Browse Results

Showing 27,151 through 27,175 of 53,426 results

English Learning in the Digital Age: Agency, Technology and Context

by Shuang Zeng

Moving beyond the ‘Web 2.0’ and ‘digital native’ rhetoric, this book addresses the complex experiences of learners of English as a foreign language (EFL) in a world embedded with interactive and participatory technologies. Adopting a sociocultural perspective, it investigates EFL learners’ behaviours concerning digital technology, and guides exploration into their contextually mediated choices and learning practices in the ‘2.0’ era.The argument is developed on the basis of the findings of a mixed sequential study that focused on 1485 Chinese undergraduates’ use and non-use of online tools and applications outside the English classroom. Particular attention is paid to the role of context and agency when understanding their learning choices and behaviours in the context of digital technology. In particular, the book acknowledges the explanatory power of agency in the minority instances of ‘good practices’ among these EFL learners. At the same time it demonstrates that for most learners, use of the current web is limited and mostly non-interactive. The barriers to ‘2.0’ transfer are largely contextual and the so-called ‘communicative opportunities’ and ‘participatory culture’ in particular did not fit into the learners’ sociocultural context of (language) learning.Overall, the compelling argument proposes that the technology-facilitated changes in EFL practices are a ‘bottom up’ process that is taking place in day-to-day situations and constrained by the learning context within which the learner is situated. Based on these arguments, the book provides a framework that challenges the existing beliefs about (language) learning with online technology, and that contributes to our understanding of how context mediates EFL learners’ behaviours surrounding digital technologies. It is a valuable resource for teachers, researchers and policy makers, providing them with insights into using digital technology to stimulate ‘good learning practices’ outside the classroom.

Enhancing CBRNE Safety & Security: Science As The First Countermeasure For Cbrne And Cyber Threats

by Marco D’Arienzo Andrea Malizia

This book presents the proceedings of SICC 2017, a conference devoted to promoting the dissemination of the different methodologies, techniques, theories, strategies, technologies and best practices on the prevention and mitigation of CBRNE risks. As the first scientific international conference on safety & security issues in the CBRNE field, SICC 2017 attracted contributions resulting from fruitful inter-professional collaborations between university and military experts, specialized operators, decision makers and the industry. As such, these proceedings are primarily intended for academics and professionals from public, private and military entities. It is the first trans-disciplinary collection of scientific papers from the numerous fields related to CBRNE.

Enhancing Reflection within Situated Learning: Incorporating Mindfulness As An Instructional Strategy (Springerbriefs In Educational Communications And Technology Ser.)

by Alexis M. Stoner Katherine S. Cennamo

This innovative brief provides guidance on promoting reflection in situated learning by incorporating mindfulness strategies, tapping into a surge of research interest in exploring mindfulness as an instructional strategy associated with positive learning outcomes. It illustrates the benefits of continuous reflection within situated learning and how mindfulness can be incorporated before, during, and after the learning experience to enhance the reflective experience. Critically, the authors present a new conceptual model that synthesizes theories and methods from three different areas of study—mindfulness, situated learning, and reflection— to provide a new perspective and instructional approach that has great potential to positively impact outcomes in situated learning.Among the other topics covered:• Strategies for reflection in situated learning.• Strategies for reflection-in-action in situated learning.• Mindfulness strategies for situated learning.• A conceptual model incorporating mindfulness to enhance reflection.Enhancing Reflection within Situated Learning is an exciting and pioneering resource that offers practical guidance to educators and instructional designers interested in incorporating methods and approaches for integrating mindfulness and reflection across instructional environments.

Enjoying Natural Computing: Essays Dedicated to Mario de Jesús Pérez-Jiménez on the Occasion of His 70th Birthday (Lecture Notes in Computer Science #11270)

by Carmen Graciani Agustín Riscos-Núñez Gheorghe Păun Grzegorz Rozenberg Arto Salomaa

This Festschrift is in honor of Mario de Jesús Pérez-Jiménez, Professor in the Department of Computer Science of University of Seville, Spain, on the occasion of his 70th birthday. The title of this volume reflects both his main research area, viz., Natural Computing, and the guiding principle of his functioning: “once you choose to do something, enjoy doing it".The respect that Professor Mario de Jesús Pérez-Jiménez enjoys in the scientific community was well demonstrated by the enthusiastic response received to the request to contribute to this book. The contributions by more than 70 authors from 15 countries cover a wide spectrum of research areas and reflect well the broad range of research interests of Professor Mario de Jesús Pérez-Jiménez. The research areas presented in this Festschrift include membrane computing, spiking neural networks, phylogenetic networks, ant colonies optimization, workbench for biocomputing, reaction systems, entropy of computation, rewriting systems, and insertion-deletion systems.

Enterprise Agility: Being Agile in a Changing World

by Sunil Mundra

Enterprise Agility is practical framework for enhancing Agility and equipping your company with the tools to survive. Key Features● Prepare your company to navigate the rapidly-moving business world● Enhance Agility in every component of your organization● Build a framework that meets the unique requirements of your enterpriseBook DescriptionThe biggest challenge enterprises face today is dealing with fast-paced change in all spheres of business. Enterprise Agility shows how an enterprise can address this challenge head on and thrive in the dynamic environment. Avoiding the mechanistic construction of existing enterprises that focus on predictability and certainty, Enterprise Agility delivers practical advice for responding and adapting to the scale and accelerating pace of disruptive change in the business environment.Agility is a fundamental shift in thinking about how enterprises work to effectively deal with disruptive changes in the business environment. The core belief underlying agility is that enterprises are open and living systems. These living systems, also known as complex adaptive systems (CAS), are ideally suited to deal with change very effectively.Agility is to enterprises what health is to humans. There are some foundational principles that can be broadly applied, but the definition of healthy is very specific to each individual. Enterprise Agility takes a similar approach with regard to agility: it suggests foundational practices to improve the overall health of the body—culture, mindset, and leadership—and the health of its various organs: people, process, governance, structure, technology, and customers. The book also suggests a practical framework to create a plan to enhance agility.What you will learnDrive agility-oriented change across the enterpriseUnderstand why agility matters (more than ever) to modern enterprises Adopt and influence an Agile mindset in your teams and in your organization Understand the concept of a CAS and how to model enterprise and leadership behaviors on CAS characteristics to enhance enterprise agility Understand and convey the differences between Agile and true enterprise agility Create an enterprise-specific action plan to enhance agility Become a champion for enterprise agilityRecognize the advantages and challenges of distributed teams, and how Agile ways of working can remedy the rough spotsEnable and motivate your IT partners to adopt Agile ways of workingWho this book is forEnterprise Agility is a tool for anyone with the motivation to influence outcomes in an enterprise, who aspires to improve Agility. Readers from the following backgrounds will benefit: chief executive officer, chief information officer, people/human resource director, information technology director, head of change program, head of transformation, and Agile coach/consultant.

Enterprise, Business-Process and Information Systems Modeling: 19th International Conference, BPMDS 2018, 23rd International Conference, EMMSAD 2018, Held at CAiSE 2018, Tallinn, Estonia, June 11-12, 2018, Proceedings (Lecture Notes in Business Information Processing #318)

by Jens Gulden Iris Reinhartz-Berger Rainer Schmidt Sérgio Guerreiro Wided Guédria Palash Bera

This book constitutes the proceedings of two events held at the CAiSE conference and relating to the areas of enterprise, business process and information systems modeling: The 19th International Conference on Business Process Modeling, Development and Support, BPMDS 2018, and the 23rd International Conference on Evaluation and Modeling Methods for Systems Analysis and Development, EMMSAD 2018. The conferences took place in Tallinn, Estonia, in June 2018. The 13 papers accepted for BPMDS were carefully reviewed and selected from 29 submissions; for EMMSAD 6 papers out of 13 submissions were accepted for publication. For BPMDS 2018, the papers were organized in topical sections as follows: context-awareness in business processes; automatic analysis of business processes; advanced approaches for business process modeling; evaluation of business process modeling techniques; an experience report on modeling collaborative processes. For EMMSAD 2018, the six related papers are listed without further sections.

Enterprise Cloud Computing for Non-Engineers (Technology for Non-Engineers)

by Frank Groom Stephan Jones

This book provides a technical description of cloud computing technologies, covering cloud infrastructure and platform services. It then addresses the basics of operating a Cloud computing data center, the services offered from Cloud providers, the carrier role in connecting users to data centers, and the process of interconnecting Cloud data centers to form a flexible processing unit. It also describes how cloud computing has made an impact in various industries and provides emerging technologies that are critical within each industry. Lastly, this book will address security requirements and provide the best practices in securing data.

Enterprise Cybersecurity Study Guide: How To Build A Successful Cyberdefense Program Against Advanced Threats

by Scott E. Donaldson Stanley G. Siegel Chris K. Williams Abdul Aslam

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats. The study guide will help you understand the book’s ideas and put them to work. The guide can be used for self-study or in the classroom.Enterprise cybersecurity is about implementing a cyberdefense program that will succeed in defending against real-world attacks. While we often know what should be done, the resources to do it often are not sufficient. The reality is that the Cybersecurity Conundrum—what the defenders request, what the frameworks specify, and what the budget allows versus what the attackers exploit—gets in the way of what needs to be done. Cyberattacks in the headlines affecting millions of people show that this conundrum fails more often than we would prefer.Cybersecurity professionals want to implement more than what control frameworks specify, and more than what the budget allows. Ironically, another challenge is that even when defenders get everything that they want, clever attackers are extremely effective at finding and exploiting the gaps in those defenses, regardless of their comprehensiveness. Therefore, the cybersecurity challenge is to spend the available budget on the right protections, so that real-world attacks can be thwarted without breaking the bank.People involved in or interested in successful enterprise cybersecurity can use this study guide to gain insight into a comprehensive framework for coordinating an entire enterprise cyberdefense program.What You’ll Learn Know the methodology of targeted attacks and why they succeed Master the cybersecurity risk management process Understand why cybersecurity capabilities are the foundation of effective cyberdefenses Organize a cybersecurity program's policy, people, budget, technology, and assessment Assess and score a cybersecurity program Report cybersecurity program status against compliance and regulatory frameworks Use the operational processes and supporting information systems of a successful cybersecurity program Create a data-driven and objectively managed cybersecurity program Discover how cybersecurity is evolving and will continue to evolve over the next decade Who This Book Is For Those involved in or interested in successful enterprise cybersecurity (e.g., business professionals, IT professionals, cybersecurity professionals, and students). This guide can be used in a self-study mode. The book can be used by students to facilitate note-taking in the classroom and by Instructors to develop classroom presentations based on the contents of the original book, Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats.

Enterprise DevOps Framework: Transforming It Operations

by Shamayel M. Farooqui

Transform your IT organization from one weighed down by set practices to one with a DevOps culture and a cloud-first strategy that is optimized by automation and other lean practices. In this engaging read, you will discover the opportunities, challenges, lessons, and rewards that CA Technologies encountered when making their agile and DevOps transformation.In Enterprise DevOps Framework author Shamayel Farooqui shows you how agile adoption will enable your organization to stay ahead in an ever-changing business environment and meet your customers’ needs. He includes detailed references to key concepts such as agile, hybrid and cloud technology, infrastructure management, and process automation.What You’ll LearnEstablish the focus areas for your IT organizationPrepare for the challenges of transforming your enterprise to a DevOps, agile organizationKnow the key steps for executing an enterprise DevOps strategyBuild a strong team of DevOps individuals focused on improving the efficiency of your organization through Agile methodologies, automation, cloud adoption, and “infrastructure as code” practicesWho This Book Is For IT administrators, operational personnel, cloud professionals, DevOps professionals, human resources professionals, managers, and C-level staff

Enterprise Information Systems: 19th International Conference, ICEIS 2017, Porto, Portugal, April 26-29, 2017, Revised Selected Papers (Lecture Notes in Business Information Processing #321)

by Slimane Hammoudi Michał Śmiałek Olivier Camp Joaquim Filipe

This book constitutes extended and revised papers from the 19th International Conference on Enterprise Information Systems, ICEIS 2017, held in Porto, Portugal, in April 2017. The 28 papers presented in this volume were carefully reviewed and selected for inclusion in this book from a total of 318 submissions. They were organized in topical sections named: databases and information systems integration; artificial intelligence and decision support systems; information systems analysis and specification; software agents and internet computing; human-computer interaction; and enterprise architecture.

Enterprise Internet of Things Handbook: Build end-to-end IoT solutions using popular IoT platforms

by Arvind Ravulavaru

Get familiar with the building blocks of IoT solutions using off–the-shelf IoT platforms.Key FeaturesWork with various trending IoT platforms such as AWS IoT, Azure IoT, Google IoT, IBM Watson IoT, and Kaa IoTGain hands-on knowledge working with Cloud-based IoT platforms, IoT Analytics, and so on.A practical guide that will help you build IoT strategies for your organizationBook DescriptionThere is a lot of work that is being done in the IoT domain and according to Forbes the global IoT market will grow from $157B in 2016 to $457B by 2020. This is an amazing market both in terms technology advancement as well as money. In this book, we will be covering five popular IoT platforms, namely, AWS IoT, Microsoft Azure IoT, Google IoT Core, IBM Watson IoT, and Kaa IoT middleware. You are going to build solutions that will use a Raspberry Pi 3, a DHT11 Temperature and humidity sensor, and a dashboard to visualize the sensor data in real-time. Furthermore, you will also explore various components of each of the platforms that are needed to achieve the desired solution. Besides building solutions, you will look at how Machine Learning and IoT go hand in hand and later design a simple predictive web service based on this concept. By the end of this book, you will be in a position to implement an IoT strategy best-fit for your organizationWhat you will learnConnect a Temperature and Humidity sensor and see how these two can be managed from various platformsExplore the core components of AWS IoT such as AWS Kinesis and AWS IoTRules EngineBuild a simple analysis dashboard using Azure IoT and Power BIUnderstand the fundamentals of Google IoT and use Google core APIs to build your own dashboardGet started and work with the IBM Watson IoT platformIntegrate Cassandra and Zeppelin with Kaa IoT dashboardReview some Machine Learning and AI and get to know more about their implementation in the IoT domain.Who this book is forThis book is targeted at IoT architects and engineers, or any stakeholders working with IoT solutions in an organization. This book will also help decision makers and professionals from small- and medium-sized enterprises build an IoT strategy for their venture.

Enterprise Java Microservices

by Kenneth Finnigan

SummaryEnterprise Java Microservices is an example-rich tutorial that shows how to design and manage large-scale Java applications as a collection of microservices.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologyLarge applications are easier to develop and maintain when you build them from small, simple components. Java developers now enjoy a wide range of tools that support microservices application development, including right-sized app servers, open source frameworks, and well-defined patterns. Best of all, you can build microservices applications using your existing Java skills.About the BookEnterprise Java Microservices teaches you to design and build JVM-based microservices applications. You'll start by learning how microservices designs compare to traditional Java EE applications. Always practical, author Ken Finnigan introduces big-picture concepts along with the tools and techniques you'll need to implement them. You'll discover ecosystem components like Netflix Hystrix for fault tolerance and master the Just enough Application Server (JeAS) approach. To ensure smooth operations, you'll also examine monitoring, security, testing, and deploying to the cloud. What's insideThe microservices mental modelCloud-native developmentStrategies for fault tolerance and monitoringSecuring your finished applicationsAbout the ReaderThis book is for Java developers familiar with Java EE.About the AuthorKen Finnigan leads the Thorntail project at Red Hat, which seeks to make developing microservices for the cloud with Java and Java EE as easy as possible.Table of ContentsPART 1 MICROSERVICES BASICSEnterprise Java microservices Developing a simple RESTful microservice Just enough Application Server for microservices Microservices testing Cloud native development PART 2 - IMPLEMENTING ENTERPRISE JAVA MICROSERVICESConsuming microservices Discovering microservices for consumption Strategies for fault tolerance and monitoring Securing a microservice Architecting a microservice hybrid Data streaming with Apache Kafka

Enterprise Resource Planning and Business Intelligence Systems for Information Quality: An Empirical Analysis in the Italian Setting (Contributions To Management Science)

by Carlo Caserio Sara Trucco

This book analyses the role of Enterprise Resource Planning (ERP) and Business Intelligence (BI) systems in improving information quality through an empirical analysis carried out in Italy. The study begins with a detailed examination of ERP features that highlights the advantages and disadvantages of ERP adoption. Critical success factors for ERP implementation and post-implementation are then discussed, along with the capabilities of ERP in driving the alignment between management accounting and financial accounting information.The study goes on to illustrate the features of BI systems and to summarize companies’ needs for BI. Critical success factors for BI implementation are then presented, along with the BI maturity model and lifecycle. The focus of the research entails a detailed empirical analysis in the Italian setting designed to investigate the role played by ERP and BI systems in reducing information overload/underload and improving information quality by influencing the features of information flow. The practical and theoretical implications of the study are discussed and future avenues of research are suggested. This book will be of value for all those who have an interest in the capacities of ERP and BI systems to enhance business information quality.

Entertainment Computing – ICEC 2018: 17th IFIP TC 14 International Conference, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 17–20, 2018, Proceedings (Lecture Notes in Computer Science #11112)

by Esteban Clua Licinio Roque Artur Lugmayr Pauliina Tuomi

This book constitutes the refereed proceedings of the 17th International Conference on Entertainment Computing, ICEC 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018.The 15 full papers, 13 short papers, and 23 poster, demostration, and workshop papers presented were carefully reviewed and selected from 65 submissions. They cover a large range of topics in the following thematic areas: digital games and interactive entertainment; design, human-computer interaction, and analysis of entertainment systems; interactive art, performance and cultural computing; entertainment devices, platforms and systems; theoratical foundations and ethical issues; entertainment for purpose and persuasion; computational methodologies for entertainment; and media studies, communication, business, and information systems.

Entity Framework Core in Action

by Jon Smith

SummaryEntity Framework Core in Action teaches you how to access and update relational data from .NET applications. Following the crystal-clear explanations, real-world examples, and around 100 diagrams, you'll discover time-saving patterns and best practices for security, performance tuning, and unit testing.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologyThere's a mismatch in the way OO programs and relational databases represent data. Entity Framework is an object-relational mapper (ORM) that bridges this gap, making it radically easier to query and write to databases from a .NET application. EF creates a data model that matches the structure of your OO code so you can query and write to your database using standard LINQ commands. It will even automatically generate the model from your database schema.About the BookUsing crystal-clear explanations, real-world examples, and around 100 diagrams, Entity Framework Core in Action teaches you how to access and update relational data from .NET applications. You'l start with a clear breakdown of Entity Framework, long with the mental model behind ORM. Then you'll discover time-saving patterns and best practices for security, performance tuning, and even unit testing. As you go, you'll address common data access challenges and learn how to handle them with Entity Framework.What's InsideQuerying a relational database with LINQUsing EF Core in business logicIntegrating EF with existing C# applicationsApplying domain-driven design to EF CoreGetting the best performance out of EF CoreCovers EF Core 2.0 and 2.1About the ReaderFor .NET developers with some awareness of how relational databases work.About the AuthorJon P Smith is a full-stack developer with special focus on .NET Core and Azure.Table of ContentsPart 1 - Getting startedIntroduction to Entity FrameworkCoreQuerying the database Changing the database content Using EF Core in business logic Using EF Core in ASP.NET Core web applications Part 2 - Entity Framework in depthConfiguring nonrelational properties Configuring relationships Configuring advanced features and handling concurrency conflicts Going deeper into the DbContext Part 3 - Using Entity Framework Core in real-world applicationsUseful software patterns for EF Core applications Handling database migrations EF Core performance tuning A worked example of performance tuning Different database types and EF Core services Unit testing EF Core applicationsAppendix A - A brief introduction to LINQ Appendix B - Early information on EF Core version 2.1

Equipment Selection for Mining: With Case Studies (Studies in Systems, Decision and Control #150)

by Louis Caccetta Christina N. Burt

This unique book presents innovative and state-of-the-art computational models for determining the optimal truck–loader selection and allocation strategy for use in large and complex mining operations. The authors provide comprehensive information on the methodology that has been developed over the past 50 years, from the early ad hoc spreadsheet approaches to today’s highly sophisticated and accurate mathematical-based computational models. The authors’ approach is motivated and illustrated by real case studies provided by our industry collaborators. The book is intended for a broad audience, ranging from mathematicians with an interest in industrial applications to mining engineers who wish to utilize the most accurate, efficient, versatile and robust computational models in order to refine their equipment selection and allocation strategy. As materials handling costs represent a significant component of total costs for mining operations, applying the optimization methodology developed here can substantially improve their competitiveness

Errors-in-Variables Methods in System Identification (Communications and Control Engineering)

by Torsten Söderström

This book presents an overview of the different errors-in-variables (EIV) methods that can be used for system identification. Readers will explore the properties of an EIV problem. Such problems play an important role when the purpose is the determination of the physical laws that describe the process, rather than the prediction or control of its future behaviour. EIV problems typically occur when the purpose of the modelling is to get physical insight into a process. Identifiability of the model parameters for EIV problems is a non-trivial issue, and sufficient conditions for identifiability are given. The author covers various modelling aspects which, taken together, can find a solution, including the characterization of noise properties, extension to multivariable systems, and continuous-time models. The book finds solutions that are constituted of methods that are compatible with a set of noisy data, which traditional approaches to solutions, such as (total) least squares, do not find. A number of identification methods for the EIV problem are presented. Each method is accompanied with a detailed analysis based on statistical theory, and the relationship between the different methods is explained. A multitude of methods are covered, including: instrumental variables methods; methods based on bias-compensation; covariance matching methods; and prediction error and maximum-likelihood methods. The book shows how many of the methods can be applied in either the time or the frequency domain and provides special methods adapted to the case of periodic excitation. It concludes with a chapter specifically devoted to practical aspects and user perspectives that will facilitate the transfer of the theoretical material to application in real systems. Errors-in-Variables Methods in System Identification gives readers the possibility of recovering true system dynamics from noisy measurements, while solving over-determined systems of equations, making it suitable for statisticians and mathematicians alike. The book also acts as a reference for researchers and computer engineers because of its detailed exploration of EIV problems.

Escaping the Rabbit Hole: How to Debunk Conspiracy Theories Using Facts, Logic, and Respect

by West Mick

The Earth is flat, the World Trade Center collapse was a controlled demolition, planes are spraying poison to control the weather, and actors faked the Sandy Hook massacre…. All these claims are bunk: falsehoods, mistakes, and in some cases, outright lies. But many people passionately believe one or more of these conspiracy theories. They consume countless books and videos, join like-minded online communities, try to convert those around them, and even, on occasion, alienate their own friends and family. Why is this, and how can you help people, especially those closest to you, break free from the downward spiral of conspiracy thinking? In Escaping the Rabbit Hole, author Mick West shares over a decade’s worth of knowledge and experience investigating and debunking false conspiracy theories through his forum, MetaBunk.org, and sets forth a practical guide to helping friends and loved ones recognize these theories for what they really are. Perhaps counter-intuitively, the most successful approaches to helping individuals escape a rabbit hole aren’t comprised of simply explaining why they are wrong; rather, West’s tried-and-tested approach emphasizes clear communication based on mutual respect, honesty, openness, and patience. West puts his debunking techniques and best practices to the test with four of the most popular false conspiracy theories today (Chemtrails, 9/11 Controlled Demolition, False Flags, and Flat Earth) — providing road maps to help you to understand your friend and help them escape the rabbit hole. These are accompanied by real-life case studies of individuals who, with help, were able to break free from conspiracism. With sections on:the wide spectrum of conspiracy theories avoiding the “shill” label psychological factors and other complications(and concluding with) a look at the future of debunking, Mick West has put forth a conclusive, well-researched, practical reference on why people fall down the conspiracy theory rabbit hole and how you can help them escape.

Essential Effects: Water, Fire, Wind, and More

by Mauro Maressa

Animate the world around you! Follow along with veteran Disney effects artist Mauro Maressa as he teaches you how to create and animate natural phenomena like water, fire, smoke, lightning, lava, mud, and wind. Essential Effects will help you plan, draw, design, and animate traditional 2D effects, taking your ideas all the way from rough sketch to finished product. Using a series of full-color visual breakdowns and diagrams, this book gives you a clear, concise understanding of what it takes to create credible, compelling effects in your own projects. Key Features Build a strong foundation of observation and drawing skills that you can rely on for the rest of your career Tips and tricks for applying classic effects principles to computer-animated and CG projects Over 400 full-color images and diagrams for clear step-by-step learning

The Essential Guide to HTML5: Using Games To Learn Html5 And Javascript

by Jeanine Meyer

Gain a deep, practical knowledge of HTML and JavaScript that will provide an introduction to programming and enable you to build interactive websites. This completely updated second edition explains HTML, JavaScript and CSS in the context of working examples and contains full-color screen shots of the programs in action.You'll begin at an introductory level, learning the essentials of HTML5 and JavaScript and programming techniques. Each chapter features either a familiar game such as Hangman, Rock-Paper-Scissors, Craps, Memory, and Blackjack, or a simple type of game, such as a quiz, a maze, or animated simulations. You’ll develop solid programming skills that will help when learning other programming languages. Each chapter contains tables revealing the structure of the program with comments for each line of code. These examples demonstrate the features introduced with HTML5. You’ll see how to use canvas elements for line drawing. You can include your own audio and video clips, directly controlled by your JavaScript code. For example, the reward for correct completion of a quiz can be the playing of an audio clip and a video clip. You’ll also learn how to use localStorage to store high scores or game preferences on a user's computer for retrieval next time they play. The Essential Guide to HTML5 explores all of this and more.What You'll Learn Understand HTML 5 concepts with the help of easy-to-grasp, appealing examples Use HTML5 to explore new avenues for application and game development on the webReview important new elements of HTML 5 Build, test, and upload simple games to a web site. Who This Book Is ForBoth absolute beginners and users with some knowledge of HTML who want to learn the new HTML5 features

Essential Logic for Computer Science

by Rex Page Ruben Gamboa

An introduction to applying predicate logic to testing and verification of software and digital circuits that focuses on applications rather than theory. Computer scientists use logic for testing and verification of software and digital circuits, but many computer science students study logic only in the context of traditional mathematics, encountering the subject in a few lectures and a handful of problem sets in a discrete math course. This book offers a more substantive and rigorous approach to logic that focuses on applications in computer science. Topics covered include predicate logic, equation-based software, automated testing and theorem proving, and large-scale computation. Formalism is emphasized, and the book employs three formal notations: traditional algebraic formulas of propositional and predicate logic; digital circuit diagrams; and the widely used partially automated theorem prover, ACL2, which provides an accessible introduction to mechanized formalism. For readers who want to see formalization in action, the text presents examples using Proof Pad, a lightweight ACL2 environment. Readers will not become ALC2 experts, but will learn how mechanized logic can benefit software and hardware engineers. In addition, 180 exercises, some of them extremely challenging, offer opportunities for problem solving. There are no prerequisites beyond high school algebra. Programming experience is not required to understand the book's equation-based approach. The book can be used in undergraduate courses in logic for computer science and introduction to computer science and in math courses for computer science students.

Essential PowerShell for Office 365: Managing And Automating Skills For Improved Productivity

by Vlad Catrinescu

Take your Office 365 skills to the next level. Master PowerShell for Office 365 to stay competitive in today’s world of highly sought after cloud management skills. With expert guidance, IT pros will learn how to leverage the muscle of PowerShell to automate many advanced administrative tasks not otherwise accessible in the Office 365 Admin Center. You will discover how to unlock configuration options and automate tasks in order to free up valuable time and resources.This book is your companion to administering Office 365 with PowerShell. You will learn time-saving techniques such as how to streamline administrative tasks, and how to manage users, licenses, and Office 365 services. Expert and MVP Vlad Catrinescu introduces each chapter with an overview and basic fundamentals, such as how to connect to your required service in Office 365, so that you have a solid foundation for success. Benefit from learning the theory behind PowerShell for Office 365 and put your knowledge to practice with numerous hands-on code examples.What You’ll LearnManage users in bulkExport data such as user lists and groupsCreate and manage Office 365 groupsManage Exchange online distribution lists, mailboxes, and contactsConfigure Skype for Business settingsPerform compliance searches directly from PowerShellWho This Book Is For Any IT pro who needs to manage Office 365 or one of its services such as Exchange, SharePoint, or Skype for Business. Readers should have a basic knowledge of PowerShell and the Office 365 service they want to manage.

Esto te va a sorprender

by Hank Green

Poderosamente relevante e imposible de dejar de leer, Esto te va a sorprender trata grandes temas de actualidad como las redes sociales, la radicalización de los discursos y la deshumanización que conlleva la fama. La vida de April May nunca volverá a ser la misma. Volviendo a casa a las tres de la mañana, April se encontró con una escultura gigante, sobre la que colgó un vídeo. Ahora los Carls, las misteriosas estatuas que aparecen y desaparecen en el mundo entero, se han hecho virales, y April May con ellas. ¿Será esta su oportunidad para dejar huella en el mundo? April pronto descubrirá las consecuencias que toda esta atención conlleva, y que el mundo haya depositado en ella la responsabilidad de averiguar qué son los Carls y, sobre todo# qué quieren de nosotros.

Ethereum Cookbook: Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps

by Manoj P R

Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of EthereumKey FeaturesBuild end-to-end decentralized Ethereum apps using Truffle, Web3, and SolidityExplore various solution-based recipes to build smart contracts and foolproof decentralized applicationsDevelop decentralized marketplaces from scratch, build wallets, and manage transactionsBook DescriptionEthereum and Blockchain will change the way software is built for business transactions. Most industries have been looking to leverage these new technologies to gain efficiencies and create new business models and opportunities.The Ethereum Cookbook covers various solutions such as setting up Ethereum, writing smart contracts, and creating tokens, among others. You’ll learn about the security vulnerabilities, along with other protocols of Ethereum.Once you have understood the basics, you’ll move on to exploring various design decisions and tips to make your application scalable and secure. In addition to this, you’ll work with various Ethereum packages such as Truffle, Web3, and Ganache.By the end of this book, you’ll have comprehensively grasped the Ethereum principles and ecosystem.What you will learnEfficiently write smart contracts in EthereumBuild scalable distributed applications and deploy themUse tools and frameworks to develop, deploy, and test your applicationUse block explorers such as Etherscan to find a specific transactionCreate your own tokens, initial coin offerings (ICOs), and gamesUnderstand various security flaws in smart contracts in order to avoid themWho this book is forThe Ethereum Cookbook is for you if you are a software engineer, Blockchain developer, or research scientist who wants to build smart contracts, develop decentralized applications, and facilitate peer-to-peer transaction. It is assumed that you are familiar with Blockchain concepts and have sound knowledge of JavaScript.

Ethereum for Architects and Developers: With Case Studies And Code Samples In Solidity

by Debajani Mohanty

Explore the Ethereum ecosystem step by step with extensive theory, labs, and live use cases. This book takes you through BlockChain concepts; decentralized applications; Ethereum’s architecture; Solidity smart contract programming with examples; and testing, debugging, and deploying smart contracts on your local machine and on the cloud. You’ll cover best practices for writing contracts with ample examples to allow you to write high-quality contracts with optimal usage of fuel. In later chapters, Ethereum for Architects and Developers covers use cases from different business areas, such as finance, travel, supply-chain, insurance, and land registry. Many of these sectors are explained with flowcharts, diagrams, and sample code that you can refer to and further enhance in live projects.By the end of the book, you will have enough information to use Ethereum to create value for your business processes and build foolproof data storage for smoother execution of business.What You Will Learn Discover key BlockChain conceptsMaster the architecture, building blocks, and ecosystem of EthereumDevelop smart contracts from scratch Debug, test, and deploy to test Take advantage of Ethereum in your business area Who This Book Is ForBlockChain developers and architects wanting to develop decentralized Ethereum applications or learn its architecture.

Refine Search

Showing 27,151 through 27,175 of 53,426 results