Written by Wes McKinney, the main author of the pandas library, this hands-on book is packed with practical cases studies. It’s ideal for analysts new to Python and for Python programmers new to scientific computing.Use the IPython interactive shell as your primary development environmentLearn basic and advanced NumPy (Numerical Python) featuresGet started with data analysis tools in the pandas libraryUse high-performance tools to load, clean, transform, merge, and reshape dataCreate scatter plots and static or interactive visualizations with matplotlibApply the pandas groupby facility to slice, dice, and summarize datasetsMeasure data by points in time, whether it’s specific instances, fixed periods, or intervalsLearn how to solve problems in web analytics, social sciences, finance, and economics, through detailed examples
Inside, you'll learn about:
Interaction design and physical computingThe Arduino hardware and software development environmentBasics of electricity and electronicsPrototyping on a solderless breadboardDrawing a schematic diagram
And more. With inexpensive hardware and open-source software components that you can download free, getting started with Arduino is a snap. To use the introductory examples in this book, all you need is a USB Arduino, USB A-B cable, and an LED.
Join the tens of thousands of hobbyists who have discovered this incredible (and educational) platform. Written by the co-founder of the Arduino project, with illustrations by Elisa Canducci, Getting Started with Arduino gets you in on the fun! This 128-page book is a greatly expanded follow-up to the author's original short PDF that's available on the Arduino website.
This book supersedes ISBN 9780596550066, from O'Reilly.
The CWNA: Certified Wireless Network Administrator Official Study Guide: Exam CWNA-106 is the officially endorsed CWNA test prep for the leading wireless certification. Expert authors and CWNEs David D. Coleman and David A. Westcott guide readers through the skills and concepts candidates need to know for the exam, using hands-on methods to convey an in-depth understanding of wireless network administration. Readers should have a basic knowledge of Radio Frequency behavior, experience with WLAN hardware peripherals and protocols, and an interest in designing, installing, and managing wireless networks.
Wireless technology is taking over the tech industry, and the demand for competent, certified professionals is far outpacing the supply. A CWNA certification denotes advanced-level proficiency in the field, with a complete understanding of wireless LAN components, features, and function—but the only way to pass the exam is to truly understand the material, not just the talking points. The CWNA: Certified Wireless Network Administrator Official Study Guide thoroughly covers each exam objective, and includes review questions, assessment tests, and exercises to test your skills. Topics include:Radio Frequency technologies, regulations, and standards 802.11 protocols Network implementation and security 802.11 RF site surveying
Readers also get access to a suite of study tools including an electronic test engine with hundreds or practice test questions, electronic flashcards, exercise peripherals, and industry White Papers, which serve as valuable backup references. In preparing for the CWNA-106 exam, the ideal study guide should cover all of the exam topics in depth—CWNA: Certified Wireless Network Administrator Official Study Guide does just that, making it an excellent, comprehensive study guide.
If you have an aptitude for mathematics and some programming skills, author Joel Grus will help you get comfortable with the math and statistics at the core of data science, and with hacking skills you need to get started as a data scientist. Today’s messy glut of data holds answers to questions no one’s even thought to ask. This book provides you with the know-how to dig those answers out.Get a crash course in PythonLearn the basics of linear algebra, statistics, and probability—and understand how and when they're used in data scienceCollect, explore, clean, munge, and manipulate dataDive into the fundamentals of machine learningImplement models such as k-nearest Neighbors, Naive Bayes, linear and logistic regression, decision trees, neural networks, and clusteringExplore recommender systems, natural language processing, network analysis, MapReduce, and databases
If you want to find out how to use Python to start answering critical questions of your data, pick up Python Machine Learning – whether you want to get started from scratch or want to extend your data science knowledge, this is an essential and unmissable resource.What You Will LearnExplore how to use different machine learning models to ask different questions of your dataLearn how to build neural networks using Keras and TheanoFind out how to write clean and elegant Python code that will optimize the strength of your algorithmsDiscover how to embed your machine learning model in a web application for increased accessibilityPredict continuous target outcomes using regression analysisUncover hidden patterns and structures in data with clusteringOrganize data using effective pre-processing techniquesGet to grips with sentiment analysis to delve deeper into textual and social media dataIn Detail
Machine learning and predictive analytics are transforming the way businesses and other organizations operate. Being able to understand trends and patterns in complex data is critical to success, becoming one of the key strategies for unlocking growth in a challenging contemporary marketplace. Python can help you deliver key insights into your data – its unique capabilities as a language let you build sophisticated algorithms and statistical models that can reveal new perspectives and answer key questions that are vital for success.
Python Machine Learning gives you access to the world of predictive analytics and demonstrates why Python is one of the world's leading data science languages. If you want to ask better questions of data, or need to improve and extend the capabilities of your machine learning systems, this practical data science book is invaluable. Covering a wide range of powerful Python libraries, including scikit-learn, Theano, and Keras, and featuring guidance and tips on everything from sentiment analysis to neural networks, you'll soon be able to answer some of the most important questions facing you and your organization.Style and approach
Python Machine Learning connects the fundamental theoretical principles behind machine learning to their practical application in a way that focuses you on asking and answering the right questions. It walks you through the key elements of Python and its powerful machine learning libraries, while demonstrating how to get to grips with a range of statistical models.
Updated for the latest versions of this popular database, this edition covers many complex features that have been added to MySQL 5.0 and 5.1, including a section dedicated to stored procedures and triggers. After a brief introduction on installation and initial setup, the book explains: How to configure MySQL, such as setting the root passwordMySQL data types, including numerics, strings, dates, and complex typesSQL syntax, commands, data types, operators, and functionsArithmetic, comparison and logical operatorsAggregate and general functionsStored procedures and triggers, including procedure definition, procedure calls, procedure management, cursors, and triggersYou don't have time to stop and thumb through an exhaustive reference when you're hard at work. This portable and affordable guide is small enough to fit into your pocket, and gives you a convenient reference that you can consult anywhere. When you reach a sticking point and need to get to a solution quickly, the MySQL Pocket Reference is the book you want to have.
Updated for R 2.14 and 2.15, this second edition includes new and expanded chapters on R performance, the ggplot2 data visualization package, and parallel R computing with Hadoop.Get started quickly with an R tutorial and hundreds of examplesExplore R syntax, objects, and other language detailsFind thousands of user-contributed R packages online, including BioconductorLearn how to use R to prepare data for analysisVisualize your data with R’s graphics, lattice, and ggplot2 packagesUse R to calculate statistical fests, fit models, and compute probability distributionsSpeed up intensive computations by writing parallel R programs for HadoopGet a complete desktop reference to R
If you just bought an Android Wear smartwatch, you need this book... because there is no comprehensive manual in the box that tells you how to get up-and-running (and more) with your new device.
If you're thinking about buying an LG G Watch, Samsung Gear Live, Motorola Moto 360 or any other Android Wear watch, you need this book... because it will help you decide which watch is right for you.
From theory (about smart watches in general and Google's Android Wear in particular) to practice (with hands-on demonstrated features, tips and tricks) our warts 'n' all coverage will help you to decide which watch to buy plus how to use it when you've bought it.
Like all our books at smartwatchbooks.info, it's an "unofficial" book because we haven't colluded with the manufacturers during the writing of the book. So we can tell it like it really is. And best of all, this first edition is a relatively cheap and definitely cheerful guide to Android Wear.
ABOUT THE SMARTWATCH REVOLUTION
ABOUT THE BOOK
1 – A BRIEF HISTORY OF SMART WATCHES
2 – INTRODUCING THE ANDROID WEAR WATCHES
THE ANDROID WEAR WATCHES
SIMILAR, BUT NOT THE SAME
ANDROID WEAR COMMON FEATURES
THE TEST VEHICLE(S)
3 – GETTING STARTED WITH YOUR WEAR WATCH
WHAT’S IN THE BOX?
CHARGING THE WATCH
PAIRING YOUR WEAR WATCH WITH YOUR ANDROID SMARTPHONE
INTERACTING WITH YOUR WEAR WATCH
4 – INTERACTING WITH ANDROID WEAR
NAVIGATING THE NOTIFICATIONS
NOW YOU’RE TALKING!
LOOK WHO’S TALKING TOO
5 – THE ANDROID WEAR SMARTPHONE APP
CONFIGURING VOICE ACTIONS
6 – WEAR WATCH STANDALONE FUNCTIONS
FROM FUNCTIONS TO APPS
7 – SMARTWATCH USAGE SCENARIOS
TELEPHONE CALL HANDLING
GMAIL, SMS AND HANGOUTS MESSAGING
CHROMECAST REMOTE CONTROL
8 – ANDROID WEAR ADDITIONAL APPS
THERE’S NO SUCH THING AS AN ANDROID WEAR APP
CALCULATOR AND WEAR MINI LAUNCHER
THE PROBLEM WITH PAID APPS
9 – ANDROID WEAR DEVELOPER NOTES
ADDING WEARABLE FEATURES TO NOTIFICATIONS
CREATING WEARABLE APPS
SENDING AND SYNCING DATA
TAKING SCREENSHOTS FROM AN ANDROID WEAR WATCH
10 – ANDROID WEAR VS. OTHER SMART WATCHES
ANDROID WEAR VERSUS PEBBLE
ANDROID WEAR VERSUS SONY SMARTWATCH 2
ANDROID WEAR VERSUS SAMSUNG GALAXY GEAR
ANDROID WEAR VERSUS OMATE TRUESMART OR EC309 TIGON
11 – SMART WATCHES ARE NOT THE ONLY WEARABLES
ANDROID WEAR WATCHES VS. GOOGLE GLASS
THE FUTURE FORM FACTOR(S)
HOW DID WE HELP YOU?
Companion web site at androidwear.smartwatchbooks.info
Inside, you’ll learn about:Interaction design and physical computing The Arduino hardware and software development environment Basics of electricity and electronics Prototyping on a solderless breadboard Drawing a schematic diagram
Getting started with Arduino is a snap. To use the introductory examples in this guide, all you need an Arduino Uno or earlier model, along with USB A-B cable and an LED. The easy-to-use Arduino development environment is free to download.
Join hundreds of thousands of hobbyists who have discovered this incredible (and educational) platform. Written by the co-founder of the Arduino project, Getting Started with Arduino gets you in on all the fun!
Projects and tutorials include:Controlling devices over BluetoothUsing Python and Arduino programming environments on EdisonTracking objects with a webcam and OpenCVResponding to voice commands and talking backUsing and configuring Linux on Edison
You’ll start with an introduction to Spark and its ecosystem, and then dive into patterns that apply common techniques—classification, collaborative filtering, and anomaly detection among others—to fields such as genomics, security, and finance. If you have an entry-level understanding of machine learning and statistics, and you program in Java, Python, or Scala, you’ll find these patterns useful for working on your own data applications.
Patterns include:Recommending music and the Audioscrobbler data setPredicting forest cover with decision treesAnomaly detection in network traffic with K-means clusteringUnderstanding Wikipedia with Latent Semantic AnalysisAnalyzing co-occurrence networks with GraphXGeospatial and temporal data analysis on the New York City Taxi Trips dataEstimating financial risk through Monte Carlo simulationAnalyzing genomics data and the BDG projectAnalyzing neuroimaging data with PySpark and Thunder
The potential user base and the wide array of available high-performance devices makes Android an attractive target for aspiring game developers. Do you have an awesome idea for the next break-through mobile gaming title? Beginning Android Games will help you kick-start your project. This book will guide you through the process of making several example game apps using APIs available in new Android SDK and earlier SDK releases for Android smartphones and tablets:The fundamentals of game development and design suitable for Android smartphones and tablets The Android platform basics to apply those fundamentals in the context of making a game, including new File Manager system and better battery life management The design of 2D and 3D games and their successful implementation on the Android platform
This book lets developers see and use some Android SDK Jelly Bean; however, this book is structured so that app developers can use earlier Android SDK releases. This book is backward compatible like the Android SDK.
This updated second edition provides guidance for database developers, advanced configuration for system administrators, and an overview of the concepts and use cases for other people on your project. Ideal for NoSQL newcomers and experienced MongoDB users alike, this guide provides numerous real-world schema design examples.Get started with MongoDB core concepts and vocabularyPerform basic write operations at different levels of safety and speedCreate complex queries, with options for limiting, skipping, and sorting resultsDesign an application that works well with MongoDBAggregate data, including counting, finding distinct values, grouping documents, and using MapReduceGather and interpret statistics about your collections and databasesSet up replica sets and automatic failover in MongoDBUse sharding to scale horizontally, and learn how it impacts applicationsDelve into monitoring, security and authentication, backup/restore, and other administrative tasks
Rather than run through all possible scenarios, this pragmatic operations guide calls out what works, as demonstrated in critical deployments.Get a high-level overview of HDFS and MapReduce: why they exist and how they workPlan a Hadoop deployment, from hardware and OS selection to network requirementsLearn setup and configuration details with a list of critical propertiesManage resources by sharing a cluster across multiple groupsGet a runbook of the most common cluster maintenance tasksMonitor Hadoop clusters—and learn troubleshooting with the help of real-world war storiesUse basic tools and techniques to handle backup and catastrophic failure
"Building a Scalable Data Warehouse" covers everything one needs to know to create a scalable data warehouse end to end, including a presentation of the Data Vault modeling technique, which provides the foundations to create a technical data warehouse layer. The book discusses how to build the data warehouse incrementally using the agile Data Vault 2.0 methodology. In addition, readers will learn how to create the input layer (the stage layer) and the presentation layer (data mart) of the Data Vault 2.0 architecture including implementation best practices. Drawing upon years of practical experience and using numerous examples and an easy to understand framework, Dan Linstedt and Michael Olschimke discuss:
How to load each layer using SQL Server Integration Services (SSIS), including automation of the Data Vault loading processes.
Important data warehouse technologies and practices.
Data Quality Services (DQS) and Master Data Services (MDS) in the context of the Data Vault architecture.Provides a complete introduction to data warehousing, applications, and the business context so readers can get-up and running fast Explains theoretical concepts and provides hands-on instruction on how to build and implement a data warehouseDemystifies data vault modeling with beginning, intermediate, and advanced techniquesDiscusses the advantages of the data vault approach over other techniques, also including the latest updates to Data Vault 2.0 and multiple improvements to Data Vault 1.0
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.
By reading this definitive tutorial and reference, you'll gain the knowledge and experience to create stunning, cutting-edge Android apps that can make you money, while keeping you agile enough to respond to changes in the future.
Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You’ll also get real-world examples that demonstrate how you can apply these concepts to your use cases.Understand the challenges of securing distributed systems, particularly HadoopUse best practices for preparing Hadoop cluster hardware as securely as possibleGet an overview of the Kerberos network authentication protocolDelve into authorization and accounting principles as they apply to HadoopLearn how to use mechanisms to protect data in a Hadoop cluster, both in transit and at restIntegrate Hadoop data ingest into enterprise-wide security architectureEnsure that security architecture reaches all the way to end-user access
If you administer a DNS system or are thinking about running one, or if you need to upgrade to support IPv6 DNS, need to secure a DNS for zone transfer, dynamic update, or other reasons, or if you need to implement DNSSEC, or simply want to understand the DNS system, then this book provides you with a single point of reference. Pro DNS and BIND starts with simple concepts, then moves on to full security-aware DNSSEC configurations. Various features, parameters, and resource records are described and, in the majority of cases, illustrated with one or more examples.
The book contains a complete reference to zone files, Resource Records, and BINDs configuration file parameters. You can treat the book as as a simple paint-by-numbers guide to everything from a simple caching DNS, to the most complex secure DNS (DNSSEC) implementation. Background information is still included for when you need to know what to do and why you have to do it, and so that you can modify processes to meet your unique needs.
Written by the developers of Spark, this book will have data scientists and engineers up and running in no time. You’ll learn how to express parallel jobs with just a few lines of code, and cover applications from simple batch jobs to stream processing and machine learning.Quickly dive into Spark capabilities such as distributed datasets, in-memory caching, and the interactive shellLeverage Spark’s powerful built-in libraries, including Spark SQL, Spark Streaming, and MLlibUse one programming paradigm instead of mixing and matching tools like Hive, Hadoop, Mahout, and StormLearn how to deploy interactive, batch, and streaming applicationsConnect to data sources including HDFS, Hive, JSON, and S3Master advanced topics like data partitioning and shared variables
The book is aimed at mobile telecommunication professionals, who want to understand what LTE is and how it works. It is invaluable for engineers who are working on LTE, notably those who are transferring from other technologies such as UMTS and cdma2000, those who are experts in one part of LTE but who want to understand the system as a whole, and those who are new to mobile telecommunications altogether. It is also relevant to those working in non technical roles, such as project managers, marketing executives and intellectual property consultants. On completing the book, the reader will have a clear understanding of LTE, and will be able to tackle the more specialised books and the 3GPP specifications with confidence.
Key features -Covers the latest developments in release 10 of the 3GPP specifications, including the new capabilities of LTE-Advanced Includes references to individual sections of the 3GPP specifications, to help readers understand the principles of each topic before going to the specifications for more detailed information Requires no previous knowledge of mobile telecommunications, or of the mathematical techniques that LTE uses for radio transmission and reception
This book offers practical answers to some of the hardest questions faced by PL/SQL developers, including:What is the best way to write the SQL logic in my application code?
How should I write my packages so they can be leveraged by my entire team of developers?
How can I make sure that all my team's programs handle and record errors consistently?Oracle PL/SQL Best Practices summarizes PL/SQL best practices in nine major categories: overall PL/SQL application development; programming standards; program testing, tracing, and debugging; variables and data structures; control logic; error handling; the use of SQL in PL/SQL; building procedures, functions, packages, and triggers; and overall program performance.
This book is a concise and entertaining guide that PL/SQL developers will turn to again and again as they seek out ways to write higher quality code and more successful applications.
"This book presents ideas that make the difference between a successful project and one that never gets off the ground. It goes beyond just listing a set of rules, and provides realistic scenarios that help the reader understand where the rules come from. This book should be required reading for any team of Oracle database professionals."
--Dwayne King, President, KRIDAN Consulting
Implementations, as well as interesting, real-world examples of each data structure and algorithm, are included.
Using both a programming style and a writing style that are exceptionally clean, Kyle Loudon shows you how to use such essential data structures as lists, stacks, queues, sets, trees, heaps, priority queues, and graphs. He explains how to use algorithms for sorting, searching, numerical analysis, data compression, data encryption, common graph problems, and computational geometry. And he describes the relative efficiency of all implementations. The compression and encryption chapters not only give you working code for reasonably efficient solutions, they offer explanations of concepts in an approachable manner for people who never have had the time or expertise to study them in depth.
Anyone with a basic understanding of the C language can use this book. In order to provide maintainable and extendible code, an extra level of abstraction (such as pointers to functions) is used in examples where appropriate. Understanding that these techniques may be unfamiliar to some programmers, Loudon explains them clearly in the introductory chapters.
Contents include:PointersRecursionAnalysis of algorithmsData structures (lists, stacks, queues, sets, hash tables, trees, heaps, priority queues, graphs)Sorting and searchingNumerical methodsData compressionData encryptionGraph algorithmsGeometric algorithms
Iridium the satellite system was a mind-boggling technical accomplishment, surely the future of communication. The only problem was that Iridium the company was a commercial disaster. Only months after launching service, it was $11 billion in debt, burning through $100 million a month and crippled by baroque rate plans and agreements that forced calls through Moscow, Beijing, Fucino, Italy, and elsewhere. Bankruptcy was inevitable—the largest to that point in American history. And when no real buyers seemed to materialize, it looked like Iridium would go down as just a “science experiment.”
That is, until Dan Colussy got a wild idea. Colussy, a former head of Pan-Am now retired and working on his golf game in Palm Beach, heard about Motorola’s plans to “de-orbit” the system and decided he would buy Iridium and somehow turn around one of the biggest blunders in the history of business.
In Eccentric Orbits, John Bloom masterfully traces the conception, development, and launching of Iridium and Colussy’s tireless efforts to stop it from being destroyed, from meetings with his motley investor group, to the Clinton White House, to the Pentagon, to the hunt for customers in special ops, shipping, aviation, mining, search and rescue—anyone who would need a durable phone at the end of the Earth. Impeccably researched and wonderfully told, Eccentric Orbits is a rollicking, unforgettable tale of technological achievement, business failure, the military-industrial complex, and one of the greatest deals of all time.
How is Office for iPad different from Office on your Mac or PC? Which features do the Office for iPad apps have, which do they lack, and how can you work around their limitations? How can you share your files among the different versions of Office? How quickly can you work without the physical keyboard and keyboard shortcuts you're used to -- and which keyboard shortcuts can you use if you connect a hardware keyboard to your iPad?
Whether you plan to write a few letters or your dissertation, run your home office away from home, or use your iPad for daily business, Pro Office for iPad will show you how to get the most out of Word, Excel, and other Office apps on your iPad. Enjoy your new freedom and still be as productive as ever with the skills and techniques you'll learn in Pro Office for iPad.
—Tom Vanderbilt, New York Times bestselling author of Traffic
In Tubes, Andrew Blum, a correspondent at Wired magazine, takes us on an engaging, utterly fascinating tour behind the scenes of our everyday lives and reveals the dark beating heart of the Internet itself. A remarkable journey through the brave new technological world we live in, Tubes is to the early twenty-first century what Soul of a New Machine—Tracy Kidder’s classic story of the creation of a new computer—was to the late twentieth.
OS X and iOS Kernel Programming provides an incisive and complete introduction to the XNU kernel, which runs iPhones, iPads, iPods, and Mac OS X servers and clients. Then, you’ll expand your horizons to examine Mac OS X and iOS system architecture. Understanding Apple’s operating systems will allow you to write efficient device drivers, such as those covered in the book, using I/O Kit.
With OS X and iOS Kernel Programming, you’ll:Discover classical kernel architecture topics such as memory management and thread synchronization Become well-versed in the intricacies of the kernel development process by applying kernel debugging and profiling tools Learn how to deploy your kernel-level projects and how to successfully package them Write code that interacts with hardware devices Examine easy to understand example code that can also be used in your own projects Create network filters
Whether you’re a hobbyist, student, or professional engineer, turn to OS X andiOS Kernel Programming and find the knowledge you need to start developing
Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion to combat cybercrime, an average of nearly $200 per victim.
Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover.Provides step-by-step instructions on how to investigate crimes onlineCovers how new software tools can assist in online investigationsDiscusses how to track down, interpret, and understand online electronic evidence to benefit investigationsDetails guidelines for collecting and documenting online evidence that can be presented in court
In this third edition of a widely acclaimed resource, three networking experts share their extensive experience, teaching you the cabling skills you need to build a reliable, efficient, and cost-effective network cabling infrastructure. As you master these techniques, you'll learn to avoid common pitfalls and troubleshoot problems as quickly as they arise. Coverage includes:Choosing the right cables and components for your network architecture and topology Avoiding unnecessary and unexpected costs Understanding the current limitations of data communications and network cabling Understanding how laws and building codes constrain cabling Understanding the function and importance of universal cabling standards Determining when you have a cabling-related network problem Assembling a complete cabling toolkit Integrating voice and data on the same cable system Setting up an infrastructure in which desktops, printers, copiers, and other nodes share cabling Understanding issues of bandwidth, impedance, resistance, attenuation, crosstalk, capacitance, propagation, delay, and delay skew Working effectively with USB and Firewire Knowing when to discard legacy cabling and begin anew Documenting your cabling Creating an RFP and selecting a vendor
This second edition introduces new material for the current state of the industry, such as the new features of LTE in Releases 11 and 12, notably coordinated multipoint transmission and proximity services; the main short- and long-term solutions for LTE voice calls, namely circuit switched fallback and the IP multimedia subsystem; and the evolution and current state of the LTE market. It also extends some of the material from the first edition, such as inter-operation with other technologies such as GSM, UMTS, wireless local area networks and cdma2000; additional features of LTE Advanced, notably heterogeneous networks and traffic offloading; data transport in the evolved packet core; coverage and capacity estimation for LTE; and a more rigorous treatment of modulation, demodulation and OFDMA. The author breaks down the system into logical blocks, by initially introducing the architecture of LTE, explaining the
techniques used for radio transmission and reception and the overall operation of the system, and concluding with more specialized topics such as LTE voice calls and the later releases of the specifications. This methodical approach enables readers to move on to tackle the specifications and the more advanced texts with confidence.
Power View is Microsoft's ground-breaking tool for ad-hoc data visualization and analysis. It's designed to produce elegant and visually arresting output. It's also built to enhance user experience through polished interactivity. Power Map is a similarly powerful mechanism for analyzing data across geographic and political units. Power Query lets you load, shape and streamline data from multiple sources. PowerPivot can extend and develop data into a dynamic model. Power BI allows you to share your findings with colleagues, and present your insights to clients.
High Impact Data Visualization with Power View, Power Map, and Power BI helps you master this suite of powerful tools from Microsoft. You'll learn to identify data sources, and to save time by preparing your underlying data correctly. You'll also learn to deliver your powerful visualizations and analyses through the cloud to PCs, tablets and smartphones.Simple techniques take raw data and convert it into information.Slicing and dicing metrics delivers interactive insight.Visually arresting output grabs and focuses attention on key indicators.
LTE for UMTS is one of the first books to provide a comprehensive guide to the standards and technologies of LTE. Key features of the book include:Covers all the key aspects of LTE in a systematic manner Presents full description of 3GPP Release 8 LTE Examines the expected performance of LTE Written by experts actively involved in the 3GPP standards and product development.
New to this edition:
The Backstage is introduced (a new Office 2013 feature); all the ‘external’ operations like Save, Print etc. are now in one placeThe chapter on charting is totally revised and updated – Excel 2013 differs greatly from earlier versionsIncludes many new end-of-chapter problems Most chapters have been edited to improve readability
This book supersedes ISBN 9780596550066, from O'Reilly.
--Hans Camenzind, inventor of the 555 timer (the world's most successful integrated circuit), and author of Much Ado About Almost Nothing: Man's Encounter with the Electron (Booklocker.com)
"A fabulous book: well written, well paced, fun, and informative. I also love the sense of humor. It's very good at disarming the fear. And it's gorgeous. I'll be recommending this book highly."
--Tom Igoe, author of Physical Computing and Making Things Talk
Want to learn the fundamentals of electronics in a fun, hands-on way? With Make: Electronics, you'll start working on real projects as soon as you crack open the book. Explore all of the key components and essential principles through a series of fascinating experiments. You'll build the circuits first, then learn the theory behind them!
Build working devices, from simple to complex You'll start with the basics and then move on to more complicated projects. Go from switching circuits to integrated circuits, and from simple alarms to programmable microcontrollers. Step-by-step instructions and more than 500 full-color photographs and illustrations will help you use -- and understand -- electronics concepts and techniques.Discover by breaking things: experiment with components and learn from failure Set up a tricked-out project space: make a work area at home, equipped with the tools and parts you'll need Learn about key electronic components and their functions within a circuit Create an intrusion alarm, holiday lights, wearable electronic jewelry, audio processors, a reflex tester, and a combination lock Build an autonomous robot cart that can sense its environment and avoid obstacles Get clear, easy-to-understand explanations of what you're doing and why
This edition has been thoroughly revised and updated to reflect the large extensions to LTE as introduced in 3GPP Releases 12 and 13 and the role of LTE in the upcoming 5G era. New to this edition includes updated content on:
4G and 5G Radio Access Spectrum for 4G and 5G Machine-Type Communication Device-to-Device Communication License-assisted Access Full-dimension MIMOSmall-cell enhancements, eIMTA, FDD+TDD aggregation, dual connectivity Requirements on and general structure of 5G wireless access, addressing the existing and new usage scenarios for 5GTechnical solutions for the new 5G radio-access technology
The authors of this book all work at Ericsson Research and have been deeply involved in 3G and 4G development and standardization. They are leading experts in the field and are today actively contributing to the standardization of 4G and 5G within 3GPP.The leading book on 3GPP specifications for LTE, LTE-Advanced, and LTE-Advanced Pro covering up to and including Release 13, written by Ericsson engineers who are heavily involved in the development of 3GPP specificationsTen new chapters and coverage of all major features introduced with Release 12 and 13Two completely new chapters on 5G wireless access including a detailed description of the key technology components under development by 3GPP