|
Books > Computing & IT > General
The calculus of IT support for the banking, securities, and insurance industries has changed dramatically and rapidly over the past few years. Consolidation and deregulation are creating opportunities and challenges never before seen. Unheard of just a few years ago, e-commerce has given birth to new infrastructures and departments needed to support them. And the Internet/Intranet/Extranet triple-whammy is the most critical component of most financial IT shops. At the same time, new intelligent agents stand ready to take on such diverse functions as customer profiling and data mining. Get a handle on all these new and newer ripples with Financial Services Information Systems. Here, in this exhaustive new guide and reference book, industry guru Jessica Keyes gives you the no-nonsense scoop on not just the tried and true IT tools of today, but also the up-and-coming "hot" technologies of tomorrow, and how to plan for them. Financial Services Information Systems addresses challenges and solutions associated with: o supporting the self-service revolution by servicing kiosks and ATMs efficiently and economically, o straight-through processing for the securities industry, o outsourcing business communications in the insurance industry, o distributed integration as a cost-effective alternative to data warehousing, and o putting inbound fax automation to work in financial organizations.
On Time Technology Implementation presents technology
implementation guidelines and lessons learned from over 30 years of
successful, hands-on project experience.
This book contains selected papers from International Symposium for
Production Research 2022, held on October 6-9, 2022, Turkey. The
book reports recent advances in production engineering and
operations. It explores topics including: production research;
production management; operations management; industry 4.0;
industrial engineering; mechanical engineering; engineering
management; and operational research. Presenting real-life
applications, case studies, and mathematical models, this book is
of interest to researchers, academics, and practitioners in the
field of production and operation engineering. It provides both the
results of recent research and practical solutions to real-world
problems.
This handbook focuses on new threats to psychological security that
are posed by the malicious use of AI and how it can be used to
counteract such threats. Studies on the malicious use of AI through
deepfakes, agenda setting, sentiment analysis and affective
computing and so forth, provide a visual representation of the
various forms and methods of malicious influence on the human
psyche, and through this on the political, economic, cultural
processes, the activities of state and non-state institutions.
Separate chapters examine the malicious use of AI in geopolitical
confrontation, political campaigns, strategic deception, damage to
corporate reputation, and activities of extremist and terrorist
organizations. This is a unique volume that brings together a
multidisciplinary range of established scholars and upcoming new
researchers from 11 countries. This handbook is an invaluable
resource for students, researchers, and professionals interested in
this new and developing field of social practice and knowledge.
The growth in popularity and complexity of video games has spurred
new interest in how games are developed and in the research and
technology behind them. David Heineman brings together some of the
most iconic, influential, and interesting voices from across the
gaming industry and asks them to weigh in on the past, present, and
future of video games. Among them are legendary game designers
Nolan Bushnell (Pong) and Eugene Jarvis (Defender), who talk about
their history of innovations from the earliest days of the video
game industry through to the present; contemporary trailblazers
Kellee Santiago (Journey) and Casey Hudson (Mass Effect), who
discuss contemporary relationships between those who create games
and those who play them; and scholars Ian Bogost (How to Do Things
With Videogames) and Edward Castronova (Exodus to the Virtual
World), who discuss how to research and write about games in ways
that engage a range of audiences. These experts and others offer
fascinating perspectives on video games, game studies, gaming
culture, and the game industry more broadly.
Why has the digital revolution been damaging for so many women? And
what can be done about it? The Threat explores today's digital
capitalism through the prism of the women who are harmed by it
globally. Some of them are victimised through digital devices.
Others are exploited while producing them. And some don't even have
access to the Internet, but are brutally raped in wars funded by
the minerals that make our tablets work. With the help of
individuals' stories and interviews, activist and academic Dr Lilia
Giugni explores how millions of women across the world are
violated, exploited and marginalised due to processes of
technological change. She unpacks the tight intersections between
technology, patriarchy and capitalism - exposing the profit-driven
market in which our digital devices are designed and built, and the
patriarchal society that shapes who gets to use them and how. Above
all, Lilia Giugni gives us very practical ideas to help us take
back the tech: turning technology into a truly emancipatory force
and a leverage to create a better and more just future for women
and for all. 'A brilliant and engaging expose of how the forces of
capitalism and patriarchy penetrate our digital world - and what
women can do to fight back.' Hannah Jewell, author of 100 Nasty
Women of History
We used to have this saying: "If it ain't broken, don't fix it." It was a powerful piece of wisdom. But then, the re-engineering fashion emerged and that changed everything.This book describes the behavior of the "creature" enterprise as it evolves in an increasingly complex universe. What is this elusive creature really like? Are we able to thoroughly understand its survival and reproduction mechanisms?The book offers a rather merciless analysis of the way things really work. It does so from a human perspective, as we, the people, are at the same time the perpetrators and the victims in the corporate game. The objective is not to indoctrinate or even convince, but to stimulate thought: Let's try to understand things, and then find ways to improve them, without breaking more than we already have.
Innovation and IT are intertwined. In order to understand how, this
book takes an interdisciplinary view of innovation in an
international and digital world. It addresses strategic and
operational aspects of R and D and new product development,
emphasizing knowledge management, configurational design, distance
and diversity.
With the political and social changes taking place in Eastern
Europe combined with the changes in Western European markets and
Japanese global marketing strategies, American corporations now can
utilize information technology as the ultimate weapon in
reshaping/expanding their global marketing strategies. Today,
global information technology is not just a set of tools for
computing, but rather is viewed as a strategic tool to bring
organizations growth and prosperity. The Global Issues of
Information Technology Management is the right source for
discovering untapped potential of your information technology. It
is a global tool for the growth and prosperity of your
organization.
The rich, multi-faceted and multi-disciplinary field of
matching-based market design is an active and important one due to
its highly successful applications with economic and sociological
impact. Its home is economics, but with intimate connections to
algorithm design and operations research. With chapters contributed
by over fifty top researchers from all three disciplines, this
volume is unique in its breadth and depth, while still being a
cohesive and unified picture of the field, suitable for the
uninitiated as well as the expert. It explains the dominant ideas
from computer science and economics underlying the most important
results on market design and introduces the main algorithmic
questions and combinatorial structures. Methodologies and
applications from both the pre-Internet and post-Internet eras are
covered in detail. Key chapters discuss the basic notions of
efficiency, fairness and incentives, and the way market design
seeks solutions guided by normative criteria borrowed from social
choice theory.
Level-up your HTML and CSS web development skills with this
dynamic, visual guide Teach Yourself VISUALLY HTML and CSS is the
perfect resource for those of you who prefer to learn visually and
would rather be shown how to do something – with crystal-clear
screenshots and easy explanations – than suffer through
long-winded explanations. You’ll find step-by-step walkthroughs
showing you how to tackle over 120 individual tasks involving HTML
and CSS. Each task-based spread covers a single technique, ensuring
you learn first the basics and then more advanced topics one
straightforward piece at a time. You'll learn to write HTML code in
a text editor or an integrated development environment, add and
format text, prepare images for the web, insert links to other
pages, control layout with style sheets, add JavaScript to a web
page, and more. You’ll also discover how to: Create websites that
look great in 2023 and beyond with classic HTML and skills and the
most modern tips and tricks for contemporary web coding Optimize
your websites for performance and speed, ensuring every visitor
gets the best possible experience Add modern elements to your code,
including , , , and , and make your code accessible to as many
people as possible Teach Yourself VISUALLY HTML and CSS is your
personal roadmap to understanding how to get the most out of HTML
and CSS to create, format, and troubleshoot websites of all kinds.
This book will get you to the next level of web development,
quickly and easily.
The book is presents the papers presented at the 4th International
Conference on Telecommunications and Communication Engineering
(ICTCE 2020) held on 4 -6 December, in Singapore. It covers
advanced research topics in the field of computer communication and
networking organized into the topics of emerging technologies of
wireless communication and networks, 5G wireless communication and
networks, information and network security, internet of things and
fog computing. These advanced research topics are taking the lead
and representing the trend of the recent academic research in the
field of computer communication and networking. It is expected that
the collection and publication of the research papers with the
advanced topics listed in this book will further promote high
standard academic research in the field and make a significant
contribution to the development of economics and human society.
This book examines how World War Two is simulated through serious
computer games, such as first-person shooters, flight and tank
simulators, and grand strategy games. It argues that a particular
dynamic emerges in these ‘simgames’, especially when curious
players begin to look beyond gameplay for how to understand the
past. This points them toward a wide range of
‘simtexts’—anything from game manuals or online resources
such as YouTube, to published material in the popular sphere or
even monographs by professional historians. This is important
because major events like World War Two continue to feature in a
wide range of game genres, and this engagement demonstrates how we
are learning about the past outside of traditional mechanisms such
as classrooms, teachers or textbooks. Utilizing interdisciplinary
methods, this volume foregrounds the experience that simgames
provide to players, especially in how they reconfigure and
reimagine history. Despite its visceral power and instructive
potential, the simulated digital experience created by simgames
curates World War Two and other global events of similar magnitude
within constrained frames that ignore much of what actually
happened in the past. This suggests that as computer games continue
to increase in power and fidelity—as seen with the expanding
scope of virtual reality—then the range of what can be simulated
will grow too. This will raise concerns about what is morally
acceptable to be simulated, and what should remain unplayable.
One of the realities characterizing the globe is the exclusion of
marginalized communities in digital transformation. Their exclusion
has resulted in a lack of participation in the digital space, which
has catastrophic consequences on the digital economy. To promote
digital inclusiveness in marginalized communities, there is a need
to deconstruct the illusion that digital transformation is an urban
phenomenon. Digital Transformation for Promoting Inclusiveness in
Marginalized Communities discusses how digital transformation can
be utilized to promote inclusiveness in marginalized communities by
exploring opportunities and challenges and determining change
mechanisms required to enhance digital transformation in
marginalized communities. Covering a range of topics such as
augmented reality and remote communities, this reference work is
ideal for government employees, technologists, policymakers,
industry professionals, researchers, scholars, academicians,
instructors, and students.
|
|