Résultats de recherche de titre
Articles 1 à 20 sur 2617
Soft Inheritance
Par Fawn Parker. 2023
In her exceptional poetic debut, Fawn Parker meditates on grief, illness, and the open-handed relationship between material objects and memory.…
Written after her mother was diagnosed with cancer, Soft Inheritance follows the poet's rapidly evolving reality where "kindness is a scar," though "not all scar-makers are kind. ,"" Both a treatise on the sick body and the state of ""after"-post-caretaking, post-breakup, post-moving, and post-death-these poems question what is inherited, and ask what can safely be left behind. A diamond ring? A cancerous gene? Soft Inheritance is a finely crafted love letter to the people and places that imprint on a life.Shadow Blight
Par Annick MacAskill. 2022
Shadow Blight considers the pain and isolation of pregnancy loss through the lens of classical myth. Drawing on the stories…
of Niobe-whose monumental suffering at the loss of her children literally turned her to stone-and others, this collection explores the experience of being swept away by grief and silenced by the world. Skirting the tropes (“o how beautiful / the poets make our catastrophes”), MacAskill interweaves the ancient with the contemporary in a way that opens possibilities and offers a new language for those “shut up in stillness.”My Grief, the Sun
Par Sanna Wani. 2022
Xanax Cowboy: Poems
Par Hannah Green. 2023
Bottom Rail on Top
Par D. M. Bradford. 2023
A rolling call and response between antebellum Black history and the present that mediates it. Somewhere in the cut between…
Harriet Jacobs and surveillance, Southampton and sneaker game, Lake Providence and the supply chain, Bottom Rail on Top sets off a mediation between the complications of legacy and selfhood. In a kind of archives-powered unmooring of the linear progress story, award-winning poet D.M. Bradford fragments and recomposes American histories of antebellum Black life and emancipation, and stages the action in tandem with the matter of his own life. Amidst echoes and complicities, roots and flights, lineage and mastery, it's a story of stories told in knots and asides, held together with paper trails, curiosities, and hooks — a study that doesn't end.John Turner: An Intimate Biography of Canada's 17th Prime Minister
Par Steve Paikin. 2022
In this masterful and engaging biography, acclaimed journalist Steve Paikin brings to life John Turner (1929-2020), one of the most…
glamorous and successful politicians in Canadian history. Born in England, raised in BC, Turner was a champion sprinter and a Rhodes scholar who captured the national imagination as escort for Princess Margaret on her 1959 Canadian tour. Elected to Parliament in 1962, he served in Prime Minister Lester Pearson's cabinet and as Pierre Trudeau's attorney general, minister of justice, and finance minister. In 1984, he won a hotly-contested Liberal leadership contest and served a brief four months as Canada's seventeenth prime minister before falling to Brian Mulroney in a Progressive Conservative landslide. In this surprisingly candid and personal book, Paikin draws on unprecedented access to Turner's personal and public papers to show how he struggled to meet the towering expectations that came with his abundant gifts, and keep his faith in Canadian democracy despite the challenges of his own careerBuilding a cyber risk management program: Evolving security for the digital age
Par Brian Allen. 2024
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for…
designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for. You'll learn how to define and establish a sustainable, defendable, cyber risk management program, and the benefits associated with proper implementation. Cyber risk management experts Brian Allen and Brandon Bapst, working with writer Terry Allan Hicks, also provide advice that goes beyond risk management. You'll discover ways to address your company's oversight obligations as defined by international standards, case law, regulation, and board-level guidance. This book helps you: understand the transformational changes digitalization is introducing, and new cyber risks that come with it; learn the key legal and regulatory drivers that make cyber risk management a mission-critical priority for enterprises; gain a complete understanding of four components that make up a formal cyber risk management program; and implement or provide guidance for a cyber risk management program within your enterpriseHealth for All: A Doctor's Prescription for a Healthier Canada
Par Jane Philpott. 2024
From one of Canada's most respected and high-profile health professionals (and former federal Minister of Health), a timely, practical, ambitious,…
and deeply personal call for action on health that sets out the roadmap to our future well-being.Jane Philpott has spent her life learning what makes people sick and what keeps people well. She has witnessed miracles in modern medicine. She has also watched children die of starvation in a world that has plenty of food. With Health for All, she sounds a clarion call for a radical disruption in a health care system that is broken—but not beyond repair. The vision is rooted in a deep-seated commitment to health equity.Decades ago, a few visionary Canadian leaders put laws in place to ensure health care insurance for all. But the structures to deliver that care were never fully developed as envisioned. As a result, our health systems are not comprehensive or well-coordinated. In the wake of a pandemic, we risk it all falling apart. More than six million people have no family doctor, nor any other access to primary care. Emergency rooms are routinely closed. Exhausted health workers wonder if it will ever get better. Some say we should hand health care over to the private sector. But to abandon our commitment to publicly funded health care now would only lead to more expensive and less equitable care. Philpott outlines a different solution—an ambitious, once-in-a-generation reset of health systems with universal access to primary care teams.What sets this book apart is that it’s more than a prescription for better medical care. Philpott looks at the big picture of health for all. This includes an intimate look at the personal roots of well-being: hope, belonging, meaning, and purpose. Then, through real-life stories, she examines the impact of the social determinants of health. Finally, she explains that none of this will happen without the political will to do the hard work of rebuilding a healthy society. The remedy we await is serious leadership to implement what we already know and to put the well-being of Canadians at the top of the agenda.Hacker culture can be esoteric, but this entertaining reference is here to help. Written by a longtime hacker, this fun…
reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From phreaking to deepfakes, and from APT (advanced package tool) to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. This book from Kim Crawley (8 Steps to Better Security) is written in a conversational style and organized from A to Z. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and some perhaps surprising facts about familiar cultural touchstones. This book will help you understand the relationship between hacker culture and cybersecurity; get to know the ideas behind the hacker ethos, like "knowledge should be free"; explore topics and publications central to hacker culture, from 2600 Magazine to Cult of the Dead Cow; appreciate the history of cybersecurity; learn about key figures in the history of hacker culture; and understand the difference between hackers and cybercriminalsCanada alone: Navigating the post-american world
Par Kim Richard Nossal. 2024
Canada must prepare for an isolationist and unpredictable neighbor to the South should a MAGA leader gain the White House…
in 2025. The American-led global order has been increasingly challenged by Chinese assertiveness and Russian revanchism. As we enter this new era of great-power competition, Canadians tend to assume that the United States will continue to provide global leadership for the West. Canada Alone sketches the more dystopian future that is likely to result if the illiberal, anti-democratic, and authoritarian Make America Great Again movement regains power. Under the twin stresses of a reinvigorated America First policy and the purposeful abandonment of American global leadership, the West will likely fracture, leaving Canadians all alone with an increasingly dysfunctional United States. Canada Alone outlines what Canadians will need to navigate this deeply unfamiliar post-American worldSoftware Supply Chain Security
Par Cassie Crossley. 2024
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability…
can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes well beyond the software development process.This practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain. Author Cassie Crossley demonstrates how and why everyone involved in the supply chain needs to participate if your organization is to improve the security posture of its software, firmware, and hardware.With this book, you'll learn how to:Pinpoint the cybersecurity risks in each part of your organization's software supply chainIdentify the roles that participate in the supply chain—including IT, development, operations, manufacturing, and procurementDesign initiatives and controls for each part of the supply chain using existing frameworks and referencesImplement secure development lifecycle, source code security, software build management, and software transparency practicesEvaluate third-party risk in your supply chainFreedom: A Mixtape
Par Marcel Stewart with Suitcase In Point. 2024
Freedom: A Mixtape is a soulful artistic response to recent and historical violence on Black bodies, presented through a collection…
of original songs, stories, poems, anecdotes, spoken-word pieces, and musical instrumentation from folks living in Ontario's Niagara Region. A community conversation about our complicated relationship with emancipation and the human right to be free, Freedom: A Mixtape is a compilation album that is part protest and part celebration. It is history and the present moment all at once, a reminder that this moment is part of a larger, ongoing movement. Familiar pains are felt deeply in moments both bygone and bitingly present, setting the tone—and stage—for action.Analog field recordings and soothing talk-radio energy give voice to the residue of intergenerational trauma, the depths of colonialism, resilience amidst oppressive conditions, and a clarion call that joy is a birthright for everyone. With emotional precision and softness, Freedom: A Mixtape offers a radical reminder that in our bleakest moments, we rise up through love of self and community.The Engineering Executive's Primer
Par Will Larson. 2024
As an engineering manager, you almost always have someone in your company to turn to for advice: a peer on…
another team, your manager, or even the head of engineering. But who do you turn to if you're the head of engineering? Engineering executives have a challenging learning curve, and many folks excitedly start their first executive role only to leave frustrated within the first 18 months.In this book, author Will Larson shows you ways to obtain your first executive job and quickly ramp up to meet the challenges you may not have encountered in non-executive roles: measuring engineering for both engineers and the CEO, company-scoped headcount planning, communicating successfully across a growing organization, and figuring out what people actually mean when they keep asking for a "technology strategy."This book explains how to:Get an engineering executive job, negotiate the contract, and onboard at your new companyRun an engineering planning process and communicate effectively with the organizationDirect the core meetings necessary to operate an effective engineering organizationHire, onboard, and run performance managementManage yourself and remain effective through many challengesLeave the job when the time is rightWill Larson was the chief technology officer at Calm and the author of An Elegant Puzzle and Staff Engineer. He's also a prolific writer on his blog, Irrational Exuberance.Advances in Aerial Sensing and Imaging
Par Sandeep Kumar, Nageswara Rao Moparthi, Abhishek Bhola, Ravinder Kaur, A. Senthil, K.M.V.V. Prasad. 2024
Advances in Aerial Sensing and Imaging This groundbreaking book is a comprehensive guide to the technology found in the complex…
field of aerial sensing and imaging, and the real-world challenges that stem from its growing significance and demand. The advent of unmanned aerial vehicles (UAVs), or drones, along with advancements in sensor technology and image processing techniques, has further enhanced the capabilities and applications of aerial sensing and imaging. These developments have opened up new research, innovation, and exploration avenues. Aerial sensing and imaging have rapidly evolved over the past few decades and have revolutionized several fields, including land cover and usage prediction, crop and livestock management, road accident monitoring, poverty estimation, defense, agriculture, forest fire detection, UAV security issues, and open parking management. This book provides a comprehensive understanding and knowledge of the underlying technology and its practical applications in different domains. Audience Computer science and artificial intelligence researchers working in the fields of aerial sensing and imaging, as well as professionals working in industries such as agriculture, geology, surveying, urban planning, disaster response, etc; this book provides them with practical guidance and instruction on how to apply aerial sensing and imaging for various purposes and stay up-to-date with the latest developments in the domain.Optimized Predictive Models in Health Care Using Machine Learning
Par Sandeep Kumar, Anuj Sharma, Navneet Kaur, Lokesh Pawar, Rohit Bajaj. 2024
OPTIMIZED PREDICTIVE MODELS IN HEALTH CARE USING MACHINE LEARNING This book is a comprehensive guide to developing and implementing optimized…
predictive models in healthcare using machine learning and is a required resource for researchers, healthcare professionals, and students who wish to know more about real-time applications. The book focuses on how humans and computers interact to ever-increasing levels of complexity and simplicity and provides content on the theory of optimized predictive model design, evaluation, and user diversity. Predictive modeling, a field of machine learning, has emerged as a powerful tool in healthcare for identifying high-risk patients, predicting disease progression, and optimizing treatment plans. By leveraging data from various sources, predictive models can help healthcare providers make informed decisions, resulting in better patient outcomes and reduced costs. Other essential features of the book include: provides detailed guidance on data collection and preprocessing, emphasizing the importance of collecting accurate and reliable data; explains how to transform raw data into meaningful features that can be used to improve the accuracy of predictive models; gives a detailed overview of machine learning algorithms for predictive modeling in healthcare, discussing the pros and cons of different algorithms and how to choose the best one for a specific application; emphasizes validating and evaluating predictive models; provides a comprehensive overview of validation and evaluation techniques and how to evaluate the performance of predictive models using a range of metrics; discusses the challenges and limitations of predictive modeling in healthcare; highlights the ethical and legal considerations that must be considered when developing predictive models and the potential biases that can arise in those models. Audience The book will be read by a wide range of professionals who are involved in healthcare, data science, and machine learning.Lifelong and Continual Learning Dialogue Systems (Synthesis Lectures on Human Language Technologies)
Par Sahisnu Mazumder, Bing Liu. 2024
This book introduces the new paradigm of lifelong and continual learning dialogue systems to endow dialogue systems with the ability…
to learn continually by themselves through their own self-initiated interactions with their users and the working environments. The authors present the latest developments and techniques for building such continual learning dialogue systems. The book explains how these developments allow systems to continuously learn new language expressions, lexical and factual knowledge, and conversational skills through interactions and dialogues. Additionally, the book covers techniques to acquire new training examples for learning new tasks during the conversation. The book also reviews existing work on lifelong learning and discusses areas for future research.This book gathers the proceedings of the 8th International Conference on Advancements of Medicine and Health Care through Technology, MEDITECH…
2022, held virtually on 20–22 October 2022, from Cluj-Napoca, Romania. It reports on both theoretical and practical developments in biomedical imaging and image processing, health technology, technologies for education, and biomedical signal processing and medical devices, measurements and instrumentation. Both the conference and the realization of this book were supported by the Romanian National Society for Medical Engineering and Biological Technology (SNIMTB).The 2x2 Matrix: Contingency, Confusion and the Metrics of Binary Classification
Par A. J. Larner. 2024
This book describes, extends, and illustrates the metrics of binary classification through worked examples.Worked examples based on pragmatic test accuracy…
study data are used in chapters to illustrate relevance to day-to-day clinical practice. Readers will gain an understanding of sensitivity and specificity and predictive values along with many other parameters.The contents are highly structured, and the use of worked examples facilitates understanding and interpretation.This book is a resource for clinicians in any discipline who are involved in the performance or assessment of test accuracy studies and professionals in the disciplines of machine learning or informatics wishing to gain insight into clinical applications of 2x2 tables.Cambridge International AS Level Information Technology Student's Book Second Edition
Par Graham Brown, Brian Sargent. 2024
Our AS Level student book is endorsed by Cambridge International Education to support the full syllabus for examination from 2025.Develop…
theoretical and practical IT skills with this comprehensive Student's Book written by experienced authors and examiners specially for the updated Cambridge International Education AS Level Information Technology syllabus (9626).- Improve understanding of concepts and terminology with clear explanations, labelled illustrations, photographs, diagrams, plus a glossary of key terms- Develop theoretical and practical skills with a range of exercises (multi choice through to discussion type questions), exam-style questions, step-by-step instructions and example answers that all ensure skills are developed alongside knowledge- Follow a structured route through the course with in-depth coverage of the full syllabusAlso available in the series:Cambridge International AS Level Information Technology Student Book eBook 9781036005597Cambridge International AS Level Information Technology Skills Workbook 9781510483064Blockchain and Machine Learning for IoT Security
Par Mourade Azrour, Jamal Mabrouki, Azidine Guezzaz, and Said Benkirane. 2024
The Internet of Things (IoT) involves physical devices, cars, household appliances, and any other physical appliance equipped with sensors, software,…
and network connections to gather and communicate data. Nowadays, this technology is embedded in everything from simple smart devices, to wearable equipment, to complex industrial machinery and transportation infrastructures. On the other hand, IoT equipment has been designed without considering security issues. Consequently, there are many challenges in terms of protection against IoT threats, which can lead to distressing situations. In fact, unlike other technological solutions, there are few standards and guidelines governing the protection of IoT technology. Moreover, few users are aware of the risks associated with IoT systems. Hence, Blockchain and Machine Learning for IoT Security discusses various recent techniques and solutions related to IoT deployment, especially security and privacy. This book addresses a variety of subjects, including a comprehensive overview of the IoT, and covers in detail the security challenges at each layer by considering how both the architecture and underlying technologies are employed. As acknowledged experts in the field, the authors provide remediation solutions for impaired security, as well as mitigation methods, and offer both prevention and improvement suggestions. Key Features: Offers a unique perspective on IoT security by introducing Machine Learning and Blockchain solutions Presents a well-rounded overview of the most recent advances in IoT security and privacy Discusses practical solutions and real-world cases for IoT solutions in various areas Provides solutions for securing IoT against various threats Discuses Blockchain technology as a solution for IoT This book is designed to provide all the necessary knowledge for young researchers, academics, and industry professionals who want to understand the advantages of artificial intelligence technology, machine learning, data analysis methodology, and Blockchain for securing IoT technologies.