Browse Results

Showing 9,001 through 9,025 of 61,703 results

Broken Code: Inside Facebook and the Fight to Expose Its Harmful Secrets

by Jeff Horwitz

By an award-winning technology reporter for The Wall Street Journal, a behind-the-scenes look at the manipulative tactics Facebook used to grow its business, how it distorted the way we connect online, and the company insiders who found the courage to speak out"Broken Code fillets Facebook&’s strategic failures to address its part in the spread of disinformation, political fracturing and even genocide. The book is stuffed with eye-popping, sometimes Orwellian statistics and anecdotes that could have come only from the inside." —New York Times Book ReviewOnce the unrivaled titan of social media, Facebook held a singular place in culture and politics. Along with its sister platforms Instagram and WhatsApp, it was a daily destination for billions of users around the world. Inside and outside the company, Facebook extolled its products as bringing people closer together and giving them voice.But in the wake of the 2016 election, even some of the company&’s own senior executives came to consider those claims pollyannaish and simplistic. As a succession of scandals rocked Facebook, they—and the world—had to ask whether the company could control, or even understood, its own platforms.Facebook employees set to work in pursuit of answers. They discovered problems that ran far deeper than politics. Facebook was peddling and amplifying anger, looking the other way at human trafficking, enabling drug cartels and authoritarians, allowing VIP users to break the platform&’s supposedly inviolable rules. They even raised concerns about whether the product was safe for teens. Facebook was distorting behavior in ways no one inside or outside the company understood. Enduring personal trauma and professional setbacks, employees successfully identified the root causes of Facebook's viral harms and drew up concrete plans to address them. But the costs of fixing the platform—often measured in tenths of a percent of user engagement—were higher than Facebook's leadership was willing to pay. With their work consistently delayed, watered down, or stifled, those who best understood Facebook&’s damaging effect on users were left with a choice: to keep silent or go against their employer.Broken Code tells the story of these employees and their explosive discoveries. Expanding on &“The Facebook Files,&” his blockbuster, award-winning series for The Wall Street Journal, reporter Jeff Horwitz lays out in sobering detail not just the architecture of Facebook&’s failures, but what the company knew (and often disregarded) about its societal impact. In 2021, the company would rebrand itself Meta, promoting a techno-utopian wonderland. But as Broken Code shows, the problems spawned around the globe by social media can&’t be resolved by strapping on a headset.

Broken News: Why the Media Rage Machine Divides America and How to Fight Back

by Chris Stirewalt

"One of America&’s most experienced and exemplary journalists has written an unsparing analysis of the dreadful consequences -- for journalism and the nation -- of &‘how the news lost a race to the bottom with itself.&’&” -- George F. Will In this national bestseller, Chris Stirewalt, a former Fox News political editor, takes readers inside America&’s broken newsrooms that have succumbed to the temptation of &“rage revenue.&” One of America&’s sharpest political analysts, Stirewalt employs his trademark wit and insight to reveal how these media organizations slant coverage – and why that drives political division and rewards outrageous conduct. The New York Times wrote that Stirewalt&’s book "is an often candid reflection on the state of political journalism and his time at Fox News, where such post-mortem assessments are not common..." Broken News is a fascinating, deeply researched, conversation-provoking study of how the news is made and how it must be repaired. Stirewalt goes deep inside the history of the industry to explain how today&’s media divides America for profit. And he offers practical advice for how readers, listeners, and viewers can (and should) become better news consumers for the sake of the republic.

Brother from a Box

by Evan Kuhlman Iacopo Bruno

One new brother--assembly required. From the author of The Last Invisible Boy.Matt Rambeau is officially a big brother--to a robot! Matt's super-computer-genius dad is always getting cool tech stuff in the mail, but the latest box Matt opens contains the most impressive thing he's ever seen: a bionically modified lifeform that looks human and calls Matt "brother" (in French)! Norman turns out to be a bit of an attention hog and a showoff, but Matt's still psyched to have a robotic sibling--even if he flirts with (ugh) girls. Then strange things start to happen. First a computer worm causes Norman to go berserk, and then odd men start showing up in unusual places. Matt soon realizes that someone is trying to steal the robot--correction--his brother!In this zany, action-packed story with spies, skateboards, and plenty of artificial intelligence, acclaimed author Evan Kuhlman gets to the heart (and motherboard) of one of the most special relationships known to man (or machine): brotherhood.

Brotopia: Breaking Up the Boys' Club of Silicon Valley

by Emily Chang

Silicon Valley is a modern utopia where anyone can change the world. Unless you're a woman. <P><P> For women in tech, Silicon Valley is not a fantasyland of unicorns, virtual reality rainbows, and 3D-printed lollipops, where millions of dollars grow on trees. <P><P>It's a "Brotopia," where men hold all the cards and make all the rules. Vastly outnumbered, women face toxic workplaces rife with discrimination and sexual harassment, where investors take meetings in hot tubs and network at sex parties.In this powerful exposé, Bloomberg TV journalist Emily Chang reveals how Silicon Valley got so sexist despite its utopian ideals, why bro culture endures despite decades of companies claiming the moral high ground (Don't Be Evil! Connect the World!)--and how women are finally starting to speak out and fight back. <P><P>Drawing on her deep network of Silicon Valley insiders, Chang opens the boardroom doors of male-dominated venture capital firms like Kleiner Perkins, the subject of Ellen Pao's high-profile gender discrimination lawsuit, and Sequoia, where a partner once famously said they "won't lower their standards" just to hire women. <P><P>Interviews with Facebook COO Sheryl Sandberg, YouTube CEO Susan Wojcicki, and former Yahoo! CEO Marissa Mayer--who got their start at Google, where just one in five engineers is a woman--reveal just how hard it is to crack the Silicon Ceiling. And Chang shows how women such as former Uber engineer Susan Fowler, entrepreneur Niniane Wang, and game developer Brianna Wu, have risked their careers and sometimes their lives to pave a way for other women. <P><P>Silicon Valley's aggressive, misogynistic, work-at-all costs culture has shut women out of the greatest wealth creation in the history of the world. It's time to break up the boys' club. <P><P>Emily Chang shows us how to fix this toxic culture--to bring down Brotopia, once and for all.

Browsers, Devices, and Fonts: A Designer's Guide to Fonts and How They Function on the Web

by Gary Rozanc

Part technical and part theoretical, this practical guide to web typography helps designers understand how the typographic choices they make in layout and prototyping programs behave once they are turned into live code. Through a series of demos, this book teaches designers how to create typographic specific webpages by learning just enough HTML and CSS to be able to view the pages in different browsers, devices, and operating systems. With live webpages to evaluate, designers will learn how to test those pages for supported features and performance, ensuring font choices look as good in the browser as it does in their layout program, delivering a speedy experience to the users. Key Features Demonstrates the minimal amount of HTML and CSS necessary to be able to create webpages to see typographic choices in the browser. Discusses responsive design and how to evaluate and test those choices for performance and usability prior to front-end development. Demonstrates how to review your own typographic, image, and layout choices in the browser through a series of demos in the book.

Bruce Schneier on Trust Set

by Bruce Schneier

Save almost 25% on this two-book set from Bruce Schneier covering issues of social trust and securityThis set includes two books from security expert Bruce Schneier, Liars and Outliers: Enabling the Trust that Society Needs to Thrive and Carry On: Sounds Advice from Schneier on Security. In Liars and Outliers, Schneier covers the topic of trust in society and how issues of trust are critical to solving problems as diverse as corporate responsibility, global warming, and the political system. Insightful and entertaining, the weaves together ideas from across the social and biological sciences to explain how society induces trust and how trust facilitates and stabilizes society.Carry On features more than 140 articles by Schneier, including more than twenty unpublished articles, covering such security issues as crime and terrorism, human security, privacy and surveillance, the psychology of security, security and technology, travel and security, and more.A two-book set from a renowned author, technologist, and security expertCovers such current topics as the Internet as surveillance state, Chinese cyberattackes, privacy and social networking, aviation security, and moreIdeal for IT professionals, security and networking engineers, hackers, consultants, and technology vendorsTogether, these two books offer deep and practical insight into a wide range of security topics for professionals in technology fields, as well as anyone interested in the larger philosophical issues of security.

Bryan Peterson Photography School: A Master Class in Creating Outstanding Images

by Bryan Peterson

A master class from the acclaimed photographer, bestselling author, and popular teacher, featuring lessons and workshops previously available only through the Bryan Peterson School of PhotographyHave you ever dreamed of attending a photography class led by one of the most respected professional photographers in the world? Step right up! Bryan Peterson invites readers to participate in his famous workshops, sharing all his best tips and tricks for capturing subjects and landscapes in a magical moment. Using before-and-after examples from real-life students, Bryan reveals the keys to improving your craft with the right angle, aperture, lens, and filters. Including lessons in shutter speed, white balance, light meter, lens choice and point of view, Photoshop, and so much more, Bryan Peterson Photography School is a unique opportunity to hone your skills and learn how to produce impeccable photographs.

Bryan Peterson's Understanding Composition Field Guide: How to See and Photograph Images with Impact

by Bryan F. Peterson

Learn to "see" more compelling images with this on-the-go field guide from Bryan Peterson! What makes an image amazing? Believe it or not, it is not about the content. What makes a photo compelling is the arrangement of that content--in other words, its composition. The right composition gives your images impact and emotion; the wrong one leaves them flat. In this handy, take-anywhere guide, renowned photographer, instructor, and bestselling author Bryan Peterson frees amateur photographers from the prejudices of what is "beautiful" or "ugly" so that they can instead focus on color, line, light, and pattern. Get the tools you need to show your distinct voice and point of view in every image you shoot. With this guide in your camera bag, you'll be equipped not only to "see" beautiful images but to successfully shoot them each and every time. Also available as an ebook

Brüche, Verhältnisse und Wurzeln: Grundlagen wiederentdecken und interessante Anwendungen neu kennenlernen (essentials)

by Renate Motzer

Renate Motzer führt in die Welt der Brüche ein und bringt sie in Verbindung mit Dezimalzahlen. Sie zeigt anschaulich, dass Brüche als Anteile eines Ganzen verstanden werden können, aber auch als Verhältnisse von zwei Größen. Die Autorin zeigt verständlich auf, warum Wurzeln nicht exakt durch Brüche angegeben werden können, wie man gute Näherungen findet und warum eine ungewöhnliche Bruchaddition zu paradoxen Ergebnissen führen kann. Weiterhin erläutert sie praxisnah die Anwendung von Brüchen beim Prozentrechnen und in der Wahrscheinlichkeitsrechnung und geht schließlich auf verschiedene Möglichkeiten ein, Mittelwerte zu bilden.

Bs25999

by Tony Drewitt

This book furnishes readers with an understanding of the basics of business continuity, including: a definition of what business continuity means; how managing operational business continuity risk can be achieved using an approach increasingly recognised world-wide; the important distinction between operational, commercial and strategic risks in business; the role played by operational resilience measures, business continuity strategies and planning in managing operational risks; how to demonstrate some form of return on investment in a business continuity management system (BCMS); and, the role of business continuity in corporate governance and how to develop a mechanism that provides directors and stakeholders with appropriate assurance about the management and control of business continuity risks. Corporate bodies will find this book useful at a number of stages in any business continuity project, including: at the decision-making stage, project initiation stage, and, as part of an ongoing awareness campaign, being made available to all staff and to new starters as part of their introduction to the company.

Bubble Witch Saga 2: O Guia de Jogo não oficial

by Mike Brandish Joshua Abbott

Além de comprar esse e-book, sinta-se livre para assinar nosso programa de suplementos grátis. Copiando o link abaixo, você recebe acesso aos últimos updates dos apps onlines e vídeo-games mais populares. Assine aqui: http://emailsignupform.subscribemenow.com/ Guia de Dicas e Estratégias avançadas: Esse é o guia mais completo e detalhado que encontrará online. Disponível para download instantâneo no seu celular, e-reader ou em papel. Com o sucesso dos meus centenas de guias escritos, eu escrevi mais um guia profissional para os jogadores veteranos. Ele dá dicas específicas e estratégias para progredir no jogo, vencer seus oponentes, conseguir mais barras de ouro e muito mais! Aqui está o que encontrará quando comprar esse guia avançado do jogo. - Dicas e estratégias profisisonais. - Hacks e Trapaças. - Segredos, Cheats, Conteúdo desbloqueável e macetes usados pelos jogadores profissionais! - Como conseguir muito Cash/Moedas - E MUITAS OUTRAS COISAS! Todas as versões desse guia tem fotos para ajudar a compreender o jogo. Não há outro guia tão completo e avançado quanto este. Você se beneficiará e se sentirá mais feliz com ele do que com os outros guias menos eficientes lá fora. Compre agora e esmague a competição! Se torne um jogador profissional hoje mesmo! Para suporte e mais informações de nossos produtos, por favor visite http://www.hiddenstuffentertainment.com/ Aviso Legal Este produto não está associado, afiliado, endossado, certificado ou patrocinado pelo dono do Copyright original. Todas as marcas registradas que aparecem nesse livro são propriedade de seus respectivos donos.

BuddyPress For Dummies

by Lisa Sabin-Wilson

Use BuddyPress to create the ultimate site experience BuddyPress is a suite of free WordPress plugins and themes, each adding a distinct new feature. It contains all the features you would expect from WordPress, but it aims to let members socially interact. With this fun and friendly guide, you'll learn how to customize BuddyPress so that it matches the style of your Web site. You'll walk through the necessary steps for modifying and customizing BuddyPress themes and you'll discover how to extend BuddyPress through the use of addons and plugins. With BuddyPress, you'll be well on your way to creating the ultimate user experience on your site. Shows you how to set up the WordPress foundation required to run BuddyPress Walks you through installing BuddyPress on a WordPress-powered site Explains the different BuddyPress components, including extended profiles, private messaging, friends, groups, the wire, activity streams, blog tracking, status updates, and more Details ways to troubleshoot BuddyPress once it is up and running Demonstrates how to extend BuddyPress through the use of addons and plugins Bring all your social community subscriptions together in BuddyPress!

BuddyPress Theme Development

by Tammie Lister

This book is a hands-on tutorial guide to using BuddyPress.This book is great for designers and developers who are looking to learn how to develop BuddyPress themes. It's assumed that the reader has some understanding of Wordpress and is familiar with CSS and HTML.

Budowa prostych robotów. Niezwyk?e projekty ze zwyk?ych materia?ów

by Kathy Ceceri

Roboty dla ka?dego, wykonane ze wszystkiegoCo to jest robot? Gdyby zada? to pytanie przypadkowej osobie na ulicy, z pewno?ci? odpowiedzia?aby, ?e jest to konstrukcja zbudowana z drogich materia?ów, zawieraj?ca skomplikowane uk?ady elektroniczne oraz profesjonalne oprogramowanie. Nic bardziej b??dnego! Czy wiesz, ?e prostego robota mo?esz zbudowa? nawet z papieru? Si?gnij po t? ksi??k? i zacznij prac? nad swoim pierwszym projektem!Autorka tego podr?cznika udowodni Ci, ?e ka?dy mo?e wcieli? si? w rol? konstruktora, nawet bez zaawansowanych umiej?tno?ci elektronicznych. W dodatku mo?e wykorzysta? w tym celu najró?niejsze materia?y. Dzi?ki informacjom zawartym w tej ksi??ce zbudujesz robota zasilanego energi? s?oneczn? oraz takiego, który porusza si? dzi?ki wibracjom. Ponadto w trakcie lektury kolejnych rozdzia?ów przekonasz si?, jak wykorzysta? p?ytk? Arduino do zapanowania nad robotem wykonanym z e-tekstyliów. Poznasz te? ciekawostki zwi?zane z drukiem 3D, platform? littleBits oraz robotami BEAM. Przekonaj si?, jak ?atwo mo?esz spe?ni? swoje marzenia o budowie robota!Lektura ksi??ki Budowa prostych robotów pozwoli Ci skonstruowa?: Papierowego i gumowego (pompowanego) robota, który b?dzie porusza? si? reaguj?c na Twoje polecenia; Ruchom?, napr??eniowo-integraln? konstrukcj? no?n? robota nap?dzan? za pomoc? komponentów littleBits; Hybryd? ko?a i nóg; Chmar? ?lizgaj?cych si? robotów poruszaj?cych si? dzi?ki drganiom; Robota BEAM zasilanego energi? s?oneczn?, poruszaj?cego si? dzi?ki drganiom; Ploter wykonuj?cy rysunki za pomoc? mazaka; Robota wyposa?onego w Arduino o korpusie wykonanym z e-tekstyliów;Naucz si? budowa? proste roboty!

Budowanie mikrous?ug

by Sam Newman

Wykorzystaj potencja? architektury us?ug!Architektura mikrous?ug to sposób na odej?cie od du?ych, monolitycznych aplikacji. Wyspecjalizowane us?ugi realizuj?ce konkretne zadania i komunikuj?ce si? z otoczeniem pozwalaj? na lepsze zapanowanie nad kodem, s? ?atwiejsze do przetestowania oraz bardziej elastyczne. Jednak oprócz zalet maj? te? wady. Si?gnij po t? ksi??k? i dowiedz si?, jak najlepiej radzi? sobie z architektur? mikrous?ug!Autor przedstawia w ksi??ce skuteczne techniki projektowania i korzystania z architektury mikrous?ug. W trakcie lektury kolejnych rozdzia?ów poznasz w szczegó?ach ide? mikrous?ug, korzy?ci ich stosowania, sposoby modelowania us?ug oraz skuteczne techniki dzielenia du?ej aplikacji na mikrous?ugi. Ponadto zapoznasz si? z mo?liwymi sposobami integracji: zdalne wywo?anie procedur, REST i zdarzenia — to tylko niektóre z poruszanych kwestii. Na sam koniec zaznajomisz si? z najlepszymi metodami testowania i monitorowania us?ug, zapewnisz im bezpiecze?stwo dzi?ki kluczom API oraz innym technikom. Ta ksi??ka jest obowi?zkow? lektur? dla wszystkich osób chc?cych tworzy? nowoczesne systemy bazuj?ce na architekturze mikrous?ug. Odkryj, jak mo?na dostosowa? projekt systemu do celów Twojej organizacji stosuj?c architektur? mikrous?ug Zapoznaj si? z mo?liwo?ciami integracji us?ug z pozosta?? cz??ci? systemu Zastosuj przyrostowe podej?cie do podzia?u monolitycznych baz kodu Wdra?aj pojedyncze mikrous?ugi korzystaj?c z techniki ci?g?ej integracji Zbadaj z?o?ono?? testowania i monitorowania rozproszonych us?ug Zarz?dzaj zabezpieczeniami stosuj?c modele u?ytkownik-us?uga oraz us?uga-us?uga Zapoznaj si? z wyzwaniami skalowania architektury mikrous?ugPrzekonaj si?, jak architektura mikrous?ug zmieni Twoje spojrzenie na aplikacje!Sam Newman — technolog w firmie ThoughtWorks odpowiedzialny za wspomaganie klientów oraz architektur? wewn?trznych systemów. Prelegent, autor artyku?ów dla wydawnictwa O’Reilly. Programista j?zyków Java oraz Python.

Buffer Overflow Attacks: Detect, Exploit, Prevent

by James C. Foster

Will the Code You Write Today Headline Tomorrow's BugTraq Mail List? Includes Numbered-by-Line Exploit Code Examples That Illustrate the Differences Between Stack Overflows, Heap Corruption, and Format String Bugs Provides Case Studies for Most Major Platforms and Environments, Including Windows, FreeBSD, FrontPage, and Linux Avoid Worm or Custom Exploits by Analyzing Your Source Code to Detect Buffer Overflow Vulnerabilities Forensic investigations of notorious Internet attacks, such as the SQL Slammer and Blaster Worms, reveal buffer overflows to be the sophisticated hacker's "vulnerability of choice". These worms crippled the Internet and cost billions of dollars to clean up. Now, even more powerful and insidious threats have appeared in the form of "custom exploits". These one-time only exploits are custom crafted to attack your enterprise, making them even more difficult to detect and defend. No catchy names, no media coverage; just your own personal disaster. James C. Foster's Buffer Overflow Attacks clearly demonstrates that the only way to defend against the endless variety of buffer overflow attacks is to implement a comprehensive design, coding and test plan for all of your applications. From Dave Aitel's Foreword through the last appendix, this is the only book dedicated exclusively to detecting, exploiting, and preventing buffer overflow attacks. CONTENTS OF THIS BOOK INCLUDE Buffer Overflows: The Essentials Understanding Shellcode Writing Shellcode Win32 Assembly Case Study: FreeBSD NN Exploit Code Case Study: xlockmore User Supplied Format String Vulnerability (CVE-2000-0763) Case Study: FrontPage Denial of Service Utilizing WinSock Stack Overflows Heap Corruption Format String Attacks Windows Buffer Overflows Case Study: cURL buffer overflow on Linux Case Study: OpenSSL SSLv2 Malformed Client Key Remote Buffer Overflow Vulnerability (CAN-2002-0656) Case Study: X11R6 4.2 XLOCALEDIR Overflow Case Study: Microsoft MDAC Denial of Service Case Study: Local UUX Buffer Overflow on HPUX Finding Buffer Overflows in Source Case Study: InlineEgg I Case Study: InlineEgg II Case Study: Seti@Home Exploit Code Case Study: Microsoft CodeBlue Exploit Code The Complete Data Conversion Table Useful Syscalls Additional Exploit References

Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities

by Vickie Li

Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You&’ll also learn how to navigate bug bounty programs set up by companies to reward security professionals for finding bugs in their web applications.Bug bounty programs are company-sponsored programs that invite researchers to search for vulnerabilities on their applications and reward them for their findings. This book is designed to help beginners with little to no security experience learn web hacking, find bugs, and stay competitive in this booming and lucrative industry. You&’ll start by learning how to choose a program, write quality bug reports, and maintain professional relationships in the industry. Then you&’ll learn how to set up a web hacking lab and use a proxy to capture traffic. In Part 3 of the book, you&’ll explore the mechanisms of common web vulnerabilities, like XSS, SQL injection, and template injection, and receive detailed advice on how to find them and bypass common protections. You&’ll also learn how to chain multiple bugs to maximize the impact of your vulnerabilities. Finally, the book touches on advanced techniques rarely covered in introductory hacking books but that are crucial to understand to hack web applications. You&’ll learn how to hack mobile apps, review an application&’s source code for security issues, find vulnerabilities in APIs, and automate your hacking process. By the end of the book, you&’ll have learned the tools and techniques necessary to be a competent web hacker and find bugs on a bug bounty program.

Bug Bounty Hunting Essentials

by Shahmeer Amir

This book is targeted towards white-hat hackers, or anyone who wants to understand the concept behind bug bounty hunting and understand this brilliant way of penetration testing. This book does not require any knowledge on bug bounty hunting.

Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications

by Sanjib Sinha

Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab. You will then discover how request forgery injection works on web pages and applications in a mission-critical setup. Moving on to the most challenging task for any web application, you will take a look at how cross-site scripting works and find out about effective ways to exploit it. You will then learn about header injection and URL redirection along with key tips to find vulnerabilities in them. Keeping in mind how attackers can deface your website, you will work with malicious files and automate your approach to defend against these attacks. Moving on to Sender Policy Framework (SPF), you will see tips to find vulnerabilities in it and exploit them. Following this, you will get to know how unintended XML injection and command injection work to keep attackers at bay. Finally, you will examine different attack vectors used to exploit HTML and SQL injection. Overall, Bug Bounty Hunting for Web Security will help you become a better penetration tester and at the same time it will teach you how to earn bounty by hunting bugs in web applications. What You Will Learn Implement an offensive approach to bug hunting Create and manage request forgery on web pages Poison Sender Policy Framework and exploit it Defend against cross-site scripting (XSS) attacks Inject headers and test URL redirection Work with malicious files and command injectionResist strongly unintended XML attacks Who This Book Is ForWhite-hat hacking enthusiasts who are new to bug hunting and are interested in understanding the core concepts.

Build AI-Enhanced Audio Plugins with C++

by Matthew John Yee-King

Build AI-Enhanced Audio Plugins with C++ explains how to embed artificial intelligence technology inside tools that can be used by audio and music professionals, through worked examples using Python, C++ and audio APIs which demonstrate how to combine technologies to produce professional, AI-enhanced creative tools.Alongside a freely accessible source code repository created by the author that accompanies the book for readers to reference, each chapter is supported by complete example applications and projects, including an autonomous music improviser, a neural network-based synthesizer meta-programmer and a neural audio effects processor. Detailed instructions on how to build each example are also provided, including source code extracts, diagrams and background theory.This is an essential guide for software developers and programmers of all levels looking to integrate AI into their systems, as well as educators and students of audio programming, machine learning and software development.

Build Android-Based Smart Applications: Using Rules Engines, NLP and Automation Frameworks

by Chinmoy Mukherjee

Build smart applications using cutting-edge technologies such as rules engines, code automation frameworks, and natural language processing (NLP). This book provides step-by-step instructions on how to port nine rules engines (CLIPS, JRuleEngine, DTRules, Zilonis, TermWare, Roolie, OpenRules, JxBRE, and JEOPS) to the Android platform. You'll learn how to use each rules engine to build a smart application with sample code snippets so that you can get started with programming smart applications immediately. Build Android-Based Smart Applications also describes porting issues with other popular rules engines (Drools, JLisa, Take, and Jess). This book is a step-by-step guide on how to generate a working smart application from requirement specifications. It concludes by showing you how to generate a smart application from unstructured knowledge using the Stanford POS (Part of Speech) tagger NLP framework. What You Will Learn Evaluate the available rules engines to see which rules engine is best to use for building smart applications Build smart applications using rules engines Create a smart application using NLP Automatically generate smart application from requirement specifications Who This Book Is For Android and web developers with some experience.

Build Applications with Meteor

by Dobrin Ganev

Build a variety of cross-platform applications with the world's most complete full-stack JavaScript framework— Meteor About This Book • Develop a set of real-world applications each exploring different features of Meteor • Make your app more appealing by adding reactivity and responsiveness to it • Work with the most powerful feature of Meteor—the “full stack reactivity”—through building real-time applications with many third party libraries Who This Book Is For If you are a developer who is looking forward to taking your application development skills with Meteor to next level by getting your hands-on different projects, this book is for you. What You Will Learn • See how Meteor fits in the modern web application development by using its reactive data system • Make your front-end behave consistently across environments by implementing a predictable state container with Redux • Get familiar with React and overview of Angular 2 • Add a map to your application with a real-time geolocation • Plugin into Meteor social media APIs like Twitter's streaming and Facebook's Messenger • Add search functionality from scratch to your existing app and data • Add responsiveness with Bootstrap 4 and Google's Material Design using Less and Sass • Distribute your data across machines and data centers by adding Apache Cassandra to your existing stack. • Learn how to scale your microservices with the high performant language neutral framework gRPC. • Learn how to query multiple data sources using GraphQL. In Detail This book starts with the basic installation and overview of the main components in Meteor. You'll get hands-on multiple versatile applications covering a wide range of topics from adding a front-end views with the hottest rendering technology React to implementing a microservices oriented architecture.All the code is written with ES6/7 which is the latest significantly improved JavaScript language. We'll also look at real-time data streaming, server to server data exchange, responsive styles on the front-end, full-text search functionality, and integration of many third-party libraries and APIs using npm. By the end of the book, you'll have the skills to quickly prototype and even launch your next app idea in a matter of days. Style and Approach This book takes an easy-to-follow project-based approach. Each project starts with the goal of what you will learn and an overview the technologies used.

Build Autonomous Mobile Robot from Scratch using ROS: Simulation and Hardware (Maker Innovations Series)

by Rajesh Subramanian

Start from scratch and build a variety of features for autonomous mobile robots both in simulation and hardware. This book will show you how to simulate an autonomous mobile robot using ROS and then develop its hardware implementation. You'll start by gaining an understanding of the basic theoretical concepts underlying the development of autonomous robots, including history, mathematics, electronics, mechanical aspects, 3D modelling, 3D printing, Linux, and programming. In subsequent chapters, you will learn how to describe kinematics, simulate and visualize the robot, how to interface Arduino with ROS, tele-operate the robot, perform mapping, autonomous navigation, add additional sensors, sensor fusion, laser scan matching, web interface, and more. Not only will you learn theoretical aspects, you’ll also review the hardware realization of mobile robots. Projects start with a very basic two-wheeled mobile robot and progress to complex features such as mapping, navigation, sensor fusion, autodocking, and web interface. Upon completing this book, you’ll have incorporated important robot algorithms including SLAM, Path Finding, Localization, and Kalman Filters – and you will be ready to start designing and building your own autonomous robots. What You Will Learn Design and build your customized physical robot with autonomous navigation capabilityCreate a map of your house using the robot’s lidar scannerCommand the robot to go to any accessible location on the mapInteract with the robot using a mobile app, joystick, keyboard, push-button, or remote computerMonitor robot updates via LCD, a mobile app, sound, and status LEDsAutomate delivery of small payloads and return to home baseUtilize autodocking to home base for battery chargingLeverage sensor fusion to improve accuracyInterface with the robot via the Web to monitor and control it remotely Who This Book Is For Complete beginners who want to build customized robots from scratch. No experience is expected, although basic programming knowledge could be handy.

Build Awesome Command-Line Applications in Ruby 2: Control Your Computer, Simplify Your Life

by David B. Copeland

Speak directly to your system. With its simple commands, flags, and parameters, a well-formed command-line application is the quickest way to automate a backup, a build, or a deployment and simplify your life. With this book, you'll learn specific ways to write command-line applications that are easy to use, deploy, and maintain, using a set of clear best practices and the Ruby programming language. This book is designed to make any programmer or system administrator more productive in their job. Now updated for Ruby 2.Writing a command-line application that's self-documenting, robust, adaptable and forever useful is easier than you might think. Ruby is particularly suited to this task, because it combines high-level abstractions with "close to the metal" system interaction wrapped up in a concise, readable syntax. Plus, Ruby has the support of a rich ecosystem of open source tools and libraries.Ten insightful chapters each explain and demonstrate a command-line best practice. You'll see how to use these tools to elevate the lowliest automation script to a maintainable, polished application. You'll learn how to use free, open source parsers to create user-friendly command-line interfaces as well as command suites. You'll see how to use defaults to keep options simple for everyday users, while giving advanced users options for more complex tasks. There's no reason why a command-line application should lack documentation, whether it's part of a help command or a man page; you'll find out when and how to use both. Your journey from command-line novice to pro ends with a look at valuable approaches to testing your apps, and includes some fun techniques for outside-the-box, colorful interfaces that will delight your users.With Ruby, the command line is not dead. Long live the command line.

Build Better Chatbots: A Complete Guide to Getting Started with Chatbots

by Rashid Khan Anik Das

Learn best practices for building bots by focusing on the technological implementation and UX in this practical book. You will cover key topics such as setting up a development environment for creating chatbots for multiple channels (Facebook Messenger, Skype, and KiK); building a chatbot (design to implementation); integrating to IFTT (If This Then That) and IoT (Internet of Things); carrying out analytics and metrics for chatbots; and most importantly monetizing models and business sense for chatbots. Build Better Chatbots is easy to follow with code snippets provided in the book and complete code open sourced and available to download. With Facebook opening up its Messenger platform for developers, followed by Microsoft opening up Skype for development, a new channel has emerged for brands to acquire, engage, and service customers on chat with chatbots. What You Will Learn Work with the bot development life cycle Master bot UX design Integrate into the bot ecosystem Maximize the business and monetization potential for bots Who This Book Is For Developers, programmers, and hobbyists who have basic programming knowledge. The book can be used by existing chatbot developers to gain a better understanding of analytics and the business side of bots.

Refine Search

Showing 9,001 through 9,025 of 61,703 results