E-Banking
This book argues that electronic banking (e-banking) is a key driver for the success of small and medium-sized businesses (SMBs) in Namibia. It likely explores how e-banking makes financial management easier and faster for SMBs, potentially covering aspects like: Convenient online access to accounts for monitoring cash flow and transactions. Secure online payments to suppliers and receiving payments from customers. Access to financial products like loans and lines of credit tailored for SMB needs. Improved efficiency and productivity by automating financial tasks. By overcoming challenges faced by traditional banking, e-banking empowers SMBs to focus on growth and contributes to Namibia's overall economic development.
Beyond Cloud
Cloud computing revolutionized access to computing power, but latency - the time for data to travel - limits its potential for real-time applications. Enter edge computing, a distributed approach that brings processing closer to the data source, like sensors and devices. Imagine a surgeon performing a remote operation. Decisions need to be made instantly. Cloud processing wouldn't be fast enough. Edge computing on the surgical equipment itself enables real-time analysis and reaction. Cloud and edge aren't rivals; they're a powerful team. The cloud excels at storing and analyzing vast amounts of data, while the edge handles time-sensitive tasks. Together, they create a responsive computing ecosystem. This "cloud-to-edge" shift is driven by the Internet of Things (IoT), where billions of devices generate real-time data. By harnessing both, we unlock the potential for applications like autonomous vehicles, industrial automation, and remote healthcare, pushing computing beyond the cloud and into the realm of real-time.
Unhcr Sa
The UNHCR faces a multitude of challenges supporting refugees in South Africa. Technology can be a powerful tool, but poorly conceived IT projects can be a drain on resources. To strengthen their impact, UNHCR SA should focus on: - Needs Assessment: Collaborate with refugees to identify their specific IT needs, from communication tools to job training platforms. - Digital Literacy: Bridge the digital divide by offering training programs on using and maintaining technology. - Sustainability: Choose solutions with long-term viability, considering factors like local infrastructure and ongoing maintenance costs. - Local Partnerships: Partner with South African tech companies and NGOs for expertise and on-the-ground support. By prioritizing these strategies, UNHCR SA can transform their IT projects into engines of empowerment, fostering self-reliance and a smoother integration process for refugees
Current Problems and Advances in Computational and Applied Mechanics
Advances in computational solid and fluid mechanics have led to significant developments in a large variety of fields, including engineering, physics, and medicine. Computational mechanics offers design flexibility, sophistication, and experimentation, enabling engineers to analyse complex design problems and optimisation solutions efficiently at reduced costs. This Special Edition illustrates the latest advances in computational solid mechanics, fluid mechanics, and coupled problems, and their application to practical engineering problems. This volume contains the scientific contributions presented at the 5th African Conference on Computational Mechanics (AfriComp5) which took place in Cape Town, South Africa, 2-4 November 2022. The articles comprise topics from the wide range of applied mechanics and mathematics including structural mechanics; fluid mechanics; fluid-structure interaction; biomechanics; damage and fracture mechanics; multi-scale mechanics; multi-physics; advanced numerical methods; optimisation and design; and big data and machine learning. Only original contributions were considered for inclusion. All articles were subjected to a full process of double-blind peer review. The review of manuscripts was undertaken by members of the Scientific Advisory Board and other identified leading experts, acting independently on one or more assigned manuscripts. The reader would find this Special to be a useful reference of the state of the art in a variety of areas spanning theoretical and applied mechanics.
Theory of Functions and Applications
"Theory of Functions and Applications" published the latest results in the field of theory of functions, in particular, the theory of functions of a real variable, the theory of approximations, the theory of functions of a complex variable, and the theory of entire and meromorphic functions. The applications of theory of functions are also of particular interest.
A Comprehensive Guide to the Nist Cybersecurity Framework 2.0
Learn to enhance your organizations cybersecurity through the NIST Cybersecurity Framework in this invaluable and accessible guide The National Institute of Standards and Technology (NIST) Cybersecurity Framework, produced in response to a 2014 US Presidential directive, has proven essential in standardizing approaches to cybersecurity risk and producing an efficient, adaptable toolkit for meeting cyber threats. As these threats have multiplied and escalated in recent years, this framework has evolved to meet new needs and reflect new best practices, and now has an international footprint. There has never been a greater need for cybersecurity professionals to understand this framework, its applications, and its potential. A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 offers a vital introduction to this NIST framework and its implementation. Highlighting significant updates from the first version of the NIST framework, it works through each of the frameworks functions in turn in language both beginners and experienced professionals can grasp. Replete with compliance and implementation strategies, it promises to prove indispensable for the next generation of cybersecurity professionals. A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 readers will also find: Clear, jargon-free language for both beginning and advanced readers Detailed discussion of all NIST framework components, including Govern, Identify, Protect, Detect, Respond, and Recover Hundreds of actionable recommendations for immediate implementation by cybersecurity professionals at all levels A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 is ideal for cybersecurity professionals, business leaders and executives, IT consultants and advisors, and students and academics focused on the study of cybersecurity, information technology, or related fields.
”Management of Digital Ecosystems”
William I. Grosky (or Bill for friends) passed away recently. He received his B.Sc. in Mathematics from MIT in 1965, his M.Sc. in Applied Mathematics from Brown University in 1968, and his Ph.D. from Yale University in 1971. William was a Professor and Chair of the Department of Computer and Information Science at the University of Michigan-Dearborn (UMD). Before joining UMD in 2001, he was a Professor and Chair of the Department of Computer Science at Wayne State University and an Assistant Professor of Information and Computer Science at the Georgia Institute of Technology in Atlanta. His research interests included multimedia information systems, text and image mining, and the semantic web. He was a founding member of Intelligent Media LLC, a Michigan-based company that integrates new media into information technologies. William served as the Editor-in-Chief of the IEEE Multimedia magazine, as well as a Member of the Editorial Boards of many journals; in addition, he served as a Member of several Program Committees of conferences focusing on database and multimedia systems. He published three books and over 150 papers in international conferences and journals. Our community remembers him as an excellent scientist and a very generous, funny, and curious person, passionately delivering lectures and seminars. He was the person to speak to when one needed to brainstorm any new technologies or ideas. He used to state that one of the luxuries of academia is the ability to learn every day. This volume is dedicated to his memory.
Fractional Calculus and Hypergeometric Functions in Complex Analysis
This reprint of the Special Issue on "Fractional Calculus and Hypergeometric Functions in Complex Analysis" has resulted in the publication of articles covering a wide range of topics. For example, the powerful and prolific tools provided by fractional calculus are combined with hypergeometric functions, which generates exciting results when integrated into studies. Quantum calculus is also involved in various investigations, alongside fractional calculus notions and methods, resulting in new, powerful operators for application in geometric function theory and other connected fields of research. Scholars studying applications of fractional calculus and hypergeometric functions in complex analysis and related fields should find this Special Issue interesting.
Special Issue in Honor of the 60th Birthday of Professor Hong-Kun Xu
This Special Issue of the journal Axioms pays tribute to Professor Hong-Kun Xu's significant contributions and details recent important advances in theory, methods, and applications of nonlinear analysis, optimization theory, fixed point theory, and algorithms for nonlinear problems. It comprises original, creative, and high-quality research papers that inspire advances in fixed point, coincidence point, and best proximity point theory, set-valued analysis, nonlinear and variational methods for ODEs and PDEs, non-smooth analysis and optimization, inverse and ill-posed problems, convex analysis, matrix theory, and their applications.
Advanced Topics in Types and Programming Languages
A thorough and accessible introduction to a range of key ideas in type systems for programming language. The study of type systems for programming languages now touches many areas of computer science, from language design and implementation to software engineering, network security, databases, and analysis of concurrent and distributed systems. This book offers accessible introductions to key ideas in the field, with contributions by experts on each topic. The topics covered include precise type analyses, which extend simple type systems to give them a better grip on the run time behavior of systems; type systems for low-level languages; applications of types to reasoning about computer programs; type theory as a framework for the design of sophisticated module systems; and advanced techniques in ML-style type inference. Advanced Topics in Types and Programming Languages builds on Benjamin Pierce's Types and Programming Languages (MIT Press, 2002); most of the chapters should be accessible to readers familiar with basic notations and techniques of operational semantics and type systems--the material covered in the first half of the earlier book. Advanced Topics in Types and Programming Languages can be used in the classroom and as a resource for professionals. Most chapters include exercises, ranging in difficulty from quick comprehension checks to challenging extensions, many with solutions.
Python for Neophytes
The book is an introduction to python as a programming language. It has been written in a lucid fashion for all audiences especially those who are seriously interested in computing. It is a must have for children and adults alike.
Unveiling Tweet Bots
Unveiling Tweet Bots: Online Trust" delves into the intricate web of social media manipulation and its profound impact on trust in the digital age. Authored by renowned social media analyst, Dr. Emily Sanchez, the book peels back the layers of deception orchestrated by tweet bots, revealing their role in shaping online narratives and influencing public opinion. Through meticulous research and real-world examples, Sanchez exposes the mechanisms behind these automated accounts, exploring their creation, dissemination, and the consequences they spawn. More than just an expos矇, "Unveiling Tweet Bots" scrutinizes the erosion of trust in online interactions. Sanchez underscores the urgent need for transparency and accountability in combating misinformation and restoring faith in digital discourse. As society grapples with the repercussions of algorithmic manipulation, this book serves as a beacon of awareness, empowering readers to navigate the virtual landscape with discernment and fortitude. With insights that resonate far beyond the realm of social media, it stands as a vital resource for anyone concerned with the future of trust in our interconnected world
Metaheuristics
This volume constitutes the refereed proceedings of Metaheuristics on 15th International Conference, MIC 2024, held in Lorient, France, during June 4-7, 2024. The 36 full papers presented together with 34 short papers were carefully reviewed and selected from 127 submissions. The conference focuses on artificial intelligence, combinatorial optimization, computer science, graph theory, evolutionary algorithms, genetic algorithms, simulated annealing, optimization, optimization problems.
Metaheuristics
This volume constitutes the refereed proceedings of Metaheuristics on 15th International Conference, MIC 2024, held in Lorient, France, during June 4-7, 2024. The 36 full papers presented together with 34 short papers were carefully reviewed and selected from 127 submissions. The conference focuses on artificial intelligence, combinatorial optimization, computer science, graph theory, evolutionary algorithms, genetic algorithms, simulated annealing, optimization, optimization problems.
Bioinformatics for Oral Cancer
Amid the rising global concern of oral cancer, this book provides a compelling exploration of the intricate oral cavity, focused on shedding light on early diagnosis and addressing outdated paradigms, it delves into the persistent challenges of oral premalignant lesions. Tailored for both beginners and researchers, its six chapters encompass the spectrum of genome sequencing, diagnostic biomarkers, gene expression, and more. Discover a fusion of basic and clinical sciences, aiming to invigorate the study of bioinformatics and oral cancer, and ultimately improve survival rates.Bioinformatics for Oral Cancer: Current Insights and Advances serves as a comprehensive guide, offering a deep dive into the multifaceted landscape of oral cancer research and bioinformatics. Within its pages, readers will uncover a wealth of knowledge, starting with foundational chapters introducing bioinformatics and establishing the backdrop of oral cancer. The book then progresses into the realm of diagnostic biomarkers, revealing cutting-edge methodologies for their identification in the context of oral cancer. The book's keen focus extends to gene expression profiles and the intricacies of gene sequencing in the context of oral cancer progression. By systematically unravelling these critical aspects, the book bridges the gap between basic and clinical sciences, equipping readers with a holistic understanding of bioinformatics' pivotal role in enhancing our grasp of oral cancer's complexities.By deciphering the enigmatic landscape of oral premalignant lesions, the book equips clinicians and researchers with tools to predict malignant potentials. Its meticulous exploration of gene expression profiles and sequencing promises to reshape early detection strategies, propelling the field towards improved diagnosis and treatment outcomes.
Submanifolds in Metric Manifolds
The present reprint contains articles accepted and published in the Special Issue "Submanifolds in Metric Manifolds" of the MDPI journal Mathematics; said articles cover a wide range of topics connected to the theory and applications of the geometry of manifolds and their submanifolds, alongside the geometrical and topological structures of submanifolds endowed by special structures in manifolds .The 11 articles in the present reprint were published in volumes 9 (2021) to 11 (2023) of Mathematics. The topics covered in this Special Issue include (but are not limited to) Riemannian and semi-Riemannian geometry, symplectic geometry, contact geometry, and complex and K\"{a}hler geometry. We hope that this volume will be both interesting and useful to researchers working in the fields of differential geometry and mathematical physics.
Raspberry Pi OS System Administration
The fourth volume in a new series exploring the basics of Raspberry Pi Operating System administration
Unlocking Search Intent
Unlocking Search Intent: Your Key to Online Relevance delves into the mysterious world of online search behaviour, unravelling the mysteries of how, when, and why people search for information online. This book brings together consumer psychology, criminal law, and philosophy (as well as digital marketing, obviously) and goes beyond theoretical exploration to become a practical handbook for marketers, content creators, and business owners alike. We'll investigate the impact of human behaviour on search engine algorithms (and vice versa), providing a roadmap to harness the power of intent for the effective engagement of real customers. By deciphering search intent, businesses can create compelling content, drive both organic and paid-for traffic, and ultimately enhance conversion rates. What's not to like? Unlocking Search Intent is a practical tool to help guide marketing professionals through the dynamic landscape of online relevance, ensuring they stay ahead in the ever-evolving digital realm.
Fancy Bear Goes Phishing
"Unsettling, absolutely riveting, and--for better or worse--necessary reading." --Brian Christian, author of Algorithms to Live By and The Alignment ProblemAn entertaining account of the philosophy and technology of hacking--and why we all need to understand it. It's a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human-interest story, he tells the fascinating tales of perpetrators, including Robert Morris Jr., the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian "Dark Avenger," who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton's cell phone, the Russian intelligence officers who sought to take control of a US election, and others. In telling their stories, Shapiro exposes the hackers' tool kits and gives fresh answers to vital questions: Why is the internet so vulnerable? What can we do in response? Combining the philosophical adventure of G繹del, Escher, Bach with dramatic true-crime narrative, the result is a lively and original account of the future of hacking, espionage, and war, and of how to live in an era of cybercrime. Includes black-and-white images
Advancements in Science and Technology for Healthcare, Agriculture, and Environmental Sustainability
This book is the collection of selected articles that appeared at the First International Analytics Conference 2023 held in Hyderabad in virtual mode on February 2nd the 3rd 2023.
VBScript Coding - Practical Solutions and Programs
Welcome to "VBScript Coding: "Practical Solutions and Programs"! This book serves as a detailed tutorial with the hands-on programming exercises and practical solutions on how to use VBScript to the full maximal. Whatever be your level of knowledge, whether you are just a beginner looking at the basics, or an experienced developer looking for more however, this book provides a solid basis for VBScript programming. VBScript, an scripting language by Microsoft, has been used widely to automate tasks, build simple applications, and to script in different windows such as Windows Script Host (WSH), Active Server Pages (ASP) among others. However, even with its simplicity, there are so many features can be useful for the developers in order to write efficient and effective scripts. Every chapter devotes a specific topic with practical cases and illustrations enabling you to understand the concept quickly and applying it to solve everyday problems. Happy coding!
Security Challenges with Blockchain
Securing the Chain: Navigating the Future of Blockchain with ConfidenceBook DescriptionIn "Security Challenges with Blockchain", readers embark on a critical journey through the evolving landscape of blockchain security. This essential guide illuminates the intricate security challenges posed by blockchain technology's decentralized nature, providing a comprehensive overview of the potential vulnerabilities, privacy concerns, and trust issues that professionals across industries may encounter.Through concise, expertly curated content, the book equips developers, IT professionals, and blockchain enthusiasts with the knowledge and strategies necessary to build and maintain secure blockchain applications. It demystifies complex security concepts, offering actionable insights and best practices for safeguarding digital assets against emerging threats and ensuring the integrity of blockchain systems.The book extends its purview to critical domains where blockchain intersects with cybersecurity such as Supply Chain Management and Identity Management. Drawing from real-world case studies and expert insights, this book empowers organizations to fortify their defenses and embrace the promise of blockchain technology with confidence.Table of Contents1. Introduction to Blockchain Technology2. Understanding Blockchain Security3. Security Challenges in Public Blockchains4. Security Challenges in Private Blockchains5. Security Challenges in Consortia Blockchains6. Security Challenges in Decentralized Finance7. Security Challenges in Supply Chain Management8. Security Challenges in Identity Management9. Best Practices for Blockchain Security Index
Virtual Libraries
"Virtual Libraries: Innovation to Integration" is a book that explores the evolution of libraries in the digital age. It delves into the transformative impact of digital technologies on traditional library systems, tracing their historical roots and highlighting how virtual libraries have emerged as pioneering platforms offering unparalleled access to resources and services. Key themes include digital transformation, innovative services, challenges and opportunities, the evolving role of librarians, and case studies and examples. The book chronicles the shift from print-centric libraries to digitally-driven information ecosystems, examining the proliferation of digital collections, online databases, and e-books. It also highlights the innovative services and tools that virtual libraries employ to enhance user experience. The book also addresses issues such as digital preservation, copyright concerns, and the digital divide, while highlighting the potential for democratizing access to information and fostering digital literacy. The book serves as a practical guide for librarians, educators, policymakers, and information professionals to navigate the complexities of the digital information age.
New Developments in Geometric Function Theory II
This project aimed to gather together the latest developments in research concerning complex-valued functions from the perspective of geometric function theory. Scholars' contributions were sought on topics including, but not limited to: new classes of univalent and bi-univalent functions; studies regarding coefficient estimates including the Fekete-Szego functional, Hankel determinants, and Toeplitz matrices; applications of different types of operators in geometric function theory including differential, integral, fractional, or quantum calculus operators; differential subordination and superordination theories in their classical form and also concerning their recent extensions-strong and fuzzy differential subordination and superordination theories; applications of different hypergeometric functions and orthogonal polynomials in geometric function theory. The presentation of new results obtained by using any other techniques which can be applied in the field of complex analysis were also welcomed. Hopefully, through this project, new lines of research associated with geometric function theory have been highlighted and will serve to boost development in this field.
Statistical Methods in Data Science and Applications
The rise of big data has significantly elevated the significance of data science, catalyzing extensive research across multiple fields, including mathematics, statistics, computer science, and artificial intelligence. Data science encompasses modeling, computation, and learning processes to transform data into information, information into knowledge, and knowledge into actionable decisions. However, the intricacies of big data pose numerous challenges, such as dealing with missing data, high- and ultra-high-dimensional data, response dependencies, time series analysis, and distributed storage. Existing theories, methods, and algorithms for analyzing big data encounter significant hurdles, especially concerning fundamental statistical concepts like estimation, hypothesis testing, confidence intervals, and variable selection, spanning frequentist and Bayesian approaches. This reprint offers an array of tools within the realm of data science aimed at tackling these challenges. It encompasses various topics, including handling measurement errors or missing data, cognitive diagnosis modeling, constructing credit risk scorecards using logistic regression models, geographically weighted regression modeling, privacy protection practices in data mining, clustering methods, and model selection for high-dimensional datasets. Furthermore, it delves into predicting sensitive features under indirect questioning. These discussions aim to provide valuable tools and examples for the practical application of data science.
Hacking IoT
Despite the multitude of hacking challenges and training opportunities on various platforms, there is a lack of targeted exercises and learning materials geared towards penetration testing of IoT devices. In particular, the important aspects of IoT hacking, such as examining hardware and recording and analyzing common wireless protocols in the IoT area such as WLAN and Bluetooth, are often neglected.This master's thesis focuses on the development and evaluation of Internet of Things (IoT) hacking challenges designed for entry-level penetration testing of IoT devices in the IoT lab at Hagenberg University of Applied Sciences. The aim of the work is to promote and improve students' understanding and skills in penetration testing of IoT devices.As part of the work, various challenges were developed that cover different aspects of penetration testing of IoT devices. Each challenge is designed to highlight realistic security issues and vulnerabilities in IoT systems, with the aim of providing both theoretical knowledge and practical skills.
IP Multicast Routing Protocols
This book discusses the fundamental concepts that are essential to understanding IP multicast communication. The material covers the well-known IP multicast routing protocols along with the rationale behind each protocol.
Technological Advancement in Internet of Medical Things and Blockchain for Personalized Healthcare
Technological Advancement in Internet of Medical Things and Blockchain for Personalized Healthcare presents an overview of the innovative concepts, technologies, and various biomedical applications of the Internet of Medical Things (IoMT).Features: - Provides insights into smart contracts, healthcare monitoring equipment, and the next generation of Internet of Things sensors to improve adherence to chronic disease management programs and patient health.- Discusses the IoMT for personalized healthcare, security, and privacy issues of the IoMT in the healthcare sector.- Elaborates on the opportunities and challenges of blockchain technology in the healthcare system.- Focuses on the convergence of the IoMT and blockchain for emerging personalized healthcare systems.- Presents techniques and methods to secure IoMT devices to protect them from cyberattacks.This book is primarily written for graduate students and academic researchers working in the fields of computer science and engineering, biomedical engineering, and electrical engineering.
How to Protect Yourself from Killer Computers
Catastrophic computer failures have led to aircraft entering 'death dives', fatal car crashes and killer radiation overdoses in hospitals. Advances in Artificial Intelligence and the UK Post Office Horizon IT scandal have further raised public concern, as an ongoing, previously unreported scandal involving TV Licensing appears to be unfolding.Computer scientist, Dr Junade Ali, peels back the layers of cover-up, negligence and wrongdoing to uncover how killer computers are born and how everyone can protect themselves."Three quarters of software engineers reporting wrongdoing in their workplace have faced some kind of retaliation" - The Register"Junade Ali's research has also found basic problems shared across various sectors." - The Independent"Through the years, Ali became adept at not only software engineering but understanding how software engineers work. In addition to developer burnout, he's focused on quality, continuous improvement and psychological safety in the workplace." - EE Times"His many contributions to IT security include developing cyber security techniques that have been adopted in products built by Apple and Google, and developing software to help de-escalate cyber warfare situations." - Computer Weekly "It's a timely warning for businesses and other organisations of all shapes and sizes." - Forbes
Taming the Machine
AI promises to transform our world, supercharging productivity and driving new innovations. Taming the Machine uncovers how you can responsibly harness the power of AI with confidence. AI has the potential to become a personal assistant, a creative partner, an editor and a research tool all at once. But it also represents a threat to your livelihood, data and privacy. Taming the Machine offers the practical insights and knowledge you need to work with AI with an ethical and responsible approach. In this book, celebrated AI expert and ethicist Nell Watson offers practical insights on how you can ethically innovate with AI. It delves into the ethical issues of unbridled AI, highlighting the challenges that it will bring to society and business unless we fortify cybersecurity, safeguard our data, and understand the dangerous potential of artificial intelligence. Step into the future and supercharge your performance safely by Taming the Machine.
Crypto Hipsters
The legendary Bitcoin white paper was first published far back beyond 2008 but somehow blockchain is still remaining as a mysterious place to most of the people. This book is for people who want to understand the overall landscape of blockchain technology and cryptocurrency. From the history of money, this book encompasses how Bitcoin and Ethereum works under the hood, potential altcoin projects and in depth real-world use-cases. Turn the first page of this book if you are ready to be a CryptoHipster.
Taming the Machine
AI promises to transform our world, supercharging productivity and driving new innovations. Taming the Machine uncovers how you can responsibly harness the power of AI with confidence. AI has the potential to become a personal assistant, a creative partner, an editor and a research tool all at once. But it also represents a threat to your livelihood, data and privacy. Taming the Machine offers the practical insights and knowledge you need to work with AI with an ethical and responsible approach. In this book, celebrated AI expert and ethicist Nell Watson offers practical insights on how you can ethically innovate with AI. It delves into the ethical issues of unbridled AI, highlighting the challenges that it will bring to society and business unless we fortify cybersecurity, safeguard our data, and understand the dangerous potential of artificial intelligence. Step into the future and supercharge your performance safely by Taming the Machine.
Fundamentals of Enterprise Architecture
With the increasing complexity of modern cloud-based systems, an effective enterprise architecture program is more critical than ever. In this practical book, author Tanu McCabe from Capital One provides proven frameworks and practices to define an effective enterprise architecture strategy--one that will enable software and enterprise architects to create and implement great architecture strategies. You'll learn how to create shared alignment across business and technology, embed architecture practices into processes and tooling, incorporate technology and business trends, and instill contextual understanding over siloed decision-making. Complete with examples of patterns and antipatterns, this book provides reusable templates, assessment tools, and practical advice. With this book, you will: Understand exactly what enterprise architecture is, and why it's important to build an effective enterprise architecture practice Learn who needs to be involved to define and implement architecture strategies Examine common pitfalls that inhibit effective architecture strategies Assess the current state of your organization's architecture practice to identify opportunities for improvement Define your own architecture strategy at both an organizational and personal level by applying the book's frameworks Enhance your ability to make great architecture decisions using the frameworks and lessons provided Tanusree (Tanu) McCabe is a distinguished engineer who leads public cloud strategy at CVS and formerly led enterprise architecture strategy at Capital One as an executive distinguished engineer.
Fractional-Order Systems and Its Applications in Engineering
As data systems become more effective, more and more mathematical approaches have been applied to real-world applications to achieve exceptional outcomes. Fractional approaches (such as fractional calculus, fractional Fourier analysis, and the linear canonical transform) are gaining importance in the area of mathematics and are gaining attention from the community of applied mathematicians. The theory and method of fractional domain analysis may further define the dynamic process of signal translation from time domains to frequency domains, creating a new avenue for non-stationary signal analyses and treatment studies. In technical domains such as the radar, communications, and sonar domains, fractional approaches are preferable to traditional integral methods because they offer novel concepts, procedures, and ideas. Due to the unpredictability of the sent signal in actual engineering systems and the effect of different disturbances and noises on the transmission process, despite the numerous benefits of these new fractional approaches, a few critical issues still need to be resolved. Simultaneously, fraction theory is confronted with several practical limits in engineering, such as sampling and filtering in the sphere of multidimensional signals. This Special Issue focuses on the current successes and potential difficulties of fractional techniques in engineering theory and applications.
Applications of Augmented Reality - Current State of the Art
Augmented Reality (AR) uses information in the form of text, graphics, audio, and other virtual enhancements that are registered with real-world objects in real-time. AR enhances the user's interaction with the real world and provides added value over virtual reality. This book presents various AR applications ranging from real-time information display and applications in the construction industry and architecture to medical applications. It provides an overview of how AR is applied in these areas and showcases the current state of the art. This book is essential reading not only for researchers and technology developers but also for students (both graduates and undergraduates) and anyone who is interested in the application of AR technology in practice.
Advances in Computational Intelligence and Its Applications
It is with great pleasure and enthusiasm that we welcome you to the International Conference on Advances in Computational Intelligence and its Applications (ICACIA-2023).
Mastering C for Advanced Data Structures
It is my privilege to welcome you to " Mastering C for Advanced Data Structures ". The following book is intended specifically for programmers and developers who are familiar with C-language and aspire to persuade where more advanced data structures are concerned. In the constantly fluctuating world of computer science and software engineering, knowledge of data structures is compulsory for gaining the skills needed to build performative and scalable applications. The primary focus of this book is to close the gap that exists between basing programming challenges on fundamental data structures and the complex advanced data structures. By the end of the book, you will be well equipped to handle all programming challenges that still use fundamental data structures. Thanks for stepping on this learning platform with us during this process. I hope this book brings you more pragmatism in programming with C language and getting mastered the advanced data structures. Happy coding!
Formal Methods for Managing and Processing Ontology Alignments
This book consolidates findings previously published in prestigious international journals and presented at leading conferences. The book introduces basic mathematical concepts, and later chapters build upon these foundations, but each focusses on specific aspects of ontology alignment, making the content accessible and easy to follow.
Artificial Intelligence in Music, Sound, Art and Design
This book constitutes the refereed proceedings of the 13th International Conference on Artificial Intelligence in Music, Sound, Art and Design, EvoMUSART 2024, held as part of EvoStar 2024, in Aberystwyth, UK, April 3-5, 2024. The 17 full papers and 8 short papers presented in this book were carefully reviewed and selected from 55 submissions. The main purpose of this conference proceedings was to bring together practitioners who are using Artificial Intelligence techniques for artistic tasks, providing the opportunity to promote, present, and discuss ongoing work in the area.
Getting Started with Cryptocurrency
Your clients, suppliers or employees may be among the one in eight adults worldwide who hold crypto assets. How can you ensure that crypto transactions are properly accounted for, legally and safely managed, and used to benefit your business?
Inter-Service Communication with Go
This book will cover different concepts of inter-service communication. They will be demonstrated through the Go programming language, its standard library, and popular third-party packages for concepts. Begin by understanding basic concepts such as clients, servers, and communication methods. Explore RESTful APIs and HTTP, the backbone of many systems. Learn about protocol buffers and gRPC for efficient data exchange. For asynchronous communication, discover message queuing with RabbitMQ and event-driven patterns with Redis. Lastly, explore event-driven architecture (EDA) and Apache Kafka for implementing this style of communication.
Integration of Constraint Programming, Artificial Intelligence, and Operations Research
This book constitutes the proceedings of the 21st International Conference on the Integration of Constraint Programming, Artificial Intelligence, and Operations Research, CPAIOR 2024, held in Uppsala, Sweden, during May 28-31, 2024.The 33 full papers and the 9 short papers presented in the proceedings were carefully reviewed and selected from a total of 104 submissions. The content of the papers focus on new techniques or applications in the area and foster the integration of techniques from different fields dealing with large and complex problems.
Combinatorial Optimization
This book constitutes the refereed proceedings of the 8th International Symposium on Combinatorial Optimization, ISCO 2024, held in La Laguna, Tenerife, Spain, during May 22-24, 2024. The 30 full papers included in this book were carefully reviewed and selected from 46 submissions. They were organized in topical sections as follows: integer programming; graph theory; parameterized algorithms; approximation algorithms; integer programming for machine learning; and applications.
The Accidental Administrator
Based on CentOS 6.5The Accidental Administrator: Linux Server Step-by-Step Configuration Guide is packed with 54 hands-on, step-by-step exercises and 185 graphics including screen captures showing you exactly what you should be seeing on your own screen. It's the most straight-forward, visual approach to learning how to configure a Red Hat/CentOS Linux server, filled with practical tips and secrets learned from years of teaching, consulting, and administering Linux servers.There's no time wasted on boring theory. The essentials are covered in chapters on installing, administering, user management, file systems and directory management, networking, package management, automated task scheduling, network services including DHCP and DNS, Samba, NFS, mail servers, Web and FTP servers, SSH, security, firewalls, NAT, performance monitoring, management tools, and more.Inside this concise, step-by-step guide, you'll find: Where to find and legally download the free server softwareHow to build and configure an Apache Web server, including virtual hostsHow to configure file and printer sharing for Windows clients with SambaHow to understand Linux file and directory permissionsWith hands-on exercises using virtualization (VMWare is used in the book, but other virtualization environments will work equally as well), this book is perfect for both individuals working by themselves or for groups such as classes and users groups.All the information is presented in a straightforward, yet casual style that you can understand and use right away. This practical book makes it possible for you to build a working Linux server in a matter of minutes. Of course, some of the more advanced configs may take a little longer, but even so, you'll be able to "get it done" in a minimal amount of time.
Application of Mathematics for Modeling Industrial Innovative Systems and Processes
This reprint contains a total of 10 articles accepted and published in the Special Issue "Application of Mathematics for Modeling Industrial Innovative Systems and Processes" of the MDPI Mathematics journal. This Special Issue covers a wide range of topics in the field of innovative development processes and mathematical modeling in industry. It focuses on the formalization of continuous and discrete systems, cyclical development study, and achieving global optimum production efficiency in the context of the triple helix of interactions. Additionally, this Special Issue explores the study of development traps, similarity and difference assessment applied to the functioning of innovative systems in different countries, regions, and types of economic activity based on the use of modern mathematical methods of data processing and visualization. It reveals latent patterns, including the use of computer analysis. This reprint aims to be both interesting and useful to those who work in the field of modeling industrial and innovative systems and processes, modeling cyclic processes, mathematical risk assessment, and dynamic supply chain models. This reprint may also be of interest to those who are curious about the latest achievements in queuing theory, methods of multidimensional statistical analysis, which serve as an effective tool for making management decisions, and unlocking the hidden potential of management objects.
Data Analytics and Machine Learning for Integrated Corridor Management
This book takes readers on a journey through the intricate web of contemporary transportation systems, offering unparalleled insights into the strategies, technologies, and methodologies shaping the movement of people and goods in urban landscapes.