Browse Results

Showing 34,026 through 34,050 of 53,680 results

Joomla! 1.5 SEO

by Herbert-Jan van Dinther

This is a practical, hands-on book that will lead you through the process of search engine optimization of your Joomla!-based web site. It provides clear instructions and detailed screenshots, so you can see exactly what to do at each step in the SEO process. Once you have finished reading the book and gone through the detailed plans from each chapter, you will have the knowledge to improve the rankings and visitor numbers of almost any Joomla!-based web site. This book is written for anyone using Joomla! ranging from owners of business sites to web site developers and personal web site owners. Any Joomla! web site owner who wants to sell products or services, or send out a message to the world will find that getting better rankings in the search engines will help them reach their goal. Some prior knowledge of Joomla! is expected but no prior knowledge of search engine optimization is needed for this book. The reader will get a deeper level of knowledge on how to make their web site rank better and attract more visitors to their site.

iFM 2023: 18th International Conference, iFM 2023, Leiden, The Netherlands, November 13–15, 2023, Proceedings (Lecture Notes in Computer Science #14300)

by Paula Herber Anton Wijs

This volume LNCS 14300 constitutes the refereed proceedings of the 18th International Conference, IFM 2023, in November 2023, held in Leiden, The Netherlands. The 16 full papers presented together with 2 short papers were carefully reviewed and selected from 51 submissions. The conference focuses on all aspects of the design of integrated techniques, including language design, verification and validation, automated tool support, and the use of such techniques in software engineering practice.

Advanced Information Systems Engineering: CAiSE Forum 2020, Grenoble, France, June 8–12, 2020, Proceedings (Lecture Notes in Business Information Processing #386)

by Nicolas Herbaut Marcello La Rosa

This book constitutes the thoroughly refereed proceedings of the CAiSE Forum 2020 which was held as part of the 32nd International Conference on Advanced Information Systems Engineering, CAiSE 2020, in June 2020. The conference was held virtually due to the COVID-19 pandemic. The CAiSE Forum is a place within the CAiSE conference for presenting and discussing new ideas and tools related to information systems engineering. Intended to serve as an interactive platform, the Forum aims at the presentation of emerging new topics and controversial positions, as well as demonstration of innovative systems, tools and applications. This year’s theme was “Responsible Information Systems”. The 12 full papers presented in this volume were carefully reviewed and selected from 19 submissions.

Recent Advances on Soft Computing and Data Mining: The Second International Conference on Soft Computing and Data Mining (SCDM-2016), Bandung, Indonesia, August 18-20, 2016 Proceedings (Advances in Intelligent Systems and Computing #549)

by Tutut Herawan Rozaida Ghazali Nazri Mohd Nawi Mustafa Mat Deris

This book provides a comprehensive introduction and practical look at the concepts and techniques readers need to get the most out of their data in real-world, large-scale data mining projects. It also guides readers through the data-analytic thinking necessary for extracting useful knowledge and business value from the data.The book is based on the Soft Computing and Data Mining (SCDM-16) conference, which was held in Bandung, Indonesia on August 18th–20th 2016 to discuss the state of the art in soft computing techniques, and offer participants sufficient knowledge to tackle a wide range of complex systems. The scope of the conference is reflected in the book, which presents a balance of soft computing techniques and data mining approaches. The two constituents are introduced to the reader systematically and brought together using different combinations of applications and practices. It offers engineers, data analysts, practitioners, scientists and managers the insights into the concepts, tools and techniques employed, and as such enables them to better understand the design choice and options of soft computing techniques and data mining approaches that are necessary to thrive in this data-driven ecosystem.

Advances on Computational Intelligence in Energy: The Applications of Nature-Inspired Metaheuristic Algorithms in Energy (Green Energy and Technology)

by Tutut Herawan Haruna Chiroma Jemal H. Abawajy

Addressing the applications of computational intelligence algorithms in energy, this book presents a systematic procedure that illustrates the practical steps required for applying bio-inspired, meta-heuristic algorithms in energy, such as the prediction of oil consumption and other energy products. Contributions include research findings, projects, surveying work and industrial experiences that describe significant advances in the applications of computational intelligence algorithms in energy. For easy understanding, the text provides practical simulation results, convergence and learning curves as well as illustrations and tables. Providing a valuable resource for undergraduate and postgraduate students alike, it is also intended for researchers in the fields of computational intelligence and energy.

Fault-Tolerance Techniques for High-Performance Computing

by Thomas Herault Yves Robert

This timely text presents a comprehensive overview of fault tolerance techniques for high-performance computing (HPC). The text opens with a detailed introduction to the concepts of checkpoint protocols and scheduling algorithms, prediction, replication, silent error detection and correction, together with some application-specific techniques such as ABFT. Emphasis is placed on analytical performance models. This is then followed by a review of general-purpose techniques, including several checkpoint and rollback recovery protocols. Relevant execution scenarios are also evaluated and compared through quantitative models. Features: provides a survey of resilience methods and performance models; examines the various sources for errors and faults in large-scale systems; reviews the spectrum of techniques that can be applied to design a fault-tolerant MPI; investigates different approaches to replication; discusses the challenge of energy consumption of fault-tolerance methods in extreme-scale systems.

Azure Cloud Security for Absolute Beginners: Enabling Cloud Infrastructure Security with Multi-Level Security Options

by Pushpa Herath

Implement cloud security with Azure security tools, configurations and policies that address the needs of businesses and governments alike. This book introduces you to the most important security solutions available in Azure and provides you with step-by-step guidance to effectively set up security and deploy an application on top of Azure platform services, as well as on top of Azure infrastructure. Author Pushpa Herath begins by teaching you the fundamentals of Azure security. An easy to follow exploration of management groups, subscriptions, management locks and Azure policies further elaborate the concepts underlying Azure cloud security. Next, you will learn about Azure Active Directory (AAD) and the utilization of AAD in application and infrastructure security. Essential aspects of maintaining secure application keys and certificates are further explained in the context of Azure Key Vault. New application security implementations such as Azure configurations and Azure Defender for Azure storage are discussed, as are key platform security factors. Network security groups, gateways, load balancers, virtual networks and firewall configurations are all demonstrated in detail. Finally, you’ll learn how to create a much more secure environment through Azure App Service Environment in the context of securing infrastructure. If you want to learn the basics of securing Azure, Azure Cloud Security for Absolute Beginners is for you. After reading the book, you will be able to begin implementing secure cloud solutions with Microsoft Azure. What Will You Learn Get up and running quickly securing AzureMaster the basic language of Azure securityUnderstand the security features available in Azure cloudConfigure and maintain Azure cloud security featuresSecure Azure PaaS ServicesLearn identity and access management options in Azure Cloud Who Is This Book For Cloud engineers, DevOps engineers, software developers and architects who are asked to manage or are involved in the Azure infrastructure management but have not had all that much experience with security.

Foundations of Robotics: A Multidisciplinary Approach with Python and ROS

by Damith Herath David St-Onge

This open access book introduces key concepts in robotics in an easy to understand language using an engaging project-based approach. It covers contemporary topics in robotics, providing an accessible entry point to fundamentals in all the major domains. A section is dedicated to introducing programming concepts using Python, which has become a language of choice in robotics and AI. The book also introduces the reader to the Robot Operating System (ROS), the ubiquitous software and algorithmic framework used by researchers and the industry. The book provides an inspired, up-to-date and multidisciplinary introduction to robotics in its many forms, including emerging topics related to robotics on Machine Learning, ethics, Human-Robot Interaction, and Design Thinking. The book also includes interviews with industry experts, providing an additional layer of insight into the world of robotics. The book is made open access through the generous support from Kinova Robotics. The book is suitable as an undergraduate textbook in a relevant engineering course. It is also suitable for students in art and design, high school students, and self-learners who would like to explore foundational concepts in robotics. “This book provides the ‘foundation’ for understanding how robots work. It is the accessible introduction that artists and engineers have been waiting for.” - Ken Goldberg, William S. Floyd Jr. Distinguished Chair in Engineering, UC Berkeley.

Robots and Art

by Damith Herath Christian Kroos Stelarc

The first compendium on robotic art of its kind, this book explores theintegration of robots into human society and our attitudes, fears and hopes ina world shared with autonomous machines. It raises questions about thebenefits, risks and ethics of the transformative changes to society that are the consequence of robotstaking on new roles alongside humans. It takes the reader on a journey into the world of the strange,the beautiful, the uncanny and the daring - and into the minds and works ofsome of the world's most prolific creators of robotic art. Offering anin-depth look at robotic art from the viewpoints of artists, engineers andscientists, it presentsoutstanding works of contemporary robotic art and brings together for the first time some of themost influential artists in this area in the last three decades. Starting froma historical review, this transdisciplinary work explores the nexus betweenrobotic research and the arts andexamines the diversityof robotic art, the encounter with robotic otherness, machine embodiment andhuman-robot interaction. Stories of difficulties, pitfalls and successes arerecalled, characterising the multifaceted collaborations across the diversedisciplines required to create robotic art. Although the book isprimarily targeted towards researchers, artists and students in robotics,computer science and the arts,its accessible style appeals to anyone intrigued by robots and the arts.

Asia Pacific Advanced Network: 56th International Conference, APANConf 2023, Colombo, Sri Lanka, August 24–25, 2023, Revised Selected Papers (Communications in Computer and Information Science #1995)

by Damayanthi Herath Susumu Date Upul Jayasinghe Vijaykrishnan Narayanan Roshan Ragel Jilong Wang

This book constitutes the refereed proceedings of the 56th International Conference onAsia Pacific Advanced Network, APANConf 2023, held in, Colombo, Sri Lanka,during August 24–25, 2023.The 10 full papers and 1 short papers included in this book were carefully reviewed andselected from 37 submissions. They are organized in topical sections as follows: artificial intelligence and machine learning, accelerated computing and distributed systems and communications and networking.

Euro-Par 2017: Euro-par 2017 International Workshops, Santiago De Compostela, Spain, August 28-29, 2017, Revised Selected Papers (Lecture Notes in Computer Science #10659)

by Dora B. Heras Luc Bougé

This book constitutes the proceedings of the workshops of the 23rd International Conference on Parallel and Distributed Computing, Euro-Par 2017, held in Santiago de Compostela. Spain in August 2017. The 59 full papers presented were carefully reviewed and selected from 119 submissions.Euro-Par is an annual, international conference in Europe, covering all aspects of parallel and distributed processing. These range from theory to practice, from small to the largest parallel and distributed systems and infrastructures, from fundamental computational problems to full-edged applications, from architecture, compiler, language and interface design and implementation to tools, support infrastructures, and application performance aspects.

Women in Game Development: Breaking the Glass Level-Cap

by Jennifer Brandes Hepler

Videogame development is usually seen as a male dominated field; even playing videogames is often wrongly viewed as a pastime for men only. But behind the curtain, women have always played myriad important roles in gaming. From programmers to artists, designers to producers, female videogame developers endure not only the pressures of their jobs but also epic levels of harassment and hostility. Jennifer Brandes Hepler’s Women in Game Development: Breaking the Glass Level-Cap gives voice to talented and experienced female game developers from a variety of backgrounds, letting them share the passion that drives them to keep making games. Key Features Experience the unique stories of nearly two dozen female game developers, from old-school veterans to rising stars. Understand the role of women in videogames, from the earliest days of development to the present day. Hear first-hand perspectives from working professionals in fields including coding, design, art, writing, community management, production and journalism. Get tips for how to be a better ally and make your company and teams more inclusive. Learn about the obstacles you face if you’re an aspiring female developer, and how to overcome them. Meet the human face of some of the women who have endured the industry’s worst harassment… and kept on going.

DevOps with OpenShift: Cloud Deployments Made Easy

by Mike Hepburn Noel O'Connor Stefano Picozzi

For many organizations, a big part of DevOps’ appeal is software automation using infrastructure-as-code techniques. This book presents developers, architects, and infra-ops engineers with a more practical option. You’ll learn how a container-centric approach from OpenShift, Red Hat’s cloud-based PaaS, can help your team deliver quality software through a self-service view of IT infrastructure.Three OpenShift experts at Red Hat explain how to configure Docker application containers and the Kubernetes cluster manager with OpenShift’s developer- and operational-centric tools. Discover how this infrastructure-agnostic container management platform can help companies navigate the murky area where infrastructure-as-code ends and application automation begins.Get an application-centric view of automation—and understand why it’s importantLearn patterns and practical examples for managing continuous deployments such as rolling, A/B, blue-green, and canaryImplement continuous integration pipelines with OpenShift’s Jenkins capabilityExplore mechanisms for separating and managing configuration from static runtime softwareLearn how to use and customize OpenShift’s source-to-image capabilityDelve into management and operational considerations when working with OpenShift-based application workloadsInstall a self-contained local version of the OpenShift environment on your computer

Process-Driven SOA: Patterns for Aligning Business and IT

by Carsten Hentrich Uwe Zdun

Process-Driven SOA: Patterns for Aligning Business and IT supplies detailed guidance on how to design and build software architectures that follow the principles of business-IT alignment. It illustrates the design process using proven patterns that address complex business/technical scenarios, where integrated concepts of service-oriented architecture (SOA), Business Process Management (BPM), and Event-Driven Architecture (EDA) are required. The book demonstrates that SOA is not limited to technical issues but instead, is a holistic challenge where aspects of SOA, EDA, and BPM must be addressed together. An ideal guide for SOA solution architects, designers, developers, managers, and students about to enter the field, the book: Provides an accessible introduction to basic and more advanced concepts in process-driven SOA Illustrates how to manage the complexities of business aligned IT architectures with detailed examples and industry cases Outlines a step-by-step design process using proven patterns to address complex business/ technical scenarios Integrates SOA, BPM, and EDA into practical patterns promoting SOA 2.0 Describing how to synchronize parallel enterprise processes, the authors explain how to cope with the architectural and design decisions you are likely to encounter when designing and implementing process-driven SOA systems. The decisions are described in the form of software patterns to provide you with a practical guideline for addressing key problems using time-tested solutions.

Hybrid Optimization: The Ten Years of CPAIOR (Springer Optimization and Its Applications #45)

by Pascal Van Hentenryck Michela Milano

Hybrid Optimization focuses on the application of artificial intelligence and operations research techniques to constraint programming for solving combinatorial optimization problems. This book covers the most relevant topics investigated in the last ten years by leading experts in the field, and speculates about future directions for research. This book includes contributions by experts from different but related areas of research including constraint programming, decision theory, operations research, SAT, artificial intelligence, as well as others. These diverse perspectives are actively combined and contrasted in order to evaluate their relative advantages. This volume presents techniques for hybrid modeling, integrated solving strategies including global constraints, decomposition techniques, use of relaxations, and search strategies including tree search local search and metaheuristics. Various applications of the techniques presented as well as supplementary computational tools are also discussed.

Constraint-based Local Search

by Pascal Van Hentenryck Laurent Michel

The ubiquity of combinatorial optimization problems in our society is illustrated by the novel application areas for optimization technology, which range from supply chain management to sports tournament scheduling. Over the last two decades, constraint programming has emerged as a fundamental methodology to solve a variety of combinatorial problems, and rich constraint programming languages have been developed for expressing and combining constraints and specifying search procedures at a high level of abstraction. Local search approaches to combinatorial optimization are able to isolate optimal or near-optimal solutions within reasonable time constraints.This book introduces a method for solving combinatorial optimization problems that combines constraint programming and local search, using constraints to describe and control local search, and a programming language, COMET, that supports both modeling and search abstractions in the spirit of constraint programming.After an overview of local search including neighborhoods, heuristics, and metaheuristics, the book presents the architecture and modeling and search components of constraint-based local search and describes how constraint-based local search is supported in COMET. The book describes a variety of applications, arranged by meta-heuristics. It presents scheduling applications, along with the background necessary to understand these challenging problems. The book also includes a number of satisfiability problems, illustrating the ability of constraint-based local search approaches to cope with both satisfiability and optimization problems in a uniform fashion.

The Amazon Incubator: Grow Your Business or Hatch a New One

by Lesley Hensell

The real story about how to be a successful seller on Amazon, from a leading consultant. Amazon is the most powerful business incubator in the history of the world. Unfortunately, where there is great opportunity, get-rich-quick schemes abound. Most available books about selling on Amazon peddle a dream that is unattainable for sellers. They promise riches at the cost of only five hours a week, or a long-term income for an initial investment of just $1,000.The Amazon Incubator is different. This book instead offers realistic, sustainable strategies for building a long-term, profitable business on Amazon. Whether sellers are burgeoning entrepreneurs or own the ecommerce channel at an established brand, they will benefit from the strategic thinking and in-depth Amazon know-how delivered in an easily digestible format. The reader will be guided through exercises to define their goals, determine their product set, and execute like a champ. The Amazon Incubator is written in short, easy-to-digest chapters that include case studies and real-world examples of Amazon seller success and failure. Readers will better identify with and understand the information when case studies are included. In addition, each chapter includes a brief summary at the end, as well as suggested action steps, so it can easily be used as a tool for the reader to share with teammates and business associates.

Practical LTE based security forces PMR networks

by Arnaud Henry-Labordère

Security forces PMR networks are moving from proprietary technologies for their Mission Critical Push-To-Talk basic service, and their data services which must provide large bandwidth real-time access, to the databases. LTE Based is adopted with backup access to public MNOs to complement their own radio coverage. Specific technologies such as multicasting of visio are required so the MCPTT works within a restricted bandwidth. The need to be able to change the main MNOs to provide resilient coverage requires specific choices of SIM cards, with OTAble security domains. Practical LTE Based Security Forces PMR Networks assumes that the reader has a basic knowledge of the 4G network architecture and services, and the book focusses on the specific features and choices required to fulfill the need of security forces PMR networks. These include tactical and centralized, including LTE based voice services VoLTE and IMS. It can be used as a reference or textbook, with many detailed call flows and traces being included. The author, who has also a long teaching career in Operations Research, provides mathematical models for the optimization of tactical network federations, multicast coverage and allocation of preemptive priorities to PMR group members. He is a pioneer in the area of Virtual Roaming, an application of graph theory and telecommunications to provide roaming without direct relations, having previously published books on SMS Hubs, SS7 Hubs, Diameter Hubs, GTP Hubs. The use of M2M (monitoring devices) for security forces with mobility is covered in detail in the book, including the new LoRa virtual roaming which goes beyond the scope of PMR.

Catalog of the Heteroptera or True Bugs, of Canada and the Continental United States

by Thomas J. Henry

A primary aim of this catalog is to offer an accounting for each species as originally proposed and for the first usage only of all its name combinations (including valid names, synonymies, and misspellings) that have been published for our area. We follow the policy outlined by the 1985 Code of Zoological Nomenclature for nonmenclatorial proposes that a dissertation for an advanced educational degree is not published unless it satisfies the criteria present in Articles 8 and 9.

Web Accessibility: Web Standards and Regulatory Compliance

by Shawn Lawton Henry Andrew Kirkpatrick Patrick H. Lauke Bruce Lawson Bob Regan Richard Rutter Mark Urban Christian Heilmann Cynthia Waddell Jim Thatcher Michael R. Burks

The power of the Web lies in the fact that anyone and everyone can access it. However, this should also extend to users with disabilities--accessibility is about making websites accessible to those with aural, visual, or physical disabilities, or rather, constructing websites that don't exclude these people from accessing the content or services being provided. This isn't difficult to do, and doesn't require anything more than your normal toolset, be it HTML, CSS, JavaScript, Flash, or whatever else. All you need to do is use these tools in the right way, and bear in mind the guidelines that exist to help you keep your web sites accessible, and the laws that enforce web accessibility around the world. This book gives you all you need to know about web accessibility, whether you are a web designer or developer who wants their sites to be accessible, or a business manager who wants to learn what impact the web accessibility laws have on their businesses' web sites.

Penetration Testing

by Kevin M. Henry

Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system in the event of a real attack. The Certified Penetration Testing Engineer (CPTE) examination is a widely recognized certification for penetration testers. Penetration Testing: Protecting networks and systems is a preparation guide for the CPTE examination. It describes the range of techniques employed by professional pen testers, and also includes advice on the preparation and delivery of the test report. The author's in-the-field experiences, combined with other real-world examples, are used to illustrate common pitfalls that can be encountered during testing and reporting. Special attention is also paid to new technologies that improve business operations, but which can create new vulnerabilities, such as employee remote access, wireless communications and public-facing web applications. This book will give you a better understanding of how to conduct a penetration test, and also how to deliver a client-focused report that assesses the security of the system and whether the level of risk to the organization is within acceptable levels. Kevin Henry has 35 years' experience working on computer systems, initially as a computer operator, and then in various programmer and analyst roles, before moving into audit and security. Kevin currently provides security auditing, training and educational programs for major clients and governments around the world and is a frequent speaker on the security conference circuit. A business-aligned approach to penetration testing!

Handbook of Statistical Bioinformatics (Springer Handbooks of Computational Statistics)

by Henry Horng-Shing Lu Bernhard Schölkopf Martin T. Wells Hongyu Zhao

Now in its second edition, this handbook collects authoritative contributions on modern methods and tools in statistical bioinformatics with a focus on the interface between computational statistics and cutting-edge developments in computational biology. The three parts of the book cover statistical methods for single-cell analysis, network analysis, and systems biology, with contributions by leading experts addressing key topics in probabilistic and statistical modeling and the analysis of massive data sets generated by modern biotechnology. This handbook will serve as a useful reference source for students, researchers and practitioners in statistics, computer science and biological and biomedical research, who are interested in the latest developments in computational statistics as applied to computational biology.

Virtual Natives: How a New Generation is Revolutionizing the Future of Work, Play, and Culture

by Catherine D. Henry Leslie Shannon

The eclipse of Digital Natives and the dawn of virtual culture—how Gen A, Z are radically redefining the future of work, play, economics, and social life. We’re living through what is arguably one of the most exciting, confusing, and powerful social moments in the history of humanity, the shift from the Digital Age to the Virtual Age. This shift is being driven by technology, and the people who are leading it are the ones who know it best: the Virtual Natives. This book will introduce you to the Virtual Native cohort and mindset, decipher their socio-cultural and economic experiences, and unpack their expectations of companies looking to engage, market, or employ them. In this book, we explore: How Virtual Natives are deploying the new technologies driving the virtualized world How relationships and work habits are being virtualized Identify ten main Virtual Native-led behaviors that are upending work and culture How Virtual Natives are evolving their expertise into a full-blown economy This is nothing short of a cultural revolution. Virtual Natives are the driving force behind a seismic change that is redefining the world through technology and virtual worlds: this book tells you how they are navigating everything from AI to Augmented and virtual reality, gaming, blockchain and Web3 in easy, accessible language. To understand the future, read Virtual Natives.

Girl Forgotten

by April Henry

Piper Gray starts a true-crime podcast investigating a seventeen-year-old cold case in this thrilling YA murder mystery by New York Times bestselling author April Henry. Seventeen years ago, Layla Trello was murdered and her killer was never found. Enter true-crime fan Piper Gray who is determined to reopen Layla&’s case and get some answers. With the help of Jonas—who has a secret of his own—Piper starts a podcast investigating Layla&’s murder. But as she digs deeper into the mysteries of the past, Piper begins receiving anonymous threats telling her to back off the investigation, or else. The killer is still out there, and Piper must uncover their identity before they silence her forever.

Platform and Collective Intelligence: Digital Ecosystem of Organizations

by Antoine Henry

Organizations, both private and public, are now evolving in a globalized "information society" that has been accelerated by digitization. They find themselves drawn into a spiral of transformations fueled by the incessant reinvention of information and communication technologies (ICT) that are changing digital uses and practices. They transform through the mediating action of ICTs, work activities and associated action situations. Platform and Collective Intelligence analyzes a specific declination of an organization that has become irreversibly reticular: the "platform organization". The network, at the heart of this new conception, proposes a model combining cybernetics and computing. The organization can thus be seen as an interface for contact, via its information systems, for employees or citizens, whatever their geographical location. With a view going beyond technocentrism and technological determinism, this book combines collective intelligence and sociotechnics with the platform to arrive at the notion of "organizational experience".

Refine Search

Showing 34,026 through 34,050 of 53,680 results