Search Results (121 titles)

Searched over 21.6 Million titles in 0.36 seconds

 
Technology (X)

       
1
|
2
|
3
|
4
|
5
Records: 21 - 40 of 121 - Pages: 
  • Cover Image

Jumpstart to Software Quality Assurance : Volume First

By: Vishnuvarthanan Moorthy

Software Quality Assurance is a specialized activity and it contributes in building capable processes in organization. This book details the different knowledge areas and provides practical insight which is required for software quality analyst to quickly grasp and start being productive within days, and contributes to build such capable processes. This book details the basics of quality assurance, relevant techniques and methods used in quality assurance. What is in there? • A quick description of various knowledge areas in software quality assurance • Frequently used tools and techniques in Software quality assurance • Sample cases to understand the concepts Why this book? • A simple ready recknor for SQA • Mix of pragmatic and theoretical elaborations • Industry specific and current needs of Industry is taken care • Short book for quick read Who should read? • People who are interested in making a career in software quality assurance • Who are interested in understanding Quality assurance • Who are leading an organization and wants to set up the Quality assurance function ...

Audit Expectations: An audit is expected to check, does the Quality System meet the requirements of the relevant Quality System Standard/model or Contract? Does the organization do what the Quality System specifies? Is the Quality System, as implemented, effective in ensuring maintenance and improvement of the quality of products and services? Audit is not an alternative to an inspection operation and cannot serve as a crutch to an ineffective inspection or quality system Types of Audit: • First Party Audit (Internal Audits) • Second Party Audit (Customer Audits) • Third Party Audit (Audit Agencies) Horizontal and Vertical Audits: • Horizontal Audit - Assess same aspect in all projects. • Vertical Audit - Assess all aspects in one project • forward tracking • backward tracking • Hybrid Audits - Mixing Horizontal and Vertical Audits Audit Team: One or more auditors conducting an audit, supported if needed by Technical Experts. The auditors are lead by Lead Auditor. One or more auditees represent the function or the organization. Lead Auditor Responsibilities: (Second party and Third party audits) • Negotiate scope ...

Quality Fundamentals Quality Assurance Functions Lifecycle Models Project Management Configuration Management Software Estimation Risk and Issue Management Tailoring and Waivering Software Engineering - Development Service Management Reviews Metrics Core SQA Activities Quality Audits Quality Control Tools and Basic Statistics Standards (ISO 9001, 20000, 27001) and Models (CMMI, PCMM) Agile Scrum Earned Value Analysis Reference Sites ...

Read More
  • Cover Image

CMMI Implementation Guide : A Practitioner's Persepective

By: Vishnuvarthanan Moorthy

The Book details on how to approach CMMI Implementation in an organization. It details out the various phases involved in CMMI Implementation and how to plan and execute them. It details on various aspects which we tend to overlook in CMMI Implementation. Who Should Read? • Organization looking forward to implement CMMI • Top Management person, trying to understand how to go about • SEPG, Program manager and Process Quality members • Anyone who is interested in understanding the Implementation of CMMI Why to Read? • To get complete End to End understanding on CMMI Implementation Lifecycle • Plan your budget, effort and resources for the program • Set your expectations clear on CMMI Implementation • Be aware of the different aspects in Implementation How it’s different: • Written from practitioners’ point of view • Communicates the reality in practical implementation Word of Caution: • The book contains only samples and typical examples and they are not comprehensive and to be verified and validated on a particular context for applicability ...

This CMMI Implementation Guide is a reference book for anyone interested in implementing CMMI in their organization. The purpose of this book is, to provide insight in to CMMI Implementation phases and best practices to be followed in this journey. Most of us agree, that CMMI is more a De facto model that IT Industry follows and other industries also has shown lot of interest in adopting this model. The day to day popularity and its adoption rate is on the surge for CMMI. In this scenario, this book will help the new organizations and implementers, on how to approach CMMI Implementation practically in their organization. This book is not a replacement to the Model or to the resources which CMMI Institute Publishes. This is only an additional resource which user can benefit from. CMMI Institute holds the complete authority and rights to CMMI model and all the components within the framework. This book is prepared based on the experience of a practitioner on implementing the model in various organizations. The Author has worked in multiple roles in CMMI Implementation and has global exposure in implementing the model. We reiterate ...

Contents Introduction to CMMI Initiating CMMI Implementation Planning CMMI Implementation Executing CMMI Implementation Appraising CMMI Implementation Sustaining CMMI Implementation CMMI High Maturity Implementation Miscellaneous References ...

Read More
  • Cover Image

No Frills on Java - Introductory Level

By: sherif hassan sadek

By the end of this book, you will be familiar with the programming world, be able to write a Java class and instantiate (create) objects that represent these classes and put them into action. You will be able to write a professional code and to deal with code written by others. The topics are tied together, and built on each other, so, if this is your first time with Java, it is recommended to read the chapters in the same sequence they are presented in the book. We...

Is this book for me, do I need to read_the_book? 1. If these are your first steps to Java, then read_the_book = yes. 2. If you are not looking for a reference, but for a book that will help you understand the world of Object Oriented Programming beside Java, then read_the_book = yes. 3. If you want to focus on the 20% knowledge that will help you to do 80% of tasks required, then read_the_book = yes. If you are looking for a pile of real world scenarios and training, then read_the_book = yes....

Bird’s View • Software development life cycle (SDLC)……….…06 • Approaches to develop SDLC…………………………..08 • Object Oriented features………………………….…….14 • Java features………………………………………….……….16 • Requirements of a good program…………………...19 01 2 Class/Object 22 3 Mapping • map class to Java code…………………………………….35 • map class data members to Java code…………….36 • map class method members to Java code……….40 • Method signature……………………………………………48 • deprecated methods……………………………………...49 • passing Java arguments…………………………………..49 33 4 Java Tools 52 5 Problem solving 66 6 Simple-Level Logic • Type casting…………………………………………………...77 • Local variables………………………………………….…….78 • Simple operations…………………………………………..82 • Arithmetic operators……………………………….……..83 75 7 Moderate-Level Logic • Relation operators……………………………………..….091 • Equality operators………………………………….………091 • Conditional operators……………………………….…..091 • packaging……………………………………………………….097 • increment/decrement operators……………….….101 • Conditional statements • if………………………………….091 • switch…………………….……112 • ?:…………………………….…..115 • looping statements • for………………………………...117 • whil...

Read More
  • Cover Image

Get Started with Video Captioning : A Beginner's Guide to Making Video Accessible: A Beginner's Guide to Making Video Accessible

By: Patrick Joseph Besong

Have a video that you need to make accessible, but don't have a clue how to start? This book will get you up and running in no time. It will show you how in layman's language how to go about the task of closed captioning your videos, what the different formats are, what software to use, and will also go over the basic style guidelines in creating captioned videos....

Captioning video not only makes video accessible to the deaf and hard-of-hearing, but there are other compelling reasons for it as well. These are also good talking points to convince others of the need to caption video. • Captioned videos have better user retention of the video content. • The video’s transcripts are searchable, so you will get better Search Engine Optimization (SEO), which may give you a leg up on your competition. • Captioned video also opens your market reach to a whole new segment of paying customers - the deaf! • It’s the law. Many videos that are provided to the public must be captioned either due to federal communication law, or merely a company’s policy regarding accessibility. • Language learning relies heavily on captioned video. • If the viewer is in a noisy area and does not have access to headphones, the captions can be read while watching the video. • Similarly, if the viewer does not have headphones and cannot turn up the volume due to the need to keep noise to a minimum (like in a library or nursery), the captions are there to provide what is being spoken....

Preface 1. Why Caption Video? 2. Captioning Formats 3. Helpful Software 4. Captioning Style Guide Helpful Video Captioning Related Links About the Author...

Read More
  • Cover Image

Mathematics for Computer Scientists

By: Gareth J. Janacek; Mark Lemmon Close

Aim of this book is to present basic mathematics that is needed by computer scientists The reader is not expected to be a mathematician and we hope you will find what follows to be useful....

Read More
  • Cover Image

C Programming in Linux

By: David Haskins

An introductory how to guide on C programming in linux.

Read More
  • Cover Image

An Introduction to Relational Database Theory

By: Hugh Darwen

An introduction to relational database theory.

Read More
  • Cover Image

Java : The Fundamentals of Objects and Classes; An Introduction to Java Programming

By: David Etheridge

An introduction to java programming.

Read More
  • Cover Image

The Warp Drive : Hyper-fast Travel Within General Relativity

By: Miguel Alcubierre

It is shown how, within the framework of general relativity and without the introduction of wormholes, it is possible to modify a spacetime in a way that allows a spaceship to travel with an arbitrarily large speed. By a purely local expansion of spacetime behind the spaceship and an opposite contraction in front of it, motion faster than the speed of light as seen by observers outside the disturbed region is possible. The resulting distortion is reminiscent of the "warp drive" of science fiction. However, just as it happens with wormholes, exotic matter will be needed in order to generate a distortion of spacetime like the one discussed here....

Read More
  • Cover Image

Comment créer et Optimiser son profil Google+ : Pour plus de visibilité, Volume 1: Pour plus de visibilité

By: Noel NGUESSAN; Noel NGUESSAN, Editor

Le lancement du concept de Google AuthorShip apporte encore plus d’intérêt au profil Google+. Et ce, dans la mesure où il permet à Google de mettre plus en valeur et de favoriser le profil Google+ de chaque auteur identifié sur ses pages de résultats. C’est d’ailleurs ce qu’a récemment confirmé Eric Schmidt, Président du Conseil d’Administration de Google. Par conséquent, bien optimiser son profil permet de tirer avantage de cette faveur que Google compte accorder aux auteurs ayant créé un profil Google+ et l’ayant lié à tous leurs contenus. Découvrez donc dans cet eBook gratuit comment vous y prendre pour réussir l’optimisation de votre profil Google+ qui va de plus en plus influencer votre classement sur le moteur Google....

Google+ est le réseau social de Google lancé en juin 2011 et qui compterait plus de 550 millions d'utilisateurs dont 345 millions d'actifs au dernier pointage. On pourrait penser qu'avec Google+, Google essaie de concurrencer Facebook sur son propre terrain en espérant, bien sûr, prendre sa place de leader dans ce créneau. Mais, en fait, ce n'est pas vraiment la place de leader qui intéresse réellement Google. Même si cela ne lui déplairait pas d'occuper cette place. La raison principale pour laquelle Google a lancé Google+ réside surtout dans la récupération des données personnelles des internautes. Car, avoir plus de données de ses utilisateurs, c'est bien entendu pouvoir fournir des résultats personnalisés et surtout pouvoir vendre de la publicité très ciblée à chacun d'eux. Google envisage donc, avec Google+, de changer le monde de l'internet en profondeur. Et pour ce faire, il lui faut plus de données personnelles, une meilleure identification des individus et plus d'intégration de tous ses services. Google+ n'est pas encore un produit fini comme l'ont été Buzz ou Orkut. Mais, il bel et bien un projet de Goo...

Introduction Les fonctionnalités de Google+ Optimisation du profil Google+ Conseils pour plus de performances Importance du bouton Google +1 ...

Read More
  • Cover Image

Affiliate Assassin to Create Targeted Affiliate Marketing Campaigns : Affiliate Assassin, Volume 84: Affiliate Assassin

By: Jeffrey Benson

Discover how to create laser targeted affiliate marketing campaigns

you can literally start making money online in a matter of a few days, even a few hours.

INTRODUCTION TO AFFILIATE ASSASSIN 3 CHOOSING THE RIGHT PRODUCTS 4 MONEY WITH REVIEW SITES 13 CATER TO HUNGRY BUYERS 13 HOW TO MAKE MONEY WITH AN AMAZON REVIEW SITE 19 MAKING MONEY WITH CPA OFFERS 22 LIST BUILDING PROFIT PLAN 27 THE TOOLS YOU NEED 28 CREATING A HIGH CONVERTING SQUEEZE PAGE 36 INCENTIVE OFFERS: UP CLOSE 41 PROMOTING YOUR SQUEEZE PAGE FOR MAXIMUM PROFITS 42 LIST BUILDING OVERVIEW 49 QUICK AFFILIATE CASH STRATEGIES 51 DESPERATE MARKET PROFITS 55 LAUNCHING YOUR CAMPAIGNS 65 KEYWORD RESEARCH MADE EASY 66 MARKETING YOUR AFFILIATE CAMPAIGNS 72 GENERATE TRAFFIC FROM BACKLINKS 75 GENERATE TRAFFIC FROM SOCIAL MEDIA SITES 78 GENERATE TRAFFIC FROM DIRECTORIES 80 ...

Read More
  • Cover Image

Facebook Marketing Profit Masters : Learn the Most Profitable Strategies to Profit from Facebook: Learn the Most Profitable Strategies to Profit from Facebook

By: David Drummy Lewis, Mr.

***Learn proven strategies to earn passive income using Facebook. A step by step process to profit from Facebook while helping people.*** You need this training! Also i encourage you to download and share this free guide with your friends. Thank you ...

Read More
  • Cover Image

Using Visual SourceSafe : SourceSafe / VSS Tutorial, Volume 163: SourceSafe / VSS Tutorial

By: Kevin Gao

Although this SourceSafe tutorial can be used for anyone who is interested in SourceSafe, it is mainly for software developers. As you may have been using SourceSafe for a long time and know many features of VSS, I will try to make the table of the content easy to navigate so hopefully you can easily find the information that you are interested in....

In this SourceSafe How To series / tutorial, I will write some guides, How To and FAQs about SourceSafe and will also post resources I found on the internet. This series will cover some basic and intermediate topics of SourceSafe as well as some advanced topics....

Introduction _________________________________________________________ 4 What is VSS? ________________________________________________________ 5 Market position _______________________________________________________ 6 What can VSS do? ____________________________________________________ 7 History preserving _____________________________________________________________ 7 File Difference _________________________________________________________________ 8 Project/Folder Difference _______________________________________________________ 9 Easy Collaboration ____________________________________________________________ 10 Several Important Concepts ___________________________________________ 12 VSS Database/Repository _____________________________________________________ 12 Working Folder _______________________________________________________________ 12 Master Copy and Local Copy ___________________________________________________ 12 Basic operations ____________________________________________________ 13 Add _________________________________________________________________________ 13 Get _________________...

Read More
  • Cover Image

X-15 Research Results

By: Wendell H. Stillwell

This semi-technical summary of the X–15 program is directed toward the less publicized aspects of its achievements.

Read More
  • Cover Image

Wright Flyer Paper : How Small Is Too Small?; Technology into 2035, Vol. 46

By: Major Paul E. Kladitis, USAF

The Department of Defense (DOD) anticipates the realization of biomimetic bird and two-inch, insect-sized systems within the 2015–47 period. Although robot systems of one millimeter or smaller are not explicitly specified in current DOD and Air Force technology road maps, the technological aims towards this size can be clearly inferred from official documents. This research assesses the likelihood of, and barriers to, the realization of true microrobots and nanorobots (defined as submillimeter-sized robots of micro-meter and nanometer proportions, respectively) that can perform in military applications by 2035. This research finds that the realization of true microrobots for military applications by 2035 is unlikely, except for a single case of microrobots....

Read More
  • Cover Image

Build-to-shelve Prototyping : Undercutting Doctrinal Development

By: Lieutenant Colonel Donald “Bud” Vazquez, USAF

I submit there are two ways we can use limited numbers of prototype systems to ensure we learn relevant tactical lessons before we have to fight:(1) capitalizing on interactive computing technologies to better develop requirements and tactics throughout the system life cycle and (2) changing our concept of prototypes from the buying of one or two “experimental”items to procuring entire “prototypical” units....

1 SETTING THE STAGE . . . . 1 Background . . . . . 1 Methodology . . . . 2 Military Doctrine: Definitions and Types . . . . . 3 Notes . . . . 5 2 DEVELOPING ROBUST EMPLOYMENT DOCTRINE . . . . 7 Why Employment Doctrine Matters . . . . 7 How Employment Doctrine Develops . . . . . 8 Combat-Capable versus Combat-Lethal Doctrine . . . . . 11 Notes . . . . 13 3 DOCUMENTING DOCTRINAL LAG . . . . 15 The YB-17 and Refining Doctrine under Fire . . . . . 15 Modern Perspectives . . . . 18 Notes . . . . 21 4 CRITIQUING THE YOCKEY POLICY . . . . . 23 The Fallacy of Strategic Warning . . . . . 23 We Can’t Predict What We’ll Need . . . . . 25 Summarizing the Policy Critique . . . . . 27 Notes . . . . 27 5 POTENTIAL SOLUTIONS . . . . 29 Interactive Simulation for Employment Doctrine . . . . . 29 Prototypical Units . . . . . 32 Historical Perspective . . . . . 33 Notes . . . . 33 6 CONCLUSION . . . . 35 Notes . . . . 37 BIBLIOGRAPHY . . . . . 39...

Read More
  • Cover Image

Preventing Catastrophe : US Policy Options for Management of Nuclear Weapons in South Asia

By: Lieutenant Colonel Martin J. Wojtysiak,USAF

In Preventing Catastrophe: US Policy Options for Management of Nuclear Weapons in South Asia, Lt Col Martin J. “Marty” Wojtysiak, USAF, proposes a response to the dangerous proliferation of nuclear weapons in India and Pakistan. This paper highlights the threat in “The Nuclear Catastrophe of 2005,” a gripping projection of the worstcase scenario on the current realities of the Indian subcontinent. Written a year after the “catastrophe,” it vividly describes the events leading up to the disaster as well as the grim aftermath of a South Asian nuclear war. The remainder of the paper looks at US regional objectives and suggests how they might be achieved. The author proposes a regional proliferation regime that realistically addresses the threat and moves the United States to a pragmatic approach to manage and limit the ongoing proliferation in South Asia....

Read More
  • Cover Image

China in Space : Civilian and Military Developments

By: Colonel David J. Thompson, USAF; Lieutenant Colonel William R. Morris, USAF

Col Thompson, in his concentrated focus on China’s military space applications, examines PRC ground, space, counterspace, and space policy aspects. His principal findings: China has plans to construct a new launch site in the deep south; PRC telemetry, tracking and com-mand capacities are improving; China has the ability to conduct limited intelligence, surveillance and reconnaissance missions from space; the PRC is pursuing a counterspace capability most likely using satellite jammers and anti-satellites (possibly parasitic or nano-satellites). Col Thompson concludes that while China’s space program does not now constitute a global threat, the PRC is pursuing space capabilities that will increase its regional influence, and deny an adversary certain uses of space....

Read More
  • Cover Image

China as Peer Competitor? : Trends in Nuclear Weapons, Space, and Information Warfare

By: Lieutenant Colonel Kathryn L. Gauthier, USAF

In China as Peer Competitor? Trends in Nuclear Weapons, Space, and Information Warfare Lt Col Kathryn L. Gauthier analyzes the potential for China to emerge as a peer competitor of the United States in the coming decades. First, she examines two traditional pillars of national strength— China’s status as a nuclear weapons state and as a space power. Second, she then explores China’s growing focus on information warfare (IW) as a means to wage asymmetric warfare against a technologically advanced adversary. Third, the author carefully examines the status of the three programs, highlights areas of concern and potential conflict with the United States, and analyzes the implications of these issues for the United States....

Read More
  • Cover Image

The F-22 : The Right Fighter for the Twenty-first Century?

By: Michael J. Costigan

In this study Lt Col Michael J. Costigan, USAF, takes a critical look at the F-22 and its role in our military strategy in the twenty-first century. Its innovative technologies provide the F-22 with supercruise, stealth, and integrated avionics, and enable it to guarantee the air superiority so necessary to victory....

Read More
       
1
|
2
|
3
|
4
|
5
Records: 21 - 40 of 121 - Pages: 
 
 





Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.