Start & Run a Computer Repair Service is ideal for entrepreneurs interested in opening and operating a computer repair shop and/or mobile on-site repair business. Professionals with a background i
Unlock your quilting potential with 155 free-motion patterns to fit every space in your quilt. Use the designs as they are or learn how to use computer graphics technology from master quilter Jessica
Mixing medical records with computer technology makes good medicine. This book provides practical guidance on using information systems effectively to answer questions of concern to those responsible
Type It Right! the little black book for your computer describes everything you'll need to know to create correctly-typed documents! Type It Right! represents a compilation of information and advice f
A computer-based decision-support tool, called the Coastal Protection and Restoration Authority (CPRA) Planning Tool, provided technical analysis that supported the development of Louisiana’s Comprehe
Terrorist organizations use many technologies as they plan and stage attacks. This book explores the purpose and manner of the use of communication and computer technologies, their net effect, and sec
It's raining again, and you've read all your books and played with all your toys, so what can you do until the sun comes out again? Instead of sitting in front of a computer or TV screen, why not make
Narrators in this volume include a Navy veteran turned computer programmer analyst, a dutiful housewife bored by her humdrum life, a young schoolboy eager to learn yoga and a purposeless college gradu
Have you ever wondered why ice cubes stick together when they are thrown into a glass? Or why we can't tickle ourselves? Or why do computer and TV screens buffer before a mobile phone rings? The book
Whether computer-animated light installations, light projections or mechanical media surfaces, it is impossible to imagine contemporary architecture without media facaes. This volume "Urban Media Cul
Passwords are proving less and less capable of protecting computer systems from abuse. Multifactor authentication (MFA)?which combines something you know (e.g., a PIN), something you have (e.g., a tok
Examines the process by which different computer applications can be made to work together, exploring such current technologies as distributed objects, object transaction monitors, CORBA, and COM/DCOM
In this engaging piece of detective work, Nicholas Kollerstrom has combined historical research with computer analysis to investigate long-unanswered questions about Newton's lunar theory of 1702 (who
Legal professionals who work in areas where law, science, and technology converge, don't need a PhD to effectively represent their clients, but they do need a grounding in how science and technology a
RAND was asked to evaluate whether the Programming Computation on Encrypted Data program—which expands the knowledge base of the global cryptographic community—is likely to provide more benefits to th
Autonomous vehicle technology has the potential to significantly improve social welfare. This report addresses the numerous legislative, regulatory, and liability issues this technology will raise.
This report on the current and future need for global technology assessment and science and technology information among government and industry decision makers and researchers was conducted by RAND f
Describes the results of a July 2014 workshop in which a diverse group of law enforcement practitioners explored future visions of law enforcement and identified and prioritized needs in technology, p
Your brain needs a software upgrade. It’s still following rules for survival based on the caveman days. Discover why the rules are there and change your programming to live the life you want.
This study reports on strategic planning activities undertaken to support the National Institute of Justice in the area of information technology, collecting and analyzing data on law enforcement need
Research has shown that students1 skills and knowledge often deteriorate during the summer months, with low-income students facing the largest losses. School districts and summer programming providers
This document provides an account of a Technology Seminar Game that brought together military operators and civilian scientists and technologists to examine future Army force development issues.
Explores how wars were and are conducted from 1700 to the present, including how changing technology and weaponry have affected the overall strategy and motivation of warfare.
Two humans find their way off planet, moving into a galaxy populated with countless aliens. They learn that humans are not native to earth, but were exiled there, and robbed of all technology. With th
Explores world history, covering such topics as ancient civilizations, exploration and discovery, medicine, religion, warfare, weapons, and science and technology.
In 2013, the National Energy Technology Laboratory (NETL) asked RAND to work closely with the Community and Technical College System of West Virginia on a collaborative strategy for preparing the loca
This is one book in the ABA Consumer Guide Series. This volume examines assisted reproductive technology, and provides readers with the information needed to understand and navigate the process and to
Learn all about the history, science and technology behind cameras from film to digital and recording images, with hands-on projects to try yourself; for 8 to 12-year-olds.
The story of technology, from simple gears and levers to high-tech gadgets, with science projects to try yourself, perfect for 8-12 year-olds at home or school.
RAND researchers recommend that China should create an innovative health care delivery model based on population health management principles and sophisticated health information technology, rather th
This report presents the findings from an exploratory survey of 3,479 active-duty, guard, and reserve Airmen on their use of information and communication technology (ICT) and the association between
The authors explore options for solving the Navy’s “big data” challenge, considering changes across four dimensions: people, tools and technology, data and data architectures, and demand and demand ma
RAND researchers recommend that China should create an innovative health care delivery model based on population health management principles and sophisticated health information technology, rather th
Discusses current Department of Defense programs and initiatives to improve diversity within the science, technology, engineering, and mathematics (STEM) workforce and offers recommendations for futur
The in-depth reference work “Media Facades – History, Technology and Content” is now sequelled by a stock take: what developments have there been in the last three years? Which kind of media facade ha
This book examines the strategic choices that American and Chinese decisionmakers face regarding sea power in the Western Pacific, shaped by geography, history, technology, and politics. In particular
To reduce the costs of maintaining the Aegis system, and to take advantage of rapidly evolving commercial computing technology, the U.S. Navy is moving toward open-architecture software, a common sour