Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > Human-computer interaction
This book offers a comprehensive guide to implementing SAP and HANA on private, public and hybrid clouds. Cloud computing has transformed the way organizations run their IT infrastructures: the shift from legacy monolithic mainframes and UNIX platforms to cloud based infrastructures offering ubiquitous access to critical information, elastic provisioning and drastic cost savings has made cloud an essential part of every organization's business strategy. Cloud based services have evolved from simple file sharing, email and messaging utilities in the past, to the current situation, where their improved technical capabilities and SLAs make running mission-critical applications such as SAP possible. However, IT professionals must take due care when deploying SAP in a public, private or hybrid cloud environment. As a foundation for core business operations, SAP cloud deployments must satisfy stringent requirements concerning their performance, scale and security, while delivering measurable improvements in IT efficiency and cost savings. The 2nd edition of "SAP on the Cloud" continues the work of its successful predecessor released in 2013, providing updated guidance for deploying SAP in public, private and hybrid clouds. To do so, it discusses the technical requirements and considerations necessary for IT professionals to successfully implement SAP software in a cloud environment, including best-practice architectures for IaaS, PaaS and SaaS deployments. The section on SAP's in-memory database HANA has been significantly extended to cover Suite on HANA (SoH) and the different incarnations of HANA Enterprise Cloud (HEC) and Tailored Datacenter Integration (TDI). As cyber threats are a significant concern, it also explores appropriate security models for defending SAP cloud deployments against modern and sophisticated attacks. The reader will gain the insights needed to understand the respective benefits and drawbacks of various deployment models and how SAP on the cloud can be used to deliver IT efficiency and cost-savings in a secure and agile manner.
This book constitutes the refereed proceedings of the 9th International Conference on Interactive Digital Storytelling, ICIDS 2016, held in Los Angeles, CA, USA, in November 2016. The 26 revised full papers and 8 short papers presented together with 9 posters, 4 workshop, and 3 demonstration papers were carefully reviewed and selected from 88 submissions. The papers are organized in topical sections on analyses and evaluation systems; brave new ideas; intelligent narrative technologies; theoretical foundations; and usage scenarios and applications.
Succeed in managing Oracle Application Express (APEX) environments. This book focuses on creating the right combination of scalability, high-availability, backup and recovery, integrity, and resource control. The book covers everything from simple to enterprise-class deployments, with emphasis on enterprise-level requirements and coverage of cloud and hybrid-cloud scenarios. Many books cover how to develop applications in Oracle APEX. It's a tool with a fast-growing user-base as developers come to know how quick and easy it is to create new applications that run in a browser. However, just getting an application off the ground is only a small part of a bigger picture. Applications must be supported. They must be available when users need them. They must be robust against disaster and secure against malicious attack. These are the issues addressed in Oracle Application Express Administration. These are the issues that when tackled successfully lead to long term success in using Oracle APEX as a rapid application-development toolset. Readers of this book learn how to install the Oracle APEX engine in support of small-scale projects such as at the departmental level, and in support of enterprise-level projects accessed by thousands of users across dozens of time zones. Readers learn to take advantage of Oracle Database's underlying feature set in regards to application scalability and performance, integrity, security, high-availability, and robustness against failure and data loss. Oracle Application Express Administration also describes different cloud solutions, integration with Oracle E-Business Suite, and helps in taking advantage of multitenancy in Oracle Database 12c and beyond. Covers important enterprise considerations such as scalability, robustness, high-availability. Describes cloud-based application deployment scenarios Focuses on creating the right deployment environment for long-term success What You Will Learn Install, upgrade, and configure robust APEX environments Back up and recover APEX applications and their data Monitor and tune the APEX engine and its applications Benefit from new administration features in APEX 5.0 Run under multi-tenant architecture in Oracle Database 12c Manage the use of scarce resources with Resource Manager Secure your data with advanced security features Build high-availability into your APEX deployments Integrate APEX with Oracle E-Business Suite Who This Book Is For Architects, administrators, and developers who want to better understand how APEX works in a corporate environment. Readers will use this book to design deployment architectures around Oracle Database strengths like multi-tenancy, resource management, and high availability. The book is also useful to administrators responsible for installation and upgrade, backup and recovery, and the ongoing monitoring of the APEX engine and the applications built upon it.
This book introduces the optimal online charging control of electric vehicles (EVs) and battery energy storage systems (BESSs) in smart grids. The ultimate goal is to minimize the total energy cost as well as reduce the fluctuation of the total power flow caused by the integration of the EVs and renewable energy generators. Using both theoretic analysis and data-driven numerical results, the authors reveal the effectiveness and efficiency of the proposed control techniques. A major benefit of these control techniques is their practicality, since they do not rely on any non-causal knowledge of future information. Researchers, operators of power grids, and EV users will find this to be an exceptional resource. It is also suitable for advanced-level students of computer science interested in networks, electric vehicles, and energy systems.
This book summarizes the results of Design Thinking Research carried out at Stanford University in Palo Alto, California, USA and Hasso Plattner Institute in Potsdam, Germany. The authors offer readers a closer look at Design Thinking with its processes of innovations and methods. The contents of the articles range from how to design ideas, methods and technologies via creativity experiments and wicked problem solutions, to creative collaboration in the real world and the connectivity of designers and engineers. But the topics go beyond this in their detailed exploration of design thinking and its use in IT systems engineering fields and even from a management perspective. The authors show how these methods and strategies work in companies, introduce new technologies and their functions and demonstrate how Design Thinking can influence as diverse a topic area as marriage. Furthermore, we see how special design thinking use functions in solving wicked problems in complex fields. Thinking and creating innovations are basically and inherently human - so is Design Thinking. Due to this, Design Thinking is not only a factual matter or a result of special courses nor of being gifted or trained: it's a way of dealing with our environment and improving techniques, technologies and life.
This book presents the latest research on the software crowdsourcing approach to develop large and complex software in a cloud-based platform. It develops the fundamental principles, management organization and processes, and a cloud-based infrastructure to support this new software development approach. The book examines a variety of issues in software crowdsourcing processes, including software quality, costs, diversity of solutions, and the competitive nature of crowdsourcing processes. Furthermore, the book outlines a research roadmap of this emerging field, including all the key technology and management issues for the foreseeable future. Crowdsourcing, as demonstrated by Wikipedia and Facebook for online web applications, has shown promising results for a variety of applications, including healthcare, business, gold mining exploration, education, and software development. Software crowdsourcing is emerging as a promising solution to designing, developing and maintaining software. Preliminary software crowdsourcing practices and platforms, including Apple's App Store and TopCoder, demonstrate the advantages of crowdsourcing in terms of software ecosystem expansion and product quality improvement.
This book provides a comprehensive overview of the emerging technologies for next-generation 5G mobile communications, with insights into the long-term future of 5G. Written by international leading experts on the subject, this contributed volume covers a wide range of technologies, research results, and networking methods. Key enabling technologies for 5G systems include, but are not limited to, millimeter-wave communications, massive MIMO technology and non-orthogonal multiple access. 5G will herald an even greater rise in the prominence of mobile access based upon both human-centric and machine-centric networks. Compared with existing 4G communications systems, unprecedented numbers of smart and heterogeneous wireless devices will be accessing future 5G mobile systems. As a result, a new paradigm shift is required to deal with challenges on explosively growing requirements in mobile data traffic volume (1000x), number of connected devices (10-100x), typical end-user data rate (10-100x), and device/network lifetime (10x). Achieving these ambitious goals calls for revolutionary candidate technologies in future 5G mobile systems. Designed for researchers and professionals involved with networks and communication systems, 5G Mobile Communications is a straightforward, easy-to-read analysis of the possibilities of 5G systems.
The two-volume set LNCS 10046 and 10047 constitutes the proceedings of the 8th International Conference on Social Informatics, SocInfo 2016, held in Bellevue, WA, USA, in November 2016. The 33 full papers and 34 poster papers presented in this volume were carefully reviewed and selected from 120 submissions. They are organized in topical sections named: networks, communities, and groups; politics, news, and events; markets, crowds, and consumers; and privacy, health, and well-being.
This book constitutes the thoroughly refereed proceedings of the 5th National Conference of Social Media Processing, SMP 2016, held in Nanchang, China, in October 2016. The 24 revised full papers presented were carefully reviewed and selected from 109 submissions. The papers address issues such as: mining social media and applications; natural language processing; data mining; information retrieval; emergent social media processing problems.
This book constitutes the thoroughly refereed proceedings of the 7th International Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2015, held in Cotonou, Benin, in December 2015. The 25 papers were carefully selected from 51 submissions and cover topics such as communication infrastructure, access to information, green IT applications and security, health.
This book examines the possibilities of incorporating elements of user-centred design (UCD) such as user experience (UX) and usability with agile software development. It explores the difficulties and problems inherent in integrating these two practices despite their relative similarities, such as their emphasis on stakeholder collaboration. Developed from a workshop held at NordiCHI in 2014, this edited volume brings together researchers from across the software development, UCD and creative design fields to discuss the current state-of-the-art. Practical case studies of integrating UCD in Agile development across diverse contexts are presented, whilst the different futures for UCD and other design practices in the context of agile software development are identified and explored. Integrating User Centred Design in Agile Development will be ideal for researchers, designers and academics who are interested in software development, user-centred design, agile methodologies and related areas.
This SpringerBrief provides an overview of contemporary innovative technologies and discusses their impact on our daily lives. Written from a technical perspective, and yet using language and terminology accessible to non-experts, it describes the technologies, the key players in each area, the most popular apps and services (and their pros and cons), as well as relevant usage statistics. It is targeted at a broad audience, ranging from young gadget enthusiasts to senior citizens trying to get used to new devices and associated apps. By offering a structured overview of some of the most useful technologies current available, putting them in perspective, and suggesting numerous resources for further exploration, the book gives its readers a clear path for learning new topics through apps and web-based resources, making better choices of apps and websites for frequent use, using social networks effectively, protecting their privacy and staying safe online, and enjoying the opportunities brought about by these technological advances without being completely consumed by them.
Highlights key research currently being undertaken within the field of telepresence, providing the most detailed account of the field to date, advancing our understanding of a fundamental property of all media - the illusion of presence; the sense of "being there" inside a virtual environment, with actual or virtual others. This collection has been put together by leading international scholars from America, Europe, and Asia. Together, they describe the state-of-the-art in presence theory, research and technology design for an advanced academic audience. Immersed in Media provides research that can help designers optimize presence for users of advanced media technologies such as virtual and augmented reality, collaborative social media, robotics, and artificial intelligence and lead us to better understand human cognition, emotion and behaviour.
This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list.Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems.
This book interconnects two essential disciplines to study the perception of speech: Neuroscience and Quality of Experience, which to date have rarely been used together for the purposes of research on speech quality perception. In five key experiments, the book demonstrates the application of standard clinical methods in neurophysiology on the one hand and of methods used in fields of research concerned with speech quality perception on the other. Using this combination, the book shows that speech stimuli with different lengths and different quality impairments are accompanied by physiological reactions related to quality variations, e.g., a positive peak in an event-related potential. Furthermore, it demonstrates that - in most cases - quality impairment intensity has an impact on the intensity of physiological reactions.
The book reports on advanced topics in the areas of wearable robotics research and practice. It focuses on new technologies, including neural interfaces, soft wearable robots, sensors and actuators technologies, and discusses important regulatory challenges, as well as clinical and ethical issues. Based on the 2nd International Symposium on Wearable Robotics, WeRob2016, held October 18-21, 2016, in Segovia, Spain, the book addresses a large audience of academics and professionals working in government, industry, and medical centers, and end-users alike. It provides them with specialized information and with a source of inspiration for new ideas and collaborations. It discusses exemplary case studies highlighting practical challenges related to the implementation of wearable robots in a number of fields. One of the focus is on clinical applications, which was encouraged by the colocation of WeRob2016 with the International Conference on Neurorehabilitation, INCR2016. Additional topics include space applications and assistive technologies in the industry. The book merges together the engineering, medical, ethical and political perspectives, thus offering a multidisciplinary, timely snapshot of the field of wearable technologies.
This book constitutes the refereed post-proceedings of the 11th IFIP WG 5.1 International Conference on Product Lifecycle Management, PLM 2014, held in Yokohama, Japan, in July 2014. The 51 full papers presented were carefully reviewed and selected from 77 submissions. They are organized in the following topical sections: BIM operations, maintenance, and renovation; BIM concepts and lifecycle management; design and education; naval engineering and shipbuilding; aeronautical and automotive engineering; industry and consumer products; interoperability, integration, configuration, systems engineering; change management and maturity; knowledge engineering; knowledge management; service and manufacturing; and new PLM.
This book constitutes the refereed proceedings of the 14th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2013, held in Dresden, Germany, in September/October 2013. The 75 revised papers were carefully selected for inclusion in this volume. They provide a comprehensive overview of identified challenges and recent advances in various collaborative network (CN) domains and their applications with a particular focus on the support for reindustrialization. The papers have been organized in the following topical sections: product-service ecosystems; innovation in networks; strategies to build collaborative networks; collaboration related processes and performance; models and meta-models of collaboration; cloud-based support to collaborative networks; collaborative platforms; services and service design; sustainable collaborative networks; event-driven collaborative networks; social-semantic enterprise; and risks and trust.
This book constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference "Creating Value for All Through IT" on Transfer and Diffusion of IT, TDIT 2014, held in Aalborg, Denmark, in June 2014. The 18 revised full papers presented together with 5 research-in-progress papers, 2 experience reports and a panel were carefully reviewed and selected from 37 submissions. The full papers are organized in the following topical sections: creating value; creating value through software development; and creating value through applications.
This book constitutes the revised selected papers from the 10th Global Sourcing Workshop held in Val d'Isere, France, in February 2016. The 11 papers presented in this volume were carefully reviewed and selected from 47 submissions. The book offers a review of the key topics in outsourcing and offshoring of information technology and business services offering practical frameworks that serve as a tool kit to students and managers. The range of topics covered is wide and diverse, but predominately focused on how to achieve success in shared services and outsourcing. More specifically, the book examines outsourcing decisions and management practices, giving specific attention to shared services that have become one of the dominant sourcing models. The topics discussed combine theoretical and practical insights regarding challenges that industry leaders, policy makers, and professionals face or should be concerned with. Case studies from various organizations, industries and countries such as UK, Italy, The Netherlands, Canada, Australia and Denmark complete the book.
This book constitutes the refereed proceedings of the 10th IFIP WG 5.1 International Conference on Product Lifecycle Management, PLM 2013, held in Nantes, France, in July 2013. The 63 full papers presented together with 2 keynote talks were carefully reviewed and selected from 91 submissions. They are organized in the following topical sections: PLM for sustainability, traceability and performance; PLM infrastructure and implementation processes; capture and reuse of product and process information; PLM and knowledge management; enterprise system integration; PLM and influence of/from social networks; PLM maturity and improvement concepts; PLM and collaborative product development; PLM virtual and simulation environments; and building information modeling.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection VIII describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: control systems security, infrastructure security, infrastructure modeling and simulation, risk and impact assessment, and advanced techniques. This book is the eighth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of seventeen edited papers from the 8th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, DC, USA in the spring of 2014. Critical Infrastructure Protection VIII is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
To date, the relation between multilingualism and the Semantic Web has not yet received enough attention in the research community. One major challenge for the Semantic Web community is to develop architectures, frameworks and systems that can help in overcoming national and language barriers, facilitating equal access to information produced in different cultures and languages. As such, this volume aims at documenting the state-of-the-art with regard to the vision of a Multilingual Semantic Web, in which semantic information will be accessible in and across multiple languages. The Multilingual Semantic Web as envisioned in this volume will support the following functionalities: (1) responding to information needs in any language with regard to semantically structured data available on the Semantic Web and Linked Open Data (LOD) cloud, (2) verbalizing and accessing semantically structured data, ontologies or other conceptualizations in multiple languages, (3) harmonizing, integrating, aggregating, comparing and repurposing semantically structured data across languages and (4) aligning and reconciling ontologies or other conceptualizations across languages. The volume is divided into three main sections: Principles, Methods and Applications. The section on "Principles" discusses models, architectures and methodologies that enrich the current Semantic Web architecture with features necessary to handle multiple languages. The section on "Methods" describes algorithms and approaches for solving key issues related to the construction of the Multilingual Semantic Web. The section on "Applications" describes the use of Multilingual Semantic Web based approaches in the context of several application domains. This volume is essential reading for all academic and industrial researchers who want to embark on this new research field at the intersection of various research topics, including the Semantic Web, Linked Data, natural language processing, computational linguistics, terminology and information retrieval. It will also be of great interest to practitioners who are interested in re-examining their existing infrastructure and methodologies for handling multiple languages in Web applications or information retrieval systems.
Pull back the curtain on making fun and innovative costumes and accessories incorporating technologies like low-cost microprocessors, sensors and programmable LEDs. Fashion tech can require skills in design, pattern-making, sewing, electronics, and maybe 3D printing. Besides the tech skills, making a good costume or accessory also requires knowledge of the intangibles of what makes a good costume. This book is a collaboration between two technologists and a veteran teacher, costumer, and choreographer. Regardless of whether you are coming at this from the theater costuming, sewing, or electronics side, the authors will help you get started with the other skills you need. More than just a book of projects (although it has those too), Practical Fashion Tech teaches why things are done a certain way to impart the authors' collective wealth of experience. Whether you need a book for a wearable tech class or you just want to get started making fantastic costumes and wearables on your own, Practical Fashion Tech will get you there. What you will learn: The fundamentals of both the sewing and the technology aspects of wearable tech for fashion How to make a memorable costume that reacts to its wearer or environment Ideas for using this book as a textbook Who this is for: Electronics enthusiasts, hipsters, costume designers, teachers, and students who want to learn how to make fashion or cosplay wearables. Cosplay fans wanting to incorporate sensors and more into their costumes. |
You may like...
Antonia's Way - My Everyday Essentials…
Antonia De Luca
Paperback
(5)
Can We Be Safe? - The Future Of Policing…
Ziyanda Stuurman
Paperback
(1)
Secondary Metabolites from Medicinal…
Rakesh Kumar Bachheti, Archana Bachheti
Hardcover
R4,746
Discovery Miles 47 460
|