|
|
Books > Computing & IT > General
The chapters in this book have evolved from talks originally
presented at The First International Workshop on Human and Machine
Cognition. Although the workshop took place in1989, the papers that
appear here are more recent, completed some time after the
workshop. They reflect both the spontaneous exchanges in that
halcyon setting and the extensive review process.
Intended as an introduction to the law for electronic data
processing managers, this book provides a comprehensive overview of
legal issues and concerns of particular relevance to those
responsible for running computer operations. The author shows the
reader how to identify potential areas of liability, how to take
steps to prevent a potential liability from becoming an actual
liability, and how to communicate more effectively with legal
counsel when it is required. As Gemignani demonstrates, managers of
computer operations must be especially alert to areas of legal
vulnerability because computers have raised novel,
precedent-setting legal issues that the courts have only recently
begun to address. His guide, written for professionals with little
background in the law, will enable EDP managers to recognize their
rights in particular situations and deal more successfully with
legal problems when they arise.
The book begins with an introduction to the law, courts, and the
trial process. This first chapter also includes a brief survey of
legal research tools that will enable the reader to find the latest
word on a question in this rapidly evolving field. Gemignani moves
to a discussion of contract law, addressing issues such as the
Uniform Commercial Code, warranties, breach of contract, and
remedies available in case of breach, rejection and acceptance of
contracted-for products, and licenses and leases. Subsequent
chapters examine copyright law, laws related to patents and trade
secrets, computer crime and piracy, torts, and evidentiary
considerations managers should be aware of in designing and
operating computer centers. Each chapter contains a list of
selected readings, and an extensive glossary of legal terms is
provided for ready reference. A contract checklist, forms and
instructions for obtaining a copyright, and a sample U.S. Supreme
Court slip opinion on a topic in computer law complete this
invaluable guide.
Mobile and Wireless Network Security and Privacy analyzes important
security and privacy problems in the realms of wireless networks
and mobile computing. The material includes a report to the
National Science Foundation of the United States which will be used
by program managers for the foundation in setting priorities for
research directions in this area. In the following chapters field
experts expand upon the report and provide further information
about important research directions in the fields of wireless
networks and mobile computing. The chapters are written by the
leading international researchers and professionals in thes fields.
Each chapter represents state-of-the-art research and includes
several influential contributions. A multitude of valuable
discussions on relevant concepts, such as the various approaches
that define emerging security and privacy in mobile and wireless
environment, are featured. The book is useful to researchers
working in the fields of mobile and wireless security and privacy
and to graduate students seeking new areas to perform research. It
also provides information for academics and industry people
researching recent trends and developments in the mobile and
wireless security fields.
The generative AI revolution has come to education. Salman Khan, the
visionary behind Khan Academy with more than 150 million users,
explores how artificial intelligence and GPT technology is already
beginning to transform learning, offering a future roadmap for
teachers, parents, and students to navigate this exciting (and
sometimes intimidating) new world.
The leading pioneer in the world of education technology, Khan explains
the ins and outs of these cutting-edge tools and how they will forever
change the way we learn and teach. How learning can be transformed for
good. Rather than approaching the ChatGPT revolution with
white-knuckled fear, Khan wants parents and teachers to embrace AI and
adapt to it (while acknowledging its imperfections and limitations). He
emphasizes that embracing AI in education is not about replacing human
interaction but enhancing it, so that every student can complement the
work they're already doing in profoundly new and creative ways, to
personalize learning, adapt assessments, and support success in the
classroom, preparing students for an increasingly digital future.
But Brave New Words is not just about technology – it’s about what this
technology means for our society, and the practical implications for
administrators, guidance counsellors, and hiring managers who can
harness the power of AI in education and the workplace. Khan also
delves into the ethical and social implications of generative AI,
offering thoughtful insights into how we can use these tools to build a
more accessible education system for students around the world.
The Revolution in Military Affairs (RMA), unleashed by the
integration of information technologies into weapons systems,
military units, and operations is a phenomenon whose impacts have
been felt well beyond the Gulf in 1991 or the Balkans in 1999.
Technological developments lie at the center of these changes;
however, the RMA is about more than technology. It includes the
consequences of technological changes for defense and security.
This study provides an assessment of the RMA that goes beyond a
mere description of new defense-related technologies to deal with
deeper, more fundamental issues.
Through the contributions of American, Canadian, Chinese, and
French experts, this book surveys the RMA from various perspectives
and evaluates it from the standpoints of military history and
military science. The authors conclude that, while the RMA
represents a significant challenge for defense establishments, it
may fall short of being truly revolutionary. Whether one looks at
power projection or information warfare, it appears that emerging
technologies will translate into significant improvements in
capabilities, but not necessarily a revolution in warfare. From a
comparative perspective, the United States remains well ahead in
thinking of and implementing changes that stem from the RMA,
although other nations may make selective use of the RMA to promote
regional security goals.
Several aspects of informatics curricula and teaching methods at
the university level are reported in this volume, including:
*Challenges in defining an international curriculum;
*The diversity in informatics curricula;
*Computing programs for scientists and engineers;
*Patterns of curriculum design;
*Student interaction;
*Teaching of programming;
*Peer review in education.
This book contains a selection of the papers presented at the
Working Conference on Informatics Curricula, Teaching Methods and
Best Practice (ICTEM 2002), which was sponsored by the
International Federation for Information Processing (IFIP) Working
Group 3.2, and held in Florian polis, Brazil in July 2002.
The working groups were organized in three parallel tracks.
Working Group 1 discussed the "Directions and Challenges in
Informatics Education." The focus of Working Group 2 was "Teaching
Programming and Problem Solving." Working Group 3 discussed
"Computing: The Shape of an Evolving Discipline." Each working
group worked actively and prepared a report with the results of the
discussions; these reports are included as the second part of this
book.
It has been upon the shoulders of giants that the modern world has
been forged. This accessible compendium presents an insight into
the great minds responsible for the technology which has
transformed our lives. Each pioneer is introduced with a brief
biography, followed by a concise account of their key contributions
to their discipline. The selection covers a broad spread of
historical and contemporary figures from theoreticians to
entrepreneurs, highlighting the richness of the field of computing.
Suitable for the general reader, this concise and easy-to-read
reference will be of interest to anyone curious about the inspiring
men and women who have shaped the field of computer science.
Research and development on optical wavelength-division
multiplexing (WDM) networks have matured considerably. While optics
and electronics should be used appropriately for transmission and
switching hardware, note that "intelligence'' in any network comes
from "software, '' for network control, management, signaling,
traffic engineering, network planning, etc.The role of software in
creating powerful network architectures for optical WDM networks is
emphasized.
Optical WDM Networks is a textbook for graduate level courses.
Its focus is on the networking aspects of optical networking, but
it also includes coverage of physical layers in optical networks.
The author introduces WDM and its enabling technologies and
discusses WDM local, access, metro, and long-haul network
architectures. Each chapter is self-contained, has problems at the
end of each chapter, and the material is organized for self study
as well as classroom use. The material is the most recent and
timely in capturing the state-of-the-art in the fast-moving field
of optical WDM networking.
|
|