Searched over 21.6 Million titles in 0.27 seconds
Please wait while the eBook Finder searches for your request. Searching through the full text of 2,850,000 books. Full Text searches may take up to 1 min.
Ihr Android-Mobilgerät ist bereits mit einer umfangreichen App-Sammlung ausgestattet. Doch in vielen Lebenslagen genügt das nicht, und man wünscht sich zusätzliche Funktionen. In diesem FreeBook stelle ich Ihnen auf über 200 Seiten 20 spannende Apps vor, die Sie einmal gesehen haben sollten. Natürlich sind die Vorstellungen und Wünsche sehr unterschiedlich. Wenn Sie für sehr spezielle Anwendungsbereiche die passende App suchen, sollten Sie den Google Play durchsuchen. Dieses Buch soll Ihnen zum Nachschlagen und zur Anregung dienen, was Sie mit Ihrem Smartphone alles anstellen können. Das Buch darf unbegrenzt vervielfältigt und weitergegeben werden, solange es als Ganzes erhalten bleibt! Änderungen sind nicht zulässig! Autor: Holger Reibold Verlag: Brain-Media.de Umfang: 208 Seiten ISBN: 978-3-95444-036-8 Preis: kostenlos ...
Nivelul Aplicaţie, Interfaţa de Programare a Aplicaţiei (IPA), Servicii de Prezentare, Nivelul Transport, Nivelul Reţea, Nivelul Legatură de Date, Nivelul Fizic, Securitatea, Managementul Reţelelor, Garanţii în Sistemul Calităţii, Perspective Mai multe formate de carte electronică: http://www.trybuyshop.com/product/retele-de-calculatoare-de-nicolae-sfetcu/...
Reţele, protocoale şi servicii asigurate prin reţelele de calculatoare.
The Treasure: Internet or the Society of the King Salome. Don’t you know that Internet and WWW are the fruit of the Quantum Revolution? At the beginning are great inventors like Thomas Alva......
Aim of this book is to present basic mathematics that is needed by computer scientists The reader is not expected to be a mathematician and we hope you will find what follows to be useful....
An introductory how to guide on C programming in linux.
An introduction to relational database theory.
An introduction to java programming.
This semi-technical summary of the X–15 program is directed toward the less publicized aspects of its achievements.
An introduction to App-V Packaging
(Previzualizare carte, Ediţia a doua, Revizia 1) Unul din cele mai vechi ghiduri pentru marketing pe Internet în limba română, dar şi unul din cele mai concise şi mai practice ghiduri. Deşi au trecut mulţi ani de la scrierea acestuia, principiile de bază descrise aici rămân încă valabile. Marketingul pe Internet utilizează Internetul pentru a vinde bunuri şi servicii. Marketingul pe Internet include reclamele plătite pe baza clicurilor, reclame cu banere, marketingul prin e-mail, marketingul pentru motoarele de căutare (inclusiv optimizarea pentru motoarele de cautare), marketingul prin bloguri si articole, etc. Lectură plăcută! Ediţia digitală (EPUB, Kindle, PDF): https://www.setthings.com/ro/e-books/ghid-marketing-pe-internet/ Ediţia tipărită: https://www.createspace.com/5168398 Data publicării: 5 noiembrie 2011 ISBN-13: 978-1505511901 ISBN-10: 1505511909 BISAC: Business & Economics / Marketing / General...
Odatã cu creşterea exponenţială a popularităţii Web-ului - instrument primordial de utilizare a Internetului - o activitate din ce în ce mai profitabilã a început sã fie exploatatã de cãtre un numãr crescând de companii: publicitatea şi marketingul electronic, instrumente ce oferã posibilităţi enorme la un cost minimal. Cu o rată de creştere mare a numărului de utilizatori, activitatea de marketing pe Internet devine mult mai uşoară decât cea prin metodele clasice. Dacă se ia în consideraţie faptul că o campanie tipică de marketing determină o rată de răspuns de cel puţin 2%, teoretic rezultă un număr de răspunsuri pe Internet de câteva mii, cel puţin. Din ce în ce mai multe întreprinderi - din toate sectoarele economice - încep sã realizeze potenţialul enorm al noului mediu de comunicaţie electronicã, Internetul. Pentru a avea acces la un auditoriu de câteva milioane de "spectatori" - şi potenţiali clienţi - marile reţele de televiziune oferã preţuri de ordinul zecilor sau sutelor de mii de dolari pentru spoturi publicitare de 30 de secunde; pentru a atinge o asemenea audientã, doar giganţi ca IBM, Coca Cola sau Ford îşi pute...
El eco de las balas resonaba en las paredes de la cueva.–¿Sabe qué, profesor? ¡Vea qué triste ironía! Hoy me doy cuenta de que no sénada de la vida. Soy un completo ignorante de las cosas, a pesar de que me es-forcé siempre por encontrar la verdad de las mismas. No sé si usted alguna vezsintió y pensó lo mismo que yo, profesor, no lo sé, pero qué sensación más frus-trante la que se siente. Sí, y estoy llorando, profesor…, sí, así como usted me lorecomendó una vez…, cuando todavía vivía… Se alivia tanto la pena…»Y tú, Hasán… hermano… No sabes cuánto desearía unirme a tu dios. «Dios yyo somos uno en un mismo pueblo». ¡Oh, qué bello! Tú estás muerto, Hasán, ysin embargo, has muerto sin temores ni dudas, creyendo fielmente que Dios terecibirá cordialmente en su seno, como una parte suelta que vuelve a su Esen-cia. En cambio yo no espero más que Juicio a futuro, donde juzgarán cada una de mis acciones con lupa… ¡Y sólo Dios sabe si merezco vivir en los Cielos oquemarme eternamente, en una continuación de esta pena, en el Infierno!».Los disparos cesaron; luego otro estertor. El agujero se ensanchaba.–¡Escúchame, yanqui estúpido, lee...
Hasán se contuvo. Humo y fuego podían observarse más allá del pasaje; supuseque los mercenarios no podrían encontrarnos, pues por sus gritos de algarabía,pensé que quizá celebraban el reparto de algún botín. Vi a Hasán adelantarsehacia la fisura.–¡Espera, Hasán! –le susurré agitado. Éste, dubitativo, se detuvo–. No temas. Yperdóname lo que te voy a decir, ya que contraviene tus creencias: nosotros notememos a las maldiciones. Tememos, eso sí, a las malas acciones de los hom- bres de carne y hueso, antes que a las fuerzas sobrenaturales, si es que existenen este orden natural del Universo. Espero que sepas comprender lo que te es-toy diciendo. No me lo tomes a mal.Hasán tenía la cabeza inclinada hacia el frente, como aturdido.–Mi querido Basilio –irrumpió el profesor–, ahora que recuerdo los estudios deCeram, en este lugar Layard descubrió el castillo de Asurnasirpal II, el monarcaque gobernó la Mesopotamia desde el año 884 al 859 antes de la era común, yque se identificaba a sí mismo como descendiente directo del Nemrod bíblico.Eso dio comienzo a la leyenda de Mosul sobre la supuesta edificación de la To-rre de Babel en este sitio, ...
n/a
The key to making big data initiatives a success lies within making the produced data more digestible and usable in decision making, rather than making it just ‘more,’ resulting in the creation of an environment wherein information is used to generate real impact. Put another way, the survival of Big Data is more about making the right data(not just higher volume) available to the right people (not just higher variety) at the right time (not just higher velocity)....
Two 21st century men travel through time and alternate universes recovering UFO debris from the 1947 Roswell crash.
The air pulled out of his lungs, a moment of breathlessness and it is over. The lyrics to a Pink Floyd song fill his head. “home, home again” "Home.." AM Lincoln said as he steps through the wormhole, older but not aged, his gray-green eyes betray his youth. A sense of weightlessness fills his body every time he rips. The cube glows a florescent green. The journey although less than 5 seconds is 13 years across 1 universe. He looks at the familiar beige wall that stands before him. Water dripping into one of the many drains that kept the labyrinth from flooding and the hum of traffic above ground were the last things he heard when left and were still here to welcome him back. Quake, his cousin, would be waiting in the safe-room. The entry back to his present time left him feeling airy, almost light on his feet as it always did. The sensation you might feel after a long flight on a airplane, AM didn't feel queasy, not a bit, just a little off. Although not the first rip back in time, this rip had given him the years that would never show on him. He put the Q pad back in his backpack. Quake and AM purchased a half dozen 2...
Table of Contents Chapter 1:2002 Chapter 2:2010 Chapter 3:2011 Chapter 4:1829 Chapter 5:1993 Chapter 6:1992 Chapter 7:1993 Chapter 8:1992 Chapter 9:1993-2011 ...
Game Insider Digital is an independent, hardcore gamer-centric, video game digital only publication, developed by passionate gamers. Game Insider strives to showcase video games and their most creative influences. Every issue of Game Insider strives to push the envelope by offering more than 100 pages of up-to-date video game insight keeping our readers ever engaged on each and every page. Through our digital partnership, Game Insider can be enjoyed from any device - iOS, Android, Blackberry, Torch, PC or Mac, your smartphone, tablet or computer is your instant portal to gaming glory only on Game Insider ...
Game Insider Digital is a fully interactive digital publication featuring links and engaging new gameplay videos from the hottest upcoming games in the industry. To get the full and FREE Game Insider experience, here you go: http://gameinsider.uberflip.com/t/29481 For more content and industry updates head over to our www.game-insider.com online destination where you can read and view our daily industry news. ...
Pages #8 and #9 features this issues table of contents, directing readers to their desired article update.
This is a how-not-to-do book about codification, indexing, information, computer science, peripherals and terminals. The data entries are unselected and stored in a database. Afterwards, they are disorganized, unstructured and then manufactured. A data mudflow is designed later in order to misdirect all information. A nonquality control personnel filters and trashes all high valued documents and restores the chaos in the institution. The book helps with the malfunctioning of an administrative system....
The illogical mudflow of a quarterly non-production process In looking at the illogical mudflow of a quarterly non-production process, it is very imperative for us to take into account several non-practical factors that take place during such non-production process. These factors include: - Tools under maintenance - Contracts - Transportation - Supply Below is an illustration of the two major phases that are not usually encountered during the execution of a non-production process. ...
Contents Forward and Backward.........3 Chapter 1 ...................................5 Non-Basic symbols misused in Computer Science .....................5 Unintelligent terminal .........................9 The illogical mudflow of a quarterly non-production process ...............12 Chapter 2 ..................................15 The computer coding misused in Computer Science ...................15 Codification problems ..............................17 Codes misclassification .............................18 Chapter 3 ..................................21 Miscomputing the time for creating an application misusing the mudflow scrambles ........21 Misinformation deregistration and non-identification in files...............27 Chapter 4 ..................................29 Data storage and types of non-peripheral devices .....................29 Representation of Misinformation in internal memory ..............30 External non-peripherals ............................31 Printing paper ................................34 Magnetic band ...............................34 Magnetic disks ...............................35 The non-...
By the end of this book, you will be familiar with the programming world, be able to write a Java class and instantiate (create) objects that represent these classes and put them into action. You will be able to write a professional code and to deal with code written by others. The topics are tied together, and built on each other, so, if this is your first time with Java, it is recommended to read the chapters in the same sequence they are presented in the book. We...
Is this book for me, do I need to read_the_book? 1. If these are your first steps to Java, then read_the_book = yes. 2. If you are not looking for a reference, but for a book that will help you understand the world of Object Oriented Programming beside Java, then read_the_book = yes. 3. If you want to focus on the 20% knowledge that will help you to do 80% of tasks required, then read_the_book = yes. If you are looking for a pile of real world scenarios and training, then read_the_book = yes....
Bird’s View • Software development life cycle (SDLC)……….…06 • Approaches to develop SDLC…………………………..08 • Object Oriented features………………………….…….14 • Java features………………………………………….……….16 • Requirements of a good program…………………...19 01 2 Class/Object 22 3 Mapping • map class to Java code…………………………………….35 • map class data members to Java code…………….36 • map class method members to Java code……….40 • Method signature……………………………………………48 • deprecated methods……………………………………...49 • passing Java arguments…………………………………..49 33 4 Java Tools 52 5 Problem solving 66 6 Simple-Level Logic • Type casting…………………………………………………...77 • Local variables………………………………………….…….78 • Simple operations…………………………………………..82 • Arithmetic operators……………………………….……..83 75 7 Moderate-Level Logic • Relation operators……………………………………..….091 • Equality operators………………………………….………091 • Conditional operators……………………………….…..091 • packaging……………………………………………………….097 • increment/decrement operators……………….….101 • Conditional statements • if………………………………….091 • switch…………………….……112 • ?:…………………………….…..115 • looping statements • for………………………………...117 • whil...
It is shown how, within the framework of general relativity and without the introduction of wormholes, it is possible to modify a spacetime in a way that allows a spaceship to travel with an arbitrarily large speed. By a purely local expansion of spacetime behind the spaceship and an opposite contraction in front of it, motion faster than the speed of light as seen by observers outside the disturbed region is possible. The resulting distortion is reminiscent of the "warp drive" of science fiction. However, just as it happens with wormholes, exotic matter will be needed in order to generate a distortion of spacetime like the one discussed here....
Although this SourceSafe tutorial can be used for anyone who is interested in SourceSafe, it is mainly for software developers. As you may have been using SourceSafe for a long time and know many features of VSS, I will try to make the table of the content easy to navigate so hopefully you can easily find the information that you are interested in....
In this SourceSafe How To series / tutorial, I will write some guides, How To and FAQs about SourceSafe and will also post resources I found on the internet. This series will cover some basic and intermediate topics of SourceSafe as well as some advanced topics....
Introduction _________________________________________________________ 4 What is VSS? ________________________________________________________ 5 Market position _______________________________________________________ 6 What can VSS do? ____________________________________________________ 7 History preserving _____________________________________________________________ 7 File Difference _________________________________________________________________ 8 Project/Folder Difference _______________________________________________________ 9 Easy Collaboration ____________________________________________________________ 10 Several Important Concepts ___________________________________________ 12 VSS Database/Repository _____________________________________________________ 12 Working Folder _______________________________________________________________ 12 Master Copy and Local Copy ___________________________________________________ 12 Basic operations ____________________________________________________ 13 Add _________________________________________________________________________ 13 Get _________________...
The Department of Defense (DOD) anticipates the realization of biomimetic bird and two-inch, insect-sized systems within the 2015–47 period. Although robot systems of one millimeter or smaller are not explicitly specified in current DOD and Air Force technology road maps, the technological aims towards this size can be clearly inferred from official documents. This research assesses the likelihood of, and barriers to, the realization of true microrobots and nanorobots (defined as submillimeter-sized robots of micro-meter and nanometer proportions, respectively) that can perform in military applications by 2035. This research finds that the realization of true microrobots for military applications by 2035 is unlikely, except for a single case of microrobots....
Col Thompson, in his concentrated focus on China’s military space applications, examines PRC ground, space, counterspace, and space policy aspects. His principal findings: China has plans to construct a new launch site in the deep south; PRC telemetry, tracking and com-mand capacities are improving; China has the ability to conduct limited intelligence, surveillance and reconnaissance missions from space; the PRC is pursuing a counterspace capability most likely using satellite jammers and anti-satellites (possibly parasitic or nano-satellites). Col Thompson concludes that while China’s space program does not now constitute a global threat, the PRC is pursuing space capabilities that will increase its regional influence, and deny an adversary certain uses of space....