![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > General
Standardization has the potential to shape, expand, and create markets. Information technology has undergone a rapid transformation in the application of standards in practice, and recent developments have augmented the need for the divulgence of supplementary research. Standardization Research in Information Technology: New Perspectives amasses cutting-edge research on the application of standards in the market, covering topics such as corporate standardization, linguistic qualities of international standards, the role of individuals in standardization, and the development, use, application, and influence of information technology in standardization techniques.
The second volume in a series which aims to focus on advances in computational biology. This volume discusses such topics as: statistical analysis of protein sequences; progress in large-scale sequence analysis; and the architecture of loops in proteins.
This volume examines the complex, contradictory discourses of hypertext. Using theoretical material from cultural theory, radical and border pedagogies, and technology criticism, the text discusses three primary ways hypertext is articulated: as automated book (technical communication), as virtual commodity (online databases), and as environment for constructing and exploring multiple subject positions (postmodern hypertext in composition and literature). I would recommend the entire book to researchers and academics who recognize the need to integrate new technologies into our classrooms and pedagogies. - Technical Communication
In digital enterprise, individuals use a variety of technologies to assist them in communicating, collaborating, and coordinating their activities across distance and time, enhancing workflow expertise and communications. ""Leadership in the Digital Enterprise: Issues and Challenges"" presents a comprehensive collection of the most current research on various aspects, roles, and functions of digital enterprises. A compendium of latest industry findings and advancements, this Premier Reference Source provides researchers, academicians, and practitioners with useful theories and references in topics such as e-business, knowledge management, and enterprise planning.
Over the past six years personal computers have carved a deep niche in the music world. This widespread popularity is largely due to the establishment of the MIDI (Musical Instrument Digital Interface) standard in 1983. This communications protocol allows computers to send, receive, and store digital information generated by various electronic musical instruments. In addition to numerous writings exploring the possibilities of present and future technology, this annotated bibliography offers educators many introductory sources, articles on how to evaluate and purchase equipment, and directories of available software. Specifically, it provides a collection of source material, an overview of significant publications in the field, and serves as a point of departure for further inquiry. Part I of the bibliography is divided into seven sections, each devoted to information regarding a specific computer. Articles written about two or more popular computers or models not covered elsewhere are detailed in part II. Music education is the subject of Part III and Part IV lists and annotates significant books. The appendix contains information on associations involved with the musical applications of personal computers and brief descriptions of several popular online services. Author and subject indexes are also included. Music and the Personal Computer covers a variety of topics that will be of interest to practicing musicians, music educators, and computer enthusiasts with interests in music.
The present work provides a platform for leading Data designers whose vision and creativity help us to anticipate major changes occurring in the Data Design field, and pre-empt the future. Each of them strives to provide new answers to the question, "What challenges await Data Design?" To avoid falling into too narrow a mind-set, each works hard to elucidate the breadth of Data Design today and to demonstrate its widespread application across a variety of business sectors. With end users in mind, designer-contributors bring to light the myriad of purposes for which the field was originally intended, forging the bond even further between Data Design and the aims and intentions of those who contribute to it. The first seven parts of the book outline the scope of Data Design, and presents a line-up of "viewpoints" that highlight this discipline's main topics, and offers an in-depth look into practices boasting both foresight and imagination. The eighth and final part features a series of interviews with Data designers and artists whose methods embody originality and marked singularity. As a result, a number of enlightening concepts and bright ideas unfold within the confines of this book to help dispel the thick fog around this new and still relatively unknown discipline. A plethora of equally eye-opening and edifying new terms, words, and key expressions also unfurl. Informing, influencing, and inspiring are just a few of the buzz words belonging to an initiative that is, first and foremost, a creative one, not to mention the possibility to discern the ever-changing and naturally complex nature of today's datasphere. Providing an invaluable and cutting-edge resource for design researchers, this work is also intended for students, professionals and practitioners involved in Data Design, Interaction Design, Digital & Media Design, Data & Information Visualization, Computer Science and Engineering.
"Hacking Europe" traces the user practices of chopping games in Warsaw, hacking software in Athens, creating chaos in Hamburg, producing demos in Turku, and partying with computing in Zagreb and Amsterdam. Focusing on several European countries at the end of the Cold War, the book shows the digital development was not an exclusively American affair. Local hacker communities appropriated the computer and forged new cultures around it like the hackers in Yugoslavia, Poland and Finland, who showed off their tricks and creating distinct demoscenes. Together the essays reflect a diverse palette of cultural practices by which European users domesticated computer technologies. Each chapter explores the mediating actors instrumental in introducing and spreading the cultures of computing around Europe. More generally, the ludological element--the role of mischief, humor, and play--discussed here as crucial for analysis of hacker culture, opens new vistas for the study of the history of technology."
Enterprise information systems touch every process of an organization as new functionalities in previously existing and upcoming solutions are created every day. ""Social, Managerial, and Organizational Dimensions of Enterprise Information Systems"" discusses the technological developments, main issues, challenges, opportunities, and trends impacting every part of small to medium sized enterprises. A leading resource for academicians, managers, and researchers, this advanced publication provides an integrated and progressive view into the benefits and applications of enterprise information systems.
Internal migration serves as one of the key contributing factors to population change involving not only change in the numbers of people, but also a change in composition and structure of local populations. Technologies for Migration and Population Analysis: Spatial Interaction Data Applications addresses the technical and data-related side of studying population flows and provides a selection of substantive case studies and applications to exemplify research currently being carried out. With expert international contributors currently working in the field, this authoritative book allows readers to better understand interaction data and ways knowledge of population flows can be put to use.
Tools of data comparison and analysis are critical in the field of archaeology, and the integration of technological advancements such as geographic information systems, intelligent systems, and virtual reality reconstructions with the teaching of archaeology is crucial to the effective utilization of resources in the field. ""E-Learning Methodologies and Computer Applications in Archaeology"" presents innovative instructional approaches for archaeological e-learning based on networked technologies, providing researchers, scholars, and professionals a comprehensive global perspective on the resources, development, application, and implications of information communication technology in multimedia-based educational products and services in archaeology.
Virtual teams are a relatively new phenomenon and by definition work across time, distance, and organizations through the use of information and communications technology. Virtual Teams: Projects, Protocols and Processes gathers the best of academic research on real work-based virtual teams into one book. It offers a series of chapters featuring practical research, insight and recommendations on how virtual team projects can be better managed, as well as in depth discussion on issues critical to virtual team success, including the place of virtual teams in organizations, leadership, trust and relationship building, best use of technology, and knowledge sharing.
Gain the knowledge and tools to deliver compelling mobile phone applications. Mobile and wireless application design is complex and challenging. Selecting an application technology and designing a mobile application require an understanding of the benefits, costs, context, and restrictions of the development company, end user, target device, and industry structure. "Designing the Mobile User Experience" provides the experienced product development professional with an understanding of the users, technologies, devices, design principles, techniques and industry players unique to the mobile and wireless space. Barbara Ballard describes the different components affecting the user experience and principles applicable to the mobile environment, enabling the reader to choose effective technologies, platforms, and devices, plan appropriate application features, apply pervasive design patterns, and choose and apply appropriate research techniques. "Designing the Mobile User Experience: " Provides a comprehensive guide to the mobile user experience, offering guidance to help make appropriate product development and design decisions. Gives product development professionals the tools necessary to understand development in the mobile environment. Clarifies the components affecting the user experience and principles uniquely applicable to the mobile application field. Explores industry structure and power dynamics, providing insight into how mobile technologies and platforms become available on current and future phones. Provides user interface design patterns, design resources, and user research methods for mobile user interface design. Illustrates concepts with example photographs, explanatory tables and charts, and an example application. "Designing the Mobile User Experience" is an invaluable resource for information architects, user experience planners and designers, interaction designers, human factors specialists, ergonomists, product marketing specialists, and brand managers. Managers and directors within organizations entering the mobile space, advanced students, partnership managers, software architects, solution architects, development managers, graphic designers, visual designers, and interface designers will also find this to be an excellent guide to the topic.
This book develops a common understanding between the client and the provider in each of the four stages of strategic outsourcing. These stages range from discovery, where the parties envision their future collaboration; planning, where they lay the ground work for the contract and the project; building, where they effectively carry out the work; and lastly to running, where they orchestrate the relationship on a daily basis to ensure that the new, enlarged company achieves the results sought. In a simple yet direct style, it highlights the dos and don'ts the parties should bear in mind at each stage of the process and combines both the client's and the provider's perspectives by comparing their respective involvement at each stage of the process and considering, equally, their obligations in establishing a balanced relationship. The book is primarily intended for those in the private sector with experience of dealing with complex outsourcing situations and who are looking for the small or bigger differentiators that will support their decisions and actions. The target audiences include, on the client side: CCOs, CIOs, lawyers, procurement managers, outsourcing consultants and IT Service managers and, on the provider side: account managers, bid managers, outsourcing project managers, operation managers and service managers. However, it is also useful for anybody involved in outsourcing who is seeking to develop a global understanding of the main processes and roles upstream and downstream in the chain.
Modern optimization approaches have attracted an increasing number of scientists, decision makers, and researchers. As new issues in this field emerge, different optimization methodologies must be developed and implemented. Exploring Critical Approaches of Evolutionary Computation is a vital scholarly publication that explores the latest developments, methods, approaches, and applications of evolutionary models in a variety of fields. It also emphasizes evolutionary models of computation such as genetic algorithms, evolutionary strategies, classifier systems, evolutionary programming, genetic programming, and related fields such as swarm intelligence and other evolutionary computation techniques. Highlighting a range of pertinent topics such as neural networks, data mining, and data analytics, this book is designed for IT developers, IT theorists, computer engineers, researchers, practitioners, and upper-level students seeking current research on enhanced information exchange methods and practical aspects of computational systems.
In the United States, mobile commerce is a $1 billion industry and growing. More and more people are using their mobile phones everywhere to communicate, to get information, and to have fun. The technology for you to create, deliver, and market that content - and profit from it - is available now too. In Making Money on the Mobile Internet, the experts at Cingular Wireless show you how to harness the potential of the mobile marketplace in five simple steps. The business opportunities for mobile content providers are tremendous. From creating your application to getting it to market to tracking your success, Making Money on the Mobile Internet shows you how to create the next killer app. Let's get started!
Exam Board: Cambridge Level: Key Stage 4 Subject: IT First Teaching: September 2016 First Exam: June 207 Support your teaching of the new Cambridge Technicals 2016 suite with Cambridge Technical Level 3 IT, developed in partnership between OCR and Hodder Education; this textbook covers each specialist pathway and ensures your ability to deliver a flexible course that is both vocationally focused and academically thorough. Cambridge Technical Level 3 IT is matched exactly to the new specification and follows specialist pathways in IT Infrastructure Technician, Emerging Digital Technology Practitioner, Application Developer, and Data Analyst. - Ensures effective teaching of each specialist pathway offered within the qualification. - Focuses learning on the skills, knowledge and understanding demanded from employers and universities. - Provides ideas and exercises for the application of practical skills and knowledge. - Developed in partnership between Hodder Education and OCR, guaranteeing quality resources which match the specification perfectly Hodder Education have worked with OCR to make updates to our Cambridge Technicals textbooks to bring them more closely in line with the model assignment course requirements. We would like to let you know about a recent change to this textbook, updated pages which are now available free of charge as a PDF when you click on the 'Amended Pages' link on the left of this webpage.
Aims and Scope Patients are more empowered to shape their own health care today than ever before. Health information technologies are creating new opportunities for patients and families to participate actively in their care, manage their medical problems and improve communication with their healthcare providers. Moreover, health information technologies are enabling healthcare providers to partner with their patients in a bold effort to optimize quality of care, improve health outcomes and transform the healthcare system on the macro-level. In this book, leading figures discuss the existing needs, challenges and opportunities for improving patient engagement and empowerment through health information technology, mapping out what has been accomplished and what work remains to truly transform the care we deliver and engage patients in their care. Policymakers, healthcare providers and administrators, consultants and industry managers, researchers and students and, not least, patients and their family members should all find value in this book. "In the exciting period that lies just ahead, more will be needed than simply connecting patients to clinicians, and clinicians to each other. The health care systems that will be most effective in meeting patients' needs will be those that can actually design their 'human wares' around that purpose. This book provides deep insight into how information technology can and will support that redesign." Thomas H. Lee, MD, MSc, Chief Medical Officer, Press Ganey Associates; Professor of Medicine, Harvard Medical School and Professor of Health Policy and Management, Harvard School of Public Health The Editors: Drs. Maria Adela Grando, Ronen Rozenblum and David W. Bates are widely recognized professors, researchers and experts in the domain of health information technology, patient engagement and empowerment. Their research, lectures and contributions in these domains have been recognized nationally and internationally. Dr. Grando is affiliated with Arizona State University and the Mayo Clinic, and Drs. Rozenblum and Bates are affiliated with Brigham and Women's Hospital and Harvard University.
Tourism is one of the leading industries worldwide. The magnitude of growth in tourism will bring both opportunities and problems to source and destination markets in years to come, especially in the internal and external exchange of information in the industry. ""Information and Communication Technologies in Support of the Tourism Industry"" examines the process of transformation as it relates to the tourism industry, and the changes to that industry from modern electronic communications. ""Information and Communication Technologies in Support of the Tourism Industry"" covers not only geographically supportive technologies in communication, but also in terms of culture, economics, marketing, social, and regional issues. In-depth analyses range from the use of the Internet to supply information to the emerging patterns of tourist decision making and investments.
"Google Earth Forensics" is the first book to explain how to use Google Earth in digital forensic investigations. This book teaches you how to leverage Google's free tool to craft compelling location-based evidence for use in investigations and in the courtroom. It shows how to extract location-based data that can be used to display evidence in compelling audiovisual manners that explain and inform the data in contextual, meaningful, and easy-to-understand ways. As mobile computing devices become more and more prevalent and powerful, they are becoming more and more useful in the field of law enforcement investigations and forensics. Of all the widely used mobile applications, none have more potential for helping solve crimes than those with geo-location tools. Written for investigators and forensic practitioners, "Google
Earth Forensics" is written by an investigator and trainer with
more than 13 years of experience in law enforcement who will show
you how to use this valuable tool anywhere at the crime scene, in
the lab, or in the courtroom.
The development of social technologies has brought about a new era of political planning and government interactions. In addition to reducing costs in city resource management, ICT and social media can be used in emergency situations as a mechanism for citizen engagement, to facilitate public administration communication, etc. In spite of all these advantages, the application of technologies by governments and the public sector has also fostered debate in terms of cyber security due to the vulnerabilities and risks that can befall different stakeholders. It is necessary to review the most recent research about the implementation of ICTs in the public sector with the aim of understanding both the strengths and the vulnerabilities that the management models can entail. Special Applications of ICTs in Digital Government and the Public Sector: Emerging Research and Opportunities is a collection of innovative research on the methods and applications of ICT implementation in the public sector that seeks to allow readers to understand how ICTs have forced public administrations to undertake reforms to both their workflow and their means of interacting with citizens. While highlighting topics including e-government, emergency communications, and urban planning, this book is ideally designed for government officials, public administrators, public managers, policy holders, policymakers, public consultants, professionals, academicians, students, and researchers seeking current research on the digital communication channels between elected officials and the citizens they represent.
Filling the gaps between subjective vehicle assessment, classical vehicle dynamics and computer-based multibody approaches, "The Multibody Systems Approach to Vehicle Dynamics" offers unique coverage of both the virtual and practical aspects of vehicle dynamics from concept design to system analysis and handling development. The book provides valuable foundation knowledge of vehicle dynamics as well as drawing on laboratory studies, test-track work, and finished vehicle applications to gel theory with practical examples and observations. Combined with insights into the capabilities and limitations of multibody simulation, this comprehensive mix provides the background understanding, practical reality and simulation know-how needed to make and interpret useful models. New to this edition you will find coverage of the latest tire
models, changes to the modeling of light commercial vehicles,
developments in active safety systems, torque vectoring, and
examples in AView, as well as updates to theory, simulation, and
modeling techniques throughout.
As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldomadopted. In this book, I argue that we can resolve the tension between security and features by leveraging the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems. At a high level, we support this premise by developing techniques to allow a user to employ a small, trusted, portable device to securely learn what code is executing on her local computer. Rather than entrusting her data to the mountain of buggy code likely running on her computer, we construct an on-demand secure execution environment which can perform security-sensitive tasks and handle private data in complete isolation from all other software (and most hardware) on the system. Meanwhile, non-security-sensitive software retains the same abundance of features and performance it enjoys today. Having established an environment for secure code execution on an individual computer, we then show how to extend trust in this environment to network elements in a secure and efficient manner. This allows us to reexamine the design of network protocols and defenses, since we can now execute code on endhosts and trust the results within the network. Lastly, we extend the user's trust one more step to encompass computations performed on a remote host (e.g., in the cloud). We design, analyze, and prove secure a protocol that allows a user to outsource arbitrary computations to commodity computers run by an untrusted remote party (or parties) who may subject the computers to both software and hardware attacks. Our protocol guarantees that the user can both verify that the results returned are indeed the correct results of the specified computations on the inputs provided, and protect the secrecy of both the inputs and outputs of the computations. These guarantees are provided in a non-interactive, asymptotically optimal (with respect to CPU and bandwidth) manner. Thus, extending a user's trust, via software, hardware, and cryptographic techniques, allows us to provide strong security protections for both local and remote computations on sensitive data, while still preserving the performance and features of commodity computers. |
You may like...
Gentzen Calculi for Modal Propositional…
Francesca Poggiolesi
Hardcover
R3,905
Discovery Miles 39 050
Ward 22, Precinct 1, City of Boston…
Boston Election Department
Paperback
R683
Discovery Miles 6 830
Utilizing Information Technology Systems…
Evon M. Abu-Taieh, Asim A El-Sheikh, …
Hardcover
R4,945
Discovery Miles 49 450
Critical Reading and Writing in the…
Andrew Goatly, Preet Hiradhar
Paperback
(1)R1,002 Discovery Miles 10 020
|