Browse Results What Format Should I Choose?

Showing 26 through 50 of 14,389 results
Previous   Page: 1 2 3 Go to last page   Next

Tales of Tenali Rama - Tenali Rama and the Wrestling Champion

by BPI India Pvt Ltd

From the Ancient tales of Tenali Rama

Tales of Tenali Rama - Tenali Rama, the Messenger

by BPI India Pvt Ltd

From the Ancient tales of Tenali Rama

Tales of Tenali Rama - Tenali Rama and the Rats

by BPI India Pvt Ltd

From the Ancient tales of Tenali Rama

Fiscal Monitor, October 2016: Debt Use It Wisely

by International Monetary Fund

A report from the International Monetary Fund.

World Economic Outlook, October 2016: Subdued Demand - Symptoms and Remedies

by International Monetary Fund

A report from the International Monetary Fund.

Regional Economic Outlook, October 2011: Middle East and Central Asia

by International Monetary Fund

A report from the International Monetary Fund.

La montée en puissance du Mozambique: Construire un nouveau lendemain

by Doris C. Ross

This publication highlights Mozambique's remarkably strong growth over the two decades since the end of the civil war in 1992, as well as the major challenges that remain for the country to rise out of poverty and further its economic development. Chapters explore such topics as the role of megaprojects and their relationship to jobs and growth; infrastructure and public investment; Mozambique's quest for inclusive growth; developing the agricultural sector; and building a social protection floor.

China Lodging Group (A)

by Tatiana Sandino Shelley Xin Li Nancy Hua Dai

This case study explores the challenges of aligning middle management interests with company goals as a company navigates rapid growth in a dynamic industry. China Lodging Group, a Chinese hotel chain that opened about 2,000 hotels during its first decade in business, uses Balanced Scorecard (BSC) metrics to promote both consistency of service and an entrepreneurial attitude amongst hotel managers. The company needs to encourage its managers to operate according to company-level values and goals, without gaming the BSC metrics for short-term rewards or without focusing exclusively on local, narrow results. This case illustrates how executive teams can develop incentive systems that increase managers' sense of ownership and commitment to company values and goals.

China Lodging Group (B)

by Tatiana Sandino Shelley Xin Li Nancy Hua Dai

This case study explores the challenges of aligning middle management interests with company goals as a company navigates rapid growth in a dynamic industry. China Lodging Group, a Chinese hotel chain that opened about 2,000 hotels during its first decade in business, uses Balanced Scorecard (BSC) metrics to promote both consistency of service and an entrepreneurial attitude amongst hotel managers. The company needs to encourage its managers to operate according to company-level values and goals, without gaming the BSC metrics for short term rewards or without focusing exclusively on local, narrow results. This case illustrates how executive teams can develop incentive systems that increase managers' sense of ownership and commitment to company values and goals.

Cyber Breach at Target

by Lynn S. Paine Neeraj Goyal Suraj Srinivasan

In November and December of 2013, Target Corporation suffered one of the largest cyber breaches till date. The breach that occurred during the busy holiday shopping season resulted in personal and credit card information of about 110 million Target customers to be compromised. The case describes the details of the breach, circumstances that lead to it, consequences for customers and for Target, and the company's response. The case then discusses the role of management and the board of directors in cyber security at Target. Target's board of directors was subject to intense criticism by shareholders and governance experts such as the leading proxy advisor Institutional Shareholder Services (ISS). The case discusses the critique and defense of the board's role. The case is designed to allow for a discussion of the causes and consequences of the cyber breach and accountability of directors in cyber security.

ABC Pharmaceuticals

by Erik R. Sparks Regina E. Herzlinger

To measure adverse cardiovascular outcomes of drugs or placebos.

Starbucks Coffee Company: Transformation and Renewal

by Kelly Mcnamara Nora N. Khan Elizabeth Legris Nancy F. Koehn

Starbucks Coffee Company: Transformation and Renewal analyzes the turnaround and reconstruction of Starbucks Coffee Company from 2008 to 2014 as led by CEO and co-founder Howard Schultz. The case offers executives and students an opportunity to examine in depth how Schultz and his team saved Starbucks from near-collapse, by both executing a deep, comprehensive return to its core values and, at the same time, investing in a range of new products, customer experiences and organizational capabilities designed to make the company fit for enduring success in a turbulent global economy. Set against the backdrop of the Great Recession, the case also considers the impact of unprecedented important shifts in consumer spending and confidence as well as new competitive forces on Starbucks' transformation. The case concludes by examining Schultz's own leadership journey, the lessons he learned personally during Starbucks transformation, and how he is using these lessons-within Starbucks and on the national stage-to redefine the roles and responsibilities of a public corporation in the 21st century.

TouchDevelop: Programming on the Go

by Nikolai Tillmann R. Nigel Horspool

"The book is great! It''s clear and easy to read, with loads of examples that showed my students what to do. " -- Larry Snyder, Emeritus Professor, University of Washington, Department of Computer Science and Engineering "Having the TouchDevelop book available made our events so much easier. Students could figure things out for themselves with help from the book. " -- Jennifer Marsman, Microsoft Principal Developer Evangelist Mobiledevices such as smartphones and tablets are set to become the main computersthat virtually all people will own and carry with them at all times. And yet,mobile devices are not yet used for all computing tasks. A project at MicrosoftResearch was created to answer a simple question: "It is possible to createinteresting apps directly on a smartphone or tablet, without using a separatePC or a keyboard?" The result is TouchDevelop, a programming environment thatruns on all modern mobile devices such as Windows Phone, iPhone, iPad, Androidphones and tablets, and also on PCs and Macs. This book walks you through all of the screens of the TouchDevelop app, and itpoints out similarities and differences of the TouchDevelop language comparedto other programming languages. For users, the book can serve as a handyreference next to the phone. The book systematically addresses all programminglanguage constructs, starting from the very basic constructs such as variablesand loops. The book also explores many of the phone sensors and data sourceswhich make creating apps for mobile devices so rewarding. If you are new to programming with TouchDevelop, or if you have not yet workedon touchscreen devices, we suggest that you read the book starting from Chapter1. If you are already familiar with the basic paradigm of the TouchDevelopprogramming environment, then feel free to jump ahead to the later chaptersthat address particular topic areas. This book is written from theperspective of a person developing their code using a web browser. TheTouchDevelop Web App runs in many modern browsers on many different devicesincluding smartphones and tablets, Macs, PC. All screenshots and navigationinstructions refer to the TouchDevelop Web App running in a browser. ForWindows Phone, there is a dedicated TouchDevelop app in the Windows Phone Storewhich gives access to many more sensors and data sources. Starting with theTouchDevelop app v3. 0 for Windows Phone 8, the phone app will share the samelook and navigation structure and all features of the Web App. What you''ll learn The little tricks to programming on your mobile devices and for a mobile device The scripting language and cloud-based ecosystem Using cameras, video and audio, and other sensors such as a microphone, accelerometer, compass, and gyroscope Access to the web, authorized access to web services How to write simple games using a built-in physics engine Who this book is for This programming language was written for people who wish tobe able to create apps from their phone. This scenario is particularlyappealing to enthusiastic end-users who own mobile devices and students, whoare the target audience of this book. Table of Contents Chapter 1 Introduction to TouchDevelop Chapter 2 The Scripting Language Chapter 3 The Wall - using the screen Chapter 4 The Web Chapter 5 Audio Chapter 6 Camera, Graphics and Video Chapter 7 Sensors Chapter 8 Interactions Chapter 9 Game Board Chapter 10 UI with Boxes and Pages Chapter 11 Authenticating Web Services Appendix A Editing TouchDevelop Scripts Appendix B TouchDevelop Services Appendix C TouchDevelop Datatypes Appendix D Platform Capabilities Appendix E TouchDevelop Editor on a Windows Phone

Handbook of Water and Wastewater Systems Protection

by Robert M. Clark Simon Hakim Avi Ostfeld

Following the events of 9/11, the Administrator of the US Environmental Protection Agency created the Water Protection Task Force (WPTF), which identified water and wastewater systems as a major area of vulnerability to deliberate attack. The WPTF suggested that there are steps that can be taken to reduce these vulnerabilities and to make it as difficult as possible for potential saboteurs to succeed. The WPTF recommended that be scrutinized with renewed vigor to secure water and wastewater systems against these possible threats. It also recommended that water and wastewater systems have a response plan in place in the event an act of terrorism occurs. The WPTF identified water distribution networks as an area of special vulnerability and highlighted the need for rapid on-line detection methods that are accurate and have a wide detection range. As a result of these recommendations novel technologies from various fields of science and engineering are now addressing water security issues and water and wastewater utilities are looking for innovative solutions. Once such technologies are available, there will be a rapid implementation process that will present many business opportunities for the private sector. However, in addition to terrorist threats water and wastewater systems are inherently vulnerable to natural disasters such as earthquakes and floods. This volume will address the problems associated with both intended terrorist attacks and natural disasters affecting water or wastewater systems. The book is divided into parts based on the kinds of threats facing water and wastewater systems: (1) a direct attack on water and wastewater infrastructure storage reservoirs, and distribution and collection networks; (2) a cyber attack disabling the functionality of the water and wastewater systems or taking over control of key components which might result in system failures; and (3) a deliberate chemical or biological contaminant injection at one of the water distribution system's nodes. It will examine unique plans, technological and managerial innovations for protecting such systems, and includes descriptions of projects that were implemented to respond to natural disasters. Case studies are presented that discuss existing projects and evaluate their performance, with an emphasis on providing guidelines and techniques that can be implemented by water and wastewater planners and managers to deal with natural and manmade disasters should they occur.

A Qualitative Approach to Inverse Scattering Theory

by David Colton Fioralba Cakoni

Inverse scattering theory is an important area of applied mathematics due to its central role in such areas as medical imaging , nondestructive testing and geophysical exploration. Until recently all existing algorithms for solving inverse scattering problems were based on using either a weak scattering assumption or on the use of nonlinear optimization techniques. The limitations of these methods have led in recent years to an alternative approach to the inverse scattering problem which avoids the incorrect model assumptions inherent in the use of weak scattering approximations as well as the strong a priori information needed in order to implement nonlinear optimization techniques. These new methods come under the general title of qualitative methods in inverse scattering theory and seek to determine an approximation to the shape of the scattering object as well as estimates on its material properties without making any weak scattering assumption and using essentially no a priori information on the nature of the scattering object. This book is designed to be an introduction to this new approach in inverse scattering theory focusing on the use of sampling methods and transmission eigenvalues. In order to aid the reader coming from a discipline outside of mathematics we have included background material on functional analysis, Sobolev spaces, the theory of ill posed problems and certain topics in in the theory of entire functions of a complex variable. This book is an updated and expanded version of an earlier book by the authors published by Springer titled Qualitative Methods in Inverse Scattering Theory Review of Qualitative Methods in Inverse Scattering Theory All in all, the authors do exceptionally well in combining such a wide variety of mathematical material and in presenting it in a well-organized and easy-to-follow fashion. This text certainly complements the growing body of work in inverse scattering and should well suit both new researchers to the field as well as those who could benefit from such a nice codified collection of profitable results combined in one bound volume. SIAM Review, 2006

Systems Design for Remote Healthcare

by Silvio Bonfiglio Koushik Maharatna

This book provides a multidisciplinary overview of the design and implementation of systems for remote patient monitoring and healthcare. Readers are guided step-by-step through the components of such a system and shown how they could be integrated in a coherent framework for deployment in practice. The authors explain planning from subsystem design to complete integration and deployment, given particular application constraints. Readers will benefit from descriptions of the clinical requirements underpinning the entire application scenario, physiological parameter sensing techniques, information processing approaches and overall, application dependent system integration. Each chapter ends with a discussion of practical design challenges and two case studies are included to provide practical examples and design methods for two remote healthcare systems with different needs.

Anatomy and Physiology of the Circulatory and Ventilatory Systems

by Marc Thiriet

Together, the volumes in this series present all of the data needed at various length scales for a multidisciplinary approach to modeling and simulation of flows in the cardiovascular and ventilatory systems, especially multiscale modeling and coupled simulations. The cardiovascular and respiratory systems are tightly coupled, as their primary function is to supply oxygen to, and remove carbon dioxide from, the body's cells. Because physiological conduits have deformable and reactive walls, macroscopic flow behavior and prediction must be coupled to nano- and microscopic events in a corrector scheme of regulated mechanism. Therefore, investigation of flows of blood and air in physiological conduits requires an understanding of the biology, chemistry, and physics of these systems, together with the mathematical tools to describe their functioning in quantitative terms. The present volume focuses on macroscopic aspects of the cardiovascular and respiratory systems in normal conditions, i. e. , anatomy and physiology, as well as the acquisition and processing of medical images and physiological signals.

Functional and Phylogenetic Ecology in R

by Nathan G. Swenson

Functional and Phylogenetic Ecology in R is designed to teach readers to use R for phylogenetic and functional trait analyses. Over the past decade, a dizzying array of tools and methods were generated to incorporate phylogenetic and functional information into traditional ecological analyses. Increasingly these tools are implemented in R, thus greatly expanding their impact. Researchers getting started in R can use this volume as a step-by-step entryway into phylogenetic and functional analyses for ecology in R. More advanced users will be able to use this volume as a quick reference to understand particular analyses. The volume begins with an introduction to the R environment and handling relevant data in R. Chapters then cover phylogenetic and functional metrics of biodiversity; null modeling and randomizations for phylogenetic and functional trait analyses; integrating phylogenetic and functional trait information; and interfacing the R environment with a popular C-based program. This book presents a unique approach through its focus on ecological analyses and not macroevolutionary analyses. The author provides his own code, so that the reader is guided through the computational steps to calculate the desired metrics. This guided approach simplifies the work of determining which package to use for any given analysis. Example datasets are shared to help readers practice, and readers can then quickly turn to their own datasets.

Mastering 3D Printing

by Joan Horvath

Mastering 3D Printing shows you how to get the most out of your printer, including how to design models, choose materials, work with different printers, and integrate 3D printing with traditional prototyping to make techniques like sand casting more efficient. You've printed key chains. You've printed simple toys. Now you're ready to innovate with your 3D printer to start a business or teach and inspire others. Joan Horvath has been an educator, engineer, author, and startup 3D printing company team member. She shows you all of the technical details you need to know to go beyond simple model printing to make your 3D printer work for you as a prototyping device, a teaching tool, or a business machine.

Pro Java 8 Programming

by Brett Spell

Pro Java 8 Programming covers the core Java development kit. It takes advantage of the finer points of the core standard edition (SE) and development kit version 8. You'll discover the particulars of working with the Java language and APIs to develop applications in many different contexts. You will also delve into more advanced topics like lambda expressions, closures, new i/o (NIO. 2), enums, generics, XML, metadata and the Swing APIs for GUI design and development. By the end of the book, you ll be fully prepared to take advantage of Java's ease of development, and able to create powerful, sophisticated Java applications. "

Mastering Structured Data on the Semantic Web

by Leslie F. Sikos

A major limitation of conventional web sites is their unorganized and isolated contents, which is created mainly for human consumption. This limitation can be addressed by organizing and publishing data, using powerful formats that add structure and meaning to the content of web pages and link related data to one another. Computers can "understand" such data better, which can be useful for task automation. The web sites that provide semantics (meaning) to software agents form the Semantic Web, the Artificial Intelligence extension of the World Wide Web. In contrast to the conventional Web (the "Web of Documents"), the Semantic Web includes the "Web of Data", which connects "things" (representing real-world humans and objects) rather than documents meaningless to computers. Mastering Structured Data on the Semantic Web explains the practical aspects and the theory behind the Semantic Web and how structured data, such as HTML5 Microdata and JSON-LD, can be used to improve your site''s performance on next-generation Search Engine Result Pages and be displayed on Google Knowledge Panels. You will learn how to represent arbitrary fields of human knowledge in a machine-interpretable form using the Resource Description Framework (RDF), the cornerstone of the Semantic Web. You will see how to store and manipulate RDF data in purpose-built graph databases such as triplestores and quadstores, that are exploited in Internet marketing, social media, and data mining, in the form of Big Data applications such as the Google Knowledge Graph, Wikidata, or Facebook''s Social Graph. With the constantly increasing user expectations in web services and applications, Semantic Web standards gain more popularity. This book will familiarize you with the leading controlled vocabularies and ontologies and explain how to represent your own concepts. After learning the principles of Linked Data, the five-star deployment scheme, and the Open Data concept, you will be able to create and interlink five-star Linked Open Data, and merge your RDF graphs to the LOD Cloud. The book also covers the most important tools for generating, storing, extracting, and visualizing RDF data, including, but not limited to, Protégé, TopBraid Composer, Sindice, Apache Marmotta, Callimachus, and Tabulator. You will learn to implement Apache Jena and Sesame in popular IDEs such as Eclipse and NetBeans, and use these APIs for rapid Semantic Web application development. Mastering Structured Data on the Semantic Web demonstrates how to represent and connect structured data to reach a wider audience, encourage data reuse, and provide content that can be automatically processed with full certainty. As a result, your web contents will be integral parts of the next revolution of the Web. What you''ll learn Extend your markup with machine-readable annotations and get your data to the Google Knowledge Graph Represent real-world objects and persons with machine-interpretable code Develop Semantic Web applications in Java Reuse and interlink structured data and create LOD datasets Who this book is for The book is intended for web developers and SEO experts who want to learn state-of-the-art Search Engine Optimization methods using machine-readable annotations and machine-interpretable Linked Data definitions. The book will also benefit researchers interested in automatic knowledge discovery. As a textbook on Semantic Web standards powered by graph theory and mathematical logic, the book could also be used as a reference work for computer science graduates and Semantic Web researchers. Table of Contents 1. Introduction to the Semantic Web 2. Knowledge Representation 3. Linked Open Data 4. Semantic Web Development Tools 5. Semantic Web Services 6. Graph Databases 7. Querying 8. Big Data Applications 9. Use Cases

Showing 26 through 50 of 14,389 results
Previous   Page: 1 2 3 Go to last page   Next

Help

Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the Help Center.

Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.

  • Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
  • DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
  • BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
  • MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
  • DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivonas Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.