Home | Amazing | Today | Tags | Publishers | Years | Search 
Data Scheduling and Transmission Strategies in Asymmetric Telecommunication Environments
Data Scheduling and Transmission Strategies in Asymmetric Telecommunication Environments
Recent advancement and increased growth in Web technologies have resulted in an even greater need for more efficient scheduling and data transmission strategies. An increased reliance on wireless communications devices, with their constraint issues, has further complicated the problem. While both push and pull strategies provide certain solutions,...
Implementing a Digital Asset Management System: For Animation, Computer Games, and Web Development
Implementing a Digital Asset Management System: For Animation, Computer Games, and Web Development
"It's certainly a challenging read, but one that's worth spending some brain power on if you're keen to create a successful computer-based production company. Getting into such a competitive market means doing some research, and for aspiring imageers this is a great first step." - Advanced Photoshop

In situations
...
UMTS Network Planning and Development: Design and Implementation of the 3G CDMA Infrastructure
UMTS Network Planning and Development: Design and Implementation of the 3G CDMA Infrastructure
The engineer's guide to the planning and implementation of UMTS networks for 3G telecoms deployment.

UMTS is the wireless network technology behind the rollout of Third Generation (3G) mobile telecoms networks which will bring video, music and internet services to the cellphone and a range of electronic products.
...
Network Query Language with CDROM
Network Query Language with CDROM
Learn about an exciting new technology that is revolutionizing network and Internet content delivery

As the first pure language of the content engineering era, Network Query Language (NQL) is the ultimate tool for rapid and simple development of intelligent agents, bots, spiders, middleware, and scalable business-to-business content aggregation...

Microsoft Data Mining: Integrated Business Intelligence for e-Commerce and Knowledge Management
Microsoft Data Mining: Integrated Business Intelligence for e-Commerce and Knowledge Management
Data mining exploits the knowledge that is held in the enterprise data store by examining the data to reveal patterns that suggest better ways to produce profit, savings, higher-quality products, and greater customer satisfaction. Just as the lines on our faces reveal a history of laughter and frowns, the patterns embedded in data reveal a history...
Official Introduction to the Itil Service Lifecycle (Official Introduction)
Official Introduction to the Itil Service Lifecycle (Official Introduction)
This book is dedicated to the people who practise IT service management. Through their knowledge and experiences we have shaped the present and can see further toward the future along our journey to service excellence.

Over the past two decades the world of IT has changed dramatically. The IT Infrastructure Library framework has grown
...
Getting Started with Flex 3: An Adobe Developer Library Pocket Guide for Developers (Adobe Developer Library)
Getting Started with Flex 3: An Adobe Developer Library Pocket Guide for Developers (Adobe Developer Library)
Discover how easy RIA development can be with this one-of-a-kind handbook from the Adobe Developer Library. Several clear, step-by-step mini-tutorials teach you about web services, event handling, designing user interfaces with reusable components, and more. After finishing this guide, you'll be able to build Flash applications ranging from widgets...
Handbook of Integrated Risk Management for E-Business: Measuring, Modeling, and Managing Risk
Handbook of Integrated Risk Management for E-Business: Measuring, Modeling, and Managing Risk
"This book provides a recipe for the practical application of technology and the implementation of solutions to solve specific problems." -- Dr. Krishna Nathan, Vice President, IBM Research

This ground-breaking professional reference integrates converging views of e-business processes and offers ways to
...
Linux Security: Craig Hunt Linux Library
Linux Security: Craig Hunt Linux Library
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators

This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the...

Microsoft Office Access 2003 in a Snap (Sams Teach Yourself)
Microsoft Office Access 2003 in a Snap (Sams Teach Yourself)
Microsoft Access is an extremely powerful product. It is the perfect product for storing and working with database information. Many people store database information in Word documents or Excel spreadsheets. Although Excel has limited database capabilities, it is not a robust database product. Microsoft Access is the perfect product for storing...
Oracle 10g Developing Media Rich Applications
Oracle 10g Developing Media Rich Applications
Integrating Multimedia features in databases in one of the most important new applications in the last 20 years

Oracle 10g Developing Media Rich Applications is focused squarely on database administrators and programmers as the foundation of multimedia database applications. With the release of Oracle8 Database in 1997,
...
Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information (TM)
Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information (TM)
No two data quality projects are the same. Some are large efforts focused entirely on improving some quality aspect of information. Others are subprojects within other efforts, such as a data migration. Still others are led by a few individuals trying to make a difference as they perform their everyday activities. What I like about McGilvray's Ten...
Result Page: 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy