Browse Results

Showing 76 through 100 of 61,674 results

IT Maintenance: Applied Project Management

by Michael F. Malinoski PMP

IT Maintenance: Applied Project Management modifies project management best practices to improve how IT system maintenance is managed. By taking a fresh look at increasing value and quality of system maintenance in a straightforward and practical way, this book helps readers understand how to apply modified project management best practices. From IT maintenance managers, project managers, and team members to CIOs, readers will: • Discover cost savings associated with reducing staff Improve reporting status and metrics •Build greater customer satisfaction Learn how to perform work consistently • Decrease staff stress level by stabilizing expectations •Streamline team operations •Decrease the manager's ongoing workload PLUS! This practical reference is organized by process groups similar to the PMBOK® — providing you with applied step-by-step guidance.

The AI Dilemma: 7 Principles for Responsible Technology

by Art Kleiner Juliette Powell

The misuse of AI has led to wrongful arrests, denial of medical care, even genocide-this book offers 7 powerful principles that business can use now to end the harm.AI holds incredible promise to improve virtually every aspect of our lives, but we can't ignore its risks, mishaps and misuses. Juliette Powell and Art Kleiner offer seven principles for ensuring that machine learning supports human flourishing. They draw on Powell's research at Columbia University and use a wealth of real-world examples. Four principles relate to AI systems themselves. Human risk must be rigorously determined and consciously included in any design process. AI systems must be understandable and transparent to any observer, not just the engineers working on them. People must be allowed to protect and manage their personal data. The biases embedded in AI must be confronted and reduced. The final three principles pertain to the organizations that create AI systems. There must be procedures in place to hold them accountable for negative consequences. Organizations need to be loosely structured so that problems in one area can be isolated and resolved before they spread and sabotage the whole system. Finally, there must be psychological safety and creative friction, so that anyone involved in software development can bring problems to light without fear of reprisal. Powell and Kleiner explore how to implement each principle, citing current best practices, promising new developments, and sobering cautionary tales. Incorporating the perspectives of engineers, businesspeople, government officials, and social activists, this book will help us realize the unprecedented benefits and opportunities AI systems can provide.

Leaders Make the Future, Third Edition: Ten New Skills to Humanize Leadership with Generative AI

by Bob Johansen Jeremy Kirshbaum Gabe Cervantes

In a world of chaos, how can generative AI help leaders lead?Over the next decade, all leaders will be augmented with some form of generative artificial intelligence, or GenAI. For the best leaders, this will mean dramatic improvement. For mediocre leaders, this will mean persistent confusion, distraction, and pretense. With futureback thinking—looking ten years ahead, then planning backward from future to next to now—this third edition of Leaders Make the Future shows how people can improve their leadership skills while expanding their human perspective.Now 75 percent revised and expanded with resources from the Institute for the Future, this new edition is organized around ten future leadership skills:Augmented futureback curiosityAugmented clarityAugmented dilemma flippingAugmented bio-engagingAugmented immersive learningAugmented depolarizingAugmented commons creatingAugmented smart mob swarmingAugmented strength with humilityHuman calmingAI-augmented leadership will be key for any organization to tackle the uncertainty of the future. And by incorporating practical methodologies, ethical guidelines, and innovative leadership practices, this book will help leaders develop their clarity and moderate their certainty.

AI and ML for Coders in PyTorch

by Laurence Moroney

Eager to learn AI and machine learning but unsure where to start? Laurence Moroney's hands-on, code-first guide demystifies complex AI concepts without relying on advanced mathematics. Designed for programmers, it focuses on practical applications using PyTorch, helping you build real-world models without feeling overwhelmed.From computer vision and natural language processing (NLP) to generative AI with Hugging Face Transformers, this book equips you with the skills most in demand for AI development today. You'll also learn how to deploy your models across the web and cloud confidently.Gain the confidence to apply AI without needing advanced math or theory expertiseDiscover how to build AI models for computer vision, NLP, and sequence modeling with PyTorchLearn generative AI techniques with Hugging Face Diffusers and Transformers

Federal IT Capital Planning and Investment Control

by Thomas G. Kessler DBA, CISA Patricia A. Kelley DPA, CISA

Reduce risk and improve the overall performance of IT assets! Federal IT Capital Planning and Investment Control is the first book to provide a comprehensive look at the IT capital planning and investment control (CPIC) process. Written from a practitioner's perspective, this book covers a range of topics designed to provide both strategic and operational perspectives on IT CPIC. From planning to evaluation, this valuable resource helps managers and analysts at all levels realize the full benefits of the CPIC process. •Explore the full range of IT investment principles and practices•Learn CPIC project management techniques including earned-value management, integrated baseline review, cost-benefit analysis, and risk-adjusted cost and schedule estimates •Identify strategies to improve how your organization manages its IT portfolio and selects, controls, and evaluates investments•Discover how to leverage scarce IT resources and align investments with program priorities•Benefit from the in-depth coverage—excellent for the experienced as well as those new to the CPIC process

Mastering the New Media Landscape: Embrace the Micromedia Mindset

by Rusty Shelton Barbara Cave Henricks

The New Way to Get Noticed The giant brands that once dominated the media landscape—Oprah, the New York Times, NPR, CNN—have seen their monopoly on public attention smashed by the Internet and now find themselves competing with individuals and brands in a sea of micromedia: websites, social media, blogs, podcasts, and more. Ace publicists and marketers Barbara Cave Henricks and Rusty Shelton show that to navigate through this modern terrain, you need to think more like a media executive than a marketer. The key lies in mastering three crucial categories of media—earned, owned, and rented—and knowing how to integrate each for maximum success. By using this proven strategy, you can create a positive feedback loop that will generate massive momentum and grow a large, loyal audience for your message.

The Inside Guide to the Federal IT Market

by David Perera Steve Charles

Unlock the Door to the Federal IT MarketplaceHere's your key to selling IT goods and services to the government. David Perera and Steve Charles present the ins and outs of successfully competing for—and winning—a share of the tens of billions of dollars the federal government spends each year on IT. Getting a piece of that business is not easy—it takes accurate knowledge of systems and procedures, as well as sharp insight into the structure and details of government procurement.The Inside Guide to the Federal IT Market penetrates the haze of jargon and apparent complexity to reveal the inner workings of the IT contracting process. Whether you're just setting out or seek a bigger share, this comprehensive book provides valuable information you can put to immediate use. The Inside Guide to the Federal IT Market covers:• Technology standards• Basic contracting concepts• Advanced contracting concepts, such as getting on and staying on the GSA schedules• The effect of the federal budget process on the sales cycle• What you need to know about ethics to earn business fairly, without avoidable delays and hassleThis book's focus on the IT market makes it a unique reference on federal procurement for private companies. Government procurement personnel will also find the depth and breadth of coverage useful in reviewing and evaluating IT offerings.

Mobilized: An Insider’s Guide to the Business and Future of Connected Technology

by SC Moatti

Mobile has now become such an integral part of how we live that, for many people, losing a cell phone is like losing a limb. Everybody knows mobile is the future, and every business wants in, but what are the elements of mobile success? SC Moatti, a Silicon Valley veteran who was an executive with Facebook, Trulia, and Nokia, gives businesses and professionals simple ways to thrive in this modern day "gold rush." More than a book on technology, this is a book about human nature and what matters most to us. Moatti shows that because mobile products have become extensions of ourselves, we expect from them what we wish for ourselves: an attractive body, a meaningful life, and a growing repertoire of skills. She has created an all-encompassing formula that makes it easy for any business to develop a strategy for creating winning mobile products.Her Body Rule dictates that mobile products must appeal to our sense of beauty—but beauty in a mobile world is both similar to and different from what it means offline. The Spirit Rule says mobile products must help us address our deepest personal needs. And the Mind Rule explains that businesses that want to succeed in mobile need to continually analyze the user experience so they can improve every iteration of their products. Moatti includes case studies from mobile pioneers such as Facebook, Uber, Tinder, WhatsApp, and more. The market is full of how-to books for programming apps, but no works examine what is required for success in the mobile era. Until now.

The IT Project Management Answer Book

by David Pratt PMP

Zero in on the answers to your IT project management questionsWith constrained schedules and anxious stakeholders eager for results, the typical IT project team doesn't have the luxury of wading through lengthy tomes to find solutions. The IT Project Management Answer Book guides you to the specific answers you need to successfully conduct and complete your IT project.Written in an easy-to-use question-and-answer format, the book covers all aspects of managing an IT project, from initial organizational issues to closeout. Following the classic project management processes, author David Pratt builds on the basics to offer valuable insights not found in other resources, including:• Proven techniques such as the best way to manage defects• How to create performance standards for outside contractors• How to develop a user's manualFor more technically inclined team members, the author's plain-speak approach presents a refreshing view of the IT world. For those less technically oriented, he describes the tools and solutions for dealing with IT project challenges in an accessible, straightforward way. Let this information-packed resource lead you and your team to IT project success.

A Crowdfunder's Strategy Guide: Build a Better Business by Building Community

by Jamey Stegmaier

More Than MoneyJamey Stegmaier knows crowdfunding. He's a veteran of seven successful Kickstarter campaigns (and counting) that have raised over $3.2 million, and he's the proprietor of the widely read Kickstarter Lessons blog. In this book he offers a comprehensive guide to crowdfunding, demonstrating that it can be a powerful way for entrepreneurs to grow their businesses by building community and putting their customers first.This book includes over forty stories of inspiring successes and sobering disasters. Stegmaier uses these examples to demonstrate how to (and how not to) prepare for a campaign, grow a fan base, structure a pitch, find new backers, and execute many other crucially important "nuts and bolts" elements of a successful crowdfunding project.But Stegmaier emphasizes that the benefits of crowdfunding are much more about the "crowd" than the "funding." He shows that if you treat your backers as people, not pocketbooks—communicate regularly and transparently with them, ask their opinions, attend to their needs—they'll become advocates as well as funders, exponentially increasing your project's chances of succeeding.

There's No Such Thing as an IT Project: A Handbook for Intentional Business Change

by Bob Lewis Dave Kaiser

Learn how to stop pouring vast sums of money into technology projects that don't have a lasting impact by closing the communication gap between IT and leadership.Too many businesses miss opportunity after opportunity to design, plan, and achieve intentional business change. Why? Because they charter projects focused on delivering software products: IT projects. But as this groundbreaking book points out, there's no such thing as an IT project—or at least there shouldn't be. It's always about intentional business change, or what's the point?It's time to stop providing simplistic, one-dimensional, all-you-gotta-do panaceas. When the only constant in business is change, truly useful IT has to help you change instead of build solutions that are obsolete even before they are completed. IT consultant Bob Lewis, author of the bestselling Bare Bones Project Management, has joined forces with seasoned CIO Dave Kaiser to give you the tools you need. It's a multidimensional, relentlessly practical guide. Condensed to handbook length and seasoned with Lewis's trademark sardonic humor, it's an enjoyable and digestible read as well.Lewis and Kaiser take you step by step through the process of building a collaboration between IT and the rest of the business that really works. Insisting on intentional business change takes patience, communication, and courage, but it has a huge payoff. More to the point, insist on anything else and every penny you spend will be a wasted dime and a waste of time.

Your Happiness Was Hacked: Why Tech Is Winning the Battle to Control Your Brain--and How to Fight Back

by Vivek Wadhwa Alex Salkever

"Technology is a great servant but a terrible master. This is the most important book ever written about one of the most significant aspects of our lives—the consequences of our addiction to online technology and how we can liberate ourselves and our children from it."—Dean Ornish, M.D. Founder & President, Preventive Medicine Research Institute, Clinical Professor of Medicine, UCSF, Author, The SpectrumTechnology: your master, or your friend? Do you feel ruled by your smartphone and enslaved by your e-mail or social-network activities? Digital technology is making us miserable, say bestselling authors and former tech executives Vivek Wadhwa and Alex Salkever. We've become a tribe of tech addicts—and it's not entirely our fault. Taking advantage of vulnerabilities in human brain function, tech companies entice us to overdose on technology interaction. This damages our lives, work, families, and friendships. Swipe-driven dating apps train us to evaluate people like products, diminishing our relationships. At work, we e-mail on average 77 times a day, ruining our concentration. At home, light from our screens is contributing to epidemic sleep deprivation. But we can reclaim our lives without dismissing technology. The authors explain how to avoid getting hooked on tech and how to define and control the roles that tech is playing and could play in our lives. And they provide a guide to technological and personal tools for regaining control. This readable book turns personal observation into a handy action guide to adapting to our new reality of omnipresent technology.

Young Children in Digital Society: Now and into the Future

by Susan Edwards Leon Straker

Moving the conversation about young children and digital technologies away beyond “good” or “bad”, Susan Edwards and Leon Straker present an innovative perspective to educators, researchers, and communities on how to support young children to learn and thrive safely in a digital society.This book marks a turning point in research concerning young children and technologies. Instead of focussing on the impacts of technology on children in ways that generate conflicting information, advice, and opinions, this book centres on understanding how children live, learn, and play in digital society, and how the adults in their lives can actively create opportunities that support them to participate safely so that they can thrive. Based on a groundbreaking research project in partnership with industry, this text showcases the development of well-designed end-user content and materials, such as videos, infographics, and books, that best support young children and their adults living, learning, and playing in digital society. It includes practical examples for early childhood educators and broader communities, such as ways to promote physical activity with digital technologies, support children with online safety, facilitate peer relationships using technologies, and engage in digital play for learning. For a closer look into the additional resources and support available, visit https://youngchildrendigitalsociety.com.au/. A refreshing perspective on young children and digital technology, this book is set to become a foundational text for early childhood educators, policy makers, and communities.

CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions (Sybex Study Guide)

by Ric Messier

The latest version of the official study guide for the in-demand CEH certification, now with 750 Practice Test Questions Information security and personal privacy remains a growing concern for businesses in every sector. And even as the number of certifications increases, the Certified Ethical Hacker, Version 12 (CEH v12) maintains its place as one of the most sought-after and in-demand credentials in the industry. In CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions, you’ll find a comprehensive overview of the CEH certification requirements. Concise and easy-to-follow instructions are combined with intuitive organization that allows you to learn each exam objective in your own time and at your own pace. The Study Guide now contains more end of chapter review questions and more online practice tests. This combines the value from the previous two-book set including a practice test book into a more valuable Study Guide. The book offers thorough and robust coverage of every relevant topic, as well as challenging chapter review questions, even more end of chapter review questions to validate your knowledge, and Exam Essentials, a key feature that identifies important areas for study. There are also twice as many online practice tests included. You’ll learn about common attack practices, like reconnaissance and scanning, intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things vulnerabilities, and more. It also provides: Practical, hands-on exercises that reinforce vital, real-world job skills and exam competencies Essential guidance for a certification that meets the requirements of the Department of Defense 8570 Directive for Information Assurance positions Complimentary access to the Sybex online learning center, complete with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms The CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions is your go-to official resource to prep for the challenging CEH v12 exam and a new career in information security and privacy.

Learning Kubernetes Security: A practical guide for secure and scalable containerized environments

by Raul Lapaz

Get practical, hands-on experience in Kubernetes security—from mastering the fundamentals to implementing advanced techniques to safeguard your Kubernetes deployments against malicious threatsKey FeaturesUnderstand Kubernetes security fundamentals through real-world examples of threat actor tacticsNavigate the complexities of securing container orchestration with practical, expert insightsDeploy multiple Kubernetes components, plugins, and third-party tools to proactively defend against cyberattacksPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionWith readily available services, support, and tools, Kubernetes has become a foundation for digital transformation and cloud-native development, but it brings significant security challenges such as breaches and supply chain attacks. This updated edition equips you with defense strategies to protect your applications and infrastructure while understanding the attacker mindset, including tactics like container escapes and exploiting vulnerabilities to compromise clusters. The author distills his 25+ years of experience to guide you through Kubernetes components, architecture, and networking, addressing authentication, authorization, image scanning, resource monitoring, and traffic sniffing. You’ll implement security controls using third-party plugins (krew) and tools like Falco, Tetragon, and Cilium. You’ll also secure core components, such as the kube-apiserver, CoreDNS, and kubelet, while hardening images, managing security contexts, and applying PodSecurityPolicy. Through practical examples, the book teaches advanced techniques like redirecting traffic from misconfigured clusters to rogue pods and enhances your support incident response with effective cluster monitoring and log analysis. By the end of the book, you'll have a solid grasp of container security as well as the skills to defend your clusters against evolving threats.What you will learnImplement Kubernetes security best practices, from threat detection to network protectionBuild strong security layers and controls using core Kubernetes componentsApply theory through hands-on labs to secure Kubernetes systems step by stepUse security plugins and open-source tools to help mitigate container-based threatsSet up monitoring and logging to quickly detect and respond to cybersecurity threatsAnalyze attacker tactics to build stronger cluster defense strategiesWho this book is forThis book is for DevOps and Platform teams managing Kubernetes environments. As security is a shared responsibility, it also addresses on-premises and cloud security professionals, as well as beginner and advanced incident responders. No expert knowledge is required; a basic tech background is all you need as this book covers Kubernetes fundamentals and security principles, delivering practical insights for anyone looking to stay current with modern tech and strengthen their security skills.

Videogames and Metareference: Mapping the Margins of an Interdisciplinary Field (Routledge Advances in Game Studies)

by Krampe and , Edited by Theresa

Videogames and Metareference is the first edited collection to investigate the rise of metareference in videogames from an interdisciplinary perspective.Bringing together a group of distinguished scholars from various geographic and disciplinary backgrounds, the book combines in-depth theoretical reflection with a diverse selection of case studies in order to explore how metareference manifests itself in and around a broad range of videogames (from indie to AAA), while also asking what cultural work the videogames in question accomplish in the process. The carefully curated chapters not only provide much-needed expansions and revisions of a concept that was at least initially derived mainly from literary studies but also cover a broad range of videogame genres, discuss the evolution of metareference across videogame history as well as the functions it fulfills in different sociocultural contexts, and scrutinize metareferential elements and examples that have hitherto received little attention.This book with its interdisciplinary scope will appeal to scholars and students within game studies and game design as well as, more broadly, scholars and students within literary studies, media studies, popular culture studies, and digital culture studies.

Hate Speech and the European Court of Human Rights (Routledge Research in Human Rights Law)

by Natalie Alkiviadou

This book argues that the European Court of Human Rights (ECtHR) should reconsider its approach to hate speech cases and develop a robust protection of freedom of expression as set out in the benchmark case of Handyside v the United Kingdom. In that case, the ECtHR determined that Article 10 of the European Convention on Human Rights (ECHR), safeguarding the right to freedom of expression, extends protection not only to opinions which are well received but also to those deemed offensive, shocking, or disturbing. However, subsequent rulings by the Court have generated a significant amount of contradictory case law. Against this backdrop, this book provides an analysis of hate speech case law before the ECtHR and the now-obsolete European Commission on Human Rights. Through a jurisprudential analysis, it is argued that these institutions have adopted an overly restrictive approach to hate speech, which fails to provide adequate protection of the right to freedom of expression. It also demonstrates that there are stark inconsistencies when it comes to the treatment of some forms of ‘hate speech’ versus others. The study further contends that, in reaching its decisions on hate speech cases, the Court disregards empirical evidence on matters related to free speech restrictions. Viewing the ECHR as a ‘living instrument,’ the book places this analysis within the current state of affairs vis-à-vis the handling of hate speech, particularly online, by European countries, the European Union itself and social media platforms, actions which the author argues are contributing to a free speech demise. The book will be a valuable resource for academics, researchers and policymakers working in the area of law, political science, European studies and sociology.

Teaching and Learning Mathematics Online

by James P. Howard, II and John F. Beyers

Teaching and Learning Mathematics Online, Second Edition continues to present meaningful and practical solutions for teaching mathematics and statistics online. It focuses on the problems observed by mathematics instructors currently working in the field who strive to hone their craft and share best practices with the community. The book provides a set of standard practices, improving the quality of online teaching and the learning of mathematics. Instructors will benefit from learning new techniques and approaches to delivering content.New to the Second Edition Nine brand new chapters Reflections on the lessons of COVID-19 Explorations of new technological opportunities

The World Politics of Disco Elysium (Popular Culture and World Politics)

by Nicholas Kiersey Vic Castro

The World Politics of Disco Elysium analyzes the distinctive political claims and original arguments on a wide range of international political issues of the highly-acclaimed Marxist video game Disco Elysium (2019), which takes place in a speculative fictional world anchored in a post-Soviet Estonian perspective.Disco Elysium (2019) has been repeatedly acclaimed as one of the best video games of all time. This detective role-playing game unfolds in a city ruined by a failed communist revolution and occupied by a foreign coalition. Furthering recent work in International Relations and popular culture, this book claims that the "cognitive estrangement" of speculative fiction can produce theoretical and political novelty, beyond merely reflecting existing political dynamics. By placing a metaphor for the Estonian capital Tallinn at the centre of a world, Disco Elysium produces an estranged Estonian perspective on world politics that challenges dominant Anglo-American views of International Relations, while also undermining the opposition between a coherent West and a colonized Rest. The contributors, from International Relations and Cultural Studies, discuss the game’s claims on topics such as capitalism, (neo)liberalism, foreign intervention, law enforcement, fascism, colonialism, gender, disability, violence, memory, revolutionary politics, the European Union, political realism and international security.The World Politics of Disco Elysium will be of great interest to students and scholars researching the politics of popular culture, post-Soviet politics, non-Western International Relations, as well as game studies and cultural studies.

Robotics: From Theory to Practice

by Chao Chen Wesley Au Shao Liu

Robotics: From Theory to Practice introduces robotic theories and technologies to audiences, including university students, professionals with engineering backgrounds, and even high-school students interested in building their own robots. We aim to bridge the gap between classic theories and real-world applications of robotic manipulators, which, to date, have far exceeded the domain of conventional industry.The contents are divided into three parts. The first two cover classic theories of robotics, including kinematics, dynamics, path planning, control, and programming. Specifically, Part I is an introduction targeting junior students, featuring more simplistic topics and examples. Part II provides the senior students and professionals with more in-depth discussions on critical topics and more comprehensive examples. In Part III, we demonstrate how classic robotics theory can be extended to more advanced theoretical frameworks and adopted in real-world applications beyond conventional industries.This textbook is valuable to broad readers, including those who have limited background in general engineering and wish to explore non-conventional applications of robotic manipulators. The scaffolded contents from Part I to Part III are created to lower the prerequisites and smooth the learning curve.

Information Security Governance using Artificial Intelligence of Things in Smart Environments

by Mariya Ouaissa Mariyam Ouaissa Tarik Hidar Ram Chandra Sachan Akhil Mittal Sanjay Poddar

This book explores the integration of Artificial Intelligence (AI) with the Internet of Things (IoT) to address security challenges in smart environments. It delves into how AI enhances the governance of information security by automating processes, detecting threats, and ensuring the protection of data in interconnected IoT systems. It covers theoretical foundations, practical frameworks, and case studies, offering insights into securing smart cities, homes, industries, and healthcare systems. It also emphasizes governance models that leverage AI to manage security policies and risk in dynamic, data-driven ecosystems.This title focuses on the study and application of AI of Things in the field of information security governance. Intelligent environments, characterized by increasing connectivity of devices and systems, present unique challenges for information security. The use of AI of Things offers opportunities to enhance security in these complex environments.

We Have Never Been Human: Or Why We Have Always Been Something Else

by Juan de Dios Vázquez

We Have Never Been Human: Or Why We Have Always Been Something Else boldly reimagines what it means to be human, challenging the traditional notions that bind our identity to biology and culture. From ancient mythologies to modern technologies, this book reveals a dynamic, ever-evolving human identity shaped by external forces and technological advancements.Blending insights from philosophy, technology studies, anthropology, and cultural critique, We Have Never Been Human: Or Why We Have Been Something Else offers an interdisciplinary exploration of our constructed identities and what they portend for the future of society. It raises essential questions: How has technology reshaped our self-perception? Are humans fixed beings, or are we endlessly evolving? What ethical, social, and political challenges arise as we integrate with intelligent machines?This book is a compelling read for those intrigued by the intersection of humanity and technology, offering profound insights into the essence of what it means to be human—or perhaps, what it means to evolve beyond the human.

Healthcare Informatics Innovation Post COVID-19 Pandemic

by Narasimha Rao Vajjhala Philip Eappen

This book is essential reading for those in healthcare informatics, as well as healthcare administrators, clinicians, and regulators, as they navigate the evolving landscape of healthcare post-pandemic. —Dr. Steven D. Berkshire, professor and director of the Doctor of Health Administration Program, Central Michigan UniversityThe coronavirus disease 2019 (COVID-19) pandemic brought unprecedented challenges to global healthcare systems, revealing vulnerabilities and pushing the boundaries of healthcare informatics. In response, the rapid adoption of digital tools and innovative technologies reshaped the way healthcare is delivered, managed, and analyzed. This transformation has not only revolutionized patient care but also underscored the importance of adopting new strategies to ensure data security, interoperability, and equitable access to healthcare services.Healthcare Informatics Innovation Post-COVID-19 Pandemic explores the lasting impact of these innovations on the healthcare sector. The book examines the key lessons learned from the pandemic, as well as the challenges and opportunities that have emerged in its wake. It covers a broad range of topics, including telehealth, artificial intelligence (AI), the Internet of Things (IoT), and cybersecurity, and examines the critical role each plays in transforming healthcare delivery.Highlights include: Bridging the digital divide with telehealth AI in post-pandemic healthcare Navigating post-pandemic mental health challenges with AI Genomics and personalized medicine Ethics, privacy, and security in healthcare informatics The book’s chapters were written by contributors from diverse academic and professional backgrounds.Together, they share their expertise in healthcare, information technology, and policy. Through their insights, the book provides a comprehensive overview of the current state of healthcare informatics and offers a roadmap for future advancements. This book was written to address the growing recognition that healthcare systems worldwide must be resilient, adaptable, and equipped with cutting-edge tools to navigate future public health crises. As healthcare professionals, academics, policymakers, and technologists work together, it is crucial to share knowledge and collaborate on innovative solutions that can sustain the progress made during the pandemic.

Principles of Multimedia

by Ranjan Parekh

Principles of Multimedia introduces and explains the theoretical concepts related to the representation, storage, compression, transmission and processing of various multimedia components, including text, image, graphics, audio, video and animation, as well as their use across various applications. The book provides the necessary programming tools and analysis technique concepts to perform practical processing tasks in software labs and to solve numerical problems at the postgraduate level. For this new third edition, every chapter has been updated and the book has been carefully streamlined throughout.Chapter 1 provides an overview of multimedia technology, including the definition, major characteristics, hardware, software, standards, technologies and relevant theorems with mathematical formulations. Chapter 2 covers text, including digital text representations, text editing and processing tools, text application areas and text file formats. Chapter 3 explores digital image input and output systems, image editing and processing tools, image application areas, image color management and image file formats. Chapter 4 discusses 2D and 3D graphics algorithms, transformation matrices, splines, fractals, vectors, projection application areas and graphics file formats. Chapter 5 covers audio, including digital audio input and output systems, audio editing and processing tools, audio application areas and audio file formats. Chapter 6 looks at video, including digital video input and output systems, video editing and processing tools, video application areas and video file formats. Chapter 7 focuses on animation, covering 2D and 3D animation algorithms, interpolations, modeling, texture mapping, lights, illumination models, camera, rendering, application areas and animation file formats. Finally, Chapter 8 covers compression, including lossless and lossy compression techniques, and various algorithms related to text image audio and video compression. Every chapter includes solved numerical problems, coding examples and references for further reading.Including theoretical explanations, mathematical formulations, solved numerical problems and coding examples throughout, Principles of Multimedia is an ideal textbook for graduate and postgraduate students studying courses on image processing, speech and language processing, signal processing, video object detection and tracking, graphic design and modeling and related multimedia technologies.

Integrating AI Techniques into the Design and Development of Smart Cyber-Physical Systems: Defense, Biomedical, Infrastructure, and Transportation (Prospects in Smart Technologies)

by D. Jeya Mala Anto Cordelia Dhanapal Saurav Sthapit Anita Khadka

Building on the knowledge of risks, vulnerabilities, and safety measures associated with cyber-physical systems, this book focuses on adapting artificial intelligence (AI) techniques to smart cyber-physical systems application development. The future is going to see cyber-physical systems in almost every aspect of life, so a book that focuses on shedding light on the design, development, and security aspects of cyber-physical systems in more crucial domains such as defense, healthcare, biomedical, smart city applications, is needed.Integrating AI Techniques into the Design and Development of Smart Cyber-Physical Systems: Defense, Biomedical, Infrastructure, and Transportation offers an introductory exploration of the fundamental theories and concepts of AI and machine learning (ML) that are utilized in the building of dependable cyber-physical systems. It brings the ideas of advanced design and development and empowered security measures to cyber-physical systems. By focusing on the application of AI in cyber-physical systems design as well as security aspects, an improvement in reliability and advancements can be explored. Also included are the latest findings and advancements as well as case studies and illustrative examples on the design and development of smart cyber-physical systems.This resource is highly valuable for those employed in educational institutions, research laboratories, enterprises, and government agencies, as well as for students seeking novel ideas in the realm of smart cyber-physical systems design.

Refine Search

Showing 76 through 100 of 61,674 results