What is the Internet of Things? It's billions of embedded computers, sensors, and actuators all connected online. If you have basic programming skills, you can use these powerful little devices to create a variety of useful systems—such as a device that waters plants when the soil becomes dry. This hands-on guide...
This book is all about wrangling a herd of network computers so that all
display the correct time. This may seem like a really narrow business,
but the issues go far beyond winding the clock on your display taskbar.
Carefully coordinated, reliable, and accurate time is vital for traffic control
in the air and on the ground, buying and...
We wrote this book because we love games. We also love sound and music, and we love what they
can bring to games to make them thrilling, involving, and moving. We want you to be able to
try out your sound and your music in a real game. For a book whose examples are based exclusively
around one piece of software, it may appear...
It doesn't matter how much time you invest in Android design, or even how careful
you are when programming, mistakes are inevitable and bugs will appear. This
book will help you minimize the impact of these errors in your Android project and
increase your development productivity. It will show you the problems that are
easily...
Cryptography is a key technology in electronic security systems.
Modern cryptograpic techniques have many uses, such as to digitally
sign documents, for access control, to implement electronic money,
and for copyright protection. Because of these important uses it is
necessary that users be able to estimate the efficiency and security...
Information networking has emerged as a multidisciplinary diversified area of research over
the past few decades. From traditional wired telephony to cellular voice telephony and from
wired access to wireless access to the Internet, information networks have profoundly
impacted our lifestyle. At the time of writing, over 3 billion...
A recent CBS poll revealed that, as a result of corporate scandals at Enron, WorldCom,
Adelphia Communications, and others, a whopping two-thirds of Americans believe that
corporate executives are dishonest. This overall assessment is even worse now than during
the last financial crises, the savings and loan debacle of the 1980s....
I’m delighted that Cengage Learning invited me to write this third edition
of Digital Painting Fundamentals with Corel Painter. The earlier books,
for versions X (pronounced “ten”) and 11 (pronounced “eleven”) were
greeted with very positive responses from users and critics, not just my
friends and...
Our interest in human–computer interaction started with our participation in the TT2
project (“Trans–Type-2”, 2002–2005—http://www.tt2.atosorigin.es), funded by the
European Union (EU) and coordinated by Atos Origin, which dealt with the development
of statistical-based technologies for computer...
Take the book you’re holding in your hands right now, and resize it so that
it’s easier to read.
Don’t feel bad—I’ve given you an impossible exercise, but I promise the
book will be filled with practical instead of ridiculous exercises from here on
out. That’s because we’re going to...
Until recently, most prepress tasks—such as scanning color
photographs, trapping, imposition, color correction, and halftone
screening—were performed exclusively by skilled specialists
working manually or on expensive proprietary systems. Today
many of these tasks can be accomplished on the desktop.
PowerShell is becoming the de facto administration tool for Microsoft
Server products. The ability to script out reusable steps and code makes life
easier for administrators, developers, and managers alike. With the latest
release of Microsoft SharePoint Server 2010, PowerShell is the recommended
administration...