This book covers the entire Business Process Management (BPM) lifecycle, from process identification to process monitoring, covering along the way process modelling, analysis, redesign and automation. Concepts, methods and tools from business management, computer science and industrial engineering are blended into one comprehensive and inter-discip...
This book is the first to present a rich selection of over 30 real-world cases of how leading organizations conduct Business Process Management (BPM). The cases stem from a diverse set of industry sectors and countries on different continents, reporting on best practices and lessons learned. The book showcases how BPM can contribute to both exploit...
This book was written to serve as an introduction to logic, with in each chapter – if applicable – special emphasis on the interplay between logic and philosophy, mathematics, language and (theoretical) computer science. The reader will not only be provided with an introduction to classical logic, but to philosophical (modal, epistemic, deontic...
This book considers all aspects of managing the complexity of Multimedia Big Data Computing (MMBD) for IoT applications and develops a comprehensive taxonomy. It also discusses a process model that addresses a number of research challenges associated with MMBD, such as scalability, accessibility, reliability, heterogeneity, and Quality of Service (...
This book demonstrates how popular culture can be successfully incorporated into medical and health science curriculums, capitalising on the opportunity fictional media presents to humanise case studies. Studies show that the vast majority of medical and nursing students watch popular medical television dramas and comedies such as Grey’s Anatomy,...
This book walks you through a patterns-based approach to building real-world cloud solutions. The patterns apply to the development process as well as to architecture and coding practices.
Developers who are curious about developing for the cloud, are considering a move to the cloud, or are new to cloud development will find here a concise overv...
That group includes full-time professional trainers, of course, but it also includes IT pros and those brave souls who staff the help desk in corporations. Most of all, it includes the incredibly large population of people who have earned a reputation for being "the person who knows Windows."
With that knowledge comes a seemingly endle...
Microsoft Azure is Microsoft's cloud computing platform, providing a wide variety of services you can use without purchasing and provisioning your own hardware. Azure enables the rapid development of solutions and provides the resources to accomplish tasks that may not be feasible in an on-premises environment. Azure's compute, storage, n...
Introducing Microsoft Power BI enables you to evaluate when and how to use Power BI. Get inspired to improve business processes in your company by leveraging the available analytical and collaborative features of this environment.
This book is targeted to a variety of readers. There are information workers and people who are totally new to the B...
This guide is an introduction to developing microservices-based applications and managing them using containers. It discusses architectural design and implementation approaches using .NET Core and Docker containers. To make it easier to get started with containers and microservices, the guide focuses on a reference containerized and microservice-ba...
With the introduction of container support in Windows Server 2016, we open a world of opportunities that takes traditional monolithic applications on a journey to modernize them for better agility. Containers are a stepping stone that can help IT organizations understand what key items in modern IT environments, such as DevOps, Agile, Scrum, Infras...
Network Virtualization "provides virtual networks to virtual machines similar to how server virtualization provides virtual machines to the operating system. Network Virtualization decouples virtual networks from the physical network infrastructure and removes the constraints and limitations of VLANs and hierarchical IP address assignment from...
Windows Server has powered a generation of organizations, from small businesses to large enterprises. No matter what your role in IT, you can be guaranteed you that have touched Windows Server at some point in your career or at very least you have seen it from afar! This book introduces you to Windows Server 2016, which is the next version of Windo...
"DevOps" is creating a lot of anxiety amongst the IT professionals of the world. It's also causing a bit of a boom for technology marketing people, who in turn are making the whole concept confusing for businesses and professionals alike.
This is an effort to set the record straight for someone who might be feeling a little vague ...
The HTML5 Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Learn how to run your web projects - everything from simple sites to complex applications - without a single server. It's possible with the JAMstack, a modern web development architecture for deploying fast, highly-scalable sites and applications that don't require traditional origin infrastructure. This practical report explains how the ...
SQL Server is Microsoft's relational database management system (RDBMS). SQL Server can now be hosted entirely in Microsoft Azure, either in a hosted virtual machine (VM) or as a hosted service. Hosting a virtual machine in Azure is known as infrastructure as a service (IaaS), and hosting a service in Azure is known as platform as a service (P...
PostgreSQL for Beginners book is intended for those who only start getting acquainted with the world of PostgreSQL. It contains some basic information about this DBMS and its main features, history of its creation and development roadmap, step-by-step installation instructions and a getting started guide....
The Linux Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
The Microsoft SQL Server Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Ccurrently many of Julia's users are hard-core developers that contribute to the language's standard libraries, and to the extensive package eco-system that surrounds it. Therefore, much of the Julia material available at present is aimed at other developers rather than end users. This is where our book comes in, as it has been written wi...
There is agency in all we do: thinking, doing, or making. We invent a tune, play, or use it to celebrate an occasion. Or we make a conceptual leap and ask more abstract questions about the conditions for agency. They include autonomy and self-appraisal, each contested by arguments immersing us in circumstances we don't control. But can it be t...
In the decade and a half since Napster first emerged, forever changing the face of digital culture, the claim that "internet pirates killed the music industry" has become so ubiquitous that it is treated as common knowledge. Piracy is a scourge on legitimate businesses and hard-working artists, we are told, a "cybercrime" simila...
Azure Functions is a new service available in Microsoft Azure to help developers run code on serverless architectures. In essence, Azure Functions is about events and code - developers write some code that will be executed upon some triggering event - but what sets Azure Functions apart is its simplicity. Developers can write just the code they nee...
This book will challenge widespread assumptions about Hippocrates (and, in the process, about the history of medicine in ancient Greece and beyond) and will also explore the creation of modern myths about the ancient world. Why do we continue to use Hippocrates, and how are new myths constructed around his name? How do news stories and the internet...
he World Wide Web has now been in use for more than 20 years. From early browsers to today's principal source of information, entertainment and much else, the Web is an integral part of our daily lives, to the extent that some people believe 'if it's not online, it doesn't exist.' While this statement is not entirely true, ...
This book introduces the use of Docker focusing on best usage practices, based on the 12factor methodology.
This preliminary version of the book focuses on the basic knowledge of Docker. It starts by briefly explaining the infrastructure of the solution, through its architecture, installation, basic commands, understanding and construction of im...
This book shows us that the way to master complexity is through insight rather than precision. Precision can overwhelm us with information, whereas insight connects seemingly disparate pieces of information into a simple picture. Unlike computers, humans depend on insight. Based on the author's fifteen years of teaching at MIT, Cambridge Unive...
This insightful collection of essays explores the ways in which open education can democratise access to education for all. It is a rich resource that offers both research and case studies to relate the application of open technologies and approaches in education settings around the world.
Global in perspective, this book argues strongly for the...
A study of Internet blocking and filtering around the world: analyses by leading researchers and survey results that document filtering practices in dozens of countries.
Many countries around the world block or filter Internet content, denying access to information that they deem too sensitive for ordinary citizens - most often about politics, b...
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great Firewall o...