![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
It is widely recognized that internet technology has had a profound effect on political participation in China, but this new use of technology is not unprecedented in Chinese history. This is a pioneering work that systematically describes and analyzes the manner in which the Chinese used telegraphy during the late Qing, and the internet in the contemporary period, to participate in politics. Drawing upon insights from the fields of anthropology, history, political science, and media studies, this book historicizes the internet in China and may change the direction of the emergent field of Chinese internet studies. In contrast to previous works, this book is unprecedented in its perspective, in the depth of information and understanding, in the conclusions it reaches, and in its methodology. Written in a clear and engaging style, this book is accessible to a broad audience.
The volume aims at providing a comprehensive review of the diverse efforts covering the gap existing between the two main perspectives on the topic of ontologies for multi-agent systems. On the one hand, there is the knowledge modelling perspective; i.e. how ontologies should be modelled and represented in order to be effectively used in agent systems. On the other hand, there is the agent perspective; what kind of capabilities should be exhibited by an agent in order to make use of ontological knowledge and to perform efficient reasoning with it. Theory and experiences are emphasized as the volume collects the most significant papers of the AAMAS 2002 and AAMAS 2003 workshop on ontologies for agent systems, and the EKAW 2002 workshop on ontologies for multi-agent systems.
This volume contains a collection of papers that provides a unique, novel and up-to-date overview of how software agents technology is being applied in very diverse problems in health care, ranging from community care to management of organ transplants. It also provides an introductory survey that highlights the main issues to be taken into account when deploying agents in the health care area. The intended audience includes graduate and postgraduate students specializing in artificial intelligence and researchers interested in the application of new technologies.
The completion of the first draft of the human genome has led to an explosion of interest in genetics and molecular biology. The view of the genome as a network of interacting computational components is well-established, but researchers are now trying to reverse the analogy, by using living organisms to construct logic circuits. The potential applications for such technologies is huge, ranging from bio-sensors, through industrial applications to drug delivery and diagnostics. This book would be the first to deal with the implementation of this technology, describing several working experimental demonstrations using cells as components of logic circuits, building toward computers incorporating biological components in their functioning.
The completion of the first draft of the human genome has led to an explosion of interest in genetics and molecular biology. The view of the genome as a network of interacting computational components is well-established, but researchers are now trying to reverse the analogy, by using living organisms to construct logic circuits. The potential applications for such technologies is huge, ranging from bio-sensors, through industrial applications to drug delivery and diagnostics. This book would be the first to deal with the implementation of this technology, describing several working experimental demonstrations using cells as components of logic circuits, building toward computers incorporating biological components in their functioning.
Rapid Prototyping of Digital Systems, Second Edition provides an exciting and challenging laboratory component for an undergraduate digital logic design class. The more advanced topics and exercises are also appropriate for consideration at schools that have an upper level course in digital logic or programmable logic. Design engineers working in industry will also want to consider this book for a rapid introduction to FPLD technology and logic synthesis using commercial CAD tools, especially if they have not had previous experience with the new and rapidly evolving technology. Two tutorials on the Altera CAD tool environment, an overview of programmable logic, and a design library with several easy-to-use input and output functions were developed for this book to help the reader get started quickly. Early design examples use schematic capture and library components. VHDL is used for more complex designs after a short introduction to VHDL-based synthesis. The second edition of the text now includes Altera's 10.1 student edition software which adds support for Windows 2000 and designs that are three times larger using the new 70,000 gate UP 1X board. All designs in the book's CD-Rom have been updated to work with the original UP 1 board or the newer UP 1X board using the new Altera student version software. A coupon is included with the text for purchase of the new UP 1X board. The additional logic and memory in the UP 1X's FLEX 10K70 is useful on larger design projects such as computers and video games. In addition to the new software, the second edition includes an update chapter on programmable logic, new robot sensors and projects, optional Verilog examples, and a meta assemblerwhich can be used to develop assemble language programs for the computer designs in Chapters 8 and 13.
Conservation of 20th Century Furniture provides a comprehensive coverage of materials and techniques that are encountered in twentieth century furniture, through both a contextual point of view and a range of practice perspectives. After putting the design, manufacture and conservation of twentieth-century furniture into context, this volume then offers an A-Z of materials. Within each chapter, a wide variety of material types are discussed, observed, analysed and contextualized, and further sources for consultation provided. The furniture discussed ranges from designer craftsman individually-made pieces, to factory-produced batch items, and includes cabinet work, decoration, surface finishes and upholstery, observing the traditional repertoire of materials and the innovative materials and processes introduced during the century. Conservation of 20th Century Furniture is the primary resourse for those studying and conserving twentieth-century furniture. The book will be of interest to those concerned with a wide range of topics in the manufacture, history and care of twentieth-century furniture, including curators, dealers and collectors.
Haunted Data explores the concepts that are at work in our complex relationships with data. Our engagement with data - big or small - is never as simplistic or straightforward as might first appear. Indeed, Blackman argues that our relationship with data is haunted with errors, dead ends, ghostly figures, and misunderstandings that challenge core assumptions about the nature of thought, consciousness, mind, cognition, affect, communication, control and rationality, both human and non-human. Using contemporary controversies from 'weird science' including the field of priming and its uncanny relations to animal telepathy, as well as artificial intelligences and their curious relation to psychic research ('clairvoyant computers'), Blackman shows how some of the current crises in science in these areas reveal more than scientists are willing or even able to acknowledge. In addition to proposing a new theory of how we might engage with data, Haunted Data also provides a nuanced survey of the historical context to contemporary debates, going back to the 19th Century origins of modern computation and science to explain the ubiquity and oddness of our data relations. Drawing from radical philosophies of science, feminist science studies, queer theory, cultural studies, and the field of affect studies, the book develops a manifesto for how artists, philosophers and scientists might engage creatively and critically with science within the context of digital communication.
This is a book in which successful, experienced IT solutions providers talk about their actual practical experiences in IT risk management. Tony Moynihan has asked successful IS/IT project managers to compare and contrast their recent projects in terms of the various important and different factors they had to deal with in each project. Coping with IS/IT Risk Management discusses how to:- handle unrealistic client expectations; - decide on the 'ownership' of a project; - set targets that work in practice! The result is a very well-written, interesting book, which will be enormously helpful to any professional needing to cope with the many and varied problems which can be encountered in IS/IT risk management. About the Author: Tony Moynihan is a Professor at the School of Computer Applications at Dublin City University, researching in the field of software engineering and software project risk-analysis. "This is probably one of the most real, useful, and entertaining books I have ever read on project management."(Robert L Glass, Editor, The Software Practitioner)"In my opinion, this book contains great practical advice to IS/IT project managers, based on the experience of other IT project managers. Tony succeeds in getting project managers to talk about their projects and the associated risks. He then distils these candid interviews into practical advice for other IS/IT project managers." (Nancy Mead, SEI, Carnegie-Mellon University, USA) "A useful book for any project manager to use and to reflect on, as they undertake their day-to-day activities." (Robert Cochran, Director, Centre for Software Engineering, Dublin)
"Business Driven Information Technology has the right formula to
reveal what it takes to make information technology succeed in an
organization. The innovative question-and-answer format provides
business professionals and students access to a wide range of
critical issues that are important in every enterprise, regardless
of scale. The real-world experience of its contributing authors
lends great credibility and value to the answers in the book and
makes Business Driven Information Technology a highly relevant tool
for managing technology in today's shifting market conditions."
--Bob Dutkowsky, Chairman, President, & CEO, J.D. Edwards
Companies in the business of providing knowledge -- for profit -- will dominate the 21st-century global marketplace. Can your business compete? In today's fast-paced world, knowledge is doubling nearly every seven years, while the life cycle of a business grows increasingly shorter. The best way -- and perhaps the only way -- to succeed is to become a "knowledge-based" business. In The Monster Under the Bed, Stan Davis and Jim Botkin show how: * Every business can become a knowledge business The Monster Under the Bed explains why it's necessary for businesses to educate employees and consumers. Consider the fact that the vast majority of 60 million PC owners, for example, learned to use their computers not at school but at work or at home. Davis and Botkin explain how any high-tech, low-tech, or no-tech company can discover new markets and create new sources of income by building future business on a knowledge-for-profit basis -- and how, once it does, its competitors must follow or fail. Filled with examples of high-profile companies that are riding the crest of this powerful wave, The Monster Under the Bed is an insightful exploration of the many ways that the knowledge-for-profit revolution will profoundly affect our businesses, our educational processes, and our everyday lives.
Computers are developing into a powerful medium integrating film, pictures, text and sound, and the use of computers for communication and information is rapidly expanding. The Computer as Medium brings insights from art, literature and theatre to bear on computers and discusses the communicative and organizational nature of computer networks within a historical perspective. The book consists of three parts. The first part characterizes the semiotic nature of computers and discusses semiotic approaches to programming and interface design. The second part discusses narrative and aesthetic issues of interactive fiction, information systems and hypertext. The final part contains papers on the cultural, organizational and historical impact of computers.The broad and rich coverage of this book will appeal to scholars in cognitive science, computer science, linguistics, semiotics, media studies and mass communications, cultural studies and education.
In-depth guide to diffusion models and their impact on design, with insight on how this novel artificial intelligence technology may disrupt the industry Diffusions in Architecture: Artificial Intelligence and Image Generators delves into the impact of Diffusion AI algorithms and generative image models on architecture design and aesthetics. The book presents an in-depth analysis of how these new technologies are revolutionizing the field of architecture. The architects presented in the book focus on the application of specific AI techniques and tools used in generative design, such as Diffusion models, Dall-E2, Stable Diffusion, and MidJourney. It discusses how these techniques can generate synthetic images that are both realistic and imaginative, creating new possibilities for architectural design and aesthetics. This comprehensive overview of the impact of Diffusion AI algorithms and generative image models on the field of architecture shows how they are changing the way architects approach their work. With a foreword by Lev Manovich—artist, writer and one of the world's most influential digital culture theorists. Sharing the work and insights of a team of designers and theorists from a range of backgrounds, offering disciplinary depth, and covering the full impact of these tools and models on architecture, Diffusions in Architecture includes information on: Fresh perspectives on design and aesthetics, with designs, images, and commentary from 22 leading architects, theorists, and designers The potential of prompt engineering and text-to-image models applicable to a broad interdisciplinary audience Whether image generators, or AI in general, will be an aid for human design, or potentially displace humans from the market Fundamentals of a larger debate in the architectural discourse (and practice) on the use of image generators Collecting the different ideas that have emerged in the field, Diffusions in Architecture provides architects, designers, concept artists, and theorists with an overview of this cornucopia of architectural imaginations produced in a common effort between humans and artificial intelligence.
Teaching Faculty How to Use Technology covers the critical developments in the use of technology for college teaching in North America and worldwide. Despite the huge investments in campus network infrastructures, the most daunting challenge in implementing technology in college teaching is the training of faculty in the use of these new technologies. Key challenges for this critical task are discussed, including such issues as funding, technical and pedagogical training/support, organizational structures, reward systems, workload issues, multi-institutional collaboration, collective bargaining, and intellectual property.
Designed with Excel gurus in mind, this handbook outlines how to create formulas that can be used to solve everyday problems with a series of data values that standard Excel formulas cannot or would be too arduous to attempt. Beginning with an introduction to array formulas, this manual examines topics such as how they differ from ordinary formulas, the benefits and drawbacks of their use, functions that can and cannot handle array calculations, and array constants and functions. Among the practical applications surveyed include how to extract data from tables and unique lists, how to get results that match any criteria, and how to utilize various methods for unique counts. This book contains 529 screen shots.
The proceedings of the conference ENTER - International Conference on Information and Communication Technologies in Tourism - provide a valuable forum for researchers and practitioners to discuss their ideas and perspectives regarding the nature and role of tourism and information technology in global society. The papers in this volume document how this new technology has changed and, in turn, how the industry has responded. They focus on the tourist, the attention on small- to medium-sized tourism enterprises, and the evaluation and benchmarking of information technology and the change it has created.
Learn to effectively deliver business aligned cybersecurity outcomes In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes. The authors use illustrative stories to show professionals how to establish an executive presence and avoid the most common pitfalls experienced by technology experts when speaking and presenting to executives. The book will show you how to: Inspire trust in senior business leaders by properly aligning and setting expectations around risk appetite and capital allocation Properly characterize the indispensable role of cybersecurity in your company's overall strategic plan Acquire the necessary funding and resources for your company's cybersecurity program and avoid the stress and anxiety that comes with underfunding Perfect for security and risk professionals, IT auditors, and risk managers looking for effective strategies to communicate cybersecurity concepts and ideas to business professionals without a background in technology. The CISO Evolution is also a must-read resource for business executives, managers, and leaders hoping to improve the quality of dialogue with their cybersecurity leaders.
If you are an editor or newsroom manager seeking new and more
efficient ways of managing the ever increasing flow of information
through your newsroom, this book will provide the information you
need to make informed decisions about crucial organisational and
equipment changes.
Business processes are among today's hottest topics in the science and practice of information systems. Business processes and workflow management systems attract a lot of attention from R&D professionals in software engineering, information systems, business-oriented computer science, and management sciences.The carefully reviewed chapters contributed to this state-of-the-art survey by internationally leading scientists consolidate work presented at various workshops on the topic organized by the editors of the book in the past few years. The book spans the whole spectrum of business process management ranging from theoretical aspects, conceptual models, and application scenarios to implementation issues. It will become a valuable source of reference and information for R&D professionals active in the fascinating interdisciplinary area of business process management and for ambitious practitioners.
SAC'99 was the sixth in a series of annual workshops on Selected Areas in Cryptography. Previous workshops were held at Carleton University in Ottawa (1995 and 1997) and at Queen's University in Kingston (1994, 1996, and 1998). The intent of the annual workshop is to provide a relaxed atmosphere in which researchers in cryptography can present and discuss new work on selected areas of current interest. The themes for the SAC'99 workshop were: { Design and Analysis of Symmetric Key Cryptosystems { E cient Implementations of Cryptographic Systems { Cryptographic Solutions for Web/Internet Security The timing of the workshop was particularly fortuitous as the announcement by NIST of the v e nalists for AES coincided with the rst morning of the workshop, precipitating lively discussion on the merits of the selection! A total of 29 papers were submitted to SAC'99 and, after a review process that had all papers reviewed by at least 3 referees, 17 were accepted and p- sented. As well, two invited presentations were given: one by Miles Smid from NIST entitled \From DES to AES: Twenty Years of Government Initiatives in Cryptography"and the other by Mike Reiter from Bell Labs entitled \Password Hardening with Applications to VPN Security". The program committee for SAC'99 consisted of the following members: Carlisle Adams, Tom Cusick, Howard Heys, Lars Knudsen, Henk Meijer, Luke O'Connor, Doug Stinson, Stao rd Tavares, and Serge Vaudenay.
Diese kompakte Einführung setzt keine Programmierkenntnisse voraus und eignet sich daher besonders für Anfänger. Verständlich und mit ausführlichen Beispielen in den modernen Programmiersprachen Opal, ML, Haskell und Gofer beschreibt der Autor die Grundlagen und praktische Umsetzung der Programmierung. Im Vordergrund stehen dabei immer konzeptuelle Fragestellungen statt vollständiger Sprachbeschreibungen.
At some point in your career, you'll realize there's more to being a software engineer than dealing with code. Is it time to become a manager? Or join a startup? In this insightful and entertaining book, Michael Lopp recalls his own make-or-break moments with Silicon Valley giants such as Apple, Slack, Pinterest, Palantir, Netscape, and Symantec to help you make better, more mindful career decisions. With more than 40 stand-alone stories, Lopp walks through a complete job lifecycle, starting with the interview and ending with the realization that it might be time to move on. You'll learn how to handle baffling circumstances in your job, understand what you want from your career, and discover how to thrive in your workplace. Learn how to navigate areas of your job that don't involve writing code Identify how the aspects you enjoy will affect your next career steps Build and maintain key relationships and interactions within your community Make choices that will help you have a deliberate career Recognize what's important to your manager and work on things that matter |
You may like...
The Routledge Intermediate Dutch Reader
Eddy Verbaan, Christine Sas, …
Hardcover
R5,061
Discovery Miles 50 610
|