Browse Results

Showing 11,601 through 11,625 of 53,517 results

Configuring the Networked Self

by Julie E. Cohen

The legal and technical rules governing flows of information are out of balance, argues Julie E. Cohen in this original analysis of information law and policy. Flows of cultural and technical information are overly restricted, while flows of personal information often are not restricted at all. The author investigates the institutional forces shaping the emerging information society and the contradictions between those forces and the ways that people use information and information technologies in their everyday lives. She then proposes legal principles to ensure that people have ample room for cultural and material participation as well as greater control over the boundary conditions that govern flows of information to, from, and about them.

Configuring User-Designer Relations: Interdisciplinary Perspectives (Computer Supported Cooperative Work)

by Mark Rouncefield Roger Slack Rob Procter Monika Büscher Mark Hartswood Alex Voss

'User-designer relations' concerns the sorts of working relationships that arise between developers and end users of IT products - the different ways designers of IT products seek to engage with users, and the ways users seek to influence product design. It is through the shifting patterns of these relations that IT products are realised. Although it has generally been accepted that achieving better user-designer relations will improve the quality of IT products, there has been little consensus on how this might be achieved. This book aims to deepen our understanding of the relationships between users and designers both as they emerge in the wild and as a consequence of our attempts to intervene. Through a series of case studies the book juxtaposes in-depth explorations of different perspectives and approaches to thinking about - and doing - user-designer relations, considering important implications for design and computer science more generally.

Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801: Configure advanced Windows Server services for on-premises, hybrid, and cloud environments

by Chris Gill Shannon Kuehn

Ace the AZ 801 exam and master advanced Windows Server and Infrastructure-as-a-Service workload administration with this comprehensive guidePurchase of the print or Kindle book includes a free PDF eBookKey FeaturesGain practical knowledge to conquer the AZ-801 certification and tackle real-world challengesLearn to secure Windows Server in on-premises and hybrid infrastructuresLeverage hands-on examples to monitor and troubleshoot Windows Server environmentsBook DescriptionConfiguring Windows Server Hybrid Advanced Services Exam Ref AZ-801 helps you master various cloud and data center management concepts in detail, helping you grow your expertise in configuring and managing Windows Server in on-premises, hybrid, and cloud-based workloads. Throughout the book, you'll cover all the topics needed to pass the AZ-801 exam and use the skills you acquire to advance in your career.With this book, you'll learn how to secure your on-premises Windows Server resources and Azure IaaS workloads. First, you'll explore the potential vulnerabilities of your resources and learn how to fix or mitigate them. Next, you'll implement high availability Windows Server virtual machine workloads with Hyper-V Replica, Windows Server Failover Clustering, and Windows File Server.You'll implement disaster recovery and server migration of Windows Server in on-premises and hybrid environments. You'll also learn how to monitor and troubleshoot Windows Server environments.By the end of this book, you'll have gained the knowledge and skills required to ace the AZ-801 exam, and you'll have a handy, on-the-job desktop reference guide.What you will learnUnderstand the core exam objectives and successfully pass the AZ-801 examSecure Windows Server for on-premises and hybrid infrastructures using security best practicesImplement, manage, and monitor Windows Server high availability features successfullyConfigure and implement disaster recovery services using Hyper-V features, Azure Recovery Services, and Azure Site RecoveryExplore how to migrate various servers, workloads, and tools from previous versions of Windows Server to 2022Monitor and troubleshoot Windows Server environments in both on-premises and cloud workloads using Windows Server tools, Windows Admin Center, and Azure servicesWho this book is forThis book is for Cloud and Datacenter Management administrators and engineers, Enterprise Architects, Microsoft 365 Administrators, Network Engineers, and anyone seeking to gain additional working knowledge with Windows Server operating systems and managing on-premises, hybrid and cloud workloads with administrative tools. To get started, you'll need to have a basic understanding of how to configure advanced Windows Server services utilizing existing on-premises technology in combination with hybrid and cloud technologies.

Confirming Justice—Or Injustice?: A Guide to Judging RBG's Successor

by Alan Dershowitz

In Confirming Justice—Or Injustice?, Alan Dershowitz—New York Times bestselling author and one of America&’s most respected legal scholars—contemplates the past, present, and future of the Supreme Court, from the death of Ruth Bader Ginsburg to the confirmation battle looming over President Trump&’s nomination of Judge Amy Coney Barrett. Alan Dershowitz has been called &“one of the most prominent and consistent defenders of civil liberties in America&” by Politico and &“the nation&’s most peripatetic civil liberties lawyer and one of its most distinguished defenders of individual rights&” by Newsweek. He is also a fair-minded and even-handed expert on the Constitution and American government, and in this book offers his knowledge and insight to help readers understand the current circumstances surrounding the Supreme Court and the looming partisan battle for its future. Confirming Justice—Or Injustice? is an analysis of every aspect of the possible confirmation of Judge Amy Coney Barrett to fill the vacant seat left by the death of Ruth Bader Ginsburg. It includes timely commentary on the history and process of confirming justices to the Supreme Court, notes about what might happen if the process is changed—such as by court packing or instituting age or term limits for justices—and discussion of the roles of the various people and groups who might have input on the confirmation, from the president to the senate to the judiciary committee to the Constitution itself. In the end, Confirming Justice—Or Injustice? represents an icon in American law and politics reckoning with an increasingly politicized and polarized nomination-and-confirmation process for judges and what those shifts might mean for the country, both now and in days to come. It is essential reading for anyone interested in or concerned about Trump's nomination of Amy Coney Barrett and the process of her possible confirmation, the legacy of Ruth Bader Ginsburg, and the future and fate of the Supreme Court—and American democracy itself.

Conflict Resolution and its Context: From the Analysis of Behavioural Patterns to Efficient Decision-Making (Law, Governance and Technology Series #18)

by Davide Carneiro Paulo Novais José Neves

This book studies how technological solutions can be used to alleviate the current state of legal systems, with their clogged up courtrooms and inefficient conflict resolution methods. It reviews the shortcomings and disadvantages of traditional and alternative conflict resolution methods and turns to Artificial Intelligence for problem-solving techniques and solutions. The book is divided into four parts. The first part presents a general and systematic analysis of the current state of the legal systems, identifying the main problems and their causes It then moves on to present UM Court: a framework for testing and prototyping conflict resolution services. This framework was developed with the objective of using Artificial Intelligence techniques to build a service environment for conflict resolution. The third part of the book takes a step into the future by analyzing the use of Intelligent Environments in the support of conflict management and resolution. It describes the approach taken and the experiments performed in the Intelligent Systems Lab of the University of Minho. The final part of the book contains the conclusions and shows the potential advantages of the use of Intelligent Environments as a way to implement better conflict resolution procedures (virtual or real), in which all the participants have access to more and better information and are able to take better informed decisions.

Conflict Resolution in Decision Making: Second International Workshop, COREDEMA 2016, The Hague, The Netherlands, August 29-30, 2016, Revised Selected Papers (Lecture Notes in Computer Science #10238)

by Tim Baarslag Vicente Julian Reyhan Aydoğan Enrico Gerding Catholijn M. Jonker Victor Sanchez-Anguix

This book constitutes thoroughly revised selected papers of the Second International Workshop on Conflict and Resolution in Decision Makrung, COREDEMA 2016, held in The Hague, The Netherlands, in August 2016. The 9 revised papers presented were carefully reviewed and selected from 13 submissions. The 2nd International Workshop on Conflict Resolution in Decision Making (COREDEMA 2016) focuses on theoretical and practical computational approaches for solving and understanding conflict resolution.

Conflict Resolution Using the Graph Model: Strategic Interactions in Competition and Cooperation (Studies in Systems, Decision and Control #153)

by Liping Fang D. Marc Kilgour Keith W. Hipel Haiyan Xu

This cutting-edge book presents the theory and practice of the Graph Model for Conflict Resolution (GMCR), which is used for strategically investigating disputes in any field to enable informed decision making. It clearly explains how GMCR can determine what is the best a particular decision maker (DM) can independently achieve in dynamic interaction with others. Moves and counter-moves follow various stability definitions reflecting human behavior under conflict. The book defines a wide range of preference structures to represent a DM’s comparisons of states or scenarios: equally preferred, more or less preferred; unknown; degrees of strength of preference; and hybrid. It vividly describes how GMCR can ascertain whether a DM can fare even better by cooperating with others in a coalition. The book portrays how a conflict can evolve from the status quo to a desirable resolution, and provides a universal design for a decision support system to implement the innovative decision technologies using the matrix formulation of GMCR. Further, it illustrates the key ideas using real-world conflicts and supplies problems at the end of each chapter. As such, this highly instructive book benefits teachers, mentors, students and practitioners in any area where conflict arises.

Conflicts, Crimes and Regulations in Cyberspace

by Sébastien-Yves Laurent

The study of cyberspace is relatively new within the field of social sciences, yet interest in the subject is significant. Conflicts, Crimes and Regulations in Cyberspace contributes to the scientific debate being brought to the fore by addressing international and methodological issues, through the use of case studies.This book presents cyberspace as a socio-technical system on an international level. It focuses on state and non-state actors, as well as the study of strategic concepts and norms. Unlike global studies, the socio-technical approach and “meso” scale facilitate the analysis of cyberspace in international relations. This is an area of both collaboration and conflict for which specific modes of regulation have appeared.

Confluence of Artificial Intelligence and Robotic Process Automation (Smart Innovation, Systems and Technologies #335)

by Siddhartha Bhattacharyya Jyoti Sekhar Banerjee Debashis De

This book provides a detailed insight into Robotic Process Automation (RPA) technologies linked with AI that will help organizations implement Industry 4.0 procedures. RPA tools enhance their functionality by incorporating AI objectives, such as use of artificial neural network algorithms, text mining techniques, and natural language processing techniques for information extraction and the subsequent process of optimization and forecasting scenarios for the purpose of improving an organization's operational and business processes. The target readers of this book are researchers, professors, graduate students, scientists, policymakers, professionals, and developers working in the IT and ITeS sectors, i.e. people who are working on emerging technologies. This book also provides insights and decision support tools necessary for executives concerned with different industrial and organizational automation-centric jobs, knowledge dissemination, information, and policy development for automation in different educational, government, and non-government organizations. This book is of special interest to college and university educators who teach AI, machine learning, blockchain, business intelligence, cognitive intelligence, and brain intelligence courses in different capacities.

Confluence, Tech Comm, Chocolate

by Sarah Maddox

Web and Tech Comm guru Sarah Maddox takes you inside the Confluence wiki for an in-depth guide to developing and publishing technical documentation on a wiki. She looks at life on a wiki from the points of view of both technical writers and readers. Confluence, Tech Comm, Chocolate shows you how to make your wiki fly.While it focuses on Confluence, the concepts and strategies can be used with any wiki. The basic message is that technical documentation becomes true communication when you add the social and collaborative tools that a wiki provides.Inside the Book Introduction Developing Technical Documentation on a Wiki Life on a Wiki Giving Your Wiki Wings Glossary and Index

Conformal and Probabilistic Prediction with Applications: 5th International Symposium, COPA 2016, Madrid, Spain, April 20-22, 2016, Proceedings (Lecture Notes in Computer Science #9653)

by Alexander Gammerman Zhiyuan Luo Jesús Vega Vladimir Vovk

This book constitutes the refereed proceedings of the 5th InternationalSymposium on Conformal and Probabilistic Prediction with Applications, COPA2016, held in Madrid, Spain, in April 2016. The 14 revised fullpapers presented together with 1 invited paper were carefully reviewed andselected from 23 submissions and cover topics on theory of conformal prediction; applicationsof conformal prediction; and machine learning.

Conformal Geometry: Computational Algorithms And Engineering Applications (Advanced Lectures In Mathematics Ser.)

by Miao Jin Xianfeng Gu Ying He Yalin Wang

This book offers an essential overview of computational conformal geometry applied to fundamental problems in specific engineering fields. It introduces readers to conformal geometry theory and discusses implementation issues from an engineering perspective.The respective chapters explore fundamental problems in specific fields of application, and detail how computational conformal geometric methods can be used to solve them in a theoretically elegant and computationally efficient way. The fields covered include computer graphics, computer vision, geometric modeling, medical imaging, and wireless sensor networks. Each chapter concludes with a summary of the material covered and suggestions for further reading, and numerous illustrations and computational algorithms complement the text.The book draws on courses given by the authors at the University of Louisiana at Lafayette, the State University of New York at Stony Brook, and Tsinghua University, and will be of interest to senior undergraduates, graduates and researchers in computer science, applied mathematics, and engineering.

Confronting Cyberespionage Under International Law (Routledge Research in International Law)

by Oğuz Kaan Pehlivan

We have witnessed a digital revolution that affects the dynamics of existing traditional social, economic, political and legal systems. This revolution has transformed espionage and its features, such as its purpose and targets, methods and means, and actors and incidents, which paves the way for the emergence of the term cyberespionage. This book seeks to address domestic and international legal tools appropriate to adopt in cases of cyberespionage incidents. Cyberespionage operations of state or non-state actors are a kind of cyber attack, which violates certain principles of international law but also constitute wrongful acquisition and misappropriation of the data. Therefore, from the use of force to state responsibility, international law offers a wide array of solutions; likewise, domestic regulations through either specialized laws or general principles stipulate civil and criminal remedies against cyberespionage. Confronting Cyberespionage Under International Law examines how espionage and its applications have transformed since World War II and how domestic and international legal mechanisms can provide effective legal solutions to this change, hindering the economic development and well-being of individuals, companies and states to the detriment of others. It shows the latest state of knowledge on the topic and will be of interest to researchers, academics, legal practitioners, legal advisors and students in the fields of international law, information technology law and intellectual property law.

Confronting the Internet’s Dark Side

by Raphael Cohen-Almagor

Terrorism, cyberbullying, child pornography, hate speech, cybercrime: along with unprecedented advancements in productivity and engagement, the Internet has ushered in a space for violent, hateful, and antisocial behavior. How do we, as individuals and as a society, protect against dangerous expressions online? Confronting the Internet's Dark Side is the first book on social responsibility on the Internet. It aims to strike a balance between the free speech principle and the responsibilities of the individual, corporation, state, and the international community. This book brings a global perspective to the analysis of some of the most troubling uses of the Internet. It urges net users, ISPs, and liberal democracies to weigh freedom and security, finding the golden mean between unlimited license and moral responsibility. This judgment is necessary to uphold the very liberal democratic values that gave rise to the Internet and that are threatened by an unbridled use of technology.

Congestion Control for 6LoWPAN Wireless Sensor Networks: Toward the Internet of Things (Springer Theses)

by Hayder Al-Kashoash

The Internet of Things (IoT) is the next big challenge for the research community. The IPv6 over low power wireless personal area network (6LoWPAN) protocol stack is considered a key part of the IoT. In 6LoWPAN networks, heavy network traffic causes congestion which significantly degrades network performance and impacts on quality of service aspects. This book presents a concrete, solid and logically ordered work on congestion control for 6LoWPAN networks as a step toward successful implementation of the IoT and supporting the IoT application requirements. The book addresses the congestion control issue in 6LoWPAN networks and presents a comprehensive literature review on congestion control for WSNs and 6LoWPAN networks. An extensive congestion analysis and assessment for 6LoWPAN networks is explored through analytical modelling, simulations and real experiments. A number of congestion control mechanisms and algorithms are proposed to mitigate and solve the congestion problem in 6LoWPAN networks by using and utilizing the non-cooperative game theory, multi-attribute decision making and network utility maximization framework. The proposed algorithms are aware of node priorities and application priorities to support the IoT application requirements and improve network performance in terms of throughput, end-to-end delay, energy consumption, number of lost packets and weighted fairness index.

Congestion Control in Data Transmission Networks: Sliding Mode and Other Designs (Communications and Control Engineering)

by Andrzej Bartoszewicz Przemysław Ignaciuk

Congestion Control in Data Transmission Networks details the modeling and control of data traffic in communication networks. It shows how various networking phenomena can be represented in a consistent mathematical framework suitable for rigorous formal analysis. The monograph differentiates between fluid-flow continuous-time traffic models, discrete-time processes with constant sampling rates, and sampled-data systems with variable discretization periods. The authors address a number of difficult real-life problems, such as: optimal control of flows with disparate, time-varying delay; the existence of source and channel nonlinearities; the balancing of quality of service and fairness requirements; and the incorporation of variable rate allocation policies. Appropriate control mechanisms which can handle congestion and guarantee high throughput in various traffic scenarios (with different networking phenomena being considered) are proposed. Systematic design procedures using sound control-theoretic foundations are adopted. Since robustness issues are of major concern in providing efficient data-flow regulation in today's networks, sliding-mode control is selected as the principal technique to be applied in creating the control solutions. The controller derivation is given extensive analytical treatment and is supported with numerous realistic simulations. A comparison with existing solutions is also provided. The concepts applied are discussed in a number of illustrative examples, and supported by many figures, tables, and graphs walking the reader through the ideas and introducing their relevance in real networks. Academic researchers and graduate students working in computer networks and telecommunications and in control (especially time-delay systems and discrete-time optimal and sliding-mode control) will find this text a valuable assistance in ensuring smooth data-flow within communications networks.

Congress on Intelligent Systems: Proceedings of CIS 2021, Volume 2 (Lecture Notes on Data Engineering and Communications Technologies #111)

by Mukesh Saraswat Harish Sharma K. Balachandran Joong Hoon Kim Jagdish Chand Bansal

This book is a collection of selected papers presented at the Second Congress on Intelligent Systems (CIS 2021), organized by Soft Computing Research Society and CHRIST (Deemed to be University), Bengaluru, India during September 4 – 5, 2021. It includes novel and innovative work from experts, practitioners, scientists and decision-makers from academia and industry. It covers topics such as Internet of Things, information security, embedded systems, real-time systems, cloud computing, big data analysis, quantum computing, automation systems, bio-inspired intelligence, cognitive systems, cyber physical systems, data analytics, data/web mining, data science, intelligence for security, intelligent decision making systems, intelligent information processing, intelligent transportation, artificial intelligence for machine vision, imaging sensors technology, image segmentation, convolutional neural network, image/video classification, soft computing for machine vision, pattern recognition, human computer interaction, robotic devices and systems, autonomous vehicles, intelligent control systems, human motor control, game playing, evolutionary algorithms, swarm optimization, neural network, deep learning, supervised learning, unsupervised learning, fuzzy logic, rough sets, computational optimization, and neuro fuzzy systems.

Congress on Intelligent Systems: Proceedings of CIS 2021, Volume 1 (Lecture Notes on Data Engineering and Communications Technologies #114)

by Mukesh Saraswat Harish Sharma K. Balachandran Joong Hoon Kim Jagdish Chand Bansal

This book is a collection of selected papers presented at the Second Congress on Intelligent Systems (CIS 2021), organized by Soft Computing Research Society and CHRIST (Deemed to be University), Bengaluru, India, during September 4 – 5, 2021. It includes novel and innovative work from experts, practitioners, scientists, and decision-makers from academia and industry. It covers topics such as Internet of things, information security, embedded systems, real-time systems, cloud computing, big data analysis, quantum computing, automation systems, bio-inspired intelligence, cognitive systems, cyber physical systems, data analytics, data/web mining, data science, intelligence for security, intelligent decision making systems, intelligent information processing, intelligent transportation, artificial intelligence for machine vision, imaging sensors technology, image segmentation, convolutional neural network, image/video classification, soft computing for machine vision, pattern recognition, human–computer interaction, robotic devices and systems, autonomous vehicles, intelligent control systems, human motor control, game playing, evolutionary algorithms, swarm optimization, neural network, deep learning, supervised learning, unsupervised learning, fuzzy logic, rough sets, computational optimization, and neuro-fuzzy systems.

Congress on Intelligent Systems: Proceedings of CIS 2020, Volume 1 (Advances in Intelligent Systems and Computing #1334)

by Harish Sharma Mukesh Saraswat Anupam Yadav Joong Hoon Kim Jagdish Chand Bansal

This book is a collection of selected papers presented at the First Congress on Intelligent Systems (CIS 2020), held in New Delhi, India during September 5 – 6, 2020. It includes novel and innovative work from experts, practitioners, scientists and decision-makers from academia and industry. It covers topics such as Internet of Things, information security, embedded systems, real-time systems, cloud computing, big data analysis, quantum computing, automation systems, bio-inspired intelligence, cognitive systems, cyber physical systems, data analytics, data/web mining, data science, intelligence for security, intelligent decision making systems, intelligent information processing, intelligent transportation, artificial intelligence for machine vision, imaging sensors technology, image segmentation, convolutional neural network, image/video classification, soft computing for machine vision, pattern recognition, human computer interaction, robotic devices and systems, autonomous vehicles, intelligent control systems, human motor control, game playing, evolutionary algorithms, swarm optimization, neural network, deep learning, supervised learning, unsupervised learning, fuzzy logic, rough sets, computational optimization, and neuro fuzzy systems.

Congress on Intelligent Systems: Proceedings of CIS 2020, Volume 2 (Advances in Intelligent Systems and Computing #1335)

by Harish Sharma Mukesh Saraswat Anupam Yadav Joong Hoon Kim Jagdish Chand Bansal

This book is a collection of selected papers presented at the First Congress on Intelligent Systems (CIS 2020), held in New Delhi, India, during September 5–6, 2020. It includes novel and innovative work from experts, practitioners, scientists, and decision-makers from academia and industry. It covers topics such as Internet of Things, information security, embedded systems, real-time systems, cloud computing, big data analysis, quantum computing, automation systems, bio-inspired intelligence, cognitive systems, cyber physical systems, data analytics, data/web mining, data science, intelligence for security, intelligent decision making systems, intelligent information processing, intelligent transportation, artificial intelligence for machine vision, imaging sensors technology, image segmentation, convolutional neural network, image/video classification, soft computing for machine vision, pattern recognition, human–computer interaction, robotic devices and systems, autonomous vehicles, intelligent control systems, human motor control, game playing, evolutionary algorithms, swarm optimization, neural network, deep learning, supervised learning, unsupervised learning, fuzzy logic, rough sets, computational optimization, and neuro-fuzzy systems.

Congress on Smart Computing Technologies: Proceedings of CSCT 2022 (Smart Innovation, Systems and Technologies #351)

by Jagdish Chand Bansal Harish Sharma Antorweep Chakravorty

This book presents high-quality research papers presented at Congress on Smart Computing Technologies (CSCT 2022) organized by SAU Center for Research and Innovative Learning (SCRIL), South Asian University, India, from 3–4 December 2022. The book extensively covers recent research in algorithms for smart computing, AI and machine learning in smart computing, edge computing algorithms, adversarial networks and autoencoders, data visualization, data mining, data analytics, machine learning, game theory, high-performance computing, mobile and ubiquitous platforms for smart environments, cloud/edge/fog computing technologies for smart systems, Internet of Things (IoT) and industrial IoT technologies for smart systems, smart device and hardware, security, privacy, and economics in smart environments, big data, healthcare informatics, smart precision agriculture, smart transportation, social network analysis, and human–computer interaction.

Congressional Communication in the Digital Age (Routledge Research in American Politics and Governance)

by Jocelyn Evans Jessica M. Hayden

Communication defines political representation. At the core of the representational relationship lies the interaction between principal and agent; the quality of this relationship is predicated upon the accessibility of effective channels of communication between the constituent and representative. Over the past decade, congressional websites have become the primary way constituents communicate with their members and a prominent place for members to communicate with constituents. Yet, as we move toward the third decade of the 21st century, little work has systematically analyzed this forum as a distinct representational space. In this book, Jocelyn Evans and Jessica Hayden offer a fresh, timely, and mixed-methods approach for understanding how the emergence of virtual offices has changed the representational relationship between constituents and members of Congress. Utilizing strong theoretical foundations, a broad historical perspective, elite interviews, and rich original datasets, Evans and Hayden present evidence that virtual offices operate as a distinct representational space, and they demonstrate that their use has resulted in unprecedented and ill-understood changes in representational behavior. Congressional Communication in the Digital Age contributes to the scholarship on representation theory and its application to the contemporary Congress. It is valuable reading for students and researchers interested in American politics, political communication, and legislative politics.

Connect: How to Use Data and Experience Marketing to Create Lifetime Customers

by Ron Person Lars Birkholm Petersen Christopher Nash

Connect and engage across channels with the new customers Connect is the ultimate marketing guide to becoming more relevant, effective, and successful within the new marketplace. Written by a team of marketing experts serving Fortune 500 brands, this book outlines the massive paradigm shift currently taking place within the industry, and provides the insight and perspective marketers need to stay on board. Readers will find guidance toward reaching a customer base that sees marketers as an unnecessary annoyance, and strategies for engaging those customers at touch points throughout the customer lifecycle. The book's scope encompasses both digital and real-life avenues, discussing the new ways of thinking and the new tools and processes that allow marketers to function in the new era where digital customer experiences are increasingly important. Marketing is undergoing a revolution to rival the impact of Gutenberg's printing press. Customers are in control, with more choice and more access than ever before, and they refuse to be "sold to" or "managed." Many marketing professionals are flailing for a new strategy while the winners are clearly jumping ahead - Connect takes readers inside the winners' world to learn the approach that's engaging the new consumer. Discover the technology and processes that allow marketers to remain relevant Craft a personal, relevant, and accessible customer journey that engages the connected customer Keep in touch throughout the customer's life cycle, both online and offline Link digital goals and metrics to business objectives for a more relevant strategy Smart marketers have moved to a higher level that achieves business objectives while increasing relevance to the customer. Connect provides readers a roadmap to this new approach, and the tools that make it work.

Connected and Automated Vehicles: Integrating Engineering and Ethics (Studies in Applied Philosophy, Epistemology and Rational Ethics #67)

by Fabio Fossa Federico Cheli

This book reports on theoretical and practical analyses of the ethical challenges connected to driving automation. It also aims at discussing issues that have arisen from the European Commission 2020 report “Ethics of Connected and Automated Vehicles. Recommendations on Road Safety, Privacy, Fairness, Explainability and Responsibility”. Gathering contributions by philosophers, social scientists, mechanical engineers, and UI designers, the book discusses key ethical concerns relating to responsibility and personal autonomy, privacy, safety, and cybersecurity, as well as explainability and human-machine interaction. On the one hand, it examines these issues from a theoretical, normative point of view. On the other hand, it proposes practical strategies to face the most urgent ethical problems, showing how the integration of ethics and technology can be achieved through design practices. All in all, this book fosters a multidisciplinary approach where philosophy, ethics, and engineering are integrated, rather than just juxtaposed. It is meant to inform and inspire an audience of philosophers of technology, ethicists, engineers, developers, manufacturers, and regulators, among other interested readers.

Connected Code: Why Children Need to Learn Programming (The John D. and Catherine T. MacArthur Foundation Series on Digital Media and Learning)

by Yasmin B. Kafai Quinn Burke

Why every child needs to learn to code: the shift from “computational thinking” to computational participation.Coding, once considered an arcane craft practiced by solitary techies, is now recognized by educators and theorists as a crucial skill, even a new literacy, for all children. Programming is often promoted in K-12 schools as a way to encourage “computational thinking”—which has now become the umbrella term for understanding what computer science has to contribute to reasoning and communicating in an ever-increasingly digital world.In Connected Code, Yasmin Kafai and Quinn Burke argue that although computational thinking represents an excellent starting point, the broader conception of “computational participation” better captures the twenty-first-century reality. Computational participation moves beyond the individual to focus on wider social networks and a DIY culture of digital “making.”Kafai and Burke describe contemporary examples of computational participation: students who code not for the sake of coding but to create games, stories, and animations to share; the emergence of youth programming communities; the practices and ethical challenges of remixing (rather than starting from scratch); and the move beyond stationary screens to programmable toys, tools, and textiles.

Refine Search

Showing 11,601 through 11,625 of 53,517 results