Browse Results

Showing 20,001 through 20,025 of 54,498 results

PHP Hacks

by Jack D. Herrington

Programmers love its flexibility and speed; designers love its accessibility and convenience. When it comes to creating web sites, the PHP scripting language is truly a red-hot property. In fact, PHP is currently used on more than 19 million web sites, surpassing Microsoft's ASP .NET technology in popularity. Not surprisingly, this surge in usage has resulted in a number of PHP books hitting the market. Only one, though, takes the language beyond traditional Web programming and into mapping, graphing, multimedia, and beyond: PHP Hacks. In PHP Hacks, author Jack Herrington wrings out his 20 years of code generation experience to deliver hands-on tools ranging from basic PHP and PEAR installation and scripting to advanced multimedia and database optimizing tricks. On the practical side of things, PHP Hacks helps you develop more robust PHP applications by explaining how to improve your database design, automate application testing, and employ design patterns in your PHP scripts and classes. In the category of "cool," Herrington explains how to upgrade your Web interface through the creation of tabs, stickies, popups, and calendars. He even examines how to leverage maps and graphics in PHP. There's also a bounty of image and application hacks, including those that show you how to: Integrate web sites with Google maps and satellite imaging Dynamically display iPhoto libraries online Add IRC, SMS, and Instant Messaging capabilities to your Web applications Drop the latest Wikipedia dictionary onto your Sony PSP Render graphics and user interfaces with SVG, DHTML, and Ajax Whether you're a newcomer or an expert, you'll find great value in PHP Hacks, the only PHP guide that offers something useful and fun for everyone.

Getting Started with Flex 3: An Adobe Developer Library Pocket Guide for Developers (Pocket Reference (O'Reilly))

by Jack D. Herrington Emily Kim

Discover how easy RIA development can be with this one-of-a-kind handbook from the Adobe Developer Library. Several clear, step-by-step mini-tutorials teach you about web services, event handling, designing user interfaces with reusable components, and more. After finishing this guide, you'll be able to build Flash applications ranging from widgets to full-featured RIAs using the Flex SDK and Flex Builder 3.0. With Getting Started with Flex 3, you will: Walk through sample RIA projects and see examples of amazing applications people have built with Flex Work with ActionScript 3.0 and the MXML markup language Build user interfaces using the controls and tools available with the framework Get a tour of controls available commercially and through open source Learn how Flex integrates with ASP.NET, ColdFusion, PHP, and J2EE in the server Build Flex-based widgets that let you display real-time data Use advanced controls to build 3D graphs, data dashboards, mapping applications, and more You'll find complete code for video players, a slideshow, a chat client, and an RSS reader, just to name a few. You also get plenty of tips, tricks, and techniques to leverage your existing programming skills, whether you come from an open source or Visual Studio-intensive background.

A Guide to Authentic e-Learning (Connecting with E-learning)

by Jan Herrington Thomas C. Reeves Ron Oliver

Part of the groundbreaking Connecting with e-Learning series, A Guide to Authentic e-Learning provides effective, working examples to engage learners with authentic tasks in online settings. As technology continues to open up possibilities for innovative and effective teaching and learning opportunities, students and teachers are no longer content to accept familiar classroom or lecture-based pedagogies that rely on information delivery and little else. Situated and constructivist theories advocate that learning is best achieved in circumstances resembling the real-life application of knowledge. While there are multiple learning design models that share similar foundations, authentic e-learning tasks go beyond process to become complex, sustained activities that draw on realistic situations to produce realistic outcomes. A Guide to Authentic e-Learning: develops the conceptual framework for authentic learning tasks in online environments provides practical guidance on design, implementation, and evaluation of authentic e-learning tasks includes case studies and examples of outcomes of using authentic e-learning tasks Written for teaching professionals in Higher Education who teach online, A Guide to Authentic e-Learning offers concrete guidelines and examples for developing and implementing authentic e-learning tasks in ways that challenge students to maximize their learning. This essential book provides effective, working examples to engages learners with authentic tasks in online learning settings.

Grundlagen der Anforderungsanalyse: Standardkonformes Requirements Engineering

by Andrea Herrmann

Dieses Buch zeigt ein systematisches, mit aktuellen Standards konformes Vorgehen für die gesamte Anforderungsanalyse bzw. das Requirements Engineering. Dieses Vorgehen wird durch konkrete Beispiele und zwei durchgängige, nicht zu einfache Fallstudien illustriert: das Buchportal und das Fitness-Armband. Die verwendeten Vorlagen sowie agilen und nichtagilen Techniken haben sich in der Praxis bewährt. So können Sie heute schon anfangen, diese Techniken anzuwenden!

Ganzheitliches Life Cycle Management

by Christoph Herrmann

Wenn Unternehmen die Anforderungen einer nachhaltigen Entwicklung umsetzen, stehen sie vor der zentralen Aufgabe, Produkte und Prozesse lebensphasenübergreifend zu betrachten. Der Autor stellt die Gestaltungsmöglichkeiten des Life Cycle Managements vor und unterscheidet zwischen lebensphasenbezogenen Disziplinen wie z. B. dem Produkt- und Produktions-Management sowie lebensphasenübergreifenden Disziplinen (z. B. Informations- und Wissensmanagement). Zahlreiche Anwendungsbeispiele und Abbildungen dienen der Veranschaulichung der Inhalte.

Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI

by Debra S. Herrmann

While it has become increasingly apparent that individuals and organizations need a security metrics program, it has been exceedingly difficult to define exactly what that means in a given situation. There are hundreds of metrics to choose from and an organization's mission, industry, and size will affect the nature and scope of the task as well as

Teach Yourself CGI Programming With Perl 5 In A Week, Second Edition

by Eric Herrmann

The CGI or common gateway interface is a program that runs on a web server and does things behind the scenes. It might be a counter of visitors or a program to e-mail the contents of a user-submitted form. The Perl scripting language is one way of creating CGIs and its intracacies are discussed in exhaustively in this tutorial.

Datenorganisation und Datenbanken: Praxisorientierte Übungen mit MS Access 2016

by Frank Herrmann

Hinter jedem elektronischen Informationssystem, hinter jeder Bestellung im Internet steht eine Datenbank. Wer solche Datenbanken entwerfen und aufbauen will, benötigt umfassende theoretische Kenntnisse über die logische und physische Datenorganisation Dieses Lehrbuch verknüpft Theorie und Praxis und führt in die Grundlagen der Datenorganisation und ihre Anwendung in Datenbanken mit Access ein. Der Autor behandelt ein breites Themenspektrum, mit dem Leser umfassende Kenntnisse zu verschiedenen Datenorganisationsmodellen, wie beispielsweise relationale oder Netzwerk-Datenmodelle, zu den unterschiedlichen Datenbankmanagementsystemen sowie zur Weiterentwicklung von bestehenden Datenbanken erwerben. Das Buch zeichnet sich durch eine klar strukturierte und anwendungsnahe Vermittlung der Lehrinhalte aus. Die verschiedenen Problemstellungen werden durch zahlreiche Lösungshinweise, Beispiele und Bilder veranschaulicht. Anhand der vielen begleitenden Übungen, die sich gleichermaßen für die Einzel- und Gruppenarbeit eigenen, können Leser ihre frisch erworbenen Kenntnisse zur Datenbankentwicklung direkt in die Praxis umsetzen.Mit dem Lehrbuch bildet der Autor den gesamten Stoff einer Hochschul-Veranstaltung in den Fächern Informatik oder Wirtschaftsinformatik mit einem Umfang von 20 Stunden Vorlesung und 20 Stunden Übungen ab. Studierende finden hier ein begleitendes Lernbuch zu Vorlesungen und Übungen, während Dozenten es zur Vorbereitung von Lehrveranstaltungen einsetzen können. Darüber hinaus eignet sich das Buch für den Informatik-Unterricht an Schulen und für Schulungen sowie für die individuelle Weiterbildung im Bereich Datenbankanwendung und Datenbankentwicklung mit Microsoft Access.

Metareasoning for Robots: Adapting in Dynamic and Uncertain Environments (Synthesis Lectures on Computer Science)

by Jeffrey W. Herrmann

This book is a state of the art resource that robotics researchers and engineers can use to make their robots and autonomous vehicles smarter. Readers will be able to describe metareasoning, select an appropriate metareasoning approach, and synthesize metareasoning policies. Metareasoning for Robots adopts a systems engineering perspective in which metareasoning is an approach that can improve the overall robot or autonomous system, not just one component or subsystem. This book introduces key concepts, discusses design options for metareasoning approaches and policies, and presents approaches for testing and evaluation of metareasoning policies. After considering the conceptual design phase, it discusses how to implement metareasoning in the robot’s software architecture and how to synthesize metareasoning policies. Every chapter has references to valuable works on robotics and metareasoning, and the book uses examples from the author’s own research and from other research groups to illustrate these ideas. In addition, this book provides links to books and papers for readers who wish to investigate these topics further.

Node.js Web Development: Server-side development with Node 10 made easy, 4th Edition

by David Herron

Create real-time applications using Node.js 10, Docker, MySQL, MongoDB, and Socket.IO with this practical guide and go beyond the developer's laptop to cover live deployment, including HTTPS and hardened security.Key FeaturesLearn server-side JavaScript coding through the most up-to-date book on Node.jsExplore the latest JavaScript features, and EcmaScript modulesWalk through different stages of developing robust applications using Node.js 10Book Description Node.js is a server-side JavaScript platform using an event-driven, non-blocking I/O model allowing users to build fast and scalable data-intensive applications running in real time. This book gives you an excellent starting point, bringing you straight to the heart of developing web applications with Node.js. You will progress from a rudimentary knowledge of JavaScript and server-side development to being able to create, maintain, deploy and test your own Node.js application.You will understand the importance of transitioning to functions that return Promise objects, and the difference between fs, fs/promises and fs-extra. With this book you'll learn how to use the HTTP Server and Client objects, data storage with both SQL and MongoDB databases, real-time applications with Socket.IO, mobile-first theming with Bootstrap, microservice deployment with Docker, authenticating against third-party services using OAuth, and use some well known tools to beef up security of Express 4.16 applications.What you will learnInstall and use Node.js 10 for both development and deploymentUse the Express 4.16 application frameworkWork with REST service development using the Restify frameworkUse data storage engines such as MySQL, SQLITE3, and MongoDBUse User authentication methods with OAuth2Perform Real-time communication with the front-end using Socket.IOImplement Docker microservices in development, testing and deployment Perform unit testing with Mocha 5.x, and functional testing with Puppeteer 1.1.xWork with HTTPS using Let’s Encrypt, and application security with HelmetWho this book is forThis book is for anybody looking for an alternative to the "P" languages (Perl, PHP, and Python), or anyone looking for a new paradigm of server-side application development. You should have at least a rudimentary understanding of JavaScript and web application development.

Node.js Web Development: Server-side web development made easy with Node 14 using practical examples, 5th Edition

by David Herron

Build scalable web applications using Node.js, Express.js, and the latest ECMAScript techniques, along with deploying applications with AWS and Docker with this updated fifth edition Key Features Learn backend web programming with the JavaScript stack Explore best practices, right from configuring and building web servers to deploying them on a production cloud hosting system: AWS using Docker and Terraform Work through the different stages of developing robust and scalable apps using Node.js 14 Book Description Node.js is the leading choice of server-side web development platform, enabling developers to use the same tools and paradigms for both server-side and client-side software. This updated fifth edition of Node.js Web Development focuses on the new features of Node.js 14, Express 4.x, and ECMAScript, taking you through modern concepts, techniques, and best practices for using Node.js. The book starts by helping you get to grips with the concepts of building server-side web apps with Node.js. You'll learn how to develop a complete Node.js web app, with a backend database tier to help you explore several databases. You'll deploy the app to real web servers, including a cloud hosting platform built on AWS EC2 using Terraform and Docker Swarm, while integrating other tools such as Redis and NGINX. As you advance, you'll learn about unit and functional testing, along with deploying test infrastructure using Docker. Finally, you'll discover how to harden Node.js app security, use Let's Encrypt to provision the HTTPS service, and implement several forms of app security with the help of expert practices. With each chapter, the book will help you put your knowledge into practice throughout the entire life cycle of developing a web app. By the end of this Node.js book, you'll have gained practical Node.js web development knowledge and be able to build and deploy your own apps on a public web hosting solution. What you will learn Install and use Node.js 14 and Express 4.17 for both web development and deployment Implement RESTful web services using the Restify framework Develop, test, and deploy microservices using Docker, Docker Swarm, and Node.js, on AWS EC2 using Terraform Get up to speed with using data storage engines such as MySQL, SQLite3, and MongoDB Test your web applications using unit testing with Mocha, and headless browser testing with Puppeteer Implement HTTPS using Let's Encrypt and enhance application security with Helmet Who this book is for If you're looking for an alternative to the 'P' languages (Perl, PHP, and Python), or if you want to get started with server-side web development with JavaScript programming, or if you want a deep dive into deploying services to cloud hosting, this Node.js book is for you. A rudimentary understanding of JavaScript and web application development is a must before you get started with this book.

Node.js Web Development - Third Edition

by David Herron

Create real-time server-side applications with this practical, step-by-step guide About This Book * Learn about server-side JavaScript with Node.js and Node modules through the most up-to-date book on Node.js web development * Understand website development both with and without the Connect/Express web application framework * Develop both HTTP server and client applications Who This Book Is For This book is for anybody looking for an alternative to the "P" languages (Perl, PHP, and Python), or anyone looking for a new paradigm of server-side application development. You should have at least a rudimentary understanding of JavaScript and web application development. What You Will Learn * Install and use Node.js for both development and deployment * Use the Express application framework * Configure Bootstrap for mobile-first theming * Use data storage engines such as MySQL, SQLITE3, and MongoDB * Understand user authentication methods, including OAuth, with third-party services * Deploy Node.js to live servers, including microservice development with Docker * Perform unit testing with Mocha * Perform functional testing of the web application with CasperJS In Detail Node.js is a server-side JavaScript platform using an event driven, non-blocking I/O model allowing users to build fast and scalable data-intensive applications running in real time. Node.js Web Development shows JavaScript is not just for browser-side applications. It can be used for server-side web application development, real-time applications, microservices, and much more. This book gives you an excellent starting point, bringing you straight to the heart of developing web applications with Node.js. You will progress from a rudimentary knowledge of JavaScript and server-side development to being able to create and maintain your own Node.js application. With this book you'll learn how to use the HTTP Server and Client objects, data storage with both SQL and MongoDB databases, real-time applications with Socket.IO, mobile-first theming with Bootstrap, microservice deployment with Docker, authenticating against third-party services using OAuth, and much more. Style and Approach This book is a practical guide for anyone looking to develop striking and robust web applications using Node.js.

Node Web Development

by David Herron

This book is a practical introduction to learning about Node. Each chapter introduces you to a different area of Node, using screenshots and examples to get you up and running as quickly as possible. If you are a developer who wants to use JavaScript on the server side in order to build quicker, higher performing web applications, then this book is for you. It is recommended that you should have at least a rudimentary understanding of JavaScript and web application development.

Node Web Development, Second Edition

by David Herron

Presented in a simple, step-by-step format, this book is an introduction to web development with Node.This book is for anybody looking for an alternative to the "P" languages (Perl, PHP, Python), or anyone looking for a new paradigm of server-side application development.The reader should have at least a rudimentary understanding of JavaScript and web application development.

Learning Cython Programming

by Philip Herron

A practical and a fast-paced guide that gives you all the information you need to start programming using Cython.This book is for developers who love C/C++ for low latency and speed but who also require the ability to add more dynamic features to applications both fast and reliably. It will also show you how you can get new applications off the ground by reusing Python libraries to get started.

Learning Cython Programming - Second Edition

by Philip Herron

Learn the fundamentals of Cython to extend the legacy of your applications About This Book * Learn how to extend C applications with pure Python code * Get more from Python - you'll not only learn Cython, you'll also unlock a greater understanding of how to harness Python * Packed with tips and tricks that make Cython look easy, dive into this accessible programming guide and find out what happens when you bring C and Python together! Who This Book Is For This book is for developers who are familiar with the basics of C and Python programming and wish to learn Cython programming to extend their applications. What You Will Learn * Reuse Python logging in C * Make an IRC bot out of your C application * Extend an application so you have a web server for rest calls * Practice Cython against your C++ code * Discover tricks to work with Python ConfigParser in C * Create Python bindings for native libraries * Find out about threading and concurrency related to GIL * Expand Terminal Multiplexer Tmux with Cython In Detail Cython is a hybrid programming language used to write C extensions for Python language. Combining the practicality of Python and speed and ease of the C language it's an exciting language worth learning if you want to build fast applications with ease. This new edition of Learning Cython Programming shows you how to get started, taking you through the fundamentals so you can begin to experience its unique powers. You'll find out how to get set up, before exploring the relationship between Python and Cython. You'll also look at debugging Cython, before moving on to C++ constructs, Caveat on C++ usage, Python threading and GIL in Cython. Finally, you'll learn object initialization and compile time, and gain a deeper insight into Python 3, which will help you not only become a confident Cython developer, but a much more fluent Python developer too. Style and approach This practical and a fast-paced guide gives you all the information you need to start programming using Cython.

Ethics and Human Behaviour in ICT Development: International Case Studies with a Focus on Poland

by Marion Hersh Józef B. Lewoc

Ethics and Human Behaviour in ICT Development discusses ethics in a professional context and encourages readers to self-assessment of their own behaviour. It provides thought-provoking accounts of the little-known early history of technological development in information and communication technology (ICT) and the automation industry in Poland, with a focus on Wroclaw. The book provides a framework for understanding the relationship between ethics and behaviour, and analyses critically ethical and behavioural issues in challenging workplaces and social contexts. It includes:case studies from around the world, especially Poland, which illustrate the relationships between human behaviour and ethics;biographies of successful Polish ICT and automation leading designers;analysis of case studies of human behaviour and ethics in challenging industrial development and other environments; andillustrative practical applications alongside the theory of human behaviour and ethics. The authors demonstrate the ingenuity of the early Polish designers, programmers and other specialists in overcoming the shortage of components caused by import embargoes to enable Poland to develop its own computer industry. An example of this is Elwro, formerly the largest manufacturer of computers in Poland. The discussion of its growth illustrates the potential of human creativity to overcome problems. The discussion of its fall highlights the importance of ethical approaches to technology transfer and the dangers of a colonialist mentality. The book is designed for engineers, computer scientists, researchers and professionals alike, as well as being of interest for those broadly concerned with ethics and human behaviour.

Avid Media Composer 6.x Cookbook

by Benjamin Hershleder

Written in a Cookbook style, it's packed with logically-sequenced recipes to gain deeper understanding of the software. Each recipe contains step-by-step instructions followed by analysis of what was done in each task and other useful information. The book is designed so that you can read it chapter by chapter, or you can look at the list of recipes and refer to them in no particular order. If you are new to editing with Avid, this book will help you get the most out of Avid Media Composer right from the start. Even if you are intermediately experienced with Avid, you will discover new methods and gain a deeper understanding to take your Avid experience to the next level, with greater confidence.

Data Protection and Privacy: (Law, Governance and Technology Series #36)

by Paul De Hert Serge Gutwirth Ronald Leenes Rosamunde Van Brakel

This book features peer reviewed contributions from across the disciplines on themes relating to protection of data and to privacy protection. The authors explore fundamental and legal questions, investigate case studies and consider concepts and tools such as privacy by design, the risks of surveillance and fostering trust. Readers may trace both technological and legal evolution as chapters examine current developments in ICT such as cloud computing and the Internet of Things. Written during the process of the fundamental revision of revision of EU data protection law (the 1995 Data Protection Directive), this volume is highly topical. Since the European Parliament has adopted the General Data Protection Regulation (Regulation 2016/679), which will apply from 25 May 2018, there are many details to be sorted out. This volume identifies and exemplifies key, contemporary issues. From fundamental rights and offline alternatives, through transparency requirements to health data breaches, the reader is provided with a rich and detailed picture, including some daring approaches to privacy and data protection. The book will inform and inspire all stakeholders. Researchers with an interest in the philosophy of law and philosophy of technology, in computers and society, and in European and International law will all find something of value in this stimulating and engaging work.

Computers, Privacy and Data Protection: An Element Of Choice

by Paul De Hert Yves Poullet Serge Gutwirth Ronald Leenes

This timely interdisciplinary work on current developments in ICT and privacy/data protection, coincides as it does with the rethinking of the Data Protection Directive, the contentious debates on data sharing with the USA (SWIFT, PNR) and the judicial and political resistance against data retention. The authors of the contributions focus on particular and pertinent issues from the perspective of their different disciplines which range from the legal through sociology, surveillance studies and technology assessment, to computer sciences. Such issues include cutting-edge developments in the field of cloud computing, ambient intelligence and PETs; data retention, PNR-agreements, property in personal data and the right to personal identity; electronic road tolling, HIV-related information, criminal records and teenager's online conduct, to name but a few.

European Data Protection: Coming of Age

by Paul De Hert Yves Poullet Ronald Leenes Serge Gutwirth

On 25 January 2012, the European Commission presented its long awaited new "Data protection package". With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory network was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media.

Enforcing Privacy

by Paul De Hert David Wright

This book is about enforcing privacy and data protection. It demonstrates different approaches - regulatory, legal and technological - to enforcing privacy. If regulators do not enforce laws or regulations or codes or do not have the resources, political support or wherewithal to enforce them, they effectively eviscerate and make meaningless such laws or regulations or codes, no matter how laudable or well-intentioned. In some cases, however, the mere existence of such laws or regulations, combined with a credible threat to invoke them, is sufficient for regulatory purposes. But the threat has to be credible. As some of the authors in this book make clear - it is a theme that runs throughout this book - "carrots" and "soft law" need to be backed up by "sticks" and "hard law". The authors of this book view privacy enforcement as an activity that goes beyond regulatory enforcement, however. In some sense, enforcing privacy is a task that befalls to all of us. Privacy advocates and members of the public can play an important role in combatting the continuing intrusions upon privacy by governments, intelligence agencies and big companies. Contributors to this book - including regulators, privacy advocates, academics, SMEs, a Member of the European Parliament, lawyers and a technology researcher - share their views in the one and only book on Enforcing Privacy.

Forms and Functions of Endings in Narrative Digital Games (Routledge Advances in Game Studies)

by Michelle Herte

This book looks closely at the endings of narrative digital games, examining their ways of concluding the processes of both storytelling and play in order to gain insight into what endings are and how we identify them in different media. While narrative digital games share many representational strategies for signalling their upcoming end with more traditional narrative media – such as novels or movies – they also show many forms of endings that often radically differ from our conventional understanding of conclusion and closure. From vast game worlds that remain open for play after a story’s finale, to multiple endings that are often hailed as a means for players to create their own stories, to the potentially tragic endings of failure and "game over", digital games question the traditional singularity and finality of endings. Using a broad range of examples, this book delves deeply into these and other forms and their functions, both to reveal the closural specificities of the ludonarrative hybrid that digital games are, as well as to find the core elements that characterise endings in any medium. It examines how endings make themselves known to players and raises the question of how well-established closural conventions blend with play and a player’s effort to achieve a goal. As an interdisciplinary study that draws on game studies as much as on transmedial narratology, Forms and Functions of Endings in Narrative Digital Games is suited for scholars and students of digital games as well as for narratologists yet to become familiar with this medium.

Industrielle Dienstleistungen 4.0: HMD Best Paper Award 2015 (essentials)

by Matthias M. Herterich Falk Uebernickel Walter Brenner

Auf Basis empirischer Daten von 45 konkreten Anwendungsfällen identifiziert dieses essential Nutzenpotentiale cyber-physischer Systeme im Kontext industrieller Dienstleistungen. Die Autoren nennen Implikationen und Handlungsempfehlungen für die Unternehmenspraxis. Die Leser erfahren, wie die fortschreitende Digitalisierung und der geschickte Einsatz cyber-physischer Systeme das Dienstleistungsgeschäft der produzierenden Industrie sowie im Maschinen- und Anlagenbau transformieren. Damit ergeben sich einerseits neue Möglichkeiten zur Effizienzsteigerung bereits bestehender Prozesse. Andererseits eröffnen sich bisher ungeahnte Möglichkeiten zur Umsetzung innovativer, datengetriebener industrieller Dienstleistungen.

Der ERP-Irrglaube im Mittelstand: Wie Sie als Entscheider das Thema ERP zum Erfolg führen

by Tobias Hertfelder Philipp Futterknecht

ERP-Systeme werden häufig als echte Wunderwaffen angepriesen, mit denen Unternehmen unkompliziert Kosten sparen und gleichzeitig noch Wachstum generieren. Dennoch laufen ERP-Projekte immer wieder teils komplett aus dem Ruder. In ihrem Buch zeigen Tobias Hertfelder und Philipp Futterknecht auf warum ERP Projekte zum Großteil keine IT- Themen sondern Chefsache sind. Denn ohne klare Richtung automatisiert man an dieser Stelle in die falsche Richtung. Warum beißen sich viele Unternehmen die Zähne an diesen Softwarelösungen aus? Lernen Sie, wie Sie Ihre eigene Strategie formulieren und erfahren Sie , wie erfolgreiche Transformationsprozesse in mittelständischen Organisationen ablaufen. Zudem zeigen die Autoren konkret auf, unter welchen Bedingungen die Implementierung eines ERP-Systems zum Scheitern verurteilt ist. All dies macht das Buch „Der ERP-Irrglaube im Mittelstand“ zu einem praktischen Leitfaden, der Ihnen hilft, die Wettbewerbsstärke und Umsatzrendite Ihres Unternehmens mit zukünftigen ERP-Entscheidungen zu steigern. Anschließend gehen die Autoren auf folgende Aspekte ein: • Arztbesuch: Warum einen Experten ins Haus holen, wenn ich gesund bin? • Diagnose Selbsterkenntnis: Ohne Ziele keine Maßnahmen • „Schuster, bleib bei deinen Leisten!“: Warum Sie lieber in Ihrem Kerngeschäft bleiben sollten • Wie Ihre Schatten-IT Ihr Geld verschlingt • Wachstumsschmerz: Nimmt Ihre Effizienz mit dem Wachstum ab? Dadurch lernen Sie, wie Sie in Ihrer Firma klare Genesungsziele definieren und Veränderungen herbeiführen. Schärfen Sie Ihren Blick dafür, wie Sie Wertschöpfungs- Potenziale erkennen und nutzen. Die Autoren liefern Ihnen die nötigen Ansätze, um eine konkrete Strategie zur Einführung von ERP selbst zu gestalten. Zu empfehlen ist dieses Werk speziell für:· Inhaber und Geschäftsführer von KMU · IT-Leiter in Unternehmen · Entscheider in mittelständischen Unternehmen · Studierende im Bereich Wirtschaftswissenschaft

Refine Search

Showing 20,001 through 20,025 of 54,498 results