Browse Results

Showing 55,351 through 55,375 of 60,786 results

Tactical Management in Complexity: Managerial and Informational Aspects (Contributions to Management Science)

by Renata Petrevska Nechkoska

This book draws on the author’s own experience as a practitioner, collaborations with professionals from small and medium-sized businesses with international scope in North Macedonia and Belgium, and academic research. Its goal is to bring together tactical management and information systems research in complex environments. By developing the “DENICA” managerial method it re-introduces tactics as an important managerial function and underestimated source of competitive advantage. The book also offers a roadmap for dynamic reconfiguration of the managerial systems in complex environment, while considering adaptability, sustainability and effectiveness in the process. Furthermore, the book introduces a methodological “kaleidoscope” which combines IS methodology with the managerial sciences, offering a model that can be adapted and replicated to specific contexts in order to achieve fitting solutions. Real-world case studies from North Macedonia and Belgium apply these methods and illustrate their practical implications.

Tactical Media (Electronic Mediations #28)

by Rita Raley

Tactical media describes interventionist media art practices that engage and critique the dominant political and economic order. Rather than taking to the streets and staging spectacular protests, the practitioners of tactical media engage in an aesthetic politics of disruption, intervention, and education. From They Rule, an interactive map of the myriad connections between the world&’s corporate and political elite created by Josh On and Futurefarmers, toBlack Shoals, a financial market visualization that is intended to be both aesthetically and politically disruptive, they embrace a broad range of oppositional practices.In Tactical Media, Rita Raley provides a critical exploration of the new media art activism that has emerged out of, and in direct response to, postindustrialism and neoliberal globalization. Through close readings of projects by the DoEAT group, the Critical Art Ensemble, Electronic Civil Disobedience, and other tactical media groups, she articulates their divergent methods and goals and locates a virtuosity that is also boldly political. Contemporary models of resistance and dissent, she finds, mimic the decentralized and virtual operations of global capital and the post-9/11 security state to exploit and undermine the system from within. Emphasizing the profound shift from strategy to tactics that informs new media art-activism, Raley assesses the efficacy of its symbolic performances, gamings, visualizations, and hacks. With its cogent analyses of new media art and their social impact, Tactical Media makes a timely and much needed contribution to wider debates about political activism, contemporary art, and digital technology.

Tactical SEO: The Theory and Practice of Search Marketing

by Lee Wilson

Search engine optimisation is an increasingly critical tool for digital marketers in a competitive and saturated online marketplace. Setting itself apart from the ubiquitous technical and process-driven guidance, where tips and tricks which are quick to date, Tactical SEO moves towards a deeper understanding of search marketing and the industry as a whole. These insights will help you to truly grasp the opportunities, challenges and value that SEO can bring to an online presence in the long term leading to a more strategic and nuanced approach.Tactical SEO explores:· what succeeds in search marketing but also why, including analysis of 'ripples' and other concepts that underpin best practice.· moving from process-driven to organic search marketing and the value of exploiting opportunity.· the Google ethos and the symbiotic nature of Google and SEO.· how a value-checklist can re-focus your strategy and generate positive results.Essential reading for practitioners and students, Tactical SEO provides thought leadership as well as strategic practical applications for those who want to develop real and lasting expertise.

A Tactical Survival Guide For Online Shooting Games

by Andrew Shepperson

This book has been written as a guide to help anyone struggling with online multiplayer First-Person Shooter (FPS) games or even if you just want to sharpen up your existing skills. By reading through the strategies, you should easily improve your game, and become a more formidable opponent. This book covers any potential problems you may encounter during FPS online play and incorporates generic techniques that you will be able to use in all FPS games regardless of their origin, timescale, control system or platform. The things that remain the same in all FPS are the basic tactics and techniques that are employed by some of the worlds best online gamers and some of the world's most formidable military powers. These are the superior tactics that you will be able to utilise in any FPS game you play and will keep you one step ahead of any player.

Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence

by Kevin Cardwell

Take a systematic approach at identifying intrusions that range from the most basic to the most sophisticated, using Wireshark, an open source protocol analyzer. This book will show you how to effectively manipulate and monitor different conversations and perform statistical analysis of these conversations to identify the IP and TCP information of interest. Next, you'll be walked through a review of the different methods malware uses, from inception through the spread across and compromise of a network of machines. The process from the initial “click” through intrusion, the characteristics of Command and Control (C2), and the different types of lateral movement will be detailed at the packet level. In the final part of the book, you'll explore the network capture file and identification of data for a potential forensics extraction, including inherent capabilities for the extraction of objects such as file data and other corresponding components in support of a forensics investigation. After completing this book, you will have a complete understanding of the process of carving files from raw PCAP data within the Wireshark tool.What You Will LearnUse Wireshark to identify intrusions into a networkExercise methods to uncover network data even when it is in encrypted formAnalyze malware Command and Control (C2) communications and identify IOCsExtract data in a forensically sound manner to support investigationsLeverage capture file statistics to reconstruct network events Who This Book Is ForNetwork analysts, Wireshark analysts, and digital forensic analysts.

Tactics of Interfacing: Encoding Affect in Art and Technology (Leonardo)

by Ksenia Fedorova

How digital technologies affect the way we conceive of the self and its relation to the world, considered through the lens of media art practices.In Tactics of Interfacing, Ksenia Fedorova explores how digital technologies affect the way we conceive of the self and its relation to the world. With the advent of ubiquitous computing, the self becomes an object of technological application, increasingly defined by data received from tracking technologies. Subtly, these technologies encourage versions of ourselves that are easier to interpret computationally. Fedorova views these shifts in self-perception through the lens of contemporary media art practices, examining a range of artistic tactics that enable embodied and intimate experiences of machinic operations on our lives.

Tactile Display for Virtual 3D Shape Rendering

by Alessandro Mansutti Mario Covarrubias Rodriguez Monica Bordegoni Umberto Cugini

This book describes a novel system for the simultaneous visual and tactile rendering of product shapes which allows designers to simultaneously touch and see new product shapes during the conceptual phase of product development. This system offers important advantages, including potential cost and time savings, compared with the standard product design process in which digital 3D models and physical prototypes are often repeatedly modified until an optimal design is achieved. The system consists of a tactile display that is able to represent, within a real environment, the shape of a product. Designers can explore the rendered surface by touching curves lying on the product shape, selecting those curves that can be considered style features and evaluating their aesthetic quality. In order to physically represent these selected curves, a flexible surface is modeled by means of servo-actuated modules controlling a physical deforming strip. The tactile display is designed so as to be portable, low cost, modular, and high performing in terms of the types of shape that it can represent.

The Tactile Internet

by Tara Ali-Yahiya Wrya Monnet

The Tactile Internet will change the landscape of communication by introducing a new paradigm that enables the remote delivery of haptic data.This book answers the many questions surrounding the Tactile Internet, including its reference architecture and adapted compression methods for conveying haptic information. It also describes the key enablers for deploying the applications of the Tactile Internet.As an antecedent technology, the IoT is tackled, explaining the differences and similarities between the Tactile Internet, the Internet of Things and the Internet of Everything. The essentials of teleoperation systems are summarized and the challenges that face this paradigm in its implementation and deployment are also discussed.Finally, a teleoperation case study demonstrating an application of the Tactile Internet is investigated to demonstrate its functionalities, architecture and performance.

Tactile Perception by Electrovibration (Springer Series on Touch and Haptic Systems)

by Yasemin Vardar

This book explains the mechanisms underpinning the tactile perception of electrovibration and lays the groundwork for delivering realistic haptic feedback on touchscreens via this method. Effective utilization of electrovibration can only be accomplished by simultaneously investigating both the physical and perceptual aspects of the finger-touchscreen interaction. Towards this goal, present work blends the available knowledge on electromechanical properties of the human finger and human tactile perception with the results of new psychophysical experiments and physical measurements. By following such an approach that combines both theoretical and experimental information, the study proposes new methods and insights on generating realistic haptic effects, such as textures and edges on these displays. Besides, state-of-the-art research on the field is reviewed, and future work is discussed. The presented interdisciplinary methods and insights can interest students, broad communities of haptics, neuroscience, engineering, physics, and cognitive sciences, as well as user-interaction experts and product designers from the industry.

Tactile Score

by Yasuhiro Suzuki Rieko Suzuki

This book deals with one of the most novel advances in natural computing, namely, in the field of tactile sense analysis. Massage, which provides relaxation and stimulation for human beings, is analyzed in this book for the first time by encoding the motions and tactile senses involved. The target audience is not limited to researchers who are interested in natural computing but also includes those working in ergonomic design, biomedical engineering, Kansei engineering, and cognitive science.

Tactile Sensing, Information, and Feedback via Wave Propagation (Springer Series on Touch and Haptic Systems)

by Yitian Shao

A longstanding goal of haptic engineering is to develop haptic interfaces that can provide realistic sensations of touch. A fundamental step towards this goal is to understand what mechanical tactile signals the hand feels during daily touch interactions. This book reveals the complex patterns of mechanical waves propagating throughout the hand that can be elicited even by simple touch interactions, which helps in expanding existing knowledge of tactile function beyond the region of near skin-object contact and inspires new designs for haptic sensing and feedback technologies. The first part of this book describes new methods for capturing dynamic, spatially distributed tactile signals in the whole hand during natural hand interactions. The second part characterizes these signals and evaluates how well and how efficiently they encode the information of touch, relating to the transmission of mechanical waves in hand tissues. The final part demonstrates how these findings can be utilized to create novel haptic effects and tactile displays. Tactile Sensing, Information, and Feedback via Wave Propagation provides a unique view of tactile sensing and feedback and will appeal to researchers, engineers, and students who are interested in learning cutting-edge haptic science and technology.

Tag Counting and Monitoring in Large-Scale RFID Systems: Theoretical Foundations and Algorithm Design

by Jihong Yu Lin Chen

This book provides a comprehensive treatment of the theoretical foundation and algorithmic tools necessary in the design of efficient tag counting and monitoring algorithms in emerging RFID systems. The book delivers an in-depth analysis on the following problems ranging from theoretical modeling and analysis, to practical algorithm design and optimization: Stability analysis of the frame slotted Aloha protocol, the de facto standard in RFID tag counting and identification; Tag population estimation in dynamic RFID systems; Missing tag event detection in the presence of unexpected tags; Missing tag event detection in multi-group multi-region RFID systems. The target readers are researchers and advanced-level engineering students interested in acquiring in-depth knowledge on the topic and on RFID systems and their applications.

Tailored Gamification to Educational Technologies

by Wilk Oliveira Ig Ibert Bittencourt

This book introduces and explores the field of tailored gamified educational technologies. Providing a theoretical overview of the domain, including a number of related psychological and educational theories along with a complete state-of-the-art analysis on this topic, it presents an approach and architecture to tailor these systems to students’ gamer type and age.

Take Back Your Life!: Using Microsoft® Office Outlook® 2007 to Get Organized and Stay Organized

by Sally Mcghee

Take control of the unrelenting e-mail, conflicting commitments, and endless interruptions--and take back your life! In this popular book updated for Microsoft Office Outlook 2007, productivity experts Sally McGhee and John Wittry show you how to reclaim what you thought you'd lost forever--your work-life balance. Now you can benefit from McGhee Productivity Solutions' highly-regarded corporate education programs, learning simple but powerful techniques for rebalancing your personal and professional commitments using Outlook 2007. Empower yourself to: Clear away distractions, tie up loose ends, and focus on what's really important to you. Take charge of your productivity using techniques designed by McGhee Productivity Solutions and implemented by numerous Fortune 500 companies. Balance your home and work priorities by exploiting the enhanced productivity, organizational, and search capabilities in Outlook 2007. Go beyond just coping and surviving to taking charge of your time--and transform your life today! PLUS--Get a quick reference poster to McGhee Productivity Solutions' proven methodology for managing workflow.

Take Back Your Life!: Using Microsoft® Outlook® to Get Organized and Stay Organized

by Sally Mcghee

Unrelenting e-mail. Conflicting commitments. Endless interruptions. In Take Back Your Life!, productivity expert Sally McGhee shows you how to take control and reclaim something you thought you'd lost forever--your work-life balance. Now you can benefit from Sally's popular and highly regarded corporate education programs, learning simple but powerful techniques for rebalancing your personal and professional commitments using the productivity features in Microsoft Outlook. Learn the proven methods that will empower you to: Clear away distractions and loose ends and focus on what's really important to you and your business. Take charge of your productivity using techniques and processes designed by McGhee Productivity Solutions and implemented in numerous Fortune 500 companies. Customize and exploit the productivity features in Microsoft Outlook to help you create balance at home and on the job. When you change your approach, you can change your results. So learn what thousands of Sally's clients worldwide have discovered about taking control of their everyday productivity--and start transforming your own life today! Covers Microsoft Office Outlook 2003, Outlook Version 2002, and Outlook 2000

Take Control: The Mac OS X Lexicon

by Andy Baird Sharon Zardetto

This ebook explains a little bit of everything; in fact, it's The Mac OS X (and then some) Lexicon because it's never just you and your Mac. It's you and your Mac and the Web, and your email, and that article you just read that threw 17 new acronyms at you or assumed that you knew all sorts of networking terms. Or it's you and your Mac and Finder features you've never touched, such as burn folders, smart folders, or proxy icons, and that mysterious Services submenu. This book is a great guide for Macintosh users everywhere who have trouble keeping up with the latest jargon, for new and intermediate level Mac users, and for anyone who enjoys smart and witty technical writing. Questions answered in this book include: What's the 501 folder for? What's the deal with all the different CD and DVD disk formats? Where can I find my Mac's MAC address? What does "snapback" mean, and how can I find and use it? How do I type the different kinds of dashes? What's the difference between composite and component video cables? What are cookies and breadcrumbs on a computer? Why does a TextEdit file with images becomes a folder on a Windows machine?

Take Control of 1Password

by Joe Kissell

Easily create and enter secure passwords on all your devices!Wrangling your web passwords can be easy and secure, thanks to 1Password, the popular password manager from AgileBits. In this book, Joe Kissell brings years of real-world 1Password experience into play to explain not only how to create, edit, and enter web login data easily, but also how to autofill contact and credit card info when shopping online, audit your passwords and generate better ones, handle two-factor authentication (2FA), and sync and share passwords in various ways--including a hosted 1Password account (individual, family, or team), iCloud or Dropbox.The book focuses on 1Password 7 for Mac and Windows, but it also provides details and directions for the iOS and Android versions of 1Password. It briefly covers 1Password X, a chrome extension that brings 1Password to Chrome OS and Linux.Topics include:Meet 1Password: Set your master password, explore the various 1Password components, and decide on your ideal usage strategy.Master logins: In 1Password, a typical login contains a set of credentials used to sign in to a website. Find out how to create logins, sort them, search them, tag them, and more. You'll also find help with editing logins--for example, changing a password or adding further details.Understand password security: Get guidance on what makes for a good password, and read Joe's important Password Dos and Don'ts. A special topic covers how to perform a security audit in order to improve poor passwords quickly.Go beyond web logins: A primary point of 1Password is to speed up web logins, but 1Password can also store and autofill contact information (for more than one identity, even), along with credit card information. You'll also find advice on storing passwords for password-protected files and encrypted disk images, plus ideas for keeping track of confidential files, software licenses, scans of important cards or documents, and more.Sync your passwords: Discover which 1Password syncing solution is right for you: a hosted 1Password account, Dropbox, iCloud, a manually synced folder, or even device-to-device Wi-Fi sync.Share your passwords: Learn to store passwords in shared vaults within a family or team hosted account.You'll also discover the answers to key questions, including:What are my options for licensing 1Password?What are the differences between vaults in 1Password accounts and standalone vaults?Should I keep using my web browser's autofill feature?What about iCloud Keychain? Should I use that too?What can I do quickly to get better password security?How can I find and update weak passwords I created long ago?What should I do about security questions, like the name of my pet?How can 1Password provide a time-based one-time password (TOTP)? How do I use 1Password logins from utilities like LaunchBar?

Take Control of 1Password

by Joe Kissell

Annoyed by having to type hard-to-remember passwords? Let 1Password do the heavy lifting. With directions for 1Password 7 for the Mac, iOS, Windows, Android, Chrome OS, and Linux, author Joe Kissell shows you how to generate and enter secure passwords, speed up your online shopping, and share and sync web logins and other confidential data.

Take Control of 1Password

by Joe Kissell

Annoyed by having to type hard-to-remember passwords? Let 1Password do the heavy lifting. With coverage of 1Password for Mac, Windows, Linux, iOS/iPadOS, and Android, author Joe Kissell shows you how to generate and enter secure passwords, speed up your online shopping, and share and sync web logins and other confidential data.

Take Control of 1Password

by Joe Kissell

Annoyed by having to type hard-to-remember passwords? Let 1Password do the heavy lifting. With coverage of 1Password for Mac, Windows, Linux, iOS/iPadOS, and Android, author Joe Kissell shows you how to generate and enter secure passwords, speed up your online shopping, and share and sync web logins and other confidential data.

Take Control of 1Password

by Joe Kissell

Speed through Web logins with 1Password 4!Remembering and entering Web passwords is both difficult and insecure, but it doesn't have to be that way, thanks to 1Password, the popular password manager from AgileBits. In this ebook, Joe Kissell brings years of real-world 1Password experience into play--plus many hours with the 1Password 4 for Mac beta--to explain not only how to create, edit, and enter Web login data easily, but also how to autofill contact and credit card information when shopping online, audit your passwords and generate better ones, and share your passwords with key people and among multiple devices. Joe focuses on 1Password 4 for the Mac, but he also provides details and directions for the iOS, Windows, and Android versions of 1Password.You'll find expert advice on these topics:Meet 1Password: Set your master passcode and make first-run configuration decisions. Explore usage strategies for 1Password on your Mac, PC, iOS device, or Android handheld, and understand the different components of the software on the different platforms. Get lots of ideas for how to share your vault (or vaults!) among your devices and with other people.Master logins: In 1Password, a typical login contains a set of credentials used to sign in to a Web site. Find out how to create logins, sort them, search them, tag them, delete them, and more. You'll especially find help with editing logins. For example, if you change a password from dragon7 to eatsevendragonsforlunchatyahoo, you'll want to incorporate that into its login. Or, use 1Password's password generator to come up with complex passwords, like dGx7Crve3WucELF#s.Understand password security: Get guidance on what makes for a good password, and read Joe's important Password Dos and Don'ts. An advanced topic later in the ebook covers how to perform a security audit in order to improve poor passwords quickly. (For Joe's full advice on passwords, read Take Control of Your Passwords.)Go beyond Web logins: For a lot of people, a primary point of 1Password is to speed the process of signing in to Web sites. But 1Password can do much more. Learn about storing and autofilling contact information (for more than one identity, even), and your credit card number and security code. You'll also find advice on storing passwords for password-protected files and encrypted disk images, plus ideas for keeping track of confidential files, private diary entries, scans of important cards or documents, and more.You'll also discover the answers to key questions, including: What are the main changes between 1Password 3 and 1Password 4?In addition to 1Password, should I use my Web browser's password, contact, or credit card autofill feature? What about Apple's iCloud Keychain?What is the fastest way to get 1Password to sign me in to a Web site?My login item used to sign me in, but it stopped working. What should I do?I made a long, random password for my bank account, but it wasn't saved in the login item! Where can I find it?How can I use one username and password with multiple Web sites, like one Apple ID for both iCloud and the online Apple Store?What if I need to access my 1Password data from another person's computer?How can I speed up Web logins and filling in shopping cart info with 1Password in iOS or Android?Is it true that I can initiate 1Password login items from keyboard launcher utilities like LaunchBar, Alfred, and Quicksilver? (Hint: the answer is yes!)

Take Control of 1Password (3.0)

by Joe Kissell

Easily create and enter secure passwords on all your devices! Wrangling your web passwords can be easy and secure, thanks to 1Password, the popular password manager from AgileBits. In this book, Joe Kissell brings years of real-world 1Password experience into play to explain not only how to create, edit, and enter web login data easily, but also how to autofill contact and credit card info when shopping online, audit your passwords and generate better ones, handle two-factor authentication (2FA), and sync and share passwords in various ways--including a hosted 1Password account (individual, family, or team), iCloud or Dropbox.While reading Take Control of 1Password on my iPad I was furiously highlighting passages and following along with 1Password open on my Mac. [The book] showed me how some of my passwords were weak or duplicates. I immediately changed those passwords to unique and secure ones.--Elisa Pacelli, in her MyMac book review (2nd Edition).The book focuses on 1Password 6 for the Mac, but it also provides details and directions for the iOS, Windows, and Android versions of 1Password. It briefly covers 1Password X, a chrome extension that brings 1Password to Chrome OS and Linux. Topics include: Meet 1Password: Set your master password, explore the various 1Password components, and decide on your ideal usage strategy. Master logins: In 1Password, a typical login contains a set of credentials used to sign in to a website. Find out how to create logins, sort them, search them, tag them, and more. You'll also find help with editing logins--for example, changing a password or adding further details. Understand password security: Get guidance on what makes for a good password, and read Joe's important Password Dos and Don'ts. A special topic covers how to perform a security audit in order to improve poor passwords quickly. Go beyond web logins: A primary point of 1Password is to speed up web logins, but 1Password can also store and autofill contact information (for more than one identity, even), along with credit card information. You'll also find advice on storing passwords for password-protected files and encrypted disk images, plus ideas for keeping track of confidential files, software licenses, scans of important cards or documents, and more.Sync your passwords: Discover which 1Password syncing solution is right for you: a hosted 1Password account, Dropbox, iCloud, a manually synced folder, or even device-to-device Wi-Fi sync.Share your passwords: Learn to store passwords in shared vaults within a family or team hosted account.You'll also discover the answers to key questions, including: What are my options for licensing 1Password? What are the differences between vaults in 1Password accounts and standalone vaults? Should I keep using my web browser's autofill feature? What about iCloud Keychain? Should I use that too? What can I do quickly to get better password security? How can I find and update weak passwords I created long ago?What should I do about security questions, like the name of my pet? How can 1Password provide a time-based one-time password (TOTP)? How do I use 1Password logins from utilities like LaunchBar?

Take Control of 1Password, Second Edition

by Joe Kissell

Easily create and enter secure passwords on all your devices!Remembering and entering Web passwords can be easy and secure, thanks to 1Password, the popular password manager from AgileBits. In this book, Joe Kissell brings years of real-world 1Password experience into play to explain not only how to create, edit, and enter Web login data easily, but also how to autofill contact and credit card info when shopping online, audit your passwords and generate better ones, and sync and share your passwords using a variety of techniques--including 1Password for Teams. Joe focuses on 1Password 6 for the Mac, but he also provides details and directions for the iOS, Windows, and Android versions of 1Password.Meet 1Password: Set your master passcode, explore the various 1Password components, and decide on your ideal usage strategy."While reading Take Control of 1Password on my iPad I was furiously highlighting passages and following along with 1Password open on my Mac. [The book] showed me how some of my passwords were weak or duplicates. I immediately changed those passwords to unique and secure ones. "--Elisa Pacelli, in her MyMac book review.Master logins: In 1Password, a typical login contains a set of credentials used to sign in to a Web site. Find out how to create logins, sort them, search them, tag them, and more. You'll especially find help with editing logins. For example, if you change a site's password from dragon7 to eatsevendragonsforlunchatyahoo, you'll want to incorporate that into its login. Or, use 1Password's password generator to create highly secure random passwords, like dGx7Crve3WucELF#s.Understand password security: Get guidance on what makes for a good password, and read Joe's important Password Dos and Don'ts. A special topic covers how to perform a security audit in order to improve poor passwords quickly.Go beyond Web logins: A primary point of 1Password is to speed up Web logins, but 1Password can also store and autofill contact information (for more than one identity, even), along with credit card information. You'll also find advice on storing passwords for password-protected files and encrypted disk images, plus ideas for keeping track of confidential files, scans of important cards or documents, and more.Sync your passwords: Discover which 1Password syncing solution is right for you: Dropbox, iCloud, or a Finder folder, as well as a device-to-device Wi-Fi sync.Share your passwords: Learn how 1Password integrates with the 1Password for Teams online service for sharing passwords within groups, such as your family or company work group.You'll also discover the answers to key questions, including:Should I use my Web browser's autofill feature?What about iCloud Keychain? Should I use that too?What can I do quickly to get better password security?Should I buy 1Password from AgileBits or the Mac App Store?How can I find and update weak passwords I created long ago?What's the best way to work with the password generator?What should I do about security questions, like the name of my pet?How can 1Password provide a time-based one-time password (TOTP)? How can I access my 1Password data on another person's computer?How do I initiate 1Password logins from utilities like LaunchBar?

Take Control of Apple Home Automation

by Josh Centers

Thanks to Apple's HomeKit platform, you can easily configure smart home devices (such as light bulbs, outlets, thermostats, sensors, cameras, and door locks) from a variety of manufacturers to behave exactly as you need them to; integrate them with a hub such as a HomePod, Apple TV, or iPad; and control them with an iOS device, a Mac, an Apple Watch, Siri commands, or automated programming. This book gives you all the information you need to get started.

Take Control of Apple Home Automation

by Josh Centers

Thanks to Apple's HomeKit platform, you can easily configure smart home devices (such as light bulbs, outlets, thermostats, sensors, cameras, and door locks) from a variety of manufacturers to behave exactly as you need them to; integrate them with a hub such as a HomePod, Apple TV, or iPad; and control them with an iOS/iPadOS device, a Mac, an Apple Watch, Siri commands, or automated programming. This book gives you all the information you need to get started.

Refine Search

Showing 55,351 through 55,375 of 60,786 results