Display search results for ** instead (61 products)

Showing 1-10 of 61

Access to digital media in various formats is possible with unparalleled ease. In the late 1990s, the advent of MP3 music encoding was an advance that heralded the expansion of the digital music market. Piracy, however, has become a constant threat to music revenue, especially after the peer-to-peer movement spawned Napster.

USD 500.00

USD 375.00 save 25 %

With the start of 2015, the 2nd half of the smartphone era has begun. A post-smartphone vision is emerging, with the smartphone as the centre of a network of sensors. These sensors will be embedded in wristbands, clothing, and everyday items such as locks, lights, and thermostats.

USD 500.00

USD 375.00 save 25 %

Enterprise buzz surrounding cloud computing has largely focussed on the self-service model, as popularized by Amazon Web Services (AWS). This multi-tenant, public cloud offering provides compute and storage resources on a pay-per-use basis, yet as enterprises increasingly look to migrate to cloud platforms, their requirements are expanding beyond t...

USD 500.00

USD 375.00 save 25 %

 

USD 500.00

USD 375.00 save 25 %

The UK government has abandoned its search for a provider of extended coverage for the proposed national Emergency Services Network (ESN). The move is a vote of confidence in the country’s mobile network operators (MNOs) who each say they can be trusted as the sole national provider of sufficient coverage in remote and rural areas.

USD 500.00

USD 375.00 save 25 %

Oculus Rift caused a stir at the Consumer Electronics Show (CES) 2014 with its futuristic vision of virtual reality (VR) integrated into everyday life and its impressive head-tracking and optical technology. A year later, at CES 2015, a number of competitors have emerged.

USD 500.00

USD 375.00 save 25 %

Commercial drones, or unmanned aerial vehicles (UAVs), are a synthesis of aerial precision robotics, computer vision, and artificial intelligence technologies. UAVs are able to navigate semi-autonomously and perform a variety of tasks, most often involving imaging or payload-bearing capabilities, depending on their individual components.

USD 500.00

USD 375.00 save 25 %

Newspaper headlines about security breaches are becoming an all too common occurrence. Nowadays, CISOs (Chief Information Security Officers) are painfully aware that their networks are being assaulted by sophisticated threat actors targeting their companies’ financial assets and intellectual property.

USD 500.00

USD 375.00 save 25 %

Web applications have become the de facto standard for all types of applications and usually have access (direct or indirect) to critical network resources such as databases and various back-end systems. Easy and cheap to develop and deploy, Web applications offer outstanding compatibility with all platforms

USD 500.00

USD 375.00 save 25 %

The wearable technologies opportunity was a hot topic at the Mobile World Congress 2015 in Barcelona, with major global device manufacturers launching their brands of wearable devices alongside smaller, niche wearable device companies attempting to create their own space in the market.

USD 500.00

USD 375.00 save 25 %

Showing 1-10 of 61