Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IT Project Portfolio Management
IT Project Portfolio Management
While consulting for a large company’s information technology (IT) department, I was asked to help find a way to better manage the various IT projects that were spread among all of its business units. The executives wanted me to research tools that would help them prioritize the projects so they would know which ones were healthy contributors...
Technologies and Systems for Access and Transport Networks (Artech House Mobile Communications)
Technologies and Systems for Access and Transport Networks (Artech House Mobile Communications)
Take command of core technologies at the heart of all telecommunications systems with the first book expressly designed to help you apply, reuse, and enhance building-block components from one generation of networks to the next. This unique problem-solver unravels the complexities behind such technologies as synchronization, multiple access,...
All Yesterdays' Parties: The Velvet Underground in Print, 1966-1971
All Yesterdays' Parties: The Velvet Underground in Print, 1966-1971
The Velvet Underground, among the most influential bands of all time, are credited with creating a streetwise, pre-punk sensibility that has become inseparable from the popular image of downtown New York. "Discovered" by Andy Warhol in 1966, the VU - with their original line-up of Lou Reed, John Cale, Sterling Morrison, and Mo...
Fixing and Flipping Real Estate: Strategies for the Post-Boom Era
Fixing and Flipping Real Estate: Strategies for the Post-Boom Era

Let’s face it—fixing and flipping houses is sexy. Who doesn’t love the idea of buying a rundown, mold-infested shack and transforming it into someone’s dream home for massive profits? Reality TV shows make it look so easy. A little paint here, some new kitchen cabinets there, and presto! The house is sold for big bucks...

With Clough, By Taylor
With Clough, By Taylor

Brian Clough famously remarked. "I'm not equipped to manage successfully without Peter Taylor. I am the shop window and he is the goods in the back."

Originally published in 1980, With Clough, By Taylor is the definitive account of the relationship that revolutionised English football and the trade...

JBoss Drools Business Rules
JBoss Drools Business Rules

In business, a lot of actions are trigged by rules: "Order more ice cream when the stock is below 100 units and temperature is above 25° C", "Approve credit card application when the credit background check is OK, past relationship with the customer is profitable, and identity is confirmed", and so on. Traditional...

Photographing Washington D.C. Digital Field Guide
Photographing Washington D.C. Digital Field Guide

The ideal companion guide for capturing awe-inspiring photos of Washington, D.C.!

Whether using a compact camera or a high-end dSLR, this companion guide provides you with detailed information for taking spectacular shots of some of the most recognizable architecture in the world. Whether you aim to capture memorable photos...

Architecture, Society, and Ritual in Viking Age Scandinavia: Doors, Dwellings, and Domestic Space
Architecture, Society, and Ritual in Viking Age Scandinavia: Doors, Dwellings, and Domestic Space
In this book, Marianne Hem Eriksen explores the social organization of Viking Age Scandinavia through a study of domestic architecture, and in particular, the doorway. A highly charged architectural element, the door is not merely a practical, constructional solution. Doors control access, generate movement, and demark boundaries, yet also serve...
Successful Proposal Strategies For Small Businesses
Successful Proposal Strategies For Small Businesses
Successful Proposal Strategies for Small Businesses: Using Knowledge
Management to Win Government, Private-Sector, and International
Contracts, Fourth Edition, is designed to provide entrepreneurs, as
well as beginner and experienced proposal managers, capture managers,
proposal writers, proposal specialists and coordinators,
...
Privacy Protection and Computer Forensics, Second Edition
Privacy Protection and Computer Forensics, Second Edition
This book deals with security from hostile computer forensics (mostly on
one’s computer, but also on one’s digital camera, fax machine, and related
computer-like electronics), as distinct from network forensics, which in this
context is snooping into users’ online activities. Computer forensics deals
with
...
More About High-volume Web Sites (IBM Redbooks)
More About High-volume Web Sites (IBM Redbooks)

In 1999, Dr Willy Chiu, noticing the emergence of many large and complex customer Web sites, and observing how they often failed to deliver the expected robustness and customer satisfaction, set up a new team within IBM called the High-Volume Web Sites (HVWS) team. This team was chartered to work with customers and IBM internal teams involved in...

GSM Networks: Protocols, Terminology and Implementation
GSM Networks: Protocols, Terminology and Implementation
Someone who wants to get to know the customs of a country frequently
receives the advice to learn the language of that country. Why? Because the differences
that distinguish the people of one country from those of another are
reflected in the language. For example, the people of the islands of the Pacific
do not have a term for
...
unlimited object storage image
Result Page: 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy