- Table View
- List View
Campbell-Kelly (University of Warwick) and Aspray (Indiana University) describe the way computing was handled before the arrival of electronic computers, and recount the development of the mainframe computer. They review the origins of office machinery, early failed attempts to build a calculating engine, scientific war programs, the IBM system/360 family of computers, and the importance of real time for common commercial applications. The second edition expands the later sections on CD-ROMs, the internet, and web commerce. Annotation ©2004 Book News, Inc. , Portland, OR (booknews. com)
Computer: A History of the Information Machine, Second Edition traces the story of the computer, and shows how business and government were the first to explore its unlimited, information-processing potential. Old-fashioned entrepreneurship combined with scientific know-how inspired now famous computer engineers to create the technology that became IBM. Wartime needs drove the giant ENIAC, the first fully electronic computer. Later, the PC enabled modes of computing that liberated people from room-sized, mainframe computers. This second edition now extends beyond the development of Microsoft Windows and the Internet, to include open source operating systems like Linux, and the rise again and fall and potential rise of the dot.com industries.
Computer: A History of the Information Machine traces the history of the computer and shows how business and government were the first to explore its unlimited, information-processing potential. Old-fashioned entrepreneurship combined with scientific know-how inspired now famous computer engineers to create the technology that became IBM. Wartime needs drove the giant ENIAC, the first fully electronic computer. Later, the PC enabled modes of computing that liberated people from room-sized, mainframe computers.This third edition provides updated analysis on software and computer networking, including new material on the programming profession, social networking, and mobile computing. It expands its focus on the IT industry with fresh discussion on the rise of Google and Facebook as well as how powerful applications are changing the way we work, consume, learn, and socialize. Computer is an insightful look at the pace of technological advancement and the seamless way computers are integrated into the modern world. Through comprehensive history and accessible writing, Computer is perfect for courses on computer history, technology history, and information and society, as well as a range of courses in the fields of computer science, communications, sociology, and management.
Computer-Aided Design of User Interfaces VI gathers the latest experience of experts, research teams and leading organisations involved in computer-aided design of user interactive applications. This area investigates how it is desirable and possible to support, to facilitate and to speed up the development life cycle of any interactive system: requirements engineering, early-stage design, detailed design, deelopment, deployment, evaluation, and maintenance. In particular, it stresses how the design activity could be better understood for different types of advanced interactive ubiquitous computing, and multi-device environments.
A systematic computer-aided approach provides a versatile setting for the control engineer to overcome the complications of controller design for highly nonlinear systems. Computer-aided Nonlinear Control System Design provides such an approach based on the use of describing functions. The text deals with a large class of nonlinear systems without restrictions on the system order, the number of inputs and/or outputs or the number, type or arrangement of nonlinear terms. The strongly software-oriented methods detailed facilitate fulfillment of tight performance requirements and help the designer to think in purely nonlinear terms, avoiding the expedient of linearization which can impose substantial and unrealistic model limitations and drive up the cost of the final product. Design procedures are presented in a step-by-step algorithmic format each step being a functional unit with outputs that drive the other steps. This procedure may be easily implemented on a digital computer with example problems from mechatronic and aerospace design being used to demonstrate the techniques discussed. The author's commercial MATLAB®-based environment, available separately from insert URL here, can be used to create simulations showing the results of using the computer-aided control system design ideas characterized in the text. Academic researchers and graduate students studying nonlinear control systems and control engineers dealing with nonlinear plant, particularly mechatronic or aerospace systems will find Computer-aided Nonlinear Control System Design to be of great practical assistance adding to their toolbox of techniques for dealing with system nonlinearities. A basic knowledge of calculus, nonlinear analysis and software engineering will enable the reader to get the best from this book.
Lynne Bowker introduces the world of technology to the world of translation in this unique book, the first of its kind. Bowker reveals the role of technology in translation and how to use this ever developing tool.
This book provides a broad survey of advanced pattern recognition techniques for human behavior analysis. Clearly structured, the book begins with concise coverage of the major concepts, before introducing the most frequently used techniques and algorithms in detail, and then discussing examples of real applications. Features: contains contributions from an international selection of experts in the field; presents a thorough introduction to the fundamental topics of human behavior analysis; investigates methods for activity recognition, including gait and posture analysis, hand gesture analysis, and semantics of human behavior in image sequences; provides an accessible psychological treatise on social signals for the analysis of social behaviors; discusses voice and speech analysis, combined audiovisual cues, and social interactions and group dynamics; examines applications in different research fields; each chapter concludes with review questions, a summary of the topics covered, and a glossary.
Information technology is the enabling foundation for all of human activity at the beginning of the 21st century, and advances in this area are crucial to all of us. These advances are taking place all over the world and can only be followed and perceived when researchers from all over the world assemble, and exchange their ideas in conferences such as the one presented in this proceedings volume regarding the 26th International Symposium on Computer and Information Systems, held at the Royal Society in London on 26th to 28th September 2011. Computer and Information Sciences II contains novel advances in the state of the art covering applied research in electrical and computer engineering and computer science, across the broad area of information technology. It provides access to the main innovative activities in research across the world, and points to the results obtained recently by some of the most active teams in both Europe and Asia.
Explains how computer animation is used to make entire films, indicates how it differs from traditional animation, and includes information on the development of that technology.
This book lays out the concepts necessary to understand how a computer works.For reasons of clarity, the authors have deliberately chosen examples that apply to machines from all eras, without having to water down the contents of the book. This choice helps to show how techniques, concepts and performances have evolved since the first computers.The book is divided into five parts. The first four, which are of increasing difficulty, are the core of the book: "Elements of a Basic Architecture", "Programming Model and Operation", "Memory Hierarchy", "Parallelism and Performance Enhancement". The final part provides hints and solutions to the exercises in the book as well as appendices. The reader may approach each part independently based on their prior knowledge and goals.
What is knowledge? How can it be successfully assessed? How can we best use the results? As questions such as these continue to be discussed and the learning sciences continue to deal with expanding amounts of data, the challenge of applying theory to diagnostic methods takes on more complexity. Computer-Based Diagnostics and Systematic Analysis of Knowledge meets this challenge head-on as an international panel of experts reviews current and emerging assessment methodologies in the psychological and educational arenas. Emphasizing utility, effectiveness, and ease of interpretation, contributors critically discuss practical innovations and intriguing possibilities (including mental representations, automated knowledge visualization, modeling, and computer-based feedback) across fields ranging from mathematics education to medicine. These contents themselves model the steps of systematic inquiry, from theoretical construct to real-world application: Historical and theoretical foundations for the investigation of knowledge Current opportunities for understanding knowledge empirically Strategies for the aggregation and classification of knowledge Tools and methods for comparison and empirical testing Data interfaces between knowledge assessment tools Guidance in applying research results to particular fields Researchers and professionals in education psychology, instructional technology, computer science, and linguistics will find Computer-Based Diagnostics and Systematic Analysis of Knowledge a stimulating guide to a complex present and a rapidly evolving future.
Computer Basics in Easy Steps explores the elements that make up a computer and tells readers how to perform important tasks. Whether it's communicating with friends and family across the world, writing reports, or taking advantage of the Internet, this book covers it all. Computer hardware and software functions are fully covered, with a special emphasis on the tasks savvy users want to perform to increase productivity and enhance satisfaction. The book also helps readers take full advantage of other devices such as iPods, PDAs, pocket PCs, digital cameras, printers, scanners, and cell phones. Whatever readers want to do, with this book they discover how to make their computer unlock powerful new ways to extend their knowledge and experience.
The Pee Wees are entering cyberspace! The scouts are earning their computer badges, and that means lots of fun--and lots of surprises--are in store. From surfing the Web to sending e-mail to going on a cyber treasure hunt, the online adventures keep getting better and better. And when Molly receives an e-mail message from a secret admirer, she and Mary Beth have an exciting computer mystery to solve.
The Pee Wees are entering cyberspace! The scouts are earning their computer badges, and that means lots of fun--and lots of surprises--are in store. From surfing the Web to sending e-mail to going on a cyber treasure hunt, the online adventures keep getting better and better. And when Molly receives an e-mail message from a secret admirer, she and Mary Beth have an exciting computer mystery to solve. The Pee Wees goof around, do good deeds, take on projects and have fun and adventures. Find out all about what scouts do in the other 38 Pee Wee Scout books you can get from Bookshare including: #1 Cookies and Crutches, #2 Camp Ghost-Away, #3 Lucky Dog Days, #4 Blue Skies, French Fries, #5 Grumpy Pumpkins, #6 Peanut-Butter Pilgrims, #7 A Pee Wee Christmas, #8 That Mushy Stuff, #9 Spring Sprouts, #10 The Pooped Troop, # 11 The Pee Wee Jubilee, #12 Bad, Bad, Bunnies, #13 Rosy Noses, Frozen Toes, #14 Sonny's Secret, #15 Sky Babies, #16 Trash Bash, # 17 Pee Wees On Parade, #18 Lights, Action, Land-ho!, # 19 Piles of Pets, #20 Fishy Wishes, #21 Pee Wees On skis, #22 Greedy Groundhogs, #23 All Dads on Deck, #24 Tricks and Treats, #25 Pee Wees on First, # 26 Super Duper Pee Wees, #27 Teeny Weeny Zucchinis, #28 Eggs With Legs, #29 Pee Wee Pool Party, #30 Bookworm Buddies, #31 Moans and Groans and Dinosaur Bones, #32 Stage Frightened, #33 Halloween Helpers, #34 Planet Pee Wee, #35 Pedal Power, #37 Wild, Wild West, #38 Here Come the Clowns, and #39 Molly For Mayor.
Everything you need for your Introduction to Computing course! COMPUTER CONCEPTS AND MICROSOFT OFFICE 2013 ILLUSTRATED delivers the most up-to-date computer concepts and Microsoft Office 2013 skills in an accessible, easy-to-follow format.
Offering a basic introduction to computers, this text covers computer hardware, software, input, applications skills, the Internet and Web page creation, careers, computer ethics and more. Step-by-step instructions along with numerous screen shots and illustrations help readers learn and master essential computer concepts and skills.
Alex's media class is divided into two teams and both are assigned to write a newsletter. The other team is way ahead of her group and she begins to smell a rat--is there a traitor in her midst?
As the field of Information and Communication Technologies rapidly expands, the applications to language learning continue to grow. Computer-Enhanced and Mobile-Assisted Language Learning: Emerging Issues and Trends compiles the latest research into computer-enhanced language learning, as well as the integration of mobile devices into new language acquisition. Though new information is constantly coming out as technologies continue to evolve, this important new follow-up publication will be distributed worldwide among academic and professional institutions and will be instrumental in providing researchers, scholars, students, and professionals access to the latest knowledge related to research on computer-enhanced and mobile assisted language learning.
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won't need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies.You'll learn all about e-mail and Web-based forensics, mobile forensics, passwords and encryption, and other e-evidence found through VoIP, voicemail, legacy mainframes, and databases. You'll discover how to use the latest forensic software, tools, and equipment to find the answers that you're looking for in record time. When you understand how data is stored, encrypted, and recovered, you'll be able to protect your personal privacy as well. By the time you finish reading this book, you'll know how to:Prepare for and conduct computer forensics investigationsFind and filter dataProtect personal privacyTransfer evidence without contaminating itAnticipate legal loopholes and opponents' methodsHandle passwords and encrypted dataWork with the courts and win the casePlus, Computer Forensics for Dummies includes lists of things that everyone interested in computer forensics should know, do, and build. Discover how to get qualified for a career in computer forensics, what to do to be a great investigator and expert witness, and how to build a forensics lab or toolkit.Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Essential reading for launching a career in computer forensics Internet crime is on the rise, catapulting the need for computer forensics specialists. This new edition presents you with a completely updated overview of the basic skills that are required as a computer forensics professional. The author team of technology security veterans introduces the latest software and tools that exist and they review the available certifications in this growing segment of IT that can help take your career to a new level. A variety of real-world practices take you behind the scenes to look at the root causes of security attacks and provides you with a unique perspective as you launch a career in this fast-growing field. Explores the profession of computer forensics, which is more in demand than ever due to the rise of Internet crime Details the ways to conduct a computer forensics investigation Highlights tips and techniques for finding hidden data, capturing images, documenting your case, and presenting evidence in court as an expert witness Walks you through identifying, collecting, and preserving computer evidence Explains how to understand encryption and examine encryption files Computer Forensics JumpStart is the resource you need to launch a career in computer forensics.
"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. . . . Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations. " --Brian H. Karney, COO, AccessData Corporation The latest strategies for investigating cyber-crime Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases. Effectively uncover, capture, and prepare evidence for investigation Store and process collected data in a highly secure digital forensic lab Restore deleted documents, partitions, user activities, and file systems Analyze evidence gathered from Windows, Linux, and Macintosh systems Use the latest Web and client-based e-mail tools to extract relevant artifacts Overcome the hacker's anti-forensic, encryption, and obscurity techniques Unlock clues stored in cell phones, PDAs, and Windows Mobile devices Prepare legal documents that will hold up to judicial and defense scrutiny
This tutorial contains detailed instructions with useful integrated examples that help you understand the main features of FTK and how you can use it to analyze evidence. This book has clear and concise guidance in an easily accessible format. This tutorial-based guide is great for you if you want to conduct digital investigations with an integrated platform. Whether you are new to Computer Forensics or have some experience, this book will help you get started with FTK so you can analyze evidence effectively and efficiently. If you are a law enforcement official, corporate security, or IT professional who needs to evaluate the evidentiary value of digital evidence, then this book is ideal for you.
Computer language and "byte-sized" facts are introduced and explained in this easy-to-read book that children will enjoy. Full-color photos of children working with computers highlight such subjects as e-mail, hardware, the internet, and virtual reality.
Blending strong narrative history and a fascinating look at the interface of business and technology, Computer: A History of the Information Machine traces the dramatic story of the invention of the computer. More than just the tale of a tool created by scientists to crunch numbers, this book suggests a richer story behind the computer's creation, one that shows how business and government were the first to explore the unlimited potential of the machine as an information processor. Not surprisingly, at the heart of the business story is IBM. A story of old-fashioned entrepreneurship in a symbiotic relationship with scientific know-how, it begins way back when "computers" were people who did the computational work of scientists, and Charles Babbage attempted in vain to mechanize the process. But it also shows how entrepreneurs like Herman Hollerith, seeing a business opportunity in a machine that could mechanically tabulate the U.S. census, created a punched-card tabulator that became the technology that created IBM. The authors show how ENIAC, the first fully electronic computer, emerged out of the wartime need of the military for computers that performed at lightning speed and did not need human intervention at any stage of the process. Most interesting is the story of how the computer began to reshape broad segments of our society when the PC enabled new modes of computing that liberated people from dependence on room-sized, enormously expensive mainframe computers. Filled with lively insights-many about the world of computing in the 1990s, such as the strategy behind Microsoft Windows-as well as a discussion of the rise and creation of the World Wide Web, here is a book no one who owns or uses a computer will want to miss.
Computer Literacy BASICS provides an introduction to computer technology and concepts. This text maps to the IC3 standards and is organized into three key components: Computing Fundamentals, Key Applications, and Living Online. It provides thorough instruction on the various uses of the computer, important accessories, networking principles and covers key applications such as word processing, spreadsheets, and presentation applications. In addition, Computer Literacy BASICS covers e-mail and Internet principles such as managing e-mail and contacts, searching for a topic online, and how computers affect every day life. Strong end-of-chapter exercises and review material reinforce important topics covered in the lesson and allow students to demonstrate their knowledge of the material.