Articles

RSS Feed Subscribe to this topic  RSS details

12138 Items

Sort by Date | Title

Using Regression to Test Differences Between Group Means
By Conrad Carlberg
Sep 15, 2016

Analysis expert Conrad Carlberg discusses the use of regression analysis to analyze the influence of nominal variables (such as make of car or type of medical treatment) on interval variables (such as gas mileage or levels of indicators in blood tests).

You Are Who You Are Because of Your Choices
By Jeanne Beliveau-Dunn
Sep 15, 2016

Recognized thought leader Jeanne Beliveau-Dunn outlines her philosophy of life and success. Everyone has experiences in life that challenge them—she calls these events contrast. She explains how, if you ground yourself in an operating model of love and build mental discipline and emotional intelligence, you will be able to use these challenges to learn and grow.

Database as a Service Concepts-360 Degrees
By Tariq Farooq, Sridhar Avantsa, Pete Sharman
Sep 14, 2016

Oracle technologists explain the cloud computing implementation as it relates to database as a service (DBaaS).

Dealing with Latch and Mutex Contention
By Mike Ault, Jim Czuprynski, Tariq Farooq, Guy Harrison, Mohamed Houri, Syed Jaffar Hussain, Paulo Portugal
Sep 14, 2016
Latches and mutexes are similar to locks, and their very nature creates the potential for contention. In this chapter from Oracle Database Problem Solving and Troubleshooting Handbook, the authors review the latch and mutex implementation in Oracle before looking at specific contention scenarios.
Garbage First Overview
By Charlie Hunt, Monica Beckwith, Poonam Parhar, Bengt Rutisson
Sep 14, 2016

Performance consultants and engineers introduce the Garbage First (or G1) garbage collector (GC) along with a historical perspective on the garbage collectors in the Java HotSpot Virtual Machine (VM) and the reasoning behind G1’s inclusion in HotSpot.

Open Source: GitHub for .NET Developers, Part 2: Collaborating and Contributing
By Alessandro Del Sole
Sep 14, 2016
In Part 2 of this series, Alessandro Del Sole explains how other developers, either within a team or from the outside developer community, can collaborate on an open source project hosted on GitHub.
Trust, Convenience, and Millennials: The Collaborative Economy
By Clara Shih
Sep 14, 2016
In this chapter from The Social Business Imperative, Clara Shih examines the collaborative (or more accurately, sharing) economy, how it digitally connects on-demand labor with consumers, how social media factors in building trust, how the attitude of the millennial generation is transforming, business, and much more.
Understanding Configuration Manager Data
By Garth Jones, Kerrie Meyler, Dan Toll
Sep 14, 2016

Learn how ConfigMgr stores its inventory data and how to find that information.

The Challenge with Knowledge Transfers
By Vinod Sankaranarayanan
Aug 31, 2016

Vinod Sankaranarayanan outlines why every organization needs a ownership transfer process and begins his narrative by sharing stories from employees' perspectives.

Understanding Concurrency
By G. Blake Meike
Aug 26, 2016

In this sample chapter from Android Concurrency, author G. Blake Meike explains how concurrent programs are used in software and hardware, introduces threads for executing sequential instructions in concurrent orders, and discusses the Java memory model used to connect the work of application programmers and hardware developers into an optimized program.

Making and Receiving Calls
By Craig James Johnston, Eric Butow
Jun 20, 2016

Get familiar with the Samsung Galaxy S7 Phone app, learn how to turn your call into a conference call, and configure the app to work your way.

VM Storage Policies on VSAN
By Cormac Hogan, Duncan Epping
Jun 15, 2016

VMware architects explain the concept of storage policy-based management.

Introduction to Augmented Reality
By Tobias Hollerer, Dieter Schmalstieg
Jun 10, 2016
In this chapter from Augmented Reality: Principles and Practice, Dieter Schmalstieg and Tobias Hollerer provide an introduction to the research field and practical occurrences of augmented reality, present a brief history of the field, take you on a whirlwind tour of AR application examples, and conclude with a discussion of related fields.
Creating an Arcade Shooter: Input Systems and Pawns
Jun 8, 2016

Get started creating your first game in Unreal Engine—a simple arcade shooter. Learn how to determine requirements from a design brief, how to create and set up a new project, how to spawn and use a Pawn, and how to set up a game camera.

Storage, Part 1
By John A. Davis, Steve Baca, Owen Thomas
May 30, 2016
Learn how to set up and use NFS, iSCSI, FC, and FCoE protocols.
RSVP: Robot Scenario Visual Planning
By Cameron Hughes, Tracey Hughes
May 12, 2016
The robot vocabulary is the language you use to assign a robot tasks for a specific situation or scenario. And once a vocabulary has been established, figuring out the instructions for the robot to execute using that vocabulary is the next step. In this chapter from Robot Programming, Cameron and Tracey Hughes explain how making a picture or a "visual representation" of the scenario and instructions you want the robot to perform can be great way to ensure your robot performs the tasks properly.
The Good Guys
By Hayley Camille
May 12, 2016

Meet all the new SuperCharged characters including bios, attack moves, speed and strength stats, Soul Gem abilities, and upgrade paths and get a look at their strengths and weaknesses, weapons, stats, and mods.

Creating a Vivid Setting
By Melissa Ford
May 5, 2016

Twine is a free tool anyone can use to create interactive fiction. In this chapter excerpt, Melissa Ford teaches how to write a strong setting for your story and how to organize map-based games. Once you learn how to build a space out of words, you can forge off the beaten path and chart your own unique trail.

Customizing Your Device
By Guy Hart-Davis
Apr 29, 2016

Learn how to configure your Android device home screens, security, and launcher.

Building a Security Strategy
By Bob Vachon
Mar 24, 2016
Bob Vachon introduces network security-related concepts and summarizes how security policies are implemented using a lifecycle approach.

<< < Prev Page 3 4 5 6 7 Next >

Become an InformIT Member

Take advantage of special member promotions, everyday discounts, quick access to saved content, and more! Join Today.

Pursue an Online Bachelor and Masters of Science in Cyber Security from Maryville University