- Table View
- List View
The Cookbook-style recipes allow you to go both directly to your topic of interest or follow topics throughout a chapter to gain in-depth knowledge. This practical Cookbook will cater to the needs of both intermediate and advanced concrete5 developers.This book is geared towards intermediate to advanced PHP developers who would like to learn more about the concrete5 content management system. Developers already familiar with concrete5 will learn new time-saving tricks and will find the book to be a great reference tool.
Whether you have had some previous experience with concrete5 or are entirely new to it, this book will help you understand all that you need to know in order to get started with concrete5 development. A background in PHP is required; some knowledge of HTML/CSS is needed in order to fully grasp the concepts underlying concrete5 theme development.
If you're one of the many developers uncertain about concurrent and multithreaded development, this practical cookbook will change your mind. With more than 75 code-rich recipes, author Stephen Cleary demonstrates parallel processing and asynchronous programming techniques, using libraries and language features in .NET 4.5 and C# 5.0.Concurrency is becoming more common in responsive and scalable application development, but it's been extremely difficult to code. The detailed solutions in this cookbook show you how modern tools raise the level of abstraction, making concurrency much easier than before. Complete with ready-to-use code and discussions about how and why the solution works, you get recipes for using:async and await for asynchronous operationsParallel programming with the Task Parallel LibraryThe TPL Dataflow library for creating dataflow pipelinesCapabilities that Reactive Extensions build on top of LINQUnit testing with concurrent codeInterop scenarios for combining concurrent approachesImmutable, threadsafe, and producer/consumer collectionsCancellation support in your concurrent codeAsynchronous-friendly Object-Oriented ProgrammingThread synchronization for accessing data
Now that multicore processors are coming to mobile devices, wouldn't it be great to take advantage of all those cores without having to manage threads? This concise book shows you how to use Apple's Grand Central Dispatch (GCD) to simplify programming on multicore iOS devices and Mac OS X. Managing your application's resources on more than one core isn't easy, but it's vital. Apps that use only one core in a multicore environment will slow to a crawl. If you know how to program with Cocoa or Cocoa Touch, this guide will get you started with GCD right away, with many examples to help you write high-performing multithreaded apps. Package your code as block objects and invoke them with GCD Understand dispatch queues--the pools of threads managed by GCD Use different methods for executing UI and non-UI tasks Create a group of tasks that GCD can run all at once Instruct GCD to execute tasks only once or after a delay Discover how to construct your own dispatch queues
In recent years, rapid changes and improvements have been witnessed in the field of transformer condition monitoring and assessment, especially with the advances in computational intelligence techniques. Condition Monitoring and Assessment of Power Transformers Using Computational Intelligence applies a broad range of computational intelligence techniques to deal with practical transformer operation problems. The approaches introduced are presented in a concise and flowing manner, tackling complex transformer modelling problems and uncertainties occurring in transformer fault diagnosis. Condition Monitoring and Assessment of Power Transformers Using Computational Intelligence covers both the fundamental theories and the most up-to-date research in this rapidly changing field. Many examples have been included that use real-world measurements and realistic operating scenarios of power transformers to fully illustrate the use of computational intelligence techniques for a variety of transformer modelling and fault diagnosis problems. Condition Monitoring and Assessment of Power Transformers Using Computational Intelligence is a useful book for professional engineers and postgraduate students. It also provides a firm foundation for advanced undergraduate students in power engineering.
Condition Monitoring Using Computational Intelligence Methods promotes the various approaches gathered under the umbrella of computational intelligence to show how condition monitoring can be used to avoid equipment failures and lengthen its useful life, minimize downtime and reduce maintenance costs. The text introduces various signal-processing and pre-processing techniques, wavelets and principal component analysis, for example, together with their uses in condition monitoring and details the development of effective feature extraction techniques classified into frequency-, time-frequency- and time-domain analysis. Data generated by these techniques can then be used for condition classification employing tools such as: * fuzzy systems; rough and neuro-rough sets; neural and Bayesian networks;hidden Markov and Gaussian mixture models; and support vector machines.
Internet-based surveys, although still in their infancy, are becoming increasingly popular because they are believed to be faster, better, cheaper, and easier to conduct than surveys using more traditional telephone or mail methods. Based on evidence in the literature and real-life case studies, this book examines the validity of those claims. The authorsd iscuss the advantages and disadvantages of using e-mail and the Web to conduct research surveys, and also offer practical suggestions for designing and implementing Internet surveys most effectively. Among other findings, the authors determined that Internet surveys may be preferable to mail or telephone surveys when a list of e-mail addresses for the target population is available, thus eliminating the need for mail or phone invitations to potential respondents. Internet surveys also are well-suited for larger survey efforts and for some target populations that are difficult to reach by traditional survey methods. Web surveys are conducted more quickly than mail or phone surveys when respondents are contacted initially by e-mail, as is often the case when a representative panel of respondents has been assembled in advance. And, although surveys incur virtually no coding or data-entry costs because the data are captured electronically, the labor costs for design and programming can be high.
Top photographer and Canon Explorer of Light Rick Sammon shares his best tips and tricks for getting high-quality images with your point-and-shoot cameraProlific author and renowned photographer Rick Sammon shares essential tips, tricks, and advice from years of vast and unique photography experiences. Packed with pointers and helpful hints, this handy, full-color guide can travel with you on your journeys for getting stunning photographs taken with point-and-shoot cameras. You'll learn how to capture proper exposure, create depth of field, use the appropriate flash settings, and much more.More than 100 techniques show you how to improve your compact camera skills and hundreds of lavish photos serve to motivate and inspire you. Aim your sights at taking stunning photos with this helpful guide by your side!Top industry expert, Canon Explorer of Light, and bestselling author Rick Sammon shares invaluable advice for taking amazing photos with a point-and-shoot cameraExplains how to capture proper exposure, create depth of field, use the appropriate flash settings, and more, all using your point-and-shoot cameraBoasts hundreds of beautiful photos with accompanying explanations as to the various techniques Sammon used to get a specific shotMotivates and inspires you to improve your compact camera skills to a whole new leveYou'll be grateful for the amazing advice Rick Sammon confesses in Confessions of a Compact Camera Shooter.
In this hilarious and highly practical book, author and professional speaker Scott Berkun reveals the techniques behind what great communicators do, and shows how anyone can learn to use them well. For managers and teachers -- and anyone else who talks and expects someone to listen -- Confessions of a Public Speaker provides an insider's perspective on how to effectively present ideas to anyone. It's a unique, entertaining, and instructional romp through the embarrassments and triumphs Scott has experienced over 15 years of speaking to crowds of all sizes. With lively lessons and surprising confessions, you'll get new insights into the art of persuasion -- as well as teaching, learning, and performance -- directly from a master of the trade. Highlights include: Berkun's hard-won and simple philosophy, culled from years of lectures, teaching courses, and hours of appearances on NPR, MSNBC, and CNBC Practical advice, including how to work a tough room, the science of not boring people, how to survive the attack of the butterflies, and what to do when things go wrong The inside scoop on who earns $30,000 for a one-hour lecture and why The worst -- and funniest -- disaster stories you've ever heard (plus countermoves you can use) Filled with humorous and illuminating stories of thrilling performances and real-life disasters, Confessions of a Public Speaker is inspirational, devastatingly honest, and a blast to read.
Be the most effective CIO you can be--by learning from the best in the businessToday's Chief Information Officers must be an entirely new breed of technology leader. With ever-changing demands from the business, and in an increasingly technology-centric business environment, CIOs must find game-changing innovations and process improvements that make a real impact on the bottom line. Business executives need their CIOs to be real partners--speaking the language of the business and donning their strategist caps--not just commodity managers. Those IT leaders who fail to break out of the order-taker, utility manager mold will, simply put, be looking for a new job.In Confessions of a Successful CIO: How the Best CIOs Tackle Their Toughest Business Challenges, current and future CIOs will gain invaluable perspectives from the stories of today's best IT leaders. These acclaimed leaders--each profiled in their own chapter--explain the toughest business decision they had to make, and how the outcome influenced and impacted their leadership style. These in-depth anecdotes take the reader inside some of the most challenging business climates imaginable and chronicle how these elite CIOs made the decisions that mattered.Read detailed case studies of how some of the best CIOs have handled their most challenging business problemsLearn how the best CIOs anticipate changes to their business and respond--before the business comes knockingExplore how these top-flight CIOs make critical decisions around strategy and IT to not only benefit their companies, but in some cases, to save them from becoming obsolete.Analyze their perspectives on managing people, crises and balancing the risks and rewards of their "bet the farm" strategiesConfessions of a Successful CIO is the new playbook for learning how to take risks, respond to crises, and create more value from IT. Each chapter presents a different challenge, giving present-day and future IT leaders the chance to examine, analyze and learn so that they can be just as successful as the CIOs they're reading about.
This is a step-by-step guide, full of hands-on examples of real-world deployment tasks. Each topic is explained and placed in context, while also pointing out the key details of the concepts used. This book is aimed at system administrators and system engineers who have an understanding of configuration management tools and infrastructure. For novice administrators, it contains easy-to-use application recipes to get started immediately.
Anyone interested in securing their networks with IPCop â " from those new to networking and firewalls, to networking and IT Professionals with previous experience of IPCop. No knowledge of Linux or IPCop is required.
SAP is the world leader in Enterprise Resource Planning (ERP) software; of the software?s modules, the FI (Finance) and CO (Controlling) are by far the most popular and are widely implemented. This book has no competition?it is the only book on the market on how to configure and implement SAP?s FI and CO modules to maximize functionality and features hands-on, step-by-step instructions and real-world examples that provide immediate and practical solutions. Updated for SAP?s ECC 6.0, the book covers FI enterprise structure, general ledger, substitutions and validations, automatic account assignments, accounts payable and receivable, asset accounting, accrual engine, closing entries, credit management, lockbox, CO enterprise structure, profitability analysis (CO-PA), and more.
The first and only book to offer detailed explanations of SAP ERP sales and distributionAs the only book to provide in-depth configuration of the Sales and Distribution (SD) module in the latest version of SAP ERP, this valuable resource presents you with step-by-step instruction, conceptual explanations, and plenty of examples. If you're an SD consultant or are in charge of managing an SAP implementation in your enterprise, you'll want this valuable resource at your sideSAP is one of the leading Enterprise Resource Planning (ERP) software products on the market, with over 40,000 implementationsCovers the latest version of SAP ERP-ECC 6.0Covers common through advanced configurations, so it's helpful no matter what your level of experience with SAPExplains the conceptual framework behind the configuration processIf your company uses the SD module, keep this indispensable guide on hand.
Configuring SonicWALL Firewal is the first book to deliver an indepth look at the SonicWALL firewall product line. It covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls. Also covered are advanced troubleshooting techniques and the SonicWALL Security Manager. This book offers novice users a complete opportunity to learn the SonicWALL firewall appliance. Advanced users will find it a rich technical resource.
The legal and technical rules governing flows of information are out of balance, argues Julie E. Cohen in this original analysis of information law and policy. Flows of cultural and technical information are overly restricted, while flows of personal information often are not restricted at all. The author investigates the institutional forces shaping the emerging information society and the contradictions between those forces and the ways that people use information and information technologies in their everyday lives. She then proposes legal principles to ensure that people have ample room for cultural and material participation as well as greater control over the boundary conditions that govern flows of information to, from, and about them.
'User-designer relations' concerns the sorts of working relationships that arise between developers and end users of IT products - the different ways designers of IT products seek to engage with users, and the ways users seek to influence product design. It is through the shifting patterns of these relations that IT products are realised. Although it has generally been accepted that achieving better user-designer relations will improve the quality of IT products, there has been little consensus on how this might be achieved. This book aims to deepen our understanding of the relationships between users and designers both as they emerge in the wild and as a consequence of our attempts to intervene. Through a series of case studies the book juxtaposes in-depth explorations of different perspectives and approaches to thinking about - and doing - user-designer relations, considering important implications for design and computer science more generally.
Web and Tech Comm guru Sarah Maddox takes you inside the Confluence wiki for an in-depth guide to developing and publishing technical documentation on a wiki. She looks at life on a wiki from the points of view of both technical writers and readers. Confluence, Tech Comm, Chocolate shows you how to make your wiki fly.While it focuses on Confluence, the concepts and strategies can be used with any wiki. The basic message is that technical documentation becomes true communication when you add the social and collaborative tools that a wiki provides.Inside the Book Introduction Developing Technical Documentation on a Wiki Life on a Wiki Giving Your Wiki Wings Glossary and Index
Congestion Control in Data Transmission Networks details the modeling and control of data traffic in communication networks. It shows how various networking phenomena can be represented in a consistent mathematical framework suitable for rigorous formal analysis. The monograph differentiates between fluid-flow continuous-time traffic models, discrete-time processes with constant sampling rates, and sampled-data systems with variable discretization periods. The authors address a number of difficult real-life problems, such as: optimal control of flows with disparate, time-varying delay; the existence of source and channel nonlinearities; the balancing of quality of service and fairness requirements; and the incorporation of variable rate allocation policies. Appropriate control mechanisms which can handle congestion and guarantee high throughput in various traffic scenarios (with different networking phenomena being considered) are proposed. Systematic design procedures using sound control-theoretic foundations are adopted. Since robustness issues are of major concern in providing efficient data-flow regulation in today's networks, sliding-mode control is selected as the principal technique to be applied in creating the control solutions. The controller derivation is given extensive analytical treatment and is supported with numerous realistic simulations. A comparison with existing solutions is also provided. The concepts applied are discussed in a number of illustrative examples, and supported by many figures, tables, and graphs walking the reader through the ideas and introducing their relevance in real networks. Academic researchers and graduate students working in computer networks and telecommunications and in control (especially time-delay systems and discrete-time optimal and sliding-mode control) will find this text a valuable assistance in ensuring smooth data-flow within communications networks.
Coding, once considered an arcane craft practiced by solitary techies, is now recognized by educators and theorists as a crucial skill, even a new literacy, for all children. Programming is often promoted in K-12 schools as a way to encourage "computational thinking" -- which has now become the umbrella term for understanding what computer science has to contribute to reasoning and communicating in an ever-increasingly digital world.In Connected Code, Yasmin Kafai and Quinn Burke argue that although computational thinking represents an excellent starting point, the broader conception of "computational participation" better captures the twenty-first-century reality. Computational participation moves beyond the individual to focus on wider social networks and a DIY culture of digital "making." Kafai and Burke describe contemporary examples of computational participation: students who code not for the sake of coding but to create games, stories, and animations to share; the emergence of youth programming communities; the practices and ethical challenges of remixing (rather than starting from scratch); and the move beyond stationary screens to programmable toys, tools, and textiles.
The title of this new book: "The Connected Home" reflects the move away from the idea that smart homes would alter the lives of those living in them by providing technologies to take over tasks that were previously the responsibility of the householder, such as managing entertainment, education - and even eating! Up until around 10 years ago this view was commonplace but time has shown that the technologies to support a smart home have not developed in such a way as to support this premise. Instead, what people do in their homes has moved the concept of a smart home into that of the 'connected home'. The rise of on-line games technologies, video connections via Skype, social networking, internet browsing etc are now an integral part of the home environment and have had a significant effect on the home. The contributors to this exciting new book consider and discuss the effects and ramifications of the connected home from a variety of viewpoints: an examination of the take-up of personal computers and the Internet in domestic situations; an analysis of the changing intersection of technology and human habits in the connected home; the impact of gaming, texting, e-book readers, tablets and other devices and their effect on the social conditions of a household; the relationship between digital messaging applications and real geography; and an overview of how sensing technologies for the smart home might evolve (lightweight medical technologies for example). The book culminates by addressing unfinished ambitions from the smart home agenda, the factors that have prevented their realisation, and addresses the need for extending research into the area.
Millions of children visit virtual worlds every day. In such virtual play spaces as Habbo Hotel, Toontown, and Whyville, kids chat with friends from school, meet new people, construct avatars, and earn and spend virtual currency. In "Connected Play," Yasmin Kafai and Deborah Fields investigate what happens when kids play in virtual worlds, how this matters for their offline lives, and what this means for the design of educational opportunities in digital worlds. Play is fundamentally important for kids development, but, Kafai and Fields argue, to understand play in virtual worlds, we need to connect concerns of development and culture with those of digital media and learning. Kafai and Fields do this through a detailed study of kids play in Whyville, a massive, informal virtual world with educational content for tween players. Combining ethnographic accounts with analysis of logfile data, they present rich portraits and overviews of how kids learn to play in a digital domain, developing certain technological competencies; how kids learn to play well -- responsibly, respectfully, and safely; and how kids learn to play creatively, creating content that becomes a part of the virtual world itself.
The global explosion of online activity is steadily transforming the relationship between government and the public. The first wave of change, "e-government," enlisted the Internet to improve management and the delivery of services. More recently, "e-democracy" has aimed to enhance democracy itself using digital information and communication technology. One notable example of e-democratic practice is the government-sponsored (or government-authorized) online forum for public input on policymaking. This book investigates these "online consultations" and their effect on democratic practice in the United States and Europe, examining the potential of Internet-enabled policy forums to enrich democratic citizenship. The book first situates the online consultation phenomenon in a conceptual framework that takes into account the contemporary media environment and the flow of political communication; then offers a multifaceted look at the experience of online consultation participants in the United States, the United Kingdom, and France; and finally explores the legal architecture of U. S. and E. U. online consultation. As the contributors make clear, online consultations are not simply dialogues between citizens and government but constitute networked communications involving citizens, government, technicians, civil society organizations, and the media. The topics examined are especially relevant today, in light of the Obama administration's innovations in online citizen involvement.
New technologies are radically changing the way that families connect with one another: we can text our teenagers from work, eat dinner with far-away parents via video link, and instantly upload and share photos after a family day out. Whether we are bridging time or distance, and whether we are enhancing our closest relationships or strengthening the bonds of extended family, as computer technologies alter the communication landscape, they in turn are changing the way we conduct and experience family life. This state of the art volume explores the impact of new communication systems on how families interact - how they share their lives and routines, engage in social touch, and negotiate being together or being apart - by considering a range of different family relationships that shape the nature of communication. Composed of three sections, the first looks at what is often the core of a 'family', the couple, to understand the impact of technology on couple relationships, communication, and feelings of closeness. The second section studies immediate families that have expanded beyond just the individual or couple to include children. Here, the emphasis is on connection for communication, coordination, and play. The third section moves beyond the immediate family to explore connections between extended, distributed family members. This includes connections between adult children and their parents, grandparents and grandchildren, and adult siblings. Here family members have grown older, moved away from 'home', and forged new families. Researchers, designers and developers of new communication technologies will find this volume invaluable. Connecting Families: The Impact of New Communication Technologies on Domestic Life brings together the most up-to-date studies to help in understanding how new communication technologies shape - and are shaped by - family life, and offers inspiration and guidance for design by making clear what families need and value from technological systems.
Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the "Using Bookshare" page in the Help Center.
Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.
- Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
- DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
- BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
- MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
- DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivona's Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.