Wireless Ad Hoc Networking (Wireless Networks and Mobile Communications)
The rapid progress of mobile, wireless communication and embedded micro-sensing MEMS technologies has brought about the rise of pervasive computing. Wireless local-area networks (WLANs) and wireless personal-area networks (WPANs) are now common tools for many people, and it is predicted that wearable sensor networks will greatly improve everyday life as we know it. By integrating these technologies into a pervasive system, we can access information and use computing resources anytime, anywhere,...
Duration 6+ Hours of Video Instruction Overview Get all the training you need to earn your ITIL Foundation Certificate in IT Service Management and jump forward in your IT career! Description The ITIL V3 Foundation Exam Video Mentor is a combined book and DVD set which contains hours of instructor-led presentations in an easy-to-follow format, providing both foundational reinforcement of exam topics as well as exam preparation tips, tricks, and sample questions. The DVD video tackles...
Practical Studies in E-Government
Information and communication technology (ICT) is permeating all aspects of service management; in the public sector, ICT is improving the capacity of government agencies to provide a wide array of innovative services that benefit citizens. E-Government is emerging as a multidisciplinary field of research based initially on empirical insights from practice. Efforts to theoretically anchor the field have opened perspectives from multiple research domains, as demonstrated in Practical Studies in E...
This book constitutes the thoroughly refereed post-proceedings of the 6th International Workshop on Technologies for E-Services held in September 2005. The nine revised full papers presented together with one keynote article were carefully reviewed and selected from forty submissions for inclusion in the book. Their common purpose is to identify the technical issues, models and infrastructures that enable enterprises to provide e-services to other businesses and individual customers.
Co-Op (Lecture Notes in Computer Science, #290)
by Tung X Bui, Professor
Develop and implement a fully-functional, systematic CRM plan with CiviCRM About This Book • Develop an integrated online system that manages contacts, donations, event registrations, memberships, bulk e-mail, campaigns, case management, and other functions such as activity tracking, grant distribution, and reporting. • Plan a constituency relationship management strategy with ladders of engagement that will improve how your organization realizes its mission. • Use case studies and step-by-ste...
This book contains the refereed proceedings of the 10th International Conference on Knowledge Management in Organizations, KMO 2015, held in Maribor, Slovenia, in August 2015. The theme of the conference was "Knowledge Management and Internet of Things." The KMO conference brings together researchers and developers from industry and academia to discuss how knowledge management using big data can improve innovation and competitiveness. The 59 contributions accepted for KMO 2015 were selected fr...
Medicine and health care are currently faced with a significant rise in their complexity. This is partly due to the progress made during the past three decades in the fundamental biological understanding of the causes of health and disease at the molecular, (sub)cellular, and organ level. Since the end of the 1970s, when knowledge representation and reasoning in the biomedical field became a separate area of research, huge progress has been made in the development of methods and tools that are f...
Picasso on a Schedule
by Kenneth C Abernethy Ph D and Stephen K Wiggins Cio
Managing Projects with Make (Nutshell Handbooks) (Nutshell S.)
by Steve Talbott
make is one of UNIX's greatest contributions to software development, and this book is the clearest description of make ever written. Even the smallest software project typically involves a number of files that depend upon each other in various ways. If you modify one or more source files, you must relink the program after recompiling some, but not necessarily all, of the sources. make greatly simplifies this process. By recording the relationships between sets of files, make can automatically...
The six-volume set LNCS 8579-8584 constitutes the refereed proceedings of the 14th International Conference on Computational Science and Its Applications, ICCSA 2014, held in Guimaraes, Portugal, in June/July 2014. The 347 revised papers presented in 30 workshops and a special track were carefully reviewed and selected from 1167. The 289 papers presented in the workshops cover various areas in computational science ranging from computational science technologies to specific areas of computationa...
This book is organized such that only the most essential information is provided to you in each chapter so as to maximize your learning. Examples and tutorials are given in an easy to follow, step-by-step manner so that you can see how the testing process is being carried out and how the code is being written. The source code also contains detailed explanation so that you know what the code is doing. Multiple screenshots are used in places that matter so that you have a visual sense of what is h...
To the Digital Age (Johns Hopkins Studies in the History of Technology)
by Ross Knox Bassett
The metal-oxide-semiconductor (MOS) transistor is the fundamental element of digital electronics. The tens of millions of transistors in a typical home-in personal computers, automobiles, appliances, and toys-are almost all derive from MOS transistors. To the Digital Age examines for the first time the history of this remarkable device, which overthrew the previously dominant bipolar transistor and made digital electronics ubiquitous. Combining technological with corporate history, To the Digita...
Reengineering Systems Integration Success (1997) (CRC Press Revivals)
Reengineering is using information technology to improved performance and cut costs. Its main premise is to examine the goals of an organization and redesign work and business processes from the ground up rather than to simply automate existing tasks and functions. Reengineering is driven by open markets and competition. It is part of responding to a global economy where worldwide customers are more sophisticated and demanding. Defining and executing a systems integration process is a challengin...
We are in the midst of the most dramatic cultural shift in three hundred years. This book explains why a great change is simmering in all facets of our civilization, from economics and politics to science and spirituality. Our inherited concept of a machine world - the clockwork universe - is giving way and the vision of a web world is rising to take its place. The author weaves current realities and new scientific insights into a fascinating vision of history and science progressing through up...
Building Automation (Signals and Communication Technology)
by Hermann Merz, Thomas Hansemann, and Christof Hubner
Modern buildings are increasingly equipped with actuators and sensors, communication, visualization and control systems. This textbook provides an overview of industrial communication systems and stimulates a basic understanding of network and bus systems for the automation of buildings. After an introduction to EIB/KNX, LON und BACnet technologies, the authors illustrate how these systems can be utilized for specific applications, like air conditioning or illumination. This book assumes only a...
IoT and AI Technologies for Sustainable Living
This book brings together all the latest methodologies, tools and techniques related to the Internet of Things and Artificial Intelligence in a single volume to build insight into their use in the sustainable living. The applications include areas such as agriculture, smart farming, healthcare, bioinformatics, self-diagnosis system, body sensor network, multimedia mining, multimedia in forensics and security. It provides a comprehensive discussion of modeling and implementation in water resourc...
Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the rationale behind these practices. It explains how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management....