Browse Results

Showing 36,626 through 36,650 of 53,662 results

Visual Basic 2005 Cookbook: Solutions for VB 2005 Programmers (Cookbooks (O'Reilly))

by Tim Patrick John Clark Craig

This book will help you solve more than 300 of the most common and not-so-common tasks that working Visual Basic 2005 programmers face every day. If you're a seasoned .NET developer, beginning Visual Basic programmer, or a developer seeking a simple and clear migration path from VB6 to Visual Basic 2005, the Visual Basic 2005 Cookbook delivers a practical collection of problem-solving recipes for a broad range of Visual Basic programming tasks. The concise solutions and examples in the Visual Basic 2005 Cookbook range from simple tasks to the more complex, organized by the types of problems you need to solve. Nearly every recipe contains a complete, documented code sample showing you how to solve the specific problem, as well as a discussion of how the underlying technology works and that outlines alternatives, limitations, and other considerations. As with all O'Reilly Cookbooks, each recipe helps you quickly understand a problem, learn how to solve it, and anticipate potential tradeoffs or ramifications. Useful features of the book include: Over 300 recipes written in the familiar O'Reilly Problem-Solution-Discussion format Hundreds of code snippets, examples, and complete solutions available for download VB6 updates to alert VB6 programmers to code-breaking changes in Visual Basic 2005 Recipes that target Visual Basic 2005 features not included in previous releases Code examples covering everyday data manipulation techniques and language fundamentals Advanced projects focusing on multimedia and mathematical transformations using linear algebraic methods Specialized topics covering files and file systems, printing, and databasesIn addition, you'll find chapters on cryptography and compression, graphics, and special programming techniques. Whether you're a beginner or an expert, the Visual Basic 2005 Cookbook is sure to save you time, serving up the code you need, when you need it.

Data Analytics and Adaptive Learning: Research Perspectives

by Patsy D. Moskal, Charles D. Dziuban, and Anthony G. Picciano

Data Analytics and Adaptive Learning offers new insights into the use of emerging data analysis and adaptive techniques in multiple learning settings. In recent years, both analytics and adaptive learning have helped educators become more responsive to learners in virtual, blended, and personalized environments. This set of rich, illuminating, international studies spans quantitative, qualitative, and mixed-methods research in higher education, K–12, and adult/continuing education contexts. By exploring the issues of definition and pedagogical practice that permeate teaching and learning and concluding with recommendations for the future research and practice necessary to support educators at all levels, this book will prepare researchers, developers, and graduate students of instructional technology to produce evidence for the benefits and challenges of data-driven learning.

Distributed Computing in Java 9

by Raja Malleswara Pattamsetti

Explore the power of distributed computing to write concurrent, scalable applications in Java About This Book • Make the best of Java 9 features to write succinct code • Handle large amounts of data using HPC • Make use of AWS and Google App Engine along with Java to establish a powerful remote computation system Who This Book Is For This book is for basic to intermediate level Java developers who is aware of object-oriented programming and Java basic concepts. What You Will Learn • Understand the basic concepts of parallel and distributed computing/programming • Achieve performance improvement using parallel processing, multithreading, concurrency, memory sharing, and hpc cluster computing • Get an in-depth understanding of Enterprise Messaging concepts with Java Messaging Service and Web Services in the context of Enterprise Integration Patterns • Work with Distributed Database technologies • Understand how to develop and deploy a distributed application on different cloud platforms including Amazon Web Service and Docker CaaS Concepts • Explore big data technologies • Effectively test and debug distributed systems • Gain thorough knowledge of security standards for distributed applications including two-way Secure Socket Layer In Detail Distributed computing is the concept with which a bigger computation process is accomplished by splitting it into multiple smaller logical activities and performed by diverse systems, resulting in maximized performance in lower infrastructure investment. This book will teach you how to improve the performance of traditional applications through the usage of parallelism and optimized resource utilization in Java 9. After a brief introduction to the fundamentals of distributed and parallel computing, the book moves on to explain different ways of communicating with remote systems/objects in a distributed architecture. You will learn about asynchronous messaging with enterprise integration and related patterns, and how to handle large amount of data using HPC and implement distributed computing for databases. Moving on, it explains how to deploy distributed applications on different cloud platforms and self-contained application development. You will also learn about big data technologies and understand how they contribute to distributed computing. The book concludes with the detailed coverage of testing, debugging, troubleshooting, and security aspects of distributed applications so the programs you build are robust, efficient, and secure. Style and approach This is a step-by-step practical guide with real-world examples.

Oracle JET for Developers

by Raja Malleswara Pattamsetti

Client side JavaScript for enterprise Oracle applications. About This Book • Develop resilient and robust client-side applications • Explore the power of popular JavaScript libraries such as jQuery, RequireJS, and custom Oracle JavaScript libraries • Integrate JavaScript for Oracle developers • Easily debug and secure your cloud interfaces Who This Book Is For If you are a web components developer looking to create client-side apps that are resilient and robust using Oracle JET, then this book is the right choice for you. What You Will Learn • Use Yeoman or npm to start a new Oracle JET-based project • Implement real-world use cases using Oracle JET components • Get to know the best practices for Oracle JET web applications • Explore Knockout.js, the framework behind Oracle JET • Implement a multi-platform app with OJ and Cordova In Detail This book will give you a complete practical understanding of the Oracle JavaScript Extension Toolkit (JET) and how you can use it to develop efficient client-side applications with ease. It will tell you how to get your own customized Oracle JET set up. You'll start with individual libraries, such as jQuery, Cordova, and Require.js. You'll also get to work with the JavaScript libraries created by Oracle, especially for cloud developers. You'll use these tools to create a working backend application with these libraries. Using the latest Oracle Alta UI, you'll develop a state-of-the-art backend for your cloud applications. You'll learn how to develop and integrate the different cloud services required for your application and use other third-party libraries to get more features from your cloud applications. Toward the end of the book, you'll learn how to manage and secure your cloud applications, and test them to ensure seamless deployment. Style and approach This book will have a practical step by step approach where every step of application development will be explained in detail with code samples.

Pro Deep Learning with TensorFlow 2.0: A Mathematical Approach to Advanced Artificial Intelligence in Python

by Santanu Pattanayak

This book builds upon the foundations established in its first edition, with updated chapters and the latest code implementations to bring it up to date with Tensorflow 2.0. Pro Deep Learning with TensorFlow 2.0 begins with the mathematical and core technical foundations of deep learning. Next, you will learn about convolutional neural networks, including new convolutional methods such as dilated convolution, depth-wise separable convolution, and their implementation. You’ll then gain an understanding of natural language processing in advanced network architectures such as transformers and various attention mechanisms relevant to natural language processing and neural networks in general. As you progress through the book, you’ll explore unsupervised learning frameworks that reflect the current state of deep learning methods, such as autoencoders and variational autoencoders. The final chapter covers the advanced topic of generative adversarial networks and their variants, such as cycle consistency GANs and graph neural network techniques such as graph attention networks and GraphSAGE. Upon completing this book, you will understand the mathematical foundations and concepts of deep learning, and be able to use the prototypes demonstrated to build new deep learning applications. What You Will Learn Understand full-stack deep learning using TensorFlow 2.0Gain an understanding of the mathematical foundations of deep learning Deploy complex deep learning solutions in production using TensorFlow 2.0Understand generative adversarial networks, graph attention networks, and GraphSAGE Who This Book Is For: Data scientists and machine learning professionals, software developers, graduate students, and open source enthusiasts.

Python Artificial Intelligence Projects: 9 real-world AI projects leveraging machine learning and deep learning with TensorFlow and Keras

by Santanu Pattanayak

This book is intended for data scientists, machine learning professionals, and deep learning practitioners who are ready to extend their knowledge and possibilities in AI. If you want to build real-life smart systems to play a crucial role in every complex domain, then this book is what you need. Knowledge of Python programming and deep learning concepts are expected to get the most out of the book.

Quantum Machine Learning with Python: Using Cirq from Google Research and IBM Qiskit

by Santanu Pattanayak

Quickly scale up to Quantum computing and Quantum machine learning foundations and related mathematics and expose them to different use cases that can be solved through Quantum based algorithms.This book explains Quantum Computing, which leverages the Quantum mechanical properties sub-atomic particles. It also examines Quantum machine learning, which can help solve some of the most challenging problems in forecasting, financial modeling, genomics, cybersecurity, supply chain logistics, cryptography among others.You'll start by reviewing the fundamental concepts of Quantum Computing, such as Dirac Notations, Qubits, and Bell state, followed by postulates and mathematical foundations of Quantum Computing. Once the foundation base is set, you'll delve deep into Quantum based algorithms including Quantum Fourier transform, phase estimation, and HHL (Harrow-Hassidim-Lloyd) among others. You'll then be introduced to Quantum machine learning and Quantum deep learning-based algorithms, along with advanced topics of Quantum adiabatic processes and Quantum based optimization. Throughout the book, there are Python implementations of different Quantum machine learning and Quantum computing algorithms using the Qiskit toolkit from IBM and Cirq from Google Research.What You'll LearnUnderstand Quantum computing and Quantum machine learningExplore varied domains and the scenarios where Quantum machine learning solutions can be appliedDevelop expertise in algorithm development in varied Quantum computing frameworksReview the major challenges of building large scale Quantum computers and applying its various techniquesWho This Book Is ForMachine Learning enthusiasts and engineers who want to quickly scale up to Quantum Machine Learning

Microsoft® Application Architecture Guide

by Microsoft Patterns Practices Team

Get the definitive guide on designing applications on the Microsoft application platform--straight from the Microsoft patterns & practices team. Learn how to choose the most appropriate architecture and the best implementation technologies that the Microsoft application platform offers applications developers. Get critical design recommendations and guidelines organized by application type--from Web, mobile, and rich Internet applications to Office Business Applications. You'll also get links to additional technical resources that can help with your application development.

Getting Started with Zurb Foundation 4

by Andrew D. Patterson

The book starts with the basics of Foundation and helps you build your skills as you advance from installation to design, configuration, and customization with examples at every step.This book will be of great benefit to web architects, designers, and builders. While it helps to be a programmer, it isn't necessary for this book. You should be familiar with the basic principles of responsive web design and have a desire to create a professional website that looks great on both mobile devices and regular displays.

Computer Organization and Design: The Hardware/Software Interface (Fifth Edition)

by David A. Patterson John L. Hennessy

Computer Organization and Design, Fifth Edition, is the latest update to the classic introduction to computer organization. The text now contains new examples and material highlighting the emergence of mobile computing and the cloud. It explores this generational change with updated content featuring tablet computers, cloud infrastructure, and the ARM (mobile computing devices) and x86 (cloud computing) architectures. The book uses a MIPS processor core to present the fundamentals of hardware technologies, assembly language, computer arithmetic, pipelining, memory hierarchies and I/O. Because an understanding of modern hardware is essential to achieving good performance and energy efficiency, this edition adds a new concrete example, Going Faster, used throughout the text to demonstrate extremely effective optimization techniques. There is also a new discussion of the Eight Great Ideas of computer architecture. Parallelism is examined in depth with examples and content highlighting parallel hardware and software topics. The book features the Intel Core i7, ARM Cortex-A8 and NVIDIA Fermi GPU as real-world examples, along with a full set of updated and improved exercises. This new edition is an ideal resource for professional digital system designers, programmers, application developers, and system software developers. It will also be of interest to undergraduate students in Computer Science, Computer Engineering and Electrical Engineering courses in Computer Organization, Computer Design, ranging from Sophomore required courses to Senior Electives.

Computer Organization and Design MIPS Edition: The Hardware/Software Interface (The Morgan Kaufmann Series in Computer Architecture and Design)

by David A. Patterson John L. Hennessy

Computer Organization and Design: The Hardware/Software Interface, Sixth Edition, the leading, award-winning textbook from Patterson and Hennessy used by more than 40,000 students per year, continues to present the most comprehensive and readable introduction to this core computer science topic. Improvements to this new release include new sections in each chapter on Domain Specific Architectures (DSA) and updates on all real-world examples that keep it fresh and relevant for a new generation of students. <p>•Covers parallelism in-depth, with examples and content highlighting parallel hardware and software topics <p>•Includes new sections in each chapter on Domain Specific Architectures (DSA) <p>•Discusses and highlights the "Eight Great Ideas" of computer architecture, including Performance via Parallelism, Performance via Pipelining, Performance via Prediction, Design for Moore's Law, Hierarchy of Memories, Abstraction to Simplify Design, Make the Common Case Fast and Dependability via Redundancy

Expelled

by James Patterson Emily Raymond

One viral photo.Four expelled teens.Everyone's a suspect.Theo Foster's Twitter account used to be anonymous--until someone posted a revealing photo that got him expelled. No final grade. No future. No fair.Theo's resigned to a life of misery working at the local mini-mart when a miracle happens: Sasha Ellis speaks to him. Sasha Ellis knows his name. She was also expelled for a crime she didn't commit, and now he has the perfect way to get her attention: find out who set them up.To uncover the truth, Theo has to get close to the suspects: the hacker, the quarterback, the mean girl, the vice principal, and his own best friend. What secrets are they hiding? And how can Theo catch their confessions on camera?

Unbelievably Boring Bart

by James Patterson Duane Swierczynski Xavier Bonet

There's more than meets the eye in James Patterson's newest illustrated middle grade novel--a book so fun kids will actually put down their games to read it!Invisible creatures are attacking the school, and 12-year-old Bartholomew Bean is the only one who can stop them! Okay, so maybe Bart is only a hero in the video game app he created. But if he reveals his identity as the genius behind the game, he'll become the most popular kid in school! Or he could secretly use the game to get back at his bullies...Press Button A: RevealPress Button B: RevengeWhich would you choose?

Kubeflow Operations Guide

by Josh Patterson Michael Katzenellenbogen Austin Harris

Building models is a small part of the story when it comes to deploying machine learning applications. The entire process involves developing, orchestrating, deploying, and running scalable and portable machine learning workloads--a process Kubeflow makes much easier. This practical book shows data scientists, data engineers, and platform architects how to plan and execute a Kubeflow project to make their Kubernetes workflows portable and scalable.Authors Josh Patterson, Michael Katzenellenbogen, and Austin Harris demonstrate how this open source platform orchestrates workflows by managing machine learning pipelines. You'll learn how to plan and execute a Kubeflow platform that can support workflows from on-premises to cloud providers including Google, Amazon, and Microsoft.Dive into Kubeflow architecture and learn best practices for using the platformUnderstand the process of planning your Kubeflow deploymentInstall Kubeflow on an existing on-premises Kubernetes clusterDeploy Kubeflow on Google Cloud Platform step-by-step from the command lineUse the managed Amazon Elastic Kubernetes Service (EKS) to deploy Kubeflow on AWSDeploy and manage Kubeflow across a network of Azure cloud data centers around the worldUse KFServing to develop and deploy machine learning models

Create Stunning HTML Email That Just Works: Create HTML5 Emails That Look Great and Deliver!

by Mathew Patterson

Create Stunning HTML Email That Just Works is a step-by-step guide to creating beautiful HTML emails that consistently work. It begins with an introduction to email covering topics such as: how email design differs from web design; permission based marketing, and the anatomy of an email. What You Will Learn:How to design HTML emails that look greatSimple methods to design & test email newslettersBest practice, permission based email marketing tips & techniquesProven strategies for selling email design services to your clientsThe book shows the reader how to plan, design, and build gorgeous HTML email designs that look great in every email program: Outlook, Gmail, Apple Mail, etc. All-important tasks like legal requirements, testing, spam compliance and known hacks and workarounds are covered.

Learn AWS Serverless Computing: A beginner's guide to using AWS Lambda, Amazon API Gateway, and services from Amazon Web Services

by Scott Patterson

Build, deploy, test, and run cloud-native serverless applications using AWS Lambda and other popular AWS services Key Features Learn how to write, run, and deploy serverless applications in Amazon Web Services Make the most of AWS Lambda functions to build scalable and cost-efficient systems Build and deploy serverless applications with Amazon API Gateway and AWS Lambda functions Book Description Serverless computing is a way to run your code without having to provision or manage servers. Amazon Web Services provides serverless services that you can use to build and deploy cloud-native applications. Starting with the basics of AWS Lambda, this book takes you through combining Lambda with other services from AWS, such as Amazon API Gateway, Amazon DynamoDB, and Amazon Step Functions. You'll learn how to write, run, and test Lambda functions using examples in Node.js, Java, Python, and C# before you move on to developing and deploying serverless APIs efficiently using the Serverless Framework. In the concluding chapters, you'll discover tips and best practices for leveraging Serverless Framework to increase your development productivity. By the end of this book, you'll have become well-versed in building, securing, and running serverless applications using Amazon API Gateway and AWS Lambda without having to manage any servers. What you will learn Understand the core concepts of serverless computing in AWS Create your own AWS Lambda functions and build serverless APIs using Amazon API Gateway Explore best practices for developing serverless applications at scale using Serverless Framework Discover the DevOps patterns in a modern CI/CD pipeline with AWS CodePipeline Build serverless data processing jobs to extract, transform, and load data Enforce resource tagging policies with continuous compliance and AWS Config Create chatbots with natural language understanding to perform automated tasks Who this book is for This AWS book is for cloud architects and developers who want to build and deploy serverless applications using AWS Lambda. A basic understanding of AWS is required to get the most out of this book.

Blackboard Learn Administration

by Terry Patterson

Hands-on and step-by-step instructions on successfully administrating Blackboard Learn from an admin expert. This book is for in-house IT administrators who are responsible for maintaining the school's IT system and making sure that it is ready for the teachers to use. Readers will need some experience with server management and installation.

New Perspectives in Behavioral Cybersecurity: Human Behavior and Decision-Making Models

by Wayne Patterson

New Perspectives in Behavioral Cybersecurity offers direction for readers in areas related to human behavior and cybersecurity, by exploring some of the new ideas and approaches in this subject, specifically with new techniques in this field coming from scholars with very diverse backgrounds in dealing with these issues. It seeks to show an understanding of motivation, personality, and other behavioral approaches to understand cyberattacks and create cyberdefenses. This book: • Elaborates cybersecurity concerns in the work environment and cybersecurity threats to individuals. • Presents personality characteristics of cybersecurity attackers, cybersecurity behavior, and behavioral interventions. • Highlights the applications of behavioral economics to cybersecurity. • Captures the management and security of financial data through integrated software solutions. • Examines the importance of studying fake news proliferation by detecting coordinated inauthentic behavior. This title is an ideal read for senior undergraduates, graduate students, and professionals in fields including ergonomics, human factors, human-computer interaction, computer engineering, and psychology.

Behavioral Cybersecurity: Applications of Personality Psychology and Computer Science

by Wayne Patterson Cynthia E. Winston-Proctor

Since the introduction and proliferation of the Internet, problems involved with maintaining cybersecurity has grown exponentially, and have evolved into many forms of exploitation. Yet, Cybersecurity has had far too little study and research. Virtually all of the Research that has taken place in cybersecurity over many years, has been done by those with computer science, electrical engineering, and mathematics backgrounds. However, many cybersecurity researchers have come to realize that to gain a full understanding of how to protect a cyber environment requires not only the knowledge of those researchers in computer science, engineering and mathematics, but those who have a deeper understanding of human behavior: researchers with expertise in the various branches of behavioral science, such as psychology, behavioral economics, and other aspects of brain science. The authors, one a computer scientist and the other a psychologist, have attempted over the past several years to understand the contributions that each approach to cybersecurity problems can benefit from this integrated approach that we have tended to call "behavioral cybersecurity." The authors believe that the research and curriculum approaches developed from this integrated approach provide a first book with this approach to cybersecurity. This book incorporates traditional technical computational and analytic approaches to cybersecurity, and also psychological and human factors approaches, as well. Features Discusses profiling approaches and risk management Includes case studies of major cybersecurity events and "Fake News" Presents analyses of password attacks and defenses Addresses game theory, behavioral economics and their application to cybersecurity Supplies research into attacker/defender personality and motivation traits Techniques for measuring cyber attacks/defenses using crypto and stego

Behavioral Cybersecurity: Fundamental Principles and Applications of Personality Psychology

by Wayne Patterson Cynthia E. Winston-Proctor

This book discusses the role of human personality in the study of behavioral cybersecurity for non-specialists. Since the introduction and proliferation of the Internet, cybersecurity maintenance issues have grown exponentially. The importance of behavioral cybersecurity has recently been amplified by current events, such as misinformation and cyber-attacks related to election interference in the United States and internationally. More recently, similar issues have occurred in the context of the COVID-19 pandemic. The book presents profiling approaches, offers case studies of major cybersecurity events and provides analysis of password attacks and defenses. Discussing psychological methods used to assess behavioral cybersecurity, alongside risk management, the book also describes game theory and its applications, explores the role of cryptology and steganography in attack and defense scenarios and brings the reader up to date with current research into motivation and attacker/defender personality traits. Written for practitioners in the field, alongside nonspecialists with little prior knowledge of cybersecurity, computer science, or psychology, the book will be of interest to all who need to protect their computing environment from cyber-attacks. The book also provides source materials for courses in this growing area of behavioral cybersecurity.

Peripheral Vision

by Zabet Patterson

In 1959, the electronics manufacturer Stromberg-Carlson produced the S-C 4020, a device that allowed mainframe computers to present and preserve images. In the mainframe era, the output of text and image was quite literally peripheral; the S-C 4020 -- a strange and elaborate apparatus, with a cathode ray screen, a tape deck, a buffer unit, a film camera, and a photo-paper camera -- produced most of the computer graphics of the late 1950s and early 1960s. At Bell Laboratories in Murray Hill, New Jersey, the S-C 4020 became a crucial part of ongoing encounters among art, science, and technology. In this book, Zabet Patterson examines the extraordinary uses to which the Bell Labs SC-2040 was put between 1961 and 1972, exploring a series of early computer art projects shaped by the special computational affordances of the S-C 4020. The S-C 4020 produced tabular data, graph plotting and design drawings, grid projections, and drawings of axes and vectors; it made previously impossible visualizations possible. Among the works Patterson describes are E. E. Zajac's short film of an orbiting satellite, which drew on the machine's graphic capacities as well as the mainframe's calculations; a groundbreaking exhibit of "computer generated pictures" by Béla Julesz and Michael Noll, two scientists interested in visualization; animations by Kenneth Knowlton and the Bell Labs artist-in-residence Stan VanDerBeek; and Lillian Schwartz's "cybernetic" film Pixillation.Arguing for the centrality of a peripheral, Patterson makes a case for considering computational systems not simply as machines but in their cultural and historical context.

Peripheral Vision: Bell Labs, the S-C 4020, and the Origins of Computer Art (Platform Studies)

by Zabet Patterson

How the S-C 4020—a mainframe peripheral intended to produce scientific visualizations—shaped a series of early computer art projects that emerged from Bell Labs.In 1959, the electronics manufacturer Stromberg-Carlson produced the S-C 4020, a device that allowed mainframe computers to present and preserve images. In the mainframe era, the output of text and image was quite literally peripheral; the S-C 4020—a strange and elaborate apparatus, with a cathode ray screen, a tape deck, a buffer unit, a film camera, and a photo-paper camera—produced most of the computer graphics of the late 1950s and early 1960s. At Bell Laboratories in Murray Hill, New Jersey, the S-C 4020 became a crucial part of ongoing encounters among art, science, and technology. In this book, Zabet Patterson examines the extraordinary uses to which the Bell Labs SC-2040 was put between 1961 and 1972, exploring a series of early computer art projects shaped by the special computational affordances of the S-C 4020. The S-C 4020 produced tabular data, graph plotting and design drawings, grid projections, and drawings of axes and vectors; it made previously impossible visualizations possible. Among the works Patterson describes are E. E. Zajac's short film of an orbiting satellite, which drew on the machine's graphic capacities as well as the mainframe's calculations; a groundbreaking exhibit of “computer generated pictures” by Béla Julesz and Michael Noll, two scientists interested in visualization; animations by Kenneth Knowlton and the Bell Labs artist-in-residence Stan VanDerBeek; and Lillian Schwartz's “cybernetic” film Pixillation.Arguing for the centrality of a peripheral, Patterson makes a case for considering computational systems not simply as machines but in their cultural and historical context.

Inside Microsoft® SharePoint® 2010

by Ted Pattison Andrew Connell Scot Hillier David Mann

<p>Get a detailed look inside SharePoint 2010&#8212;and master the intricacies of developing intranets, extranets, and Web-based applications. Guided by an author team with in-depth knowledge of SharePoint architecture, you'll gain task-oriented guidance and extensive code samples to help you build robust business solutions.</p>

Inside Microsoft SharePoint 2013

by Ted Pattison Andrew Connell Scot Hillier Mirjam Van Olst Kyle Davis Wictor Wilen

Build custom SharePoint solutions with architectural insights from the experts. Take a deep dive into SharePoint 2013, and master the intricacies for designing and implementing robust apps and other business solutions for your organization. Led by an author team with in-depth knowledge of SharePoint architecture, you'll thoroughly explore the SharePoint 2013 development platform and new app model through hands-on tasks and extensive code samples. Discover how to: Create SharePoint-hosted, provider-hosted, and autohosted apps Master the new app security model with OAuth and Certificates Develop workflows with the SharePoint 2013 workflow model Design a custom search experience and create search-based apps Leverage the client-side object model and REST APIs Produce catalog-driven web sites with Web Content Management capabilities Get cloud-based data sources with Business Connectivity Services Create and utilize remote event receivers for lists and libraries Generate new social networking apps and solutions

Praxisratgeber Video-Marketing: Strategie, Produktion, Tools, Verbreitung

by Jörg Pattiss

Online-Videos haben sich zu einem effektiven und unverzichtbaren Werkzeug im Marketing für Unternehmen jeglicher Größe etabliert. Videos können nicht nur relevanten Content in kurzer Zeit anschaulich vermitteln, sondern bedienen den Zuschauer auch auf verschiedenen emotionalen Ebenen und helfen dadurch, eine Beziehung zur Zielgruppe aufzubauen. Dieses Buch erklärt, wie Unternehmen Online-Videos strategisch planen und einsetzen können und erläutert, was es in allen Phasen der Produktion zu beachten gilt: von der Zielsetzung und der Konzeptphase, über Präsentationstechniken und Handwerkszeug beim Dreh, bis hin zur Nachbearbeitung und digitalen Verbreitung.Ein handfester und leicht verständlicher Ratgeber mit unzähligen wertvollen Tipps, Tools, Programmen und Insider-Tricks eines Experten, der wiederholt dazu rät: Einfach mal machen - Übung macht den Meister!Digitales Buch: Laden Sie die Springer Nature ExploreBooks App kostenlos herunter – Abbildungen im Buch per App mit Handy oder Tablet scannen, um Videos zu streamen und Zusatzinformationen zu erhalten.

Refine Search

Showing 36,626 through 36,650 of 53,662 results