|
|
Books > Computing & IT
Sega Arcade: Pop-Up History presents six of the most iconic Sega
Taiken 'body sensation' videogame cabinets - Hang-On, Space
Harrier, Out Run, After Burner, Thunder Blade and Power Drift - in
an innovative form: as dazzling pop-up paper sculptures. Sega
Arcade: Pop-Up History is a unique book object, a delight for Sega
fans and a love letter to the once-vibrant arcade game scene of the
1980s. Accompanying the 3D model showcase is a written history from
Guardian games writer and best-selling novelist, Keith Stuart,
punctuated by specially restored production artwork and beautifully
reproduced in-game screens. The book features contributions from
arcade game innovator Yu Suzuki, who offers first-hand insight into
the development of these ground-breaking games and the birth of the
Taiken cabinet phenomenon.
Up and Running with AutoCAD 2017: 2D and 3D Drawing and Modeling
presents Gindis' combination of step-by-step instruction, examples,
and insightful explanations. The emphasis from the beginning is on
core concepts and practical application of AutoCAD in engineering,
architecture, and design. Equally useful in instructor-led
classroom training, self-study, or as a professional reference, the
book is written with the user in mind by a long-time AutoCAD
professional and instructor based on what works in the industry and
the classroom.
Discussions around the preservation of privacy and confidential
data of patients parallels discussions about innovation,
effectiveness, and quality of care that the use of technology can
provide in health services. The use of technology in the management
of health services and in the provision of care in hospital
establishments can pose ethical issues. An effective solution needs
to be concocted before the use of this technology disturbs the
privacy practices of today's healthcare systems. Emerging Trends
and Innovations in Privacy and Health Information Management is a
collection of innovative research on the methods and applications
of the preservation of privacy and confidential data of patients.
While highlighting topics including privacy laws, ethical issues,
and healthcare security, this book is ideally designed for
professionals and researchers working in the fields of health,
social intervention, and information management.
In this book, translated into English for the first time, Lelio
Demichelis takes on a modern perspective of the concept/process of
alienation. This concept-much more profound and widespread today
than first described and denounced by Marx-has largely been
forgotten and erased. Using the characters of Narcissus, Pygmalion
and Prometheus, the author reinterprets and updates Marx,
Nietzsche, Anders, Foucault and, in particular, critical theory and
the Frankfurt School views on an administered society (where
everything is automated and engineered, manifest today in
algorithms, AI, machine learning and social networking) showing
that, in a world where old and new forms of alienation come
together, man is increasingly led to delegate (i.e. alienate)
sovereignty, freedom, responsibility and the awareness of being
alive.
Universal UX Design: Building Multicultural User Experience
provides an ideal guide as multicultural UX continues to emerge as
a transdisciplinary field that, in addition to the traditional UI
and corporate strategy concerns, includes socio/cultural and
neurocognitive concerns that constitute one of the first steps in a
truly global product strategy. In short, multicultural UX is no
longer a nice-to-have in your overall UX strategy, it is now a
must-have. This practical guide teaches readers about international
concerns on the development of a uniquely branded, yet culturally
appealing, software end-product. With hands-on examples throughout,
readers will learn how to accurately predict user behavior,
optimize layout and text elements, and integrate persuasive design
in layout, as well as how to determine which strategies to
communicate image and content more effectively, while demystifying
the psychological and sociopolitical factors associated with
culture. The book reviews the essentials of cognitive UI perception
and how they are affected by socio-cultural conditioning, as well
as how different cultural bias and expectations can work in UX
design.
Multimedia represents information in novel and varied formats. One
of the most prevalent examples of continuous media is video.
Extracting underlying data from these videos can be an arduous
task. From video indexing, surveillance, and mining, complex
computational applications are required to process this data.
Intelligent Analysis of Multimedia Information is a pivotal
reference source for the latest scholarly research on the
implementation of innovative techniques to a broad spectrum of
multimedia applications by presenting emerging methods in
continuous media processing and manipulation. This book offers a
fresh perspective for students and researchers of information
technology, media professionals, and programmers.
Autonomic networking aims to solve the mounting problems created by
increasingly complex networks, by enabling devices and
service-providers to decide, preferably without human intervention,
what to do at any given moment, and ultimately to create
self-managing networks that can interface with each other, adapting
their behavior to provide the best service to the end-user in all
situations. This book gives both an understanding and an assessment
of the principles, methods and architectures in autonomous network
management, as well as lessons learned from, the ongoing
initiatives in the field. It includes contributions from industry
groups at Orange Labs, Motorola, Ericsson, the ANA EU Project and
leading universities. These groups all provide chapters examining
the international research projects to which they are contributing,
such as the EU Autonomic Network Architecture Project and Ambient
Networks EU Project, reviewing current developments and
demonstrating how autonomic management principles are used to
define new architectures, models, protocols, and mechanisms for
future network equipment.
As the internet and its applications grow more sophisticated and
widespread, so too do the strategies of modern terrorist groups.
The existence of the dark web adds to the online arsenal of groups
using digital networks and sites to promulgate ideology or recruit
supporters. It is necessary to understand how terrorist cells are
using and adapting online tools in order to counteract their
efforts. Utilization of New Technologies in Global Terror: Emerging
Research and Opportunities is an informative resource that explores
new developments in technological advancements and the progression
of terror organizations while also examining non-government
activist organizations and their new role in protecting internet
freedom and combating cyberterrorism. Featuring relevant topics
such as social media, cyber threats, and counterterrorism, this
publication will benefit government officials, political
scientists, policymakers, researchers, academicians, and graduate
students interested in political science, mass communication, and
cyberwarfare.
With the rapid advancement in technology, a myriad of new threats
have emerged in online environments. The broad spectrum of these
digital risks requires new and innovative methods for protection
against cybercrimes. Combating Security Breaches and Criminal
Activity in the Digital Sphere is a pivotal reference source for
the latest scholarly research on current trends in cyber forensic
investigations, focusing on advanced techniques for protecting
information security and preventing potential exploitation for
online users. Featuring law enforcement perspectives, theoretical
foundations, and forensic methods, this book is ideally designed
for policy makers, analysts, researchers, technology developers,
and upper-level students.
With the growth and advancement of business and industry, there is
a growing need for the advancement of the strategies that manage
these modernizations. Adaptation to advancement is essential for
the success of these organizations and using the proper methods to
accomplish this essential adaptation is paramount. Organizational
Transformation and Managing Innovation in the Fourth Industrial
Revolution provides innovative insights into the management of
advancements and the implementation of strategies to accommodate
these changes. The content within this publication examines social
engagement, cyber-journalism, and educational innovation. It is
designed for managers, consultants, academicians, researchers, and
professionals, and covers topics centered on the growth of
businesses and how they change alongside the economy and
infrastructure.
Technology continues to make great strides in society by providing
opportunities for advancement, inclusion, and global competency. As
new systems and tools arise, novel applications are created as
well. Smart Technology Applications in Business Environments is an
essential reference source for the latest scholarly research on the
risks and opportunities of utilizing the latest technologies in
different aspects of society such as education, healthcare systems,
and corporations. Featuring extensive coverage on a broad range of
topics and perspectives including virtual reality, robotics, and
social media, this publication is ideally designed for
academicians, researchers, students, and practitioners seeking
current research on the improvement and increased productivity from
the implementation of smart technologies.
Quantum Inspired Computational Intelligence: Research and
Applications explores the latest quantum computational intelligence
approaches, initiatives, and applications in computing,
engineering, science, and business. The book explores this emerging
field of research that applies principles of quantum mechanics to
develop more efficient and robust intelligent systems. Conventional
computational intelligence-or soft computing-is conjoined with
quantum computing to achieve this objective. The models covered can
be applied to any endeavor which handles complex and meaningful
information.
Can you imagine swapping your body for a virtual version? This
technology-based look at the afterlife chronicles America's
fascination with death and reveals how digital immortality may
become a reality. The Internet has reinvented the paradigm of life
and death: social media enables a discourse with loved ones long
after their deaths, while gaming sites provide opportunities for
multiple lives and life forms. In this thought-provoking work,
author Kevin O'Neill examines America's concept of afterlife—as
imagined in cyberspace—and considers how technologies designed to
emulate immortality present serious challenges to our ideas about
human identity and to our religious beliefs about heaven and hell.
The first part of the work—covering the period between 1840 and
1860—addresses post-mortem photography, cemetery design, and
spiritualism. The second section discusses Internet afterlife,
including online memorials and cemeteries; social media legacy
pages; and sites that curate passwords, bequests, and final
requests. The work concludes with chapters on the transhumanist
movement, the philosophical and religious debates about Internet
immortality, and the study of technologies attempting to extend
life long after the human form ceases.
Peering Carrier Ethernet Networks begins by providing background
information on the evolution of important concepts and building
blocks that have led to the current state of high bandwidth and
high performance Ethernet technology in order to support current
and emerging customer applications. The background information
covered includes an overview of Public Switched Telephone Networks
(PSTN) to describe circuit switching, multiplexing, and voice
digitization that lead to the development of T1/T3 and SONET/SDH
for transport. It interweaves these developments with changes in
the regulatory regime. Additional coverage includes Carrier
Ethernet networks' technical standards, which describe how service
providers can offer services to off-net customers using peered
Carrier Ethernet networks and a description of the taxonomy of
customers and their current and emerging applications at Layer 2
and Layer 3 on peered Carrier Ethernet networks. The book concludes
by describing next steps in Ethernet technology to meet growing
demands and emerging trends.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,228
Discovery Miles 12 280
|