Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 101
- Economics 89
- History 84
- Engineering & Applied Sciences 52
- Historia 48
- Economic conditions 46
- Social aspects 44
- Business & Economics 43
- Development 41
- Information technology 41
- Technological innovations 40
- Economic policy 37
- Computer networks 36
- Success in business 36
- Computer Science 35
- Economic aspects 35
- Philosophy 35
- Application software 31
- Organizational change 31
- Leadership 30
- Security measures 29
- Computer security 28
- Employment 28
- Social Issues/Migration/Health 26
- Education 25
- Government policy 24
- Marketing 24
- Older people 24
- Strategic planning 24
- Data processing 21
-
2101por Institute of Medicine (U.S.).Tabla de Contenidos: “…-- Do Short-Term Maternal and Child Health Effects Lead to Longer-Term Effects? -- IMPLICATIONS -- References -- PART II DIETARY INTAKE AND NUTRIENT SUPPLEMENTS -- 11 Introduction…”
Publicado 1990
Libro electrónico -
2102Publicado 2022Tabla de Contenidos: “…-- References -- Eight - Economic stagnation in the Euro Area -- Preface -- Secular growth slowdown in the Euro Area: evidence -- A short digression: the slowdown of private consumption growth is linked to the slowdown of growth of fixed capital formation -- Falling wage shares: not quite a "natural development" -- A somewhat longer digression: supply side developments unlikely to have underlain stagnating output growth -- The noxious of restrictive EU fiscal policy rules and the common monetary policy -- Real effective exchange rate of Germany's EA partners: from relative appreciation to relative depreciation -- The limits of "internal devaluation" -- Suppression of fiscal deficits critically contributing to stagnant EA output growth -- The future remains uncertain -- References…”
Libro electrónico -
2103Publicado 2019Tabla de Contenidos: “…20.4 Multivariate Results -- 20.4.1 Firm Value -- 20.4.2 Firm Riskiness and Firm Accounting Performance -- 20.5 Conclusion -- References -- Appendix: Estimated MTEs -- Chapter 21 Exercises -- Exercise 1 Portfolio Choice and the Notion of Value at Risk (VaR) -- Calculating VaR -- Incremental VaR -- Reference -- Solution for Exercise 1 -- Conclusion Regarding the Calculations for the VaR -- Incremental VaR -- Exercise 2 Backtesting of VaR Models -- The Importance of Backtesting -- Definitions for the Backtesting -- Validation of the Model over a Longer Period -- Linear Regression Approach -- References -- Exercise 3 Calculation of VaR with Different Distributions and Accuracy of VaR -- Calculating VaR using a Lognormal or Truncated Normal Distribution -- Estimating the Precision of the VaR Calculated -- Solution to Exercise 3 -- Precision Estimation of the Calculated VaR -- References -- Exercise 4 VaR for an Equity Portfolio with Options -- Part A Choosing a Portfolio Application of VaR Calculations with Real Data from a Stock Portfolio -- Part B Application of the Delta and Delta‐Gamma Methods to Calculate VaR -- Risk Exposure of the Portfolio by the Delta Approach -- Risk Exposure of the Portfolio by the Delta‐Gamma Approach -- Solution to Exercise 4 -- Exercise 5 CVaR Conditional Value at Risk -- Mathematical Expressions of CVaR -- Recapitulation of the Three Models: Normal Distribution, Student's t, and Mixture of Two Normal Distributions -- Conclusion -- Reference -- Conclusion -- General References -- Index -- EULA…”
Libro electrónico -
2104Publicado 2023Tabla de Contenidos: “…11.2 Various Existing Proposed Anti-Poaching Systems -- 11.3 System Framework and Construction -- 11.4 Results and Discussions -- 11.5 Conclusion and Future Scope -- References -- Chapter 12 Tumor Detection Using Morphological Image Segmentation with DSP Processor TMS320C6748 -- 12.1 Introduction -- 12.2 Image Processing -- 12.2.1 Image Acquisition -- 12.2.2 Image Segmentation Method -- 12.3 TMS320C6748 DSP Processor -- 12.4 Code Composer Studio -- 12.5 Morphological Image Segmentation -- 12.5.1 Optimization -- 12.6 Results and Discussions -- 12.7 Conclusions -- References -- Chapter 13 Design Challenges for Machine/Deep Learning Algorithms -- 13.1 Introduction -- 13.2 Design Challenges of Machine Learning -- 13.2.1 Data of Low Quality -- 13.2.2 Training Data Underfitting -- 13.2.3 Training Data Overfitting -- 13.2.4 Insufficient Training Data -- 13.2.5 Uncommon Training Data -- 13.2.6 Machine Learning Is a Time-Consuming Process -- 13.2.7 Unwanted Features -- 13.2.8 Implementation is Taking Longer Than Expected -- 13.2.9 Flaws When Data Grows -- 13.2.10 The Model's Offline Learning and Deployment -- 13.2.11 Bad Recommendations -- 13.2.12 Abuse of Talent -- 13.2.13 Implementation -- 13.2.14 Assumption are Made in the Wrong Way -- 13.2.15 Infrastructure Deficiency -- 13.2.16 When Data Grows, Algorithms Become Obsolete -- 13.2.17 Skilled Resources are Not Available -- 13.2.18 Separation of Customers -- 13.2.19 Complexity -- 13.2.20 Results Take Time -- 13.2.21 Maintenance -- 13.2.22 Drift in Ideas -- 13.2.23 Bias in Data -- 13.2.24 Error Probability -- 13.2.25 Inability to Explain -- 13.3 Commonly Used Algorithms in Machine Learning -- 13.3.1 Algorithms for Supervised Learning -- 13.3.2 Algorithms for Unsupervised Learning -- 13.3.3 Algorithm for Reinforcement Learning -- 13.4 Applications of Machine Learning -- 13.4.1 Image Recognition…”
Libro electrónico -
2105por Avasthi, Sandhya“…As the number of tasks that depend on each other grows, a single machine can no longer handle all of them. Distributed computing is better than traditional computer settings in several ways. …”
Publicado 2024
Libro electrónico -
2106Publicado 2017Tabla de Contenidos: “…Front Cover -- Silicon Photonics -- Copyright Page -- Dedication -- Contents -- Preface -- The Reasoning for the Book and Its Organization -- References -- Acknowledgments -- 1 Silicon Photonics: Disruptive and Ready for Prime Time -- 1.1 Introduction -- 1.2 Silicon Photonics: An Introduction -- 1.2.1 The Application of Silicon Photonics -- 1.3 The Significance of Silicon Photonics -- 1.3.1 Silicon Photonics From a Photonics Perspective -- 1.3.2 Silicon Photonics From a Semiconductor Perspective -- 1.3.3 Silicon Photonics From a System Perspective -- 1.4 The Status of Silicon Photonics -- 1.5 Silicon Photonics: Market Opportunities and Industry Disruption -- 1.5.1 The Market Opportunities for Silicon Photonics -- 1.5.2 Silicon Photonics is a Disruptive Technology -- References -- 2 Layers and the Evolution of Communications Networks -- 2.1 Introduction -- 2.1.1 The Cloud as an Information Resource -- 2.1.2 Optical Networking is Central to the Internet -- 2.1.3 Silicon Photonics: A Technology to Tackle the Industry's Challenges -- 2.2 The Concept of Layering -- 2.3 The Telecom Network-Layer 4 -- 2.3.1 Cloud Computing is Driving the Need for High-Bandwidth Links Between Data Centers -- 2.3.2 The Importance of Optics for Communications -- 2.4 The Data Center-Layer 3 -- 2.4.1 Data Center Networking is a Key Opportunity for Silicon Photonics -- 2.5 Platforms-Layer 2 -- 2.6 The Silicon Chip-Layer 1 -- 2.7 Telecom and Datacom Industry Challenges -- 2.7.1 Approaching the Traffic-Carrying Capacity of Fiber -- 2.7.2 Internet Businesses Have Their Own Challenges -- 2.7.3 Approaching the End of Moore's law -- 2.8 Silicon Photonics: Why the Technology Is Important for All the Layers -- References -- 3 The Long March to a Silicon-Photonics Union -- 3.1 Moore's Law and 50 Years of the Chip Industry -- 3.1.1 The Shrinking Transistor-But Not for Much Longer…”
Libro electrónico -
2107Publicado 2019Tabla de Contenidos: “…4.4.7.2 Review Prior Steps -- 4.5 Step 11: Use Case -- 4.5.1 Template -- 4.5.2 Example -- 4.5.3 Guidance -- 4.5.3.1 Document Assumptions -- 4.5.3.2 Review Prior Steps -- 4.6 Step 12: Experience Implications -- 4.6.1 Template -- 4.6.2 Example -- 4.6.3 Guidance -- 4.6.3.1 Document Assumptions -- 4.6.3.2 Review Prior Steps -- Chapter 5 Stage 3: Craft Business to Know Viability -- 5.1 Step 13: Business Context -- 5.1.1 Business Context Template -- 5.1.2 Example -- 5.1.3 Guidance -- 5.1.3.1 Document Assumptions -- 5.1.3.2 Review Prior Steps -- 5.2 Step 14: Value Proposition -- 5.2.1 Template -- 5.2.2 Example -- 5.2.3 Guidance -- 5.2.3.1 Document Assumptions -- 5.2.3.2 Review Prior Steps -- 5.3 Step 15: Business Model -- 5.3.1 Value Proposition -- 5.3.2 Value Delivery -- 5.3.3 Value Creation -- 5.3.4 Value Partnering -- 5.3.5 Value Capture -- 5.3.6 Value Funding -- 5.3.7 Template (Figure 5.7) -- 5.3.8 Guidance -- 5.3.8.1 Document Assumptions -- 5.3.8.2 Review Prior Steps -- 5.3.9 Bringing It All Together -- 5.4 Step 16: Elevator Pitch -- 5.4.1 Template -- 5.4.1.1 Short Version -- 5.4.1.2 Longer Version -- 5.4.2 Example -- 5.4.3 Guidance -- 5.4.3.1 Document Assumptions -- 5.4.3.2 Review Prior Steps -- Chapter 6 Stage 4: Manage Risk to Handle Uncertainty -- 6.1 Step 17: Assumptions -- 6.1.1 Impact -- 6.1.2 Template -- 6.2 Step 18: Risk Assessment -- 6.2.1 Calculation -- Chapter 7 Go Ahead and Transform Your Idea -- About the Author -- Index…”
Libro electrónico -
2108
-
2109por Lakner, GaryTabla de Contenidos: “…Troubleshooting -- Common problems and solutions -- Unable to connect to domain controller -- List EIM identifiers takes a long time -- EIM Configuration wizard hangs during finish processing -- EIM handle is no longer valid -- Cannot connect with NetServer -- Kerberos authentication and diagnostic messages -- Errors when running client commands in QSH -- iSeries Access Diagnostic Tools -- Troubleshooting WebSphere Host On-Demand -- Appendix C. …”
Publicado 2004
Libro electrónico -
2110
-
2111Publicado 2022Tabla de Contenidos: “…-- Top Concerns of Management -- Do Not Fight the Tide -- Remote Working Is Older Than You May Think -- Productivity and Job Performance -- Adjusting to the New Work and Home Balance -- Social Isolation -- Employee Engagement -- Maintaining Growth and Profitability -- Let's Get to Work -- Notes -- Chapter 2 The Remote Workspace: Set Up Your Mind and Your Space -- Your Work Zone: Distinguished from the Rest of the House -- Choosing Your Space -- Good Lighting -- Broadband -- Monitors -- Grab a Seat -- Invest in Yourself -- Add Privacy If Needed -- Set Healthy Boundaries with Family and Friends -- No Is a Powerful Asset -- Self-Motivation from Home Can Be Perilous -- Productive Procrastination -- Work and Play -- Your Mental Space -- Take Breaks and Don't Feel Guilty -- You Are Not a Machine -- Replenish Your Resources -- Take Breaks Early -- Take Better Breaks -- Create a Morning Routine Different from When You Were Commuting -- Set Daily Goals -- Tasks vs. Goals -- Longer-Term Goals -- SMART Goals -- Team Goals -- Communication Habits: Respond Quickly and Use the Right Tools -- Communicate Proactively -- Set Expectations Early On -- The Right Conversation Tools -- Be Precise -- Daily Check-Ins -- Make Yourself Available -- Get Dressed for Work -- Dress the Part -- Business Casual -- Know Your Audience -- Set Yourself Up for Success Right from the Start -- Notes -- Chapter 3 Office Technology: Stay Connected and Competitive -- VoIP: From Desktop to Soft Phones and Features -- Cloud Management -- Automated Attendant -- Forwarding and Follow Me…”
Libro electrónico -
2112Publicado 2023Tabla de Contenidos: “…Drive-by downloads -- Stealing passwords -- Exploiting Maintenance Difficulties -- Advanced Attacks -- Opportunistic attacks -- Targeted attacks -- Blended (opportunistic and targeted) attacks -- Some Technical Attack Techniques -- Rootkits -- Brute-force attacks -- Injection attacks -- Cross-site scripting -- SQL injection -- Session hijacking -- Malformed URL attacks -- Buffer overflow attacks -- Chapter 3 The Bad Guys You Must Defend Against -- Bad Guys and Good Guys Are Relative Terms -- Bad Guys Up to No Good -- Script kiddies -- Kids who are not kiddies -- Terrorists and other rogue groups -- Nations and states -- Corporate spies -- Criminals -- Hacktivists -- Terrorists -- Rogue insiders -- Cyberattackers and Their Colored Hats -- How Cybercriminals Monetize Their Actions -- Direct financial fraud -- Indirect financial fraud -- Profiting off illegal trading of securities -- Stealing credit card, debit card, and other payment-related information -- Stealing goods -- Stealing data -- Ransomware -- Cryptominers -- Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats -- Human error -- Humans: The Achilles' heel of cybersecurity -- Social engineering -- External disasters -- Natural disasters -- Pandemics -- Environmental problems caused by humans -- Cyberwarriors and cyberspies -- The impotent Fair Credit Reporting Act -- Expunged records are no longer really expunged -- Social Security numbers -- Social media platforms -- Google's all-knowing computers -- Mobile device location tracking -- Defending against These Attackers -- 2 Personal Cybersecurity -- Chapter 1 Evaluating Your Current Cybersecurity Posture -- Don't be Achilles: Identifying Ways You May Be Less than Secure -- Your home computer(s) -- Your mobile devices -- Your Internet of Things (IoT) devices -- Your networking equipment -- Your work environment…”
Libro electrónico -
2113CybersecurityCybersecurity For DummiesPublicado 2022Tabla de Contenidos: “…Malvertising -- Drive-by downloads -- Stealing passwords -- Exploiting Maintenance Difficulties -- Advanced Attacks -- Opportunistic attacks -- Targeted attacks -- Blended (opportunistic and targeted) attacks -- Some Technical Attack Techniques -- Rootkits -- Brute-force attacks -- Injection attacks -- Cross-site scripting -- SQL injection -- Session hijacking -- Malformed URL attacks -- Buffer overflow attacks -- Chapter 3 The Bad Guys You Must Defend Against -- Bad Guys and Good Guys Are Relative Terms -- Bad Guys Up to No Good -- Script kiddies -- Kids who are not kiddies -- Terrorists and other rogue groups -- Nations and states -- Corporate spies -- Criminals -- Hacktivists -- Terrorists -- Rogue insiders -- Cyberattackers and Their Colored Hats -- How Cybercriminals Monetize Their Actions -- Direct financial fraud -- Indirect financial fraud -- Profiting off illegal trading of securities -- Stealing credit card, debit card, and other payment-related information -- Stealing goods -- Stealing data -- Ransomware -- Cryptominers -- Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats -- Human error -- Humans: The Achilles' heel of cybersecurity -- Social engineering -- External disasters -- Natural disasters -- Pandemics -- Man-made environmental problems -- Cyberwarriors and cyberspies -- The impotent Fair Credit Reporting Act -- Expunged records are no longer really expunged -- Social Security numbers -- Social media platforms -- Google's all-knowing computers -- Mobile device location tracking -- Defending against These Attackers -- Part 2 Improving Your Own Personal Security -- Chapter 4 Evaluating Your Current Cybersecurity Posture -- Don't be Achilles: Identifying Ways You May Be Less than Secure -- Your home computer(s) -- Your mobile devices -- Your Internet of Things (IoT) devices -- Your networking equipment…”
Libro electrónico -
2114por Hurley, WilliamTabla de Contenidos: “…-- Superposition, the first quantum superpower -- Welcoming foreign entanglements -- Enabling quantum computing with coherence -- Doing the Math for the Power of Quantum Computing -- Examining What Quantum Computing Will Do for People -- Describing Different Types of Quantum Computing -- Quantum-inspired computing -- Quantum annealing -- Gate-based quantum computing -- Addressing What's Stopping Us -- Chapter 2 Looking Back to Early and Classical Computing -- Understanding Why Classical Computers Are Not Going Away -- Looking Back to the Prehistory of Computers -- Counting on the abacus, a forerunner of the classical computer -- Unearthing the Antikythera, an early orrery -- Calculating why the slide rule no longer rules -- Assessing what we can learn from early computers -- Tracking the Emergence of Classical Computing -- Counting on the arrival of tabulating machines -- Examining a mathematical model for classical computers -- Commemorating the first electronic computer -- Understanding the invention of byte-sized data -- Tracking the rise of ICs and microprocessors -- Joining Classical Computing and Quantum Computing -- Chapter 3 Examining the Roots of Quantum Computing -- Identifying the Keys to Quantum Mechanics -- Finding the fundamentals of fundamental particles -- Counting the cost of coherence -- Identifying the Effect of Uncertainty -- Summarizing the History of Quantum Mechanics -- Tracing the development of classical mechanics…”
Publicado 2023
Libro electrónico -
2115Publicado 2016Tabla de Contenidos: “…Low-Cost IoT for Sub-Saharan African Applications -- 10.5.1 Lower-Cost, Longer-Range IoT Communications -- 10.5.2 Cost of IoT Hardware and Services -- 10.5.3 Limit Dependency to Proprietary Infrastructures, Provide Local Interaction Models -- 10.5.4 The H2020WAZIUP Project -- 10.6 EU-Japan Collaboration for aWorld Leading Research in IoT -- 10.6.1 ClouT: Cloud of Things for Empowering Citizen ClouT in Smart Cities -- 10.6.2 FESTIVAL Federated Interoperable Smart ICT Services Development and Testing Platform -- 10.6.3 iKaaS - Intelligent Knowledge as a Service -- 10.7 EU-US IoT Cooperation -- 10.7.1 Policy Level Cooperation -- 10.7.2 Technical Cooperation -- 10.7.3 Standards Cooperation -- 10.7.4 Market Cooperation -- 10.8 Conclusions: Cooperation to Balance Globalisationand Differentiation of IoT Solutions Worldwide -- Index -- Backcover…”
Libro electrónico -
2116Publicado 2003“…Business Intelligence and OLAP systems are no longer limited to the privileged few business analysts: they are being democratized by being shared with the rank and file employee demanding a Relational Database Management System (RDBMS) that is more OLAP-aware. …”
Libro electrónico -
2117Publicado 2022Tabla de Contenidos: “…Add Events to Your Calendar -- Play Music -- Get Directions -- Ask for Facts -- Search the Web -- Send Email, Messages, or Tweets -- Use Dictation -- Part 3 Exploring the Internet and Apps -- Chapter 12 Browsing with Safari -- Connect to the Internet -- Explore Safari -- Navigate Web Pages -- Use Tabbed Browsing -- Organize with Tab Groups -- View Browsing History -- Search the Web -- Add and Use Bookmarks -- Download Files -- Translate Web Pages -- Chapter 13 Working with Email in the Mail App -- Add an Email Account -- Manually Set Up an Email Account -- Open Mail and Read Messages -- Reply To or Forward Email -- Create and Send a New Message -- Format Email -- Search Email -- Mark Email as Unread or Flag for Follow-Up -- Create an Event from Email Contents -- Delete Email -- Organize Email -- Create a VIP List -- Chapter 14 Expanding Your iPhone Horizons with Apps -- Explore Senior-Recommended Apps -- Search the App Store -- Get Applications from the App Store -- Organize Your Applications on Home Screens -- Organize Apps in Folders -- Delete Apps You No Longer Need -- Offload Apps to Keep Data -- Update Apps -- Purchase and Download Games -- Challenge Friends in Game Center -- Chapter 15 Socializing with Facebook, Twitter, and Instagram -- A Few Social Media Dos and Don'ts -- Find and Install Social Media Apps -- Create a Facebook Account -- Customize Facebook Settings for Your iPhone -- Create a Twitter Account -- Create an Instagram Account -- Part 4 Enjoying Media -- Chapter 16 Shopping the iTunes Store -- Explore the iTunes Store -- Buy a Selection -- Rent Movies -- Use Apple Pay and Wallet -- Set Up Family Sharing -- Chapter 17 Reading Books -- Find Books with Apple Books -- Buy Books -- Navigate a Book -- Adjust Brightness in Apple Books -- Change the Font Size and Type -- Chapter 18 Enjoying Music and Podcasts -- View the Music Library…”
Libro electrónico -
2118Publicado 2022Tabla de Contenidos: “…Intro -- Table of Contents -- About the Author -- About the Technical Reviewers -- Acknowledgments -- Preface -- Overview of the Book -- Introduction -- Chapter 1: An Overview of SAP S/4HANA -- Cloud Options -- RISE with SAP S/4HANA Cloud -- RISE with SAP S/4HANA Cloud, Private Edition -- Key Features -- SAP S/4HANA Cloud, Extended Edition -- Key Features -- On-Premises Options -- SAP S/4HANA Hosted in the Customer's Data Center -- SAP S/4HANA Hosted by an IaaS Provider (Hyperscaler) Data Center -- SAP S/4HANA Hosted in SAP HANA Enterprise Cloud (HEC) in an SAP Data Center -- SAP S/4HANA Hosted in SAP HANA Enterprise Cloud (HEC) in a Hyperscaler Data Center -- Choosing a Deployment Option -- SAP S/4HANA Move Planning Tools -- SAP Readiness Check for SAP S/4HANA -- Process Discovery Tool -- SAP Transformation Navigator -- SAP Fiori App Recommendation Report -- Conclusions -- Overview of SAP S/4HANA -- Capabilities of SAP Accounting Powered by HANA (SAP S/4 HANA Finance) -- Converting an SAP ECC System to SAP S/4HANA -- Advantages of the SAP HANA Technology -- Advantages of SAP S/4HANA -- Improvements in the Data Model -- Advantages of the New Data Model -- Planning Table -- Fixed Asset Accounting -- Transparent Depreciation Areas -- One Document per Valuation -- Ledger and Accounting Principle Postings -- S/4HANA Cash Management -- Bank Relationship Management -- Transfer Prices -- Business Partner Approach Now Mandatory -- Accrual Engine -- Flexible Workflow -- MRP Live -- Lean Service Procurement -- OLAP and OLTP Together -- SAP S/4HANA Financial Closing Cockpit -- New Depreciation Run -- FI-AR Based Credit Management Is No Longer Recommended -- SAP S/4HANA Sales -- Simplified Areas in SAP S/4HANA Sales -- Foreign Trade -- Revenue Recognition -- Financial Consolidation Through Group Reporting -- SAP Fiori Apps -- SAP S/4HANA Deployment Options…”
Libro electrónico -
2119por OECDTabla de Contenidos: “…Negotiated wages: falling in real terms even in countries with high collective bargaining coverage -- Collective bargaining: A tool to ensure fair and tailored responses to inflation cost -- Negotiated wages are reacting with longer delay -- Recent bargaining rounds suggests that, after a catch-up phase, negotiated wage growth should go back to previous trends -- 1.4. …”
Publicado 2023
Libro electrónico -
2120por Spivey, DwightTabla de Contenidos: “…Activate Siri -- Discover All That Siri Can Do -- Get Suggestions -- Call Contacts -- Create Reminders and Alerts -- Add Events to Your Calendar -- Play Music -- Get Directions -- Ask for Facts -- Search the Web -- Send Email, Messages, or Tweets -- Use Dictation -- Part 3: Exploring the Internet and Apps -- Chapter 12: Browsing with Safari -- Connect to the Internet -- Explore Safari -- Navigate Web Pages -- Use Tabbed Browsing -- Organize with Tab Groups -- View Browsing History -- Search the Web -- Add and Use Bookmarks -- Download Files -- Translate Web Pages -- Chapter 13: Working with Email in the Mail App -- Add an Email Account -- Manually Set Up an Email Account -- Open Mail and Read Messages -- Reply To or Forward Email -- Create and Send a New Message -- Format Email -- Search Email -- Mark Email as Unread or Flag for Follow-Up -- Create an Event from Email Contents -- Delete Email -- Organize Email -- Create a VIP List -- Chapter 14: Expanding Your iPhone Horizons with Apps -- Explore Senior-Recommended Apps -- Search the App Store -- Get Applications from the App Store -- Organize Your Applications on Home Screen Pages -- Organize Apps in Folders -- Delete Apps You No Longer Need -- Offload Apps to Keep Data -- Update Apps -- Purchase and Download Games -- Challenge Friends in Game Center -- Chapter 15: Socializing with Facebook, X (Twitter), and Instagram -- A Few Social Media Dos and Don'ts -- Find and Install Social Media Apps -- Create a Facebook Account -- Customize Facebook Settings for Your iPhone -- Create an X (Twitter) Account -- Create an Instagram Account -- Part 4: Enjoying Media -- Chapter 16: Shopping the iTunes Store -- Explore the iTunes Store -- Buy a Selection -- Rent Movies -- Use Apple Pay and Wallet -- Set Up Family Sharing -- Chapter 17: Reading Books -- Find Books with Apple Books -- Buy Books -- Navigate a Book…”
Publicado 2023
Libro electrónico