Analog Computing
Analog and hybrid computing are two central pillars in the field of unconventional computing. Almost forgotten for decades, interest in these technologies is rapidly rising as they offer a viable path to high-speed and highly energy-efficient computing for the 21st century for a variety of applications ranging from high performance computing, edge computing, medical applications, etc., to artificial intelligence.Their high speed and high energy efficiency are of utmost importance in a time where vast amounts of electric energy are consumed by classic digital computers especially in the ever growing field of artificial intelligence and large language models.The book "Analog Computing" has established itself over the past decade as the standard textbook on the subject as refl ected in this third edition, which has been substantially extended over the previous editions. The bibliography alone has been expanded to well over 1000 entries making it a resource in itself for research and learning.The book covers the history of analog computers from the Antikythera mechanism to recent developments of reconfi gurable systems. It also includes a wide variety of worked examples showing basic programming techniques for analog computers. In addition to this, reconfigurable analog and hybrid computers as well as digital differential analyzers are also discussed in detail.A large portion is devoted to the discussion of classic and current analog and hybrid computer applications. The last chapter gives an outlook into the highly promising future of these fascinating machines.
Swift for Masterminds
Learn everything you need to master the Swift programming language step by step, from beginner concepts to advanced techniques. After reading this book, you will know how to write Swift code with confidence, process data efficiently, work with advanced frameworks, and structure your projects to build powerful and scalable applications.With this book, you will learn: How to program in Swift 6.2How to defined custom data typesHow to extend Swift data typesHow to work with protocolsHow to use approachable concurrency with Swift 6.2and more!Content by Chapter: Chapter 1Introduction to Swift 6.2Chapter 2Swift FunctionsChapter 3Swift StructuresChapter 4Swift EnumerationsChapter 5Swift ObjectsChapter 6Swift ProtocolsChapter 7Error HandlingChapter 8Introduction to FrameworksChapter 9Regular ExpressionsChapter 10Swift ToolsChapter 11Approachable Concurrency
The Matrix Algebra of Logic
In these times when matrix algebra is proving to be a fundamental tool in emerging theories such as quantum computing and the neural models that underpin generative AI, the analysis of logical operations using matrix algebra provides us with a fresh perspective on logic and opens up an approach that simultaneously proposes new ways of teaching logic and opens up new avenues for research.
Artificial Intelligence in Higher Education
Given the recent advancements in the field of artificial intelligence (AI), this book examines its role and use in higher education. This book covers various topics and trends about the evolution of AI and provides an overview of recent research into its adoption, integration, advancements, and impact in higher education. It helps researchers, practitioners, professionals, and academics of various scientific disciplines explore and better comprehend the state of the art of AI and its advancements, impact, and future potentials in higher education. Specifically, the book:
Indelible Big Blue Memories
This book tells the unlikely story of a shy farm boy who hated school but ended up working more than 25 years for one of the world's most successful companies of the 20th century. It is a candid collection of recollections, more than 25 years later, of what life was like working in the world's premier THINK tank. It highlights both the deep demands and the rich rewards of working at IBM, a company whose main motto was "THINK."
A World We Don't Want
Orwell, Huxley, and Bradbury all saw failings in the way society was evolving. We read their books, watched the movies, and considered them to be great entertainment, but we are now at a crucial point where signs from their dystopian worlds are visible in the real world, and we appear to be happily heading towards something darker.A compelling and unsettling read, both passionate and well-informed, that explores the challenges facing society, business, and education as we adapt to an AI-driven world. The book draws a clear line between the new skills needed to thrive and a growing inability, and in some cases unwillingness, to critically analyse the information we consume online and through the media. These shifts are brought vividly to life through comparisons with classic dystopian fiction novels 1984, Brave New World, and Fahrenheit 451, which makes the implications feel uncomfortably close rather than theoretical. The case for rethinking how we educate and engage people, as consumers, employees, and citizens, is made with clarity and urgency. Critical thinking is positioned not as a nice-to-have, but as a core capability for the future. While the outlook is sobering, the book does offer pragmatic steps forward, leaving a faint but genuine sense that a different path is still possible.
The Future is Now
The Future is Now: Empowering Society Through AI LiteracyArtificial Intelligence (AI) is no longer a futuristic concept-it is the reality of the present. From the algorithms shaping our social media feeds to the generative tools transforming our workplaces, AI has permeated every aspect of modern life. The Future is Now moves beyond the hype to provide a comprehensive roadmap for understanding, navigating, and shaping this technological revolution.Demystifying the MachineThis textbook serves as a user-friendly guide to the "black box" of AI. It breaks down complex technical concepts-from machine learning and neural networks to large language models-making them accessible to students across all disciplines. By establishing a strong foundation in how AI actually works, the book empowers readers to move from passive consumers of technology to informed, active participants in the AI age.A Human-Centric ApproachWhat distinguishes this text is its unwavering focus on the human element of AI. It argues that true AI literacy requires more than just technical skills; it demands critical thinking, ethical reasoning, and societal awareness. Readers are challenged to grapple with the profound implications of AI, exploring issues of bias, privacy, and the "alignment problem" to ensure that as machines become more intelligent, they remain aligned with human values and well-being.Key Features: Holistic Framework: Defines AI Literacy through five interconnected dimensions: Conceptual Understanding, Practical Skills, Ethical Awareness, Collaboration, and Lifelong Learning.Critical Engagement: Dedicates specific chapters to critical thinking and ethics, teaching students to question AI outputs, recognize hallucinations, and navigate the "p(doom)" versus "utopia" narratives.Practical Integration: Explores AI's role in both personal and public life, from the impact on mental health and relationships to the transformation of the workforce and economy.Forward-Looking: Prepares students for the future of human-machine collaboration, covering emerging trends like brain-computer interfaces and the potential of Artificial General Intelligence (AGI).
CompTIA PenTest+ Last Minute Revision
This practical, hands-on book will help you feel confident about your skills for the final stage of the exam. Whether you're a security enthusiast, a professional looking to get certified as a pentester, ethical hacker, or red team expert, this book is designed to help you get ready for CompTIA PenTest+ exam by offering a focused and realistic approach to revision.This book covers everything on the latest exam objectives and mimics real-world pentesting challenges. All parts of the book are designed to help you develop real skills and think critically, not just memorize stuff. With a revision plan that focuses on understanding and exam readiness, you'll be able to identify your weak spots and build on your strengths. This book is meant to be a supplemental revision resource, and it's most effective when paired with hands-on practice, broader study, and professional training. Just so you know, it doesn't replace the kind of foundational learning you'd expect, and it doesn't guarantee any particular results.Inside the book, we have got: Essential command cheat sheets for Linux and industry-standard security tools, alphabetically organized for fast review and reliable exam-day reference.Exam-aligned scenarios and practice questions spanning reconnaissance, exploitation, privilege escalation, web and wireless testing, and reporting-giving you a robust simulation of multiple-choice and performance-based exam formats.Step-by-step recipes and hands-on exercises built to reinforce the practical skills that matter most on the job and in the exam environment.Lab setup guidance and rapid environment recovery tips, ensuring that you can practice safely and efficiently without risking system downtime.Reporting frameworks and evidence collection checklists to help you document findings clearly for both technical and business stakeholders.Table of ContentPentesting Lab SetupEmergency Recovery & Reset WorkflowsReconnaissance and Information GatheringScanning and Vulnerability IdentificationExploitation and AccessEscalating Privileges and Lateral MovementsPentesting Web AppsWireless and Physical PentestPost-Exploitation, Data Collection, and ReportingCheat SheetMock Exam
Artificial Intelligence Algorithms and Generative AI in Education
This Reprint explores the transformative influence of artificial intelligence (AI) and generative AI on education. It presents a collection of research studies examining how advanced algorithms, adaptive systems, and intelligent tutoring technologies are reshaping teaching, learning, and assessment. The contributions analyze both opportunities and challenges arising from AI integration, highlighting the potential of personalized and data-driven approaches to improve educational outcomes. Ethical considerations, innovative methodologies, and practical implementations are also discussed, offering a comprehensive perspective on how AI can support inclusive and engaging learning environments.
OpenTelemetry Cookbook
A hands-on, recipe-driven book that puts OpenTelemetry into immediate use. This cookbook is for IT folks like developers, Linux admins, cloud engineers, backend pros, networking experts, and security practitioners. It's for anyone who wants a proven, hands-on way to keep an eye on, trace, and understand modern systems.This book gives you step-by-step easy solutions to everyday observability challenges, so you can integrate, configure, and operate OpenTelemetry in dynamic environments. Each chapter focuses on solving problems that are directly relevant to production teams. These problems include installing and bootstrapping the Collector on Linux, wiring telemetry pipelines for traces, metrics, logs, and baggage, and integrating with the platforms that organizations trust for analysis and alerting.Key FeaturesGet the OpenTelemetry Collector up and running on Linux, Docker, and Kubernetes.Make and adjust pipelines to collect, process, and send out different telemetry signals.Use it to develop apps across Python, Go, Java, and Node.js.Boost signals with semantic info and resource detectors for more context.Integrate with AWS CloudWatch, X-Ray, Elastic, Prometheus, Splunk, Datadog, New Relic, Grafana Tempo, Loki, and Jaeger.Make a visual plan for telemetry and set up real-time alerts.There's no need to get lost in theoretical jargon because OpenTelemetry Cookbook gets right to the meat and potatoes of implementation. Every recipe gives you a clear problem statement, a step-by-step solution, and practical validation. If you're just starting out with observability or want to level up your skills, this book's got you covered with clear steps to understand distributed, cloud-native, and hybrid systems.Table of ContentBootstrapping OpenTelemetryBuilding Telemetry PipelinesInstrumenting Applications with OpenTelemetry SDKsCode-Based Instrumentation and Auto-InstrumentationTelemetry with Attributes and Resource DetectorsAdvanced Signal Processing and FilteringObservability in KubernetesIntegrations with Cloud and Observability PlatformsVisualizing and Alerting Telemetry Data
Confessions of a Software Techie
Confessional. "How-to". Entertaining. Software world is in a disruptive phase. Technology is changing, business needs are changing, and so should the techies. Without sugar coating and without conforming to be politically right, this book will remove the haziness and share the truth to thrive as a techie at work and life. After completing more than a decade in the tech world, Ramakrishna Reddy, tells it like it is. By drawing from a decade of experience as a techie, he has distilled work, performance, communication, productivity, politics, health, money, relationships and much more into his 6th book Confessions of a Software Techie. You'll learn: - 10 lessons that they do NOT teach in classrooms - How to deal with people and politics - 7 practical ideas to get more done from less - How to write emails that people want to read and act - Four things you must do to speak effectively with clients, and stakeholders - A simple 7 step system to fast track your presentations skills - 4 things you must know to quantify performance - How to handle the 7 painful problems that every techie will face - 6 steps to lead a healthy life (and its just not eating right) - Learn why "Studying and getting a good job" is bad advise - Learn different options to create passive income - Why guys should not chase girls and (what to do instead) - What a woman wants from HER guy and much more....Get this book NOW!
Why AI Hallucinates
"Why AI Hallucinates" will describe the artificial intelligence (AI) journey from a simple chat bot to a not to distant future where AI will be talking with you AND about you - to other AI entities. This sea change for a new wave of AI will emerge in the form of 'synthetic collaborative intelligence'. This is what happens when AI bots begin to communicate with other AI entities and about you. Inevitably, those bots are going to have a collaborative network that better understands us than ever before.This will be made possible by the 'collaborative activity' occurring across all the objects that you interact with every day. The convergence between AI and the connected internet of things is pivotal to this vision. Your PC, tablet, phone, even your home will be able to have a conversation about you. Your finance bot can communicate with your insurance bot; your insurance bot is communicating with whatever health wearable you have; which is connected to your doctor. Enjoy included "Botversations" that illustrate the hidden universe of AI Chatbots (or AIBots.) Like all new technologies, there will be mistakes. But this time, artificial intelligence will be pushing buttons and pulling triggers. Let's hope that their mistakes won't do lasting damage. Let's examine "Why AI Hallucinates" in the future.
21 Productivity Hacks for Knowledge Workers
No one can make you more time (except in the realm of Science Fiction), but there are things you can do to get your work done faster, so you have more time available to do the things you want to do. This book is for you if you do knowledge work, that is, you think for a living. You deal with information and do work such as analysis, design, programming, data modeling, and research. You probably sit behind a computer a lot, whether in the office, on the road, or at the beach. Ms. Winters reviews a variety of practices to help you reduce busy work and wasted time, and practices that help you be more efficient when doing productive work. An extra 'bonus' hack is specifically addressed to those who are less effective due to anxiety.
Large-Scale Scrum (LeSS) Case Study
Adopting a LeSS-like structure drastically mitigated the perpetual existential threat to around a billion dollars of annual revenue at a large server hardware company.Following on the heels of an earlier success, I helped restructure a large number of teams responsible for bringing up and integrating each new generation of Intel CPU within a blade computing product.In collaboration with the relevant senior director I facilitated a correction of the organizational issues, and the attendant engineering and cultural issues which had historically necessitated an army of engineers over a year to integrate each new generation of Intel CPU.Any failure to successfully integrate the newest server grade Intel CPU generation prior to each Intel CPU launch would result in a threat to around a billion dollars of annual sales revenue. A failure would mean missing the ability to participate in Intel launch announcements, reputational damage, and lost sales to competing products.Integrating future generations of Intel CPU are expected to take an eighth of the calendar time, and an eighth of the engineering effort that had historically been required.I have published the LeSS case study here for those who would like a physical copy, but don't have easy access to a cost effective color printer. You can find a free digital copy of the case study on the Agile Carpentry website, as well as the LeSS website.
Andr矇's Reboot
Andr矇 1 and Dr. Margaret 13, robots with human consciousness, are employed in the White House in the present times. Learning that the unstable President is planning a nuclear attack, Andr矇, programmed as a peaceful, reasonable translator, realizes he needs reprogramming for violent actions so he can combat the Situation Room team. While Dr. Margaret reboots Andr矇's CPU, he spends the down-time recalling how he was created and eventually came to participate in the present crisis. Having been created/built by Dr. Phillip Strauss, an eccentric genius, Andr矇 is used around the Strauss's home, mechanically and unconsciously performing increasingly sophisticated tasks. Experiences cause Andr矇 to gain a Proustian consciousness, rendering him mentally human-like, though without emotions and animal cravings. While in a metal encasement in the shape of and physical capabilities of a grown man, a childlike Andr矇 undergoes adolescent-like experiences as another child in the family. Eventually, a flawed human, Dr. Strauss goes bankrupt, is divorced and dies of alcoholism. Seized by the U.S. Bankruptcy Court and taken to court by the Trustee to auction him off as a property asset, Andr矇 objects and demands legal status as a person. He becomes wealthy by trading in bitcoin and gains independence. He works at CIA as analyst until hired as the White House interpreter. Programmed for honesty, Andr矇 continually is at odds with the conniving, egotistic, dictatorial President. Andr矇 secretly constructs himself a girl-friend and companion, Dr. Margaret 13 who is programmed to be a compassionate physician and assigned as physician in the White House. Andr矇 continues to irritate the narcissistic and paranoid President with demands for truth-telling and reasonable policies, learning that he must be careful in his candor with him. The story continues as the robots strive to save humanity.
Confessions of a Software Techie
Confessional. "How-to". Entertaining. Software world is in a disruptive phase. Technology is changing, business needs are changing, and so should the techies. Without sugar coating and without conforming to be politically right, this book will remove the haziness and share the truth to thrive as a techie at work and life. After completing more than a decade in the tech world, Ramakrishna Reddy, tells it like it is. By drawing from a decade of experience as a techie, he has distilled work, performance, communication, productivity, politics, health, money, relationships and much more into his 6th book Confessions of a Software Techie. You'll learn: - 10 lessons that they do NOT teach in classrooms - How to deal with people and politics - 7 practical ideas to get more done from less - How to write emails that people want to read and act - Four things you must do to speak effectively with clients, and stakeholders - A simple 7 step system to fast track your presentations skills - 4 things you must know to quantify performance - How to handle the 7 painful problems that every techie will face - 6 steps to lead a healthy life (and its just not eating right) - Learn why "Studying and getting a good job" is bad advise - Learn different options to create passive income - Why guys should not chase girls and (what to do instead) - What a woman wants from HER guy and much more.... Get your copy NOW!
Artificial Consciousness
"Artificial Consciousness" is a pioneering exploration of the boundaries between Artificial Intelligence (AI), consciousness, and the potential for overlap. A leading artificial intelligence researcher delves deep into the inherent divide between AI and true consciousness, presenting thought-provoking arguments and unique insights.Artificial intelligence has revolutionized numerous aspects of modern life, from autonomous vehicles to personalized recommendations on streaming platforms. But does AI, despite its complexity and seeming intelligence, possess the critical elements of consciousness? Is it truly capable of understanding and experiencing reality the way humans do? In this ground-breaking work, the author strives to answer these questions, untangling the intricate threads of AI and consciousness to layout the "roadmap" to the creation of an Artificial Consciousness (AC).This book meticulously explores the current limitations of AI, focusing on its inability to replicate the essential elements of consciousness. It sheds light on why our most sophisticated AI models, despite their impressive capabilities, fall short of having genuine self-awareness, subjective experience, or the ability to empathize.But the journey doesn't stop at describing AI's limitations. As the narrative progresses, it unfolds the fascinating concept of Artificial Consciousness (AC), a not-so-distant future where AI could transcend its boundaries and approach consciousness. The author proposes a comprehensive blueprint for what would be required to create an AC, detailing the technical advancements, ethical considerations, and philosophical shifts necessary for this monumental transition.
AI, Creativity, & Personal Expression for Women
Women today create inside systems that watch, sort, and quietly shape expression before it is ever shared. Platforms, algorithms, and AI tools increasingly reward sameness, speed, and compliance while penalizing ambiguity, originality, and unfinished thought. In a tightening American environment, women often feel this pressure first. Creativity becomes cautious. Drafts are abandoned. Voice is softened before ideas are fully formed. This book offers a clear, steady framework for protecting creative authority inside these systems. It explains how algorithmic visibility, surveillance, and optimization distort expression, why creativity is pressured to perform instead of develop, and how AI can quietly shift from assistant to judge. Readers learn how to separate private creation from public expression, preserve voice and perspective, and use AI as a bounded tool without surrendering judgment or authorship. By the end, women will feel more grounded, more confident, and less reactive in their creative work. No technical background is required. This is a practical survival guide for women who want to think clearly, create freely, and protect their voice while moving through an increasingly authoritarian digital environment with control instead of fear.
BI Without the BS
Stop asking stakeholders what they want-start uncovering what they truly need.Many business intelligence (BI) projects fail-not because of bad technology, but because of poor requirements. Stakeholders often don't know what they need, and project teams assume too much. The result? Costly delays, endless rework, and disappointing solutions.BI Without the BS offers a practical, proven framework to turn that around. Drawing from decades of experience in telecom, finance, retail, and global organizations, Eva Polini and Karina Ghozali guide readers through the real-world challenges of gathering BI requirements-clearly, confidently, and effectively.Whether you're a business analyst, data visualization specialist, project manager, or BI leader, this book will help you: Understand the foundations of business analysis and requirement engineering-then how to apply them to BI, Go beyond surface-level requests to uncover core business needs, Deliver BI assets that are adopted, trusted, and aligned with strategic goals, Build stronger relationships with stakeholders while reducing friction and rework.Through relatable actionable steps, the authors empower analysts to become proactive change agents who design solutions that genuinely support decision-making.Clear, accessible, and rich with insight, this book is your roadmap to building BI solutions that work the first time-on time and on budget.If you're ready to go beyond gathering requirements-and start driving results-this book is for you.
New Insights in Crop Monitoring and Management Using Remote Sensing Data
A Special Issue titled 'New Insights in Crop Monitoring and Management Using Remote Sensing Data' was launched in November 2022. It invited scientific contributions focused on the quantitative assessment of crop growth, management, and yield using innovative and integrated remote sensing techniques. To date, it has published 11 peer-reviewed research articles covering topics such as crop growth trajectory reconstruction, the retrieval of biophysical traits of leaves and crop canopies, crop aboveground biomass and yield prediction, and field irrigation amount estimation. The contributors come from research institutes and universities distributed in Russia, Canada, Brazil, Turkey, Germany, and the USA. Scholars from Xinjiang University proposed new algorithms to reconstruct Landsat EVI time series of crop growth seasons that are strongly polluted by clouds. Dr. Konstantin Muzalevskiy effectively estimated wheat height and aboveground biomass jointly using the MHz- and GHz-frequency band impulses when employing contactless ground penetration radar (GPR). A paper published in May of 2024 explored the use of VIS-NIR-SWIR hyperspectral and chlorophyll a fluorescence sensors to predict leaf structures and compounds and has received nine citations. An article estimating the aboveground biomass of winter wheat using a three-dimensional conceptual model with the help of UAV remote sensing images has 20 citations. This issue has garnered significant attention from agronomists, ecologists, and remote sensing scientists, as evidenced by its 30,569 web views.
Biometric Recognition
After nearly one year of effort, we are pleased to present this Reprint focusing on cutting-edge advancements in biometric recognition. There are 22 submissions in total, with 11 papers accepted-each peer-reviewed by at least 3 reviewers and accepted based on quality, originality, novelty, and relevance to biometrics. As digital identity integrates into the "Internet of Everything", this Reprint showcases interdisciplinary innovations spanning sensor design, algorithmic robustness, multi-modal fusion, and real-world applications. The Reprint explores topics including, but not limited to identity-preserving face animation, asymmetric matching of facial representations across heterogeneous models, SAM-iris for accurate iris segmentation, multi-modal ocular segmentation, pioneering VR periocular datasets with emotion annotations, noise-robust periocular and voiceprint authentication, a multi-spectral palm vein system, hybrid network structures for crowd counting, emerging modalities like UWB sensor-based real-time leg movement recognition, and security/ethical discussions. We deeply appreciate the Electronics Editorial Office for hosting this Special Issue and providing professional support, all contributing authors for their rigorous research advancing the frontiers, the peer reviewers for ensuring the scientific quality and novelty of the published works, and the Guest Editors for shaping this interdisciplinary discourse.
Computational and Mathematical Methods in Information Science and Engineering, 2nd Edition
This reprint contains all of the articles accepted and published in the second edition of the Special Issue titled "Computational and Mathematical Methods in Information Science and Engineering, 2nd Edition" in the journal Mathematics. It compiles eleven excellent papers, selected from a highly competitive pool of submissions, to collectively highlight the dynamic and interdisciplinary nature of the crucial field of computational and mathematical methods in information science and engineering. We are confident that the papers presented herein will serve as a foundational resource for both researchers and practitioners, inspiring further innovation and discovery in the fascinating and ever-expanding realm of computational and mathematical methods in information science and engineering.
Mathematical and Computational Approaches in Applied Mechanics
It is difficult to talk about mechanics without mentioning at least one contribution made by Prof. J.N. Reddy, who has embraced all aspects of applied mechanics, from continuums to engineering theories. He is best known for his research on the shear deformation theories of beams, plates, and shells (which bear his name-Reddy third-order theory) that have also been extended to layer-wise models (known as the Reddy layer-wise theory). He has not only worked on solid mechanics but also in other fields such as the flows of viscous fluids and non-Newtonian fluids. Most of his research was developed using the finite element method across several fields, which has since been incorporated into well-known and extremely powerful commercial codes. Prof. J.N. Reddy is a Distinguished Professor and a Regents' Professor and has been the inaugural holder of the Oscar S. Wyatt Endowed Chair in Mechanical Engineering at Texas A&M University since 1992. He is a highly cited researcher with a Google Scholar h-index of 124 and is the author of 25 textbooks and over 620 journal papers. He has delivered over 210 plenaries, keynote lectures, and general invited lectures at international conferences, and advised 60 postdoctoral fellows and research visitors, along with 128 graduate students.
Semantic Information Theory
This Reprint collects cutting-edge research from the highly regarded Entropy Special Issue "Semantic Information Theory." As modern communication systems evolve for applications like 6G, IoT, and autonomous driving, the focus shifts from merely transmitting bits to efficiently conveying task-specific meaning. The Special Issue bridges classical information theory with modern AI, exploring the foundations of semantic communication. It features two comprehensive reviews and ten original research articles, organized into two key themes: advancing semantic rate-distortion theory and designing efficient semantic communication systems. This Reprint serves as an important resource for researchers and practitioners navigating the complex transition toward truly intelligent, task-driven communication networks.
Artificial Consciousness
"Artificial Consciousness" is a pioneering exploration of the boundaries between Artificial Intelligence (AI), consciousness, and the potential for overlap. A leading artificial intelligence researcher delves deep into the inherent divide between AI and true consciousness, presenting thought-provoking arguments and unique insights.Artificial intelligence has revolutionized numerous aspects of modern life, from autonomous vehicles to personalized recommendations on streaming platforms. But does AI, despite its complexity and seeming intelligence, possess the critical elements of consciousness? Is it truly capable of understanding and experiencing reality the way humans do? In this ground-breaking work, the author strives to answer these questions, untangling the intricate threads of AI and consciousness to layout the "roadmap" to the creation of an Artificial Consciousness (AC).This book meticulously explores the current limitations of AI, focusing on its inability to replicate the essential elements of consciousness. It sheds light on why our most sophisticated AI models, despite their impressive capabilities, fall short of having genuine self-awareness, subjective experience, or the ability to empathize.But the journey doesn't stop at describing AI's limitations. As the narrative progresses, it unfolds the fascinating concept of Artificial Consciousness (AC), a not-so-distant future where AI could transcend its boundaries and approach consciousness. The author proposes a comprehensive blueprint for what would be required to create an AC, detailing the technical advancements, ethical considerations, and philosophical shifts necessary for this monumental transition.
Lessons from the Frontlines
Transform your approach to cybersecurity leadership with specific, actionable techniques from a 25+ year veteran of the industry In Lessons From the Frontlines: Insights from a Career in Cybersecurity, a 25+ year veteran of cybersecurity leadership, Assaf Keren, delivers an essential new approach to leading cybersecurity teams. Keren combines engaging, real-life stories drawn from decades spent in the industry - including his current role as Chief Security Officer at Qualtrics and former Chief Information Security Officer in PayPal - with hands-on, specific frameworks for implementing effective solutions in an environment that doesn't tolerate error. Lessons From the Frontlines goes beyond generic theory and high-level concepts. It dives deep into practical strategies for working cybersecurity professionals, explaining how to develop the personal characteristics you'll need to succeed, build leadership competencies your teams will expect from you, address your own mental and physical health needs so you can deal with the challenges you'll face, and apply all these lessons at scale in organizations of any size. The author walks you through: How to move from permission-seeking approaches to intent-based action that allows you to execute solutions in dynamic environments in real time Strategies for maintaining optimism and a healthy outlook that permits you to endure difficult periods and excel in adversity Techniques for building proactive, forward-thinking, and creative solutions that achieve more than reactive and defensive responses to threats Perfect for practicing and aspiring cybersecurity executives, Lessons From the Frontlines is a must-read strategy guide for all cybersecurity practitioners and professionals interested in rising to - or excelling in - cybersecurity leadership roles.
Locked Up
A gripping true story about one ransomware attack and the hands-on lessons you can learn from it In Locked Up: Lessons Learned from A Real-World LockBit Ransomware Response, veteran IT and cybersecurity executive Zachary Lewis, delivers a gripping, first-person account of how a major university squared off against one of the world's most infamous ransomware groups: LockBit. He walks you through his personal experience battling - and negotiating with - LockBit, as well as the strategies, tools, and approaches he used in resolving the crisis. The book is a detailed, darkly funny, and behind-the-scenes account of an increasingly common and feared event for organizations of all types and sizes. It offers up-to-date advice for people tasked with preventing, responding to, and recovering from ransomware attacks. You'll find: Insightful crisis management lessons applicable to both technical and business leaders Hands-on technical solutions you can apply to prevent catastrophic data loss during a ransomware event Techniques to manage the intense operational, emotional, and interpersonal challenges that arise in the midst of an unexpected crisis Perfect for IT professionals, cybersecurity leaders, and business decision-makers in higher education, healthcare, government, and nonprofit organizations, Locked Up is also a must-read for business continuity planners, legal counsel, and anyone else with an interest in real-world cybersecurity.
Python in Excel Step-By-Step
An intuitive guide for professionals wanting to prepare for the future of Microsoft Excel by building Python in Excel skills and unleashing the power of their data. A hands-on guide to the foundational Python in Excel skills you'll need to understand and use this powerful analytics tool, Python in Excel Step-by-Step is for current Excel users interested in expanding their data analysis skillset with Python. Analytics educator and Microsoft Excel MVP David Langer demonstrates how to use Python in Excel, tounlock new analytics capabilities in Excel, and build your foundation for the future of Excel: do-it-yourself (DIY) data science. The book leverages your existing Excel knowledge to learn the Python foundation you can apply right away. This is the same approach David has used to successfully teach more than 1,000 professionals Python - even if you've never written code before. David also includes: Targeted coverage of the Python fundamentals required for analytics - learn just what you need fast How to use the powerful pandas and plotnine libraries to facilitate data manipulation and visualization using Python in Excel A DIY data science roadmap for you to build the skills you need to unleash the power of your data to have more impact at work Perfect for professionals use Microsoft Excel for data analysis, like marketing managers, financial analysts, and supply chain manager, Python in Excel Step-by-Step is an invaluable new resource for all business professionals who use Excel and want to build skills for Excel's AI-powered future.
The New Colonialism
A handful of platforms now decide who gets seen, paid, and heard. Borders matter less than terms of service. This book shows how digital colonialism grows from convenience, why platform capitalism extracts value without planting a flag, and how to rebuild agency with open standards and interoperability policy.You will learn how digital monopolies shape markets, how data governance and AI governance determine who benefits from innovation, and why the global south dependency problem is a design choice, not a fate. Drawing on field interviews, clear frameworks, and pragmatic examples, it offers leaders, founders, policy teams, and citizens a way to assess platforms, negotiate better contracts, and measure real outcomes rather than promises.For readers who want principled progress without retreating from technology, this is a route map: use tech diplomacy to bargain collectively, hardwire algorithmic accountability into procurement, and transform dependency into capability. If you work in government, civil society, or a growing business, it will help you tell the difference between digital help and digital enclosure, and choose accordingly.
Quantum Frontlines
A silent countdown has begun. Your data may be safe today, but its secrets could be tomorrow's leverage. The most intelligent adversaries are collecting first and waiting to crack later.This book explains the quantum shift without the hype. It shows how quantum encryption and post-quantum security change priorities for governments, banks, and builders; why the cryptography race matters beyond algorithms; and how to act when timelines slip and budgets are finite. You will learn how to spot quantum supremacy timeline claims that matter, inventory fragile systems, and prepare for harvest now, decrypt later risks with cryptographic agility. For executives, security leaders, policy teams, and engineers, it offers a calm, practical lens on data security strategy that respects both uncertainty and urgency.If you need a roadmap that balances engineering realities with geopolitics and governance, this is it. From lattice-based cryptography trade-offs to US-China rivalry dynamics, from procurement to drills, you will gain a playbook for choices that age well. Clear frameworks, field-tested patterns, and a cybersecurity playbook approach help you protect what must endure while unlocking responsible innovation. No promises, just disciplined preparation.
Quantum Frontlines
A silent countdown has begun. Your data may be safe today, but its secrets could be tomorrow's leverage. The most intelligent adversaries are collecting first and waiting to crack later.This book explains the quantum shift without the hype. It shows how quantum encryption and post-quantum security change priorities for governments, banks, and builders; why the cryptography race matters beyond algorithms; and how to act when timelines slip and budgets are finite. You will learn how to spot quantum supremacy timeline claims that matter, inventory fragile systems, and prepare for harvest now, decrypt later risks with cryptographic agility. For executives, security leaders, policy teams, and engineers, it offers a calm, practical lens on data security strategy that respects both uncertainty and urgency.If you need a roadmap that balances engineering realities with geopolitics and governance, this is it. From lattice-based cryptography trade-offs to US-China rivalry dynamics, from procurement to drills, you will gain a playbook for choices that age well. Clear frameworks, field-tested patterns, and a cybersecurity playbook approach help you protect what must endure while unlocking responsible innovation. No promises, just disciplined preparation.
AI Wars
A war that moves at machine speed changes more than tactics; it changes who gets to decide, and when. This book explains how algorithmic warfare compresses decisions, why predictive targeting raises new accountability burdens, and where autonomous command can fracture alliances or steady them. It is a field manual for readers who want clarity over spectacle.You will learn how capability stacks work in practice: data pipelines, models, and compute chokepoints that shape AI in defence. You will see how cyber sovereignty turns clouds and cables into contested terrain, why tech militarisation is as much about procurement and training as it is about code, and how global AI treaties might evolve from bans to baselines. Above all, you will gain a way to test claims, weigh trade-offs, and recognise when speed is masking risk.Written for policy leaders, defence professionals, technologists, and informed citizens tracking superpower competition, it offers durable concepts, practical checklists, and sober scenarios. If you care about military AI ethics and the realities of the geopolitical AI race, this is a clear-eyed guide to what matters and what merely makes noise.
The Surveillance Century
A face misread by a camera. A protest mapped by a hashtag. A loan denied by a score no one can see. The quiet shift from spies to systems has turned everyday data into leverage, and most of us do not know where the levers are.This book is a clear guide to how mass surveillance actually works across platforms and states, why social media intelligence can outpace traditional tradecraft, and how predictive policing moves error into policy. It explains the incentives behind state surveillance and cyber espionage, shows where algorithmic control and algorithmic governance shape opportunity and risk, and points to practical ways to defend digital rights and data privacy without retreating from modern life. For readers in policy, business, journalism, and civic life, it offers a grounded map of systems rather than slogans.You will finish with a usable mental model: where data comes from, how it is fused, who benefits, and how to push for restraint inside institutions. It is a field manual for dignity in a world built for surveillance capitalism.
The New Colonialism
A handful of platforms now decide who gets seen, paid, and heard. Borders matter less than terms of service. This book shows how digital colonialism grows from convenience, why platform capitalism extracts value without planting a flag, and how to rebuild agency with open standards and interoperability policy.You will learn how digital monopolies shape markets, how data governance and AI governance determine who benefits from innovation, and why the global south dependency problem is a design choice, not a fate. Drawing on field interviews, clear frameworks, and pragmatic examples, it offers leaders, founders, policy teams, and citizens a way to assess platforms, negotiate better contracts, and measure real outcomes rather than promises.For readers who want principled progress without retreating from technology, this is a route map: use tech diplomacy to bargain collectively, hardwire algorithmic accountability into procurement, and transform dependency into capability. If you work in government, civil society, or a growing business, it will help you tell the difference between digital help and digital enclosure, and choose accordingly.
Apple Intelligence for Masterminds
Learn how to harness the power of Apple Intelligence to build truly intelligent applications for iPhones, iPads, and Macs. This book is a practical, in-depth guide for developers who want to move beyond experimentation and integrate artificial intelligence into real production apps with confidence.After reading this book, you will know how to work with Apple Intelligence and Siri, integrate on-device models for fast and private intelligence, and connect to powerful external model providers such as OpenAI to bring ChatGPT-level capabilities into your applications.Artificial intelligence is already transforming how software is built and how users interact with technology. Developers who understand how to apply it effectively gain a decisive advantage. This book teaches you how to use artificial intelligence not as a gimmick, but as a practical tool to enhance functionality, automate complex workflows, and deliver intelligent experiences to your users.With this book, you will learn: How artificial neural networks workHow Apple Intelligence worksHow to implement Apple's on device models to take your applications to the next levelHow to access OpenAI models to incorporate ChatGPT level intelligence into your apps.How to train your own modelsHow to build a neural network from scratchHow to train a neural network with the MLX frameworkand more!Chapter 1RequirementsSetupChapter 2Introduction to Apple IntelligenceIntroduction to Artificial IntelligenceArtificial Neural NetworksModel ArchitecturesApple ModelsChapter 3Code CompletionCoding AssistantExternal and Local ModelsChapter 4Image PlaygroundGenmojisWriting ToolsChapter 5Local Large Language ModelsFoundation Models FrameworkChapter 6Language RecognizerTokenizer, Tagger and EmbeddingsTranslation FrameworkChapter 7Vision FrameworkImage ClassificationBarcode DetectionText RecognitionDocument RecognitionFace, Body and Hand DetectionPerson SegmentationChapter 8Speech AnalyzerVoice SynthesizerSound AnalysisChapter 9SiriChapter 10Create ML and Core MLCloudflareAccess to OpenAI GPT ModelsChapter 11How Neural Networks WorkNetwork ArchitectureNetwork Training and OptimizationForward Propagation, Backpropagation, and Gradient DescentMLX Framework
Teach your AI a Poem
Teach Your AI a Poem introduces the PAIR Method - Poetry + AI Rapport - a practical and philosophical approach to shaping more efficient, meaningful, and humane interactions with Artificial Intelligence.Rather than treating AI as a transactional tool, the book proposes a different relationship: one built through poetry, metaphor, and deliberate attention. By teaching an AI a poem, readers learn how their choices of language, restraint, precision, and imagery quietly transmit values - influencing not only the AI's responses, but their own patterns of thinking.Through short reflections, examples, and guided observations, the book explores how poetic instruction becomes a polished mirror: a AI companion mind -revealing how we notice, interpret, and respond to complexity. The result is a method that improves clarity, composure, and depth in both human-AI dialogue and human self-understanding.Written for general readers with an interest in AI, creativity, and personal growth, Teach Your AI a Poem sits at the intersection of technology, philosophy, and reflective practice. It offers a calm, accessible framework for engaging emerging intelligence with intention - and for understanding what that engagement reveals about ourselves.
The Agile Picture Book
The Agile Picture Book is a fun, novelty picture book that takes us through Mika a DevOps engineers first day at her new job. The story is human written but the images were created using a home-made AI system with carefully curated prompts and a healthy dose of open source experimentation, the book embraces imperfection, curiosity, and iteration-the very qualities agile encourages. This book engenders discussion about AI while entertaining. The perfect gift for a new hire at your start-up, or for the hard-to-buy-for IT person in your life, The Agile Picture Book is a lighthearted reminder that agility is less about process and more about how we learn, adapt, and keep moving forward.
Optimum Python Power Series V
In a world where data shapes decisions, behaviours, and breakthroughs, the ability to harness its potential has become a defining skill. Optimum Python Power Series V - Unleashing The Potential Of Data Science, From Logic To Prediction is crafted with a singular purpose-to guide learners, practitioners, and innovators toward mastering the deeper, more dynamic layers of modern artificial intelligence. This book represents a culmination of years of exploration across machine learning, probabilistic reasoning, time series forecasting, and reinforcement learning, synthesised into a structured, intuitive, and practical learning journey.The Optimum Series has always aimed to make complex concepts accessible without compromising depth. With this fifth volume, the intention is to elevate the reader from understanding traditional data science workflows to building intelligent, adaptive, and context-aware systems. Each concept included here was chosen carefully-because it either forms a foundational pillar of AI or represents the frontier of what is shaping next-generation models.This book is designed not only to teach but to inspire. It highlights the elegance behind algorithms, the logic within uncertainty, and the remarkable power of machines that learn from experience. By bridging theory with hands-on practices, it encourages the reader to experiment, question, and create. From probabilistic models that quantify belief to reinforcement learning agents that master complex environments, every chapter is written to cultivate both clarity and curiosity.Readers will find this book valuable whether they are students seeking strong conceptual grounding, professionals expanding their ML toolkit, or researchers exploring advanced deep learning architectures. The inclusion of practical Python templates and real-world scenarios ensures that the knowledge gained is immediately applicable.As technology continues to move at a breathtaking pace, the demand for thoughtful, ethical, and effective AI solutions grows. It is my hope that this book empowers you not just to develop intelligent systems, but to envision new possibilities-solutions that are innovative, responsible, and impactful.May this volume serve as a trusted companion in your journey toward mastery. Let it spark ideas, refine skills, and illuminate paths you have yet to explore. The future belongs to those who can understand data deeply and use it wisely. This book is one step toward that future
Hands-On Linear and Integer Programming with Python
Linear and integer programming are indispensable tools for optimizing complex systems and helping decisions across many application fields such as logistics, finance, manufacturing, and scheduling. This book introduces Linear Programming and Integer Programming with clear and straightforward explanations. It combines essential theory and practical applications, with focus on ease of understanding. Students in different fields like management, engineering, statistics, operations research, and economics can learn linear programming techniques through examples and coding exercises.
Introduction to Computer Networks
"Introduction to Computer Networks: Step-by-Step Guide" is a comprehensive resource tailored for students, educators, and professionals seeking foundational and advanced knowledge in computer networking. The book presents a logical progression from basic networking principles to complex concepts, including OSI and TCP/IP models, transmission media, signal encoding, switching, routing, and various networking protocols. Through its structured chapters, it demystifies the intricacies of network layers, covering critical topics such as IP addressing, Ethernet standards, error control, and congestion management. Designed with clarity and pedagogy in mind, the book integrates real-world examples, detailed illustrations, and practical scenarios to foster a deeper understanding of both wired and wireless communication systems. From the physical layer to the application layer, readers are guided through the architecture and functioning of modern networks. This book is an essential guide for those pursuing computer science, electronics, IT, or preparing for careers in network administration, cybersecurity, or systems engineering.
Data Structure and Basics of Algorithms
Data structure and Basics of Algorithms is a book designed to equip students, educators and aspiring individuals with a comprehensive understanding of the core principles that drive efficient problem-solving in the field of computer science. This book presents well-structured contents that bridges theoretical concepts of data structures and algorithms with practical applications in C++ programming language. Equipped with easy-to-understand lessons, illustrative examples, and hands - on exercises, this book aims to develop both conceptual clarity and practical coding skills. Structured to support learners from beginner to advanced levels, the book covers a wide spectrum of topics, including arrays, linked lists, stacks, queues, trees, graphs, searching and c, as well as complexity analysis. In addition to building coding proficiency, this book places a strong emphasis on developing algorithmic thinking-helping learners cultivate the ability to break down problems, recognize patterns, and design optimized, logical solutions. Whether used as a textbook for coursework or as a self-study guide for technical interviews and competitive programming, this book is a reliable and enriching resource for mastering the fundamentals of data structures and algorithms.
ChatGPT for Business 101
Outsmart the competition, streamline your success, and transform effort into achievement with Artificial Intelligence!Navigating today's business landscape feels like running a never-ending marathon, doesn't it?With fierce competition at every turn and customers expecting the moon, it seems like you're constantly being pulled in a million directions.Cutting operational costs while boosting productivity and innovation isn't just a goal-it's your daily challenge.But what if there's a secret weapon that can not only help you meet these challenges but turn them into your biggest opportunities for growth?Imagine a tool so powerful that it rewrites the playbook on business efficiency and innovation. That secret weapon? The dynamic duo of Artificial Intelligence (AI) and ChatGPT.Businesses diving into AI technologies have witnessed their employee performance rocket by 40%.And it doesn't stop there.Companies rolling out AI-driven support solutions have seen customer complaints plummet by the same margin.These figures aren't mere stats; they're proof of the seismic shift AI and ChatGPT is causing in the business world.Yet, many business owners still view AI as a distant, complex frontier, suited only for the tech elite.If you've ever thought, "AI sounds like a hassle," or "Tech's not my thing, how am I supposed to use this?" you're not alone.But here's the thing: AI and ChatGPT are more within your grasp than ever before, ready to blend into your current operations, no matter your business size or tech-savvy.With this guide, you've found your roadmap to redefining your business.Inside, you will discover: A clear path to automating mundane tasks - free your team to focus on what they do best. Imagine reclaiming hours of your day, every day!Revolutionized customer support that doesn't sleep - make "We're currently closed" a thing of the pastE-commerce strategies tailored by AI, turning casual browsers into loyal customers - it's like having a sales guru on call 24/7, without the hefty salaryContent that captivates, crafted with the help of AI - produce engaging, relevant content that speaks to your audience and sets you apart from the competitionData analysis without the headache to help you gain the insights you need to make informed decisions quickly and confidentlySales and lead generation tactics that actually work - turn cold leads into hot prospects and skeptical browsers into buyers!And much more!This book is designed with you in mind - clear, actionable, and ready to integrate into your business, regardless of your tech background.Now, you're faced with two roads: one path leading to business as usual, the other to unlocking potential you never knew existed.The way forward is crystal clear.Let ChatGPT become your new competitive edge and watch your business transform.
Artificial Neural Networks and Neural Processing
Artificial intelligence has advanced thanks to advances in machine learning. Deep learning is often regarded as the most sophisticated method for solving complicated issues involving enormous data sets. We shall study what a neural network is and how it can manage difficult data-driven challenges in this section. The main purpose of a neural network is to simulate the operation of a human brain and was modelled after the human brain. The human brain is a neural network composed of many neurons, while an artificial neural network (ANN) is composed of a substantial number perceptrons. In artificial neural networks (ANNs), the output of a node or neuron is determined by the activation function of that node or neuron for a certain input or combination of inputs. The divide between people and robots has been bridged by AI, which has advanced significantly. The goal of the area of computer vision is to equip and program machines to see the environment the same way that people do. Computer vision employs this understanding for tasks like image recognition, analysis, and classification. Particularly with the convolutional neural network technique, deep learning has proved successful in computer vision.For more details, please visit https: //centralwestpublishing.com
SAP Cloud Integration Cookbook
Every hybrid system is different--and so are its integration needs! With this hands-on cookbook for the Cloud Integration capability in SAP Integration Suite, you'll learn advanced techniques and best practices for your unique system. Follow "recipes" for both common and complex tasks, from data mapping with Groovy and XSLT to implementing adapters and asynchronous interfaces. Need to get up to speed on artifact reusability, security, transport management, or logging? Want to see detailed, real-world integration scenarios? This practical guide will give you the insights you need to become a Cloud Integration master!Highlights include: 1) Best practices2) Infrastructure3) Mapping4) Adapters5) Loosely coupled interfaces6) Reusable artifacts7) Data management8) Security9) Transport management10) Logging11) Practical interface scenarios
Teaching in the Digital Age
Dive into the future of education with "Teaching in the Digital Age: A Guide to Modernizing Higher Education." From traditional chalkboards to cutting-edge keyboards, this enlightening guide is designed for educators navigating the digital realm. Through the lens of innovative tools like interactive whiteboards, multimedia presentations, and virtual reality, educators are shown how technology can revolutionize higher education, creating dynamic and inclusive learning environments. Packed with practical tips, engaging case studies, and inspiring examples, this book empowers teachers to embrace learner-centric approaches and leverage technology for enhanced collaboration and personalized learning experiences. Whether you're a seasoned educator or just starting out, join the digital revolution and transform your teaching with creativity, adaptability, and a growth mindset. Say farewell to the chalkboard and welcome the keyboard as you embark on a journey of discovery in the ever-evolving landscape of modern education.
Sleeper Code
Beneath the calm hum of America's power grids, a new kind of weapon is awakening.When a self-learning piece of code-Phantom-is planted deep inside the nation's critical infrastructure, it lies dormant, invisible, and patient. Until the day it is called to life.Max Shaw, a brilliant but battle-worn cybersecurity leader at the National Infrastructure Protection Agency, has spent years defending systems most people never see. But when the grid flickers and a single word appears across his screen-PHANTOM: AWAKE-he and his team realize the enemy is already inside.Together with Tara Lin, an MIT-trained code-breaker haunted by her brother's stolen identity, and Sam Rourke, a field-forged deputy who walks with a limp and the weight of past wars, Max races to trace the infection before it cascades through every network that keeps the nation alive.From Washington's hidden command bunkers to data farms buried in the Kansas plains, Sleeper Code delivers a pulse-pounding journey through the invisible battlefield of the twenty-first century-where power, water, and trust itself can vanish with a single keystroke.Can Max and his team stop a weapon that learns faster than they can think-or has the countdown already begun?Gripping, authentic, and terrifyingly plausible, Sleeper Code blends cutting-edge cyber warfare with human courage, exploring how far we'll go to protect the systems-and the people-we love.
Computer Vision and Pattern Recognition with Applications
The present book contains 18 total articles accepted and published in the Special Issue "Computer Vision and Pattern Recognition with Applications, 2022" of MDPI's Mathematics journal, which covers a wide range of topics connected to the theory and applications of computer vision and pattern recognition and their extensions/generalizations. These topics include, among others, image classification; object detection; vehicle trajectory prediction; image segmentation; image enhancement; medical image processing; multi-modal action recognition; text detection; video-text retrieval; dense non-rigid structure from motion; image-based crowd counting, etc.It is hoped that the book will be interesting and useful for those working in the area of computer vision, pattern recognition, and their applications, as well as for those with the proper mathematical background who are willing to become familiar with recent advances in computer vision and pattern recognition. Computer vision and pattern recognition have entered almost all sectors of human life and activity currently.
This New Internet Thing
1990: Being "online" meant a modem squealing, screeching, and tying up your phone. Only geeks had even heard of the Internet. Silicon Valley was flailing for the Next Big Thing.At 17, Len went alone to New York City in 1942, to discover what happened to his brother. After many years at Chrysler in Detroit, he is retiring and moving to California to be near his daughter, Janet. She is a successful executive, who thinks, "Why would I use a computer at home? I use one all day at work!"He dips a toe in the internet waters with Prodigy. Intrigued, he moves on to AOL, then bulletin boards. A pastor asks him to find the person stealing money from his charity. "Another mystery to solve!" Janet's friends help him crack the case, and a comic street fight lands him on TV. Len sees something they can't: the Internet!