Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Man Behind the Microchip: Robert Noyce and the Invention of Silicon Valley
The Man Behind the Microchip: Robert Noyce and the Invention of Silicon Valley
Hailed as the Thomas Edison and Henry Ford of Silicon Valley, Robert Noyce was a brilliant inventor, a leading entrepreneur, and a daring risk taker who piloted his own jets and skied mountains accessible only by helicopter. Now, in The Man Behind the Microchip, Leslie Berlin captures not only this colorful individual but also the vibrant...
Implementing 802.11, 802.16, and 802.20 Wireless Networks: Planning, Troubleshooting, and Operations
Implementing 802.11, 802.16, and 802.20 Wireless Networks: Planning, Troubleshooting, and Operations

For nearly a century, voice communications networks have been king of the hill. The growth of the Internet in the 1990’s has given rise to the need for data communications networks that are as well developed and flexible as the voice networks that are currently in place. Broadband connectivity has become available in certain places...

Implementing Voice over IP
Implementing Voice over IP
In general, voice transmission over the Internet protocol (IP), or VoIP, means
transmission of real-time voice signals and associated call control information
over an IP-based (public or private) network. The term IP telephony is commonly
used to specify delivery of a superset of the advanced public switched
telephone network
...
How to Cheat at Administering Office Communications Server 2007
How to Cheat at Administering Office Communications Server 2007
Microsoft Office Communications Server (OCS) 2007 is Microsofts latest version of Live Communications Server 2005. The product provides management for all synchronous communications that takes place in real time. This includes instant messaging (IM), Voice over IP (VoIP), and audio conferencing and videoconferencing. It will work with your companys...
International Encyclopedia of the Social Sciences (9 vol. set)
International Encyclopedia of the Social Sciences (9 vol. set)

Late in 2004 I received a telephone call from Hélène Potter, director of new product development for Macmillan Reference USA—an imprint of Gale. I did not realize immediately that it was the telephone call that would shape a large share of my intellectual activity for the next three years. In fact, I recall hearing about a...

Intelligent Multimedia Communication: Techniques and Applications (Studies in Computational Intelligence)
Intelligent Multimedia Communication: Techniques and Applications (Studies in Computational Intelligence)

Multimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the applications need multimedia transmission techniques that send multimedia data from one side to another side and keep the properties of efficiency, robustness and security. Here, the efficiency...

Computer Networking and the Internet (5th Edition)
Computer Networking and the Internet (5th Edition)

With the advent of the World Wide Web the global Internet has rapidly become the dominant type of computer network. It now enables people around the world to use the Web for E-Commerce and interactive entertainment applications, in addition to those already supported by the Internet such as e-mail and IP telephony. As a result, the study of...

Contemporary Logic Design
Contemporary Logic Design
Computer hardware has experienced the most dramatic improvement in capabilities and costs ever known to humankind. In just 40 years, we have seen room-sized computers, with little more processing power than today's pocket calculators, evolve into fingernail-sized devices with near supercomputer performance. This miracle has been made possible...
Practical Unix & Internet Security, 3rd Edition
Practical Unix & Internet Security, 3rd Edition
This new edition of Practical Unix & Internet Security provides detailed coverage of today's increasingly important security and networking issues. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication...
Third Generation Wireless Communications, Volume 1: Post Shannon Signal Architectures
Third Generation Wireless Communications, Volume 1: Post Shannon Signal Architectures
...fundamental concepts, the latest design techniques and the most advanced architectures for tackling wireless communications problems...covers source coding, baseband signal shaping, adaptive air interfaces, and much more.

This is a book about the technological foundations of the next generation of wireless networks, including the
...
Networking and Online Games: Understanding and Engineering Multiplayer Internet Games
Networking and Online Games: Understanding and Engineering Multiplayer Internet Games
Networking and Online Games concisely draws together and illustrates the overlapping and interacting technical concerns of these sectors. The text explains the principles behind modern multiplayer communication systems and the techniques underlying contemporary networked games. The traffic patterns that modern games impose on networks, and...
Lossless Compression Handbook (Communications, Networking and Multimedia)
Lossless Compression Handbook (Communications, Networking and Multimedia)
Compression schemes can be divided into two major classes: lossless compression schemes and lossy compression schemes. Data compressed using lossless compression schemes can be recovered exactly, while lossy compression introduces some loss of information in the reconstruction.

While the first modern compression scheme, Huffman coding,
...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy