![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > General
Design is an art form in which the designer selects from a myriad of alternatives to bring an "optimum" choice to a user. In many complex of "optimum" is difficult to define. Indeed, the users systems the notion themselves will not agree, so the "best" system is simply the one in which the designer and the user have a congruent viewpoint. Compounding the design problem are tradeoffs that span a variety of technologies and user requirements. The electronic business system is a classically complex system whose tradeoff criteria and user views are constantly changing with rapidly developing underlying technology. Professor Milutinovic has chosen this area for his capstone contribution to the computer systems design. This book completes his trilogy on design issue in computer systems. His first work, "Surviving the Design of a 200 MHz RISC Microprocessor" (1997) focused on the tradeoffs and design issues within a processor. His second work, "Surviving the Design of Microprocessor and Multiprocessor Systems" (2000) considers the design issues involved with assembling a number of processors into a coherent system. Finally, this book generalizes the system design problem to electronic commerce on the Internet, a global system of immense consequence.
'Is private regulation of the Internet over? Have states taken over?' This book examines the function of self-regulation in cyberspace. It argues that contrary to what is often supposed in the literature, self-regulation is still an indispensable part of regulation of the Internet and will arguably remain so. It is intricately woven into the mesh of rules that governs the Internet today. Private regulation fills substantive or procedural gaps where no state regulation exists or where it is incomplete or ineffective, thus complementing the reach of state regulation. Simultaneously, states supply legal (and financial) frameworks that enable or complement self-regulation. In practice, often unknown to users, their behaviour is regulated by intertwined rules coming from both states and private groups. While each source of rules retains its identity and regulatory strengths, it is dependent on and complementary to the rules and processes of the other to effectively regulate Internet activities. Dr. Jeanne P. Mifsud Bonnici is a Senior Lecturer at the Centre for Law, Information and Converging Technologies, University of Central Lancashire, Preston, UK. This is Volume 16 in the Information Technology and Law (IT&Law) Series
'I loved her then, I love her now. Annie's back and she's better than ever! Fun, feel good and feisty - Annie Valentine is the woman you want to share a cocktail with!' Portia MacIntosh Can she get her life back online?Tired of being underestimated, Annie Valentine is determined to prove to everyone that she can make her life a success. Her job as a personal shopper is brilliant, but she's now intent on setting up a shoe and handbag empire of her own. To get there, she'll do anything and go anywhere - the handbag factories of Italy are calling! But what started out as a fun after hours project is getting slightly out of hand. Because Annie is working around the clock to bag the perfect bargain, and her family life and relationship with adorable Ed is feeling the strain. Annie knows she is getting in too deep, but the more she tries to pull back, the more risks she takes. Soon, everything Annie loves is on the line and perhaps the only way to have it all is to step into the real world again.... Fans of Sophie Kinsella, Lindsey Kelk and Paige Toon will love this laugh-out-loud romantic comedy from bestselling author Carmen Reid. What readers are saying! "If you love shopping as much as you love a great read, try this. Wonderful." Bestselling author, Katie Fforde "Annie Valentine is a wonderful character - I want her to burst into my life and sort out my wardrobe for me!" Bestselling author, Jill Mansell "You will enjoy getting to know Annie Valentine; laughing with her and crying with her. You may even fall in love with her . . . I have! A fantastic read!" Reader review "Fantastic read, couldn't put it down" Reader review "Can't wait to read the next one!" Reader review
School library media specialists will find this concepts-based approach to teaching electronic literacy an indispensable basic tool for instructing students and teachers. It provides step-by-step instruction on how to find and evaluate needed information from electronic databases and the Internet, how to formulate successful electronic search strategies and retrieve relevant results, and how to interpret and critically analyze search results. The chapters contain a suggested lesson plan and sample assignments for the school library media specialist to use in teaching electronic literacy skills to students and teachers. Dr. Kathleen W. Craver, a nationally recognized specialist in technology in the library media center, identifies the universal concepts of electronic literacy and provides the library media specialist with the rationales, background, methods, and model assignments to teach students and faculty to become proficient and critical users of electronic information technologies. At the beginning of each chapter, Craver furnishes a rationale for change that school library media specialists can use to justify these essential modifications to their teaching curriculum. Chapters include: The Structure of Electronic Information; The Common Vocabulary and Characteristics of Electronic Resources; Formulating Electronic Search Strategies; The Physical Arrangement of Information; Choosing Appropriate On-Site and Remote Electronic Libraries; Choosing Appropriate Electronic Databases; Internet Search Tools and Techniques; Identifying Electronic Resources; On-Site Electronic Records Access; Using Primary Electronic Resources; and Evaluating Electronic Sources. The Appendix contains a listof principal vendors. A glossary of terms and a bibliography of suggested reading complete the work. This basic teaching guide provides the media specialist with all the tools necessary to help novice users to be successful and avoid the frustration of electronic database searching and retrieval.
As the IoT market is booming, several issues are delaying the full realization of the technology. IoT devices, in cybersecurity terms, greatly increase security risk. This means that any scientific work that offers cybersecurity strategies will excite security experts who will be glad to expand their knowledge base on IoT cybersecurity. As a result of the booming of the IoT market, business competitors are jockeying for a piece of the market. This means that solutions from researchers that address compatibility issues will be greatly welcomed by IoT technology developers. Connectivity providers are likely to embrace solutions to challenges of bandwidth since a growing IoT market must be followed up by bandwidth-intensive IoT applications which tend to jostle for space on the current client-server model. Overpromising followed by underdelivering, has been the current approach by many innovators and the mismatch results in losses in production, orphaned technologies accompanied by frequent system failures. Solutions that address IoT performance issues are likely to excite many start-ups. Solutions to challenges of fragmentation presented by thousands of devices from different manufacturers operating on proprietary ecosystems are likely to be warmly embraced by many IoT brands developers. As such, a publication that specifically addresses the challenges faced in the rolling out of IoT technologies is sorely needed.
Under Quality of Service (QoS) routing, paths for flows are selected based upon the knowledge of resource availability at network nodes and the QoS requirements of flows. QoS routing schemes proposed differ in the way they gather information about the network state and select paths based on this information. We broadly categorize these schemes into best-path routing and proportional routing. The best-path routing schemes gather global network state information and always select the best path for an incoming flow based on this global view. On the other hand, proportional routing schemes proportion incoming flows among a set of candidate paths. We have shown that it is possible to compute near-optimal proportions using only locally collected information. Furthermore, a few good candidate paths can be selected using infrequently exchanged global information and thus with minimal communication overhead. Localized Quality Of Service Routing For The Internet, describes these schemes in detail demonstrating that proportional routing schemes can achieve higher throughput with lower overhead than best-path routing schemes. It first addresses the issue of finding near-optimal proportions for a given set of candidate paths based on locally collected flow statistics. This book will also look into the selection of a few good candidate paths based on infrequently exchanged global information. The final phase of this book will describe extensions to proportional routing approach to provide hierarchical routing across multiple areas in a large network. Localized Quality Of Service Routing For The Internet is designed for researchers and practitioners in industry, and is suitable for graduatelevel students in computer science as a secondary text.
Social Media Abyss plunges into the paradoxical condition of the new digital normal versus a lived state of emergency. There is a heightened, post-Snowden awareness; we know we are under surveillance but we click, share, rank and remix with a perverse indifference to technologies of capture and cultures of fear. Despite the incursion into privacy by companies like Facebook, Google and Amazon, social media use continues to be a daily habit with shrinking gadgets now an integral part of our busy lives. We are thrown between addiction anxiety and subliminal, obsessive use. Where does art, culture and criticism venture when the digital vanishes into the background? Geert Lovink strides into the frenzied social media debate with Social Media Abyss - the fifth volume of his ongoing investigation into critical internet culture. He examines the symbiotic yet problematic relation between networks and social movements, and further develops the notion of organized networks. Lovink doesn't just submit to the empty soul of 24/7 communication but rather provides the reader with radical alternatives. Selfie culture is one of many Lovink's topics, along with the internet obsession of American writer Jonathan Franzen, the internet in Uganda, the aesthetics of Anonymous and an anatomy of the Bitcoin religion. Will monetization through cybercurrencies and crowdfunding contribute to a redistribution of wealth or further widen the gap between rich and poor? In this age of the free, how a revenue model of the 99% be collectively designed? Welcome back to the Social Question.
The Semantic Web, which is intended to establish a machine-understandable Web, is currently changing from being an emerging trend to a technology used in complex real-world applications. A number of standards and techniques have been developed by the World Wide Web Consortium (W3C), e.g., the Resource Description Framework (RDF), which provides a general method for conceptual descriptions for Web resources, and SPARQL, an RDF querying language. Recent examples of large RDF data with billions of facts include the UniProt comprehensive catalog of protein sequence, function and annotation data, the RDF data extracted from Wikipedia, and Princeton University's WordNet. Clearly, querying performance has become a key issue for Semantic Web applications. In his book, Groppe details various aspects of high-performance Semantic Web data management and query processing. His presentation fills the gap between Semantic Web and database books, which either fail to take into account the performance issues of large-scale data management or fail to exploit the special properties of Semantic Web data models and queries. After a general introduction to the relevant Semantic Web standards, he presents specialized indexing and sorting algorithms, adapted approaches for logical and physical query optimization, optimization possibilities when using the parallel database technologies of today's multicore processors, and visual and embedded query languages. Groppe primarily targets researchers, students, and developers of large-scale Semantic Web applications. On the complementary book webpage readers will find additional material, such as an online demonstration of a query engine, and exercises, and their solutions, that challenge their comprehension of the topics presented.
Managing (e)Business Transformation comprises text and cases designed to show students how a business can be transformed into an internetworked enterprise where IT infrastructures are used to link customers, suppliers, partners and employees to create superior economic value. The book is written based on the premise that integrating internet technologies throughout the value chain is crucial to building and managing customer relationships. Importantly, it underscores the centrality of basic business and economic principles within the context of a networked environment. The book builds on established business and economic theories, concepts and fundamentals to show that 'e-business' will soon be synonymous with 'business'. The book takes a strong managerial perspective, especially popular with MBA students, to argue that the internet is simply an enabling technology, which allows firms to build the infrastructure needed to operate in an evolving business world. The application of theory/concepts is emphasized throughout and contains a range of international case studies enhance the learning experience. This book is a must for all students studying e-business strategy at undergraduate, MBA and postgraduate level. Also available is a companion website with extra features to accompany the text, please take a look by clicking below - http://www.palgrave.com/business/farhoomand/index.asp
The World Wide Web has become a ubiquitous global tool, used for finding infor mation, communicating ideas, carrying out distributed computation and conducting business, learning and science. The Web is highly dynamic in both the content and quantity of the information that it encompasses. In order to fully exploit its enormous potential as a global repository of information, we need to understand how its size, topology and content are evolv ing. This then allows the development of new techniques for locating and retrieving information that are better able to adapt and scale to its change and growth. The Web's users are highly diverse and can access the Web from a variety of devices and interfaces, at different places and times, and for varying purposes. We thus also need techniques for personalising the presentation and content of Web based information depending on how it is being accessed and on the specific user's requirements. As well as being accessed by human users, the Web is also accessed by appli cations. New applications in areas such as e-business, sensor networks, and mobile and ubiquitous computing need to be able to detect and react quickly to events and changes in Web-based information. Traditional approaches using query-based 'pull' of information to find out if events or changes of interest have occurred may not be able to scale to the quantity and frequency of events and changes being generated, and new 'push' -based techniques are needed."
"Both newbies (newcomers to the Internet) and Netizens (old-timers)
will find challenges and rewards in this witty, knowledgeable, and
timely report from the electronic front." "Vividly describes the virtual realm as a place of
interconnecting communities every bitas complicated, exciting, and
dangerous as any city." "A pleasant antidote to the breathless rhetoric one finds in
many books and magazines devoted to computer culture." "Grossman brings a wealth of professional and personal
experience to the material-and a clarity of style and analysis that
is a welcome relief from both the hyperbolic prose of many Net
boosters and the overwrought jeremiads of cyberphobes." "There is a lot to like about this survey, especially the
diligent research and reading the author has invested in it. The
endnotes are vast and informative..."From Anarchy to Power" gathers
strengh as it goes along." "An informative exploration into many of the issues and problems
that plague the Net today...From Anarchy to Power is a must
read." companion website: http: //www.nyupress.org/fap Yesterday's battles over internet turf were fought on the net itself: today's battles are fought in government committees, in Congress, on the stock exchange, and in the marketplace. What was once an experimental ground for electronic commerce is now the hottest part of our economic infrastructure. In From Anarchy to Power, Wendy Grossman explores the new dispensation on the net and tackles the questions that trouble every online user: How vulnerable are the internet andworld wide web to malicious cyber hackers? What are the limits of privacy online? How real is internet addiction and to what extent is the news media responsible for this phenomenon? Are women and minorities at a disadvantage in cyberspace? How is the increasing power of big business changing internet culture? We learn about the political economy of the internet including issues of copyright law, corporate control and cryptography legislation. Throughout the book the emphasis is on the international dimensions of the net, focusing on privacy and censorship in the United States, Europe and Canada and the hitherto ignored contributions of other countries in the development of the net. Entertaining and informative From Anarchy to Power is required reading for anyone who wants to know where the new digital economy is heading.
E-Business Management: Integration of Web Technologies with
Business Models contains a collection of articles by leading
information systems researchers on important topics related to the
development of e-business. The goal is to enhance the understanding
of the state of the art in e-business, including the most current
and forward-looking research. The book emphasizes both business
practices and academic research made possible by the recent rapid
advances in the applications of e-business technology. The book
should help graduate students, researchers, and practitioners
understand major e-business developments, how they will transform
businesses, and the strategic implications to be drawn.
Current access paradigms for the Web, i.e., direct access via search engines or database queries and navigational access via static taxonomies, have recently been criticized because they are too rigid or simplistic to effectively cope with a large number of practical search applications. A third paradigm, dynamic taxonomies and faceted search, focuses on user-centered conceptual exploration, which is far more frequent in search tasks than retrieval using exact specification, and has rapidly become pervasive in modern Web data retrieval, especially in critical applications such as product selection for e-commerce. It is a heavily interdisciplinary area, where data modeling, human factors, logic, inference, and efficient implementations must be dealt with holistically. Sacco, Tzitzikas, and their contributors provide a coherent roadmap to dynamic taxonomies and faceted search. The individual chapters, written by experts in each relevant field and carefully integrated by the editors, detail aspects like modeling, schema design, system implementation, search performance, and user interaction. The basic concepts of each area are introduced, and advanced topics and recent research are highlighted. An additional chapter is completely devoted to current and emerging application areas, including e-commerce, multimedia, multidimensional file systems, and geographical information systems. The presentation targets advanced undergraduates, graduate students and researchers from different areas - from computer science to library and information science - as well as advanced practitioners. Given that research results are currently scattered among very different publications, this volume will allow researchers to get a coherent and comprehensive picture of the state of the art.
A Web portal is a special Website designed to act as a gateway giving convenient access to other related sites. This book investigates the various types of portals and describes how they can be used in business applications. After considering the nature of portals, the book describes the first general portals like Yahoo, and how they came into being. Portals are used in businesses of all types and sizes and this book discusses how portals can be used in large business corporations as well as small to medium enterprises. Web portals have increasing importance to marketers as, by their nature, they retain their users who must return to them frequently. They also provide a useful means of making information and knowledge readily available in a convenient form to authorized users. This book covers a wide range of issues relating to the use of portals in business.
Creating Texts emphasises a practical approach to composition and enables students to understand what is involved in the creation of a text and to learn from the practice of other writers. Extensively rewritten and updated from Walter Nash's earlier volume, Designs in Prose, attention is paid to the general theory of composition, in both traditional and original terms, so that students are made familiar with the basic resources of composition, in grammar and in the lexicon. The essence of every chapter is the discussion of examples of text, sometimes devised by the authors, but more often drawn from the work of authors writing in diverse styles of English. This practical approach is most evident in the final section of the book where detailed suggestions for projects and exercises reinforce the connection between theory and practice, and encourage students to develop their creative sense and to adapt their style of writing to fit the particular audience and context. In addition, this section is cross-referenced to the main text to allow students to consult easily the relevant chapter.
IP technology has progressed from being a scientific topic to being one of the most popular technologies in networking. Concurrently, a number of new innovations and technological advances have been developed and brought to the marketplace. These new ideas, concepts and products are likely to have a tremendous influence on businesses and on our everyday lives. This book addresses many of these newer technological developments and provides insights for engineers and scientists developing new technological components, devices and products. explores how they are being implemented in the real world. The author examines numerous implementation details related to IP equipment and software. The material is organized by application so that readers can better understand the uses of IP technology. Included are details of implementation issues and state-of-the-art equipment and software. descriptions of Cisco 12410 GSR and Juniper M160, and IP software stack details are also included for several popular operating systems such as Windows, BSD, VxWorks and Linux.
|
You may like...
Towards A Semantic Web - Connecting…
Bill Cope, Mary Kalantzis, …
Paperback
|