Home | Amazing | Today | Tags | Publishers | Years | Search 
Getting StartED with Netbooks
Getting StartED with Netbooks

Getting StartED with Netbooks broadly targets consumers at a pivotal moment in the explosive growth of the MID/Netbook/UMPC market. We intend to create value for this group by providing an indispensable, "Consumer Reports Meets Whole Earth Catalog" sort of information aggregation.

For this project, timing and tone...

NX-OS and Cisco Nexus Switching: Next-Generation Data Center Architectures (Networking Technology)
NX-OS and Cisco Nexus Switching: Next-Generation Data Center Architectures (Networking Technology)

Cisco® Nexus switches and the new NX-OS operating system are rapidly becoming the new de facto standards for data center distribution/aggregation layer networking. NX-OS builds on Cisco IOS to provide advanced features that will be increasingly crucial to efficient data center operations. NX-OS and Cisco...

Microsoft SharePoint 2010 Business Intelligence Unleashed
Microsoft SharePoint 2010 Business Intelligence Unleashed

Business intelligence (BI) has been around for many more years than you might think. Decision support systems (DSS) and executive information systems (EIS) from the 1970s and 1980s, along with artificial intelligence (AI) systems from the 1990s, can now all be considered as part of what BI comprises today.

In brief, BI refers...

Platelet Glycoprotein IIb/IIIa Inhibitors in Cardiovascular Disease (Contemporary Cardiology)
Platelet Glycoprotein IIb/IIIa Inhibitors in Cardiovascular Disease (Contemporary Cardiology)

This substantially revised second edition contains new chapters on the role of GPIIb/IIIa blockade during acute coronary syndromes or with fibrinolytic therapy during acute myocardial infarctions, and updated and expanded information on the latest trials of GP IIb/IIIa inhibition during percutaneous coronary intervention. Additional...

Mobile and Wireless Communications for IMT-Advanced and Beyond
Mobile and Wireless Communications for IMT-Advanced and Beyond
This book was prompted by the desire to fill the gap between theoretical descriptions and a more pedagogical description of the main technological components of International Mobile Telecommunications Advanced (IMT-Advanced) such as Radio Resource Management (RRM), Carrier

Aggregation (CA), improved MIMO support, and
...
Pervasive Collaborative Networks: IFIP TC 5 WG 5.5 Ninth Working Conference on VIRTUAL ENTERPRISES
Pervasive Collaborative Networks: IFIP TC 5 WG 5.5 Ninth Working Conference on VIRTUAL ENTERPRISES
In earlier definitions, organization’s competency is mainly addressing its capabilities, for example Gallon (Gallon et al, 1995) defines competency as “aggregation of capabilities, where synergy that is created has sustainable value and broad applicability”. However participation of VBE members in general VBE...
MongoDB and PHP
MongoDB and PHP
Once every decade or so, a technology comes along that is so revolutionary that it fundamentally alters the way we approach everything we do. The world itself has changed. As I think back to 1995 when I first started developing Internet applications, our data needs were relatively simple. For the next 10 years,...
IBM Websphere Portal 8: Web Experience Factory and the Cloud
IBM Websphere Portal 8: Web Experience Factory and the Cloud
When I joined IBM in early 2001, WebSphere Portal was little more than an idea. But some believed this was going to be the future of web technology. When WebSphere Portal v1 was released later in that same year, spending the time required to cobble together the components needed to make it run, was an exercise in patience and...
Immunopharmacology of Platelets (Handbook of Immunopharmacology)
Immunopharmacology of Platelets (Handbook of Immunopharmacology)
Although anucleated, blood platelets are extraordinarily efficient cells and still the subject of fruitful investigations in haematology, in vascular physiology, in biochemistry, and more recently in immunology and in physiopathology where their metabolism has been implicated as a source of potential effector compounds. It...
Security in Sensor Networks
Security in Sensor Networks

Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.

Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers,
...

Joomla! Bible
Joomla! Bible

Your complete guide to the Joomla! content management system

Whether you use Joomla! to power a website, intranet, or blog, you'll need a good how-to reference on this complex, but not always intuitive, content management software. Joomla! Bible, Second Edition is that book. It not only brings you up to speed on...

Heterogeneous Cellular Networks
Heterogeneous Cellular Networks

A timely publication providing coverage of radio resource management, mobility management and standardization in heterogeneous cellular networks

The topic of heterogeneous cellular networks has gained momentum in industry and the research community, attracting the attention of standardization bodies such as 3GPP LTE and IEEE...

Result Page: 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy