Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer hardware & operating systems
New Work and Industry 4.0 have matured and this book takes a practical, experience-based approach to project management in these areas. It introduces methods and covers the practical aspects. It critically examines existing approaches and practices and shows their limitations. The book covers appropriate methods as well as human and social aspects. It contributes to the ongoing discussion of business practices and methods. It also aims to stimulate dialogue in the professional community. Digital Project Practice for New Work and Industry 4.0 begins by introducing basic concepts in the context of Industry 4.0 and discussing how they might influence organizational communication and impact the work environment. After examining the possibilities and challenges of remote work and collaboration in distributed teams all over the world, the book looks at a company's fundamental changes related to New Work from a practical business perspective as well as legal and ethical perspectives. It reviews the case of the VW emission scandal and recommends ways to improve corporate culture. Legal issues include New Work and hybrid forms of collaboration as well as liability for automated decisions (i.e., the potential need for an 'electronic person'). Other implications for the workplace include how: Industry 4.0 might influence the potential demand for "Digital Unions" Industry 4.0, and lean production, and their applications can change industrial practices Open Banking presents new approaches and new business models Work structures and systems can empower employees' work self-management This book also looks at how New Work effects individual workers. It addresses digital stress, introduces strategies for coping with it, and discusses related topics. It also explores the benefits of meditation and the economics of mind, body, and spirit. In essence, this book cover appropriate methods along with human and social factors. It also covers practice, different perspectives, and various experiences from all around the globe. Contributing to the ongoing discussion on business practices and methods, this book will nourish and stimulate dialogue in the professional community.
Since the invention of computers or machines, scientists and researchers are trying very hard to enhance their capabilities to perform various tasks. As a consequence, the capabilities of computers are growing exponentially day by day in terms of diverse working domains, versatile jobs, processing speed, and reduced size. Now, we are in the race to make the computers or machines as intelligent as human beings. Artificial Intelligence (AI) came up as a way of making a computer or computer software think in the similar manner the intelligent humans think. AI is inspired by the study of human brain like how humans think, learn, decide and act while trying to solve a problem. The outcomes of this study are the basis of developing intelligent software and systems or Intelligent Computing (IC). An IC system has the capability of reasoning, learning, problem solving, perception, and linguistic intelligence. The IC systems consist of AI techniques as well as other emerging techniques that make a system intelligent. The use of intelligent computing has been seen in almost every sub-domain of computer science such as networking, software engineering, gaming, natural language processing, computer vision, image processing, data science, robotics, expert systems, and security. Now a days, the use of IC can also be seen for solving various complex problems in diverse domains such as for predicting disease in medical science, predicting land fertility or crop productivity in agriculture science, predicting market growth in economics, weather forecasting and so on. For all these reasons, this book presents the advances in AI techniques, under the umbrella of IC. In this context, the book includes the recent research works have been done in the areas of machine learning, neural networks, deep learning, evolutionary algorithms, genetic algorithms, swarm intelligence, fuzzy systems and so on. This book provides theoretical, algorithmic, simulation, and implementation-based recent research advancements related to the Intelligent Computing.
New Work and Industry 4.0 have matured and this book takes a practical, experience-based approach to project management in these areas. It introduces methods and covers the practical aspects. It critically examines existing approaches and practices and shows their limitations. The book covers appropriate methods as well as human and social aspects. It contributes to the ongoing discussion of business practices and methods. It also aims to stimulate dialogue in the professional community. Digital Project Practice for New Work and Industry 4.0 begins by introducing basic concepts in the context of Industry 4.0 and discussing how they might influence organizational communication and impact the work environment. After examining the possibilities and challenges of remote work and collaboration in distributed teams all over the world, the book looks at a company's fundamental changes related to New Work from a practical business perspective as well as legal and ethical perspectives. It reviews the case of the VW emission scandal and recommends ways to improve corporate culture. Legal issues include New Work and hybrid forms of collaboration as well as liability for automated decisions (i.e., the potential need for an 'electronic person'). Other implications for the workplace include how: Industry 4.0 might influence the potential demand for "Digital Unions" Industry 4.0, and lean production, and their applications can change industrial practices Open Banking presents new approaches and new business models Work structures and systems can empower employees' work self-management This book also looks at how New Work effects individual workers. It addresses digital stress, introduces strategies for coping with it, and discusses related topics. It also explores the benefits of meditation and the economics of mind, body, and spirit. In essence, this book cover appropriate methods along with human and social factors. It also covers practice, different perspectives, and various experiences from all around the globe. Contributing to the ongoing discussion on business practices and methods, this book will nourish and stimulate dialogue in the professional community.
Tackles a topic in a concise and accessible way that most believe too advanced to pick up easily. Author has over 40 years teaching and industry experience which they utilize in this book. Contains an appendix with extended code and examples of topics discussed in text.
The developments in mesh generation are usually driven by the needs of new applications and/or novel algorithms. The last decade has seen a renewed interest in mesh generation and adaptation by the computational engineering community, due to the challenges introduced by complex industrial problems.Another common challenge is the need to handle complex geometries. Nowadays, it is becoming obvious that geometry should be persistent throughout the whole simulation process. Several methodologies that can carry the geometric information throughout the simulation stage are available, but due to the novelty of these methods, the generation of suitable meshes for these techniques is still the main obstacle for the industrial uptake of this technology.This book will cover different aspects of mesh generation and adaptation, with particular emphasis on cutting-edge mesh generation techniques for advanced discretisation methods and complex geometries.
This book takes a holistic view on mobile and distributed computing systems. It presents innovative solutions at all system layers. These range from hardware over vertical and horizontal infrastructure services and novel middleware techniques to various types of application software. Some chapters address core properties of ubiquitous applications including mobility, self-healing and self-organization of both technical and social-technical systems.
- Totally unique, and incredibly damning, concerning information and overview of the world's first Cyberwar. - The first ever Cyberwar and the precursor to the first war in Europe since 1945, it will be discussed for decades to come and go down in history as a defining point. - Will be of interest to all citizens of the world, literally.
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. It's not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Features The book presents the implementation of a unique socio-technical solution for real-time cybersecurity awareness. It provides comprehensible knowledge about security, risk, protection, estimation, knowledge and governance. Various emerging standards, models, metrics, continuous updates and tools are described to understand security principals and mitigation mechanism for higher security. The book also explores common vulnerabilities plaguing today's web applications. The book is aimed primarily at advanced undergraduates and graduates studying computer science, artificial intelligence and information technology. Researchers and professionals will also find this book useful.
This book covers the proceedings of ICISSI 2022 (International Conference on Intelligent Systems and Smart Infrastructure) held at Prayagraj, Uttar Pradesh during April 21-22, 2022. The conference was jointly organised by Shambhunath Institute of Engineering and Technology, Prayagraj UP India, Institute of Engineering and Technology (IET) Lucknow, U.P India, and Manipal University Jaipur, Rajasthan India with an aim to provide a platform for researchers, scientists, technocrats, academicians and engineers to exchange their innovative ideas and new challenges being faced in the field of emerging technologies. The papers presented in the conference have been compiled in form of chapters to focus on the core technological developments in the emerging fields like machine learning, intelligence systems, smart infrastructure, advanced power technology etc.
This volume is published as the proceedings of the third Russian-German - vanced Research Workshop on Computational Science and High Performance Computing in Novosibirsk, Russia, in July 2007. The contributions of these proceedings were provided and edited by the - thors, chosen after a careful selection and reviewing. The workshop was organized by the High Performance Computing Center Stuttgart(Stuttgart,Germany)andtheInstituteofComputationalTechnologies SBRAS(Novosibirsk,Russia)intheframeworkofactivitiesoftheGerman-Russian CenterforComputationalTechnologiesandHighPerformanceComputing. Thee event is held biannually and has already become a good tradition for German and Russian scientists. The ?rst Workshop took place in September 2003 in Novosibirskand the second Workshopwas hosted by Stuttgart in March 2005. Both workshops gave the possibility of sharing and discussing the latest results and developing further scienti?c contacts in the ?eld of computational science and high performance computing. The topics of the current workshop include software and hardware for high performancecomputation,numericalmodellingingeophysicsandcomputational ?uid dynamics, mathematical modelling of tsunami waves, simulation of fuel cellsandmodern? breopticsdevices,numericalmodellingincryptographypr- lems andaeroacoustics,interval analysis,toolsfor Gridapplications,researchon service-oriented architecture (SOA) and telemedicine technologies. Theparticipationofrepresentativesofmajorresearchorganizationsengagedin the solution of the most complex problems of mathematical modelling, devel- ment of new algorithms,programsandkey elementsof informationtechnologies, elaboration and implementation of software and hardware for high performance computing systems,provideda highlevelof competenceofthe workshop. Among the German participants were the heads and leading specialists of the HighPerformanceComputingCenterStuttgart(HLRS)(UniversityofStuttgart), NECHighPerformanceComputingEuropeGmbH,SectionofAppliedMathem- ics(UniversityofFreiburgi.Br.),InstituteofAerodynamics(RWTHAachen),- gionalComputingCenterErlangen(RRZE(UniversityofErlangen-Nuremberg), Center for High Performance Computing (ZHR) (Dresden University of Technology).
Access US Census Bureau geographic and demographic data directly within R. Wrangle Census data with tidyverse tools and work with margins of error in the American Community Survey. Make maps and interactive web visualizations with US Census data. Explore Census data with spatial analysis using the sf package. Integrate Census data into spatial and machine learning models.
The iPod is more than a digital music device. It has become a cultural phenomenon and a fashion statement, symbolized by the universally recognized white earphones. Already a bestseller in Japan, the "iPod Fan Book" shows owners how to get the most out of the world s most popular portable music player. This compact and beautifully packaged guide is for iPod users who want a quick, fun way to learn all the features and capabilities of the device. The "iPod Fan Book" takes readers through the process of loading the iPod with music and then organizing, playing, and even burning those tunes onto CDs and DVDs. The book also discusses ways to use the iPod on-the-go, such as playing it through a car stereo. And it shows how to use the iPod as a PDA for storing things like addresses and personal calendars. The perfect gift for people living the iPod lifestyle.
This unique compendium highlights the theory of computation, particularly logic and automata theory. Special emphasis is on computer science applications including loop invariants, program correctness, logic programming and algorithmic proof techniques.This innovative volume differs from standard textbooks, by building on concepts in a different order, using fewer theorems with simpler proofs. It has added many new examples, problems and answers. It can be used as an undergraduate text at most universities.
Recent industry surveys expect the cloud computing services market to be in excess of $20 billion and cloud computing jobs to be in excess of 10 million worldwide in 2014 alone. In addition, since a majority of existing information technology (IT) jobs is focused on maintaining legacy in-house systems, the demand for these kinds of jobs is likely to drop rapidly if cloud computing continues to take hold of the industry. However, there are very few educational options available in the area of cloud computing beyond vendor-specific training by cloud providers themselves. Cloud computing courses have not found their way (yet) into mainstream college curricula. This book is written as a textbook on cloud computing for educational programs at colleges. It can also be used by cloud service providers who may be interested in offering a broader perspective of cloud computing to accompany their own customer and employee training programs. The typical reader is expected to have completed a couple of courses in programming using traditional high-level languages at the college-level, and is either a senior or a beginning graduate student in one of the science, technology, engineering or mathematics (STEM) fields. We have tried to write a comprehensive book that transfers knowledge through an immersive "hands-on approach," where the reader is provided the necessary guidance and knowledge to develop working code for real-world cloud applications. Additional support is available at the book's website: www.cloudcomputingbook.info Organization The book is organized into three main parts. Part I covers technologies that form the foundations of cloud computing. These include topics such as virtualization, load balancing, scalability & elasticity, deployment, and replication. Part II introduces the reader to the design & programming aspects of cloud computing. Case studies on design and implementation of several cloud applications in the areas such as image processing, live streaming and social networks analytics are provided. Part III introduces the reader to specialized aspects of cloud computing including cloud application benchmarking, cloud security, multimedia applications and big data analytics. Case studies in areas such as IT, healthcare, transportation, networking and education are provided.
Built specifically for statistical computing and graphics, the R language, along with its amazing collection of libraries and tools, is one of the most powerful tools you can use to tackle data analysis for business, research, and other data-intensive domains. This revised and expanded third edition of R in Action covers the new tidy verse approach to data analysis and R's state-of-the-art graphing capabilities with the ggplot2 package. R in Action, Third Edition teaches you to use the R language, including the popular tidy verse packages, through hands-on examples relevant to scientific, technical, and business developers. Focusing on practical solutions to real-world data challenges, R expert RobKabacoff takes you on a crash course in statistics, from dealing with messy and incomplete data to creating stunning visualisations. The R language is the most powerful platform you can choose for modern data analysis. Free and open source, R's community has created thousands of modules to tackle challenges from data-crunching to presentation. R's graphical capabilities are also state-of-the-art, with a comprehensive and powerful feature set available for data visualization. R runs on all major operating systems and is used by businesses, researchers, and organizations worldwide.
Are you a programmer who wants to get started quickly in a new language? This book is for you. Are you a novice who wants to learn to program? This book is not for you. Are you a Python programmer who needs encyclopaedic information? This book is not for you. Like any mainstream language, Python has loops, if statements, assignment statements, functions, etc. I'll show you what these look like in Python. I won't waste your time telling you what they're good for. Python has features you may not be familiar with--iterators, list comprehensions, maybe even dictionaries. I'll spend more time on these. I'll cover some of the library functions I found most immediately useful, and tell you where to find more. In short, this book will help you hit the ground running. Next week, you'll be ready to buy that Python encyclopaedia.
This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining. "Filled with practical and relevant examples based on years of experience ... with lively discussions and storytelling related to loT security design flaws and architectural issues."- Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel 'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."- Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies 'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."- Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express "If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."- Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems
One of the most difficult, yet important, questions regarding projects is "What advantages will this project create for the investors and key stakeholders?" Projects and programs should be treated as investments. This means that the focus of projects shifts from delivering within the triple constraints (time-cost-quality) towards some of the more fundamental questions: What is the purpose of this investment? What are the specific advantages expected? Are these benefits worth the investment? Implementing Project and Program Benefit Management is written for executives and practitioners within the portfolio, program, and project environment. It guides them through the important work that must be addressed as the investment progresses towards the realization of benefits. The processes discussed cover the strategic elements of benefits realization as well as the more detailed requirements, which are the domain of the program delivery teams and the operational users. Using real cases to explain complex situations, operational teams and wider groups of stakeholders, including communities affected by infrastructure projects, will be able to engage in the conversation with the sponsors and delivery teams. Covering an area of program and project management that is rapidly becoming more widely valued, this book blends theory with practical experience to present a clear process flow to managing the benefits life cycle. Best practices are defined, and pitfalls and traps are identified to enable practitioners to apply rigor and structure to this crucial discipline.
"Vivek Kale's Creating Smart Enterprises goes smack-dab at the heart of harnessing technology for competing in today's chaotic digital era. Actually, for him, it's SMACT-dab: SMACT (Social media, Mobile, Analytics and big data, Cloud computing, and internet of Things) technologies. This book is required reading for those that want to stay relevant and win, and optional for those that don't." -Peter Fingar, Author of Cognitive Computing and business technology consultant Creating Smart Enterprises unravels the mystery of social media, mobile, analytics and big data, cloud, and Internet of Things (SMACT) computing and explains how it can transform the operating context of business enterprises. It provides a clear understanding of what SMACT really means, what it can do for smart enterprises, and application areas where it is practical to use them. All IT professionals who are involved with any aspect of a SMACT computing project will profit by using this book as a roadmap to make a more meaningful contribution to the success of their computing initiatives. This pragmatic book: Introduces the VUCA (volatility, uncertainty, complexity, and ambiguity) business ecosystem confronted by the businesses today. Describes the challenges of defining business and IT strategies and of aligning them as well as their impact on enterprise governance. Provides a very wide treatment of the various components of SMACT computing, including the Internet of Things (IoT) and its constituting technologies like RFID, wireless networks, sensors, and wireless sensor networks (WSNs). This book addresses the key differentiator of SMACT computing environments and solutions that combine the power of an elastic infrastructure with analytics. The SMACT environment is cloud-based and inherently mobile. Information management processes can analyze and discern recurring patterns in colossal pools of operational and transactional data. Analytics, big data, and IoT computing leverage and transform these data patterns to help create successful, smart enterprises.
Within this context, big data analytics (BDA) can be an important tool given that many analytic techniques within the big data world have been created specifically to deal with complexity and rapidly changing conditions. The important task for public sector organizations is to liberate analytics from narrow scientific silos and expand it across internally to reap maximum benefit across their portfolios of programs. This book highlights contextual factors important to better situating the use of BDA within government organizations and demonstrates the wide range of applications of different BDA techniques. It emphasizes the importance of leadership and organizational practices that can improve performance. It explains that BDA initiatives should not be bolted on but should be integrated into the organization's performance management processes. Equally important, the book includes chapters that demonstrate the diversity of factors that need to be managed to launch and sustain BDA initiatives in public sector organizations.
Benefits realization management (BRM) is a key part of governance, because it supports the strategic creation of value and provides the correct level of prioritization and executive support to the correct initiatives. Because of its relevance to the governance process, BRM has a strong influence over project success and is a link between strategic planning and strategy execution. This book guides portfolio, program, and project managers through the process of benefits realization management so they can maximize business value. It discusses why and how programs and projects are expected to enable value creation, and it explains the role of BRM in value creation. The book provides a flexible framework for: Translating business strategy drivers into expected benefits and explains the subsequent composition of a program and project portfolio that can realize expected benefits Planning the benefits realization expected from programs and projects and then making it happen Keeping programs and projects on track Reviewing and evaluating the benefits achieved or expected against the original baselines and the current expectations. To help project, program, and portfolio managers on their BRM journey, as well as to support business managers in executing business strategies, the book identifies key organizational responsibilities and roles involved in BRM practices, and it provides a simple reference that can be mapped against any organizational structure. A detailed and comprehensive case study illustrates each phase of the BRM framework as it links business strategy to project work, benefits, and business value. Each chapter ends with a series questions that provide a BRM self-assessment. The book concludes with a set of templates and detailed instructions to ensure successful deployment of BRM.
This book is intended for a first course on microprocessor-based systems design for engineering and computer science students. It starts with an introduction of the fundamental concepts, followed by a practical path that guides readers to developing a basic microprocessor example, using a step-by-step problem-solving approach. Then, a second microprocessor is presented, and readers are guided to the implementation and programming of microcomputer systems based on it. The numerous worked examples and solved exercises allow a better understanding and a more effective learning. All the examples and exercises were developed on Deeds (Digital Electronics Education and Design Suite), which is freely available online on a website developed and maintained by the authors. The discussed examples can be simulated by using Deeds and the solutions to all exercises and examples can be found on that website. Further, in the last part of this book, different microprocessor-based systems, which have been specifically thought for educational purposes, are extensively developed, simulated and implemented on FPGA-based platforms. This textbook draws on the authors' extensive experience in teaching and developing learning materials for bachelor's and master's engineering courses. It can be used for self-study as well, and even independently from the simulator. Thanks to the learning-by-doing approach and the plentiful examples, no prior knowledge in computer programming is required.
|
You may like...
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, …
Hardcover
R1,276
Discovery Miles 12 760
Edsger Wybe Dijkstra - His Life, Work…
Krzysztof R. Apt, Tony Hoare
Hardcover
R3,075
Discovery Miles 30 750
Grammatical and Syntactical Approaches…
Juhyun Lee, Michael J. Ostwald
Hardcover
R5,608
Discovery Miles 56 080
|