![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > General
How is the internet changing the way you think? That is one of the dominant questions of our time, one which affects almost every aspect of our life and future. And it's exactly what John Brockman, publisher of Edge.org, posed to more than 150 of the world's most influential minds. Brilliant, farsighted, and fascinating, Is the Internet Changing the Way You Think? is an essential guide to the Net-based world.
This book takes a multidisciplinary approach to the question of esports and their role in society A diverse group of authors tackle the impact of esports and the ways in which it has grown within the entertainment industry around the world. Chapters offer a coherent response to the following questions: What role do esports play in the entertainment industry? What communication skills can be learned through esports? What do the media gain from broadcasting esports? What is the relationship between social networks and esports? What are the main marketing strategies used in esports? What effect does communicative globalization have on the development of esports? What is the relationship between merchandising and esports? What do communication experts think about esports? Offering clear insights into this rapidly developing area, this volume will be of great interest to scholars, students, and anyone working in game studies, new media, leisure, sport studies, communication studies, transmedia literacy, and digital culture
This book is the second edition of the popular 1996 title "Electronic Publishing and Libraries: Planning for the Impact and Growth to 2003," which is an essential update arising from the need for scholarly information dissemination in this area due to the rapid pace of change. There are two noticeable improvements to this edition compared to the last one. Firstly, the organization of the material is separated into groups involved in the electronic publishing industry, making it easier for users to find relevant information. Secondly, the book is now larger in size allowing it to present the detailed diagrams more clearly. Like the previous edition, the title still aims to quantify the future size of the electronic publishing industry and provides practical data to support investment decisions in information systems for electronic media and serves as an aid to forward planning. Plus, all the sources of the original book are revisited and updated.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Tap into the Internet of Things (IoT) with innovative projects! The Internet of Things:Do-It-Yourself at Home Projects for Arduino, Raspberry Pi, and BeagleBone Black gets you started working with the most popular processing platforms and wireless communication technologies to connect devices and systems to the Internet using sensors. You'll learn the basics of object-oriented programming and relational databases so you can complete your projects with ease. Each project features a list of required tools and components, how-to explanations with photos and illustrations, and complete programming code. Take advantage of the power and versatility of the IoT with help from this practical, easy-to-follow guide. Inventive DIY projects include: Home temperature monitoring system Raspberry Pi home weather station Webcam and Raspberry Pi camera Internet-enabled, Arduino-powered garage door opener Arduino irrigation control system Arduino lighting controller BeagleBone Black message controller BeagleBone Black temperature sensor with cloud service Machine-to-Machine communications Software downloads for the book are available at www.mhprofessional.com/iot
Semantics and ontologies offer an extension to traditional information systems in which information is given well-defined meaning, enabling computers and people to work in cooperation. With expanding uses and integrations of semantics and ontologies, research in Semantic Web engineering has grown immensely. Semantic Web Engineering in the Knowledge Society brings together contributions from researchers and scientists from both industry and academia and representatives from different communities for the understanding and exploration of the theories, tools, and applications of semantics and ontologies. This authoritative reference serves as the platform for exchange of both practical technologies and far reaching implications, offering academicians and practitioners a compendium of knowledge in Semantic Web engineering.
Replete with interviews with key practitioners (both in the book and online) will give up-to-date information on the techniques, forms and concepts used by leading figures in contemporary Live Visuals.
The first section of Semantic Web and Education surveys the basic aspects and features of the Semantic Web. After this basic review, the book turns its focus to its primary topic of how Semantic Web developments can be used to build attractive and more successful education applications. The book analytically discusses the technical areas of architecture, metadata, learning objects, software engineering trends, and more. Integrated with these technical topics are the examinations of learning-oriented topics such as learner modeling, collaborative learning, learning management, learning communities, ontological engineering of web-based learning, and related topics. The result is a thorough and highly useful presentation on the confluence of the technical aspects of the Semantic Web and the field of Education or the art of teaching. The book will be of considerable interest to researchers and students in the fields Information Systems, Computer Science, and Education.
The Second International Workshop on Cooperative Internet Computing (CIC2002) has brought together researchers, academics, and industry practitioners who are involved and interested in the development of advanced and emerging cooperative computing technologies. Cooperative computing is an important computing paradigm to enable different parties to work together towards a pre defined non-trivial goal. It encompasses important technological areas like computer supported cooperative work, workflow, computer assisted design and concurrent programming. As technologies continue to advance and evolve, there is an increasing need to research and develop new classes of middlewares and applications to leverage on the combined benefits of Internet and web to provide users and programmers with highly interactive and robust cooperative computing environment. It is the aim of this forum to promote close interactions and exchange of ideas among researchers, academics and practitioners on the state-of-the art researches in all of these exciting areas. We have partnered with Kluwer Acedamic Press this year to bring to you a book compilation of the papers that were presented at the CIC2002 workshop. The importance of the research area is reflected both in the quality and quantity of the submitted papers, where each paper was reviewed by at least three PC members. As a result, we were able to only accept 14 papers for full presentation at the workshop, while having to reject several excellent papers due to the limitations of the program schedule."
'Boldly reactionary... What looks like feast, Carr argues, may be closer to famine' Sunday Times 'Chilling' The Economist In this ground-breaking and compelling book, Nicholas Carr argues that not since Gutenberg invented printing has humanity been exposed to such a mind-altering technology. The Shallows draws on the latest research to show that the Net is literally re-wiring our brains inducing only superficial understanding. As a consequence there are profound changes in the way we live and communicate, remember and socialise - even in our very conception of ourselves. By moving from the depths of thought to the shallows of distraction, the web, it seems, is actually fostering ignorance. The Shallows is not a manifesto for luddites, nor does it seek to turn back the clock. Rather it is a revelatory reminder of how far the Internet has become enmeshed in our daily existence and is affecting the way we think. This landmark book compels us all to look anew at our dependence on this all-pervasive technology. This 10th-anniversary edition includes a new afterword that brings the story up to date, with a deep examination of the cognitive and behavioural effects of smartphones and social media.
An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts and technology specialists interested in the simulation and application of computer network protection. It presents theoretical frameworks and the latest research findings in network security technologies, while analyzing malicious threats which can compromise network integrity. It discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing and intrusion detection, this edited collection emboldens the efforts of researchers, academics and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, web security and much more. Information and communication systems are an essential component of our society, forcing us to become dependent on these infrastructures. At the same time, these systems are undergoing a convergence and interconnection process that has its benefits, but also raises specific threats to user interests. Citizens and organizations must feel safe when using cyberspace facilities in order to benefit from its advantages. This book is interdisciplinary in the sense that it covers a wide range of topics like network security threats, attacks, tools and procedures to mitigate the effects of malware and common network attacks, network security architecture and deep learning methods of intrusion detection.
Packed with projects and inspirational ideas you can do any time, any place, become an accomplished photographer while feeding your creativity with this guide that reveals what just what your smartphone camera is capable of. A camera phone is something we always have on us and creativity is something we all have in us but often we struggle to use them properly, feeling like we don't have the time, space or inclination to dedicate to it. Here, photography expert and bestselling author Jo Bradford supplies a collection of practical exercises that allow you to master the features on your smartphone camera to take incredible images and also help you to easily reconnect with your creative side. By encouraging you to try something different with your camera and seek out creative opportunities - from light painting to collage, image stacking to time-lapse landscapes - soon you will once again feel the satisfaction of thinking and acting creatively, with the added benefit of taking you from a snapper to an accomplished photographer with visual literacy. Smartphone photography is addictive with a tangible feel-good factor; it's time to embrace it and capture the moments that matter to you in all their glory.
Paralleling emerging trends in cyber-health technology, concerns are mounting about racial and ethnic disparities in health care utilization and outcomes. This book brings these themes together, challenging readers to use, promote, and develop new technology-based methods for closing these gaps. Edited by a leading urban health advocate and featuring 16 expert contributors, the book examines cyber-strategies with the greatest potential toward effective, equitable care, improved service delivery and better health outcomes for all. The rise of e-Patients and the transformation of the doctor-patient relationship are also discussed.
Canadian Semantic Web is an edited volume based on the first Canadian Web Working Symposium, June 2006, in Quebec, Canada. It is the first edited volume based on this subject. This volume includes, but is not limited to, the following popular topics: "Trust, Privacy, Security on the Semantic Web," "Semantic Grid and Semantic Grid Services" and "Semantic Web Mining."
What does men's fashion say about contemporary masculinity? How do these notions operate in an increasingly digitized world? To answer these questions, author Joshua M. Bluteau combines theoretical analysis with vibrant narrative, exploring men's fashion in the online world of social media as well as the offline worlds of retail, production, and the catwalk. Is it time to reassess notions of masculinity? How do we construct ourselves in the online world, and what are the dangers of doing so? From the ateliers of London to the digital landscape of Instagram, Dressing Up re-examines the ways men dress, and the ways men post.
Containing the edited research papers resulting from an ambitious, cross-disciplinary research project, this volume examines the spatiality of virtual inhabited 3D worlds - virtual reality and cyberspace. (Three other volumes look at Interaction, Staging and Methodology.) It is about the communication spaces emerging at the Internet and supported by special 3D interfaces. It is also about the virtual spaces created by virtual reality hardware (CAVEs, panoramic screens, head mounted display systems etc.) and software.Virtual Space: Spatiality in Virtual Inhabited 3D Worlds is interdisciplinary. It deals with philosophical, psychological, communicational, technological and aesthetic aspects of space. While philosophy raises the question concerning the ontology of space - what is space - psychology deals with our perception of space. Communication theory looks at the way in which space supports communication (i.e. that space is a medium for communication), and finally aesthetic analyses exemplify the use of virtual space in virtual cities, in museums and in art.
Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm, which has accelerated the development and application of cloud, fog and edge computing; artificial intelligence; cyber physical systems; social networking; crowdsourcing and crowdsensing; 5g; trust management and finance; and other many useful sectors. Nowadays, the primary blockchain technology uses are in information systems to keep information secure and private. However, many threats and vulnerabilities are facing blockchain in the past decade such 51% attacks, double spending attacks, etc. The popularity and rapid development of blockchain brings many technical and regulatory challenges for research and academic communities. The main goal of this book is to encourage both researchers and practitioners of Blockchain technology to share and exchange their experiences and recent studies between academia and industry. The reader will be provided with the most up-to-date knowledge of blockchain in mainstream areas of security and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and p2p applications are increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book provides a detailed explanation of security and privacy with respect to blockchain for information systems, and will be an essential resource for students, researchers and scientists studying blockchain uses in information systems and those wanting to explore the current state of play.
The Internet of Things (IoT) has become a major influence on the development of new technologies and innovations. When utilized properly, these applications can enhance business functions and make them easier to perform. Protocols and Applications for the Industrial Internet of Things discusses and addresses the difficulties, challenges, and applications of IoT in industrial processes and production and work life. Featuring coverage on a broad range of topics such as industrial process control, machine learning, and data mining, this book is geared toward academicians, computer engineers, students, researchers, and professionals seeking current and relevant research on applications of the IoT.
This comprehensive volume explores the evolving fields of consumer informatics and telemedicine as envisioned by the Institute of Medicine in its landmark reports on the electronic medical record, patient safety, and quality care. Each chapter describes the role of computers, technology, and telecommunications as enablers within a specific application focused on the needs of consumers. The applications covered are ones which empower consumers as they seek information, analyze their health care needs, and make decisions about their own health care. Such applications empower professionals in their efforts to serve patients, while increasing the knowledge of the consumer. Richly illustrated with detailed examples, this volume speaks to a wide range of audiences as it addresses issues raised by consumer informatics, the use of technology, research and development effects, and telemedicine. Chapter highlights include: Patient-Centered Communication; Using the Internet Toward Reliable Consumer Health Information; Disease Management and Home Telehealth; and Biothreats and Disaster Management. The book's audience includes all healthcare professionals, healthcare administrators, IT professionals, health informaticians, and students.
In a world that is awash in ubiquitous technology, even the least tech-savvy know that we must take care how that technology affects individuals and society. That governments and organizations around the world now focus on these issues, that universities and research institutes in many different languages dedicate significant resources to study the issues, and that international professional organizations have adopted standards and directed resources toward ethical issues in technology is in no small part the result of the work of Simon Rogerson. - Chuck Huff, Professor of Social Psychology at Saint Olaf College, Northfield, Minnesota In 1995, Apple launched its first WWW server, Quick Time On-line. It was the year Microsoft released Internet Explorer and sold 7 million copies of Windows 95 in just 2 months. In March 1995, the author Simon Rogerson opened the first ETHICOMP conference with these words: We live in a turbulent society where there is social, political, economic and technological turbulence ... it is causing a vast amount of restructuring within all these organisations which impacts on individuals, which impacts on the way departments are set up, organisational hierarchies, job content, span of control, social interaction and so on and so forth. ... Information is very much the fuel of modern technological change. Almost anything now can be represented by the technology and transported to somewhere else. It's a situation where the more information a computer can process, the more of the world it can actually turn into information. That may well be very exciting, but it is also very concerning. That could be describing today. More than 25 years later, these issues are still at the forefront of how ethical digital technology can be developed and utilised. This book is an anthology of the author's work over the past 25 years of pioneering research in digital ethics. It is structured into five themes: Journey, Process, Product, Future and Education. Each theme commences with an introductory explanation of the papers, their relevance and their interrelationship. The anthology finishes with a concluding chapter which summarises the key messages and suggests what might happen in the future. Included in this chapter are insights from some younger leading academics who are part of the community charged with ensuring that ethical digital technology is realised.
Building Flickr Applications with PHP teaches you how to use today's most popular online photo management system. You'll learn to work with both your own photos and Flickr's enormous cache, and create new and compelling extensions to the Flickr platform. This book is a great pick because It's written by experienced developer Rob Kunkle and Phlickr developer Andrew Morton. You'll learn how to use the PHP API Phlickr to write and retrieve photos. Flicker is growing quickly in popularity in the online photo management world. Using the popular PHP-driven Phlickr API in conjunction with MySQL, you'll discover how to take advantage of open source tools like PHP, Apache, and MySQL, as well as the Flickr architecture, to manage, retrieve, and format photos in imaginative ways. You'll also learn how to build upon Flickr's photo collaboration features to create interfaces for working with others on photo album projects. And you'll learn how to format Flickr tags--taking advantage of RSS to distribute photo updates. |
![]() ![]() You may like...
Gradient Microstructure in Laser Shock…
Liucheng Zhou, Weifeng He
Hardcover
R4,611
Discovery Miles 46 110
Governance and Security as a Unitary…
Tom Rippon, Graham Kemp
Hardcover
R1,278
Discovery Miles 12 780
The Accidental Mayor - Herman Mashaba…
Michael Beaumont
Paperback
![]()
Revolutionizing Business Practices…
Manisha Gupta, Deergha Sharma, …
Hardcover
R6,723
Discovery Miles 67 230
Flexible and Generalized Uncertainty…
Weldon A Lodwick, Luiz L. Salles-Neto
Hardcover
R2,632
Discovery Miles 26 320
Machine Learning Applications in…
Goutam Kumar Bose, Pritam Pain
Hardcover
R5,776
Discovery Miles 57 760
|