Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CCIE Wireless Exam (350-050) Quick Reference
CCIE Wireless Exam (350-050) Quick Reference

With the introduction of wireless LAN (WLAN), IP networks are now also available for those applications on which wired technologies are not suitable or no wired connectivity is available at all. The following are a few wireless use cases:

  • Home ISP connectivity: Consumer products
  • Building-to-building...
Web Application Design Patterns (Interactive Technologies)
Web Application Design Patterns (Interactive Technologies)
Increasingly, software applications are built using web technologies and made accessible via web browsers (e.g., Internet Explorer, Firefox, Safari, and Opera). They are commonly referred to as web applications, or hosted applications—applications based on a software as a service (SaaS) model1 or cloud computing

...
Taming The Big Data Tidal Wave: Finding Opportunities in Huge Data Streams with Advanced Analytics
Taming The Big Data Tidal Wave: Finding Opportunities in Huge Data Streams with Advanced Analytics

You receive an e-mail. It contains an offer for a complete personal computer system. It seems like the retailer read your mind since you were exploring computers on their web site just a few hours prior….

As you drive to the store to buy the computer bundle, you get an offer for a discounted coffee from the coffee shop you...

Inside the Mind of the Shopper: The Science of Retailing
Inside the Mind of the Shopper: The Science of Retailing

What do you really do when you shop? The answers are fascinating and, for retailers, they're cash in the bank. In Inside the Mind of the Shopper: The Science of Retailing, world-renowned retail consultant Dr. Herb Sorensen, Ph.D. uncovers the truth about the retail shopper and rips away the myths and mistakes...

High Tech/High Touch: Technology and Our Search for Meaning
High Tech/High Touch: Technology and Our Search for Meaning
The one great megatrend of the new millennium. In this important and timely book encompassing the key trends of our time, John Naisbitt, the world's foremost social forecaster and bestselling author, takes us on a compelling and kaleidoscopic tour of our contemporary 'technology immersion' and our accelerated search for meaning. High...
The Digital Consumer Technology Handbook: A Comprehensive Guide to Devices, Standards, Future Directions, and Programmable Logic Solutions
The Digital Consumer Technology Handbook: A Comprehensive Guide to Devices, Standards, Future Directions, and Programmable Logic Solutions

Studying the history of consumer electronics is nothing short of fascinating. The landscape is filled with countless stories of product successes and failures— fickle consumer adoptions, clever marketing campaigns that outsmart the best technologies, better packaging winning over better technology, and products that are simply...

Getting Started with BeagleBone: Linux-Powered Electronic Projects With Python and JavaScript
Getting Started with BeagleBone: Linux-Powered Electronic Projects With Python and JavaScript

Many people think of Linux as a computer operating system, running on users' desktops and powering servers. But Linux can also be found inside many consumer electronics devices. Whether they're the brains of a cell phone, cable box, or exercise bike, embedded Linux systems blur the distinction between computer and device.
...

3D Printing for Architects with MakerBot
3D Printing for Architects with MakerBot

Learn how to create successful 3D architectural models that you can print out with MakerBot Replicator 2X. It brings an extra dimension to your presentations and distinguishes your practice from the rest.

Overview

  • Intelligently design a model to be printed on the MakerBot from the scratch
  • ...
Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

Fixed Mobile Convergence (McGraw-Hill Communications Series)
Fixed Mobile Convergence (McGraw-Hill Communications Series)
It would be an understatement to say that a book on fixed-mobile convergence is very he was convinced that mobile phones work off the satellites up in the sky—how an educated person in our enlightened times can be so technically unaware! We then kept him amused for about 15 minutes with a description of a highly developed terrestrial...
Introduction to Probability and Statistics
Introduction to Probability and Statistics
Every time you pick up a newspaper or a magazine, watch TV, or surf the Internet, you encounter statistics. Every time you fill out a questionnaire, register at an online website, or pass your grocery rewards card through an electronic scanner, your personal information becomes part of a database containing your personal...
Pro iOS 5 Augmented Reality
Pro iOS 5 Augmented Reality
Welcome to Pro iOS 5 Augmented Reality. Augmented reality (AR) has existed in sci-fi movies for decades, is used in the military for head-up displays (HUDs), and until recently, has been a thing of the future. With the upswing in mobile applications since the introduction of the iPhone and the Android operating system, applications...
unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy