![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > General
With the daily addition of million documents and new users, there is no doubt that the World Wide Web (WWW or Web shortly) is still expanding its global information infrastructure. Thanks to low-cost wireless technology, the Web is no more limited to homes or offices, but it is simply everywhere. The Web is so large and growing so rapidly that the 40 million page "WebBase" repository of Inktomi corresponds to only about 4% of the estimated size of the publicly indexable Web as of January 2000 and there is every reason to believe these numbers will all swell significantly in the next few years. This unrestrainable explosion is not bereft of troubles and drawbacks, especially for inexpert users. Probably the most critical problem is the effectiveness of Web search engines: though the Web is rich in providing numerous services, the primary use of the Internet falls in emails and information retrieval activities. Focusing in this latter, any user has felt the frustrating experience to see as result of a search query overwhelming numbers of pages that satisfy the query but that are irrelevant to the user.
Small and medium-sized enterprises (SMEs) are recognized as the backbone of today's world economy. However, SMEs are well known for having limitations and acceptance barriers in adopting new technology even though the internet and communications channel's revolution has changed the way people conduct business today. Further, the COVID-19 pandemic has disturbed the operations of SMEs and increased the burden on social media application globally. It is essential that SMEs utilize social media to strengthen their performance. Strengthening SME Performance Through Social Media Adoption and Usage explores experiences in different technological, managerial, organizational, and entrepreneurial environmental issues. It focuses on different conceptions of factors and consequences influencing social media usage and SME performance. Covering topics such as corporate social responsibility, marketing frameworks, and social media adoption, this premier reference source is a valuable resource for entrepreneurs, business leaders and managers, human resource managers, marketers, consultants, students and educators of higher education, librarians, researchers, and academicians.
Web-based offerings in manu academic disciplines are redefining the educational landscape. In this book, Reinaldo Canton assesses the importance of learner activity in computer programmed instruction. This research explores the practical relation between the learner's behavior and the method of delivery of lesson content. Programmed Instruction in Online Learning is a timely and important book as online instruction becomes increasingly predominant in the education environment.
Electronic and internet voting has become increasingly widespread in recent years, but which countries are the leaders of the movement and who lags behind? Is the digital divide likely to present a permanent challenge to electronic democracy? What are the experiences with regard to online voting, and what are the arguments for and against? Electronic Voting and Democracy examines these issues and the contexts in which they are played out, such as problems of legitimacy and the practical considerations that have driven some countries toward electronic voting faster than others. JOACHIM ASTROM Department of Social Sciences, University of Orebro, Sweden HUBERTUS BUCHSTEIN Professor of Political Science, University of Greifswald, Germany WOLFGANG DRECHSLER Department of Public Administration, University of Tartu, Estonia HANS GESER Department of Political Science, University of Zurich, Switzerland CAROLYN HRIBAR Department of Political Science, Kent State Uniersity, Ohio, USA KIMMO GRONLUND Department of Political Science, Abo Akademi University, Turku, Finland PIA KARGER Federal Ministry of the Interior, Berlin, Germany ROBERT KOFLER Institute for Information Economics, Vienna Univers
This book covers in a great depth the fast growing topic of tools, techniques and applications of soft computing (e.g., fuzzy logic, genetic algorithms, neural networks, rough sets, Bayesian networks, and other probabilistic techniques) in the ontologies and the Semantic Web. The author shows how components of the Semantic Web (like the RDF, Description Logics, ontologies) can be covered with a soft computing methodology.
The Semantic Web, which is intended to establish a machine-understandable Web, is currently changing from being an emerging trend to a technology used in complex real-world applications. A number of standards and techniques have been developed by the World Wide Web Consortium (W3C), e.g., the Resource Description Framework (RDF), which provides a general method for conceptual descriptions for Web resources, and SPARQL, an RDF querying language. Recent examples of large RDF data with billions of facts include the UniProt comprehensive catalog of protein sequence, function and annotation data, the RDF data extracted from Wikipedia, and Princeton University's WordNet. Clearly, querying performance has become a key issue for Semantic Web applications. In his book, Groppe details various aspects of high-performance Semantic Web data management and query processing. His presentation fills the gap between Semantic Web and database books, which either fail to take into account the performance issues of large-scale data management or fail to exploit the special properties of Semantic Web data models and queries. After a general introduction to the relevant Semantic Web standards, he presents specialized indexing and sorting algorithms, adapted approaches for logical and physical query optimization, optimization possibilities when using the parallel database technologies of today's multicore processors, and visual and embedded query languages. Groppe primarily targets researchers, students, and developers of large-scale Semantic Web applications. On the complementary book webpage readers will find additional material, such as an online demonstration of a query engine, and exercises, and their solutions, that challenge their comprehension of the topics presented.
Design is an art form in which the designer selects from a myriad of alternatives to bring an "optimum" choice to a user. In many complex of "optimum" is difficult to define. Indeed, the users systems the notion themselves will not agree, so the "best" system is simply the one in which the designer and the user have a congruent viewpoint. Compounding the design problem are tradeoffs that span a variety of technologies and user requirements. The electronic business system is a classically complex system whose tradeoff criteria and user views are constantly changing with rapidly developing underlying technology. Professor Milutinovic has chosen this area for his capstone contribution to the computer systems design. This book completes his trilogy on design issue in computer systems. His first work, "Surviving the Design of a 200 MHz RISC Microprocessor" (1997) focused on the tradeoffs and design issues within a processor. His second work, "Surviving the Design of Microprocessor and Multiprocessor Systems" (2000) considers the design issues involved with assembling a number of processors into a coherent system. Finally, this book generalizes the system design problem to electronic commerce on the Internet, a global system of immense consequence.
The World Wide Web has become a ubiquitous global tool, used for finding infor mation, communicating ideas, carrying out distributed computation and conducting business, learning and science. The Web is highly dynamic in both the content and quantity of the information that it encompasses. In order to fully exploit its enormous potential as a global repository of information, we need to understand how its size, topology and content are evolv ing. This then allows the development of new techniques for locating and retrieving information that are better able to adapt and scale to its change and growth. The Web's users are highly diverse and can access the Web from a variety of devices and interfaces, at different places and times, and for varying purposes. We thus also need techniques for personalising the presentation and content of Web based information depending on how it is being accessed and on the specific user's requirements. As well as being accessed by human users, the Web is also accessed by appli cations. New applications in areas such as e-business, sensor networks, and mobile and ubiquitous computing need to be able to detect and react quickly to events and changes in Web-based information. Traditional approaches using query-based 'pull' of information to find out if events or changes of interest have occurred may not be able to scale to the quantity and frequency of events and changes being generated, and new 'push' -based techniques are needed."
A Web portal is a special Website designed to act as a gateway giving convenient access to other related sites. This book investigates the various types of portals and describes how they can be used in business applications. After considering the nature of portals, the book describes the first general portals like Yahoo, and how they came into being. Portals are used in businesses of all types and sizes and this book discusses how portals can be used in large business corporations as well as small to medium enterprises. Web portals have increasing importance to marketers as, by their nature, they retain their users who must return to them frequently. They also provide a useful means of making information and knowledge readily available in a convenient form to authorized users. This book covers a wide range of issues relating to the use of portals in business.
"Both newbies (newcomers to the Internet) and Netizens (old-timers)
will find challenges and rewards in this witty, knowledgeable, and
timely report from the electronic front." "Vividly describes the virtual realm as a place of
interconnecting communities every bitas complicated, exciting, and
dangerous as any city." "A pleasant antidote to the breathless rhetoric one finds in
many books and magazines devoted to computer culture." "Grossman brings a wealth of professional and personal
experience to the material-and a clarity of style and analysis that
is a welcome relief from both the hyperbolic prose of many Net
boosters and the overwrought jeremiads of cyberphobes." "There is a lot to like about this survey, especially the
diligent research and reading the author has invested in it. The
endnotes are vast and informative..."From Anarchy to Power" gathers
strengh as it goes along." "An informative exploration into many of the issues and problems
that plague the Net today...From Anarchy to Power is a must
read." companion website: http: //www.nyupress.org/fap Yesterday's battles over internet turf were fought on the net itself: today's battles are fought in government committees, in Congress, on the stock exchange, and in the marketplace. What was once an experimental ground for electronic commerce is now the hottest part of our economic infrastructure. In From Anarchy to Power, Wendy Grossman explores the new dispensation on the net and tackles the questions that trouble every online user: How vulnerable are the internet andworld wide web to malicious cyber hackers? What are the limits of privacy online? How real is internet addiction and to what extent is the news media responsible for this phenomenon? Are women and minorities at a disadvantage in cyberspace? How is the increasing power of big business changing internet culture? We learn about the political economy of the internet including issues of copyright law, corporate control and cryptography legislation. Throughout the book the emphasis is on the international dimensions of the net, focusing on privacy and censorship in the United States, Europe and Canada and the hitherto ignored contributions of other countries in the development of the net. Entertaining and informative From Anarchy to Power is required reading for anyone who wants to know where the new digital economy is heading.
Under Quality of Service (QoS) routing, paths for flows are selected based upon the knowledge of resource availability at network nodes and the QoS requirements of flows. QoS routing schemes proposed differ in the way they gather information about the network state and select paths based on this information. We broadly categorize these schemes into best-path routing and proportional routing. The best-path routing schemes gather global network state information and always select the best path for an incoming flow based on this global view. On the other hand, proportional routing schemes proportion incoming flows among a set of candidate paths. We have shown that it is possible to compute near-optimal proportions using only locally collected information. Furthermore, a few good candidate paths can be selected using infrequently exchanged global information and thus with minimal communication overhead. Localized Quality Of Service Routing For The Internet, describes these schemes in detail demonstrating that proportional routing schemes can achieve higher throughput with lower overhead than best-path routing schemes. It first addresses the issue of finding near-optimal proportions for a given set of candidate paths based on locally collected flow statistics. This book will also look into the selection of a few good candidate paths based on infrequently exchanged global information. The final phase of this book will describe extensions to proportional routing approach to provide hierarchical routing across multiple areas in a large network. Localized Quality Of Service Routing For The Internet is designed for researchers and practitioners in industry, and is suitable for graduatelevel students in computer science as a secondary text.
Collecting and Conserving Net Art explores the qualities and characteristics of net art and its influence on conservation practices. By addressing and answering some of the challenges facing net art and providing an exploration of its intersection with conservation, the book casts a new light on net art, conservation, curating and museum studies. Viewing net art as a process rather than as a fixed object, the book considers how this is influenced by and executed through other systems and users. Arguing that these processes and networks are imbued with ambiguity, the book suggests that this is strategically used to create suspense, obfuscate existing systems and disrupt power structures. The rapid obsolescence of hard and software, the existence of many net artworks within restricted platforms and the fact that artworks often act as assemblages that change or mutate, make net art a challenging case for conservation. Taking the performative and interpretive roles conservators play into account, the book demonstrates how practitioners can make more informed decisions when responding to, critically analysing or working with net art, particularly software-based processes. Collecting and Conserving Net Art is intended for researchers, academics and postgraduate students, especially those engaged in the study of museum studies, conservation and heritage studies, curatorial studies, digital art and art history. The book should also be interesting to professionals who are involved in the conservation and curation of digital arts, performance, media and software.
E-Business Management: Integration of Web Technologies with
Business Models contains a collection of articles by leading
information systems researchers on important topics related to the
development of e-business. The goal is to enhance the understanding
of the state of the art in e-business, including the most current
and forward-looking research. The book emphasizes both business
practices and academic research made possible by the recent rapid
advances in the applications of e-business technology. The book
should help graduate students, researchers, and practitioners
understand major e-business developments, how they will transform
businesses, and the strategic implications to be drawn.
Managing (e)Business Transformation comprises text and cases designed to show students how a business can be transformed into an internetworked enterprise where IT infrastructures are used to link customers, suppliers, partners and employees to create superior economic value. The book is written based on the premise that integrating internet technologies throughout the value chain is crucial to building and managing customer relationships. Importantly, it underscores the centrality of basic business and economic principles within the context of a networked environment. The book builds on established business and economic theories, concepts and fundamentals to show that 'e-business' will soon be synonymous with 'business'. The book takes a strong managerial perspective, especially popular with MBA students, to argue that the internet is simply an enabling technology, which allows firms to build the infrastructure needed to operate in an evolving business world. The application of theory/concepts is emphasized throughout and contains a range of international case studies enhance the learning experience. This book is a must for all students studying e-business strategy at undergraduate, MBA and postgraduate level. Also available is a companion website with extra features to accompany the text, please take a look by clicking below - http://www.palgrave.com/business/farhoomand/index.asp
This volume offers unique insights into the mutually constitutive nature of social media practices and religious change. Part 1 examines how social media operate in conjunction with mass media in the construction of discourses of religion and spirituality. It includes: a longitudinal study of British news media coverage of Christianity, secularism and religious diversity (Knott et al.); an analysis of responses to two documentaries 'The Monastery' and 'The Convent' (Thomas); an evaluation of theories of the sacred in studies of religion and media within the 'strong program' in cultural sociology in the US (Lynch); and a study of the consequences of mass and social media synergies for public perceptions of Islam in the Netherlands (Herbert). Part 2 examines the role of social media in the construction of contemporary martyrs and media celebrities (e.g., Michael Jackson) using mixed and mobile methods to analyse fan sites (Bennett & Campbell) and jihadi websites and YouTube (Nauta). Part 3 examines how certain bounded religious communities negotiate the challenges of social media: Judaism in Second Life (Abrams & Baker); Bah'ai regulation of web use among members (Campbell & Fulton); YouTube evangelists (Pihlaja); and public expressions of bereavement (Greenhill & Fletcher). The book provides theoretically informed empirical case studies and presents an intriguing, complex picture of the aesthetic and ethical, demographic and discursive aspects of new spaces of communication and their implications for religious institutions, beliefs and practices.
.NET represents a new and improved way of developing software for the Windows platform. Given the chance, youd probably rewrite all of your existing code in the newer managed code environment that .NET provides. But it is difficult or impossible to throw out all existing legacy code and start over when a new technology arrives. Instead, you need to find a way to move forward with new .NET development while reusing existing pieces of tested, working code. You need a way to interoperate with the existing code until you have a chance to finally rewrite all of it in .NET. The only recipe-style book on the subject,,"NET 2.0 Interoperability Recipes: A Problem-Solution Approach" guides Windows developers who are transitioning from native Windows code to .NET managed code. The book Explains new interop features in .NET 2.0 and VS .NET 2005 Covers PInvoke, COM, and COM+ (other books dont cover all three areas) Features most of its example code in C# and VB .NET, and also includes some managed C++/CLI Is written by a working developer with first-hand experience .NET tools will allow you to interoperate with existing code. But finding the appropriate tool for the task at hand can sometimes be a frustrating experience. So this book will guide you past myriad infrequently used interop options to focus on those youll use most often.
This collected volume gathers a broad spectrum of social science and information science articles about Facebook. It looks into facets of users, such as age, sex, and culture, and into facets of use, e.g. privacy behavior after the Snowden affair, unfriending on Facebook, or Facebook addiction, as well as into quality perceptions. Written by leading scholars investigating the impact of Web 2.0., this volume is highly relevant for social media researchers, information scientists, and social scientists, and, not least, for everyone interested in Facebook-related topics.
This book attempts to link some of the recent advances in crowdsourcing with advances in innovation and management. It contributes to the literature in several ways. First, it provides a global definition, insights and examples of this managerial perspective resulting in a theoretical framework. Second, it explores the relationship between crowdsourcing and technological innovation, the development of social networks and new behaviors of Internet users. Third, it explores different crowdsourcing applications in various sectors such as medicine, tourism, information and communication technology (ICT), and marketing. Fourth, it observes the ways in which crowdsourcing can improve production, finance, management and overall managerial performance. Crowdsourcing, also known as "massive outsourcing" or "voluntary outsourcing," is the act of taking a job or a specific task usually performed by an employee of a company or contractors, and outsourcing it to a large group of people or a community (crowd or mass) via the Internet, through an open call. The term was coined by Jeff Howe in a 2006 issue of Wired magazine. It is being developed in different sciences (i.e., medicine, engineering, ICT, management) and is used in the most successful companies of the modern era (i.e., Apple, Facebook, Inditex, Starbucks). The developments in crowdsourcing has theoretical and practical implications, which will be explored in this book. Including contributions from international academics, scholars and professionals within the field, this book provides a global, multidimensional perspective on crowdsourcing.
IP technology has progressed from being a scientific topic to being one of the most popular technologies in networking. Concurrently, a number of new innovations and technological advances have been developed and brought to the marketplace. These new ideas, concepts and products are likely to have a tremendous influence on businesses and on our everyday lives. This book addresses many of these newer technological developments and provides insights for engineers and scientists developing new technological components, devices and products. explores how they are being implemented in the real world. The author examines numerous implementation details related to IP equipment and software. The material is organized by application so that readers can better understand the uses of IP technology. Included are details of implementation issues and state-of-the-art equipment and software. descriptions of Cisco 12410 GSR and Juniper M160, and IP software stack details are also included for several popular operating systems such as Windows, BSD, VxWorks and Linux. |
![]() ![]() You may like...
Real Estate in Central America, Mexico…
Claudia Murray, Camilla Ween, …
Hardcover
R4,482
Discovery Miles 44 820
Expired Mindsets - Releasing Patterns…
Dr Charryse Johnson Lcmhc Ncc
Hardcover
Business Sustainability Model for…
Mastura Jaafar, Azlan Raofuddin Nuruddin, …
Hardcover
R3,618
Discovery Miles 36 180
Algebraic Monoids, Group Embeddings, and…
Mahir Can, Zhenheng Li, …
Hardcover
R3,738
Discovery Miles 37 380
|