Browse Results

Showing 1,476 through 1,500 of 62,964 results

Access 2016 Bible (Bible)

by Michael Alexander Richard Kusleika

Master database creation and management Access 2016 Bible is your, comprehensive reference to the world's most popular database management tool. With clear guidance toward everything from the basics to the advanced, this go-to reference helps you take advantage of everything Access 2016 has to offer. Whether you're new to Access or getting started with Access 2016, you'll find everything you need to know to create the database solution perfectly tailored to your needs, with expert guidance every step of the way. The companion website features all examples and databases used in the book, plus trial software and a special offer from Database Creations. Start from the beginning for a complete tutorial, or dip in and grab what you need when you need it. Access enables database novices and programmers to store, organize, view, analyze, and share data, as well as build powerful, integrable, custom database solutions — but databases can be complex, and difficult to navigate. This book helps you harness the power of the database with a solid understanding of their purpose, construction, and application. Understand database objects and design systems objects Build forms, create tables, manipulate datasheets, and add data validation Use Visual Basic automation and XML Data Access Page design Exchange data with other Office applications, including Word, Excel, and more From database fundamentals and terminology to XML and Web services, this book has everything you need to maximize Access 2016 and build the database you need.

Access 2019 Bible (Bible)

by Michael Alexander Richard Kusleika

Master database creation and management Access 2019 Bible is your, comprehensive reference to the world's most popular database management tool. With clear guidance toward everything from the basics to the advanced, this go-to reference helps you take advantage of everything Access 2019 has to offer. Whether you're new to Access or getting started with Access 2019, you'll find everything you need to know to create the database solution perfectly tailored to your needs, with expert guidance every step of the way. The companion website features all examples and databases used in the book, plus trial software and a special offer from Database Creations. Start from the beginning for a complete tutorial, or dip in and grab what you need when you need it. Access enables database novices and programmers to store, organize, view, analyze, and share data, as well as build powerful, integrable, custom database solutions — but databases can be complex, and difficult to navigate. This book helps you harness the power of the database with a solid understanding of their purpose, construction, and application. Understand database objects and design systems objects Build forms, create tables, manipulate datasheets, and add data validation Use Visual Basic automation and XML Data Access Page design Exchange data with other Office applications, including Word, Excel, and more From database fundamentals and terminology to XML and Web services, this book has everything you need to maximize Access 2019 and build the database you need.

Access 2019 For Dummies

by Ken Cook Laurie A. Ulrich

Easy steps to practical databases People who really know how to build, populate, and simplify databases are few and far between. Access 2019 For Dummies is here to help you join the ranks of office heroes who possess these precious skills. This book offers clear and simple advice on how to build and operate databases as well as create simple forms, import data from outside sources, query databases for information, and share knowledge in reports. In short, it’s the book that holds all the secrets behind the mysteries of Access! Build effective databases from the ground up Simplify your data entry with forms and tables Write queries that produce answers to your data questions Simplify input with forms There’s no time like the present to get your hands on the insight that database beginners need to become Access gurus.

Access 97 Answers! Certified Tech Support

by Edward Jones Jarrel Jones

kAnswers to the 1,000 most commonly asked questions about Microsoft Access. Most answers are provided in step-by-step text format with not a lot of diagrams and figures.

Access 97 Expert Solutions

by Stan Leszynski

Que's Access 97 Expert Solutions is more than a unique tutorial--it's truly a handbook, covering important topics you won't find in any other book. Beyond creating queries, forms, and reports, discover how to combine Access objects into an expert solution. This book shows you how Access application experts work--their standards, philosophies, and techniques--and how you can apply this knowledge to your own development efforts.

Access By Design: A Guide To Universal Usability For Web Designers

by Sarah Horton

Bestselling author Sarah Horton argues that simply meeting the official standards and guidelines for Web accessibility is not enough. Her goal is universal usability, and in Access by Design: A Guide to Universal Usability for Web Designers, Sarah describes a design methodology that addresses accessibility requirements but then goes beyond. As a result, designers learn how to optimize page designs to work more effectively for more users, disabled or not. Working through each of the main functional features of Web sites, she provides clear principles for using HTML and CSS to deal with elements such as text, forms, images, and tables, illustrating each with an example drawn from the real world. Through these guidelines, Sarah makes a convincing case that good design principles benefit all users of the Web.

Access Contested

by John Palfrey Rafal Rohozinski Ronald Deibert Jonathan Zittrain

A daily battle for rights and freedoms in cyberspace is being waged in Asia. At the epicenter of this contest is China--home to the world's largest Internet population and what is perhaps the world's most advanced Internet censorship and surveillance regime in cyberspace. Resistance to China's Internet controls comes from both grassroots activists and corporate giants such as Google. Meanwhile, similar struggles play out across the rest of the region, from India and Singapore to Thailand and Burma, although each national dynamic is unique. Access Contested, the third volume from the OpenNet Initiative (a collaborative partnership of the Citizen Lab at the University of Toronto's Munk School of Global Affairs, the Berkman Center for Internet and Society at Harvard University, and the SecDev Group in Ottawa), examines the interplay of national security, social and ethnic identity, and resistance in Asian cyberspace, offering in-depth accounts of national struggles against Internet controls as well as updated country reports by ONI researchers. The contributors examine such topics as Internet censorship in Thailand, the Malaysian blogosphere, surveillance and censorship around gender and sexuality in Malaysia, Internet governance in China, corporate social responsibility and freedom of expression in South Korea and India, cyber attacks on independent Burmese media, and distributed-denial-of-service attacks and other digital control measures across Asia.The hardcover edition does not include a dust jacket.

Access Contested: Security, Identity, and Resistance in Asian Cyberspace

by John Palfrey Rafal Rohozinski Jonathan L. Zittrain Ronald Deibert

A daily battle for rights and freedoms in cyberspace is being waged in Asia. At the epicenter of this contest is China--home to the world's largest Internet population and what is perhaps the world's most advanced Internet censorship and surveillance regime in cyberspace. Resistance to China's Internet controls comes from both grassroots activists and corporate giants such as Google. Meanwhile, similar struggles play out across the rest of the region, from India and Singapore to Thailand and Burma, although each national dynamic is unique. Access Contested, the third volume from the OpenNet Initiative (a collaborative partnership of the Citizen Lab at the University of Toronto's Munk School of Global Affairs, the Berkman Center for Internet and Society at Harvard University, and the SecDev Group in Ottawa), examines the interplay of national security, social and ethnic identity, and resistance in Asian cyberspace, offering in-depth accounts of national struggles against Internet controls as well as updated country reports by ONI researchers. The contributors examine such topics as Internet censorship in Thailand, the Malaysian blogosphere, surveillance and censorship around gender and sexuality in Malaysia, Internet governance in China, corporate social responsibility and freedom of expression in South Korea and India, cyber attacks on independent Burmese media, and distributed-denial-of-service attacks and other digital control measures across Asia.

Access Contested: Security, Identity, and Resistance in Asian Cyberspace (Information Revolution and Global Politics)

by John Palfrey Rafal Rohozinski Jonathan L. Zittrain Ronald Deibert edited by Ronald Deibert

Experts examine censorship, surveillance, and resistance across Asia, from China and India to Malaysia and the Philippines. A daily battle for rights and freedoms in cyberspace is being waged in Asia. At the epicenter of this contest is China—home to the world's largest Internet population and what is perhaps the world's most advanced Internet censorship and surveillance regime in cyberspace. Resistance to China's Internet controls comes from both grassroots activists and corporate giants such as Google. Meanwhile, similar struggles play out across the rest of the region, from India and Singapore to Thailand and Burma, although each national dynamic is unique. Access Contested, the third volume from the OpenNet Initiative (a collaborative partnership of the Citizen Lab at the University of Toronto's Munk School of Global Affairs, the Berkman Center for Internet and Society at Harvard University, and the SecDev Group in Ottawa), examines the interplay of national security, social and ethnic identity, and resistance in Asian cyberspace, offering in-depth accounts of national struggles against Internet controls as well as updated country reports by ONI researchers.The contributors examine such topics as Internet censorship in Thailand, the Malaysian blogosphere, surveillance and censorship around gender and sexuality in Malaysia, Internet governance in China, corporate social responsibility and freedom of expression in South Korea and India, cyber attacks on independent Burmese media, and distributed-denial-of-service attacks and other digital control measures across Asia.

Access Control Management in Cloud Environments

by Yanchun Zhang Hua Wang Jinli Cao

This textbook introduces new business concepts on cloud environments such as secure, scalable anonymity and practical payment protocols for the Internet of things and Blockchain technology. The protocol uses electronic cash for payment transactions. In this new protocol, from the viewpoint of banks, consumers can improve anonymity if they are worried about disclosure of their identities in the cloud. Currently, there is not a book available that has reported the techniques covering the protocols with anonymizations and Blockchain technology. Thus this will be a useful book for universities to purchase. This textbook provides new direction for access control management and online business, with new challenges within Blockchain technology that may arise in cloud environments. One is related to the authorization granting process. For example, when a role is granted to a user, this role may conflict with other roles of the user or together with this role; the user may have or derive a high level of authority. Another is related to authorization revocation. For instance, when a role is revoked from a user, the user may still have the role. Experts will get benefits from these challenges through the developed methodology for authorization granting algorithm, and weak revocation and strong revocation algorithms.

Access Control Models and Architectures For IoT and Cyber Physical Systems

by Ravi Sandhu Maanak Gupta Smriti Bhatt Asma Hassan Alshehri

This book presents cybersecurity aspects of ubiquitous and growing IoT and Cyber Physical Systems. It also introduces a range of conceptual, theoretical, and foundational access control solutions. This was developed by the authors to provide an overall broader perspective and grounded approach to solve access control problems in IoT and CPS.The authors discuss different architectures, frameworks, access control models, implementation scenarios, and a broad set of use-cases in different IoT and CPS domains. This provides readers an intuitive and easy to read set of chapters. The authors also discuss IoT and CPS access control solutions provided by key industry players including Amazon Web Services (AWS) and Google Cloud Platform (GCP). It provides extensions of the authors proposed fine grained solutions with these widely used cloud and edge supported platforms.This book is designed to serve the computer science and the cybersecurity community including researchers, academicians and students. Practitioners who have a wider interest in IoT, CPS, privacy and security aspects will also find this book useful. Thanks to the holistic planning and thoughtful organization of this book, the readers are expected to gain in-depth knowledge of the state-of-the-art access control architectures and security models for resilient IoT and CPS.

Access Control and Identity Management

by Mike Chapple

Revised and updated with the latest data from this fast paced field, Access Control, Authentication, and Public Key Infrastructure defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs.

Access Control, Security, and Trust: A Logical Approach

by Shiu-Kai Chin Susan Beth Older

Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple pro

Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace (Information Revolution and Global Politics)

by John Palfrey Rafal Rohozinski Ronald Deibert Jonathan Zittrain

Reports on a new generation of Internet controls that establish a new normative terrain in which surveillance and censorship are routine.Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous “Great Firewall of China” is one of the first national Internet filtering systems. Today the new tools for Internet controls that are emerging go beyond mere denial of information. These new techniques, which aim to normalize (or even legalize) Internet control, include targeted viruses and the strategically timed deployment of distributed denial-of-service (DDoS) attacks, surveillance at key points of the Internet's infrastructure, take-down notices, stringent terms of usage policies, and national information shaping strategies. Access Controlled reports on this new normative terrain. The book, a project from the OpenNet Initiative (ONI), a collaboration of the Citizen Lab at the University of Toronto's Munk Centre for International Studies, Harvard's Berkman Center for Internet and Society, and the SecDev Group, offers six substantial chapters that analyze Internet control in both Western and Eastern Europe and a section of shorter regional reports and country profiles drawn from material gathered by the ONI around the world through a combination of technical interrogation and field research methods.

Access Cookbook: Solutions to Common User Interface & Programming Problems

by Andy Baron Ken Getz Paul Litwin

Not a reference book, and not a tutorial either, the new second edition of the highly regarded Access Cookbook is an uncommonly useful collection of solutions to problems that Access users and developers are likely to face as they attempt to build increasingly complex applications.Although using any single "recipe" in the book will more than pay back the cost of the book in terms of both hours saved and frustration thwarted, Access Cookbook, Second Edition is much more than a handy assortment of cut-and-paste code.Each of the "recipes" examine a particular problem--problems that commonly occur when you push the upper limits of Access, or ones that are likely to trip up a developer attempting to design a more elegant Access application--even some things you never knew Access could do. The authors then, in a clear, accessible, step-by-step style, present the problems' solution. Following each "recipe" are insights on how Access works, potential pitfalls, interesting programming techniques that are used in the solution, and how and why the solution works, so you can adapt the problem-solving techniques to other similar situations.Fully updated for Access 2003, Access Cookbook, Second Edition is also one of the first books to thoroughly explore new support for .NET managed code and XML. All of the practical, real-world examples have been tested for compatibility with Access 2003, Windows XP, and Windows Server 2003. This updated new edition also covers Access and SharePoint, Access and SmartTags, Access and .NET; and Access and XML.Access power users and programmers at all levels, from the relatively inexperienced to the most sophisticated, will rely on the Access Cookbook for quick solutions to gnarly problems. With a dog-eared copy of Access Cookbook at your side, you can spend your time and energy where it matters most: working on the interesting facets of your Access application, not just the time-consuming ones.

Access Data Analysis Cookbook: Slicing and Dicing to Find the Results You Need

by Ken Bluttman Wayne S. Freeze

If you have large quantities of data in a Microsoft Access database, and need to study that data in depth, this book is a data cruncher's dream. Access Data Analysis Cookbook offers practical recipes to solve a variety of common problems that users have with extracting Access data and performing calculations on it. Each recipe includes a discussion on how and why the solution works.Whether you use Access 2007 or an earlier version, this book will teach you new methods to query data, different ways to move data in and out of Access, how to calculate answers to financial and investment issues, and more. Learn how to apply statistics to summarize business information, how to jump beyond SQL by manipulating data with VBA, how to process dates and times, and even how to reach into the Excel data analysis toolkit. Recipes demonstrate ways to:Develop basic and sophisticated queriesApply aggregate functions, custom functions, regular expressions, and crosstabsApply queries to perform non-passive activities such as inserting, updating, and deleting dataCreate and manipulate tables and queries programmaticallyManage text-based data, including methods to isolate parts of a string and ways to work with numbers that are stored as textUse arrays, read and write to the Windows registry, encrypt data, and use transaction processingUse the FileSystemObject, use XML with XSLT, communicate with SQL Server, and exchange data with other Office productsFind answers from time-based data, such as how to add time, count elapsed time, work with leap years, and how to manage time zones in your calculationsDeal with business and finance problems, including methods for calculating depreciation, loan paybacks, and Return on Investment (ROI)Explore statistical techniques, such as frequency, variance, kurtosis, linear regression, combinations and permutationsAccess Data Analysis Cookbook is a one-stop-shop for extracting nuggets of valuable information from your database, and anyone with Access experience will benefit from these tips and techniques, including seasoned developers. If you want to use your data, and not just store it, you'll find this guide indispensable.

Access Database Design & Programming, 3rd Edition

by Steven Roman

Access Database Design and Programming takes you behind the details of the Access interface, focusing on the general knowledge necessary for Access power users or developers to create effective database applications. When using software products with graphical interfaces, we frequently focus so much on the interface that we forget about the general concepts that allow us to understand and use the software effectively. In particular, this book focuses on three areas: Database design. The book provides an enjoyable, informative overview of database design that carefully shows you how to normalize tables to eliminate redundancy without losing data. Queries. The book examines multi-table queries (i.e.,various types of joins) and shows how to implement them indirectly by using the Access interface or directly by using Access SQL. Programming. The book examines the VBA integrated development environment (IDE). It then goes on to provide an excellent introduction to Data Access Objects (DAO), ActiveX Data Objects (ADO), and ADO Extensions for Data Definition and Security (ADOX). These sections serve as a handy introduction and primer for basic database operations, such as modifying a table under program control, dynamically adding and deleting a record, and repositioning a record pointer. The concluding chapter focuses on common programming problems, such as computing running sums and comparing two sets. Unlike other Access books that take the long, detailed approach to every topic of concern to Access programmers, Access Database Design and Programming instead focuses on the core concepts, enabling programmers to develop solid, effective database applications. This book also serves as a 'second course' in Access that provides a relatively experienced Access user who is new to programming with the frequently overlooked techniques necessary to develop successfully in the Microsoft Access environment. Anyone interested in learning Access in depth, rather than just scraping the surface, will enjoy and benefit immensely from reading this book.

Access Database Design & Programming: Creating Programmable Database Applications with Access 97, 2000, 2002 & 2003 (Nutshell Handbooks)

by Steven Roman

Access Database Design & Programming takes you behind the details of the Access interface, focusing on the general knowledge necessary for Access power users or developers to create effective database applications. When using software products with graphical interfaces, we frequently focus so much on the interface that we forget about the general concepts that allow us to understand and use the software effectively. In particular, this book focuses on three areas:Database design. The book provides an enjoyable, informative overview of database design that carefully shows you how to normalize tables to eliminate redundancy without losing data.Queries. The book examines multi-table queries (i.e.,various types of joins) and shows how to implement them indirectly by using the Access interface or directly by using Access SQL.Programming. The book examines the VBA integrated development environment (IDE). It then goes on to provide an excellent introduction to Data Access Objects (DAO), ActiveX Data Objects (ADO), and ADO Extensions for Data Definition and Security (ADOX). These sections serve as a handy introduction and primer for basic database operations,such as modifying a table under program control, dynamically adding and deleting a record, and repositioning a record pointer. The concluding chapter focuses on common programming problems, such as computing running sums and comparing two sets.Unlike other Access books that take the long, detailed approach to every topic of concern to Access programmers, Access Database Design &Programming instead focuses on the core concepts, enabling programmers to develop solid, effective database applications. This book also serves as a 'second course' in Access that provides a relatively experienced Access user who is new to programming with the frequently overlooked techniques necessary to develop successfully in the Microsoft Access environment.Anyone interested in learning Access in depth, rather than just scraping the surface, will enjoy and benefit immensely from reading this book.

Access Denied (Turing Hopper #3)

by Donna Andrews

When Turing Hopper, Artificial Intelligence Personality extraordinaire, learns that criminal Nestor Garcia's once-dormant credit card has been doing a lot of shopping lately, she begins to do some sleuthing -- and finds out the loot's shown up at an empty bungalow. So Turing gets her human friends to stake out the vicinity. But when one of them sees something he wishes he hadn't -- and gets charged with murder -- everyone will have to pull together to clear his name. The only way to do it is to find the guilty party -- by luring him to attack them. But doing so might very well get them "accidentally" deleted...

Access Device Fraud and Related Financial Crimes

by Jerry Iannacci

Access Device Fraud and Related Financial Crimes offers front-line exposure. It is a reference text that affords the student, financial investigator or law enforcement professional a true insight into a wide spectrum of criminal activity involving financial crimes. This book brings the reader back to the scene of cases in which the intensity and ma

Access For Dummies

by Ken Cook Laurie A. Ulrich

Become a database boss —and have fun doing it—with this accessible and easy-to-follow guide to Microsoft Access Databases hold the key to organizing and accessing all your data in one convenient place. And you don’t have to be a data science wizard to build, populate, and organize your own. With Microsoft Access For Dummies, you’ll learn to use the latest version of Microsoft’s Access software to power your database needs. Need to understand the essentials before diving in? Check out our Basic Training in Part 1 where we teach you how to navigate the Access workspace and explore the foundations of databases. Ready for more advanced tutorials? Skip right to the sections on Data Management, Queries, or Reporting where we walk you through Access’s more sophisticated capabilities. Not sure if you have Access via Office 2021 or Office 365? No worries – this book covers Access now matter how you access it. The book also shows you how to: Handle the most common problems that Access users encounter Import, export, and automatically edit data to populate your next database Write powerful and accurate queries to find exactly what you’re looking for, exactly when you need it Microsoft Access For Dummies is the perfect resource for anyone expected to understand, use, or administer Access databases at the workplace, classroom, or any other data-driven destination.

Access Hacks

by Ken Bluttman

As part of the Microsoft Office suite, Access has become the industry's leading desktop database management program for organizing, accessing, and sharing information. But taking advantage of this product to build increasingly complex Access applications requires something more than your typical how-to book. What it calls for is Access Hacks from O'Reilly. This valuable guide provides direct, hands-on solutions that can help relieve the frustrations felt by users struggling to master the program's various complexities. For experienced users, Access Hacks offers a unique collection of proven techniques and tools that enable them to take their database skills and productivity to the next level. For Access beginners, it helps them acquire a firm grasp of the program's most productive features. A smart collection of insider tips and tricks, Access Hacks covers all of the program's finer points. Among the multitude of topics addressed, it shows users how to: work with Access in multi-user environments utilize SQL queries work with external data and programs integrate Access with third-party products Just imagine: a learning process without the angst. Well, Access Hacks delivers it with ease, thanks to these down-and-dirty techniques not collected together anywhere else. Part of O'Reilly's best-selling Hacks series, Access Hacks is based on author Ken Bluttman's two decades of real-world experience in database programming and business application building. It's because of his vast experiences that the book is able to offer such a deep understanding of the program's expanding possibilities.

Access Hacks: Tips & Tools for Wrangling Your Data

by Ken Bluttman

As part of the Microsoft Office suite, Access has become the industry's leading desktop database management program for organizing, accessing, and sharing information. But taking advantage of this product to build increasingly complex Access applications requires something more than your typical how-to book. What it calls for is Access Hacks from O'Reilly.This valuable guide provides direct, hands-on solutions that can help relieve the frustrations felt by users struggling to master the program's various complexities. For experienced users, Access Hacks offers a unique collection of proven techniques and tools that enable them to take their database skills and productivity to the next level. For Access beginners, it helps them acquire a firm grasp of the program's most productive features.A smart collection of insider tips and tricks, Access Hacks covers all of the program's finer points. Among the multitude of topics addressed, it shows users how to:work with Access in multi-user environmentsutilize SQL querieswork with external data and programsintegrate Access with third-party productsJust imagine: a learning process without the angst. Well, Access Hacks delivers it with ease, thanks to these down-and-dirty techniques not collected together anywhere else.Part of O'Reilly's best-selling Hacks series, Access Hacks is based on author Ken Bluttman's two decades of real-world experience in database programming and business application building. It's because of his vast experiences that the book is able to offer such a deep understanding of the program's expanding possibilities.

Access Is Capture: How Edtech Reproduces Racial Inequality

by Roderic N Crooks

Racially and economically segregated schools across the United States have hosted many interventions from commercial digital education technology (edtech) companies who promise their products will rectify the failures of public education. Edtech's benefits are not only trumpeted by industry promoters and evangelists but also vigorously pursued by experts, educators, students, and teachers. Why, then, has edtech yet to make good on its promises? In Access Is Capture, Roderic N. Crooks investigates how edtech functions in Los Angeles public schools that exclusively serve Latinx and Black communities. These so-called urban schools are sites of intense, ongoing technological transformation, where the tantalizing possibilities of access to computing meet the realities of structural inequality. Crooks shows how data-intensive edtech delivers value to privileged individuals and commercial organizations but never to the communities that hope to share in the benefits. He persuasively argues that data-drivenness ultimately enjoins the public to participate in a racial project marked by the extraction of capital from minoritized communities to enrich the tech sector.

Access Rules: Freeing Data from Big Tech for a Better Future

by Viktor Mayer-Schönberger Thomas Ramge

A powerful and urgent call to action: to improve our lives and our societies, we must demand open access to data for all. Information is power, and the time is now for digital liberation. Access Rules mounts a strong and hopeful argument for how informational tools at present in the hands of a few could instead become empowering machines for everyone. By forcing data-hoarding companies to open access to their data, we can reinvigorate both our economy and our society. Authors Viktor Mayer-Schönberger and Thomas Ramge contend that if we disrupt monopoly power and create a level playing field, digital innovations can emerge to benefit us all. Over the past twenty years, Big Tech has managed to centralize the most relevant data on their servers, as data has become the most important raw material for innovation. However, dominant oligopolists like Facebook, Amazon, and Google, in contrast with their reputation as digital pioneers, are actually slowing down innovation and progress by withholding data for the benefit of their shareholders––at the expense of customers, the economy, and society. As Access Rules compellingly argues, ultimately it is up to us to force information giants, wherever they are located, to open their treasure troves of data to others. In order for us to limit global warming, contain a virus like COVID-19, or successfully fight poverty, everyone—including citizens and scientists, start-ups and established companies, as well as the public sector and NGOs—must have access to data. When everyone has access to the informational riches of the data age, the nature of digital power will change. Information technology will find its way back to its original purpose: empowering all of us to use information so we can thrive as individuals and as societies.

Refine Search

Showing 1,476 through 1,500 of 62,964 results