Home | Amazing | Today | Tags | Publishers | Years | Search 
Digital Video Broadcasting: Technology, Standards, and Regulations
Digital Video Broadcasting: Technology, Standards, and Regulations
Many books and articles on the transition of television from analog to digital transmission have been published in recent years. This transition is still in its infancy, but it will inevitably take place in the years to come. Due to digitization, the existing barriers between audio, video, and data generation and transmission...
California and the Fictions of Capital (Commonwealth Center Studies in the History of American Culture)
California and the Fictions of Capital (Commonwealth Center Studies in the History of American Culture)

Between the frequently recounted events of the Gold Rush and the Great Depression stretches a period of California history that is equally crucial but less often acknowledged. In his fresh, synthetic consideration of these in-between years, George L. Henderson points specifically to the take-off of California's rural juggernaut between...

North Korea: The Struggle Against American Power
North Korea: The Struggle Against American Power
George W. Bush's infamous remark about the 'Axis of Evil' brought North Korea dramatically back into the international spotlight. During the late 1990s relations between North Korea and the US and its allies were on the mend. However, the election of George W. Bush resulted in renewed crisis. The nuclear accord between the two...
The Economics of Cloud Computing: An Overview For Decision Makers (Network Business)
The Economics of Cloud Computing: An Overview For Decision Makers (Network Business)

In my conversations with customers, partners, and peers, one topic seems to bubble to the surface more than any other: How do I financially justify the move to the cloud?

Initially, the notion of a business case for cloud computing seemed almost redundant. It seemed to me that the cost savings associated with...

Energy Supply and Renewable Resources
Energy Supply and Renewable Resources
One has only to read a newspaper or magazine to realize the importance of energy at this early juncture of the 21st century. It will surely become more critical as world demand for oil continues to increase and its supply peaks and begins to fall.

Industrialized nations have become addicted to an ever-increasing
...
America's Secret Establishment: An Introduction to the Order of Skull & Bones
America's Secret Establishment: An Introduction to the Order of Skull & Bones
The book began with an anonymous donation to the author of an 8-inch package of documents in the early 1980s. Nothing less than the membership list and supporting documents for a truly secret society the Yale Skull and Bones.

The late Johnny Johnson, of Phoenix Arizona was the spark that moved me to write first a
...
The Twitter Book
The Twitter Book
In March 2006, a little communications service called Twttr debuted. It began as a side project at a San Francisco podcasting company, but it wasn’t long before the side project had become the main event.

Today, just over five years later, Twitter is booming. In September 2011, the service announced that it had 100
...
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the...

Using CiviCRM
Using CiviCRM

Donald Lobo, Michal Mach, and I started CiviCRM almost six years ago. Back then, open source software had gained traction in the operating system arena, but the idea of an open source application designed from the ground up to meet the needs of non-profits and other civic sector organizations was pretty radical. We were convinced that there...

Encyclopedia of Cryptology
Encyclopedia of Cryptology

Secret writing for the transmission of messages has been practiced for nearly 4,000 years. According to David Kahn, the great historian of cryptology, the first example of an intentionally altered message can be traced to a tomb in ancient Egypt dated about 1900 b.c. In the 40 centuries since that...

Special Edition Using XML Schema
Special Edition Using XML Schema

The Extensible Markup Language is one of the most controversial technologies to come into vogue in recent years. Starting with humble roots with the desire to create a simple subset of SGML, XML burst onto the scene to a fantastic fanfare from developers and hype from the press. As more people have started to adopt XML, more...

Methods for Mining and Summarizing Text Conversations (Synthesis Lecture on Data Management)
Methods for Mining and Summarizing Text Conversations (Synthesis Lecture on Data Management)

Before the invention of the Internet and the creation of the Web, the vast majority of human conversations were in spoken form, with the only notable, but extremely limited, exception being epistolary exchanges. Some important spoken conversations, such as criminal trials and political debates (e.g., Hansard, the transcripts of...

Result Page: 68 67 66 65 64 63 62 61 60 59 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy