|
|
Books > Computing & IT > General
This peer-reviewed book explores the technologies driving broadband
internet connectivity in the fourth industrial revolution (Industry
4.0). It particularly focuses on potential solutions to introduce
these technologies in emerging markets and rural areas, regions
that typically form part of the digital divide and often have
under-developed telecommunications infrastructures, a lack of
skilled workers, and geographical restrictions that limit broadband
connectivity. Research shows that ubiquitous internet access boosts
socio-economic growth through innovations in science and
technology, with the common goal of bringing positive change to the
lives of individuals. Fifth-generation (5G) networks based on
millimeter-wave (mm-wave) frequency information transfer have the
potential to provide future-proof, affordable and sustainable
broadband connectivity in areas where previous-generation mobile
networks were unable to do so. This book discusses the principles
of various technologies that enable electronic circuits to operate
at mm-wave frequencies. It examines the importance of identifying,
describing, and analyzing technology from a purely technological
standpoint, but also acknowledges and investigates the challenges
and limitations of introducing such technologies in emerging
markets. Presenting recent research, the book spearheads
participation in Industry 4.0 in these areas.
Digital forensics is the science of detecting evidence from digital
media like a computer, smart phone, server, or network. It provides
the forensic team with the most beneficial methods to solve
confused digital-related cases. AI and blockchain can be applied to
solve online predatory chat cases and photo forensics cases,
provide network service evidence, custody of digital files in
forensic medicine, and identify roots of data scavenging. The
increased use of PCs and extensive use of internet access, has
meant easy availability of hacking tools. Over the past two
decades, improvements in the information technology landscape have
made the collection, preservation, and analysis of digital evidence
extremely important. The traditional tools for solving cybercrimes
and preparing court cases are making investigations difficult. We
can use AI and blockchain design frameworks to make the digital
forensic process efficient and straightforward. AI features help
determine the contents of a picture, detect spam email messages and
recognize swatches of hard drives that could contain suspicious
files. Blockchain-based lawful evidence management schemes can
supervise the entire evidence flow of all of the court data. This
book can provide a wide-ranging overview of how AI and blockchain
can be used to solve problems in digital forensics using advanced
tools and applications available on the market.
With the aim to sequentially determine optimal allocations across a
set of assets, Online Portfolio Selection (OLPS) has significantly
reshaped the financial investment landscape. Online Portfolio
Selection: Principles and Algorithms supplies a comprehensive
survey of existing OLPS principles and presents a collection of
innovative strategies that leverage machine learning techniques for
financial investment. The book presents four new algorithms based
on machine learning techniques that were designed by the authors,
as well as a new back-test system they developed for evaluating
trading strategy effectiveness. The book uses simulations with real
market data to illustrate the trading strategies in action and to
provide readers with the confidence to deploy the strategies
themselves. The book is presented in five sections that: Introduce
OLPS and formulate OLPS as a sequential decision task Present key
OLPS principles, including benchmarks, follow the winner, follow
the loser, pattern matching, and meta-learning Detail four
innovative OLPS algorithms based on cutting-edge machine learning
techniques Provide a toolbox for evaluating the OLPS algorithms and
present empirical studies comparing the proposed algorithms with
the state of the art Investigate possible future directions
Complete with a back-test system that uses historical data to
evaluate the performance of trading strategies, as well as MATLAB®
code for the back-test systems, this book is an ideal resource for
graduate students in finance, computer science, and statistics. It
is also suitable for researchers and engineers interested in
computational investment. Readers are encouraged to visit the
authors’ website for updates: http://olps.stevenhoi.org.
Accessible, refreshingly candid, but above all helpful, this pragmatic guide addresses a real need by dealing with the problems that face the new IT manager. By providing a number of practical recommendations and approaches including how to make the transition from technical professional to manager and dealing with people, to giving advice and guidance on organization structure, architecture and planning approaches, this book covers a whole raft of issues essential to managing an IT unit. If you have chosen to move from the safe haven of technology to the unpredictable world of management, this book could make the difference between success and failure. "The IT Manager's Survival Guide is well named. Aimed at the techie becoming an IT Manager it covers the many alligators of IT management - from legacy systems to managing vendors - in easy chunks with checklists. It also provides the new manager with help to get ahead of the game by including articles from experts on what is wrong with IT management and a set of short reviews of management theorists from Strassman to Mayo. I recommend this book for those who would like to buck the trend - the average tenure of an IT Manager is about 900 days - and run an IT outfit appreciated by customers and staff." Gill Ringland, Fellow of the British Computer Society and Member of the BCS Management Forum. Author of Scenario Planning: Managing for the Future.
Role of Blockchain Technology in IoT Applications, Volume 115 in
the Advances in Computers series, reviews the latest information on
this topic that promises many applications in human life. According
to forecasts made by various market research/survey agencies, there
will be around 50 Billion connected devices (IoT) by 2020. Updates
in this new release include chapters on the Technical Aspects of
Blockchain and IoT, Integrated Platforms for Blockchain-Enablement,
Intersections Between IoT and Distributed Ledger, Blockchain and
Artificial Intelligence: How and Why Combining These Two
Groundbreaking Technologies, Blockchain Applications in Health Care
and Opportunities and Advancements Due to New Information
Technology Frameworks, and more.
Information security is broken. Year after year, attackers remain
unchallenged and undeterred, while engineering teams feel mounting
pressure to design, build, and operate "secure" systems. Attacks
can't be prevented, mental models of systems are incomplete, and
our digital world constantly evolves. How can we verify that our
systems behave the way we expect? What can we do to improve our
systems' resilience? In this pragmatic and comprehensive guide,
authors Kelly Shortridge and Aaron Rinehart help you navigate the
challenges of securing complex software systems. Using the
principles and practices of security chaos engineering, they
explore how you can cultivate resilience across the software
delivery lifecycle. Attackers and systems will change, but by
preparing for adverse events you can ensure it does not disrupt
your ability to innovate, move quickly, and achieve your
engineering and business goals. You will: Learn how to design a
modern security program aligned to business and engineering goals
Make informed decisions at each phase of software delivery to
nurture resilience to attack Understand the complex systems
dynamics upon which security outcomes depend Navigate technical and
organizational trade-offs that distort defensive decision making
Explore chaos experimentation as a tool for verifying critical
assumptions about systems security and the ROI of security
investments Peek behind the scenes of major enterprises that
leverage security chaos engineering and learn from their practices
Develop your NLP skills from scratch! This revised bestseller now
includes coverage of the latest Python packages, Transformers, the
HuggingFace packages, and chatbot frameworks. In Natural
Language Processing in Action, Second Edition you will learn
how to: Process, analyze, understand, and generate natural language
text Build production-quality NLP pipelines with spaCy Build neural
networks for NLP using Pytorch BERT and GPT transformers for
English composition, writing code, and even organizing your
thoughts Create chatbots and other conversational AI agents Natural
Language Processing in Action has helped thousands of data
scientists build machines that understand human language. In this
new and revised edition, you’ll discover state-of-the art NLP
models like BERT and HuggingFace transformers, popular open-source
frameworks for chatbots, and more. As you go, you’ll create
projects that can detect fake news, filter spam, and even answer
your questions, all built with Python and its ecosystem of data
tools. about the technology Deep learning has been a giant leap
forward for NLP applications. Developers can now build chatbots and
other natural language tools that can imitate real people, diagnose
illness, automatically summarize documents, and more. Accessible
open source tools such as spaCy and PyTorch make production-level
NLP easier and more impactful than ever before. about the book
Natural Language Processing in Action, Second Edition is your
guide to building software that can read and interpret human
language. This new edition is updated to include the latest Python
packages and comes with full coverage of cutting-edge models like
BERT, GPT-J and HuggingFace transformers. In it, you’ll learn to
create fun and useful NLP applications such as semantic search
engines that are even better than Google, chatbots that can help
you write a book, and a multilingual translation program. Soon,
you’ll be ready to start tackling real-world problems with NLP.
AUTHOR BIOÂ Hobson Lane is a data scientist and machine
learning engineer. He has over twenty years experience building
autonomous systems and NLP pipelines for both large corporations
and start-ups. Currently, Hobson is an instructor at UCSD Extension
and Springboard, and the CTO and cofounder of Tangible AI and
ProAI.org. Maria Dyshel is a social entrepreneur and
artificial intelligence expert. She held a variety of AI research,
engineering, and management roles in diverse industries, from
designing and improving algorithms for autonomous vehicles, to
implementing company-wide Conversational AI program in one of the
world's largest pharma companies. Maria is currently the CEO and
cofounder of Tangible AI. Cole Howard and Hannes Max Hapke
were authors of the first edition of Natural Language Processing in
Action and their legacy lives on in the collective intelligence of
the community around the book.
Coding is awesome. So is being outside. With location-based iOS
apps, you can combine the two for an enhanced outdoor experience.
Use Swift to create your own apps that use GPS data, read sensor
data from your iPhone, draw on maps, automate with geofences, and
store augmented reality world maps. You'll have a great time
without even noticing that you're learning. And even better, each
of the projects is designed to be extended and eventually submitted
to the App Store. Explore, share, and have fun. Location-based apps
are everywhere. From mapping our jogging path to pointing us to the
nearest collectible creature in a location-based game, these apps
offer useful and interesting features and information related to
where you are. Using real-world maps and places as the environment,
they add an extra layer of adventure to exploring the outdoors. If
you've ever wanted to make your own location-based apps and games,
you can learn how with four simple, Swift-based projects that are
easy to code and fun to use. Build four stunning apps that sense
the iPhone's surroundings. Use Core Location and MapKit to draw GPS
data on maps and share the results to social media. Use the sensor
data from the iPhone and draw acceleration graphs using Core
Graphics while on a playground swing. Build an app that measures
the time you spend outside using geofences. Combine Core Location
and ARKit to build an augmented reality scavenger hunt app that you
can use and play with other people. Have great time building
creative apps you cannot wait to try out.
We live in a moment of high anxiety around digital transformation.
Computers are blamed for generating toxic forms of culture and ways
of life. Once part of future imaginaries that were optimistic or
even utopian, today there is a sense that things have turned out
very differently. Anti-computing is widespread. This book seeks to
understand its cultural and material logics, its forms, and its
operations. Anti-Computing critically investigates forgotten
histories of dissent - moments when the imposition of computational
technologies, logics, techniques, imaginaries, utopias have been
questioned, disputed, or refused. It asks why dissent is forgotten
and how - under what circumstances - it revives. Constituting an
engagement with media archaeology/medium theory and working through
a series of case studies, this book is compelling reading for
scholars in digital media, literary, cultural history, digital
humanities and associated fields at all levels. -- .
This book from Jürgen Claus is a milestone among the books
dedicated to the planet sea A knowledgeable overview of marine
architectures from both the Pacific and Atlantic regions Discusses
the seascape as a fluid studio for visual artists
Business managers, management consultants and researchers regularly
question whether and how the contribution of IT to business
performance can be measured. This book contributes to the art and
science of the expost valuation of IT, by posing and answering key
management questions, offering insights into the value of IT once
it has been developed, implemented and used. Measuring the Value of
Information Technology targets business managers, IT managers,
business students and researchers and will enable its readers to
systematically, effectively and consistently measure the value of
Information Technology.
Steps forward in mathematics often reverberate in other scientific
disciplines, and give rise to innovative conceptual developments or
find surprising technological applications. This volume brings to
the forefront some of the proponents of the mathematics of the
twentieth century, who have put at our disposal new and powerful
instruments for investigating the reality around us. The portraits
present people who have impressive charisma and wide-ranging
cultural interests, who are passionate about defending the
importance of their own research, are sensitive to beauty, and
attentive to the social and political problems of their times. What
we have sought to document is mathematics' central position in the
culture of our day. Space has been made not only for the great
mathematicians but also for literary texts, including contributions
by two apparent interlopers, Robert Musil and Raymond Queneau, for
whom mathematical concepts represented a valuable tool for
resolving the struggle between 'soul and precision.'
The Chaos Machine is an essential book for our times - Ezra Klein
The Chaos Machine is the story of how the world was driven mad by
social media. The election of populists like Trump and Bolsonaro;
strife and genocide in countries like Myanmar; the rampant spread
of COVID-19 conspiracy theories as deadly as the pandemic itself;
all of these are products of a breakdown in our social and
political lives, a breakdown driven by the apps, companies and
algorithms that compete constantly for our attention. Max Fisher is
a leading New York Times technology reporter whose work has covered
the way that social media sites - driven increasingly by artificial
intelligence rather than human ingenuity - push users towards more
and more extreme positions, deepening the divisions in society in
pursuit of greater engagement and profit. With extraordinary access
to the most powerful players in Silicon Valley, and with
testimonies from around the world of the havoc being wreaked by our
online selves, The Chaos Machine shows us how we got to this
uniquely perilous moment - and how we might get out of it.
|
|