|
|
Books > Computing & IT
The development of information technology in supply chains has
shown that this digital revolution can be a source of performance
for enterprises and governments. Among these technologies is
blockchain. The application of blockchains in cryptocurrency
reduces information security risks and eliminates several
processing and transaction fees and allows countries with volatile
currencies to have a more stable currency. Blockchain Applications
in Cryptocurrency for Technological Evolution features a collection
of contributions related to the application of blockchain
technology in cryptocurrency. It further explains the ways in which
these applications have affected the industry. Covering topics such
as crypto mining attacks, data processing architecture, and
purchase power, this premier reference source is an excellent
resource for business leaders and executives, IT managers,
logistics specialists, students and faculty of higher education,
librarians, researchers, and academicians.
Empower yourself with the knowledge to keep up with the rapidly
changing technical world of work, as two workforce productivity and
technology experts lay out a clear picture of
the?coming?revolution?in how work is done and how jobs are shaped.
If you listen to the news, robots are coming for your job.
Full-time employment will soon be a thing of the past as
organizations opt more to hire employees on a contract basis.?With
technological advances across email, video, project management, and
instant messaging platforms, being tied to a desk working full time
for one company is becoming obsolete. So, where does that leave
you? The Human Cloud may be the most important book you read to
prepare for how work is done in the future. In these pages, human
cloud technologist Matthew Mottola and AI expert Matthew Coatney
help you not only clearly understand the transition you see
happening around you, but they will also help you take advantage of
it. In The Human Cloud, Mottola and Coatney inform you about topics
including: How employees and employers will be able to take
advantage of the new automated and freelance-based workplace. How
they will be able to take advantage of the new technology
disruptions the machine cloud will create. Why the changes
employees and employers are seeing aren't the projection of doom
that many are predicting. How to navigate the coming job
marketplace. By replacing fear with knowledge, you will better
understand how this shift in employment is a good thing, be
equipped to embrace the positive?advantages new technology brings,
and further secure how your own job is shaped so you are never left
behind.
SECURITY AND PRIVACY IN THE INTERNET OF THINGS Provides the
authoritative and up-to-date information required for securing IoT
architecture and applications The vast amount of data generated by
the Internet of Things (IoT) has made information and cyber
security vital for not only personal privacy, but also for the
sustainability of the IoT itself. Security and Privacy in the
Internet of Things brings together high-quality research on IoT
security models, architectures, techniques, and application
domains. This concise yet comprehensive volume explores
state-of-the-art mitigations in IoT security while addressing
important security and privacy challenges across different IoT
layers. The book provides timely coverage of IoT architecture,
security technologies and mechanisms, and applications. The authors
outline emerging trends in IoT security and privacy with a focus on
areas such as smart environments and e-health. Topics include
authentication and access control, attack detection and prevention,
securing IoT through traffic modeling, human aspects in IoT
security, and IoT hardware security. Presenting the current body of
knowledge in a single volume, Security and Privacy in the Internet
of Things: Discusses a broad range of IoT attacks and defense
mechanisms Examines IoT security and privacy protocols and
approaches Covers both the logical and physical security of IoT
devices Addresses IoT security through network traffic modeling
Describes privacy preserving techniques in smart cities Explores
current threat and vulnerability analyses Security and Privacy in
the Internet of Things: Architectures, Techniques, and Applications
is essential reading for researchers, industry practitioners, and
students involved in IoT security development and IoT systems
deployment.
This book takes the reader through the actual manufacturing process
of making a typical chip, from start to finish, including a
detailed discussion of each step, in plain language. The evolution
of today's technology is added to the story, as seen through the
eyes of the engineers who solved some of the problems. The authors
are well suited to that discussion since they are three of those
same engineers. They have a broad exposure to the industry and its
technology that extends all the way back to Shockley Laboratories,
the first semiconductor manufacturer in Silicon Valley.
The CMOS (Complementary Metal-Oxide-Semiconductor) process flow is
the focus of the discussion and is covered in ten chapters. The
vast majority of chips made today are fabricated using this general
method. In order to ensure that all readers are comfortable with
the vocabulary, the first chapter carefully and clearly introduces
the science concepts found in later chapters. A chapter is devoted
to pointing out the differences in other manufacturing methods,
such as the gallium arsenide technology that produces chips for
cell phones. In addition, a chapter describing the nature of the
semiconductor industry from a business perspective is included.
"The entire process of making a chip is surprisingly easy to
understand. The part of the story that defies belief is the tiny
dimensions: the conducting wires and other structures on a chip are
more than a hundred times thinner than a hair - and getting thinner
with every new chip design."
* Included CD gives the reader a much greater comprehension of the
process than a strictly print book with static illustrations
provides
* Authors are actual engineers who have a broad range of exposure
and experience with chip technology
* Contains a unique chapter describing the nature of the
semiconductor industry from a business perspective
Superlubricity - the state between sliding systems where friction
is reduced to almost immeasurable amounts - holds great potential
for improving both the economic and environmental credentials of
moving mechanical systems. Research in this field has progressed
tremendously in recent years, and there now exist several
theoretical models, recognised techniques for computational
simulations and interesting experimental evidence of superlubricity
in practise. Superlubricity, Second Edition, presents an
extensively revised and updated overview of these important
developments, providing a comprehensive guide to the physical
chemistry underpinning molecular mechanisms of friction and
lubrication, current theoretical models used to explore and assess
superlubricity, examples of its achievement in experimental
systems, and discussion of potential future applications. Drawing
on the extensive knowledge of its expert editors and global team of
authors from across academia and industry, Superlubricity, Second
Edition, is a great resource for all those with a need to
understand, model or manipulate surface interactions for improved
performance.
Tactile Internet with Human-in-the-Loop describes the change from
the current Internet, which focuses on the democratization of
information independent of location or time, to the Tactile
Internet, which democratizes skills to promote equity that is
independent of age, gender, sociocultural background or physical
limitations. The book promotes the concept of the Tactile Internet
for remote closed-loop human-machine interaction and describes the
main challenges and key technologies. Current standardization
activities in the field for IEEE and IETF are also described,
making this book an ideal resource for researchers, graduate
students, and industry R&D engineers in communications
engineering, electronic engineering, and computer engineering.
Oxford Coding and Robotics
Novice Ground Level, in partnership with Resolute Education, comprises
a Workbook and Teacher's Guide. The Ground Level Workbook introduces
learners to the world of coding and robotics through computational
thinking, and how computers and robots "think".
Features
- Fun, interesting, practical activities encourage learner-centred
learning and teaching.
- Cut-outs and stickers enhance hand-eye coordination and fine
motor skills as well as understanding, creativity and reasoning skills.
- Full-colour illustrations and high-quality photos teach the key
knowledge, skills and values, and develop visual literacy.
- A glossary with pictures of selected terms enhances the
development of key Coding and Robotics vocabulary.
The Era of Artificial Intelligence, Machine Learning and Data
Science in the Pharmaceutical Industry examines the drug discovery
process, assessing how new technologies have improved
effectiveness. Artificial intelligence and machine learning are
considered the future for a wide range of disciplines and
industries, including the pharmaceutical industry. In an
environment where producing a single approved drug costs millions
and takes many years of rigorous testing prior to its approval,
reducing costs and time is of high interest. This book follows the
journey that a drug company takes when producing a therapeutic,
from the very beginning to ultimately benefitting a patient's life.
This comprehensive resource will be useful to those working in the
pharmaceutical industry, but will also be of interest to anyone
doing research in chemical biology, computational chemistry,
medicinal chemistry and bioinformatics.
With the far-reaching global impact of the COVID-19 pandemic, the
demand and the necessity for digital enterprise transformation have
accelerated exponentially. Management and strategies for the
adoption and wider usage of newer digital technologies for the
transformation of an enterprise through digital tools such as
real-time video communications have shown that people no longer
need to be required to be physically present in the same place;
rather, they can be geographically dispersed. Technologies such as
artificial intelligence, cloud computing, digital banking, and
cloud data have taken over tasks that were initially done by human
hands and have increased both the automation and efficiency of
tasks and the accessibility of information and services. Inclusion
of all these newer technologies has shown the fast pace at which
the digital enterprise transformation is rapidly evolving and how
new ecosystems are reshaping the digital enterprise model.
Disruptive Technology and Digital Transformation for Business and
Government presents interesting research on digital enterprise
transformation at different stages and across different settings
within government and industry, along with key issues and deeper
insights on the core problems and developing solutions and
recommendations for digital enterprise transformation. The chapters
examine the three core leaders of transformation: the people such
as managers, employees, and customers; the digital technology such
as artificial intelligence and robotics; and the digital
enterprise, including the products and services being transformed.
They unravel the underlying process for management and strategies
to fully incorporate new digital tools and technologies across all
aspects of an enterprise undergoing transformation. This book is
ideally intended for managers, executives, IT consultants, business
professionals, government officials, researchers, students,
practitioners, stakeholders, academicians, and anyone else looking
to learn about new developments in digital enterprise
transformation of business systems from a global perspective.
This guidance covers the practical application of photogrammetry in
recording cultural heritage, with particular reference to structure
from motion (SfM) techniques. Our audience for this document
includes survey contractors, archaeological contractors, voluntary
organisations and specialists. Photogrammetric image acquisition
and processing, until recently requiring a considerable investment
in hardware and software, are now possible at a fraction of their
former cost. This has led to a huge increase in the use of
photogrammetry in cultural heritage recording. The skills required
to apply the techniques successfully and accurately are discussed,
and background information on how various parts of the process work
is provided so that better results can be achieved through better
understanding. Photogrammetry is characterised by its versatility,
and is applicable over a wide range of scales, from landscapes to
small objects. The particular requirements needed at these
different scales are outlined, and both imaging techniques and
useful ancillary equipment are described. The different types of
outputs are discussed, including their suitability for further
interrogation using a range of established analytical techniques
and the presentation options available. A range of case studies
illustrates the application of photogrammetry across a variety of
projects that broadly reflect the areas discussed in the text. This
document is one of a number of Historic England technical advice
documents on how to survey historic places.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,228
Discovery Miles 12 280
|