資料搜尋諮詢服務
找不到您所需要的資料嗎?
我們能協助您找到最符合您研究需求的資訊
請撥打 +886-2-2799-3110
或透過電子郵件與我們聯絡 mi@hintoninfo.com

頁面路徑選單

(搜尋結果 6017 項結果)
排序:
篩選:出版日期: 地區: 搜尋

Sensors for Biometry and Recognition 2016

2016/11/01
In a global biometric hardware market worth over $4B, traditional fingerprint/palm sensors still monopolize 95% of the market, but face and iris senso.. more

Fan-Out Wafer Level Packaging Patent Landscape Analysis

2016/11/01
With Apple and TSMC changing the game, 2016 is a turning point for the Fan-Out market. The number of enforceable patents is increasing worldwide, with.. more

Fan-In: Technology Trends and Business Update 2016

2016/11/01
A steady growth platform with imminent disruptions ahead. How will Fan-In adapt to SiP growth and handle uncertainty in future markets? more

Beyond Li-ion Batteries: Present and Future Li-ion Technology Challengers

2016/11/01
Which technologies can surpass Li-ion batteries, and for which applications? more

Apple iPhone 7 Plus: Rear-Facing Dual Camera Module

2016/11/01
With its choice of a dual camera, Apple’s innovations include new objectives lens assemblies, new bonding processes and a new type of autofocus more

40V Silicon MOSFETs Technology and Cost Review

2016/11/01
18 different 40V MOSFETs, five different manufacturers: Which is the most competitive? more

DevOps for Networking

2016/10/28
Boost your organization’s growth by incorporating networking in the DevOps cultureAbout This Book‧ Implement networking fundamentals to the DevOps cul.. more

Hyper-V 2016 Best Practices

2016/10/28
Harness the power of Hyper-V 2016 to build high-performance infrastructures that suit your needsAbout This Book‧ Design and build a reliable and effic.. more

Test-Driven iOS Development with Swift 3

2016/10/28
Write testable and maintainable code to develop highly-functional iOS appsAbout This Book‧ Learn test-driven principles to help you build apps with fe.. more

Mastering Modern Web Penetration Testing

2016/10/28
Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!About This Book‧ This book cover.. more