![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Personal computers
This book takes a holistic view on mobile and distributed computing systems. It presents innovative solutions at all system layers. These range from hardware over vertical and horizontal infrastructure services and novel middleware techniques to various types of application software. Some chapters address core properties of ubiquitous applications including mobility, self-healing and self-organization of both technical and social-technical systems.
Providing an introduction to the fundamentals of body area communications, this book covers the key topics of channel modeling, modulation and demodulation, and performance evaluation A systematic introduction to body area networks (BAN), this book focuses on three major parts: channel modeling, modulation/demodulation communications performance, and electromagnetic compatibility considerations. The content is logically structured to lead readers from an introductory level through to in-depth and more advanced topics. * Provides a concise introduction to this emerging topic based on classroom-tested materials * Details the latest IEEE 802.15.6 standard activities * Moves from very basic physics, to useful mathematic models, and then to practical considerations * Covers not only EM physics and communications, but also biological applications * Topics approached include: link budget, bit error rate performance, RAKE and diversity reception; SAR analysis for human safety evaluation; and modeling of electromagnetic interference to implanted cardiac pacemakers * Provides Matlab and Fortran programs for download from the Companion Website
CoCo: The Colorful History of Tandy's Underdog Computer is the first book to document the complete history of the Tandy Color Computer (CoCo), a popular 8-bit PC series from the 1980s that competed against the era's biggest names, including the Apple II, IBM PC, and Commodore 64. The book takes you inside the interesting stories and people behind this unique, underdog computer. Both noted computer science and technology advocates, authors Pitre and Loguidice reveal the story of a pivotal period in the home computing revolution from the perspective of Tandy's CoCo. As these computers were sold in Radio Shack stores throughout the United States and other countries, they provide a critical point of reference for key events in the unprecedented evolutionary period for the PC industry in the 1980s. The book also features first-hand accounts from the people who created and promoted the CoCo, from the original Tandy executives and engineers to today's active product creators and information keepers. The CoCo impacted many lives, and this book leaves no stone unturned in recounting this fascinating slice of the PC revolution that is still in play today. From early telecommunications experiments to engineering and budgetary challenges, it covers all the aspects that made the CoCo a truly personal, useful computing experience in as small and inexpensive a package as possible.
Your mouse is slowing you down. The time you spend context switching between your editor and your consoles eats away at your productivity. Take control of your environment with tmux, a terminal multiplexer that you can tailor to your workflow. With this updated second edition for tmux 2.2, you'll customize, script, and leverage tmux's unique abilities to craft a productive terminal environment that lets you keep your fingers on your keyboard's home row. You have a database console, web server, test runner, and text editor running at the same time, but switching between them and trying to find what you need takes up valuable time and breaks your concentration. By using tmux 2.2, you can improve your productivity and regain your focus. This book will show you how. This second edition includes many features requested by readers, including how to integrate plugins into your workflow, how to integrate tmux with Vim for seamless navigation - oh, and how to use tmux on Windows 10. Use tmux to manage multiple terminal sessions in a single window using only your keyboard. Manage and run programs side by side in panes, and create the perfect development environment with custom scripts so that when you're ready to work, your programs are waiting for you. Manipulate text with tmux's copy and paste buffers, so you can move text around freely between applications. Discover how easy it is to use tmux to collaborate remotely with others, and explore more advanced usage as you manage multiple tmux sessions, add custom scripts into the tmux status line, and integrate tmux with your system. Whether you're an application developer or a system administrator, you'll find many useful tricks and techniques to help you take control of your terminal.
Discover everything you want to know about Mac basics in this easy-to-use guide, from the most essential tasks that you'll want to perform, to solving the most common problems you'll encounter.
Gain a thorough understanding of today's sometimes daunting, ever-changing world of technology as you learn how to apply the latest technology to your academic, professional and personal life with TECHNOLOGY FOR SUCCESS: COMPUTER CONCEPTS. Written by a team of best-selling technology authors and based on extensive research and feedback from students like you, this edition breaks each topic into brief, inviting lessons that address the "what, why and how" behind digital advancements to ensure deep understanding and application to today's real world. Optional online MindTap and SAM (Skills Assessment Manager) learning tools offer hands-on and step-by-step training, videos that cover the more difficult concepts and simulations that challenge you to solve problems in the actual world. You leave this course able to read the latest technology news and understand its impact on your daily life, the economy and society.
A fully updated version of Pearson's bestselling Brilliant Windows titles, covering Windows 10 - the latest release of the widely-used Microsoft operating system. Brilliant Windows 10 gives you the information you need easily and without fuss. It guides you through all tasks and applications using a highly visual, full-colour, step-by-step approach and tells you exactly what you need to know, when you need to know it. For the first time, this book comes with FREE downloadable bonus material. An extra 140 pages, which cover chapters on advanced subjects like customising Windows, maintaining your computer and managing your hardware as well as the key, new features of Office 2016. Spend less time reading and more time doing with a simple step-by-step approach to beginner and intermediate level tasks. Brilliant guides provide the quick, easy-to-access information that you need: Numbered steps guide you through each task or problem Numerous colour screenshots illustrate each step Cross reference boxes point you to related tasks and information in the book "Did you know ?..." sections alert you to relevant expert tips, tricks and advice
This book constitutes the refereed proceedings of the 1st IFIP Entertainment Computing Symposium held in Milan, Italy on September 7-10, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
This book constitutes the refereed post-proceedings of the 4th IFIP WG 9.7 Conference on the History of Nordic Computing, HiNC 4, held in Copenhagen, Denmark, in August 2014. The 37 revised full papers were carefully reviewed and selected for inclusion in this volume. The papers focus on innovative ICT milestones that transformed the nordic societies and on the new ideas, systems and solutions that helped creating the welfare societies of today, in particular solutions and systems for public services, e.g., tax, social benefits, health care and education; solutions and systems for the infrastructure of the society, e.g., banking, insurance, telephones, transport and energy supply; and technologies and IT policies behind the major IT milestones, e.g., user centric innovation, programming techniques and IT ethics. They are organized in topical sections on IT policy, infrastructure, public services, private services, telesystems, health care, IT in banking, transport and IT technology.
Time series with mixed spectra are characterized by hidden periodic components buried in random noise. Despite strong interest in the statistical and signal processing communities, no book offers a comprehensive and up-to-date treatment of the subject. Filling this void, Time Series with Mixed Spectra focuses on the methods and theory for the statistical analysis of time series with mixed spectra. It presents detailed theoretical and empirical analyses of important methods and algorithms. Using both simulated and real-world data to illustrate the analyses, the book discusses periodogram analysis, autoregression, maximum likelihood, and covariance analysis. It considers real- and complex-valued time series, with and without the Gaussian assumption. The author also includes the most recent results on the Laplace and quantile periodograms as extensions of the traditional periodogram. Complete in breadth and depth, this book explains how to perform the spectral analysis of time series data to detect and estimate the hidden periodicities represented by the sinusoidal functions. The book not only extends results from the existing literature but also contains original material, including the asymptotic theory for closely spaced frequencies and the proof of asymptotic normality of the nonlinear least-absolute-deviations frequency estimator.
Use your laptop or tablet with confidence This practical book will have you achieving immediate results using: a friendly, visual approach simple language practical, task-based examples large, full-colour screenshots. Discover everything you want to know about choosing and using your laptop or tablet in this easy-to-use guide; from the most essential tasks that you'll want to perform, to solving the most common problems you'll encounter. Practical. Simple. Fast. Get the most out of your laptop or tablet with practical tips on every page: * ALERT: Solutions to common problems * HOT TIP: Time-saving shortcuts * SEE ALSO: Related tasks and information * DID YOU KNOW? Additional features to explore * WHAT DOES THIS MEAN? Jargon explained in plain English
How did the Commodore 64 conquer the hearts of millions and become a platform people still actively develop for even today? What made it so special? This book will appeal to both those who like tinkering with old technology as a hobby and nostalgic readers who simply want to enjoy a trip down memory lane. It discusses in a concise but rigorous format the different areas of home gaming and personal computing where the C64 managed to innovate and push forward existing boundaries. Starting from Jack Tramiel's vision of designing computers "for the masses, not the classes," the book introduces the 6510, VIC-II and SID chips that made the C64 unique. It briefly discusses its Basic programming language and then proceeds to illustrate not only many of the games that are still so fondly remembered but also the first generation of game engines that made game development more approachable among other topics that are often neglected but are necessary to provide a comprehensive overview of how far reaching theC64 influence was. Written in a straightforward and accessible style, readers will relive the dawn of modern technology and gain a better understanding of the legacy that was built, bit by bit, in those pioneering days by computers that had only a tiny fraction of the power modern machines have and, yet, were used to create the technological world we are now living in. With a foreword by Michael Tomczyk
Everything you need to know to choose and use your laptop. Brilliant Laptops guides you through the essential tasks step-by-step, showing you how to:
From fundamental concepts and theories to implementation protocols and cutting-edge applications, the Handbook of Mobile Systems Applications and Services supplies a complete examination of the evolution of mobile services technologies. It examines service-oriented architecture (SOA) and explains why SOA and service oriented computing (SOC) will play key roles in the development of future mobile services. Investigating current service discovery frameworks, the book covers the basics of mobile services and applications developed in various contexts. The first section provides readers with the required background in mobile services architecture. Next, it details of middleware support for mobile services. The final section discusses security and applications of mobile services. Containing the contributions of leading researchers and academics from around the world, the book: Introduces a new location-based access control model Unveils a simple, yet powerful enhancement that enables Web services to locally manage workflow dependencies and handle messages resulting from multiple workflows Examines an event-based location aware query model that continuously aggregates data in specific areas around mobile sensors of interest Addresses the problem of location-based access control in the context of privacy protection Presents a layered architecture of context-aware middleware Considers the development of assistive technology solutions for the blind or visually impaired Discussing architecture for supporting multi-mode terminals in integrated heterogeneous wireless networks, this book addresses the network availability constraint to serve all mobile services originating from a single-user terminal. It examines QoS protocols and their enhancements in supporting user mobility. Analyzing mobile services security vulnerabilities, it details security design best practices that mobile service developers can use to improve the security of their mobile systems.
The world of smart shoes, appliances, and phones is already here,
but the practice of user experience (UX) design for ubiquitous
computing is still relatively new. Design companies like IDEO and
frogdesign are regularly asked to design products that unify
software interaction, device design and service design -- which are
all the key components of ubiquitous computing UX -- and practicing
designers need a way to tackle practical challenges of design.
Theory is not enough for them -- luckily the industry is now mature
enough to have tried and tested best practices and case studies
from the field.
Aimed at people over the age of 50 and written by an expert in the field, Joli Ballew, this book covers the topic of laptop computers.
1 Die wirtschaftliche Bedeutung der Schutzmassnahmen fur EDV-Anlagen.- 2 Voraussetzungen und Anforderungen an die sicherheits-gerechte Konzipierung eines Hochsicherheitsbereichs.- 3 Unterschiedliche Gefahrdungen fur Rechenzentren.- 3.1 Einbruch/Diebstahl, Sabotage und Vandalismus.- 3.2 Brand, Verrauchung.- 3.3 Fehlfunktionen in der Klimatisierung.- 3.4 Wassereinbruch.- 3.5 Elektrische Versorgung.- 3.5.1 Aufrechterhaltung der Stromversorgung.- 3.5.2 UEberspannungen und Blitzschlag.- 3.6 Datenverlust.- 3.7 Sonstige Gefahren.- 4 Moegliche Analysemethoden.- 5 Schema der konkreten Risiko- und Schutzniveauermittlung.- 5.1 Massnahmen gegen Einbruch, Diebstahl, Sabotage und Vandalismus.- 5.2 Massnahmen gegen Feuer und Verrauchung.- 5.3 Massnahmen gegen Fehlfunktionen der Klimatisierung.- 5.4 Massnahmen gegen Beschadigungen durch Wasser bzw. fehlerhafte Versorgung.- 5.5 Massnahmen zur Aufrechterhaltung der gleichbleibenden Stromversorgung.- 5.6 Massnahmen gegen Datenverlust.- 5.7 Sonstige sicherheitsrelevante Kriterien.- 5.8 Zusammenfassende Benotung der analysierten Risiken.- 6 Sicherheitsmanagement: Organisation und Realisierung der sicherheitstechnischen Massnahmen.- 7 Sicherheitsgerechter EDV-Betrieb.- 8 Organisatorische Schritte zur permanenten Beibehaltung des Niveaus des ursprunglich entworfenen Sicherheitskonzepts.- 8.1 Menschliche Aspekte.- 8.2 Technische Massnahmen.- 9 Katastrophenvorsorge.- 9.1 Katastrophenplan.- 9.2 Backup-Konzepte.- 9.3 Versicherungskonzepte fur Hochsicherheitsbereiche.- 10 Schlussworte und Aussicht.
Over the last decade, there has been a growing interest in human behavior analysis, motivated by societal needs such as security, natural interfaces, affective computing, and assisted living. However, the accurate and non-invasive detection and recognition of human behavior remain major challenges and the focus of many research efforts. Traditionally, in order to identify human behavior, it is first necessary to continuously collect the readings of physical sensing devices (e.g., camera, GPS, and RFID), which can be worn on human bodies, attached to objects, or deployed in the environment. Afterwards, using recognition algorithms or classification models, the behavior types can be identified so as to facilitate advanced applications. Although such traditional approaches deliver satisfactory performance and are still widely used, most of them are intrusive and require specific sensing devices, raising issues such as privacy and deployment costs. In this book, we will present our latest findings on non-invasive sensing and understanding of human behavior. Specifically, this book differs from existing literature in the following senses. Firstly, we focus on approaches that are based on non-invasive sensing technologies, including both sensor-based and device-free variants. Secondly, while most existing studies examine individual behaviors, we will systematically elaborate on how to understand human behaviors of various granularities, including not only individual-level but also group-level and community-level behaviors. Lastly, we will discuss the most important scientific problems and open issues involved in human behavior analysis.
Microcomputers are an increasingly important tool in all aspects of development as the need to handle and assimilate vast quantities of information becomes ever more critical for both the international development community and the developing countries. In addition, the microcomputer represents the first significant technological advance that a developing country can assimilate and exploit with a relatively low capital investment and without prior knowledge or involvement in other technologies. Unfortunately this new technology represents not only an opportunity if properly exploited but a threat if ignored. The widespread and increasing incorporation of microcomputers into all aspects of the developed countries represents a major technological advance and an inevitable social change. If a developing country fails to take advantage of the opportunity that microcomputer technology represents, its level of development in relation to developed countries will be significantly lowered. Organized by the Board on Science and Technology for International Development in response to a request from the U.S. Agency for International Development, this book is an overview of microcomputer applications in developing countries and the issues associated with their use and abuse. The first section of the book is an assessment of the need for microcomputers in development. Written primarily for those in the development field and other computer-literate individuals, the second part is divided into applications in agriculture, health, energy, and municipal management. Policy concerns are addressed in the final section. It discusses the technology transfer that takes place as countries try to establish national computer policies that meet local needs while encouraging creative and useful applications.
This new edition has been updated with information relevant to the newest Basic Stamp, the BS2P, and revised to present more advanced projects. The result is a superb hands-on teaching text with dozens of completely new projects in addition to enhanced projects that take advantage of its latest features. (Computer Books - Languages/Programming)
Why purchase expensive add-on cards or bus interfaces when you can develop effective and economical data acquisition and process controls using C programs? Using the under-employed printer adapter (that is, the parallel port of your PC), you can turn your computer into a powerful tool for developing microprocessor applications. Learn how to build a complete data acquisition system and such varied applications as a CCD camera controller, a photometer interface, and a wave form generator. The book also covers the enhanced parallel port (EPP), the extended capabilities port (ECP), interfacing analog-to-digital converters, and data acquisition under Linux. This extraordinary software approach to interfacing through the parallel port will be especially appealing to programmers involved in control systems design and device development, as well as to those who work with real-time and embedded systems. ;
Have we resigned ourselves to a cyber-future that has been decided behind our backs? Why is technology - and our understanding of it - central to the concerns of critical social theory? In developing the PC technologists have borrowed ideas from the human sciences about what people are like, about the nature of meaning and the desirability of some experiences over others. Yet, to date, the academic disciplines most concerned with these ideas have offered neither resistance nor debate. In this book, Graeme Kirkpatrick shows why it is crucial that we initiate that debate. Offering a revealing critique of PC design and the social assumptions that underlie it, Kirkpatrick argues that it relies on a particular conception of a capitalistic society that expects its technology to come pre-packaged, mass-marketed and "user-friendly". Anyone who is critical of such a society and its commodification of human achievement should, he suggests, be suspicious. Kirkpatrick argues that the computer is a contested space within which major social conflicts are played out. On the one hand, there is a narrative of flexibility and human empowerment, and on the other a sense of a "system" that controls our lives, leaving us in thrall to the computer corporations, and at constant risk from phishers and hackers. The outcomes of these conflicts are extremely important as they will shape our future experience of technology, society and politics. Critical Technology is a lively, provocative and often radical book, which forces us to reflect on the meaning of an artefact that is central to our daily lives, yet that we too often take for granted. |
You may like...
RISC System/6000 PowerPC System…
International Business Machines Inc
Hardcover
R1,222
Discovery Miles 12 220
From Specification to Embedded Systems…
Achim Rettberg, Mauro C. Zanella, …
Hardcover
R2,830
Discovery Miles 28 300
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, …
Hardcover
R1,285
Discovery Miles 12 850
|