Listing 1 - 10 of 11 | << page >> |
Sort by
|
Choose an application
Lernen Sie Ihre App effektiv, strukturiert und begeisternd weltweit zu vermarkten. In diesem praxisorientierten Buch erhalten Sie einen prägnanten Überblick von der Idee und Konzeption einer App, über die Entwicklung und die Veröffentlichung der App, bis hin zu ihrer Vermarktung und Weiterentwicklung. Um Ihnen den Weg zu Ihrer App so anschaulich wie möglich zu beschreiben, werden wir in diesem Buch den gesamten Lebenszyklus einer App verfolgen. Dabei liegen die Schwerpunkte auf der nachhaltigen Pflege, also dem Management, und dem Marketing. Außerdem lernen wir Methoden zur Formulierung und laufenden Verbesserung des gesamten App-Geschäftsmodells kennen. Der Inhalt Idee und Konzeption App-Entwicklung und Projektcontrolling Testing und Deployment App Store Marketing Iteratives App-Management Die Zielgruppen App- und Spiele-Entwickler Produktmanager von Apps Marketing-Verantwortliche Der Autor Max Ott ist erfolgreicher App-Entwickler und Vermarkter, Berater und Buchautor. In seiner Praxis berät er Unternehmen, wie sie ihre Apps nicht nur effizient und beeindruckend managen, sondern auch präsentieren. Dazu entwickelte er einerseits Automatisierungstools, anderseits innovative Marketing-Landscapes. Sein Anliegen ist es, Kunden zu helfen einfach, schnell und auf Knopfdruck weltweit und auf jeder Plattform präsent zu sein.
Choose an application
In diesem Buch lernen Sie anschaulich und praxisnah, wie Sie ein gutes Webinar organisieren, produzieren und live durchführen. Sie erhalten Antworten auf die Fragen: Was sind Webinare überhaupt? Wie können Sie das Format „Webinar“ in Ihrem Unternehmen sinnvoll einsetzen? Welche Technik benötigen Sie für gute Webinare? Wie produzieren Sie Präsentationen onlinegerecht? Wie halten Sie ein Webinar überzeugend und fesselnd live? Wie nutzen andere Unternehmen und Organisationen dieses Format heute schon erfolgreich? Sechs Kapitel führen Sie in die Welt der Webinare ein mit vielen Materialien, Checklisten, Plänen und Inspirationshilfen. Auf einer extra Website zum Buch erhalten Sie die wichtigsten Vorlagen zum Herunterladen, ein Bonuskapitel zum Thema Onlinemarketing, Beispiel-Webinare zum Anschauen und viele weitere Informationen. Inhalt: Share-Software - Online-Tools - Online-Methodik - Online-Training - Virtuelle Rhetorik - Limbische Kommunikation - Online-Präsentationen - Collaboration - Webinar-Struktur - PowerPoint-Storyline - Beeindruckende Charts - Stimmübungen - Audiovisuelle Highlights - Organisationsplan - Marketingplan - Leadgenerierung - Best Practice - Links zu Webinaren - Checklisten.
Choose an application
Complex analysis --- Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- IR (information retrieval) --- complexe analyse (wiskunde) --- mobiele netwerken --- software engineering --- computernetwerken --- robots
Choose an application
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International ICST Conference on Mobile and Ubiquitous Systems, MobiQuitous 2010, held in Sydney, Australia, in December 2010. The 24 revised full papers presented were carefully reviewed and selected from 105 submissions. They cover a wide range of topics ranging from papers architectures to toolkits and mechanisms for privacy, energy efficiency and content awareness. In addition there are 11 work in progress papers and a selection of the best poster and workshop papers.
Complex analysis --- Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- IR (information retrieval) --- complexe analyse (wiskunde) --- mobiele netwerken --- software engineering --- computernetwerken --- robots
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the First International ICST Conference on Wireless Communications and Applications, ICWCA 2011, held in Sanya, China, in August 2011. The 43 revised full papers presented were carefully reviewed and selected from around 90 submissions and cover a wide range of topics as mobile ad hoc networks, sensor networks, network architectural design, network protocol design, local area networks, MAC, routing, and transport protocols, quality of service provisioning, reliability and fault tolerance issues, resource allocation and management, signal processing, medical imaging, data aggregation techniques, security and privacy issues, wireless computing and applications for wireless network as smart grid, agriculture, health care, smart home, conditional monitoring, etc.
Choose an application
Choose an application
This book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, held in Sydney, Australia, in May 2008. The 18 revised full papers presented were carefully selected during two rounds of reviewing and improvement. The papers are organized in topical sections on sensing and activity recognition, applications for mobile devices, location in pervasive systems, platforms for pervasive computing, lessons learned from displays, games and health applications, as well as privacy and security.
Ubiquitous computing --- Mobile computing --- Portable computers --- Informatique omniprésente --- Informatique mobile --- Ordinateurs portables --- Congresses. --- Congrès --- Telecommunications --- Computer Science --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Information Technology --- Computer Science (Hardware & Networks) --- Computer science. --- Computer communication systems. --- Special purpose computers. --- Computer security. --- Information storage and retrieval. --- Computer engineering. --- Computer Science. --- Computer Engineering. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Information Storage and Retrieval. --- Computers --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Special purpose computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Design and construction --- Protection --- Security measures --- Distributed processing --- Software engineering. --- Information storage and retrieva. --- Computer software engineering --- Engineering --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the First International ICST Conference on Wireless Communications and Applications, ICWCA 2011, held in Sanya, China, in August 2011. The 43 revised full papers presented were carefully reviewed and selected from around 90 submissions and cover a wide range of topics as mobile ad hoc networks, sensor networks, network architectural design, network protocol design, local area networks, MAC, routing, and transport protocols, quality of service provisioning, reliability and fault tolerance issues, resource allocation and management, signal processing, medical imaging, data aggregation techniques, security and privacy issues, wireless computing and applications for wireless network as smart grid, agriculture, health care, smart home, conditional monitoring, etc.
Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Information Technology --- Computer Science (Hardware & Networks) --- Wireless communication systems --- Mobile communication systems --- Computer science. --- Computer communication systems. --- Computers. --- Algorithms. --- Artificial intelligence. --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Information Systems Applications (incl. Internet). --- Artificial Intelligence (incl. Robotics). --- Computation by Abstract Devices. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algorism --- Algebra --- Arithmetic --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Calculators --- Cyberspace --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Distributed processing --- Computer software. --- Information Systems. --- Artificial Intelligence. --- Software, Computer --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, held in Sydney, Australia, in May 2008. The 18 revised full papers presented were carefully selected during two rounds of reviewing and improvement. The papers are organized in topical sections on sensing and activity recognition, applications for mobile devices, location in pervasive systems, platforms for pervasive computing, lessons learned from displays, games and health applications, as well as privacy and security.
Listing 1 - 10 of 11 | << page >> |
Sort by
|