- Table View
- List View
The Auditory System at the Cocktail Party
by Arthur N. Popper Richard R. Fay John C. Middlebrooks Jonathan Z. SimonThe Auditory System at the Cocktail Party is a rather whimsical title that points to the very serious challenge faced by listeners in most everyday environments: how to hear out sounds of interest amid a cacophony of competing sounds. The volume presents the mechanisms for bottom-up object formation and top-down object selection that the auditory system employs to meet that challenge. Ear and Brain Mechanisms for Parsing the Auditory Scene by John C. Middlebrooks and Jonathan Z. Simon Auditory Object Formation and Selection by Barbara Shinn-Cunningham, Virginia Best, and Adrian K. C. Lee Energetic Masking and Masking Release by John F. Culling and Michael A. Stone Informational Masking in Speech Recognition by Gerald Kidd, Jr. and H. Steven Colburn Modeling the Cocktail Party Problem by Mounya Elhilali Spatial Stream Segregation by John C. Middlebrooks Human Auditory Neuroscience and the Cocktail Party Problem by Jonathan Z. Simon Infants and Children at the Cocktail Party by Lynne Werner Older Adults at the Cocktail Party by M. Kathleen Pichora-Fuller, Claude Alain, and Bruce A. Schneider Hearing with Cochlear Implants and Hearing Aids in Complex Auditory Scenes by Ruth Y. Litovsky, Matthew J. Goupell, Sara M. Misurelli, and Alan Kan About the Editors: John C. Middlebrooks is a Professor in the Department of Otolaryngology at the University of California, Irvine, with affiliate appointments in the Department of Neurobiology and Behavior, the Department of Cognitive Sciences, and the Department of Biomedical Engineering. Jonathan Z. Simon is a Professor at the University of Maryland, College Park, with joint appointments in the Department of Electrical and Computer Engineering, the Department of Biology, and the Institute for Systems Research. Arthur N. Popper is Professor Emeritus and Research Professor in the Department of Biology at the University of Maryland, College Park. Richard R. Fay is Distinguished Research Professor of Psychology at Loyola University, Chicago. About the Series: The Springer Handbook of Auditory Research presents a series of synthetic reviews of fundamental topics dealing with auditory systems. Each volume is independent and authoritative; taken as a set, this series is the definitive resource in the field.
The Auditor’s Guide to Blockchain Technology: Architecture, Use Cases, Security and Assurance (Security, Audit and Leadership Series)
by Shaun AghiliThe 21st century has been host to a number of information systems technologies in the areas of science, automotive, aviation and supply chain, among others. But perhaps one of its most disruptive is blockchain technology whose origin dates to only 2008, when an individual (or perhaps a group of individuals) using the pseudonym Satoshi Nakamoto published a white paper entitled Bitcoin: A peer-to-peer electronic cash system in an attempt to address the threat of “double- spending” in digital currency. Today, many top-notch global organizations are already using or planning to use blockchain technology as a secure, robust and cutting-edge technology to better serve customers. The list includes such well-known corporate entities as JP Morgan, Royal Bank of Canada, Bank of America, IBM and Walmart. The tamper-proof attributes of blockchain, leading to immutable sets of transaction records, represent a higher quality of evidence for internal and external auditors. Blockchain technology will impact the performance of the audit engagement due to its attributes, as the technology can seamlessly complement traditional auditing techniques. Furthermore, various fraud schemes related to financial reporting, such as the recording of fictitious revenues, could be avoided or at least greatly mitigated. Frauds related to missing, duplicated and identical invoices can also be greatly curtailed. As a result, the advent of blockchain will enable auditors to reduce substantive testing as inherent and control audit risks will be reduced thereby greatly improving an audit’s detection risk. As such, the continuing use and popularity of blockchain will mean that auditors and information systems security professionals will need to deepen their knowledge of this disruptive technology. If you are looking for a comprehensive study and reference source on blockchain technology, look no further than The Auditor’s Guide to Blockchain Technology: Architecture, Use Cases, Security and Assurance. This title is a must read for all security and assurance professionals and students looking to become more proficient at auditing this new and disruptive technology.
The Authoring Problem: Challenges in Supporting Authoring for Interactive Digital Narratives (Human–Computer Interaction Series)
by Alex Mitchell David E. Millard Charlie Hargood Ulrike SpierlingAuthoring, its tools, processes, and design challenges are key issues for the Interactive Digital Narrative (IDN) research community. The complexity of IDN authoring, often involving stories co-created by procedures and user interaction, creates confusion for tool developers and raises barriers for new authors.This book examines these issues from both the tool designer and the author’s perspective, discusses the poetics of IDN and how that can be used to design authoring tools, explores diverse forms of IDN and their demands, and investigates the challenges around conducting research on IDN authoring.To address these challenges, the chapter authors incorporate a range of interdisciplinary perspectives on ‘The Authoring Problem’ in IDN. While existing texts provide ‘how-to’ guidance for authors, this book is a primer for research and practice-based investigations into the authoring problem, collecting the latest thoughts about this area from key researchers and practitioners.
The Authoritative Guide on Harbor: Management and Practice of Cloud Native Artifacts Such as Container Images and Helm Charts
by Yan Wang Haining ZhangHarbor is a major CNCF open source project, with thousands of production users all over the world. This book provides a comprehensive explanation of the open source cloud native registry: Harbor. Written by experts who contributed to and now maintain Harbor, the content covers its architecture, principles, functions, deployment and configuration, scanning artifacts, remote replication, operation and maintenance, customized development, API usage and success stories. The book offers a valuable guide for Harbor users, developers and contributors, cloud native software development engineers, test engineers, operational and maintenance engineers, IT architects and IT technical managers. It will also benefit university students in computer-related disciplines.
The Automated City: Internet of Things and Ubiquitous Artificial Intelligence
by Seng W. Loke Andry RakotonirainyThe book outlines the concept of the Automated City, in the context of smart city research and development. While there have been many other perspectives on the smart city such as the participatory city and the data-centric city, this book focuses on automation for the smart city based on current and emerging technologies such as the Internet of Things, Artificial Intelligence and Robotics. The book attempts to provide a balanced view, outlining the promises and potential of the Automated City as well as the perils and challenges of widespread automation in the city. The book discusses, at some depth, automated vehicles, urban robots and urban drones as emerging technologies that will automate many aspects of city life and operation, drawing on current work and research literature. The book also considers broader perspectives of the future city, in the context of automation in the smart city, including aspirational visions of cities, transportation, new business models, and socio-technological challenges, from urban edge computing, ethics of the Automated City and smart devices, to large scale cooperating autonomous systems in the city.
The Autonomous Revolution: Reclaiming the Future We’ve Sold to Machines
by Michael S. Malone William H. DavidowThe coauthors of the seminal book The Virtual Corporation describe how the rise of artificial intelligence and virtual environments are ushering in an epic cultural transformation—and how we can thrive in this new era.We are at the dawn of the Autonomous Revolution, a turning point in human history as decisive as the Agricultural and Industrial Revolutions. More and more, AI-based machines are replacing human beings, and online environments are gathering our data and using it to manipulate us. This loss of human autonomy amounts to nothing less than a societal phase change, a fundamental paradigm shift. The same institutions will remain—schools, banks, churches, and corporations—but they will radically change form, obey new rules, and use new tools. William H. Davidow and Michael S. Malone go deeply into the enormous implications of these developments. They show why increases in productivity no longer translate into increases in the GDP and how zero cost, one-to-many communications have been turned into tools for cybercrime and propaganda. Many of the book's recommendations—such as using taxes to control irresponsible internet behavior and enabling people to put their data into what are essentially virtual personal information "safety deposit boxes"—are bold and visionary, but we must figure out how we will deal with these emerging challenges now, before the Autonomous Revolution overcomes us.
The Autonomous System
by Szabolcs Michael de Gyurky Mark A. TarbellThe Fundamental Science in "Computer Science" Is the Science of ThoughtFor the first time, the collective genius of the great 18th-century German cognitive philosopher-scientists Immanuel Kant, Georg Wilhelm Friedrich Hegel, and Arthur Schopenhauer have been integrated into modern 21st-century computer science.In contrast to the languishing mainstream of Artificial Intelligence, this book takes the human thought system as its model, resulting in an entirely different approach. This book presents the architecture of a thoroughly and broadly educated human mind as translated into modern software engineering design terms.The result is The Autonomous System, based on dynamic logic and the architecture of the human mind. With its human-like intelligence, it is capable of rational thought, reasoning, and an understanding of itself and its tasks."A system of thoughts must always have an architectural structure."--Arthur Schopenhauer, The World as Will and Presentation
The Autonomous Web (Studies in Big Data #101)
by Herwig Unger Mario KubekThis book initiates a transformation of the Web into a self-managing, autonomous information system to challenge today’s all-embracing role of big search engines as centralized information managers. In the last decades, the World Wide Web became the biggest source for all kinds of information needed. After a short review of the state of the art, a Web-based system is presented for the first time, which employs all its instances equally to provide, consume, and process information uniformly and consistently. In order to build such an efficient, decentralized, and fully integrated information space with all its needed functionalities, a set of diverse algorithms is introduced. These novel mechanisms for load balancing, routing, clustering, document classification, but also time-dependent information management pertain to almost all system levels. Finally, three different approaches to decentralized Web search are discussed that represent the backbone of the new autonomous Web.
The Avatar Faculty: Ecstatic Transformations in Religion and Video Games (Ethnographic Studies in Subjectivity #16)
by Jeffrey G. SnodgrassThe Avatar Faculty creatively examines the parallels between spiritual and digital activities to explore the roles that symbolic second selves—avatars—can play in our lives. The use of avatars can allow for what anthropologists call ecstasy, from the Greek ekstasis, meaning "standing outside oneself." The archaic techniques of promoting spiritual ecstasy, which remain central to religious healing traditions around the world, now also have contemporary analogues in virtual worlds found on the internet. In this innovative book, Jeffrey G. Snodgrass argues that avatars allow for the ecstatic projection of consciousness into alternate realities, potentially providing both the spiritually possessed and gamers access to superior secondary identities with elevated social standing. Even if only temporary, self-transformations of these kinds can help reduce psychosocial stress and positively improve health and well-being.
The Avid Handbook: Advanced Techniques, Strategies, and Survival Information for Avid Editing Systems
by Greg Staten Steve BayesBrimming with workflow efficiencies for the experienced editor, The Avid Handbook teaches you the hows and whys of operating the system in order to reach streamlined, creative end solutions. The book emphasizes time-saving techniques, shortcuts, and workflow procedures- the true keys to getting a job done.The book has also been updated to include new information on HD formats and workflows, color-correction and grading capability enhancements, MXF media standardization, and much more.Also new to this edition are an 8 page 4-color insert, adding depth to the color-correction lessons, as well as running sidebars throughout the book, calling out time-saving tips and techniques.
The Azure Cloud Native Architecture Mapbook: Explore Microsoft Cloud's infrastructure, application, data, and security architecture
by Ed Price Stephane EyskensImprove your Azure architecture practice and set out on a cloud and cloud-native journey with this Azure cloud native architecture guideKey FeaturesDiscover the key drivers of successful Azure architectureImplement architecture maps as a compass to tackle any challengeUnderstand architecture maps in detail with the help of practical use casesBook DescriptionAzure offers a wide range of services that enable a million ways to architect your solutions. Complete with original maps and expert analysis, this book will help you to explore Azure and choose the best solutions for your unique requirements. Starting with the key aspects of architecture, this book shows you how to map different architectural perspectives and covers a variety of use cases for each architectural discipline. You'll get acquainted with the basic cloud vocabulary and learn which strategic aspects to consider for a successful cloud journey. As you advance through the chapters, you'll understand technical considerations from the perspective of a solutions architect. You'll then explore infrastructure aspects, such as network, disaster recovery, and high availability, and leverage Infrastructure as Code (IaC) through ARM templates, Bicep, and Terraform. The book also guides you through cloud design patterns, distributed architecture, and ecosystem solutions, such as Dapr, from an application architect's perspective. You'll work with both traditional (ETL and OLAP) and modern data practices (big data and advanced analytics) in the cloud and finally get to grips with cloud native security. By the end of this book, you'll have picked up best practices and more rounded knowledge of the different architectural perspectives.What you will learnGain overarching architectural knowledge of the Microsoft Azure cloud platformExplore the possibilities of building a full Azure solution by considering different architectural perspectivesImplement best practices for architecting and deploying Azure infrastructureReview different patterns for building a distributed application with ecosystem frameworks and solutionsGet to grips with cloud-native concepts using containerized workloadsWork with AKS (Azure Kubernetes Service) and use it with service mesh technologies to design a microservices hosting platformWho this book is forThis book is for aspiring Azure Architects or anyone who specializes in security, infrastructure, data, and application architecture. If you are a developer or infrastructure engineer looking to enhance your Azure knowledge, you'll find this book useful.
The Azure Data Lakehouse Toolkit: Building and Scaling Data Lakehouses on Azure with Delta Lake, Apache Spark, Databricks, Synapse Analytics, and Snowflake
by Ron L'EsteveDesign and implement a modern data lakehouse on the Azure Data Platform using Delta Lake, Apache Spark, Azure Databricks, Azure Synapse Analytics, and Snowflake. This book teaches you the intricate details of the Data Lakehouse Paradigm and how to efficiently design a cloud-based data lakehouse using highly performant and cutting-edge Apache Spark capabilities using Azure Databricks, Azure Synapse Analytics, and Snowflake. You will learn to write efficient PySpark code for batch and streaming ELT jobs on Azure. And you will follow along with practical, scenario-based examples showing how to apply the capabilities of Delta Lake and Apache Spark to optimize performance, and secure, share, and manage a high volume, high velocity, and high variety of data in your lakehouse with ease.The patterns of success that you acquire from reading this book will help you hone your skills to build high-performing and scalable ACID-compliant lakehouses using flexible and cost-efficient decoupled storage and compute capabilities. Extensive coverage of Delta Lake ensures that you are aware of and can benefit from all that this new, open source storage layer can offer. In addition to the deep examples on Databricks in the book, there is coverage of alternative platforms such as Synapse Analytics and Snowflake so that you can make the right platform choice for your needs.After reading this book, you will be able to implement Delta Lake capabilities, including Schema Evolution, Change Feed, Live Tables, Sharing, and Clones to enable better business intelligence and advanced analytics on your data within the Azure Data Platform.What You Will LearnImplement the Data Lakehouse Paradigm on Microsoft’s Azure cloud platformBenefit from the new Delta Lake open-source storage layer for data lakehouses Take advantage of schema evolution, change feeds, live tables, and moreWrite functional PySpark code for data lakehouse ELT jobsOptimize Apache Spark performance through partitioning, indexing, and other tuning optionsChoose between alternatives such as Databricks, Synapse Analytics, and SnowflakeWho This Book Is ForData, analytics, and AI professionals at all levels, including data architect and data engineer practitioners. Also for data professionals seeking patterns of success by which to remain relevant as they learn to build scalable data lakehouses for their organizations and customers who are migrating into the modern Azure Data Platform.
The BBC: Myth of a Public Service
by Tom MillsThe BBC: the mouthpiece of the Establishment?The BBC is one of the most important institutions in Britain; it is also one of the most misunderstood. Despite its claim to be independent and impartial, and the constant accusations of a liberal bias, the BBC has always sided with the elite. As Tom Mills demonstrates, we are only getting the news that the Establishment wants aired in public.Throughout its existence, the BBC has been in thrall to those in power. This was true in 1926 when it stood against the workers during the General Strike, and since then the Corporation has continued to mute the voices of those who oppose the status quo: miners in 1984; anti-war protesters in 2003; those who offer alternatives to austerity economics since 2008. From the outset much of its activity has been scrutinised by the secret services at the invitation of those in charge. Since the 1990s the BBC has been integrated into the market, while its independence from government and big business has been steadily eroded. The BBC is an important and timely examination of a crucial public institution that is constantly under threat.
The BDD Books - Discovery: Explore behavior using examples
by Seb Rose Gaspar NagyGet the most out of the discovery phase of Behavior Driven Development (BDD) Key Features Get a comprehensive overview of the discovery phase and see where it fits into BDD Learn specific technical practices needed to successfully drive development Gain insight into how to use BDD in almost any project – not just agile approaches Book Description Behavior-Driven Development (BDD) is an agile approach to software development that insists that detailed requirements for a feature should be defined collaboratively by the business and delivery teams. This book explores, in detail, the collaborative aspect of BDD. The book starts by explaining the need for BDD and describes techniques for getting the most out of the collaboration between the delivery team (those that implement the solution) and the business team (those that work on the requirements). You'll also learn how BDD can be integrated into the development process and answer some common questions, such as “Who should write the scenarios?" and “Should the testers or the developers automate the scenarios?” The last chapters discuss how to use BDD in agile and fixed-price projects and how to involve your business partners in your projects. By the end of the book, you'll have discovered the importance of collaboration and learned techniques to effectively implement these ideas in your software development lifecycle. What you will learn Explore why BDD exists, what challenges it addresses, and how it works Establish structured conversations to finalize requirements Discover techniques to form concrete examples that clearly list requirements Gain insight into the tasks involved while following the BDD approach Get good automated test coverage by tightly connecting tests and scenarios Develop scenarios to get a functional breakdown of a story Who this book is for This book is written for everyone involved in the specification and delivery of software (including product owners, business analysts, developers, and testers). This book is aimed at everyone involved in the project, irrespective of your role, whether you come from a software background or not.
The BOXES Methodology
by David W. RussellRobust control mechanisms customarily require knowledge of the system's describing equations which may be of the high order differential type. In order to produce these equations, mathematical models can often be derived and correlated with measured dynamic behavior. There are two flaws in this approach one is the level of inexactness introduced by linearizations and the other when no model is apparent. Several years ago a new genre of control systems came to light that are much less dependent on differential models such as fuzzy logic and genetic algorithms. Both of these soft computing solutions require quite considerable a priori system knowledge to create a control scheme and sometimes complicated training program before they can be implemented in a real world dynamic system. Michie and Chambers' BOXES methodology created a black box system that was designed to control a mechanically unstable system with very little a priori system knowledge, linearization or approximation. All the method needed was some notion of maximum and minimum values for the state variables and a set of boundaries that divided each variable into an integer state number. The BOXES Methodology applies the method to a variety of systems including continuous and chaotic dynamic systems, and discusses how it may be possible to create a generic control method that is self organizing and adaptive that learns with the assistance of near neighbouring states. The BOXES Methodology introduces students at the undergraduate and master's level to black box dynamic system control , and gives lecturers access to background materials that can be used in their courses in support of student research and classroom presentations in novel control systems and real-time applications of artificial intelligence. Designers are provided with a novel method of optimization and controller design when the equations of a system are difficult or unknown. Researchers interested in artificial intelligence (AI) research and models of the brain and practitioners from other areas of biology and technology are given an insight into how AI software can be written and adapted to operate in real-time.
The BOXES Methodology Second Edition: Black Box Control of Ill-defined Systems
by David W. RussellThis book focuses on how the BOXES Methodology, which is based on the work of Donald Michie, is applied to ill-defined real-time control systems with minimal a priori knowledge of the system. The method is applied to a variety of systems including the familiar pole and cart. This second edition includes a new section that covers some further observations and thoughts, problems, and evolutionary extensions that the reader will find useful in their own implementation of the method. This second edition includes a new section on how to handle jittering about a system boundary which in turn causes replicated run times to become part of the learning mechanism. It also addresses the aging of data values using a forgetfulness factor that causes wrong values of merit to be calculated. Another question that is addressed is “Should a BOXES cell ever be considered fully trained and, if so, excluded from further dynamic updates”. Finally, it expands on how system boundaries may be shifted using data from many runs using an evolutionary paradigm.
The Backlash: Right-Wing Radicals, High-Def Hucksters, and Paranoid Politics in the Age of Obama
by Will BunchIn The Backlash, Liberal columnist and Pulitzer Prize-winning political reporter Will Bunch goes behind the scenes of America’s new extreme right-wing minority to explore how their campaign of misinformation, their distortion of President Obama, and their collective fear of the future combine to pose a very real threat to our democratic system. From health care reform to immigration policies, The Backlash is a gripping investigation into the emerging voice of the dangerous American right wing.
The Balancing Problem in the Governance of Artificial Intelligence
by Tshilidzi MarwalaThis book examines the balancing problems in the governance of artificial intelligence (AI). AI is transforming the world at an unprecedented pace, which is revolutionary and presents significant challenges. Nevertheless, AI's complex balance dilemma necessitates careful governance as it transforms businesses, economies, and society. Fundamental issues discussed in this book include the complexities of AI's dual nature, the challenges of aligning memorizing with thinking, and the trade-offs between opportunity seeking and risk aversion. This book explores the complex interplay between AI security and transparency, the technical decision between CPUs and GPUs, and the expanding potential of quantum computing. Nevertheless, the challenge of maintaining balance is not resolved by technological advancements. It encompasses the global arena, where the forces of globalization and localization must be reconciled, and the governance sphere, where self-regulation must coexist with government control. Comprising cutting-edge research, real-world examples, and futuristic perspectives, this book guides researchers, practitioners, politicians, entrepreneurs, and leaders in navigating AI's future. The reader will learn how to capitalize on the potential of AI while avoiding its weaknesses, ensuring that this disruptive technology benefits society.
The Basics of Bitcoins and Blockchains: An Introduction to Cryptocurrencies and the Technology that Powers Them
by Antony LewisDiscover the Surprising History of Ordinary Things"Emily magically weaves a vibrant history of simple everyday objects we often take for granted. The Story Behind will surprise and delight..." ─Deana Marie, Creator & Host of the Twisted Philly podcast#1 Best Seller in Trivia & Fun Facts, Art History, Design History & Criticism, Reference, Decorative Arts & Design, and History of TechnologyLearn the fascinating history and trivia you never knew about things we use daily, from the host of The Story Behind podcast.Everyday objects and major events in history. Every single thing that surrounds us has a story behind it. Many of us learn the history of humans and the major inventions that shaped our world. But what you may not have learned is the history of objects we surround ourselves with every day. You might not even know how the major events in history (World Wars, ancient civilizations, revolutions, etc.) influenced the inventions of things we use today.The history and science behind the ordinary. From the creator of The Story Behind podcast comes one of the coolest coffee table books ever written. The Story Behind provides insight into everyday objects we don’t think much about as we use them. Topics covered in Emily’s podcast are examined in more detail along with new fascinating topics. Learn how lollipops got started in Ancient Egypt, how podcasts were invented, and why Comic Sans was created. Learn the torture device origins of certain exercise equipment and the espionage beginnings of certain musical instruments. Ordinary things from science to art, food to sports, customs to fashion, and more are explored.Inside:Learn obscure history and fun facts and change the way you see the worldDiscover how major historic events still affect us todayBecome a formidable trivia masterIf you have enjoyed books such as Now I Know, What If?, Ever Wonder Why?, The Greatest Stories Never Told, or Atlas Obscura; you will be entertained by The Story Behind.
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
by David Kennedy Patrick EngebretsonThe Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate. Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases. Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University. Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test.
The Battle for Your Computer: Israel and the Growth of the Global Cyber-Security Industry
by Alon ArvatzDiscover the extraordinary realities of the world’s most advanced cybersecurity companies and tech In The Battle for Your Computer: Israel and the Growth of the Global Cyber-Security Industry, Israeli Defense Force (IDF) cyberwarfare veteran and tech product leader Alon Arvatz examines the “why” and the “how” of the extraordinarily strong connection between Israel’s elite cyber military unit and that country’s booming offensive and defensive cybersecurity industry. In the book, you’ll explore the central role played by Israel in the global fight for cybersecurity supremacy. Featuring interviews with some of the world’s leading cybersecurity professionals and leaders, The Battle for Your Computer explains how the IDF’s “Unit 8200” became the globe’s most fruitful incubator of cyber technologies. You’ll also find: Explanations of how the technologies that protect your own computers at home and at work probably began their lives in IDF personnel or equipment The stories of the men and women working to protect Israel and how they pivoted to protecting her technology against attack Answers to fascinating questions like: How does an offensive cyber company decide to whom to sell its tech?An endlessly engrossing take on an equally engrossing subject, The Battle for Your Computer is a must-read for laypeople and cyber experts alike.
The Beauty of Mathematics in Computer Science
by Jun WuThe Beauty of Mathematics in Computer Science explains the mathematical fundamentals of information technology products and services we use every day, from Google Web Search to GPS Navigation, and from speech recognition to CDMA mobile services. The book was published in Chinese in 2011 and has sold more than 600,000 copies. Readers were surprised to find that many daily-used IT technologies were so tightly tied to mathematical principles. For example, the automatic classification of news articles uses the cosine law taught in high school. The book covers many topics related to computer applications and applied mathematics including: Natural language processing Speech recognition and machine translation Statistical language modeling Quantitive measurement of information Graph theory and web crawler Pagerank for web search Matrix operation and document classification Mathematical background of big data Neural networks and Google’s deep learning Jun Wu was a staff research scientist in Google who invented Google’s Chinese, Japanese, and Korean Web Search Algorithms and was responsible for many Google machine learning projects. He wrote official blogs introducing Google technologies behind its products in very simple languages for Chinese Internet users from 2006-2010. The blogs had more than 2 million followers. Wu received PhD in computer science from Johns Hopkins University and has been working on speech recognition and natural language processing for more than 20 years. He was one of the earliest engineers of Google, managed many products of the company, and was awarded 19 US patents during his 10-year tenure there. Wu became a full-time VC investor and co-founded Amino Capital in Palo Alto in 2014 and is the author of eight books.
The Beckstead Wedding
by David BecksteadAmerican Photo magazine named David Beckstead one of the Top Ten Wedding Photographers in the World. He's an industry leader with a reputation for quality work and giving back to the industry. In this book, readers will get a behind-the-scenes look at Beckstead's unique, stylized wedding images, learning the tips, tricks and insights that have thrust him into the wedding industry's spotlight. From straight talk about camera work (exposure settings, lens selection, camera angle, and more) to lighting (indoors and outdoors, working in an array of conditions), to composition (using color, visual shapes, leading lines, contrast, and more), Beckstead shows readers how to maximize their skills while learning to see and create more stylized photographs, avoid pitfalls, cultivate a distinctive look, and create high-impact photographs that will send waves of excitement to prospective clients who know what they want and are willing to go the distance (financially and geographically) to get it.
The Bedford Researcher
by Mike PalmquistTech-savvy and student-friendly, The Bedford Researcher addresses the kinds of writing students actually do and the kinds of sources they actually use, from multimodal projects and oral presentations to Web sites and digital databases. The Bedford Researcher strips away the complexities of research writing across the disciplines and offers the practical help students need to write with confidence while integrating electronic sources and tools into each stage of the process.
The Beginner's Guide to Data Science
by Robert Ball Brian RagueThis book discusses the principles and practical applications of data science, addressing key topics including data wrangling, statistics, machine learning, data visualization, natural language processing and time series analysis. Detailed investigations of techniques used in the implementation of recommendation engines and the proper selection of metrics for distance-based analysis are also covered.Utilizing numerous comprehensive code examples, figures, and tables to help clarify and illuminate essential data science topics, the authors provide an extensive treatment and analysis of real-world questions, focusing especially on the task of determining and assessing answers to these questions as expeditiously and precisely as possible. This book addresses the challenges related to uncovering the actionable insights in “big data,” leveraging database and data collection tools such as web scraping and text identification.This book is organized as 11 chapters, structured as independent treatments of the following crucial data science topics:Data gathering and acquisition techniques including data creationManaging, transforming, and organizing data to ultimately package the information into an accessible format ready for analysisFundamentals of descriptive statistics intended to summarize and aggregate data into a few concise but meaningful measurementsInferential statistics that allow us to infer (or generalize) trends about the larger population based only on the sample portion collected and recordedMetrics that measure some quantity such as distance, similarity, or error and which are especially useful when comparing one or more data observationsRecommendation engines representing a set of algorithms designed to predict (or recommend) a particular product, service, or other item of interest a user or customer wishes to buy or utilize in some mannerMachine learning implementations and associated algorithms, comprising core data science technologies with many practical applications, especially predictive analyticsNatural Language Processing, which expedites the parsing and comprehension of written and spoken language in an effective and accurate mannerTime series analysis, techniques to examine and generate forecasts about the progress and evolution of data over timeData science provides the methodology and tools to accurately interpret an increasing volume of incoming information in order to discern patterns, evaluate trends, and make the right decisions. The results of data science analysis provide real world answers to real world questions. Professionals working on data science and business intelligence projects as well as advanced-level students and researchers focused on data science, computer science, business and mathematics programs will benefit from this book.