![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems
Take a deep look at accessibility as it applies to mobile and wearables. This book covers topics within the accessibility domain that are rarely covered or understood, despite the fact that nearly half of the world's population uses smartphones. Moreover, by 2025, 72% of smartphone users are expected to only use smartphones to access the internet. And yet, accessibility is often an afterthought instead of a core principle of product development. This book changes that.You will begin by exploring the current landscape and policy frameworks, looking at the software product lifecycle and how to embed inclusion from the start. You'll learn the nuances of mobile accessibility as it applies to mobile devices, wearables, and IoT. From there you'll move onto automated testing, accessibility and inclusion, and the next frontiers of emerging technology including AR and VR. There will be notes at the end of programming examples to help those in orthogonal roles, such as project management, understand the basics and the language to better communicate with their engineering counterparts. Over 1 billion people in the world live with some form of disability so it's imperative you devise a comprehensive game plan to make your digital products accessible for all. Beyond Accessibility Compliance is your guide to understanding the current landscape of assistive technology and how emerging techniques are changing the way we think about personalization and accessibility. What You'll Learn See how people with the most common forms of disabilities use digital products Review the basics of the product development lifecycle and how to embed accessibility Explore tangible answers as to how accessibility pertains to unique roles Understand the difference between compliance and usability Make data visualizations accessible for blind users Implement code-level changes to address gaps in accessibility Build a campus programs and course material inclusive for people with disabilities Who This Book Is For Current developers, designers, and others building technology products with basic knowledge of front-end development. This book is also suitable for students in computer science, engineering, HCI, and related fields. Sections that are not engineering-specific are applicable to design, user research, communication, and business students who are looking to pursue careers in technology.
Palm OS is one of the most popular handheld operating systems on the planet. From the newest Tungstens and Treos all the way down the family tree, Palms are everywhere. Although the Palm OS is simple to learn and use, there is more to it than meets the eye - from new features in the Palm to capabilities you can get with add-on software, the Palm can be made to do quite a lot. "Palm and Treo Hacks" gives you tips and tools that show you how to make the most of your Palm. A few minutes spent reading some of the hacks in this book will save you hours of research. Inside this book, you'll learn how to: find great applications for your Palm and make the most of the ones you're using now; get super-organized, getting more from the built-in Personal Information Manager and learning how to manage complex projects with your Palm; extend the Palm with must-have software and hardware add-ons; take your Palm online, reading email, surfing the web, and sending instant messages; and get some rest and relaxation with your Palm, whether it's listening to music, playing classic games, or watching video. Written for beginning to experienced Palm users, "Palm and Treo Hacks" is full of practical, ingenious tips and tricks you can apply immediately. Whether you're looking to master the built-in applications or you want to trick out your Palm to its fullest extent, this book will show you how to get it.
The popularity of enterprise architecture (EA) has increased in the last two decades, in both business and academic domains. Despite the cumulative interest from all sectors, the implementation and practice of EA have been entangled with numerous challenges and complexities. Consequently, some organisations continue to theorise the concept, which has ramifications on practice and ROI. This has led to many studies that have been conducted, to understand the complexities impacting the implementation and practice of EA in organisations. Yet, the trajectory of some convolutions remain a mystery in many quarters. This attributes to the struggle to articulate the value of EA in many environments. Hence many organisations find it difficult to apply EA for strategic management of modern information technology (IT) solutions. Enterprise Architecture for strategic Management of Modern IT Solutions provides guidance on how to employ EA in deploying and managing IT solutions from pragmatic and implementable perspectives. Until now, implementation and practice of EA have been slow, despite its growing popularity and interest from all sectors. This book employs sociotechnical theories such as actor-network theory (ANT) and structuration theory (ST) as lenses to examine and explain why and how challenges and complexities exist and derail the implementation or practice of EA in organisations. This serves to enable practitioners and readers to gain fresh insights on why the challenges exist and how they can be addressed in creating collaborative capabilities for business enhancement, sustainability, and competitiveness. The book provides detailed insights on how to apply EA for organisational purposes, from three main fronts. First, it explains the implications that lack of understanding of EA have on organisational activities and processes. Second, it examines the challenges and complexities that hinder the implementation and practice of EA in organisations. Third, it proposes models and frameworks on how EA can be applied for strategic management of modern IT solutions in organisations. Written for postgraduates, researchers, academics, and professionals in the fields of EA, IT, and information systems, this book provides a valuable resource that will enable and enhance implementation and practice of EA including future studies.
Gain a strong foundation of core WSO2 ESB concepts and acquire a proven set of guidelines designed to get you started with WSO2 ESB quickly and efficiently. This book focuses on the various enterprises integration capabilities of WSO2 ESB along with a broad range of examples that you can try out. From beginning to the end, Beginning WSO2 ESB effectively guides you in gradually building expertise in enterprise integration with WSO2 ESB for your SOA infrastructure. Nowadays successful enterprises rely heavily on how well the underlying software applications and services work together to produce a unified business functionality. This enterprise integration is facilitated by an Enterprise Service Bus (ESB). This book provides comprehensive coverage of the fundamentals of the WSO2 ESB and its capabilities, through real-world enterprise integration use cases. What You'll Learn Get started with WSO2 ESB Discover message processing techniques with WSO2 ESB Integrate REST and SOAP services Use enterprise messaging techniques: JMS, AMQP, MQTT Manage file-based integration and integrate with proprietary systems such as SAP Extend and administrate WSO2 ESB Who This Book Is For: All levels of IT professionals from developers to integration architects who are interested in using WSO2 ESB for their SOA infrastructure.
This volume is the first ever collection devoted to the field of proof-theoretic semantics. Contributions address topics including the systematics of introduction and elimination rules and proofs of normalization, the categorial characterization of deductions, the relation between Heyting's and Gentzen's approaches to meaning, knowability paradoxes, proof-theoretic foundations of set theory, Dummett's justification of logical laws, Kreisel's theory of constructions, paradoxical reasoning, and the defence of model theory. The field of proof-theoretic semantics has existed for almost 50 years, but the term itself was proposed by Schroeder-Heister in the 1980s. Proof-theoretic semantics explains the meaning of linguistic expressions in general and of logical constants in particular in terms of the notion of proof. This volume emerges from presentations at the Second International Conference on Proof-Theoretic Semantics in Tubingen in 2013, where contributing authors were asked to provide a self-contained description and analysis of a significant research question in this area. The contributions are representative of the field and should be of interest to logicians, philosophers, and mathematicians alike.
The Mac command line offers a faster, easier way to accomplish many tasks. It's also the medium for many commands that aren't accessible using the GUI. The Mac OS X Command Line is a clear, concise, tutorial-style introduction to all the major functionality provided by the command line. It's also packed with information the experienced users need, including little-known shortcuts and several chapters devoted to advanced topics. This is a book to get you started, but also a book you won't soon outgrow.
This book is focused on addressing the designs of FinFET-based analog ICs for 5G and E-band communication networks. In addition, it also incorporates some of the contemporary developments over different fields. It highlights the latest advances, problems and challenges and presents the latest research results in the field of mm-wave integrated circuits designing based on scientific literature and its practical realization. The traditional approaches are excluded in this book. The authors cover various design guidelines to be taken care for while designing these circuits and detrimental scaling effects on the same. Moreover, Gallium Nitrides (GaN) are also reported to show huge potentials for the power amplifier designing required in 5G communication network. Subsequently, to enhance the readability of this book, the authors also include real-time problems in RFIC designing, case studies from experimental results, and clearly demarking design guidelines for the 5G communication ICs designing. This book incorporates the most recent FinFET architecture for the analog IC designing and the scaling effects along with the GaN technology as well.
A complete and authoritative discussion of systems engineering and neural networks In Systems Engineering Neural Networks, a team of distinguished researchers deliver a thorough exploration of the fundamental concepts underpinning the creation and improvement of neural networks with a systems engineering mindset. In the book, you'll find a general theoretical discussion of both systems engineering and neural networks accompanied by coverage of relevant and specific topics, from deep learning fundamentals to sport business applications. Readers will discover in-depth examples derived from many years of engineering experience, a comprehensive glossary with links to further reading, and supplementary online content. The authors have also included a variety of applications programmed in both Python 3 and Microsoft Excel. The book provides: A thorough introduction to neural networks, introduced as key element of complex systems Practical discussions of systems engineering and forecasting, complexity theory and optimization and how these techniques can be used to support applications outside of the traditional AI domains Comprehensive explorations of input and output, hidden layers, and bias in neural networks, as well as activation functions, cost functions, and back-propagation Guidelines for software development incorporating neural networks with a systems engineering methodology Perfect for students and professionals eager to incorporate machine learning techniques into their products and processes, Systems Engineering Neural Networks will also earn a place in the libraries of managers and researchers working in areas involving neural networks.
Ocean covers 70.8% of the Earth's surface, and it plays an important role in supporting all life on Earth. Nonetheless, more than 80% of the ocean's volume remains unmapped, unobserved and unexplored. In this regard, Underwater Sensor Networks (USNs), which offer ubiquitous computation, efficient communication and reliable control, are emerging as a promising solution to understand and explore the ocean. In order to support the application of USNs, accurate position information from sensor nodes is required to correctly analyze and interpret the data sampled. However, the openness and weak communication characteristics of USNs make underwater localization much more challenging in comparison to terrestrial sensor networks. In this book, we focus on the localization problem in USNs, taking into account the unique characteristics of the underwater environment. This problem is of considerable importance, since fundamental guidance on the design and analysis of USN localization is very limited at present. To this end, we first introduce the network architecture of USNs and briefly review previous approaches to the localization of USNs. Then, the asynchronous clock, node mobility, stratification effect, privacy preserving and attack detection are considered respectively and corresponding localization schemes are developed. Lastly, the book's rich implications provide guidance on the design of future USN localization schemes. The results in this book reveal from a system perspective that underwater localization accuracy is closely related to the communication protocol and optimization estimator. Researchers, scientists and engineers in the field of USNs can benefit greatly from this book, which provides a wealth of information, useful methods and practical algorithms to help understand and explore the ocean.
A unique feature of this open access textbook is to provide a comprehensive introduction to the fundamental knowledge in embedded systems, with applications in cyber-physical systems and the Internet of things. It starts with an introduction to the field and a survey of specification models and languages for embedded and cyber-physical systems. It provides a brief overview of hardware devices used for such systems and presents the essentials of system software for embedded systems, including real-time operating systems. The author also discusses evaluation and validation techniques for embedded systems and provides an overview of techniques for mapping applications to execution platforms, including multi-core platforms. Embedded systems have to operate under tight constraints and, hence, the book also contains a selected set of optimization techniques, including software optimization techniques. The book closes with a brief survey on testing. This fourth edition has been updated and revised to reflect new trends and technologies, such as the importance of cyber-physical systems (CPS) and the Internet of things (IoT), the evolution of single-core processors to multi-core processors, and the increased importance of energy efficiency and thermal issues.
This book provides a systematic and unified methodology, including basic principles and reusable processes, for dynamic memory management (DMM) in embedded systems. The authors describe in detail how to design and optimize the use of dynamic memory in modern, multimedia and network applications, targeting the latest generation of portable embedded systems, such as smartphones. Coverage includes a variety of design and optimization topics in electronic design automation of DMM, from high-level software optimization to microarchitecture-level hardware support. The authors describe the design of multi-layer dynamic data structures for the final memory hierarchy layers of the target portable embedded systems and how to create a low-fragmentation, cost-efficient, dynamic memory management subsystem out of configurable components for the particular memory allocation and de-allocation patterns for each type of application. The design methodology described in this book is based on propagating constraints among design decisions from multiple abstraction levels (both hardware and software) and customizing DMM according to application-specific data access and storage behaviors.
For any digital TV developer or manager, the maze of standards and
specifications related to MHP and OCAP is daunting-you have to
patch together pieces from several standards to gather all the
necessary knowledge you need to compete worldwide. The standards
themselves can be confusing, and contain many inconsistencies and
missing pieces. Interactive TV Standards provides a guide for
actually deploying these technologies for a broadcaster or product
and application developer.
This book gathers a collection of high-quality peer-reviewed research papers presented at First International Conference on Innovations in Software Architecture and Computational Systems (ISACS 2021), held at Guru Nanak Institute of Technology, Kolkata, India, during 2 - 3 April 2021. The book primarily focuses on developing artificial intelligence-based algorithms and methodologies for enabling intelligent hardware and software systems. This book brings together the latest findings on efficient technological solutions for developing intelligent and hybrid systems, intelligent software architecture, machine intelligence-based analytical tools and also smart sensors and networks. The prime focus is on solving technological problems using state-of-the-art research finding like fuzzy computing, evolutionary and hybrid frameworks, neuro-computing, etc., along with other AI-based computation platforms. The book offers a valuable resource for all undergraduate, postgraduate students and researchers interested in exploring solution frameworks for social good problems using artificial intelligence.
Presents practical recommendations for reaching and maintaining HIPAA compliance Contains contributed articles from HIPAA experts-consultants, employees of covered entities, and members of the standards bodies-who have worked first-hand with the standards and requirements Covers HIPAA program fundamentals including Due Diligence, workforce education, issues analysis, and internal control structures and requirements Addresses the standards of performance, execution, and due care that must be met to establish compliance Management and IT professionals in the healthcare arena face the fear of the unknown: they fear that their massive efforts to comply with HIPAA requirements may not be enough, because they still do not know how compliance will be tested and measured. No one has been able to clearly explain to them the ramifications of HIPAA. Until now. The HIPAA Program Reference Handbook explains all aspects of HIPAA including system design, implementation, compliance, liability, transactions, security, and privacy, focusing on pragmatic action instead of theoretic approaches. The book is organized into five parts. The first discusses programs and processes, covering program design and implementation, a review of legislation, human dynamics, the roles of Chief Privacy and Chief Security Officers, and many other foundational issues. The Handbook continues by analyzing product policy, technology, and process standards, and what entities need to do to reach compliance. It then focuses on HIPAA legal impacts, including liability associated with senior management and staff within an organization. A section on transactions and interactions discusses the intricacies of the transaction types, standards, methods, and implementations required by HIPAA, covering the flow of payments and patient information among healthcare and service providers, payers, agencies, and other organizations. The book concludes with a discussion of security and pri
This book describes simple to complex ASIC design practical scenarios using Verilog. It builds a story from the basic fundamentals of ASIC designs to advanced RTL design concepts using Verilog. Looking at current trends of miniaturization, the contents provide practical information on the issues in ASIC design and synthesis using Synopsys DC and their solution. The book explains how to write efficient RTL using Verilog and how to improve design performance. It also covers architecture design strategies, multiple clock domain designs, low-power design techniques, DFT, pre-layout STA and the overall ASIC design flow with case studies. The contents of this book will be useful to practicing hardware engineers, students, and hobbyists looking to learn about ASIC design and synthesis.
The book presents the research by the Action Space! Studio on the Evolutionary City. An ambitious project meant to create a new tool not only for urban planners, but also for people involved inside project management business and people outside that practice. A kind of simulator-educational tool. The journey of discovery began by understanding evolution starting with Darwin, his phenotypes, the realms of biology, sociology, and economics. Pumped by evolution's magic the studio quickly plunged into game theory. These two lines of research synthesized into a set of games modeled on diverse aspects of the city - from the tasks a building developer faces when dealing with land value to the more intangible aspects of a city (i.e. the driving forces of desires in social groups).
1. An up-to-date reference on Red Hat 8 with comparisons to Red Hat's 7 and 6 when warranted. 2. A combination of how to use and administer Linux and operating systems concepts (making this text unique to Linux textbooks) written in an easy-to-read manner. 3. Improved chapters on computer networks, regular expressions and scripting. Revised and additional examples to support the concepts in these chapters. 4. Comparisons between Red Hat Linux and other Linux distributions when such comparisons will be useful. 5. A set of ancillary material including a complete lab manual, text bank, power point notes, glossary of terms, instructor's manual and supplemental readings. The supplemental readings will allow for a smaller book while still retaining all of the important content. 6. Improved chapter reviews, added end-of-section activities, additional tables, improved figures (where possible) and "did you know" boxes inserted to provide useful facts.
This book summarizes the key scientific outcomes of the Horizon 2020 research project TULIPP: Towards Ubiquitous Low-power Image Processing Platforms. The main focus lies on the development of high-performance, energy-efficient embedded systems for the growing range of increasingly complex image processing applications. The holistic TULIPP approach is described in the book, which addresses hardware platforms, programming tools and embedded operating systems. Several of the results are available as open-source hardware/software for the community. The results are evaluated with several use cases taken from real-world applications in key domains such as Unmanned Aerial Vehicles (UAVs), robotics, space and medicine. Discusses the development of high-performance, energy-efficient embedded systems for the growing range of increasingly complex image processing applications; Covers the hardware architecture of embedded image processing systems, novel methods, tools and libraries for programming those systems as well as embedded operating systems to manage those systems; Demonstrates results with several challenging applications, such as medical systems, robotics, drones and automotive.
Basic Computer Skills Made Simple XP Version presents all the necessary computer skills an individual may need in a straightforward and intelligent way. It demystifies computers and is ideal for those wishing to develop their skills and confidence in the subject whilst working at their own pace. By using the text the reader will be able to produce a wide range of word-processed documents, prepare illustrated slides to aid talks, store and search for information systematically, and gain confidence handling simple numbers or charts. They will also learn how to connect to the Internet, surf the Web, and send and receive emails.
The Architecture of Computer Hardware, Systems Software and Networking is designed help students majoring in information technology (IT) and information systems (IS) understand the structure and operation of computers and computer-based devices. Requiring only basic computer skills, this accessible textbook introduces the basic principles of system architecture and explores current technological practices and trends using clear, easy-to-understand language. Throughout the text, numerous relatable examples, subject-specific illustrations, and in-depth case studies reinforce key learning points and show students how important concepts are applied in the real world. This fully-updated sixth edition features a wealth of new and revised content that reflects today's technological landscape. Organized into five parts, the book first explains the role of the computer in information systems and provides an overview of its components. Subsequent sections discuss the representation of data in the computer, hardware architecture and operational concepts, the basics of computer networking, system software and operating systems, and various interconnected systems and components. Students are introduced to the material using ideas already familiar to them, allowing them to gradually build upon what they have learned without being overwhelmed and develop a deeper knowledge of computer architecture.
This textbook aims to help the reader develop an in-depth understanding of logical reasoning and gain knowledge of the theory of computation. The book combines theoretical teaching and practical exercises; the latter is realised in Isabelle/HOL, a modern theorem prover, and PAT, an industry-scale model checker. I also give entry-level tutorials on the two software to help the reader get started. By the end of the book, the reader should be proficient in both software. Content-wise, this book focuses on the syntax, semantics and proof theory of various logics; automata theory, formal languages, computability and complexity. The final chapter closes the gap with a discussion on the insight that links logic with computation. This book is written for a high-level undergraduate course or a Master's course. The hybrid skill set of practical theorem proving and model checking should be helpful for the future of readers should they pursue a research career or engineering in formal methods.
|
![]() ![]() You may like...
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, …
Hardcover
R1,347
Discovery Miles 13 470
Enterprise Level Security 1 & 2
Kevin Foltz, William R. Simpson
Paperback
R1,421
Discovery Miles 14 210
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,056
Discovery Miles 10 560
|