Book picks similar to
Strategies For Real Time System Specification by Derek J. Hatley
code_complete
comp
dining-room
egr102-a5
Kill It with Fire: Manage Aging Computer Systems (and Future Proof Modern Ones)
Marianne Bellotti - 2021
Aging computer systems present complex technical challenges for organizations both large and small, and Kill It with Fire provides sound strategies for spearheading modernization efforts.Kill It with Fire examines aging computer systems, the evolution of technology over time, and how organizations can modernize, maintain, and future-proof their current systems.In playful and engaging prose, Marianne Bellotti uses real-world case studies to illustrate the technical challenges of modernizing complex legacy systems, as well as the organizational challenges of time-intensive maintenance efforts. The book explains how to evaluate existing architecture, create upgrade plans, and handle communication structures. Team exercises and historical analyses of complex computer systems make this a valuable resource for those in both older and newer companies, and will help readers restore or create systems built to evolve as time goes on.
Real-Life BPMN: With Introductions to CMMN and DMN
Jakob Freund - 2010
It is about business process management (BPM) and Business Process Model and Notation (BPMN 2.0). Truth be told, there are several BPMN books on the market. Some of them are quite good, so why should you care about this one? This book distills the experience the authors accumulated while running Camunda, a consulting company that specializes in BPM. Camunda helped to define the BPMN specification, and during the past ten years, they have applied BPMN in over 1000 customer engagements. These were big businesses, small companies, and public institutions. Now you can benefit from this practical experience. Topics covered: The basics of modeling processes with Business Process Model and Notation (BPMN 2.0) Methods to apply BPMN successfully to real-world problems A practical approach for automating processes with BPMN 2.0 The alignment of business and IT as an attainable goal Advice on introducing BPMN across your company This book explains the notation, of course, but it also delves into the kinds of challenges that process designers face every day. It talks about pitfalls to avoid. It gives dos and don'ts. There are guidelines and best practices. In the 3rd edition we added introductions to the related BPM standards CMMN 1.1 for case management, handling unstructured processes DMN 1.1 for decision management, you might know as business rules management (BRM) This third edition in English is based on the successful fith German edition, which, according to amazon.de, it is the highest-ranked book on BPMN in German. The number of five-star ratings awarded by readers speaks volumes. Also available in Spanish. Note: The resolution of all images for the 3rd edition of the ebook has been increased to improve the digial reading experience.
Prehistoric Investigations: From Denisovans to Neanderthals; DNA to stable isotopes; hunter-gathers to farmers; stone knapping to metallurgy; cave art to stone circles; wolves to dogs
Christopher Seddon - 2016
In addition to fieldwork and traditional methods, paleoanthropologists and archaeologists now draw upon genetics and other cutting-edge scientific techniques. In fifty chapters, Prehistoric Investigations tells the story of the many thought-provoking discoveries that have transformed our understanding of the distant past.
Prince2 for Dummies
Nick Graham - 2008
Fully updated with the 2009 practice guidelines, this book will take you through every step of a project - from planning and establishing roles to closing and reviewing - offering practical and easy-to-understand advice on using PRINCE2. It also shows how to use the method when approaching the key concerns of project management, including setting up effective controls, managing project risk, managing quality and controlling change. PRINCE2 allows you to divide your project into manageable chunks, so you can make realistic plans and know when resources will be needed. PRINCE2 For Dummies, 2009 Edition provides you with a comprehensive guide to its systems, procedures and language so you can run efficient and successful projects.PRINCE2 For Dummies, 2009 Edition includes: Part I: How PRINCE Can Help You - Chapter 1: So What's a Project Method and Why Do I Need to Use One? - Chapter 2: Outlining the Structure of PRINCE2 - Chapter 3: Getting Real Power from PRINCE2Part II: Working Through Your Project - Chapter 4: Checking the Idea Before You Start - Chapter 5: Planning the Whole Project: Initiation - Chapter 6: Preparing for a Stage in the Project - Chapter 7: Controlling a Stage - Chapter 8: Building the Deliverables - the Work of the Teams - Chapter 9: Finishing the Project - Chapter 10: Running Effective Project BoardsPart III: Help with PRINCE Project Management - Chapter 11: Producing and Updating the Business Case - Chapter 12: Deciding Roles and Responsibilities - Chapter 13: Managing Project Quality - Chapter 14: Planning the Project, Stages, and Work Packages - Chapter 15: Managing Project Risk - Chapter 16: Controlling Change and Controlling Versions - Chapter 17: Monitoring Progress and Setting Up Effective ControlsPart IV: The Part of Tens - Chapter 18: Ten Ways to Make PRINCE Work Well - Chapter 19: Ten Tips for a Good Business Case - Chapter 20: Ten Things for Successful Project Assurance Part V: Appendices - Appendix A: Looking into PRINCE Qualifications - Appendix B: Glossary of the Main PRINCE2 Terms
But How Do It Know? - The Basic Principles of Computers for Everyone
J. Clark Scott - 2009
Its humorous title begins with the punch line of a classic joke about someone who is baffled by technology. It was written by a 40-year computer veteran who wants to take the mystery out of computers and allow everyone to gain a true understanding of exactly what computers are, and also what they are not. Years of writing, diagramming, piloting and editing have culminated in one easy to read volume that contains all of the basic principles of computers written so that everyone can understand them. There used to be only two types of book that delved into the insides of computers. The simple ones point out the major parts and describe their functions in broad general terms. Computer Science textbooks eventually tell the whole story, but along the way, they include every detail that an engineer could conceivably ever need to know. Like Momma Bear's porridge, But How Do It Know? is just right, but it is much more than just a happy medium. For the first time, this book thoroughly demonstrates each of the basic principles that have been used in every computer ever built, while at the same time showing the integral role that codes play in everything that computers are able to do. It cuts through all of the electronics and mathematics, and gets right to practical matters. Here is a simple part, see what it does. Connect a few of these together and you get a new part that does another simple thing. After just a few iterations of connecting up simple parts - voilà! - it's a computer. And it is much simpler than anyone ever imagined. But How Do It Know? really explains how computers work. They are far simpler than anyone has ever permitted you to believe. It contains everything you need to know, and nothing you don't need to know. No technical background of any kind is required. The basic principles of computers have not changed one iota since they were invented in the mid 20th century. "Since the day I learned how computers work, it always felt like I knew a giant secret, but couldn't tell anyone," says the author. Now he's taken the time to explain it in such a manner that anyone can have that same moment of enlightenment and thereafter see computers in an entirely new light.
Debugging Teams: Better Productivity Through Collaboration
Brian W. Fitzpatrick - 2015
Their conclusion? Even among people who have spent decades learning the technical side of their jobs, most haven't really focused on the human component. Learning to collaborate is just as important to success. If you invest in the soft skills of your job, you can have a much greater impact for the same amount of effort.The authors share their insights on how to lead a team effectively, navigate an organization, and build a healthy relationship with the users of your software. This is valuable information from two respected software engineers whose popular series of talks--including Working with Poisonous People--has attracted hundreds of thousands of followers.
The Design of the UNIX Operating System
Maurice J. Bach - 1986
The leading selling UNIX internals book on the market.
Tata
Morgen Witzel - 2010
1 Lakh/ below US$ 2500 car), is set to change our perception of India': on the threshold of becoming a truly global brand.*s oldest and most respected corporate brand. With a major international presence, in a variety of areas including steel, tea, chemicals, communications and software, Tata now stands 65th in the world brand valuation league. But what is the Tata brand all about? What are its values? How do people perceive it, in India and around the world? In this absorbing and informed book Morgen Witzel digs into the heart of the Tata enterprise, describes its origins, how Tata's reputation and image evolved, and how the group has worked to transform that image into a powerful and valuable brand. Tata: The Evolution of a Corporate Brand goes to the core of the Tata ethos to explore the unique relationship between the Tata group and the Indian people, a relationship that goes beyond the achievements of a successful business to its social contributions for its employees and the society at large. Finally it asks how that reputation will be perceived and understood as Tata moves into global markets. Whether you re an entrepreneur, a manager, a marketer, or an interested Tata loyalist this book will help you understand the durability of the brand and inspire you with the values it holds onto in the global economy.
Vagrant: Up and Running
Mitchell Hashimoto - 2013
This hands-on guide shows you how to use this open source software to build a virtual machine for any purpose—including a completely sandboxed, fully provisioned development environment right on your desktop.Vagrant creator Mitchell Hashimoto shows you how to share a virtual machine image with members of your team, set up a separate virtualization for each project, and package virtual machines for use by others. This book covers the V1 (1.0.x) configuration syntax running on top of a V2 (1.1+) core, the most stable configuration format running on the latest core.Build a simple virtual machine with just two commands and no configurationCreate a development environment that closely resembles productionAutomate software installation and management with shell scripts, Chef, or PuppetSet up a network interface to access your virtual machine from any computerUse your own editor and browser to develop and test your applicationsTest complicated multi-machine clusters with a single VagrantfileChange Vagrant’s default operating system to match your production OSExtend Vagrant features with plugins, including components you build yourself
Algorithms
Robert Sedgewick - 1983
This book surveys the most important computer algorithms currently in use and provides a full treatment of data structures and algorithms for sorting, searching, graph processing, and string processing -- including fifty algorithms every programmer should know. In this edition, new Java implementations are written in an accessible modular programming style, where all of the code is exposed to the reader and ready to use.The algorithms in this book represent a body of knowledge developed over the last 50 years that has become indispensable, not just for professional programmers and computer science students but for any student with interests in science, mathematics, and engineering, not to mention students who use computation in the liberal arts.The companion web site, algs4.cs.princeton.edu contains An online synopsis Full Java implementations Test data Exercises and answers Dynamic visualizations Lecture slides Programming assignments with checklists Links to related material The MOOC related to this book is accessible via the "Online Course" link at algs4.cs.princeton.edu. The course offers more than 100 video lecture segments that are integrated with the text, extensive online assessments, and the large-scale discussion forums that have proven so valuable. Offered each fall and spring, this course regularly attracts tens of thousands of registrants.Robert Sedgewick and Kevin Wayne are developing a modern approach to disseminating knowledge that fully embraces technology, enabling people all around the world to discover new ways of learning and teaching. By integrating their textbook, online content, and MOOC, all at the state of the art, they have built a unique resource that greatly expands the breadth and depth of the educational experience.
NSHipster: Obscure Topics in Cocoa & Objective C
Mattt Thompson - 2013
In cultivating a deep understanding and appreciation of Objective-C, its frameworks and ecosystem, one is able to create apps that delight and inspire users. Combining articles from NSHipster.com with new essays, this book is the essential guide for modern iOS and Mac OS X developers.
Life Lessons from Bergson
Michael Foley - 2013
Written for 'The School of Life series, Foley takes one of his favourite philosophers, Henri Bergson, and highlights the ideas from Bergson that are most relevant to our ordinary everyday dilemmas.
Out of Bounds: Inside the NBA's Culture of Rape, Violence, and Crime
Jeff Benedict - 2004
They generate millions of dollars of revenue for the NBA and their teams. They inspire adulation. But underneath all the glitz, the money, and alley-oops is a seamy underbelly, a rash of lawlessness that is gripping the NBA.Based on a first-of-its-kind investigation into the criminal histories of 177 NBA players from the 2001–2002 season, Out of Bounds shows that an alarming four out of every ten NBA players have a police record involving a serious crime. They are All-Stars and they are journeymen, involved in crimes ranging from armed robbery to domestic violence to gun possession to rape.Out of Bounds takes a hard look at shocking cases, with graphic accounts of physical and sexual violence and other outrageous conduct by players. In all, more than 250 people are named, including many prominent NBA players. It exposes the environment and culture that encourages such criminal behavior. It also explains the unique challenges these cases pose for law-enforcement agencies and prosecutors. And Out of Bounds takes readers inside the hidden yet critically vital role that lawyers, agents, and fame play in insulating criminally accused players from accountability.Author Jeff Benedict, an expert on athletes and crime, draws his conclusions from exhaustive research. In addition to his criminal-background checks, the author retrieved documents from law-enforcement agencies, courts, and private attorneys. He conducted more than 400 interviews with police officers, prosecutors, defense lawyers, players, agents, victims, witnesses, and coaches. What emerges is a disturbing and appalling picture of men who live above the law.A seminal and important work, Out of Bounds will forever change how we look at the NBA and its stars' lives of excess and privilege.
Introducing Elixir: Getting Started in Functional Programming
Simon St.Laurent - 2013
If you're new to Elixir, its functional style can seem difficult, but with help from this hands-on introduction, you'll scale the learning curve and discover how enjoyable, powerful, and fun this language can be. Elixir combines the robust functional programming of Erlang with an approach that looks more like Ruby and reaches toward metaprogramming with powerful macro features.Authors Simon St. Laurent and J. David Eisenberg show you how to write simple Elixir programs by teaching you one skill at a time. You’ll learn about pattern matching, recursion, message passing, process-oriented programming, and establishing pathways for data rather than telling it where to go. By the end of your journey, you’ll understand why Elixir is ideal for concurrency and resilience.* Get comfortable with IEx, Elixir's command line interface* Become familiar with Elixir’s basic structures by working with numbers* Discover atoms, pattern matching, and guards: the foundations of your program structure* Delve into the heart of Elixir processing with recursion, strings, lists, and higher-order functions* Create processes, send messages among them, and apply pattern matching to incoming messages* Store and manipulate structured data with Erlang Term * Storage (ETS) and the Mnesia database* Build resilient applications with the Open Telecom Platform (OTP)* Define macros with Elixir's meta-programming tools.