![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Personal computers > General
A fully updated version of Pearson's bestselling Brilliant Windows titles, covering Windows 10 - the latest release of the widely-used Microsoft operating system. Brilliant Windows 10 gives you the information you need easily and without fuss. It guides you through all tasks and applications using a highly visual, full-colour, step-by-step approach and tells you exactly what you need to know, when you need to know it. For the first time, this book comes with FREE downloadable bonus material. An extra 140 pages, which cover chapters on advanced subjects like customising Windows, maintaining your computer and managing your hardware as well as the key, new features of Office 2016. Spend less time reading and more time doing with a simple step-by-step approach to beginner and intermediate level tasks. Brilliant guides provide the quick, easy-to-access information that you need: Numbered steps guide you through each task or problem Numerous colour screenshots illustrate each step Cross reference boxes point you to related tasks and information in the book "Did you know ?..." sections alert you to relevant expert tips, tricks and advice
This book constitutes the refereed proceedings of the 1st IFIP Entertainment Computing Symposium held in Milan, Italy on September 7-10, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
This book constitutes the refereed post-proceedings of the 4th IFIP WG 9.7 Conference on the History of Nordic Computing, HiNC 4, held in Copenhagen, Denmark, in August 2014. The 37 revised full papers were carefully reviewed and selected for inclusion in this volume. The papers focus on innovative ICT milestones that transformed the nordic societies and on the new ideas, systems and solutions that helped creating the welfare societies of today, in particular solutions and systems for public services, e.g., tax, social benefits, health care and education; solutions and systems for the infrastructure of the society, e.g., banking, insurance, telephones, transport and energy supply; and technologies and IT policies behind the major IT milestones, e.g., user centric innovation, programming techniques and IT ethics. They are organized in topical sections on IT policy, infrastructure, public services, private services, telesystems, health care, IT in banking, transport and IT technology.
Time series with mixed spectra are characterized by hidden periodic components buried in random noise. Despite strong interest in the statistical and signal processing communities, no book offers a comprehensive and up-to-date treatment of the subject. Filling this void, Time Series with Mixed Spectra focuses on the methods and theory for the statistical analysis of time series with mixed spectra. It presents detailed theoretical and empirical analyses of important methods and algorithms. Using both simulated and real-world data to illustrate the analyses, the book discusses periodogram analysis, autoregression, maximum likelihood, and covariance analysis. It considers real- and complex-valued time series, with and without the Gaussian assumption. The author also includes the most recent results on the Laplace and quantile periodograms as extensions of the traditional periodogram. Complete in breadth and depth, this book explains how to perform the spectral analysis of time series data to detect and estimate the hidden periodicities represented by the sinusoidal functions. The book not only extends results from the existing literature but also contains original material, including the asymptotic theory for closely spaced frequencies and the proof of asymptotic normality of the nonlinear least-absolute-deviations frequency estimator.
How did the Commodore 64 conquer the hearts of millions and become a platform people still actively develop for even today? What made it so special? This book will appeal to both those who like tinkering with old technology as a hobby and nostalgic readers who simply want to enjoy a trip down memory lane. It discusses in a concise but rigorous format the different areas of home gaming and personal computing where the C64 managed to innovate and push forward existing boundaries. Starting from Jack Tramiel's vision of designing computers "for the masses, not the classes," the book introduces the 6510, VIC-II and SID chips that made the C64 unique. It briefly discusses its Basic programming language and then proceeds to illustrate not only many of the games that are still so fondly remembered but also the first generation of game engines that made game development more approachable among other topics that are often neglected but are necessary to provide a comprehensive overview of how far reaching theC64 influence was. Written in a straightforward and accessible style, readers will relive the dawn of modern technology and gain a better understanding of the legacy that was built, bit by bit, in those pioneering days by computers that had only a tiny fraction of the power modern machines have and, yet, were used to create the technological world we are now living in. With a foreword by Michael Tomczyk
This fascinating cultural history of the personal computer explains how user-friendly design allows tech companies to build systems that we cannot understand. Modern personal computers are easy to use, and their welcoming, user-friendly interfaces encourage us to see them as designed for our individual benefit. Rarely, however, do these interfaces invite us to consider how our individual uses support the broader political and economic strategies of their designers. In Transparent Designs, Michael L. Black revisits early debates from hobbyist newsletters, computing magazines, user manuals, and advertisements about how personal computers could be seen as usable and useful by the average person. Black examines how early personal computers from the Tandy TRS-80 and Commodore PET to the IBM PC and Apple Macintosh were marketed to an American public that was high on the bold promises of the computing revolution but also skeptical about their ability to participate in it. Through this careful archival study, he shows how many of the foundational principles of usability theory were shaped through disagreements over the languages and business strategies developed in response to this skepticism. In short, this book asks us to consider the consequences of a computational culture that is based on the assumption that the average person does not need to know anything about the internal operations of the computers we've come to depend on for everything. Expanding our definition of usability, Transparent Designs examines how popular and technical rhetoric shapes user expectations about what counts as usable and useful as much as or even more so than hardware and software interfaces. Offering a fresh look at the first decade of personal computing, Black highlights how the concept of usability has been leveraged historically to smooth over conflicts between the rhetoric of computing and its material experience. Readers interested in vintage computing, the history of technology, digital rhetoric, or American culture will be fascinated in this book.
"Bootstrapping" analyzes the genesis of personal computing from
both technological and social perspectives, through a close study
of the pathbreaking work of one researcher, Douglas Engelbart. In
his lab at the Stanford Research Institute in the 1960s, Engelbart,
along with a small team of researchers, developed some of the
cornerstones of personal computing as we know it, including the
mouse, the windowed user interface, and hypertext. Today, all these
technologies are well known, even taken for granted, but the
assumptions and motivations behind their invention are not.
"Bootstrapping" establishes Douglas Engelbart's contribution
through a detailed history of both the material and the symbolic
constitution of his system's human-computer interface in the
context of the computer research community in the United States in
the 1960s and 1970s.
From fundamental concepts and theories to implementation protocols and cutting-edge applications, the Handbook of Mobile Systems Applications and Services supplies a complete examination of the evolution of mobile services technologies. It examines service-oriented architecture (SOA) and explains why SOA and service oriented computing (SOC) will play key roles in the development of future mobile services. Investigating current service discovery frameworks, the book covers the basics of mobile services and applications developed in various contexts. The first section provides readers with the required background in mobile services architecture. Next, it details of middleware support for mobile services. The final section discusses security and applications of mobile services. Containing the contributions of leading researchers and academics from around the world, the book: Introduces a new location-based access control model Unveils a simple, yet powerful enhancement that enables Web services to locally manage workflow dependencies and handle messages resulting from multiple workflows Examines an event-based location aware query model that continuously aggregates data in specific areas around mobile sensors of interest Addresses the problem of location-based access control in the context of privacy protection Presents a layered architecture of context-aware middleware Considers the development of assistive technology solutions for the blind or visually impaired Discussing architecture for supporting multi-mode terminals in integrated heterogeneous wireless networks, this book addresses the network availability constraint to serve all mobile services originating from a single-user terminal. It examines QoS protocols and their enhancements in supporting user mobility. Analyzing mobile services security vulnerabilities, it details security design best practices that mobile service developers can use to improve the security of their mobile systems.
Use your laptop or tablet with confidence This practical book will have you achieving immediate results using: a friendly, visual approach simple language practical, task-based examples large, full-colour screenshots. Discover everything you want to know about choosing and using your laptop or tablet in this easy-to-use guide; from the most essential tasks that you'll want to perform, to solving the most common problems you'll encounter. Practical. Simple. Fast. Get the most out of your laptop or tablet with practical tips on every page: * ALERT: Solutions to common problems * HOT TIP: Time-saving shortcuts * SEE ALSO: Related tasks and information * DID YOU KNOW? Additional features to explore * WHAT DOES THIS MEAN? Jargon explained in plain English
Everything you need to know to choose and use your laptop. Brilliant Laptops guides you through the essential tasks step-by-step, showing you how to:
The world of smart shoes, appliances, and phones is already here,
but the practice of user experience (UX) design for ubiquitous
computing is still relatively new. Design companies like IDEO and
frogdesign are regularly asked to design products that unify
software interaction, device design and service design -- which are
all the key components of ubiquitous computing UX -- and practicing
designers need a way to tackle practical challenges of design.
Theory is not enough for them -- luckily the industry is now mature
enough to have tried and tested best practices and case studies
from the field.
Expand Raspberry Pi capabilities with fundamental engineering principles Exploring Raspberry Pi is the innovators guide to bringing Raspberry Pi to life. This book favors engineering principles over a 'recipe' approach to give you the skills you need to design and build your own projects. You'll understand the fundamental principles in a way that transfers to any type of electronics, electronic modules, or external peripherals, using a "learning by doing" approach that caters to both beginners and experts. The book begins with basic Linux and programming skills, and helps you stock your inventory with common parts and supplies. Next, you'll learn how to make parts work together to achieve the goals of your project, no matter what type of components you use. The companion website provides a full repository that structures all of the code and scripts, along with links to video tutorials and supplementary content that takes you deeper into your project. The Raspberry Pi's most famous feature is its adaptability. It can be used for thousands of electronic applications, and using the Linux OS expands the functionality even more. This book helps you get the most from your Raspberry Pi, but it also gives you the fundamental engineering skills you need to incorporate any electronics into any project. * Develop the Linux and programming skills you need to build basic applications * Build your inventory of parts so you can always "make it work" * Understand interfacing, controlling, and communicating with almost any component * Explore advanced applications with video, audio, real-world interactions, and more Be free to adapt and create with Exploring Raspberry Pi.
Aimed at people over the age of 50 and written by an expert in the field, Joli Ballew, this book covers the topic of laptop computers.
1 Die wirtschaftliche Bedeutung der Schutzmassnahmen fur EDV-Anlagen.- 2 Voraussetzungen und Anforderungen an die sicherheits-gerechte Konzipierung eines Hochsicherheitsbereichs.- 3 Unterschiedliche Gefahrdungen fur Rechenzentren.- 3.1 Einbruch/Diebstahl, Sabotage und Vandalismus.- 3.2 Brand, Verrauchung.- 3.3 Fehlfunktionen in der Klimatisierung.- 3.4 Wassereinbruch.- 3.5 Elektrische Versorgung.- 3.5.1 Aufrechterhaltung der Stromversorgung.- 3.5.2 UEberspannungen und Blitzschlag.- 3.6 Datenverlust.- 3.7 Sonstige Gefahren.- 4 Moegliche Analysemethoden.- 5 Schema der konkreten Risiko- und Schutzniveauermittlung.- 5.1 Massnahmen gegen Einbruch, Diebstahl, Sabotage und Vandalismus.- 5.2 Massnahmen gegen Feuer und Verrauchung.- 5.3 Massnahmen gegen Fehlfunktionen der Klimatisierung.- 5.4 Massnahmen gegen Beschadigungen durch Wasser bzw. fehlerhafte Versorgung.- 5.5 Massnahmen zur Aufrechterhaltung der gleichbleibenden Stromversorgung.- 5.6 Massnahmen gegen Datenverlust.- 5.7 Sonstige sicherheitsrelevante Kriterien.- 5.8 Zusammenfassende Benotung der analysierten Risiken.- 6 Sicherheitsmanagement: Organisation und Realisierung der sicherheitstechnischen Massnahmen.- 7 Sicherheitsgerechter EDV-Betrieb.- 8 Organisatorische Schritte zur permanenten Beibehaltung des Niveaus des ursprunglich entworfenen Sicherheitskonzepts.- 8.1 Menschliche Aspekte.- 8.2 Technische Massnahmen.- 9 Katastrophenvorsorge.- 9.1 Katastrophenplan.- 9.2 Backup-Konzepte.- 9.3 Versicherungskonzepte fur Hochsicherheitsbereiche.- 10 Schlussworte und Aussicht.
Over the last decade, there has been a growing interest in human behavior analysis, motivated by societal needs such as security, natural interfaces, affective computing, and assisted living. However, the accurate and non-invasive detection and recognition of human behavior remain major challenges and the focus of many research efforts. Traditionally, in order to identify human behavior, it is first necessary to continuously collect the readings of physical sensing devices (e.g., camera, GPS, and RFID), which can be worn on human bodies, attached to objects, or deployed in the environment. Afterwards, using recognition algorithms or classification models, the behavior types can be identified so as to facilitate advanced applications. Although such traditional approaches deliver satisfactory performance and are still widely used, most of them are intrusive and require specific sensing devices, raising issues such as privacy and deployment costs. In this book, we will present our latest findings on non-invasive sensing and understanding of human behavior. Specifically, this book differs from existing literature in the following senses. Firstly, we focus on approaches that are based on non-invasive sensing technologies, including both sensor-based and device-free variants. Secondly, while most existing studies examine individual behaviors, we will systematically elaborate on how to understand human behaviors of various granularities, including not only individual-level but also group-level and community-level behaviors. Lastly, we will discuss the most important scientific problems and open issues involved in human behavior analysis.
Microcomputers are an increasingly important tool in all aspects of development as the need to handle and assimilate vast quantities of information becomes ever more critical for both the international development community and the developing countries. In addition, the microcomputer represents the first significant technological advance that a developing country can assimilate and exploit with a relatively low capital investment and without prior knowledge or involvement in other technologies. Unfortunately this new technology represents not only an opportunity if properly exploited but a threat if ignored. The widespread and increasing incorporation of microcomputers into all aspects of the developed countries represents a major technological advance and an inevitable social change. If a developing country fails to take advantage of the opportunity that microcomputer technology represents, its level of development in relation to developed countries will be significantly lowered. Organized by the Board on Science and Technology for International Development in response to a request from the U.S. Agency for International Development, this book is an overview of microcomputer applications in developing countries and the issues associated with their use and abuse. The first section of the book is an assessment of the need for microcomputers in development. Written primarily for those in the development field and other computer-literate individuals, the second part is divided into applications in agriculture, health, energy, and municipal management. Policy concerns are addressed in the final section. It discusses the technology transfer that takes place as countries try to establish national computer policies that meet local needs while encouraging creative and useful applications.
This new edition has been updated with information relevant to the newest Basic Stamp, the BS2P, and revised to present more advanced projects. The result is a superb hands-on teaching text with dozens of completely new projects in addition to enhanced projects that take advantage of its latest features. (Computer Books - Languages/Programming)
If you've dreamed about having a customized multimedia PC or one tricked out for your favorite games, build your own and make your dreams come true! Build Your Own PC Do-It-Yourself For Dummies makes it easy. Not only is building your own PC a really rewarding project, it can also save you a nice chunk of cash. This step-by-step guide helps you decide what you need, teaches you what all those computer terms mean, and tells you exactly how to put the pieces together. It shows you: What tools you need (not as many as you might think!) All about operating systems How to install CD and DVD drives The scoop on sound and video, and how to put a sound system together from start to finish How to connect a monitor and install a modem All about setting up and configuring the hard drive Secrets for securing your system, and more Included is a bonus DVD showing you how to install the motherboard, CPU, RAM, ports, hard drive, video and sound cards, a DVD drive, and more. With Build Your Own PC Do-It-Yourself For Dummies, you can have the computer you want plus the satisfaction of doing it yourself! Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Why purchase expensive add-on cards or bus interfaces when you can develop effective and economical data acquisition and process controls using C programs? Using the under-employed printer adapter (that is, the parallel port of your PC), you can turn your computer into a powerful tool for developing microprocessor applications. Learn how to build a complete data acquisition system and such varied applications as a CCD camera controller, a photometer interface, and a wave form generator. The book also covers the enhanced parallel port (EPP), the extended capabilities port (ECP), interfacing analog-to-digital converters, and data acquisition under Linux. This extraordinary software approach to interfacing through the parallel port will be especially appealing to programmers involved in control systems design and device development, as well as to those who work with real-time and embedded systems. ;
Providing a comprehensive introduction into an overview of the field of pervasive healthcare applications, this volume incorporates a variety of timely topics ranging from medical sensors and hardware infrastructures, to software platforms and applications and addresses issues of user experience and technology acceptance. The recent developments in the area of information and communication technologies have laid the groundwork for new patient-centred healthcare solutions. While the majority of computer-supported healthcare tools designed in the last decades focused mainly on supporting care-givers and medical personnel, this trend changed with the introduction of pervasive healthcare technologies, which provide supportive and adaptive services for a broad variety and diverse set of end users. With contributions from key researchers the book integrates the various aspects of pervasive healthcare systems including application design, hardware development, system implementation, hardware and software infrastructures as well as end-user aspects providing an excellent overview of this important and evolving field.
"Covers all areas of computer-based data acquisition--from basic concepts to the most recent technical developments--without the burden of long theoretical derivations and proofs. Offers practical, solution-oriented design examples and real-life case studies in each chapter and furnishes valuable selection guides for specific types of hardware."
This second edition of Compact Numerical Methods for Computers presents reliable yet compact algorithms for computational problems. As in the previous edition, the author considers specific mathematical problems of wide applicability, develops approaches to a solution and the consequent algorithm, and provides the program steps. He emphasizes useful applicable methods from various scientific research fields, ranging from mathematical physics to commodity production modeling. While the ubiquitous personal computer is the particular focus, the methods have been implemented on computers as small as a programmable pocket calculator and as large as a highly parallel supercomputer. New to the Second Edition Presents program steps as Turbo Pascal code Includes more algorithmic examples Contains an extended bibliography The accompanying software (available by coupon at no charge) includes not only the algorithm source codes, but also driver programs, example data, and several utility codes to help in the software engineering of end-user programs. The codes are designed for rapid implementation and reliable use in a wide variety of computing environments. Scientists, statisticians, engineers, and economists who prepare/modify programs for use in their work will find this resource invaluable. Moreover, since little previous training in numerical analysis is required, the book can also be used as a supplementary text for courses on numerical methods and mathematical software.
Have we resigned ourselves to a cyber-future that has been decided behind our backs? Why is technology - and our understanding of it - central to the concerns of critical social theory? In developing the PC technologists have borrowed ideas from the human sciences about what people are like, about the nature of meaning and the desirability of some experiences over others. Yet, to date, the academic disciplines most concerned with these ideas have offered neither resistance nor debate. In this book, Graeme Kirkpatrick shows why it is crucial that we initiate that debate. Offering a revealing critique of PC design and the social assumptions that underlie it, Kirkpatrick argues that it relies on a particular conception of a capitalistic society that expects its technology to come pre-packaged, mass-marketed and "user-friendly". Anyone who is critical of such a society and its commodification of human achievement should, he suggests, be suspicious. Kirkpatrick argues that the computer is a contested space within which major social conflicts are played out. On the one hand, there is a narrative of flexibility and human empowerment, and on the other a sense of a "system" that controls our lives, leaving us in thrall to the computer corporations, and at constant risk from phishers and hackers. The outcomes of these conflicts are extremely important as they will shape our future experience of technology, society and politics. Critical Technology is a lively, provocative and often radical book, which forces us to reflect on the meaning of an artefact that is central to our daily lives, yet that we too often take for granted.
Microprocessors and Microcomputer-Based System Design, Second Edition, builds on the concepts of the first edition. It discusses the basics of microprocessors, various 32-bit microprocessors, the 8085 microprocessor, the fundamentals of peripheral interfacing, and Intel and Motorola microprocessors. This edition includes new topics such as floating-point arithmetic, Program Array Logic, and flash memories. It covers the popular Intel 80486/80960 and Motorola 68040 as well as the Pentium and PowerPC microprocessors. The final chapter presents system design concepts, applying the design principles covered in previous chapters to sample problems.
"The Encyclopedia of Microcomputers serves as the ideal companion reference to the popular Encyclopedia of Computer Science and Technology. Now in its 10th year of publication, this timely reference work details the broad spectrum of microcomputer technology, including microcomputer history; explains and illustrates the use of microcomputers throughout academe, business, government, and society in general; and assesses the future impact of this rapidly changing technology." |
You may like...
Clean Living Movements - American Cycles…
Ruth Clifford Engs
Hardcover
R2,593
Discovery Miles 25 930
|