Résultats de recherche de titre
Articles 1 à 20 sur 1690
New Uzbekistan: The Third Renaissance (Europa Perspectives: Emerging Economies)
Par Bakhrom Mirkasimov, Richard Pomfret. 2024
This book reviews and analyses the comprehensive socioeconomic reforms undertaken in Uzbekistan since 2016 by the government led by President…
Shavkat Mirziyoyev. The volume takes the reader through the different sectors of the economy and the effects of reforms on the country’s citizens. The various developments are detailed, examining the gains and the gaps in terms of policy and implementation. Using the broad tools of economics and, in particular, of development economics, the authors present evidence to drive their conclusions and recommendations, and also draw on comparative cases from policy and practice to illustrate alternative approaches and results from measures in other transition countries.Implementing Uzbekistan’s ambitious economic transformation into a market economy is a challenging process that takes time. This book provides the first systematic and comprehensive discussion of the government’s reform areas, including the macroeconomic fundamentals, business and investment climate, the energy, transport, health, education, social protection, financial, banking and agriculture sectors, regional trade, tourism and transport connectivity, reform of state-owned enterprises, as well as public services, citizen engagement and gender equality.Reliable and Intelligent Optimization in Multi-Layered Cloud Computing Architectures
Par Madhusudhan H. S., Satish Kumar T., Punit Gupta, Dinesh Kumar Saini, Kashif Zia. 2024
One of the major developments in the computing field has been cloud computing, which enables users to do complicated computations…
that local devices are unable to handle. The computing power and flexibility that have made the cloud so popular do not come without challenges. It is particularly challenging to decide which resources to use, even when they have the same configuration but different levels of performance because of the variable structure of the available resources. Cloud data centers can host millions of virtual machines, and where to locate these machines in the cloud is a difficult problem. Additionally, fulfilling optimization needs is a complex problem.Reliable and Intelligent Optimization in Multi-Layered Cloud Computing Architectures examines ways to meet these challenges. It discusses virtual machine placement techniques and task scheduling techniques that optimize resource utilization and minimize energy consumption of cloud data centers. Placement techniques presented can provide an optimal solution to the optimization problem using multiple objectives. The book focuses on basic design principles and analysis of virtual machine placement techniques and task allocation techniques. It also looks at virtual machine placement techniques that can improve quality-of-service (QoS) in service-oriented architecture (SOA) computing. The aims of virtual machine placement include minimizing energy usage, network traffic, economical cost, maximizing performance, and maximizing resource utilization. Other highlights of the book include: Improving QoS and resource efficiency Fault-tolerant and reliable resource optimization models A reactive fault tolerance method using checkpointing restart Cost and network-aware metaheuristics. Virtual machine scheduling and placement Electricity consumption in cloud data centers Written by leading experts and researchers, this book provides insights and techniques to those dedicated to improving cloud computing and its services.Game Design Deep Dive: Soulslike
Par Joshua Bycer. 2024
Game Design Critic Joshua Bycer is back with another entry in the Game Design Deep Series to focus on the…
youngest genre yet: soulslikes. Over a decade, From Software defined a new genre that has led to studios chasing after them hit after hit. In this book, Josh will cover the history of the genre and popular soulslike games of the 2010s and discuss what aspects of design make a game a soulslike. The first book looking at the history of the genre A breakdown of both action and RPG design for fans and designers of both A lesson on difficulty in games and why harder doesn’t mean betterThe third volume in a new series exploring the basics of Raspberry Pi Operating System administration, this installment builds on…
the insights from Volumes 1 and 2 to provide a compendium of easy-to-use and essential guidance for Raspberry Pi system administration for novice users, with specific focus on Text Editors, git/ GitHub, and LXC/LXD.The overriding idea behind system administration of a modern, 21st-century Linux system, such as the Raspberry Pi OS, is the use of systemd to ensure that the Linux kernel works efficiently and effectively to provide these three foundation stones of computer operation and management: computer system concurrency, virtualization, and secure persistence. This third volume includes a beginner’s compendium of essential text-based Linux commands, a complete tutorial on the most important Raspberry Pi OS Text Editors, a description of uses of the git command, and a thorough explication of container virtualization with LXC/LXD and Docker.This book is aimed at students and practitioners looking to maximize their use of the Raspberry Pi OS. With plenty of practical examples, projects, and exercises, this volume can also be adopted in a more formal learning environment to supplement and extend the basic knowledge of a Linux operating system.The Zero Trust Framework and Privileged Access Management (PAM)
Par Ravindra Das. 2024
This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business…
is segmented into smaller islands, each having its own lines of defense. This is primarily achieved through the use of Multifactor Authentication (MFA), where at least three more authentication layers are used, preferably being different from one another.Another key aspect of the Zero Trust Framework is known as Privileged Access Management (PAM). This is an area of Cybersecurity where the protection of superuser accounts, rights, and privileges must be protected at all costs from Cyberattackers. In this regard, this is where the Zero Trust Framework and PAM intertwine, especially in a Cloud-based platform, such as Microsoft Azure.However, as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis, not only for individuals but for businesses as well. It is hoped that by combining the Zero Trust Framework with PAM, password use can be eradicated altogether, thus giving rise to a passwordless society.Practical Web Accessibility: A Comprehensive Guide to Digital Inclusion
Par Ashley Firth. 2024
Everyone deserves to use the Internet. An estimated 1.3 billion people experience significant disability. That’s 16percent of the world’s population,…
or one in six of us. At the same time, over 96 percent of the one million most popular websites have an accessibility issue. Add to this the massive rise in legal cases around sites not being accessible, including Beyoncé, Disney, and Netflix, and you have an important topic that more and more people are starting to engage with.In this updated and revamped second edition of the Amazon technology chart-topping Practical Web Accessibility, you’ll be guided through a broad range of disabilities and access needs. You’ll understand the ways these users typically engage with the web, the barriers they often face, and practical advice on how your websites and content can be compliant, but more than that, inclusive and enjoyable to use. There’s also a new chapter on “Outsourcing Accessibility,” exploring third party “bolt-on” tools, “build your own website” platforms like Wix, and popular design systems. You‘ll explore whether they’re helpful or detrimental in the fight to make the web more accessible.Throughout this book you’ll learn to test for, spot, and fix web accessibility issues for a wide range of physical and mental impairments. Featuring content from the latest compliance frameworks, including the newly released WCAG 2.2 and exploratory concepts in WCAG 3, you’ll see how to go beyond the basic requirements in order to help your users. You’ll also learn that an accessible approach won’t just help people with disabilities, it will improve your website for everyone.This book comes complete with practical examples you can use in your own sites, along with a brand-new approach to auditing and improving a website’s accessibility, and a team’s approach to it, based on tools created by the author and refined over years as a consultant — The FAIR framework and ACCESS checklist. With these tools, you can set up processes for yourself and your team that will drastically improve the accessibility of your sites and, importantly, keep them that way in the future. Suitable for those of any profession or experience level, Practical Web Accessibility gives you all the information you need to ensure that your sites are truly accessible for the modern, inclusive web. If you would like to learn about web accessibility in a clear and actionable way, this book is for you.What You Will LearnA greater understanding of a vast range of disabilities that have online access needs, and the issues they typically face accessing content online.Ways to apply the practical steps required to cater for those needs.How to take your sites, and colleagues, on a journey from being inaccessible to accessible.The importance of accessibility in your designs, code, content, and more.The best ways to test andimprove your sites, so you can be compliant, and truly accessible. Who This Book Is For Anyone, regardless of what they do, who wants to learn how to make websites and their content more accessible for those with disabilities. In the world of web, the book has been used by front and backend developers, designers, product and project managers, team and business leaders.Cultural Activism around Gender and Sexualities in Colombia and Mexico: De un Mundo Raro (Global Queer Politics)
Par César Sánchez-Avella. 2024
This book focuses on an underestimated alternative to the mainstream liberal rights-based approach: cultural activism. This political strategy deploys art…
and other creative techniques to support the quest for social justice. This work explores this approach's dynamics, strategies, and potential, presenting a qualitative case study of three cultural activists in Colombia and Mexico -Lia García, Felipe Osornio, and Manuel Parra-, including in-depth interviews and ethnographic observation of their artistic/activist work.Through their intervention in the realm of ordinary affects, these cultural producers create new affective climates for the experience of sexual and gender difference and develop new repertoires of affective response concerning identities usually seen as abject or worthy of social punishment. Strategies of cultural activism aim to subvert dominant representations and performances of marginalized subjectivities, to critique and subvert gender norms, to give visibility to non-hegemonic identities, to resist different forms of oppression and marginalization, and to prompt collective healing of wounds left by violence and discrimination.Data-Centric Business and Applications: Modern Trends in Financial and Innovation Data Processes 2023. Volume 2 (Lecture Notes on Data Engineering and Communications Technologies #194)
Par Andriy Semenov, Iryna Yepifanova, Jana Kajanová. 2024
This book examines aspects of financial and investment processes, as well as the application of information technology mechanisms to business…
and industrial management, using the experience of the Ukrainian economy as an example. An effective tool for supporting business data processing is combining modern information technologies and the latest achievements in economic theory. The variety of industrial sectors studied supports the continuous acquisition and use of efficient business analysis in organizations. In addition, the book elaborates on multidisciplinary concepts, examples, and practices that can be useful for researching the evolution of developments in the field. Also, in this book, there is a description of analysis methods for making decisions in business, finance, and innovation management.Limits of AI - theoretical, practical, ethical (Technik im Fokus)
Par Klaus Mainzer, Reinhard Kahle. 2024
Artificial intelligence is a key technology with great expectations in science, industry, and everyday life. This book discusses both the…
perspectives and the limitations of this technology. This concerns the practical, theoretical, and conceptual challenges that AI has to face. In an early phase of symbolic AI, AI focused on formal programs (e.g., expert systems), in which rule-based knowledge was processed with the help of symbolic logic. Today, AI is dominated by statistics-based machine learning methods and Big Data. While this sub-symbolic AI is extremely successful (e.g., chatbots like ChatGPT), it is often not transparent. The book argues for explainable and reliable AI, in which the logical and mathematical foundations of AI-algorithms become understandable and verifiable.America’s New Racial Battle Lines: Protect versus Repair (Chicago Studies in American Politics)
Par Rogers M. Smith, Desmond King. 2024
A sobering portrait of the United States’ divided racial politics. For nearly two decades, Rogers M. Smith and Desmond King…
have charted the shifting racial policy alliances that have shaped American politics across different eras. In America’s New Racial Battle Lines, they show that US racial policy debates are undergoing fundamental change. Disputes over colorblind versus race-conscious policies have given way to new lines of conflict. Today’s conservatives promise to protect traditionalist, predominantly white, Christian Americans against what they call the “radical” Left. Meanwhile, today’s progressives seek not just to integrate American institutions but to more fully transform and “repair” pervasive systemic racism. Drawing on interviews with activists, surveys, social network analyses, and comprehensive reviews of federal, state, and local policies and advocacy groups, Smith and King map the memberships and goals of two rival racial policy alliances and delineate the contrasting stories each side tells. They also show that these increasingly polarized racial policy alliances are substantially funded on both the Left and Right. Placing today’s conflicts in theoretical and historical perspectives, Smith and King analyze where these intensifying clashes may take the nation in the years ahead. They highlight the great potential for mounting violence, as well as the remaining possibilities for finding common ground.The Borders of the European Union in a Conflictual World: Interdisciplinary European Studies
Par Antonina Bakardjieva Engelbrekt, Per Ekman, Anna Michalski, Lars Oxelheim. 2024
This open access book examines the implications for the EU of a radically changed international context characterized by systemic rivalry,…
competition over norms and regulations, and growing strategic tension. Globalization that once tied national economies together and internationalized social phenomena, such as education, research and innovation, and tourism, has gone in reverse. An opposite trend is driving the world into distinct spheres of competing models of governance, regulation, technological development, and communication. Facing the most extensive rupture of economic and inter-state relations since the onset of the Cold War, the management of the EU’s internal and external borders is taking on a completely new meaning. The open access book brings together scholars from economics, law, and political science to provide up dated assessments and policy advice on the insecurity in the neighborhood and war in Ukraine, the EU’s role in the future European security architecture,weaponized energy dependence, and the global competition on norms.This book makes the powerful argument that Latin America needs to be a more central part of the discourse on…
emerging globalities and in the pursuit of an inter-civilizational focus to avoid West-centric perspectives. It deploys a cultural political economy approach that sees the global political economy as inescapably cultural and allows us to avoid the hyper-rational analysis of economics. It explores various aspects of contemporary Latin America from the revival of dependency theory, the ‘pink tide’ governments since 2000 and, in particular, the potential of the Andean Buen Vivir political philosophy, to offer a distinctive paradigm for sustainable global development.The book provides a de-colonial frame and shows how many recent and new social science perspectives emerging globally are connected with Latin American scholars and Latin American social experiments: namely, dependency, decolonial and post-colonial epistemologies, post-neoliberalism, and the notion ofPluriverse. The book focuses on the cultural, the ethical, the economic and the political, and environmental dimensions of this transformation, which represents a reaction and alternative to the Western cultural, including ethical, economic, political, environmental crises.The readership for this book includes all who are fascinated by the globalization lens on the one hand, and the experience and lessons of Latin America on the other hand.Advancements in Smart Computing and Information Security: Second International Conference, ASCIS 2023, Rajkot, India, December 7–9, 2023, Revised Selected Papers, Part I (Communications in Computer and Information Science #2037)
Par Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja. 2024
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances in Smart Computing and Information…
Security, ASCIS 2023, in Rajkot, Gujarat, India, December 2023. The 91 full papers and 36 short papers in the volume were carefully checked and selected from 432 submissions. Various application areas were presented at the conference, including healthcare, agriculture, automotive, construction and engineering, pharmaceuticals, cybercrime and sports.Advancements in Smart Computing and Information Security: Second International Conference, ASCIS 2023, Rajkot, India, December 7–9, 2023, Revised Selected Papers, Part III (Communications in Computer and Information Science #2039)
Par Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja. 2024
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances in Smart Computing and Information…
Security, ASCIS 2023, in Rajkot, Gujarat, India, December 2023. The 91 full papers and 36 short papers in the volume were carefully checked and selected from 432 submissions. Various application areas were presented at the conference, including healthcare, agriculture, automotive, construction and engineering, pharmaceuticals, cybercrime and sports.Decision Support Systems XIV. Human-Centric Group Decision, Negotiation and Decision Support Systems for Societal Transitions: 10th International Conference on Decision Support System Technology, ICDSST 2024, Porto, Portugal, June 3–5, 2024, Proceedings
Par Sérgio Pedro Duarte, António Lobo, Boris Delibašić, Daouda Kamissoko. 2024
This book constitutes the proceedings of the 10th International Conference on Decision Support Systems Technologies, ICDSST 2024, held in June…
2024. The EWG-DSS series of International Conference on Decision Support System Technology (ICDSST) is planned to consolidate the tradition of annual events organized by the EWG-DSS in offering a platform for European and international DSS communities, comprising the academic and industrial sectors, to present state-of-the-art DSS research and developments, to discuss current challenges that surround decision-making processes, to exchange ideas about realistic and innovative solutions, and to co-develop potential business opportunities. This year the main topic was: Human-Centric Group Decision, Negotiation and Decision Support Systems for Societal Transitions. The 10 full papers included in these proceedings were carefully reviewed and selected from 29 submissions. They have been organized in topical sections as follows: Decision support tools and methods; and decision factors.Advancements in Smart Computing and Information Security: Second International Conference, ASCIS 2023, Rajkot, India, December 7–9, 2023, Revised Selected Papers, Part II (Communications in Computer and Information Science #2038)
Par Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja. 2024
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances in Smart Computing and Information…
Security, ASCIS 2023, in Rajkot, Gujarat, India, December 2023. The 91 full papers and 36 short papers in the volume were carefully checked and selected from 432 submissions. Various application areas were presented at the conference, including healthcare, agriculture, automotive, construction and engineering, pharmaceuticals, cybercrime and sports.Advancements in Smart Computing and Information Security: Second International Conference, ASCIS 2023, Rajkot, India, December 7–9, 2023, Revised Selected Papers, Part IV (Communications in Computer and Information Science #2040)
Par Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja. 2024
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances in Smart Computing and Information…
Security, ASCIS 2023, in Rajkot, Gujarat, India, December 2023. The 91 full papers and 36 short papers in the volume were carefully checked and selected from 432 submissions. Various application areas were presented at the conference, including healthcare, agriculture, automotive, construction and engineering, pharmaceuticals, cybercrime and sports.The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory…
of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory…
of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.Expedition to Disaster: The Athenian Mission to Sicily 415 BC
Par Philip Matyszak. 2012
This thrillingly vivid history recounts a pivotal battle of the Peloponnesian War, bringing the drama and personalities of the Sicilian…
Expedition to life. The Athenian expedition to conquer Sicily was one of the most significant military events of the classical period. At the time, Athens was locked in a decades-long struggle with Sparta for mastery of the Greek world. The expedition to Sicily was intended to win Athens the extra money and resources needed to crush the Spartans. With the aid of new archaeological discoveries, Expedition to Disaster reconstructs the mission, and the ensuing siege, in greater detail than ever before. The cast of characters includes Alcibiades, the flamboyant, charismatic young aristocrat; Nicias, the ageing, reluctant commander of the ill-fated expedition, and Gylippus, the grim Spartan general sent to command the defense of Syracuse. It was he who turned the tables on the Athenian invaders. They were surrounded, besieged, and forced to ask for mercy from a man who had none. Philip Matyszak's combination of thorough research and gripping narrative presents an episode of ancient history packed with colorful characters and dramatic tension.