Sharing Does Not Compute


Book Description

Power up with robots Standroid and Dandroid in this playful board book about sharing! Standroid’s battery is full and Dandroid’s charging is complete. The two robots are fueled-up and ready to play! Standroid grabs a toy car. Dandroid wants to play with it, too. But Dandroid does NOT want to share. Error! Sharing does not compute! Will the two robots figure out how to override the command and play together?




Data Sharing Using A Common Data Architecture


Book Description

Data Sharing Using a Common Data Architecture Wouldn’t it be a pleasure to know and understand all the data in your organization? Wouldn’t it be great to easily identify and readily share those data to develop information that supports business strategies? Wouldn’t it be wonderful to have a formal data resource that provides just-in-time data for developing just-in-time information to support just-in-time decision making? Data Sharing Using a Common Data Architecture shows you how by: Defining a common data architecture, its contents, and its uses Refining data to a common data architecture Discussing disparate data, its structure, quality, and how to identify it Describing how Data Sharing Reality is achieved Focusing on the importance of people and creating a win-win situation Providing a data lexicon and extensive glossary Data Sharing Using a Common Data Architecture is must reading for data administrators, database administrators, MIS project leaders, application programmers, systems analysts, MIS trainers and instructors, and graduate students.




Distributed Algorithms


Book Description

A comprehensive guide to distributed algorithms that emphasizes examples and exercises rather than mathematical argumentation.




Sharing Bandwidth


Book Description

Sharing Bandwidth Get More Bang for Your Bandwidth Improve the performance and manageability of your network connection — and reduce costs! Filled with practical, innovative solutions and detailed scenarios, Sharing Bandwidth shows you how to leverage the latest hardware and software solutions to make the most of the amount of bandwidth you have — whether you run a small system or an enterprise-wide network spanning the globe. Working Solutions for Everyday Networking Challenges Master common line-sharing implementations — WebRamp, 3Com Remote Dual Analog, and software solutions Explore critical techniques for reducing bandwidth waste — explicit bandwidth management and redundancy reduction Set up and integrate Netscape Proxy Server 3.5 or Microsoft Proxy Server 2.0 Develop an optimal caching strategy Make efficient and secure use of Internet services — e-mail, network news, and DNS Find out how firewalls can complement and enhance bandwidth management issues Combine technologies to create the most efficient network architecture www.idgbooks.com




Computer Graphics from Scratch


Book Description

Computer Graphics from Scratch demystifies the algorithms used in modern graphics software and guides beginners through building photorealistic 3D renders. Computer graphics programming books are often math-heavy and intimidating for newcomers. Not this one. Computer Graphics from Scratch takes a simpler approach by keeping the math to a minimum and focusing on only one aspect of computer graphics, 3D rendering. You’ll build two complete, fully functional renderers: a raytracer, which simulates rays of light as they bounce off objects, and a rasterizer, which converts 3D models into 2D pixels. As you progress you’ll learn how to create realistic reflections and shadows, and how to render a scene from any point of view. Pseudocode examples throughout make it easy to write your renderers in any language, and links to live JavaScript demos of each algorithm invite you to explore further on your own. Learn how to: Use perspective projection to draw 3D objects on a 2D plane Simulate the way rays of light interact with surfaces Add mirror-like reflections and cast shadows to objects Render a scene from any camera position using clipping planes Use flat, Gouraud, and Phong shading to mimic real surface lighting Paint texture details onto basic shapes to create realistic-looking objects Whether you’re an aspiring graphics engineer or a novice programmer curious about how graphics algorithms work, Gabriel Gambetta’s simple, clear explanations will quickly put computer graphics concepts and rendering techniques within your reach. All you need is basic coding knowledge and high school math. Computer Graphics from Scratch will cover the rest.




Don't Make Me Think


Book Description

Five years and more than 100,000 copies after it was first published, it's hard to imagine anyone working in Web design who hasn't read Steve Krug's "instant classic" on Web usability, but people are still discovering it every day. In this second edition, Steve adds three new chapters in the same style as the original: wry and entertaining, yet loaded with insights and practical advice for novice and veteran alike. Don't be surprised if it completely changes the way you think about Web design. Three New Chapters! Usability as common courtesy -- Why people really leave Web sites Web Accessibility, CSS, and you -- Making sites usable and accessible Help! My boss wants me to ______. -- Surviving executive design whims "I thought usability was the enemy of design until I read the first edition of this book. Don't Make Me Think! showed me how to put myself in the position of the person who uses my site. After reading it over a couple of hours and putting its ideas to work for the past five years, I can say it has done more to improve my abilities as a Web designer than any other book. In this second edition, Steve Krug adds essential ammunition for those whose bosses, clients, stakeholders, and marketing managers insist on doing the wrong thing. If you design, write, program, own, or manage Web sites, you must read this book." -- Jeffrey Zeldman, author of Designing with Web Standards




Visual Cryptography and Secret Image Sharing


Book Description

With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information. Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive data—such as medical records, financial transactions, and electronic voting systems—the methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files. An exploration of the most prominent topics in digital imaging security, this book discusses: Potential for sharing multiple secrets Visual cryptography schemes—based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared images Inclusion of pictures in the distributed shares Contrast enhancement techniques Color-image visual cryptography Cheating prevention Alignment problems for image shares Steganography and authentication In the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.




Distributed Services with Go


Book Description

You know the basics of Go and are eager to put your knowledge to work. This book is just what you need to apply Go to real-world situations. You'll build a distributed service that's highly available, resilient, and scalable. Along the way you'll master the techniques, tools, and tricks that skilled Go programmers use every day to build quality applications. Level up your Go skills today. Take your Go skills to the next level by learning how to design, develop, and deploy a distributed service. Start from the bare essentials of storage handling, then work your way through networking a client and server, and finally to distributing server instances, deployment, and testing. All this will make coding in your day job or side projects easier, faster, and more fun. Lay out your applications and libraries to be modular and easy to maintain. Build networked, secure clients and servers with gRPC. Monitor your applications with metrics, logs, and traces to make them debuggable and reliable. Test and benchmark your applications to ensure they're correct and fast. Build your own distributed services with service discovery and consensus. Write CLIs to configure your applications. Deploy applications to the cloud with Kubernetes and manage them with your own Kubernetes Operator. Dive into writing Go and join the hundreds of thousands who are using it to build software for the real world. What You Need: Go 1.11 and Kubernetes 1.12.




Alone Together


Book Description

A groundbreaking book by one of the most important thinkers of our time shows how technology is warping our social lives and our inner ones Technology has become the architect of our intimacies. Online, we fall prey to the illusion of companionship, gathering thousands of Twitter and Facebook friends, and confusing tweets and wall posts with authentic communication. But this relentless connection leads to a deep solitude. MIT professor Sherry Turkle argues that as technology ramps up, our emotional lives ramp down. Based on hundreds of interviews and with a new introduction taking us to the present day, Alone Together describes changing, unsettling relationships between friends, lovers, and families.




Privacy in Context


Book Description

Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself—most people understand that this is crucial to social life —but the inappropriate, improper sharing of information. Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts—whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.