|
|
Books > Computing & IT
Relational databases have been predominant for many years and are
used throughout various industries. The current system faces
challenges related to size and variety of data thus the NoSQL
databases emerged. By joining these two database models, there is
room for crucial developments in the field of computer science.
Bridging Relational and NoSQL Databases is an innovative source of
academic content on the convergence process between databases and
describes key features of the next database generation. Featuring
coverage on a wide variety of topics and perspectives such as BASE
approach, CAP theorem, and hybrid and native solutions, this
publication is ideally designed for professionals and researchers
interested in the features and collaboration of relational and
NoSQL databases.
ICT Sustainability is about how to assess, and reduce, the carbon
footprint and materials used with computers and telecommunications.
These are the notes for an award winning on-line graduate course on
strategies for reducing the environmental impact of computers and
how to use the Internet to make business more energy efficient.
These notes have been used for courses by the Australian Computer
Society, Australian National University and Athabasca University
(Canada). The book includes an extensive bibliography. Free open
access course-ware is available on-line to accompany this text.
There is a tremendous need for computer scientists, data
scientists, and software developers to learn how to develop
Socratic problem-solving applications. While the amount of data and
information processing has been accelerating, our ability to learn
and problem-solve with that data has fallen behind. Meanwhile,
problems have become too complex to solve in the workplace without
a concerted effort to follow a problem-solving process. This
problem-solving process must be able to deal with big and disparate
data. Furthermore, it must solve problems that do not have a "rule"
to apply in solving them. Moreover, it must deal with ambiguity and
help humans use informed judgment to build on previous steps and
create new understanding. Computer-based Socratic problem-solving
systems answer this need for a problem-solving process using big
and disparate data. Furthermore, computer scientists, data
scientists, and software developers need the knowledge to develop
these systems. Socrates Digital (TM) for Learning and Problem
Solving presents the rationale for developing a Socratic
problem-solving application. It describes how a computer-based
Socratic problem-solving system called Socrates DigitalTM can keep
problem-solvers on track, document the outcome of a problem-solving
session, and share those results with problem-solvers and larger
audiences. In addition, Socrates DigitalTM assists problem-solvers
to combine evidence about their quality of reasoning for individual
problem-solving steps and their overall confidence in the solution.
Socrates DigitalTM also captures, manages, and distributes this
knowledge across organizations to improve problem-solving. This
book also presents how to build a Socrates DigitalTM system by
detailing the four phases of design and development: Understand,
Explore, Materialize, and Realize. The details include flow charts
and pseudo-code for readers to implement Socrates DigitalTM in a
general-purpose programming language. The completion of the design
and development process results in a Socrates DigitalTM system that
leverages artificial intelligence services from providers that
include Apple, Microsoft, Google, IBM, and Amazon. In addition, an
appendix provides a demonstration of a no-code implementation of
Socrates DigitalTM in Microsoft Power Virtual Agent.
Introduction to Graphic Arts and Media Technologies provides
students with an accessible and informative overview of various
facets of and opportunities within the graphic arts and media
technologies industry. The text provides readers with the knowledge
and skillsets required to help them to succeed in their future
careers, whether in graphic design, advertising design, printing
technologies, web design, video and sound design, or 3D modeling
and animation. The opening chapter offers students a brief history
of the industry and describes a variety of jobs available to them.
Additional chapters examine historical reference points that can
influence and inspire today's artists, from the cave paintings of
Lascaux to the art style of Walt Disney to modern web design
aesthetics. Students learn how to expand their creativity, think
like a designer, and apply key design elements and principles to
produce effective media solutions. Dedicated chapters cover imagery
in graphics, type and typography, industry workflows, and media and
communication options. The closing chapter speaks to building a
professional portfolio, leveraging industry resources, and tapping
into future educational opportunities. Featuring vibrant,
full-color images and enlightening interviews with professionals in
the industry, Introduction to Graphic Arts and Media Technologies
is an ideal resource for courses and programs in the visual arts.
As digital technology continues to revolutionize the world,
businesses are also evolving by adopting digital technologies such
as artificial intelligence, digital marketing, and analytical
methods into their daily practices. Due to this growing adoption,
further study on the potential solutions modern technology provides
to businesses is required to successfully apply it across
industries. AI-Driven Intelligent Models for Business Excellence
explores various artificial intelligence models and methods for
business applications and considers algorithmic approaches for
business excellence across numerous fields and applications.
Covering topics such as business analysis, deep learning, machine
learning, and analytical methods, this reference work is ideal for
managers, business owners, computer scientists, industry
professionals, researchers, scholars, practitioners, academicians,
instructors, and students.
Timely and essential, Ethics and Risk Management in Online and
Distance Social Work identifies pertinent ethical challenges and
ethically related risk-management issues that social workers should
consider when using digital technology to assist people in need.
The text illuminates how the use of technology is influenced by
traditional ethics concepts, including consent, privacy,
confidentiality, professional boundaries, documentation, and other
issues. The text begins by discussing how social workers today are
leveraging technology to provide services to clients and the
importance of continually considering the ethical issues involved
in using such communication methods. It addresses the specific
ethical issues involved in video counseling, cybertherapy, text
messaging, self-guided web-based interventions, smartphone apps,
and other forms of digital communication. Ethical, regulatory, and
practice standards are covered, as well as challenges in integrated
health and social work educational settings. The final chapter is
dedicated to preventing and managing ethical and legal risk. Ethics
and Risk Management in Online and Distance Social Work is an ideal
textbook for advanced courses in social work. It is also an
excellent resource for social workers interested in incorporating
online or distance communication in their practice.
As society continues to heavily rely on software and databases, the
risks for cyberattacks have increased rapidly. As the dependence on
computers has become gradually widespread throughout communities
and governments, there is a need for cybersecurity programs that
can assist in protecting sizeable networks and significant amounts
of data at once. Implementing overarching security policies for
software systems is integral to protecting community-wide data from
harmful attacks. Establishing Cyber Security Programs Through the
Community Cyber Security Maturity Model (CCSMM) is an essential
reference source that discusses methods in applying sustainable
cybersecurity programs and policies within organizations,
governments, and other communities. Featuring research on topics
such as community engagement, incident planning methods, and
information sharing, this book is ideally designed for
cybersecurity professionals, security analysts, managers,
researchers, policymakers, students, practitioners, and
academicians seeking coverage on novel policies and programs in
cybersecurity implementation.
This book presents the state-of-the-art, current challenges, and
future perspectives for the field of many-criteria optimization and
decision analysis. The field recognizes that real-life problems
often involve trying to balance a multiplicity of considerations
simultaneously – such as performance, cost, risk, sustainability,
and quality. The field develops theory, methods and tools that can
support decision makers in finding appropriate solutions when faced
with many (typically more than three) such criteria at the same
time. The book consists of two parts: key research topics,
and emerging topics. Part I begins with a general introduction to
many-criteria optimization, perspectives from research leaders in
real-world problems, and a contemporary survey of the attributes of
problems of this kind. This part continues with chapters on
fundamental aspects of many-criteria optimization, namely on order
relations, quality measures, benchmarking, visualization, and
theoretical considerations. Part II offers more specialized
chapters on correlated objectives, heterogeneous objectives,
Bayesian optimization, and game theory. Written by leading experts
across the field of many-criteria optimization, this book will be
an essential resource for researchers in the fields of evolutionary
computing, operations research, multiobjective optimization, and
decision science.
This organizational history relates the role of the National
Science Foundation (NSF) in the development of modern computing.
Drawing upon new and existing oral histories, extensive use of NSF
documents, and the experience of two of the authors as senior
managers, this book describes how NSF's programmatic activities
originated and evolved to become the primary source of funding for
fundamental research in computing and information technologies. The
book traces how NSF's support has provided facilities and education
for computing usage by all scientific disciplines, aided in
institution and professional community building, supported
fundamental research in computer science and allied disciplines,
and led the efforts to broaden participation in computing by all
segments of society. Today, the research and infrastructure
facilitated by NSF computing programs are significant economic
drivers of American society and industry. For example, NSF
supported work that led to the first widely-used web browser,
Netscape; sponsored the creation of algorithms at the core of the
Google search engine; facilitated the growth of the public
Internet; and funded research on the scientific basis for countless
other applications and technologies. NSF has advanced the
development of human capital and ideas for future advances in
computing and its applications. This account is the first
comprehensive coverage of NSF's role in the extraordinary growth
and expansion of modern computing and its use. It will appeal to
historians of computing, policy makers and leaders in government
and academia, and individuals interested in the history and
development of computing and the NSF.
As environmental issues remain at the forefront of energy research,
renewable energy is now an all-important field of study. And as
smart technology continues to grow and be refined, its applications
broaden and increase in their potential to revolutionize
sustainability studies. This potential can only be fully realized
with a thorough understanding of the most recent breakthroughs in
the field. Research Advancements in Smart Technology, Optimization,
and Renewable Energy is a collection of innovative research that
explores the recent steps forward for smart applications in
sustainability. Featuring coverage on a wide range of topics
including energy assessment, neural fuzzy control, and
biogeography, this book is ideally designed for advocates,
policymakers, engineers, software developers, academicians,
researchers, and students.
Because it continually implements entrepreneurial creativity and
innovative business models, the economic landscape is ever-changing
in today's globalized world. As consumers become more willing to
accept new strategic trends, this has led to the emergence of
disruptive technologies. Since this equipment has an insufficient
amount of information and high risks, it is necessary to assess the
potential of disruptive technologies in the commercial environment.
Impact of Disruptive Technologies on the Sharing Economy provides
emerging research exploring the theoretical and practical aspects
of disruptive technologies and knowledge-based entrepreneurial
efforts and applications within management, business, and
economics. Featuring coverage on a broad range of topics such as
consumer ethics, corporate governance, and insurance issues, this
book is ideally designed for IT specialists, IT consultants,
software developers, computer engineers, managers, executives,
managing directors, students, professors, scientists,
professionals, industry practitioners, academicians, and
researchers seeking current research on the consequences of
disruptive technologies.
Mobile Sensors and Context-Aware Computing is a useful guide that
explains how hardware, software, sensors, and operating systems
converge to create a new generation of context-aware mobile
applications. This cohesive guide to the mobile computing landscape
demonstrates innovative mobile and sensor solutions for platforms
that deliver enhanced, personalized user experiences, with examples
including the fast-growing domains of mobile health and vehicular
networking. Users will learn how the convergence of mobile and
sensors facilitates cyber-physical systems and the Internet of
Things, and how applications which directly interact with the
physical world are becoming more and more compatible. The authors
cover both the platform components and key issues of security,
privacy, power management, and wireless interaction with other
systems.
|
|