- Table View
- List View
Contabilidad Fácil Para Ebay
by Carlos Blanco Nick Vulich¿Serio acerca de su negocio en el Internet? Contabilidad Fácil para eBay es un iniciador financiero para los vendedores en el Internet. Lo ayudará a domar la bestia, para que Ud. pueda dejar de hacer malabares con sus recibos, los formularios de impuestos y el miedo a una auditoría del Servicio de Rentas Internas. El libro es como una Maestría en Administración de Empresas presentada en cortos y simples bytes. > He aquí una muestra de lo que Ud. aprenderá. > Eliminaremos el misterio de la contabilidad > Le daremos los términos básicos de negocio que Ud. necesita saber > Le ayudaremos a domar el monstruo que es GoDaddy Bookkeeping > Le ayudaremos a maniobrar en el laberinto de los impuestos, las licencias de negocio y las deducciones de negocio más comunes. Si UD. se ha preguntado alguna vez si puede tomar la deducción por usar su casa para negocios , reclamar los gastos por kilometraje por usar su carro para negocios; consideró deducir una nueva computadora, iPad o iPhone; o pensó acerca de deducir sus próximas vacaciones como un viaje de negocios. ¡No se preocupe! Se lo explicaremos todo. Y si vende en múltiples plataformas, también lo ayudaremos. Contabilidad Fácil para eBay aplica a vendedores de Amazon y de Etsy también. Recoja su copia hoy y aprenda como hacer crecer su negocio - ¡Un número detrás otro!:
Contact Tracing in Post-Covid World: A Cryptologic Approach (Indian Statistical Institute Series)
by Mridul Nandi Subhamoy Maitra Pranab Chakraborty Suprita TalnikarThis book is a timely document of state-of-the-art techniques in the domain of contact tracing applications. Well known in the field of medical science, this topic has recently received attention from governments, industries and academic communities due to the COVID-19 pandemic. This book provides a link between new proposals related to contact tracing applications and a contextual literature review primarily from the cryptologic viewpoint. As these applications are related to security and privacy of individuals, analyzing them from cryptologic viewpoint is of utmost importance. Therefore, present developments from cryptologic aspects of most proposals around the world, including Singapore, Europe, USA, Australia and India, have been discussed. Providing an in-depth study on the design rationale of each protocol, this book is of value to researchers, students and professionals alike.
Contactless 3D Fingerprint Identification (Advances in Computer Vision and Pattern Recognition)
by Ajay KumarThis important text/reference presents the first dedicated review of techniques for contactless 3D fingerprint identification, including novel and previously unpublished research. The text provides a systematic introduction to 3D fingerprint identification, covering the latest advancements in contactless 2D and 3D sensing technologies, and detailed discussions on each key aspect in the development of an effective 3D fingerprint identification system.Topics and features: introduces the key concepts and trends in the acquisition and identification of fingerprint images, and a range of 3D fingerprint imaging techniques; proposes a low-cost method for online 3D fingerprint image acquisition, and an efficient 3D fingerprint imaging approach using coloured photometric stereo; describes pre-processing operations on point cloud 3D fingerprint data, and explains the specialized operations for reconstructing 3D fingerprints from live finger scans; examines the representation of minutiae in 3D space, providing details on recovering these features from point cloud data, and on matching such 3D minutiae templates; reviews various 3D fingerprint matching methods, including binary surface code-based approaches and a tetrahedron-based matching approach; discusses the uniqueness of 3D fingerprints, evaluating the benefits of employing 3D fingerprint identification over conventional 2D fingerprint techniques.This unique work is a must-read for all researchers seeking to make further advances in this area, towards the exciting opportunities afforded by contactless 3D fingerprint identification for improving the hygiene, user convenience, and matching accuracy of fingerprint biometric technologies.
Contactless Healthcare Facilitation and Commodity Delivery Management During COVID 19 Pandemic (Advanced Technologies and Societal Change)
by Stefan Mozar Mousmi Ajay ChaurasiaThis book offers concepts related to communication engineering principles to fight the current Covid situation, by developing contactless need-based solutions. COVID-19, a global pandemic makes us rethink how governments, organizations, and societies around the world can work with minimum or without physical contact. Technologies like artificial intelligence and big data are playing an essential role in responding to the COVID-19 pandemic. This book is a combination of chapters related to imaging and detective technologies used by the experts to fight the COVID-19 pandemic and a combination of interesting content covering the need of hour solutions generated through cutting edge technologies. In the absence of a proper medicine or vaccine, it is quite evident that nutrition plays an important role in the quick recovery of covid patients which must be very carefully planned with proper diagnostics. Data analysis and X-Ray/CT Image analysis by next-generation techniques like deep sensing, machine learning is interesting and useful for research and applied healthcare professionals. Research findings with a focus on diagnostics and reports generated through important data analysis in the book are quite useful and can be referred to by researchers and professionals working in the area of cutting-edge technologies against COVID 19.
Contactless Human Activity Analysis (Intelligent Systems Reference Library #200)
by Md Atiqur Rahman Ahad Upal Mahbub Tauhidur RahmanThis book is a truly comprehensive, timely, and very much needed treatise on the conceptualization of analysis, and design of contactless & multimodal sensor-based human activities, behavior understanding & intervention. From an interaction design perspective, the book provides views and methods that allow for more safe, trustworthy, efficient, and more natural interaction with technology that will be embedded in our daily living environments. The chapters in this book cover sufficient grounds and depth in related challenges and advances in sensing, signal processing, computer vision, and mathematical modeling. It covers multi-domain applications, including surveillance and elderly care that will be an asset to entry-level and practicing engineers and scientists.(See inside for the reviews from top experts)
Contactless VLSI Measurement and Testing Techniques
by Selahattin SayilThis book provides readers with a comprehensive overview of the state-of-the-art in optical contactless probing approaches, in order to fill a gap in the literature on VLSI Testing. The author highlights the inherent difficulties encountered with the mechanical probe and testability design approaches for functional and internal fault testing and shows how contactless testing might resolve many of the challenges associated with conventional mechanical wafer testing. The techniques described in this book address the increasing demands for internal access of the logic state of a node within a chip under test.
Contagious Architecture: Computation, Aesthetics, and Space (Technologies of Lived Abstraction)
by Luciana ParisiA proposal that algorithms are not simply instructions to be performed but thinking entities that construct digital spatio-temporalities.In Contagious Architecture, Luciana Parisi offers a philosophical inquiry into the status of the algorithm in architectural and interaction design. Her thesis is that algorithmic computation is not simply an abstract mathematical tool but constitutes a mode of thought in its own right, in that its operation extends into forms of abstraction that lie beyond direct human cognition and control. These include modes of infinity, contingency, and indeterminacy, as well as incomputable quantities underlying the iterative process of algorithmic processing. The main philosophical source for the project is Alfred North Whitehead, whose process philosophy is specifically designed to provide a vocabulary for “modes of thought” exhibiting various degrees of autonomy from human agency even as they are mobilized by it. Because algorithmic processing lies at the heart of the design practices now reshaping our world—from the physical spaces of our built environment to the networked spaces of digital culture—the nature of algorithmic thought is a topic of pressing importance that reraises questions of control and, ultimately, power. Contagious Architecture revisits cybernetic theories of control and information theory's notion of the incomputable in light of this rethinking of the role of algorithmic thought. Informed by recent debates in political and cultural theory around the changing landscape of power, it links the nature of abstraction to a new theory of power adequate to the complexities of the digital world.
Container Handling in Automated Yard Blocks: An Integrative Approach Based on Time Information (Contributions to Management Science)
by Filip CovicThe yard block of a container terminal is the central point of synchronisation for asynchronous container flows between deep-sea vessels and transport to the hinterland. The structure of the block stipulates that containers are stacked on top of each other with only the topmost container directly accessible by a yard crane. This book describes a holistic and integrative approach to container handling in yard blocks to optimise productivity by minimising re-handling operations. The results provide insights for academic scholars as well as for experts from practical terminal planning and operations. The approach presented is two-fold: first, a theoretical foundation of the interdependencies in decision-making is established using mathematical programming. Secondly, operations involving uncertain container arrival information are examined on the basis of a simulation with a rigorous experimental design and statistical evaluation. In this context, the book develops container-handling strategies and analyses the impact of a system for vehicle arrival management – the "Terminal Appointment System". The findings presented in this book are the result of a close cooperation with experts at the port of Hamburg and build on previous research.
Container Security: Fundamental Technology Concepts that Protect Containerized Applications
by Liz RiceTo facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. But how do you know if the deployment is secure? This practical book examines key underlying technologies to help developers, operators, and security professionals assess security risks and determine appropriate solutions.Author Liz Rice, Chief Open Source Officer at Isovalent, looks at how the building blocks commonly used in container-based systems are constructed in Linux. You'll understand what's happening when you deploy containers and learn how to assess potential security risks that could affect your deployments. If you run container applications with kubectl or docker and use Linux command-line tools such as ps and grep, you're ready to get started.Explore attack vectors that affect container deploymentsDive into the Linux constructs that underpin containersExamine measures for hardening containersUnderstand how misconfigurations can compromise container isolationLearn best practices for building container imagesIdentify container images that have known software vulnerabilitiesLeverage secure connections between containersUse security tooling to prevent attacks on your deployment
Containerization with Ansible 2
by Aric RenzoAutomate the container lifecycle from image build through cloud deployment using the automation language you already know. About This Book • Use Ansible Container as an integral part of your workflow to increase flexibility and portability. • Manage the container life cycle using existing Ansible roles and automate the entire container build, deployment and management process. • A step-by-step guide that will get you up and running from building a simple container image to deploying a complex, multi-container app in the cloud. Who This Book Is For This book is aimed at DevOps engineers, administrators and developers who already have some familiarity with writing and running Ansible playbooks, and want to learn how to use Ansible to implement containerization. What You Will Learn • Increase your productivity by using Ansible roles to define and build images • Learn how to work with Ansible Container to manage, test, and deploy your containerized applications. • Increase the flexibility and portability of your applications by learning to use Ansible • Discover how you can apply your existing Ansible roles to the image build process • Get you up and running from building a simple container image to deploying a complex, multi-container app in the cloud. • Take an indepth look at the architecture of Ansible Container, and learn how to build re-usable container images, reliably and efficiently. In Detail Today many organizations are adopting containerization and DevOps methodologies to improve the flexibility and reliability of deploying new applications. Building custom application containers often means leveraging brittle and oftentimes complex Dockerfiles that can lead to cumbersome, multi-layered containers. Ansible Container brings a new workflow for managing the development of containers from development all the way through to production. The goal of this book is to get you up and running with Ansible Container so that you can create container images from Ansible roles, run containers locally, and deploy them to the cloud. We'll progress from a simple, single container application, to a complex application consisting of multiple, connected containers. You'll learn how to run the application locally, how to deploy it to an OpenShift cluster running locally, and how to deploy it to a Kubernetes cluster running in the cloud. Along the way, you'll see how to use roles to define each image or micro-service, and how to share your completed project with the Ansible community. Next, you will be able to take full advantage of Ansible Container, and use it to automate the container lifecycle in your own projects. By the end of this book,you will gain mastery of the Ansible Container platform by building complex multi-container projects ready for deployment into production. Style and approach This book will walk you through Ansible Containerization from building a simple container image to deploying a complex, multi-container app in the cloud. You will get an in-depth understanding of how to effectively manage containers using Ansible 2.
Containerization with LXC
by Konstantin IvanovThis book is for Linux engineers and software developers who are looking to deploy applications in a fast, secure and scalable way, both for testing and production use.
Containers in OpenStack: Leverage OpenStack services to make the most of Docker, Kubernetes and Mesos
by Vinoth Kumar Selvaraj Felipe Monteiro Venkatesh Loganathan Pradeep Kumar Singh Madhuri KumariKey Features Gets you acquainted with containerization in private cloud Learn to effectively manage and secure your containers in OpenStack Practical use cases on container deployment and management using OpenStack components Book Description Containers are one of the most talked about technologies of recent times. They have become increasingly popular as they are changing the way we develop, deploy, and run software applications. OpenStack gets tremendous traction as it is used by many organizations across the globe and as containers gain in popularity and become complex, it’s necessary for OpenStack to provide various infrastructure resources for containers, such as compute, network, and storage. Containers in OpenStack answers the question, how can OpenStack keep ahead of the increasing challenges of container technology? You will start by getting familiar with container and OpenStack basics, so that you understand how the container ecosystem and OpenStack work together. To understand networking, managing application services and deployment tools, the book has dedicated chapters for different OpenStack projects: Magnum, Zun, Kuryr, Murano, and Kolla. Towards the end, you will be introduced to some best practices to secure your containers and COE on OpenStack, with an overview of using each OpenStack projects for different use cases. What you will learn Understand the role of containers in the OpenStack ecosystem Learn about containers and different types of container runtimes tools. Understand containerization in OpenStack with respect to the deployment framework, platform services, application deployment, and security Get skilled in using OpenStack to run your applications inside containers Explore the best practices of using containers in OpenStack.
Contemporary Architecture and the Digital Design Process
by Peter SzalapajContemporary Architecture and the Digital Design Process introduces the reader to new developments in the computer modelling of design form in contemporary architectural practice through a series of detailed case studies. The book illustrates how evolving design practices use and exploit the potential of new computing technologies in a wide range of areas and application.A central thesis of this book is that technology follows design demand, rather than design adjusting to available new technology. Designers are not merely passive recipients of prescribed computing tools and techniques. Instead, they are increasingly able to express their intuitive design ideas through the rational medium of computing.The book features several contemporary building projects, each of which introduces a range of CAD and computing issues based upon the work of creative architectural and engineering design practices. These include the offices of Frank O. Gehry, Peter Cook and Colin Fournier, Anthony Hunt Associates, Peter Hubner, Szyskowitz-Kowalski, and Faulkner Brown. All these examples show what architects need to know and the skills they need to acquire to use advanced CAD technology.
Contemporary Artificial Intelligence (Chapman And Hall/crc Artificial Intelligence And Robotics Ser.)
by Richard E. NeapolitanThe notion of artificial intelligence (AI) often sparks thoughts of characters from science fiction, such as the Terminator and HAL 9000. While these two artificial entities do not exist, the algorithms of AI have been able to address many real issues, from performing medical diagnoses to navigating difficult terrain to monitoring possible failures
Contemporary Coding Techniques and Applications for Mobile Communications
by Onur Osman Osman Nuri UcanModern error control coding methods based on turbo coding have essentially solved the problem of reliable data communications over noisy channels. Contemporary Coding Techniques and Applications for Mobile Communications provides a clear, comprehensive, and practical grounding on the subject matter, examining the fundamentals, theory, and ap
Contemporary Complex Systems and Their Dependability: Proceedings Of The Thirteenth International Conference On Dependability And Complex Systems Depcos-relcomex. July 2 - 6, 2018, Brunów, Poland (Advances In Intelligent Systems And Computing #761)
by Janusz Kacprzyk Wojciech Zamojski Jacek Mazurkiewicz Jarosław Sugier Tomasz WalkowiakThis book presents the proceedings of the Thirteenth International Conference on Dependability and Complex Systems (DepCoS-RELCOMEX), which took place in the Brunów Palace in Poland from 2nd to 6th July 2018. The conference has been organized at the Faculty of Electronics, Wrocław University of Science and Technology since 2006, and it continues the tradition of two other events: RELCOMEX (1977–89) and Microcomputer School (1985–95). The selection of papers in these proceedings illustrates the broad variety of topics that are investigated in dependability analyses of today’s complex systems. Dependability came naturally as a contemporary answer to new challenges in the reliability evaluation of these systems. Such systems cannot be considered only as structures (however complex and distributed) built on the basis of technical resources (hardware): their analysis must take into account a unique blend of interacting people (their needs and behaviours), networks (together with mobile properties, cloud-based systems) and a large number of users dispersed geographically and producing an unimaginable number of applications (working online). A growing number of research methods apply the latest advances in artificial intelligence (AI) and computational intelligence (CI). Today’s complex systems are really complex and are applied in numerous different fields of contemporary life.
Contemporary Digital Transformation in Chinese Education
by Shutao Wang Junwei BaoAdopting a macro‑meso‑micro framework, this book explores the recent developments of digital transformation in Chinese education.From a macro perspective, this book examines the sociocultural background and policy environment of China’s educational digital transformation. At the meso level, it analyzes the dynamics and challenges of educational digitalization within the context of regional equity. Finally, it examines the impact of digital technologies on school practices at the micro level. By delving into the driving forces behind the digital transformation of education in China, and assessing its empowerment of regional equity and its impact on educational practices, this book will provide theoretical and practical support for future educational reforms and offer insights into the digital transformation of education in other developing countries.This book will attract academic researchers of educational technology and policy, policymakers, and educational administrators.
Contemporary Evolution Strategies (Natural Computing Series)
by Thomas Bäck Christophe Foussette Peter KrauseThis book surveys key algorithm developments between 1990 and 2012, with brief descriptions, a unified pseudocode for each algorithm and downloadable program code. Provides a taxonomy to clarify similarities and differences as well as historical relationships.
Contemporary Experimental Design, Multivariate Analysis and Data Mining: Festschrift in Honour of Professor Kai-Tai Fang
by Jianqing Fan Jianxin PanThe collection and analysis of data play an important role in many fields of science and technology, such as computational biology, quantitative finance, information engineering, machine learning, neuroscience, medicine, and the social sciences. Especially in the era of big data, researchers can easily collect data characterised by massive dimensions and complexity. In celebration of Professor Kai-Tai Fang’s 80th birthday, we present this book, which furthers new and exciting developments in modern statistical theories, methods and applications. The book features four review papers on Professor Fang’s numerous contributions to the fields of experimental design, multivariate analysis, data mining and education. It also contains twenty research articles contributed by prominent and active figures in their fields. The articles cover a wide range of important topics such as experimental design, multivariate analysis, data mining, hypothesis testing and statistical models.
Contemporary Fuzzy Logic: A Perspective of Fuzzy Logic with Scilab (Big and Integrated Artificial Intelligence #1)
by Witold Pedrycz Vincenzo Loia Stefania TomasielloThis book offers an essential introduction to fuzzy logic, starting with the classical notions and going through more advanced notions from the current state-of-the-art research. Each of the major topics is accompanied by examples, problems and Scilab codes. As a free open source software, Scilab offers everyone the chance to practice the concepts learned through the book. The book represents a synthesis of authors’ research and experience through the lectures delivered to university students. It is primarily intended as a textbook for upper-level undergraduates and graduates in computer science, mathematics, physics and engineering. It also represents a valuable resource for practitioners and researchers alike, bringing ideas for projects in the broad field of fuzzy logic.
Contemporary Gender Formations in India: In-between Conformity, Dissent and Affect
by Nandini DharThe volume discusses critical issues surrounding the developments in gender movements in the last two decades in India following the Delhi rape case and the ensuing massive protests in December 2012. A critical documentation of some of the key moments surrounding the contemporary gendered formations and radicalisms in South Asia, the chapters span questions of class, caste, sexuality, digital feminisms, and conflict zones. The book looks at anger, protest, and imaginations of resistance. It showcases the ‘new’ visibility that digital spaces have opened up to lend voice to survivors who are let down by traditional justice mechanisms and raises questions regarding ‘individualized’ modes of seeking justice as against traditional ‘collective’ voices that have always been a hallmark of movements. The volume analyses and criticizes the complicity of the state and the court as agents of reinforcing gender violence – an issue that has not been theorized enough by activists and scholars of violence. Further, it also delves into the #MeToo movement and the LoSHA, as both have raised contentious, controversial, and often conflicting debates on the nature of addressing sexual harassment, particularly at the workplace. Calling for further debate and discussions of cyberspace, gender justice, sexual violence, male entitlement, and forms of neoliberal feminism, this volume will be of immense interest to scholars and researchers in the areas of women and gender studies, sociology and social theory, gender politics, political theory, democracy, protest movements, politics, media and the internet, political advocacy, and law and legal theory. It will also be a compelling read for anyone interested in gender justice and equal rights.
Contemporary High Performance Computing: From Petascale toward Exascale (Chapman & Hall/CRC Computational Science)
by Jeffrey S. VetterContemporary High Performance Computing: From Petascale toward Exascale focuses on the ecosystems surrounding the world’s leading centers for high performance computing (HPC). It covers many of the important factors involved in each ecosystem: computer architectures, software, applications, facilities, and sponsors. The first part of the book examines significant trends in HPC systems, including computer architectures, applications, performance, and software. It discusses the growth from terascale to petascale computing and the influence of the TOP500 and Green500 lists. The second part of the book provides a comprehensive overview of 18 HPC ecosystems from around the world. Each chapter in this section describes programmatic motivation for HPC and their important applications; a flagship HPC system overview covering computer architecture, system software, programming systems, storage, visualization, and analytics support; and an overview of their data center/facility. The last part of the book addresses the role of clouds and grids in HPC, including chapters on the Magellan, FutureGrid, and LLGrid projects. With contributions from top researchers directly involved in designing, deploying, and using these supercomputing systems, this book captures a global picture of the state of the art in HPC.
Contemporary High Performance Computing: From Petascale toward Exascale, Volume 3 (Chapman & Hall/CRC Computational Science)
by Jeffrey S. VetterContemporary High Performance Computing: From Petascale toward Exascale, Volume 3 focuses on the ecosystems surrounding the world’s leading centers for high performance computing (HPC). It covers many of the important factors involved in each ecosystem: computer architectures, software, applications, facilities, and sponsors. This third volume will be a continuation of the two previous volumes, and will include other HPC ecosystems using the same chapter outline: description of a flagship system, major application workloads, facilities, and sponsors. Features: Describes many prominent, international systems in HPC from 2015 through 2017 including each system’s hardware and software architecture Covers facilities for each system including power and cooling Presents application workloads for each site Discusses historic and projected trends in technology and applications Includes contributions from leading experts Designed for researchers and students in high performance computing, computational science, and related areas, this book provides a valuable guide to the state-of-the art research, trends, and resources in the world of HPC.
Contemporary High Performance Computing: From Petascale toward Exascale, Volume Two (Chapman And Hall/crc Computational Science Ser.)
by Jeffrey S. VetterHPC is used to solve a number of complex questions in computational and data-intensive sciences. These questions include the simulation and modeling of physical phenomena, such as climate change, energy production, drug design, global security, and materials design; the analysis of large data sets such as those in genome sequencing, astronomical observation, and cybersecurity; and the intricate design of engineered products, such as airplanes and automobiles.This second volume of Contemporary High Performance Computing: From Petascale toward Exascale continues to document international HPC ecosystems, including the sponsors and sites that host them. Each chapter is punctuated with a site's flagship system and:Presents highlights of applications, workloads, and benchmarksDescribes hardware architectures, system software, and programming systemsExplores storage, visualization, and analyticsExamines the data center/facility as well as system statisticsFeaturing pictures of buildings and systems in production, floorplans, and many block diagrams and charts to illustrate system design and performance, Contemporary High Performance Computing: From Petascale toward Exascale, Volume Two delivers a detailed snapshot of the rich history of practice in modern HPC. This book provides a valuable reference for researchers in HPC and computational science.
Contemporary Issues in Communication, Cloud and Big Data Analytics: Proceedings of CCB 2020 (Lecture Notes in Networks and Systems #281)
by Valentina Emilia Balas Nitul Dutta Hiren Kumar Deva Sarma Bhaskar BhuyanThis book presents the outcomes of the First International Conference on Communication, Cloud, and Big Data (CCB) held on December 18–19, 2020, at Sikkim Manipal Institute of Technology, Majitar, Sikkim, India. This book contains research papers and articles in the latest topics related to the fields like communication networks, cloud computing, big data analytics, and on various computing techniques. Research papers addressing security issues in above-mentioned areas are also included in the book. The research papers and articles discuss latest issues in the above-mentioned topics. The book is very much helpful and useful for the researchers, engineers, practitioners, research students, and interested readers.