Home | Amazing | Today | Tags | Publishers | Years | Search 
ULSI Technology
ULSI Technology

ULSI Technology describes the theoretical and practical aspects of the most advanced state of electronics technology-ultralarge-scale integration (ULSI), where an integrated circuit (IC) chip contains over 10 million semiconductor devices. With ULSI technology, the cost of electronics products will decrease while the system functionality and...

Sams Teach Yourself Google Places in 10 Minutes (Sams Teach Yourself -- Minutes)
Sams Teach Yourself Google Places in 10 Minutes (Sams Teach Yourself -- Minutes)

Sams Teach Yourself Google Places in 10 Minutes

 Sams Teach Yourself Google Places in 10 Minutes gives you straightforward, practical answers when you need fast results. By working through its 10-minute lessons, you’ll learn how to claim your free Google Places business...

The RenderMan Shading Language Guide
The RenderMan Shading Language Guide

Over the past 15 years, movie audiences all over the world have witnessed the emergence of one of the most revolutionary tools ever created to aid in the creation of films, the use of Computer Generated Imagery (CGI). Through the use of CGI, filmmakers have transported us to distant places, put us right in the middle of very dangerous shots,...

Protecting Your Mobile App IP: The Mini Missing Manual
Protecting Your Mobile App IP: The Mini Missing Manual

Learn four cost-effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won't stop people from misappropriating your secrets, stealing your name, and copying your code. But if any of those things do...

Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

RFID-Enabled Sensor Design and Applications (Integrated Microsystems)
RFID-Enabled Sensor Design and Applications (Integrated Microsystems)

Radio frequency identification (RFID) is gaining in popularity, especially as we find ourselves in this communications age and headed towards a ubiquitous computing world. Automatic identification systems become an important aspect not just in today’s technology but also as part of our daily life. We need RFID in our cars,...

Drowning in Oil: BP & the Reckless Pursuit of Profit
Drowning in Oil: BP & the Reckless Pursuit of Profit

As night settled on April 20, 2010, a series of explosions rocked Deepwater Horizon, the immense semisubmersible drilling platform leased by British Petroleum, located 40 miles off the Louisiana coast. The ensuing inferno claimed 11 lives, and it would rage uncontained for two days, until its wreckage sank to a final resting place nearly a...

Pro Puppet
Pro Puppet

The lives of system administrators and operations staff often revolve around a series of repetitive tasks: configuring hosts, creating users, and managing applications, daemons, and services. Often these tasks are repeated many times in the life cycle of one host, from building to decommissioning, and as new configuration is added or...

Femtocells: Design & Application
Femtocells: Design & Application

As a cellular standard evolves, there are many variables that must be optimized. A few of these variables are directly related to higher throughput, increased user capacity, and in general improved system performance. The optimization techniques have involved higherorder modulation, improved multiple access (in both time and frequency), more...

ISO 20022 For Dummies®
ISO 20022 For Dummies®

The financial services industry has a unique opportunity. Despite all of the intricacies of our business processes and transaction types, our industry has the opportunity to identify and promote interoperable business processes that contain risk, reduce cost and deliver effective products and solutions. How can we achieve this? Through...

APM Best Practices: Realizing Application Performance Management (Books for Professionals by Professionals)
APM Best Practices: Realizing Application Performance Management (Books for Professionals by Professionals)

The objective of APM Best Practices: Realizing Application Performance Management is to establish reliable application performance management (APM) practices—to demonstrate value, to do it quickly, and to adapt to the client circumstances. It's important to balance long-term goals with short-term deliverables, but...

Advances in Visual Computing: 6th International Symposium, ISVC 2010, Part III
Advances in Visual Computing: 6th International Symposium, ISVC 2010, Part III

The three volume set LNCS 6453, LNCS 6454, and LNCS 6455 constitutes the refereed proceedings of the 6th International Symposium on Visual Computing, ISVC 2010, held in Las Vegas, NV, USA, in November/December 2010. The 93 revised full papers and 73 poster papers presented together with 44 full and 6 poster papers of 7 special tracks were...

Result Page: 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy