Browse Results

Showing 24,676 through 24,700 of 55,973 results

Highlights of Practical Applications of Cyber-Physical Multi-Agent Systems: International Workshops of PAAMS 2017, Porto, Portugal, June 21-23, 2017, Proceedings (Communications in Computer and Information Science #722)

by Javier Bajo, Zita Vale, Kasper Hallenborg, Ana Paula Rocha, Philippe Mathieu, Pawel Pawlewski, Elena Del Val, Paulo Novais, Fernando Lopes, Nestor D. Duque Méndez, Vicente Julián and Johan Holmgren

This book constitutes the refereed proceedings of the nine workshops co-located with the 15th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2017, held in Porto, Portugal, in June 2017.The 41 full papers presented were carefully reviewed and selected from 80 submissions. The volume presents the papers that have been accepted for the following workshops: Workshop on Agent based Applications for Air Transport and Application of Agents to Passenger Transport; Workshop on Agent-based Artificial Markets Computational Economics; Workshop on Agents and Multi-agent Systems for AAL and e-HEALTH; Workshop on Agent-Based Solutions for Manufacturing and Supply Chain; Workshop on MAS for Complex Networks and Social Computation; Workshop on Decision Making in Dynamic Information Environments; Workshop on Multi-agent based Applications for Smart Grids and Sustainable Energy Systems; Workshop on Multiagent System based Learning Environments; Workshop on Smart Cities and Intelligent Agents.

Highlights of Practical Applications of Scalable Multi-Agent Systems. The PAAMS Collection

by Javier Bajo María José Escalona Sylvain Giroux Patrycja Hoffa-Dąbrowska Vicente Julián Paulo Novais Nayat Sánchez-Pi Rainer Unland Ricardo Azambuja-Silveira

This book constitutes the refereed proceedings of the seven workshops co-located with the 14th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2016, held in Sevilla, Spain, in June 2016. The 37 full papers presented were carefully reviewed and selected from 77 submissions. The volume presents the papers that have been accepted for the following workshops: Workshop on Agents and Multi-Agent Systems for AAL and e-Health; Workshop on Agent-Based Solutions for Manufacturing and Supply Chain; Workshop on MAS for Complex Networks and Social Computation; Workshop on Decision Making in Dynamic Information Environments; Workshop on Intelligent Systems for Context-based Information Fusion; Workshop on Multi-Agent based Applications for Smart Grids and Sustainable Energy Systems; Workshop on Multiagent System based Learning Environments.

Highlights of Practical Applications of Survivable Agents and Multi-Agent Systems. The PAAMS Collection: International Workshops of PAAMS 2019, Ávila, Spain, June 26–28, 2019, Proceedings (Communications in Computer and Information Science #1047)

by Fernando De La Prieta Alfonso González-Briones Pawel Pawleski Davide Calvaresi Elena Del Val Fernando Lopes Vicente Julian Eneko Osaba Ramón Sánchez-Iborra

This book constitutes the refereed proceedings of the workshops and special session co-located with the 17th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2019, held in Ávila, Spain, in June 2019.The total of 26 full and 8 short papers presented in this volume were carefully reviewed and selected from 47 submissions. The book also contains extended abstracts of the doctoral consortium contributions. The papers in this volume stem from the following meetings: Workshop on Agents-Based Solutions for Manufacturing and Supply Chain, AMSC; Second International Workshop on Blockchain Technology for Multi-Agent Systems, BTC4MAS; Workshop on MAS for Complex Networks and Social Computation; CNSC; Workshop on Multi-Agent Based Applications for Energy Markets, Smart Grids and Sustainable Energy Systems, MASGES; Workshop on Smart Cities and Intelligent Agents, SCIA; and Workshop on Swarm Intelligence and Swarm Robotics, SISR; as well as the special session on Software Agents and Virtualization for Internet of Things, SAVIoTS.

Highly-Distributed Systems: IoT, Robotics, Mobile Apps, Energy Efficiency , Security

by Andriy Luntovskyy Dietbert Gütter

So, you are reading a book that aims to cover the field of recent innovations in network services and distributed systems. The book’s target audience includes university and technical college students, graduate engineers and teaching staff. If you are someone else, don’t worry, the topics covered may still be of interest to you!

HIMSS Dictionary of Health Information Technology Terms, Acronyms, and Organizations (HIMSS Book Series)

by Himss

This significantly expanded and newest edition of the bestselling HIMSS Dictionary of Health Information Technology Terms, Acronyms, and Organizations has been developed and extensively reviewed by more than 50 industry experts. The fourth edition of this dictionary serves as a quick reference for students, health information technology professionals and healthcare executives to better navigate the ever-growing health IT field. This valuable resource includes more than 3000 definitions, 30 new organizations and 76 new references. Definitions of terms for the information technology and clinical, medical and nursing informatics fields are updated and included. This fourth edition also includes an acronyms list with cross references to current definitions, new word-search capability, and a list of health IT-related associations and organizations, including contact information, mission statements and web addresses. Academic and certification credentials are also included. HIMSS North America, a business unit within HIMSS, positively transforms health and healthcare through the best use of information technology in the United States and Canada. As a cause-based non-profit, HIMSS North America provides thought leadership, community building, professional development, public policy, and events. HIMSS North America represents 64,000 individual members, 640 corporate members, and over 450 non-profit organizations. Thousands of volunteers work with HIMSS to improve the quality, cost-effectiveness, access, and value of healthcare through IT. HIMSS Vision Better health through information technology. HIMSS Mission Globally, lead endeavors optimizing health engagements and care outcomes through information technology.

Hiper y el mapa del fin del mundo

by Hiper

El mundo está en peligro y solo una persona puede salvarlo: ¡HIPER! HIPER está listo para pasar unos días de vacaciones en una isla paradisíaca junto con sus amigos, pero lo que no se imagina es que le espera el combate más épico para salvar a la humanidad. Un montón de gente de la isla parece haberse vuelto loca y está arrasando con todo y, por si eso fuera poco, Afrogirl y Steyb han desaparecido... ¡sin dejar rastro! La pregunta es: ¿QUÉ hay detrás de todo esto? O, mejor dicho..., ¡¿QUIÉN?! ÚNETE A HIPER Y VIVE SU AVENTURA MÁS ALUCINANTE.

Hippocampal Microcircuits: A Computational Modeler's Resource Book (Springer Series in Computational Neuroscience #5)

by Vassilis Cutsuridis Bruce P. Graham Stuart Cobb Imre Vida

This is the 2nd edition of a very well received and popular book that reflects the current state-of-the-art of the ongoing research avenues concerning the hippocampus and processing units bridging the gap between single cell activity, network activity and global brain function. It aims to provide a methodology to anyone interested in developing microcircuit level models of the hippocampus. <P><P> The book is divided into two thematic areas: (I) Experimental background and (II) Computational analysis. In part I, leading experimental neuroscientists discuss the morphological, physiological and molecular characteristics as well as the connectivity and synaptic properties of the various cell types found in the hippocampus. Behaviour-related ensemble activity patterns of morphologically identified neurons in anesthetized and freely moving animals provide insights on the function of the hippocampal areas. In part II, computational neuroscientists present models of the hippocampal microcircuits at various levels of detail (e.g. single cell level, network level, etc.). Synaptomics and connectomics models of hippocampal structures are initially discussed. Then, network models of memory, rhythm generation and spatial navigation are presented, followed by abstract and biophysical models of synaptic plasticity. Network models of hippocampal implicated disorders (epilepsy and schizophrenia) are then detailed and how their network topologies, connectivities and activities change in these diseases. Finally, two chapters are dedicated to describing simulator environments of single neurons and networks currently used by computational neuroscientists in developing their models and modelling tools to parametrically constrain them. <P><P> This engaging volume is invaluable to experimental and computational neuroscientists, electrical engineers, physicists, mathematicians and others interested in developing microcircuit models of the hippocampus. Graduate level students and trainees in all of these fields can find this book a significant source of information.

Hire Purpose: How Smart Companies Can Close the Skills Gap

by Deanna Mulligan Greg Shaw

The future of work is already here, and what this future looks like must be a pressing concern for the current generation of leaders in both the private and public sectors. In the next ten to fifteen years, rapid change in a post-pandemic world and emerging technology will revolutionize nearly every job, eliminate some, and create new forms of work that we have yet to imagine. How can we survive and thrive in the face of such drastic change?Deanna Mulligan offers a practical, broad-minded look at the effects of workplace evolution and automation and why the private sector needs to lead the charge in shaping a values-based response. With a focus on the power of education, Mulligan proposes that the solutions to workforce upheaval lie in reskilling and retraining for individuals and companies adapting to rapid change. By creating lifelong learning opportunities that break down boundaries between the classroom and the workplace, businesses can foster personal and career well-being and growth for their employees. Drawing on her own experiences, historical examples, and reports from the frontiers where these issues are unfolding, Mulligan details how business leaders can prepare for and respond to technological disruption. Providing a framework for concrete and meaningful action, Hire Purpose is an essential read about the transformations that will shape the next decade and beyond.

Hiring Geeks That Fit

by Johanna Rothman

"Do you want to hire great people? Not sure how? Read this book.Knowledge workers -- your geeks -- are different from skill-based staff. So, you should hire them differently. You need to analyze your situation, determine the problems you have, understand your culture, and then you can hire the right kinds of people.Cultural fit is critical, because we rarely fire people based on technical skill. But we frequently fire them because of that elusive fit. And, that's an expensive proposition.Hiring great geeks forces you to recognize and match culture, non-technical qualities, preferences and skills, and finally, technical skills. These people will adapt their knowledge to your specific situation, the context. They are the sum of both what they know and how they apply that knowledge to the product.As a result, one developer, tester, or technical manager is not interchangeable with another. This makes hiring technical people one of the most critical and difficult processes a technical manager or team can undertake.Hiring Geeks That Fit takes the guesswork out of hiring and reduces the risk of costly hiring mistakes. You'll learn how to:Develop a hiring strategy so you know how to solve your problemAnalyze the job, so the job description and ad falls out of the analysisI Source candidates, using a variety of approaches including LinkedIn and TwitterDevelop effective ads for different mediumsReview resumes quickly to determine Yes, No, or Maybe candidatesDevelop behavior-description questions and auditionsCreate phone screens that help you know who to bring in for an in-person interviewMake the most of an in-person interviewCheck referencesExtend an offer that will attract a win-win acceptance or tender a gentle-but-decisive rejectionCreate a great first day experience for new hiresLearn how to create a buddy system to decrease the cost of a new hireWhat to do if you can't find someoneYou, your team, and your organization will live with the long-term consequences of your hiring decision. Investing the time for you and your team in how to hire and interview will pay off fast.This book was written and produced entirely by the author. We are proud to be distributing it."

Hispanic Market Power: America’s Business Growth Engine

by Isaac Mizrahi

The US Hispanic segment represents the most prominent demographic growth in the country, and a huge and untapped business opportunity for companies willing to move away from preconceived notions and market effectively to Hispanic customers. This book shows you how. Now more than ever, corporations operating in the US should see the Hispanic population at the core of their existing and future strategies, but many leaders believe Hispanic marketing is the same marketing you run for Anglos but translated into Spanish, or that all Hispanics are undocumented immigrants with no purchasing power, or that using Mariachis in their communications is the way to connect with this diverse segment. It’s time for a modern approach, and in this book, Isaac Mizrahi, one of the country’s leading voices in multicultural marketing, uses his unique experience as a corporate executive, agency CEO, and industry leader to help businesses grow by leveraging the booming Hispanic consumer segment to drive sales. Filled with straightforward talk, illustrative case studies, and pragmatic suggestions and recommendations, this book counterbalances academic books on the topic with little connection to day-to-day reality and other books with a more political standpoint. This is a business book created by a marketer for other marketers and business leaders looking to succeed in the US.

Historical Instructional Design Cases: ID Knowledge in Context and Practice

by Elizabeth Boling Colin M. Gray Craig D. Howard John Baaki

Historical Instructional Design Cases presents a collection of design cases which are historical precedents for the field with utility for practicing designers and implications for contemporary design and delivery. Featuring concrete and detailed views of instructional design materials, programs, and environments, this book’s unique curatorial approach situates these cases in the field’s broader timeline while facilitating readings from a variety of perspectives and stages of design work. Students, faculty, and researchers will be prepared to build their lexicon of observed designs, understand the real-world outcomes of theory application, and develop cases that are fully accessible to future generations and contexts.

Historical Studies in Computing, Information, and Society: Insights from the Flatiron Lectures (History of Computing)

by William Aspray

This is a volume of chapters on the historical study of information, computing, and society written by seven of the most senior, distinguished members of the History of Computing field. These are edited, expanded versions of papers presented in a distinguished lecture series in 2018 at the University of Colorado Boulder – in the shadow of the Flatirons, the front range of the Rocky Mountains. Topics range widely across the history of computing. They include the digitalization of computer and communication technologies, gender history of computing, the history of data science, incentives for innovation in the computing field, labor history of computing, and the process of standardization. Authors were given wide latitude to write on a topic of their own choice, so long as the result is an exemplary article that represents the highest level of scholarship in the field, producing articles that scholars in the field will still look to read twenty years from now. The intention is to publish articles of general interest, well situated in the research literature, well grounded in source material, and well-polished pieces of writing. The volume is primarily of interest to historians of computing, but individual articles will be of interest to scholars in media studies, communication, computer science, cognitive science, general and technology history, and business.

Historicizing Myths in Contemporary India: Cinematic Representations and Nationalist Agendas in Hindi Cinema

by Swapna Gopinath Rutuja Deshmukh

This book examines cinematic practices in Bollywood as narratives that assist in shaping the imagination of the age, especially in contemporary India. It examines historical films released in India since the new millennium and analyses cinema as a reflection of the changing socio-political and economic conditions at any given period. The chapters in Historicizing Myths in Contemporary India: Cinematic Representations and Nationalist Agendas in Hindi Cinemas also illuminate different perspectives on how cinematic historical representations follow political patterns and market compulsions, giving precedence to a certain past over the other, creating a narrative suited for the dominant narrative of the present. From Mughal-e-Azam to Padmaavat, and Bajirao Mastani to Raazi, the chapters show how creating history out of myths validate hegemonic identities in a rapidly evolving Indian society. The volume will be of interest to scholars of film and media studies, literature and culture studies, and South Asian studies.

Histories of Computing in Eastern Europe: IFIP WG 9.7 International Workshop on the History of Computing, HC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznań, Poland, September 19–21, 2018, Revised Selected Papers (IFIP Advances in Information and Communication Technology #549)

by Christopher Leslie Martin Schmitt

This book consitutes the refereed post-conference proceedings of the IFIP WG 9.7 International Workshop on the History of Computing, HC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, in Poznań, Poland, in September 2018.The 16 revised full papers were carefully reviewed and selected from 20 submissions. They reflect academic approaches to history along with the expertise of museum and other public history professionals as well as the experience of computingand information science practitioners. The papers are organized in the following sections: Eastern Europe, Poland, Soviet Union, CoCom and Comecon; analog computing, and public history.

History and Philosophy of Computing

by Fabio Gadducci Mirko Tavosanis

This volume constitutes the refereed post-conference proceedings of the Third International Conference on the History and Philosophy of Computing, held in Pisa, Italy in October 2015. The 18 full papers included in this volume were carefully reviewed and selected from the 30 papers presented at the conference. They cover topics ranging from the world history of computing to the role of computing in the humanities and the arts.

History, ICT and Learning in the Secondary School

by Terry Haydn Christine Counsell

This book explores the current use and potential of ICT in the secondary history curriculum, and offers sound theory and practical advice to help secondary history teachers use ICT effectively. Key areas covered include: getting started in ICT and history short, medium and long-term planning using ICT to develop historical understanding and skills data handling in the history classroom ICT and maps integrating virtual resources with the real world of teaching and learning. With contributions from leading academics and practitioners in history education, this book will be important reading for all secondary history teachers and trainee teachers, but will be of interest to upper primary school teachers too.

A History of Communications

by Marshall T. Poe

A History of Communications advances a new theory of media that explains the origins and impact of different forms of communication – speech, writing, print, electronic devices and the Internet – on human history in the long term. New media are 'pulled' into widespread use by broad historical trends and these media, once in widespread use, 'push' social institutions and beliefs in predictable directions. This view allows us to see for the first time what is truly new about the Internet, what is not, and where it is taking us.

History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms (History of Computing)

by John F. Dooley

This accessible textbook presents a fascinating review of cryptography and cryptanalysis across history. The text relates the earliest use of the monoalphabetic cipher in the ancient world, the development of the “unbreakable” Vigenère cipher, and an account of how cryptology entered the arsenal of military intelligence during the American Revolutionary War. Moving on to the American Civil War, the book explains how the Union solved the Vigenère ciphers used by the Confederates, before investigating the development of cipher machines throughout World War I and II. This is then followed by an exploration of cryptology in the computer age, from public-key cryptography and web security, to criminal cyber-attacks and cyber-warfare. Looking to the future, the role of cryptography in the Internet of Things is also discussed, along with the potential impact of quantum computing.Topics and features: presents a history of cryptology from ancient Rome to the present day, with a focus on cryptology in the 20th and 21st centuries; reviews the different types of cryptographic algorithms used to create secret messages, and the various methods for breaking such secret messages; provides engaging examples throughout the book illustrating the use of cryptographic algorithms in different historical periods; describes the notable contributions to cryptology of Herbert Yardley, William and Elizebeth Smith Friedman, Lester Hill, Agnes Meyer Driscoll, and Claude Shannon; concludes with a review of tantalizing unsolved mysteries in cryptology, such as the Voynich Manuscript, the Beale Ciphers, and the Kryptos sculpture.This engaging work is ideal as both a primary text for courses on the history of cryptology, and as a supplementary text for advanced undergraduate courses on computer security. No prior background in mathematics is assumed, beyond what would be encountered in an introductory course on discrete mathematics.

A History of Cyber Security Attacks: 1980 to Present

by Bruce Middleton

Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the public, knowing how the attacks are launched and succeed is vital to ensuring cyber security. The book provides a concise summary in a historical context of the major global cyber security attacks since 1980. Each attack covered contains an overview of the incident in layman terms, followed by a technical details section, and culminating in a lessons learned and recommendations section.

A History of Data Visualization and Graphic Communication

by Michael Friendly Howard Wainer

A comprehensive history of data visualization—its origins, rise, and effects on the ways we think about and solve problems. With complex information everywhere, graphics have become indispensable to our daily lives. Navigation apps show real-time, interactive traffic data. A color-coded map of exit polls details election balloting down to the county level. Charts communicate stock market trends, government spending, and the dangers of epidemics. A History of Data Visualization and Graphic Communication tells the story of how graphics left the exclusive confines of scientific research and became ubiquitous. As data visualization spread, it changed the way we think. Michael Friendly and Howard Wainer take us back to the beginnings of graphic communication in the mid-seventeenth century, when the Dutch cartographer Michael Florent van Langren created the first chart of statistical data, which showed estimates of the distance from Rome to Toledo. By 1786 William Playfair had invented the line graph and bar chart to explain trade imports and exports. In the nineteenth century, the “golden age” of data display, graphics found new uses in tracking disease outbreaks and understanding social issues. Friendly and Wainer make the case that the explosion in graphical communication both reinforced and was advanced by a cognitive revolution: visual thinking. Across disciplines, people realized that information could be conveyed more effectively by visual displays than by words or tables of numbers. Through stories and illustrations, A History of Data Visualization and Graphic Communication details the 400-year evolution of an intellectual framework that has become essential to both science and society at large.

History of Digital Games: Developments in Art, Design and Interaction

by Andrew Williams

The growth of videogame design programs in higher education and explosion of amateur game development has created a need for a deeper understanding of game history that addresses not only "when," but "how" and "why." Andrew Williams takes the first step in creating a comprehensive survey on the history of digital games as commercial products and artistic forms in a textbook appropriate for university instruction. History of Digital Games adopts a unique approach and scope that traces the interrelated concepts of game design, art and design of input devices from the beginnings of coin-operated amusement in the late 1800s to the independent games of unconventional creators in the present. Rooted in the concept of videogames as designed objects, Williams investigates the sources that inspired specific game developers as well as establishing the historical, cultural, economic and technological contexts that helped shape larger design trends

A History of Fake Things on the Internet

by Walter Scheirer

A Next Big Idea Club "Must Read" for December 2023 As all aspects of our social and informational lives increasingly migrate online, the line between what is "real" and what is digitally fabricated grows ever thinner—and that fake content has undeniable real-world consequences. A History of Fake Things on the Internet takes the long view of how advances in technology brought us to the point where faked texts, images, and video content are nearly indistinguishable from what is authentic or true. Computer scientist Walter J. Scheirer takes a deep dive into the origins of fake news, conspiracy theories, reports of the paranormal, and other deviations from reality that have become part of mainstream culture, from image manipulation in the nineteenth-century darkroom to the literary stylings of large language models like ChatGPT. Scheirer investigates the origins of Internet fakes, from early hoaxes that traversed the globe via Bulletin Board Systems (BBSs), USENET, and a new messaging technology called email, to today's hyperrealistic, AI-generated Deepfakes. An expert in machine learning and recognition, Scheirer breaks down the technical advances that made new developments in digital deception possible, and shares behind-the-screens details of early Internet-era pranks that have become touchstones of hacker lore. His story introduces us to the visionaries and mischief-makers who first deployed digital fakery and continue to influence how digital manipulation works—and doesn't—today: computer hackers, digital artists, media forensics specialists, and AI researchers. Ultimately, Scheirer argues that problems associated with fake content are not intrinsic properties of the content itself, but rather stem from human behavior, demonstrating our capacity for both creativity and destruction.

The History of Information Security: A Comprehensive Handbook

by Karl Maria Michael De Leeuw Jan Bergstra

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties. <p><p> The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas other aspects have remained largely uncovered. <p><p>There has never been any effort to write a comprehensive history. This is most unfortunate, because Information Security should be perceived as a set of communicating vessels, where technical innovations can make existing legal or organisational frame-works obsolete and a breakdown of political authority may cause an exclusive reliance on technical means. <p><p> This book is intended as a first field-survey. It consists of twenty-eight contributions, written by experts in such diverse fields as computer science, law, or history and political science, dealing with episodes, organisations and technical developments that may considered to be exemplary or have played a key role in the development of this field. <p><p> These include: the emergence of cryptology as a discipline during the Renaissance, the Black Chambers in 18th century Europe, the breaking of German military codes during World War II, the histories of the NSA and its Soviet counterparts and contemporary cryptology. <p><p>Other subjects are: computer security standards, viruses and worms on the Internet, computer transparency and free software, computer crime, export regulations for encryption software and the privacy debate. <p><p> - Interdisciplinary coverage of the history Information Security<p> - Written by top experts in law, history, computer and information science<p> - First comprehensive work in Information Security

History of Nordic Computing 4

by Christian Gram Per Rasmussen Søren Duus Østergaard

This book constitutes the refereed post-proceedings of the 4th IFIP WG 9. 7 Conference on the History of Nordic Computing, HiNC 4, held in Copenhagen, Denmark, in August 2014. The 37 revised full papers were carefully reviewed and selected for inclusion in this volume. The papers focus on innovative ICT milestones that transformed the nordic societies and on the new ideas, systems and solutions that helped creating the welfare societies of today, in particular solutions and systems for public services, e. g. , tax, social benefits, health care and education; solutions and systems for the infrastructure of the society, e. g. , banking, insurance, telephones, transport and energy supply; and technologies and IT policies behind the major IT milestones, e. g. , user centric innovation, programming techniques and IT ethics. They are organized in topical sections on IT policy, infrastructure, public services, private services, telesystems, health care, IT in banking, transport and IT technology.

The History of the Computer: People, Inventions, and Technology that Changed Our World

by Rachel Ignotofsky

A strikingly illustrated overview of the computing machines that have changed our world—from the abacus to the smartphone—and the people who made them, by the New York Times bestselling author and illustrator of Women in Science.Computers are everywhere and have impacted our lives in so many ways. But who created them, and why? How have they transformed the way that we interact with our surroundings and each other?Packed with accessible information, fun facts, and discussion starters, this charming and art-filled book takes you from the ancient world to the modern day, focusing on important inventions, from the earliest known counting systems to the sophisticated algorithms behind AI. The History of the Computer also profiles a diverse range of key players and creators—from An Wang and Margaret Hamilton to Steve Jobs and Sir Tim Berners-Lee—and illuminates their goals, their intentions, and the impact of their inventions on our everyday lives. This entertaining and educational journey will help you understand our most important machines and how we can use them to enhance the way we live. You&’ll never look at your phone the same way again!

Refine Search

Showing 24,676 through 24,700 of 55,973 results