|
Showing 1 - 8 of
8 matches in All Departments
Thanks to the advancement of faster processors within communication
devices, there has been a rapid change in how information is
modulated, multiplexed, managed, and moved. While formulas and
functions are critical in creating the granular components and
operations of individual technologies, understanding the
applications and their purposes in the business environment only
requires a basic scientific background. The third edition of
Introduction to Communications Technologies: A Guide for
Non-Engineers helps students in telecommunications business
programs become familiar with and stay abreast of the ever-changing
technology surrounding their industry. Used in the core curriculum
at Ball State University's graduate professional program in
Information and Communication Sciences, this textbook is designed
for graduate and undergraduate students who do not necessarily have
a high level of technical expertise, but need to have some
understanding of the technical functions of information and
communication technologies to prepare them for working in a
corporate environment. See What's New in the Third Edition:
Significant updates to the following chapters: Modulation Schemes;
Signaling Formats, Multiplexing, and Digital Transmission; Packet
Switching and Local Area Networks; Mobile Wireless Technologies;
Network Security and Management Added coverage of OFDMA, Metro
Ethernet, 5G pre-standard configuration, 'apps' on mobile devices,
and VoIP core switching New chapters on Big Data and the Cloud
Avoiding complicated equations and the need for calculus
gymnastics, this textbook provides non-engineering students with a
firm background and a broad understanding of the knowledge
necessary to work within the fast-paced and ever-changing
communications industry.
The next big area within the information and communication
technology field is Artificial Intelligence (AI). The industry is
moving to automate networks, cloud-based systems (e.g.,
Salesforce), databases (e.g., Oracle), AWS machine learning (e.g.,
Amazon Lex), and creating infrastructure that has the ability to
adapt in real-time to changes and learn what to anticipate in the
future. It is an area of technology that is coming faster and
penetrating more areas of business than any other in our history.
AI will be used from the C-suite to the distribution warehouse
floor. Replete with case studies, this book provides a working
knowledge of AI's current and future capabilities and the impact it
will have on every business. It covers everything from healthcare
to warehousing, banking, finance and education. It is essential
reading for anyone involved in industry.
Learn network and data security by analyzing the Anthem breach and
step-by-step how hackers gain entry, place hidden software,
download information, and hide the evidence of their entry.
Understand the tools, establishing persistent presence, use of
sites as testbeds to determine successful variations of software
that elude detection, and reaching out across trusted connections
to the entire healthcare system of the nation. Examine the
components of technology being diverted, starting with application
code and how to protect it with isolation approaches. Dissect forms
of infections including viruses, worms, bots, and Trojans; and
encryption with RSA algorithm as the working example.
This book provides a technical description of cloud computing
technologies, covering cloud infrastructure and platform services.
It then addresses the basics of operating a Cloud computing data
center, the services offered from Cloud providers, the carrier role
in connecting users to data centers, and the process of
interconnecting Cloud data centers to form a flexible processing
unit. It also describes how cloud computing has made an impact in
various industries and provides emerging technologies that are
critical within each industry. Lastly, this book will address
security requirements and provide the best practices in securing
data.
Learn network and data security by analyzing the Anthem breach and
step-by-step how hackers gain entry, place hidden software,
download information, and hide the evidence of their entry.
Understand the tools, establishing persistent presence, use of
sites as testbeds to determine successful variations of software
that elude detection, and reaching out across trusted connections
to the entire healthcare system of the nation. Examine the
components of technology being diverted, starting with application
code and how to protect it with isolation approaches. Dissect forms
of infections including viruses, worms, bots, and Trojans; and
encryption with RSA algorithm as the working example.
This book provides a technical description of cloud computing
technologies, covering cloud infrastructure and platform services.
It then addresses the basics of operating a Cloud computing data
center, the services offered from Cloud providers, the carrier role
in connecting users to data centers, and the process of
interconnecting Cloud data centers to form a flexible processing
unit. It also describes how cloud computing has made an impact in
various industries and provides emerging technologies that are
critical within each industry. Lastly, this book will address
security requirements and provide the best practices in securing
data.
As the population ages and healthcare costs continue to soar, the
focus of the nation and the healthcare industry turns to reducing
costs and making the delivery process more efficient. Demonstrating
how improvements in information systems can lead to improved
patient care, Information and Communication Technologies in
Healthcare explains how to create a holistic Medical Records System
as a core component to addressing the issues affecting the U.S.
healthcare system. Examining the impact of our aging population on
healthcare, the book describes the range of systems that support
key segments of the industry, including: hospitals, physicians,
imaging, and nursing. It considers patient records, the physician's
office, emerging home-monitoring networks, the recording and
information submitting process, and hospice/nursing home use.
Leaving no stone unturned, this reference investigates: Healthcare
technology Healthcare data standards Healthcare information
exchange Legal and regulatory issues Electronic medical records
Usability by patients and physicians Security and privacy
Healthcare facility planning Emerging media and healthcare The book
includes a case study that illustrates the human factors behind the
implementation of technology. Following the principle that data
should be captured only once, stored in a repository, and then made
available throughout the medical system, this is the ideal starting
point for those looking to improve the effectiveness and cost
efficiencies of the healthcare system.
Thanks to the advancement of faster processors within communication
devices, there has been a rapid change in how information is
modulated, multiplexed, managed, and moved. While formulas and
functions are critical in creating the granular components and
operations of individual technologies, understanding the
applications and their purposes in the business environment only
requires a basic scientific background. The third edition of
Introduction to Communications Technologies: A Guide for
Non-Engineers helps students in telecommunications business
programs become familiar with and stay abreast of the ever-changing
technology surrounding their industry. Used in the core curriculum
at Ball State University's graduate professional program in
Information and Communication Sciences, this textbook is designed
for graduate and undergraduate students who do not necessarily have
a high level of technical expertise, but need to have some
understanding of the technical functions of information and
communication technologies to prepare them for working in a
corporate environment. See What's New in the Third Edition:
Significant updates to the following chapters: Modulation Schemes;
Signaling Formats, Multiplexing, and Digital Transmission; Packet
Switching and Local Area Networks; Mobile Wireless Technologies;
Network Security and Management Added coverage of OFDMA, Metro
Ethernet, 5G pre-standard configuration, 'apps' on mobile devices,
and VoIP core switching New chapters on Big Data and the Cloud
Avoiding complicated equations and the need for calculus
gymnastics, this textbook provides non-engineering students with a
firm background and a broad understanding of the knowledge
necessary to work within the fast-paced and ever-changing
communications industry.
|
|