This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations and guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that can be used to customize the servers boot process to fit the datacenters requirements.
Cloud Capacity Management helps readers in understanding what the cloud, IaaS, PaaS, SaaS are, how they relate to capacity planning and management and which stakeholders are involved in delivering value. It explains the role of capacity management for creators, aggregators, and consumers of cloud services.
Big Data Imperatives, focuses on resolving the key questions on everyones mind: 'Which data matters? Do you have enough data volume to justify the usage? How do you want to process this amount of data? How long do you really need to keep it active for your analysis, marketing, and BI applications?
How to Secure Your H-1B Visa is a practical guide that takes the mystery out of hiring foreign professionals for US employment and teaches H-1B employees and employers how to optimize petition outcomes.
This book takes readers through a set of interview questions programmers are likely to be asked sharing the authors insight into the key aspects of each question. By understanding these questions, readers can learn how to approach a wide array of questions more effectively.
Reputation, Stock Price, and You: Why the Market Rewards Some Companies and Punishes Others gives you insight into how reputation affects stock price and company value, and how you can use that insight to manage more wisely, oversee operations more effectively, operate more profitably, and invest more successfully.
Software Project Secrets: Why Software Projects Fail airs dirty laundry about the software industryhow putting project management's priorities above all else is the root cause of problems in software development projects. This book offers solutions to integrate project management with agile methodologies that really work for software development.
Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. The book explores techniques that developers can use to build additional layers of security into their apps beyond the security controls provided by Android itself.