Home | Amazing | Today | Tags | Publishers | Years | Search 
Getting Started with Windows 8 Apps: A Guide to the Windows Runtime
Getting Started with Windows 8 Apps: A Guide to the Windows Runtime
The personal computer (PC), which first hit the market over 30 years ago, has undergone tectonic changes that, in turn, launched the PC era. PCs were primarily used in the workplace where software was simple and optimized for use with the keyboard; touching a screen was unheard of until recently. Slowly computers...
Cdma Mobile Radio Design (Artech House Telecommunications Library)
Cdma Mobile Radio Design (Artech House Telecommunications Library)
Wireless communications is growing at a phenomenal rate. From 1991 to 1999, the number of subscribers increased from about 25 million to over 250 million. Incredibly, over the next seven years, the number. of subscribers is expected to quadruple, to over 1 billion [ 1]. That growth rate is faster than that of any other consumer...
iOS 5 in the Enterprise (Develop and Design)
iOS 5 in the Enterprise (Develop and Design)

 

Those of you who have to deal with more than a handful of iPhones, iPads, or iPod Touches already know why you manage iOS devices. For everyone else, “manage” is not a short way to say “impose draconian control.” Managing devices on your network, including iOS devices,
...
CCIE Wireless Exam (350-050) Quick Reference
CCIE Wireless Exam (350-050) Quick Reference

With the introduction of wireless LAN (WLAN), IP networks are now also available for those applications on which wired technologies are not suitable or no wired connectivity is available at all. The following are a few wireless use cases:

  • Home ISP connectivity: Consumer products
  • Building-to-building...
Less Than Zero: The Case for a Falling Price Level in a Growing Economy (Hobart Papers)
Less Than Zero: The Case for a Falling Price Level in a Growing Economy (Hobart Papers)
One of main features of the 'counter-revolution' in economics which has resulted in the revival of classical liberal ideas has been a change in views about government's ability to control the economy. 'Fiscal fine tuning' is virtually discredited and monetary policy is no longer seen as a means of...
Deflation: What Happens When Prices Fall
Deflation: What Happens When Prices Fall
MAY 6, 2003, WAS AN EXTRAORDINARY DAY IN Washington, D.C. The Federal Reserve held its Federal Open Market Committee (FOMC) meeting in its two-storied chandeliered boardroom at the central bank's white marble temple on Constitution Avenue. Now, there was nothing unusual about the FOMC gathering. The committee meets...
Intelligent Document Capture with Ephesoft
Intelligent Document Capture with Ephesoft
In my recent e-book #OccupyIT: A Technology Manifesto for the Cloud, Mobile, and Social Era (http://www.aiim.org/occupyIT), I talk about the revolutionary changes that are impacting how we make enterprise technology decisions.

On the one hand, we have "the business," awed and impressed by the changes and
...
Programming Windows 8 Apps with HTML, CSS, and JavaScript
Programming Windows 8 Apps with HTML, CSS, and JavaScript
Welcome, my friends, to Windows 8! On behalf of the thousands of designers, program managers, developers, test engineers, and writers who have brought the product to life, I'm delighted to welcome you into a world of Windows Reimagined. This theme is no mere sentimental marketing ploy, intended to bestow an aura of newness to something...
Enterprise Games: Using Game Mechanics to Build a Better Business
Enterprise Games: Using Game Mechanics to Build a Better Business
We are living in a time of big changes. We face changes driven by powerful forces like world population growth; rising prices for food, fuel, and raw materials; depletion of natural resources; and increasing levels of greenhouse gases in the atmosphere. And at the very same time, we are also surrounded by the...
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...

Raspberry Pi A Quick-Start Guide
Raspberry Pi A Quick-Start Guide
Over the past decades computers have gotten cheaper and cheaper, so today you can find them not only beneath your desk but in nearly every consumer electronics device such as smartphones or DVD players. Still, computers aren’t so cheap that you spontaneously buy one when shopping for your groceries. Usually, you carefully...
Introduction to Probability and Statistics
Introduction to Probability and Statistics
Every time you pick up a newspaper or a magazine, watch TV, or surf the Internet, you encounter statistics. Every time you fill out a questionnaire, register at an online website, or pass your grocery rewards card through an electronic scanner, your personal information becomes part of a database containing your personal...
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy