Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Startup Cities: Why Only a Few Cities Dominate the Global Startup Scene and What the Rest Should Do About It
Startup Cities: Why Only a Few Cities Dominate the Global Startup Scene and What the Rest Should Do About It
This book offers a comprehensive model for explaining the success and failure of cities in nurturing startups, presents detailed case studies of how participants in that model help or hinder startup activity, and shows how to apply these lessons to boost local startup activity.

Startup Cities explains the...

Mastering 3D Printing in the Classroom, Library, and Lab (Technology in Action)
Mastering 3D Printing in the Classroom, Library, and Lab (Technology in Action)
Learn how to manage and integrate the technology of 3D printers in the classroom, library, and lab. With this book, the authors give practical, lessons-learned advice about the nuts and bolts of what happens when you mix 3D printers, teachers, students, and the general public in environments ranging from K-12 and university classrooms...
Practical Quantum Computing for Developers: Programming Quantum Rigs in the Cloud using Python, Quantum Assembly Language and IBM QExperience
Practical Quantum Computing for Developers: Programming Quantum Rigs in the Cloud using Python, Quantum Assembly Language and IBM QExperience
Write algorithms and program in the new field of quantum computing. This book covers major topics such as the physical components of a quantum computer: qubits, entanglement, logic gates, circuits, and how they differ from a traditional computer. Also, Practical Quantum Computing for Developers...
Hands-On Cybersecurity for Architects: Plan and design robust security architectures
Hands-On Cybersecurity for Architects: Plan and design robust security architectures

Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization

Key Features

  • Architect complex security structures using standard practices and use cases
  • Integrate security with any...
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications

Your one-stop guide to blockchain technology and its business applications

Key Features

  • Assimilate blockchain services such as Ethereum and Hyperledger to transform industrial applications
  • Know in and out of blockchain technology to understand various business use...
Practical Big Data Analytics: Hands-on techniques to implement enterprise analytics and machine learning using Hadoop, Spark, NoSQL and R
Practical Big Data Analytics: Hands-on techniques to implement enterprise analytics and machine learning using Hadoop, Spark, NoSQL and R

Get command of your organizational Big Data using the power of data science and analytics

Key Features

  • A perfect companion to boost your Big Data storing, processing, analyzing skills to help you take informed business decisions
  • Work with the best tools such as Apache...
Telecosmos: The Next Great Telecom Revolution
Telecosmos: The Next Great Telecom Revolution
An insider's guide to the exciting future of telecommunications

The last great telecommunications revolution brought us fiber optics, mobile phones, videoconferencing, and a host of other innovations that improved life and business and connected individuals in ways never imagined. Now emerging technologies such as Voice over Internet Protocol...

High-performance and Hardware-aware Computing
High-performance and Hardware-aware Computing

High-performance system architectures are increasingly exploiting heterogeneity: multi- and manycore-based systems are complemented by coprocessors, accelerators, and reconfigurable units providing huge computational power. However, applications of scientific interest (e.g. in high-performance computing and numerical simulation) are not yet...

The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets
The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets

You can't predict or prevent disasters. That's reality. But with The Disaster Recovery Handbook, you can create a plan to ensure your business will continue and your vital operations, facilities, and assets will be protected. Expect the best. Plan for the worst. Survey the headlines: superstorms, data breaches, pandemics, system...

Microservices: Flexible Software Architecture
Microservices: Flexible Software Architecture

The Most Complete, Practical, and Actionable Guide to Microservices

 

Going beyond mere theory and marketing hype, Eberhard Wolff presents all the knowledge you need to capture the full benefits of this emerging paradigm. He illuminates...

High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication
High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication
"Building networks with high performance demanded by today's applications requires a complete understanding of the basic principles and latest techniques. This book is the definitive guide to both."-Lyman Chapin

High-speed networking is the essential enabler of modern sophisticated distributed computing applications. This
...
System Parameter Identification: Information Criteria and Algorithms (Elsevier Insights)
System Parameter Identification: Information Criteria and Algorithms (Elsevier Insights)

Recently, criterion functions based on information theoretic measures (entropy, mutual information, information divergence) have attracted attention and become an emerging area of study in signal processing and system identification domain. This book presents a systematic framework for system identification and information processing,...

Result Page: 123 122 121 120 119 118 117 116 115 114 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy