![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
The progression of information and communication technology (ICT) eGovernment systems has substantial implications for the future of government as we know it. eGov presents major challenges and advantages for policy makers as fundamentally different nations are adopting ICT in public administration reforms in order to capitalize on the benefits of transformational government or electronic government technology. This book investigates the modern political, technological, economic, social, and cultural issues of transformational government. It discusses in detail how interaction through advancing technology such as e-participation, mobile government, social media, web 2.0, and cloud computing has been successfully incorporated into eGov practice. International in scope this book gives practical examples and case studies of eGov implementation in countries across the globe and is the essential reference text for this important topic.
Bioconductor is a widely used open source and open development software project for the analysis and comprehension of data arising from high-throughput experimentation in genomics and molecular biology. Bioconductor is rooted in the open source statistical computing environment R. This volume's coverage is broad and ranges across most of the key capabilities of the Bioconductor project, including importation and preprocessing of high-throughput data from microarray, proteomic, and flow cytometry platforms: Curation and delivery of biological metadata for use in statistical modeling and interpretationStatistical analysis of high-throughput data, including machine learning and visualizationModeling and visualization of graphs and networksThe developers of the software, who are in many cases leading academic researchers, jointly authored chapters
Being an IT manager for the first time can be daunting. With a focus on practical advice, this book will provide you with hints, tips and examples from the world of IT management, showing you that management is about people rather than process; it is an art rather than a science. All the stories you will read in this book are true; all the advice has been personally tried and tested; all the tools and techniques have been applied by other aspiring leaders with positive results.
Social media has accelerated communication, expanded business horizons and connected millions of individuals who otherwise would never have met. But not everything social media touches turns to gold--much of it is brass. Social networking sites are used by scammers, criminals and sexual predators, and many people now self-diagnose illness based on misinformation shared online. Businesses make great claims about social media as a marketing tool but few show any real returns. We communicate through social media but are we really saying anything? Is social media doomed to be a conduit of narcissism or can it become a channel for responsible communication? Can social networking overcome its manifold violations of privacy? Must we sacrifice our identities in order to tweet or ""friend"" our associates? This book examines some of the legal and ethical issues surrounding social media, its impact on civil discourse and its role in suicides, murders and criminal enterprise.
The nature of cognition is examined by the methods of experimental cognitive psychology and the theoretical models of computational psychology. First explained is the nature and objectives of artificial intelligence, symbolic and connectionist paradigms, the architecture of cognition, and characteristics of a general theory of intelligence. Wagman then examines theory and research in human reasoning and reasoning systems. Experimental research in deductive and inductive reasoning, the nature of artificial intelligence reasoning systems, nonmonotonic and common-sense reasoning, and general types of reasoning in artificial intelligence are examined. Next the author examines the nature of human problem solving and problem-solving systems. Problem representation methods and their duplication by artificial intelligence is discussed at length. Concepts and research in human learning and learning systems are also reviewed, as are the nature of human expertise and expert systems. Major characteristics of expertise including deep knowledge, reasoning strategies, and pattern recognition are described and exemplified in research concerned with medical expertise. The nature of intelligence and intelligence systems is examined, and the physical symbol system hypothesis and its results are analyzed. The author covers an artificial intelligence system that emulates the cognitive processes in scientific discovery and its implications for human creativity.
Technopoles - planned centres for the promotion for high- technology industry - have become a key feature of national economic development worldwide. Created out of a technological revolution, the formation of the global economy and the emergence of a new form of economic production and management, they constitute the mines and foundries of the information age, redefining the conditions and processes of local and regional development. This book is the first systematic survey of technopoles in all manifestations: science parks, science cities, national technopoles and technobelt programmes. Detailed case studies, ranging from the Silicon Valley to Siberia and from the M4 Corridor to Taiwan, relate how global technopoles have developed, what each is striving to achieve and how well it is succeeding. Technopoles of the World distills the lessons learnt from the successes and failures, embracing a host of disparate concepts and a few myths, and offering guidelines for national, regional and local planners and developers worldwide.
This book is the first one that comprehensively discusses cyberspace sovereignty in China, reflecting China’s clear attitude in the global Internet governance: respecting every nation’s right to independently choose a development path, cyber management modes and Internet public policies and to participate in the international cyberspace governance on an equal footing. At present, the concept of cyberspace sovereignty is still very strange to many people, so it needs to be thoroughly analyzed. This book will not only help scientific and technical workers in the field of cyberspace security, law researchers and the public understand the development of cyberspace sovereignty at home and abroad, but also serve as reference basis for the relevant decision-making and management departments in their work.
The financial services industry is changing under the stimulus of
advances in information technology (IT), telecommunications, and
the Internet. Technological innovations and growing customer demand
and sophistication have led to the emergence of new electronic
financial markets, organizational forms for financial services
firms, products, and product delivery capabilities. This special
issue highlights Information Systems (IS) research on management
topics in the financial services that involve IT. The authors
utilize a mix of research methodologies to examine a range of
innovative applications of IT in the financial services
industry.
Beginning graduate students in mathematical sciences and related areas in physical and computer sciences and engineering are expected to be familiar with a daunting breadth of mathematics, but few have such a background. This bestselling book helps students fill in the gaps in their knowledge. Thomas A. Garrity explains the basic points and a few key results of all the most important undergraduate topics in mathematics, emphasizing the intuitions behind the subject. The explanations are accompanied by numerous examples, exercises and suggestions for further reading that allow the reader to test and develop their understanding of these core topics. Featuring four new chapters and many other improvements, this second edition of All the Math You Missed is an essential resource for advanced undergraduates and beginning graduate students who need to learn some serious mathematics quickly.
Covering over 40 industries and dozens of applications, this is the first bibliography on the history of computer applications. After an introductory essay on the history of applications, the volume is divided into two time periods and includes over 1,600 entries, arranged by application and industry. Users will find sections on such fields as higher education, manufacturing, law enforcement, accounting, space travel, ATMs, artificial intelligence, banking, and trucking. Entries are annotated to describe their content and, when appropriate, their historical significance. Compiled by a historian for other historians and economists, the bibliography draws on the entire spectrum of contemporary and historical literature: books, user's guides, trade journals, industry publications, technology and scholarly magazines and journals, and newsletters, including both American and European sources. As the author of several books on information processing and a member of the IBM Corporation, Cortada is in a good position to pick the historically significant literature for inclusion in this bibliography.
This book shows how neural networks are applied to computational mechanics. Part I presents the fundamentals of neural networks and other machine learning method in computational mechanics. Part II highlights the applications of neural networks to a variety of problems of computational mechanics. The final chapter gives perspectives to the applications of the deep learning to computational mechanics.
This easy-to-use guide covers the history, development, and current workings of cybercurrencies and the underground economy, both in the United States and around the world. The world of cybercurrency has experienced explosive growth in recent years, but that expansion has been accompanied by numerous controversies and misunderstandings about what it is, how it works, and how it relates to the underground economy and illegal activities such as money laundering, tax evasion, and human trafficking. Many illegal or malicious activities are paid for with cyber currencies. This book covers those applications. But cyber currencies also have many legitimate, constructive applications, all of which are explained in Rogue Money in clear, plain English, without embellishment or exaggeration. An authoritative and thought-provoking reference for readers seeking a greater understanding of all aspects of alternative cybercurrencies, this encyclopedia includes entries on economic history, international trade, current controversies, and its impact on the wider underground economy. It peels back the layers of jargon and obfuscation, giving each topic individual attention to show how it works and contributes to the whole.
Although Japanese universities have relied on information technology to resolve numerous problems, their high expectations are undermined by lags in implementing that technology. This innovative edited volume argues that lags in IT implementation in Japanese education are created by contradictory and challenging responses of the social environment. If this dialectic can be visualized as having hands, the right avidly promotes IT, while the left hand simultaneously blocks it. The result, of course, is an impasse. The issues central to this stalemate are significant because they point beyond the schools, to a broader set of problem areas in Japanese society. The contributors to Roadblocks on the Information Highway discover and discuss the contradictions inherent in Japanese society and culture as they are played out in the social contexts of IT service providers, web masters, and classroom teachers who implement IT. They then show how these contradictions indicate broader, structural problems that pervade the dynamic between Japanese education and the state and business sectors. Ultimately, in a reach that goes beyond Japan, this book examines relationships between technology and society, persuasively convincing readers that the modern age has created an inextricable link between the two.
This edited collection of essays is devoted to the terminology used in the fields of videogame theory and videogame studies. Videogame scholars provide theoretical critiques of existing terminology, mount arguments for the creation of new terminology, articulate terminological gaps in the current literature devoted to videogame studies, and share phenomenological studies of videogames that facilitate terminological theory.
This collection of new essays explores issues of identity, work and play in the virtual world of Second Life (SL). Fourteen women explore their experiences in this virtual environment. Topics include teaching in Second Life, becoming an SL journalist, and using SL as a means to bring human rights to health care; exploring issues of identity and gender such as performing the role of digital geisha, playing with gender crossing, or determining how identity is formed virtually; examining how race is perceived; and investigating creativity such as poetry writing or quilting. The text is unique in that it represents only women and their experiences in a world that is most often viewed as a man's world.
Discover everything you want to know about Microsoft's newest version of Windows in this easy-to-use guide; from the most essential tasks that you'll want to perform, to solving the most common problems you'll encounter.
This book analyses the root causes of suicide terrorism at both the elite and rank-and- file levels of the Hamas and also explains why this tactic has disappeared in the post-2006 period. This volume adopts a multi-causal, multi-level approach to analyse the use of suicide bombings by Hamas and its individual operatives in the Israeli-Palestinian conflict. It uses extensive fieldwork and on-the-ground interviews in order to delve beneath the surface and understand why and how suicide operations were adopted as a sustained mechanism of engagement within the Israeli-Palestinian conflict. Three core factors fuelled Hamas's suicide bombing campaigns. First, Palestinian suicide operations are a complex combination of instrumental and expressive violence adopted by both organisations and individuals to achieve political and/or societal survival, retaliation and competition. In other words, suicide bombings not only serve distinct political and strategic goals for both Hamas and its operatives but they also serve to convey a symbolic message to various audiences, within Israel, the Palestinian territories and around the world. Second, suicide operations perform a crucial role in the formation and consolidation of Palestinian national identity and are also the latest manifestation of the historically entrenched cultural norm of militant heroic martyrdom. Finally, Hamas's use of political Islam also facilitates the articulation, justification and legitimisation of suicide operations as a modern-day jihad against Israel through the means of modern interpretations and fatwas. This approach not only facilitates a much needed, multifaceted, holistic understanding of suicide bombings in this particular region but also yields policy-relevant lessons to address extreme political violence in other parts of the world. This book will be of much interest to students of Hamas, terrorism, Middle East politics and security studies.
Smart phones, tablets, Facebook, Twitter, and wireless Internet connections are the latest technologies to have quickly become entrenched in our culture. Although traditionalists have argued that computer-mediated communication and cyberspace are incongruent with the study of folklore,Trevor J. Blank sees the digital world as fully capable of generating, transmitting, performing, and archiving vernacular culture. Folk Culture in the Digital Age documents the emergent cultural scenes and expressive folkloric communications that are being made possible by digital "new media" technologies. New media is changing the ways in which people learn, share, participate, and engage with others as they adopt technologies to complement and supplement traditional means of vernacular expression. But behavioral and structural overlap in many folkloric forms exists between on- and offline, and emerging patterns in digital rhetoric mimic the dynamics of previously documented folkloric forms, invoking familiar social or behavior customs, linguistic inflections, and symbolic gestures. Folk Culture in the Digital Age provides insights and perspectives on the myriad ways in which folk culture manifests in the digital age and contributes to our greater understanding of vernacular expression in our ever-changing technological world.
Turning an anthropological eye toward cyberspace, Human No More explores how conditions of the online world shape identity, place, culture, and death within virtual communities. Online worlds have recently thrown into question the traditional anthropological conception of place-based ethnography. They break definitions, blur distinctions, and force us to rethink the notion of the "subject." Human No More asks how digital cultures can be integrated and how the ethnography of both the "unhuman" and the "digital" could lead to possible reconfiguring the notion of the "human." This provocative and groundbreaking work challenges fundamental assumptions about the entire field of anthropology. Cross-disciplinary research from well-respected contributors makes this volume vital to the understanding of contemporary human interaction. It will be of interest not only to anthropologists but also to students and scholars of media, communication, popular culture, identity, and technology.
This book introduces the latest version of hardware description languages and explains how the languages can be implemented in the design of the digital logic components. In addition to digital design, other examples in the areas of bioengineering and basic computer design are covered. Unlike the competition, HDL with Digital Design introduces mixed language programming. By covering both Verilog and VHDL side by side, students, as well as professionals, can learn both the theoretical and practical concepts of digital design. The two languages are equally important in the field of computer engineering and computer science as well as other engineering fields such as simulation and modeling. Features: Covers both VHDL and Verilog side by side Uses the latest versions of both Verilog and VHDL Includes fundamentals of synthesis and FPGAs implementation Instructor's resources available upon adoption
Understand Kubernetes and other orchestration systems deeply by building your own using Go and the Docker API. In Build an Orchestrator in Go you will learn how to: Identify the components that make up any orchestration system Schedule containers on to worker nodes Start and stop containers using the Docker API Manage a cluster of worker nodes using a simple API Work with algorithms taken from cutting-edge Google Borg research papers Demystify orchestration systems like Kubernetes and Nomad Orchestration systems like Kubernetes coordinate other software subsystems and services to create a complete organized system. Although orchestration tools have a reputation for complexity, they’re designed around few important patterns that apply across many aspects of software development. Build an Orchestrator in Go reveals the inner workings of orchestration frameworks by guiding you as you design and implement your own using the Go SDK. As you create your own orchestration framework, you’ll improve your understanding of Kubernetes and its role in distributed system design. You’ll also build the skills required to design custom orchestration solutions for those times when an out-of-the-box solution isn’t a good fit. about the technology Orchestration systems provide the management framework for software and infrastructure that’s distributed across multiple machines and services. By managing the many individual components and containers in a large application, they ensure web apps are resilient and reliable, automatically switching between resources in response to crashes and outages. A properly designed orchestration system can seamlessly scale to handle traffic loads, and reduce time-consuming manual work for sysadmin and site reliability engineers. about the book Build an Orchestrator in Go teaches you to implement an orchestrator from scratch. You’ll discover the components that make up all orchestration systems, and use the Docker API and Go SDK to build layers of functionality from tasks, to workers, to the manager. Learn how to save on costs by maximising the usage of a cluster, or spread tasks among workers to avoid overload and downtime. Once you’ve built your working system, you’ll even implement a command line user interface to easily manage your orchestrator.
This textbook presents fundamental topics in discrete mathematics introduced from the perspectives of a pure mathematician and an applied computer scientist. The synergy between the two complementary perspectives is seen throughout the book; key concepts are motivated and explained through real-world examples, and yet are still formalized with mathematical rigor. The book is an excellent introduction to discrete mathematics for computer science, software engineering, and mathematics students.The first author is a leading mathematician in the area of logic, computability, and theoretical computer science, with more than 25 years of teaching and research experience. The second author is a computer science PhD student at the University of Washington specializing in database systems. The father-and-daughter team merges two different views to create a unified book for students interested in learning discrete mathematics, the connections between discrete mathematics and computer science, and the mathematical foundations of computer science.Readers will learn how to formally define abstract concepts, reason about objects (such as programs, graphs and numbers), investigate properties of algorithms, and prove their correctness. The textbook studies several well-known algorithmic problems including the path problem for graphs and finding the greatest common divisor, inductive definitions, proofs of correctness of algorithms via loop invariants and induction, the basics of formal methods such as propositional logic, finite state machines, counting, probability, as well as the foundations of databases such as relational calculus. |
You may like...
If Anyone Builds It, Everyone Dies - The…
Eliezer Yudkowsky, Nate Soares
Paperback
Principles of Business Information…
George Reynolds, Ralph M. Stair, …
Paperback
Digital Libraries - Integrating Content…
Mark V Dahl, Kyle Banerjee, …
Paperback
R1,150
Discovery Miles 11 500
Transforming Human Resource Functions…
Anchal Pathak, Shikha Rana
Hardcover
R5,333
Discovery Miles 53 330
OECD report on public communication…
Organisation for Economic Cooperation and Development
Paperback
R1,953
Discovery Miles 19 530
|