Organizations waste millions of dollars every year on failed projects. Failure is practically guaranteed by poor or incomplete requirements that do not properly define projects in their initial stages. Business analysis is the critical process ensuring projects start on the path toward success. To accurately determine project...
Although the Internet of Things (IoT) will play a key role in the development of next generation information, network, and communication technologies, many are still unclear about what makes IoT different from similar concepts.
Answering fundamental questions about IoT architectures and models, Unit and Ubiquitous...
Leaders who communicate properly and frequently—in good times as well as bad—improve performance, get results, and create a successful enterprise. In this groundbreaking guide, top leadership consultant, visionary, and coach John Baldoni explores the leadership communication styles of many of the world’s most influential...
As 3G mobile communication systems are being deployed, the research community is now focusing on the research needed for the long-term evolution of 3G and 4G systems. This fully updated second volume of the successful Technologies for the Wireless Future is a unique and timely book, presenting up-to-the-minute ideas and trends in mobile...
The Java Message Service (JMS) provides a way for the components of a distributed application to talk asynchronously, or for welding together legacy enterprise systems. Think of it as application-to-application e-mail. Unlike COM, JMS uses one or more JMS servers to handle the messages on a store-and-forward basis, so that the loss of one or more...
An unparalleled learning tool and guide to error correction coding
Error correction coding techniques allow the detection and correction of errors occurring during the transmission of data in digital communication systems. These techniques are nearly universally employed in modern communication systems, and are thus an important component of...
This lecture is a review of what is known about modeling human speech recognition (HSR). A model is proposed, and data are tested against the model.
There seem to be a large number of theories, or points of view, on how human speech recognition functions, yet few of these theories are comprehensive. What is needed is a set of models that are...
Microsoft Windows Communication Foundation (WCF), alongside Windows Workflow Foundation (WF) and Windows Presentation Foundation (WPF), has become part of the primary framework for building the next wave of business applications for the Microsoft Windows operating system. WCF provides the underpinning technology driving distributed solutions...
This is the industry’s most comprehensive, realistic, and useful guide to Microsoft Lync Server 2010. It brings together “in-the-trenches” guidance for all facets of planning, integration, deployment, and administration, from expert consultants who’ve spent years implementing Microsoft Unified...
This book was developed from a workshop on the “Effective Use of
Ecological Modeling in Management,” held in Oak Ridge, Tennessee,
on October 23–26, 2000. The workshop was sponsored by the Department
of Defense’s (DoD’s) Strategic Environmental Research and Development
Program (SERDP), the Army Research...
The Cisco IronPort Email Security Appliances (ESA) have been deployed in thousands of networks to accept, filter, and deliver email messages. The ESA is easy to deploy and its security-filtering settings are effective right out of the box. However, many organizations are looking for more from their messaging environment...
The book features selected high-quality papers presented at the International Conference on Computing, Power and Communication Technologies 2019 (GUCON 2019), organized by Galgotias University, India, in September 2019. Divided into three sections, the book discusses various topics in the fields of power electronics and control...