Featured Book

Learning Blender: A Hands-On Guide to Creating 3D Animated Characters

Learning Blender

Learning Blender walks you through every step of creating an outstanding animated character with the free, open source, 3D software Blender, and then compositing it in a real video using a professional workflow. This is the only Blender tutorial to take you from preproduction to final result, and it's perfect for both 3D novices and those who've used other 3D Software.

Articles

The Mobile Commerce Revolution and the Current State of Mobile
The statistics in this chapter from The Mobile Commerce Revolution: Business Success in a Wireless World underline what is truly powerful about mobile technology: It’s not about enabling things we couldn’t have imagined. Instead, today’s mobile technology enables exactly what the average consumer could have imagined, albeit in settings and situations that could not have been predicted.
By Tim Hayden, Tom Webster - Oct 20, 2014
Understanding JavaScript
This chapter from HTML, CSS and JavaScript All in One, Sams Teach Yourself: Covering HTML5, CSS3, and jQuery, 2nd Edition introduces the concept of web scripting and the JavaScript language. As the chapter moves ahead, you’ll learn how to include JavaScript commands directly in your HTML documents, and how your scripts will be executed when the page is viewed in a browser. You will work with a simple script, edit it, and test it in your browser, all the while learning the basic tasks involved in creating and using JavaScript scripts.
By Julie C. Meloni - Oct 20, 2014
A Video Interview with Herb Sutter on C++ Standards
Herb Sutter, the lead software architect for C++ at Microsoft, head of the ISO C++ standards committee, and co-author of C++ Coding Standards talks with Brian Overland about how the standards committee evaluates proposals, the importance of being egoless, how to submit a proposal to the standards committee, why the committee decided to update the standard every three years, and the adoption of C++ in cross-platform mobile apps.
By Herb Sutter, Brian Overland - Oct 16, 2014
Using Models to Help Plan Tests in Agile Projects
This chapter from More Agile Testing: Learning Journeys for the Whole Team looks at some foundations of agile test planning and how they are evolving.
By Janet Gregory, Lisa Crispin - Oct 16, 2014
Why the Effectiveness Formula Is the Key to Productivity Improvement
Randall W. Jensen, Ph. D., author of Improving Software Development Productivity: Effective Leadership and Quantitative Methods in Software Management, explains how to use the Effectiveness Formula to quantify and improve the expected productivity of any development company. If your organization isn't getting the kind of programmer performance you need, maybe the problem isn't your staff, but rather their working environment.
By Randall W. Jensen - Oct 16, 2014
See All Articles

Blogs

How the Internet Works: A Call for Personal Security

It's very easy, after reading "The Snappening" Snapchat security breach news, to determine fault lies with users. It would be very easy and convenient to blame the leak not on the leakers, but on the users who sent sexually explicit materials to friends, lovers and strangers. This conclusion is easy to draw yet, it only skims the surface of the true issue at hand.  

Whatever you think of the materials leaked, the larger issue at play in "The Snappening" is how the public relates to, understands and uses public Internet architectures. If anything, "The Snappening" should serve as a beacon call for greater Internet security practice enlightenment. 

In this version of "How the Internet Works" we cover public Cloud architectures and the need for increased Internet security practices learning.  

By Brad Yale - Oct 13, 2014 - Security, Cloud Computing, Data, Information Technology, Web Services, Access, General Security and Privacy, Network Security, Software Security
Mobile Malware and Fake Apps: Hong Kong, China and The New York Times

For the past week or so, Hong Kong has erupted with peaceful demonstrations advocating for the ousting of the Chinese premiere and the right to peacefully and openly elect his replacement. While the Chinese premiere, Xi Jinping, looks to be going nowhere one thing has become clear - the mobile devices and Internet connections which helped to grow the nightly demonstrations are quietly suffering an inward meta problem - malware, viruses and fake applications.

As mobile platforms become more prominent and are used more robustly to organize, carry out financial transactions and conduct daily personal business, the time has come to address mobile malware and fake applications.

By Brad Yale - Oct 2, 2014 - Windows Phone, Software Security, General Security and Privacy, Information Technology, Open Source, iOS, Mobile Application Development & Programming, Android, Security, HTML5 & Web Standards
See All Blogs

Safari Books Online Free Trial

Who is InformIT

We are the online presence for the world's leading technology publishers and your source for reliable and qualified content to help you do your job better.

Learn More About InformIT


Our Imprints


Become a Reviewer

Provide valuable feedback and suggestions on current and new releases from us. Learn more.