Résultats de recherche de titre
Articles 1 à 20 sur 2674
Comprendre l'intelligence artificielle (L'Encyclopédie d'Utovie)
Par Louis Belon. 2023
Un ouvrage pour faire toute la lumière sur l'intelligence artificielle qui, selon l'auteur, ne constitue pas un mal en soi…
mais qui nécessite de s'interroger sur celles et ceux qui sont à l'origine de cet outil.I heard her call my name: A memoir of transition
Par Lucy Sante. 2024
An iconic writer&’s lapidary memoir of a life spent pursuing a dream of artistic truth while evading the truth of…
her own gender identity, until, finally, she turned to face who she really was For a long time, Lucy Sante felt unsure of her place. Born in Belgium, the only child of conservative working-class Catholic parents who transplanted their little family to the United States, she felt at home only when she moved to New York City in the early 1970s and found her people among a band of fellow bohemians. Some would die young, to drugs and AIDS, and some would become jarringly famous. Sante flirted with both fates, on her way to building an estimable career as a writer. But she still felt like her life a performance. She was presenting a façade, even to herself. Sante&’s memoir braids together two threads of personal narrative: the arc of her life, and her recent step-by-step transition to a place of inner and outer alignment. Sante brings a loving irony to her account of her unsteady first steps; there was much she found she still needed to learn about being a woman after some sixty years cloaked in a man&’s identity, in a man&’s world. A marvel of grace and empathy, I Heard Her Call My Name parses with great sensitivity many issues that touch our lives deeply, of gender identity and far beyondWhen My Ghost Sings: A Memoir of Stroke, Recovery, and Transformation
Par Tara Sidhoo Fraser. 2023
A lucid exploration of amnesia, selfhood, and who is left behind when the past is obliterated Tara Sidhoo Fraser is…
thirty-two years old when a rare mutation in her brain causes a stroke. Awakening after surgery with no memory of her previous life, she attempts to piece it all back together through a haze of amnesia. Yet, as memories do begin to surface, they are seen through someone else's eyes - the person whose body she stole, whom she calls Ghost. Fighting to stabilize her existence, Tara struggles with the gulf between who she was and who she is now, while constantly battling and paying penance to Ghost. She meets Jude, who is also contending with their identity, the gap between who they are and who they present to the world. As Jude's transition progresses and they begin testosterone injections, Tara's conflict with Ghost heightens. Ghost's voice becomes stronger, and memories buried in the body they now share of hospital visits, old desires, and her ex threaten Tara's new relationship. She burrows deeper into the mystery of who she once was, recognizing the need to fuse herself and Ghost into one. When My Ghost Sings is a lyrical memoir of healing, a farewell letter, and a reclamation of selfhood.Building a cyber risk management program: Evolving security for the digital age
Par Brian Allen. 2024
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for…
designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for. You'll learn how to define and establish a sustainable, defendable, cyber risk management program, and the benefits associated with proper implementation. Cyber risk management experts Brian Allen and Brandon Bapst, working with writer Terry Allan Hicks, also provide advice that goes beyond risk management. You'll discover ways to address your company's oversight obligations as defined by international standards, case law, regulation, and board-level guidance. This book helps you: understand the transformational changes digitalization is introducing, and new cyber risks that come with it; learn the key legal and regulatory drivers that make cyber risk management a mission-critical priority for enterprises; gain a complete understanding of four components that make up a formal cyber risk management program; and implement or provide guidance for a cyber risk management program within your enterpriseNGINX Cookbook
Par Derek DeJonghe. 2024
NGINX is one of the most widely used web servers available today, in part because of itscapabilities as a load…
balancer and reverse proxy server for HTTP and other network protocols. This revised cookbook provides easy-to-follow examples of real-world problems in application delivery. Practical recipes help you set up and use either the open source or commercial offering to solve problems in various use cases.For professionals who understand modern web architectures, such as n-tier or microservice designs and common web protocols such as TCP and HTTP, these recipes provide proven solutions for security and software load balancing and for monitoring and maintaining NGINX's application delivery platform. You'll also explore advanced features of both NGINX and NGINX Plus, the free and licensed versions of this server.You'll find recipes for:High-performance load balancing with HTTP, TCP, and UDPSecuring access through encrypted traffic, secure links, HTTP authentication subrequests, and moreDeploying NGINX to Google, AWS, and Azure cloudSetting up and configuring NGINX ControllerInstalling and configuring the NGINX App Protect moduleEnabling WAF through Controller ADCNGINX Instance Manager, Service Mesh, and the njs moduleVision and Actualization in Academia: Georgia Tech’s College of Computing (History of Computing)
Par Peter A. Freeman. 2024
Although difficult, change in academic structures is necessary today, especially in fast-changing fields today such as biology, computing, management, the…
social sciences, and others. This includes changes within existing organizations as well as creation of new structures and reorganizations or eliminations of older ones. This narrative attempts first to document the historical rise of an organization, Georgia Tech’s College of Computing, that has touched and successfully changed the lives of thousands of people. Second, it aims to identify and explicate some of what has led to this widely acknowledged success. The book provides a chronological narrative that highlights major changes taken under each successive leader. These changes have built on one another, knowingly or otherwise, to create a growing organization that rivals in size and prominence longer established parts of the university. The case study, while of an academic organization focused on computing, provides general lessons applicable almost anywhere. Topics and features: Discusses the nature and uses of visions, both general and specificShows how visions can be used to drive specific actions and resource allocationsIllustrates the choice and use of enduring organizational principlesOutlines a simple strategic-planning method and its applicationIndicates results of this overall approach This book will be of interest to anyone interested in organizational change, especially in academia, and to those interested in Georgia Tech. It will also appeal to policymakers in education, government, and industry; as well as anyone interested in the historical growth of the computing milieu broadly. Peter A. Freeman was Founding Dean and Professor in the College of Computing at Georgia Tech from 1990 to 2002. Today he is an Emeritus Dean and Professor.The information infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector:…
chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XVII describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and IssuesSmart Grid Risks and ImpactsNetwork and Telecommunications Systems SecurityInfrastructure SecurityAutomobile Security This book is the seventeenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of eleven edited papers from the Seventeenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, which was held at SRI International, Arlington, Virginia, USA in the spring of 2023. Critical Infrastructure Protection XVII is an important resource for researchers, faculty members and graduate students, as well as for as well as for policy makers, practitioners and other individuals with interests in homeland security.Progress in Landslide Research and Technology, Volume 2 Issue 2, 2023 (Progress in Landslide Research and Technology)
Par Irasema Alcántara-Ayala, Željko Arbanas, David Huntley, Kazuo Konagai, Snježana Mihalić Arbanas, Matjaž Mikoš, Maneesha V. Ramesh, Kyoji Sassa, Shinji Sassa, Huiming Tang, Binod Tiwari. 2023
This open access book provides an overview of the progress in landslide research and technology and is part of a…
book series of the International Consortium on Landslides (ICL). The book provides a common platform for the publication of recent progress in landslide research and technology for practical applications and the benefit for the society contributing to the Kyoto Landslide Commitment 2020, which is expected to continue up to 2030 and even beyond to globally promote the understanding and reduction of landslide disaster risk, as well as to address the 2030 Agenda Sustainable Development Goals.Proceedings of Data Analytics and Management: ICDAM 2023, Volume 4 (Lecture Notes in Networks and Systems #788)
Par Abhishek Swaroop, Zdzislaw Polkowski, Sérgio Duarte Correia, Bal Virdee. 2023
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at…
London Metropolitan University, London, UK, during June 2023. The book covers the topics in data analytics, data management, big data, computational intelligence, and communication networks. The book presents innovative work by leading academics, researchers, and experts from industry which is useful for young researchers and students. The book is divided into four volumes.Current and Future Trends on Intelligent Technology Adoption: Volume 1 (Studies in Computational Intelligence #1128)
Par Mohammed A. Al-Sharafi, Mostafa Al-Emran, Garry Wei-Han Tan, Keng-Boon Ooi. 2023
This book explores current and future trends in adopting intelligent technologies, such as the metaverse, social technologies, FinTech applications, and…
blockchain, among individuals and organizations. The edited book includes empirical and review studies primarily focusing on these issues. This focus aids scholars in conducting future research in the domain and identifying possible future developments of emerging technologies. The empirical studies in the book utilize recent and advanced analytical techniques for data analysis.This unique textbook explicitly addresses the intersection of advanced analytics and procurement. It is motivated by one core question: How…
can firms generate (economic) value from procurement data? It demonstrates that procurement is one of the major functions within a firm where data analytics, artificial intelligence, and operations research can successfully be leveraged to reduce cost and risk and to achieve resilience and sustainability goals.The book provides a methods-based overview of data-driven optimization of purchasing decisions. Besides presenting key concepts and applications, it particularly focuses on implementation, so as to help (future) procurement managers and data scientists quickly evaluate the value generated by a given data-driven solution. What sets this textbook apart is its combination of rigorous, state-of-the-art methodologies from academic research and first-hand experience from various application-oriented consulting projects in a range of industries. Though primarily intended for graduate students with a major in procurement and supply chain management, the book will also benefit purchasing managers with and without specific knowledge of advanced analytics techniques, and data scientists with and without specific experience in procurement.Laws of UX: Using Psychology To Design Better Products And Services
Par Jon Yablonski. 2024
An understanding of psychology-specifically the psychology behind how users behave and interact with digital interfaces-is perhaps the single most valuable…
nondesign skill a designer can have. The most elegant design can fail if it forces users to conform to the design instead of working within the "blueprint" of how humans perceive and process the world around them.This practical guide explains how you can apply key principles of psychology to build products and experiences that are more human-centered and intuitive. Author Jon Yablonski deconstructs familiar apps and experiences to provide clear examples of how UX designers can build interfaces that adapt to how users perceive and process digital interfaces.You'll learn:How aesthetically pleasing design creates positive responsesThe principles of psychology most useful for designersHow these psychology principles relate to UX heuristicsPredictive models including Fitts's law, Jakob's law, and Hick's lawEthical implications of using psychology in designA practical framework for applying principles of psychology in your design processThis updated edition includes an even deeper connection to the underlying psychological concepts that govern the principles explored in the book, along with accompanying UX methods and techniques. Examples have been updated to ensure the deconstructed apps and experiences remain familiar and relevant.Linked: Conquer LinkedIn. Get Your Dream Job. Own Your Future.
Par Omar Garriott, Jeremy Schifeling. 2022
The LinkedIn insider&’s guide to how the new job search really works—and how to make it work for you. No…
one disputes that LinkedIn is the world&’s biggest job market. So it&’s about time that someone with the inside scoop explained how to make the most of it. Here, from two LinkedIn experts and former employees, is the definitive guide that demystifies the massive site and gives every reader—from the newly minted college graduate to the midlife career-changer—the most important strategies to win the modern job search game. Clear, lively, and decidedly practical, Linked shows how to burnish your personal brand so recruiters come to you. Tap the power of the network effect and turn anyone into an invaluable referral. Think like employers and focus your profile to get noticed, get considered, and get hired. And game both the search algorithm and Applicant Tracking Systems used by nearly every employer in every economic sector. The result: not just a great job, but the future of your dreams.Distributed Machine Learning Patterns
Par Yuan Tang. 2024
Practical patterns for scaling machine learning from your laptop to a distributed cluster.Distributing machine learning systems allow developers to handle…
extremely large datasets across multiple clusters, take advantage of automation tools, and benefit from hardware accelerations. This book reveals best practice techniques and insider tips for tackling the challenges of scaling machine learning systems. In Distributed Machine Learning Patterns you will learn how to: Apply distributed systems patterns to build scalable and reliable machine learning projects Build ML pipelines with data ingestion, distributed training, model serving, and more Automate ML tasks with Kubernetes, TensorFlow, Kubeflow, and Argo Workflows Make trade-offs between different patterns and approaches Manage and monitor machine learning workloads at scale Inside Distributed Machine Learning Patterns you&’ll learn to apply established distributed systems patterns to machine learning projects—plus explore cutting-edge new patterns created specifically for machine learning. Firmly rooted in the real world, this book demonstrates how to apply patterns using examples based in TensorFlow, Kubernetes, Kubeflow, and Argo Workflows. Hands-on projects and clear, practical DevOps techniques let you easily launch, manage, and monitor cloud-native distributed machine learning pipelines. About the technology Deploying a machine learning application on a modern distributed system puts the spotlight on reliability, performance, security, and other operational concerns. In this in-depth guide, Yuan Tang, project lead of Argo and Kubeflow, shares patterns, examples, and hard-won insights on taking an ML model from a single device to a distributed cluster. About the book Distributed Machine Learning Patterns provides dozens of techniques for designing and deploying distributed machine learning systems. In it, you&’ll learn patterns for distributed model training, managing unexpected failures, and dynamic model serving. You&’ll appreciate the practical examples that accompany each pattern along with a full-scale project that implements distributed model training and inference with autoscaling on Kubernetes. What's inside Data ingestion, distributed training, model serving, and more Automating Kubernetes and TensorFlow with Kubeflow and Argo Workflows Manage and monitor workloads at scale About the reader For data analysts and engineers familiar with the basics of machine learning, Bash, Python, and Docker. About the author Yuan Tang is a project lead of Argo and Kubeflow, maintainer of TensorFlow and XGBoost, and author of numerous open source projects. Table of Contents PART 1 BASIC CONCEPTS AND BACKGROUND 1 Introduction to distributed machine learning systems PART 2 PATTERNS OF DISTRIBUTED MACHINE LEARNING SYSTEMS 2 Data ingestion patterns 3 Distributed training patterns 4 Model serving patterns 5 Workflow patterns 6 Operation patterns PART 3 BUILDING A DISTRIBUTED MACHINE LEARNING WORKFLOW 7 Project overview and system architecture 8 Overview of relevant technologies 9 A complete implementationInternet of Production: Fundamentals, Methods and Applications (Interdisciplinary Excellence Accelerator Series)
Par Christian Brecher, Günther Schuh, Wil van der Aalst, Matthias Jarke, Frank T. Piller, Melanie Padberg. 2024
This seminal compendium, available through open access, illuminates the forefront of digital collaboration in production. It introduces the visionary concept…
of the Internet of Production (IoP), an ambitious initiative by Germany's esteemed Cluster of Excellence at RWTH Aachen University. This handbook pioneers the integration of data, models, and knowledge across development, production, and user cycles, offering interdisciplinary insights into production technology's horizons with the overall objective to create a worldwide lab.The work is organized into seven key parts, each contributing to a comprehensive understanding of the IoP. Part I lays the foundation with interdisciplinary visions and concepts. Part II delves into IoP's infrastructure, encompassing digital shadows and actionable artificial intelligence. Part III examines materials within the digitalized production landscape. Part IV confronts the challenges and potentials of production processes under novel digitalization methods.Part V focuses on production management with data-driven decision support, while Part VI explores agile development processes. Finally, Part VII delves into the interplay between internal and external perspectives in the IoP, human-centered work design, and platform-based ecosystems.Supported by the German Research Foundation (DFG), this compendium redefines manufacturing through the transformative IoP lens. Embrace this scholarly endeavor to embrace technological advancement. This is an open access book.Learn Concurrent Programming with Go
Par James Cutajar. 2024
Concurrency doesn&’t need to be confusing. Start writing concurrent code that improves performance, scales up to handle large volumes of…
data, and takes full advantage of modern multi-processor hardware.Too many developers think concurrency is extremely challenging. Learn Concurrent Programming with Go is here to prove them wrong! This book uses the easy-to-grasp concurrency tools of the Go language to demonstrate principles and techniques, steadily teaching you the best practices of effective concurrency. Techniques learned in this book can be applied to other languages. In Learn Concurrent Programming with Go you will learn how to: Implement effective concurrency for more responsive, higher performing, scalable software Avoid common concurrency problems such as deadlocks and race conditions Manage concurrency using goroutines, mutexes, readers-writer locks, and more Identify concurrency patterns such as pipelining, worker pools, and message passing Discover advantages, limits, and properties of parallel computing Improve your Go coding skills with advanced multithreading topics Concurrent programming allows multiple tasks to execute and interact simultaneously, speeding up performance and reducing user wait time. In Learn Concurrent Programming with Go, you&’ll discover universal principles of concurrency, along with how to use them for a performance boost in your Go applications. Expert author James Cutajar starts with the basics of modeling concurrency in your programs, demonstrates differences between message passing and memory sharing, and even introduces advanced topics such as atomic variables and futexes. About the technology You can improve almost any application&’s performance and responsiveness by introducing concurrency into the codebase. This book will show you how! It starts with the basics of concurrent programming and builds your skills step by step by exploring scenarios you&’ll face every day as a developer. Author James Cutajar explains each aspect of concurrency in plain language using the intuitive features baked into the Go language. About the book Learn Concurrent Programming with Go provides a practical, hands-on introduction to creating software for modern multiprocessor systems. In it, you&’ll learn how to divide larger programming tasks into independent parts that can run simultaneously. You&’ll use the Go language to implement common concurrency patterns by utilizing readers-writer locks, semaphores, message passing, and memory sharing. The skills you learn will easily transfer to other languages. What's inside Prevent deadlocks and race conditions Go concurrency features like goroutines, mutexes, channels, and more Concurrency patterns including pipelining and worker pools About the reader For programmers with basic knowledge of Go or another C-style language. No experience in concurrent programming required. About the author James Cutajar has been programming for more than 20 years. He&’s an open source contributor, blogger, tech evangelist, Udemy instructor, and author. Table of Contents PART 1 FOUNDATIONS 1 Stepping into concurrent programming 2 Dealing with threads 3 Thread communication using memory sharing 4 Synchronization with mutexes 5 Condition variables and semaphores 6 Synchronizing with waitgroups and barriers PART 2 MESSAGE PASSING 7 Communication using message passing 8 Selecting channels 9 Programming with channels PART 3 MORE CONCURRENCY 10 Concurrency patterns 11 Avoiding deadlocks 12 Atomics, spin locks, and futexesLineare Kirchhoff-Netzwerke: Grundlagen, Analyse und Synthese
Par Reiner Thiele. 2023
Das Buch vermittelt ausgehend von den Grundlagen der Netzwerk-Theorie neuartige Analyse- und Syntheseverfahren für lineare zeitinvariante Kirchhoff-Netzwerke. Hierzu verwendet der…
Autor als Elementarnetzwerke gewöhnliche Widerstände, Kondensatoren und Spulen sowie die sogenannten pathologischen Unternetzwerke Nullator, Norator und Nullor. Der Nullor besteht dabei aus einem Nullator und einem Norator, wird hinsichtlich seines Klemmenverhaltens durch die Belevitch-Darstellung beschrieben und näherungsweise durch einen Operationsverstärker realisiert. Zur Analyse oder Synthese erfolgt die Zerlegung in realisierbare Unternetzwerke mit dem Verfahren der Singulärwert-Zerlegung von Matrizen. Außerdem zeigt Reiner Thiele, wie durch die Applikation von Klemmen-Äquivalenzen praxisrelevante elektrische oder elektronische Schaltungen entstehen.Entrepreneurship der Zukunft: Voraussetzung, Implementierung und Anwendung von Künstlicher Intelligenz im Rahmen datenbasierter Geschäftsmodelle
Par Lars Heim, Sebastian Gerth. 2023
Dieses Buch behandelt die Rolle von Künstlicher Intelligenz (KI) im Kontext der fortlaufenden Digitalisierung und Automatisierung in Unternehmen, um Wertschöpfung zu…
optimieren, neue Geschäftsmodelle zu entwickeln oder bestehende zu transformieren. Untersucht werden Voraussetzungen, Implementierung und Anwendung von KI in datenbasierten Geschäftsmodellen und dabei sowohl Chancen als auch Risiken beleuchtet.Der erste Buchabschnitt konzentriert sich auf die erforderlichen Bedingungen für den erfolgreichen Einsatz von KI. Hierzu zählen die Erfassung und Verarbeitung von Daten, der Aufbau einer robusten IT-Infrastruktur und die Personalschulung. Im zweiten Abschnitt wird die Implementierung von KI diskutiert. Besonderer Fokus liegt dabei auf dem Aufbau und Training von KI-Systemen und deren Integration in bestehende Geschäftsprozesse. Verschiedene Ansätze der KI, wie Machine Learning und Deep Learning, werden erläutert und ihre Anwendungsmöglichkeiten aufgezeigt. Der dritte Abschnitt widmet sich der praktischen Anwendung von KI in verschiedenen Branchen und Geschäftsmodellen. So werden etwa Beispiele aus der Produktion, dem Handel und der Dienstleistungsbranche vorgestellt, um den Einsatz von KI zur Automatisierung von Prozessen, Optimierung von Entscheidungen und Verbesserung von Prognosen zu demonstrieren.Insgesamt bietet das Buch eine umfassende Perspektive auf das Thema KI und liefert in 17 Kapiteln wertvolle Anregungen für Unternehmen, um ihre Zukunftsfähigkeit mit KI zu sichern und von den Möglichkeiten zu profitieren. Die Beiträge von führenden Expert:innen aus unterschiedlichen Disziplinen, mit verschiedenen theoretischen Ansätzen, methodischen Zugängen und empirischen Befunden beleuchten und diskutieren das Thema sehr anschaulich.Winning with Data Science: A Handbook for Business Leaders
Par Howard Steven Friedman, Akshay Swaminathan. 2024
Whether you are a newly minted MBA or a project manager at a Fortune 500 company, data science will play…
a major role in your career. Knowing how to communicate effectively with data scientists in order to obtain maximum value from their expertise is essential. This book is a compelling and comprehensive guide to data science, emphasizing its real-world business applications and focusing on how to collaborate productively with data science teams.Taking an engaging narrative approach, Winning with Data Science covers the fundamental concepts without getting bogged down in complex equations or programming languages. It provides clear explanations of key terms, tools, and techniques, illustrated through practical examples. The book follows the stories of Kamala and Steve, two professionals who need to collaborate with data science teams to achieve their business goals. Howard Steven Friedman and Akshay Swaminathan walk readers through each step of managing a data science project, from understanding the different roles on a data science team to identifying the right software. They equip readers with critical questions to ask data analysts, statisticians, data scientists, and other technical experts to avoid wasting time and money. Winning with Data Science is a must-read for anyone who works with data science teams or is interested in the practical side of the subject.Global Digital Data Governance: Polycentric Perspectives (Routledge Global Cooperation Series)
Par Carolina Aguerre, Malcolm Campbell-Verduyn, Jan Aart Scholte. 2024
This book provides a nuanced exploration of contemporary digital data governance, highlighting the importance of cooperation across sectors and disciplines…
in order to adapt to a rapidly evolving technological landscape. Most of the theory around global digital data governance remains scattered and focused on specific actors, norms, processes, or disciplinary approaches. This book argues for a polycentric approach, allowing readers to consider the issue across multiple disciplines and scales. Polycentrism, this book argues, provides a set of lenses that tie together the variety of actors, issues, and processes intertwined in digital data governance at subnational, national, regional, and global levels. Firstly, this approach uncovers the complex array of power centers and connections in digital data governance. Secondly, polycentric perspectives bridge disciplinary divides, challenging assumptions and drawing together a growing range of insights about the complexities of digital data governance. Bringing together a wide range of case studies, this book draws out key insights and policy recommendations for how digital data governance occurs and how it might occur differently. Written by an international and interdisciplinary team, this book will be of interest to students and scholars in the field of development studies, political science, international relations, global studies, science and technology studies, sociology, and media and communication studies.