· 2012
Even Steve Jobs didn't know what he had on his hands when he announced the original iPhone as a combination of a mere "three revolutionary products"--an iPod, a cell phone, and a keyboard-less handheld computer. Once Apple introduced the App Store and opened it up to outside developers, however, the iPhone became capable of serving a rapidly growing number of functions--now more than 200,000 and counting. But the iPhone has implications far beyond the phone or gadget market. In fact, it's opening the way to what Brian Chen calls the "always-on" future, where we are all constantly connected to a global Internet via flexible, incredibly capable gadgets that allow us to do anything, anytime, from anywhere. This has far-reaching implications--both positive and negative--throughout all areas of our lives, opening the door for incredible personal and societal advances while potentially sacrificing both privacy and creative freedom in the process. Always On is the first book to look at the surprising and expansive significance of Apple's incredibly powerful vertical business model, and the future it portends.
· 2008
The 2nd edition of this integrated guide explains and lists readily available graphics software tools and their applications, while also serving as a shortcut to graphics theory and programming. It grounds readers in fundamental concepts and helps them use visualization, modeling, simulation, and virtual reality to complement and improve their work.
· 2011
Looks at the social implications of having all of one's technology in a single device and the notion of being plugged into information and socially available all the time.
Data migration, generally referred to as the process of reading data from their source and inserting them into a target database, is an important element of data extract, transform, and load (ETL) systems. During data migration, errors can occur during data transmission. These errors can directly affect the quality of the data in the target database. Therefore, verifying the correctness of the outcome is a critical component of a data migration operation. Current methods in data migration correctness verification have many limitations, including incompleteness and inaccuracy. This paper describes an innovative method that applies the well-proven checksum methodology to verify the correctness of the data migration outcome. This method performs a thorough and accurate verification on the correctness of the migrated data, mitigating most of the weaknesses associated with current verification methods. This method is also easy to implement and will greatly enhance the quality of data migration operations.
· 2011
The traditional vertical decomposition methods in relational database normalization fail to prevent common data anomalies. Although a database may be highly normalized, the quality of the data stored in this database may still deteriorate because of potential data anomalies. In this paper, we first discuss why practitioners need to further improve their databases after they apply the traditional normalization methods, because of the existence of functional entanglement, a phenomenon we defined. We outline two methods for identifying functional entanglements in a normalized database as the first step toward data quality improvement. We then analyze several practical methods for preventing common data anomalies by eliminating and restricting the effects of functional entanglements. The goal of this paper is to reveal shortcomings of the traditional database normalization methods with respect to the prevention of common data anomalies, and offer practitioners useful techniques for improving data quality.
Software updates often involve data migration, especially when converting legacy software implemented to interface with outdated relational database management systems or other nonrelational database electronic files. Moreover, many software applications rely on data migration to import data from a variety of platforms. Usually, database migrations are time consuming and error prone. Based on their experience designing and implementing custom utilities to convert a large number of legacy databases and files in different platforms, RTI computer scientists developed five criteria that need to be considered when evaluating a data migration tool (DMT). These criteria can help users and software development project managers make informed decisions in data conversion tasks, help software developers assess design and implementation considerations for future DMT products, and provide guidelines for database administrators to evaluate a general DMT.
· 2018
An elderly woman dies at the bottom of a stairway, and Betty is accused as her killer. Convinced that his sister isn’t capable of such a crime, psychiatrist Seth enlists his friend Ann Lee, an amateur detective, and her partner to help clear her name. Never in their decadelong career have Ann and Fang Chen had to defend a client who already has airtight evidence and an eyewitness against her. As they try to separate the assumptions from the truth, every lead appears to be a dead end, and Betty Foreman seems to be guilty as accused. As the trial day looms, they are under tremendous pressure to prove their mettle and save an innocent friend. When the curtain finally comes down, however, nothing is what it seems, and the one who wins the battle could lose the war.
Android mobile devices have become an attractive consumer product because of their portability, high-definition screens, long battery life, intuitive user interface, and ubiquitous competitive vendor pricing. The very feature that has helped with the proliferation of the devices is also one of the most problematic: their portability could result in theft, potentially allowing data to be compromised. For applications deployed to these devices, data security requirements need to be incorporated in the design process so these devices can be considered viable data collection tools. Researchers at RTI have been working to secure data on Android mobile devices so that selected information on the device can be encrypted and therefore difficult to obtain illegitimately while still making confidential data easy to access. We have developed software that will encrypt specific attributes of databases residing on the internal secure digital card (SD card) of Android devices. The method we have developed could also benefit other Android applications requiring secure storage of data on globally readable and writable databases. In this occasional paper, we discuss the technologies and methods used in our Android database encryption/ decryption implementation and their potential scalability to broader applications.
This new reference text offers a shortcut to graphics theory and programming using JOGL, a new vehicle of 3D graphics programming in Java. It covers all graphics basics and several advanced topics, without including some implementation details that are not necessary in graphics applications. It also covers some basic concepts in Java programming for C/C++ programmers. The book is designed as quick manual for scientists and engineers who understand Java programming to learn 3D graphics, and serves as a concise 3D graphics textbook for students who know programming basics already.
OpenGL, which has been bound in C, is a seasoned graphics library for scientists and engineers. As we know, Java is a rapidly growing language becoming the de facto standard of Computer Science learning and application development platform as many undergraduate computer science programs are adopting Java in place of C/C++. Released by Sun Microsystems in June 2003, the recent OpenGL binding with Java, JOGL, provides students, scientists, and engineers a new venue of graphics learning, research, and applications. Overview This book aims to be a shortcut to graphics theory and programming in JOGL. Specifically, it covers OpenGL programming in Java, using JOGL, along with concise computer graphics theories. It covers all graphics basics and several advanced topics without including some implementation details that are not necessary in graphics applications. It also covers some basic concepts in Java programming for C/C++ programmers. It is designed as a textbook for students who know programming basics already. It is an excellent shortcut to learn 3D graphics for scientists and engineers who understand Java programming. It is also a good reference for C/C++ graphics vi Preface programmers to learn Java and JOGL. This book is a companion to Guide to Graphics Software Tools (Springer-Verlag, New York, ISBN 0-387-95049-4), which covers a smaller graphics area with similar examples in C but has a comprehensive list of graphics software tools. Organization and Features This book concisely introduces graphics theory and programming in Java with JOGL.