Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mobile Information Systems: IFIP TC 8 Working Conference on Mobile Information Systems (MOBIS)
Mobile Information Systems: IFIP TC 8 Working Conference on Mobile Information Systems (MOBIS)
Mobility is perhaps the most important market and technological trend
within information and communication technology. With the advent of new
mobile infrastructures providing higher bandwidth and constant connection
to the network from virtually everywhere, the way people use information
resources is predicted to be radically
...
Founders at Work: Stories of Startups' Early Days (Recipes: a Problem-Solution Ap)
Founders at Work: Stories of Startups' Early Days (Recipes: a Problem-Solution Ap)
Sprinters apparently reach their highest speed right out of the blocks, and spend the rest of the race slowing down. The winners slow down the least. It’s that way with most startups too. The earliest phase is usually the most productive. That’s when they have the really big ideas. Imagine what Apple was like when 100 percent of its...
Intelligent Open Learning Systems: Concepts, Models and Algorithms (Intelligent Systems Reference Library)
Intelligent Open Learning Systems: Concepts, Models and Algorithms (Intelligent Systems Reference Library)

The book addresses the problem known in the literature as Open and Distance Learning (ODL). ODL describes new concepts of the process of learning-teaching organization. ODL is becoming very popular at universities that offer education via online and/or distance learning, both in synchronous or asynchronous modes. More precisely, the...

Lead with a Story: A Guide to Crafting Business Narratives That Captivate, Convince, and Inspire
Lead with a Story: A Guide to Crafting Business Narratives That Captivate, Convince, and Inspire

Storytelling has come of age in the business world. Today, many of the most successful companies use storytelling as a leadership tool. At Nike, all senior executives are designated "corporate storytellers." 3M banned bullet points years ago and replaced them with a process of writing "strategic narratives." Procter &...

Handbook of Research on Mobile Multimedia
Handbook of Research on Mobile Multimedia
The demand for mobile access to data no matter where the data is stored and where the user happens to be, in addition to the explosive growth of the Internet and the rising popularity of mobile devices, are among the factors that have created a dynamic business environment, where companies are competing to provide customers access to information...
Adobe Flex 2: Training from the Source
Adobe Flex 2: Training from the Source
Part of the Adobe Training from the Source series, the official curriculum from Adobe, developed by experienced trainers. Using project-based tutorials, this book/CD volume is designed to teach the techniques needed to create sophisticated, professional-level projects. Each book includes a CD that contains all the files used in the lessons, plus...
Pragmatic Version Control: Using Subversion (The Pragmatic Starter Kit Series) (2nd Edition)
Pragmatic Version Control: Using Subversion (The Pragmatic Starter Kit Series) (2nd Edition)
This book covers the theory behind version control and how it can help developers become more efficient, work better as a team, and keep on top of software complexity. Version control, done well, is your "undo" button for the project: nothing is final, and mistakes are easily rolled back.

This book describes Subversion 1.3, the...

Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
The idea for this book came out of a need to find a text for a unit in Information Warfare given to Doctor of Business Administration students. Most of the existing texts had a military flavour and so did not suit our task. Others concentrated on security aspects and assumed some level of knowledge in this area. What we wanted was a text that...
GPU Computing Gems Emerald Edition (Applications of GPU Computing Series)
GPU Computing Gems Emerald Edition (Applications of GPU Computing Series)

We are entering the golden age of GPU computing. Since the introduction of CUDA in 2007, more than 100 million computers with CUDA-capable GPUs have been shipped to end users. Unlike the previous GPGPU shader programming models, CUDA supports parallel programming in C. From my own experience in teaching CUDA programming, C programmers...

Idea to iPhone: The essential guide to creating your first app for the iPhone and iPad
Idea to iPhone: The essential guide to creating your first app for the iPhone and iPad

Learn to build apps from scratch without any programming experience!

Do you have a great idea for an app but have no idea where to begin? Then this is the book for you. Even if you have no programming experience, this easy-to-follow, step-by-step guide teaches you exactly what you need to know to bring your app idea to life...

Your Leadership Story: Use Your Story to Energize, Inspire, and Motivate
Your Leadership Story: Use Your Story to Energize, Inspire, and Motivate

Stories have power. They move people in a way that facts and figures can't. Many leaders use stories as a tool, but leadership development expert Tim Tobin says most have no idea what tale their own leadership is telling. He shows how, by thinking of your career as a narrative—with a plot, characters, and an...

Building and Managing Enterprise-Wide Portals
Building and Managing Enterprise-Wide Portals
Inspired by similar questions, we decided to put together a systematic review of current Web technology and trends to meet two goals:
  1. Provide information to people who need general, rather than in depth, technical knowledge such as information technology (IT) development mangers, software designers, architects, IT students, and...
unlimited object storage image
Result Page: 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy