Browse Results

Showing 27,176 through 27,200 of 29,540 results

Image Processing and Communications Challenges 10: 10th International Conference, IP&C’2018 Bydgoszcz, Poland, November 2018, Proceedings (Advances in Intelligent Systems and Computing #892)

by Ryszard S. Choraś Michał Choraś

Presenting a collection of high-quality research papers on image processing and communications, this book not only discusses emerging applications of the currently available solutions, but also outlines potential future techniques and research directions in these areas. Gathering the proceedings of the 10th International Conference on Image Processing and Communications (IP&C 2018), held in Bydgoszcz, Poland in November 2018, it is divided into two parts. Part I focuses on image processing, offering a comprehensive survey of available methods and discussing current trends in computer vision. In turn, Part II presents novel results on networks, communications and a diverse range of applications, including cybersecurity and cloud computing.

Image Texture Analysis: Foundations, Models and Algorithms

by Chih-Cheng Hung Enmin Song Yihua Lan

This useful textbook/reference presents an accessible primer on the fundamentals of image texture analysis, as well as an introduction to the K-views model for extracting and classifying image textures. Divided into three parts, the book opens with a review of existing models and algorithms for image texture analysis, before delving into the details of the K-views model. The work then concludes with a discussion of popular deep learning methods for image texture analysis.Topics and features: provides self-test exercises in every chapter; describes the basics of image texture, texture features, and image texture classification and segmentation; examines a selection of widely-used methods for measuring and extracting texture features, and various algorithms for texture classification; explains the concepts of dimensionality reduction and sparse representation; discusses view-based approaches to classifying images; introduces the template for the K-views algorithm, as well as a range of variants of this algorithm; reviews several neural network models for deep machine learning, and presents a specific focus on convolutional neural networks.This introductory text on image texture analysis is ideally suitable for senior undergraduate and first-year graduate students of computer science, who will benefit from the numerous clarifying examples provided throughout the work.

Imagine. Shoot. Create.: Creative Photography

by Annegien Schilling

Annegien Schilling's imaginative self-portraits inspire just under 1 million followers under the account @fetching_tigerss. In this, her first book, she guides her readers through simple step-by-steps to beautiful, surreal imagery and teaches her successful method of conceiving an idea (Imagine), capturing it correctly (Shoot), and editing them efficiently (Create), all without expensive camera gear or complicated software. This book will inspire you to explore your imagination and create photos you never thought possible!

Immersive Learning Research Network: 5th International Conference, iLRN 2019, London, UK, June 23–27, 2019, Proceedings (Communications in Computer and Information Science #1044)

by Leonel Morgado Johanna Pirker Dennis Beck Jonathon Richter Christian Gütl Anasol Peña-Rios Todd Ogle Daphne Economou Markos Mentzelopoulos Christian Eckhardt Roxane Koitz-Hristov Michael Gardner

This volume constitutes the refereed proceedings of the 5th International Conference of the Immersive Learning Network, iLRN 2019, held in London, UK, in June 2019.The 18 revised full papers and presented in this volume were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on science, technology, engineering, and mathematics (STEM); disciplinary applications: special education; disciplinary applications: history; pedagogical strategies; immersion and presence.

The Impact of Service Oriented Architecture Adoption on Organizations (SpringerBriefs in Electrical and Computer Engineering)

by Iraj Sadegh Amiri Naghmeh Niknejad Ab Razak Hussin

This book describes Service-Oriented Architecture (SOA) and the significant factors which affect its adoption, such as governance, strategy, complexity, Return on Investment (ROI), business and IT alignment, culture and communication, costs, and security. The study on which this book is based, involved a quantitative analysis to investigate the influential factors for adopting SOA, paving the way to further research in the field.

Implementation and Application of Automata: 24th International Conference, CIAA 2019, Košice, Slovakia, July 22–25, 2019, Proceedings (Lecture Notes in Computer Science #11601)

by Michal Hospodár Galina Jirásková

This book constitutes the proceedings of the 24th International Conference on Implementation and Application of Automata, CIAA 2019, held in Kosice, Slovakia, in July 2019.The 17 regular papers presented together with 2 invited papers in this book were carefully reviewed and selected from 29 initial submissions. The topics of the papers include complexity of languages and language operations, regular expressions, picture languages, jumping automata, input driven and two-dimensional automata, tree languages and tree transducers, architecture of oritatami systems, intruder deduction problem, context sensitive ash codes, rational relations, and algorithms for manipulating sequence binary decision diagrams

Implementing AWS: Leverage AWS features to build highly secure, fault-tolerant, and scalable cloud environments

by Yohan Wadia Lucas Chan Rowan Udell Udita Gupta

Work through exciting recipes to administer your AWS cloud Key Features Build secure environments using AWS components and services Explore core AWS features with real-world applications and best practices Design and build Lambda functions using real-world examples Book Description With this Learning Path, you'll explore techniques to easily manage applications on the AWS cloud. You'll begin with an introduction to serverless computing, its advantages, and the fundamentals of AWS. The following chapters will guide you on how to manage multiple accounts by setting up consolidated billing, enhancing your application delivery skills, with the latest AWS services such as CodeCommit, CodeDeploy, and CodePipeline to provide continuous delivery and deployment, while also securing and monitoring your environment's workflow. It'll also add to your understanding of the services AWS Lambda provides to developers. To refine your skills further, it demonstrates how to design, write, test, monitor, and troubleshoot Lambda functions. By the end of this Learning Path, you'll be able to create a highly secure, fault-tolerant, and scalable environment for your applications. This Learning Path includes content from the following Packt products: AWS Administration: The Definitive Guide, Second Edition by Yohan Wadia AWS Administration Cookbook by Rowan Udell, Lucas Chan Mastering AWS Lambda by Yohan Wadia, Udita Gupta What you will learn Explore the benefits of serverless computing and applications Deploy apps with AWS Elastic Beanstalk and Amazon Elastic File System Secure environments with AWS CloudTrail, AWSConfig, and AWS Shield Run big data analytics with Amazon EMR and Amazon Redshift Back up and safeguard data using AWS Data Pipeline Create monitoring and alerting dashboards using CloudWatch Effectively monitor and troubleshoot serverless applications with AWS Design serverless apps via AWS Lambda, DynamoDB, and API Gateway Who this book is for This Learning Path is specifically designed for IT system and network administrators, AWS architects, and DevOps engineers who want to effectively implement AWS in their organization and easily manage daily activities. Familiarity with Linux, web services, cloud computing platforms, virtualization, networking, and other administration-related tasks will assist in understanding the concepts in the book. Prior hands-on experience with AWS core services such as EC2, IAM, S3, and programming languages, such as Node.Js, Java, and C#, will also prove beneficial.

Implementing Azure: Transform your software deployment process with Microsoft Azure

by Florian Klaffenbach Oliver Michalski Namit Tanasseri Markus Klein Mohamed Wali

Explore powerful Azure DevOps solutions to develop and deploy your software faster and more efficiently. Key Features Build modern microservice-based systems with Azure architecture Learn to deploy and manage cloud services and virtual machines Configure clusters with Azure Service Fabric for deployment Book Description This Learning Path helps you understand microservices architecture and leverage various services of Microsoft Azure Service Fabric to build, deploy, and maintain highly scalable enterprise-grade applications. You will learn to select an appropriate Azure backend structure for your solutions and work with its toolkit and managed apps to share your solutions with its service catalog. As you progress through the Learning Path, you will study Azure Cloud Services, Azure-managed Kubernetes, and Azure Container Services deployment techniques. To apply all that you've understood, you will build an end-to-end Azure system in scalable, decoupled tiers for an industrial bakery with three business domains. Toward the end of this Learning Path, you will build another scalable architecture using Azure Service Bus topics to send orders between decoupled business domains with scalable worker roles processing these orders. By the end of this Learning Path, you will be comfortable in using development, deployment, and maintenance processes to build robust cloud solutions on Azure. This Learning Path includes content from the following Packt products: Learn Microsoft Azure by Mohamed Wali Implementing Azure Solutions - Second Edition by Florian Klaffenbach, Oliver Michalski, Markus Klein Microservices with Azure by Namit Tanasseri and Rahul Rai What you will learn Study various Azure Service Fabric application programming models Create and manage a Kubernetes cluster in Azure Kubernetes Service Use site-to-site VPN and ExpressRoute connections in your environment Design an Azure IoT app and learn to operate it in various scenarios Implement a hybrid Azure design using Azure Stack Build Azure SQL databases with Code First Migrations Integrate client applications with Web API and SignalR on Azure Implement the Azure Active Directory (Azure AD) across the entire system Who this book is for If you are an IT system architect, network admin, or a DevOps engineer who wants to implement Azure solutions for your organization, this Learning Path is for you. Basic knowledge of the Azure Cloud platform will be beneficial.

Implementing Cloud Design Patterns for AWS: Solutions and design ideas for solving system design problems, 2nd Edition

by Marcus Young Clive Harber Sean Keery

Create highly efficient design patterns for scalability, redundancy, and high availability in the AWS CloudKey FeaturesBuild highly robust systems using the cloud infrastructureMake web applications resilient against scheduled and accidental downtimeExplore and apply Amazon-provided services in unique ways to solve common design problemsBook DescriptionWhether you're just getting your feet wet in cloud infrastructure or already creating complex systems, this book will guide you through using the patterns to fit your system needs.Starting with patterns that cover basic processes such as source control and infrastructure-as-code, the book goes on to introduce cloud security practices. You'll then cover patterns of availability and scalability and get acquainted with the ephemeral nature of cloud environments. You'll also explore advanced DevOps patterns in operations and maintenance, before focusing on virtualization patterns such as containerization and serverless computing. In the final leg of your journey, this book will delve into data persistence and visualization patterns. You'll get to grips with architectures for processing static and dynamic data, as well as practices for managing streaming data.By the end of this book, you will be able to design applications that are tolerant of underlying hardware failures, resilient against an unexpected influx of data, and easy to manage and replicate.What you will learnImplement scaling policies on schedules, influxes in traffic, and deep health checksMake complete use of highly available and redundant storageDesign content delivery networks to improve user experienceOptimize databases through caching and shardingApply patterns to solve common problemsImplement repeatable processes for deploying systemsWho this book is forIf you’re an architect, solution provider, or DevOps community member looking to implement repeatable patterns for deploying and maintaining services in the Amazon cloud infrastructure, this book is for you.You’ll need prior experience of using AWS understand key concepts covered in the book, as it focuses on the patterns rather than the basics of using AWS.

Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition

by Jason Sachowski

Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition presents the optimal way for digital forensic and IT security professionals to implement a proactive approach to digital forensics. The book details how digital forensic processes can align strategically with business operations and an already existing information and data security program. Detailing proper collection, preservation, storage, and presentation of digital evidence, the procedures outlined illustrate how digital evidence can be an essential tool in mitigating risk and redusing the impact of both internal and external, digital incidents, disputes, and crimes. By utilizing a digital forensic readiness approach and stances, a company’s preparedness and ability to take action quickly and respond as needed. In addition, this approach enhances the ability to gather evidence, as well as the relevance, reliability, and credibility of any such evidence. New chapters to this edition include Chapter 4 on Code of Ethics and Standards, Chapter 5 on Digital Forensics as a Business, and Chapter 10 on Establishing Legal Admissibility. This book offers best practices to professionals on enhancing their digital forensic program, or how to start and develop one the right way for effective forensic readiness in any corporate or enterprise setting.

Implementing Integrated Business Planning: A Guide Exemplified With Process Context and SAP IBP Use Cases (Management for Professionals)

by Robert Kepczynski Raghav Jandhyala Ganesh Sankaran Alecsandra Dimofte Andrew Boyle

This book provides comprehensive guidance on leveraging SAP IBP technology to connect strategic, tactical and operational planning into one coherent process framework, presenting experience shared by practitioners in workshops, customer presentations, business, and IT transformation projects. It also offers use cases and a wealth of practical tips to ensure that readers understand the challenges and advantages of IBP implementation. The book starts by characterizing disconnected planning and contrasting this with key elements of a transformation project approach. It explains the functional foundations and SAP Hybris, Trade Promotion Planning, Customer Business Planning, ARIBA, and S/4 integration with SAP IBP. It then presents an example of a process for integrating finance in IBP. Annual business planning and monthly strategic product planning are taken as examples of explain Strategic Planning. The core of the book is dedicated to tactical sales and operations planning (S&OP) and its process steps, product demand, supply review, integrated reconciliation and management business review, illustrating all steps with use cases. It also describes unconstrained and constrained-but-optimized supply planning, inventory optimization, and shelf life planning in detail, and explains how to improve responsiveness with order-based allocation planning, sales order confirmation, and big deal / tender management coupled with simultaneous re-planning of supply. The book closes with a chapter on performance measurement, focusing on effectiveness, efficiency, and adherence. Throughout, the book includes use cases to connect process and technology through use.

Implementing iOS and macOS Documents with the Files App: Managing Files and Ensuring Compatibility

by Jesse Feiler

Rise above the basics of Xcode app development to implement tools like Share buttons and activity view controllers to share document content including parts of documents with other users and with other devices. This book fills the gap so that developers with even a fundamental knowledge of iOS and Swift can implement document creation, saving, and sharing in their apps.Since the launch of iPhone in 2007, users and developers have struggled with the fact that the file system is hidden. Fortunately the Files app in iOS 11 now offers this feature and it is supported by Apple apps such as Numbers, Pages, and Keynote as well as by the few third-party apps that support documents. By using the standard formats described in this book, you can make your app’s data shareable to and from other apps like Numbers, Pages, and Word. Files also provides an interface to tools such as Dropbox and iCloud so that users can open and modify documents in them. If you combine standard formats such as .doc, .docx, .jpeg, and .jpg with Dropbox and eMail, you have a simple way to implement and use cross-platform sharing to Macs, PCs, and Android devices.Implementing iOS and macOS Documents with the Files App provides the combination of skills developers need to build these types of apps—working with files and constructing documents. What You'll LearnAdd Document Support to Your Apps Share your documents with iCloud and Apple IDs across your Mac and iOS devices Use standard formats from .doc, .docx, .png, and .jpeg both for input and outputManage and organize documentsWho This Book Is ForDevelopers with a basic knowledge of app development and Swift. You should already know how to use Xcode to create an app. Knowledge of basic Swift syntax is recommended. The book can also be a useful overview and guide to managers who are trying to decide how to convert legacy document-based systems to apps.

Implementing SAP S/4HANA: A Framework for Planning and Executing SAP S/4HANA Projects

by Sanket Kulkarni

Gain a better understanding of implementing SAP S/4HANA-based digital transformations. This book helps you understand the various components involved in the planning and execution of successful SAP S/4HANA projects. Learn how to ensure success by building a solid business case for SAP S/4HANA up front and track business value generated throughout the implementation. Implementing SAP S/4HANA provides a framework for planning and executing SAP S/4HANA projects by articulating the implementation approach used by different components in SAP S/4HANA implementations. Whether you are mid-way through the SAP S/4HANA program or about to embark on it, this book will help you throughout the journey. If you are looking for answers on why SAP S/4HANA requires special considerations as compared to a traditional SAP implementation, this book is for you.What You Will LearnUnderstand various components of your SAP S/4HANA projectForecast and track your success throughout the SAP S/4HANA implementationBuild a solid business case for your SAP S/4HANA programDiscover how the implementation approach varies across these componentsWho This Book Is ForSAP S/4HANA clients (line managers and consultants).

Implementing VMware Horizon 7.5 - Third Edition: Manage and deploy the end-user computing infrastructure for your organization, 3rd Edition

by Jason Ventresco

The book is intended to system administrators, solutions architects, desktop engineers, and various professionals who want to level up their skill in working with VMware's Horizon ecosystem and build a successful deployment strategy for desktops and applications.

Imposing Regulation on Advanced Algorithms (SpringerBriefs in Law)

by Fotios Fitsilis

This book discusses the necessity and perhaps urgency for the regulation of algorithms on which new technologies rely; technologies that have the potential to re-shape human societies. From commerce and farming to medical care and education, it is difficult to find any aspect of our lives that will not be affected by these emerging technologies. At the same time, artificial intelligence, deep learning, machine learning, cognitive computing, blockchain, virtual reality and augmented reality, belong to the fields most likely to affect law and, in particular, administrative law. The book examines universally applicable patterns in administrative decisions and judicial rulings. First, similarities and divergence in behavior among the different cases are identified by analyzing parameters ranging from geographical location and administrative decisions to judicial reasoning and legal basis. As it turns out, in several of the cases presented, sources of general law, such as competition or labor law, are invoked as a legal basis, due to the lack of current specialized legislation. This book also investigates the role and significance of national and indeed supranational regulatory bodies for advanced algorithms and considers ENISA, an EU agency that focuses on network and information security, as an interesting candidate for a European regulator of advanced algorithms. Lastly, it discusses the involvement of representative institutions in algorithmic regulation.

Impresión 3D: La Guía Completa: Configuración, software, ideas, diseños, materiales, aplicaciones, consejos y más

by Bob Babson

Impresión 3D La Guía Completa: Configuración, software, ideas, diseños, materiales, aplicaciones, consejos y más por Bob Babson En este libro aprenderá todo sobre la impresión en 3D y cómo empezar. Impresión 3D de la guía completa: configuración, software, ideas, diseños, materiales, aplicaciones, consejos y más ¿Le gustaría comprar una impresora 3D pero no tiene ni idea de cuál comprar? ¿Le gustaría aprender a utilizar las impresoras 3D para imprimir objetos y diseños sorprendentes? En este libro aprenderá todo sobre la impresión en 3D y cómo empezar. Aprende: -Cómo empezar -Qué impresoras 3D comprar -Características y capacidades de las impresoras 3D + MUCHO MÁS! Descargo de responsabilidad: Este autor y/o propietario(s) de derechos no hace reclamos, promesas o garantías sobre la exactitud, integridad o adecuación de los contenidos de este libro, y expresamente niega responsabilidad por errores y omisiones en los contenidos dentro de este libro. Este producto es sólo para uso de referencia.

Improving Forecasts with Integrated Business Planning: From Short-Term to Long-Term Demand Planning Enabled by SAP IBP (Management for Professionals)

by Robert Kepczynski Ganesh Sankaran Federico Sasso Alessandro Chiaraviglio

This book provides both a broad overview of the forecasting process, covering technological and human aspects alike, and deep insights into algorithms and platform functionalities in the IBP toolbox required to maximize forecast accuracy. Rich in technical and business explanations, it addresses short-, medium- and long-term forecasting processes using functionalities available in demand planning and demand sensing. There are also several theoretical concepts underpinning the algorithms discussed; these are explained with numerical examples to help demystify the IBP forecasting toolbox. Beyond standard procedures, the book also discusses custom approaches (e.g. new segmentation criteria, new outlier detection and correction methods) and new methods (e.g. the use of Markov chains for forecasting sporadic demands), etc. It subsequently benchmarks common practices using these innovative approaches and discusses the results. As measurement is an important precondition for improvement, an entire chapter is devoted to discussing process improvement and value using the Six Sigma methodology. In closing, the book provides several useful tips and tricks that should come in handy during project implementation.

Improving your C# Skills: Solve modern challenges with functional programming and test-driven techniques of C#

by Rod Stephens John Callaway Clayton Hunt Ovais Mehboob Ahmed Khan

Conquer complex and interesting programming challenges by building robust and concurrent applications with caches, cryptography, and parallel programming.Key FeaturesUnderstand how to use .NET frameworks like the Task Parallel Library (TPL)and CryptoAPIDevelop a containerized application based on microservices architectureGain insights into memory management techniques in .NET CoreBook DescriptionThis Learning Path shows you how to create high performing applications and solve programming challenges using a wide range of C# features. You’ll begin by learning how to identify the bottlenecks in writing programs, highlight common performance pitfalls, and apply strategies to detect and resolve these issues early. You'll also study the importance of micro-services architecture for building fast applications and implementing resiliency and security in .NET Core. Then, you'll study the importance of defining and testing boundaries, abstracting away third-party code, and working with different types of test double, such as spies, mocks, and fakes. In addition to describing programming trade-offs, this Learning Path will also help you build a useful toolkit of techniques, including value caching, statistical analysis, and geometric algorithms. This Learning Path includes content from the following Packt products:C# 7 and .NET Core 2.0 High Performance by Ovais Mehboob Ahmed KhanPractical Test-Driven Development using C# 7 by John Callaway, Clayton HuntThe Modern C# Challenge by Rod StephensWhat you will learnMeasure application performance using BenchmarkDotNetLeverage the Task Parallel Library (TPL) and Parallel Language Integrated Query (PLINQ)library to perform asynchronous operationsModify a legacy application to make it testableUse LINQ and PLINQ to search directories for files matching patternsFind areas of polygons using geometric operationsRandomize arrays and lists with extension methodsUse cryptographic techniques to encrypt and decrypt strings and filesWho this book is forIf you want to improve the speed of your code and optimize the performance of your applications, or are simply looking for a practical resource on test driven development, this is the ideal Learning Path for you. Some familiarity with C# and .NET will be beneficial.

Improving your Penetration Testing Skills: Strengthen your defense against web attacks with Kali Linux and Metasploit

by Abhinav Singh Juned Ahmed Ansari Gilberto Najera-Gutierrez Daniel Teixeira

Evade antiviruses and bypass firewalls with the most widely used penetration testing frameworks Key Features Gain insights into the latest antivirus evasion techniques Set up a complete pentesting environment using Metasploit and virtual machines Discover a variety of tools and techniques that can be used with Kali Linux Book Description Penetration testing or ethical hacking is a legal and foolproof way to identify vulnerabilities in your system. With thorough penetration testing, you can secure your system against the majority of threats. This Learning Path starts with an in-depth explanation of what hacking and penetration testing is. You'll gain a deep understanding of classical SQL and command injection flaws, and discover ways to exploit these flaws to secure your system. You'll also learn how to create and customize payloads to evade antivirus software and bypass an organization's defenses. Whether it's exploiting server vulnerabilities and attacking client systems, or compromising mobile phones and installing backdoors, this Learning Path will guide you through all this and more to improve your defense against online attacks. By the end of this Learning Path, you'll have the knowledge and skills you need to invade a system and identify all its vulnerabilities. This Learning Path includes content from the following Packt products: Web Penetration Testing with Kali Linux - Third Edition by Juned Ahmed Ansari and Gilberto Najera-Gutierrez Metasploit Penetration Testing Cookbook - Third Edition by Abhinav Singh , Monika Agarwal, et al What you will learn Build and analyze Metasploit modules in Ruby Integrate Metasploit with other penetration testing tools Use server-side attacks to detect vulnerabilities in web servers and their applications Explore automated attacks such as fuzzing web applications Identify the difference between hacking a web application and network hacking Deploy Metasploit with the Penetration Testing Execution Standard (PTES) Use MSFvenom to generate payloads and backdoor files, and create shellcode Who this book is for This Learning Path is designed for security professionals, web programmers, and pentesters who want to learn vulnerability exploitation and make the most of the Metasploit framework. Some understanding of penetration testing and Metasploit is required, but basic system administration skills and the ability to read code are a must.

Improving Your Splunk Skills: Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights

by Josh Diakun Derek Mock James D. Miller Paul R. Johnson

Transform machine-generated data into valuable business insights using the powers of Splunk Key Features Explore the all-new machine learning toolkit in Splunk 7.x Tackle any problems related to searching and analyzing your data with Splunk Get the latest information and business insights on Splunk 7.x Book Description Splunk makes it easy for you to take control of your data and drive your business with the cutting edge of operational intelligence and business analytics. Through this Learning Path, you'll implement new services and utilize them to quickly and efficiently process machine-generated big data. You'll begin with an introduction to the new features, improvements, and offerings of Splunk 7. You'll learn to efficiently use wildcards and modify your search to make it faster. You'll learn how to enhance your applications by using XML dashboards and configuring and extending Splunk. You'll also find step-by-step demonstrations that'll walk you through building an operational intelligence application. As you progress, you'll explore data models and pivots to extend your intelligence capabilities. By the end of this Learning Path, you'll have the skills and confidence to implement various Splunk services in your projects. This Learning Path includes content from the following Packt products: Implementing Splunk 7 - Third Edition by James Miller Splunk Operational Intelligence Cookbook - Third Edition by Paul R Johnson, Josh Diakun, et al What you will learn Master the new offerings in Splunk: Splunk Cloud and the Machine Learning Toolkit Create efficient and effective searches Master the use of Splunk tables, charts, and graph enhancements Use Splunk data models and pivots with faster data model acceleration Master all aspects of Splunk XML dashboards with hands-on applications Apply ML algorithms for forecasting and anomaly detection Integrate advanced JavaScript charts and leverage Splunk's API Who this book is for This Learning Path is for data analysts, business analysts, and IT administrators who want to leverage the Splunk enterprise platform as a valuable operational intelligence tool. Existing Splunk users who want to upgrade and get up and running with Splunk 7.x will also find this book useful. Some knowledge of Splunk services will help you get the most out of this Learning Path.

In Defense of Elitism: Why I'm Better Than You and You're Better Than Someone Who Didn't Buy This Book

by Joel Stein

From Thurber finalist and former star TIME columnist Joel Stein comes a "brilliant exploration" (Walter Isaacson) of America's political culture war and a hilarious call to arms for the elite."I can think of no one more suited to defend elitism than Stein, a funny man with hands as delicate as a baby full of soft-boiled eggs."--Jimmy Kimmel, host of Jimmy Kimmel Live!The night Donald Trump won the presidency, our author Joel Stein, Thurber Prize finalist and former staff writer for Time Magazine, instantly knew why. The main reason wasn't economic anxiety or racism. It was that he was anti-elitist. Hillary Clinton represented Wall Street, academics, policy papers, Davos, international treaties and the people who think they're better than you. People like Joel Stein. Trump represented something far more appealing, which was beating up people like Joel Stein. In a full-throated defense of academia, the mainstream press, medium-rare steak, and civility, Joel Stein fights against populism. He fears a new tribal elite is coming to replace him, one that will fend off expertise of all kinds and send the country hurtling backward to a time of wars, economic stagnation and the well-done steaks doused with ketchup that Trump eats. To find out how this shift happened and what can be done, Stein spends a week in Roberts County, Texas, which had the highest percentage of Trump voters in the country. He goes to the home of Trump-loving Dilbert cartoonist Scott Adams; meets people who create fake news; and finds the new elitist organizations merging both right and left to fight the populists. All the while using the biggest words he knows.

The Indecent Screen: Regulating Television in the Twenty-First Century

by Cynthia Chris

The Indecent Screen explores clashes over indecency in broadcast television among U.S.-based media advocates, television professionals, the Federal Communications Commission, and TV audiences. Cynthia Chris focuses on the decency debates during an approximately twenty-year period since the Telecommunications Act of 1996, which in many ways restructured the media environment. Simultaneously, ever increasing channel capacity, new forms of distribution, and time-shifting (in the form of streaming and on-demand viewing options) radically changed how, when, and what we watch. But instead of these innovations quelling concerns that TV networks were too often transmitting indecent material that was accessible to children, complaints about indecency skyrocketed soon after the turn of the century. Chris demonstrates that these clashes are significant battles over the role of family, the role of government, and the value of free speech in our lives, arguing that an uncensored media is so imperative to the public good that we can, and must, endure the occasional indecent screen.

Individual-based Methods in Forest Ecology and Management

by Arne Pommerening Pavel Grabarnik

Model-driven individual-based forest ecology and individual-based methods in forest management are of increasing importance in many parts of the world. For the first time this book integrates three main fields of forest ecology and management, i.e. tree/plant interactions, biometry of plant growth and human behaviour in forests. Individual-based forest ecology and management is an interdisciplinary research field with a focus on how the individual behaviour of plants contributes to the formation of spatial patterns that evolve through time. Key to this research is a strict bottom-up approach where the shaping and characteristics of plant communities are mostly the result of interactions between plants and between plants and humans. This book unites important methods of individual-based forest ecology and management from point process statistics, individual-based modelling, plant growth science and behavioural statistics. For ease of access, better understanding and transparency the methods are accompanied by R code and worked examples.

Industrial Applications of Holonic and Multi-Agent Systems: 9th International Conference, HoloMAS 2019, Linz, Austria, August 26–29, 2019, Proceedings (Lecture Notes in Computer Science #11710)

by Ismail Khalil A Min Tjoa Vladimír Mařík Petr Kadera Alois Zoitl Gabriele Anderst-Kotsis George Rzevski

This book constitutes the refereed proceedings of the 9th International Conference on Industrial Applications of Holonic and Multi-Agent Systems, HoloMAS 2019, held in Linz, Austria, in August 2019. The 14 full papers presented were carefully reviewed and selected from 15 submissions, and 2 invited papers were also included. The papers are organized in the following topical sections: invited talks; methodologies and framework; agent-based production scheduling and control; data and knowledge; and MAS in various areas.

Industrial Engineering in the Big Data Era: Selected Papers from the Global Joint Conference on Industrial Engineering and Its Application Areas, GJCIE 2018, June 21–22, 2018, Nevsehir, Turkey (Lecture Notes in Management and Industrial Engineering)

by Emre Cevikcan Fethi Calisir Hatice Camgoz Akdag

This book gathers extended versions of the best papers presented at the Global Joint Conference on Industrial Engineering and Its Application Areas (GJCIE), held in Nevsehir, Turkey, on June 21-22, 2018. They reports on industrial engineering methods and applications, with a special focus on the advantages and challenges posed by Big data in this field. The book covers a wide range of topics, including decision making, optimization, supply chain management and quality control.

Refine Search

Showing 27,176 through 27,200 of 29,540 results