- Table View
- List View
75 consejos para sobrevir a las redes sociales (Serie 75 Consejos #8)
by María Frisa¡¡Llega el volumen número 8 de la exitosa serie «75 consejos», el DIARIO MÁS TRONCHANTE JAMÁS ESCRITO!! Y esta vez no querrás perdértelo, porque lo necesitas: ¿cómo sobrevivir cuando las redes sociales se vuelven en tu contra? ¿Alguna vez un «amigo» ha subido una foto o un vídeo tuyo humillante, de esos que a los demás les hacen mucha gracia (porque no salen) y tú has sido el último en enterarte? ¿Quieres saber qué hacer para intentar pararlo (difícil) o, por lo menos, contrarrestarlo? ¡¡No esperes más, ABRE ESTE LIBRO!! ¡Y aprende de mis 75 superconsejos! Bueno, ejem, ejem, también de mis errores... Y recuerda: si hay algo eterno, es lo que subes a un grupo de WhatsApp, (el sol se apagará, las estrellas desaparecerán, la raza humana se extinguirá, pero tu foto seguirá ahí).
77 Bloques para Construir una Transformación Digital: Explicación Simplificada
by Jace AnEn 2018, ‘77 Bloques para Construir una Transformación Digital: Modelo de Capacidad Digital’ fue publicado para asistir a los ‘practicantes digitales’ quienes trabajan en el espacio digital. Desde entonces, pocos lectores me han sugerido escribir un libro sobre la transformación digital para ‘el público en general’ que estuviere interesado en aprender más que lo básico sobre la transformación digital. Es así que he creado este libro ‘77 Bloques para Construir una Transformación Digital: Explicación Simplificada’. Este libro intenta entregar los mensajes claves de ‘77 Bloques para Construir una Transformación Digital: Modelo de Capacidad Digital’ al público en general. Dicho esto, este no pretende ser un libro de teoría que discuta las ideas y conceptos académicos de la transformación digital, sino un libro práctico de campo que describe las capacidades digitales probadas como los bloques de construcción para la transformación digital. ‘77 Bloques para Construir una Transformación Digital: Explicación Simplificada’ se enfoca en introducir 77 bloques de construcción para asistir al público en general a comprender las ‘prácticas reales’ en el espacio digital, aunque no cubre totalmente el Modelo de Madurez descripto en detalle en ‘77 Bloques para Construir una Transformación Digital: Modelo de Capacidad Digital’ que asiste a los practicantes digitales con indicadores de madurez de las capacidades digitales. Este libro proporciona unos pocos ejemplos de indicadores de mayor madurez como una introducción al Modelo de Madurez de las Capacidades Digitales.
77 Bloques para Construir una Transformación Digital: El Modelo de Capacidad Digital
by Jace AnEste no es un libro sobre teoría que discuta conceptos académicos de transformaración digital, sino que se orienta a la práctica de campo que describe cómo asesorar y mejorar las capacidades digitales de una organización. Más bien satisface mejor a los ‘practicantes digitales’, quienes están involucrados en operaciones de negocios digitales, incluyendo tecnología informática y digital, comercio electrónico, servicios de atención al cliente online y muchas otras áreas operativas en las que la tecnología informática podría tener impacto. La capacidad digital está definida en este libro como la capacidad organizativa y la habilidad para producir resultados de negocio intencionales en el espacio digital al combinar procesos, personas y elementos tecnológicos de un modo único para cada organización. Los elementos del proceso incluyen flujo de proceso, información de entrada y salida; reglas del negocio; políticas y lineamientos. El elemento humano incluye una estructura y cultura organizacional; roles, responsabilidades y habilidades de las personas. Los elementos tecnológicos incluyen aplicaciones; infraestructura de datos; instalaciones y equipos alrededor de la tecnología digital. La capacidad de escucha del diálogo social está definida, por ejemplo, como una capacidad organizativa para entender de qué están hablando los usuarios en las redes sociales y utilizarlo para un negocio al combinar procesos bien definidos, las habilidades del personal y sus evidentes roles y responsabilidades, como también las herramientas de automatización. Una mayor madurez dentro de las capacidades digitales asegura operaciones efectivas y eficientes dentro de los negocios digitales. Las operaciones de los negocios digitales están dentro de un área multidisciplinaria donde convergen los negocios y la Tecnología Informática que trabajan en conjunto para producir resultados comerciales en el espacio digital. Enten
7R: Las siete revoluciones tecnológicas que transformarán nuestra vida
by Joan CwaikEl siglo XXI dejará su huella en la historia gracias al desarrollo de tecnologías emergentes que están generando una revolución que va más allá de lo industrial porque también involucra aspectos sociales, económicos y culturales. Decir que el mundo avanza a pasos agigantados es una frase trillada pero real. Todavía los autos no vuelan y no vacacionamos en el espacio, pero el siglo XXI va a dejar su huella en la historia gracias al desarrollo de las tecnologías emergentes. Aunque la ciencia ficción y la filosofía imaginaron todos estos adelantos, se está generando una nueva revolución que va más allá de lo industrial porque también involucra aspectos sociales, económicos y culturales. Joan Cwaik, investigador y especialista en innovación tecnológica, explica con claridad en qué consisten estos nuevos avances y cómo van a cambiar la vida de las personas. Las criptomonedas, el big data, las ciudades inteligentes, la impresión 3D, los robots, la Internet de las Cosas y la realidad virtual y la aumentada llegaron para quedarse y van a transformarnos para siempre.
7th EAI International Conference on Computer Science and Engineering in Health Services: COMPSE 2023 (EAI/Springer Innovations in Communication and Computing)
by Jose Antonio Marmolejo-Saucedo Idalia Flores De la Mota Roman Rodriguez-Aguilar Liliana Marmolejo-Saucedo Miriam Rodriguez-Aguilar Igor Litvinchev Pandian Vasant Utku KoseThis book constitutes the refereed post-conference proceedings of the 7th EAI International Conference on Computer Science and Engineering in Health Services (COMPSE 2023), which took place November 16-17, 2023, in Mexico City, Mexico. The full papers presented were carefully reviewed and selected from dozens of submissions. The papers are grouped on thematic topics: application of tools delivered by the COVID-19 pandemic; health services; computer and data science; and industry 4.0 in logistics and supply chain. The content is relevant to researchers, academics, students and professionals.
7th EAI International Conference on Robotic Sensor Networks: EAI ROSENET 2023 (EAI/Springer Innovations in Communication and Computing)
by Paolo Fiorini Ömer Melih Gül Seifedine Nimer KadryThis book presents the proceedings of the 7th EAI International Conference on Robotics and Networks 2023 (EAI ROSENET 2023). The conference explores the integration of networks, communications, and robotic technologies, which has become a topic of increasing interest for both researchers and developers from academic fields and industries worldwide. The authors posit that big networks will be the main approach to the next generation of robotic research, with the explosive number of communications and networks models and increasing computational power of computers significantly extending the number of potential applications for robotic technologies while also bringing new challenges to the communications and networking community. The conference provided a platform for researchers to share up-to-date scientific achievements in this field. The conference takes place at Bahcesehir University, Istanbul, Türkiye on 15-16 December 2023.
The 7th International Conference on Information Science, Communication and Computing (Smart Innovation, Systems and Technologies #350)
by Xuesong Qiu Yang Xiao Zhiqiang Wu Yudong Zhang Yuan Tian Bo LiuThis conference proceedings is a collection of the accepted papers of ISCC2023 - the 7th International Conference on Information Science, Communication and Computing held in Chongqing, China, 2-5 June 2023. The topics focus on intelligent information science and technology, artificial intelligence and intelligent systems, cloud computing and big data, smart computing and communication technology, wireless network, and cyber security. Each part can be used as an excellent reference by industry practitioners, university faculties, research fellows, and undergraduate and graduate students who need to build a knowledge base of the latest advances and state of the practice in the topics covered by this conference proceedings. This will enable them to build, maintain and manage systems of high reliability and complexity. We would like to thank the authors for their hard work and dedication, and the reviewers for ensuring that only the highest quality papers were selected.
8 Ball Pool: guía no oficial
by Joshua Abbott Mario AntuñaGUÍA NO OFICIAL Guía de consejos y estrategias. Este título contiene la guía más detallada de internet, todo explicado de manera sencilla y entendible. Disponible para descarga instantánea a tu teléfono móvil, dispositivo eBook o en papel. Con el éxito de mis cientos de otras guías, he escrito una nueva incluyendo consejos profesionales, excelentes tanto para jugadores principiantes como para avanzados. Esta guía incluye consejos, estrategias y tácticas específicas para ayudarte a progresar más rápidamente, vencer a tus oponentes, ganar más dinero ¡y mucho más! *- Consejos y estrategias profesionales *- Trampas *- ¡Secretos, trucos y estrategias usadas por jugadores profesionales! *- Cómo obtener millones de billetes y monedas *- Y MUCHO MÁS Todas las versiones de esta guía incluyen capturas que te ayudarán a entender mejor cada parte de la misma. No hay ninguna otra guía más comprensible y completa que esta en internet. Renuncia a derechos Este producto no está relacionado, afiliado, patrocinado o certificado de ninguna forma por el poseedor de los derechos de autor.
8-Bit Apocalypse: The True Story Behind The Classic Video Game
by Alex Rubens Jeff GerstmannThe first history of Atari’s Missile Command, and its unforeseen effects on its creators and the culture Before Call of Duty, before World of Warcraft, before even Super Mario Bros., the video game industry exploded in the late 1970s with the advent of the video arcade. Leading the charge was Atari Inc., the creator of, among others, the iconic game Missile Command. The first game to double as a commentary on culture, Missile Command put the players’ fingers on “the button,” making them responsible for the fate of civilization in a no-win scenario, all for the price of a quarter. The game was a marvel of modern culture, helping usher in both the age of the video game and the video game lifestyle. Its groundbreaking implications inspired a fanatical culture that persists to this day. As fascinating as the cultural reaction to Missile Command were the programmers behind it. Before the era of massive development teams and worship of figures like Steve Jobs, Atari was manufacturing arcade machines designed, written, and coded by individual designers. As earnings from their games entered the millions, these creators were celebrated as geniuses in their time; once dismissed as nerds and fanatics, they were now being interviewed for major publications, and partied like Wall Street traders. However, the toll on these programmers was high: developers worked 120-hour weeks, often opting to stay in the office for days on end while under a deadline. Missile Command creator David Theurer threw himself particularly fervently into his work, prompting not only declining health and a suffering relationship with his family, but frequent nightmares about nuclear annihilation. To truly tell the story from the inside, tech insider and writer Alex Rubens has interviewed numerous major figures from this time: Nolan Bushnell, founder of Atari; David Theurer, the creator of Missile Command; and Phil Klemmer, writer for the NBC series Chuck, who wrote an entire episode for the show about Missile Command and its mythical “kill screen.” Taking readers back to the days of TaB cola, dot matrix printers, and digging through the couch for just one more quarter, Alex Rubens combines his knowledge of the tech industry and experience as a gaming journalist to conjure the wild silicon frontier of the 8-bit ’80s. 8-Bit Apocalypse: The Untold Story of Atari's Missile Command offers the first in-depth, personal history of an era for which fans have a lot of nostalgia.
8 Practical Bootstrap Projects
by Maria Antonietta Perna George Martsoukos Ashraff Hathibelagal Syed Fazle Rahman Ahmed Bouchefra Manjunath M Zeeshan ChawdharyBootstrap stands as one of the most popular, open-source, front-end frameworks on the Web. Since its official release in 2011, it has undergone several changes, and it's now one of the most stable and responsive frameworks available. It's loved by web developers of all levels, as it gives them the capability to build a functional, attractive website design within minutes. A novice developer with just some basic knowledge of HTML and little CSS can easily get started with Bootstrap. In this book, we'll share a selection of nine different practical projects that you can follow along with. It contains: Spicing Up the Bootstrap Carousel with CSS3 Animations by Maria Antonietta PernaA Full-screen Bootstrap Carousel with Random Initial Image by George MartsoukosAnimating Bootstrap Carousels with GSAP's Animation Library by George MartsoukosBuild a Simple Tumblr Theme with Bootstrap by Ashraff Hathibelagal How to Build a Responsive Bootstrap Website by Syed Fazle RahmanBootstrap and WordPress Theme Integration in 8 Easy Steps by Ahmed BouchefraIntegrating Bootstrap with React: a Guide for Developers by Manjunath MIntegrating Bootstrap with Vue.js using Bootstrap-Vue by Zeeshan Chawdhary This book is for all frontend developers who want to build responsive, mobile-first websites. You'll need to be familiar with HTML and CSS and have a reasonable level of understanding of JavaScript in order to follow the discussion.
8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
by Kim CrawleyHarden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: Foster a strong security culture that extends from the custodial team to the C-suite Build an effective security team, regardless of the size or nature of your business Comply with regulatory requirements, including general data privacy rules and industry-specific legislation Test your cybersecurity, including third-party penetration testing and internal red team specialists Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.
80/20 Sales and Marketing
by Richard Koch Perry MarshallGuided by famed marketing consultant and best-selling author Perry Marshall, sales and marketing professionals save 80 percent of their time and money by zeroing in on the right 20 percent of their market - then apply 80/202 and 80/203 to gain 10X, even 100X the success. With a powerful 80/20 software tool (online, included with the book), sellers and marketers uncover how to slash time-wasters; advertise to hyper-responsive buyers and avoid tire-kickers; gain coveted positions on search engines; differentiate themselves from competitors and gain esteem in their marketplace. With the included tools they'll see exactly how much money they're leaving on the table, and how to put it back in their pockets. Sellers will identify untapped markets, high-profit opportunities and incremental improvements, gaining time and greater profit potential. Supported by online tools from Marshall, including The 80/20 Power Curve, a tool that helps you see invisible money, and a Marketing DNA Test, a personal assessment that zeroes in on one's natural selling assets, this timeless guide promises to change the game for seasoned and novice marketers and sellers.
80 sposobów na Ajax
by Bruce W. PerryTechniki tworzenia nowoczesnych aplikacji internetowych Przygotowywanie wygodnych w obs?udze formularzy Integracja witryny z Google Maps Zarzšdzanie po?šczeniami sieciowymi Ajax to nazwa technologii powsta?ej w wyniku po?šczenia j?zyka JavaScript, XML oraz kaskadowych arkuszy stylów. Jej wdro?enie pozwala wyeliminowa? ze stron WWW jednš z ich najbardziej irytujšcych cech, czyli konieczno?? prze?adowywania zawarto?ci po ka?dej zmianie. Umiej?tne wykorzystanie mo?liwo?ci Ajaksa sprawia, ?e aplikacje internetowe przypominajš "zwyk?e" programy dla systemów Windows lub Mac OS. Dzi?ki zastosowaniu Ajaksa aplikacja internetowa dzia?a zdecydowanie szybciej, a po?šczenia z serwerem nie przeszkadzajš u?ytkownikowi w pracy. ?atwiejsza jest tak?e dynamiczna zmiana elementów w ró?nych cz??ciach strony. Rozwišzania oparte na Ajaksie wprowadzono w wielu dziedzinach, takich jak blogi, narz?dzia s?u?šce do nauki, newslettery oraz ma?e portale internetowe. W ksiš?ce "80 sposobów na Ajax" znajdziesz przyk?ady zastosowania tej techniki w tworzeniu interesujšcych i nieszablonowych witryn WWW. Czytajšc jš, dowiesz si?, jak sprawi?, aby witryny WWW by?y bardziej interaktywne, a aplikacje WWW dzia?a?y dok?adnie tak jak aplikacje desktopowe. Nauczysz si? korzysta? z interfejsów programistycznych witryn Google Maps, Yahoo! Maps i Geo URL oraz obs?ugiwa? sesje i cookies z poziomu Ajaksa. Poznasz równie? metody weryfikowania poprawno?ci danych wprowadzanych do formularzy oraz techniki ?šczenia Ajaksa z innymi nowoczesnymi narz?dziami, takimi jak Ruby on Rails. Tworzenie interaktywnych formularzy Po?šczenia z Google Maps i Yahoo! Maps Korzystanie z us?ugi Geo URL Obs?uga plików cookies Przeglšdanie kana?ów RSS Integracja z aplikacjami sieciowymi napisanymi w Javie Korzystanie z bibliotek Prototype i Rico Po?šczenie Ajaksa z Ruby on Rails Wykorzystanie biblioteki script.aculo.us do tworzenia efektów wizualnych Twórz szybkie, wydajne i wygodne w obs?udze aplikacje sieciowe.
802.11 Security
by Bob Fleck Bruce PotterBeginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you'll want this book beside you every step of the way
802.11 Wireless Networks: The Definitive Guide
by Matthew GastAs we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain. The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start. This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on: deployment considerations network monitoring and performance tuning wireless security issues how to use and select access points network monitoring essentials wireless card configuration security issues unique to wireless networks With wireless technology, the advantages to its users are indeed plentiful. Companies no longer have to deal with the hassle and expense of wiring buildings, and households with several computers can avoid fights over who's online. And now, with 802.11 Wireless Networks: The Definitive Guide, 2nd Edition, you can integrate wireless technology into your current infrastructure with the utmost confidence.
802.11 Wireless Networks: The Definitive Guide
by Matthew GastAs we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain. The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide , 2nd Edition is the perfect place to start. This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on: deployment considerations network monitoring and performance tuning wireless security issues how to use and select access points network monitoring essentials wireless card configuration security issues unique to wireless networks With wireless technology, the advantages to its users are indeed plentiful. Companies no longer have to deal with the hassle and expense of wiring buildings, and households with several computers can avoid fights over who's online. And now, with 802.11 Wireless Networks: The Definitive Guide , 2nd Edition, you can integrate wireless technology into your current infrastructure with the utmost confidence.
802.11 Wireless Networks
by Alan Holt Chi-Yu HuangWireless communication has the advantage of mobility and obviates the need for cabling, but is inherently less secure and is subject to the heavy regulation of the radio frequency spectrum. Nevertheless, the allocation of unlicensed parts of the spectrum has facilitated the growth in wireless local area networks (WLANs). WLAN technology is progressing at a rapid pace, but the most widely accepted WLAN standard is the IEEE 802.11. This unique and highly practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions. Readers will gain understanding of the security implications of wireless networks and learn how vulnerabilities can be mitigated. Additionally, the book examines the underlying 802.11 protocols and explains how to build mathematical models in order to analyze performance in a WLAN environment. Topics and Features: presents a practical approach supported by the extensive use of examples and detailed instructions; discusses various wireless network solutions across a number of different vendor platforms, including Cisco Aironet, Alactel-Lucent Omniaccess and Meru Networks; provides numerous mathematical models for analyzing the performance of IEEE 802.11 standards, and shows how to build these models using Maple; examines issues of wireless security and describes how to implement a wireless network with enterprise security; investigates the medium access control sub-layer, and models for performance analysis of the MAC layer; reviews the physical sub-layers of 802.11, describing modulation techniques and examining how devices adapt to changes in the RF environment. A highly useful text/reference for industry professionals, undergraduate and graduate-level students will also find this book an ideal companion to a university course on wireless networking. Dr. Alan Holt is Chief Technical Officer at the network consultancy company IP Performance Ltd., based in Bristol, UK. He is author of the popular Springer text Network Performance Analysis: Using the J Programming Language. Dr. Chi-Yu Huang works for Tata Technologies Ltd., and is currently a software consultant on the Airbus project in Bristol. She was formerly Operations Manager for DL Consulting, New Zealand.
802.11n: A Survival Guide
by Matthew Gast<p>With a significant jump in throughput over previous standards, 802.11n is the first wireless technology that doesn’t trade speed for mobility, and users have stormed onto wireless networks with a passion. In this concise guide, Matthew Gast—chair of the IEEE group that produced revision 802.11-2012—shows you why wireless has become the default method of connecting to a network, and provides technical details you need to plan, design, and deploy 802.11n today.</p>
802.11n: Wi-Fi Above 100 Mbps
by Matthew S. GastWireless has finally come of age. With a significant jump in throughput over previous standards, 802.11n is the first wireless technology that doesn’t trade speed for mobility, and users have stormed onto wireless networks with a passion. In this concise guide, Matthew Gast—chair of the IEEE group that produced revision 802.11-2012—shows you why wireless has become the default method of connecting to a network, and provides technical details you need to plan, design, and deploy 802.11n today.Building a network for the multitude of new devices is now a strategic decision for network engineers everywhere. This book gives you an in-depth look at key parts of 802.11n, and shows you how to achieve an Ethernet-free wireless office.Learn how MIMO’s multiple data streams greatly increase wireless speedDiscover how 802.11n modifications improve MAC efficiencyExamine advanced PHY features such as beanforming and space-time code blockUse advanced MAC features to maintain interoperability with older devicesPlan an 802.11n network by determining traffic demand, key applications, power requirements, and securityChoose the architecture, select hardware, and plan coverage to design and build your network
8051 Microcontrollers: Fundamental Concepts, Hardware, Software And Applications In Electronics
by Salvador Pinillos GimenezExplains internals of 8051 hardware and relates to general principles of computer architecture;<P><P> Demonstrates how to implement various electronics applications, with hardware and software design for 8051 microcontrollers;<P> Includes numerous, solved examples, end-of-chapter exercises, laboratory and practical projects.<P>This textbook describes in detail the fundamental information about the 8051 microcontroller and it carefully teaches readers how to use the microcontroller to make both electronics hardware and software. In addition to discussion of the 8051 internals, this text includes numerous, solved examples, end-of-chapter exercises, laboratory and practical projects.
The 8th International Conference on Advanced Machine Learning and Technologies and Applications (Lecture Notes on Data Engineering and Communications Technologies #113)
by Aboul Ella Hassanien Rawya Y. Rizk Václav Snášel Rehab F. Abdel-KaderThis book constitutes the refereed proceedings of the 8th International Conference on Advanced Machine Learning Technologies and Applications, AMLTA 2022, held in Cairo, Egypt, during May 5-7, 2022. The 8th edition of AMLTA will be organized by the Scientific Research Group in Egypt (SRGE), Egypt, collaborating with Port Said University, Egypt, and VSB-Technical University of Ostrava, Czech Republic. AMLTA series aims to become the premier international conference for an in-depth discussion on the most up-to-date and innovative ideas, research projects, and practices in the field of machine learning technologies and their applications. The book covers current research on advanced machine learning technology, including deep learning technology, sentiment analysis, cyber-physical system, IoT, and smart cities informatics and AI against COVID-19, data mining, power and control systems, business intelligence, social media, digital transformation, and smart systems.
8th International Conference on Advancements of Medicine and Health Care Through Technology: Proceedings of MEDITECH 2022, October 20–22, 2022, Cluj-Napoca, Romania (IFMBE Proceedings #102)
by Simona Vlad Nicolae Marius RomanThis book gathers the proceedings of the 8th International Conference on Advancements of Medicine and Health Care through Technology, MEDITECH 2022, held virtually on 20–22 October 2022, from Cluj-Napoca, Romania. It reports on both theoretical and practical developments in biomedical imaging and image processing, health technology, technologies for education, and biomedical signal processing and medical devices, measurements and instrumentation. Both the conference and the realization of this book were supported by the Romanian National Society for Medical Engineering and Biological Technology (SNIMTB).
The 8th International Conference on Knowledge Management in Organizations: Social and Big Data Computing for Knowledge Management
by Leon S.L. Wang Juan Manuel Corchado Rodríguez Lorna Uden I-Hsien Ting Hsin-Chang YangThe proceedings from the eighth KMO conference represent the findings of this international meeting which brought together researchers and developers from industry and the academic world to report on the latest scientific and technical advances on knowledge management in organizations. This conference provided an international forum for authors to present and discuss research focused on the role of knowledge management for innovative services in industries, to shed light on recent advances in social and big data computing for KM as well as to identify future directions for researching the role of knowledge management in service innovation and how cloud computing can be used to address many of the issues currently facing KM in academia and industrial sectors.
9 Practical Node.js Projects
by James Hibbard James Kolce Lukas White Jeremy Wilken Simon Holmes Michael Wanyoike Paul Orac Patrick CatanzaritiWhile there have been quite a few attempts to get JavaScript working as a server-side language, Node.js (frequently just called Node) has been the first environment that's gained any traction. It's now used by companies such as Netflix, Uber and Paypal to power their web apps. Node allows for blazingly fast performance; thanks to its event loop model, common tasks like network connection and database I/O can be executed very quickly indeed. In this book, we offer a selection of nine different practical projects that you can follow along with. It contains: Build a Simple Beginner App with Node, Bootstrap & MongoDB by James HibbardHow to Build a File Upload Form with Express and Dropzone.js by Lukas WhiteHow to Build and Structure a Node.js MVC Application by James KolceUser Authentication with the MEAN Stack by Simon Holmes & Jeremy WilkenBuild a JavaScript Command Line Interface (CLI) with Node.js by Lukas White & Michael WanyoikeBuilding a Real-time Chat App with Sails.js by Michael WanyoikePassport Authentication for Node.js Applications by Paul OracLocal Authentication Using Passport in Node.js by Paul OracAn Introduction to NodeBots by Patrick Catanzariti This book is for anyone who wants to start learning server-side development with Node.js. Familiarity with JavaScript is assumed.
97 Things About Ethics Everyone in Data Science Should Know: Collective Wisdom From The Experts
by Bill FranksMost of the high-profile cases of real or perceived unethical activity in data science aren’t matters of bad intent. Rather, they occur because the ethics simply aren’t thought through well enough. Being ethical takes constant diligence, and in many situations identifying the right choice can be difficult.In this in-depth book, contributors from top companies in technology, finance, and other industries share experiences and lessons learned from collecting, managing, and analyzing data ethically. Data science professionals, managers, and tech leaders will gain a better understanding of ethics through powerful, real-world best practices.Articles include:Ethics Is Not a Binary Concept—Tim WilsonHow to Approach Ethical Transparency—Rado KotorovUnbiased ≠ Fair—Doug HagueRules and Rationality—Christof Wolf BrennerThe Truth About AI Bias—Cassie KozyrkovCautionary Ethics Tales—Sherrill HayesFairness in the Age of Algorithms—Anna JacobsonThe Ethical Data Storyteller—Brent DykesIntroducing Ethicize™, the Fully AI-Driven Cloud-Based Ethics Solution!—Brian O’NeillBe Careful with "Decisions of the Heart"—Hugh WatsonUnderstanding Passive Versus Proactive Ethics—Bill Schmarzo