Browse Results

Showing 54,726 through 54,750 of 61,805 results

The Cloud DBA-Oracle

by Abhinivesh Jain Niraj Mahajan

Learn how to define strategies for cloud adoption of your Oracle database landscape. Understand private cloud, public cloud, and hybrid cloud computing in order to successfully design and manage databases in the cloud. The Cloud DBA-Oracle provides an overview of Database-as-a-Service (DBaaS) that you can use in defining your cloud adoption strategy. In-depth details of various cloud service providers for Oracle database are given, including Oracle Cloud and Amazon Web Services (AWS). Database administration techniques relevant to hosting databases in the cloud are shown in the book as well as the technical details needed to perform all database administration tasks and activities, such as migration to the cloud, backup in the cloud, and new database setup in the cloud. You will learn from real-world business cases and practical examples of administration of Oracle database in the cloud, highlighting the challenges faced and solutions implemented. What you will learn: Cloud computing concepts from the DBA perspective, such as private cloud, public cloud, hybrid cloud Technical details of all aspects of cloud database administration Challenges faced during setup of databases in private cloud or database migration to public cloud Key points to be kept in mind during database administration in the cloud Practical examples of successful Oracle database cloud migration and support Who Is This Book For All levels of IT professionals, from executives responsible for determining database strategies to database administrators and database architects who manage and design databases.

The Cloud Data Lake: A Guide to Building Robust Cloud Data Architecture

by Rukmani Gopalan

More organizations than ever understand the importance of data lake architectures for deriving value from their data. Building a robust, scalable, and performant data lake remains a complex proposition, however, with a buffet of tools and options that need to work together to provide a seamless end-to-end pipeline from data to insights.This book provides a concise yet comprehensive overview on the setup, management, and governance of a cloud data lake. Author Rukmani Gopalan, a product management leader and data enthusiast, guides data architects and engineers through the major aspects of working with a cloud data lake, from design considerations and best practices to data format optimizations, performance optimization, cost management, and governance.Learn the benefits of a cloud-based big data strategy for your organizationGet guidance and best practices for designing performant and scalable data lakesExamine architecture and design choices, and data governance principles and strategiesBuild a data strategy that scales as your organizational and business needs increaseImplement a scalable data lake in the cloudUse cloud-based advanced analytics to gain more value from your data

The Cloud Leader’s Handbook: Strategically Innovate, Transform, and Scale Organizations

by Ron C. L'Esteve

This book is a comprehensive guide covering modern cloud strategies and leadership approaches for building and scaling organizations to maturity on their cloud adoption journey. The book starts by examining technical topics from the perspective of the cloud leader, who is responsible for cloud teams and accountable for cloud products and platforms within their organization. Through a series of practical insights and real-world examples, you will gain a deep understanding of the key considerations for leading a cloud-driven organization. These considerations include understanding the benefits of digital transformation, managing global tech teams, and delivering excellence through platform ownership. Towards the end of the book, you will explore the latest trends and best practices for strategically innovating and scaling your organization in the cloud. With the knowledge gained from this book, you will be able to harness the power of the cloud to drive business success and gain valuable insights and practical strategies to support and empower the adoption of modern cloud platforms and technologies for your clients and organization. The Cloud Leader's Handbook is a must-read for any Cloud Leader who wants to stay ahead of the curve and achieve success in the rapidly evolving world of cloud computing. What Will You LearnDevelop a strong foundation in the technical aspects of cloud leadershipUnderstand the benefits of digital transformation and how to lead a cloud-driven organization, including managing global tech teams.Discover the bleeding-edge cloud trends that are influencing organizational roadmapsTransition into the role of the modern Cloud Leader by gaining a deeper perspective around what it means to own, manage, administer, govern, and optimize the modern cloud platformLearn how to effectively envision, manage, and deploy modern cloud transformation projects through successful approaches around innovation, strategy, and excellence Who This Book Is ForExperienced IT professionals and business leaders looking to understand the power of the cloud.

The Cloud at Your Service: The when, how, and why of enterprise cloud computing

by Jonathan Rosenberg Arthur Mateos

Cloud Computing is here to stay. As an economically viable way for businesses of all sizes to distribute computing, this technology shows tremendous promise. But the intense hype surrounding the Cloud is making it next to impossible for responsible IT managers and businessdecision-makers to get a clear understanding of what the Cloud really means, what it might do for them, when it is practical, and what their future with the Cloud looks like.The Cloud at Your Service helps cut through all this fog to help enterprises make these critical decisions based on facts and the authors' informed unbiased recommendations and predictions. Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.

The Cloud in IoT-enabled Spaces

by Fadi Al-Turjman

The Cloud in IoT-enabled Spaces addresses major issues and challenges in IoT-based solutions proposed for the Cloud. It paves the way for IoT-enabled spaces in the next generation cloud computing paradigm and opens the door for further innovative ideas. Topics include Cloud-based optimization in the IoT era, scheduling and routing, medium access, data caching, secure access, uncertainty, home automation, machine learning in wearable devices, energy monitoring, and plant phenotyping in farming. Smart spaces are solutions where Internet of Things (IoT)-enabling technologies have been employed towards further advances in the lifestyle. It tightly integrates with the existing Cloud infrastructure to impact several fields in academia and industry. The Cloud in IoT-enabled Spaces provides an overview of the issues around small spaces and proposes the most up-to-date alternatives and solutions. The objective is to pave the way for IoT-enabled spaces in the next-generation Cloud computing and open the door for further innovative ideas.

The Cloud-to-Thing Continuum: Opportunities and Challenges in Cloud, Fog and Edge Computing (Palgrave Studies in Digital Business & Enabling Technologies)

by Theo Lynn Brian Lee John G. Mooney Patricia Takako Endo

The Internet of Things offers massive societal and economic opportunities while at the same time significant challenges, not least the delivery and management of the technical infrastructure underpinning it, the deluge of data generated from it, ensuring privacy and security, and capturing value from it.This Open Access Pivot explores these challenges, presenting the state of the art and future directions for research but also frameworks for making sense of this complex area. This book provides a variety of perspectives on how technology innovations such as fog, edge and dew computing, 5G networks, and distributed intelligence are making us rethink conventional cloud computing to support the Internet of Things. Much of this book focuses on technical aspects of the Internet of Things, however, clear methodologies for mapping the business value of the Internet of Things are still missing. We provide a value mapping framework for the Internet of Things to address this gap. While there is much hype about theInternet of Things, we have yet to reach the tipping point. As such, this book provides a timely entrée for higher education educators, researchers and students, industry and policy makers on the technologies that promise to reshape how society interacts and operates.

The Cluetrain Manifesto: The End of Business as Usual

by David Weinberger Christopher Locke Fredrick Levine David Searls

The book provides a contrast in business and brand promotions from conventional methods to the internet age, where the conversations of connectedness have changed both the business we do, and the way its done.

The Cobra Event: A Novel

by Richard Preston

A deadly virus - and a desperate race against time.'One of the most horrifying things I've ever read in my entire life' Stephen KingOne spring morning in New York City a seventeen-year-old student wakes up feeling vaguely ill. Hours later she is having violent seizures, blood is pouring out of her nose, and she begins to attack her own body in the most hideous way imaginable. Soon, other gruesome deaths of a similar nature have been discovered, and the autopsies reveal that a previously unknown virus is at large. It replicates horribly fast, it is always fatal - and is just too efficient to be entirely natural.When the Centre for Disease Control sends a forensic pathologist to investigate, her discoveries precipitate a national crisis.THE COBRA EVENT is a dramatic, heart-stopping thriller of an all-too-real threat.

The Code Book: How to Make it, Break it, Hack it, Crack it

by Simon Singh

It's known as the science of secrecy. Cryptography: the encoding and de coding of private information. And it is history's most fascinating story of intrigue and cunning. The battle between codemakers and codebreakers has been going on for centuries: from Julius Caesar and his Caesar cipher to the codebreaking achievements of the tenth-century Arabs; from the code used by Mary Queen of Scots in an attempt to dethrone Elizabeth I to Sir Francis Walsingham's decipherment of that code, which led to Mary's execution for treason; from the Germans' use of the Enigma machine for automatic encryption in the Second World War to Alan Turing's efforts to infiltrate Enigma, which contributed to the Allied victory. And the battle rages on. How private are your e-mail communications? How secure is sending your credit card information over the Internet? And how much secrecy will the government tolerate? Simon Singh follows the evolution of secret writing with a clarity that lets the reader enjoy the captivating story while easily absorbing the details of cryptography. Woven throughout are clear and concise illustrations of the processes of enciphering and deciphering. Accessible, compelling and timely, this international bestseller, now adapted for young people, is sure to make readers see the past- and the future-in a whole new way.

The Code of Honor: Embracing Ethics in Cybersecurity

by Paul J. Maurer Ed Skoudis

A comprehensive and practical framework for ethical practices in contemporary cybersecurity While some professions – including medicine, law, and engineering – have wholeheartedly embraced wide-ranging codes of ethics and conduct, the field of cybersecurity continues to lack an overarching ethical standard. This vacuum constitutes a significant threat to the safety of consumers and businesses around the world, slows commerce, and delays innovation. The Code of Honor: Embracing Ethics in Cybersecurity delivers a first of its kind comprehensive discussion of the ethical challenges that face contemporary information security workers, managers, and executives. Authors Ed Skoudis, President of the SANS Technology Institute College and founder of the Counter Hack team, and Dr. Paul Maurer, President of Montreat College, explain how timeless ethical wisdom gives birth to the Cybersecurity Code which is currently being adopted by security practitioners and leaders around the world. This practical book tells numerous engaging stories that highlight ethically complex situations many cybersecurity and tech professionals commonly encounter. It also contains compelling real-world case studies – called Critical Applications – at the end of each chapter that help the reader determine how to apply the hands-on skills described in the book. You'll also find: A complete system of cybersecurity ethics relevant to C-suite leaders and executives, front-line cybersecurity practitioners, and students preparing for careers in cybersecurity. Carefully crafted frameworks for ethical decision-making in cybersecurity. Timeless principles based on those adopted in countless professions, creeds, and civilizations. Perfect for security leaders, operations center analysts, incident responders, threat hunters, forensics personnel, and penetration testers, The Code of Honor is an up-to-date and engaging read about the ethically challenging world of modern cybersecurity that will earn a place in the libraries of aspiring and practicing professionals and leaders who deal with tech every day.

The Coder's Path to Wealth and Independence

by Mark Beckner

Developers, programmers, technical architects, and consultants: You are highly skilled and have deep commitment to your craft as well as the motivation to excel. It's time to step away from the perceived security of a full-time salaried position, or a marginally successful solo business, and step into a world of freedom, independence, and wealth. With your current technical skills, and an open mind, you can rapidly build a highly successful and ethical business--and on your own terms. The Coder's Path to Wealth and Independence explains how. Mark Beckner, himself, a highly successful itinerant developer, shows you how to transform yourself from a skilled programmer into a highly creative and effective businessperson leveraging the skills you already have. You will learn to create opportunities where none have existed, create value for yourself and those you work with, substantially increase your income, define your ideals, and realize your dreams. By utilizing the unique strategies outlined in The Coder's Path to Wealth and Independence to build your practice, you will find your path to personal, professional, and financial prosperity. The Coder's Path to Wealth and Independence will show you how to: Work from wherever you want Use your technical skills to create a high-revenue, highly independent business Learn the skills of the "rainmaker" to acquire new projects and clients Operate under various fee models, allowing you to increase your wealth and your freedom Rapidly create proposals and contracts Manage projects and execute on your goals with greater skill than ever In short, this book will help you discover a variety of powerful and unique approaches to business that will allow you be highly successful--where, how, and whenever you want. What you'll learn How to take your technical skills and create a high revenue, highly independent business based on them How to work from wherever you want, and stay in constant motion, on your terms How to create opportunities through unique approaches to client acquisition and advertising How to focus on self-mastery and discipline in order to create a thriving practice How to implement a powerful business model, tailored to solo developers and technical consultants, that enables you to work when, where, and how you want Who this book is for Coders, architects, and technical consultants, and anyone in the world of technology all have the core skills required to follow this path to freedom and riches. This is a guide targeted at people who want to create and grow thriving and rewarding solo, technically focused practices. Table of Contents Chapter 1: Travel: The Power of Staying in Motion Chapter 2: Skills: The Nature of Programming and Business Chapter 3: Discipline and Education: The Importance of Continuous Improvement Chapter 4: Ethics: The Foundation of Relationships and Business Chapter 5: Structuring Your Business: Protecting Yourself Chapter 6: Advertising and Marketing: The Science of Lead Creation Chapter 7: Prospecting and Sales: The Art of Rainmaking Chapter 8: Proposals and Contracts: Trust, Flexibility and Simplicity Chapter 9: Fees and Income: Creating a High Dollar Revenue Stream Chapter 10: Goal Setting: The Engine Behind Your Success Chapter 11: Growth and Expansion: Handling Success Chapter 12: Investing in Your Business and Utilizing Wealth: The Abundance Mentality Chapter 13: Health: Personal Vitality and the Impact on Your Business Chapter 14: Freedom through Business: Wealth, Dreams, and Independence

The Coevolution: The Entwined Futures of Humans and Machines (The\mit Press Ser.)

by Edward Ashford Lee

Should digital technology be viewed as a new life form, sharing our ecosystem and coevolving with us?Are humans defining technology, or is technology defining humans? In this book, Edward Ashford Lee considers the case that we are less in control of the trajectory of technology than we think. It shapes us as much as we shape it, and it may be more defensible to think of technology as the result of a Darwinian coevolution than the result of top-down intelligent design. Richard Dawkins famously said that a chicken is an egg's way of making another egg. Is a human a computer's way of making another computer? To understand this question requires a deep dive into how evolution works, how humans are different from computers, and how the way technology develops resembles the emergence of a new life form on our planet.Lee presents the case for considering digital beings to be living, then offers counterarguments. What we humans do with our minds is more than computation, and what digital systems do—be teleported at the speed of light, backed up, and restored—may never be possible for humans. To believe that we are simply computations, he argues, is a “dataist” faith and scientifically indefensible. Digital beings depend on humans—and humans depend on digital beings. More likely than a planetary wipe-out of humanity is an ongoing, symbiotic coevolution of culture and technology.

The Cognitive Early Warning Predictive System Using the Smart Vaccine: The New Digital Immunity Paradigm for Smart Cities and Critical Infrastructure

by Rocky Termanini

This book introduces the Cognitive Early Warning Predictive System (CEWPS ) as the new digital immune system. Similar to the human immune system, CEWPS relies on true or "inoculated" sickness experience to defend the body. The book also introduces The Smart Vaccine an intelligent agent that manages all the vaccination-as-a-service on the cloud before an attack happens. The book illustrates the current landscape of cyber warfare, highlights the vulnerabilities of critical infrastructure, and identifies the shortcomings of AVT. Next, it describes the concept, the architecture, and the enabling technologies required to build a digital immune system.

The Cognitive Style Of PowerPoint: Pitching Out Corrupts Within

by Edward Tufte

In corporate and government bureaucracies, the standard method for making a presentation is to talk about a list of points organized onto slides projected up on the wall. For many years, overhead projectors lit up transparencies, and slide projectors showed high-resolution 35mm slides. Now 'slideware' computer programs for presentations are nearly everywhere. Early in the 21st century, several hundred million copies of Microsoft PowerPoint were turning out trillions of slides each year. Unfortunately, slideware often reduces the analytical quality of presentations. In particular, the popular PowerPoint templates (ready-made designs) usually weaken verbal and spatial reasoning, and almost always corrupt statistical analysis. The author examines how these problems can be avoided and how to improve Powerpoint (and other) presentations.

The Cold Start Problem: How to Start and Scale Network Effects

by Andrew Chen

A startup executive and investor draws on expertise developed at the premier venture capital firm Andreessen Horowitz and as an executive at Uber to address how tech’s most successful products have solved the dreaded "cold start problem”—by leveraging network effects to launch and scale toward billions of users.Although software has become easier to build, launching and scaling new products and services remains difficult. Startups face daunting challenges entering the technology ecosystem, including stiff competition, copycats, and ineffective marketing channels. Teams launching new products must consider the advantages of “the network effect,” where a product or service’s value increases as more users engage with it. Apple, Google, Microsoft, and other tech giants utilize network effects, and most tech products incorporate them, whether they’re messaging apps, workplace collaboration tools, or marketplaces. Network effects provide a path for fledgling products to break through, attracting new users through viral growth and word of mouth.Yet most entrepreneurs lack the vocabulary and context to describe them—much less understand the fundamental principles that drive the effect. What exactly are network effects? How do teams create and build them into their products? How do products compete in a market where every player has them? Andrew Chen draws on his experience and on interviews with the CEOs and founding teams of LinkedIn, Twitch, Zoom, Dropbox, Tinder, Uber, Airbnb, and Pinterest to offer unique insights in answering these questions. Chen also provides practical frameworks and principles that can be applied across products and industries. The Cold Start Problem reveals what makes winning networks thrive, why some startups fail to successfully scale, and, most crucially, why products that create and compete using the network effect are vitally important today.

The Colour Photography Field Guide: The Essential Guide to Hue for Striking Digital Images (Field Guide Ser.)

by Michael Freeman

Understand the role colour plays in your images, learn to appreciate its dynamic effects and find out how to capture and reproduce it as precisely as possible in your own images.The Colour Photography Field Guide provides a unique look at analysing and combining three important ways of dealing with colour. The first is the subjective and cultural response to individual colour: the perception. The second is how colours are found and appear in photography: the science. The third is the means by which they can be viewed and altered digitally: the expression.- A clear and technically precise look at how colour affects your digital images- Portable and lightweight, for on-the-spot information and inspiration- With a host of case studies examining difficult colour situations such as capturing flesh tones and unreal colours

The Columbia Guide to Digital Publishing

by William E. Kasdorf

What is metadata? When do you need to archive digital content? How does electronic publication affect copyrights? How can XML and PDF improve your workflow and your publications? There is a digital dimension to virtually all publishing today. Beyond the obvious electronic media -- the music and movies we take for granted, the increasingly indispensable Web, the eBooks that most of us will take for granted in a few years -- almost everything we read, even on paper, was produced digitally. This new digital world offers a steadily increasing number of choices. It is this rich and rapidly changing publishing environment for which The Columbia Guide to Digital Publishingwas created. Although there is a vast amount of information on a host of topics relevant to digital production and publishing available -- some in print, more on the Web -- there has been, until now, no single resource to which those involved in any dimension of publishing could turn for guidance. The Columbia Guide to Digital Publishing fills that need. The Guide is definitive: written by experts in the broad array of subjects it covers, it provides reliable, authoritative, user-friendly information about a vast number of topics. Designed to be the first place to go to learn about any of the numerous interrelated issues that define the digital publishing landscape, it offers readers a multilevel approach, from a brief glossary definition of a technical term or acronym (sometimes all a user needs), to a concise discussion of a topic (comprehensible to the lay person, yet useful for the technical expert). It puts a subject in the context of other topics and broader issues, with real-world examples, liberal cross-references, and pointers to sources of further information in print or electronic form.

The ComSoc Guide to Managing Telecommunications Projects (The ComSoc Guides to Communications Technologies #7)

by Celia Desmond

This pocket guide provides an overview of the telecommunications environment as it has evolved over the past few years, illustrating the need for project management, the significance of project success to the companies, and the application of key project management processes within the telecom environment. Topics covered include: scope management, time management, cost management, procurement management, risk management, communications, quality, human resources, and Integration. It offers professionals a brief and accessible guide to managing telecommunication projects in the 21st century.

The Combinatory Systems Theory: A Powerful Theory for Understanding, Modeling and Simulating Collective Phenomena (Progress in IS)

by Piero Mella

This book adopts the logic of Systems Thinking and Control Systems, presenting a simple but complete theory called the Theory of Combinatory Systems. This new theory describes, interprets, explains, and simulates collective phenomena and their observable effects. Such collective phenomena – many of which are “one way", non-repeatable or reproducible – can all be described and understood using the model, as simple as it is general, of combinatory systems; that is, systems formed by collectivities, or populations of non-connected and unorganized individuals of some species, which appear to be directed by an invisible hand that guides the analogous actions of similar individuals in order to produce an emerging collective phenomenon. This edition includes enhanced theories such as an analysis of potential interactions between combinatory systems and their dynamics, highlighting the role of the environment in which such systems operate. It also includes new examples and enhanced figures that illustrate how combinatory systems are observed in social, biological and physical contexts.

The Combined Power of Research, Education, and Dissemination: Essays Dedicated to Tiziana Margaria on the Occasion of Her 60th Birthday (Lecture Notes in Computer Science #15240)

by Mike Hinchey Bernhard Steffen

Starting with a Laurea in Ingegneria Elettronica and a PhD in Computer and Systems Engineering at the Politecnico di Torino, Tiziana has stayed faithful to her love of organized management of composable functionalities in software and systems, with building blocks and MDD, and she strives for coherence and alignment in complex systems through verification, model checking and workflow synthesis. Her quest for simplicity spans technologies (low-code/no-code; ITSy project), business (Business Model Canvas; tools for innovative business models) and disciplines with her concept of the Digital Thread, a metaphor for IT-mediated interoperation of reusable and ideally verified tools and systems in new platforms where reuse, repurposing and evolution are supported by design. Her most recent initiative, R@ISE, aims at opening the world of IT production and adaptation to a wider range of users and professions. Tiziana is a cofounder and managing editor of the International Journal on Software Tools for Technology Transfer, she cofounded the ISoLA conference, and cofounded METAFrame Technologies serving as CEO. She is a Fellow of the Society for Design and Process Science and a Fellow and President of the Irish Computer Society. Throughout her career Tiziana’s successes have been motivated by how best to advance science and engineering through the implementation of techniques in challenging applications, and the contributions in this volume by leading researchers are representative of a community that shares this drive.

The Comic Book Story of Video Games: The Incredible History of the Electronic Gaming Revolution (Comic Book Story of)

by Jonathan Hennessey

A complete, illustrated history of video games--highlighting the machines, games, and people who have made gaming a worldwide, billion-dollar industry/artform--told in a graphic novel format. Author Jonathan Hennessey and illustrator Jack McGowan present the first full-color, chronological origin story for this hugely successful, omnipresent artform and business. Hennessey provides readers with everything they need to know about video games--from their early beginnings during World War II to the emergence of arcade games in the 1970s to the rise of Nintendo to today's app-based games like Angry Birds and Pokemon Go. Hennessey and McGowan also analyze the evolution of gaming as an artform and its impact on society. Each chapter features spotlights on major players in the development of games and gaming that contains everything that gamers and non-gamers alike need to understand and appreciate this incredible phenomenon.

The Coming Robot Revolution

by David Hanson Adi Marom Yoseph Bar-Cohen

This book discusses the emergence of humanlike robots into our everyday world. It covers the trends, possibilities, and concerns we will all feel with their emergence. Robots will walk, talk, and look ever more like people, and with the speed at which new technologies develop, this may happen very soon. Robots will be in homes, in space, in workplaces, in hospitals--everywhere. Their capabilities will soon surpass what has been usually considered science fiction. In what directions will the technology be taking us, and how will the presence of these robots challenge our identity? This book explores the fascinating implications of robot technology while alerting of its possibly disturbing flipside.

The Coming Wave: AI, Power, and Our Future

by Mustafa Suleyman

NEW YORK TIMES BESTSELLER • An urgent warning of the unprecedented risks that AI and other fast-developing technologies pose to global order, and how we might contain them while we have the chance—from a co-founder of the pioneering artificial intelligence company DeepMind and current CEO of Microsoft AI&“A fascinating, well-written, and important book.&”—Yuval Noah Harari &“Essential reading.&”—Daniel Kahneman&“My favorite book on AI.&”—Bill Gates, GatesNotesA Best Book of the Year: CNN, Economist, Bloomberg, Politico Playbook, Financial Times, The Guardian, CEO Magazine, Semafor • Winner of the Inc. Non-Obvious Book Award • Finalist for the Porchlight Business Book Award and the Financial Times and Schroders Business Book of the Year Award We are approaching a critical threshold in the history of our species. Everything is about to change. Soon you will live surrounded by AIs. They will organize your life, operate your business, and run core government services. You will live in a world of DNA printers and quantum computers, engineered pathogens and autonomous weapons, robot assistants and abundant energy. None of us are prepared. As co-founder of the pioneering AI company DeepMind, part of Google, Mustafa Suleyman has been at the center of this revolution. The coming decade, he argues, will be defined by this wave of powerful, fast-proliferating new technologies. In The Coming Wave, Suleyman shows how these forces will create immense prosperity but also threaten the nation-state, the foundation of global order. As our fragile governments sleepwalk into disaster, we face an existential dilemma: unprecedented harms on one side, the threat of overbearing surveillance on the other. How do we ensure the flourishing of humankind? How do we maintain control? How do we navigate the narrow path to a successful future? This groundbreaking book from the ultimate AI insider establishes &“the containment problem&”—the task of maintaining control over powerful technologies—as the essential challenge of our age.

The Commercialisation of Massive Open Online Courses: Reading Ideologies in Between the Lines

by Seb Dianati

This book critically examines the role of Massive Open Online Courses (MOOCs) in higher education, against the backdrop of rapid developments in online learning. Reporting on a method by which one could isolate ideologically charged words from websites, the author underlines the need to pause, question and understand the underlying motives behind MOOCs, and ask fundamental questions about their data use, commercial interests, and ability to provide ‘good’ education. With its step-by-step ideological analysis, the author challenges educators, policymakers, and students alike to reconsider the fabric of online courses and their associated platforms. The book will appeal to scholars of digital education and sociology, as well as scholars from the critical sciences.

The Common Lisp Condition System: Beyond Exception Handling with Control Flow Mechanisms

by Michał "phoe" Herda

Discover the functioning and example uses of the Common Lisp condition system. This book supplements already existing material for studying Common Lisp as a language by providing detailed information about the Lisp condition system and its control flow mechanisms; it also describes an example ANSI-conformant implementation of the condition system. In part 1 of The Common Lisp Condition System, the author introduces the condition system using a bottom-up approach, constructing it piece by piece. He uses a storytelling approach to convey the foundation of the condition system, dynamically providing code to alter the behavior of an existing program. Later, in part 2, you’ll implement a full and complete ANSI-conformant condition system while examining and testing each piece of code that you write. Throughout, the author demonstrates how to extend Lisp using Lisp itself by using the condition system as an example. This is done while paying proper attention to the CL restart subsystem, giving it attention on a par with the handler subsystem. After reading and using this book, you'll have learned about the inner functioning of the condition system, how to use it in your own Common Lisp coding and applications, and how to implement it from scratch, should such a need arise. What You Will LearnExamine the condition system and see why it is important in Common LispConstruct the condition system from scratch using foundational mechanisms provided by Common LispProgram the condition system and its control flow mechanisms to achieve practical resultsImplement all parts of a condition system: conditions, restarts, handler- and restart-binding macros, signalling mechanisms, assertions, a debugger, and more Who This Book Is For Beginning and intermediate Lisp programmers, as well as intermediate programmers of other programming languages.

Refine Search

Showing 54,726 through 54,750 of 61,805 results