![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > General
Fifty years ago, the political whistle-stop tour was thus named because trains blew their whistles twice when making unscheduled stops in backwater towns. Like its distant cousin, the "electronic" whistle-stop brings the candidate's message directly to the people, but with one outstanding difference: the new whistle-stop offers politicians an accuracy, efficiency, and success at voter persuasian unimaginable to by earlier whistle-stoppers such as Harry Truman. As Selnow shows, American political campaigns have an extraordinary affinity for electronic devices. They have seized upon electronic bulletin boards, home pages, and electronic libraries. Since political campaigns are communication campaigns, Selnow concludes that candidates who successfully inform, persuade, enlighten, and even confuse voters will win votes. Selnow also examines the debate between those who argue that new technologies have improved efficiency and those who believe that the innovations have affected society in other ways. Scholars and students of American political communication must read this book; the lively style will also make it exciting reading for anyone interested in this new political tool.
This book develops the core system science needed to enable the development of a complex industrial internet of things/manufacturing cyber-physical systems (IIoT/M-CPS). Gathering contributions from leading experts in the field with years of experience in advancing manufacturing, it fosters a research community committed to advancing research and education in IIoT/M-CPS and to translating applicable science and technology into engineering practice. Presenting the current state of IIoT and the concept of cybermanufacturing, this book is at the nexus of research advances from the engineering and computer and information science domains. Readers will acquire the core system science needed to transform to cybermanufacturing that spans the full spectrum from ideation to physical realization.
This book presents the first paradigm of social multimedia computing completely from the user perspective. Different from traditional multimedia and web multimedia computing which are content-centric, social multimedia computing rises under the participatory Web2.0 and is essentially user-centric. The goal of this book is to emphasize the user factor in facilitating effective solutions towards both multimedia content analysis, user modeling and customized user services. Advanced topics like cross-network social multimedia computing are also introduced as extensions and potential directions along this research line.
Language teachers, social studies teachers, and school library media specialists will find this resource invaluable for providing lessons and activities in critical thinking for students in grades 7-12. It is filled with over 200 primary source Internet sites covering the Chinese, French, German, Spanish, Japanese, Russian, and Latin languages. Each Web site will help reinforce language skills while providing students with interactive lessons on the unique culture of the peoples who speak the language. The next best thing to visiting the country itself For each of the 56 primary Web sites, a site summary is given describing its contents and usefulness to teachers and school library media specialists. Site subjects may include: a country's radio or news program; the history of a country and its visual arts, including museums; foods eaten by the people who speak this language and recipes on how to prepare them; ceremonies, customs, and sports enjoyed; geography of the countries who speak this language; and sites to help practice the language itself. Following are a list of questions and activities which students can prepare orally or in written form, and at least four more related Web sites are provided for further study. Using this book will not only help students increase their language skills, but it will also open up the entire culture, to enable students to experience it just as if they were visiting
Web information systems engineering resolves the multifaceted issues of Web-based systems development; however, as part of an emergent yet prolific industry, Web site quality assurance is a continually adaptive process needing a comprehensive reference tool to merge all cutting-edge research and innovations. ""Handbook of Research on Web Information Systems Quality"" integrates invaluable research on the models, measures, and methodologies of Web information systems, software quality, and Web engineering into one practical guide to Web information systems quality, making this handbook of research an essential addition to all library collections.
This book brings together the diversified areas of contemporary computing frameworks in the field of Computer Science, Engineering and Electronic Science. It focuses on various techniques and applications pertaining to cloud overhead, cloud infrastructure, high speed VLSI circuits, virtual machines, wireless and sensor networks, clustering and extraction of information from images and analysis of e-mail texts. The state-of-the-art methodologies and techniques are addressed in chapters presenting various proposals for enhanced outcomes and performances. The techniques discussed are useful for young researchers, budding engineers and industry professionals for applications in their respective fields.
Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Companies look to store their data in a separate location, distancing the availability of the information and reducing the risk of data breaches. Modern organizations need to remain vigilant against insider attacks, cloud computing risks, and security flaws within their mainframe. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities is an essential reference source that discusses maintaining a secure management of sensitive data, and intellectual property and provides a robust security algorithm on consumer data. Featuring research on topics such as public cryptography, security principles, and trustworthy computing, this book is ideally designed for IT professionals, business managers, researchers, students, and professionals seeking coverage on preventing and detecting the insider attacks using trusted cloud computing techniques.
Social networks and online communities are reshaping the way people communicate, both in their personal and professional lives. What makes some succeed and others fail? What draws a user in? What makes them join? What keeps them coming back? Entrepreneurs and businesses are turning to user experience practitioners to figure this out. Though they are well-equipped to evaluate and create a variety of interfaces, social networks require a different set of design principles and ways of thinking about the user in order to be successful. Design to Thrive presents tried and tested design methodologies,
based on the author s decades of research, to ensure successful and
sustainable online communities -- whether a wiki for employees to
share procedures and best practices or for the next Facebook. The
book describes four criteria, called"RIBS," which are necessary to
the design of a successful and sustainable online community. These
concepts provide designers with the tools they need to generate
informed creative and productive design ideas, to think proactively
about the communities they are building or maintaining, and to
design communities that encourage users to actively
contribute. Contains real world stories from popular, well known communities to illustrate how the concepts work Features a companion online network that employs the techniques outlined in the book "
The prominence of social media, especially in the lives of teenagers and young adults, has long been regarded as a significant distraction from studies. However, the integration of these forms of media into the teaching experience can improve the engagement of students. Global Perspectives on Social Media in Tertiary Learning and Teaching: Emerging Research and Opportunities is an essential scholarly publication that embeds innovative, current pedagogical practices into new and redeveloped courses and introduces digital and online learning tools to best support teaching practices. Featuring coverage on a wide range of topics including collaborative learning, innovative learning environments, and blended teaching, this book provides essential research for educators, educational administrators, education stakeholders, academicians, researchers, and professionals within the realm of higher education.
Each consumer now has the power to be a journalist, reviewer, and whistle blower. The prevalence of social media has made it possible to alter a brand's reputation with a single viral post, or spark a political movement with a hashtag. This new landscape requires a strategic plasticity and careful consideration of how the public will react to an organization's actions. Participation in social media is mandatory for a brand's success in this highly competitive online era. Managing Public Relations and Brand Image through Social Media provides the latest research and theoretical framework necessary to find ease in the shifting public relations and reputation management worlds. It provides an overview of the tools and skills necessary to deftly sidestep public affronts and to effectively use online outlets to enhance an organization's visibility and reputation. This publication targets policy makers, website developers, students and educators of public relations, PR and advertising professionals, and organizations who wish to better understand the effects of social media.
This title explores research on new techniques for the virtual enterprise operation, and has opened up new ideas on the design principles and operation approaches in order to maximize benefits and overcome limitations.
This is an edited volume that develops a common understanding of the various technologies intended to facilitate the automation of mediation, choreography and discovery for Web Services using semantic annotations. The volume explores trade-offs among existing approaches, and reveals strengths and weaknesses of proposed approaches, as well as which aspects of the problem are not yet covered. The book is designed for a professional audience composed of practitioners and researchers in industry. Professionals can use it to evaluate SWS technology for their potential practical use. The book is also suitable for advanced-level students in computer science.
Facebook had a problem. Along with its sister platforms Instagram and WhatsApp, it was a daily destination for billions of users around the world, extolling its products for connecting people. But as a succession of scandals rocked Facebook from 2016, some began to question whether the company could control, or even understood, its own platforms. As Facebook employees searched for answers, what they uncovered was worse than they could've imagined. The problems ran far deeper than politics. Facebook was peddling and amplifying anger, looking the other way at human trafficking, enabling drug cartels and authoritarians and allowing VIP users to break the platform's supposedly inviolable rules. It turned out to be eminently possible to isolate many of Facebook's worst problems, but whenever employees offered solutions their work was consistently delayed, watered down or stifled by a company that valued user engagement above all else. The only option left was to blow the whistle. In Broken Code, award-winning Wall Street Journal reporter Jeff Horwitz tells the riveting inside story of these employees and their explosive discoveries, uncovering the shocking cost of Facebook's blind ambition in the process.
Ontology Managememt provides an up-to-date, scientifically correct, concise and easy-to-read reference on this topic. The book includes relevant tasks, practical and theoretical challenges, limitations and methodologies, plus available tooling support. The editors discuss integrating the conceptual and technical dimensions with a business view on using ontologies, stressing the cost dimension of ontology engineering and offering guidance on how to derive ontologies semi-automatically from existing standards and specifications.
You want to find an Afrocentric video or a Black history game for your child but no store in your area offers them. You are considering home schooling your child, but would like to first discuss it with Black families that are already home schooling. You want to take your family to see the "Black rodeo," but do not have a tour schedule. You are about to have a baby and would like to send out Afrocentric birth announcements, but cannot find any. Help is here With the click of a mouse, products, services and information aimed at Black families are immediately accessible "Black Families Online" takes you on a journey through Cyberspace, directing you to hundreds of online resources for Black parents, kids, educators, and anyone seeking multiculturalism. "Black Families Online" shows you how easy it is to get things done without leaving the house: Research your family history Decorate your baby's room with Afrocentric bedding and accessories Learn how to braid your daughter's hair Find Afrocentric educational tools Learn Black history Find college scholarships Meet moms and dads like you: SAHMs, families with biracial children, home schooling families, and more
These are exciting times in the fields of Fuzzy Logic and the Semantic Web, and this book will add to the excitement, as it is the first volume to focus on the growing connections between these two fields. This book is expected to be a valuable aid to anyone considering the application of Fuzzy Logic to the Semantic Web, because it contains a number of detailed accounts of these combined fields, written by leading authors in several countries. The Fuzzy Logic field has been maturing for forty years. These years have witnessed a tremendous growth in the number and variety of applications, with a real-world impact across a wide variety of domains with humanlike behavior and reasoning. And we believe that in the coming years, the Semantic Web will be major field of applications of Fuzzy Logic.
|
![]() ![]() You may like...
Three-Dimensional Design Methodologies…
Vinod Pangracious, Zied Marrakchi, …
Hardcover
R2,909
Discovery Miles 29 090
Economics, Entropy and the Environment…
T. R. Beard, Gabriel A. Lozada
Hardcover
R3,023
Discovery Miles 30 230
Computational Methods in Mechanical…
Jorge Angeles, Evtim Zakhariev
Hardcover
R4,605
Discovery Miles 46 050
Extrinsic Geometry of Foliations
Vladimir Rovenski, Pawel Walczak
Hardcover
R3,407
Discovery Miles 34 070
Recent Trends in Combinatorics
Andrew Beveridge, Jerrold R. Griggs, …
Paperback
R5,703
Discovery Miles 57 030
|