Home | Amazing | Today | Tags | Publishers | Years | Search 
Parallel I/O for Cluster Computing (Innovative Technology Series)
Parallel I/O for Cluster Computing (Innovative Technology Series)

Data sets in large applications such as databases and data-mining applications are often too large to fit into a computer’s internal memory. The resulting I/O (input/output) communications between internal memory and the slower external medium (such as disks) can present a major performance bottleneck.

Among the possible computer...

The Internet Encyclopedia, Volume 3
The Internet Encyclopedia, Volume 3
The only comprehensive guide to every Internet topic-from ActiveX to XBRL
The definitive, three-volume Internet Encyclopedia covers every aspect of the Internet for professionals. This up-to-date compendium offers a broad perspective on the Internet as a business tool, an IT platform, and a medium for communications and commerce. It presents
...
ShaderX2: Introductions and Tutorials with DirectX 9.0
ShaderX2: Introductions and Tutorials with DirectX 9.0
This book is a collection of articles that explain the foundations of
shader programming, from the High Level Shading Language and
version 3.0 shader models to shadow mapping and stencil shadow
volumes. The following provides a brief overview of these articles:
Jason L. Mitchell and Craig Peeper, one of the creators of HLSL...
IBM Lotus Domino 6.5 for Linux on Zseries Implementation
IBM Lotus Domino 6.5 for Linux on Zseries Implementation

This IBM Redbook will help the reader plan for, install, and configure the new IBM Lotus Domino 6.5 product on a zSeries system running Linux. We discuss why you should consider running Domino for Linux on zSeries, and list the advantages of running Linux in a guest under z/VM.

We then describe the structure of running Domino for Linux...

The Analyst Application
The Analyst Application
This guide will show you how to use the Analyst Application to perform such tasks as table analysis, ANOVA, repeated measurements, mixed models, basic power computations, and much more.

Discover how to perform statistical analysis using the Analyst Application, a point-and-click interface to basic statistical analysis in SAS. The
...
The Hotel Business (Inside the Minds)
The Hotel Business (Inside the Minds)
Inside the Minds: The Hotel Business is an authoritative, insider's perspective on the ins and outs of hospitality and the future of the industry, on a global scale. Featuring Presidents, CEOs and proprietors representing some of the world's leading hotels, top franchisors, most luxurious resorts and quaintest Inns, this book provides a broad, yet...
SIP: Understanding the Session Initiation Protocol, Second Edition
SIP: Understanding the Session Initiation Protocol, Second Edition
The Session Initiation Protocol (SIP) is a new signaling, presence and instant
messaging protocol developed to set up, modify, and tear down multimedia sessions,
request and deliver presence and instant messages over the Internet [1].
This chapter covers some background for the understanding of the protocol. SIP
was developed by
...
The Internet Encyclopedia, Volume 2
The Internet Encyclopedia, Volume 2
The Internet Encyclopedia is the first comprehensive examination of the core topics in the Internet field. The Internet Encyclopedia, a three-volume reference work with 205 chapters and more than 2,600 pages, provides comprehensive coverage of the Internet as a...
Photoshop CS All-in-One Desk Reference for Dummies
Photoshop CS All-in-One Desk Reference for Dummies
10 books in 1 – plus 16 pages of full-color examples!

Your one-stop guide to using all the cool features of Photoshop CS

You know you can do amazing things with Photoshop CS, but wow – where do you start? One feature at a time, with this handy reference guide! Ten easy-to-follow minibooks show you how to set up...

Ethical Hacking
Ethical Hacking
By explaining computer security and outlining methods to test computer systems for possible weaknesses, this guide to system security provides the tools necessary for approaching computers with the skill and understanding of an outside hacker. A useful tool for those involved in securing networks from outside tampering, this guide to CEH 312-50...
Going Wi-Fi: A Practical Guide to Planning and Building an 802.11 Network
Going Wi-Fi: A Practical Guide to Planning and Building an 802.11 Network

Make informed decisions about planning and installing 802.11 “Wi-Fi” wireless networks. This book helps you tackle the challenge, whether installing Wi-Fi within an existing corporate network, or setting up a wireless network from scratch in any business or organization. Author Janice Reynolds guides you through everything you need...

Pragmatic Version Control Using CVS
Pragmatic Version Control Using CVS
This book is a recipe-based approach to using the CVS Version Control system that will get you up and running quickly--and correctly. All projects need version control: it's a foundational piece of any project's infrastructure. Yet half of all project teams in the U.S. don't use any version control at all. Many others don't use it well, and end...
Result Page: Previous 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy