Browse Results

Showing 47,526 through 47,550 of 55,978 results

The Selfie Generation: How Our Self-Images Are Changing Our Notions of Privacy, Sex, Consent, and Culture

by Alicia Eler

<p>Whether it's Kim Kardashian uploading picture after picture to Instagram or your roommate posting a mid-vacation shot to Facebook, selfies receive mixed reactions. But are selfies more than, as many critics lament, a symptom of a self-absorbed generation? <p>Millennial Alicia Eler's The Selfie Generation is the first book to delve fully into this ubiquitous and much-maligned part of social media, including why people take them in the first place and the ways they can change how we see ourselves. Eler argues that selfies are just one facet of how we can use digital media to create a personal brand in the modern age. More than just a picture, they are an important part of how we live today. <p>Eler examines all aspects of selfies, online social networks, and the generation that has grown up with them. She looks at how the boundaries between people’s physical and digital lives have blurred with social media; she explores questions of privacy, consent, ownership, and authenticity; and she points out important issues of sexism and double standards wherein women are encouraged to take them but then become subject to criticism and judgment. Alicia discusses the selfie as a paradox—both an image with potential for self-empowerment, yet also a symbol of complacency within surveillance culture The Selfie Generation explores just how much social media has changed the ways that people connect, communicate, and present themselves to the world.</p>

Selfie Made: Your Ultimate Guide to Social Media Stardom

by Meridith Valiando Rojas

HOW DO I MAKE IT BIG ON SOCIAL MEDIA? WHAT IS MY STORY—AND WHO IS MY AUDIENCE? WHAT CONTENT SHOULD I POST TO ACHIEVE #SUCCESS? HOW DO I GO VIRAL…OR HOW LONG WILL IT TAKE ME TO GET NOTICED?Selfie Made is a one-of-a-kind guide to creating a digital identity, finding an audience, and building a powerful brand—your own!—on the Internet. Whether you want to be in front of or behind the camera, produce click-worthy content or start your own business, this book is the place to begin. Written by Meridith Valiando Rojas, the hugely successful (and super friendly IRL) founder of DigiTour who has worked with every major star from YouTube to Musical.ly, this collection of personal anecdotes and professional advice, tricks of the trade and behind-the-screen secrets, will give you everything you need for your social media toolkit.Here, you’ll get to know the true stories behind some of today’s most successful multimedia stars and influencers, including:Max And Harvey - Blake Gray - Danielle CohnBryce Xavier - Lauren Godwin - Nathan TriskaTrevor Moran - Messy Monday - Simon Britton…and others who learned the ropes, beat the odds, and took social media by storm. And so can you!

SELinux

by Bill Mccarty

The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the key advances of the security field. Better yet, SELinux is available in widespread and popular distributions of the Linux operating system--including for Debian, Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE--all of it free and open source. SELinux emerged from research by the National Security Agency and implements classic strong-security measures such as role-based access controls, mandatory access controls, and fine-grained transitions and privilege escalation following the principle of least privilege. It compensates for the inevitable buffer overflows and other weaknesses in applications by isolating them and preventing flaws in one application from spreading to others. The scenarios that cause the most cyber-damage these days--when someone gets a toe-hold on a computer through a vulnerability in a local networked application, such as a Web server, and parlays that toe-hold into pervasive control over the computer system--are prevented on a properly administered SELinux system. The key, of course, lies in the words "properly administered." A system administrator for SELinux needs a wide range of knowledge, such as the principles behind the system, how to assign different privileges to different groups of users, how to change policies to accommodate new software, and how to log and track what is going on. And this is where SELinux is invaluable. Author Bill McCarty, a security consultant who has briefed numerous government agencies, incorporates his intensive research into SELinux into this small but information-packed book. Topics include: A readable and concrete explanation of SELinux concepts and the SELinux security model Installation instructions for numerous distributions Basic system and user administration A detailed dissection of the SELinux policy language Examples and guidelines for altering and adding policies With SELinux , a high-security computer is within reach of any system administrator. If you want an effective means of securing your Linux system--and who doesn't?--this book provides the means.

SELinux Cookbook

by Sven Vermeulen

If you are a Linux system administrator or a Linux-based service administrator and want to fine-tune SELinux to implement a supported, mature, and proven access control system, then this book is for you. Basic experience with SELinux enabled distributions is expected.

SELinux System Administration

by Sven Vermeulen

A step-by-step guide to learn how to set up security on Linux servers by taking SELinux policies into your own hands.Linux administrators will enjoy the various SELinux features that this book covers and the approach used to guide the admin into understanding how SELinux works. The book assumes that you have basic knowledge in Linux administration, especially Linux permission and user management.

SELinux System Administration: Implement mandatory access control to secure applications, users, and information flows on Linux, 3rd Edition

by Sven Vermeulen

Enhance Linux security, application platforms, and virtualization solutions with SELinux to work within your boundaries, your rules, and your policiesKey FeaturesLearn what SELinux is, and how it acts as a mandatory access control system on LinuxApply and tune SELinux enforcement to users, applications, platforms, and virtualization solutionsUse real-life examples and custom policies to strengthen the security posture of your systemsBook DescriptionLinux is a dominant player in many organizations and in the cloud. Securing the Linux environment is extremely important for any organization, and Security-Enhanced Linux (SELinux) acts as an additional layer to Linux system security.SELinux System Administration covers basic SELinux concepts and shows you how to enhance Linux system protection measures. You will get to grips with SELinux and understand how it is integrated. As you progress, you'll get hands-on experience of tuning and configuring SELinux and integrating it into day-to-day administration tasks such as user management, network management, and application maintenance. Platforms such as Kubernetes, system services like systemd, and virtualization solutions like libvirt and Xen, all of which offer SELinux-specific controls, will be explained effectively so that you understand how to apply and configure SELinux within these applications. If applications do not exert the expected behavior, you'll learn how to fine-tune policies to securely host these applications. In case no policies exist, the book will guide you through developing custom policies on your own.By the end of this Linux book, you'll be able to harden any Linux system using SELinux to suit your needs and fine-tune existing policies and develop custom ones to protect any app and service running on your Linux systems.What you will learnUnderstand what SELinux is and how it is integrated into LinuxTune Linux security using policies and their configurable settingsManage Linux users with least-privilege roles and access controlsUse SELinux controls in system services and virtualization solutionsAnalyze SELinux behavior through log events and policy analysis toolsProtect systems against unexpected and malicious behaviorEnhance existing policies or develop custom onesWho this book is forThis Linux sysadmin book is for Linux administrators who want to control the secure state of their systems using SELinux, and for security professionals who have experience in maintaining a Linux system and want to know about SELinux. Experience in maintaining Linux systems, covering user management, software installation and maintenance, Linux security controls, and network configuration is required to get the most out of this book.

SELinux System Administration - Second Edition

by Sven Vermeulen

Ward off traditional security permissions and effectively secure your Linux systems with SELinux About This Book • Leverage SELinux to improve the secure state of your Linux system • A clear approach to adopting SELinux within your organization • Essential skills and techniques to help further your system administration career Who This Book Is For This book is for Linux administrators who want to control the secure state of their systems. It's packed with the latest information on SELinux operations and administrative procedures so you'll be able to further harden your system through mandatory access control (MAC) – a security strategy that has been shaping Linux security for years. What You Will Learn • Analyze SELinux events and selectively enable or disable SELinux enforcement • Manage Linux users and associate them with the right role and permission set • Secure network communications through SELinux access controls • Tune the full service flexibility by dynamically assigning resource labels • Handle SELinux access patterns enforced through the system • Query the SELinux policy in depth In Detail Do you have the crucial job of protecting your private and company systems from malicious attacks and undefined application behavior? Are you looking to secure your Linux systems with improved access controls? Look no further, intrepid administrator! This book will show you how to enhance your system's secure state across Linux distributions, helping you keep application vulnerabilities at bay. This book covers the core SELinux concepts and shows you how to leverage SELinux to improve the protection measures of a Linux system. You will learn the SELinux fundamentals and all of SELinux's configuration handles including conditional policies, constraints, policy types, and audit capabilities. These topics are paired with genuine examples of situations and issues you may come across as an administrator. In addition, you will learn how to further harden the virtualization offering of both libvirt (sVirt) and Docker through SELinux. By the end of the book you will know how SELinux works and how you can tune it to meet your needs. Style and approach This book offers a complete overview of SELinux administration and how it integrates with other components on a Linux system. It covers the majority of SELinux features with a mix of real life scenarios, descriptions, and examples. This book contains everything an administrator needs to customize SELinux.

Sell Online Like a Creative Genius: A Guide for Artists, Entrepreneurs, Inventors, and Kindred Spirits (Like a Creative Genius #1)

by Brainard Carey

How to sell art or anything else online without leaving your home. Whether you’re selling original artwork, jewelry, or a unique product, this is the book for you. Brainard Carey offers advice with solid examples of how building an online business is something every creative person can pursue. Carey draws from his extensive experience and interviews with others to show artists and creative people how to sell their work independently and efficiently. Readers will learn how to establish an online store, develop a presence, promote their goods, and reach customers. Chapter topics include: Designing a website or profile on an existing site Effective marketing strategies Creative ways to advertise your product Building your social media following Finding new customers Real examples of artists and entrepreneurs who succeeded in selling their work online And much more With chapters divided between practical how-tos and case studies, Sell Online Like a Creative Genius™, offers readers both instructive and demonstrative lessons in making their small online business a reality. Everyone can do it with the right tools, and Carey offers an insider’s guide to an otherwise daunting process.

Selling Graphic and Web Design

by Donald Sparkman

Expert guidance on selling graphic design, in print and online. Attract today's savvy design clients! A veteran designer who turned his small business into a multimillion-dollar new-media company shares his strategies for success in this new edition of the acclaimed Selling Graphic and Web Design. Donald Sparkman's approach blurs the lines between graphic design, web design, and marketing by building strategic partnerships and thinking outside the box. No-nonsense advice for writing proposals and offering the right design solutions, plus information on providing services that fit a client's needs and budget, have made this book indispensable. Now, in this revised and expanded version, leading Internet designers share strategies on effective marketing for the web, including pricing, billing, portfolios, ethics, brand design, web content management, brand law, and much more. Trusted advice and the latest strategies combine to make Selling Graphic and Web Design a great one-stop resource for designers in every field. New edition of a classic Up-to-the-minute advice on selling to internet clients Get the top clients and keep them

Selling IT: The Science of Selling, Buying, and Deal-Making

by Sandip Mukhopadhyay Srinivas Pingali Amitabh Satyam

Information technology (IT) is an essential core of the economy today. Corporations and governments worldwide rely on it to drive their core strategy and develop and execute business models. Amounting to over 3.7 trillion US dollars of worldwide spending, the growing significance of the IT industry in the global economy is now well established. Hence, it is crucial to understand the marketplace within which it exists, and this book presents a systematic analysis of the processes, techniques, and methods involved in IT sales and marketing. In Selling IT, the book: Integrates a large IT provider’s selling process with the enterprise user’s IT buying process to highlight the nuances of selling, marketing, and developing IT solutions that create value for customers. Discusses various key concepts such as value-based IT selling, business case for IT acquisition, vendor evaluation and management, account and customer relationship management, customer segmentation, and techniques for customer acquisition and retention. Analyses the challenges and opportunities involved in selling digital IT and examines the evolution of jobs and careers based on the changed IT landscape. Includes lesson plans, case studies, and chapter-wise practice questions to support teaching and learning. The book boasts a robust theoretical foundation supported by a clear exposition of concepts and management theories. It will be of benefit to professionals using organisation-mandated selling processes. Young executives with a technology background looking for a sales and marketing career in the IT industry can also effectively use this book. It will also be an essential read for scholars and researchers in B2B marketing, IT consulting, technology sales, and digital transformation.

Selling on Amazon For Dummies

by Joseph Kraynak Deniz Olmez

Sell on Amazon and Make Them Do the Heavy Lifting Selling on Amazon has become one of the most popular ways to earn income online. In fact, there are over 2 million people selling on Amazon worldwide. Amazon allows any business, no matter how small, to get their products in front of millions of customers and take advantage of the largest fulfillment network in the world. It also allows businesses to leverage their first-class customer service and storage capabilities. Selling on Amazon For Dummies walks owners through the process of building a business on Amazon—a business that can be built almost anywhere in the world, as long as you have access to a computer and the internet. The basics of selling on Amazon Using FBA Getting started Deciding what to sell Conducting product research Finding your way around Seller Central Product sourcing, shipping and returns, Amazon subscription, fees, sales tax, and more How to earn ROIs (Returns on Your Investments) Selling on Amazon provides the strategies, tools, and education you need, including turnkey solutions focused on sales, marketing, branding, and marketplace development to analyze and maximize opportunities.

Selling Online with Drupal e-Commerce

by Michael Peacock

The book starts with the basics of Drupal and then steps you through the creation of an online shop, exploring Drupal further as needed. Only the features of Drupal relevant to the e-commerce application will be covered. Written in a straightforward, easy-to-understand manner, the book provides the essentials of getting your e-commerce website up and running with Drupal. This book is for people who want to start selling online as quickly as possible, and want to see how to use the proven Drupal platform to achieve this. The book is ideal for use in a small business with only basic in-house technical skills. It will also be useful for developers who not only want to create an e-commerce site, but also want a CMS platform for expanding the site in the future. No prior knowledge of Drupal is required. No PHP experience is expected, although it will be useful. Basic knowledge of e-commerce will also be useful, although the main concepts are introduced and covered as required.

Selling the American People: Advertising, Optimization, and the Origins of Adtech

by Lee McGuigan

How marketers learned to dream of optimization and speak in the idiom of management science well before the widespread use of the Internet.Algorithms, data extraction, digital marketers monetizing "eyeballs": these all seem like such recent features of our lives. And yet, Lee McGuigan tells us in this eye-opening book, digital advertising was well underway before the widespread use of the Internet. Explaining how marketers have brandished the tools of automation and management science to exploit new profit opportunities, Selling the American People traces data-driven surveillance all the way back to the 1950s, when the computerization of the advertising business began to blend science, technology, and calculative cultures in an ideology of optimization. With that ideology came adtech, a major infrastructure of digital capitalism.To help make sense of today's attention merchants and choice architects, McGuigan explores a few key questions: How did technical experts working at the intersection of data processing and management sciences come to command the center of gravity in the advertising and media industries? How did their ambition to remake marketing through mathematical optimization shape and reflect developments in digital technology? In short, where did adtech come from, and how did data-driven marketing come to mediate the daily encounters of people, products, and public spheres? His answers show how the advertising industry's efforts to bend information technologies toward its dream of efficiency and rational management helped to make "surveillance capitalism" one of the defining experiences of public life.

Selling the Dream: How to Promote Your Product, Company, or Ideas - And Make A Difference - Using Everyday Evangelism

by Guy Kawasaki

Former product manager for Apple Computers, Guy Kawasaki, discusses a new selling technique he names "evangelism."

Selling Used Books Online: The Complete Guide to Bookselling at Amazon's Marketplace and Other Online Sites

by Stephen Windwalker Genevieve Kazdin

Discusses how to get started selling used books online, with an emphasis on amazon.com. Also covers the basics of starting and running a business.

Semantic Acquisition Games

by Jakub Šimko Mária Bieliková

Many applications depend on the effective acquisition of semantic metadata, and this state-of-the-art volume provides extensive coverage of the field of semantics acquisition games (SAGs). SAGs are a part of the crowdsourcing approach family and the authors analyze their role as tools for acquisition of resource metadata and domain models. Three case studies of SAG-based semantics acquisition methods are shown, along with other existing SAGs: 1. the Little Search Game - a search query formulation game using negative search, serving for acquisition of lightweight semantics. 2. the PexAce - a card game acquiring annotations to images. 3. the CityLights - a SAG used for validation of music metadata. The authors also look at the SAGs from their design perspectives covering SAG design issues and existing patterns, including several novel patterns. For solving cold start problems, a "helper artifact" scheme is presented, and for dealing with malicious player behavior, a posteriori cheating detection scheme is given. The book also presents methods for assessing information about player expertise, which can be used to make SAGs more effective in terms of useful output.

Semantic AI in Knowledge Graphs

by Sanju Tiwari Fernando Ortíz-Rodriguez Sarra Ben Abbés Patience Usoro Usip Rim Hantach

Recent combinations of semantic technology and artificial intelligence (AI) present new techniques to build intelligent systems that identify more precise results. Semantic AI in Knowledge Graphs locates itself at the forefront of this novel development, uncovering the role of machine learning to extend the knowledge graphs by graph mapping or corpus-based ontology learning. Securing efficient results via the combination of symbolic AI and statistical AI such as entity extraction based on machine learning, text mining methods, semantic knowledge graphs, and related reasoning power, this book is the first of its kind to explore semantic AI and knowledge graphs. A range of topics are covered, from neuro-symbolic AI, explainable AI and deep learning to knowledge discovery and mining, and knowledge representation and reasoning. A trailblazing exploration of semantic AI in knowledge graphs, this book is a significant contribution to both researchers in the field of AI and data mining as well as beginner academicians.

Semantic Analysis and Understanding of Human Behavior in Video Streaming

by Vincenzo Piuri Alberto Amato Vincenzo Di Lecce

Semantic Analysis and Understanding of Human Behaviour in Video Streaming investigates the semantic analysis of the human behaviour captured by video streaming, and introduces both theoretical and technological points of view. Video analysis based on the semantic content is in fact still an open issue for the computer vision research community, especially when real-time analysis of complex scenes is concerned. This book explores an innovative, original approach to human behaviour analysis and understanding by using the syntactical symbolic analysis of images and video streaming described by means of strings of symbols. A symbol is associated to each area of the analyzed scene. When a moving object enters an area, the corresponding symbol is appended to the string describing the motion. This approach allows for characterizing the motion of a moving object with a word composed by symbols. By studying and classifying these words we can categorize and understand the various behaviours. The main advantage of this approach lies in the simplicity of the scene and motion descriptions so that the behaviour analysis will have limited computational complexity due to the intrinsic nature both of the representations and the related operations used to manipulate them. Besides, the structure of the representations is well suited for possible parallel processing, thus allowing for speeding up the analysis when appropriate hardware architectures are used. A new methodology for design systems for hierarchical high semantic level analysis of video streaming in narrow domains is also proposed. Guidelines to design your own system are provided in this book. Designed for practitioners, computer scientists and engineers working within the fields of human computer interaction, surveillance, image processing and computer vision, this book can also be used as secondary text book for advanced-level students in computer science and engineering.

Semantic Applications: Methodology, Technology, Corporate Use

by Thomas Hoppe Bernhard Humm Anatol Reibold

This book describes methodologies for developing semantic applications. Semantic applications are software applications which explicitly or implicitly use the semantics, i.e. the meaning of a domain terminology, in order to improve usability, correctness, and completeness. An example is semantic search, where synonyms and related terms are used for enriching the results of a simple text-based search. Ontologies, thesauri or controlled vocabularies are the centerpiece of semantic applications. The book includes technological and architectural best practices for corporate use. The authors are experts from industry and academia with experience in developing semantic applications.

Semantic Computing (World Scientific Encyclopedia With Semantic Computing And Ro Ser. #Vol. 2)

by Phillip Sheu Heather Yu C. V. Ramamoorthy Arvind K. Joshi Lotfi A. Zadeh

Presents the state of the technology and points to future directions for semantic computing Semantic computing, a rapidly evolving interdisciplinary field, seeks to structure, design, and manipulate computer content to better satisfy the needs and intentions of users and create a more meaningful user experience. This remarkable contributed work examines the art, engineering, technology, and applications of the field. Moreover, it brings together researchers from such disciplines as natural language processing, software engineering, multimedia semantics, semantic Web, signal processing, and pattern recognition in order to provide a single source that presents the state of the technology and points to new breakthroughs on the horizon. Semantic Computing begins with an introduction that explores the concepts, technology, applications, and future of semantic computing. Next, the book is divided into four parts: Part One: Semantic Analysis Part Two: Semantic Languages and Integration Part Three: Semantic Applications Part Four: Semantic Programming and Interface As readers progress through the book, they,ll learn not only the underlying science, but also the fundamental technological building blocks of semantic computing. Moreover, they,ll discover a variety of cross-disciplinary solutions to current computing and communication problems. Throughout the book, references to the primary literature enable further investigation of each individual topic. Semantic Computing is ideal for industrial managers, researchers, and engineers seeking to design the next generation of computing systems in order to better meet user needs. It is also recommended as a textbook for senior undergraduate and graduate-level semantic computing courses.

Semantic Control for the Cybersecurity Domain: Investigation on the Representativeness of a Domain-Specific Terminology Referring to Lexical Variation

by Claudia Lanza

This book presents the creation of a bilingual thesaurus (Italian and English), and its conversion into an ontology system, oriented to the Cybersecurity field of knowledge term management and the identification of a replicable method over other specialized areas of study, through computational linguistics procedures, to a statistical and qualitative measurement of the terminological coverage threshold a controlled vocabulary is able to guarantee with respect to the semantic richness proper to the domain under investigation. The volume empowers readers to compile and study significant corpora documentations to support the text mining tasks and to establish a representativeness evaluation of the information retrieved. Through a description of several techniques belonging to the field of linguistics and knowledge engineering, this monograph provides a methodological account on how to enhance and update semantic monitoring tools reflecting a specialized lexicon as that of Cybersecurity to grant a reference semantic structure for domain-sector text classification tasks. This volume is a valuable reference to scholars of corpus-based studies, terminology, ICT, documentation and librarianship studies, text processing research, and distributional semantics area of interest as well as for professionals involved in Cybersecurity organizations.

Semantic e-Science

by Huajun Chen Kei-Hoi Cheung Yimin Wang

The Semantic Web has been a very important development in how knowledge is disseminated and manipulated on the Web, but it has been of particular importance to the flow of scientific knowledge, and will continue to shape how data is stored and accessed in a broad range of disciplines, including life sciences, earth science, materials science, and the social sciences. After first presenting papers on the foundations of semantic e-science, including papers on scientific knowledge acquisition, data integration, and workflow, this volume looks at the state of the art in each of the above-mentioned disciplines, presenting research on semantic web applications in the life, earth, materials, and social sciences. Drawing papers from three semantic web workshops, as well as papers from several invited contributors, this volume illustrates how far semantic web applications have come in helping to manage scientific information flow.

Semantic Intelligence: Select Proceedings of ISIC 2022 (Lecture Notes in Electrical Engineering #964)

by Sarika Jain Sven Groppe Bharat K. Bhargava

This book constitutes refereed proceedings of the 2nd International Semantic Intelligence Conference (ISIC 2022). This book covers a wide range of topics, including semantic web engineering, ontology-based data access, multimodal and multilingual access, machine-to-machine communications and interoperability, knowledge extraction and ontology learning from the web, computational paradigms and computational intelligence, distributed and mobile systems, and many others. This book includes novel contributions and the latest developments from researchers across industry and academia. This book serves as a valuable reference resource for academics and researchers across the globe.

Semantic Interoperability Issues, Solutions, Challenges (River Publishers Series In Information Science And Technology Ser.)

by Salvatore F. Pileggi Carlos Fernandez-Llatas

Semantic technologies are experimenting an increasing popularity in the context of different domains and applications. The understanding of any class of system can be significantly changed under the assumption any system is part of a global ecosystem known as Semantic Web.The Semantic Web would be an evolving extension of current Web model (normally referred as Syntactic Web) that introduces a semantic layer in which semantics, or meaning of information, are formally defined.So, semantics should integrate web-centric standard information infrastructures improving several aspects of interaction among heterogeneous systems. This is because common interoperability models are progressively becoming obsolete if compared with the intrinsic complexity and always more distributed focus that feature modern systems. For example, the basic interoperability model, that assumes the interchange of messages among systems without any interpretation, is simple but effective only in the context of close environments. Also more advanced models, such as the functional interoperability model that integrates basic interoperability model with the ability of intepretating data context under the assumption of a shared schema for data fields accessing, appears not able to provide a full sustainable technologic support for open systems.The Semantic Interoperability model would improve common interoperability models introducing the interpretation of means of data. Semantic interoperability is a concretely applicable interaction model under the assumption of adopting rich data models (commonly called Ontology) composed of concepts within a domain and the relationships among those concepts.In practice, semantic technologies are partially inverting the common view at actor intelligence: intelligence is not implemented (only) by actors but it is implicitly resident in the knowledge model. In other words, schemas contain information and the "code" to interpretate it.

Semantic IoT: Interoperability, Provenance and Beyond (Studies in Computational Intelligence #941)

by Rajiv Pandey Marcin Paprzycki Nidhi Srivastava Subhash Bhalla Katarzyna Wasielewska-Michniewska

This book is focused on an emerging area, i.e. combination of IoT and semantic technologies, which should enable breaking the silos of local and/or domain-specific IoT deployments. Taking into account the way that IoT ecosystems are realized, several challenges can be identified. Among them of definite importance are (this list is, obviously, not exhaustive): (i) How to provide common representation and/or shared understanding of data that will enable analysis across (systematically growing) ecosystems? (ii) How to build ecosystems based on data flows? (iii) How to track data provenance? (iv) How to ensure/manage trust? (v) How to search for things/data within ecosystems? (vi) How to store data and assure its quality? Semantic technologies are often considered among the possible ways of addressing these (and other, related) questions. More precisely, in academic research and in industrial practice, semantic technologies materialize in the following contexts (this list is, also, not exhaustive, but indicates the breadth of scope of semantic technology usability): (i) representation of artefacts in IoT ecosystems and IoT networks, (ii) providing interoperability between heterogeneous IoT artefacts, (ii) representation of provenance information, enabling provenance tracking, trust establishment, and quality assessment, (iv) semantic search, enabling flexible access to data originating in different places across the ecosystem, (v) flexible storage of heterogeneous data. Finally, Semantic Web, Web of Things, and Linked Open Data are architectural paradigms, with which the aforementioned solutions are to be integrated, to provide production-ready deployments.

Refine Search

Showing 47,526 through 47,550 of 55,978 results