Start & Run a Computer Repair Service is ideal for entrepreneurs interested in opening and operating a computer repair shop and/or mobile on-site repair business. Professionals with a background i
Unlock your quilting potential with 155 free-motion patterns to fit every space in your quilt. Use the designs as they are or learn how to use computer graphics technology from master quilter Jessica
Mixing medical records with computer technology makes good medicine. This book provides practical guidance on using information systems effectively to answer questions of concern to those responsible
Type It Right! the little black book for your computer describes everything you'll need to know to create correctly-typed documents! Type It Right! represents a compilation of information and advice f
Recommendations to 60 attractive hotels and more than 300 delicious restaurants, representing 50 different cuisines, including 21 styles of regional Chinese cooking.
In this diverse collection of sixteen essays, lectures, and interviews Graham Harman lucidly explains the principles of Speculative Realism, including his own object-oriented philosophy.
XIII, Jones and Betty Barnowsky escaped the deadly trap set by Colonel McCall. Lost in a hostile jungle, they must now make their way back to America. And they must be quick: In Washington, every ally
It's raining again, and you've read all your books and played with all your toys, so what can you do until the sun comes out again? Instead of sitting in front of a computer or TV screen, why not make
Narrators in this volume include a Navy veteran turned computer programmer analyst, a dutiful housewife bored by her humdrum life, a young schoolboy eager to learn yoga and a purposeless college gradu
Have you ever wondered why ice cubes stick together when they are thrown into a glass? Or why we can't tickle ourselves? Or why do computer and TV screens buffer before a mobile phone rings? The book
A computer-based decision-support tool, called the Coastal Protection and Restoration Authority (CPRA) Planning Tool, provided technical analysis that supported the development of Louisiana’s Comprehe
Whether computer-animated light installations, light projections or mechanical media surfaces, it is impossible to imagine contemporary architecture without media facaes. This volume "Urban Media Cul
Passwords are proving less and less capable of protecting computer systems from abuse. Multifactor authentication (MFA)?which combines something you know (e.g., a PIN), something you have (e.g., a tok
Terrorist organizations use many technologies as they plan and stage attacks. This book explores the purpose and manner of the use of communication and computer technologies, their net effect, and sec
Examines the process by which different computer applications can be made to work together, exploring such current technologies as distributed objects, object transaction monitors, CORBA, and COM/DCOM
In this engaging piece of detective work, Nicholas Kollerstrom has combined historical research with computer analysis to investigate long-unanswered questions about Newton's lunar theory of 1702 (who
Legal professionals who work in areas where law, science, and technology converge, don't need a PhD to effectively represent their clients, but they do need a grounding in how science and technology a
RAND was asked to evaluate whether the Programming Computation on Encrypted Data program—which expands the knowledge base of the global cryptographic community—is likely to provide more benefits to th
Autonomous vehicle technology has the potential to significantly improve social welfare. This report addresses the numerous legislative, regulatory, and liability issues this technology will raise.
This report on the current and future need for global technology assessment and science and technology information among government and industry decision makers and researchers was conducted by RAND f
Describes the results of a July 2014 workshop in which a diverse group of law enforcement practitioners explored future visions of law enforcement and identified and prioritized needs in technology, p
Your brain needs a software upgrade. It’s still following rules for survival based on the caveman days. Discover why the rules are there and change your programming to live the life you want.
This study reports on strategic planning activities undertaken to support the National Institute of Justice in the area of information technology, collecting and analyzing data on law enforcement need
Research has shown that students1 skills and knowledge often deteriorate during the summer months, with low-income students facing the largest losses. School districts and summer programming providers
This document provides an account of a Technology Seminar Game that brought together military operators and civilian scientists and technologists to examine future Army force development issues.
Explores how wars were and are conducted from 1700 to the present, including how changing technology and weaponry have affected the overall strategy and motivation of warfare.
Two humans find their way off planet, moving into a galaxy populated with countless aliens. They learn that humans are not native to earth, but were exiled there, and robbed of all technology. With th
Explores world history, covering such topics as ancient civilizations, exploration and discovery, medicine, religion, warfare, weapons, and science and technology.
In 2013, the National Energy Technology Laboratory (NETL) asked RAND to work closely with the Community and Technical College System of West Virginia on a collaborative strategy for preparing the loca
This is one book in the ABA Consumer Guide Series. This volume examines assisted reproductive technology, and provides readers with the information needed to understand and navigate the process and to
Learn all about the history, science and technology behind cameras from film to digital and recording images, with hands-on projects to try yourself; for 8 to 12-year-olds.
The story of technology, from simple gears and levers to high-tech gadgets, with science projects to try yourself, perfect for 8-12 year-olds at home or school.
RAND researchers recommend that China should create an innovative health care delivery model based on population health management principles and sophisticated health information technology, rather th
This report presents the findings from an exploratory survey of 3,479 active-duty, guard, and reserve Airmen on their use of information and communication technology (ICT) and the association between