![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
* A useful summary of the findings of a project researching the use of information communication technologies (ICTs) for development* Includes a functional best practice framework--who should do what, and when--and suggestions for further research* Features a review of the literature and illustrates lessons learned through the example of a case study of a project in PeruThis paper summarizes the findings from a research project conducted by ITDG and Cranfield School of Management (Bedford, U.K.) into using ICTs (like the Internet or mobile telephony) to share information with people at grassroots level "connecting the first mile."Across the world, development agencies are piloting projects to use ICTs to provide people with improved access to up-to-date information, equip them with new skills, or connect them to an international market. Evidence suggests that many of these projects are not succeeding. "Connecting the First Mile" outlines the challenges involved in sharing information with people who have little experience with ICTs, low levels of literacy, little time or money, and very specific knowledge and language requirements. It provides a best practice framework that embraces many applications of ICT (eg for agriculture, e-governance etc.) and many technologies, and it includes suggestions for further research.Of interest to Development, and ICT for Development: practitioners, students, academics, and donor organizations.
In today's knowledge-driven economy, the ability to share insight and know-how is essential for driving innovation and growth. In this groundbreaking volume, scholars from around the world demonstrate how communication and information technologies are enabling dynamic project design and management practices that challenge traditional concepts of time, space and behavior. Showcasing experiments in architecture, engineering, and construction design--employing technological infrastructures that link people and their ideas across physical, intellectual, and cultural boundaries--the authors consider such issues as the links between "competence" and "innovation" and between individual and collective knowledge. At the heart of their analysis is the realization that technological innovation is chiefly a social activity. The implications are profound for the practical management of complex design projects, experiments in distance learning and virtual teams, and emerging theoretical concepts of collaborative learning and innovation.
The concept of the user is not a well-established sociological concept even though the
This book focuses on the adoption of new technologies led by information and communication technologies by SMEs in developing countries. It identifies several factors that augment competitiveness of firms in the era of globalization. Contrary to the general belief, these factors are not uniform across developing world. Based on the empirical evidence from firms located in Malaysia, India, Nigeria, Jamaica, and Costa Rica, the study concludes that firms cannot remain competitive without institutional support. Since firms operate in different institutional and economic environment, form of support varies from one country to another.
In the arena of Parasitic-Aware Design of CMOS RF Circuits, efforts are aimed at the realization of true single-chip radios with few, if any, off-chip components. Ironically, the on-chip passive components required for RF integration pose miore serious challenges to SOC integration than the active CMOS and BJT devices. This is not surprising since modern digital IC designs are dominated as much, or more, by interconnectg characteristics than by active device properties. In any event, the co-integration of active and passive devices in RFIC design represents a serious design problem and an even more daunting manufacturing challenge. If conventional mixed-signal design techniques are employed, parasitics associated with passive elements (resistors, capacitors, inductors, transformers, pads, etc.) and the package effectively de-tune RF circuits rendering them sub-optimal or virtually useless. Hence, dealing with parasitics in an effective way as part of the design process is an essential emerging methodology in modern SOC design. The parasitic-aware RF circuit synthesis techinques described in this book effectively address this critical problem.
This volume presents an overview of computer forensics perfect for beginners. A distinguished group of specialist authors have crafted chapters rich with detail yet accessible for readers who are not experts in the field. Tying together topics as diverse as applicable laws on search and seizure, investigating cybercrime, and preparation for courtroom testimony, Handbook of Digital and Multimedia Evidence is an ideal overall reference for this multi-faceted discipline.
This volume considers the theme of the protection of the user in the field of information technology, and more specifically in relation to software licences, electronic information services and Internet access services. Litigation in IT usually stems from the users' feeling that their expectations have been frustrated at performance. When dealing with such cases, the courts seem to increasingly take the objective of user protection into account. How is this protection implemented? Is this trend generally desirable? Is this judicial protection excessive? What are the constraints met by IT providers that should be taken into account in litigation? How can the user's position be improved? "User Protection in IT Contracts" extensively presents the reasons why, and the ways in which national courts may decide a case in favour of the user. Many practical issues are considered in this respect. Which factors appear relevant to deal with liability claims in IT? Are exemption clauses always enforceable? What are the implications of information duties for IT providers? How can general conditions be safely incorporated to a contract? What is the validity of shrinkwrap licences? Is it safe to rely on an entire-agreement clause? This book exhaustively reviews these issues in English, Dutch and French law.
This book describes the current state of the art in big-data analytics, from a technology and hardware architecture perspective. The presentation is designed to be accessible to a broad audience, with general knowledge of hardware design and some interest in big-data analytics. Coverage includes emerging technology and devices for data-analytics, circuit design for data-analytics, and architecture and algorithms to support data-analytics. Readers will benefit from the realistic context used by the authors, which demonstrates what works, what doesn’t work, and what are the fundamental problems, solutions, upcoming challenges and opportunities. Provides a single-source reference to hardware architectures for big-data analytics; Covers various levels of big-data analytics hardware design abstraction and flow, from device, to circuits and systems; Demonstrates how non-volatile memory (NVM) based hardware platforms can be a viable solution to existing challenges in hardware architecture for big-data analytics.
Due to the rise of digital crime and the pressing need for methods of combating these forms of criminal activities, there is an increasing awareness of the importance of digital forensics and investigation. The Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions addresses a broad range of electronic devices and software for crime prevention and investigation. This defining body of research covers a wide spectrum of topics useful to a broad cross-sectional and multi-disciplinary readership ranging from academic and professional research communities to industry consultants and practitioners.
This comprehensive overview of the history of computing and its industry, and of commercial applications of the computer also outlines the history of how computing operations were managed within American companies. Based on extensive research in the contemporary business literature, this work is one of the few which looks at computing as business history, and it is the first to look at the broad scope of computing from the perspective of the business historian. The work is also directed at business managers to help them appreciate and understand the uses of the computer in their firms.
The lack of adequate and timely IT involvement in the merger and
acquisition process costs companies millions of dollars every year.
Current research shows that IT accounts for 20-30% of the
post-acquisition benefits in a merger or acquisition, and it is
growing. With M&A activity back on an upwards trend, the need
to get IT right has never being greater.
Back of book copy: For professionals: For consumers: All purpose:
Information technology will be the most pervasive and important influence on individuals and organizations in the next 10 years. Impression management is a growing field of study in the management and organizational sciences, which studies the self-presentational approach of individuals and the organizations. This collection of papers is both exploratory and innovative, examining new ways for the corporation to effect its strategy, its organizational design and its development as they are stimulated by the introduction and evolution of information technology. Understanding impression management theory as it moves further into the mainstream of research and practice is critical to corporate strategists, academics, and students.
|
You may like...
The Garbage Collection Handbook - The…
Richard Jones, Antony Hosking, …
Hardcover
R1,868
Discovery Miles 18 680
Diagnostic Biomedical Signal and Image…
Kemal Polat, Saban Ozturk
Paperback
R2,952
Discovery Miles 29 520
Evolutionary Multi-Agent Systems - From…
Aleksander Byrski, Marek Kisiel-Dorohinicki
Hardcover
R4,287
Discovery Miles 42 870
Quality Analysis of Additively…
Javad Kadkhodapour, Siegfried Schmauder, …
Paperback
R4,703
Discovery Miles 47 030
|