Recent combinations of semantic technology and artificial intelligence (AI) present new techniques to build intelligent systems that identify more precise results.
This book takes a new, critical, and multidisciplinary look at experiences and meanings of social intervention in different social contexts, taking the approaches of social constructionism as a theoretical approach.
Recent combinations of semantic technology and artificial intelligence (AI) present new techniques to build intelligent systems that identify more precise results.
This book takes a new, critical, and multidisciplinary look at experiences and meanings of social intervention in different social contexts, taking the approaches of social constructionism as a theoretical approach.
The emergence of highly promising and potent technologies has enabled the transition of ordinary objects into smart artifacts-providing wider connectivity of digitized entities that can facilitate the building of connected cities.
This book provides a comprehensive review of cloud philosophy, design principals, development trends as well as practical patterns to guide readers to understand, design and implement successful cloud-based solutions.
Leverage the full potential of IoT with the combination of Raspberry Pi 3 and Python and architect a complete IoT system that is the best fit for your organizationKey FeaturesBuild complex Python-based applications with IoTExplore different concepts, technologies, and tradeoffs in the IoT architectural stackDelve deep into each element of the IoT design-from sensors to the cloudBook DescriptionThe Internet of Things (IoT) is the fastest growing technology market.
Clarifying the purpose and place of strategy in an information security program, this book explains how to select, develop, and deploy the security strategy best suited to your organization.
In this book, the author presents lessons learned from her extensive experience as a CAE to help internal auditors understand the challenges, issues, and potential alternative solutions when executing the role.
IT management and staff are called upon to perform the almost-impossible tasks of evaluating, purchasing, integrating, and maintaining complex IT systems, and directing these systems to meet the ever-changing goals of an organization.
Delivering successful projects means the ability to produce high quality software within budget and on time-consistently, but when one mentions quality to software engineers or project managers, they talk about how impossible it is to eliminate defects from software.
Smart manufacturing environments are revolutionizing the industrial sector by integrating advanced technologies, such as the Internet of Things (IoT), artificial intelligence (AI), and robotics, to achieve higher levels of efficiency, productivity, and safety.
Practice the Skills Essential for a Successful IT Career80+ lab exercises challenge you to solve problems based on realistic case studiesStep-by-step scenarios require you to think criticallyLab Analysis tests measure your understanding of lab resultsKey Term Quizzes help build your vocabularyMike Meyers CompTIA Network+ Guide to Managing and Troubleshooting Networks Lab Manual, Sixth Edition covers:Network modelsCabling and topologyEthernet basicsEthernet standardsInstalling a physical networkTCP/IP basicsRoutingTCP/IP applicationsNetwork namingSecuring TCP/IPSwitch featuresIPv6WAN connectivityWireless networkingVirtualization and cloud computingData centersIntegrating network devicesNetwork operationsProtecting your networkNetwork monitoringNetwork troubleshooting
As manufacturing control systems converge with manufacturing automation systems and systems supporting the back office, IT managers in manufacturing companies are being asked to oversee all their company's IT-including the manufacturing systems.
This second edition of the Strategic Project Leader prepares project managers to develop leadership competencies that translate into increased confidence to lead in a demanding environment.
The aim of this book is to demonstrate the use of business driven risk assessments to address government regulations and guidelines specific to AI risks, as AI systems often require access to personal data.
En las estructuras de datos dinámicas el tamaño y su forma es variable a lo largo de un programa, es decir, la memoria se reserva a tiempo de corrida del programa; este tipo de estructuras está conformada por nodos, los cuales tienen como mínimo dos campos: uno de información (clientes, pasajeros, cuenta bancaria, entre otros) y otro que contiene la referencia del siguiente nodo; los nodos se crean y destruyen en tiempo de ejecución.
Project management is truly an art seeking science with complex processes balancing project output objectives against restraints of time, budget, human resources, quality, and customer satisfaction.
Project management is truly an art seeking science with complex processes balancing project output objectives against restraints of time, budget, human resources, quality, and customer satisfaction.
The concept of a PKI (public key infrastructure) has been around for decades, but it is one strand of IT which has taken an extraordinarily long time to come to fruition within the mainstream.
Over the past three years, the landscape of blockchain technology has undergone remarkable transformation, extending far beyond its association with cryptocurrencies especially with the emergence of Web3 applications.
Cybersecurity and Data Science Innovations for Sustainable Development of HEICC: Healthcare, Education, Industry, Cities, and Communities brings together a collection of chapters that explore the intersection of cybersecurity, data science, and sustainable development across key sectors: healthcare, education, industry, cities, and communities.
In diesem Buch erfahren Sie, wie Sie Ihre Computer, Smartphones und Tablets sowie die Ihrer Familie in einem eigenen Heimnetzwerk miteinanderverbinden.
Notebooks, Smartphones, Fernseher, Webradios, Netzwerkkameras - in fast jedem Haushalt gibt es heute eine ganze Armada an Geräten, die alle nur eines wollen: ins Internet.
In diesem Buch erfahren Sie, wie Sie Ihre Computer, Smartphones und Tablets sowie die Ihrer Familie in einem eigenen Heimnetzwerk miteinanderverbinden.
This book aims to demonstrate the use of business driven risk assessments to address government regulations and guidelines specific to the management of risks related to all third party arrangements and emphasises that organisations retain accountability for business activities, functions and services outsourced to a third party.