![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General
In today's knowledge-driven economy, the ability to share insight and know-how is essential for driving innovation and growth. In this groundbreaking volume, scholars from around the world demonstrate how communication and information technologies are enabling dynamic project design and management practices that challenge traditional concepts of time, space and behavior. Showcasing experiments in architecture, engineering, and construction design--employing technological infrastructures that link people and their ideas across physical, intellectual, and cultural boundaries--the authors consider such issues as the links between "competence" and "innovation" and between individual and collective knowledge. At the heart of their analysis is the realization that technological innovation is chiefly a social activity. The implications are profound for the practical management of complex design projects, experiments in distance learning and virtual teams, and emerging theoretical concepts of collaborative learning and innovation.
This volume presents an overview of computer forensics perfect for beginners. A distinguished group of specialist authors have crafted chapters rich with detail yet accessible for readers who are not experts in the field. Tying together topics as diverse as applicable laws on search and seizure, investigating cybercrime, and preparation for courtroom testimony, Handbook of Digital and Multimedia Evidence is an ideal overall reference for this multi-faceted discipline.
This book shows designers how to ensure signal integrity and control noise in high-speed digital systems - particularly important in a Pentium-paced environment where functional logic design is no longer separable from electrical and mechanical design. Highlighting TTL, CMOS, and BiCMOS logic applications in a single source, Signal and Power Integrity in Digital Systems provides a practical solutions-oriented approach to a wide variety of relevant interconnection and timing issues. Special features include noise tolerant logic architectures; power distribution techniques that reduce noise; clock distribution techniques that ensure clock signal quality; signal interconnection techniques that reduce crosstalk, signal loading, and transmission-line effects; how to get optimum performance from high-speed memory devices; and system application tips for high-speed PALs, PLAs, FIFOs, and ASICs. Designers will also appreciate the practical engineering approximations provided for the calculation of design parameters along with illustrations and numerous tables usable for quick reference and comparison of characteristics. It's a book every digital designer should have - engineers involved in the design of computers, peripherals, signal processors, and control and communications equipment, as well as young engineers facing their first designs using high-speed logic devices.
This book focuses on the adoption of new technologies led by information and communication technologies by SMEs in developing countries. It identifies several factors that augment competitiveness of firms in the era of globalization. Contrary to the general belief, these factors are not uniform across developing world. Based on the empirical evidence from firms located in Malaysia, India, Nigeria, Jamaica, and Costa Rica, the study concludes that firms cannot remain competitive without institutional support. Since firms operate in different institutional and economic environment, form of support varies from one country to another.
In the arena of Parasitic-Aware Design of CMOS RF Circuits, efforts are aimed at the realization of true single-chip radios with few, if any, off-chip components. Ironically, the on-chip passive components required for RF integration pose miore serious challenges to SOC integration than the active CMOS and BJT devices. This is not surprising since modern digital IC designs are dominated as much, or more, by interconnectg characteristics than by active device properties. In any event, the co-integration of active and passive devices in RFIC design represents a serious design problem and an even more daunting manufacturing challenge. If conventional mixed-signal design techniques are employed, parasitics associated with passive elements (resistors, capacitors, inductors, transformers, pads, etc.) and the package effectively de-tune RF circuits rendering them sub-optimal or virtually useless. Hence, dealing with parasitics in an effective way as part of the design process is an essential emerging methodology in modern SOC design. The parasitic-aware RF circuit synthesis techinques described in this book effectively address this critical problem.
This volume considers the theme of the protection of the user in the field of information technology, and more specifically in relation to software licences, electronic information services and Internet access services. Litigation in IT usually stems from the users' feeling that their expectations have been frustrated at performance. When dealing with such cases, the courts seem to increasingly take the objective of user protection into account. How is this protection implemented? Is this trend generally desirable? Is this judicial protection excessive? What are the constraints met by IT providers that should be taken into account in litigation? How can the user's position be improved? "User Protection in IT Contracts" extensively presents the reasons why, and the ways in which national courts may decide a case in favour of the user. Many practical issues are considered in this respect. Which factors appear relevant to deal with liability claims in IT? Are exemption clauses always enforceable? What are the implications of information duties for IT providers? How can general conditions be safely incorporated to a contract? What is the validity of shrinkwrap licences? Is it safe to rely on an entire-agreement clause? This book exhaustively reviews these issues in English, Dutch and French law.
Due to the rise of digital crime and the pressing need for methods of combating these forms of criminal activities, there is an increasing awareness of the importance of digital forensics and investigation. The Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions addresses a broad range of electronic devices and software for crime prevention and investigation. This defining body of research covers a wide spectrum of topics useful to a broad cross-sectional and multi-disciplinary readership ranging from academic and professional research communities to industry consultants and practitioners.
This book describes the current state of the art in big-data analytics, from a technology and hardware architecture perspective. The presentation is designed to be accessible to a broad audience, with general knowledge of hardware design and some interest in big-data analytics. Coverage includes emerging technology and devices for data-analytics, circuit design for data-analytics, and architecture and algorithms to support data-analytics. Readers will benefit from the realistic context used by the authors, which demonstrates what works, what doesn’t work, and what are the fundamental problems, solutions, upcoming challenges and opportunities. Provides a single-source reference to hardware architectures for big-data analytics; Covers various levels of big-data analytics hardware design abstraction and flow, from device, to circuits and systems; Demonstrates how non-volatile memory (NVM) based hardware platforms can be a viable solution to existing challenges in hardware architecture for big-data analytics.
This comprehensive overview of the history of computing and its industry, and of commercial applications of the computer also outlines the history of how computing operations were managed within American companies. Based on extensive research in the contemporary business literature, this work is one of the few which looks at computing as business history, and it is the first to look at the broad scope of computing from the perspective of the business historian. The work is also directed at business managers to help them appreciate and understand the uses of the computer in their firms.
A 2021 ‘BOOK TO LOOK OUT FOR’ – THE INDEPENDENT ‘A mouthpiece for our anxieties and a tonic for our hearts.’ Charly Cox ‘Funny and honest.’ Pandora Sykes ‘Offers readers of all stripes and ages a great overview of relationships in the digital era’. Matt Haig In Millennial Love journalist Olivia Petter explores the questions, quirks and anxieties that consume the contemporary dating landscape. Olivia scrutinises the myths surrounding modern romance and asks why, despite having endless technology designed to aid communication, it’s harder to meet someone now than ever before. The book is based on the Independent’s chart-topping podcast of the same name and expands on some of the issues discussed on the show, including why contraception is a feminist issue, how dating apps have altered our understanding of attraction, and how 'Love Island' became the unlikely lens through which the consequences of so many of these things were exposed. Other topics covered include read receipt anxiety, why we need to rethink our relationship with porn, and the significance of ‘sliding into someone’s DMs’. By combining memoir with social commentary and insights from former podcast guests, including Munroe Bergdorf, Elizabeth Day and Lisa Taddeo, Millennial Love is an essential handbook on what it means to love today.
Library research has changed dramatically since Marilyn Lutzker and Eleanor Ferrall's Criminal Justice Research in Libraries was published in 1986. In addition to covering the enduring elements of traditional research, this new edition provides full coverage of research using the World Wide Web, hypertext documents, computer indexes, and other online resources. It gives an in-depth explanation of such concepts as databases, networks, and full text, and the Internet gets a full chapter. The chapters on bibliographic searching, the library catalog, and comparative research are almost totally new, and chapters on indexes and abstracts, newsletters, newspapers and news broadcasts, documents, reports and conference proceedings, and statistics reflect the shift to computerized sources. The chapter on legal resources discusses the wealth of legal information available on the Internet. A new chapter on library research in forensic science corrects an omission from the first book. With the growth of computerized indexes and the Internet, more and more researchers are admitting that they feel inadequate to the new tools. Librarians themselves are struggling to keep abreast of the new technology. This book will help students, practitioners, scholars, and librarians develop a sense of competency in doing criminal justice research.
The lack of adequate and timely IT involvement in the merger and
acquisition process costs companies millions of dollars every year.
Current research shows that IT accounts for 20-30% of the
post-acquisition benefits in a merger or acquisition, and it is
growing. With M&A activity back on an upwards trend, the need
to get IT right has never being greater.
Information technology will be the most pervasive and important influence on individuals and organizations in the next 10 years. Impression management is a growing field of study in the management and organizational sciences, which studies the self-presentational approach of individuals and the organizations. This collection of papers is both exploratory and innovative, examining new ways for the corporation to effect its strategy, its organizational design and its development as they are stimulated by the introduction and evolution of information technology. Understanding impression management theory as it moves further into the mainstream of research and practice is critical to corporate strategists, academics, and students.
Good and Schultz demonstrate how the careful identification and management of technologies provide significant advantages that for many managers and firms far outweigh the disadvantages imposed through the invention of these technologies. As part of this exploration, the strategic, organizational, and managerial impacts of technology are explored in a variety of venues. The book discusses such topics as the roots and directions of technology, how technology will change organizational teamwork, its influence on internal and external (e.g., supplier and customer) relationships, opportunities provided technological entrepreneurs, and the influence of technology on marketing, employees, customer partnerships, information systems, and resource strategies. To demonstrate the practical application and to bring in real-life scenarios, a host of business applications are introduced. As a result, this book provides managers a strategic roadmap to using technology for a competitive advantage, while remaining free from the entanglement of specific technologies.
This book offers an original and informative view of the development of fundamental concepts of computability theory. The treatment is put into historical context, emphasizing the motivation for ideas as well as their logical and formal development. In Part I the author introduces computability theory, with chapters on the foundational crisis of mathematics in the early twentieth century, and formalism. In Part II he explains classical computability theory, with chapters on the quest for formalization, the Turing Machine, and early successes such as defining incomputable problems, c.e. (computably enumerable) sets, and developing methods for proving incomputability. In Part III he explains relative computability, with chapters on computation with external help, degrees of unsolvability, the Turing hierarchy of unsolvability, the class of degrees of unsolvability, c.e. degrees and the priority method, and the arithmetical hierarchy. Finally, in the new Part IV the author revisits the computability (Church-Turing) thesis in greater detail. He offers a systematic and detailed account of its origins, evolution, and meaning, he describes more powerful, modern versions of the thesis, and he discusses recent speculative proposals for new computing paradigms such as hypercomputing. This is a gentle introduction from the origins of computability theory up to current research, and it will be of value as a textbook and guide for advanced undergraduate and graduate students and researchers in the domains of computability theory and theoretical computer science. This new edition is completely revised, with almost one hundred pages of new material. In particular the author applied more up-to-date, more consistent terminology, and he addressed some notational redundancies and minor errors. He developed a glossary relating to computability theory, expanded the bibliographic references with new entries, and added the new part described above and other new sections. |
![]() ![]() You may like...
A Synthesis of Qualitative Studies of…
Rebecca Day Babcock, Kellye Manning, …
Hardcover
R3,173
Discovery Miles 31 730
The Unresolved National Question - Left…
Edward Webster, Karin Pampallis
Paperback
![]()
Polling Students for School Improvement…
Paris S. Strom, Robert D. Strom
Hardcover
R3,044
Discovery Miles 30 440
Microbial Decontamination in the Food…
Ali Demirci, Michael O. Ngadi
Hardcover
R6,076
Discovery Miles 60 760
Chemistry of Food, Food Production, and…
Mark a. Benvenuto, Satinder Ahuja, …
Hardcover
R5,799
Discovery Miles 57 990
Pearson Edexcel A level Mathematics Pure…
Greg Attwood, Jack Barraclough, …
Paperback
![]() R1,005 Discovery Miles 10 050
Multi-Dimensional Liquid Chromatography…
Dwight R. Stoll, Peter W. Carr
Hardcover
R5,821
Discovery Miles 58 210
|