Title search results
Showing 27081 - 27100 of 45908 items
IoT Benefits and Growth Opportunities for the Telecom Industry: Key Technology Drivers for Companies
By Vincent Sabourin, Jordan Tito Jabo. 2022
This critical and forward-looking book features: An assessment of the impact of Internet of Things (IoT) on the telecom industry’s…
revenue streams IoT-based business models in the telecom industry A PESTLE (political, economic, socio-cultural, technological, legal, and environmental) analysis of the industry in relation to IoT Key technological drivers. It also features a case study of Bell Canada Enterprises (BCE) Inc., which highlights IoT-based business models in the industry. The study reveals that telecom operators have started implementing IoT projects, however, true revenue streams are yet to materialize. Ten IoT-based business models have been identified at BCE Inc. The book points out that operators do leverage existing infrastructure in terms of broadband fiber and mobile connectivity in part and resort to partnerships and acquisitions to acquire much-needed knowledge, technology, and smart devices. Concerning the effect of IoT on the telecoms’ revenue streams, it was revealed that new entrants, who are not necessarily in the telecom industry, have impacted the old players’ revenue streams. OTT services like YouTube, WhatsApp, IPTV, Netflix, are the biggest culprits. Seven key technological drivers for IoT have been identified and include widespread wireless connectivity, the availability and affordability of microcontrollers, sensors and actuators, the decreasing cost of bandwidth, the recent implementation of IPv6, and the ongoing development of 5G network, as well as the use of cloud computing and analytics. Finally, the PESTLE analysis of the industry shows that the lack of a comprehensive political and regulatory framework still slows down IoT deployment. Interoperability, security, and privacy concerns are other constraints. Conversely, general economic conditions in most developed and developing economies are favorable to the advancement of IoT technology. Governments are willing to subsidize R&D and have partnered with the private sector to speed up the roll-out process.DevOps for the Desperate: A Hands-On Survival Guide
By Bradley Smith. 2022
DevOps for the Desperate is a hands-on, no-nonsense guide for those who land in a DevOps environment and need to…
get up and running quickly.This book introduces fundamental concepts software developers need to know to flourish in a modern DevOps environment including infrastructure as code, configuration management, security, containerization and orchestration, monitoring and alerting, and troubleshooting. Readers will follow along with hands-on examples to learn how to tackle common DevOps tasks. The book begins with an exploration of DevOps concepts using Vagrant and Ansible to build systems with repeatable and predictable states, including configuring a host with user-based security. Next up is a crash course on containerization, orchestration, and delivery using Docker, Kubernetes, and a CI/CDpipeline. The book concludes with a primer in monitoring and alerting with tips for troubleshootingcommon host and application issues. You'll learn how to:Use Ansible to manage users and groups, and enforce complex passwordsCreate a security policy for administrative permissions, and automate a host-based firewallGet started with Docker to containerize applications, use Kubernetes for orchestration, and deploycode using a CI/CD pipelineBuild a monitoring stack, investigate common metric patterns, and trigger alertsTroubleshoot and analyze common issues and errors found on hostsAndroids: The Team that Built the Android Operating System
By Chet Haase. 2022
The fascinating inside story of how the Android operating system came to be.In 2004, Android was two people who wanted…
to build camera software but couldn't get investors interested. Today, Android is a large team at Google, delivering an operating system (including camera software) to over 3 billion devices worldwide. This is the inside story, told by the people who made it happen.Androids: The Team that Built the Android Operating System is a first-hand chronological account of how the startup began, how the team came together, and how they all built an operating system from the kernel level to its applications and everything in between. It describes the tenuous beginnings of this ambitious project as a tiny startup, then as a small acquisition by Google that took on an industry with strong, entrenched competition. Author Chet Haase joined the Android team at Google in May 2010 and later recorded conversations with team members to preserve the early days of Android's history leading to the launch of 1.0. This engaging and accessible book captures the developers' stories in their own voices to answer the question: How did Android succeed?Blazor in Action
By Chris Sainty. 2023
An example-driven guide to building reusable UI components and web frontends—all with Blazor, C#, and .NET.In Blazor in Action, you…
will learn about: Blazor + WebAssembly Picking the right hosting model Building reusable UI components Building forms with validation Integrating with JavaScript libraries Securing your application Testing your applications Blazor in Action is a practical guide to building stunning UIs and client-side applications using C# and .NET. You&’ll use the Blazor frontend framework to create a fun and exciting web application for plotting hiking routes. As you build up your new application, you&’ll master the key features of Blazor, such as routing, forms and validation, and dynamic and reusable components. By the time you're done, you'll be ready to develop beautiful sites and apps that seamlessly execute your C# code natively in the browser. The book is written to the most recent stable build of Blazor and seamlessly integrates fresh features from .NET 6. About the technology Create rich web frontends without relying on JavaScript. Microsoft&’s Blazor framework uses WebAssembly to extend the ultra-popular ASP.NET platform. In Blazor, you can build interactive web components that run natively in the browser without plug-ins or transpilers. And because it&’s C# end-to-end, it&’s easy to share code between the server and your web UI. About the book Blazor in Action teaches you to create full-stack ASP.NET applications end-to-end in C#. You&’ll start by learning to build Blazor web components, working through core topics like routing and forms. As you go, you&’ll implement a hiking route web application that includes reusable code, integration with JavaScript libraries, and role-based security. To make sure your app is production ready, this practical book also covers state management, data persistence, and testing. What's inside Dynamic and reusable UI components Sharing client and server code Role-based security using Auth0 Persisting state using local browser storage About the reader For web developers with C# and .NET experience. About the author Chris Sainty has been a part of the Blazor community from the beginning. He&’s an active blogger, open source developer, international speaker, and a Microsoft MVP. Table of Contents 1 Starting your Blazor journey 2 Your first Blazor app 3 Working with Blazor&’s component model 4 Routing 5 Forms and validation—Part 1: Fundamentals 6 Forms and validation—Part 2: Beyond the basics 7 Creating more reusable components 8 Integrating with JavaScript libraries 9 Securing Blazor applications 10 Managing state 11 Testing your Blazor applicationGPT-3
By Sandra Kublik, Shubham Saboo. 2022
GPT-3: NLP with LLMs is a unique, pragmatic take on Generative Pre-trained Transformer 3, the famous AI language model launched…
by OpenAI in 2020. This model is capable of tackling a wide array of tasks, like conversation, text completion, and even coding with stunningly good performance. Since its launch, the API has powered a staggering number of applications that have now grown into full-fledged startups generating business value. This book will be a deep dive into what GPT-3 is, why it is important, what it can do, what has already been done with it, how to get access to it, and how one can build a GPT-3 powered product from scratch.This book is for anyone who wants to understand the scope and nature of GPT-3. The book will evaluate the GPT-3 API from multiple perspectives and discuss the various components of the new, burgeoning economy enabled by GPT-3. This book will look at the influence of GPT-3 on important AI trends like creator economy, no-code, and Artificial General Intelligence and will equip the readers to structure their imaginative ideas and convert them from mere concepts to reality.Advanced Research in Data Privacy (Studies in Computational Intelligence #567)
By Guillermo Navarro, Vicen Torra. 2015
This book provides an overview of the research work on data privacy and privacy enhancing technologies carried by the participants…
of the ARES project ARES Advanced Research in Privacy an Security CSD2007-00004 has been one of the most important research projects funded by the Spanish Government in the fields of computer security and privacy It is part of the now extinct CONSOLIDER INGENIO 2010 program a highly competitive program which aimed to advance knowledge and open new research lines among top Spanish research groups The project started in 2007 and will finish this 2014 Composed by 6 research groups from 6 different institutions it has gathered an important number of researchers during its lifetime Among the work produced by the ARES project one specific work package has been related to privacy This books gathers works produced by members of the project related to data privacy and privacy enhancing technologies The presented works not only summarize important research carried in the project but also serve as an overview of the state of the art in current research on data privacy and privacy enhancing technologiesFormal Techniques for Distributed Objects, Components, and Systems: 42nd IFIP WG 6.1 International Conference, FORTE 2022, Held as Part of the 17th International Federated Conference on Distributed Computing Techniques, DisCoTec 2022, Lucca, Italy, June 1
By Mohammad Reza Mousavi, Anna Philippou. 2022
This book constitutes the refereed proceedings of the 42nd IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects,…
Components, and Systems, FORTE 2022, held in Lucca, Italy, in June 2022, as part of the 17th International Federated Conference on Distributed Computing Techniques, DisCoTec 2022.The 12 regular papers presented were carefully reviewed and selected from 28 submissions. They cover topics such as: software quality, reliability, availability, and safety; security, privacy, and trust in distributed and/or communicating systems; service-oriented, ubiquitous, and cloud computing systems; component-and model-based design; object technology, modularity, and software adaptation; self-stabilisation and self-healing/organising; and verification, validation, formal analysis, and testing of the above.Blockchain-Implementierung in eine Automotive Supply Chain (essentials)
By Alexander Goudz, Erhan Yilmaz, Sven Meyhöfer, Henrik Sanchez-Gonzalez. 2022
In der Automotive-Branche ist eine schnell agierende und perfekt abgestimmte Supply Chain ein entscheidender Vorteil gegenüber dem Wettbewerb. Durch die…
Implementierung der Blockchain-Technologie lässt sich die Geschwindigkeits- und Transparenzerhöhung gewährleisten. Dieses essentiell simuliert eine Supply Chain an verschiedenen Instanzen, in der die Blockchain exemplarisch genutzt wird und dadurch die Supply-Chain-Abläufe automatisiert werden.Advance your understanding of generic data structures and algorithms and their applications using Go and the effective use of concurrency.…
You are invited on a journey that aims to improve your programming and problem-solving skills. This book takes you to the next step by showing how to get your programs to work efficiently as well as correctly. As you explore many data structures and the algorithms and applications associated with them, you'll focus on the trade-offs between speed and storage and the benefits of deploying concurrency when appropriate. This book will demonstrate the huge increases in application performance that are possible. The presentation of classic data structures and techniques of algorithm design (greedy, divide and conquer, branch-and-bound to name a few) provides an essential foundation and toolkit for problem solving. But this book goes further by presenting heuristic algorithms and their implementations for solving computationally intractable combinatoric optimization problems such as the travelling salesperson problem. Simulated annealing and genetic algorithms are among the techniques used.The consistent style of coding used throughout this book exploits Go’s ability to implement abstract, generic and constrained generic data types without the use of classes. Although some familiarity with Go is assumed, this book should advance your ability to use Go to tackle server-side applications, games, machine learning, information retrieval and other application domains where speed and storage efficiency is essential.What You'll LearnExplore classical data structures and algorithms aimed at making your applications run faster or require less storageUse the new generic features of Go to build reusable data structuresUtilize concurrency for maximizing application performanceSee the power of heuristic algorithms for computationally intractable problemsEnhance and improve your Go programming skillsWho This Book Is ForPracticing Go software developers and students who wish to advance their programming and problem-solving skills and experience the excitement and see the benefits of using generic data structures and algorithms that utilize concurrency whenever possible.This book constitutes the refereed proceedings of the 36th Annual IFIP WG 11.3 Conference on Data and Applications Security and…
Privacy, DBSec 2022, held in Newark, NJ, USA, in July 2022.The 12 full papers and 6 short papers presented were carefully reviewed and selected from 33 submissions. The conference covers research in data and applications security and privacy.Theoretical Cybersecurity: Principles and Advanced Concepts
By Michael Butler, Jacob G. Oakley, Wayne York, Matthew Puckett, J. Louis Sewell. 2022
There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is…
lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract and intellectual exploration of cybersecurity from the philosophical and speculative perspective. Technological innovation is certainly necessary, as it furthers the purveying of goods and services for cybersecurity producers in addition to securing the attack surface of cybersecurity consumers where able. The issue is that the industry, sector, and even academia are largely technologically focused. There is not enough work done to further the trade—the craft of cybersecurity. This book frames the cause of this and other issues, and what can be done about them. Potential methods and directions are outlined regarding how the industry can evolve to embrace theoretical cybersecurity innovation as it pertains to the art, as much as to the science. To do this, a taxonomy of the cybersecurity body of work is laid out to identify how the influences of the industry’s past and present constrain future innovation. Then, cost-benefit analysis and right-sizing of cybersecurity roles and responsibilities—as well as defensible experimentation concepts—are presented as the foundation for moving beyond some of those constraining factors that limit theoretical cybersecurity innovation. Lastly, examples and case studies demonstrate future-oriented topics for cybersecurity theorization such as game theory, infinite-minded methodologies, and strategic cybersecurity implementations. What you’ll learn The current state of the cybersecurity sector and how it constrains theoretical innovation How to understand attacker and defender cost benefit The detect, prevent, and accept paradigm How to build your own cybersecurity box Supporting cybersecurity innovation through defensible experimentation How to implement strategic cybersecurity Infinite vs finite game play in cybersecurity Who This Book Is For This book is for both practitioners of cybersecurity and those who are required to, or choose to, employ such services, technology, or capabilities.Explore Business, Technology Opportunities and Challenges After the Covid-19 Pandemic (Lecture Notes in Networks and Systems #495)
By Allam Hamdan, Bahaaeddin Alareeni. 2023
This book constitutes the refereed proceedings of the International Conference on Business and Technology (ICBT2021) organized by EuroMid Academy of…
Business and Technology (EMABT), held in Istanbul, between November 06–07, 2021. In response to the call for papers for ICBT2021, 485 papers were submitted for presentation and inclusion in the proceedings of the conference. After a careful blind refereeing process, 292 papers were selected for inclusion in the conference proceedings from forty countries. Each of these chapters was evaluated through an editorial board, and each chapter was passed through a double-blind peer-review process. The book highlights a range of topics in the fields of technology, entrepreneurship, business administration, accounting, and economics that can contribute to business development in countries, such as learning machines, artificial intelligence, big data, deep learning, game-based learning, management information system, accounting information system, knowledge management, entrepreneurship and social enterprise, corporate social responsibility and sustainability, business policy and strategic management, international management and organizations, organizational behavior and HRM, operations management and logistics research, controversial issues in management and organizations, turnaround, corporate entrepreneurship, and innovation, legal issues, business ethics, and firm governance, managerial accounting and firm financial affairs, non-traditional research and creative methodologies. These proceedings are reflecting quality research contributing theoretical and practical implications, for those who are wise to apply the technology within any business sector. It is our hope that the contribution of this book proceedings will be of the academic level which even decision-makers in the various economic and executive-level will get to appreciate.Advances in Artificial Intelligence and Security: 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part III (Communications in Computer and Information Science #1588)
By Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino. 2022
The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on…
Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 115 full papers and 53 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1124 submissions. The papers were organized in topical sections as follows:Part I: artificial intelligence;Part II: artificial intelligence; big data; cloud computing and security; multimedia forensics;Part III: encryption and cybersecurity; information hiding; IoT security.With over 300 pages of easy to follow, step-by-step illustrations, everyone can understand Machine Learning from the basics to advanced…
topics like neural networksKey FeaturesFully illustrated in color and written in the style of a graphic novel. BAM!Every concept is taught with a very gentle learning curve. DOUBLE BAM!!Every page is labeled as Main Ideas or Details, and you can focus on one, or the other, or both. TRIPLE BAM!!!Book DescriptionMachine Learning is awesome and powerful, but it can also appear incredibly complicated. That's where The StatQuest Illustrated Guide to Machine Learning comes in. This book takes the machine learning algorithms, no matter how complicated, and breaks them down into small, bite-sized pieces that are easy to understand. Each concept is clearly illustrated to provide you, the reader, with an intuition about how the methods work that goes beyond the equations alone. The StatQuest Illustrated Guide does not dumb down the concepts. Instead, it builds you up so that you are smarter and have a deeper understanding of Machine Learning.The StatQuest Illustrated Guide to Machine Learning starts with the basics, showing you what machine learning is and what are its goals, and builds on those, one picture at a time, until you have mastered the concepts behind self driving cars and facial recognition.What you will learnMaster the fundamentals to use, optimize and evaluate machine learningDevelop an intuition for fundamental statistics conceptsApply Statistical distributions, R-squared, p-values to your ML modelsGain deep insight into the building blocks like Gradient DescentVisualize machine learning methods, including Neural NetworksLearn about the limitations of machine learningWho this book is forThe StatQuest Illustrated Guide To Machine Learning is a great starting point for anyone who wants to get into the field of Machine Learning. It also serves as the perfect reference for seasoned practitioners who need to review key concepts for an upcoming job interview.For beginners, the illustrations and step-by-step approach ensure that the learning curve is as gentle as possible.For experts, the depth each topic is explored and the visualizations ensure “I finally understand!” moments occur in each chapter.Advances in Artificial Intelligence and Security: 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part I (Communications in Computer and Information Science #1586)
By Elisa Bertino, Xingming Sun, Xiaorui Zhang, Zhihua Xia. 2022
The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on…
Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 115 full papers and 53 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1124 submissions. The papers were organized in topical sections as follows:Part I: artificial intelligence;Part II: artificial intelligence; big data; cloud computing and security; multimedia forensics;Part III: encryption and cybersecurity; information hiding; IoT security.Advances in Artificial Intelligence and Security: 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part II (Communications in Computer and Information Science #1587)
By Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino. 2022
The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on…
Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 115 full papers and 53 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1124 submissions. The papers were organized in topical sections as follows:Part I: artificial intelligence;Part II: artificial intelligence; big data; cloud computing and security; multimedia forensics;Part III: encryption and cybersecurity; information hiding; IoT security.DevOps in Python: Infrastructure as Python
By Moshe Zadka. 2022
Take advantage of Python to automate complex systems with readable code. This new edition will help you move from operations/system…
administration into easy-to-learn coding.You'll start by writing command-line scripts and automating simple DevOps-style tasks followed by creating reliable and fast unit tests designed to avoid incidents caused by buggy automation. You’ll then move on to more advanced cases, like using Jupyter as an auditable remote-control panel and writing Ansible and Salt extensions.The updated information in this book covers best practices for deploying and updating Python applications. This includes Docker, modern Python packaging, and internal Python package repositories. You'll also see how to use the AWS API, and the Kubernetes API, and how to automate Docker container image building and running. Finally, you'll work with Terraform from Python to allow more flexible templating and customization of environments.What You'll LearnUnderstand operating system automation with PythonPackage Python applicationsUse Python as a DevOps consoleReview Cloud automation with PythonWho This Book Is ForDevOps engineer. Site Reliability Engineer, or similar (including Platform, Production, and Systems), and whose organization uses Python.Sensing Technology: Proceedings of ICST 2022 (Lecture Notes in Electrical Engineering #886)
By Subhas Chandra Mukhopadhyay, Krishanthi P. Jayasundera, Boby George, Joyanta Kumar Roy, Nagender Kumar Suryadevara. 2022
This book gathers the latest advances, innovations, and applications in the field of sensing technology, as presented by international researchers…
and engineers at the 14th International Conference on Sensing Technology (ICST), held in Chennai, India on January 17-19, 2022. Contributions include a wide range of topics such as: vision sensing, sensor signal processing, sensors phenomena and modelling, sensor characterization, smart sensors and sensor fusion, electromagnetic, chemical and physical sensors, electronic nose technology, biosensors, nano sensors, wireless sensors and WSN, Internet of Things, optical sensors, sensor arrays, intelligent sensing, Internet-based and remote data acquisition. The contributions, which were selected by means of a rigorous international peer-review process, present a wealth of exciting ideas that will open novel research directions and foster multidisciplinary collaboration among different specialists.Proceedings of the Sixteenth International Conference on Management Science and Engineering Management – Volume 2 (Lecture Notes on Data Engineering and Communications Technologies #145)
By Fausto Pedro García Márquez, Jiuping Xu, Asaf Hajiyev, Mohamed Hag Ali Hassan, Fulya Altiparmak. 2022
This book covers many hot topics, including theoretical and practical research in many areas such as dynamic analysis, machine learning,…
supply chain management, operations management, environmental management, uncertainty, and health and hygiene. It showcases advanced management concepts and innovative ideas. The 16th International Conference on Management Science and Engineering Management (2022 ICMSEM) will be held in Ankara, Turkey during August 3-6, 2022. ICMSEM has always been committed to promoting innovation management science (M-S) and engineering management (EM) academic research and development. The book provides researchers and practitioners in the field of Management Science and Engineering Management (MSEM) with the latest, cutting-edge thinking and research in the field. It will appeal to readers interested in these fields, especially those looking for new ideas and research directions.Bioinformatics Tools and Big Data Analytics for Patient Care
By Pramod Kumar Sharma, Balamurugan Balusamy, Rajesh Kumar Dhanaraj, Rishabha Malviya, Sonali Sundram. 2023
Nowadays, raw biological data can be easily stored as databases in computers but extracting the required information is the real…
challenge for researchers. For this reason, bioinformatics tools perform a vital role in extracting and analyzing information from databases. Bioinformatics Tools and Big Data Analytics for Patient describes the applications of bioinformatics, data management, and computational techniques in clinical studies and drug discovery for patient care. The book gives details about the recent developments in the fields of artificial intelligence, cloud computing, and data analytics. It highlights the advances in computational techniques used to perform intelligent medical tasks. Features: • Presents recent developments in the fields of artificial intelligence, cloud computing, and data analytics for improved patient care. • Describes the applications of bioinformatics, data management, and computational techniques in clinical studies and drug discovery. • Summarizes several strategies, analyses, and optimization methods for patient healthcare. • Focuses on drug discovery and development by cloud computing and data-driven research. The targeted audience comprises academics, research scholars, healthcare professionals, hospital managers, pharmaceutical chemists, the biomedical industry, software engineers, and IT professionals.