Xem 1-20 trên 68 kết quả Computer age
  • Tham khảo sách 'hackers & painters: big ideas from the computer age', công nghệ thông tin, kỹ thuật lập trình phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf274p trac2_123 16-04-2013 28 8   Download

  • "The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. " --from Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care?

    pdf274p trac2_123 11-04-2013 22 3   Download

  • The years 1945–55 saw the emergence of a radically new kind of device: the high-speed stored-program digital computer. Secret wartime projects in areas such as code-breaking, radar and ballistics had produced a wealth of ideas and technologies that kick-started this first decade of the Information Age. The brilliant mathematician and code-breaker Alan Turing was just one of several British pioneers whose prototype machines led the way. Turning theory into practice proved tricky, but by 1948 five UK research groups had begun to build practical stored-program computers.

    pdf128p namde01 10-04-2013 29 7   Download

  • Experimental mathematics, a child of our ‘Computer Age’, allows us glimpses into the world of numbers that are breathtaking, not just to mathematicians. Abstract concepts, until recently known only to specialists - for example Feigenbaum diagrams or Julia sets - are becoming vivid objects, which even renew the motivation of students. Beauty and mathematics: they belong together visibly, and not just in the eyes of mathematicians

    pdf410p minhhuy 14-03-2009 86 6   Download

  • With increasing numbers of computers and diffusion of the internet around the world, localisation of the technology and the content it carries into the many languages people speak is becoming an ever more important area for discussion and action. Localisation, simply put, includes translation and cultural adaptation of user interfaces and software applications, as well as the creation and translation of internet content in diverse languages.

    pdf168p quatet 10-01-2013 15 4   Download

  • In Illinois, most people under age 18 learn to drive in high school or at a commercial driv- er training school licensed by the Secretary of State’s office. Approved driver education classes include at least 30 hours of classroom study and six hours of behind-the-wheel training in a regular passenger vehicle. For information about driving a larger vehicle or a motorcycle, please refer to the Rules of the Road for Non-CDL Vehicles, Commercial Driver’s License Study Guide, or Illinois Motorcycle Operator Manual, available at any Driver Services facility or at www.

    pdf89p nhacsihuytuan 13-04-2013 25 3   Download

  • Tham khảo sách 'education in cybernetic age', công nghệ thông tin, kỹ thuật lập trình phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf200p nt18103 24-05-2013 20 2   Download

  • Chapter 7 - Infrastructure, cloud computing, metrics, and business continuity planning: building and sustaining the dynamic enterprise. In this chapter, students will be able to: Describe how a service-oriented architecture can be used as a philosophical approach to help the organization of the future meet all its IT-related needs, define and describe the various hardware and software infrastructure considerations in an organization.

    ppt15p tangtuy17 11-07-2016 3 2   Download

  • Module A - Computer hardware and software. This chapter include objectives: Define information technology (IT) and its two basic categories: hardware and software; describe the categories of computers based on size; compare the roles of personal productivity, vertical market, and horizontal market software; describe the roles of operating system and utility software as components of system software; define the purpose of each of the six major categories of hardware.

    ppt15p tangtuy17 11-07-2016 3 2   Download

  • Module H - Computer crime and digital forensics. This chapter define computer crime and list three types of computer crime that can be perpetrated from inside and three from outside the organization, identify the seven types of hackers and explain what motivates each group, define digital forensics and describe the two phases of a forensic investigation, describe what is meant by anti-forensics and give an example of each of the three types,...

    ppt15p tangtuy17 11-07-2016 2 2   Download

  • Language variationists study how languages vary along geographical or social lines or along lines of age and gender. Variationist data is available and challenging, in particular for DIALECTOLOGY, the study of geographical variation, which will be the focus of this paper, although we present approaches we expect to transfer smoothly to the study of variation correlating with other extralinguistic variables.

    pdf8p bunthai_1 06-05-2013 14 1   Download

  • Chapter 12 - The internet and the world wide web. In this chapter we will discuss: A brief history of the computer, the internet, structure and features of the internet, the evolving internet, economics, feedback, social implications, the future: the evernet.

    ppt31p tangtuy17 11-07-2016 7 1   Download

  • William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security.

    pdf531p cuong4012 22-02-2013 68 23   Download

  • The digital economy—defined by the changing characteristics of information, computing, and communications—is now the preeminent driver of economic growth and social change. With a better understanding of these fundamental transformations, we can make wiser decisions—whether we are investing in research, products, or services, or are adapting our laws and policies to the realities of a new age.

    pdf408p hotmoingay 04-01-2013 43 16   Download

  • Until relatively recent times, most periods of technological development have been linked to changes in the use of materials (eg the stone, bronze and iron ages). In more recent years the driving force for technological change in many respects has shifted towards information technology. This is amply illustrated by the way the humble microprocessor has built intelligence into everyday domestic appliances.

    pdf454p nhatkyvodanh 24-07-2012 47 13   Download

  • We’ve known about algorithms for millennia, but we’ve only been writing computer programs for a few decades. A big difference between the Euclidean or Eratosthenes age and ours is that since the middle of the twentieth century, we express the algorithms we conceive using formal languages: programming languages. Computer scientists are not the only ones who use formal languages. Optometrists, for example, prescribe eyeglasses using very technical expressions, such as “OD: -1.25 (-0.50) 180◦ OS: -1.00 (-0.25) 180◦”, in which the parentheses are essential.

    pdf166p hotmoingay 03-01-2013 36 12   Download

  • You know you're getting old when it takes you a day to configure software...especially when bright−eyed kids half your age accomplish the same thing in two hours flat. This was the thought that crossed my mind when I recently decided to set up my machine for JSP (Java Server Pages) development. I got myself set up, made sure there was plenty of space available on my hard drive, and went to work downloading the software off the Web. And I spent the next ten hours wading through acres and acres of incomprehensible detail while trying to get Apache, mod_jserv and Tomcat to talk nice to...

    pdf18p trungha 31-08-2009 68 11   Download

  • Surveillance systems have become an essential part in most establishments nowadays. There are many uses to these systems in national security, safety in public areas, flow control in crowded scenes, private safety and in providing special care for the aged and disabled. At the heart of any surveillance system are video cameras which have had their numbers significantly multiply over the last decade, thanks to advances in digital networks and automated video processing.

    pdf132p bi_bi1 09-07-2012 23 8   Download

  • We live in the Information Age. This term often alludes to the global economy's shift in focus away from the Industrial Age. The relatively recent field of information technology concerns the use of computer-based information systems to convert, store, protect, process, transmit and retrieve information. Technological advances in this field have changed lifestyles all over the world.

    pdf350p bi_bi1 11-07-2012 41 8   Download

  • As multimedia-enabled mobile devices such as smart phones and tablets are becoming the day-to-day computing device of choice for users of all ages, everyone expects that all mobile multimedia applications and services should be as smooth and as high-quality as the desktop experience. The grand challenge in delivering multimedia to mobile devices using the Internet is to ensure the quality of experience that meets the users' expectations, within reasonable costs, while supporting heterogeneous platforms and wireless network conditions. ...

    pdf166p bi_bi1 13-07-2012 37 7   Download

Đồng bộ tài khoản