Free Essay

Multimedia Compression(Not Mine)

In:

Submitted By sidguptajhs
Words 1593
Pages 7
Video compression design, analysis, consulting and research

White Paper: An Overview of H.264 Advanced Video Coding

Iain Richardson 2007

Vcodex White Paper: An overview of H.264 http://www.vcodex.com - H.264 and video coding expertise and consulting.

1

What is H.264 ?

H.264 is an industry standard for video compression, the process of converting digital video into a format that takes up less capacity when it is stored or transmitted. Video compression (or video coding) is an essential technology for applications such as digital television, DVD-Video, mobile TV, videoconferencing and internet video streaming. Standardising video compression makes it possible for products from different manufacturers (e.g. encoders, decoders and storage media) to inter-operate. An encoder converts video into a compressed format and a decoder converts compressed video back into an uncompressed format.

Recommendation H.264: Advanced Video Coding is a document published by the international standards bodies ITU-T (International Telecommunication Union) and ISO/IEC (International Organisation for Standardisation / International Electrotechnical Commission). It defines a format (syntax) for compressed video and a method for decoding this syntax to produce a displayable video sequence. The standard document does not actually specify how to encode (compress) digital video – this is left to the manufacturer of a video encoder – but in practice the encoder is likely to mirror the steps of the decoding process. Figure 1 shows the encoding and decoding processes and highlights the parts that are covered by the H.264 standard.
The H.264/AVC standard was first published in 2003. It builds on the concepts of earlier standards such as MPEG-2 and MPEG-4 Visual and offers the potential for better compression efficiency (i.e. better-quality compressed video) and greater flexibility in compressing, transmitting and storing video.

Figure 1 The H.264 video coding and decoding process

© Iain Richardson/Vcodex Ltd 2007

Page 2 of 7

Vcodex White Paper: An overview of H.264 http://www.vcodex.com - H.264 and video coding expertise and consulting.

2

How does an H.264 codec work ?

An H.264 video encoder carries out prediction, transform and encoding processes (see Figure 1) to produce a compressed H.264 bitstream. An H.264 video decoder carries out the complementary processes of decoding, inverse transform and reconstruction to produce a decoded video sequence. 2.1 Encoder processes

Prediction The encoder processes a frame of video in units of a Macroblock (16x16 displayed pixels). It forms a prediction of the macroblock based on previously-coded data, either from the current frame (intra prediction) or from other frames that have already been coded and transmitted (inter prediction). The encoder subtracts the prediction from the current macroblock to form a residual 1. The prediction methods supported by H.264 are more flexible than those in previous standards, enabling accurate predictions and hence efficient video compression. Intra prediction uses 16x16 and 4x4 block sizes to predict the macroblock from surrounding, previously-coded pixels within the same frame (Figure 2). Inter prediction uses a range of block sizes (from 16x16 down to 4x4) to predict pixels in the current frame from similar regions in previously-coded frames (Figure 3 ).

Figure 2 Intra prediction

Figure 3 Inter prediction
Transform and quantization
1

Finding a suitable inter prediction is often described as motion estimation. Subtracting an inter prediction from the current macroblock is motion compensation.

© Iain Richardson/Vcodex Ltd 2007

Page 3 of 7

Vcodex White Paper: An overview of H.264 http://www.vcodex.com - H.264 and video coding expertise and consulting. A block of residual samples is transformed using a 4x4 or 8x8 integer transform, an approximate form of the Discrete Cosine Transform (DCT). The transform outputs a set of coefficients, each of which is a weighting value for a standard basis pattern. When combined, the weighted basis patterns re-create the block of residual samples. Figure 4 shows how the inverse DCT creates an image block by weighting each basis pattern according to a coefficient value and combining the weighted basis patterns. The output of the transform, a block of transform coefficients, is quantized, i.e. each coefficient is divided by an integer value. Quantization reduces the precision of the transform coefficients according to a quantization parameter (QP). Typically, the result is a block in which most or all of the coefficients are zero, with a few non-zero coefficients. Setting QP to a high value means that more coefficients are set to zero, resulting in high compression at the expense of poor decoded image quality. Setting QP to a low value means that more non-zero coefficients remain after quantization, resulting in better decoded image quality but lower compression.

Figure 4 Inverse transform: combining weighted basis patterns to create a 4x4 image block

Bitstream encoding The video coding process produces a number of values that must be encoded to form the compressed bitstream. These values include: • quantized transform coefficients • information to enable the decoder to re-create the prediction • information about the structure of the compressed data and the compression tools used during encoding

© Iain Richardson/Vcodex Ltd 2007

Page 4 of 7

Vcodex White Paper: An overview of H.264 http://www.vcodex.com - H.264 and video coding expertise and consulting. • information about the complete video sequence.

These values and parameters (syntax elements) are converted into binary codes using variable length coding and/or arithmetic coding. Each of these encoding methods produces an efficient, compact binary representation of the information. The encoded bitstream can then be stored and/or transmitted. 2.2 Decoder processes

Bitstream decoding A video decoder receives the compressed H.264 bitstream, decodes each of the syntax elements and extracts the information described above (quantized transform coefficients, prediction information, etc). This information is then used to reverse the coding process and recreate a sequence of video images. Rescaling and inverse transform The quantized transform coefficients are re-scaled. Each coefficient is multiplied by an integer value to restore its original scale2. An inverse transform combines the standard basis patterns, weighted by the re-scaled coefficients, to re-create each block of residual data. These blocks are combined together to form a residual macroblock. Reconstruction For each macroblock, the decoder forms an identical prediction to the one created by the encoder. The decoder adds the prediction to the decoded residual to reconstruct a decoded macroblock which can then be displayed as part of a video frame.

3
3.1

H.264 in practice
Performance

Perhaps the biggest advantage of H.264 over previous standards is its compression performance. Compared with standards such as MPEG-2 and MPEG-4 Visual, H.264 can deliver: • Better image quality at the same compressed bitrate, or • A lower compressed bitrate for the same image quality. For example, a single-layer DVD can store a movie of around 2 hours’ length in MPEG2 format. Using H.264, it should be possible to store 4 hours or more of movie-quality video on the same disk (i.e. lower bitrate for the same quality). Alternatively, the H.264 compression format can deliver better quality at the same bitrate compared with MPEG-2 and MPEG-4 Visual (Figure 5 ).

2

This is often described as inverse quantization but it is important to note that quantization is not a fully-reversible process. Information removed during quantization cannot be restored during re-scaling.

© Iain Richardson/Vcodex Ltd 2007

Page 5 of 7

Vcodex White Paper: An overview of H.264 http://www.vcodex.com - H.264 and video coding expertise and consulting. The improved compression performance of H.264 comes at the price of greater computational cost. H.264 is more sophisticated than earlier compression methods and this means that it can take significantly more processing power to compress and decompress H.264 video.

Figure 5 A video frame compressed at the same bitrate using MPEG-2 (left), MPEG-4 Visual (centre) and H.264 compression (right)

3.2

Applications

As well as its improved compression performance, H.264 offers greater flexibility in terms of compression options and transmission support. An H.264 encoder can select from a wide variety of compression tools, making it suitable for applications ranging from low-bitrate, low-delay mobile transmission through high definition consumer TV to professional television production. The standard provides integrated support for transmission or storage, including a packetised compressed format and features that help to minimise the effect of transmission errors. H.264/AVC is being adopted for an increasing range of applications, including: • High Definition DVDs (HD-DVD and Blu-Ray formats) • High Definition TV broadcasting in Europe • Apple products including iTunes video downloads, iPod video and MacOS • NATO and US DoD video applications • Mobile TV broadcasting • Internet video • Videoconferencing

© Iain Richardson/Vcodex Ltd 2007

Page 6 of 7

Vcodex White Paper: An overview of H.264 http://www.vcodex.com - H.264 and video coding expertise and consulting. Further reading See http://www.vcodex.com/links.html for links to further resources on H.264 and video compression. About the author As a researcher, consultant and author working in the field of video compression (video coding), my books on video codec design and the MPEG-4 and H.264 standards are widely read by engineers, academics and managers. I advise companies on video coding standards, design and intellectual property and lead the Centre for Video Communications Research at The Robert Gordon University in Aberdeen, UK. Iain Richardson iain@vcodex.com Telephone 020 7193 6500 (UK)

© Iain Richardson/Vcodex Ltd 2007

Page 7 of 7

Similar Documents

Free Essay

Steganography

...Steganography Hide and Seek: An Introduction to Steganography Although people have hidden secrets in plain sight— now called steganography—throughout the ages, the recent growth in computational power and technology has propelled it to the forefront of today’s security techniques. N IELS PROVOS AND PETER HONEYMAN University of Michigan teganography is the art and science of hiding communication; a steganographic system thus embeds hidden content in unremarkable cover media so as not to arouse an eavesdropper’s suspicion. In the past, people used hidden tattoos or invisible ink to convey steganographic content. Today, computer and network technologies provide easy-to-use communication channels for steganography. Essentially, the information-hiding process in a steganographic system starts by identifying a cover medium’s redundant bits (those that can be modified without destroying that medium’s integrity).1 The embedding process creates a stego medium by replacing these redundant bits with data from the hidden message. Modern steganography’s goal is to keep its mere presence undetectable, but steganographic systems— because of their invasive nature—leave behind detectable traces in the cover medium. Even if secret content is not revealed, the existence of it is: modifying the cover medium changes its statistical properties, so eavesdroppers can detect the distortions in the resulting stego medium’s statistical properties. The process of finding these distortions is called...

Words: 8940 - Pages: 36

Premium Essay

Quantitative Management

...article begins with a brief definition of the cultural economy. A first generation of local economic development policy approaches based on place marketing and associated initiatives is described. The possibilities of a more powerful second-generation approach are then sketched out with special emphasis on localized complexes of cultural-products industries. An extensive review and classification of these complexes is laid out, and their inward and outward relations to global markets are considered. On this basis, a critical discussion of local economic policy options focused on cultural-products industries is offered. Contrasting examples of development initiatives in major global cities, in selected old manufacturing towns, and in the Multimedia Super Corridor of Malaysia are briefly presented. It is suggested that the growth and spread of localized production agglomerations based on cultural-products industries are leading not to cultural uniformity but to greatly increased diversity at the global level. Keywords: agglomeration; cultural economy; globalization; industrial districts; local economic development; place marketing Over the past decade or so, the industrial profile of many countries has tilted perceptibly in the direction of a new creative or cultural economy. In some countries, indeed, the cultural economy is now one of the major frontiers of expansion of output and employment. This turn of events is actually one facet of the wider resurgence of a so-called...

Words: 12496 - Pages: 50

Premium Essay

Computer Science Illuminated

...N E L L D A L E J O H N L E W I S illuminated computer science J O N E S A N D B A RT L E T T C O M P U T E R S C I E N C E computer science illuminated N E L L D A L E J O H N L E W I S computer science illuminated N E L L D A L E J O H N Villanova University L E W I S University of Texas, Austin Jones and Bartlett Publishers is pleased to provide Computer Science Illuminated’s book-specific website. This site offers a variety of resources designed to address multiple learning styles and enhance the learning experience. Goin’ Live This step-by-step HTML Tutorial will guide you from start to finish as you create your own website. With each lesson, you’ll gain experience and confidence working in the HTML language. Online Glossary We’ve made all the key terms used in the text easily accessible to you in this searchable online glossary. The Learning Store Jones and Bartlett Publishers has a wealth of material available to supplement the learning and teaching experience. Students and instructors will find additional resources here or at http://computerscience. jbpub.com The Language Library Here you will find two complete chapters that supplement the book’s language-neutral approach to programming concepts. A JAVA language chapter and C++ language chapter are included and follow the same pedagogical approach as the textbook. http://csilluminated.jbpub.com eLearning Our eLearning center provides chapter-specific...

Words: 67693 - Pages: 271

Premium Essay

Association Rule Mining

...Notification In the content of this chapter material, you could read section 5.1, 5.2.1 and 5.2.2 to leaning details about the ideas and procedures to mine valid association rules, which are identical to the content Professor Chen introduced to you in class. Note that you do not need to pay more attention to the algorithm or codes of this method. Instead, ideas and related examples are more important for you to understand this method and it is enough to help you complete the assignment. Furthermore, to resolve the problem 2.(c) in EXERCISE 3, you need to read section 5.3.1 to know how to do. This part gives you the concept of multi-level association rule or generalized association rule. 基本阅读:英文资料 5.1,5.2.1 和 5.2.2,这部分内容与老师上课所介 绍的内容一致,不必过分专注于其中的算法和代码部分,更重要的是 理解方法意思,过程及其中的相关例子。扩展阅读:为了解决作业问 题 2 中的(c)小问,你还最好阅读 5.3.1 部分。 Mining Frequent Patterns, Associations, and Correlations Frequent patterns are patterns (such as itemsets, subsequences, or substructures) that appear in a data set frequently. For example, a set of items, such as milk and bread, that appear frequently together in a transaction data set is a frequent itemset. A subsequence, such as buying first a PC, then a digital camera, and then a memory card, if it occurs frequently in a shopping history database, is a (frequent) sequential pattern. A substructure can refer to different structural forms, such as subgraphs, subtrees, or sublattices, which may be combined with itemsets or subsequences. If a substructure...

Words: 26078 - Pages: 105

Free Essay

Voip Essay

...Executive Bulletin COMPUTERWORLD INTRODUCTION All Roads Lead to IP .................................2 TRENDS &STRATEGIES Wading Into IP Telephony ..........................4 Getting ROI From VoIP ..............................7 VoIP Monitoring Tools ............................10 VoIP Security .......................................13 Call Centers and IP ................................15 Voice Over Wireless LANs .......................18 RESOURCES QuickStudy:Session Initiation Protocol ......21 Emerging Technology:..........................23 IP Videoconferencing IPCommunications Voice-over-IP is changing the way we think of,and manage,communications. Compliments of Computerworld Executive Bulletin IP Communications 2 Converged IP networks allow for a wide variety of new applications to ride on the network and interact, including IP telephony,audioconfer- encing,videoconferencing,unified messaging and presence technolo- gies (like chat). Getting Started Corporate America is just starting down the road to voice-over-IP (VoIP)communications,though every analyst says it¡¯s just a matter of time before it becomes main- stream.¡°By 2009,the installed base of IP [communications]equipment will dominate the enterprise land- scape,but that¡¯s still a few years away,¡±says Robert Rosenberg,presi- dent of Insight Research Corp.in Boonton,N.J. There are several reasons why VoIP hasn¡¯t been an overnight suc- cess.Companies started testing the ...

Words: 10014 - Pages: 41

Free Essay

Many Many Sops

...Here is a collection of lots of sops of lots of seniors. Browse. According to whacko. (Addressed to our batch) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ As for SOPs, don't worry too much. All of you have good writing skills. Anyway, my advice on this matter is: [1] Have a look at some SOPs *now* or early next SEM. [2] When it's time to write your own SOP, do it *fully* by yourself. Do not look at anybody else's SOP. [3] Having made version 1.0 of your SOP, *now* take a look at as many SOPs as you can of guys in your area. Borrow points from then which you think are good. [4] Your SOP does not have to be too big. We at IITB tend to write long SOPs (1.5 to 2 pages) whereas IITM guys (who get better schools!)Usually write 0.75 page (max. 1 page). Basically, their SOPs are much more direct and to-the-point than ours. [5] REMEMBER THAT A SOP *MUST* BE ORIGINAL. Statement of Purpose I am applying to Stanford University for admission to the Ph.D. program in Computer Science. I am interested in Theoretical Computer Science, particularly in the Design and Analysis of Approximation Algorithms, Combinatory and Complexity Theory. My interest in Mathematics goes back to the time I was at school. This interest has only grown through my years in school and high school, as I have learnt more and more about the subject. Having represented India at the International Mathematical Olympiads on two occasions, I have been exposed to elements of Discrete Mathematics...

Words: 20877 - Pages: 84

Premium Essay

Html Text

...Changing and Customizing HTML Text....................................................................33 Chapter 5: Displaying Text in Lists .............................................................................................43 Chapter 6: Adding Graphics to Your Web Pages.........................................................................54 Chapter 7: Hypertext and Creating Links.....................................................................................64 Chapter 8: Clickable Image Maps and Graphical interfaces........................................................74 Chapter 9: HTML Forms..............................................................................................................85 Chapter 10: Images, Multimedia Objects and Background Graphics ..........................................96 Chapter 11: Adding Tables to your Documents.........................................................................102 Chapter 12: Frames ....................................................................................................................110 Chapter 13: Introduction to DHTML .........................................................................................122 Chapter 14: Introduction to CSS...

Words: 56638 - Pages: 227

Premium Essay

Databasse Management

...Fundamentals of Database Systems Preface....................................................................................................................................................12 Contents of This Edition.....................................................................................................................13 Guidelines for Using This Book.........................................................................................................14 Acknowledgments ..............................................................................................................................15 Contents of This Edition.........................................................................................................................17 Guidelines for Using This Book.............................................................................................................19 Acknowledgments ..................................................................................................................................21 About the Authors ..................................................................................................................................22 Part 1: Basic Concepts............................................................................................................................23 Chapter 1: Databases and Database Users..........................................................................................23 ...

Words: 229471 - Pages: 918

Premium Essay

Asignment

...Oracle® Database Concepts 10g Release 2 (10.2) B14220-02 October 2005 Oracle Database Concepts, 10g Release 2 (10.2) B14220-02 Copyright © 1993, 2005, Oracle. All rights reserved. Primary Author: Michele Cyran Contributing Author: Paul Lane, JP Polk Contributor: Omar Alonso, Penny Avril, Hermann Baer, Sandeepan Banerjee, Mark Bauer, Bill Bridge, Sandra Cheevers, Carol Colrain, Vira Goorah, Mike Hartstein, John Haydu, Wei Hu, Ramkumar Krishnan, Vasudha Krishnaswamy, Bill Lee, Bryn Llewellyn, Rich Long, Diana Lorentz, Paul Manning, Valarie Moore, Mughees Minhas, Gopal Mulagund, Muthu Olagappan, Jennifer Polk, Kathy Rich, John Russell, Viv Schupmann, Bob Thome, Randy Urbano, Michael Verheij, Ron Weiss, Steve Wertheimer The Programs (which include both the software and documentation) contain proprietary information; they are provided under a license agreement containing restrictions on use and disclosure and are also protected by copyright, patent, and other intellectual and industrial property laws. Reverse engineering, disassembly, or decompilation of the Programs, except to the extent required to obtain interoperability with other independently created software or as specified by law, is prohibited. The information contained in this document is subject to change without notice. If you find any problems in the documentation, please report them to us in writing. This document is not warranted to be error-free. Except as may be expressly permitted in your license agreement...

Words: 199783 - Pages: 800

Free Essay

Ojt Experience

...NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS AN ASSESSMENT OF THE SHIPBOARD TRAINING EFFECTIVENESS OF THE INTEGRATED DAMAGE CONTROL TRAINING TECHNOLOGY (DDCTT) VERSION 3.0 by Stephen J. Coughlin March 1998 Thesis Co-Advisors: Bernard J. Ulozas Alice Crawford Approved for public release; distribution is unlimited. PTIC QUALITY INSPECTED 6 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20S03. 1. AGENCY USE ONLY (Leave blank) 6. March 1998 Master's Thesis FUNDING NUMBERS TITLE AND SUBTITLE An Assessment of the Shipboard Training Effectiveness of the Integrated Damage Control Training Technology (IDCTT) Version 3.0 AUTHQR(S) Stephen J. Coughlin 7. 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED PERFORMING ORGANIZATION...

Words: 34538 - Pages: 139

Premium Essay

Computer Networking

...COMPUTER NETWORKING SIXTH EDITION A Top-Down Approach James F. Kurose University of Massachusetts, Amherst Keith W. Ross Polytechnic Institute of NYU Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Vice President and Editorial Director, ECS: Marcia Horton Editor in Chief: Michael Hirsch Editorial Assistant: Emma Snider Vice President Marketing: Patrice Jones Marketing Manager: Yez Alayan Marketing Coordinator: Kathryn Ferranti Vice President and Director of Production: Vince O’Brien Managing Editor: Jeff Holcomb Senior Production Project Manager: Marilyn Lloyd Manufacturing Manager: Nick Sklitsis Operations Specialist: Lisa McDowell Art Director, Cover: Anthony Gemmellaro Art Coordinator: Janet Theurer/ Theurer Briggs Design Art Studio: Patrice Rossi Calkin/ Rossi Illustration and Design Cover Designer: Liz Harasymcuk Text Designer: Joyce Cosentino Wells Cover Image: ©Fancy/Alamy Media Editor: Dan Sandin Full-Service Vendor: PreMediaGlobal Senior Project Manager: Andrea Stefanowicz Printer/Binder: Edwards Brothers Cover Printer: Lehigh-Phoenix Color This book was composed in Quark. Basal font is Times. Display font is Berkeley. Copyright © 2013, 2010, 2008, 2005, 2003 by Pearson Education, Inc., publishing as Addison-Wesley. All rights reserved. Manufactured in the United States of...

Words: 69922 - Pages: 280

Premium Essay

Computer

...This page intentionally left blank Copyright © 2008, New Age International (P) Ltd., Publishers Published by New Age International (P) Ltd., Publishers All rights reserved. No part of this ebook may be reproduced in any form, by photostat, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, without the written permission of the publisher. All inquiries should be emailed to rights@newagepublishers.com ISBN (13) : 978-81-224-2631-1 PUBLISHING FOR ONE WORLD NEW AGE INTERNATIONAL (P) LIMITED, PUBLISHERS 4835/24, Ansari Road, Daryaganj, New Delhi - 110002 Visit us at www.newagepublishers.com This page intentionally left blank Table Of Contents PART I (Computer Application Theory) 1 Introduction To Computer .........................................................1 History Of Computer .................................................................................................. 1 Generations Of Computer ........................................................................................... 7 First Generation Computers........................................................................... 7 Second Generation Computers ...................................................................... 7 Third Generation Computers ......................................................................... 8 Fourth Generation Computers .......................................................

Words: 60713 - Pages: 243

Free Essay

Mcda Analysis

...McKinsey Global Institute June 2011 Big data: The next frontier for innovation, competition, and productivity The McKinsey Global Institute The McKinsey Global Institute (MGI), established in 1990, is McKinsey & Company’s business and economics research arm. MGI’s mission is to help leaders in the commercial, public, and social sectors develop a deeper understanding of the evolution of the global economy and to provide a fact base that contributes to decision making on critical management and policy issues. MGI research combines two disciplines: economics and management. Economists often have limited access to the practical problems facing senior managers, while senior managers often lack the time and incentive to look beyond their own industry to the larger issues of the global economy. By integrating these perspectives, MGI is able to gain insights into the microeconomic underpinnings of the long-term macroeconomic trends affecting business strategy and policy making. For nearly two decades, MGI has utilized this “micro-to-macro” approach in research covering more than 20 countries and 30 industry sectors. MGI’s current research agenda focuses on three broad areas: productivity, competitiveness, and growth; the evolution of global financial markets; and the economic impact of technology. Recent research has examined a program of reform to bolster growth and renewal in Europe and the United States through accelerated productivity growth; Africa’s economic potential;...

Words: 60035 - Pages: 241

Free Essay

Big Data

...McKinsey Global Institute June 2011 Big data: The next frontier for innovation, competition, and productivity The McKinsey Global Institute The McKinsey Global Institute (MGI), established in 1990, is McKinsey & Company’s business and economics research arm. MGI’s mission is to help leaders in the commercial, public, and social sectors develop a deeper understanding of the evolution of the global economy and to provide a fact base that contributes to decision making on critical management and policy issues. MGI research combines two disciplines: economics and management. Economists often have limited access to the practical problems facing senior managers, while senior managers often lack the time and incentive to look beyond their own industry to the larger issues of the global economy. By integrating these perspectives, MGI is able to gain insights into the microeconomic underpinnings of the long-term macroeconomic trends affecting business strategy and policy making. For nearly two decades, MGI has utilized this “micro-to-macro” approach in research covering more than 20 countries and 30 industry sectors. MGI’s current research agenda focuses on three broad areas: productivity, competitiveness, and growth; the evolution of global financial markets; and the economic impact of technology. Recent research has examined a program of reform to bolster growth and renewal in Europe and the United States through accelerated productivity growth; Africa’s economic potential;...

Words: 60035 - Pages: 241

Premium Essay

Html

...The Missing Link: An Introduction to Web Development and Programming The Missing Link An Introduction to Web Development and Programming Michael Mendez SUNY Fredonia i The Missing Link An Introduction to Web Development and Programming by Michael Mendez Open SUNY Textbooks 2014 ©2014 Michael Mendez ISBN: 978-0-9897226-5-0 This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Published by Open SUNY Textbooks, Milne Library (IITG PI) State University of New York at Geneseo, Geneseo, NY 14454 Cover design by William Jones Licensing This text is published by the Open SUNY Textbooks project under the Creative Commons 3.0 license format (see full length legal text at http://creativecommons.org/licenses/ by-sa/3.0/): You are free: 1. To share — to copy, distribute and transmit the work 2. To remix — to adapt the work 3. To make commercial use of the work Under the following conditions: 1. Attribution: You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). 2. Share Alike: If you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. With the understanding that: 1. Waiver: Any of the above conditions can be waived if you get permission from the copyright holder. 2. Public Domain:...

Words: 78185 - Pages: 313