The Digital Frontier


Book Description

Discover how to move forward with your own company’s digital transformation with this accessible new resource from a global leader in his field In The Digital Frontier, experienced executive and distinguished author Ajay Sohoni delivers a relatable and readable reference for corporate executives who need the knowledge and confidence to build lasting digital change within their enterprise. From marketing to commercial, supply chain, and finance, the book offers actionable insights in an accessible format, full of anecdotes, humor, and case examples. You’ll learn which areas to focus on and which not to worry about as you craft your own custom transformation journey. In the book, you’ll also find: A demystification of the startup world for executives and an explanation of why unicorns exist (and so often ultimately fail) A detailed description of the digital transformation gripping companies across a variety of industries in functional areas including advertising, engagement, commerce, product development, manufacturing, and corporate functions A simplified 4-stage framework for companies to start from scratch and build valuable use cases Perfect for executives in consumer-facing companies, corporate managers and leaders, business unit heads and management teams, The Digital Frontier is also an indispensable guide for digital non-natives trying to make sense of, and keep up with, the rapidly changing world around them.




Medieval Frontier History in New Catalonia


Book Description

Lawrence McCrank addresses here the processes and consequences of the Christian reconquests in Northeastern Spain during the 12th century, focusing specifically on 'New Catalonia' then being won back from the Muslims. The history of this region, he argues, can be analysed best in terms of the concepts of frontier historiography because this frontier context gave the institutions and organizations that emerged there a distinctive and persistent character. In particular, these studies look at the role of the Cistercians of Poblet and Santes Creus and the Church of Tarragona as colonial agents fostering the resettlement and reorganization of the frontier. This consolidation prepared the way for the next wave of Reconquest.




The CISO’s Next Frontier


Book Description

This book provides an advanced understanding of cyber threats as well as the risks companies are facing. It includes a detailed analysis of many technologies and approaches important to decreasing, mitigating or remediating those threats and risks. Cyber security technologies discussed in this book are futuristic and current. Advanced security topics such as secure remote work, data security, network security, application and device security, cloud security, and cyber risk and privacy are presented in this book. At the end of every chapter, an evaluation of the topic from a CISO’s perspective is provided. This book also addresses quantum computing, artificial intelligence and machine learning for cyber security The opening chapters describe the power and danger of quantum computing, proposing two solutions for protection from probable quantum computer attacks: the tactical enhancement of existing algorithms to make them quantum-resistant, and the strategic implementation of quantum-safe algorithms and cryptosystems. The following chapters make the case for using supervised and unsupervised AI/ML to develop predictive, prescriptive, cognitive and auto-reactive threat detection, mitigation, and remediation capabilities against advanced attacks perpetrated by sophisticated threat actors, APT and polymorphic/metamorphic malware. CISOs must be concerned about current on-going sophisticated cyber-attacks, and can address them with advanced security measures. The latter half of this book discusses some current sophisticated cyber-attacks and available protective measures enabled by the advancement of cybersecurity capabilities in various IT domains. Chapters 6-10 discuss secure remote work; chapters 11-17, advanced data security paradigms; chapters 18-28, Network Security; chapters 29-35, application and device security; chapters 36-39, Cloud security; and chapters 40-46 organizational cyber risk measurement and event probability. Security and IT engineers, administrators and developers, CIOs, CTOs, CISOs, and CFOs will want to purchase this book. Risk personnel, CROs, IT and Security Auditors as well as security researchers and journalists will also find this useful.




Innovation Policies and Practices within Innovation Ecosystems


Book Description

While intense efforts of clarification have been made to distinguish between the concept of system and ecosystem, and between the different forms of ecosystems, very few works have addressed the issues of how these different forms of ecosystems are interacting in a dynamic perspective, or of how the notion of a dynamic ecosystem could emerge from the static frame of a system approach. The five chapters in this volume precisely aim at adding to this literature by highlighting the interplay between different types of innovation systems. A common thread among the five chapters of the book is the recognition of the need to develop new lenses to formally account for adaptative behaviour within clusters, networks, or regional innovation systems using the ecosystem metaphor. The diversity and heterogeneity of agents, the complexity of relationships, and new forms of organisation (underground, middleground, and upperground) are the main characteristics of innovation ecosystems, in contrast to more traditional concepts like clusters or networks. In essence, the five chapters add various complexity dimensions (relationships, knowledge, systems, etc.) to the existing knowledge on ecosystems. The chapters in this book were originally published as a special issue of the journal Industry and Innovation.




An Interdisciplinary Approach to Aging, Biohacking and Technology


Book Description

An Interdisciplinary Approach to Aging, Biohacking and Technology focuses on a broad range of issues that cover everything from the most basic ways technology and biohacking influence people’s everyday lives to concerns about equity, globalization and how we humans produce, consume and are consumed by our technologies. This edited collection looks at the intersection between technology and aging, addressing the ways in which technology affects individuals, groups, local communities and entire populations. Contributions from a range of disciplines including sociology, philosophy, communications, medicine and religion provide interdisciplinary perspectives, addressing questions such as ‘What is the impact of technology on adult bodies, our well-being and our safety?’ The book explores risks such as surveillance technology, body modification and the Internet as well as issues in the aging journey such as the body and its modification; communication, privacy and surveillance; gerontechnology and aging in place. Critically examining the journey of ageing and exploring techniques such as biohacking, this book is for students studying aging and technology, including courses such as psychology, sociology, philosophy, cultural studies, health studies and gerontology. It will also be of interest to scholars who are curious about an interdisciplinary approach to age and technology.




Amazon


Book Description

What is the secret to Amazon's success? What does the ecommerce giant have in store for the future? Explore the disruptive new retail strategies of the world's most relentless retailer and gain valuable lessons that can be applied to any business in the ecommerce sector, with original insight from the company as it continues to revolutionize itself even further. The retail industry is facing unprecedented challenges. Across all sectors and markets, retailers are shifting their business models and customer engagement strategies to ensure they survive. The rise of online shopping, and its primary player, Amazon, is at the heart of these changes and opportunities. Amazon's relentless dissatisfaction with the status quo is what makes it such an extraordinary retailer. This book explores whether Amazon has what it takes to become a credible grocery retailer, and as it transitions to bricks and mortar retailing, investigates whether Amazon's stores can be as compelling as its online offering. Exploring the ecommerce giant's strategies, Amazon offers unique insight into how innovations such voice technology, checkout-free stores and its Prime ecosystem, will fundamentally change the way consumers shop. Written by industry leading retail analysts who have spent decades providing research-based analysis and opinion on retail strategy and enterprise technology use in retail, Amazon analyzes the impact these initiatives will have on the wider retail sector and the lessons that can be learned from its unprecedented rise to dominance - as stores of the future become less about transactions and more about experiences.




A History of the Literature of the U.S. South: Volume 1


Book Description

A History of the Literature of the U.S. South provides scholars with a dynamic and heterogeneous examination of southern writing from John Smith to Natasha Trethewey. Eschewing a master narrative limited to predictable authors and titles, the anthology adopts a variegated approach that emphasizes the cultural and political tensions crucial to the making of this regional literature. Certain chapters focus on major white writers (e.g., Thomas Jefferson, William Faulkner, the Agrarians, Cormac McCarthy), but a substantial portion of the work foregrounds the achievements of African American writers like Frederick Douglass, Zora Neale Hurston, and Sarah Wright to address the multiracial and transnational dimensions of this literary formation. Theoretically informed and historically aware, the volume's contributors collectively demonstrate how southern literature constitutes an aesthetic, cultural and political field that richly repays examination from a variety of critical perspectives.




The Cambridge Handbook of the Law of Algorithms


Book Description

Algorithms are a fundamental building block of artificial intelligence - and, increasingly, society - but our legal institutions have largely failed to recognize or respond to this reality. The Cambridge Handbook of the Law of Algorithms, which features contributions from US, EU, and Asian legal scholars, discusses the specific challenges algorithms pose not only to current law, but also - as algorithms replace people as decision makers - to the foundations of society itself. The work includes wide coverage of the law as it relates to algorithms, with chapters analyzing how human biases have crept into algorithmic decision-making about who receives housing or credit, the length of sentences for defendants convicted of crimes, and many other decisions that impact constitutionally protected groups. Other issues covered in the work include the impact of algorithms on the law of free speech, intellectual property, and commercial and human rights law.




Hacking and Data Privacy


Book Description

Hackers can break into government websites, nuclear power plants, and the NSA. They can steal corporate secrets, top-secret security code, and credit card numbers. Through social media, they can plant ideas, manipulate public opinion, and influence elections. And there's precious little we can do to stop them. this book documents the dramatic increase in hacking and data mining incidents in recent years. The articles within it explore how these incidents affect world events, such as the United Kingdom's Brexit vote and the 2016 U.S. presidential election. Investigative articles reveal who is behind these incidents, why they happened, and how we can protect our data.




Artificial Intelligence in Customer Service


Book Description

This edited volume elucidates how artificial intelligence (AI) can enable customer service to achieve higher customer engagement, superior user experiences, and increased well-being among customers and employees. As customer expectations dictate 24/7 availability from service departments and market pressures call for lower costs with higher efficiency, businesses have accepted that AI is vital in maintaining customer satisfaction. Yet, firms face tough challenges in choosing the right tool, optimizing integration, and striking the appropriate balance between AI systems and human efforts. In this context, chapters in this book capture the latest advancements in AI-enabled customer service through real-world examples. This volume offers a global perspective on this contemporary issue, covering topics such as the use of AI in enhancing customer well-being, data and technology integration, and customer engagement.