End-User Development


Book Description

Work practices and organizational processes vary widely and evolve constantly. The technological infrastructure has to follow, allowing or even supporting these changes. Traditional approaches to software engineering reach their limits whenever the full spectrum of user requirements cannot be anticipated or the frequency of changes makes software reengineering cycles too clumsy to address all the needs of a specific field of application. Moreover, the increasing importance of ‘infrastructural’ aspects, particularly the mutual dependencies between technologies, usages, and domain competencies, calls for a differentiation of roles beyond the classical user–designer dichotomy. End user development (EUD) addresses these issues by offering lightweight, use-time support which allows users to configure, adapt, and evolve their software by themselves. EUD is understood as a set of methods, techniques, and tools that allow users of software systems who are acting as non-professional software developers to 1 create, modify, or extend a software artifact. While programming activities by non-professional actors are an essential focus, EUD also investigates related activities such as collective understanding and sense-making of use problems and solutions, the interaction among end users with regard to the introduction and diffusion of new configurations, or delegation patterns that may also partly involve professional designers.




End-User Development


Book Description

This book constitutes the refereed proceedings of the Third International Symposium on End-User Development, IS-EUD 2011, held in Torre Canne, Italy, in June 2011. The 14 long papers and 21 short papers presented were carefully reviewed and selected for inclusion in the book. In addition the volume contains 2 keynote speeches, 14 doctoral consortia, and information on 3 workshops. The contributions are organized in topical sections on mashups, frameworks, users as co-designers, infrastructures, methodologies and guidelines, beyond the desktop, end-user development in the workplace, meta-design, and supporting end-user developers.




End User Microcomputing


Book Description




Practical Issues in Database Management


Book Description

The aim of this work is to provide a correct and up-to-date understanding of the practical aspects of crucial, yet little- understood core database issues. The author identifies fundamental concepts, principles, and techniques and assesses the treatment of those issues in SQL (both the standard and commercial implementations) and gives advice on how to deal with them. Topics covered include complex data types, missing information, data hierarchies, and quota queries. Annotation copyrighted by Book News, Inc., Portland, OR




End User Development


Book Description

This book makes important aspects of the international discussion on End User Development (EUD) available to a broader audience. It offers a unique set of contributions from research institutes worldwide, addressing relevant issues and proposing original solutions. This broad look at the emerging paradigm of End-User Development will inspire every reader to appreciate its potential for the future. Indeed, the editors hope that readers – "end-users" - will themselves become developers.




Database and Application Security


Book Description

An all-encompassing guide to securing your database and applications against costly cyberattacks! In a time when the average cyberattack costs a company $9.48 million, organizations are desperate for qualified database administrators and software professionals. Hackers are more innovative than ever before. Increased cybercrime means front-end applications and back-end databases must be finetuned for a strong security posture. Database and Application Security: A Practitioner's Guide is the resource you need to better fight cybercrime and become more marketable in an IT environment that is short on skilled cybersecurity professionals. In this extensive and accessible guide, Dr. R. Sarma Danturthi provides a solutions-based approach to help you master the tools, processes, and methodologies to establish security inside application and database environments. It discusses the STIG requirements for third-party applications and how to make sure these applications comply to an organization’s security posture. From securing hosts and creating firewall rules to complying with increasingly tight regulatory requirements, this book will be your go-to resource to creating an ironclad cybersecurity database. In this guide, you'll find: Tangible ways to protect your company from data breaches, financial loss, and reputational harm Engaging practice questions (and answers) after each chapter to solidify your understanding Key information to prepare for certifications such as Sec+, CISSP, and ITIL Sample scripts for both Oracle and SQL Server software and tips to secure your code Advantages of DB back-end scripting over front-end hard coding to access DB Processes to create security policies, practice continuous monitoring, and maintain proactive security postures Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.




Database Design and Implementation


Book Description

This textbook examines database systems from the viewpoint of a software developer. This perspective makes it possible to investigate why database systems are the way they are. It is of course important to be able to write queries, but it is equally important to know how they are processed. We e.g. don’t want to just use JDBC; we also want to know why the API contains the classes and methods that it does. We need a sense of how hard is it to write a disk cache or logging facility. And what exactly is a database driver, anyway? The first two chapters provide a brief overview of database systems and their use. Chapter 1 discusses the purpose and features of a database system and introduces the Derby and SimpleDB systems. Chapter 2 explains how to write a database application using Java. It presents the basics of JDBC, which is the fundamental API for Java programs that interact with a database. In turn, Chapters 3-11 examine the internals of a typical database engine. Each chapter covers a different database component, starting with the lowest level of abstraction (the disk and file manager) and ending with the highest (the JDBC client interface); further, the respective chapter explains the main issues concerning the component, and considers possible design decisions. As a result, the reader can see exactly what services each component provides and how it interacts with the other components in the system. By the end of this part, s/he will have witnessed the gradual development of a simple but completely functional system. The remaining four chapters then focus on efficient query processing, and focus on the sophisticated techniques and algorithms that can replace the simple design choices described earlier. Topics include indexing, sorting, intelligent buffer usage, and query optimization. This text is intended for upper-level undergraduate or beginning graduate courses in Computer Science. It assumes that the reader is comfortable with basic Java programming; advanced Java concepts (such as RMI and JDBC) are fully explained in the text. The respective chapters are complemented by “end-of-chapter readings” that discuss interesting ideas and research directions that went unmentioned in the text, and provide references to relevant web pages, research articles, reference manuals, and books. Conceptual and programming exercises are also included at the end of each chapter. Students can apply their conceptual knowledge by examining the SimpleDB (a simple but fully functional database system created by the author and provided online) code and modifying it.




Information Systems for Business and Beyond


Book Description

"Information Systems for Business and Beyond introduces the concept of information systems, their use in business, and the larger impact they are having on our world."--BC Campus website.




Handbook of Materials Selection


Book Description

Erstmals in einem Band werden Werkstoffe hier (in zwei getrennten Systemen) sowohl nach ihrer technischen Anwendung als auch nach ihren Eigenschaften geordnet. - Benutzer können deshalb zunächst nach der Gruppe von Materialen suchen, die für eine spezielle Anwendung geeignet sind, und anschließend Details über jedes einzelne Material finden - Suchkriterien sind Eigenschaften wie Wärmeleitfähigkeit, optisches Reflexionsvermögen, Elastizität usw. und Anwendungsgebiete wie Bauwesen, Biomedizin, Fahrzeugbau, Luftfahrttechnik, Elektrotechnik usw. - berücksichtigt werden sowohl herkömmliche Werkstoffe (Eisen- und Nichteisenmetalle, Kunststoffe, Klebstoffe) als auch Kompositwerkstoffe und synthetische Materialen wie Laminate, Fasern und Keramiken




InfoWorld


Book Description

InfoWorld is targeted to Senior IT professionals. Content is segmented into Channels and Topic Centers. InfoWorld also celebrates people, companies, and projects.