Home | Amazing | Today | Tags | Publishers | Years | Search 
Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Find out how IAX can complement SIP to overcome complications encountered in current SIP-based communications

Written by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal,...

Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user...
Taking Your iPhone 4S to the Max: For iPhone 4S and Other iOS 5-Enabled iPhones
Taking Your iPhone 4S to the Max: For iPhone 4S and Other iOS 5-Enabled iPhones

Unleash the power of your new iPhone 4S or other iOS 5-driven iPhone and take it to the limit using powerful tips and techniques from the Apple experts at TUAW, Erica Sadun, Steve Sande, and Michael Grothaus. Fast and fun to read, Taking Your iPhone 4S to the Max shows you how to get the most out of your iPhone...

Noise Reduction in Speech Processing (Springer Topics in Signal Processing)
Noise Reduction in Speech Processing (Springer Topics in Signal Processing)

Noise is everywhere and in most applications that are related to audio and speech, such as human-machine interfaces, hands-free communications, voice over IP (VoIP), hearing aids, teleconferencing/telepresence/telecollaboration systems, and so many others, the signal of interest (usually speech) that is picked up by a microphone is generally...

IMS Application Developer's Handbook: Creating and Deploying Innovative IMS Applications
IMS Application Developer's Handbook: Creating and Deploying Innovative IMS Applications
Many books have been written about IMS, so why do we think another is needed? Most of the existing books are written from the perspective of those who implement the technology, either network vendors or operators. There is no such focus for developers. The standards that form the basis of IMS are complex – as they are...
Building a Windows IT Infrastructure in the Cloud: Distributed Hosted Environments with AWS
Building a Windows IT Infrastructure in the Cloud: Distributed Hosted Environments with AWS
Everybody’s talking about cloud services today. It’s one of the hot new buzzwords, but most of the conversation is about how to develop custom applications in the cloud. While that is a really important topic, it ignores another very useful attribute of a distributed cloud: as a great place to build and...
Learning Core Audio: A Hands-On Guide to Audio Programming for Mac and iOS
Learning Core Audio: A Hands-On Guide to Audio Programming for Mac and iOS

Audio can affect the human brain in the most powerful and profound ways. Using Apple’s Core Audio, you can leverage all that power in your own Mac and iOS software, implementing features ranging from audio capture to real-time effects, MP3 playback to virtual instruments, web radio to VoIP support. The most sophisticated audio...

Sams Teach Yourself Twitter in 10 Minutes
Sams Teach Yourself Twitter in 10 Minutes

Welcome to Twitter, the Social Networking site that was called “utterly devoid of any sort of merit” by New Zealand Herald’s Canvas Magazine, (June 6, 2009) in the same week it appeared on the cover of TIME Magazine as “a powerful form of communication” and “the future of American innovation.”...

Evolving Intelligent Systems: Methodology and Applications (IEEE Press Series on Computational Intelligence)
Evolving Intelligent Systems: Methodology and Applications (IEEE Press Series on Computational Intelligence)

One of the consequences of the information revolution is the ever-growing amount of
information we are surrounded with and the need to process this information
efficiently and extract meaningful knowledge. This phenomenon was termed “digital
obesity” or “information obesity” by Toshiba Ltd. One
...

Cisco Unity Connection (Networking Technology: IP Communications)
Cisco Unity Connection (Networking Technology: IP Communications)

This book, Cisco Unity Connection, by Dave Schulz, hits the bull’s-eye of its intended topic: Cisco Unity Connection. This book zeroes in on the target with clarity and depth. Anyone that uses or considers using the Cisco Unity Connection product needs a copy of this book to read when planning a deployment, administering the...

Data Communications and Computer Networks: A Business User's Approach
Data Communications and Computer Networks: A Business User's Approach

Data communications and computer networks are vital in today's business world. Whether your career entails business management, computer programming, system design, or a related area, DATABASE COMMUNICATIONS AND COMPUTER NETWORKS, 7th Edition will give you the thorough understanding you need of basic features, operations, and limitations...

Configuring Cisco Unified Communications Manager and Unity Connection: A Step-by-Step Guide (2nd Edition)
Configuring Cisco Unified Communications Manager and Unity Connection: A Step-by-Step Guide (2nd Edition)

On March 10, 1876, Alexander Graham Bell made the first successful telephone call. As with many things, the test was purely accidental. Graham spilled acid on his leg, and Watson, his assistant, heard his call for help through the telephone. So, what has changed over the last 129 years? It would be easier to discuss what hasn’t...

Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy