Browse Results

Showing 54,451 through 54,475 of 54,498 results

Creators Take Control: How NFTs Revolutionize Art, Business, and Entertainment

by Edward Lee

A leading legal scholar offers a compelling new theory to explain the meteoric rise of non-fungible tokens (NFTs) and their impact on art, business, entertainment, and society, and explains how they are revolutionizing our understanding of ownership.If you buy an NFT, do you own anything? Critics say no. Then why are people spending so much money to own them—to the tune of $27 billion in 2021? And why are big businesses and venture capital firms investing hundreds of millions to develop NFTs for people’s use in the metaverse, a purely imaginary world? In Creators Take Control, Edward Lee offers a compelling new theory he calls “Tokenism” that answers these perplexing questions. Using vivid examples, Lee lucidly explains how NFTs operate—and how they fundamentally change our understanding of ownership. Tokenism is an artistic, cultural, and technological movement that creates value in a new kind of ownership of a new type of property—symbolized by a virtual token—through a process of technological abstraction and artificial scarcity effectuated by NFTs. Ownership becomes virtual. What Cubism did in radically changing the twentieth-century perspective of creating and viewing art through cubes, Tokenism does today in altering our perspective of owning art and other things through tokens. Both movements radically reimagine what’s possible. Creators and businesses have seized upon this profound transformation. In a short time, they have developed a new market for digital art, important new rights for creators, innovative business models based on decentralized collaboration, and a new type of interactive ownership that enables identity, community, and patronage through NFTs. These innovations are just the start of revolutionary changes to society. Lee shows how NFTs create a new form of decentralized intellectual property, or De-IP. Comparable to the movement to decentralized finance (DeFi), De-IP empowers creators to take control of their artistic productions and livelihood. Lee’s intellectual tour de force is filled with practical insights—and hope—for fostering creativity and a Virtual Renaissance for the ages.

Putting People On The Map: Protecting Confidentiality With Linked Social-spatial Data

by National Research Council of the National Academies

Precise, accurate spatial information linked to social and behavioral data is revolutionizing social science by opening new questions for investigation and improving understanding of human behavior in its environmental context. At the same time, precise spatial data make it more likely that individuals can be identified, breaching the promise of confidentiality made when the data were collected. Because norms of science and government agencies favor open access to all scientific data, the tension between the benefits of open access and the risks associated with potential breach of confidentiality pose significant challenges to researchers, research sponsors, scientific institutions, and data archivists. Putting People on the Map finds that several technical approaches for making data available while limiting risk have potential, but none is adequate on its own or in combination. This book offers recommendations for education, training, research, and practice to researchers, professional societies, federal agencies, institutional review boards, and data stewards.

Atari Age: The Emergence of Video Games in America

by Michael Z. Newman

Beginning with the release of the Magnavox Odyssey and Pong in 1972, video games, whether played in arcades and taverns or in family rec rooms, became part of popular culture, like television. In fact, video games were sometimes seen as an improvement on television because they spurred participation rather than passivity. These "space-age pinball machines" gave coin-operated games a high-tech and more respectable profile. In Atari Age, Michael Newman charts the emergence of video games in America from ball-and-paddle games to hits like Space Invaders and Pac-Man, describing their relationship to other amusements and technologies and showing how they came to be identified with the middle class, youth, and masculinity.Newman shows that the "new media" of video games were understood in varied, even contradictory ways. They were family fun (but mainly for boys), better than television (but possibly harmful), and educational (but a waste of computer time). Drawing on a range of sources -- including the games and their packaging; coverage in the popular, trade, and fan press; social science research of the time; advertising and store catalogs; and representations in movies and television -- Newman describes the series of cultural contradictions through which the identity of the emerging medium worked itself out. Would video games embody middle-class respectability or suffer from the arcade's unsavory reputation? Would they foster family togetherness or allow boys to escape from domesticity? Would they make the new home computer a tool for education or just a glorified toy? Then, as now, many worried about the impact of video games on players, while others celebrated video games for familiarizing kids with technology essential for the information age.

Debugging Game History: A Critical Lexicon

by Raiford Guins Henry Lowood

Even as the field of game studies has flourished, critical historical studies of games have lagged behind other areas of research. Histories have generally been fact-by-fact chronicles; fundamental terms of game design and development, technology, and play have rarely been examined in the context of their historical, etymological, and conceptual underpinnings. This volume attempts to "debug" the flawed historiography of video games. It offers original essays on key concepts in game studies, arranged as in a lexicon -- from "Amusement Arcade" to "Embodiment" and "Game Art" to "Simulation" and "World Building." Written by scholars and practitioners from a variety of disciplines, including game development, curatorship, media archaeology, cultural studies, and technology studies, the essays offer a series of distinctive critical "takes" on historical topics. The majority of essays look at game history from the outside in; some take deep dives into the histories of play and simulation to provide context for the development of electronic and digital games; others take on such technological components of games as code and audio. Not all essays are history or historical etymology -- there is an analysis of game design, and a discussion of intellectual property -- but they nonetheless raise questions for historians to consider. Taken together, the essays offer a foundation for the emerging study of game history. ContributorsMarcelo Aranda, Brooke Belisle, Caetlin Benson-Allott, Stephanie Boluk, Jennifer deWinter, J. P. Dyson, Kate Edwards, Mary Flanagan, Jacob Gaboury, William Gibbons, Raiford Guins, Erkki Huhtamo, Don Ihde, Jon Ippolito, Katherine Isbister, Mikael Jakobsson, Steven E. Jones, Jesper Juul, Eric Kaltman, Matthew G. Kirschenbaum, Carly A. Kocurek, Peter Krapp, Patrick LeMieux, Henry Lowood, Esther MacCallum-Stewart, Ken S. McAllister, Nick Monfort, David Myers, James Newman, Jenna Ng, Michael Nitsche, Laine Nooney, Hector Postigo, Jas Purewal, Reneé H. Reynolds, Judd Ethan Ruggill, Marie-Laure Ryan, Katie Salen Tekinbas, Anastasia Salter, Mark Sample, Bobby Schweizer, John Sharp, Miguel Sicart, Rebecca Elisabeth Skinner, Melanie Swalwell, David Thomas, Samuel Tobin, Emma Witkowski, Mark J.P. Wolf

Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents

by Jean-Francois Blanchette

An examination of the challenges of establishing the authenticity of electronic documents—in particular the design of a cryptographic equivalent to handwritten signatures.The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. In Burdens of Proof, Jean-François Blanchette examines the challenge of defining a new evidentiary framework for electronic documents, focusing on the design of a digital equivalent to handwritten signatures.From the blackboards of mathematicians to the halls of legislative assemblies, Blanchette traces the path of such an equivalent: digital signatures based on the mathematics of public-key cryptography. In the mid-1990s, cryptographic signatures formed the centerpiece of a worldwide wave of legal reform and of an ambitious cryptographic research agenda that sought to build privacy, anonymity, and accountability into the very infrastructure of the Internet. Yet markets for cryptographic products collapsed in the aftermath of the dot-com boom and bust along with cryptography's social projects.Blanchette describes the trials of French bureaucracies as they wrestled with the application of electronic signatures to real estate contracts, birth certificates, and land titles, and tracks the convoluted paths through which electronic documents acquire moral authority. These paths suggest that the material world need not merely succumb to the virtual but, rather, can usefully inspire it. Indeed, Blanchette argues, in renewing their engagement with the material world, cryptographers might also find the key to broader acceptance of their design goals.

Burdens of Proof

by Jean-François Blanchette

The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. In Burdens of Proof, Jean-François Blanchette examines the challenge of defining a new evidentiary framework for electronic documents, focusing on the design of a digital equivalent to handwritten signatures. From the blackboards of mathematicians to the halls of legislative assemblies, Blanchette traces the path of such an equivalent: digital signatures based on the mathematics of public-key cryptography. In the mid-1990s, cryptographic signatures formed the centerpiece of a worldwide wave of legal reform and of an ambitious cryptographic research agenda that sought to build privacy, anonymity, and accountability into the very infrastructure of the Internet. Yet markets for cryptographic products collapsed in the aftermath of the dot-com boom and bust along with cryptography's social projects. Blanchette describes the trials of French bureaucracies as they wrestled with the application of electronic signatures to real estate contracts, birth certificates, and land titles, and tracks the convoluted paths through which electronic documents acquire moral authority. These paths suggest that the material world need not merely succumb to the virtual but, rather, can usefully inspire it. Indeed, Blanchette argues, in renewing their engagement with the material world, cryptographers might also find the key to broader acceptance of their design goals.

Interface

by Branden Hookway

In this book, Branden Hookway considers the interface not as technology but as a form of relationship with technology. The interface, Hookway proposes, is at once ubiquitous and hidden from view. It is both the bottleneck through which our relationship to technology must pass and a productive encounter embedded within the use of technology. It is a site of contestation -- between human and machine, between the material and the social, between the political and the technological -- that both defines and elides differences. A virtuoso in multiple disciplines, Hookway offers a theory of the interface that draws on cultural theory, political theory, philosophy, art, architecture, new media, and the history of science and technology. He argues that the theoretical mechanism of the interface offers a powerful approach to questions of the human relationship to technology. Hookway finds the origin of the term interface in nineteenth-century fluid dynamics and traces its migration to thermodynamics, information theory, and cybernetics. He discusses issues of subject formation, agency, power, and control, within contexts that include technology, politics, and the social role of games. He considers the technological augmentation of humans and the human-machine system, discussing notions of embodied intelligence. Hookway views the figure of the subject as both receiver and active producer in processes of subjectification. The interface, he argues, stands in a relation both alien and intimate, vertiginous and orienting to those who cross its threshold.

Windows PowerShell 2.0 Scripting für Administratoren

by Tobias Weltner Dr.

Wenn Sie sich für die Automatisierung der Verwaltung von Windows-Systemen mit den vielfältigen Möglichkeiten von Windows PowerShell 2.0 interessieren, finden Sie in diesem Buch zahlreiche Beispielskripts aus allen wichtigen administrativen Bereichen. Einer der bekanntesten Scripting-Experten Deutschlands stellt Ihnen die wichtigsten Cmdlets vor und liefert Ihnen viele Beispielskripts, die Sie sofort einsetzen, anpassen und erweitern können. Dieses Buch ist ein Nachschlagewerk für die PowerShell-Praxis, die vielen hilfreichen Codebeispiele in diesem Buch sind ohne größeres Vorwissen für den Praktiker sofort einsetzbar.

Data-Driven Security

by Jay Jacobs Bob Rudis

Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and make better decisions. Everything in this book will have practical application for information security professionals. Helps IT and security professionals understand and use data, so they can thwart attacks and understand and visualize vulnerabilities in their networks Includes more than a dozen real-world examples and hands-on exercises that demonstrate how to analyze security data and intelligence and translate that information into visualizations that make plain how to prevent attacks Covers topics such as how to acquire and prepare security data, use simple statistical methods to detect malware, predict rogue behavior, correlate security events, and more Written by a team of well-known experts in the field of security and data analysis Lock down your networks, prevent hacks, and thwart malware by improving visibility into the environment, all through the power of data and Security Using Data Analysis, Visualization, and Dashboards.

Peripheral Vision

by Zabet Patterson

In 1959, the electronics manufacturer Stromberg-Carlson produced the S-C 4020, a device that allowed mainframe computers to present and preserve images. In the mainframe era, the output of text and image was quite literally peripheral; the S-C 4020 -- a strange and elaborate apparatus, with a cathode ray screen, a tape deck, a buffer unit, a film camera, and a photo-paper camera -- produced most of the computer graphics of the late 1950s and early 1960s. At Bell Laboratories in Murray Hill, New Jersey, the S-C 4020 became a crucial part of ongoing encounters among art, science, and technology. In this book, Zabet Patterson examines the extraordinary uses to which the Bell Labs SC-2040 was put between 1961 and 1972, exploring a series of early computer art projects shaped by the special computational affordances of the S-C 4020. The S-C 4020 produced tabular data, graph plotting and design drawings, grid projections, and drawings of axes and vectors; it made previously impossible visualizations possible. Among the works Patterson describes are E. E. Zajac's short film of an orbiting satellite, which drew on the machine's graphic capacities as well as the mainframe's calculations; a groundbreaking exhibit of "computer generated pictures" by Béla Julesz and Michael Noll, two scientists interested in visualization; animations by Kenneth Knowlton and the Bell Labs artist-in-residence Stan VanDerBeek; and Lillian Schwartz's "cybernetic" film Pixillation.Arguing for the centrality of a peripheral, Patterson makes a case for considering computational systems not simply as machines but in their cultural and historical context.

Architecting the Cloud

by Michael J. Kavis

An expert guide to selecting the right cloud service model for your businessCloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a cloud model, you need to determine what the ideal cloud service model is for your business. Helping you cut through all the haze, Architecting the Cloud is vendor neutral and guides you in making one of the most critical technology decisions that you will face: selecting the right cloud service model(s) based on a combination of both business and technology requirements.Guides corporations through key cloud design considerationsDiscusses the pros and cons of each cloud service modelHighlights major design considerations in areas such as security, data privacy, logging, data storage, SLA monitoring, and moreClearly defines the services cloud providers offer for each service model and the cloud services IT must provideArming you with the information you need to choose the right cloud service provider, Architecting the Cloud is a comprehensive guide covering everything you need to be aware of in selecting the right cloud service model for you.

Confessions of a Successful CIO

by Brian Watson Susan Cramm Dan Roberts

Be the most effective CIO you can be--by learning from the best in the businessToday's Chief Information Officers must be an entirely new breed of technology leader. With ever-changing demands from the business, and in an increasingly technology-centric business environment, CIOs must find game-changing innovations and process improvements that make a real impact on the bottom line. Business executives need their CIOs to be real partners--speaking the language of the business and donning their strategist caps--not just commodity managers. Those IT leaders who fail to break out of the order-taker, utility manager mold will, simply put, be looking for a new job.In Confessions of a Successful CIO: How the Best CIOs Tackle Their Toughest Business Challenges, current and future CIOs will gain invaluable perspectives from the stories of today's best IT leaders. These acclaimed leaders--each profiled in their own chapter--explain the toughest business decision they had to make, and how the outcome influenced and impacted their leadership style. These in-depth anecdotes take the reader inside some of the most challenging business climates imaginable and chronicle how these elite CIOs made the decisions that mattered.Read detailed case studies of how some of the best CIOs have handled their most challenging business problemsLearn how the best CIOs anticipate changes to their business and respond--before the business comes knockingExplore how these top-flight CIOs make critical decisions around strategy and IT to not only benefit their companies, but in some cases, to save them from becoming obsolete.Analyze their perspectives on managing people, crises and balancing the risks and rewards of their "bet the farm" strategiesConfessions of a Successful CIO is the new playbook for learning how to take risks, respond to crises, and create more value from IT. Each chapter presents a different challenge, giving present-day and future IT leaders the chance to examine, analyze and learn so that they can be just as successful as the CIOs they're reading about.

Day Trade Online

by Farrell Christopher A.

Day trading can be quite lucrative, but only if you know what you are doing. As Farrell points out: "Trading for a living is hard. Trading for a living over the Internet is even harder. There are many challenges and obstacles that confront you. Venturing into this jungle unprepared is a recipe for disaster. " This straightforward guide provides the head start and heads up necessary to thrive as a day trader, covering everything from the dangers and pitfalls of trading online to an in-depth analysis of which trading techniques work and which don't. Day Trade Online, Second Edition presents inside information on the strategies of top trading firms, including the most secretive, misunderstood, and profitable function on Wall Street. Most importantly, you will learn to look at ten different stocks and pinpoint which one to trade, when, at what price, and why. With the right know-how, you will be able to apply this knowledge to every single stock that you screen.

Digital Disciplines

by Joe Weinman

Leverage digital technologies to achieve competitive advantage through better processes, products, customer relationships and innovation How does Information Technology enable competitive advantage? Digital Disciplines details four strategies that exploit today's digital technologies to create unparalleled customer value. Using non-technical language, this book describes the blueprints that any company, large or small, can use to gain or retain market leadership, based on insights derived from examining modern digital giants such as Amazon and Netflix as well as established firms such as GE, Nike, and UPS. Companies can develop a competitive edge through four digital disciplines--information excellence, solution leadership, collective intimacy, and accelerated innovation--that exploit cloud computing, big data and analytics, mobile and wireline networks, social media, and the Internet of Things. These four disciplines represent the extension and evolution of the value disciplines of operational excellence, product leadership, and customer intimacy originally defined by Michael Treacy and Fred Wiersema in their bestselling business classic The Discipline of Market Leaders. Operational excellence must now encompass information excellence--leveraging automation, information, analytics, and sophisticated algorithms to make processes faster, better, and more cost-effective, as well as to generate new revenue Product leadership must be extended to solution leadership--smart digital products ranging from wind turbines to wearables connected to each other, cloud services, social networks, and partner ecosystems Customer intimacy is evolving to collective intimacy--as face-to-face relationships not only go online, but are collectively analyzed to provide individually targeted recommendations ranging from books and movies to patient-specific therapies Traditional innovation is no longer enough--accelerated innovation goes beyond open innovation to exploit crowdsourcing, idea markets, challenges, and contest economics to dramatically improve processes, products, and relationships This book provides a strategy framework, empirical data, case studies, deep insights, and pragmatic steps for any enterprise to follow and attain market leadership in today's digital era. Digital Disciplines can be exploited by existing firms or start-ups to disrupt established ways of doing business through innovative, digitally enabled value propositionsto win in competitive markets in today's digital era.

How to Beat the Market Makers at Their Own Game

by Fausto Pugliese

The basic skills for becoming a successful trader from a master of the gameWritten by Fausto Pugliese (founder and CEO of Cyber Trading University) this must-have resource offers a hands-on guide to learning the ins and outs of active trading. How to Beat the Market Makers at Their Own Game gives professionals, as well as those relatively new to investing, a behind-the-scenes look at the inner workings of the marketplace and a comprehensive overview of basic trading techniques. The book explains how to apply the trading strategies of acclaimed trader Fausto Pugliese. Step by step the author covers the most common market maker setups, shows how to identify market maker traps, and most importantly, reveals how to follow the direction of the lead market maker in an individual stock.Throughout the book, Pugliese puts the spotlight on Level II quotes to help investors understand how market makers drive prices and manipulate the market. This handy resource is filled with the tools needed to interpret market maker activity so traders can truly understand the market and trade accordingly.Offers an accessible guide for developing the investing skills to trade with confidenceFilled with the real-world trading experiences and techniques of Fausto PuglieseCovers simple technical patterns that are important in day tradingIncludes a website with exercises to help master the book's techniquesHow to Beat the Market Makers at their Own Game will become your well-thumbed resource for learning what it takes to succeed in short-term stock trading.

The Prop Trader's Chronicles

by Francis J. Chan

A practical guide to profiting from the strategies of professional proprietary tradersToday's technology allows traders to make faster, more price-sensitive trades and to better read the flow of market information and transactions--opening the way to a wider variety of short-term trading strategies. The Prop Trader's Chronicles unveils these strategies and techniques, which have long been the province of proprietary trading firms and other professional stock traders.This reliable guide describes author Francis Chan's experience as a prop trader in an engaging narrative, but at the same time provides an in-depth explanation of strategies employed by proprietary traders utilizing direct access technologies, Level II quotes, time and sales feeds, and electronic communication networks. Along the way, you'll be introduced to a variety of strategies involved in the rapid day trading of stocks, including: scalping, rebate trading, and advanced reading of time and sales transactions to detect short-term swings. Chang also reveals how to use time and sales data as the modern-day equivalent of 'reading the tape.'Shows active independent traders how they can perform at a higher level by replicating the professional strategies of prop tradersOffers valuable insights on how traders can 'read the tape' and better detect short term market swingsDescribes a variety of prop trading strategies, from electronic scalping to statistical arbitrageThe Prop Trader's Chronicles provides a solid foundation for traders looking to improve their performance. With this book as your guide, you'll quickly discover what it really takes to make it in today's competitive markets.

The Trend Following Bible

by Andrew Abraham David Druz

A proven approach to trading success based on the best commodity trading advisorsProfiting from long-term trends is the most common path to success for traders. The challenge is recognizing the emergence of a trend and determining where to enter and exit the market. The Trend Following Bible shows individual traders and investors how to profit from this approach by trading like today's top commodity trading advisors.In this book, author Andrew Abraham stresses the importance of a disciplined, consistent methodology, with stringent risk controls, that allows you to catch big trends, while limiting losses on unprofitable trades. By trading in this manner, he shows you how to successfully achieve market-beating returns over the long term and multiple your trading capital along the way.Reveals exactly how top commodity trading advisors operate and how individuals can incorporate these methods into their everyday trading endeavorsAddresses key issues like position sizing and risk control, which are critical to trading success, but often underemphasized in other trading literatureHighlights how to effectively execute the trading strategies outlinedEngaging and accessible, The Trend Following Bible will put you in a better position to profit as you make more informed trading decisions.

Unleashing the Power of IT

by Dan Roberts

Go from the "IT guy" to trusted business partnerIf you're in IT, quite a lot is expected of you and your team: be technologically advanced, business-minded, customer-focused, and financially astute, all at once. In the face of unforgiving competition, rampant globalization, and demanding customers, business leaders are discovering that it's absolutely essential to have a strong, active partner keeping a firm hand on the decisions and strategies surrounding information technology. Unleashing the Power of IT provides tangible, hard-hitting, real-world strategies, techniques, and approaches that will immediately transform your IT workforce and culture, presenting the new mindset, skill set, and tool set necessary for IT leaders to thrive in today's challenging environment.Includes new discussion on social mediaOffers online access to the IT Skill Builder Competency Assessment ToolFeatures top ten lists of tips and techniques, proven frameworks, and practical guidance to help you launch and sustain your IT culture change and professional development initiativesProfiling several world-class organizations that have implemented the principles in this book, Unleashing the Power of IT reveals the best practices to get you on the path to implementation.

The Hidden History of Code-Breaking: The Secret World of Cyphers, Uncrackable Codes, and Elusive Encryptions

by Sinclair McKay

A fascinating exploration of the uncrackable codes and secret cyphers that helped win wars, spark revolutions and change the faces of nations.There have been secret codes since before the Old Testament, and there were secret codes in the Old Testament, too. Almost as soon as writing was invented, so too were the devious means to hide messages and keep them under the wraps of secrecy. In The Hidden History of Code Breaking, Sinclair McKay explores these uncrackable codes, secret ciphers, and hidden messages from across time to tell a new history of a secret world. From the temples of Ancient Greece to the court of Elizabeth I; from antique manuscripts whose codes might hold prophecies of doom to the modern realm of quantum mechanics, we will see how a few concealed words could help to win wars, spark revolutions and even change the faces of great nations. Here is the complete guide to the hidden world of codebreaking, with opportunities for you to see if you could have cracked some of the trickiest puzzles and lip-chewing codes ever created.

A Citizen's Guide to Artificial Intelligence

by John Zerilli

A concise but informative overview of AI ethics and policy.Artificial intelligence, or AI for short, has generated a staggering amount of hype in the past several years. Is it the game-changer it's been cracked up to be? If so, how is it changing the game? How is it likely to affect us as customers, tenants, aspiring home-owners, students, educators, patients, clients, prison inmates, members of ethnic and sexual minorities, voters in liberal democracies? This book offers a concise overview of moral, political, legal and economic implications of AI. It covers the basics of AI's latest permutation, machine learning, and considers issues including transparency, bias, liability, privacy, and regulation.

Handbook of Mobile Ad Hoc Networks for Mobility Models

by Radhika Ranjan Roy

The Mobile Ad Hoc Network (MANET) has emerged as the next frontier for wireless communications networking in both the military and commercial arena. Handbook of Mobile Ad Hoc Networks for Mobility Models introduces 40 different major mobility models along with numerous associate mobility models to be used in a variety of MANET networking environments in the ground, air, space, and/or under water mobile vehicles and/or handheld devices. These vehicles include cars, armors, ships, under-sea vehicles, manned and unmanned airborne vehicles, spacecrafts and more. This handbook also describes how each mobility pattern affects the MANET performance from physical to application layer; such as throughput capacity, delay, jitter, packet loss and packet delivery ratio, longevity of route, route overhead, reliability, and survivability. Case studies, examples, and exercises are provided throughout the book. Handbook of Mobile Ad Hoc Networks for Mobility Models is for advanced-level students and researchers concentrating on electrical engineering and computer science within wireless technology. Industry professionals working in the areas of mobile ad hoc networks, communications engineering, military establishments engaged in communications engineering, equipment manufacturers who are designing radios, mobile wireless routers, wireless local area networks, and mobile ad hoc network equipment will find this book useful as well.

Affiliate Program Management

by Evgenii Prussakov

Affiliate marketing is hot; here's how to get your program goingNearly every retailer in the Internet Retailers' Top 500 has an affiliate marketing program. Now free affiliate networks, automation software, and pay-for-performance compensation models are making it easy for small businesses to take advantage of this marketing tool. In the popular An Hour a Day format, this guide features a detailed, real-world, task-based approach to developing, launching, and managing a successful affiliate marketing program. It explores market research, determining payment models and reporting guidelines, recruiting affiliates, crafting appropriate communications, and much more.Affiliate marketing programs help boost marketing efforts without incurring excessive costs; this Hour a Day guide provides everything merchants, business owners, and those charged with managing an affiliate program need to knowOffers a modern, real-world, step-by-step guide to researching, launching, managing, and optimizing a successful affiliate marketing programCovers social media; creating policies; working with feeds, coupons, widgets, and video; creating compelling content; handling partners who are not meeting goals; and much moreAffiliate Program Management: An Hour a Day is the do-it-yourself guide to planning and maintaining a successful affiliate program.

Alcatel-Lucent Service Routing Architect (SRA) Self-Study Guide

by Ghassan Shaheen Mira Ghafary Glenn Warnock

A comprehensive resource for professionals preparing for Alcatel-Lucent Service Routing Architect (SRA) certification Networking professionals are taking note of Alcatel-Lucent and its quick ascent in the networking and telecom industries. IP networking professionals looking for a comprehensive guide to obtaining the Alcatel-Lucent Service Routing Architect (SRA) certification will be pleased to learn of this new publication, Alcatel-Lucent Service Routing Architect (SRA) Self-Study Guide: Preparing for the BGP, VPRN and Multicast Exams. The book comprises approximately 2,600 pages of print and additional online content, making it the foremost resource for those looking to make themselves IP subject matter experts. In this impressive resource, readers will find detailed information to prepare them for various sections of the Service Routing Architect certification, and to familiarize them with topics and learning material for three of the SRA written exams. Pre- and post-chapter assessment questions, sample written exam questions, and valuable lab exercises ensure that readers will gain knowledge and develop strategies for successfully obtaining certification. Other highlights of the book include: Offers a comprehensive look at certification topics through 1,500 pages of printed content and an additional 1,100 pages of authoritative online information Provides strategies for troubleshooting complex network problems Serves as the premier resource for Service Routing Architect certification--similar books do not offer this level of detail Alcatel-Lucent Service Routing Architect (SRA) Self-Study Guide: Preparing for the BGP, VPRN and Multicast Exams has been developed for industry professionals working in network environments where Alcatel-Lucent products are deployed, and for industry professionals with Cisco and Juniper certifications looking to expand their knowledge and skill base. Engineers and networking professionals with an SRA certification from Alcatel-Lucent will be in high demand. Let this must-have learning resource prepare you for success!

Building PHP Applications with Symfony, CakePHP, and Zend Framework

by Bartosz Porebski Karol Przystalski Leszek Nowak

The first detailed, unbiased comparison of the three leading PHP frameworks Web developers have been eager for an impartial comparison of leading PHP frameworks so they can make educated decisions about the most effective tool for their needs. This guide uses Symfony, CakePHP, and Zend Framework to solve key problems, providing source code examples and comparisons for each. It explains the approach and reviews the similarities and differences in the three frameworks, providing reliable information on which to base your decisions. Symfony, CakePHP, and Zend Framework are considered the leading PHP frameworks; developers need an unbiased comparison to choose which one works best for their individual situations This guide uses each framework to solve the same problems, illustrating the solutions with source code examples and working applications Covers wide range of topics, from installation and configuration to most advanced features like AJAX, web services and automated testing. Includes an appendix of new PHP frameworks, including CodeIgniter, Lithium, and Agavi Bestselling PHP author Elizabeth Naramore serves as technical editor Comparison of PHP Web Frameworks provides the impartial, side-by-side comparison that developers have been looking for.

CompTIA A+ Complete Lab Manual

by James Pyles

Boost your understanding of CompTIA A+ exam principles with practical, real-world exercisesDesigned to complement CompTIA A+ Complete Study Guide, this hands-on companion book takes you step by step through the tasks a PC technician is likely to face on any given day. It supports the theory explained in the test-prep guide with additional practical application, increasing a new PC technician's confidence and marketability. Various scenarios incorporate roadblocks that may occur on the job and explain ways to successfully complete the task at hand. In addition, each task is mapped to a specific A+ exam objective for exams 220-801 and 220-802.Tasks are divided into categories: hardware and software installation, hardware and software maintenance, and installing and upgrading operating systems, networks, and security systems. Designed to enhance factual study with practical application Explains step by step how to perform a variety of tasks that PC technicians commonly face on the job Tasks include installing or replacing a power supply or a laptop hard drive, installing or upgrading to Windows 7, scanning for and removing viruses, installing printer drivers, and troubleshooting a networkCompTIA A+ Complete Lab Manual gives you the hands-on experience you need to succeed in the real world.?

Refine Search

Showing 54,451 through 54,475 of 54,498 results