Browse Results

Showing 24,776 through 24,800 of 55,972 results

How Computers Make Books: From graphics rendering, search algorithms, and functional programming to indexing and typesetting

by John Whitington

Learn about computer science by exploring the fascinating journey it took to make this book!How Computers Make Books introduces what&’s wonderful about computer science by showing how computers have transformed the art of publishing books. Author and publishing software developer John Whitington reveals the elegant computer science solutions invented to solve big publishing challenges. In How Computers Make Books you&’ll discover: How human descriptions are translated into computer programs How a computer can understand document formatting How a program decides where to print ink on a page Why computer science is so interesting to computer scientists, and why it might interest you …and much more! How do computers represent all the different languages and letters used by humans? How do we compress a book&’s worth of complex information so it can be transferred in seconds? And what exactly is a computer program? This book answers all those questions by telling the story of how it was created! About the technology Computers are part of every step in creating a book, from capturing the author&’s words as a digital document to controlling how the ink gets onto the paper. How Computers Make Books introduces basic computer science concepts like file formatting, transfer, and storage, computer programming, and task automation by guiding you through the modern digital printing process. About the book This book takes you on a journey from the plain white page, weaving through typesetting, making gray images from black ink, electronic file formats, and more. It makes computer science come alive as you see how every word, illustration, and page has its own story. You&’ll even learn to write your own simple programs and discover hands-on what&’s so intoxicating about computer science. What's inside How human descriptions are translated into computer programs How a digital computer thinks about print documents How a program decides where to print ink on a page How the history of typesetting shows up in modern books About the reader For the curious-but-clueless about computer science—and anyone interested in how computers make books! About the author John Whitington is the founder of a company that builds software for electronic document processing. He has studied and taught Computer Science at Queens&’ College, Cambridge. Technical editor on this book was Bojan Stojanovic. Table of Contents 1 Putting marks on paper 2 Letter forms 3 Storing words 4 Looking and finding 5 Typing it in 6 Saving space 7 The sums behind the screen 8 Gray areas 9 A typeface 10 Words to paragraphs 11 Out into the world

How Computers Really Work: A Hands-On Guide to the Inner Workings of the Machine

by Matthew Justice

An approachable, hands-on guide to understanding how computers work, from low-level circuits to high-level code.How Computers Really Work is a hands-on guide to the computing ecosystem: everything from circuits to memory and clock signals, machine code, programming languages, operating systems, and the internet.But you won't just read about these concepts, you'll test your knowledge with exercises, and practice what you learn with 41 optional hands-on projects. Build digital circuits, craft a guessing game, convert decimal numbers to binary, examine virtual memory usage, run your own web server, and more.Explore concepts like how to: • Think like a software engineer as you use data to describe a real world concept • Use Ohm's and Kirchhoff's laws to analyze an electrical circuit • Think like a computer as you practice binary addition and execute a program in your mind, step-by-stepThe book's projects will have you translate your learning into action, as you: • Learn how to use a multimeter to measure resistance, current, and voltage • Build a half adder to see how logical operations in hardware can be combined to perform useful functions • Write a program in assembly language, then examine the resulting machine code • Learn to use a debugger, disassemble code, and hack a program to change its behavior without changing the source code • Use a port scanner to see which internet ports your computer has open • Run your own server and get a solid crash course on how the web worksAnd since a picture is worth a thousand bytes, chapters are filled with detailed diagrams and illustrations to help clarify technical complexities.Requirements: The projects require a variety of hardware - electronics projects need a breadboard, power supply, and various circuit components; software projects are performed on a Raspberry Pi. Appendix B contains a complete list. Even if you skip the projects, the book's major concepts are clearly presented in the main text.

How COVID-19 is Accelerating the Digital Revolution: Challenges and Opportunities

by R. Anandan G. Suseendran Pushpita Chatterjee Noor Zaman Jhanjhi Uttam Ghosh

This book explores how digital technologies have proved to be a useful and necessary tool to help ensure that local and regional governments on the frontline of the emergency can continue to provide essential public services during the COVID-19 crisis. Indeed, as the demand for digital technologies grows, local and regional governments are increasingly committed to improving the lives of their citizens under the principles of privacy, freedom of expression and democracy.The Digital Revolution began between the late 1950s and 1970s and represents the evolution of technology from the mechanical and analog to the digital. The advent of digital technology has also changed how humans communicate – today using computers, smartphones and the internet. Further, the digital revolution has made a tremendous wealth of information accessible to virtually everyone. In turn, the book focuses on key challenges for local and regional governments concerning digital technologies during this crisis, e.g. the balance between privacy and security, the digital divide, and accessibility. Privacy is a challenge in the mitigation of COVID-19, as governments rely on digital technologies like contact-tracking apps and big data to help trace peoples’ patterns and movements. While these methods are controversial and may infringe on rights to privacy, they also appear to be effective measures for rapidly controlling and limiting the spread of the virus. Next, the book discusses the 10 technology trends that can help build a resilient society, as well as their effects on how we do business, how we work, how we produce goods, how we learn, how we seek medical services and how we entertain ourselves. Lastly, the book addresses a range of diversified technologies, e.g. Online Shopping and Robot Deliveries, Digital and Contactless Payments, Remote Work, Distance Learning, Telehealth, Online Entertainment, Supply Chain 4.0, 3D Printing, Robotics and Drones, 5G, and Information and Communications Technology (ICT).

How Cybersecurity Really Works: A Hands-On Guide for Total Beginners

by Sam Grubb

Cybersecurity for Beginners is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as how to defend yourself and organizations against online attacks.You don&’t need a technical background to understand core cybersecurity concepts and their practical applications – all you need is this book. It covers all the important stuff and leaves out the jargon, giving you a broad view of how specific attacks work and common methods used by online adversaries, as well as the controls and strategies you can use to defend against them. Each chapter tackles a new topic from the ground up, such as malware or social engineering, with easy-to-grasp explanations of the technology at play and relatable, real-world examples. Hands-on exercises then turn the conceptual knowledge you&’ve gained into cyber-savvy skills that will make you safer at work and at home. You&’ll explore various types of authentication (and how they can be broken), ways to prevent infections from different types of malware, like worms and viruses, and methods for protecting your cloud accounts from adversaries who target web apps. You&’ll also learn how to: • Use command-line tools to see information about your computer and network • Analyze email headers to detect phishing attempts • Open potentially malicious documents in a sandbox to safely see what they do • Set up your operating system accounts, firewalls, and router to protect your network • Perform a SQL injection attack by targeting an intentionally vulnerable website • Encrypt and hash your files In addition, you&’ll get an inside look at the roles and responsibilities of security professionals, see how an attack works from a cybercriminal&’s viewpoint, and get first-hand experience implementing sophisticated cybersecurity measures on your own devices.

How Data Happened: A History from the Age of Reason to the Age of Algorithms

by Chris Wiggins Matthew L. Jones

“Fascinating.” —Jill Lepore, The New Yorker A sweeping history of data and its technical, political, and ethical impact on our world. From facial recognition—capable of checking people into flights or identifying undocumented residents—to automated decision systems that inform who gets loans and who receives bail, each of us moves through a world determined by data-empowered algorithms. But these technologies didn’t just appear: they are part of a history that goes back centuries, from the census enshrined in the US Constitution to the birth of eugenics in Victorian Britain to the development of Google search. Expanding on the popular course they created at Columbia University, Chris Wiggins and Matthew L. Jones illuminate the ways in which data has long been used as a tool and a weapon in arguing for what is true, as well as a means of rearranging or defending power. They explore how data was created and curated, as well as how new mathematical and computational techniques developed to contend with that data serve to shape people, ideas, society, military operations, and economies. Although technology and mathematics are at its heart, the story of data ultimately concerns an unstable game among states, corporations, and people. How were new technical and scientific capabilities developed; who supported, advanced, or funded these capabilities or transitions; and how did they change who could do what, from what, and to whom? Wiggins and Jones focus on these questions as they trace data’s historical arc, and look to the future. By understanding the trajectory of data—where it has been and where it might yet go—Wiggins and Jones argue that we can understand how to bend it to ends that we collectively choose, with intentionality and purpose.

How Data Science Is Transforming Health Care

by Tim O'Reilly Mike Loukides Julie Steele Colin Hill

<p>In the early days of the 20th century, department store magnate John\nWanamaker famously said, "I know that half of my advertising doesn't\nwork. The problem is that I don't know which half." That remained\nbasically true until Google transformed advertising with AdSense based\non new uses of data and analysis. The same might be said about health\ncare and it's poised to go through a similar transformation as new\ntools, techniques, and data sources come on line. Soon we'll make\npolicy and resource decisions based on much better understanding of\nwhat leads to the best outcomes, and we'll make medical decisions\nbased on a patient's specific biology. The result will be better\nhealth at less cost.<br/><br/>\nThis paper explores how data analysis will help us structure the\nbusiness of health care more effectively around outcomes, and how it\nwill transform the practice of medicine by personalizing for each\nspecific patient.</p>

How Digital Intelligence Drives Business Growth (Management for Professionals)

by Zhizhuan Business Research Institute

This book aims to build a framework for understanding how to achieve new business growth through digital intelligence. It reveals the driving force and commercial logic behind the technology upgrade and transformation for enterprises, analyzes how to improve enterprises' branding, product, distribution channel, marketing, logistics, and organization under the new context, and studies the successful cases in digital intelligence of 6 Chinese enterprises. For business school students, researchers, managers, and practitioners, it is helpful to build an overview and understanding on strategy level as well as practice level.

How Do I Photograph A Sunset?: More than 150 essential photography questions answered

by Chris Gatcum

How do we learn? We learn by asking questions. But what if we don't know what questions we should be asking? Thanks to the digital revolution, photography has never been so popular, and whether you shoot on a phone or a top-spec DSLR or CSC camera, the urge to improve is relentless. In this book, author Chris Gatcum asks the questions that every photographer will have in mind at some point in their image-making journey, and then answers them in a clear, concise, straightforward and inspirational manner. Laid out in intuitive sections, this book tackles the questions that are on every photographer's mind, as well as those that they haven't thought of yet. And with a clear progression through each chapter, from the simple to more complex, the book asks - and answers - questions to satisfy the complete novice as well as the advanced practitioner.

How Do I Photograph A Sunset?: More than 150 essential photography questions answered

by Chris Gatcum

How do we learn? We learn by asking questions. But what if we don't know what questions we should be asking? Thanks to the digital revolution, photography has never been so popular, and whether you shoot on a phone or a top-spec DSLR or CSC camera, the urge to improve is relentless. In this book, author Chris Gatcum asks the questions that every photographer will have in mind at some point in their image-making journey, and then answers them in a clear, concise, straightforward and inspirational manner. Laid out in intuitive sections, this book tackles the questions that are on every photographer's mind, as well as those that they haven't thought of yet. And with a clear progression through each chapter, from the simple to more complex, the book asks - and answers - questions to satisfy the complete novice as well as the advanced practitioner.

How Education Works: Teaching, Technology, and Technique (Issues in Distance Education)

by Jon Dron

In this engaging volume, Jon Dron views education, learning, and teaching through a technological lens that focuses on the parts we play in technologies, from language and pedagogies to computers and regulations. He proposes a new theory of education whereby individuals are not just users but co-participants in technologies— technologies that are intrinsic parts of our cognition, of which we form intrinsic parts, through which we are entangled with one another and the world around us. Dron reframes popular families of educational theory (objectivist, subjectivist, and complexivist) and explains a variety of educational phenomena, including the failure of learning style theories, the nature of literacies, systemic weaknesses in learning management systems, the prevalence of cheating in educational institutions, and the fundamental differences between online and in-person learning. Ultimately, How Education Works articulates how practitioners in education can usefully understand technology, education, and their relationship to improve teaching practice.

How Fuzzy Concepts Contribute to Machine Learning (Studies in Fuzziness and Soft Computing #416)

by Vicenç Torra Mahdi Eftekhari Adel Mehrpooya Farid Saberi-Movahed

This book introduces some contemporary approaches on the application of fuzzy and hesitant fuzzy sets in machine learning tasks such as classification, clustering and dimension reduction. Many situations arise in machine learning algorithms in which applying methods for uncertainty modeling and multi-criteria decision making can lead to a better understanding of algorithms behavior as well as achieving good performances. Specifically, the present book is a collection of novel viewpoints on how fuzzy and hesitant fuzzy concepts can be applied to data uncertainty modeling as well as being used to solve multi-criteria decision making challenges raised in machine learning problems. Using the multi-criteria decision making framework, the book shows how different algorithms, rather than human experts, are employed to determine membership degrees. The book is expected to bring closer the communities of pure mathematicians of fuzzy sets and data scientists.

How Happy to Call Oneself a Turk

by Gavin D. Brockett

The modern nation-state of Turkey was established in 1923, but when and how did its citizens begin to identify themselves as Turks? Mustafa Kemal Ataturk, Turkey's founding president, is almost universally credited with creating a Turkish national identity through his revolutionary program to "secularize" the former heartland of the Ottoman Empire. Yet, despite Turkey's status as the lone secular state in the Muslim Middle East, religion remains a powerful force in Turkish society, and the country today is governed by a democratically elected political party with a distinctly religious (Islamist) orientation. In this history, Gavin D. Brockett takes a fresh look at the formation of Turkish national identity, focusing on the relationship between Islam and nationalism and the process through which a "religious national identity" emerged. Challenging the orthodoxy that Ataturk and the political elite imposed a sense of national identity from the top down, Brockett examines the social and political debates in provincial newspapers from around the country. He shows that the unprecedented expansion of print media in Turkey between 1945 and 1954, which followed the end of strict, single-party authoritarian government, created a forum in which ordinary people could inject popular religious identities into the new Turkish nationalism. Brockett makes a convincing case that it was this fruitful negotiation between secular nationalism and Islam--rather than the imposition of secularism alone--that created the modern Turkish national identity.

How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It!

by John J. Trinckes, Jr.

The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual perspectives. Someone hacking into a medical device and changing it is life-threatening. Personal information is available on the black market. And there are increased medical costs, erroneous medical record data that could lead to wrong diagnoses, insurance companies or the government data-mining healthcare information to formulate a medical ‘FICO’ score that could lead to increased insurance costs or restrictions of insurance. Experts discuss these issues and provide solutions and recommendations so that we can change course before a Healthcare Armageddon occurs.

How Humans Judge Machines

by Cesar A. Hidalgo Diana Orghiain Jordi Albo Canals Filipa De Almeida Natalia Martin

How people judge humans and machines differently, in scenarios involving natural disasters, labor displacement, policing, privacy, algorithmic bias, and more.How would you feel about losing your job to a machine? How about a tsunami alert system that fails? Would you react differently to acts of discrimination depending on whether they were carried out by a machine or by a human? What about public surveillance? How Humans Judge Machines compares people's reactions to actions performed by humans and machines. Using data collected in dozens of experiments, this book reveals the biases that permeate human-machine interactions. Are there conditions in which we judge machines unfairly? Is our judgment of machines affected by the moral dimensions of a scenario? Is our judgment of machine correlated with demographic factors such as education or gender? César Hidalgo and colleagues use hard science to take on these pressing technological questions. Using randomized experiments, they create revealing counterfactuals and build statistical models to explain how people judge artificial intelligence and whether they do it fairly. Through original research, How Humans Judge Machines bring us one step closer tounderstanding the ethical consequences of AI.

How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code: And Other Stories Of Intelligence And Codes

by David Kahn

This book recounts the desperate efforts to gather information during World War II and the Cold War. The author provides insight into the dark realm of intelligence and code that will fascinate cryptographers, intelligence personnel, and the millions of people interested in military history, espionage adventure, and world affairs. David Kahn is universally regarded as the dean of intelligence historians. Authoritative and addictively readable, this book, by revealing the past, helps guide present and future intelligence efforts.

How I Rob Banks: And Other Such Places

by FC

Follow FC as he steals from the world’s most secure banks and government facilities—without breaking a single law In How I Rob Banks: And Other Such Places, renowned ethical hacker and social engineer FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to “steal” money, data, and anything else he can get his hands on. In the book, you’ll explore the secretive world of physical assessments and follow FC as he breaks into banks and secure government locations to identify security flaws and loopholes. The author explains how banks and other secure facilities operate, both digitally and physically, and shows you the tools and techniques he uses to gain access to some of the world’s most locked-down buildings. You’ll also find: Strategies you can implement immediately to better secure your own company, home, and data against malicious actors Detailed photos, maps, and drawings to bring to life the unbelievable true stories contained inside An inside and candid look at a rarely examined industry through the eyes of one of its most respected penetration testers A can’t-miss account of real-life security exploits perfect for infosec pros, including red and blue teamers, pentesters, CIOs, CISSPs, and social engineers, How I Rob Banks also belongs in the hands of anyone who loves a great Ocean’s 11-style story pulled straight from the real world.

How Images Think

by Ron Burnett

Digital images are an integral part of all media, including television, film, photography, animation, video games, data visualization, and the Internet. In the digital world, spectators become navigators wending their way through a variety of interactive experiences, and images become spaces of visualization with more and more intelligence programmed into the very fabric of communication processes. In How Images Think, Ron Burnett explores this new ecology, which has transformed the relationships humans have with the image-based technologies they have created. So much intelligence has been programmed into these image-dependent technologies that it often seems as if images are "thinking"; ascribing thought to machines redefines our relationship with them and enlarges our ideas about body and mind. Burnett argues that the development of this new, closely interdependent relationship marks a turning point in our understanding of the connections between humans and machines. After presenting an overview of visual perception, Burnett examines the interactive modes of new technologies -- including computer games, virtual reality, digital photography, and film -- and locates digital images in a historical context. He argues that virtual images occupy a "middle space," combining the virtual and the real into an environment of visualization that blurs the distinctions between subject and object -- part of a continuum of experiences generated by creative choices by viewers, the results of which cannot be attributed either to images or to participants.

How Information Systems Came to Rule the World: And Other Essays (Routledge Focus on IT & Society)

by Burt Swanson

This book offers a fresh perspective on information systems, a field of study and practice currently undergoing substantial upheaval, even as it expands rapidly and widely with new technologies and applications. Mapping the field as it has developed, the author firmly establishes the under-recognized importance of the field, and grounds it firmly in the subject’s history. He argues against the view of enthusiasts who believe that the field has somehow moved "beyond information systems" to something more exotic and offers a short and compelling manifesto on behalf of the field and its future. Offering a comprehensive insight into the significance of the information systems field, this book will appeal primarily to scholars and practitioners working in information systems, management, communication studies, technology studies, and related areas.

How Intranets Work

by Preston Gralla

Now you can learn how intranets work, what they can and cannot do for your organization. This is a great beginner's guide to intranets.

How JavaScript Works: Master the Basics of JavaScript and Modern Web App Development

by Jonathon Simpson

JavaScript is a complicated language with a lot of misinformation surrounding how it works. This book provides a comprehensive introduction to JavaScript, from how it works at a technical level to how it is used to create websites and applications. Everything you need to know to start a career in JavaScript development is covered here. How JavaScript Works begins with a practical introduction of the basics before moving into the technical underpinnings of JavaScript, detailing everything you need to know, including variables, memory storage, functions, classes, types, maps, sets and APIs. Once you’ve fully absorbed these key topics. author Jonathan Simpson will show you how to put them into practice, demonstrating how they are employed for modern web development. You’ll learn how to use JavaScript with HTML and CSS to construct web pages and applications, how to change CSS with JavaScript, and how to utilize Fetch and asynchronous operations. Upon completing this book, you will have the foundational knowledge necessary to continue your journey to becoming a professional JavaScript developer. What You Will Learn: Gain insight into the technical essentials of JavaScript and how it worksLearn advanced concepts and such as memory storage and how classes, functions and objects actually workExplore the basic mathematical underpinnings of JavaScriptUnderstand how JavaScript is used to manipulate HTML and CSSObtain the tools and knowledge needed to start your career in web development Who This Book Is For: Anyone interested in a web development career, as well as those who may have already embarked on their careers, but who want to deepen their technical understanding of JavaScript and how it works.

How Linux Works: What Every Superuser Should Know

by Brian Ward

Whether you're a systems administrator or a home user, you need to understand how Linux internals work before you can really master Linux — how it boots, how networking works, how to customize the kernel, and even what hardware to buy.How Linux Works contains the kind of information normally handed down from wizards—knowledge that comes from years of experience doing things the hard way. But instead of seeking the right incantation to make your system work, you can read How Linux Works to see how to administer Linux and why each particular technique works.This book covers such need-to-know topics as:–How Linux boots, with coverage of boot loaders and init–How networking, interfaces, firewalls, and servers work–How development tools and shared libraries work–How the kernel manages devices, device drivers, and processes, and how to build a custom kernel–How the Linux printing system works, with sections on cups, filters, and Ghostscript–How shell scripts workWith its combination of background theory and real-world examples, How Linux Works will show you how to run your system instead of having your system run you.

How Linux Works, 2nd Edition: What Every Superuser Should Know

by Brian Ward

Unlike some operating systems, Linux doesn’t try to hide the important bits from you—it gives you full control of your computer. But to truly master Linux, you need to understand its internals, like how the system boots, how networking works, and what the kernel actually does.In this completely revised second edition of the perennial best seller How Linux Works, author Brian Ward makes the concepts behind Linux internals accessible to anyone curious about the inner workings of the operating system. Inside, you’ll find the kind of knowledge that normally comes from years of experience doing things the hard way. You’ll learn:–How Linux boots, from boot loaders to init implementations (systemd, Upstart, and System V)–How the kernel manages devices, device drivers, and processes–How networking, interfaces, firewalls, and servers work–How development tools work and relate to shared libraries–How to write effective shell scriptsYou’ll also explore the kernel and examine key system tasks inside user space, including system calls, input and output, and filesystems. With its combination of background, theory, real-world examples, and patient explanations, How Linux Works will teach you what you need to know to solve pesky problems and take control of your operating system.

How Linux Works, 3rd Edition: What Every Superuser Should Know

by Brian Ward

Best-selling guide to the inner workings of the Linux operating system with over 50,000 copies sold since its original release in 2014. Unlike some operating systems, Linux doesn&’t try to hide the important bits from you—it gives you full control of your computer. But to truly master Linux, you need to understand its internals, like how the system boots, how networking works, and what the kernel actually does. In this third edition of the bestselling How Linux Works, author Brian Ward peels back the layers of this well-loved operating system to make Linux internals accessible. This edition has been thoroughly updated and expanded with added coverage of Logical Volume Manager (LVM), virtualization, and containers. You'll learn: • How Linux boots, from boot loaders to init (systemd) • How the kernel manages devices, device drivers, and processes • How networking, interfaces, firewalls, and servers work • How development tools work and relate to shared libraries • How to write effective shell scripts You&’ll also explore the kernel and examine key system tasks inside user space, including system calls, input and output, and filesystems. With its combination of background, theory, real-world examples, and patient explanations, How Linux Works, 3rd edition will teach you what you need to know to solve pesky problems and take control of your operating system.

How Machine Learning is Innovating Today's World: A Concise Technical Guide

by Arindam Dey Sukanta Nayak Sachi Nandan Mohanty Ranjan Kumar

Provides a comprehensive understanding of the latest advancements and practical applications of machine learning techniques. Machine learning (ML), a branch of artificial intelligence, has gained tremendous momentum in recent years, revolutionizing the way we analyze data, make predictions, and solve complex problems. As researchers and practitioners in the field, the editors of this book recognize the importance of disseminating knowledge and fostering collaboration to further advance this dynamic discipline. How Machine Learning is Innovating Today's World is a timely book and presents a diverse collection of 25 chapters that delve into the remarkable ways that ML is transforming various fields and industries. It provides a comprehensive understanding of the practical applications of ML techniques. The wide range of topics include: An analysis of various tokenization techniques and the sequence-to-sequence model in natural language processing explores the evaluation of English language readability using ML models a detailed study of text analysis for information retrieval through natural language processing the application of reinforcement learning approaches to supply chain management the performance analysis of converting algorithms to source code using natural language processing in Java presents an alternate approach to solving differential equations utilizing artificial neural networks with optimization techniques a comparative study of different techniques of text-to-SQL query conversion the classification of livestock diseases using ML algorithms ML in image enhancement techniques the efficient leader selection for inter-cluster flying ad-hoc networks a comprehensive survey of applications powered by GPT-3 and DALL-E recommender systems' domain of application reviews mood detection, emoji generation, and classification using tokenization and CNN variations of the exam scheduling problem using graph coloring the intersection of software engineering and machine learning applications explores ML strategies for indeterminate information systems in complex bipolar neutrosophic environments ML applications in healthcare, in battery management systems, and the rise of AI-generated news videos how to enhance resource management in precision farming through AI-based irrigation optimization. Audience The book will be extremely useful to professionals, post-graduate research scholars, policymakers, corporate managers, and anyone with technical interests looking to understand how machine learning and artificial intelligence can benefit their work.

How Not to Fail at Projects: Stopping the Project Management Insanity Spiral

by Claude H. Maley

They say that repeating the same thing and expecting a different result is insanity. This book aims to analyze the reasons for failure in project management. It is filled with stories, anecdotes and satires that highlight how organizations and project managers fall into an “insanity spiral”. It provides seven Sanity Checks designed to keep project managers from repeating the same mistakes and to help them become project champions: The first sanity check is how and when to appoint a project manager. This first sanity check may be familiar and may well bring back memories of starting a career in project management. The second sanity check is the comprehension of why a project is needed. It helps to overcome the misunderstanding that many have on the nature of projects and its management. The third sanity check is the understanding of the unknown and emphasizes the importance of risk management. The fourth sanity check is capturing who needs what. It is about the constant pursuit to satisfy a host of individuals and at times the, sometimes seemingly, unsurmountable quest to secure resources for a project. The fifth sanity check is who does what. It also deals with satisfying stakeholders and obtaining resources. The sixth sanity check is outside assistance. It is all about breaking the us versus them syndrome when outsourcing in a project. The seventh and most important sanity check is engaging the efforts of others as it deals with people—the lifeblood of any organization. The book concludes with a chapter on composing and building powerful microservices. With the exponential growth of IoT devices, microservices are being developed and deployed on resource-constrained but resource-intensive devices in order to provide people-centric applications. The book discusses the challenges of these applications. Finally, the book looks at the role of microservices in smart environments and upcoming trends including ubiquitous yet disappearing microservices.

Refine Search

Showing 24,776 through 24,800 of 55,972 results