Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Uncover the fascinating history of virtual communities and how we connect to each other online. The Rise of Virtual Communities, explores the earliest online community platforms, mapping the technological evolutions, and the individuals, that have shaped the culture of the internet.Read in-depth interviews with the visionary founders of iconic online platforms, and uncover the history of virtual communities and how the industry has developed over time. Featuring never-before told stories, this exploration introduces new ideas and predictions for the future, explaining how we got here and challenging what we think we may know about building online communities.Readers will: Learn what a virtual community is and how it has become an integral part of modern society Review key insights into building virtual communities and platforms from the founders and pioneers who created them See what thecurrent developments and the potential challenges are related to the future of virtual communitiesWho is this for:Community managers, company founders and those who want to know more about the origins and future of virtual communities.interviews Include:Randy Farmer & Chip Morningstar ¿ Lucasfilm Games ¿Habitat¿ and creators of the modern AvatarHoward Rheingold - Community expert and member of the WELLStacy Horn - Founder of Echo NYCJim Bumgardner - Founder of The PalacePhilip Rosedale - Founder of Second LifeSampo Karjalainen - Co-founder of Habbo HotelLance Priebe - Co-Founder of Club Penguin Angelo Sotira - Co-Founder of Deviant Art Caterina Fake - Co-Founder of FlickrAlexis Ohanian- Founder of Reddit Kevin Rose ¿ Co-Founder of Digg & PROOF CollectiveJason Citron - Founder of Discord Trevor McFedries - Founder of FWB & Brud Cherie Hu - Founder of Water & MusicMichelle Kennedy - Founder of Peanut
"The question all beginners in genealogy research ask themselves is, 'Where do I begin?' 'Should I join a commercial subscription service like Ancestry.com?' ' What if I don't find what I'm looking for on the Internet?' 'How do I organize the information I'm gathering along the way?' Fortunately, this guide answers all those questions and engages neophytes with a book that takes an entirely fresh approach to the subject. Author Drew Smith has organized the chapters according to the actual process used in genealogical research: Start with yourself, then move on to living family and relatives, and then move backwards in time, generation by generation. Each chapter describes a time period and the kinds of records available for that era, allowing beginners to learn about new types of records just as they need them"--Provided by publisher.
Oggi l'SDSS si è sviluppato in molte aree, in particolare per i servizi medici di emergenza che sono una componente molto importante per i servizi di emergenza autostradali, in particolare nei paesi in via di sviluppo. Al fine di garantire un trasporto sicuro e rapido verso gli ospedali in tutti i casi critici. Inoltre, i GIS sono utilizzati nella gestione delle risorse di trasporto (Transportation Asset Management, TAM), che comprende la pianificazione dei trasporti e la gestione dei servizi di emergenza e aiuta a determinare la misura, l'area, il percorso più breve ottimizzato e l'analisi spaziale. L'obiettivo di questo libro è costruire un modello di Spatial Decision Support System (SDSS) per migliorare i servizi di emergenza sulle autostrade. Non si tratta solo di individuare il percorso più breve, ma di trovare automaticamente la posizione dell'incidente senza l'intervento del fattore umano. L'utilizzo del sistema SDSS consente di raggiungere rapidamente i feriti dal luogo dell'incidente all'ospedale generale più vicino, includendo tutte le diramazioni. Progettare e sviluppare un caso di studio applicando il modello alla capitale dell'Egitto, nella zona del Cairo, in particolare alla Ring Road.
This book constitutes the refereed proceedings of the 11th International Conference on Computational Data and Social Networks, CSoNet 2022, held as a Virtual Event, during December 5¿7, 2022. The 17 full papers and 7 short papers included in this book were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: Machine Learning and Prediction, Security and Blockchain, Fact-checking, Fake News, and Hate Speech, Network Analysis, Optimization.
As the title suggests, "Learn To Code: The Beginner's Guide to Computer Programming" will help you learn how to code and possibly try to make a career out of it. Programming can be difficult to learn, but once you get a good grasp of it, you will never stop. If you are wondering why many programmers stay at night and even work countless hours, it is because programming can be really exciting. You can learn how to see programming that way through this book. This will help you to: ¿ Understand why programming is a highly-valued skill in today's world ¿ Know the fundamental theories behind programming ¿ Learn Python - the easiest programming language yet ¿ Identify the skills and the tools you need to help you learn how to code ¿ And most importantly how to find a job as a programmer with no experience and with no Computer Science degree
Metaverse, Non-Fungible Tokens (NFTs), Cryptocurrencies, Blockchain, Artificial Intelligence (AI), Service Robots etc. are a rapidly expanding field with an ever-increasing number of terms and community-specific jargon. A new term is not always accompanied by something truly novel. In addition to verbal "pseudo-innuendos" and "crypto-slang" introduced with the intent of attracting attention quickly, there are several significant new developments. The issue with this development is that the risk of "Babylonian language confusion" is growing exponentially.Our observations indicate that this risk is particularly prevalent in the dialogue between science and practice. This book hopes to contribute to the clarification with quick access to all key terms. Obviously, many online marketplaces, platforms, encyclopedias, and glossaries already exist. However, our pre-book analysis has revealed that neither is even close to completion, sometimes with imprecise language and often with contradictory definitions and explanations.This glossary provides quick access for managers, students, and professors alike who are faced with the topics in their daily work. Students may keep track of the web 3.0's numerous terms as they study it. Instructors, teachers, and professors may use it as a guide for a consistent use of Metaverse, NFT, Cryptocurrency, and Blockchain terminology. Although, the more than 1,300 explanations of the individual terms are scientifically based, the focus is on easy understanding of the terms. The authors have made an effort to provide clear and concise definitions, an application-focused perspective, and simple language.
Personnel management acts as the kernel of HRM. It can be stated that HRM is built from the managing employees. The core concept of the management of staff is to get work done from an employee for the salary given. Employees were not granted that much importance in the decision-making system during the Personnel Management period and were not permitted to communicate with higher management. Personnel management restricted to factories and the personal manager's primary concern was to see if everything met with labor laws or not, not much importance was put on employee morale. Employees were only viewed as resources, the organization's responsibility, in addition to being seen as expense & expenditure to the business rather than capital and future asset. The most widely used staff officers are punitive rather than versatile and cooperative with staff. Employee nurturing was not a concern for staff managers and the opinion of workers was overlooked, meaning employee managers rather than recognizing the situation they used to be punitive if the employee made any mistake. (Tutar et al. 2020).Viewpoint of HRM is that, workers are company's most important resources and they regard their employees as value of assets for their organization. In comparison to personal management, empowering workers is a fundamental aspect of HRM. The core notion of managing human resources is seeing what should be provided to an employee to extract the desired job. Employee engagement in decision-making is often welcomed by HR managers and their opinions are most respected. Employee versatility in job and health is an important aspect for HR executives and they show more importance about employee problems. New regulations and enhancement approaches are well supported and easy to enforce by the Hr Manager. The key difference between staff management and human human resources management was the incorporation and strengthening of information technology into HR process and functions for better productivity and time savings. Artificial intelligence and Robots take over many HR roles, ranging from recruiting of staff, research, interviewing and many more.
Defining Intelligence is the basic and foremost requirement of this research. The base of artificial intelligence and multiple intelligence is intelligence which is a broader and wide concept. Intelligence can be said as "The ability to think in abstract or intellectual terms." It is this intellectual concept which separate humans from animals but can be limited. Talking about mammals such as Squirrels, Coyote, otters, and Panda have the tremendous survival ability in the environment where they stay. Precisely stating intelligence is not the word that can describe them but it is the human ability or the notional thinking ability such as usage of different kind of speech sounds, to plot calculus, conversion of music into rhythmic notes, connecting various available colors with emotions, logic implementation, thinking contemplation, moralize, pondering eternity and various other things.
Softwarecost estimation is the forecasting of development effort and development time mandatory needed to develop a software project. It is considered to be the very primary step of software development process and at the same time considered to be the key task as accurate assessments of growth of the current project, its delivery exactness and its cost control can only be achieved once calculated estimation is accurate. And at broader perspective an accurate estimation of a currently developing software project will result in landing the organization in a better schedule of its futuristic software projects too. With due above reason, software effort estimation has received a considerable amount of attention of many researchers from past so many decades. In other words, Software cost estimation is the summation of predictions of both building effort and calendar time used to develop a software project. The building effort includes the summation of working hours and the total of workers included in the process of soft project development. Just from the inception of software project development, organizations of this nature came across to the problem of poor estimations of development effort and development time of software projects.
Over the past two decades, the Internet has transcended human civilization to the information age. Cyberspace has now become a part of our ecosystem, an essential and indispensable element of our life. However, with the rise of Internet users, it has also become a playground of reprobaters who are constantly threatening the computer systems with ever evolving threats. These threats target various computing platforms like PCs, laptops, tablets, mobiles, IoT devices, etc. Security agencies globally are striving hard to combat these threats but fail to keep pace with their rising complexity and variety. Artificial Intelligence (AI), which heralded the growth of smart cognitive systems in the last decade, gives hope to cybersecurity agencies to contain cyber threats. This thesis is a step in this direction. The work done in this thesis is at the intersection of AI and Cybersecurity. The following two sections, 1.1 and 1.2, describe the broad areas covered in the thesis, Cybersecurity, and AI, respectively. Subsequent sections describe the research gaps (1.3), the main contribution of the thesis (1.5), and the thesis organization (1.6).
You've likely heard about influencer marketing, but may not really know what it's all about. This special report will show you exactly how to start making money as an influencer while increasing brand awareness and boosting engagement, all at the same time!Influencer marketing is all about the outreach and foothold you have in your chosen niche. The more you're able to connect with a specific audience, the easier it will be to land influencer marketing opportunities. You will learn reading this guide:Kinds of influencersStrategies to become an influencerPros and cons of being an influencerBuilding a following is an ongoing headache.Top ways how influencers produce profitMistakes influencers need to stop makingInstructions to start influencer marketing relationships The word influencer has today turned into a phenomenon in the social networking world. What used to be considered an easy world that meant an individual who has an influence on other people's thinking or actions has become vital to success.
This book constitutes the refereed proceedings of the 17th International Conference on Green, Pervasive, and Cloud Computing, GPC 2022, held in Chengdu, China, in December 2022.The 19 full papers presented in this book were carefully reviewed and selected from 104 submissions. GPC 2022 shares novel ideas and experiences in the areas of Green, Pervasive, and Cloud Computing.
This book constitutes the post-conference proceedings of the First MICCAI Workshop on Medical Applications with Disentanglements, MAD 2022, held in conjunction with MICCAI 2022, in Singapore, on September22, 2022. The 8 full papers presented in this book together with one short paper were carefully reviewed and cover generative adversarial networks (GAN), variational autoencoders (VAE) and normalizing-flow architectures as well as a wide range of medical applications, like brain age prediction, skull reconstruction and unsupervised pathology disentanglement.
Hvordan er det, hvis alle skærme går i sort? Hvordan finder man vej? Og hvordan kommer man i kontakt med vennerne og med farmor? Skrupskørt og sjovt roadtrip UDEN GPS!Ingen internet, ingen mobiltelefoner, der virker, ingen tv og ingen radioKan du forestille dig en verden uden skærme? Hvad gør man, hvis alle skærme pludselig går i sort? Det finder Stella, hendes forældre og lillebror ud af! Pludselig en morgen virker hverken mobiler, tv, internet, radio. Hvordan ved man så, hvad klokken er? Hvordan finder man vej? Hvordan skal man betale for noget? Hvad skal man overhovedet lave? Og værst af alt: Hvad gør Stella og familien, da de ikke kan ringe eller skype med farmor i den anden ende af landet? Stella og hendes familie begiver sig ud på et vanvittig roadtrip – uden GPS. Måske opdager de nye ting om hinanden og om verden omkring sig …Højtlæsning fra 8+. Selvlæsning fra 10+Lix 25,5 ml 12,6 lo 12,9Tankevækkende og god bog, der tager nogle problematikker op på en stille og rolig måde. Man kan grine og få noget at spekulere over samtidig. Forhåbentlig kommer der flere bøger. Det kunne være spændende at høre, hvordan det går familien i en verden uden telefoner, og måske uden stress og jag? Anbefales varmt!LEKTØRUDTALELSEN
Die Saving and Credit Co-operatives Society hat die neuesten Informationstechnologiedienste, die den Mitgliedern angeboten werden, übernommen, um im Bankensektor relevant zu bleiben. Die Volatilität im Bankensektor hat die Saving and Credit Co-operatives Society dazu veranlasst, eine effizientere und zuverlässigere Plattform für Software as a Service unter dem Namen Cloud Computing zu nutzen. Eine Technologie, die es den Mitarbeitern ermöglicht, mobil zu arbeiten, und den Sacco-Mitgliedern, unabhängig von Zeit und Ort auf Dienstleistungen und Produkte zuzugreifen. Um nur einige wenige Beispiele zu nennen, gehören zu den genutzten Informationstechnologiediensten der Zugang zu Geldautomaten, die Nutzung von Google-Anwendungen wie "Stima Application", die Nutzung von unstrukturierten zusätzlichen Servicedaten und anderen mobilen Anwendungen, um Geld einzuzahlen und andere Dienste zu nutzen. In Kenia leisten die Kreditgenossenschaften weiterhin einen großen Beitrag zum Bruttoinlandsprodukt. Die Stima Saving and Credit Co-operatives Society ist eine der führenden Spar- und Kreditgenossenschaften des Landes, die mit einer Vielzahl von technologischen Produkten und Dienstleistungen ein großes Publikum anspricht.
Ce livre est basé sur la dernière méthodologie de développement de logiciels "Agile Software development". Dans ce livre, l'auteur a donné une revue de la méthodologie Agile et une étude de cas sur l'application de la méthodologie Agile sur les projets des étudiants. Ce travail vous fournira également des connaissances sur l'adaptation d'Agile à l'industrie. La plupart des entreprises informatiques utilisent maintenant le développement logiciel Agile pour leurs projets, il sera donc très bon pour les étudiants d'en savoir plus sur Agile et de devenir Agile.
A Saving and Credit Co-operatives Society avançou na adopção dos mais recentes serviços de Tecnologias de Informação que são oferecidos aos membros como forma de permanecerem relevantes na indústria bancária. A volatilidade na indústria bancária enviou a Saving and Credit Co-operatives Society para uma plataforma mais eficiente e fiável de Software como Serviço em nome da computação em nuvem. Uma tecnologia que tem visto o pessoal a utilizar o trabalho móvel e os membros da Sacco a aceder a serviços e produtos, independentemente do tempo e do local. Só para mencionar apenas alguns, alguns dos serviços de Tecnologias de Informação utilizados incluem o acesso à Máquina de Venda Automática, a utilização de Aplicações Google como a 'Stima Application', a utilização de Dados de Serviços Suplementares Não Estruturados e outras aplicações móveis para depositar dinheiro e desfrutar de outros serviços. No Quénia, as cooperativas de crédito continuam a contribuir fortemente para o Produto Interno Bruto. A Stima Saving and Credit Co-operatives Society está entre as Sociedades de Poupança e Cooperativas de Crédito líderes no país, controlando uma grande audiência com uma variedade de produtos e serviços tecnológicos.
Ida tager ansvar er en mørk og morsom fortælling om internetstalking, ensomhed og om at flygte fra sine katastrofetanker. Men først og fremmest om at finde sin plads i det allerstørste gruppearbejde, der findes: livet. Ida flytter til Oslo for at studere psykologi. Hendes største frygt er terror, og den mindskes ikke, da hun møder Aksel – en enspænder med en mistænkelig interesse for våben. Ida bliver både fascineret og frastødt, for hvad er Aksel egentlig for en fyr, og hvad er han i stand til at gøre?Lidt efter lidt indser Ida, at hun må gå drastisk til værks for at holde sin egen frygt i ave. Men hvad er i grunden vigtigst? At redde Aksel, verden eller sig selv?Kjersti Halvorsen (født 1993) er tidligere studerende ved Forfatterstudiet i Bø og uddannet psykolog ved universitetet i Oslo. Ida tager ansvar er hendes debutroman, og den har høstet fremragende anmeldelser i Norge.
www.CatherineBosley.comRemember the saying, "image is everything"? Forget that. Instead, today it's "online image is everything" or "social media image is everything." That Google search can make or break you-whether it's you as an individual, a corporation, an association, or a small business. That, combined with the fact that there's incredible pressure and temptation to share everything we do, see, hear, think and feel with the world (we're talking EVERYTHING, ugh!), leaves us with a reality that calls for a new level of navigational skills. Not just to succeed but, more importantly, to simply stay out of harm's way. The kind of harm that didn't even exist not long ago. The kind of harm that, with one keystroke, can cause chaos, destruction, and pain on so many levels. Our day of digital everything lets us connect like never before, and our human instinct is to take advantage of that-connect, connect, connect. That also makes us vulnerable to being exposed like never before in ways we never imagined and are still discovering. All it takes is one Tweet, share, or forward gone wrong, an impulsive social media post or picture, a misinterpreted email or text-one poor choice, online or off, to set scandal into motion. No one, no company, no organization is immune. Bottom line, there's very little room for a "what was I thinking?" moment, online or off, before it could become attached to you forever and for all to see, one mouse click away. The digital world can turn a real-life world upside down in a virtual split second. It happens every day.Award-winning news anchor Catherine Bosley knows all about it. Her own story of online scandal got her invited to appear on shows like Good Morning America, Oprah, and Inside Edition. It's the motivation for the cautionary yet inspirational, Forever and For All to See: How to Avoid a Social Media Scandal and How to Survive One. While she's a perfect example of how such a nightmare can happen to anyone or any entity, she's all about the good news here. It is survivable. She's living proof. Also, she'll tell you there are strategic ways to avoid the kind of technology-induced tumult too many are finding themselves dealing with every day. The insight she shares includes actionable steps on how to better protect yourself, your loved ones, and even your business or organization from today's new brand of scandal-humiliation social media style. You'll learn the top five areas where you need to be especially mindful in your everyday life, again, online and off. More importantly, she provides guidance on how to rise above if it happens to you. That includes, on the technical side, advice from the experts regarding online reputation management and, on the legal side, insight from contributor Ian Corzine (aka, Your Social Media Lawyer). She also addresses the emotional side by sharing her P.A.C.T. strategy and advice from mental health experts who recognize the pain and brainwashing effect of online cruelty-no matter where you are in life. In addition to Catherine's story, these pages are chock-full of true stories of the digital world turning people's real-life worlds upside down. You'll be left with an eye-opening perspective of social media scandal. Most importantly, you'll be armed with the kind of insight you'll want to share with everyone you know, from your loved ones to your colleagues and staff.
The word "hacker" has matured through time within the Internet universe. The word actually predates the Internet.However, even though maturity implies change, it is not always an improvement.Three decades ago, it meant "curious", "tinkerer", and nowadays it mostly means "criminal", which is clearly not better.Written for techies and non-techies alike, this book is a journey through the origin of the word "hacker", and the way in which its meaning has changed since and throughout last century, with first-person examples, thoughts, and a focus on what can, and will (or not) happen next.
OSINT (Open Source Intelligence) ist ein Feld, das immer mehr an Bedeutung gewinnt. Immer mehr Informationen werden online zur Verfügung gestellt. Hierbei ist vielen Personen, Firmen oder Organisationen gar nicht klar, wie viel mehr sie verraten, als sie eigentlich wollten.Getreu dem Motto: "Wissen ist Macht" lernen Sie, die digitalen Fußabdrücke zu verfolgen und digitale Spuren zu finden. Sie werden erstaunt sein, welche Informationen Sie daraus extrahieren können!Lernen Sie die verschiedensten Tools und Techniken kennen, um mit OSINT Informationen zu gewinnen. Abgesehen davon zeige ich Ihnen einige Ansätze weitaus mehr als nur die offensichtlichen Informationen aus Ihren Funden zu extrahieren.Begleiten Sie mich auf dieser spannenden Reise auf der digitalen Datenautobahn!
Savais-tu que le numérique contribue déjà à 4% des émissions mondiales de gaz à effet de serre, soit plus que l'aviation ? Puis, as-tu déjà eu la sensation de sentir vibrer ton smartphone alors qu'en réalité tu n'avais reçu aucune notification ? C'est le syndrome FOMO et c'est un signe de dépendance au numérique. Nous vivons et travaillons dans un monde numérisé. Le numérique facilite certes notre quotidien et parfois notre mobilité, mais utilisé incorrectement, il nuit à notre santé et à l'environnement. Quelle est donc la face cachée du numérique ?Avec "Un autre univers numérique est possible", Ivan Mariblanca Flinch, fondateur de la société Canopé, présente les dessous du numérique. Simple à lire, ce livre présente l'empreinte environnementale du numérique et s'intéresse à l'économie de l'attention, à l'impact énergétique des vidéos en ligne et à la place des GAFAM dans cette pollution croissante.Enfin, tu découvriras 42 bonnes pratiques pour réduire rapidement ton empreinte numérique ainsi que 10 conseils pour maîtriser le temps passé devant les écrans.Si tu souhaites découvrir et comprendre facilement l'impact environnemental du numérique, "Un autre univers numérique est possible" est ton livre.
Master the capabilities of PostgreSQL 15 to efficiently administer and maintain your database.Purchase of the print or Kindle book includes a free PDF eBook.Key Features:Using real world examples, get to grips with expert PostgreSQL 15 conceptsExplore performance improvement, database replication, data replication, database administration, and moreExtend PostgreSQL's functionalities to suit your organization's needs with minimal effortBook Description:Starting with an introduction to the newly released features of PostgreSQL 15, this updated fifth edition will help you get to grips with PostgreSQL administration and how to build dynamic database solutions for enterprise apps, including designing both physical and technical aspects of the system.You'll explore advanced PostgreSQL features, such as logical replication, database clusters, advanced indexing, and user management to manage and maintain your database. You'll then work with the PostgreSQL optimizer, configure PostgreSQL for high speed, and move from Oracle to PostgreSQL. Among the other skills that the book will help you build, you'll cover transactions, handling recursions, working with JSON and JSONB data, and setting up a Patroni cluster. It will show you how to improve performance with query optimization. You'll also focus on managing network security and work with backups and replication while exploring useful PostgreSQL extensions that optimize the performance of large databases.By the end of this PostgreSQL book, you'll be able to use your database to its utmost capacity by implementing advanced administrative tasks with ease.What You Will Learn:Make use of the indexing features in PostgreSQL and fine-tune the performance of your queriesWork with stored procedures and manage backup and recoveryGet the hang of replication and failover techniquesImprove the security of your database server and handle encryption effectivelyTroubleshoot your PostgreSQL instance for solutions to common and not-so-common problemsPerform database migration from Oracle to PostgreSQL with easeWho this book is for:This database administration book is for PostgreSQL developers, database administrators, and professionals who want to implement advanced functionalities and master complex administrative tasks with PostgreSQL 15. Prior experience in PostgreSQL and familiarity with the basics of database administration will assist with understanding key concepts covered in the book.
Develop a rendering framework in this part-color guide by implementing next-generation 3D graphics, leveraging advanced Vulkan features, and getting familiar with efficient real-time ray tracing techniques uncovered by leading industry veterans, Marco Castorina and Gabriel SassoneKey Features:- Use a pre-built "Raptor" engine to abstract tedious aspects like file systems, memory allocation, and utility functions- Delve into advanced graphics programming by taking advantage of Vulkan's cutting-edge features, including mesh shaders and ray tracing- Optimize your engine without reinventing the wheel- Purchase of the print or Kindle book includes a free PDF eBookBook Description:Vulkan is now an established and flexible multi-platform graphics API. It has been adopted in many industries, including game development, medical imaging, movie productions, and media playback but learning it can be a daunting challenge due to its low-level, complex nature. Mastering Graphics Programming with Vulkan is designed to help you overcome this difficulty, providing a practical approach to learning one of the most advanced graphics APIs.In Mastering Graphics Programming with Vulkan, you'll focus on building a high-performance rendering engine from the ground up. You'll explore Vulkan's advanced features, such as pipeline layouts, resource barriers, and GPU-driven rendering, to automate tedious tasks and create efficient workflows. Additionally, you'll delve into cutting-edge techniques like mesh shaders and real-time ray tracing, elevating your graphics programming to the next level.By the end of this book, you'll have a thorough understanding of modern rendering engines to confidently handle large-scale projects. Whether you're developing games, simulations, or visual effects, this guide will equip you with the skills and knowledge to harness Vulkan's full potential.What You Will Learn:- Understand resources management and modern bindless techniques- Get comfortable with how a frame graph works and know its advantages- Explore how to render efficiently with many light sources- Discover how to integrate variable rate shading- Understand the benefits and limitations of temporal anti-aliasing- Get to grips with how GPU-driven rendering works- Explore and leverage ray tracing to improve render qualityWho this book is for:This book is for professional graphics and game developers who want to gain in-depth knowledge about how to write a modern and performant rendering engine in Vulkan. Familiarity with basic concepts of graphics programming (i.e. matrices, vectors, etc.) and fundamental knowledge of Vulkan are required.Table of Contents- Introducing the Raptor Engine and Hydra- Improving Resources Management- Unlocking Multi-Threading- Implementing a Frame Graph- Unlocking Async Compute- GPU-Driven Rendering- Rendering Many Lights with Clustered Deferred Rendering- Adding Shadows Using Mesh Shaders- Implementing Variable Rate Shading- Adding Volumetric Fog- Temporal Anti-Aliasing- Getting Started with Ray Tracing- Revisiting Shadows with Ray Tracing- Adding Dynamic Diffuse Global Illumination with Ray Tracing- Adding Reflections with Ray Tracing
O objectivo deste estudo era inspeccionar o uso dos sítios de comunicação social pelos estudantes e as suas percepções sobre os efeitos do uso, no caso de instituições superiores seleccionadas da cidade de Mekelle. O estudo começou com as questões de investigação relativas a como, e porquê os estudantes utilizam os sítios de redes sociais, o efeito dos sítios de redes sociais, como os sítios de redes sociais podem ser utilizados como instrumento de aprendizagem académica. A fim de responder às perguntas de investigação especificadas, o investigador seleccionou propositadamente os estudantes que utilizam sítios de redes sociais e deu-lhes perguntas subjectivas e baseadas em opiniões para responder. A fim de realizar os objectivos declarados ou perguntas da investigação, foram recolhidos dados qualitativos e quantitativos de amostras de sítios de meios de comunicação social utilizadores da Universidade de Mekelle, Colégio Universitário de Sheba, Colégio de Tecnologias de Informação Microlink e Colégio Universitário do Novo Milénio. A recolha de dados foi conduzida utilizando questionário, entrevista e observação e depois os dados foram analisados através de estatísticas descritivas, tais como, percentagem, tabulação cruzada, frequência, e teste de associação chi quadrado. Consequentemente, é proposto um quadro para o envolvimento dos estudantes em SMSs.
Use the Rust programming language to build fully functional web applications with async Rust to amplify security and boost the performance of your programsKey Features:Work with cutting-edge web techniques such as distroless Rust servers, Terraform, and AWS deploymentGet acquainted with async concepts such as actors and queuing tasks using lower-level frameworks like TokioBuild a full web application in Rust with a database, authentication, and frontendBook Description:Are safety and high performance a big concern for you while developing web applications?With this practical Rust book, you'll discover how you can implement Rust on the web to achieve the desired performance and security as you learn techniques and tooling to build fully operational web apps.In this second edition, you'll get hands-on with implementing emerging Rust web frameworks, including Actix, Rocket, and Hyper. It also features HTTPS configuration on AWS when deploying a web application and introduces you to Terraform for automating the building of web infrastructure on AWS. What's more, this edition also covers advanced async topics. Built on the Tokio async runtime, this explores TCP and framing, implementing async systems with the actor framework, and queuing tasks on Redis to be consumed by a number of worker nodes. Finally, you'll go over best practices for packaging Rust servers in distroless Rust Docker images with database drivers, so your servers are a total size of 50Mb each.By the end of this book, you'll have confidence in your skills to build robust, functional, and scalable web applications from scratch.What You Will Learn:Structure and build scalable Rust web apps by creating a basic to-do list web appManage authentication and databases in Rust web applicationsGet to grips with wrapping web applications in distrolessUnderstand the building blocks of web development such as HTTPS, TCP, and middlewareBuild app infrastructure on AWS using Terraform with databases, servers, load balancers, HTTPS, and URL routingBuild end-to-end tests using PostmanBuild async systems implementing the actor model using TokioWho this book is for:This Rust programming book is for web developers who want to learn and implement Rust to build web applications. Developers familiar with languages such as Python, Ruby, and JS will be able to use this book to build high performant web apps with Rust.Although no prior experience in Rust is necessary, a solid understanding of web development principles, along with basic knowledge of HTML, CSS, and JavaScript, is necessary to get the most out of this book.
Desejando melhorar o sucesso da adopção de sistemas ERP em todo o mundo, tem havido muitos estudos de investigação que examinam os factores críticos para o processo. Contudo, não tem havido nenhum estudo académico a investigar os factores críticos para a adopção de ERP no Vietname, apesar do seu mercado em desenvolvimento. Este livro examina os factores críticos de sucesso da adopção de um sistema ERP no Vietname através de um projecto ERP bem sucedido de uma empresa vietnamita. Além disso, o livro introduz os novos conceitos do processo de adopção do ERP em que a implementação do ERP é uma das suas fases. A combinação de métodos qualitativos e quantitativos foi utilizada para conduzir a investigação. Especificamente, foram recolhidas e analisadas entrevistas com diferentes intervenientes no projecto do caso, documentação do projecto e inquérito em pequena escala. Os resultados indicaram que nove factores foram considerados críticos para o sucesso do processo de adopção do ERP no Vietname. Portanto, este livro é uma boa referência para gestores, consultores novatos e outros investigadores interessados na adopção de ERP no Vietname.
Chc¿c poprawi¿ sukces przyj¿cia systemów ERP na cäym ¿wiecie, by¿o wiele badä badaj¿cych, jakie czynniki s¿ krytyczne dla tego procesu. Jednak¿e, nie by¿o badania akademickiego badaj¿cego czynniki krytyczne dla przyj¿cia ERP w Wietnamie, mimo jego rozwijaj¿cego si¿ rynku. Ta ksi¿¿ka analizuje krytyczne czynniki sukcesu przyj¿cia systemu ERP w Wietnamie poprzez udany projekt ERP jednej wietnamskiej firmy. Ponadto, ksi¿¿ka wprowadza nowe koncepcje procesu przyj¿cia ERP, gdzie wdro¿enie ERP jest jednym z jego etapów. Po¿¿czenie jako¿ciowych i ilo¿ciowych metod zostäo wykorzystane do przeprowadzenia badä. W szczególno¿ci zebrano i przeanalizowano wywiady z ró¿nymi zainteresowanymi stronami w ramach projektu, dokumentacj¿ projektu oraz badanie na mä¿ skal¿. Wyniki wykazäy, ¿e dziewi¿¿ czynników zostäo uznanych za krytyczne dla sukcesu procesu przyj¿cia ERP w Wietnamie. Dlatego ta ksi¿¿ka jest dobrym punktem odniesienia dla mened¿erów, pocz¿tkuj¿cych konsultantów i innych badaczy, którzy s¿ zainteresowani przyj¿ciem ERP w Wietnamie.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.