![]() |
![]() |
Your cart is empty |
||
Books > Business & Economics > Industry & industrial studies > Media, information & communication industries > Information technology industries
The research and policy evaluations presented in these papers represent a uniquely valuable evolving record of policy and research on high technology small firms through many changes in economic conditions and government policy approaches over more the a decade and a half. Specific issues in the book series cover many of the key industrial development policies adopted by developed, and developing, national governments since the early 1990's including, for example, writings on policy and practice concerning science parks, incubators, academic enterprise, industrial networking and the role of clusters in nurturing high technology small firms formation and growth. In particular, the on-going problem of early stage high technology funding has been a theme of constant concern since 1993, and because it remains resistant to amelioration, will endure into the future. Both the conference and the ensuing book series represent a pre-eminent vehicle for all the major international researchers concerned with high technology small firms to present their work to each other and the wider public.
“Jam packed with insights from women in the field,” this is an invaluable career guide for the aspiring or experienced female tech professional (Forbes) As the CEO of a startup, Tarah Wheeler is all too familiar with the challenges female tech professionals face on a daily basis. That’s why she’s teamed up with other high-achieving women within the field—from entrepreneurs and analysts to elite hackers and gamers—to provide a roadmap for women looking to jump-start, or further develop, their tech career. In an effort to dismantle the unconscious social bias against women in the industry, Wheeler interviews professionals like Brianna Wu (founder, Giant Spacekat), Angie Chang (founder, Women 2.0), Keren Elazari (TED speaker and cybersecurity expert), Katie Cunningham (Python educator and developer), and Miah Johnson (senior systems administrator) about the obstacles they have overcome to do what they love. Their inspiring personal stories are interspersed with tech-focused career advice. Readers will learn: • The secrets of salary negotiation • The best format for tech resumes • How to ace a tech interview • The perks of both contracting (W-9) and salaried full-time work • The secrets of mentorship • How to start your own company • And much more BONUS CONTENT: Perfect for its audience of hackers and coders, Women in Tech also contains puzzles and codes throughout—created by Mike Selinker (Lone Shark Games), Gabby Weidling (Lone Shark Games), and cryptographer Ryan “LostboY” Clarke—that are love letters to women in the industry. A distinguished anonymous contributor created the Python code for the cover of the book, which references the mother of computer science, Ada Lovelace. Run the code to see what it does!
We think we know everything about our smartphones. We use them
constantly. We depend on them for every conceivable purpose. We are
familiar with every inch of their compact frames. But there is more
to the smartphone than meets the eye.
Futureproofpaints a complete picture of the major disruptive forces
currently facing us -defining them, mapping them out and putting them
into context. First understand the Mindsets you need to be fully ready
for disruption -what qualities do you need to have, how can you develop
them and what should you do next?
BE READY, BE FUTUREPROOF
As threats to the security of information pervade the fabric of everyday life, A Vulnerable System describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our personal data, the integrity of our elections, and the stability of foreign relations between countries are increasingly at risk. Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed. A Vulnerable System delivers a long view of the history of information security, beginning with the creation of the first digital computers during the Cold War. From the key institutions of the so-called military industrial complex in the 1950s to Silicon Valley start-ups in the 2020s, the relentless pursuit of new technologies has come at great cost. The absence of knowledge regarding the history of information security has caused the lessons of the past to be forsaken for the novelty of the present, and has led us to be collectively unable to meet the needs of the current day. From the very beginning of the information age, claims of secure systems have been crushed by practical reality. The myriad risks to technology, Stewart reveals, cannot be addressed without first understanding how we arrived at this moment. A Vulnerable System is an enlightening and sobering history of a topic that affects crucial aspects of our lives.
Norbert Wiener, perhaps better than anyone else, understood the intimate and delicate relationship between control and communication: that messages intended as commands do not necessarily differ from those intended simply as facts. Wiener noted the paradox when the modem computer was hardly more than a laboratory curiosity. Thirty years later, the same paradox is at the heart of a severe identity crisis which con fronts computer programmers. Are they primarily members of "management" acting as foremen, whose task it is to ensure that orders emanating from executive suites are faithfully trans lated into comprehensible messages? Or are they perhaps sim ply engineers preoccupied with the technical difficulties of relating "software" to "hardware" and vice versa? Are they aware, furthermore, of the degree to which their work whether as manager or engineer-routinizes the work of others and thereby helps shape the structure of social class relation ships? I doubt that many of us who lived through the first heady and frantic years of software development-at places like the RAND and System Development Corporations-ever took time to think about such questions. The science fiction-like setting of mysterious machines, blinking lights, and torrents of numbers served to awe outsiders who could only marvel at the complexity of it all. We were insiders who constituted a secret society into which only initiates were welcome. So today I marvel at the boundless audacity of a rank out sider in writing a book like Programmers and Managers."
Building Intelligent Enterprises by leveraging the emerging and next-generation technologies to accelerate the adoption of digital transformation The speed of innovation and emerging IT technologies are changing at a very fast pace and enterprises are eager to join the digital revolution so they can stand above the competition and succeed as the enterprise of tomorrow. This book is an attempt to make the enterprise intelligent by providing the path to digital transformation and the adoption of new IT methods, tools and technologies. This book has been organized to cover the following topics: Digital Transformation, Design Thinking, Agile, DevOps, Robotic Process Automation, Internet of Things, Artificial Intelligence, Machine Learning, Blockchain, Drones, Augmented and Virtual Reality, 3D Printing, Big Data, Analytics, Cloud Computing, APIs, and SAP Leonardo. No prior knowledge of any technical coding or language is necessary to understand the content of this book. End-to-end storyline to accelerate the enterprise's digital transformation journey How an enterprise can stay relevant, compete, and perform in the digital economy How to leverage these technologies to build intelligent enterprises Understand and apply the emerging technologies across key business processes Industry-specific Use Cases for all technologies as a reference point to build the business case for implementation The book is very well suited towards the C-Suite executives, both IT and business leaders, directors and managers, project managers, solution architects, and all professionals who have an interest and desire to keep up-to-date with the latest technological trends, looking for a career change, want to help enterprise adapt and onboard the digital roadmap, or have an agenda to digitize key processes within the enterprise to make it intelligent.
Turn cyber intelligence into meaningful business decisions and reduce losses from cyber events Cyber Intelligence-Driven Risk provides a solution to one of the most pressing issues that executives and risk managers face: How can we weave information security into our business decisions to minimize overall business risk? In today's complex digital landscape, business decisions and cyber event responses have implications for information security that high-level actors may be unable to foresee. What we need is a cybersecurity command center capable of delivering, not just data, but concise, meaningful interpretations that allow us to make informed decisions. Building, buying, or outsourcing a CI-DR(TM) program is the answer. In his work with executives at leading financial organizations and with the U.S. military, author Richard O. Moore III has tested and proven this next-level approach to Intelligence and Risk. This book is a guide to: Building, buying, or outsourcing a cyber intelligence-driven risk program Understanding the functional capabilities needed to sustain the program Using cyber intelligence to support Enterprise Risk Management Reducing loss from cyber events by building new organizational capacities Supporting mergers and acquisitions with predictive analytics Each function of a well-designed cyber intelligence-driven risk program can support informed business decisions in the era of increased complexity and emergent cyber threats.
This book is a beginner's guide to AutomationML Edition 2, written for students, engineers, lecturers, developers and those interested. In guides through the basics of AutomationML Edition 2, CAEX and the AutomationML Editor. AutomationML stands for digitisation of engineering data and engineering workflows. AutomationML achieves both human readability and machine-readability. It is a method for converting data into digital information, and it supports the special needs of iterative engineering data exchange. AutomationML is in the hot spot of the digitisation of automation engineering data. It enables the modelling and transport of engineering data in a vendor neutral and machine-readable models, a valuable source of digital innovation. Machine readable engineering data makes the data accessible and interpretable by software, enabling a plethora of opportunities. This book carefully introduces AutomationML, its goals, values and innovations. It teaches the architecture of AutomationML and explains the language elements with a multitude of examples and step-by-step instructions. Additional material to the book and more information about AutomationML on the website: https://www.automationml.org/about-automationml/publications/amlbook/
This open access book presents the foundations of the Big Data research and innovation ecosystem and the associated enablers that facilitate delivering value from data for business and society. It provides insights into the key elements for research and innovation, technical architectures, business models, skills, and best practices to support the creation of data-driven solutions and organizations. The book is a compilation of selected high-quality chapters covering best practices, technologies, experiences, and practical recommendations on research and innovation for big data. The contributions are grouped into four parts: * Part I: Ecosystem Elements of Big Data Value focuses on establishing the big data value ecosystem using a holistic approach to make it attractive and valuable to all stakeholders. * Part II: Research and Innovation Elements of Big Data Value details the key technical and capability challenges to be addressed for delivering big data value. * Part III: Business, Policy, and Societal Elements of Big Data Value investigates the need to make more efficient use of big data and understanding that data is an asset that has significant potential for the economy and society. * Part IV: Emerging Elements of Big Data Value explores the critical elements to maximizing the future potential of big data value. Overall, readers are provided with insights which can support them in creating data-driven solutions, organizations, and productive data ecosystems. The material represents the results of a collective effort undertaken by the European data community as part of the Big Data Value Public-Private Partnership (PPP) between the European Commission and the Big Data Value Association (BDVA) to boost data-driven digital transformation.
In the Age of Software, will your business dominate and maintain relevance—or will it become a digital relic? As tech giants and startups disrupt every market, those who master large-scale software delivery will define the economic landscape of the 21st century, just as the masters of mass production defined the landscape in the 20th. Unfortunately, business and technology leaders are woefully ill-equipped to solve the problems posed by digital transformation. At the current rate of disruption, half of S&P 500 companies will be replaced in the next ten years. A new approach is needed. In Project to Product, Value Stream Network pioneer and technology business leader Dr. Mik Kersten introduces the Flow Framework—a new way of seeing, measuring, and managing software delivery. The Flow Framework will enable your company's evolution from project-oriented dinosaur to product-centric innovator that thrives in the Age of Software. If you're driving your organization's transformation at any level, this is the book for you.
In order to achieve long-term profitability and assure survival for their companies, managers must be informed, imaginative, and capable of adapting to shifting circumstances. Practical decisions rather than theories hold the upper ground. Business, Marketing, and Management Principles for IT and Engineering supplies the understanding required to effectively manage an organization in an increasingly competitive global market. Using case studies, the book illustrates the principles, policies, and management practices used by some of the most successful companies around the world. The real-world case studies supply valuable insight into the range of issues that confront decision makers in business. By explaining how to develop effective strategies and business plans, the text supplies both the concepts and the tools to stay on track with those plans. It also: Explains how to evaluate the pros and cons of your organizational policies and how to effect policies for maximum synergy Covers product development, sales, marketing, pricing, and financial analysis Illustrates the right and wrong ways to implement the principles discussed, with case studies of hi-tech companies such as Apple, Google, Cisco, IBM, Microsoft, Toyota, ITT, and Bloomberg Dimitris N. Chorafas provides valuable insight garnered over half a century of advising financial institutions and multinational industrial corporations. Dr. Chorafas explains how to develop competitive products and use pricing strategies to achieve an edge over your competition. He also includes case studies that examine the price wars in the computer industry. This book supplies a realistic look into the positive and negative aspects of various policies and whether or not current practices related to forecasting, planning, organizing, staffing, directing, and controlling have produced th
This book is the first part of Applications and Trends in Fintech, which serves as a comprehensive guide to the advanced topics in fintech, including the deep learning and natural language processing algorithms, blockchain design thinking, token economics, cybersecurity, cloud computing and quantum computing, compliance and risk management, and global fintech trends. Readers will gain knowledge about the applications of fintech in finance and its latest developments as well as trends.This fourth volume covers the foundation of fintech, which is ethics and governance, and advanced topics in two of the most important technologies, artificial intelligence and blockchain. Together with the second part in applications and trends (fifth volume), these two books will deepen readers' understanding of the fintech fundamentals covered in previous volumes through various applications and analysis of impacts and trends.Bundle set: Global Fintech Institute-Chartered Fintech Professional Set I
Although there are numerous advertising texts available to the advertising student today, few focus solely on account planning and even fewer still view the digital landscape as permeating every aspect of advertising. Advertising Account Planning in the Digital Media Landscape seeks to bridge that gap by providing a strategic understanding of what the account planner does, a thorough explanation of the kinds of research needed for the account planning process to be successful, and all explained within a digital media mindset. Written in an engaging manner, Advertising Account Planning offers tools and information for effective account planning. Rather than simply adding a digital approach to the traditional understanding of account planning, this book recognizes that advertising in the digital landscape is no longer "new": rather, it's fundamental to understanding how advertising functions. This core text incorporates insights from current forward-thinking advertising professionals as well as suggestions for assignments, discussions and additional readings.
Its vast infrastructure projects now extend from the ocean floor to outer space, and from Africa's megacities into rural America. China is wiring the world, and, in doing so, rewriting the global order. As things stand, the rest of the world still has a choice. But the battle for tomorrow will require America and its allies to take daring risks in uncertain political terrain. Unchecked, China will reshape global flows of data to reflect its interests. It will develop an unrivalled understanding of market movements, the deliberations of foreign competitors, and the lives of countless individuals enmeshed in its systems. Networks create large winners, and this is one contest that democracies can't afford to lose. Taking readers on a global tour of these emerging battlefields, Jonathan Hillman reveals what China's digital footprint looks like on the ground, and explores the dangers of a world in which all routers lead to Beijing.
A fast-growing social media marketing company, TechCo encourages all of its employees to speak up. By promoting open dialogue across the corporate hierarchy, the firm has fostered a uniquely engaged workforce and an enviable capacity for change. Yet the path hasn't always been easy. TechCo has confronted a number of challenges, and its experience reveals the essential elements of bureaucracy that remain even when a firm sets out to discard them. Through it all, TechCo serves as a powerful new model for how firms can navigate today's rapidly changing technological and cultural climate. Catherine J. Turco was embedded within TechCo for ten months. The Conversational Firm is her ethnographic analysis of what worked at the company and what didn't. She offers multiple lessons for anyone curious about the effect of social media on the corporate environment and adds depth to debates over the new generation of employees reared on social media: Millennials who carry their technological habits and expectations into the workplace. Marshaling insights from cultural and economic sociology, organizational theory, economics, technology studies, and anthropology, The Conversational Firm offers a nuanced analysis of corporate communication, control, and culture in the social media age.
"Blockchains will matter crucially; this book, beautifully and clearly written for a wide audience, powerfully demonstrates how." -Lawrence Lessig "Attempts to do for blockchain what the likes of Lawrence Lessig and Tim Wu did for the Internet and cyberspace-explain how a new technology will upend the current legal and social order... Blockchain and the Law is not just a theoretical guide. It's also a moral one." -Fortune Bitcoin has been hailed as an Internet marvel and decried as the preferred transaction vehicle for criminals. It has left nearly everyone without a computer science degree confused: how do you "mine" money from ones and zeros? The answer lies in a technology called blockchain. A general-purpose tool for creating secure, decentralized, peer-to-peer applications, blockchain technology has been compared to the Internet in both form and impact. Blockchains are being used to create "smart contracts," to expedite payments, to make financial instruments, to organize the exchange of data and information, and to facilitate interactions between humans and machines. But by cutting out the middlemen, they run the risk of undermining governmental authorities' ability to supervise activities in banking, commerce, and the law. As this essential book makes clear, the technology cannot be harnessed productively without new rules and new approaches to legal thinking. "If you...don't 'get' crypto, this is the book-length treatment for you." -Tyler Cowen, Marginal Revolution "De Filippi and Wright stress that because blockchain is essentially autonomous, it is inflexible, which leaves it vulnerable, once it has been set in motion, to the sort of unforeseen consequences that laws and regulations are best able to address." -James Ryerson, New York Times Book Review
Dieses Buch liefert einen Uberblick uber alle wichtigen Aspekte des Medienmanagements. Zusatzlich ermoglichen Grundlagenartikel zum Medienmanagement aus interdisziplinarer Perspektive ein umfassendes Verstandnis der Medienbranche, ihrer Wirkungen und Handlungsimplikationen. Fuhrende Vertreter aus dem Feld der Medien geben einen umfassenden Einblick in den State-of-the-Art des Gebiets. Durch die ebenfalls enthaltenen Perspektiven anderer, nicht betriebswirtschaftlicher Fachdisziplinen - die hier integrativ zusammenfugt werden - eignet sich das Handbuch auch als Literatur fur managementbezogene Fragestellungen aus den Disziplinen Medienrecht, Medienpsychologie, Medienokonomie und Kommunikationswissenschaft.
Jeffrey James is one of the relatively few academics to have systematically taken on the topic of IT and development. In this timely book he undertakes a methodological critique of prominent topics in the debate. Challenging the existing literature by international and governmental institutions, the book looks not only at the digital divide but also at issues such as digital preparedness, leapfrogging and low-cost computers. James also raises important issues which have been largely neglected in the literature, such as the implications for poverty in developing countries and the macroeconomics of mobile phones. The book argues that benefits from IT are captured in a different form in developing as opposed to developed countries. In the latter, gains come from technology ownership and use, whereas in the former, benefits cannot be captured as much in this way because ownership is more limited. Interestingly, the author shows that developing countries have responded to this distinction with a series of local innovations which are often low-cost and pro-poor. This finding contradicts the widely held view that poor countries are unable to generate major innovations within their own borders. Accessible and clearly written, this book will be of great interest to scholars of development economics and development studies, and is relevant to both policy-makers and academics.
Teaches the machine learning process for business students and professionals using automated machine learning, a new development in data science that requires only a few weeks to learn instead of years of training Though the concept of computers learning to solve a problem may still conjure thoughts of futuristic artificial intelligence, the reality is that machine learning algorithms now exist within most major software, including Websites and even word processors. These algorithms are transforming society in the most radical way since the Industrial Revolution, primarily through automating tasks such as deciding which users to advertise to, which machines are likely to break down, and which stock to buy and sell. While this work no longer always requires advanced technical expertise, it is crucial that practitioners and students alike understand the world of machine learning. In this book, Kai R. Larsen and Daniel S. Becker teach the machine learning process using a new development in data science: automated machine learning (AutoML). AutoML, when implemented properly, makes machine learning accessible by removing the need for years of experience in the most arcane aspects of data science, such as math, statistics, and computer science. Larsen and Becker demonstrate how anyone trained in the use of AutoML can use it to test their ideas and support the quality of those ideas during presentations to management and stakeholder groups. Because the requisite investment is a few weeks rather than a few years of training, these tools will likely become a core component of undergraduate and graduate programs alike. With first-hand examples from the industry-leading DataRobot platform, Automated Machine Learning for Business provides a clear overview of the process and engages with essential tools for the future of data science.
Understanding the key IT issues facing firms within their surrounding contexts is critical for the firm, government, and their international counterparts.In response to the dominant and pervasive bias in Information Systems (IS) research towards American and Western views, the World IT Project was launched and is the largest study of its kind in the field. This book captures the organizational, technological, and individual issues of IT employees across 37 countries.The book enables management and staff to formulate business and IT-related policies and strategies. Likewise, it allows policymakers, governments and vendors to address important issues at the national level as well as to respond to the needs of partners and stakeholders in other countries. It also offers current and future academic scholars a grounded understanding of the international IT environment and provides a sound foundation to launch many international IT studies.
A sweeping, revisionist historical analysis of telecommunications networks, from the dawn of the republic to the 21st century. Telecommunications networks are vast, intricate, hugely costly systems for exchanging messages and information-within cities and across continents. From the Post Office and the telegraph to today's internet, these networks have sown domestic division while also acting as sources of international power. In Crossed Wires, Dan Schiller, who has conducted archival research on US telecommunications for more than forty years, recovers the extraordinary social history of the major network systems of the United States. Drawing on arrays of archival documents and secondary sources, Schiller reveals that this history has been shaped by sharp social and political conflict and is embedded in the larger history of an expansionary US political economy. Schiller argues that networks have enabled US imperialism through a a recurrent "American system" of cross-border communications. Three other key findings wind through the book. First, business users of networks—more than carriers, and certainly more than residential users—have repeatedly determined how telecommunications systems have developed. Second, despite their current importance for virtually every sphere of social life, networks have been consecrated above all to aiding the circulation of commodities. Finally, although the preferences of executives and officials have broadly determined outcomes, these elites have repeatedly had to contend against the ideas and organizations of workers, social movement activists, and other reformers. This authoritative and comprehensive revisionist history of US telecommunications argues that not technology but a dominative—and contested—political economy drove the evolution of this critical industry.
Written with the verve of such works as The Big Short, The History of the Future, and The Spider Network, here is the fascinating, true story of the rise of Ethereum, the second-biggest digital asset in the world, the growth of cryptocurrency, and the future of the internet as we know it. Everyone has heard of Bitcoin, but few know about the second largest cryptocurrency, Ethereum, which has been heralded as the "next internet." The story of Ethereum begins with Vitalik Buterin, a supremely gifted nineteen-year-old autodidact who saw the promise of blockchain when the technology was in its earliest stages. He convinced a crack group of coders to join him in his quest to make a super-charged, global computer. The Infinite Machine introduces Vitalik's ingenious idea and unfolds Ethereum's chaotic beginnings. It then explores the brilliant innovation and reckless greed the platform-an infinitely adaptable foundation for experimentation and new applications-has unleashed and the consequences that resulted as the frenzy surrounding it grew: increased regulatory scrutiny, incipient Wall Street interest, and the founding team's effort to get the Ethereum platform to scale so it can eventually be accessible to the masses. Financial journalist and cryptocurrency expert Camila Russo details the wild and often hapless adventures of a team of hippy-anarchists, reluctantly led by an ambivalent visionary, and lays out how this new foundation for the internet will spur both transformation and fraud-turning some into millionaires and others into felons-and revolutionize our ideas about money.
|
![]() ![]() You may like...
Connect: Writing For Online Audiences
Maritha Pritchard, Karabo Sitto
Paperback
![]()
The Digital Silk Road - China's Quest To…
Jonathan E. Hillman
Paperback
|