- Table View
- List View
Pentaho 5.0 Reporting By Example Beginner's Guide
by Dario R. Bernabeu Mariano Garcia MattioWritten in a friendly, example driven Beginner’s Guide format, there are plenty of step-by-step instructions to get you started fast! Pentaho 5.0 By Example: Beginner's Guide is the ideal companion for a wide-variety of developers. Whether you are new to the world of Business Intelligence reporting, or an experienced BI analyst, this book will guide you through the creation of your first reports in Pentaho. We assume some knowledge of the SQL language and database systems.
Pentaho Analytics for MongoDB
by Bo BorlandThis is an easy-to-follow guide on the key integration points between Pentaho and MongoDB. This book employs a practical approach designed to have Pentaho configured to talk to MongoDB early on so that you see rapid results. This book is intended for business analysts, data architects, and developers new to either Pentaho or MongoDB who want to be able to deliver a complete solution for storing, processing, and visualizing data. It's assumed that you will already have experience defining data requirements needed to support business processes and exposure to database modeling, SQL query, and reporting techniques.
Pentaho Analytics for MongoDB Cookbook
by Harris Ward Joel LatinoOver 50 recipes to learn how to use Pentaho Analytics and MongoDB to create powerful analysis and reporting solutions About This Book * Create reports and stunning dashboards with MongoDB data * Accelerate data access and maximize productivity with unique features of Pentaho for MongoDB * A step-by-step recipe-based guide for making full use of Pentaho suite tools with MongoDB Who This Book Is For This book is intended for data architects and developers with a basic level of knowledge of MongoDB. Familiarity with Pentaho is not expected. What You Will Learn * Extract, load, and transform data from MongoDB collections to other datasources * Design Pentaho Reports using different types of connections for MongoDB * Create a OLAP mondrian schema for MongoDB * Explore your MongoDB data using Pentaho Analyzer * Utilize the drag and drop web interface to create dashboards * Use Kettle Thin JDBC with MongoDB for analysis * Integrate advanced dashboards with MondoDB using different types of connections * Publish and run a report on Pentaho BI server using a web interface In Detail MongoDB is an open source, schemaless NoSQL database system. Pentaho as a famous open source Analysis tool provides high performance, high availability, and easy scalability for large sets of data. The variant features in Pentaho for MongoDB are designed to empower organizations to be more agile and scalable and also enables applications to have better flexibility, faster performance, and lower costs. Whether you are brand new to online learning or a seasoned expert, this book will provide you with the skills you need to create turnkey analytic solutions that deliver insight and drive value for your organization. The book will begin by taking you through Pentaho Data Integration and how it works with MongoDB. You will then be taken through the Kettle Thin JDBC Driver for enabling a Java application to interact with a database. This will be followed by exploration of a MongoDB collection using Pentaho Instant view and creating reports with MongoDB as a datasource using Pentaho Report Designer. The book will then teach you how to explore and visualize your data in Pentaho BI Server using Pentaho Analyzer. You will then learn how to create advanced dashboards with your data. The book concludes by highlighting contributions of the Pentaho Community. Style and approach A comprehensive, recipe-based guide to take complete advantage of the Pentaho Analytics for MongoDB.
Pentaho Business Analytics Cookbook
by Sergio RamazzinaThis practical guide contains a wide variety of recipes, taking you through all the topics you need to quickly familiarize yourself with Pentaho and extend your Pentaho skillset. If you are involved in daily activities using Pentaho Business Analytics platform, this is the book for you. It is a good companion to get you quickly acquainted with everything you need to increase your productivity with the platform. We assume basic familiarity with Pentaho, data warehouse design and SQL, HTML, and XML.
Pentaho Data Integration 4 Cookbook
by Adrian Sergio PulvirentiThis book has step-by-step instructions to solve data manipulation problems using PDI in the form of recipes. It has plenty of well-organized tips, screenshots, tables, and examples to aid quick and easy understanding.If you are a software developer or anyone involved or interested in developing ETL solutions, or in general, doing any kind of data manipulation, this book is for you. It does not cover PDI basics, SQL basics, or database concepts. You are expected to have a basic understanding of the PDI tool, SQL language, and databases.
Pentaho Data Integration Beginner's Guide, Second Edition
by María Carina RoldanThis book focuses on teaching you by example. The book walks you through every aspect of Pentaho Data Integration, giving systematic instructions in a friendly style, allowing you to learn in front of your computer, playing with the tool. The extensive use of drawings and screenshots make the process of learning Pentaho Data Integration easy. Throughout the book, numerous tips and helpful hints are provided that you will not find anywhere else.This book is a must-have for software developers, database administrators, IT students, and everyone involved or interested in developing ETL solutions, or, more generally, doing any kind of data manipulation. Those who have never used Pentaho Data Integration will benefit most from the book, but those who have, they will also find it useful.This book is also a good starting point for database administrators, data warehouse designers, architects, or anyone who is responsible for data warehouse projects and needs to load data into them.
Pentaho Data Integration Cookbook Second Edition
by Alex ArbucklePentaho Data Integration Cookbook Second Edition is written in a cookbook format, presenting examples in the style of recipes.This allows you to go directly to your topic of interest, or follow topics throughout a chapter to gain a thorough in-depth knowledge.Pentaho Data Integration Cookbook Second Edition is designed for developers who are familiar with the basics of Kettle but who wish to move up to the next level.It is also aimed at advanced users that want to learn how to use the new features of PDI as well as and best practices for working with Kettle.
Pentaho Data Integration Quick Start Guide: Create ETL processes using Pentaho
by María Carina RoldánGet productive quickly with Pentaho Data IntegrationKey FeaturesTake away the pain of starting with a complex and powerful systemSimplify your data transformation and integration workExplore, transform, and validate your data with Pentaho Data IntegrationBook DescriptionPentaho Data Integration(PDI) is an intuitive and graphical environment packed with drag and drop design and powerful Extract-Transform-Load (ETL) capabilities. Given its power and flexibility, initial attempts to use the Pentaho Data Integration tool can be difficult or confusing. This book is the ideal solution.This book reduces your learning curve with PDI. It provides the guidance needed to make you productive, covering the main features of Pentaho Data Integration. It demonstrates the interactive features of the graphical designer, and takes you through the main ETL capabilities that the tool offers.By the end of the book, you will be able to use PDI for extracting, transforming, and loading the types of data you encounter on a daily basis.What you will learnDesign, preview and run transformations in SpoonRun transformations using the Pan utilityUnderstand how to obtain data from different types of files Connect to a database and explore it using the database explorerUnderstand how to transform data in a variety of waysUnderstand how to insert data into database tablesDesign and run jobs for sequencing tasks and sending emailsCombine the execution of jobs and transformationsWho this book is forThis book is for software developers, business intelligence analysts, and others involved or interested in developing ETL solutions, or more generally, doing any kind of data manipulation.
Pentaho Kettle Solutions
by Jos Van Dongen Matt Casters Roland BoumanA complete guide to Pentaho Kettle, the Pentaho Data lntegration toolset for ETLThis practical book is a complete guide to installing, configuring, and managing Pentaho Kettle. If you're a database administrator or developer, you'll first get up to speed on Kettle basics and how to apply Kettle to create ETL solutions--before progressing to specialized concepts such as clustering, extensibility, and data vault models. Learn how to design and build every phase of an ETL solution.Shows developers and database administrators how to use the open-source Pentaho Kettle for enterprise-level ETL processes (Extracting, Transforming, and Loading data)Assumes no prior knowledge of Kettle or ETL, and brings beginners thoroughly up to speed at their own paceExplains how to get Kettle solutions up and running, then follows the 34 ETL subsystems model, as created by the Kimball Group, to explore the entire ETL lifecycle, including all aspects of data warehousing with KettleGoes beyond routine tasks to explore how to extend Kettle and scale Kettle solutions using a distributed "cloud"Get the most out of Pentaho Kettle and your data warehousing with this detailed guide--from simple single table data migration to complex multisystem clustered data integration tasks.
Pentaho Reporting 3.5 for Java Developers
by Will GormanThis hands-on tutorial, filled with exercises and examples, introduces the reader to a variety of concepts within Pentaho Reporting. With screenshots that show you how reports look at design time as well as how they should look when rendered as PDF, Excel, or HTML, this book also contains complete example source code that you can copy and paste into your environment to get up and running quickly. This book is primarily written for Java developers who want to assemble custom reporting solutions with Pentaho Reporting. Their main interest is in the technical details of creating reports and they want to see how to solve common report problems with a minimum of fuss; they do not need an overview of BI or the importance of reporting. Secondary audiences of this book are IT professionals who need to install a reporting solution in their environment, and want to learn advanced concepts within Pentaho Reporting such as sub-reports, cross-tabs, data source configuration, and metadata-based reporting.
Pentaho Solutions
by Jos Van Dongen Ronald BoumanYour all-in-one resource for using Pentaho with MySQL for Business Intelligence and Data Warehousing Open-source Pentaho provides business intelligence (BI) and data warehousing solutions at a fraction of the cost of proprietary solutions. Now you can take advantage of Pentaho for your business needs with this practical guide written by two major participants in the Pentaho community. The book covers all components of the Pentaho BI Suite. You'll learn to install, use, and maintain Pentaho-and find plenty of background discussion that will bring you thoroughly up to speed on BI and Pentaho concepts. Of all available open source BI products, Pentaho offers the most comprehensive toolset and is the fastest growing open source product suite Explains how to build and load a data warehouse with Pentaho Kettle for data integration/ETL, manually create JFree (pentaho reporting services) reports using direct SQL queries, and create Mondrian (Pentaho analysis services) cubes and attach them to a JPivot cube browser Review deploying reports, cubes and metadata to the Pentaho platform in order to distribute BI solutions to end-users Shows how to set up scheduling, subscription and automatic distribution The companion Web site provides complete source code examples, sample data, and links to related resources.
Pentaho for Big Data Analytics
by Manoj R Patil Feris ThiaThe book is a practical guide, full of step-by-step examples that are easy to follow and implement.This book is for developers, system administrators, and business intelligence professionals looking to learn how to get more out of their data through Pentaho. In order to best engage with the examples, some knowledge of Java will be required.
Pentesting APIs: A practical guide to discovering, fingerprinting, and exploiting APIs
by Maurício HarleyLearn the essential steps to successfully identify and leverage API endpoints with a sequenced and structured approachKey FeaturesGain detailed insights into vulnerabilities and attack vectors for RESTful and GraphQL APIsFollow practical advice and best practices for securing APIs against potential threatsExplore essential security topics, potential vulnerabilities, common attack vectors, and the overall API security landscapePurchase of the print or Kindle book includes a free PDF eBookBook DescriptionUnderstanding API security is crucial as APIs form the backbone of modern interconnected applications, making them prime targets for cyberattacks. Drawing on nearly 30 years of cybersecurity experience and an extensive background in network security and forensic analysis, this book provides the knowledge and tools to strengthen your API security practices and protect against cyber threats comprehensively. This book begins by establishing a foundational understanding of APIs, particularly focusing on REST and GraphQL, emphasizing their critical role and potential security vulnerabilities. It guides you through setting up a penetration testing environment to ensure the practical application of concepts. You’ll learn reconnaissance techniques, information-gathering strategies, and the discovery of API vulnerabilities. Authentication and authorization testing are thoroughly explored, covering mechanisms, weaknesses, and methods to bypass security controls. By comprehensively addressing these aspects, the book equips you to understand, identify, and mitigate risks, strengthening API security and effectively minimizing potential attack surfaces. By the end of this book, you’ll have developed practical skills to identify, exploit, and secure APIs against various vulnerabilities and attacks.What you will learnGet an introduction to APIs and their relationship with securitySet up an effective pentesting lab for API intrusionConduct API reconnaissance and information gathering in the discovery phaseExecute basic attacks such as injection, exception handling, and DoSPerform advanced attacks, including data exposure and business logic abuseBenefit from expert security recommendations to protect APIs against attacksWho this book is forThis book is for security engineers, particularly those focused on application security, as well as security analysts, application owners, web developers, pentesters, and all curious enthusiasts who want to learn about APIs, effective testing methods for their robustness, and how to protect them against cyber attacks. Basic knowledge of web development, familiarity with API concepts, and a foundational understanding of cybersecurity principles will help you get started with this book.
Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments
by Matt BurroughA comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple.Pentesting Azure Applications is a comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies. You'll start by learning how to approach a cloud-focused penetration test and how to obtain the proper permissions to execute it; then, you'll learn to perform reconnaissance on an Azure subscription, gain access to Azure Storage accounts, and dig into Azure's Infrastructure as a Service (IaaS).You'll also learn how to:- Uncover weaknesses in virtual machine settings that enable you to acquire passwords, binaries, code, and settings files- Use PowerShell commands to find IP addresses, administrative users, and resource details- Find security issues related to multi-factor authentication and management certificates- Penetrate networks by enumerating firewall rules- Investigate specialized services like Azure Key Vault, Azure Web Apps, and Azure Automation- View logs and security events to find out when you've been caughtPacked with sample pentesting scripts, practical advice for completing security assessments, and tips that explain how companies can configure Azure to foil common attacks, Pentesting Azure Applications is a clear overview of how to effectively perform cloud-focused security tests and provide accurate findings and recommendations.
Pentesting Industrial Control Systems: An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
by Paul SmithDiscover modern tactics, techniques, and procedures for pentesting industrial control systemsKey FeaturesBecome well-versed with offensive ways of defending your industrial control systemsLearn about industrial network protocols, threat hunting, Active Directory compromises, SQL injection, and much moreBuild offensive and defensive skills to combat industrial cyber threatsBook DescriptionThe industrial cybersecurity domain has grown significantly in recent years. To completely secure critical infrastructure, red teams must be employed to continuously test and exploit the security integrity of a company's people, processes, and products. This pentesting book takes a slightly different approach than most by helping you to gain hands-on experience with equipment that you'll come across in the field. This will enable you to understand how industrial equipment interacts and operates within an operational environment.You'll start by getting to grips with the basics of industrial processes, and then see how to create and break the process, along with gathering open source intel to create a threat landscape for your potential customer. As you advance, you'll find out how to install and utilize offensive techniques used by professional hackers. Throughout the book, you'll explore industrial equipment, port and service discovery, pivoting, and much more, before finally launching attacks against systems in an industrial network.By the end of this penetration testing book, you'll not only understand how to analyze and navigate the intricacies of an industrial control system (ICS), but you'll also have developed essential offensive and defensive skills to proactively protect industrial networks from modern cyberattacks.What you will learnSet up a starter-kit ICS lab with both physical and virtual equipmentPerform open source intel-gathering pre-engagement to help map your attack landscapeGet to grips with the Standard Operating Procedures (SOPs) for penetration testing on industrial equipmentUnderstand the principles of traffic spanning and the importance of listening to customer networksGain fundamental knowledge of ICS communicationConnect physical operational technology to engineering workstations and supervisory control and data acquisition (SCADA) softwareGet hands-on with directory scanning tools to map web-based SCADA solutionsWho this book is forIf you are an ethical hacker, penetration tester, automation engineer, or IT security professional looking to maintain and secure industrial networks from adversaries, this book is for you. A basic understanding of cybersecurity and recent cyber events will help you get the most out of this book.
People Analytics: Data to Decisions (Management for Professionals)
by Rahul GhatakThis book is an exploration of the people analytics possibility, bringing out both theoretical frameworks and detailed practical case studies from the author's experience in industry and business across both sides of the table, with an understanding of data science models and SMAC (Social, Mobile & Cloud) technologies underpinning it. It further explores and lays out a business case for why organizations need to invest behind this space and why HR functions and businesses need to embrace and adopt it. The book examines how people analytics makes a difference to business, describes stages of adoption and maturity models for its effective deployment in organizations and explores the journey from employee master data management and conversion to reporting and visualizations to dash-boarding and descriptive analytics, operational analytics to finally predictive modelling. The book provides insights on the impact of big data and social networks on HR and talent frameworks and the opportunity for HR to mine these networks with a view to culling out predictive insights for the business. It also describes in great detail the specific applications of people and talent analytics through case examples. The book discusses and makes the case for HR to be metric driven focused on business outcomes. It enumerates upon “lead” and “lag” indicators and the need to leverage relevant measurement systems. It provides an understanding of relevant statistical tools that could be deployed to mine key insights from the data to enable robust decision-making, and examines the power of “visual intelligence” and data representation that goes beyond traditional tools like Excel. This book is for HR practitioners who seek to challenge the status quo. It does so by helping them leverage a data and evidence based approach; asking the right questions and building new capabilities with a view towards leading change and driving transformation both in their domain, the wider business and the larger organization. The book is also useful for HRM students to gain a deep understanding of “people analytics” as a critical sub-domain within HR. “HR is not just about people but now also about Tech, Data and Analytics. Upgrading numerical/analytics skills in order to have greater impact on the business, is the new wave of HR, which Rahul helps address via his own rich experience.”- Gurprriet Siingh, Managing Director, Russell Reynolds Associates, Mumbai, India. “This book would help HR & Leadership Teams find a way of discarding perceptions and uncovering truth by embracing data patterns as opposed to just continuing with incremental changes to how it has always been. This is particularly so of successful organizations.”- Vikas Gupta, Divisional Chief Executive Officer, Education and Stationery Products Business, ITC Limited, Gurugram, India.
People Count: Contact-Tracing Apps and Public Health
by Susan LandauAn introduction to the technology of contact tracing and its usefulness for public health, considering questions of efficacy, equity, and privacy.How do you stop a pandemic before a vaccine arrives? Contact tracing is key, the first step in a process that has proven effective: trace, test, and isolate. Smartphones can collect some of the information required by contact tracers--not just where you've been but also who's been near you. Can we repurpose the tracking technology that we carry with us--devices with GPS, Wi-Fi, Bluetooth, and social media connectivity--to serve public health in a pandemic? In People Count, cybersecurity expert Susan Landau looks at some of the apps developed for contact tracing during the COVID-19 pandemic, finding that issues of effectiveness and equity intersect. Landau explains the effectiveness (or ineffectiveness) of a range of technological interventions, including dongles in Singapore that collect proximity information; India's biometric national identity system; Harvard University's experiment, TraceFi; and China's surveillance network. Other nations rejected China-style surveillance in favor of systems based on Bluetooth, GPS, and cell towers, but Landau explains the limitations of these technologies. She also reports that many current apps appear to be premised on a model of middle-class income and a job that can be done remotely. How can they be effective when low-income communities and front-line workers are the ones who are hit hardest by the virus? COVID-19 will not be our last pandemic; we need to get this essential method of infection control right.
People Over Capital
by Rob HarrisonCapitalism is failing and ordinary people are forced to pay the price. With such deep-rooted problems there is real hunger for alternative ways of organizing our economic system. Answering the question, "Is there a co-operative alternative to capitalism?" this book showcases fourteen responses from economists, academics, co-operators, politicians, and campaigners, exploring both the success and untapped potential of co-operatives. Each essay approaches from a new direction-from the flourishing open source movement to cases of co-operative success in different parts of the world.Rob Harrison has written and commented widely on social change issues for more than twenty years.
People Over Process: Leadership for Agility
by Michael K. LevineThis book is about improving and sustaining agility by focusing on people over process, as the first agile value advocates, and is the third and final book in the author's Lean and Agile Software trilogy. The first – A Tale of Two Systems: Lean and Agile Software Development for Business Leaders – describes what agile is and why we do it. The second – A Tale of Two Transformations: Bringing Lean and Agile Software Development to Life – guides leaders in transforming their organizations to adopt this approach. All three books mix description and elaboration of theory with practical demonstration in fictional companies and projects. This new, third book – People over Process: Leadership for Agility – presents a model of facilitative leadership for agility, which informs the entire book. It begins by describing the roots of the agile movement, which motivates the centrality of people and the need for leadership. The leadership model is then presented, very simply: rigor, alignment, efficiency, through frameworks. Leadership is considered for all team members, and then for the special case of the responsibilities of leaders in formal positions of organizational authority. With this strong background presented, the book proceeds to describe and demonstrate common and highly useful frameworks for agility. The fictional Pacifica Bank is introduced, and we see the Pacifica team work through architecture, project planning, team structure, governance, scrum meeting, and ultimately retrospectives, using frameworks that have been presented. An Appendix summarizes the most useful frameworks for future reference. Throughout the book concepts are illustrated with vignettes from my experience (in the didactic sections) and with the Pacifica fictional case study. The key benefits of the book are to make everyone involved in agile work more effective and fulfilled. Essentially, since agile was first introduced almost two decades ago, the primary focus in practice has been on process. The "scrum" methodology was developed and promulgated, and has been widely adopted. This has been on balance broadly positive, but as an industry we have progressed to the point where following the steps of a methodology, particularly one that seeks to implement concepts where the first value is "People over Process," has reached its limits. The reader of this book: • Gains a powerful, simple model of leadership that enables the "People" in "People over Process;" • Sees these principles in action in a fictional company, making agile leadership understandable and engaging; • Improves their ability to participate in and lead agility; • Learns extraordinarily useful "frameworks" that help in the most important activities in agile software. In short, the reader will be better at delivering valuable software solutions, more valuable to their organizations, and more fulfilled in their work.
People to Follow: A Novel
by Olivia WorleyIn Olivia Worley's pitch-perfect debut, People to Follow, ten teen influencers come to a remote island to star in a reality show, but when one of them winds up dead, they realize that this time, the price of getting “cancelled” could be their lives.A reality show on a remote Caribbean island. Ten teen influencers. One dead body.Welcome to “In Real Life,” the hot new reality show that forces social media’s reigning kings and queens to unplug for three weeks and “go live” without any filters. IRL is supposed to be the opportunity of a lifetime, watched closely by legions of loyal followers. But for these rising stars--including Elody, an Instagram model with an impulsive streak; Kira, a child star turned fitness influencer; Logan, a disgraced TikTok celeb with a secret; and Max, a YouTuber famous for exposés on his fellow creators--it’s about to turn into a nightmare.When the production crew fails to show up and one of their own meets a violent end, these social media moguls find themselves stranded with a dead body and no way to reach the outside world. When they start receiving messages from a mysterious Sponsor threatening to expose their darkest secrets, they realize that they’ve been lured into a deadly game…and one of them might be pulling the strings.With the body count rising and cameras tracking their every move, the creators must figure out who is trying to get them canceled--like, literally--before their #1 follower strikes again.
People, Personal Data and the Built Environment (Springer Series in Adaptive Environments)
by David Kirk Holger SchnädelbachPersonal data is increasingly important in our lives. We use personal data to quantify our behaviour, through health apps or for 'personal branding' and we are also increasingly forced to part with our data to access services. With the proliferation of embedded sensors, the built environment is playing a key role in this developing use of data, even though this remains relatively hidden. Buildings are sites for the capture of personal data. This data is used to adapt buildings to people's behaviour, and increasingly, organisations use this data to understand how buildings are occupied and how communities develop within them. A whole host of technical, practical, social and ethical challenges emerge from this still developing area across interior, architectural and urban design, and many open questions remain.This book makes a contribution to this on-going discourse by bringing together a community of researchers interested in personal informatics and the design of interactive buildings and environments. The book’s aim is to foster critical discussion about the future role of personal data in interactions with the built environment.People, Personal Data and the Built Environment is ideal for researchers and practitioners interested in Architecture, Computer Science and Human Building Interaction.
People, Practice, Power: Digital Humanities outside the Center (Debates in the Digital Humanities)
by Siobhan Senier Anne B. McGrail Angel David NievesAn illuminating volume of critical essays charting the diverse territory of digital humanities scholarship The digital humanities have traditionally been considered to be the domain of only a small number of prominent and well-funded institutions. However, through a diverse range of critical essays, this volume serves to challenge and enlarge existing notions of how digital humanities research is being undertaken while also serving as a kind of alternative guide for how it can thrive within a wide variety of institutional spaces. Focusing on the complex infrastructure that undergirds the field of digital humanities, People, Practice, Power examines the various economic, social, and political factors that shape such academic endeavors. The multitude of perspectives comprising this collection offers both a much-needed critique of the existing structures for digital scholarship and the means to generate broader representation within the field. This collection provides a vital contribution to the realm of digital scholarly research and pedagogy in acknowledging the role that small liberal arts colleges, community colleges, historically black colleges and universities, and other underresourced institutions play in its advancement. Gathering together a range of voices both established and emergent, People, Practice, Power offers practitioners a self-reflexive examination of the current conditions under which the digital humanities are evolving, while helping to open up new sustainable pathways for its future. Contributors: Matthew Applegate, Molloy College; Taylor Arnold, U of Richmond; Eduard Arriaga, U of Indianapolis; Lydia Bello, Seattle U; Kathi Inman Berens, Portland State U; Christina Boyles, Michigan State U; Laura R. Braunstein, Dartmouth College; Abby R. Broughton; Maria Sachiko Cecire, Bard College; Brennan Collins, Georgia State U; Kelsey Corlett-Rivera, U of Maryland; Brittany de Gail, U of Maryland; Madelynn Dickerson, UC Irvine Libraries; Nathan H. Dize, Vanderbilt U; Quinn Dombrowski, Stanford U; Ashley Sanders Garcia, UCLA; Laura Gerlitz; Erin Rose Glass; Kaitlyn Grant; Margaret Hogarth, Claremont Colleges; Maryse Ndilu Kiese, U of Alberta; Pamella R. Lach, San Diego State U; James Malazita, Rensselaer Polytechnic Institute; Susan Merriam, Bard College; Chelsea Miya, U of Alberta; Jamila Moore Pewu, California State U, Fullerton; Urszula Pawlicka-Deger, Aalto U, Finland; Jessica Pressman, San Diego State U; Jana Remy, Chapman U; Roopika Risam, Salem State U; Elizabeth Rodrigues, Grinnell College; Dylan Ruediger, American Historical Association; Rachel Schnepper, Wesleyan U; Anelise Hanson Shrout, Bates College; Margaret Simon, North Carolina State U; Mengchi Sun, U of Alberta; Lauren Tilton, U of Richmond; Michelle R. Warren, Dartmouth College.
People, Problems, and Proofs
by Richard J. Lipton Kenneth W. ReganPeople, problems, and proofs are the lifeblood of theoretical computer science. Behind the computing devices and applications that have transformed our lives are clever algorithms, and for every worthwhile algorithm there is a problem that it solves and a proof that it works. Before this proof there was an open problem: can one create an efficient algorithm to solve the computational problem? And, finally, behind these questions are the people who are excited about these fundamental issues in our computational world. In this book the authors draw on their outstanding research and teaching experience to showcase some key people and ideas in the domain of theoretical computer science, particularly in computational complexity and algorithms, and related mathematical topics. They show evidence of the considerable scholarship that supports this young field, and they balance an impressive breadth of topics with the depth necessary to reveal the power and the relevance of the work described. Beyond this, the authors discuss the sustained effort of their community, revealing much about the culture of their field. A career in theoretical computer science at the top level is a vocation: the work is hard, and in addition to the obvious requirements such as intellect and training, the vignettes in this book demonstrate the importance of human factors such as personality, instinct, creativity, ambition, tenacity, and luck. The authors' style is characterize d by personal observations, enthusiasm, and humor, and this book will be a source of inspiration and guidance for graduate students and researchers engaged with or planning careers in theoretical computer science.
Perceived Privacy in Location-Based Mobile System (T-Labs Series in Telecommunication Services)
by Maija Elina PoikelaThis work aims at understanding behavior around location information, including why users share such information, why they protect the data, and what kind of other factors influence the decision to behave in a certain way. This book explores privacy in the context of location data, and answers questions such as what are the privacy related behaviors in this context, and what are the factors influencing such behaviors. The book gives an overview to what privacy means for users in terms of understandings, attitudes and valuations. This book discusses reasons for why research around this topic is challenging, and presents various methods for diving into the topic through empirical studies. The work is relevant for professionals, researchers, and users of technology.
Perception, Representations, Image, Sound, Music: 14th International Symposium, CMMR 2019, Marseille, France, October 14–18, 2019, Revised Selected Papers (Lecture Notes in Computer Science #12631)
by Mitsuko Aramaki Richard Kronland-Martinet Sølvi YstadThis book constitutes the refereed proceedings of the 14th International Symposium on Perception, Representations, Image, Sound, Music, CMMR 2019, held in Marseille, France, in October 2019. The 46 full papers presented were selected from 105 submissions. The papers are grouped in 9 sections. The first three sections are related to music information retrieval, computational musicology and composition tools, followed by a section on notations and instruments distributed on mobile devices. The fifth section concerns auditory perception and cognition, while the three following sections are related to sound design and sonic and musical interactions. The last section contains contributions that relate to Jean-Claude Risset's research.