Products related to Hardware:
-
Complex Digital Hardware Design
This book is about how to design the most complex types of digital circuit boards used inside servers, routers and other equipment, from high-level system architecture down to the low-level signal integrity concepts.It explains common structures and subsystems that can be expanded into new designs in different markets. The book is targeted at all levels of hardware engineers.There are shorter, lower-level introductions to every topic, while the book also takes the reader all they way to the most complex and most advanced topics of digital circuit design, layout design, analysis, and hardware architecture.
Price: 145.00 £ | Shipping*: 0.00 £ -
Global LGBTQ Activism : Social Media, Digital Technologies, and Protest Mechanisms
Focused on understanding and analyzing LGBTQ activism and protest globally, this edited collection brings together voices from different parts of the world to examine LGBTQ protests and their impact. Through the lens of media, culture, and sociopolitical structures, this collection highlights how cultural and technical factors like the emergence of social media and other digital platforms have impacted LGBTQ activism.This book draws on studies from countries as varied as Zimbabwe, Bangladesh, Sri Lanka, Hungary, Morocco, China, and the US.The contributions provide important insight into how social media and digital platforms have provided space for self-expression and protest and encouraged advocacy and empowerment for LGBTQ movements.It also examines the diversity and similarities between different national contexts and the various obstacles faced, while spotlighting countries that are traditionally understudied in Western academia, in an important step toward decolonizing research.Each chapter, through the voices of activists and media scholars, moves beyond an oversimplified examination of queer protests to show, in rich detail, the exciting yet complicated terrain of queer protests throughout the globe. This book is suitable for media, communication, and cultural studies students; researchers; academics; and LGBTQ activists, as well as students and scholars from related academic disciplines.
Price: 35.99 £ | Shipping*: 0.00 £ -
Hardware
What are all the parts of a computer called and what do they all do Find out the answers to these questions and many more inside this book.An easy-to-understand guide that will have you sounding like an expert in no time Computers are everywhere from watches to satellites and toys to vacuum cleaners.Just knowing how to switch computers on is no longer enough.Start your knowledge journey right here in this series for kids who want to be right at the leading edge as computers evolve into the future.
Price: 12.99 £ | Shipping*: 3.99 £ -
Hardware
Price: 15.49 £ | Shipping*: 3.99 £
-
Can PC hardware destroy other hardware?
Yes, PC hardware can potentially destroy other hardware. For example, a malfunctioning power supply unit can send a surge of electricity through the system, damaging other components such as the motherboard, CPU, or RAM. Similarly, a faulty cooling system can lead to overheating, which can cause damage to various hardware components. It is important to ensure that all PC hardware is functioning properly and is compatible with each other to avoid potential damage.
-
Which hardware?
The specific hardware required will depend on the context of the question. Hardware can refer to a wide range of physical components such as computers, smartphones, servers, routers, and other electronic devices. It is important to specify the type of hardware being referred to in order to provide a more accurate answer.
-
Software or hardware?
When deciding between software and hardware, it ultimately depends on the specific needs and goals of the user. Software provides flexibility, scalability, and ease of updates, making it ideal for tasks that require frequent changes or updates. On the other hand, hardware offers reliability, security, and performance for tasks that require high processing power or data storage. It is important to carefully evaluate the requirements of the project or task at hand to determine whether software or hardware is the best solution.
-
'Software or hardware?'
The choice between software and hardware depends on the specific needs and goals of the user. Software provides flexibility and can be easily updated or customized, while hardware offers physical components that may be more reliable and provide better performance for certain tasks. Ultimately, the decision between software and hardware should be based on the specific requirements of the user and the intended use of the technology.
Similar search terms for Hardware:
-
Digital Protest and Activism in Public Education : Reactions to Neoliberal Restructuring in Israel
Digital protest and activism in reaction to the consequences of neoliberalism in public education have become a global phenomenon in the second decade of the 21st century, emerging in countries such as the US, UK, France, and Israel.Teachers, parents, and other stakeholders in education are increasingly using digital media in their protest and activism efforts, yet these efforts have hardly been investigated to date.This book addresses this gap and employs an empirical exploration of the way in which Internet-based protest activity concerning public education issues is constructed, mobilised, and carried out.In doing so it provides key insights for the study of educational politics in the digital age.It shows how digital media is used by teachers and parents to create a bottom-up politics, spanning a common divide in the study of education politics between the macro (policymaking) and the micro (school) levels.The authors propose a novel taxonomy of uses of social media by digital activists, and argue that Internet-based social mobilisations develop different patterns of use of social media, based on the lived experience of their members and potential supporters.Finally, the book situates the rise of digital activism in education within the neoliberal restructuring of national education systems and the rise of neoliberal discourse of competition, budget discipline, and measurable achievements.The authors highlight three cases of Internet-based mobilisations in Israel, in which teachers and parents successfully affected public education policy. By providing a case-study driven analysis of digital protest and activism in education, this book will prove an invaluable text for researchers, leaders and practitioners in the field of education policy and comparative education.
Price: 45.99 £ | Shipping*: 0.00 £ -
PROTEST : Pictogram Activism to Change the World
This book is a visual guide that collects 400 downloadable copyright-free images of a social and political nature that can be used in T-shirts, posters, fanzines, stationery, and many other supports.Presenting complex ideas in a straight to the point way, these images make us reflect on the contradictions of this world.Accompanied by thought-provoking texts, they are a reaction to issues such as racism, drugs, terrorism, inequality, poverty, war, destruction, life and death, freedom, war and peace, smoking, and animal rights, among others.This brilliant work not only raises important questions about today’s society in general but is also a superb illustration of pure graphic design with a political conscience.It is an ideal working tool and reference for professionals and students, or anyone with a keen interest in visual culture and communication.With a foreword by Liz McQuiston and texts by Steven Heller, Bettina Richter, Sarah Corbett, Fons Hickmann, Lincoln Cushing, King ADZ, and others.
Price: 16.99 £ | Shipping*: 3.99 £ -
Optimal Spending on Cybersecurity Measures : Digital Privacy and Data Protection
The aim of this book is to demonstrate the use of business- driven risk assessments to meet the requirements within privacy laws.This book introduces the cyber risk investment model and the cybersecurity risk management framework used within business-driven risk assessments to meet the intent of privacy and data protection laws.This can be used by various stakeholders involved in the implementation of cybersecurity measures to safeguard sensitive data.This framework facilitates an organization’s risk management decision- making process to demonstrate the mechanisms in place to fund cybersecurity measures to meet privacy laws and demonstrates the application of the process using two case studies: CatchMyData and Rapid Cloud Migration.This book also discusses the elements used within the cybersecurity risk management process and defines a strategic approach to minimize cybersecurity risks.FeaturesAims to strengthen the reader’s understanding of industry governance, risk and compliance practicesIncorporates an innovative approach to assess business risk managementExplores the strategic decisions made by organizations when implementing cybersecurity measures and leverages an integrated approach to include risk management elements
Price: 44.99 £ | Shipping*: 0.00 £ -
Hardware Architectures for Post-Quantum Digital Signature Schemes
This book explores C-based design, implementation, and analysis of post-quantum cryptography (PQC) algorithms for signature generation and verification. The authors investigate NIST round 2 PQC algorithms for signature generation and signature verification from a hardware implementation perspective, especially focusing on C-based design, power-performance-area-security (PPAS) trade-offs and design flows targeting FPGAs and ASICs. Describes a comprehensive set of synthesizable c code base as well as the hardware implementations for the different types of PQC algorithms including lattice-based, code-based, and multivariate-based;Demonstrates the hardware (FPGA and ASIC) and hardware-software optimizations and trade-offs of the NIST round 2 signature-based PQC algorithms;Enables designers to build hardware implementations that are resilient to a variety of side-channels.
Price: 99.99 £ | Shipping*: 0.00 £
-
What is the serious hardware issue with the Western Digital external hard drive?
The serious hardware issue with the Western Digital external hard drive is related to the My Book Live and My Book Live Duo devices. These devices have been experiencing a widespread issue where they are being remotely wiped and reset to factory settings without the owner's consent. This has resulted in the loss of all data stored on the devices, causing significant inconvenience and potential data loss for the affected users. This issue has raised concerns about the security and vulnerability of these devices, and has prompted Western Digital to investigate and address the issue.
-
Is hardware advice safe?
Hardware advice can be safe as long as it comes from a reputable source or expert in the field. It is important to verify the credibility of the source before following any hardware advice to ensure that it is accurate and reliable. Additionally, it is recommended to cross-reference the advice with other sources to confirm its validity before making any changes to your hardware setup.
-
Is hardware rat safe?
Hardware rat, also known as a hardware keylogger, is not safe as it can be used for malicious purposes such as stealing sensitive information like passwords and credit card numbers. It can be discreetly installed on a computer or other electronic device to capture keystrokes and other input. Therefore, it is important to be cautious and take measures to protect your devices from potential hardware rat attacks, such as using security software and being mindful of the physical security of your devices.
-
What is hardware lighting?
Hardware lighting refers to the use of physical lighting fixtures, such as lamps, bulbs, and LEDs, to illuminate a space. This type of lighting relies on the actual hardware components to produce light, as opposed to software-based lighting which uses digital technology to control lighting effects. Hardware lighting is commonly used in homes, offices, and outdoor spaces to provide illumination and create ambiance.
* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.