|
|
Books > Computing & IT > General
This book presents contextualised and detailed research on Artificial
Intelligence (AI) and the Global South. It examines the key challenges
of these emerging and least industrialised countries while proffering
holistic and comprehensive solutions. The book then explains how AI, as
part of these broad interventions, can drive Global South economies to
achieve inclusive development and shared prosperity. The book outlines
how countries can swiftly prepare to adopt and develop AI across all
sectors. It presents novel national, regional, and continental AI
adoption, development, and implementation frameworks.
Features:
- Broad non-AI interventions and prescriptions to address Global
South challenges
- A comprehensive but accessible introduction to AI concepts,
technology, infrastructure, systems, and innovations such as AlphaFold,
ChatGPT-4, and DeepSeek-R1
- An overview of AI-related technologies such as quantum computing,
battery energy storage systems, 3D printing, nanotechnology, IoT, and
blockchain
- How to prepare emerging economies to unlock the benefits of AI
while mitigating the risks
- Discussion of specific AI applications in 11 critical Global
South sectors
- Details of 11 sector case studies of AI adoption in the Global
South and Global North
- Ten country case studies: Sharing emergent AI experiences in the
Global South
- AI adoption framework: vision, strategy, policy, governance,
legislation/regulation, and implementation matrix
- A framework for democratising and decolonising AI
- The value proposition for AI research, development, and ownership
in the Global South
- A case for the participation of the Global South in the AI
semiconductor industry
This book is aimed at policymakers, business leaders, graduate
students, academics, researchers, strategic thinkers, and world leaders
seeking to understand and leverage the transformative role of AI-based
systems in achieving inclusive development, economic transformation,
and shared prosperity.
In the 21st century, intangible resources such as knowledge and
social capital have become as necessary to the modern economy as
coal, diamonds, and oil were to the past. This shift from
product-focused to service-focused economies necessitates a drastic
re-thinking of the ways in which we support the mission and
business of economic development on a global, regional, and
national scale. In order to effect and sustain a positive change,
innovation and knowledge networks need to be connected to every
aspect of life, from the private and domestic, to the corporate and
the global. This book integrates a wide variety of perspectives and
treatises on mutually adaptive and complementary processes of
knowledge generation, diffusion, and transfer within organizations
and industry, addressing both the "what" and "how to" questions of
knowledge management in a conceptual as well as an applied manner.
It should be of strong interest to science and technology policy
makers, research and development managers, business decision
makers, and students of innovation and knowledge dynamics alike.
Step-by-step guide to creating compelling, memorable presentations
A chart that once took ten hours to prepare can now be produced by anyone with ten minutes and a computer keyboard. What hasnt changed, however, are the basics behind creating a powerful visual - what to say, why to say it, and how to say it for the most impact. In Say It With Charts, Fourth Edition --the latest, cutting-edge edition of his best-selling presentation guide -- Gene Zelazny reveals time-tested tips for preparing effective presentations. Then, this presentation guru shows you how to combine those tips with todays hottest technologies for sharper, stronger visuals. Look to this comprehensive presentation encyclopedia for information on:
* How to prepare different types of charts -- pie, bar, column, line, or dot -- and when to use each
* Lettering size, color choice, appropriate chart types, and more
* Techniques for producing dramatic eVisuals using animation, scanned images, sound, video, and links to pertinent websites
This title presents the systematization and description of
accumulated knowledge on oceanic fronts of the Norwegian,
Greenland, Barents and Bering Seas. The main fronts of the
Norwegian, Greenland and Barents Seas are part of the climatic
North Polar Frontal Zone (NPFZ). The work is based on numerous
observational data, collected by the authors during special sea
experiments directed at the investigation of physical processes and
phenomena inside certain parts of the NPFZ and in the northern part
of the Bering Sea, on archive data of the USSR Hydrometeocenter and
other research institutions, as well as on a wide scientific
literature published in Russian and Western editions.
The book contains general information on the oceanic fronts of the
Subarctic Seas, brief history of their investigation, state of the
knowledge, as well as detailed description of the thermohaline
structure of all frontal zones in the Norwegian, Greenland, Barents
and Bering Seas and of neighboring fronts of Arctic and coastal
origin. Special attention is given to the study of the multifrontal
character of the NPFZ and of peculiarities of its internal
structure at different locations, to the description of diverse
oceanic features observed in the NPFZ, as well as to some
characteristics of the horizontal and vertical fine structure of
hydrophysical fields in the NPFZ. The main features of the northern
Bering Sea's summer ecohydrodynamics are investigated with the help
of three-dimensional direct and inverse models.
In Redefining Eternity: Interfacing Immortality in the Digital
Corporate World, Bethany Crawford critically assesses the
implications of “digital immortality†for central tenets of the
human experience - such as consciousness, death, and time - as a
preliminary mapping of the shifting existential paradigms of the
digital age. This groundbreaking new book explores the social
consequences and provocations of a digitally replicable subject in
the current sociopolitical context. It thereby confronts a timeless
philosophical question, imbued with ever greater urgency in our
digital age: What does it mean to be human? Redefining Eternity
establishes the motivations of digital and information technologies
in creating “immortalization†through social and modal
engagement with these new media. By analyzing various digital
services currently promoting immortality, both intentionally and
unintentionally, and engaging with texts by transhumanists and
technologists such as Ray Kurzweil, Martine Rothblatt, and Max
More, this endeavor allows for critical interpretation of the key
terminologies, processes, and intentions for an immortal digital
being. Crawford’s findings offer a dynamic foundation for
conceptual analysis of the ramifications of “living forever†as
a digital post-death self.
There are today no more compelling sets of crime and security
threats facing nations, communities, organizations, groups,
families and individuals than those encompassed by cybercrime. For
over fifty years crime enabled by computing and telecommunications
technologies have increasingly threatened societies as they have
become reliant on information systems for sustaining modernized
living. Cybercrime is not a new phenomenon, rather an evolving one
with respect to adoption of information technology (IT) for abusive
and criminal purposes. Further, by virtue of the myriad ways in
which IT is abused, it represents a technological shift in the
nature of crime rather than a new form of criminal behavior. In
other words, the nature of crime and its impacts on society are
changing to the extent computers and other forms of IT are used for
illicit purposes. Understanding the subject, then, is imperative to
combatting it and to addressing it at various levels.
This work is the first comprehensive encyclopedia to address
cybercrime. Topical articles address all key areas of concern and
specifically those having to with: terminology, definitions and
social constructs of crime; national infrastructure security
vulnerabilities and capabilities; types of attacks to computers and
information systems; computer abusers and cybercriminals;
criminological, sociological, psychological and technological
theoretical underpinnings of cybercrime; social and economic
impacts of crime enabled with information technology (IT) inclusive
of harms experienced by victims of cybercrimes and computer abuse;
emerging and controversial issues such as online pornography, the
computer hacking subculture and potential negative effects of
electronic gaming and so-called computer addiction; bodies and
specific examples of U.S. federal laws and regulations that help to
prevent cybercrimes; examples and perspectives of law enforcement,
regulatory and professional member associations concerned about
cybercrime and its impacts; and computer forensics as well as
general investigation/prosecution of high tech crimes and attendant
challenges within the United States and internationally.
The complex world of online piracy and peer-to-peer file sharing is
skillfully condensed into an easy-to-understand guide that provides
insight into the criminal justice approach to illegal file sharing,
while offering guidance to parents and students who have concerns
about potential legal action in response to file-sharing
activities. While the actual impact of digital piracy is nearly
impossible to precisely calculate, the threat of financial damage
from illegal peer-to-peer (P2P) file sharing to the world's
highest-grossing entertainment firms (and even entire industries!)
has garnered attention from government, industry, and academic
leaders and criminal justice professionals. Oftentimes, those
providing access to computers and file sharing
capabilities-parents, schools, libraries-don't know about or
understand these activities and, therefore, put themselves and
their families at risk for criminal and civil prosecution. This
work describes the technological, legal, social, and ethical facets
of illegal peer-to-peer file sharing. Geared toward parents,
teachers, librarians, students, and any other computer user engaged
in file sharing, this book will help readers to understand all
forms of traditional and digital copyright violations of protected
music, movies, and software. To date over 18,000 P2P users have
been sued by the Recording Industry Association of America (RIAA).
Most of these users have been college students and parents of
high-school students. While word of these law suits are spreading,
and many parents fear that their children may be using a family
computer to illegally download and share copyrighted works, few
supervising adults have the technical knowledge needed to determine
whether and to what extent pirating may be occurring via a computer
and Internet connection they are legally responsible for.
Additionally, while P2P networks are filled with millions of users
with billions of copyrighted files, few users understand the ways
in which they are illegally using computers and other mobile
electronic devices to download protected content. While describing
both technical and social issues, this book primarily focuses on
the social aspects of illegal file sharing, and provides technical
concepts at a general level. Fisk skillfully condenses the complex
nature of file sharing systems into an easy-to-understand guide,
provides insight into the criminal justice approach to illegal file
sharing, and offers guidance to parents and students who have
concerns about potential legal action in response to file sharing
activities.
On-line analytical processing (OLAP) is clearly a new approach
to information system technology--offering a much-needed way to
make informed decisions better and faster. One of its most
important characteristics is multidimensional analysis--analysis
that goes beyond the conventional two-dimensional analysis and
provides users with rapid retrieval of data from organizational
databases, data warehouses, or both. Not only that, but most
importantly, says Dr. Thierauf, it allows users to look at
different dimensions of the same data, thus enabling them to do
analyses across departmental and even corporate boundaries. How it
works and OLAP's many benefits to aid users in the public and
private sectors is spelled out here, comprehensively yet concisely,
and with the author's customary well-developed examples and clear
prose. His book will be important reading for people at all levels
of management and in all types of organizations.
Another way of viewing OLAP is getting a typical company out of
the custom-report-writing business and into the data-cube-server
building business. An OLAP data structure can be thought of as a
Rubik's Cube of data that users can twist and twirl in different
ways to work through what-if and what-happened scenerios to get at
the "whys" of the situation. Within an OLAP environment, the focus
is on performing dictionary definition and maintenance as well as
mapping flat files or relational columns to dimensions and
measures. Although this may sound like a lot of work, managing one
data cube is more efficient than writing a number of custom
reports. Currently, some vendors provide administrative tools to
get the data into the cubes in the first place, in the proper form,
and on a regular basis. Hence, the job of managing data has been
simplified for users.
|
You may like...
Five Sermons
Joseph Butler
Hardcover
R448
Discovery Miles 4 480
|