time reporting. With a focus on real-world applications, the author devotes an entire section to powerful implementation best practices that can help you build customer confidence while saving valuable time, effort, and resources.
Information systems for manufacturing often follow a three-layer architecture based on an enterprise resource planning (ERP) layer (for order planning), a manufacturing execution system (MES) layer (for factory control), and a shop floor layer (for machine control). Future requirements on flexibility and adaptability require a much closer integration of ERP systems with the manufacturing floor. To achieve this integration, an MES often pushes customer orders to the manufacturing floor in a flexible manner. Moreover, a large amount of shop floor data needs to be filtered and fed into business planning applications such as production planning or supply chain management. Radio Frequency Identification (RFID) chips can play an important role in the collection and management of such data. Gunther, Kletti, and Kubach explain the potential advantages of using RFID technology in a modern manufacturing and supply chain context. Areas of emphasis include integration of RFID data into legacy IT architectures, RFID-MES-ERP integration, and cost-benefit considerations. Their presentation is not restricted to intra-company production planning, but also emphasizes the benefits of inter-company collaboration. Six case studies based on SAP s ERP systems and MPDV s MES solution show how to successfully implement cross-company supply chain integration using RFID technology."
Scientific descriptions of the climate have traditionally been based on the study of average meteorological values taken from different positions around the world. In recent years however it has become apparent that these averages should be considered with other statistics that ultimately characterize spatial and temporal variability. This book is designed to meet that need. It is based on a course in computational statistics taught by the author that arose from a variety of projects on the design and development of software for the study of climate change, using statistics and methods of random functions.
Even though Six Sigma programs have successfully been implemented in practice, many IT departments remain skeptical of the process or are unaware of how the tools can be used to improve system development. Removing the mystique surrounding this technique, Six Sigma Software Development, Second Edition demonstrates how Six Sigma tools and concepts can be used to enhance the system development process. Revised and updated, this second edition clearly explains Six Sigma concepts and their application, maps Six Sigma concepts and tools to all aspects of system development, and proposes the use of Six Sigma tools to evaluate and improve the overall performance of the IT department. In addition to classic Six Sigma, the book introduces Design for Six Sigma (DFSS) and illustrates when and how its tools and techniques can be used to increase the robustness and reliability of a new system. It also shows how the judicious application of lean tools can reduce the complexity of IT processes, thus shortening the time needed to translate customer requirements into completed systems and increasing customer satisfaction.
Organizations enjoy two kinds of strategic advantages. One is transitory: being in the right place with the right products at the right time. The other comes from having first class management and instituting processes that mobilize an organization, keeping in ahead of the competition. Which would you like to count on for your organization's success?Integrating ERP, CRM, Supply Chain Management, and Smart Materials explores how to create business opportunities and reap savings by: Restructuring and updating of ERP and CRM software as it integrates supply chain management and delivers new killer applications Evolving opportunities that will develop from the implementation of smart materials, automatic identification, classification systems, and quality assurance projects Auditing the implementation, operation, and maintenance of ERP and CRM software as well as the corrective action taken on the basis of resultsInternet commerce, online supply chain, and advances in technology - all available at increasingly lower costs - make systems of the past obsolete. However, just as new technology creates new opportunities, it can also create unforeseen consequences. By binding a wealth of interdependent issues between the covers of one book, Integrating ERP, CRM, Supply Chain Management, and Smart Materials gives you the tools you need to create proprietary, high value-added solutions.
The Science of Biometrics: Security Technology for Identity Verification covers the technical aspects of iris and facial recognition, focusing primarily on the mathematical and statistical algorithms that run the verification and identification processes in these two modalities. Each chapter begins with a review of the technologies, examining how they work, their advantages and disadvantages, as well as some of their established market applications. Numerous approaches are examined. Facial recognition is much more of an emerging biometric technology than iris recognition; therefore, there are more algorithms that are currently being developed in that area. After this review, numerous applications of these two modalities are covered as well, some of which have just been commercially deployed while others are under research and development. Chapters 3 and 4 conclude with case studies to provide further application review. This book is directed to security managers, electronic security system designers, consultants, and system integrators, as well as electronic security system manufacturers working in access control and biometrics.
Environment Modeling-Based Requirements Engineering for Software Intensive Systems provides a new and promising approach for engineering the requirements of software-intensive systems, presenting a systematic, promising approach to identifying, clarifying, modeling, deriving, and validating the requirements of software-intensive systems from well-modeled environment simulations. In addition, the book presents a new view of software capability, i.e. the effect-based software capability in terms of environment modeling.
This book is concerned with the importance of Human Computer Interaction (HCI), Usability, user participants, and Sustainability in the Information Communication Technology (ICT) industry throughout the world. ICTs have become a crucial instrument for communication, entertainment, commerce and research and this increased usage is presenting new environmental and sustainability issues as we try and meet the ever-growing needs of both businesses and individuals. Sustainability and sustainable design must become central to the design of new technologies to make a concerted effort to tackle the environmental concerns we face now and in the future. Development frameworks, tools and models are used and explored, and the New Participative Methodology for Sustainable Design (NPMSD) is introduced as a way of identifying key factors needed in developing more sustainable systems including new smart technology and portable devices. In this book, the sustainable step in the design stage is evaluated and assessed by 11 countries: namely, Australia, Brazil, China, Germany, India, Norway, Singapore, South Korea, Sweden, UK, and USA. The new results are generated confirming that sustainable design awareness should be considered by designers, and users to minimize and reduce the carbon emissions, raw materials usage, and global warming, since these problems should be tackled soon, otherwise, it will be too late to solve it. Further research is needed in the future to implement and assess the sustainable design step with large IT companies to ensure compliance with environmental standards and rules for sustainable systems. Sustainable Design is an invaluable resource for students and researchers, designers and business managers who are interested in the human-centered, environmental concerns of sustainable technologies.
This open access book provides an overview of the dissertations of the five nominees for the Ernst Denert Award for Software Engineering in 2019. The prize, kindly sponsored by the Gerlind & Ernst Denert Stiftung, is awarded for excellent work within the discipline of Software Engineering, which includes methods, tools and procedures for better and efficient development of high quality software. An essential requirement for the nominated work is its applicability and usability in industrial practice. The book contains five papers describing the works by Sebastian Baltes (U Trier) on Software Developers'Work Habits and Expertise, Timo Greifenberg's thesis on Artefaktbasierte Analyse modellgetriebener Softwareentwicklungsprojekte, Marco Konersmann's (U Duisburg-Essen) work on Explicitly Integrated Architecture, Marija Selakovic's (TU Darmstadt) research about Actionable Program Analyses for Improving Software Performance, and Johannes Spath's (Paderborn U) thesis on Synchronized Pushdown Systems for Pointer and Data-Flow Analysis - which actually won the award. The chapters describe key findings of the respective works, show their relevance and applicability to practice and industrial software engineering projects, and provide additional information and findings that have only been discovered afterwards, e.g. when applying the results in industry. This way, the book is not only interesting to other researchers, but also to industrial software professionals who would like to learn about the application of state-of-the-art methods in their daily work.
Three-Dimensional Integrated Circuit Design, Second Eition, expands the original with more than twice as much new content, adding the latest developments in circuit models, temperature considerations, power management, memory issues, and heterogeneous integration. 3-D IC experts Pavlidis, Savidis, and Friedman cover the full product development cycle throughout the book, emphasizing not only physical design, but also algorithms and system-level considerations to increase speed while conserving energy. A handy, comprehensive reference or a practical design guide, this book provides effective solutions to specific challenging problems concerning the design of three-dimensional integrated circuits. Expanded with new chapters and updates throughout based on the latest research in 3-D integration: Manufacturing techniques for 3-D ICs with TSVs Electrical modeling and closed-form expressions of through silicon vias Substrate noise coupling in heterogeneous 3-D ICs Design of 3-D ICs with inductive links Synchronization in 3-D ICs Variation effects on 3-D ICs Correlation of WID variations for intra-tier buffers and wires
This fast-moving tutorial introduces you to OCaml, an industrial-strength programming language designed for expressiveness, safety, and speed. Through the book's many examples, you'll quickly learn how OCaml stands out as a tool for writing fast, succinct, and readable systems code using functional programming. Real World OCaml takes you through the concepts of the language at a brisk pace, and then helps you explore the tools and techniques that make OCaml an effective and practical tool. You'll also delve deep into the details of the compiler toolchain and OCaml's simple and efficient runtime system. This second edition brings the book up to date with almost a decade of improvements in the OCaml language and ecosystem, with new chapters covering testing, GADTs, and platform tooling. This title is also available as open access on Cambridge Core, thanks to the support of Tarides. Their generous contribution will bring more people to OCaml.
This book is devoted to recent progress made in solving propositional satisfiability and related problems. Propositional satisfiability is a powerful and general formalism used to solve a wide range of important problems including hardware and software verification. The core of many reasoning problems in automated deduction are propositional. Research into methods to automate such reasoning has therefore a long history in artificial intelligence. In 1957, Allen Newell and Herb Simon introduced the Logic Theory Machine to prove propositional theorems from Whitehead and Russel's Principia mathematica. ...] This book follows on from the highly successful volume entitled SAT 2000 published five years ago. The papers in SAT 2005 fall (not entirely neatly) into the following categories: complete methods, local and stochastic search methods, random problems, applications, and extensions beyond the propositional.
This book is perhaps the first attempt to give full treatment to the topic of Software Design. It will facilitate the academia as well as the industry. This book covers all the topics of software design including the ancillary ones.
You've heard about pair programming's benefits: fewer bugs, improved skills, and faster delivery. But what happens when you want to pair with someone in another city, country, or even hemisphere? With the right tools, you won't have to relocate to refactor. In this book, you'll learn techniques used by the most productive remote programmers in the industry to pair with anyone on the globe on any kind of project. You'll use collaborative editors, screen sharing, secure networking, and virtualization to create a remote pairing environment that feels as if your partner is sitting right next to you. Two heads are better than one, but only if they're working on the same problem. When pairing remotely, this requires a specialized environment that you'll learn how to create. We'll use the same open-source tools as the pros to improve collaboration and increase productivity. You'll learn techniques, patterns, and best practices you can apply to projects of all kinds. These tools are so effective that many co-located programmers use them despite sitting side-by-side--you don't have to work outside of an office for this book to improve your programming techniques. We'll start by creating a secure collaborative editing environment capable of handling the low-bandwidth networks at some coffee shops. Then we'll share your screen using free open source tools and protocols. We'll deploy all of this to a server in the cloud so you can access your development environment from anywhere. Then we'll use one of the most advanced integrated development environments to collaborate, sketch on a virtual whiteboard, and resolve conflicts. Finally, we'll talk with programmers at Pivotal Labs, Big Nerd Ranch, and other top-notch distributed development firms to learn how they handle the challenges of remote pairing on a daily basis. With their help and advice, you can be productive from any location on the planet. What You Need: Many of the examples in this book require an internet connection. You'll only need one computer for most of the exercises, and you can run them by yourself. But having a second computer and even a second person may improve the experience.
This book provides essential information on Petri net theory and Petri net-based model checking methods. As for the Petri net theory, it involves the interleaving semantics and concurrency semantics of elementary net systems, some important net structures (e.g., invariant, repetitive vector, siphon, and trap), some classical net subclasses with special structures (e.g., state machine, marked graph, free-choice net,asymmetric-choice net, normal net, and weakly persistent net), and some basic properties (e.g., reachability, liveness, deadlock, and soundness). It also involves four high-level Petri nets: knowledge-oriented Petri nets, Petri nets with insecure places, time Petri nets, and plain time Petri nets with priorities, focusing on different fields of application. As for the model checking methods, this book introduces readers to computation tree logic (CTL), computation tree logic of knowledge (CTLK), and timed computation tree logic (TCTL), as well as Petri net-based methods for checking them. The basic principle of the reduced ordered binary decision diagram (ROBDD) is employed to compress the state space used in these model checking procedures. The book also covers time-soundness for time Petri nets and secure bisimulation for Petri nets with insecure places, both of which are based on the bisimulation theory. As such, it offers an introduction to basic information on bisimulation theory.
Software quality is a generalised statement difficult to agree or disagree with until a precise definition of the concept of "Software Quality" is reached in terms of measurable quantities. Unfortunately, for the software technology the basic question of: * what to measure; * how to measure; * when to measure; * how to deal with the data obtained are still unanswered and are also closely dependant on the field of application. In the past twenty years or more there have been a number of conferences and debates focusing on the concept of Software Quality, which produced no real industrial impact. Recently, however, the implementation of a few generic standards (ISO 9000, IEEE etc.) has produced and improved application of good practice principles at the industrial level. As a graduate in PhYSiCS, I still believe it is a long way before the concept of Software Quality can be defined exactly and measured, if ever. This is way I think the AQuIS series of conferences is important, its object begin to provide a platform for the transfer of technology and know how between Academic, Industrial and Research Institutions, in the field of Software Quality. Their objects are: * to provide a forum for the introduction and discussion of new research breakthroughs in Software Quality; * to provide professional Software Quality engineers with the necessary exposure to the results of current research; * to expose the research community to the problems of practical application of new results. |
You may like...
Web-Based Services - Concepts…
Information Reso Management Association
Hardcover
R16,895
Discovery Miles 168 950
Neural Approaches to Dynamics of Signal…
Anna Esposito, Marcos Faundez-Zanuy, …
Hardcover
R2,750
Discovery Miles 27 500
|