![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
This book presents the proceedings of The EAI International Conference on Computer Science: Applications in Engineering and Health Services (COMPSE 2019). The conference highlighted the latest research innovations and applications of algorithms designed for optimization applications within the fields of Science, Computer Science, Engineering, Information Technology, Management, Finance and Economics and Health Systems. Focusing on a variety of methods and systems as well as practical examples, this conference is a significant resource for post graduate-level students, decision makers, and researchers in both public and private sectors who are seeking research-based methods for modelling uncertain and unpredictable real-world problems.
Digital art practitioners work under the constant threat of a medium - the digital - that objectifies the self and depersonalises artistic identities. If digital technology is a pharmakon in that it can be either cure or poison, with regard to digital art practices the digital may have in fact worked as a placebo that has allowed us to push back the date in which the crisis between digital and art will be given serious thought. This book is hence concerned with an analysis of such a relationship and proposes their rethinking in terms of an ethico-phenomenological practice informed by an in-depth understanding of the digital medium. Giuseppe Torre engages with underground cultures such as Free and Libre Open Source Software (FLOSS) and its ties with art discourse. The discussion is informed by various philosophical discourses and media theories, with a focus on how such ideas connect back to the existing literature in performance studies. Replete with examples of artwork and practices, this book will be of great interest to students and scholars of theatre and performance studies, art and technology.
Make the most of today's JavaScript--even if you've never programmed anything before. JavaScript Absolute Beginner's Guide, Third Edition is the fastest way to learn JavaScript, starting with the basics and gradually going deeper and broader into all the techniques you need to begin building highly scalable, performant web apps and experiences. Do what you want, the way you want, one incredibly easy step at a time! Learn all this, and much more: Start fast with the basics: values, variables, functions, conditionals, loops, closures, and more Create well-organized, clear code that's easy to reuse and improve Learn proven best practices to build web apps that scale with outstanding performance Make the most of powerful object-oriented techniques to build complex, extensible apps Wrangle data like a pro by learning how to use the popular JSON standard, arrays, web storage, and more Translate your ideas into visually compelling and interactive content by learning how to work with the DOM Identify and fix issues quickly by learning how to use the in-browser development tools Understand the ins and outs of events and how you can use them to react to actions the user or the page will perform Learn how to ensure your code runs lightning-fast with extra coverage of performance optimizations and techniques you can use Learn the basics that set you up to more quickly use modern web frameworks like React, Vue, Next.js, and Nuxt Explore advanced features such as object destructuring, making web requests, the class syntax, accessing your webcam, variable hoisting, and more Get up-to-speed on the latest JavaScript enhancements proposed by the EcmaScript standard
This book discusses blockchain technology and its potential applications in digital government and the public sector. With its robust infrastructure and append-only record system, blockchain technology is being increasingly employed in the public sector, specifically where trustworthiness and security are of importance. Written by leading scholars and practitioners, this edited volume presents challenges, benefits, regulations, frameworks, taxonomies, and applications of blockchain technology in the public domain. Specifically, the book analyzes the implementation of blockchain technologies in the public sector and the potential reforms it would bring. It discusses emerging technologies and their role in the implementation of blockchain technologies in the public sector. The book details the role of blockchain in the creation of public value in the delivery of public sector services. The book analyzes effects, impacts, and outcomes from the implementation of blockchain technologies in the public sector in select case studies. Providing up-to-date information on important developments regarding blockchain in government around the world, this volume will appeal to academics, researchers, policy-makers, public managers, international organizations, and technical experts looking to understand how blockchain can enhance public service delivery.
'I loved her then, I love her now. Annie's back and she's better than ever! Fun, feel good and feisty - Annie Valentine is the woman you want to share a cocktail with!' Portia MacIntoshHer passion is fashion... but she's on a budget! Personal shopper Annie Valentine is about to hit the big time: presenting a glamorous TV makeover series! This is it for Annie and her little family. No more scrimping and saving, finally all her hard work has paid off. But life in the spotlight isn't all it's cracked up to be. Soon, Annie discovers this is TV on a shoestring and her budget is zip. But more than this, Annie feels as though the women she should be helping to look fabulous, go away feeling all the more like fashion failures! Can Annie make it in the spotlight? Or will making it big mean losing who she really is? Fans of Sophie Kinsella, Lindsey Kelk and Paige Toon will love this laugh-out-loud romantic comedy from bestselling author Carmen Reid. What readers are saying! "If you love shopping as much as you love a great read, try this. Wonderful." Bestselling author, Katie Fforde "Annie Valentine is a wonderful character - I want her to burst into my life and sort out my wardrobe for me!" Bestselling author, Jill Mansell "You will enjoy getting to know Annie Valentine; laughing with her and crying with her. You may even fall in love with her . . . I have! A fantastic read!" Reader review "Fantastic read, couldn't put it down" Reader review "Can't wait to read the next one!" Reader review
Key features Provides an in-depth understanding of emerging technologies and integration of artificial intelligence, deep learning, big data, IoT in healthcare Details specific applications for the use of AI, big data, and IoT in healthcare Discusses how AI technology can help in formulating protective measures for COVID-19 and other diseases Includes case studies
Based on the latest version of the language, this book offers a self-contained, concise and coherent introduction to programming with Python. The book's primary focus is on realistic case study applications of Python. Each practical example is accompanied by a brief explanation of the problem-terminology and concepts, followed by necessary program development in Python using its constructs, and simulated testing. Given the open and participatory nature of development, Python has a variety of incorporated data structures, which has made it difficult to present it in a coherent manner. Further, some advanced concepts (super, yield, generator, decorator, etc.) are not easy to explain. The book specially addresses these challenges; starting with a minimal subset of the core, it offers users a step-by-step guide to achieving proficiency.
This comprehensive overview of IoT systems architecture includes in-depth treatment of all key components: edge, communications, cloud, data processing, security, management, and uses. Internet of Things: Concepts and System Design provides a reference and foundation for students and practitioners that they can build upon to design IoT systems and to understand how the specific parts they are working on fit into and interact with the rest of the system. This is especially important since IoT is a multidisciplinary area that requires diverse skills and knowledge including: sensors, embedded systems, real-time systems, control systems, communications, protocols, Internet, cloud computing, large-scale distributed processing and storage systems, AI and ML, (preferably) coupled with domain experience in the area where it is to be applied, such as building or manufacturing automation. Written in a reader-minded approach that starts by describing the problem (why should I care?), placing it in context (what does this do and where/how does it fit in the great scheme of things?) and then describing salient features of solutions (how does it work?), this book covers the existing body of knowledge and design practices, but also offers the author's insights and articulation of common attributes and salient features of solutions such as IoT information modeling and platform characteristics.
Aims and Scope Patients are more empowered to shape their own health care today than ever before. Health information technologies are creating new opportunities for patients and families to participate actively in their care, manage their medical problems and improve communication with their healthcare providers. Moreover, health information technologies are enabling healthcare providers to partner with their patients in a bold effort to optimize quality of care, improve health outcomes and transform the healthcare system on the macro-level. In this book, leading figures discuss the existing needs, challenges and opportunities for improving patient engagement and empowerment through health information technology, mapping out what has been accomplished and what work remains to truly transform the care we deliver and engage patients in their care. Policymakers, healthcare providers and administrators, consultants and industry managers, researchers and students and, not least, patients and their family members should all find value in this book. "In the exciting period that lies just ahead, more will be needed than simply connecting patients to clinicians, and clinicians to each other. The health care systems that will be most effective in meeting patients' needs will be those that can actually design their 'human wares' around that purpose. This book provides deep insight into how information technology can and will support that redesign." Thomas H. Lee, MD, MSc, Chief Medical Officer, Press Ganey Associates; Professor of Medicine, Harvard Medical School and Professor of Health Policy and Management, Harvard School of Public Health The Editors: Drs. Maria Adela Grando, Ronen Rozenblum and David W. Bates are widely recognized professors, researchers and experts in the domain of health information technology, patient engagement and empowerment. Their research, lectures and contributions in these domains have been recognized nationally and internationally. Dr. Grando is affiliated with Arizona State University and the Mayo Clinic, and Drs. Rozenblum and Bates are affiliated with Brigham and Women's Hospital and Harvard University.
This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for this book. Situational awareness is exceptionally prominent in the field of cyber defense. It involves science, technology and practice of perception, comprehension and projection of events and entities in cyber space. Chapters discuss the difficulties of achieving cyber situational awareness - along with approaches to overcoming the difficulties - in the relatively young field of cyber defense where key phenomena are so unlike the more conventional physical world. Cyber Defense and Situational Awareness is designed as a reference for practitioners of cyber security and developers of technology solutions for cyber defenders. Advanced-level students and researchers focused on security of computer networks will also find this book a valuable resource.
Application Performance Management (APM) in the Digital Enterprise enables IT professionals to be more successful in managing their company's applications. It explores the fundamentals of application management, examines how the latest technological trends impact application management, and provides best practices for responding to these changes. The recent surge in the use of containers as a way to simplify management and deploy applications has created new challenges, and the convergence of containerization, cloud, mobile, virtualization, analytics, and automation is reshaping the requirements for application management. This book serves as a guide for understanding these dramatic changes and how they impact the management of applications, showing how to create a management strategy, define the underlying processes and standards, and how to select the appropriate tools to enable management processes.
Simplicity and Uniqueness Structure of the book content Simple English and Ease of Undersatanding Exhaustive research in the content of the book
The stability analysis of stochastic models for telecommunication systems is an intensively studied topic. The analysis is, as a rule, a difficult problem requiring a refined mathematical technique, especially when one endeavors beyond the framework of Markovian models. The primary purpose of this book is to present, in a unified way, research into the stability analysis of a wide variety of regenerative queueing systems. It describes the theoretical foundations of this method, and then shows how it works with particular models, both classic ones as well as more recent models that have received attention. The focus lies on an in-depth and insightful mathematical explanation of the regenerative stability analysis method. The unique volume can serve as a textbook for students working in these and related scientific areas. The material is also of interest to engineers working in telecommunications field, who may be faced with the problem of stability of queueing systems.
An indispensable guide for telling fact from fiction on the internet—often in less than 30 seconds. The internet brings information to our fingertips almost instantly. The result is that we often jump to thinking too fast, without taking a few moments to verify the source before engaging with a claim or viral piece of media. Information literacy expert Mike Caulfield and educational researcher Sam Wineburg are here to enable us to take a moment for due diligence with this informative, approachable guide to the internet. With this illustrated tool kit, you will learn to identify red flags, get quick context, and make better use of common websites like Google and Wikipedia that can help and hinder in equal measure. This how-to guide will teach you how to use the web to verify the web, quickly and efficiently, including how to
And so much more. Building on techniques like SIFT and lateral reading, Verified will help students and anyone else looking to get a handle on the internet’s endless flood of information through quick, practical, and accessible steps.
This book provides an account of the latest developments in IoT and cloud computing, and their practical applications in various industrial, scientific, business, education, and government domains. The book covers the advanced research and state of the art review of the latest developments in IoT and cloud computing and how they might be employed post-COVID era. The book also identifies challenges and their solutions in this era, shaping the direction for future research and offering emerging topics to investigate further. The book serves as a reference for a broader audience such as researchers, application designers, solution architects, teachers, graduate students, enthusiasts, practitioners, IT managers, decision-makers and policymakers. The book editors are pioneers in the fields of IoT and Cloud computing. Provides an account of the latest developments in IoT and cloud computing and how it can aid in a COVID-19 Era in a variety of applications; Identifies IoT and cloud computing challenges and their solutions, shaping the direction for future research; Serves as a reference for researchers, application designers, solution architects, teachers, and graduate students.
This Palgrave Pivot analyzes how six countries in Central America-Costa Rica, El Salvador, Guatemala, Honduras, Nicaragua and Panama-connected to and through computer networks such as UUCP, BITNET and the Internet from the 80s to the year 2000. It argues that this story can only be told from a transnational perspective. To connect to computer networks, Central America built a regional integration project with great implications for its development. By revealing the beginnings of the Internet in this part of the world, this study broadens our understanding of the development of computer networks in the global south. It also demonstrates that transnational flows of knowledge, data, and technologies are a constitutive feature of the historical development of the Internet.
"IN The eBay Billionaires' Club, you will read thestories of twelve professional eBay merchants whorecognized a great business opportunity on the Internetand pursued it--some at great personal financial risk.In every case, the gamble has paid off. There are some powerful lessons to be learnedfrom these entrepreneurs, whose experiences truly runthe gamut. In the end, what they all have in common is that they started small--and some have purposely decided to stay that way. You'll quickly discover that eBay success really iswithin your reach, because every person in this bookbegan at the very bottom. What's more, a number of them have achievedincredible growth in a relatively short period of time, which should motivate you to stop thinking aboutyour idea and get started on the road to becoming amember of this elite club yourself. Get your highlighters out and fasten your seat belts for a
journey that will put you on the road to building your own
million-dollar--or perhaps even billion-dollar--eBay
business!"
An incisive glimpse into the future of the internet In Step into the Metaverse: How the Immersive Internet Will Unlock a Trillion-Dollar Social Economy, future tech strategist, entrepreneur, and thought leader Dr. Mark van Rijmenam delivers a startlingly insightful discussion about how the world as we know it will fundamentally change as the physical and the digital worlds merge into the metaverse, impacting the everyday experiences of people, companies, and societies. The author maps out the extraordinary opportunities and challenges facing business leaders, consumers, regulators, policymakers, and other metaverse stakeholders trying to navigate the future of the Internet. In the metaverse, you can be who you want to be, where you want to be, and companies and consumers are only restricted by their own creativity how they can benefit from the immersive internet. With engaging commentary on issues ranging from avatars, identity and digital fashion to non-fungible tokens (NFTs), blockchain and the economics of the metaverse, this book also offers: Discussions on the importance of an open and interoperable metaverse build on the web 3.0 paradigm if we want to reign in the control of Big Tech over our identity, data and lives. Explorations of the enormous--and largely untapped--potential for metaverse entertainment, including gaming, music, media, and sports and how brands can engage with their customers in novel ways and how digital twins will change how we work and innovate. Considerations related to the dangers of an always-on, immersive internet, including data breaches, avatar imposters, mental health issues, corporate and state surveillance, and the need for metaverse law. A fascinating read you won't be able to put down, Step into the Metaverse belongs in the hands of executives, managers, and other business leaders who play a role in digital transformation or execution. It's also an invaluable resource for anyone interested in the future of technology, the internet, and social interaction.
This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. It is primarily addressed to computer science and statistics researchers and educators, who are interested in topics related to mobility privacy. This handbook will also be valuable to industry developers, as it explains the state-of-the-art algorithms for offering privacy. By discussing a wide range of privacy techniques, providing in-depth coverage of the most important ones, and highlighting promising avenues for future research, this handbook also aims at attracting computer science and statistics students to this interesting field of research. The advances in mobile devices and positioning technologies, together with the progress in spatiotemporal database research, have made possible the tracking of mobile devices (and their human companions) at very high accuracy, while supporting the efficient storage of mobility data in data warehouses, which this handbook illustrates. This has provided the means to collect, store and process mobility data of an unprecedented quantity, quality and timeliness. As ubiquitous computing pervades our society, user mobility data represents a very useful but also extremely sensitive source of information. On one hand, the movement traces that are left behind by the mobile devices of the users can be very useful in a wide spectrum of applications such as urban planning, traffic engineering, and environmental pollution management. On the other hand, the disclosure of mobility data to third parties may severely jeopardize the privacy of the users whose movement is recorded, leading to abuse scenarios such as user tailing and profiling. A significant amount of research work has been conducted in the last 15 years in the area of mobility data privacy and important research directions, such as privacy-preserving mobility data management, privacy in location sensing technologies and location-based services, privacy in vehicular communication networks, privacy in location-based social networks, privacy in participatory sensing systems which this handbook addresses.. This handbook also identifies important privacy gaps in the use of mobility data and has resulted to the adoption of international laws for location privacy protection (e.g., in EU, US, Canada, Australia, New Zealand, Japan, Singapore), as well as to a large number of interesting technologies for privacy-protecting mobility data, some of which have been made available through open-source systems and featured in real-world applications.
This book focuses on key simulation and evaluation technologies for 5G systems. Based on the most recent research results from academia and industry, it describes the evaluation methodologies in depth for network and physical layer technologies. The evaluation methods are discussed in depth. It also covers the analysis of the 5G candidate technologies and the testing challenges, the evolution of the testing technologies, fading channel measurement and modeling, software simulations, software hardware cosimulation, field testing and other novel evaluation methods. The fifth-generation (5G) mobile communications system targets highly improved network performances in terms of the network capacity and the number of connections. Testing and evaluation technologies is widely recognized and plays important roles in the wireless technology developments, along with the research on basic theory and key technologies. The investigation and developments on the multi-level and comprehensive evaluations for 5G new technologies, provides important performance references for the 5G technology filtering and future standardizations. Students focused on telecommunications, electronic engineering, computer science or other related disciplines will find this book useful as a secondary text. Researchers and professionals working within these related fields will also find this book useful as a reference.
The book provides a broad outlook on the applications of cyber-physical systems along with case studies and examples in healthcare, automotive electronics, industrial automation, environment monitoring, agriculture, and applications in civil and mechanical sectors. Topics include using an energy management system in smart grids, implementing an intelligent traffic management system, warehouse tracking and monitoring, medical cyber-physical systems security, remote healthcare monitoring, and more.
This book takes a holistic view of the roles of ICTs during the pandemic through the lens of social informatics, as it is critical to our understanding of the relations between society and technology. Specific attention is given to various stakeholders and social contexts, with analysis at the individual, group, community, and society levels. Pushing the boundaries of information science research with timely and critical research questions, this edited volume showcases information science research in the context of COVID-19, by specifically accentuating sociotechnical practices, activities, and ICT interventions during the pandemic. Its social informatics focus appeals to a broad audience, and its global and international orientation provides a timely, innovative, and much-needed perspective to information science. This book is unique in its interdisciplinary nature as it consists of research studies on the intersections between ICTs and health, culture, social interaction, civic engagement, information dissemination, work, and education. Chapters apply a range of research methods, including questionnaire surveys, content analyses, and case studies from countries in Asia, Europe, and America, as well as global and international comparisons. The book's primary target audience includes scholars and students in information and library science, particularly those interested in the social aspect of the information society. It may be of interest to information professionals, library practitioners, educators, and information policymakers, as well as scholars and students in science and technology studies, cultural studies, political science, public administration, sociology, and communication studies.
Rediscover how fun web development can be with Hugo, the static site generator and web framework that lets you build content sites quickly using the skills you already have. Design layouts with HTML and share common components across pages. Create Markdown templates that let you create new content quickly. Consume and generate JSON, enhance layouts with logic, and generate a site that works on any platform with no runtime dependencies or database. Hugo gives you everything you need to build your next content site and have fun doing it. Database-driven sites bring complexity you might not need, but building a site by hand is too much work. Hugo is a static site generator and web development framework that creates content sites quickly without the overhead or dependencies of a dyanmic web framework. With Hugo, you use HTML templates and Markdown to build static sites you can host anywhere, letting you use the skills you already have. Develop your own theme using standard HTML and CSS, using Hugo's powerful templating features to organize your site's components. Create your site's content with HTML or Markdown and use Hugo's content templating features to build new content quickly. Build a fully-featured blog with archive pages, tagging, and pagination, and integrate an external commenting system to provide interactivity. Use data from front-matter, site-wide configuration, and external JSON sources to add content, and generate JSON others can use. Integrate JavaScript with your site to create a search engine. Get Hugo working with Webpack so you can leverage the wider web development ecosystem, and explore ways to publish your site to various services. Finally, learn how you can move your existing content site to Hugo. Dive in and build your next site with Hugo! |
You may like...
Research Anthology on Social Media's…
Information Resources Management Association
Hardcover
R9,426
Discovery Miles 94 260
Responsive Web Design with HTML 5 & CSS
Jessica Minnick
Paperback
|