Title search results
Showing 1 - 20 of 53023 items
AI for Humanity: Building a Sustainable AI for the Future
By Andeed Ma, James Ong, Siok Siok Tan. 2024
Capture the value of cutting-edge AI while mitigating its most salient risks AI For Humanity: Building a Sustainable AI for…
the Future delivers an incisive and timely discussion of how to design, build, and implement cutting-edge AI in for-profit firms and other organizations in a responsible, sustainable, and ethical way. The book walks you through the three pillars of human-focused AI development—governance, technology, and commercialization—and dives deep into each one, showing you how to create AI products and services that better humanity and advance universally held values. You'll find methodologies and frameworks that mitigate against some of the most profound and unsettling risks of unchecked artificial intelligence development, and roadmaps to help you avoid the numerous pitfalls and traps awaiting unsuspecting companies, managers, and executives. You'll also discover: Real-world case studies, from companies including SAP, Huawei, and Tencent, demonstrating the actual dilemmas and questions firms face when developing and implementing this extraordinary tech Actionable commitments you can make to help ensure you and your company avoid the ethical and reputational risks associated with AI Strategies for AI product and service development consistent with sustainable growth Perfect for managers, executives, directors, and other business leaders with a stake in responsible artificial intelligence design, development, and implementation, AI For Humanity will also interest regulators, academics, thought leaders, and policy makers doing their best to capture AI's substantial potential value while mitigating its most serious risks.In today's data-driven world, understanding statistical models is crucial for effective analysis and decision making. Whether you're a beginner or…
an experienced user, this book equips you with the foundational knowledge to grasp and implement statistical models within Tableau. Gain the confidence to speak fluently about the models you employ, driving adoption of your insights and analysis across your organization.As AI continues to revolutionize industries, possessing the skills to leverage statistical models is no longer optional—it's a necessity. Stay ahead of the curve and harness the full potential of your data by mastering the ability to interpret and utilize the insights generated by these models.Whether you're a data enthusiast, analyst, or business professional, this book empowers you to navigate the ever-evolving landscape of data analytics with confidence and proficiency. Start your journey toward data mastery today.In this book, you will learn:The basics of foundational statistical modeling with TableauHow to prove your analysis is statistically significantHow to calculate and interpret confidence intervalsBest practices for incorporating statistics into data visualizationsHow to connect external analytics resources from Tableau using R and PythonApache Iceberg: The Definitive Guide
By Tomer Shiran, Jason Hughes, Alex Merced. 2024
Traditional data architecture patterns are severely limited. To use these patterns, you have to ETL data into each tool—a cost-prohibitive…
process for making warehouse features available to all of your data. The lack of flexibility with these patterns requires you to lock into a set of priority tools and formats, which creates data silos and data drift. This practical book shows you a better way.Apache Iceberg provides the capabilities, performance, scalability, and savings that fulfill the promise of an open data lakehouse. By following the lessons in this book, you'll be able to achieve interactive, batch, machine learning, and streaming analytics with this high-performance open source format. Authors Tomer Shiran, Jason Hughes, and Alex Merced from Dremio show you how to get started with Iceberg.With this book, you'll learn:The architecture of Apache Iceberg tablesWhat happens under the hood when you perform operations on Iceberg tablesHow to further optimize Apache Iceberg tables for maximum performanceHow to use Iceberg with popular data engines such as Apache Spark, Apache Flink, and DremioHow Apache Iceberg can be used in streaming and batch ingestionDiscover why Apache Iceberg is a foundational technology for implementing an open data lakehouse.Reliable and Intelligent Optimization in Multi-Layered Cloud Computing Architectures
By Madhusudhan H. S., Satish Kumar T., Punit Gupta, Dinesh Kumar Saini, Kashif Zia. 2024
One of the major developments in the computing field has been cloud computing, which enables users to do complicated computations…
that local devices are unable to handle. The computing power and flexibility that have made the cloud so popular do not come without challenges. It is particularly challenging to decide which resources to use, even when they have the same configuration but different levels of performance because of the variable structure of the available resources. Cloud data centers can host millions of virtual machines, and where to locate these machines in the cloud is a difficult problem. Additionally, fulfilling optimization needs is a complex problem.Reliable and Intelligent Optimization in Multi-Layered Cloud Computing Architectures examines ways to meet these challenges. It discusses virtual machine placement techniques and task scheduling techniques that optimize resource utilization and minimize energy consumption of cloud data centers. Placement techniques presented can provide an optimal solution to the optimization problem using multiple objectives. The book focuses on basic design principles and analysis of virtual machine placement techniques and task allocation techniques. It also looks at virtual machine placement techniques that can improve quality-of-service (QoS) in service-oriented architecture (SOA) computing. The aims of virtual machine placement include minimizing energy usage, network traffic, economical cost, maximizing performance, and maximizing resource utilization. Other highlights of the book include: Improving QoS and resource efficiency Fault-tolerant and reliable resource optimization models A reactive fault tolerance method using checkpointing restart Cost and network-aware metaheuristics. Virtual machine scheduling and placement Electricity consumption in cloud data centers Written by leading experts and researchers, this book provides insights and techniques to those dedicated to improving cloud computing and its services.Game Design Deep Dive: Soulslike
By Joshua Bycer. 2024
Game Design Critic Joshua Bycer is back with another entry in the Game Design Deep Series to focus on the…
youngest genre yet: soulslikes. Over a decade, From Software defined a new genre that has led to studios chasing after them hit after hit. In this book, Josh will cover the history of the genre and popular soulslike games of the 2010s and discuss what aspects of design make a game a soulslike. The first book looking at the history of the genre A breakdown of both action and RPG design for fans and designers of both A lesson on difficulty in games and why harder doesn’t mean betterThe third volume in a new series exploring the basics of Raspberry Pi Operating System administration, this installment builds on…
the insights from Volumes 1 and 2 to provide a compendium of easy-to-use and essential guidance for Raspberry Pi system administration for novice users, with specific focus on Text Editors, git/ GitHub, and LXC/LXD.The overriding idea behind system administration of a modern, 21st-century Linux system, such as the Raspberry Pi OS, is the use of systemd to ensure that the Linux kernel works efficiently and effectively to provide these three foundation stones of computer operation and management: computer system concurrency, virtualization, and secure persistence. This third volume includes a beginner’s compendium of essential text-based Linux commands, a complete tutorial on the most important Raspberry Pi OS Text Editors, a description of uses of the git command, and a thorough explication of container virtualization with LXC/LXD and Docker.This book is aimed at students and practitioners looking to maximize their use of the Raspberry Pi OS. With plenty of practical examples, projects, and exercises, this volume can also be adopted in a more formal learning environment to supplement and extend the basic knowledge of a Linux operating system.The Zero Trust Framework and Privileged Access Management (PAM)
By Ravindra Das. 2024
This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business…
is segmented into smaller islands, each having its own lines of defense. This is primarily achieved through the use of Multifactor Authentication (MFA), where at least three more authentication layers are used, preferably being different from one another.Another key aspect of the Zero Trust Framework is known as Privileged Access Management (PAM). This is an area of Cybersecurity where the protection of superuser accounts, rights, and privileges must be protected at all costs from Cyberattackers. In this regard, this is where the Zero Trust Framework and PAM intertwine, especially in a Cloud-based platform, such as Microsoft Azure.However, as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis, not only for individuals but for businesses as well. It is hoped that by combining the Zero Trust Framework with PAM, password use can be eradicated altogether, thus giving rise to a passwordless society.Practical Web Accessibility: A Comprehensive Guide to Digital Inclusion
By Ashley Firth. 2024
Everyone deserves to use the Internet. An estimated 1.3 billion people experience significant disability. That’s 16percent of the world’s population,…
or one in six of us. At the same time, over 96 percent of the one million most popular websites have an accessibility issue. Add to this the massive rise in legal cases around sites not being accessible, including Beyoncé, Disney, and Netflix, and you have an important topic that more and more people are starting to engage with.In this updated and revamped second edition of the Amazon technology chart-topping Practical Web Accessibility, you’ll be guided through a broad range of disabilities and access needs. You’ll understand the ways these users typically engage with the web, the barriers they often face, and practical advice on how your websites and content can be compliant, but more than that, inclusive and enjoyable to use. There’s also a new chapter on “Outsourcing Accessibility,” exploring third party “bolt-on” tools, “build your own website” platforms like Wix, and popular design systems. You‘ll explore whether they’re helpful or detrimental in the fight to make the web more accessible.Throughout this book you’ll learn to test for, spot, and fix web accessibility issues for a wide range of physical and mental impairments. Featuring content from the latest compliance frameworks, including the newly released WCAG 2.2 and exploratory concepts in WCAG 3, you’ll see how to go beyond the basic requirements in order to help your users. You’ll also learn that an accessible approach won’t just help people with disabilities, it will improve your website for everyone.This book comes complete with practical examples you can use in your own sites, along with a brand-new approach to auditing and improving a website’s accessibility, and a team’s approach to it, based on tools created by the author and refined over years as a consultant — The FAIR framework and ACCESS checklist. With these tools, you can set up processes for yourself and your team that will drastically improve the accessibility of your sites and, importantly, keep them that way in the future. Suitable for those of any profession or experience level, Practical Web Accessibility gives you all the information you need to ensure that your sites are truly accessible for the modern, inclusive web. If you would like to learn about web accessibility in a clear and actionable way, this book is for you.What You Will LearnA greater understanding of a vast range of disabilities that have online access needs, and the issues they typically face accessing content online.Ways to apply the practical steps required to cater for those needs.How to take your sites, and colleagues, on a journey from being inaccessible to accessible.The importance of accessibility in your designs, code, content, and more.The best ways to test andimprove your sites, so you can be compliant, and truly accessible. Who This Book Is For Anyone, regardless of what they do, who wants to learn how to make websites and their content more accessible for those with disabilities. In the world of web, the book has been used by front and backend developers, designers, product and project managers, team and business leaders.Data-Centric Business and Applications: Modern Trends in Financial and Innovation Data Processes 2023. Volume 2 (Lecture Notes on Data Engineering and Communications Technologies #194)
By Andriy Semenov, Iryna Yepifanova, Jana Kajanová. 2024
This book examines aspects of financial and investment processes, as well as the application of information technology mechanisms to business…
and industrial management, using the experience of the Ukrainian economy as an example. An effective tool for supporting business data processing is combining modern information technologies and the latest achievements in economic theory. The variety of industrial sectors studied supports the continuous acquisition and use of efficient business analysis in organizations. In addition, the book elaborates on multidisciplinary concepts, examples, and practices that can be useful for researching the evolution of developments in the field. Also, in this book, there is a description of analysis methods for making decisions in business, finance, and innovation management.Limits of AI - theoretical, practical, ethical (Technik im Fokus)
By Klaus Mainzer, Reinhard Kahle. 2024
Artificial intelligence is a key technology with great expectations in science, industry, and everyday life. This book discusses both the…
perspectives and the limitations of this technology. This concerns the practical, theoretical, and conceptual challenges that AI has to face. In an early phase of symbolic AI, AI focused on formal programs (e.g., expert systems), in which rule-based knowledge was processed with the help of symbolic logic. Today, AI is dominated by statistics-based machine learning methods and Big Data. While this sub-symbolic AI is extremely successful (e.g., chatbots like ChatGPT), it is often not transparent. The book argues for explainable and reliable AI, in which the logical and mathematical foundations of AI-algorithms become understandable and verifiable.Advancements in Smart Computing and Information Security: Second International Conference, ASCIS 2023, Rajkot, India, December 7–9, 2023, Revised Selected Papers, Part I (Communications in Computer and Information Science #2037)
By Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja. 2024
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances in Smart Computing and Information…
Security, ASCIS 2023, in Rajkot, Gujarat, India, December 2023. The 91 full papers and 36 short papers in the volume were carefully checked and selected from 432 submissions. Various application areas were presented at the conference, including healthcare, agriculture, automotive, construction and engineering, pharmaceuticals, cybercrime and sports.Advancements in Smart Computing and Information Security: Second International Conference, ASCIS 2023, Rajkot, India, December 7–9, 2023, Revised Selected Papers, Part III (Communications in Computer and Information Science #2039)
By Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja. 2024
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances in Smart Computing and Information…
Security, ASCIS 2023, in Rajkot, Gujarat, India, December 2023. The 91 full papers and 36 short papers in the volume were carefully checked and selected from 432 submissions. Various application areas were presented at the conference, including healthcare, agriculture, automotive, construction and engineering, pharmaceuticals, cybercrime and sports.Decision Support Systems XIV. Human-Centric Group Decision, Negotiation and Decision Support Systems for Societal Transitions: 10th International Conference on Decision Support System Technology, ICDSST 2024, Porto, Portugal, June 3–5, 2024, Proceedings
By Sérgio Pedro Duarte, António Lobo, Boris Delibašić, Daouda Kamissoko. 2024
This book constitutes the proceedings of the 10th International Conference on Decision Support Systems Technologies, ICDSST 2024, held in June…
2024. The EWG-DSS series of International Conference on Decision Support System Technology (ICDSST) is planned to consolidate the tradition of annual events organized by the EWG-DSS in offering a platform for European and international DSS communities, comprising the academic and industrial sectors, to present state-of-the-art DSS research and developments, to discuss current challenges that surround decision-making processes, to exchange ideas about realistic and innovative solutions, and to co-develop potential business opportunities. This year the main topic was: Human-Centric Group Decision, Negotiation and Decision Support Systems for Societal Transitions. The 10 full papers included in these proceedings were carefully reviewed and selected from 29 submissions. They have been organized in topical sections as follows: Decision support tools and methods; and decision factors.Advancements in Smart Computing and Information Security: Second International Conference, ASCIS 2023, Rajkot, India, December 7–9, 2023, Revised Selected Papers, Part II (Communications in Computer and Information Science #2038)
By Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja. 2024
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances in Smart Computing and Information…
Security, ASCIS 2023, in Rajkot, Gujarat, India, December 2023. The 91 full papers and 36 short papers in the volume were carefully checked and selected from 432 submissions. Various application areas were presented at the conference, including healthcare, agriculture, automotive, construction and engineering, pharmaceuticals, cybercrime and sports.Advancements in Smart Computing and Information Security: Second International Conference, ASCIS 2023, Rajkot, India, December 7–9, 2023, Revised Selected Papers, Part IV (Communications in Computer and Information Science #2040)
By Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja. 2024
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances in Smart Computing and Information…
Security, ASCIS 2023, in Rajkot, Gujarat, India, December 2023. The 91 full papers and 36 short papers in the volume were carefully checked and selected from 432 submissions. Various application areas were presented at the conference, including healthcare, agriculture, automotive, construction and engineering, pharmaceuticals, cybercrime and sports.The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory…
of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory…
of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.Eating Between the Lines: The Supermarket Shopper's Guide to the Truth Behind Food Labels
By Kimberly Lord Stewart. 2007
So many labels, so little time—just tell me what to buy!If you—like millions of other Americans—still don't know how to…
read food labels and are frustrated by the hundreds of nutrition and health claims as well as statements like free-range and grassfed, it's time to learn what you're really putting into your body…find out how to select the most healthy foods at the supermarket and still get dinner on the table by 6:00 pm with EATING BETWEEN THE LINESShopping is no longer as simple as deciding what's for dinner. Food labels like "organic," "natural," "low carb," and "fat free!" scream out at you from every aisle at the supermarket. Some claims are certified by authoritative groups such as the FDA and USDA, but much of our country's nutrition information is simply a marketing ploy. If you want to know what food labels really mean—and what they could mean to your health—EATING BETWEEN THE LINES will explain why:--Chickens labeled "free range" may never actually see daylight --Organic seafood may be a misnomer. --The words "hormone-free" on pork, eggs and poultry is meaningless --"Low fat" cookies and "heart-healthy" cereals may contain heart damaging trans-fatty acids …and more. Organized by supermarket section, from the vegetable aisle to the dairy case, EATING BETWEEN THE LINES also features more than seventy actual food labels and detachable shopping lists for your convenience—and to help bring the best food to the table for you and your family.Disease-Proof Your Child: Feeding Kids Right
By Joel Fuhrman. 2005
Disease-Proof Your Child features easy-to-prepare, kid-friendly recipes that will satisfy even the pickiest eaters, and will help your whole family…
establish life-long healthful eating habits. Harness the power of a nutrient-rich diet to ensure a lifetime free of illness and full of health! In his private practice, Joel Fuhrman, M.D. helps families transform their eating habits and recover their health. His nutrient-rich eating plan can have a significant impact on your child's resistance to dangerous infections, and a dramatic effect on reducing the occurrence of illnesses like asthma, ear infections, and allergies. Dr. Fuhrman explains how you can make sure your children are eating right to maintain a healthy mind and body, and how eating certain foods and avoiding others can positively impact your child's IQ and success in school.He also presents the fascinating science that demonstrates that the current epidemic of adult cancers and other diseases is closely linked to what we eat in the first quarter of life. Eating well in our early years may enable us to win the war on cancer. Bolstered by this scientific evidence, he helps you do everything you can to protect your child against developing diabetes, cardiovascular disease, autoimmune diseases, and cancer through a solid nutritional groundwork.Joy Bauer, New York City's hottest nutrition guru, has taken the nation by storm with The 90/10 Weight-Loss Plan. Now,…
Joy reveals the secrets to creating meals that will help you lose weight and keep it off. Following the 90/10 plan--an easy, balanced diet of 90% nutritious food and 10% Fun Food--Cooking with Joy is the perfect book for those looking to create healthy at-home meals. Only Cooking with Joy features:*Over 100 recipes for breakfast, lunch, dinner, AND DESSERT!*Joy's Guide to Navigating the Grocery Store*Kids in the Kitchen--a chapter devoted to kid-friendly meals and snacks.