Angebote zu "Devices" (82 Treffer)

Kategorien

Shops

Internet of Things , Hörbuch, Digital, 1, 40min
9,95 € *
ggf. zzgl. Versand

The Internet of things is a network of mechanical and digital devices like vehicles, home appliances, etc. containing software or sensors and various other devices for network connectivity. This enables the devices to freely connect and exchange data with each other. All these devices are easily identifiable because of their embedded computing system. Internet of things is completely based on the use of modern technologies in our daily errands. Hence, it can be said to be a product of artificial intelligence (AI). It can be a sensor in the smart AC which tells the user to turn it off when a suitable temperature is obtained or it can be a microwave which stops the heating when the set time limit is reached - or any other natural or man-made system that can be assigned an IP address and given with the skill to move data over a network without human involvement. 1. Language: English. Narrator: Andrea Giordani. Audio sample: http://samples.audible.de/bk/acx0/110491/bk_acx0_110491_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 30.05.2020
Zum Angebot
Information technology company Introduction
33,99 € *
ggf. zzgl. Versand

Information technology company Introduction ab 33.99 € als Taschenbuch: Analog Devices Thermocopy BatchMaster Software Mamut LiquidPlanner Platform Computing Gravity Technologies Alliance Global Services FlexSystem Interactive Intelligence Roxio SDRC TOWER Software Sleepycat Software Manugistics. Aus dem Bereich: Bücher, Taschenbücher, Wirtschaft & Soziales,

Anbieter: hugendubel
Stand: 30.05.2020
Zum Angebot
LEMFO LEM5 PRO Watch Phone-1 IMEI, 3G, WiFi, Mu...
199,53 € *
ggf. zzgl. Versand

Key Features:Bluetooth Smart Watch Phone supports one 3G SIM card slotQuad-Core processor and 2GB RAM support basic applications and mediaSupports an abundance of health featuresLem5 Smart Watch Phone The Lem5 smart watch phone lets you enjoy all the trusted Android features straight from your wrist. It comes with 1 IMEI number and supports one 3G SIM card. It comes with a stylish design and has a beautiful 1.39-Inch display. Thanks to its powerful 450mAh battery, you’ll be able to use all its smart features throughout the day without needing to worry about running low on juice. It is furthermore life-waterproof so you won’t have to worry about your watch getting wet.  With Android 5.1 at your disposal, you’ll be able to enjoy a smartphone experience on your wrist. It comes packed with a Quad-Core CPU and 2GB RAM. This hardware provides you with all the power needed to enjoy basic media and Applications. You’ll be treated to 16GB internal memory that offers you with a sufficient amount of space to store your downloaded files, contact information, and pictures.  Speaking of intelligence and health, watches are also equipped with Bluetooth 4, allowing you to synchronize it with your iOS or Android phone. To further increase your user experience, it is equipped with pedometer, sedentary reminder, heart rate monitor, and GPS. These cool features make you use Bluetooth watch as a fitness tool to help you work in a healthier future. The Les1 smart watch phone comes with a 12 months warranty, brought to you by the leader in electronic devices as well as wholesale electronic gadgets.. Manufacturer SpecificationsGeneralOS: Android 5.1CPU: MTK6801 Quad CoreProcessor Speed (max): 1.3GHzRAM: 2GBInternal Memory: 16GBDisplay Size: 1.39 Inch AMOLED DisplayDisplay Resolution: 400x400Touch Lens: Capacitance round touch screenFrequency: 2G: GSM 850/900/1800/1900MHz, 3G: WCDMA 850//1900/2100MHzBluetooth 4.0IMEI Number: 1GPSGoogle playWIFI: 802.11 b/g/nSensor: Distance sensor, Optical sensor, AccelerometerMic and SpeakerBattery Size: 450mAhContinuous Usage Time: Up to 4 HoursBattery Standby: UP to 72 HoursHeart RatePedometerSedentary reminderCompatible OS: Android 4.4/ iOS 9.0 and aboveApp Name:watch helperLife WaterproofCompanion Function (with smartphone) SMS / Phone book syncingMusic PlayHealth: Heart Rate, Pedometer, Take medicine reminder, Sedentary reminderSocial Media Notifications: : Able to check Facebook / Twitter / Email / WechatFind the phonePorts 1 (GSM/WCDMA) SIM card slot – 1x Nano SIMLanguages Chinese, Japanese, Korean, English, French, Russian, German, Portuguese, Arabic,Persian, Italian, Turkish, Thai, Vietnamese, Hindi, Indonesia, Spanish, polish, Hebrew and so on.Media Formats Video: MP4, AVI, FLV, 3GP, 3GPP, MKVAudio: OGG, MP3, ASF, WMA, WAV, MODULE, MIDIGraphic: JPG, PNG, PJEG, BMPE-book files: PDF, TXTDimensions Main Product Dimensions: 26.80 x 2.20 x 0.30 cm (L x W x D)Inner strap length using last hole: 235mmInner strap length using first hole: 175mmMain Product Weight: 60gWeight/dimension is for the main item of this boxed product, to help you compare product sizes before buying: please do not base your shipping calculations on this price - shipping prices depend on your cart contents, shipping destination, and shipping method: please use the checkout to select options and preview shipping price for your total order.Product NotesThe Android OS version on this device cannot be upgraded or flashed and any attempts to modify the default OS will void the warranty. As a wholesaler, we provide no software support, advice, or training regarding the Android operating system and software.Package Contents Smart WatchUSB CableScrewdriverUser ManualEnjoy the following benefits:Orders processed and shipped within 1-3 working day12 month warrantyIn-house QCMember discountsAward winning customer supportQuantity order discountsShipping Only To EUCertification: CE, FCC, RoHS

Anbieter: G2A
Stand: 30.05.2020
Zum Angebot
Business Technology Trends for Beyond 2015: How...
9,95 € *
ggf. zzgl. Versand

Consider this your crystal ball! In the near future, information systems and smart devices will automate many jobs that exist today, changing the nature of skills that are in high demand. As social technologies play a more important role in value creation, skills such as social intelligence and new media literacy, among others, will become increasingly vital for anyone trying to make a decent living. Cloud computing has proven a critical tool to businesses - especially small businesses, for which it hits a particularly sweet spot. With cloud services, small businesses reap the benefits of not having to deploy physical infrastructure like file and email servers, storage systems, or shrink-wrapped software. This book will show that it's not a stretch to say that aside from a locally installed desktop operating system and browser (or, increasingly, from a single mobile device), a lot of today's small business technology needs can be fulfilled almost completely with cloud-based offerings. 1. Language: English. Narrator: Mike Norgaard. Audio sample: http://samples.audible.de/bk/acx0/045324/bk_acx0_045324_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 30.05.2020
Zum Angebot
Mobile software
25,49 € *
ggf. zzgl. Versand

Mobile software ab 25.49 € als Taschenbuch: Client-server model Java Platform Micro Edition List of Google products N-Gage Bolt Browser WebKit Android Market List of digital distribution platforms for mobile devices Mobile business intelligence. Aus dem Bereich: Bücher, Ratgeber, Computer & Internet,

Anbieter: hugendubel
Stand: 30.05.2020
Zum Angebot
The Finesse Factor: How to Build Exceptional Le...
9,95 € *
ggf. zzgl. Versand

When dealing with office politics and interpersonal conflict, how do you “show up”? If you are facing tricky situations, how well do you use tact, emotional intelligence, and forethought regarding impact to handle them?For exceptional leaders, finesse is the key. It is what they possess and how they accomplish objectives. Finesse enables them to influence, motivate, and hold people accountable as they create work environments where employees thrive.In The Finesse Factor, Ryan Lahti shows you the essentials of finesse for exceptional leaders. Based on Dr. Lahti’s multiple decades of practical experience, tested approaches in over 20 industries, and analyses of 10 years of leadership assessment work, this audiobook:  Explains the seven essentials of finesse in STEM organizations via real-life war stories. Lays out a proven method with user-friendly frameworks to help you build proficiency in the finesse essentials.Details specific actions that will help you succeed in each essential.If you are a business leader, especially one who runs an organization driven by science, technology, engineering, and math (STEM), this audiobook is a prime resource to have handy. Leaders in the following industries will benefit from the essentials discussed:Science: health care, medical diagnostics, medical devices, and biotech.Technology: software, semiconductors, information security, consumer electronics, and wireless technologies.Engineering: automotive, aerospace, engineering/construction, and automation/control.Finance: banking, credit, and insurance.Leaders who oversee STEM organizations such as research and development (R&D), information technology (IT), and finance departments will also find increasing finesse invaluable to their ongoing success. This includes CIOs, CFOs, and heads of R&D along with their team members.The Finesse Factor/ 1. Language: English. Narrator: Fred Filbrich. Audio sample: http://samples.audible.de/bk/acx0/147703/bk_acx0_147703_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 30.05.2020
Zum Angebot
Personal Cybersecurity
26,99 € *
ggf. zzgl. Versand

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual users at risk are increasing in step with accelerating mutation rates of malware and cybercriminal delivery systems. Traditional anti-virus software and personal firewalls no longer suffice to guarantee personal security. Users who neglect to learn and adopt the new ways of protecting themselves in their work and private environments put themselves, their associates, and their companies at risk of inconvenience, violation, reputational damage, data corruption, data theft, system degradation, system destruction, financial harm, and criminal disaster. This book shows what actions to take to limit the harm and recover from the damage. Instead of laying down a code of "thou shalt not" rules that admit of too many exceptions and contingencies to be of much practical use, cloud expert Marvin Waschke equips you with the battlefield intelligence, strategic understanding, survival training, and proven tools you need to intelligently assess the security threats in your environment and most effectively secure yourself from attacks. Through instructive examples and scenarios, the author shows you how to adapt and apply best practices to your own particular circumstances, how to automate and routinize your personal cybersecurity, how to recognize security breaches and act swiftly to seal them, and how to recover losses and restore functionality when attacks succeed. What You'll Learn Discover how computer security works and what it can protect us from See how a typical hacker attack works Evaluate computer security threats to the individual user and corporate systems Identify the critical vulnerabilities of a computer connected to the Internet Manage your computer to reduce vulnerabilities to yourself and your employer Discover how the adoption of newer forms of biometric authentication affects you Stop your router and other online devices from being co-opted into disruptive denial of service attacks Who This Book Is For Proficient and technically knowledgeable computer users who are anxious about cybercrime and want to understand the technology behind both attack and defense but do not want to go so far as to become security experts. Some of this audience will be purely home users, but many will be executives, technical managers, developers, and members of IT departments who need to adopt personal practices for their own safety and the protection of corporate systems. Many will want to impart good cybersecurity practices to their colleagues. IT departments tasked with indoctrinating their users with good safety practices may use the book as training material.

Anbieter: buecher
Stand: 30.05.2020
Zum Angebot
Personal Cybersecurity
26,99 € *
ggf. zzgl. Versand

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual users at risk are increasing in step with accelerating mutation rates of malware and cybercriminal delivery systems. Traditional anti-virus software and personal firewalls no longer suffice to guarantee personal security. Users who neglect to learn and adopt the new ways of protecting themselves in their work and private environments put themselves, their associates, and their companies at risk of inconvenience, violation, reputational damage, data corruption, data theft, system degradation, system destruction, financial harm, and criminal disaster. This book shows what actions to take to limit the harm and recover from the damage. Instead of laying down a code of "thou shalt not" rules that admit of too many exceptions and contingencies to be of much practical use, cloud expert Marvin Waschke equips you with the battlefield intelligence, strategic understanding, survival training, and proven tools you need to intelligently assess the security threats in your environment and most effectively secure yourself from attacks. Through instructive examples and scenarios, the author shows you how to adapt and apply best practices to your own particular circumstances, how to automate and routinize your personal cybersecurity, how to recognize security breaches and act swiftly to seal them, and how to recover losses and restore functionality when attacks succeed. What You'll Learn Discover how computer security works and what it can protect us from See how a typical hacker attack works Evaluate computer security threats to the individual user and corporate systems Identify the critical vulnerabilities of a computer connected to the Internet Manage your computer to reduce vulnerabilities to yourself and your employer Discover how the adoption of newer forms of biometric authentication affects you Stop your router and other online devices from being co-opted into disruptive denial of service attacks Who This Book Is For Proficient and technically knowledgeable computer users who are anxious about cybercrime and want to understand the technology behind both attack and defense but do not want to go so far as to become security experts. Some of this audience will be purely home users, but many will be executives, technical managers, developers, and members of IT departments who need to adopt personal practices for their own safety and the protection of corporate systems. Many will want to impart good cybersecurity practices to their colleagues. IT departments tasked with indoctrinating their users with good safety practices may use the book as training material.

Anbieter: buecher
Stand: 30.05.2020
Zum Angebot
Inversion Factor
28,50 € *
ggf. zzgl. Versand

In the past, companies found success with a product-first orientation, they made a thing that did a thing. The Inversion Factor explains why the companies of today and tomorrow will have to abandon the product-first orientation. Rather than asking "How do the products we make meet customer needs?" companies should ask "How can technology help us reimagine and fill a need?" The authors explain how the introduction of "smart" objects connected by the Internet of Things signals fundamental changes for business. The IoT, where real and digital coexist, is powering new ways to meet human needs. The authors chart the evolution of three IoTs - the Internet of Things (devices connected to the Internet), the Intelligence of Things (devices that host software applications), and the Innovation of Things (devices that become experiences). Finally, they offer a blueprint for businesses making the transition to inversion and interviews with leaders of major companies and game-changing startups.

Anbieter: Dodax
Stand: 30.05.2020
Zum Angebot