Browse Results

Showing 25,226 through 25,250 of 54,275 results

In the Beginning...Was the Command Line

by Neal Stephenson

This is "the Word" -- one man's word, certainly -- about the art (and artifice) of the state of our computer-centric existence. And considering that the "one man" is Neal Stephenson, "the hacker Hemingway" (Newsweek) -- acclaimed novelist, pragmatist, seer, nerd-friendly philosopher, and nationally bestselling author of groundbreaking literary works (Snow Crash, Cryptonomicon, etc., etc.) -- the word is well worth hearing. Mostly well-reasoned examination and partial rant, Stephenson's In the Beginning... was the Command Line is a thoughtful, irreverent, hilarious treatise on the cyber-culture past and present; on operating system tyrannies and downloaded popular revolutions; on the Internet, Disney World, Big Bangs, not to mention the meaning of life itself.

In the Blink of an Eye: A Perspective on Film Editing Second Edition

by Walter Murch

In the Blink of an Eye is celebrated film editor Walter Murch's vivid, multifaceted, thought -- provoking essay on film editing. Starting with what might be the most basic editing question -- Why do cuts work? -- Murch treats the reader to a wonderful ride through the aesthetics and practical concerns of cutting film. Along the way, he offers his unique insights on such subjects as continuity and discontinuity in editing, dreaming, and reality; criteria for a good cut; the blink of the eye as an emotional cue; digital editing; and much more. In this second edition, Murch reconsiders and completely revises his popular first edition's lengthy meditation on digital editing (which accounts for a third of the book's pages) in light of the technological changes that have taken place in the six years since its publication.

In the Company of Cars: Driving as a Social and Cultural Practice (Human Factors in Road and Rail Transport)

by Sarah Redshaw

It has long been accepted that the social and cultural meanings of the car far exceed the practical need for mobility. This book marks the first attempt to contribute to road safety, considering, in depth, these meanings and the cultures of driving that are shaped by them. In the Company of Cars examines the perspectives that young people have on cars, and explores the broader social and cultural meanings of the car, the potential it is supposed to fulfil, and the anticipated benefits it offers to young drivers. From focus-group research conducted in Australia, the book takes up the views of young people on a range of topics, from media to car use to gender performance. The author looks at the ways in which driving has been defined by articulations of the car that emphasize valued features of the car-driver, such as gender, youthfulness, status, age, power, raciness, sexiness, ruggedness and competitiveness. The book takes a global perspective on mobility, considering the impact of cars and road safety policy on quality of life, and the value and significance of other modes of travel, in a range of countries.

In the Land of the Unreal: Virtual and Other Realities in Los Angeles

by Lisa Messeri

In the mid-2010s, a passionate community of Los Angeles-based storytellers, media artists, and tech innovators formed around virtual reality (VR), believing that it could remedy society’s ills. Lisa Messeri offers an ethnographic exploration of this community, which conceptualized VR as an “empathy machine” that could provide glimpses into diverse social realities. She outlines how, in the aftermath of #MeToo, the backlash against Silicon Valley, and the turmoil of the Trump administration, it was imagined that VR—if led by women and other marginalized voices—could bring about a better world. Messeri delves into the fantasies that allowed this vision to flourish, exposing the paradox of attempting to use a singular VR experience to mend a fractured reality full of multiple, conflicting social truths. She theorizes this dynamic as unreal, noting how dreams of empathy collide with reality’s irreducibility to a “common” good. With In the Land of the Unreal, Messeri navigates the intersection of place, technology, and social change to show that technology alone cannot upend systemic forces attached to gender and race.

In the Plex: How Google Thinks, Works, and Shapes Our Lives

by Steven Levy

&“The most interesting book ever written about Google&” (The Washington Post) delivers the inside story behind the most successful and admired technology company of our time, now updated with a new Afterword.Google is arguably the most important company in the world today, with such pervasive influence that its name is a verb. The company founded by two Stanford graduate students—Larry Page and Sergey Brin—has become a tech giant known the world over. Since starting with its search engine, Google has moved into mobile phones, computer operating systems, power utilities, self-driving cars, all while remaining the most powerful company in the advertising business.Granted unprecedented access to the company, Levy disclosed that the key to Google&’s success in all these businesses lay in its engineering mindset and adoption of certain internet values such as speed, openness, experimentation, and risk-taking. Levy discloses details behind Google&’s relationship with China, including how Brin disagreed with his colleagues on the China strategy—and why its social networking initiative failed; the first time Google tried chasing a successful competitor. He examines Google&’s rocky relationship with government regulators, particularly in the EU, and how it has responded when employees left the company for smaller, nimbler start-ups.In the Plex is the &“most authoritative…and in many ways the most entertaining&” (James Gleick, The New York Book Review) account of Google to date and offers &“an instructive primer on how the minds behind the world&’s most influential internet company function&” (Richard Waters, The Wall Street Journal).

In the Swarm: Digital Prospects (Untimely Meditations #3)

by Byung-Chul Han

A prominent German thinker argues that—contrary to “Twitter Revolution” cheerleading—digital communication is destroying political discourse and political action. The shitstorm represents an authentic phenomenon of digital communication.—from In the SwarmDigital communication and social media have taken over our lives. In this contrarian reflection on digitized life, Byung-Chul Han counters the cheerleaders for Twitter revolutions and Facebook activism by arguing that digital communication is in fact responsible for the disintegration of community and public space and is slowly eroding any possibility for real political action and meaningful political discourse. In the predigital, analog era, by the time an angry letter to the editor had been composed, mailed, and received, the immediate agitation had passed. Today, digital communication enables instantaneous, impulsive reaction, meant to express and stir up outrage on the spot. “The shitstorm,” writes Han, ”represents an authentic phenomenon of digital communication. ”Meanwhile, the public, the senders and receivers of these communications have become a digital swarm—not a mass, or a crowd, or Negri and Hardt's antiquated notion of a “multitude,” but a set of isolated individuals incapable of forming a “we,” incapable of calling dominant power relations into question, incapable of formulating a future because of an obsession with the present. The digital swarm is a fragmented entity that can focus on individual persons only in order to make them an object of scandal. Han, one of the most widely read philosophers in Europe today, describes a society in which information has overrun thought, in which the same algorithms are employed by Facebook, the stock market, and the intelligence services. Democracy is under threat because digital communication has made freedom and control indistinguishable. Big Brother has been succeeded by Big Data.

In the Trenches with Microsoft® Office Project 2007

by Elaine Marmel

Marmel is an author and president of a technical writing and software training firm, and she has written this guide to Microsoft Office Project 2007 for users who need develop the tools and techniques for all types of project management scenarios. The author combines expert advice and examples to show how Project 2007 can be used to define and set project goals, determine how dependencies and constraints will affect the project, set budgets, organize information files, communicate with teams, track progress and deal with management objectives. Problem solving approaches are also discussed such as getting back on schedule and managing cross-project conflicts. Annotation c2009 Book News, Inc. , Portland, OR (booknews. com)

In the Trenches with Microsoft® Office Project 2007

by Elaine J. Marmel

Led by a well-known Project expert, you'll learn how to apply the right tools and techniques to the most common project-management scenarios you'll encounter. Most important, you'll see the effects of different approaches in action--so you can make the best decisions for your project. Orchestrate great results by learning the most effective ways to: Identify project scope and goals Evaluate project costs Drive a project plan and schedule Organize and deploy resources Monitor and communicate status Manage cuts in budget and resources Get management buy-in on essential changes Resolve cross-project conflicts Get a wayward project back on track Work out the kinks--solving real problems, in real time

In-Vehicle Corpus and Signal Processing for Driver Behavior

by Kazuya Takeda Hakan Erdogan John Hansen Huseyin Abut

In-Vehicle Corpus and Signal Processing for Driver Behavior is comprised of expanded papers from the third biennial DSPinCARS held in Istanbul in June 2007. The goal is to bring together scholars working on the latest techniques, standards, and emerging deployment on this central field of living at the age of wireless communications, smart vehicles, and human-machine-assisted safer and comfortable driving. Topics covered in this book include: improved vehicle safety; safe driver assistance systems; smart vehicles; wireless LAN-based vehicular location information processing; EEG emotion recognition systems; and new methods for predicting driving actions using driving signals. In-Vehicle Corpus and Signal Processing for Driver Behavior is appropriate for researchers, engineers, and professionals working in signal processing technologies, next generation vehicle design, and networks for mobile platforms.

Inbound Content: A Step-By-Step Guide To Doing Content Marketing the Inbound Way

by Justin Champion

Develop and implement an effective content strategy tailored to your business’s needs Inbound Content is a step-by-step manual for attracting the right people, turning them into leads, and closing them into customers. Today, everyone knows that content is king. It’s how we engage, how we inform, and how we pass the time; content is everywhere, and if you’re not leveraging its power to promote your business, you’ve already been left behind. Having a website and social media is not enough; if you truly want to take advantage of unprecedented levels of connectedness, you have to create content that draws customers in. It’s not about blindly expanding reach, it’s about reaching out to the right audience. Today’s marketplace is no longer about chasing the sale—with the right approach to content, your customers will come to you. Your content must be valuable, relevant, and consistent—but how should it be implemented at the actual content-creation level? This book shows you how to develop a unified strategy, create compelling content tailored to your needs, and utilize that content to its greatest advantage in order to build your brand. Discover the power of storytelling and generate effective content ideas Plan a long-term content strategy and a content creation framework Create great content, promote it, measure it, and analyze its performance Extend your content’s value, become a more effective writer, and develop a growth mentality Effective content is worth its weight in marketing gold. It stands out from the noise, and to the customer, looks like an oasis in a desert of clickbait and paid reviews. Inbound Content shows you how to plan, build, and implement your content strategy for unprecedented engagement and sales.

Inbound Marketing and SEO: Insights from the Moz Blog

by Thomas Høgenhaven Rand Fishkin

As the SEO industry undergoes a shift and Google continues to change its algorithm, successful SEO practitioners need to increase their knowledge of a wide range of inbound marketing channels. The Moz Blog is the go-to place for the latest thought leadership on the shifts in inbound marketing and SEO. This book cherry-picks and updates the most popular articles for the key inbound marketing disciplines, mixing them with some brand-new essays. Rand Fishkin and Thomas Høgenhaven have produced a masterfully edited anthology packed with information to provide the best possible insight into these marketing channels. The popular Moz blog is a top resource for cutting-edge information on SEO techniques: Co-compiled and co-edited by Moz CEO and co-founder Rand Fishkin, this book is an anthology of articles selected to provide the best possible overview of current SEO and inbound marketing techniques and trends Covers channels of online marketing, content marketing, social media, outreach, conversion rate optimization, and analytics, as well as search engine optimization Focuses on leveraging existing platforms like social media sites and community for inbound marketing success Inbound Marketing and SEO is a must-have for marketers in today's online world.

Inbound Marketing For Dummies

by Consumer Dummies

Don't chase business-bring new customers to you! Outdated sales tactics have you chasing leads and fishing for new business. In today's competitive world, nobody has time for that! Inbound Marketing For Dummies is a one-stop-shop for everything you need to know about inbound marketing techniques that attract the attention of your target audience. Whether you have a small or large business, this approachable text offers insight into creating, executing, promoting, and measuring inbound marketing tactics through easy-to-follow instructions on setting up and implementing a new strategic approach. With the information in this book, you can increase brand awareness, enhance brand loyalty, engage with target audience members, and attract new buyers all by leveraging your website, social media, blog, and other resources that are, most likely, already at your fingertips. A breath of fresh air brought on by the Digital Age, inbound marketing is a holistic, data-driven marketing approach that calls upon digital-based resources, such as your website, social media platforms, blogging, search engine optimization, etc. , to establish your company as an authority in its industry-and to help customers find you, instead of require your sales team to chase after each and every customer. Build a reliable inbound marketing team Develop deeper relationships with your customers Convert inbound traffic into revenue Combine inbound and outbound marketing strategies to optimize your business' resources Inbound Marketing For Dummies is an essential guide for anyone looking to leverage tried and true inbound marketing strategies within their business.

Inbound-Marketing für B2B-Unternehmen: Neukunden digital gewinnen (essentials)

by Christian Dach

Dieses essential erläutert, wie B2B-Unternehmen Inbound-Marketing erfolgreich umsetzen können, um ihre Vertriebsergebnisse nachhaltig zu verbessern. Der Schlüssel liegt in kontinuierlich generiertem Content, der über geeignete Kanäle ausgespielt wird – mit dem Ziel, dass Potenzialkunden von sich aus auf das verkaufende Unternehmen zukommen. Marketing-Automation-Software ermöglicht dabei eine individuelle und gleichzeitig kostengünstige Interaktion mit potenziellen Kunden. Ist ein Lead „Sales Ready“, kann der Vertrieb den bereits interessierten und qualifizierten Kontakt übernehmen.Prof. Dr. Christian Dach beschreibt kompakt und auf den Punkt, wie B2B-Unternehmen diesen Ansatz zielführend im Unternehmen implementieren können und dadurch hochbezahlte Verkaufsmitarbeiter wesentlich effektiver einsetzen sowie die Conversion-Rate deutlich steigern können.

Inbound Marketing, Revised and Updated

by Brian Halligan Dharmesh Shah

Attract, engage, and delight customers online Inbound Marketing, Revised and Updated: Attract, Engage, and Delight Customers Online is a comprehensive guide to increasing online visibility and engagement. Written by top marketing and startup bloggers, the book contains the latest information about customer behavior and preferred digital experiences. From the latest insights on lead nurturing and visual marketing to advice on producing remarkable content by building tools, readers will gain the information they need to transform their marketing online. With outbound marketing methods becoming less effective, the time to embrace inbound marketing is now. Cold calling, e-mail blasts, and direct mail are turning consumers off to an ever-greater extent, so consumers are increasingly doing research online to choose companies and products that meet their needs. Inbound Marketing recognizes these behavioral changes as opportunities, and explains how marketers can make the most of this shift online. This not only addresses turning strangers into website visitors, but explains how best to convert those visitors to leads, and to nurture those leads to the point of becoming delighted customers. Gain the insight that can increase marketing value with topics like: Inbound marketing - strategy, reputation, and tracking progress Visibility - getting found, and why content matters Converting customers - turning prospects into leads and leads into customers Better decisions - picking people, agencies, and campaigns The book also contains essential tools and resources that help build an effective marketing strategy, and tips for organizations of all sizes looking to build a reputation. When consumer behaviors change, marketing must change with them. The fully revised and updated edition of Inbound Marketing is a complete guide to attracting, engaging, and delighting customers online.

Incentive Mechanism for Mobile Crowdsensing: A Game-theoretic Approach (SpringerBriefs in Computer Science)

by Youqi Li Fan Li Song Yang Chuan Zhang

Mobile crowdsensing (MCS) is emerging as a novel sensing paradigm in the Internet of Things (IoTs) due to the proliferation of smart devices (e.g., smartphones, wearable devices) in people’s daily lives. These ubiquitous devices provide an opportunity to harness the wisdom of crowds by recruiting mobile users to collectively perform sensing tasks, which largely collect data about a wide range of human activities and the surrounding environment. However, users suffer from resource consumption such as battery, processing power, and storage, which discourages users’ participation. To ensure the participation rate, it is necessary to employ an incentive mechanism to compensate users’ costs such that users are willing to take part in crowdsensing. This book sheds light on the design of incentive mechanisms for MCS in the context of game theory. Particularly, this book presents several game-theoretic models for MCS in different scenarios. In Chapter 1, the authors present an overview of MCS and state the significance of incentive mechanism for MCS. Then, in Chapter 2, 3, 4, and 5, the authors propose a long-term incentive mechanism, a fair incentive mechanism, a collaborative incentive mechanism, and a coopetition-aware incentive mechanism for MCS, respectively. Finally, Chapter 6 summarizes this book and point out the future directions. This book is of particular interest to the readers and researchers in the field of IoT research, especially in the interdisciplinary field of network economics and IoT.

Incident Management for Operations

by Chris Hawley Rob Schnepp Ron Vidal

Are you satisfied with the way your company responds to IT incidents? How prepared is your response team to handle critical, time-sensitive events such as service disruptions and security breaches? IT professionals looking for effective response models have successfully adopted the Incident Management System (IMS) used by firefighters throughout the US. This practical book shows you how to apply the same response methodology to your own IT operation.You’ll learn how IMS best practices for leading people and managing time apply directly to IT incidents where the stakes are high and outcomes are uncertain. This book provides use cases of some of the largest (and smallest) IT operations teams in the world. There is a better way to respond. You just found it.Assess your IT incident response with the PROCESS programmatic evaluation toolGet an overview of the IMS all-hazard, all-risk frameworkUnderstand the responsibilities of the Incident CommanderForm a unified command structure for events that affect multiple business unitsSystematically evaluate what broke and how the incident team responded

Incident on Simpac III: A Scientific Novel (Science and Fiction)

by Doug Brugge

A few hundred years into the future, a wave of space colonization follows a disastrous earlier attempt to inhabit nearby extrasolar planets. It is guided by a new computational method based on massive data-driven socio-cultural and socio-epidemiological modeling and using novel biological computers, fed with data on Earth’s history of successes and failures. Yet, in the newly settled Simpac system, some unexpected and worrying anomalies begin cropping up, making an urgent expedition to the system necessary: is it the underlying data, the computations, or is some unknown entity tampering with the space colonization program? A race against time ensues as the lives of four strangers begin to converge. While grounded in the social systems aspect, the author posits that the future is likely to be characterized by more biology-based tools than most contemporary science fiction – which most often relies entirely on non-biological hardware in terms of advanced technologies – predicts. The result is an entertaining and skillful blend of thriller and SF, complemented by a nontechnical appendix describing the underlying science.

Incident Response

by Richard Forno Kenneth R. van Wyk

Are you ready for a computer "incident," such as a security breach? Incident Responseshows you both the technical and administrative aspects of building an effective incident response plan. You'll learn about the different types of incidents and ways to respond to them, how to put together an incident response team, what procedures to use, what tools there are for investigating incidents, and where to find extensive online resources.

Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents

by Dr. Erdal Ozkaya

Learn to identify a security incident and build a series of best practices to stop a cyberattack before it creates serious consequencesKey FeaturesDiscover Incident Response (IR), from its evolution to implementationUnderstand cybersecurity essentials and IR best practices through real-world phishing incident scenariosExplore the current challenges in IR through the perspectives of leading figures in the cybersecurity communityBook DescriptionCybercriminals are always in search of new methods and ways to infiltrate systems. Quickly responding to an incident should help an organization minimize its losses, decrease vulnerabilities, and rebuild services and processes. In the wake of the COVID-19 pandemic, with most organizations gravitating towards remote working and cloud computing, this book provides updated IR processes to address the associated security risks. The book begins by introducing you to the cybersecurity landscape and explaining why IR matters. You will understand the evolution of IR, current challenges, key metrics, and the composition of an IR team, along with an array of methods and tools used in an effective IR process. You will then learn how to apply this conceptual toolkit, with discussions on incident alerting, handling, investigation, recovery, and reporting. Further, you will cover governing IR on multiple platforms and sharing cyber threat intelligence, and the procedures involved in IR in the cloud – the challenges, opportunities, and how to secure your cloud environments. Finally, the book concludes with an “Ask the Experts” section where industry experts have provided their perspective on diverse topics in the IR sphere. By the end of this book, you should become proficient at building and applying IR strategies pre-emptively and confidently. What you will learnUnderstand IR and its significanceOrganize an IR teamExplore best practices for managing attack situations with your IR teamForm, organize, and operate a product security team to deal with product vulnerabilities and assess their severityOrganize all the entities involved in product security responseRespond to a security vulnerability based on Keepnet Labs processes and practicesAdapt all the above learnings for the cloudWho this book is forThis book is aimed at first-time incident responders, cybersecurity enthusiasts who want to get into IR, and anyone who is responsible for maintaining business security. It will also interest CIOs, CISOs, and members of IR, SOC, and CSIRT teams. However, IR is not just about information technology (IT) or security teams, and anyone with a legal, HR, media, or other active business role would benefit from this book.The book assumes you have some admin experience. No prior DFIR experience is required. Some infosec knowledge will be a plus but isn't mandatory.

Incident Response Techniques for Ransomware Attacks: Understand modern ransomware attacks and build an incident response strategy to work through them

by Oleg Skulkin

Explore the world of modern human-operated ransomware attacks, along with covering steps to properly investigate them and collecting and analyzing cyber threat intelligence using cutting-edge methods and toolsKey FeaturesUnderstand modern human-operated cyber attacks, focusing on threat actor tactics, techniques, and proceduresCollect and analyze ransomware-related cyber threat intelligence from various sourcesUse forensic methods and tools to reconstruct ransomware attacks and prevent them in the early stagesBook DescriptionRansomware attacks have become the strongest and most persistent threat for many companies around the globe. Building an effective incident response plan to prevent a ransomware attack is crucial and may help you avoid heavy losses. Incident Response Techniques for Ransomware Attacks is designed to help you do just that.This book starts by discussing the history of ransomware, showing you how the threat landscape has changed over the years, while also covering the process of incident response in detail. You'll then learn how to collect and produce ransomware-related cyber threat intelligence and look at threat actor tactics, techniques, and procedures. Next, the book focuses on various forensic artifacts in order to reconstruct each stage of a human-operated ransomware attack life cycle. In the concluding chapters, you'll get to grips with various kill chains and discover a new one: the Unified Ransomware Kill Chain.By the end of this ransomware book, you'll be equipped with the skills you need to build an incident response strategy for all ransomware attacks.What you will learnUnderstand the modern ransomware threat landscapeExplore the incident response process in the context of ransomwareDiscover how to collect and produce ransomware-related cyber threat intelligenceUse forensic methods to collect relevant artifacts during incident responseInterpret collected data to understand threat actor tactics, techniques, and proceduresUnderstand how to reconstruct the ransomware attack kill chainWho this book is forThis book is for security researchers, security analysts, or anyone in the incident response landscape who is responsible for building an incident response model for ransomware attacks. A basic understanding of cyber threats will be helpful to get the most out of this book.

Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting

by Roberto Martinez

Learn everything you need to know to respond to advanced cybersecurity incidents through threat hunting using threat intelligenceKey FeaturesUnderstand best practices for detecting, containing, and recovering from modern cyber threatsGet practical experience embracing incident response using intelligence-based threat hunting techniquesImplement and orchestrate different incident response, monitoring, intelligence, and investigation platformsBook DescriptionWith constantly evolving cyber threats, developing a cybersecurity incident response capability to identify and contain threats is indispensable for any organization regardless of its size. This book covers theoretical concepts and a variety of real-life scenarios that will help you to apply these concepts within your organization.Starting with the basics of incident response, the book introduces you to professional practices and advanced concepts for integrating threat hunting and threat intelligence procedures in the identification, contention, and eradication stages of the incident response cycle. As you progress through the chapters, you'll cover the different aspects of developing an incident response program. You'll learn the implementation and use of platforms such as TheHive and ELK and tools for evidence collection such as Velociraptor and KAPE before getting to grips with the integration of frameworks such as Cyber Kill Chain and MITRE ATT&CK for analysis and investigation. You'll also explore methodologies and tools for cyber threat hunting with Sigma and YARA rules.By the end of this book, you'll have learned everything you need to respond to cybersecurity incidents using threat intelligence.What you will learnExplore the fundamentals of incident response and incident managementFind out how to develop incident response capabilitiesUnderstand the development of incident response plans and playbooksAlign incident response procedures with business continuityIdentify incident response requirements and orchestrate people, processes, and technologiesDiscover methodologies and tools to integrate cyber threat intelligence and threat hunting into incident responseWho this book is forIf you are an information security professional or anyone who wants to learn the principles of incident management, first response, threat hunting, and threat intelligence using a variety of platforms and tools, this book is for you. Although not necessary, basic knowledge of Linux, Windows internals, and network protocols will be helpful.

The Inclusion of Environmental Education in Science Teacher Education

by Starlin Weaver Beth Shiner Klein Alec Bodzin

In the coming decades, the general public will be required ever more often to understand complex environmental issues, evaluate proposed environmental plans, and understand how individual decisions affect the environment at local to global scales. Thus it is of fundamental importance to ensure that higher quality education about these ecological issues raises the environmental literacy of the general public. In order to achieve this, teachers need to be trained as well as classroom practice enhanced. This volume focuses on the integration of environmental education into science teacher education. The book begins by providing readers with foundational knowledge of environmental education as it applies to the discipline of science education. It relates the historical and philosophical underpinnings of EE, as well as current trends in the subject that relate to science teacher education. Later chapters examine the pedagogical practices of environmental education in the context of science teacher education. Case studies of environmental education teaching and learning strategies in science teacher education, and instructional practices in K-12 science classrooms, are included. This book shares knowledge and ideas about environmental education pedagogy and serves as a reliable guide for both science teacher educators and K-12 science educators who wish to insert environmental education into science teacher education. Coverage includes everything from the methods employed in summer camps to the use of podcasting as a pedagogical aid. Studies have shown that schools that do manage to incorporate EE into their teaching programs demonstrate significant growth in student achievement as well as improved student behavior. This text argues that the multidisciplinary nature of environmental education itself requires problem-solving, critical thinking and literacy skills that benefit students' work right across the curriculum.

Inclusive Access and Open Educational Resources E-text Programs in Higher Education

by Tracy A. Hurley

This volume takes a comprehensive and broad look at e-text programs across a wide spectrum of programs, institutions, and policies in three parts. The first part showcases several policy papers to contextualize the discussion and highlight the reasons for IAE programs’ structure and the obstacles they face for implementation. The second part is an in-depth exploration of various case studies that provide a detailed description of IAE programs, including information about program elements, program structure, program size, and insights into how programs are operationalized, and their shortcomings and benefits to students and stakeholders. The final part is a selection of research papers that offer evidence-based support for the adoption of IAE programs in terms of student success, access, engagement, costs, and a variety of other student and institutional outcomes. There are approximately 300 institutions of higher education that currently have some form of Inclusive Access or Open Educational Resources E-text (IAE) program in the United States, but there is little scholarship that engages on the topic of assessing these programs’ effect on student success. The results of the research studies included in this volume will inform faculty, administrators, and policy-makers who seek to support the development, adoption, and implementation of IAE programs based on their potential positive effects on student success and other outcomes.

Inclusive Design for a Digital World: Designing with Accessibility in Mind

by Regine M. Gilbert

What is inclusive design? It is simple. It means that your product has been created with the intention of being accessible to as many different users as possible. For a long time, the concept of accessibility has been limited in terms of only defining physical spaces. However, change is afoot: personal technology now plays a part in the everyday lives of most of us, and thus it is a responsibility for designers of apps, web pages, and more public-facing tech products to make them accessible to all. Our digital era brings progressive ideas and paradigm shifts – but they are only truly progressive if everybody can participate.In Inclusive Design for a Digital World, multiple crucial aspects of technological accessibility are confronted, followed by step-by-step solutions from User Experience Design professor and author Regine Gilbert. Think about every potential user who could be using your product. Could they be visually impaired? Have limited motor skills? Be deaf or hard of hearing? This book addresses a plethora of web accessibility issues that people with disabilities face. Your app might be blocking out an entire sector of the population without you ever intending or realizing it. For example, is your instructional text full of animated words and Emoji icons? This makes it difficult for a user with vision impairment to use an assistive reading device, such as a speech synthesizer, along with your app correctly. In Inclusive Design for a Digital World, Gilbert covers the Web Content Accessibility Guidelines (WCAG) 2.1 requirements, emerging technologies such as VR and AR, best practices for web development, and more.As a creator in the modern digital era, your aim should be to make products that are inclusive of all people. Technology has, overall, increased connection and information equality around the world. To continue its impact, access and usability of such technology must be made a priority, and there is no better place to get started than Inclusive Design for a Digital World.What You’ll LearnThe moral, ethical, and high level legal reasons for accessible designTools and best practices for user research and web developersThe different types of designs for disabilities on various platformsFamiliarize yourself with web compliance guidelinesTest products and usability best practicesUnderstand past innovations and future opportunities for continued improvementWho This Book Is ForPractitioners of product design, product development, content, and design can benefit from this book.

Inclusive Design For Organisations: Including Your Missing 20% By Embedding Web And Mobile Accessibility

by Jonathan Hassell

Most organisations are oblivious to, or terrified about, web accessibility. <p><p> You may be aware that 20% of your customers - people with disabilities - could be clicking away from your websites or mobile apps every day, without having bought anything or found the information they needed. You may have received complaints about accessibility problems you don't understand, with people asking for what seem like impossible fixes. Your web teams may have read the industry standard WCAG guidelines, but found them impenetrable. You probably know you could be sued if you don't do the right thing, but you don't know how far you need to go to prevent that. And apart from eliminating risk, what else is in it for your organisation? <p> In this book, award-winning international accessibility thought-leader Jonathan Hassell shows you how to transform your organisation to consistently and cost-efficiently create websites, mobile apps and other digital products that are usable for all of your customers. <p> Inclusive Design for Organisations gives you a clear, strategic business-aligned framework how to embed accessibility policies and processes consistently throughout your organisation, and how to measure the return on your investment. <p> With insights from leading worldwide accessibility experts who have implemented these processes in their organisations, this book comes with a free library of downloadable support tools, templates, podcasts and videos to help you on your journey to accessibility maturity. <p> Inclusive Design for Organisations, and its companion, Inclusive Design for Products, will help you comply with both parts of the new International Standard ISO 30071-1.

Refine Search

Showing 25,226 through 25,250 of 54,275 results