Internet & Social Media
mobi |eng | 2013-04-23 | Author:Ben Waber [Waber, Ben]
Long Table, Short Table Seemingly lost in this discussion is how the actual furniture that populates offices impacts face-to-face interaction. There are many furniture choices in the workplace: cubicles, long ...
( Category:
Web Development & Design
December 2,2017 )
mobi |eng | 2011-09-26 | Author:Anthony J. Bradley & Mark P. McDonald
Setting Critical Mass Targets The success of a collaborative community will depend on attracting participant contributions. In the most successful social media environments, the vast majority of content comes from ...
( Category:
Internet & Social Media
December 2,2017 )
mobi |eng | 2013-06-24 | Author:Alexandra Samuel
TIP: If you went to a school with strong alumni ties, you may want to do a periodic dig through its alumni profiles. From the “contacts,” drop down in the ...
( Category:
Internet & Social Media
December 2,2017 )
mobi, epub |eng | 2015-04-25 | Author:Daniel Waisberg
Mobile Apps Integrations 79 Step 3: Add Campaign Parameters to Your Links to iTunes This step is very similar to Google Play’s instructions for Android as described in Step 3 ...
( Category:
Processes & Infrastructure
December 2,2017 )
mobi |eng | 2012-10-09 | Author:Nichole Kelly [Kelly, Nichole]
The second dashboard allows the management team to dig a little deeper into the social media metrics, while still providing a high-level overview. You’re probably asking the same question that ...
( Category:
Marketing & Sales
December 2,2017 )
mobi |eng | 2013-06-16 | Author:Ethan Zuckerman [Zuckerman, Ethan]
TAKEN IN CONTEXT THE EARLY 1980S WEREN’T ESPECIALLY KIND TO PAUL SIMON. He ushered in the second decade of his post–Simon & Garfunkel life with One Trick Pony, a forgettable ...
( Category:
Social Sciences
December 2,2017 )
epub, mobi |eng | | Author:2016
If needed, define the data structure normalization function. This almost always has to be a generator function. A structural change can't be applied via map(): from ch08_r02 import row_merge As ...
( Category:
Programming Languages
December 2,2017 )
epub, mobi |eng | 2016-02-28 | Author:Rafal Kuc & Marek Rogozinski [Kuc, Rafal]
Field value factor function The field_value_factor function allows us to influence the score of the document by using a value of the field in that document. For example, to multiply ...
( Category:
Programming
November 29,2017 )
epub |eng | 2013-03-05 | Author:Evgeny Morozov [Morozov, Evgeny]
Against Technological Defeatism Viewed in the abstract, it may seem that the tides of digital preemption, situational crime prevention, and reputation-based controls are unstoppable and irreversible. Information is everywhere, and ...
( Category:
Politics & Government
November 29,2017 )
epub |eng | 2011-10-15 | Author:Evgeny Morozov [Morozov, Evgeny]
No Such Thing as Virtual Politics The danger that “slacktivism” poses in the context of authoritarian states is that it may give young people living there the wrong impression that ...
( Category:
Politics & Government
November 29,2017 )
mobi |eng | 2015-06-02 | Author:Jamie Bartlett
* * * fn1 This ad hoc dealing continues today, often on forums related to prescription drugs. fn2 Charges that Ulbricht, at the time of writing, denies. fn3 In 2014 ...
( Category:
Internet & Social Media
November 29,2017 )
epub, pdf |eng | 2015-05-29 | Author:Shiti Saxena [Saxena, Shiti]
All of this is handled by the Cached case class and its companion object. The case class is defined as follows: case class Cached(key: RequestHeader => String, caching: PartialFunction[ResponseHeader, Duration]) ...
( Category:
Web Development & Design
November 28,2017 )
epub |eng | 2015-03-27 | Author:Corey Gough & Ian Steiner & Winston A. Saunders [Gough, Corey & Steiner, Ian & Saunders, Winston A.]
Policy trigger type Can be any of the following: No policy trigger. Inlet temperature limit (in Celsius). Missing power reading timeout (in 1/10th of a second). Time after host reset ...
( Category:
Computer Science
November 28,2017 )
epub |eng | 2015-09-08 | Author:Andrei Soldatov & Irina Borogan [Soldatov, Andrei & Borogan, Irina]
On the outskirts of St. Petersburg, in a glossy new business center, there is a small company named Protei. The company’s office was a bit chaotic in 2011—they had just ...
( Category:
Politics & Government
November 28,2017 )
epub |eng | 2011-05-09 | Author:Kevin Beaver & Peter T. Davis [Beaver, Kevin & Davis, Peter T.]
Chapter 10: Still at War 171 3. Select the directory where you want to install the program. Use the default unless you have a compelling reason not to do so. ...
( Category:
Internet & Social Media
November 28,2017 )
Categories
Blogging & Blogs | eBay |
E-Commerce | Hacking |
Online Searching | Podcasts & Webcasts |
Search Engine Optimization | Social Media |
Social Media for Business | Web Browsers |
Web Marketing |
Popular ebooks
Deep Learning with Python by François Chollet(12631)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7808)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6442)
Kotlin in Action by Dmitry Jemerov(5089)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3939)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3353)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3101)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2887)
The Art Of Deception by Kevin Mitnick(2621)
Drugs Unlimited by Mike Power(2478)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2448)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2414)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2320)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2274)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2200)
JavaScript by Example by S Dani Akash(2152)
DarkMarket by Misha Glenny(2095)
Wireless Hacking 101 by Karina Astudillo(2091)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2090)
