Automatic feedback control systems play crucial roles in many fields, including manufacturing industries, communications, naval and space systems. At its simplest, a control system represents a feedback loop in which the difference between the ideal (input) and actual (output) signals is used to modify the behaviour of the system. Control...
Flow cytometry immunophenotyping of hematopoietic disorders is a complex and demanding exercise that requires a good understanding of cell lineages, developmental pathways, and physiological changes, as well as broad experience in hematopathology. The process includes several interrelated stages, from the initial medical decision regarding...
Setting up a cloud computing service, whether for yourself or a customer, is greatly simplified by this step-by-step guide to Cloudstack – the world’s leading open source platform. It’s all here, from installing to extending.
Overview
Install, deploy, and manage a cloud service using...
Due diligence conducted around technology decisions is complex. Done correctly, it has the power to enable outstanding positive outcomes; done poorly, it can wreak havoc on organizations, corporate cultures, and markets.
Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors...
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
The hot new data analysis trends involve business intelligence and analytics. The technology that supports business intelligence and analytics better than anything else is today's multidimensional OLAP technology - and there is none better than Oracle Essbase! Although storing data in a cube and developing analytical applications leaves...
Offering you thorough coverage of the new version of the leading Linux certification from Linux Professional Institute (LPI), this book covers both objectives and materials tested in the two required LPIC-1 exams: LPI 101 and LPI 102. You’ll certainly appreciate the clear, concise information on key exam topics, including using Linux command...
Challenging behaviours, such as aggression and violence, are more common in deaf people than hearing people. Filling a crucial gap in the international market, this book will appeal equally to those who work occasionally or entirely with Deaf or hearing impaired client groups of all ages.
A key resource to learn how to repurpose Windows applications for handheld devices
When handheld computers were power-hungry and memory-poor, synchronizing calendars and perhaps reading e-mail were all the applications most people needed. Now that handhelds have more power than first-generation desktop computers, the opportunity to do more than...
Few developments in the world of computers have been embraced as quickly as mashups. The most common mashups remain those that build on the various mapping APIs, but dynamic combinations of data from multiple sources or in multiple formats (the basic definition of a mashup) are all over the Web. Part I of this book provides an introduction to the...
Networked information technology (NIT) systems are synonymous with network-centric or net-centric systems and constitute the cornerstone of the fast-growing information age. NIT systems' field of application ranges from the traditional worldwide telecommunication systems, banking and financial transactions, on-line travel reservation...