Home | Amazing | Today | Tags | Publishers | Years | Search 
Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management
Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management

Fifteen years ago, Michael and I wrote the first version of this book. A little more than 400 pages, the book fulfilled our goal of surveying the field of data mining by bridging the gap between the technical and the practical, by helping business people understand the data mining techniques and by helping technical people understand the...

UMTS Signaling: UMTS Interfaces, Protocols, Message Flows and Procedures Analyzed and Explained
UMTS Signaling: UMTS Interfaces, Protocols, Message Flows and Procedures Analyzed and Explained

UMTS is real. In a continuously growing number of countries we can walk in the stores of mobile network operators or resellers and take UMTS PC cards or even third-generation (3G) phones home and use them instantly. Every day the number of equipments and their feature sets gets broader. The “dream” of multimedia on mobile...

Guide to Computer Forensics and Investigations
Guide to Computer Forensics and Investigations

The rapid advance of technology has changed and influenced how we think about gathering digital evidence. Soon after the attacks on the World Trade Center in New York City on September 11, 2001, many young men and women volunteered to serve their country in different ways. For those who did not choose the military, options included...

Tried and True Object Development: Industry-Proven Approaches with UML (SIGS: Managing Object Technology)
Tried and True Object Development: Industry-Proven Approaches with UML (SIGS: Managing Object Technology)

Written by four experienced Nokia Telecommunications software developers, this practical book focuses on object-based and component-based software development. The authors concentrate on the most important issues in real-life software development, such as the development process itself, software architecture, the development of user...

Wirelessness: Radical Empiricism in Network Cultures
Wirelessness: Radical Empiricism in Network Cultures

Motion, to take a good example, is originally a turbid sensation, of which the native shape is perhaps best preserved in the phenomenon of vertigo. (James 1996a, 62)

Between 1999 and 2009, a “ turbid ” or disordered sensation of change was felt as wireless connections expanded and eroded the edges of the Internet...

Korea's Online Gaming Empire
Korea's Online Gaming Empire

Too often I hear people say ‘ South Korea ’ and ‘ emerging market ’ in the same sentence, ” said Rich Wickham, the global head of Microsoft ’ s Windows games business. “ When it comes to gaming, Korea is the developed market, and it ’ s the rest of the world that ’ s playing...

Information Technology and the Networked Economy, Second Edition
Information Technology and the Networked Economy, Second Edition
In this text you will explore how information systems are used in business, and, more importantly, how the role of information systems has grown as a result of the telecommunications revolution.

About the Author

Dr. Patrick McKeown has been at the University of Georgia since 1976. He received his
...
Microsoft SQL Server 2000 DTS
Microsoft SQL Server 2000 DTS
Microsoft SQL Server 2000 Data Transformation Services covers all facets in the development of data transformations with DTS. The reader will learn how to create each of the DTS tasks, both in the User Interface supplied with SQL Server and through the object model using Visual Basic or VBScript.

Microsoft SQL Server 2000 Data Transformation...

Intelligent Image Processing
Intelligent Image Processing
Intelligent Image Processing describes the EyeTap technology that allows non-invasive tapping into the human eye through devices built into eyeglass frames. This isn't merely about a computer screen inside eyeglasses, but rather the ability to have a shared telepathic experience among viewers. Written by the developer of the EyeTap principle, this...
Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Find out how IAX can complement SIP to overcome complications encountered in current SIP-based communications

Written by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal,...

Newnes Data Communications Pocket Book, Fourth Edition (Newnes Pocket Books)
Newnes Data Communications Pocket Book, Fourth Edition (Newnes Pocket Books)
*A practical engineer’s reference that puts the key information at your fingertips
*Covers essential data, techniques and working practice
*This update covers the latest international regulations

Newnes Data Communications Pocket Book is a remarkable toolkit for engineers, IT professionals, managers and students. The wide
...
Microsoft Voice and Unified Communications
Microsoft Voice and Unified Communications

The telecommunications industry is changing in ways not thought possible. We, as a human race, are seeing a complete transformation in how human communication can be used throughout applications and devices, truly connecting people and processes, regardless of geography, at a speed of innovation that is incomprehensible. The future of these...

Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy