Software Development Lifecycle

Articles

Camtasia Studio QuickStart Guide for Authors, Part 2: Using Postproduction Features to Edit, Enhance, and Produce Your Video
Tom Bunzel, author of Solving the PowerPoint Predicament: Using Digital Media for Effective Communication, concludes his two-part series on TechSmith's Camtasia by showing how to edit, customize, and produce your specialized video and audio projects with Camtasia Editor.
By Tom Bunzel - Oct 22, 2014
Introduction to Oracle Databases on Virtual Infrastructure
99.9% of all database or data management systems should be considered candidates for virtualization on vSphere. In this chapter from Virtualizing Oracle Databases on vSphere, the authors argue that Oracle databases and software are prime candidates to consider migrating to virtualized infrastructure.
By Kannan Mani, Don Sullivan - Oct 22, 2014
Overview of SharePoint 2013’s Social Computing Capabilities
Social collaboration in the workplace has been embraced by some organizations and really shunned by others due to possible legal and compliance concerns. Both types of organizations, those who embrace it and those who feel the ROI does not outweigh the risk, have valid points and underlying driving reasons for their overall stance on this subject. SharePoint expert Errin O’Connor tries to shed light on the capabilities of SharePoint 2013’s Social capabilities and discuss the ways your organization may be able to embrace these to provide real value to your organization.
By Errin O'Connor - Oct 21, 2014
The Mobile Commerce Revolution and the Current State of Mobile
The statistics in this chapter from The Mobile Commerce Revolution: Business Success in a Wireless World underline what is truly powerful about mobile technology: It’s not about enabling things we couldn’t have imagined. Instead, today’s mobile technology enables exactly what the average consumer could have imagined, albeit in settings and situations that could not have been predicted.
By Tim Hayden, Tom Webster - Oct 20, 2014
Understanding JavaScript
This chapter from HTML, CSS and JavaScript All in One, Sams Teach Yourself: Covering HTML5, CSS3, and jQuery, 2nd Edition introduces the concept of web scripting and the JavaScript language. As the chapter moves ahead, you’ll learn how to include JavaScript commands directly in your HTML documents, and how your scripts will be executed when the page is viewed in a browser. You will work with a simple script, edit it, and test it in your browser, all the while learning the basic tasks involved in creating and using JavaScript scripts.
By Julie C. Meloni - Oct 20, 2014
See All Articles

Blogs

How the Internet Works: The Deep Web

The Deep Web. The Deepnet. The Invisible Web. The Hidden Web. 

Maybe you have heard of the Deep Web. Maybe you even know how to access the Deep Web. 

Chances are though, you've never heard of the Deep Web and you have no idea how to access it. The Deep Web sounds mysterious, elusive and somewhat dangerous. By all accounts, it is all these things. 

So, what is the deep web? How does the deep web work? How do you access it?

In this installment of "How the Internet Works", we tackle the mysterious Deepnet.   

By Brad Yale - Oct 21, 2014 - Business & Management, Data, Home & Office Computing, Information Technology, Security, Web Services, Access, General Security and Privacy, Information Management, Network Security, The Web/Virtual Worlds/Social Networking
How the Internet Works: A Call for Personal Security

It's very easy, after reading "The Snappening" Snapchat security breach news, to determine fault lies with users. It would be very easy and convenient to blame the leak not on the leakers, but on the users who sent sexually explicit materials to friends, lovers and strangers. This conclusion is easy to draw yet, it only skims the surface of the true issue at hand.  

Whatever you think of the materials leaked, the larger issue at play in "The Snappening" is how the public relates to, understands and uses public Internet architectures. If anything, "The Snappening" should serve as a beacon call for greater Internet security practice enlightenment. 

In this version of "How the Internet Works" we cover public Cloud architectures and the need for increased Internet security practices learning.  

By Brad Yale - Oct 13, 2014 - Access, General Security and Privacy, Information Technology, Web Services, Network Security, Data, Security, Cloud Computing, Software Security
See All Blogs

Safari Books Online Free Trial

Who is InformIT

We are the online presence for the world's leading technology publishers and your source for reliable and qualified content to help you do your job better.

Learn More About InformIT


Our Imprints


Become a Reviewer

Provide valuable feedback and suggestions on current and new releases from us. Learn more.