Wayward Pines S01E06 1080p HDTV X264-DIMENSION | Dragon Ball | Final Fantasy XIV 2010
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Big Data, Big Innovation: Enabling Competitive Differentiation through Business Analytics (Wiley and SAS Business Series)
Big Data, Big Innovation: Enabling Competitive Differentiation through Business Analytics (Wiley and SAS Business Series)
INNOVATION, CULTURE, AND BIG DATA ANALYTICS
 
Ignoring the big data hype and diving right into the value proposition, Big Data, Big Innovation takes a long, hard look at making sure that businesses don't stray off course when chasing innovation. It focuses on real-world goals, strategies...
Disruptive Possibilities: How Big Data Changes Everything
Disruptive Possibilities: How Big Data Changes Everything

Big data has more disruptive potential than any information technology developed in the past 40 years. As author Jeffrey Needham points out in this revealing book, big data can provide unprecedented visibility into the operational efficiency of enterprises and agencies.

Disruptive Possibilities provides an...

Refactoring to Agility
Refactoring to Agility

Agile methodologies, such as XP, Scrum, Crystal, and Lean Software Development enable development organizations to deliver higher-quality software far more rapidly. However, for the "non-agile" development organization, transitioning to agility is an enormous leap, requiring radically new skills and presenting profound...

Cyber Security Policy Guidebook
Cyber Security Policy Guidebook

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of...

Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation
Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation

Getting software released to users is often a painful, risky, and time-consuming process. This groundbreaking new book sets out the principles and technical practices that enable rapid, incremental delivery of high quality, valuable new functionality to users. Through automation of the build, deployment, and testing...

Configuration Management Principles and Practice
Configuration Management Principles and Practice

Configuration management (CM) is an important, but often neglected, practice that allows application developers and project managers to better identify potential problems, manage changes, and track the progress of software projects. An effective CM strategy—one that adheres to the practice's complexity while harnessing its depth—can...

The DevOps Adoption Playbook: A Guide to Adopting DevOps in a Multi-Speed IT Enterprise
The DevOps Adoption Playbook: A Guide to Adopting DevOps in a Multi-Speed IT Enterprise

Achieve streamlined, rapid production with enterprise-level DevOps

Awarded DevOps 2017 Book of the Year, The DevOps Adoption Playbook provides practical, actionable, real-world guidance on implementing DevOps at enterprise scale. Author Sanjeev Sharma heads the DevOps practice for IBM; in this book, he provides unique...

The Scrum Culture: Introducing Agile Methods in Organizations (Management for Professionals)
The Scrum Culture: Introducing Agile Methods in Organizations (Management for Professionals)

This book is a guide for managers, Scrum Masters and agile coaches who are interested in agile organizational methods and who are planning to introduce Scrum at their own company. Scrum is not only a product development framework but can also be used to structure activities for agile and lean organizational development.

Divided...

IT Security Risk Control Management: An Audit Preparation Plan
IT Security Risk Control Management: An Audit Preparation Plan

Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.

Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating...

Oracle Fusion Middleware Patterns
Oracle Fusion Middleware Patterns

Enterprise Architecture is seldom simplistic enough to be built on a single technology - it generally encompasses a wide array of technologies, including SOA, Identity Management, Business Intelligence, Performance Management, Web 2.0, Content Management, BPM, Distributed caching, Data Integration, and Application Server.

What are...

Production-Ready Microservices: Building Standardized Systems Across an Engineering Organization
Production-Ready Microservices: Building Standardized Systems Across an Engineering Organization
                 
One of the biggest challenges for organizations that have adopted microservice architecture is the lack of architectural, operational, and organizational standardization. After splitting a monolithic application or building a microservice ecosystem from scratch, many...
Blockchain: Blueprint for a New Economy
Blockchain: Blueprint for a New Economy

Bitcoin is starting to come into its own as a digital currency, but the blockchain technology behind it could prove to be much more significant. This book takes you beyond the currency ("Blockchain 1.0") and smart contracts ("Blockchain 2.0") to demonstrate how the blockchain is in position to become the fifth...

Result Page: 60 59 58 57 56 55 54 53 52 51 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy