Mobile TV: Customizing Content And Experience
Mobile TV: Customizing Content and Experience /by Aaron Marcus (Editor), Anxo Cereijo Roib?s (Editor), Riccardo Sala (Editor) .This book will present significant projects and studies carried out in academia and in industry seeking to develop new mobile multimedia systems that go beyond mobile TV (in terms of purely media streaming) and are more enjoyable and relevant for the nomadic and peripatetic user.
To do this, it will showcase successful methodologies and new relevant solutions that extend the field of action of people on the move, improving, at the same time, the quality of their mobile experience.
The objectectives of the book are as follows:
* to gain insight into the future of mobile TV and mobile video in general;
* to explore the user-experience in mobile and pervasive interactive multimedia systems;
* to question the essential correlation between mobile video and users' context;
* to analyse how these systems can encourage the creation of mobile communities;
* to understand how these systems can be evaluated;
* to unveil relevant scenarios for mobile storytelling (creation and sharing);
* to understand how sociability can be achieved in nomadic contexts;
* to analyse how mobile digital content could evolve;
* to examine advanced interaction modalities for mobile video, and
* to discuss techniques to anticipate how nomadic cultures can shape trends in technology.
download link:
depositfiles
or:
sh-matrix
Labels: Hardware
Minimizing And Exploiting Leakage In VLSI Design
Minimizing and Exploiting Leakage in VLSI Design /by Nikhil Jayakumar (Author), Suganth Paul (Author), Rajesh Garg (Author), Kanupriya Gulati (Author), Sunil P. Khatri (Author) .Power consumption of VLSI (Very Large Scale Integrated) circuits has been growing at an alarmingly rapid rate. This increase in power consumption, coupled with the increasing demand for portable/hand-held electronics, has made power consumption a dominant concern in the design of VLSI circuits today.
Traditionally, dynamic (switching) power has dominated the total power consumption of an IC. However, due to current scaling trends, leakage power has now become a major component of the total power consumption in VLSI circuits. Leakage power reduction is especially important in portable/hand-held electronics such as cell-phones and PDAs. This book presents two techniques aimed at reducing leakage power in digital VLSI ICs. The first technique reduces leakage through the selective use of high threshold voltage sleep transistors. The second technique reduces leakage by applying the optimal Reverse Body Bias (RBB) voltage. This book also shows readers how to turn the leakage problem into an opportunity, through the use of sub-threshold logic.
download link:
depositfiles
or:
sh-matrix
Labels: Hardware
Middleware Networks: Concept, Design and Deployment of Internet Infrastructure
Middleware Networks: Concept, Design and Deployment of Internet Infrastructure describes a framework for developing IP Service Platforms and emerging managed IP networks with a reference architecture from the AT&T Labs GeoPlex project. The main goal is to present basic principles that both the telecommunications industry and the Internet community can see as providing benefits for service-related network issues.
As this is an emerging technology, the solutions presented are timely and significant. Middleware Networks: Concept, Design and Deployment of Internet Infrastructure illustrates the principles of middleware networks, including Application Program Interfaces (APIs), reference architecture, and a model implementation.
Part I begins with fundamentals of transport, and quickly transitions to modern transport and technology. Part II elucidates essential requirements and unifying design principles for the Internet. These fundamental principles establish the basis for consistent behavior in view of the explosive growth underway in large-scale heterogeneous networks. Part III demonstrates and explains the resulting architecture and implementation. Particular emphasis is placed upon the control of resources and behavior. Reference is made to open APIs and sample deployments.
Middleware Networks: Concept, Design and Deployment of Internet Infrastructure is intended for a technical audience consisting of students, researchers, network professionals, software developers, system architects and technically-oriented managers involved in the definition and deployment of modern Internet platforms or services. Although the book assumes a basic technical competency, as it does not provide remedial essentials, any practitioner will find this useful, particularly those requiring an overview of the newest software architectures in the field.
Download from Hotfile
Mirror: FileSonic
Labels: Hardware
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
Essential Security Advice from Tony Bradley, About.com's Guide for Internet/Network Security. “Security is a process, not a product, and computer security is everyone's responsibility. You wouldn't leave the backdoor of your home or business open to intruders, and your computer merits the same prudence.
Even Dodge City had a Wyatt Earp to keep order if things got out of hand. In the wild world of the Internet, there is no sheriff. With Essential Computer Security you can act as your own deputy by arming yourself with fundamental knowledge of the important aspects of computer security.” – Douglas Schweitzer, Sc.D., security expert and author of Securing the Network from Malicious Code
Coverage includes:
• Basic Windows Security
• Passwords
• Viruses, Worms, and Other Malware
• Patching
• Perimeter Security
• E-mail Safety
• Web Surfing Privacy and Safety
• Wireless Network Security
• Spyware and Adware
• Glossary of Technology and Terminology
Download from Hotfile
Mirror: FileSonic
Labels: Hardware
CD and DVD Forensics
CD and DVD Forensics takes the reader through all facets of handling, examining, and processing CD and DVD evidence for computer forensics.
CD and DVD Forensics is a how-to book that gives the reader tools to open CDs and DVDs in an effort to identify evidence of a crime. These tools can be applied in both the public and private sectors. Armed with this information, readers in law enforcement and corporate security and private investigators will be more effective in performing their evidence-related tasks.
Download from Hotfile
Mirror: FileSonic
Labels: Hardware
Understanding Computers: Today and Tomorrow
Understanding Computers: Today and Tomorrow gives your students a classic introduction to computer concepts with a modern twist! Known for its emphasis on industry insight, this text makes concepts relevant to today's career-focused students.
Hotfile
SharingMatrix
Labels: Hardware
Gerald R. Rising, "Inside Your Calculator: From Simple Programs to Significant Insights"
Many of us want to understand how the technological instruments that so pervade modern society operate. This book answers questions about one of those devices: the scientific calculator. Calculator keys seem to work like magic. They tell us, for example, that the cosine of 56° is 0.559192903. This book explores the simple internal calculator processes (called algorithms or programs) that produce this and similar results. Although the text focuses on the calculator keys that compute powers, roots, logarithms, and trigonometry functions, insights are also provided into simple programming, conversion between decimal and binary numeration, and perhaps most important, the structure of our numeration systems. Many people think that the processes that drive calculators demand advanced mathematical concepts such as Taylor series. However, high school algebra and a minimum understanding of programming (provided by this text) supply enough background to understand these algorithms.
Download from Depositfiles
or
Download from SharingMatrix
Labels: Hardware
Alan Wiemann, "Standardized Functional Verification"
Standardized Functional Verification describes the science of functional verification that applies to any digital hardware system. With a precise and comprehensive terminology this book describes a thorough technical framework for achieving superior results with greater efficiency. It also defines a scientific basis for achieving functional closure and shows how true functional closure can be measured by software.
The author provides a wealth of practical guidance to the practicing professional. It describes how to compare results from differing projects and how to assess the risk of functional bugs at tape-out or at any other critical product juncture. The book also shows consumers how to compare IP offerings from multiple vendors. For producers, it describes how to verify IP in a manner that meets customer needs. Producers and consumers of silicon IP therefore have a solid framework to communicate requirements and to align expectations effectively and efficiently.
Standardized Functional Verification is a valuable reference for verification engineers and managers, and also for developers of verification software. The principles and theory this book describes will drive creation of the next generation of verification tools.
Download from Depositfiles
or
Download from HotFile
or
Download from SharingMatrix
Labels: Hardware
Practical Guide to Inspection, Testing and Certification of Electrical Installations
This book covers all the basics of inspection and testing and clearly explains all the legal requirements. It not only tells you what tests are needed but also describes all of them step-by-step with the help of colour photos. Sample forms show how to verify recorded test results and how to certify and fill in the required documentation. The book is also packed with handy advice on how to avoid and solve common problems encountered on the job.
With its focus on the practical side of the actual inspection and testing rather than just the requirements of the regulations, this book is ideal for students, experienced electricians and those working in allied industries, such as plumbers and heating specialists, kitchen and bathroom fitters, alarm installers and others, whether they are working on domestic or industrial installations.
Depositfiles
mirror
mirror
Labels: Hardware
How to Do Everything with Your Sony Vaio
Here is a friendly, solutions-oriented guide to getting the most out of your Sony Vaio. You'll find full coverage of all aspects of the laptop including adding peripherals, using the bundled software, linking to digital cameras and home stereos, and performing routine maintenance and upgrades.
Labels: Hardware
How to Do Everything with iPod & iTunes, 4th Ed.
Listening to music is just the beginning!
With coverage of the iPod classic, iPod touch, iPod nano, iPod shuffle, and iPhone, How to Do Everything: iPod & iTunes, Fourth Edition shows you how to download and play podcasts and videos, load your calendar and contacts, choose accessories to add versatile features, and even use your iPod as an external drive. You'll also get detailed advice on managing your iTunes library, enhancing audio quality, syncing multiple iPods to the same computer, and much more, all in an easy-to-follow format.
Configure your PC or Mac, install iTunes, and connect your iPod or iPhone
Load songs, videos, photos, podcasts, contacts, calendars, and more
Select accessories, including speakers, cases, adapters, docks, remote controls, and radio transmitters
Use your iPod or iPhone as a stereo-at home or in the car
Build and manage your iTunes library, and burn CDs and DVDs
Create AAC, MP3, and Apple Lossless Encoder files from CDs, cassettes, vinyl, or other sources
Recover your songs and videos from your iPod or iPhone
Use your iPod as an external drive or backup device
Troubleshoot problems with your iPod, iPhone, or iTunes
Labels: Hardware
Hardware Bible, 6 Ed
The Winn L. Rosch Hardware Bible provides a background on how things work, puts competing technologies, standards, and products in perspective, and serves as a reference that provides quick answers for common computer and technology questions. It functions as a buying guide, telling not only what to buy, but why. It also lays the foundation for upgrading or repairing a computer, but stops short of the step-by-step mechanics of the process. The chief purpose of the Hardware Bible remains educational. Some new features in this edition include rewritable DVD technology as well as Blu-ray Discs, wireless networking including 802.11a and 802.11b, Bluetooth wireless communications, and extended coverage of digital cameras, scanners, and telecommunications...and much more!
One way is by reading the book you hold in your hand. It's designed to help you understand all the technologies that underlie the modern personal computer and all its peripherals that help make it useful. Although you won't be able to design a computer when you're finished (that is, unless you already knew how to when you started), you will know what it takes to design one, how computers work, and how you can work better with them—and get them to do more for you. It doesn't matter if you regard a screwdriver as a tool, an instrument of torture, or a new curiosity you've never before encountered. Even if you have no technical background whatsoever, this book will guide you to a level of understanding that will let you buy, use, and upgrade your computer with confidence. At the same time, you'll find all the technical information that you need to do a school report or business presentation on nearly any current computer topic.
Labels: Hardware
CCNP: Routing Study Guide Exam 640-503
Get ready for your future today! Cisco's new Routing exam is a requirement for both the Cisco Certified Network Professional (CCNP) and Cisco Certified Design Professional (CCDP) programs. With full coverage of all exam objectives, you'll learn techniques and strategies for building scalable Cisco networks. The CD contains a testing engine, electronic flashcards for PCs and Palm devices, and valuable networking tools and utilities.
depositfiles
sharingmatrix
turbobit
uploading
Labels: Hardware
Hardware Based Packet Classification for High Speed Internet Routers
Packet classification is the core component of routers, firewalls and other networking devices that enables many networking services such as packet filtering and traffic accounting. Using Ternary Content Addressable Memories (TCAMs) to perform high-speed packet classification has become the standard in industry today. While we can expect some gain in TCAM performance from improved hardware, the demands on TCAM performance (measured by the number of rules in packet classifiers) increase far more rapidly due to the explosive growth of internet services and threats. Hardware Based Packet Classification for High Speed Internet Routers presents the most recent developments in hardware based packet classification algorithms and architectures. This book describes five methods which reduce the space that classifiers occupy within TCAMs; TCAM Razor, All-Match Redundancy Removal, Bit Weaving, Sequential Decomposition, and Topological Transformations. These methods demonstrate that in most cases a substantial reduction of space is achieved. Case studies and examples are provided throughout this book. About this book: • Presents the only book in the market that exclusively covers hardware based packet classification algorithms and architectures. • Describes five methods which reduce the space that classifiers occupy within TCAMs: TCAM Razor, All-Match Redundancy Removal, Bit Weaving, Sequential Decomposition, and Topological Transformations. • Provides case studies and examples throughout. Hardware Based Packet Classification for High Speed Internet Routers is designed for professionals and researchers who work within the related field of router design. Advanced-level students concentrating on computer science and electrical engineering will also find this book valuable as a text or reference book.
Labels: Hardware
Cisco Security Agent (Repost)
Prevent security breaches by protecting endpoint systems with Cisco Security Agent, the Cisco host Intrusion Prevention System
Secure your endpoint systems with host IPS
Build and manipulate policies for the systems you wish to protect
Learn how to use groups and hosts in the Cisco Security Agent architecture and how the components are related
Install local agent components on various operating systems
Explore the event database on the management system to view and filter information
Examine Cisco Security Agent reporting mechanisms for monitoring system activity
Apply Application Deployment Investigation to report on installed applications, hotfixes, and service packs
Collect detailed information on processes and see how they use and are used by system resources
Create and tune policies to control your environment without impacting usability
Learn how to maintain the Cisco Security Agent architecture, including administrative access roles and backups
Cisco Security Agent presents a detailed explanation of Cisco Security Agent, illustrating the use of host Intrusion Prevention Systems (IPS) in modern self-defending network protection schemes. At the endpoint, the deployment of a host IPS provides protection against both worms and viruses. Rather than focusing exclusively on reconnaissance phases of network attacks a host IPS approaches the problem from the other direction, preventing malicious activity on the host by focusing on behavior. By changing the focus to behavior, damaging activity can be detected and blocked–regardless of the attack.
depositfiles
sharingmatrix
uploading
turbobit
megaupload
Labels: Hardware
CNET Do-It-Yourself PC Upgrade Projects (ReUp)
Supercharge and customize your PC
Now you can get the most out of your PC with the fun and practical projects packed inside this easy-to-follow guide. Produced in conjunction with CNET.com, the place you go for the latest in tech and consumer electronics, this book shows you how to exploit the media, communications, networking, and security features of your PC. You'll also find out how to add powerful hardware and software, improve performance, and expand your computer's capabilities.
Inside, you'll find 24 self-contained projects, clear step-by-step instructions, a list of tools needed at the beginning of each project, and hundreds of helpful photos and screenshots. With CNET Do-It-Yourself PC Upgrade Projects, you'll be able to take your PC to peak performance--and beyond.
Transform your PC into a video phone
Add two or more extra monitors so you can see all your work at once
Set up your PC as a recording studio
Create a permanent wireless network or a temporary one
Back up your data safely--and restore it
Digitize your paper documents for safekeeping
Secure your secrets in a virtual locker
And much more
Labels: Hardware