![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
Rapidly growing cognitive technologies (such as word processors, web browsers, cell phones, and personal data assistants) aid learning, memory, and problem solving, and contribute to every part of modern life from interviewing crime witnesses to learning a foreign language to calling one's mother. This collection of essays on cognitive technology examines the interaction between the human mind and the tools people create to enhance it, studying which technologies assist cognition the most and what features are most effective. It also considers the point at which the technological enhancement of human ability begins to restrict that very ability, such as the risk of some cognitive technologies impairing cognition or creating disadvantages for individuals or groups. This collection of 11 essays discusses the most recent psychological research in cognitive technology, showcasing the paradigms and theories that have driven the development of new cognitive technologies. It explores the impact of technology on cognitive psychology, the classroom, and social interaction and group problem solving. Topics covered include the distracting characteristics of new technologies (such as the effects of cell phone use on driving ability and of distracting advertisements on problem solving), the study of mass media through assessing memories for media experiences, the media's role in advancing gender and racial prejudices, and the misuse of cognitive technology through identity theft and cyberterrorism. Each essay concludes with a bibliography.
This book is about the fastest growing form of electronic game in the world - the Massively Multiplayer Online Role Playing Game (MMORPG). It introduces these self-contained three-dimensional virtual worlds, often inhabited by thousands of players, and describes their evolution; it also delves into the psychology of the people who inhabit the game universe and explores the development of unique cultures, economies, moral codes, and slang in virtual communities. The work describes MMORPGs' ever-greater effect on society: for example, players can sell virtual goods for real money, creating a separate economy, and several governments have labeled the games a public health threat. It explains how the games are built, the spin-offs that players create to enhance their game lives, and peeks at the future of MMORPGs as they evolve from a form of amusement to an educational, scientific, and business tool. Based on hundreds of interviews over a three-year period, the work explores reasons people are attracted to and addicted to these games. It also surveys many existing and upcoming games, identifying their unique features and attractions. Two appendices list online addiction organizations and MMORPG information sites.
This book will examine the history of robotics and explicate what massive automation means for the present and future of labor in all its forms, from mills and factories to the white-collars offices of suburbia and more. While warnings of a robot world-takeover could seem dramatic, the truth is more mundane—robots have come to take our jobs. Winning in the Robotic Workplace: How to Prosper in the Automation Age will teach you the skills needed to reprogram the way you work in anticipation of this technological shift. Author John F. Wasik believes learning to thrive in the automation age can in fact humanize the workplace once again. In Winning in the Robotic Workplace: How to Prosper in the Automation Age, you will learn to emphasize the conceptualization and pursuit of creative ideas, a practice that most robots are unequipped to perform in a meaningful way. You will learn that the successful integration of automated elements with humans is the most effective business model moving forward, and that an eagerness to collaborate demonstrates a will to succeed.
A CUNNING CHRONICLE OF THE 50 CODES THAT ALTERED THE COURSE OF HISTORY AND CHANGED THE WORLD From the bestselling author of Bletchley Park Brainteasers and The Scotland Yard Puzzle Book. There have been secret codes since before the Old Testament, and there were secret codes in the Old Testament too. Almost as soon as writing was invented, so too were the devious means to hide messages and keep them under the wraps of secrecy. In 50 Codes that Changed the World, Sinclair McKay explores these uncrackable codes, secret cyphers and hidden messages from across time to tell a new history of a secret world. From the temples of Ancient Greece to the court of Elizabeth I; from antique manuscripts whose codes might hold prophecies of doom to the modern realm of quantum mechanics, you will see how a few concealed words could help to win wars, spark revolutions and even change the faces of great nations. Here is the complete guide to the hidden world of codebreaking, with opportunities for you to see if you could have cracked some of the trickiest puzzles and lip-chewing codes ever created. ----------------------- Praise for Sinclair McKay's books: 'This book [The Secret Life of Bletchley Park] seems a remarkably faithful account of what we did, why it mattered, and how it all felt at the time by someone who couldn't possibly have been born then. - THE GUARDIAN [Bletchley Park Brainteasers] is outrageously difficult but utterly fascinating. - THE EXPRESS 'Sinclair McKay's account of this secret war of the airwaves in [Secret Listeners] is as painstakingly researched and fascinating as his bestselling The Secret Life Of Bletchley Park, and an essential companion to it.' - DAILY MAIL
Developments in information technology are bringing about changes in science education. This Reader focuses on the theoretical and practical consideration of using information and communications technologies in teaching and learning. It examines current approaches to teaching and learning in science at various levels of education, and ways in which science in made more accessible. This will include the future potential of such current developments as access to practical work delivered on the web. The Reader is divided into three sections: What are the current issues in using ICT to teach and learn in science? Designing and evaluating ICT to teach and learn science Extending access to science learning This is a companion book to Reconsidering Science Education, also published by RoutledgeFalmer. Mediating Science Learning Through ICT is a valuable resource for teachers on Masters courses in science education and academics in science education.
Advances in communications technology continue to accelerate. To maintain the competitive edge in such a dynamic environment, today's managers, professionals and engineers can expect to be challenged daily to keep pace with the technical and organizational issues, opportunities and threats surrounding the operation and management of any communications system. The purpose of this book is to enable these people to detect, understand, handle and control a communications system during a crisis.
Developments in information technology are bringing about changes in science education. This Reader focuses on the theoretical and practical consideration of using information and communications technologies in teaching and learning. It examines current approaches to teaching and learning in science at various levels of education, and ways in which science in made more accessible. This will include the future potential of such current developments as access to practical work delivered on the web. The Reader is divided into three sections: What are the current issues in using ICT to teach and learn in science? Designing and evaluating ICT to teach and learn science Extending access to science learning This is a companion book to Reconsidering Science Education, also published by RoutledgeFalmer. Mediating Science Learning Through ICT is a valuable resource for teachers on Masters courses in science education and academics in science education.
Get ready to code like a pro in Rust! This hands-on guide dives deep into memory management, asynchronous programming, and Rust design patterns and explores essential productivity techniques like testing, tooling, and project management. In Code Like A Pro in Rust you will learn: Essential Rust tooling Core Rust data structures Memory management Design patterns for Rust Testing in Rust Asynchronous programming for Rust Optimized Rust Rust project management Code Like A Pro in Rust is a fast-track guide to building and delivering professional quality software in Rust. You’ll upgrade your basic knowledge of Rust with conventions, best practices, and veteran’s secrets that are normally only learned through years of experience. Skip the fluff and get right to the heart of this powerful modern language, including Rust’s support for asynchronous programming and integrating Rust with codebases written in other languages. about the technology Programmers prize Rust for its safety, performance, and security. However, its strict syntax and tricky memory management can make it challenging to master. This practical guide shows you how to balance Rust’s trade offs, lessen its cognitive load, and rapidly bring your productivity to a professional level. about the book Code Like a Pro in Rust shows you how to quickly create and ship Rust programs without wasting time on language quirks, compiler problems, and unexpected complexities. It builds on your existing Rust knowledge with design patterns and shortcuts direct from veteran Rust contributor Brenden Matthews. You’ll learn to use important Rust tooling like rust-analyzer, Clippy, and Cargo, as well as best practices for unit testing and code optimization. By the time you’re done, you’ll be writing high quality code with less maintenance overhead. RETAIL SELLING POINTS • Essential Rust tooling • Core Rust data structures • Memory management • Design patterns for Rust • Testing in Rust • Asynchronous programming for Rust • Optimized Rust • Rust project management AUDIENCE For aspiring Rust pros familiar with the basics of the language.
The term “stringology” is a popular nickname for text algorithms, or algorithms on strings. This book deals with the most basic algorithms in the area. Most of them can be viewed as “algorithmic jewels” and deserve reader-friendly presentation. One of the main aims of the book is to present several of the most celebrated algorithms in a simple way by omitting obscuring details and separating algorithmic structure from combinatorial theoretical background. The book reflects the relationships between applications of text-algorithmic techniques and the classification of algorithms according to the measures of complexity considered. The text can be viewed as a parade of algorithms in which the main purpose is to discuss the foundations of the algorithms and their interconnections. One can partition the algorithmic problems discussed into practical and theoretical problems. Certainly, string matching and data compression are in the former class, while most problems related to symmetries and repetitions in texts are in the latter. However, all the problems are interesting from an algorithmic point of view and enable the reader to appreciate the importance of combinatorics on words as a tool in the design of efficient text algorithms.In most textbooks on algorithms and data structures, the presentation of efficient algorithms on words is quite short as compared to issues in graph theory, sorting, searching, and some other areas. At the same time, there are many presentations of interesting algorithms on words accessible only in journals and in a form directed mainly at specialists. This book fills the gap in the book literature on algorithms on words, and brings together the many results presently dispersed in the masses of journal articles. The presentation is reader-friendly; many examples and about two hundred figures illustrate nicely the behaviour of otherwise very complex algorithms.
Master the art and science of data storytelling--with frameworks and techniques to help you craft compelling stories with data. The ability to effectively communicate with data is no longer a luxury in today's economy; it is a necessity. Transforming data into visual communication is only one part of the picture. It is equally important to engage your audience with a narrative--to tell a story with the numbers. Effective Data Storytelling will teach you the essential skills necessary to communicate your insights through persuasive and memorable data stories. Narratives are more powerful than raw statistics, more enduring than pretty charts. When done correctly, data stories can influence decisions and drive change. Most other books focus only on data visualization while neglecting the powerful narrative and psychological aspects of telling stories with data. Author Brent Dykes shows you how to take the three central elements of data storytelling--data, narrative, and visuals--and combine them for maximum effectiveness. Taking a comprehensive look at all the elements of data storytelling, this unique book will enable you to: Transform your insights and data visualizations into appealing, impactful data stories Learn the fundamental elements of a data story and key audience drivers Understand the differences between how the brain processes facts and narrative Structure your findings as a data narrative, using a four-step storyboarding process Incorporate the seven essential principles of better visual storytelling into your work Avoid common data storytelling mistakes by learning from historical and modern examples Effective Data Storytelling: How to Drive Change with Data, Narrative and Visuals is a must-have resource for anyone who communicates regularly with data, including business professionals, analysts, marketers, salespeople, financial managers, and educators.
Library research has changed dramatically since Marilyn Lutzker and Eleanor Ferrall's Criminal Justice Research in Libraries was published in 1986. In addition to covering the enduring elements of traditional research, this new edition provides full coverage of research using the World Wide Web, hypertext documents, computer indexes, and other online resources. It gives an in-depth explanation of such concepts as databases, networks, and full text, and the Internet gets a full chapter. The chapters on bibliographic searching, the library catalog, and comparative research are almost totally new, and chapters on indexes and abstracts, newsletters, newspapers and news broadcasts, documents, reports and conference proceedings, and statistics reflect the shift to computerized sources. The chapter on legal resources discusses the wealth of legal information available on the Internet. A new chapter on library research in forensic science corrects an omission from the first book. With the growth of computerized indexes and the Internet, more and more researchers are admitting that they feel inadequate to the new tools. Librarians themselves are struggling to keep abreast of the new technology. This book will help students, practitioners, scholars, and librarians develop a sense of competency in doing criminal justice research.
A comprehensive and cutting-edge introduction to quantitative methods of causal analysis, including new trends in machine learning. Reasoning about cause and effect—the consequence of doing one thing versus another—is an integral part of our lives as human beings. In an increasingly digital and data-driven economy, the importance of sophisticated causal analysis only deepens. Presenting the most important quantitative methods for evaluating causal effects, this textbook provides graduate students and researchers with a clear and comprehensive introduction to the causal analysis of empirical data. Martin Huber’s accessible approach highlights the intuition and motivation behind various methods while also providing formal discussions of key concepts using statistical notation. Causal Analysis covers several methodological developments not covered in other texts, including new trends in machine learning, the evaluation of interaction or interference effects, and recent research designs such as bunching or kink designs.
A collection of the best moments from the ‘Ricky Gervais Show’ with further musings from Karl Pilkington, star of Sky 1’s ‘An Idiot Abroad’. Karl Pilkington’s is a brilliant mind, locked inside a perfectly round head and uncluttered by the unhelpful constraints of logic or common sense. He both baffles and enlightens with his take on topics as diverse as population control, the rights of monkeys and how long you can stay alive with your head chopped off. Featuring the best conversations from ‘The Ricky Gervais Show’ podcasts and original illustrations and scribblings by Karl Pilkington, this is a unique trip into the mind of our most innovative visionary – or, as Gervais and Merchant know him, ‘the funniest man alive in Britain today’.
Designed to provide you with the knowledge and skills needed to protect your technology devices from increasingly sophisticated cyberattacks, SECURITY AWARENESS: APPLYING PRACTICAL CYBERSECURITY IN YOUR WORLD, 6th EDITION continues to present the same practical information that has made previous editions so popular. For most students, practical cybersecurity poses daunting challenges: Do I need antivirus software? How can I manage all my passwords? Can I prevent a ransomware attack? Is there a way to make my Web browser secure? What are patches? This text is designed to help you understand the answers to these questions and to protect your devices and even Wi-Fi networks from cyberattacks. In addition, hands-on projects and case studies give you the opportunity to test your knowledge and apply what you have learned.
A single dramatic software failure can cost a company millions of dollars - but can be avoided with simple changes to design and architecture. This new edition of the best-selling industry standard shows you how to create systems that run longer, with fewer failures, and recover better when bad things happen. New coverage includes DevOps, microservices, and cloud-native architecture. Stability antipatterns have grown to include systemic problems in large-scale systems. This is a must-have pragmatic guide to engineering for production systems. If you're a software developer, and you don't want to get alerts every night for the rest of your life, help is here. With a combination of case studies about huge losses - lost revenue, lost reputation, lost time, lost opportunity - and practical, down-to-earth advice that was all gained through painful experience, this book helps you avoid the pitfalls that cost companies millions of dollars in downtime and reputation. Eighty percent of project life-cycle cost is in production, yet few books address this topic. This updated edition deals with the production of today's systems - larger, more complex, and heavily virtualized - and is the first book to cover chaos engineering, the discipline of applying randomness and deliberate stress to reveal systematic problems. Build systems that survive the real world, avoid downtime, implement zero-downtime upgrades and continuous delivery, and make cloud-native applications resilient. Examine ways to architect, design, and build software - particularly distributed systems - that stands up to the typhoon winds of a flash mob, a Slashdotting, or a link on Reddit. Take a hard look at software that failed the test and find ways to make sure your software survives.
Do you find yourself sat at home wishing you could be in your favourite video game? Or dream of a time when you pretended you were Sailor Moon? Or do you want to embody your Dungeons and Dragons character for real? What's holding you back? Maybe you need to introduced to cosplay! Cosplay is a phenomenon that is taking over the world. If you haven't seen it yet, have you not been looking at social media? Cosplay is a mix of exciting craft skills, heady escapism and passion for pop culture that lets you be whoever you want, whenever you want. Cosplay has made its way into TV shows and documentaries, been included as part of film premieres and video game launches, it's even referenced in the comics, manga and media it comes from! Talk about meta. But what is this super popular hobby? Well, pick up this book, and it's twin A Guide to Movie and TV Cosplay, to get all the answers. Because it's more than just dressing up, promise. With a little bit of help from this handy, dandy guide to cosplay, you can get stuck in. Learn about the history of the hobby (it's been around longer than you'd think!), where it came from and how it got to be the way it is now, get your head around making and designing costumes, find out how about all the amazing skills people are using to make these costumes, and perhaps even try a few yourself. Who knows, you might be rocking out as Astro Boy, Chris Redfield or All Might at the next big comic con! So why not give it a try and play make believe for a day.
This book presents part of the proceedings of the Manufacturing and Materials track of the iM3F 2020 conference held in Malaysia. This collection of articles deliberates on the key challenges and trends related to manufacturing as well as materials engineering and technology in setting the stage for the world in embracing the fourth industrial revolution. It presents recent findings with regards to manufacturing and materials that are pertinent towards the realizations and ultimately the embodiment of Industry 4.0, with contributions from both industry and academia.
Are you working on a codebase where cost overruns, death marches, and heroic fights with legacy code monsters are the norm? Battle these adversaries with novel ways to identify and prioritize technical debt, based on behavioral data from how developers work with code. And that's just for starters. Because good code involves social design, as well as technical design, you can find surprising dependencies between people and code to resolve coordination bottlenecks among teams. Best of all, the techniques build on behavioral data that you already have: your version-control system. Join the fight for better code! Use statistics and data science to uncover both problematic code and the behavioral patterns of the developers who build your software. This combination gives you insights you can't get from the code alone. Use these insights to prioritize refactoring needs, measure their effect, find implicit dependencies between different modules, and automatically create knowledge maps of your system based on actual code contributions. In a radical, much-needed change from common practice, guide organizational decisions with objective data by measuring how well your development teams align with the software architecture. Discover a comprehensive set of practical analysis techniques based on version-control data, where each point is illustrated with a case study from a real-world codebase. Because the techniques are language neutral, you can apply them to your own code no matter what programming language you use. Guide organizational decisions with objective data by measuring how well your development teams align with the software architecture. Apply research findings from social psychology to software development, ensuring you get the tools you need to coach your organization towards better code. If you're an experienced programmer, software architect, or technical manager, you'll get a new perspective that will change how you work with code. What You Need: You don't have to install anything to follow along in the book. TThe case studies in the book use well-known open source projects hosted on GitHub. You'll use CodeScene, a free software analysis tool for open source projects, for the case studies. We also discuss alternative tooling options where they exist.
In reading this book, there are key themes that are constant such as the notion of identity and identity sets; e-sovereignty and privacy and most importantly the function of an Internet that is inclusive, not “controlled” by a few organizations for their own profitability. Certainly, “enterprising” the Internet has been a process over these past years and there is no intent to set judgement here but rather pause for a moment and reflect on the impact of these technologies to individuals. Yes, this is The Humanized Internet. These tenets may sound libertarian but in fact we are speaking about core principles to guide the development and perhaps the return of the Internet to the people especially those who are underserved . “Do No Evil” should not be a company motto but rather foundational to the development of any technologies that do impact us as individual consumers of these technologies and corresponding products. Indeed there is a polarity between an Internet that is used for mass empowerment and one that can be used for mass destruction. Privacy, security and the management of your digital footprint should be done by you. With the progression of Human and Machine interaction due to advances in Biotech and Brain/Computer interface Cloud, Virtual and Mixed Reality, we need to understand the impact of these technologies to identity overall. Do we require a new definition of identity? What is e-Sovereignty and it application moving forward if we posit that the institutions that exist today may indeed no longer be relevant in their current structure. We have read about the abuses when your data falls into the hands of other entities, intentionally or not. The Humanized Internet is therefore a call to action, your action.
Work in Flutter, a framework designed from the ground up for dual platform development, with support for native Java/Kotlin or Objective-C/Swift methods from Flutter apps. Write your next app in one language and build it for both Android and iOS. Deliver the native look, feel, and performance you and your users expect from an app written with each platform's own tools and languages. Deliver apps fast, doing half the work you were doing before and exploiting powerful new features to speed up development. Write once, run anywhere. Learn Flutter, Google's multi-platform mobile development framework. Instantly view the changes you make to an app with stateful hot reload and define a declarative UI in the same language as the app logic, without having to use separate XML UI files. You can also reuse existing platform-specific Android and iOS code and interact with it in an efficient and simple way. Use built-in UI elements - or build your own - to create a simple calculator app. Run native Java/Kotlin or Objective-C/Swift methods from your Flutter apps, and use a Flutter package to make HTTP requests to a Web API or to perform read and write operations on local storage. Apply visual effects to widgets, create transitions and animations, create a chat app using Firebase, and deploy everything on both platforms. Get native look and feel and performance in your Android and iOS apps, and the ability to build for both platforms from a single code base. What You Need: Flutter can be used for Android development on any Linux, Windows or macOS computer, but macOS is needed for iOS development.
Here is a book containing information about more than 500 Web sites about dinosaurs. Sites are rated for quality and cross-referenced by type, level of complexity, and availability of special features. |
You may like...
The path to becoming a data-driven…
Organisation for Economic Cooperation and Development
Paperback
R1,382
Discovery Miles 13 820
OECD report on public communication…
Organisation for Economic Cooperation and Development
Paperback
R1,953
Discovery Miles 19 530
Principles Of Business Information…
Ralph Stair, George Reynolds, …
Paperback
(1)
Enhancing access to and sharing of data…
Organisation for Economic Cooperation and Development
Paperback
R1,105
Discovery Miles 11 050
Institutions guaranteeing access to…
Organisation for Economic Cooperation and Development
Paperback
R1,384
Discovery Miles 13 840
OECD digital economy outlook 2020
Organisation for Economic Cooperation and Development
Paperback
R2,469
Discovery Miles 24 690
|