Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Determining Project Requirements (ESI International Project Mgmt)
Determining Project Requirements (ESI International Project Mgmt)

Organizations waste millions of dollars every year on failed projects. Failure is practically guaranteed by poor or incomplete requirements that do not properly define projects in their initial stages.  Business analysis is the critical process ensuring projects start on the path toward success. To accurately determine project...

Unit and Ubiquitous Internet of Things
Unit and Ubiquitous Internet of Things

Although the Internet of Things (IoT) will play a key role in the development of next generation information, network, and communication technologies, many are still unclear about what makes IoT different from similar concepts.

Answering fundamental questions about IoT architectures and models, Unit and Ubiquitous
...

Great Communication Secrets of Great Leaders
Great Communication Secrets of Great Leaders

Leaders who communicate properly and frequently—in good times as well as bad—improve performance, get results, and create a successful enterprise. In this groundbreaking guide, top leadership consultant, visionary, and coach John Baldoni explores the leadership communication styles of many of the world’s most influential...

Technologies for the Wireless Future: Wireless World Research Forum (WWRF)
Technologies for the Wireless Future: Wireless World Research Forum (WWRF)
As 3G mobile communication systems are being deployed, the research community is now focusing on the research needed for the long-term evolution of 3G and 4G systems. This fully updated second volume of the successful Technologies for the Wireless Future is a unique and timely book, presenting up-to-the-minute ideas and trends in mobile...
Java Message Service
Java Message Service
The Java Message Service (JMS) provides a way for the components of a distributed application to talk asynchronously, or for welding together legacy enterprise systems. Think of it as application-to-application e-mail. Unlike COM, JMS uses one or more JMS servers to handle the messages on a store-and-forward basis, so that the loss of one or more...
Error Correction Coding: Mathematical Methods and Algorithms
Error Correction Coding: Mathematical Methods and Algorithms
An unparalleled learning tool and guide to error correction coding

Error correction coding techniques allow the detection and correction of errors occurring during the transmission of data in digital communication systems. These techniques are nearly universally employed in modern communication systems, and are thus an important component of...

Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
This lecture is a review of what is known about modeling human speech recognition (HSR). A model is proposed, and data are tested against the model.

There seem to be a large number of theories, or points of view, on how human speech recognition functions, yet few of these theories are comprehensive. What is needed is a set of models that are...

Windows Communication Foundation 4 Step by Step
Windows Communication Foundation 4 Step by Step

Microsoft Windows Communication Foundation (WCF), alongside Windows Workflow Foundation (WF) and Windows Presentation Foundation (WPF), has become part of the primary framework for building the next wave of business applications for the Microsoft Windows operating system. WCF provides the underpinning technology driving distributed solutions...

Microsoft Lync Server 2010 Unleashed
Microsoft Lync Server 2010 Unleashed

This is the industry’s most comprehensive, realistic, and useful guide to Microsoft Lync Server 2010. It brings together “in-the-trenches” guidance for all facets of planning, integration, deployment, and administration, from expert consultants who’ve spent years implementing Microsoft Unified...

Ecological Modeling for Resource Management
Ecological Modeling for Resource Management

This book was developed from a workshop on the “Effective Use of Ecological Modeling in Management,” held in Oak Ridge, Tennessee, on October 23–26, 2000. The workshop was sponsored by the Department of Defense’s (DoD’s) Strategic Environmental Research and Development Program (SERDP), the Army Research...

Email Security with Cisco IronPort (Networking Technology: Security)
Email Security with Cisco IronPort (Networking Technology: Security)

The Cisco IronPort Email Security Appliances (ESA) have been deployed in thousands of networks to accept, filter, and deliver email messages. The ESA is easy to deploy and its security-filtering settings are effective right out of the box. However, many organizations are looking for more from their messaging environment...

Advances in Power and Control Engineering: Proceedings of GUCON 2019 (Lecture Notes in Electrical Engineering)
Advances in Power and Control Engineering: Proceedings of GUCON 2019 (Lecture Notes in Electrical Engineering)

The book features selected high-quality papers presented at the International Conference on Computing, Power and Communication Technologies 2019 (GUCON 2019), organized by Galgotias University, India, in September 2019. Divided into three sections, the book discusses various topics in the fields of power electronics and control...

unlimited object storage image
Result Page: 186 185 184 183 182 181 180 179 178 177 176 175 174 173 172 171 170 169 168 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy