Search Results (403 titles)

Searched over 21.6 Million titles in 0.38 seconds

 
PDF (eBook) (X) Technology (X) Authors Community (X)

       
1
|
2
|
3
|
4
|
5
Records: 1 - 20 of 403 - Pages: 
  • Cover Image

Validate Digital Signature in Adobe : A Step by Step Guide with Snapshots

By: Pratik Kaushikkumar Kikani; Pratik Kaushikkumar Kikani

The book will show how to validate Digital Signature in Adobe reader. It covers two methods of validating along with snapshots of screen and step by step guidance....

“SIGNATURE IS WHAT YOU GET PAID FOR.” –Pratik Kikani

Index Content Page No E-book Page No Introduction 5-5 6-6 Few Basics of Digital Signature 6-7 7-8 Methods of Validating Sign-Brief 8-9 9-10 Which Method Suitable 10-10 11-11 Method 1 with Snapshots 11-16 12-17 Method 2 with Snapshots 17-28 18-29 Document after Validating Sign 29-29 30-30 ...

Read More
  • Cover Image

Ghidul Google SEO

By: Nicolae Sfetcu, Editor; Nicolae Sfetcu, Performer

Acest document a fost lansat iniţial ca un efort pentru a ajuta echipele Google, însă este la fel de util şi pentru webmasterii începători în domeniul optimizării pentru motoarele de căutare, şi care doresc să îmbunătăţească interacţiunea site-ului atât cu utilizatorii, cât şi cu motoarele de căutare. Deşi acest ghid nu vă va dezvălui niciun secret prin care site-ul dvs. să se claseze în mod automat primul pentru interogările de pe Google, respectarea celor mai bune practici prezentate mai jos va simplifica atât accesarea cu crawlere, cât şi indexarea conţinutului dvs. de motoarele de căutare....

Ghidul de iniţiere Google privind optimizarea pentru motoarele de căutare, Versiunea 1.1, 13 noiembrie 2008

Read More
  • Cover Image

Libraries of the Future

By: J.C.R. Licklider

This report of research on concepts and problems of "Libraries of the Future" records the result of a two-year inquiry into the applicability of some of the newer techniques for handling information to what goes at present by the name of library work— i.e., the operations connected with assembling information in recorded form and of organizing and making it available for use....

Read More
  • Cover Image

Ghid web design pentru administratia publică

By: Nicolae Sfetcu, Compiler; Nicolae Sfetcu, Editor

Ghid privind realizarea paginilor web pentru administraţia publică centrală şi locală din România. Acest ghid se adresează administraţiei publice care utilizează IT&C în vederea interacţiunii atât între cetăţeni, mediile de afaceri şi administraţia publică, cât şi în raportul interinstituţional, cu scopul creşterii eficienţei şi operativităţii, a îmbunătăţirii accesibilităţii web la serviciile publice. În vederea garantării calităţii şi utilităţii site-urilor web ale autorităţilor şi instituţiilor publice din administraţia publică centrală şi locală, se recomandă o planificare meticuloasă a proiectării, realizării şi întreţinerii site-urilor înainte de demararea proiectului. Imaginea respectivelor autorităţi şi instituţii publice, precum şi cea a României depinde şi de calitatea site-urilor web proiectate. Mai multe formate: http://www.trybuyshop.com/product/ghid-web-design-pentru-administratia-publica/...

Ghid privind realizarea paginilor web pentru administraţia publică centrală şi locală din România.

Read More
  • Cover Image

Ghid Utilizarea Calculatoarelor

By: Nicolae Sfetcu, Compiler

Utilizarea calculatorului şi a serviciilor electronice – Ghid pentru funcţionarii publici Acest ghid se adresează funcţionarilor publici care utilizează calculatorul şi Internetul în activitatea lor. Scopul acestei lucrări este de a familiariza funcţionarii publici cu posibilităţile şi avantajele oferite de utilizarea calculatorului şi a internetului, inclusiv prin potenţialul guvernării electronice (e-Guvernare) pentru activitatea instituţiilor publice. Lucrarea porneşte de la prezentarea, în primul capitol, a câtorva concepte de bază legate de calculatoare şi Internet, cum ar fi tipurile de programe pentru calculator şi utilitatea lor, documentele şi organizarea lor, tipuri de reţele şi rolul Internetului ca reţea globala, serviciile disponibile prin Internet, respectiv câteva considerente legate de drepturile de autor şi utilizarea legală a programelor de calculator. Capitolul 2 descrie utilitatea calculatorului si aplicaţiilor pentru activitatea de birou, fiind structurat pe două componente: Internetul si aplicaţiile software. Capitolul 3 prezintă o serie de concepte, reguli şi sfaturi destinate unei utilizări cât ma...

Acest ghid se adresează funcţionarilor publici care utilizează calculatorul şi Internetul în activitatea lor. Scopul acestei lucrări este de a familiariza funcţionarii publici cu posibilităţile şi avantajele oferite de utilizarea calculatorului şi a internetului, inclusiv prin potenţialul guvernării electronice (e-Guvernare) pentru activitatea instituţiilor publice....

Read More
  • Cover Image

X-15 Research Results

By: Wendell H. Stillwell

This semi-technical summary of the X–15 program is directed toward the less publicized aspects of its achievements.

Read More
  • Cover Image

Wright Flyer Paper : Unmanned Intratheater Airlift, Vol. 45

By: Major Kevin J. McGowan, USAF

This paper investigates the DOD’s tactical logistical challenges and each service’s tactical lift requirements, especially with respect to the movement of supplies from forward supply hubs to forward forces. To address these challenges and requirements, the author suggests the use of remotely piloted aircraft (RPA) as a potential solution. Focusing on existing and quickly emerging technologies as well as the joint operating requirements, the author proposes RPA performance and design characteristics along with a concept of employment that increases tactical lift capabilities and meets all current service requirements....

1 INTRODUCTION . . . .1 Notes . . . . . 12 2 OPERATIONAL REQUIREMENTS . . . .15 Notes . . . . 26 3 TECHNOLOGY REVIEW/PROOF OF CONCEPT . . .27 Notes . . . .41 4 PROPOSED SOLUTION . . . . 45 Notes . . . . .51 5 SYNOPSIS OF CONCEPT OF EMPLOYMENT . . . .53 Notes . . . . 59 6 CONCLUSION . . . . .61...

Read More
  • Cover Image

Supervivencia en VoIP

By: Gustavo Cardelle

Buenas prácticas, conceptos, configuraciones y métodos a tener en cuenta en un proyecto de VoIP para evitar interrupciones en las comunicaciones.

Dirigido especialmente a técnicos e instaladores en IP PBX.

01. Introducción Visión general de las plataformas de VoIP en el mercado 02. Que es supervivencia? Conceptos y soluciones de supervivencia 03. Primeros pasos Ejemplo de proyecto. Diseño y planificación 04. 2 WAN Dos ISP (Internet Service Provider) 05. Router 2 WAN Configuración del router 06. IP PBX Local Red centralizada Vs multi centrales 07. Plan de numeración Planificación integral de las funciones de nuestra PBX 08. Redundancia Duplicidad en hardware 09. Comunicaciones Unificadas Web Service y Softphone 10. PBX Hibrida Centrales analógicas con enlace IP 11. Bypass FXS/FXO Conmutación de líneas 12. Líneas IP Registro de líneas IP en red 13. ARS | Selección automática de ruta Configuración de ruta alternativa 14. Telulares Red de celulares 15. Resguardo eléctrico Planificación de switch POE 16. Conclusión Uso de buenas practicas Links de interés Sitios recomendados Acerca del Autor...

Read More
  • Cover Image

Failure to Launch : From Big Data to Big Decisions; Why velocity, variety and volume is not improving decision making and how to fix it

By: Forte Wares

The key to making big data initiatives a success lies within making the produced data more digestible and usable in decision making, rather than making it just ‘more,’ resulting in the creation of an environment wherein information is used to generate real impact. Put another way, the survival of Big Data is more about making the right data(not just higher volume) available to the right people (not just higher variety) at the right time (not just higher velocity)....

Read More
  • Cover Image

Wright Flyer Paper : How Small Is Too Small?; Technology into 2035, Vol. 46

By: Major Paul E. Kladitis, USAF

The Department of Defense (DOD) anticipates the realization of biomimetic bird and two-inch, insect-sized systems within the 2015–47 period. Although robot systems of one millimeter or smaller are not explicitly specified in current DOD and Air Force technology road maps, the technological aims towards this size can be clearly inferred from official documents. This research assesses the likelihood of, and barriers to, the realization of true microrobots and nanorobots (defined as submillimeter-sized robots of micro-meter and nanometer proportions, respectively) that can perform in military applications by 2035. This research finds that the realization of true microrobots for military applications by 2035 is unlikely, except for a single case of microrobots....

Read More
  • Cover Image

Wright Flyer Paper : Tracking Next–Generation Automatic Identification Technology into 2035, Vol. 46

By: Major Richard N Holifield, Jr., USAF

This paper explores the advances in automatic identification technology, specifically radio frequency identification, and seeks to exploit these capabilities for use in the Department of Defense (DOD) supply chain. Using technological trends, a thorough literature review, and the opinions of experts, the paper compares current technology to a 2035 requirements forecast to identify capability gaps. The end goal is logistics situational awareness, whereby the DOD has the ability to provide end-to-end visibility throughout its supply chain and can rapidly mobilize, deploy, sustain, and redeploy forces in support of national security objectives....

Read More
  • Cover Image

Introdução ao Uso do LaTeX: Versão 1.2a

By: Ivo Fernandez Lopez e Maria Darci Godinho da Silva

Apesar de haver uma literatura grande sobre o LaTeX, uma boa parte dos trabalhos disponíveis é relativamente antiga e não contém os avanços dos últimos anos. Em virtude disto, resolvemos escrever um texto sobre o LaTeX que, de uma forma simples e auto contida, apresente as opções mais recentes que estenderam e facilitaram o aprendizado e aplicação. No livro, além do básico sobre o LaTeX, acrescentaram-se tópicos sobre como elaborar apresentações, elaborar monografias, dissertações e teses, elaborar uma prova com gabarito, incluir arquivos multimídia, elaborar pôsteres para apresentação em congresso, usar recursos mais modernos para digitação de equações longas e sistemas de equações, elaborar bibliografias, incluir um índice remissivo, incluir sumário etc. A bibliografia do livro é constituída quase que exclusivamente de arquivos disponíveis na Internet e é feito um comentário sobre cada citação, além de permitir o acesso através de hiperligação ("hyperlink"). Ao longo do texto são citadas as referências que podem aprofundar os tópicos, caso o leitor sinta necessidade. No segundo semestre de 2013 foram feitos diversos ac...

1 Introdução -- Noções Básicas de LATEX 1.1 Origem: TeX (TEX) 1.2 Avanço: LaTeX (LATEX) 1.3 Exemplo mínimo de arquivo em LATEX 1.4 Resultado da compilação 1.5 Programas indicados 1.6 Gerando arquivo .pdf ou .dvi (compilação) 1.7 Distribuições de LATEX 1.8 Distribuição MiKTeX 1.9 Distribuição TeXLive 1.10 Editor para os arquivos .tex 1.11 Editor TeXworks 1.11.1 Configurações básicas 1.11.2 Algumas sugestões para o seu uso 1.12 Exemplo da interface do TeXworks 1.13 Editor Texmaker 1.14 Exemplo da interface do Texmaker 1.15 Arquivos auxiliares 2 LATEX Básico 2.1 Caracteres especiais 2.2 Estrutura dos arquivos em LATEX 2.3 Comandos básicos, ambientes, matemática 2.4 Classes de documentos 2.5 Parágrafos, espaços, separação de sílabas 2.6 Fontes e LuaTeX 2.7 Capítulos, seções, apêndice etc 2.8 Título, sumário, listas de tabelas e de figuras 2.9 Geometria da página, espaçamento entre linhas 2.10 Numeração e formatação das páginas, notas de rodapé 2.11 Principais pacotes 2.12 Símbolos matemáticos 2.13 Subscritos, sobrescritos, funções pré-de...

Read More
  • Cover Image

Mosquitoes to Wolves : The Evolution of the Airborne Forward Air Controller

By: Gary Robert Lester

By the end of the Vietnam War, advances in technology allowed these FACs to control strikes against targets at night, in bad weather, and with improved precision. Laser-guided weapons systems, new computer navigation equipment, and advanced ground radars combined to provide an effective and lethal capability. If the Mosquitoes were an annoyance in Korea, the Wolves of Vietnam proved to be a deadly addition to the concept of FAC....

Read More
  • Cover Image

Aviation Urban Operations : Are We Training Like We Fight?

By: Lieutenant Colonel, Todd G. Kemper, USMC

The author contends that urban terrain has become the preferred battlespace of US adversaries in the early twenty-first century. This environment poses unique challenges, especially to air and space warfare. The difficulty of sorting friendlies from enemy combatants, the latter intermingled with large numbers of noncombatants in very confined spaces, creates serious dilemmas for maneuver and aviation forces. Colonel Kemper believes that this mission, though well documented, has received neither the priority nor the resources necessary to ensure operational excellence and success on the modern battlefield. Thus, he not only inquires about whether we are training like we fight, but also seeks to determine what makes aviation urban operations so complicated and unique that they require stand-alone doctrine, tactics, techniques, and procedures....

Read More
  • Cover Image

Information Technology Tales

By: Brad Bradford

This book also begins with that wondrous first Information Technology and then moves on to tales about the wonders of the written word—great stories, many of them likely new to most readers. In them, you‘ll find all the backgrounds, foregrounds, premises, conclusions, and surprises that make up the best and most valuable books. This book also begins with that wondrous first Information Technology and then moves on to tales about the wonders of the written word—great stories, many of them likely new to most readers. In them, you‘ll find all the backgrounds, foregrounds, premises, conclusions, and surprises that make up the best and most valuable books. At sixty-four, I bring another full lifetime lived both at that exact moment where my experiences could straddle working in print shops and in the current digital eBook era.. My degree in human-computer interfaces in 1973 led to my appointment as adjunct professor at Benedictine University, where I built the world‘s first electronic library in 1988. You could walk into that library, and the first thing you‘d see was the computer asking if there were any books you wanted. You se...

Way back in the fifteenth century a man named Johann Gutenberg invented the ?printing press. More than 400 years passed before Ottmar Mergenthaler found a way in the late 1880s to mechanize that historic invention. Then, less than a century later – in the 1980s – digital printing displaced Mergenthaler’s wondrous Linotypes....

Read More
  • Cover Image

Technology and Military Doctrine

By: I.B. Holley

1 THE ROLE OF DOCTRINE . . . . . . . . . . . . . 1 2 THE DOCTRINAL PROCESS: SOME SUGGESTED STEPS . . . . . . . . . . . . . . . . . . .5 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 3 CONCEPTS, DOCTRINES, PRINCIPLES . . . .19 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 4 SOME SEMINAL THINKERS ON TECHNOLOGY AND DOCTRINE . . . . . . . . . . . . . 25 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 5 WEAPONS AND DOCTRINE: A HISTORICAL INTRODUCTION . . . . . . . . . . . . . . . . . . . 55 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 6 INSIGHTS ON TECHNOLOGY AND DOCTRINE . . . . . . . . . . . . . . . . . . . . . . . .79 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 7 OF SABER CHARGES, ESCORT FIGHTERS, AND SPACECRAFT: THE SEARCH FOR DOCTRINE . . . . . . . . . . . . . . . . . . . . . . . .91 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . 106 8 LOOKING BACKWARD TO SEE AHEAD IN SPACE: REFLECTIONS ON THE NEED FOR SPACE DOCTRINE . . . . . . . . . . . . . . .109 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . 119 9 A MO...

Read More
  • Cover Image

The Business of Domain Names

By: Nicolae Sfetcu

Business of buying, selling, developing and monetizing Internet domain names. On the Internet, the Domain Name System (DNS) associates various sorts of information with so-called domain names; most importantly, it serves as the “phone book” for the Internet: it translates human-readable computer hostnames. Domaining is the business of buying, selling, developing and monetizing Internet domain names. Such domain name portfolios often include cleverly chosen and highly marketable generic domain names, or domains whose registrations had lapsed yet still retain reasonable traffic. There is sometimes no actual intent to use any of the domain names with the exception of generating advertising revenue through domain parking. ...

Business of buying, selling, developing and monetizing Internet domain names.

Read More
  • Cover Image

Iritel Beograd - Company Product Catalogue : IRITEL OTP10G - OTN/DWDM 10G, ODS2G5 - SDH/SONET, OTS622 - SDH/SONET, SUNCE+, SUNCE-M NMS, IP ETHERNET TDM

By: Iritel Beograd

IRITEL (www.iritel.com) Company Product Catalogue - OTP10G - OTN/DWDM 10G Optical Transport Systems - ODS2G5 - SDH/SONET 2G5 Optical Transport Systems - OTS622 - SDH/SONET 622M Optical Transport Systems - SUNCE+ - NETWORK MANAGEMENT SYSTEM (NMS) FOR IRITEL OTN DWDM SDH SONET AND ACCESS SYSTEMS - SUNCE-M - NETWORK MANAGEMENT SYSTEM (NMS) FOR IRITEL SDH SONET AND ACCESS SYSTEMS - INTERFACE CONVERTERS TDM OVER IP, IP OVER TDM - TELECOMMUNICATION POWER SUPPLY - RADIO SYSTEMS...

IRITEL (www.iritel.com) Company Product Catalogue - OTP10G - OTN/DWDM 10G Optical Transport Systems - ODS2G5 - SDH/SONET 2G5 Optical Transport Systems - OTS622 - SDH/SONET 622M Optical Transport Systems - SUNCE+ - NETWORK MANAGEMENT SYSTEM (NMS) FOR IRITEL OTN DWDM SDH SONET AND ACCESS SYSTEMS - SUNCE-M - NETWORK MANAGEMENT SYSTEM (NMS) FOR IRITEL SDH SONET AND ACCESS SYSTEMS - INTERFACE CONVERTERS TDM OVER IP, IP OVER TDM - TELECOMMUNICATION POWER SUPPLY - RADIO SYSTEMS...

Read More
  • Cover Image

Using Visual SourceSafe : SourceSafe / VSS Tutorial, Volume 163: SourceSafe / VSS Tutorial

By: Kevin Gao

Although this SourceSafe tutorial can be used for anyone who is interested in SourceSafe, it is mainly for software developers. As you may have been using SourceSafe for a long time and know many features of VSS, I will try to make the table of the content easy to navigate so hopefully you can easily find the information that you are interested in....

In this SourceSafe How To series / tutorial, I will write some guides, How To and FAQs about SourceSafe and will also post resources I found on the internet. This series will cover some basic and intermediate topics of SourceSafe as well as some advanced topics....

Introduction _________________________________________________________ 4 What is VSS? ________________________________________________________ 5 Market position _______________________________________________________ 6 What can VSS do? ____________________________________________________ 7 History preserving _____________________________________________________________ 7 File Difference _________________________________________________________________ 8 Project/Folder Difference _______________________________________________________ 9 Easy Collaboration ____________________________________________________________ 10 Several Important Concepts ___________________________________________ 12 VSS Database/Repository _____________________________________________________ 12 Working Folder _______________________________________________________________ 12 Master Copy and Local Copy ___________________________________________________ 12 Basic operations ____________________________________________________ 13 Add _________________________________________________________________________ 13 Get _________________...

Read More
  • Cover Image

China in Space : Civilian and Military Developments

By: Colonel David J. Thompson, USAF; Lieutenant Colonel William R. Morris, USAF

Col Thompson, in his concentrated focus on China’s military space applications, examines PRC ground, space, counterspace, and space policy aspects. His principal findings: China has plans to construct a new launch site in the deep south; PRC telemetry, tracking and com-mand capacities are improving; China has the ability to conduct limited intelligence, surveillance and reconnaissance missions from space; the PRC is pursuing a counterspace capability most likely using satellite jammers and anti-satellites (possibly parasitic or nano-satellites). Col Thompson concludes that while China’s space program does not now constitute a global threat, the PRC is pursuing space capabilities that will increase its regional influence, and deny an adversary certain uses of space....

Read More
       
1
|
2
|
3
|
4
|
5
Records: 1 - 20 of 403 - Pages: 
 
 





Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.