0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (57)
  • R250 - R500 (365)
  • R500+ (14,538)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases

Handbook on Knowledge Management 2 - Knowledge Directions (Hardcover, 2003 ed.): Clyde Holsapple Handbook on Knowledge Management 2 - Knowledge Directions (Hardcover, 2003 ed.)
Clyde Holsapple
R5,565 Discovery Miles 55 650 Ships in 18 - 22 working days

As the most comprehensive reference work dealing with knowledge management (KM), this work is essential for the library of every KM practitioner, researcher, and educator. Written by an international array of KM luminaries, its approx. 60 chapters approach knowledge management from a wide variety of perspectives ranging from classic foundations to cutting-edge thought, informative to provocative, theoretical to practical, historical to futuristic, human to technological, and operational to strategic. The chapters are conveniently organized into 8 major sections. The second volume consists of the sections: technologies for knowledge management, outcomes of KM, knowledge management in action, and the KM horizon. Novices and experts alike will refer to the authoritative and stimulating content again and again for years to come.

Practical Intranet Security - Overview of the State of the Art and Available Technologies (Hardcover, 1999 ed.): Paul M.... Practical Intranet Security - Overview of the State of the Art and Available Technologies (Hardcover, 1999 ed.)
Paul M. Ashley, M. Vandenwauver
R5,170 Discovery Miles 51 700 Ships in 18 - 22 working days

Foreword by Lars Knudsen
"Practical Intranet Security" focuses on the various ways in which an intranet can be violated and gives a thorough review of the technologies that can be used by an organization to secure its intranet. This includes, for example, the new security architecture SESAME, which builds on the Kerberos authentication system, adding to it both public-key technology and a role-based access control service. Other technologies are also included such as a description of how to program with the GSS-API, and modern security technologies such as PGP, S/MIME, SSH, SSL IPSEC and CDSA. The book concludes with a comparison of the technologies.
This book is different from other network security books in that its aim is to identify how to secure an organization's intranet. Previously books have concentrated on the Internet, often neglecting issues relating to securing intranets. However the potential risk to business and the ease by which intranets can be violated is often far greater than via the Internet.
The aim is that network administrators and managers can get the information that they require to make informed choices on strategy and solutions for securing their own intranets.
The book is an invaluable reference for network managers and network administrators whose responsibility it is to ensure the security of an organization's intranet. The book also contains background reading on networking, network security and cryptography which makes it an excellent research reference and undergraduate/postgraduate text book.

Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems (Paperback): Bharat Bhushan, Sudhir Kumar... Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems (Paperback)
Bharat Bhushan, Sudhir Kumar Sharma, Muzafer Saracevic, Azedine Boulmakoul
R2,945 Discovery Miles 29 450 Ships in 10 - 15 working days

Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems explores the various benefits and challenges associated with the integration of blockchain with IoT healthcare systems, focusing on designing cognitive-embedded data technologies to aid better decision-making, processing and analysis of large amounts of data collected through IoT. This book series targets the adaptation of decision-making approaches under cognitive computing paradigms to demonstrate how the proposed procedures, as well as big data and Internet of Things (IoT) problems can be handled in practice. Current Internet of Things (IoT) based healthcare systems are incapable of sharing data between platforms in an efficient manner and holding them securely at the logical and physical level. To this end, blockchain technology guarantees a fully autonomous and secure ecosystem by exploiting the combined advantages of smart contracts and global consensus. However, incorporating blockchain technology in IoT healthcare systems is not easy. Centralized networks in their current capacity will be incapable to meet the data storage demands of the incoming surge of IoT based healthcare wearables.

The Data Bank Society (Routledge Revivals) - Organizations, Computers and Social Freedom (Hardcover): Malcolm Warner, Mike Stone The Data Bank Society (Routledge Revivals) - Organizations, Computers and Social Freedom (Hardcover)
Malcolm Warner, Mike Stone
R3,288 R1,451 Discovery Miles 14 510 Save R1,837 (56%) Ships in 10 - 15 working days

This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing. Discussing areas such as the impact of the computer on administration, privacy and the storage on information, the authors assess the technical and social feasibility of constructing integrated data banks to cover the details of populations. The book was hugely influential both in terms of scholarship and legislation, and the years following saw the introduction of the Data Protection Act of 1984, which was then consolidated by the Act of 1998. The topics under discussion remain of great concern to the public in our increasingly web-based world, ensuring the continued relevance of this title to academics and students with an interest in data protection and public privacy.

Fuzzy Logic in Data Modeling - Semantics, Constraints, and Database Design (Hardcover, 1998 ed.): Guoqing Chen Fuzzy Logic in Data Modeling - Semantics, Constraints, and Database Design (Hardcover, 1998 ed.)
Guoqing Chen
R4,137 Discovery Miles 41 370 Ships in 18 - 22 working days

also in: THE KLUWER INTERNATIONAL SERIES ON ASIAN STUDIES IN COMPUTER AND INFORMATION SCIENCE, Volume 2

Synchronizing E-Security (Hardcover, 2004 ed.): Godfried B. Williams Synchronizing E-Security (Hardcover, 2004 ed.)
Godfried B. Williams
R2,712 Discovery Miles 27 120 Ships in 18 - 22 working days

Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies. This book presents insights into the validity and credibility of current risk assessment methods that support electronic transactions in the global economy. Synchronizing E-Security focuses on a number of case studies of IT companies, within selected countries in West Africa, Europe, Asia and the United States. The foundation of this work is based on previous studies by Williams G., Avudzivi P.V (Hawaii 2002) on the retrospective view of information security management and the impact of tele-banking on the end-user.

Data Stewardship - An Actionable Guide to Effective Data Management and Data Governance (Paperback, 2nd edition): David Plotkin Data Stewardship - An Actionable Guide to Effective Data Management and Data Governance (Paperback, 2nd edition)
David Plotkin
R1,286 Discovery Miles 12 860 Ships in 10 - 15 working days

Data stewards in any organization are the backbone of a successful data governance implementation because they do the work to make data trusted, dependable, and high quality. Since the publication of the first edition, there have been critical new developments in the field, such as integrating Data Stewardship into project management, handling Data Stewardship in large international companies, handling "big data" and Data Lakes, and a pivot in the overall thinking around the best way to align data stewardship to the data-moving from business/organizational function to data domain. Furthermore, the role of process in data stewardship is now recognized as key and needed to be covered. Data Stewardship, Second Edition provides clear and concise practical advice on implementing and running data stewardship, including guidelines on how to organize based on organizational/company structure, business functions, and data ownership. The book shows data managers how to gain support for a stewardship effort, maintain that support over the long-term, and measure the success of the data stewardship effort. It includes detailed lists of responsibilities for each type of data steward and strategies to help the Data Governance Program Office work effectively with the data stewards.

High-Dimensional and Low-Quality Visual Information Processing - From Structured Sensing and Understanding (Hardcover, 2015... High-Dimensional and Low-Quality Visual Information Processing - From Structured Sensing and Understanding (Hardcover, 2015 ed.)
Yue Deng
R1,388 Discovery Miles 13 880 Ships in 18 - 22 working days

This thesis primarily focuses on how to carry out intelligent sensing and understand the high-dimensional and low-quality visual information. After exploring the inherent structures of the visual data, it proposes a number of computational models covering an extensive range of mathematical topics, including compressive sensing, graph theory, probabilistic learning and information theory. These computational models are also applied to address a number of real-world problems including biometric recognition, stereo signal reconstruction, natural scene parsing, and SAR image processing.

Fault-Tolerant Real-Time Systems - The Problem of Replica Determinism (Hardcover, 1996 ed.): Stefan Poledna Fault-Tolerant Real-Time Systems - The Problem of Replica Determinism (Hardcover, 1996 ed.)
Stefan Poledna
R4,098 Discovery Miles 40 980 Ships in 18 - 22 working days

Real-time computer systems are very often subject to dependability requirements because of their application areas. Fly-by-wire airplane control systems, control of power plants, industrial process control systems and others are required to continue their function despite faults. Fault-tolerance and real-time requirements thus constitute a kind of natural combination in process control applications. Systematic fault-tolerance is based on redundancy, which is used to mask failures of individual components. The problem of replica determinism is thereby to ensure that replicated components show consistent behavior in the absence of faults. It might seem trivial that, given an identical sequence of inputs, replicated computer systems will produce consistent outputs. Unfortunately, this is not the case. The problem of replica non-determinism and the presentation of its possible solutions is the subject of Fault-Tolerant Real-Time Systems: The Problem of Replica Determinism. The field of automotive electronics is an important application area of fault-tolerant real-time systems. Systems like anti-lock braking, engine control, active suspension or vehicle dynamics control have demanding real-time and fault-tolerance requirements. These requirements have to be met even in the presence of very limited resources since cost is extremely important. Because of its interesting properties Fault-Tolerant Real-Time Systems gives an introduction to the application area of automotive electronics. The requirements of automotive electronics are a topic of discussion in the remainder of this work and are used as a benchmark to evaluate solutions to the problem of replica determinism.

Distributed, Parallel and Biologically Inspired Systems - 7th IFIP TC 10 Working Conference, DIPES 2010, and 3rd IFIP TC 10... Distributed, Parallel and Biologically Inspired Systems - 7th IFIP TC 10 Working Conference, DIPES 2010, and 3rd IFIP TC 10 International Conference, BICC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings (Hardcover, Edition.)
Mike Hinchey, Bernd Kleinjohann, Lisa Kleinjohann, Peter Lindsay, Franz J. Rammig, …
R1,446 Discovery Miles 14 460 Ships in 18 - 22 working days

st This volume contains the proceedings of two conferences held as part of the 21 IFIP World Computer Congress in Brisbane, Australia, 20-23 September 2010. th The first part of the book presents the proceedings of DIPES 2010, the 7 IFIP Conference on Distributed and Parallel Embedded Systems. The conference, int- duced in a separate preface by the Chairs, covers a range of topics from specification and design of embedded systems through to dependability and fault tolerance. rd The second part of the book contains the proceedings of BICC 2010, the 3 IFIP Conference on Biologically-Inspired Collaborative Computing. The conference is concerned with emerging techniques from research areas such as organic computing, autonomic computing and self-adaptive systems, where inspiraton for techniques - rives from exhibited behaviour in nature and biology. Such techniques require the use of research developed by the DIPES community in supporting collaboration over multiple systems. We hope that the combination of the two proceedings will add value for the reader and advance our related work.

Analysis, Retrieval and Delivery of Multimedia Content (Hardcover, 2013 ed.): Nicola Adami, Andrea Cavallaro, Riccardo... Analysis, Retrieval and Delivery of Multimedia Content (Hardcover, 2013 ed.)
Nicola Adami, Andrea Cavallaro, Riccardo Leonardi, Pierangelo Migliorati
R4,043 Discovery Miles 40 430 Ships in 18 - 22 working days

Covering some of the most cutting-edge research on the delivery and retrieval of interactive multimedia content, this volume of specially chosen contributions provides the most updated perspective on one of the hottest contemporary topics. The material represents extended versions of papers presented at the 11th International Workshop on Image Analysis for Multimedia Interactive Services, a vital international forum on this fast-moving field. Logically organized in discrete sections that approach the subject from its various angles, the content deals in turn with content analysis, motion and activity analysis, high-level descriptors and video retrieval, 3-D and multi-view, and multimedia delivery. The chapters cover the finest detail of emerging techniques such as the use of high-level audio information in improving scene segmentation and the use of subjective logic for forensic visual surveillance. On content delivery, the book examines both images and video, focusing on key subjects including an efficient pre-fetching strategy for JPEG 2000 image sequences. Further contributions look at new methodologies for simultaneous block reconstruction and provide a trellis-based algorithm for faster motion-vector decision making.

Social Software and Web 2.0 Technology Trend - Blogs, Podcasts and Wikis (Hardcover): P. Candace Deans Social Software and Web 2.0 Technology Trend - Blogs, Podcasts and Wikis (Hardcover)
P. Candace Deans
R4,898 Discovery Miles 48 980 Ships in 18 - 22 working days

Very little has been written to address the emerging trends in social software and technology. With these technologies and applications being relatively new and evolving rapidly, research is wide open in these fields. Social Software and Web 2.0 Technology Trends fills this critical research need, providing an overview of the current state of Web 2.0 technologies and their impact on organizations and educational institutions. Written for academicians and practicing managers, this estimable book presents business applications as well as implementations for institutions of higher education with numerous examples of how these technologies are currently being used. Delivering authoritative insights to a rapidly evolving domain of technology application, this book is an invaluable resource for both academic libraries and for classroom instruction.

Data Mining Methods for Knowledge Discovery (Hardcover, 1998 ed.): Krzysztof J. Cios, Witold Pedrycz, Roman W. Swiniarski Data Mining Methods for Knowledge Discovery (Hardcover, 1998 ed.)
Krzysztof J. Cios, Witold Pedrycz, Roman W. Swiniarski
R4,291 Discovery Miles 42 910 Ships in 18 - 22 working days

Data Mining Methods for Knowledge Discovery provides an introduction to the data mining methods that are frequently used in the process of knowledge discovery. This book first elaborates on the fundamentals of each of the data mining methods: rough sets, Bayesian analysis, fuzzy sets, genetic algorithms, machine learning, neural networks, and preprocessing techniques. The book then goes on to thoroughly discuss these methods in the setting of the overall process of knowledge discovery. Numerous illustrative examples and experimental findings are also included. Each chapter comes with an extensive bibliography. Data Mining Methods for Knowledge Discovery is intended for senior undergraduate and graduate students, as well as a broad audience of professionals in computer and information sciences, medical informatics, and business information systems.

Fuzziness in Database Management Systems (Hardcover, 1995 ed.): Patrick Bosc Fuzziness in Database Management Systems (Hardcover, 1995 ed.)
Patrick Bosc
R4,248 Discovery Miles 42 480 Ships in 18 - 22 working days

The volume "Fuzziness in Database Management Systems" is a highly informative, well-organized and up-to-date collection of contributions authored by many of the leading experts in its field. Among the contributors are the editors, Professors Patrick Bose and Janusz Kacprzyk, both of whom are known internationally. The book is like a movie with an all-star cast. The issue of fuzziness in database management systems has a long history. It begins in 1968 and 1971, when I spent my sabbatical leaves at the IBM Research Laboratory in San Jose, California, as a visiting scholar. During these periods I was associated with Dr. E.F. Codd, the father of relational models of database systems, and came in contact with the developers ofiBMs System Rand SQL. These associations and contacts at a time when the methodology of relational models of data was in its formative stages, made me aware of the basic importance of such models and the desirability of extending them to fuzzy database systems and fuzzy query languages. This perception was reflected in my 1973 ffiM report which led to the paper on the concept of a linguistic variable and later to the paper on the meaning representation language PRUF (Possibilistic Relational Universal Fuzzy). More directly related to database issues during that period were the theses of my students V. Tahani, J. Yang, A. Bolour, M. Shen and R. Sheng, and many subsequent reports by both graduate and undergraduate students at Berkeley.

Public-Key Cryptography (Hardcover, 2nd enlarged ed. 1996): Arto Salomaa Public-Key Cryptography (Hardcover, 2nd enlarged ed. 1996)
Arto Salomaa
R1,557 Discovery Miles 15 570 Ships in 18 - 22 working days

Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. The second edition has been revised and enlarged especially in its treatment of cryptographic protocols. From a review of the first edition: "This is a comprehensive review ... there can be no doubt that this will be accepted as a standard text. At the same time, it is clearly and entertainingly written ... and can certainly stand alone." Alex M. Andrew, Kybernetes, March 1992

Protocols and Procedures of Cryptography and Network Security (Hardcover): Stephen Mason Protocols and Procedures of Cryptography and Network Security (Hardcover)
Stephen Mason
R1,801 Discovery Miles 18 010 Ships in 10 - 15 working days
Practical Studies in E-Government - Best Practices from Around the World (Hardcover, 2011 ed.): Said Assar, Imed Boughzala,... Practical Studies in E-Government - Best Practices from Around the World (Hardcover, 2011 ed.)
Said Assar, Imed Boughzala, Isabelle Boydens
R2,790 Discovery Miles 27 900 Ships in 18 - 22 working days

Information and communication technology (ICT) is permeating all aspects of service management; in the public sector, ICT is improving the capacity of government agencies to provide a wide array of innovative services that benefit citizens. E-Government is emerging as a multidisciplinary field of research based initially on empirical insights from practice. Efforts to theoretically anchor the field have opened perspectives from multiple research domains, as demonstrated in Practical Studies in E-Government. In this volume, the editors and contributors consider the evolution of the e-government field from both practical and research perspectives. Featuring in-depth case studies of initiatives in eight countries, the book deals with such technology-oriented issues as interoperability, prototyping, data quality, and advanced interfaces, and management-oriented issues as e-procurement, e-identification, election results verification, and information privacy. The book features best practices, tools for measuring and improving performance, and analytical methods for researchers.

Handbook of Economic Expectations (Paperback): Ruediger Bachmann, Giorgio Topa, Wilbert Van Der Klaauw Handbook of Economic Expectations (Paperback)
Ruediger Bachmann, Giorgio Topa, Wilbert Van Der Klaauw
R2,978 Discovery Miles 29 780 Ships in 10 - 15 working days

Handbook of Economic Expectations discusses the state-of-the-art in the collection, study and use of expectations data in economics, including the modelling of expectations formation and updating, as well as open questions and directions for future research. The book spans a broad range of fields, approaches and applications using data on subjective expectations that allows us to make progress on fundamental questions around the formation and updating of expectations by economic agents and their information sets. The information included will help us study heterogeneity and potential biases in expectations and analyze impacts on behavior and decision-making under uncertainty.

Multivariate Analysis of Quality - An Introduction (Hardcover): H. Martens Multivariate Analysis of Quality - An Introduction (Hardcover)
H. Martens
R8,019 Discovery Miles 80 190 Ships in 18 - 22 working days

Multivariate data analysis is a central tool whenever several variables need to be considered at the same time. The present book explains a powerful and versatile way to analyse data tables, suitable also for researchers without formal training in statistics.

This method for extracting useful information from data is demonstrated for various types of quality assessment, ranging from human quality perception via industrial quality monitoring to health quality and its molecular basis.

Key features include:

  • Minimum mathematics; all technical details in appendix form
  • Very accessible style with cartoons, self assessment questions and wide range of practical examples
  • All data sets available FREE online on Chemometrics World (http://www.wiley.co.uk/wileychi/chemometrics).
Essential reading for researchers who need data analysis in practice, it will be of particular interest to chemometricians, sensometricians and food scientists already familiar with Harald's previous book.

The book is written with ISO certified businesses and laboratories in mind, to enhance Total Quality Management (TQM). As yet there are no clear guidelines for realistic data analysis of quality in complex systems - this volume bridges the gap.

Semantic Web Services, Processes And Applications (Hardcover, 2006 ed.): Jorge Cardoso, Amit P. Sheth Semantic Web Services, Processes And Applications (Hardcover, 2006 ed.)
Jorge Cardoso, Amit P. Sheth
R4,076 Discovery Miles 40 760 Ships in 18 - 22 working days

Semantics, Web services, and Web processes promise better re-use, universal interoperability and integration. Semantics has been recognized as the primary tool to address the challenges of a broad spectrum of heterogeneity and for improving automation through machine understandable descriptions.

Semantic Web Services, Processes and Applications brings contributions from researchers who study, explore and understand the semantic enabling of all phases of semantic Web processes. This encompasses design, annotation, discovery, choreography and composition. Also this book presents fundamental capabilities and techniques associated with ontological modeling or services, annotation, matching and mapping, and reasoning. This is complemented by discussion of applications in e-Government and bioinformatics.

Special bulk rates are available for course adoption through Publishing Editor.

Introduction to Artificial Intelligence (Hardcover, 1st ed. 2016): Mariusz Flasinski Introduction to Artificial Intelligence (Hardcover, 1st ed. 2016)
Mariusz Flasinski
R2,465 Discovery Miles 24 650 Ships in 18 - 22 working days

In the chapters in Part I of this textbook the author introduces the fundamental ideas of artificial intelligence and computational intelligence. In Part II he explains key AI methods such as search, evolutionary computing, logic-based reasoning, knowledge representation, rule-based systems, pattern recognition, neural networks, and cognitive architectures. Finally, in Part III, he expands the context to discuss theories of intelligence in philosophy and psychology, key applications of AI systems, and the likely future of artificial intelligence. A key feature of the author's approach is historical and biographical footnotes, stressing the multidisciplinary character of the field and its pioneers. The book is appropriate for advanced undergraduate and graduate courses in computer science, engineering, and other applied sciences, and the appendices offer short formal, mathematical models and notes to support the reader.

Information Management: Technologies and Methodologies (Hardcover): Iker Morris Information Management: Technologies and Methodologies (Hardcover)
Iker Morris
R3,068 R2,783 Discovery Miles 27 830 Save R285 (9%) Ships in 18 - 22 working days
Private Data and Public Value - Governance, Green Consumption, and Sustainable Supply Chains (Hardcover, 1st ed. 2016): Holly... Private Data and Public Value - Governance, Green Consumption, and Sustainable Supply Chains (Hardcover, 1st ed. 2016)
Holly Jarman, Luis F. Luna-Reyes
R3,316 Discovery Miles 33 160 Ships in 10 - 15 working days

This book investigates the ways in which these systems can promote public value by encouraging the disclosure and reuse of privately-held data in ways that support collective values such as environmental sustainability. Supported by funding from the National Science Foundation, the authors' research team has been working on one such system, designed to enhance consumers ability to access information about the sustainability of the products that they buy and the supply chains that produce them. Pulled by rapidly developing technology and pushed by budget cuts, politicians and public managers are attempting to find ways to increase the public value of their actions. Policymakers are increasingly acknowledging the potential that lies in publicly disclosing more of the data that they hold, as well as incentivizing individuals and organizations to access, use, and combine it in new ways. Due to technological advances which include smarter phones, better ways to track objects and people as they travel, and more efficient data processing, it is now possible to build systems which use shared, transparent data in creative ways. The book adds to the current conversation among academics and practitioners about how to promote public value through data disclosure, focusing particularly on the roles that governments, businesses and non-profit actors can play in this process, making it of interest to both scholars and policy-makers.

Spectral Interpretation of Decision Diagrams (Hardcover, 2003 ed.): Radomir Stankovic, Jaakko T. Astola Spectral Interpretation of Decision Diagrams (Hardcover, 2003 ed.)
Radomir Stankovic, Jaakko T. Astola
R2,817 Discovery Miles 28 170 Ships in 18 - 22 working days

Decision diagrams (DDs) are data structures for efficient (time/space) representations of large discrete functions. In addition to their wide application in engineering practice, DDs are now a standard part of many CAD systems for logic design and a basis for severe signal processing algorithms. "Spectral Interpretation of Decision Diagrams" derives from attempts to classify and uniformly interpret DDs through spectral interpretation methods, relating them to different Fourier-series-like functional expressions for discrete functions and a group-theoretic approach to DD optimization. The book examines DDs found in literature and engineering practice and provides insights into relationships between DDs and different polynomial or spectral expressions for representation of discrete functions. In addition, it offers guidelines and criteria for selection of the most suitable representation in terms of space and time complexity. The work complements theory with numerous illustrative examples from practice. Moreover, the importance of DD representations to the verification and testing of arithmetic circuits is addressed, as well as problems related to various signal processing tasks.

Data Management for Mobile Computing (Hardcover, 1998 ed.): Evaggelia Pitoura, George Samaras Data Management for Mobile Computing (Hardcover, 1998 ed.)
Evaggelia Pitoura, George Samaras
R5,230 Discovery Miles 52 300 Ships in 18 - 22 working days

Earth date, August 11, 1997 "Beam me up Scottie!" "We cannot do it! This is not Star Trek's Enterprise. This is early years Earth." True, this is not yet the era of Star Trek, we cannot beam captain James T. Kirk or captain Jean Luc Pickard or an apple or anything else anywhere. What we can do though is beam information about Kirk or Pickard or an apple or an insurance agent. We can beam a record of a patient, the status of an engine, a weather report. We can beam this information anywhere, to mobile workers, to field engineers, to a track loading apples, to ships crossing the Oceans, to web surfers. We have reached a point where the promise of information access anywhere and anytime is close to realization. The enabling technology, wireless networks, exists; what remains to be achieved is providing the infrastructure and the software to support the promise. Universal access and management of information has been one of the driving forces in the evolution of computer technology. Central computing gave the ability to perform large and complex computations and advanced information manipulation. Advances in networking connected computers together and led to distributed computing. Web technology and the Internet went even further to provide hyper-linked information access and global computing. However, restricting access stations to physical location limits the boundary of the vision.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Handbook of Mobility Data Mining, Volume…
Haoran Zhang Paperback R2,473 Discovery Miles 24 730
Opinion Mining and Text Analytics on…
Pantea Keikhosrokiani, Moussa Pourya Asl Hardcover R9,276 Discovery Miles 92 760
Advanced SQL with SAS
Christian F. G. Schendera Hardcover R2,458 Discovery Miles 24 580
Big Data and Smart Service Systems
Xiwei Liu, Rangachari Anand, … Hardcover R1,961 R1,830 Discovery Miles 18 300
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,321 R1,228 Discovery Miles 12 280
Blockchain Life - Making Sense of the…
Kary Oberbrunner, Lee Richter Hardcover R506 Discovery Miles 5 060
Build A Large Language Model - From…
Sebastian Raschka Paperback R1,195 Discovery Miles 11 950
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Database Principles - Fundamentals of…
Carlos Coronel, Keeley Crockett, … Paperback R1,109 R1,049 Discovery Miles 10 490
Temporal Data Mining via Unsupervised…
Yun Yang Paperback R1,173 Discovery Miles 11 730

 

Partners