Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Internet > General
What does men's fashion say about contemporary masculinity? How do these notions operate in an increasingly digitized world? To answer these questions, author Joshua M. Bluteau combines theoretical analysis with vibrant narrative, exploring men's fashion in the online world of social media as well as the offline worlds of retail, production, and the catwalk. Is it time to reassess notions of masculinity? How do we construct ourselves in the online world, and what are the dangers of doing so? From the ateliers of London to the digital landscape of Instagram, Dressing Up re-examines the ways men dress, and the ways men post.
In the mid 1990s, the widespread adoption of the web browser led to a rapid commercialization of the Internet. In addition, initial success stories were reported from companies that learned how to create an effective direct marketing channel selling tangible products to consumers directly with the World Wide Web. By the end of the 1990s, the next revolution began called business-to-business electronic commerce. Business to Business Electronic Commerce will provide researchers and practitioners alike with a source of knowledge related to this emerging area of business. The audience for this book includes students, scholars, researchers and practitioners. Any currently engaged in the utilization and management of electronic commerce technologies will be interested in Business to Business Electronic Commerce to learn about the latest issues and challenges facing businesses throughout the world.
As the number of Internet of Things (IoT) elements grows exponentially, their interactions can generate a massive amount of raw and multi-structured data. The challenge with this data explosion is to transform any raw data into information and knowledge, which can be used by people and systems to make intelligent decisions. Industrial IoT Application Architectures and Use Cases explores how artificial intelligence (AI), data analytics, and IoT technology combine to promote intelligent decision-making and automation in a range of industries. With faster, more stable AI algorithms and approaches, knowledge discovery and dissemination from IoT-device data can be simplified and streamlined. An era of powerful cognitive technology is beginning due to cloud-based cognitive systems that are forming the foundation of game-changing intelligent applications. This book presents next-generation use cases of IoT and IoT data analytics for a variety of industrial verticals as given below: An Intelligent IoT framework for smart water management An IoT-enabled smart traffic control system for congestion control and smart traffic management An intelligent airport system for airport management and security surveillance An IoT framework for healthcare to integrate and report patient information Fuzzy scheduling with IoT for tracking and monitoring hotel assets An IoT system for designing drainage systems and monitoring drainage pipes Predictive maintenance of plant equipment to decide the actual mean time to malfunction Integrated neural networks and IoT systems for predictive equipment maintenance IoT integration in blockchain for smart waste management This book also includes a chapter on the IoT paradigm and an overview of uses cases for personal, social, and industrial applications.
"Vivek Kale's Creating Smart Enterprises goes smack-dab at the heart of harnessing technology for competing in today's chaotic digital era. Actually, for him, it's SMACT-dab: SMACT (Social media, Mobile, Analytics and big data, Cloud computing, and internet of Things) technologies. This book is required reading for those that want to stay relevant and win, and optional for those that don't." -Peter Fingar, Author of Cognitive Computing and business technology consultant Creating Smart Enterprises unravels the mystery of social media, mobile, analytics and big data, cloud, and Internet of Things (SMACT) computing and explains how it can transform the operating context of business enterprises. It provides a clear understanding of what SMACT really means, what it can do for smart enterprises, and application areas where it is practical to use them. All IT professionals who are involved with any aspect of a SMACT computing project will profit by using this book as a roadmap to make a more meaningful contribution to the success of their computing initiatives. This pragmatic book: Introduces the VUCA (volatility, uncertainty, complexity, and ambiguity) business ecosystem confronted by the businesses today. Describes the challenges of defining business and IT strategies and of aligning them as well as their impact on enterprise governance. Provides a very wide treatment of the various components of SMACT computing, including the Internet of Things (IoT) and its constituting technologies like RFID, wireless networks, sensors, and wireless sensor networks (WSNs). This book addresses the key differentiator of SMACT computing environments and solutions that combine the power of an elastic infrastructure with analytics. The SMACT environment is cloud-based and inherently mobile. Information management processes can analyze and discern recurring patterns in colossal pools of operational and transactional data. Analytics, big data, and IoT computing leverage and transform these data patterns to help create successful, smart enterprises.
A new era of complexity science is emerging, in which nature- and bio-inspired principles are being applied to provide solutions. At the same time, the complexity of systems is increasing due to such models like the Internet of Things (IoT) and fog computing. Will complexity science, applying the principles of nature, be able to tackle the challenges posed by highly complex networked systems? Bio-Inspired Optimization in Fog and Edge Computing: Principles, Algorithms, and Systems is an attempt to answer this question. It presents innovative, bio-inspired solutions for fog and edge computing and highlights the role of machine learning and informatics. Nature- or biological-inspired techniques are successful tools to understand and analyze a collective behavior. As this book demonstrates, algorithms, and mechanisms of self-organization of complex natural systems have been used to solve optimization problems, particularly in complex systems that are adaptive, ever-evolving, and distributed in nature. The chapters look at ways of enhancingto enhance the performance of fog networks in real-world applications using nature-based optimization techniques. They discuss challenges and provide solutions to the concerns of security, privacy, and power consumption in cloud data center nodes and fog computing networks. The book also examines how: The existing fog and edge architecture is used to provide solutions to future challenges. A geographical information system (GIS) can be used with fog computing to help users in an urban region access prime healthcare. An optimization framework helps in cloud resource management. Fog computing can improve the quality, quantity, long-term viability, and cost-effectiveness in agricultural production. Virtualization can support fog computing, increase resources to be allocated, and be applied to different network layers. The combination of fog computing and IoT or cloud computing can help healthcare workers predict and analyze diseases in patients.
This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers and policy makers working in various areas related to cybersecurity and privacy for Smart Cities. This book includes chapters titled "An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT Security", "Smart City: Evolution and Fundamental Concepts", "Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment", "A Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel Framework for a Cyber Secure Smart City", "Contemplating Security Challenges and Threats for Smart Cities", "Self-Monitoring Obfuscated IoT Network", "Introduction to Side Channel Attacks and Investigation of Power Analysis and Fault Injection Attack Techniques", "Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study", "Understanding Security Requirements and Challenges in the Industrial Internet of Things: A Review", "5G Security and the Internet of Things", "The Problem of Deepfake Videos and How to Counteract Them in Smart Cities", "The Rise of Ransomware Aided by Vulnerable IoT Devices", "Security Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart Cities". This book provides state-of-the-art research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a "must have" for all university libraries.
The Internet is already more widely deployed than any other computing system in history and continues to grow rapidly. New technologies, including high speed wide area network and improved software support for distribution, promise to make the Internet much more useful for general purpose distributed computing in the future. Web Information Systems is dedicated to the new era of information systems on web environments, due to not only the growing popularity of the web technology but also the roles that web technology play in modern information systems. The major elements of web information systems include web semantics, XML technologies, web mining and querying, web-based information systems, information extraction, and web semantics.
'I loved her then, I love her now. Annie's back and she's better than ever! Fun, feel good and feisty - Annie Valentine is the woman you want to share a cocktail with!' Portia MacIntoshHer passion is fashion... but she's on a budget! Personal shopper Annie Valentine is about to hit the big time: presenting a glamorous TV makeover series! This is it for Annie and her little family. No more scrimping and saving, finally all her hard work has paid off. But life in the spotlight isn't all it's cracked up to be. Soon, Annie discovers this is TV on a shoestring and her budget is zip. But more than this, Annie feels as though the women she should be helping to look fabulous, go away feeling all the more like fashion failures! Can Annie make it in the spotlight? Or will making it big mean losing who she really is? Fans of Sophie Kinsella, Lindsey Kelk and Paige Toon will love this laugh-out-loud romantic comedy from bestselling author Carmen Reid. What readers are saying! "If you love shopping as much as you love a great read, try this. Wonderful." Bestselling author, Katie Fforde "Annie Valentine is a wonderful character - I want her to burst into my life and sort out my wardrobe for me!" Bestselling author, Jill Mansell "You will enjoy getting to know Annie Valentine; laughing with her and crying with her. You may even fall in love with her . . . I have! A fantastic read!" Reader review "Fantastic read, couldn't put it down" Reader review "Can't wait to read the next one!" Reader review
Like many other incipient technologies, Web services are still surrounded by a tremendous level of noise. This noise results from the always dangerous combination of wishful thinking on the part of research and industry and of a lack of clear understanding of how Web services came to be. On the one hand, multiple contradictory interpretations are created by the many attempts to realign existing technology and strategies with Web services. On the other hand, the emphasis on what could be done with Web services in the future often makes us lose track of what can be really done with Web services today and in the short term. These factors make it extremely difficult to get a coherent picture of what Web services are, what they contribute, and where they will be applied. Alonso and his co-authors deliberately take a step back. Based on their academic and industrial experience with middleware and enterprise application integration systems, they describe the fundamental concepts behind the notion of Web services and present them as the natural evolution of conventional middleware, necessary to meet the challenges of the Web and of B2B application integration. Rather than providing a reference guide or a "how to write your first Web service" kind of book, they discuss the main objectives of Web services, the challenges that must be faced to achieve them, and the opportunities that this novel technology provides. Established, as well as recently proposed, standards and techniques (e.g., WSDL, UDDI, SOAP, WS-Coordination, WS-Transactions, and BPEL), are then examined in the context of this discussion in order to emphasize their scope, benefits, and shortcomings. Thus, the book is ideally suited both for professionals considering the development of application integration solutions and for research and students interesting in understanding and contributing to the evolution of enterprise application technologies.
As the Internet's presence in health care grows more pervasive, an increasing number of health care providers have begun to implement eHealth innovations in their practice. The interactive health communication system (IHCS), one such eHealth solution, provides consumers with information, informal support, and a venue for communication. Investing in eHealth: What it Takes to Sustain Consumer Health Informatics examines the evolution of the IHCS and the significant changes in organizational culture and operational systems that may be required for successful and sustained implementation. This book explores the development of a model (funded by the Agency for Healthcare Research and Quality in 1998) to predict and explain the degree of success of such implementation efforts. This model allows an institution to benchmark its progress towards IHCS implementation and advises administrators where to invest resources to increase the chance of successful implementation. A set of case studies highlights key features of the model; each study describes an attempt by an organization to implement the Comprehensive Health Enhancement Support System (CHESS), a proven IHCS.After examining the success or failure of each particular implementation, the book suggests steps that could have been taken to address weaknesses identified by the model. Investing in eHealth culminates in a set of general guidelines for any health care provider striving to successfully employ the model, and suggests directions for future research.
Hidden and Devalued Feminized Labour in the Digital Humanities examines the data-driven labour that underpinned the Index Thomisticus-a preeminent project of the incunabular digital humanities-and advanced the data-foundations of computing in the Humanities. Through oral history and archival research, Nyhan reveals a hidden history of the entanglements of gender in the intellectual and technical work of the early digital humanities. Setting feminized keypunching in its historical contexts-from the history of concordance making, to the feminization of the office and humanities computing-this book delivers new insight into the categories of work deemed meritorious of acknowledgement and attribution and, thus, how knowledge and expertise was defined in and by this field. Focalizing the overlooked yet significant data-driven labour of lesser-known individuals, this book challenges exclusionary readings of the history of computing in the Humanities. Contributing to ongoing conversations about the need for alternative genealogies of computing, this book is also relevant to current debates about diversity and representation in the Academy and the wider computing sector. Hidden and Devalued Feminized Labour in the Digital Humanities will be of interest to researchers and students studying digital humanities, library and information science, the history of computing, oral history, the history of the humanities, and the sociology of knowledge and science.
The metaverse is here. Are you ready? In The Metaverse Handbook: Innovating for the Internet's Next Tectonic Shift, a duo of experienced tech and culture experts delivers a can't-miss guide to participating in the most promising new technology since the advent of the web. Through dozens of metaverse creator case studies and concise, actionable insights, you'll walk away from this book understanding how to explore and implement the latest metaverse tech emerging from blockchain, XR, and web3. In The Metaverse Handbook, you'll discover: What the metaverse is, why you should care about it, and how to build your metaverse strategy The history of the metaverse and primers on critical technologies driving the metaverse, including non-fungible tokens, XR, the blockchain, and web3 How to unearth unique metaverse opportunities in digital communities, commerce, and immersive experiences As the metaverse has rapidly become the technology platform and marketing buzzword of the future, this new reality for companies, creators, and consumers is not easily understood at the surface level. Those who aim to be at the forefront of this exciting new arena must first understand the foundations and central technologies of the metaverse. An essential resource for digital professionals, creators, and business leaders in the vanguard of the coming technology revolution, The Metaverse Handbook provides the go-to roadmap for your journey into the metaverse.
Get to know WordPress with this simple and approachable reference WordPress For Dummies, 9th Edition helps readers discover the power of the WordPress web content building tool. Web builders have created 75 million websites using WordPress and this book will show you how to add your blogs and websites to that count. WordPress For Dummies, 9th Edition drops you right into the fast lane to publishing your first website or blog by teaching you to: - Customize a theme - Create your first post - Use WordPress as a content management system - Work with multimedia formats - Add plugins to your site - Establish a publishing routine Perfect for new bloggers, experienced bloggers converting to WordPress for the first time, and people accustomed to WordPress who want to learn more about the full potential of the technology, WordPress for Dummies, 9th Edition is an indispensable addition to the library of every blogger and webmaster.
Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists' online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online "footprints" to target new converts, broaden their messaging, and increase their influence. Chapters present the emergence of various groups; the advancement of terrorist groups' online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment. With contributions from leading experts in the field-including practitioners and terrorism researchers-the coverage moves from general factors to specific groups practices as relate to Islamic State of Iraq and the Levant (ISIL), and numerous other groups. Chapters also examine the lone wolf phenomenon as a part of the disturbing trend of self-radicalization. A functional, real-world approach is used regarding the classification of the means and methods by which an online presence is often utilized to promote and support acts of terrorism. Online Terrorist Propaganda, Recruitment, and Radicalization examines practical solutions in identifying the threat posed by terrorist propaganda and U.S. government efforts to counter it, with a particular focus on ISIS, the Dark Web, national and international measures to identify, thwart, and prosecute terrorist activities online. As such, it will be an invaluable resources for intelligence professionals, terrorism and counterterrorism professionals, those researching terrorism funding, and policy makers looking to restrict the spread of terrorism propaganda online.
Get a sneak peek into the future of technology, finance, and the metaverse In The Web3 Era: NFTs, the Metaverse, Blockchain and the Future of the Decentralized Internet, renowned finance and technology expert David Shin connects pivotal moments from the history of human progress and global trade with current events that are shaping the world of tomorrow through a fascinating and insightful exploration of the long-term, next-level use cases of non-fungible tokens and digital assets, and their implications for industries that leverage these advancements. In the book, you'll find discussions of the challenges and opportunities for institutions awaiting the arrival of the Web3 space; how old Western central powers are struggling to keep up with the digital currencies of the East; and why our voices will matter as consensus-driven tribes converge to form DAOs. You'll also discover the potential of blockchain as a pivotal engine for driving the metaverse economy and transforming contemporary web infrastructure into a decentralized network of free trade and social interaction governed by users themselves. The author covers topics that include: The potential institution of a smart treasury in a digital economy The convergence of metaverse infrastructure with decentralized finance, creating a virtual world of open finance Use cases for government-backed digital tokens in a variety of industries, including education, healthcare, and banking Social interactions and commerce tied to Soulbound-identity, A.I. technology, archeological revelations, de-dollarization, and the rising Global South An essential and one-of-a-kind resource for business leaders, executives, entrepreneurs, investors, and finance professionals, The Web3 Era: NFTs, the Metaverse, Blockchain and the Future of the Decentralized Internet will also benefit technology enthusiasts, digital marketers, and digital transformation specialists who seek to gain invaluable insights into the future of technology and finance, as well as anyone who believes that we are in need of a new system of governance for a better tomorrow.
Wikis as information sources, as a form of publishing, and as tools
for collaboration, are discussed in this book. The applications of
wikis in library and information services, education and business
are explored, with examples. Provides an overview of wikis, in the
context of the increasing use of social software and the trend
towards a more interactive World Wide Web. The different kinds of
wikis are identified and described. The advantages and problems
associated with using wikis in information work and collaboration
are discussed. One of the problems is simply that of finding wikis
that deal with a particular topic or activity, and this is
addressed through a discussion of directories, search engines and
other finding tools. Later chapters cover the options for creating
wikis and the management of a wiki. The book concludes with lists
of resources related to wikis.
Power and Authority in Internet Governance investigates the hotly contested role of the state in today's digital society. The book asks: Is the state "back" in internet regulation? If so, what forms are state involvement taking, and with what consequences for the future? The volume includes case studies from across the world and addresses a wide range of issues regarding internet infrastructure, data and content. The book pushes the debate beyond a simplistic dichotomy between liberalism and authoritarianism in order to consider also greater state involvement based on values of democracy and human rights. Seeing internet governance as a complex arena where power is contested among diverse non-state and state actors across local, national, regional and global scales, the book offers a critical and nuanced discussion of how the internet is governed - and how it should be governed. Power and Authority in Internet Governance provides an important resource for researchers across international relations, global governance, science and technology studies and law as well as policymakers and analysts concerned with regulating the global internet.
Recent advances in mobile and wireless communication and personal computer technology have created a new paradigm for information processing. Today, mobile and wireless communications exit in many forms, providing different types of services. Existing forms of mobile and wireless communications continue to experience rapid growth and new applications and approaches are being spawned at an increasing rate. Recently, the mobile and wireless Internet has become one of the most important issues in the telecommunications arena. The development of the mobile and wireless Internet is the evolution of several different technologies coming together to make the Internet more accessible. Technologies such as the Internet, wireless networks, and mobile computing have merged to form the mobile and wireless Internet. The mobile and wireless Internet extends traditional Internet and World Wide Web services to wireless devices such as cellular phones, Personal Digital Assistants (PDAs) and notebooks. Mobile and wireless Internet c: an give users access to personalized information anytime and anywhere they need it, and thus empower them to make decisions more quickly, and bring them closer to friends, family, and work colleagues. Wireless data communication methods have been around for sometime
One of The New York Times Book Review's 100 Notable Books of 2022. Named one of the best books of 2022 by The New Yorker, Pitchfork, Vanity Fair and TIME. A New York Times Book Review Editors' Choice. "On the internet, fandom can be a route toward cyberbullying a baby, or it can be a way of figuring some things out about yourself. Sometimes, it can even forge a writer as funny and perceptive as Kaitlyn Tiffany." --Amanda Hess, The New York Times "Wistful, winning, and unexpectedly funny." --Katy Waldman, The New Yorker A thrilling dive into the world of superfandom and the fangirls who shaped the social internet. In 2014, on the side of a Los Angeles freeway, a One Direction fan erected a shrine in the spot where, a few hours earlier, Harry Styles had vomited. "It's interesting for sure," Styles said later, adding, "a little niche, maybe." But what seemed niche to Styles was actually a signpost for an unfathomably large, hyper-connected alternate universe: stan culture. In Everything I Need I Get from You, Kaitlyn Tiffany, a staff writer at The Atlantic and a superfan herself, guides us through the online world of fans, stans, and boybands. Along the way we meet girls who damage their lungs from screaming too loud, fans rallying together to manipulate chart numbers using complex digital subversion, and an underworld of inside jokes and shared memories surrounding band members' allergies, internet typos, and hairstyles. In the process, Tiffany makes a convincing, and often moving, argument that fangirls, in their ingenuity and collaboration, created the social internet we know today. "Before most people were using the internet for anything," Tiffany writes, "fans were using it for everything." With humor, empathy, and an insider's eye, Everything I Need I Get from You reclaims internet history for young women, establishing fandom not as the territory of hysterical girls but as an incubator for digital innovation, art, and community. From alarming, fandom-splitting conspiracy theories about secret love and fake children, to the interplays between high and low culture and capitalism, Tiffany's book is a riotous chronicle of the movement that changed the internet forever.
Updates content and introduces topics such as business changes and outsourcing. Addresses new cyber security risks such as IoT and Distributed Networks (i.e., blockchain). Covers strategy based on the OODA loop in the cycle. Demonstrates application of the concepts through short case studies of real-world incidents chronologically delineating related events. Discusses certifications and reference manuals in cyber security and digital forensics. Includes an entire chapter on tools used by professionals in the field.
Key features Provides an in-depth understanding of emerging technologies and integration of artificial intelligence, deep learning, big data, IoT in healthcare Details specific applications for the use of AI, big data, and IoT in healthcare Discusses how AI technology can help in formulating protective measures for COVID-19 and other diseases Includes case studies |
You may like...
Tweeting to Power - The Social Media…
Jason Gainous, Kevin M. Wagner
Hardcover
R3,792
Discovery Miles 37 920
Strengthening SME Performance Through…
Sikandar Ali Qalati, Dragana Ostic, …
Hardcover
R6,691
Discovery Miles 66 910
|