Browse Results

Showing 13,276 through 13,300 of 58,455 results

CORS in Action: Creating and consuming cross-origin APIs

by Monsur Hossain

SummaryCORS in Action introduces Cross-Origin Resource Sharing (CORS) from both the server and the client perspective. It starts with the basics: how to make CORS requests and how to implement CORS on the server. It then explores key details such as performance, debugging, and security. API authors will learn how CORS opens their APIs to a wider range of users. JavaScript developers will find valuable techniques for building rich web apps that can take advantage of APIs hosted anywhere. The techniques described in this book are especially applicable to mobile environments, where browsers are guaranteed to support CORS. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the BookSuppose you need to share some JSON data with another application or service. If everything is hosted on one domain, it's a snap. But if the data is on another domain, the browser's "same-origin" policy stops you cold. CORS is a new web standard that enables safe cross-domain access without complex server-side code. Mastering CORS makes it possible for web and mobile applications to share data simply and securely. CORS in Action introduces CORS from both the server and the client perspective. It starts with making and enabling CORS requests and then explores performance, debugging, and security. You'll learn to build apps that can take advantage of APIs hosted anywhere and how to write APIs that expand your products to a wider range of users. For web developers comfortable with JavaScript. No experience with CORS is assumed.What's InsideCORS from the ground upServing and consuming cross-domain dataBest practices for building CORS APIsWhen to use CORS alternatives like JSON-P and proxiesAbout the AuthorMonsur Hossain is an engineer at Google who has worked on API-related projects such as the Google JavaScript Client, the APIs Discovery Service, and CORS support for Google APIs.Table of ContentsPART 1 INTRODUCING CORSThe Core of CORSMaking CORS requestsPART 2 CORS ON THE SERVERHandling CORS requestsHandling preflight requestsCookies and response headersBest practicesPART 3 DEBUGGING CORS REQUESTSDebugging CORS requests APPENDIXESCORS referenceConfiguring your environmentWhat is CSRF?Other cross-origin techniques

The Cortex and the Critical Point: Understanding the Power of Emergence

by John M. Beggs

How the cerebral cortex operates near a critical phase transition point for optimum performance.Individual neurons have limited computational powers, but when they work together, it is almost like magic. Firing synchronously and then breaking off to improvise by themselves, they can be paradoxically both independent and interdependent. This happens near the critical point: when neurons are poised between a phase where activity is damped and a phase where it is amplified, where information processing is optimized, and complex emergent activity patterns arise. The claim that neurons in the cortex work best when they operate near the critical point is known as the criticality hypothesis. In this book John Beggs—one of the pioneers of this hypothesis—offers an introduction to the critical point and its relevance to the brain.Drawing on recent experimental evidence, Beggs first explains the main ideas underlying the criticality hypotheses and emergent phenomena. He then discusses the critical point and its two main consequences—first, scale-free properties that confer optimum information processing; and second, universality, or the idea that complex emergent phenomena, like that seen near the critical point, can be explained by relatively simple models that are applicable across species and scale. Finally, Beggs considers future directions for the field, including research on homeostatic regulation, quasicriticality, and the expansion of the cortex and intelligence. An appendix provides technical material; many chapters include exercises that use freely available code and data sets.

Cosine-/Sine-Modulated Filter Banks: General Properties, Fast Algorithms and Integer Approximations

by Vladimir Britanak K. R. Rao

This book covers various algorithmic developments in the perfect reconstruction cosine/sine-modulated filter banks (TDAC-MDCT/MDST or MLT, MCLT, low delay MDCT, complex exponential/cosine/sine-modulated QMF filter banks), and near-perfect reconstruction QMF banks (pseudo-QMF banks) in detail, including their general mathematical properties, matrix representations, fast algorithms and various methods to integer approximations being recently a new transform technology for lossless audio coding. Each chapter will contain a number of examples and will conclude with problems and exercises. The book reflects the research efforts/activities and achieved results of the authors in the time period over the last 20 years.

Cosmetics Marketing Strategy in the Era of the Digital Ecosystem: Revolutionizing Beauty in the New Market Frontier

by Young Won Park Paul Hong

This book explores how cosmetics firms have made the transition to technology-enabled beauty companies to meet changing customer demands. For this purpose, the contexts of cosmetics industry growth and digital marketing strategy in the post-pandemic world are presented here. The digital marketing strategies of Japanese and Korean firms are shown, along with new business models and future prospects in cosmetics industries. In the post-pandemic world, the growing middle class will set priorities for beauty–hygienic goals, nutritional choices, and healthcare development needs. The growth rates of Asian economies were slowed during the COVID-19 pandemic, yet their growth opportunities were not constrained. Diverse industries—the cosmetics industry in particular—have addressed the needs of these growing segments in Asia. In keeping up with the leading business trends, cosmetics firms also have leveraged big data and built their brand partnerships across industries, applying the Internet of Things (IoT) and artificial intelligence for their product and process development. The vast amounts of big data gathered through IoT devices are now being used to improve entire value chain operations, creating a digital thread through the global value chain. These data are increasingly used to create new services and develop a business model for global firms. As of 2021, four of the top ten global cosmetics firms are from the USA (Estée Lauder, Proctor & Gamble, Coty, and Johnson & Johnson), three are from Europe (L’Oréal, Unilever, and Beiersdorf), two from Japan (Shiseido and Kao), and one from Korea (Amore Pacific). The USA and European firms still maintain their competitive advantage in the cosmetics industry. Global cosmetics market share by region shows that North Asia is the largest (35%), followed by North America (26%) and Latin America (7%), Europe (22%), and Africa and other regions (10%). With the rapid increase of the middle class in the Asia region, more sales are expected there than anywhere else. In this dynamic market environment, a real challenge for the cosmetics industry is how to develop and put into practice its own unique business model.

COSMIC Function Points: Theory and Advanced Practices

by Alain Abran Reiner Dumke

Designed to conform to the ISO/IEC standard 14143, the Common Software Measurement International Consortium (COSMIC) Function Point method has become the major estimation technique based on international standards for building software-intensive systems. COSMIC Function Points: Theory and Advanced Practices supplies a cutting-edge look at current a

Cosmic Rays: Multimessenger Astrophysics and Revolutionary Astronomy (Astronomers' Universe)

by Alessandro De Angelis

In recent years, cosmic rays have become the protagonists of a new scientific revolution. We are able today to film the Universe with telescopes of completely novel conception, recording information from many different messengers and accessing previously unknown cosmic regions.Written by a recognized authority in physics, this book takes readers on a captivating journey through the world of cosmic rays, their role in the revolutionary field of multi-messenger astronomy, their production from powerful accelerators close to the surfaces of black holes and compact objects, reaching the highest levels of energy observed in nature, and the implications this has for our understanding of the Universe. Through the stories of pioneering scientists, explorations of cutting-edge technologies, and simple explanations related to particle physics, quantum mechanics, and astrophysics, the book provides an illuminating state-of-the-art introduction to the current state of high-energy astrophysics. The book was written in straightforward yet rigorous language, so as to be accessible to the greater public. For those curious about the cosmos and cosmic gamma rays, nuclei, neutrinos, and gravitational waves, from casual observers to professional astronomers and physicists, the book is a must-read, offering a thrilling adventure into the future of astronomy and particle physics.

Cosmopolitan Commons

by Nil Disco Eda Kranakis

With the advent of modernity, the sharing of resources and infrastructures rapidly expanded beyond local communities into regional, national, and even transnational space -- nowhere as visibly as in Europe, with its small-scale political divisions. This volume views these shared resource spaces as the seedbeds of a new generation of technology-rich bureaucratic and transnational commons. Drawing on the theory of cosmopolitanism, which seeks to model the dynamics of an increasingly interdependent world, and on the tradition of commons scholarship inspired by the late Elinor Ostrom, the book develops a new theory of "cosmopolitan commons" that provides a framework for merging the study of technology with such issues as risk, moral order, and sustainability at levels beyond the nation-state. After laying out the theoretical framework, the book presents case studies that explore the empirical nuances: airspace as transport commons, radio broadcasting, hydropower, weather forecasting and genetic diversity as information commons, transboundary air pollution, and two "capstone" studies of interlinked, temporally layered commons: one on overlapping commons within the North Sea for freight, fishing, and fossil fuels; and one on commons for transport, salmon fishing, and clean water in the Rhine. Contributors: Hakon With Andersen, Nil Disco, Paul N. Edwards, Arne Kaijser, Eda Kranakis, Kristiina Korjonen-Kuusipuro, Tiago Saraiva, Nina WormbsThe hardcover edition does not include a dust jacket.

Cosmopolitan Commons: Sharing Resources and Risks across Borders (Infrastructures)

by Nil Disco Eda Kranakis

A new approach in commons theory to understand the interactions of technology, society, and nature, supported by case studies of new transnational European commons.With the advent of modernity, the sharing of resources and infrastructures rapidly expanded beyond local communities into regional, national, and even transnational space—nowhere as visibly as in Europe, with its small-scale political divisions. This volume views these shared resource spaces as the seedbeds of a new generation of technology-rich bureaucratic and transnational commons. Drawing on the theory of cosmopolitanism, which seeks to model the dynamics of an increasingly interdependent world, and on the tradition of commons scholarship inspired by the late Elinor Ostrom, the book develops a new theory of “cosmopolitan commons” that provides a framework for merging the study of technology with such issues as risk, moral order, and sustainability at levels beyond the nation-state. After laying out the theoretical framework, the book presents case studies that explore the empirical nuances: airspace as transport commons, radio broadcasting, hydropower, weather forecasting and genetic diversity as information commons, transboundary air pollution, and two “capstone” studies of interlinked, temporally layered commons: one on overlapping commons within the North Sea for freight, fishing, and fossil fuels; and one on commons for transport, salmon fishing, and clean water in the Rhine.ContributorsHåkon With Andersen, Nil Disco, Paul N. Edwards, Arne Kaijser, Eda Kranakis, Kristiina Korjonen-Kuusipuro, Tiago Saraiva, Nina Wormbs

Cosmos DB for MongoDB Developers: Migrating to Azure Cosmos DB and Using the MongoDB API

by Manish Sharma

Learn Azure Cosmos DB and its MongoDB API with hands-on samples and advanced features such as the multi-homing API, geo-replication, custom indexing, TTL, request units (RU), consistency levels, partitioning, and much more. Each chapter explains Azure Cosmos DB’s features and functionalities by comparing it to MongoDB with coding samples. Cosmos DB for MongoDB Developers starts with an overview of NoSQL and Azure Cosmos DB and moves on to demonstrate the difference between geo-replication of Azure Cosmos DB compared to MongoDB. Along the way you’ll cover subjects including indexing, partitioning, consistency, and sizing, all of which will help you understand the concepts of read units and how this calculation is derived from an existing MongoDB’s usage. The next part of the book shows you the process and strategies for migrating to Azure Cosmos DB. You will learn the day-to-day scenarios of using Azure Cosmos DB, its sizing strategies, and optimizing techniques for the MongoDB API. This information will help you when planning to migrate from MongoDB or if you would like to compare MongoDB to the Azure Cosmos DB MongoDB API before considering the switch.What You Will LearnMigrate to MongoDB and understand its strategiesDevelop a sample application using MongoDB’s client driverMake use of sizing best practices and performance optimization scenariosOptimize MongoDB’s partition mechanism and indexingWho This Book Is ForMongoDB developers who wish to learn Azure Cosmos DB. It specifically caters to a technical audience, working on MongoDB.

Cost-Effective Data Pipelines

by Sev Leonard

The low cost of getting started with cloud services can easily evolve into a significant expense down the road. That's challenging for teams developing data pipelines, particularly when rapid changes in technology and workload require a constant cycle of redesign. How do you deliver scalable, highly available products while keeping costs in check?With this practical guide, author Sev Leonard provides a holistic approach to designing scalable data pipelines in the cloud. Intermediate data engineers, software developers, and architects will learn how to navigate cost/performance trade-offs and how to choose and configure compute and storage. You'll also pick up best practices for code development, testing, and monitoring.By focusing on the entire design process, you'll be able to deliver cost-effective, high-quality products. This book helps you:Reduce cloud spend with lower cost cloud service offerings and smart design strategiesMinimize waste without sacrificing performance by rightsizing compute resourcesDrive pipeline evolution, head off performance issues, and quickly debug with effective monitoringSet up development and test environments that minimize cloud service dependenciesCreate data pipeline code bases that are testable and extensible, fostering rapid development and evolutionImprove data quality and pipeline operation through validation and testing

Cost-Justifying Usability: An Update for an Internet Age

by Randolph G. Bias Deborah J. Mayhew

You just know that an improvement of the user interface will reap rewards, but how do you justify the expense and the labor and the time-guarantee a robust ROI!-ahead of time? How do you decide how much of an investment should be funded? And what is the best way to sell usability to others? In this completely revised and new edition, Randolph G. Bias (University of Texas at Austin, with 25 years' experience as a usability practitioner and manager) and Deborah J. Mayhew (internationally recognized usability consultant and author of two other seminal books including The Usability Engineering Lifecycle) tackle these and many other problems. It has been updated to cover cost-justifying usability for Web sites and intranets, for the complex applications we have today, and for a host of products-offering techniques, examples, and cases that are unavailable elsewhere. No matter what type of product you build, whether or not you are a cost-benefit expert or a born salesperson, this book has the tools that will enable you to cost-justify the appropriate usability investment. 66

Cost Sharing, Capacity Investment and Pricing in Networks (Mathematische Optimierung und Wirtschaftsmathematik | Mathematical Optimization and Economathematics)

by Anja Schedel

Anja Schedel analyzes two models in the field of algorithmic game theory which both constitute bilevel problems in networks. The first model is a game-theoretic variant of the well-known Steiner forest problem, and one is interested in an optimal sharing of the cost of the Steiner forest. The author provides (and partially exactly characterizes) network structures which allow for cost-minimal pure Nash equilibria. The second model is motivated from privatized public roads, in which private, selfishly acting firms build roads, and as compensation for their investment, are allowed to set prices for using the roads. For a basic model of this situation, the author shows existence and uniqueness of pure Nash equilibria. The existence result requires a non-standard proof approach since techniques like Kakutani’s fixed point theorem cannot be applied directly.

Cost & Value Engineering: Digital und nachhaltig im turbulenten Marktumfeld (essentials)

by Dirk A. Weber

Digitalisierung, Künstliche Intelligenz und Nachhaltigkeit sind weder aus der betrieblichen Praxis noch aus dem wissenschaftlichen Diskurs wegzudenken. Hinzu kommen Turbulenzen, die seit der Corona-Pandemie und den vielfältigen Krisen sämtliche Marktakteure betreffen und zusätzliche Dynamik schaffen. Cost & Value Engineering (CVE) gehört dabei zu einem wichtigen Hebel des Kosten- und Wertmanagements von Industrieunternehmen. Dieses Essential zeigt, dass sich das CVE als eine wesentliche Aufgabe für technologieintensive Industrieunternehmen etabliert und stark gewandelt hat. Der Einkauf hat somit die Chance, sich von einer Kostenoptimierungsfunktion zu einer wertschaffenden Funktion zu entwickeln. Für diese strategische Weiterentwicklung ist eine enge Kollaboration mit unternehmensinternen Crossfunktionen erforderlich. Das Buch beschreibt, wo Cost & Value-Organisationen heute stehen und was die wesentlichen Gestaltungsdimensionen und Entwicklungstrends sind. Außerdem wird ein Reifegradmodell vorgestellt, das eine Weiterentwicklung von Cost & Value Engineering in den Gestaltungsdimensionen systematisieren kann.

The Costs and Economics of Open and Distance Learning (Open And Distance Learning Ser.)

by Rumble, Greville (Lecturer, Open University)

Dissecting in detail the arguments underlying the costs and economics of open and distance learning, this text should give the reader an insight and the confidence to cost their own open and distance learning projects.

Costume Design for Video Games: An Exploration of Historical and Fantastical Skins

by Sandy Appleoff Lyons

Costume Design for Video Games: An Exploration of Historical and Fantastical Skins explores the rich and colorful history of fashion throughout the ages. Each page goes into detail concerning the social significance of Iconic period pieces. From the real and the imagined, Costume Design for Video Games highlights the development of costumes and characters that pertain to plots, scenarios, and visionary goals, while also exploring silhouettes and the aesthetics of various eras. This survey of costume design for the video game market includes an exploration of the aesthetics of historical, fantasy, and futuristic influences. Not only does the text help in illustrating an assortment of styles, but Sandy Appleoff Lyons also helps to facilitate creative problem-solving as it applies to costume design and the design principles applied. This is uniquely done through a reader project, which in turn builds and implements research skills and the creation of authentic designs. Key Features: This book is not about replicating what already exists; it gives the reader the tools needed in order to understand the design principles and how to apply them to costumes. Through the comprehensive understanding of history, fashion, costumes, and cultural impacts, the readers will be able to expand their creativity and knowledge to help increase the narrative subtext and the stories of costumed figures. Readers are given tools for creative problem-solving to create authentic, original costumes. Text includes a glossary and sidebars covering materials rendering, color history, design principles, and meaning. Key terms and style sheets with layout training and cited historical examples help ground the reader with strong visuals.

The Couch Potato (The Food Group)

by Jory John

An Instant New York Times Bestseller * An Instant Indie Bestseller * An Indie Next List SelectionFeeling fried? Peel yourself on the couch and meet your new pal-tato! The winning fourth picture book from the #1 New York Times bestselling creators of The Bad Seed, The Good Egg, and The Cool Bean, Jory John and Pete Oswald, will get you and your kids moving!The Couch Potato has everything within reach and doesn't have to move from the sunken couch cushion. But when the electricity goes out, Couch Potato is forced to peel away from the comforts of the living room and venture outside. Could fresh air and sunshine possibly be better than the views on screen?Readers of all ages will laugh along as their new best spuddy learns that balancing screen time and playtime is the root to true happiness.Check out Jory John and Pete Oswald’s funny, bestselling books for kids 4-8 and anyone who wants a laugh:The Bad SeedThe Good EggThe Cool BeanThe Couch PotatoThe Good Egg Presents: The Great Eggscape!The Bad Seed Presents: The Good, the Bad, the Spooky!The Cool Bean Presents: As Cool as It GetsThat’s What Dinosaurs Do

Couchbase Essentials

by John Zablocki

This book is for those application developers who want to achieve greater flexibility and scalability from their software. Whether you are familiar with other NoSQL databases or have only used relational systems, this book will provide you with enough background to move you along at your own pace. If you are new to NoSQL document databases, the design discussions and introductory material will give you the information you need to get started with Couchbase.

CouchDB: Time to Relax (Animal Guide)

by Jan Lehnardt J. Chris Anderson Noah Slater

Three of CouchDB's creators show you how to use this document-oriented database as a standalone application framework or with high-volume, distributed applications. With its simple model for storing, processing, and accessing data, CouchDB is ideal for web applications that handle huge amounts of loosely structured data. That alone would stretch the limits of a relational database, yet CouchDB offers an open source solution that's reliable, scales easily, and responds quickly. CouchDB works with self-contained data that has loose or ad-hoc connections. It's a model that fits many real-world items, such as contacts, invoices, and receipts, but you'll discover that this database can easily handle data of any kind. With this book, you'll learn how to work with CouchDB through its RESTful web interface, and become familiar with key features such as simple document CRUD (create, read, update, delete), advanced MapReduce, deployment tuning, and more. Understand the basics of document-oriented storage and manipulation Interact with CouchDB entirely though HTTP using its RESTful interface Model data as self-contained JSON documents Handle evolving data schemas naturally Query and aggregate data in CouchDB using MapReduce views Replicate data between nodes Tune CouchDB for increased performance and reliability

CouchDB and PHP Web Development Beginner’s Guide

by Tim Juravich

Each chapter follows the creation of a social networking application with step-by-step instructions. This means that you will have easily created a complete, working application by the end of the book. This book is for beginner and intermediate PHP developers interested in using CouchDB development in their projects. Advanced PHP developers will appreciate the familiarity of the PHP architecture and can easily learn how to incorporate CouchDB into their existing development experiences.

Counsellor Competencies: Developing Counselling Skills for Education, Career and Occupation

by Bernd-Joachim Ertelt William E. Schulz Andreas Frey

Career and student counselling is a complex task that requires a high level of professionalism. This book introduces basic counselling skills in vocational and educational guidance. It is based on important scientific models. The book presents internationally recognized counselling approaches which include among others micro counselling, solution focused brief counselling and competence oriented counselling. It also addresses possibilities for the use of artificial intelligence. The book offers direct guidance for the consulting practice and supports competence development through case studies, tasks and didactically designed exercises. It is suitable as a guide for the training of consulting professionals in the field of career guidance.

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

by Kim Zetter

Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran's nuclear efforts and shows how its existence has ushered in a new age of warfare--one in which a digital attack can have the same destructive capability as a megaton bomb. In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery--apparently as much to the technicians replacing the centrifuges as to the inspectors observing them. Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly. At first, the firm's programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity. They had, they soon learned, stumbled upon the world's first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet's planning, execution, and discovery, covering its genesis in the corridors of Bush's White House and its unleashing on systems in Iran--and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making. But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today's flourishing zero-day "grey markets," in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike--and shows us just what might happen should our infrastructure be targeted by such an attack. Propelled by Zetter's unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war.

Counter Terrorism Issues: Case Studies in the Courtroom

by James Ottavio Castagnera

The American legal profession and judicial system bear a unique responsibility to set and maintain the balance between defending homeland security and protecting the civil liberties outlined in the Bill of Rights. These competing interests will continue to collide as the threats to our safety grow. Exploring the most significant terrorist cases of

Counter Terrorism Issues: Case Studies in the Courtroom

by James Ottavio Castagnera

Counter Terrorism Issues: Case Studies in the Courtroom, Second Edition presents a panoramic view of the American judiciary’s handling of domestic terrorism in the last 30 years. As has played out in recent history, the American legal profession and judicial system bear a unique responsibility to set and maintain the balance between defending homeland security and protecting the civil liberties outlined in the Bill of Rights. These competing interests will continue to collide as the threats to our safety grow.The book examines some of the most notorious cases—the two attacks on the World Trade Center, the Oklahoma City bombing, and the Fort Hood massacre. Updates from the First Edition include a reflection on the Boston Marathon bombing, as well as an examination of the events of January 6, 2021, the subsequent legal proceedings and convictions of those involved in the assault on the U.S. Capitol, and the danger arising from increased domestic extremism and violent rhetoric from the right.Drawing extensively upon trial transcripts, witness statements, and judicial opinions, the book reviews the events and cases to demonstrate how the criminal justice system has grappled with conflicting facts and countervailing legal rights and responsibilities. Through the words of witnesses, judges, and the attorneys who tried these cases in America’s courtrooms, coverage provides important commentary on the historical/political contexts of these events, enabling readers to understand the significance of these infamous attacks on U.S. soil.

The Counterfeit Coin: Videogames and Fantasies of Empowerment

by Christopher Goetz

The Counterfeit Coin argues that games and related entertainment media have become almost inseparable from fantasy. In turn, these media are making fantasy itself visible in new ways. Though apparently asocial and egocentric—an internal mental image expressing the fulfillment of some wish—fantasy has become a key term in social contestations of the emerging medium. At issue is whose fantasies are catered to, who feels powerful and gets their way, and who is left out. This book seeks to undo the monolith of commercial gaming by locating multiplicity and difference within fantasy itself. It introduces and tracks three broad fantasy traditions that dynamically connect apparently distinct strata of a game (story and play), that join games to other media, and that encircle players in pleasurable loops as they follow these connections.

Countering Brandjacking in the Digital Age: … and Other Hidden Risks to Your Brand (SpringerBriefs in Computer Science)

by Christopher Hofman Simeon Keates

The rise of the Internet and social media in particular offer great opportunities for brand owners to increase business and brand recognition. While this has clearly been of benefit to brand owners, who have seen a consequent rise in the value of their brands, it simultaneously makes those brands more attractive for exploitation or attack by others. Brand risks can come in many different types and this book provides examples of how these risks can arise as well as providing quantitative estimates of the adverse impacts that can result from such risks. Brand owners need to be aware of the risks and of the need to develop strategies for identifying and managing them. This book details the process by which a brand owner can develop a brand risk management process to protect a brand's reputation and value. Rather than prescribe a one-size-fits-all approach, the authors provide guidance on how a brand risk management process can be tailored to particular needs and circumstances. This approach is underpinned by drawing on examples of best practice in the fields of risk management, interaction design and engineering design. This combined approach relies on developing an understanding of the risks faced by a particular brand owner, the full context of those risks and also the brand owner's capabilities for identifying and managing those risks. This book contains many real-world examples and interviews with a number of brand owning organisations ranging from small companies to large multinationals.

Refine Search

Showing 13,276 through 13,300 of 58,455 results