Computer und IT
Angular Portfolio App Development
In this book you'll learn how to create an online portfolio application with Angular. Building a personal brand is important for your online growth and career. In this book, you'll learn how to create an online portfolio application to showcase your talent to the world and impress your potential employers. We start from scratch and build everything together. By the end of this book, you'll be confident working with Angular and creating an elegant and impressive portfolio to showcase yourself online. We will use the latest Angular technology v19.2, NgRx SignalStore and Modern CSS Layouts. Hello, I am Abdelfattah Ragab, a professional software developer with more than 20 years of experience. I am an expert in Angular, CSS, graphic design and all web related technologies. I have published numerous books on modern CSS layouts and Angular as well as complete business solutions for e-commerce and the like. I hope you enjoy my books. With kind regards.
Visual Analytics for Dashboards
This book covers the key principles, best practices, and practical techniques for designing and implementing visually compelling dashboards. It explores the various stages of the dashboard development process, from understanding user needs and defining goals, to selecting appropriate visual encodings, designing effective layouts, and employing interactive elements. It also addresses the critical aspect of data storytelling, examining how narratives and context can be woven into dashboards to deliver impactful insights and engage audiences._Visual Analytics for Dashboards _is designed to cater to a wide range of readers, from beginners looking to grasp the fundamentals of visual analytics, to seasoned professionals seeking to enhance their dashboard design skills. For different types of readers, such as a data analyst, BI professional, data scientist, or simply someone interested in data visualization, this book aims to equip them with the knowledge and tools necessary to create impactful dashboards.WHAT YOU’LL LEARNThe principles of data visualizationHow to create effective dashboardsMeet all the requirements for visual analytics/data visualization/dashboard coursesDeepen understanding of data presentation and analysisHow to use different kinds of tools for data analysis, such as scorecards and key performance indicatorsWHO THIS BOOK IS FORBusiness analysts, data analysts, BI professionals, end-users, executives, developers, as well as students in dashboards, data visualizations, and visual analytics courses.Arshad Khan is a versatile business intelligence/analytics and training professional, with 35+ years of experience, who has led many Tableau and SAP projects. He has consulted for Accenture, PwC, Deloitte, Chevron, Bose Corporation, Daimler Chrysler, Genentech, PepsiCo, Hitachi-America, and many other blue-chip companies.Khan has authored 17 books including six on business intelligence. He has taught many data visualization, dashboards, data analysis, BI, and SAP courses at 9 universities including Golden Gate University, Santa Clara University, and the University of California (Berkeley, Santa Cruz/Silicon Valley, and San Diego Extensions). Mr. Khan has a graduate degree in chemical engineering and an MBA.Chapter 1: Dashboards.- Chapter 2: Scorecards.- Chapter 3: Key performance indicators.- Chapter 4: Dashboard requirements.- Chapter 5: Dashboard design.- Chapter 6: Data visualization.- Chapter 7: Visualization principles.- Chapter 8: Visual communication.- Chapter 9: Understanding and using charts.- Chapter 10: Selecting charts.- Chapter 11: Best Practices and Tips.
Windows Forensics
This book is your comprehensive guide to Windows forensics. It covers the process of conducting or performing a forensic investigation of systems that run on Windows operating systems. It also includes analysis of incident response, recovery, and auditing of equipment used in executing any criminal activity.The book covers Windows registry, architecture, and systems as well as forensic techniques, along with coverage of how to write reports, legal standards, and how to testify. It starts with an introduction to Windows followed by forensic concepts and methods of creating forensic images. You will learn Windows file artefacts along with Windows Registry and Windows Memory forensics. And you will learn to work with PowerShell scripting for forensic applications and Windows email forensics. Microsoft Azure and cloud forensics are discussed and you will learn how to extract from the cloud. By the end of the book you will know data-hiding techniques in Windows and learn about volatility and a Windows Registry cheat sheet.WHAT WILL YOU LEARN* Understand Windows architecture* Recover deleted files from Windows and the recycle bin* Use volatility and PassMark volatility workbench* Utilize Windows PowerShell scripting for forensic applicationsWHO THIS BOOK IS FORWindows administrators, forensics practitioners, and those wanting to enter the field of digital forensicsDR. CHUCK EASTTOM is the author of 39 books, including several on computer security, forensics, and cryptography. He is also an inventor with 25 patents and the author of over 70 research papers. He holds a Doctor of Science in cyber security, a Ph.D. in Nanotechnology, a Ph.D. in computer science, and three master’s degrees.DR. WILLIAM BUTLER is Vice President of Academic Affairs and Executive Director of the Center for Cybersecurity Research and Analysis (CCRA) at Capitol Technology University (Located in Laurel, Maryland). Before this appointment, Bill served as the Chair of Cybersecurity programs for eight years.JESSICA PHELAN is a computer science graduate student at Vanderbilt University. She is currently doing research in natural language processing at the University of Texas at Austin.RAMYA SAI BHAGAVATULA is a Cybersecurity enthusiast and holds a Security+ Certification from CompTIA. She is currently working as an AI Engineer for a medical organization, Baylor Genetics, where she is using her AI expertise to work with genomic data to bring out valuable insights and predictions. She has previously worked for NASA as a Deep Learning Research Intern, where she developed deep learning models to effectively predict severe climate patterns. She was also a lead Data Analyst Intern at an arts organization, Houston Arts Alliance, where she was involved in analyzing in-depth patterns and providing recommendations for their future art grants. Through her dedication to continuous learning and professional development, she pursued her Master's in Data Analytics at UH and is currently pursuing her second Master's in Computer Science at Vanderbilt University. She is also 3x Microsoft Certified in AI and Data Engineering. She aspires for her future career path to involve Cybersecurity, Quantum Computing, and AI. In her free time, she loves to volunteer at local organizationsto raise awareness about Computer Science among underprivileged school students. She has also received the Presidential Volunteer Service Award for her volunteer services.SEAN STEUBER has a BS in Engineering from University of Alabama, an MS in Computer Science from Vanderbilt University, and eight years of professional computer science experience.KARELY RODRIGUEZ is a first-generation DACA recipient and a woman pursuing STEM. She earned a Bachelor’s of Science in Computer Science and minored in Mathematics at the University of Washington and has continued her education in achieving a Masters of Computer Science from Vanderbilt University.VICTORIA INDY BALKISSOON is working in the Naval Enterprise Research Data Science (N.E.R.D.S.) team at NAWCTSD Orlando where she currently works on developing software applications and data science solutions for the US NAVY. She is also currently pursuing a Master’s degree inComputer Science at Vanderbilt University.ZEHRA NASEER has an MS in Ccmputer Science from Vanderbilt University.Chapter 1: Introduction to Windows.- Chapter 2: Forensics Concepts.- Chapter 3: Creating Forensic Images Using OSForensics, FTK Imager, and Autopsy.- Chapter 4: Windows File Artifacts.- Chapter 5: Windows Registry Part 1.- Chapter 6: Windows Registry Part 2.- Chapter 7: Windows Shadow Copy.- Chapter 8: Windows Memory Forensics.- Chapter 9: PowerShell Forensics.- Chapter 10: Web Browser Forensics.- Chapter 11: Windows Email Forensics.- Chapter 12: Microsoft Azure and Cloud Forensics.- Chapter 13: Data-Hiding Techniques in Windows.- Appendix A: Volatility Cheat Sheet.- Appendix B: Windows Registry Cheat Sheet.
Mastering Knowledge Management Using Microsoft Technologies
For companies and individuals already using Microsoft365 and other Microsoft technologies, this book is designed to reveal how to fully utilize these platforms for effective Knowledge Management without needing to rely on additional third-party tools. It addresses a common issue where organizations find themselves with overlapping technology capabilities for managing knowledge. This situation arises because many companies are not fully aware of the capabilities they already possess within their existing Microsoft tools. Knowledge management firms capitalize on this gap by offering white-labeled, branded applications with user-friendly interfaces, selling them to companies that could achieve the same results with what they already own, if only they knew how to use them properly. By mastering the use of Microsoft technologies for Knowledge Management, organizations can save significant amounts of money that would otherwise be spent on unnecessary external solutions.Whether your objective is to optimize Knowledge Management processes or align these tools with your organization's business processes, this book is designed to serve as a valuable resource, offering practical guidance and strategies to empower your endeavors. By the end of this book, readers will be equipped with the knowledge and skills necessary to make informed decisions regarding the utilization of Microsoft technologies for Knowledge Management and organizational design.WHAT YOU WILL LEARN* The components of a Microsoft Knowledge Base* How PowerPlatfom can support Knowledge Management activities* How Microsoft tools fit into the Knowledge Management Landscape* How to integrate AI using Microsoft Co-PilotWHO THIS BOOK IS FORChief Technology Officers, Chief Information Officers, Chief Knowledge Officers, Chief Digital Officers, Directors of Knowledge Management, Knowledge Managers, SharePoint Administrators, Digital Transformation ConsultantsTori Reddy Dodla, Ph.D., a distinguished professional with the title of Knowledge Collaborative Engineer Principal, brings a wealth of expertise and academic rigor to knowledge management. Holding a Ph.D. in Technology, Dr. Dodla has dedicated her career to unraveling the complexities of knowledge management systems. Her research, centered on navigating the risks, rewards, and implementation challenges of knowledge management including Microsoft products has not only advanced the theoretical underpinnings of the field but has also contributed practical insights that have guided organizations toward more effective knowledge strategies.Chapter 1: Microsoft is Good for Knowledge Management.- Chapter 2: The Importance of a Knowledge Base.- Chapter 3: PowerApps for Knowledge Sharing.- Chapter 4: PowerBi for Gamification.- Chapter 5: Integrate AI on PowerPlatform.- Chapter 6: Knowledge Management for Document Management.- Chapter 7: Designing a SharePoint Newsletter.- Chapter 8: Knowledge Management Metrics and Analytics.- Chapter 9: Knowledge Management Challenges and Solutions.
Linking with Nature in the Digital Age
The use of digital technology in our societies is growing to meet the ever-increasing challenges of data collection, raising awareness, education and understanding nature. Artificial intelligence, for example, appears to be the answer to collecting massive amounts of data on biodiversity at a global scale and facilitating citizen participation in such data collection.Linking with Nature in the Digital Age explores the reconfiguration of our relationship with nature within this digital framework. This book examines this mediated linking from three angles. Firstly, it shows how digital technology can foster the development of links to nature. Then, it describes in greater detail the materiality of these links and how they have evolved with the developments in information technology. Finally, it questions the belief in the digital as a facilitator and opens up new perspectives on our relationship with nature and the living worldÉMILIE KOHLMANN is a lecturer in information and communication sciences at Université Grenoble Alpes, France. As part of the GRESEC laboratory, she works on nature mediation systems.Acknowledgments xi Introduction xiiiÉmilie KOHLMANNPART 1 EXTENDING LINKS THROUGH DIGITAL DEVICES 1Chapter 1 Benchmarks: Biodiversity, Participation and Digital Technology 3Émilie KOHLMANN and Catherine GAUTHIERChapter 2 The Documentary Links of Herbarium Collections and Their Communicative Stakes 15Lisa CHUPINChapter 3 Investigating the Relationship with Nature in the Animation of Wineries' Facebook Pages 35Marie-Caroline HEÏD and Catherine DE LAVERGNEChapter 4 Forms of Linking with Nature and with Others through a Digital Device: "Let Them Know and Participate" 53Émilie KOHLMANNPART 2 LINK MATERIALITY AND STRUCTURE: GENERATING DATA ON NATURE 73Chapter 5 Explainable Artificial Intelligence for a Better Understanding of Naturalist Data 75Ikram CHRAIBI KAADOUDChapter 6 Pooling Biodiversity Databases: Linking Data, Linking Actors 103Camille BERNARDChapter 7 The Challenges and Implementation of the LPO Auvergne-Rhône-Alpes Naturalist Information System 127Daniel THONONPART 3 GAINS AND LOSSES: QUESTIONING THE LINK TO NATURE 149Chapter 8 Complementarity of Big Data and Citizen Participation in Monitoring Plant Biodiversity 151Pierre BONNET, Alexis JOLY and François MUNOZChapter 9 New Automatic Identification Tools: An Aid for Botanists and Nature Managers? 161François MUNOZ and Pierre BONNETChapter 10 The Contribution of New Technologies to Our Experiences of Nature 177Minh-Xuan TRUONGChapter 11 Belonging to the World to Think of the Link: The Relationship with the Natural Environment as a Crucible of Relatedness 191Amélie COULBAUT-LAZZARINIConclusion 209Émilie KOHLMANNList of Authors 215Index 217
Information Systems Management
Information Systems Management is intended to sensitize the heads of organizations to the issues raised by information systems (IS). Through its pedagogical presentation, this book ensures that issues related to IS are not left solely to the experts in the field.This book combines and analyzes three key concepts in IS science: governance, urbanization and alignment. While governance implies the implementation of a certain number of means, bodies and procedures to manage IS more effectively, urbanization involves visualization methods to enable the manager to take into account the different levels of the organization of an IS and their coherence. Finally, alignment assesses the ability of the IS to make a significant contribution to the organization's strategy.DANIEL ALBAN is former Senior Lecturer in Management Sciences and Information Systems at Paris Descartes University (2005-2017), France.PHILIPPE EYNAUD is Professor of Management Sciences at Sorbonne Business School, University of Paris 1 Panthéon-Sorbonne, France.JEAN-LOUP RICHET is Associate Professor in Information Systems at the IAE Paris-Sorbonne, University of Paris 1 Panthéon-Sorbonne, France.CLAUDIO VITARI is Professor of Management Sciences at Aix-Marseille University, France.Foreword to the 2nd Edition xiSerge AMABILE and Régis MEISSONIERForeword to the 1st Edition xvLaurent BIBARDIntroduction xixPART 1 GOVERNING THE STAKEHOLDERS 1Introduction to Part 1 3CHAPTER 1 IS STAKEHOLDERS 51.1 The technological environment of IS stakeholders, and its development 61.2 Impact of the developing technologies on organizational management 81.3 Understanding and categorizing the human stakeholders in IS 11CHAPTER 2 FROM GLOBAL GOVERNANCE TO IS GOVERNANCE 212.1 From organizational governance to IS governance 222.2 Defining IS governance 252.3 IS governance in an outsourcing strategy 282.4 IS governance in a resource pooling strategy 322.5 IS governance in a co-management strategy with stakeholders 372.6 Open innovation-type software 422.7 Exercise: PingPongApp 42CHAPTER 3 IS GOVERNANCE IN PRACTICE 453.1 IS governance organizational models 463.2 IS governance benchmarks 503.3 Implement a best practice benchmark 573.4 Exercise: GreenNRJ 59PART 2 URBANIZING THE TERRITORIES 63Introduction to Part 2 65CHAPTER 4 THE IS TERRITORY 674.1 The territory 674.2 Organizational and microeconomic territory 694.3 Organizational territory and mesoeconomics 774.4 The IS territory 804.5 The IS territory and the organization's territory 834.6 The IS territory and process systems engineering 874.7 Alignment between the firm's territory and the IS territory 914.8 Representing the IS territory 964.9 Unified modeling language (UML) 984.10 Exercise: Linky and Enedis' IS territory 103CHAPTER 5 TERRITORIAL URBANIZATION 1075.1 Urbanization 1075.2 Urbanization of ISs 1105.3 Urbanization: approaches and objectives 1125.4 The planner's job 1185.5 The limits 1195.6 IS urbanization and the ecological transition 1205.7 Exercise: urbanization of France's government IS 122CHAPTER 6 URBANIZING THE INTER-ORGANIZATIONAL IS 1256.1 Inter-organizational territory 1256.2 Inter-organizational territory of the IS 1316.3 Alignment and representation of the inter-organizational IS territory 1396.4 Urbanization of an inter-organizational IS 1396.5 Exercise: AGK 149PART 3 PROJECT ALIGNMENT 153Introduction to Part 3 155CHAPTER 7 IS PROJECT MANAGEMENT 1577.1 Strategy of IS projects 1577.2 Roll-out of a traditional IS project 1607.3 Agile IS projects: a development methodology, a process and a philosophy 1637.4 DevOps: making the link between IS developments and IS department procedures 1687.5 Security in IS projects 1707.6 Exercise: cybersecurity in projects, managing tomorrow's threats 174CHAPTER 8 TECHNOLOGY, ALIGNMENT AND STRATEGIC TRANSFORMATION 1778.1 The alignment of stakeholders, territories and projects 1788.2 Strategic alignment 1798.3 Competition, technological revolutions and new strategies 1818.4 Strategic transformation linked to ISs and new technologies 1858.5 Towards a dynamic perspective of strategic transformation linked to the IS 1888.6 Exercise: TechOne: Big Data and the Cloud 189CHAPTER 9 AUDITING ISS 1919.1 What is an audit? 1919.2 The IS and auditing 1959.3 The audit process 1989.4 Scope of the audit 2019.5 Audit repositories 2039.6 Towards an approach via the risks of strategic alignment? 2049.7 Conclusion 2069.8 Exercise: an auditor's view 206Conclusion 209Glossary 219References 227Index 237
Artificial Intelligence for Risk Mitigation in the Financial Industry
ARTIFICIAL INTELLIGENCE FOR RISK MITIGATION IN THE FINANCIAL INDUSTRYTHIS BOOK EXTENSIVELY EXPLORES THE IMPLEMENTATION OF AI IN THE RISK MITIGATION PROCESS AND PROVIDES INFORMATION FOR AUDITING, BANKING, AND FINANCIAL SECTORS ON HOW TO REDUCE RISK AND ENHANCE EFFECTIVE RELIABILITY. The applications of the financial industry incorporate vast volumes of structured and unstructured data to gain insight into the financial and non-financial performance of companies. As a result of exponentially increasing data, auditors and management professionals need to enhance processing capabilities while maintaining the effectiveness and reliability of the risk mitigation process. The risk mitigation and audit procedures are processes involving the progression of activities to “transform inputs into output.” As AI systems continue to grow mainstream, it is difficult to imagine an aspect of risk mitigation in the financial industry that will not require AI-related assurance or AI-assisted advisory services. AI can be used as a strong tool in many ways, like the prevention of fraud, money laundering, and cybercrime, detection of risks and probability of NPAs at early stages, sound lending, etc. AUDIENCEThis is an introductory book that provides insights into the advantages of risk mitigation by the adoption of AI in the financial industry. The subject is not only restricted to individuals like researchers, auditors, and management professionals, but also includes decision-making authorities like the government. This book is a valuable guide to the utilization of AI for risk mitigation and will serve as an important standalone reference for years to come. AMBRISH KUMAR MISHRA, PHD, is a scholar in the School of Management at Gautam Buddha University in Greater Noida, Uttar Pradesh, India. He obtained his Master’s in banking services from Amity University Noida, India in 2014, and has spent six years in the banking industry teaching and as a mutual fund and GST trainer with the BFSI sector skill council in India. He has published research papers and received various awards in his field of research. SHWETA ANAND, PHD, is the dean of the School of Management at Gautam Buddha University in Greater Noida, Uttar Pradesh, India. She earned a PhD in Wealth Management and has 30+ years of experience of which 14 years were in industry. She has won several awards and accolades and has published numerous papers in international and national journals and conferences. NARAYAN C. DEBNATH, PHD, is the Founding Dean of the School of Computing and Information Technology at Eastern International University (EIU), Vietnam where he also serves as the Head of the Department of Software Engineering. He has been the Director of the International Society for Computers and their Applications (ISCA), USA since 2014 as well as serving as a Full Professor of Computer Science at Winona State University, Minnesota, USA for 28 years. He is the author or co-author of more than 500 publications in numerous refereed journals and conference proceedings as well as the editor of several books. PURVI POKHARIYAL, PHD, is the Campus Director at the National Forensic Sciences University of the Delhi Campus, India. She has more than 25 years of academic and industry experience in the field of law and justice administration. She has published about 50 papers in national and international journals and conferences. ARCHANA PATEL, PHD, is an assistant professor at the National Forensic Sciences University, Delhi, India. She completed her PhD in Computer Applications and a PG degree from the National Institute on Technology in Kurukshetra, India in 2020 and 2016, respectively. Dr. Patel has received various awards for her presentation of research work, and published more than 40 papers in peer-reviewed journals and conferences, as well as edited 10 books. Her research interests are in ontological engineering, semantic web, big data, expert systems, and knowledge warehouses. Preface xvii1 Artificial Intelligence in Risk Management 1Pankaj Yadav, Priya Gupta, Rajeev Sijariya and Yogesh Sharma2 Application of Artificial Intelligence in Risk Assessment and Mitigation in Banks 27Ankita Srivastava, Bhartrihari Pandiya and Navtika Singh Nautiyal3 Artificial Intelligence and Financial Risk Mitigation 53Raja Rehan, Auwal Adam Sa'ad and Razali Haron4 Artificial Intelligence Adoption in the Indian Banking and Financial Industry: Current Status and Future Opportunities 81Deepthi B. and Vikram Bansal5 Impact of AI Adoption in Current Trends of the Financial Industry 103S. C. Vetrivel, T. Mohanasundaram, T. P. Saravanan and R. Maheswari6 Artificial Intelligence Applications in the Indian Financial Ecosystem 133Vijaya Kittu Manda and Khaliq Lubza Nihar7 The Extraction of Features That Characterize Financial Fraud Behavior by Machine Learning Algorithms 159George X. Yuan, Yuanlei Luo, Lan Di, Yunpeng Zhou, Wen Chen, Yiming Liu and Yudi Gu8 A New Surge of Interest in the Cybersecurity of VIP Clients is the First Step Toward the Return of the Previously Used Positioning Practice in Domestic Private Banking 187Gusev Alexey9 Determinants of Financial Distress in Select Indian Asset Reconstruction Companies Using Artificial Neural Networks 209Shashank Sharma and Ajay Kumar Kansal10 The Framework of Feature Extraction for Financial Fraud Behavior and Applications 229George X. Yuan, Shanshan Yang, Lan Di, Yunpeng Zhou, Wen Chen and Yuanlei Luo11 Real-Time Analysis of Banking Data with AI Technologies 261S. C. Vetrivel, T. Mohanasundaram, T. P. Saravanan and R. Maheswari12 Risks in Amalgamation of Artificial Intelligence with Other Recent Technologies 289K. Sathya and A. Hency Juliet13 Exploring the Role of ChatGPT in the Law Enforcement and Banking Sectors 327Shubham Pandey, Archana Patel and Purvi PokhariyalReferences 345Index 349
Raspberry Pi programmieren mit Python
* ALLE PYTHON-GRUNDLAGEN, DIE SIE FÜR IHREN RASPBERRY PI 5, 4, 3 ODER ZERO BRAUCHEN* PROJEKTE MIT SENSOREN, RELAIS UND AD-WANDLERN* EINSATZ VON PERIPHERIEGERÄTEN WIE KAMERAMODUL UND LAUTSPRECHERRASPBERRY PI - DER MINI-COMPUTER ZUM EXPERIMENTIERENDer Raspberry Pi ist ein preiswerter Computer in der Größe einer Kreditkarte. In Kombination mit der Programmiersprache Python bietet er eine hervorragende Umgebung für die schnelle Realisierung technischer Ideen und Projekte. In diesem Buch lernen Sie alle Grundlagen, die Sie brauchen, um mit dem Raspberry Pi oder dem Raspberry Pi Zero spannende Projekte zu realisieren.ZAHLREICHE PROJEKTE MIT SENSOREN, KAMERA U.V.M.Sie finden in diesem Buch eine Fülle von kleinen Projekten, die auf die besondere Hardware des Raspberry Pi und das Linux-Betriebssystem Raspberry Pi OS zugeschnitten sind. Dazu gehören sowohl Schaltungen mit Sensoren (Temperatur, Licht, Alkohol), Relais, AD-Wandlern und LEDs als auch die Verwendung des Kameramoduls und des 1-Wire- sowie SPI-Bus zur Datenkommunikation. Zahlreiche Illustrationen und einfache Beispiele zum Ausprobieren erleichtern das Verständnis.DIE PROGRAMMIERSPRACHE PYTHON ALS GRUNDLAGEPython ist - auch für Programmiereinsteiger - einfach zu lernen und deshalb Teil des Gesamtkonzepts des Raspberry Pi. Dieses Buch vermittelt Ihnen anhand anschaulicher Beispiele sowohl die Grundlagen von Python als auch fortgeschrittene Techniken wie Objektorientierung, Internetprogrammierung und grafische Benutzungsoberflächen. Am Ende jedes Kapitels finden Sie Aufgaben mit Lösungen zum Download, mit denen Sie Ihr Wissen festigen, erweitern und vertiefen können.AUS DEM INHALT:* Gerätesteuerung* Messwerterfassung und -visualisierung* Interaktive Spiele mit Schaltern und Sensoren* Animationen und Simulationen* Automatische Textproduktion* Digitale Bildverarbeitung* Morsezeichen senden und Signalmuster erkennen* Projekte mit dem Sense HAT* Farben und Bewegung wahrnehmen* Steuerung mit Potentiometer und AD-Wandler* Auswertung von Daten aus dem Internet* Webserver und WebcamZUM DOWNLOAD: Programmcode für alle Projekte sowie Lösungen der ÜbungsaufgabenMichael Weigend hat an der Universität Potsdam in Informatik promoviert. Er war für mehr als 30 Jahre als Lehrer tätig und hat 20 Jahre lang an der FernUniversität Hagen Seminare zur Didaktik der Informatik gegeben. An der Universität Münster hält er im Rahmen eines Lehrauftrags Vorlesungen zur Python-Programmierung. Michael Weigend engagiert sich in mehreren nationalen und internationalen Communities für den Computer-Einsatz in der Bildung, darunter Constructionism, International Federation for Information Processing (TC 3 Computers in Education) , Bebras - International Contest on Informatics and Computational Thinking. Er hat über 60 wissenschaftliche Artikel veröffentlicht und mehrere Bücher zu den Themen Programmierung, Web Development und visuelle Modellierung geschrieben.
React Portfolio App Development
Create a portfolio application with React and show the world your talent. Create your personal brand, increase your online presence and impress your potential employers. An online portfolio is important for your career to show the world your skills and impress your future employers. Hello, I am Abdelfattah Ragab, a professional software developer with more than 20 years of experience. I am an expert in Angular, CSS, graphic design and all web related technologies. I have published numerous books on modern CSS layouts and Angular as well as complete business solutions for e-commerce and the like. I hope you enjoy my books. With kind regards.
The Art of Immutable Architecture
This book teaches you how to evaluate a distributed system from the perspective of immutable objects. You will understand the problems in existing designs, know how to make small modifications to correct those problems, and learn to apply the principles of immutable architecture to your tools.Most software components focus on the state of objects. They store the current state of a row in a relational database. They track changes to state over time, making several basic assumptions: there is a single latest version of each object, the state of an object changes sequentially, and a system of record exists.This is a challenge when it comes to building distributed systems. Whether dealing with autonomous microservices or disconnected mobile apps, many of the problems we try to solve come down to synchronizing an ever-changing state between isolated components. Distributed systems would be a lot easier to build if objects could not change.After reading THE ART OF IMMUTABLE ARCHITECTURE, you will come away with an understanding of the benefits of using immutable objects in your own distributed systems. You will learn a set of rules for identifying and exchanging immutable objects, and see a collection of useful theorems that emerges and ensures that the distributed systems you build are eventually consistent. Using patterns, you will find where the truth converges, see how changes are associative, rather than sequential, and come to feel comfortable understanding that there is no longer a single source of truth. Practical hands-on examples reinforce how to build software using the described patterns, techniques, and tools. By the end of the book, you will possess the language and resources needed to analyze and construct distributed systems with confidence.The assumptions of the past were sufficient for building single-user, single-computer systems. But aswe expand to multiple devices, shared experiences, and cloud computing, they work against us. It is time for a new set of assumptions. Start with immutable objects, and build better distributed systems.WHAT YOU WILL LEARN* Evaluate a distributed system from the perspective of immutable objects * Recognize the problems in existing designs, and make small modifications to correct them* Start a new system from scratch, applying patterns* Apply the principles of immutable architecture to your tools, including SQL databases, message queues, and the network protocols that you already use * Discover new tools that natively apply these principles WHO THIS BOOK IS FORSoftware architects and senior developers. It contains examples in SQL and languages such as JavaScript and C#. Past experience with distributed computing, data modeling, or business analysis is helpful.MICHAEL L. PERRY is Director of Consulting at Improving, where he applies his love of software mathematics to benefit his clients. He has built upon the works of mathematicians such as Marc Shapiro, Pat Helland, and Leslie Lamport to develop a mathematical system for software development. He has captured this system in the Jinaga open source project. Michael often presents on math and software at events and online. You can find out more at michaelperry.net.PART I: DEFINITION.- Chapter 1: Why Immutable Architecture?.- Chapter 2: Forms of Immutable Architecture.- Chapter 3: How to Read an Historical Model.- PART II: APPLICATION.- Chapter 4: Analysis.- Chapter 5: Location Independence.- Chapter 6: Immutable Runtimes.- Chapter 7: Structural Patterns.- Chapter 8: State Transitions.- Chapter 9: Security.- PART III: IMPLEMENTATION.- Chapter 10: SQL Databases.- Chapter 11: Communication.- Chapter 12: Feeds.- Chapter13: Inversion.
Tuning the Snowflake Data Cloud
This project-oriented book presents a hands-on approach to identifying migration and performance issues with experience drawn from real-world examples. As you work through the book, you will develop skills, knowledge, and deep understanding of Snowflake tuning options and capabilities while preparing for later incorporation of additional Snowflake features as they become available. Your Snowflake platform will cost less to run and will improve your customer experience. Written by a seasoned Snowflake practitioner, this book is full of practical, hands-on guidance and advice specifically designed to further accelerate your Snowflake journey._Tuning the Snowflake Data Cloud_ provides you a pathway to success by equipping you with the skills, knowledge, and expertise needed to elevate your Snowflake experience. The book shows you how to leverage what you already know, adds what you don’t, and helps you apply it toward delivering for your Snowflake accounts. Read this book to embark on a voyage of advancement and equip your organization to deliver consistent Snowflake performance.What You Will Learn* Recognize and understand the root cause of performance bottlenecks* Know how to resolve performance issues* Develop a deep understanding of Snowflake performance tuning options* Reduce expensive mistakes, remediate poorly performing code* Manage Snowflake costsAndrew Carruthers is the Director for Snowflake Distribution at the London Stock Exchange Group (LSEG). Andrew’s new role is to deliver several Snowflake accounts supporting Refinitiv “final mile” data product content delivery via Snowflake Marketplace, Private Listings and Data Shares.Previously responsible for the Snowflake Corporate Data Cloud, Andrew was responsible for both ingestion data lake and consumption analytics hub, the Corporate Data Cloud services a growing customer base of over 7,000 end users. He also leads both the Centre for Enablement developing tooling, best practice and training, also the Snowflake Landing Zone provisioning Snowflake Accounts conforming to both internal standards and best practice.Andrew has almost 30 years hands-on Relational Database design, development and implementation experience starting out with Oracle in 1993. Until joining LSEG, Andrew operated as an independent IT consultant, his experience has been gained through predominantly working at major European financial institutions. Andrew is considered a visionary and thought leader within his domain with tight focus on delivery. Successfully bridging the gap between Snowflake technological capability and business usage of technology, Andrew often develops proof of concepts to showcase benefits leading to successful business outcomes.Since 2020 Andrew has immersed himself in Snowflake and is considered a Subject Matter Expert, he is CorePro certified, contributes to online forums and speaking at Snowflake events on behalf of LSEG. In recognition of his contribution to implementing Snowflake at LSEG, Andrew received the Snowflake Data Driver award, this category recognizes a technology trailblazer who has pioneered the Data Cloud into their organization.Andrew has two daughters, 20 and 22, both elite figure skaters. He has a passion for Jaguar cars having both designed and implemented modifications, and has published articles for both the Jaguar Enthusiast Magazine and Jaguar Drivers Club. Andrew enjoys 3D printing and has a mechanical engineering workshop with lathe, milling machine, TIG welder to name but a few tools, and enjoys developing his workshop skills.1. Tuning the Snowflake Data Cloud.- 2. The Query Optimizer.- 3. The Query Profiler.- 4. Micro-Partitions.- 5. Cluster Keys.- 6. Warehouses.- 7. Search Optimization Service.- 8. Parallelization.- 9. Client Expectations.- 10. Optimizing Performance.- Appendix.
African Artificial Intelligence
Artificial intelligence (AI) is upending life, work, and play as we know it, and it's only just getting started. The rise of AI is a milestone on par with the discovery of fire, the invention of the wheel, and the creation of the internet. In short, AI is going to change everything. For some, that's an exciting prospect. For others, it's terrifying. However you feel about AI, there's no escaping it, whether you're in a global metropolis or a farmer in rural KwaZulu-Natal.Dr Mark Nasila has been watching AI's ascent for over a decade, studying its effects on everything from agriculture and aviation to healthcare, education, entertainment, crime prevention, energy management, policy creation, finance, and anything in between, and applying them to his role at one of South Africa's most successful financial institutions, First National Bank, a division of FirstRand Group.African Artificial Intelligence is a comprehensive and fascinating journey, tracing the rise of AI and its evolution into the emerging technology underpinning all others – from connected devices and smart chatbots to the metaverse. Mark combines unexpected use cases and tales of cutting-edge innovation with a unique and potent argument: harnessing AI to solve Africa's problems requires embracing it from an African perspective.African nations can't afford to simply import AI solutions from afar. Instead, Mark contends, they need to rework, remix, and refine AI so it's able to meet uniquely African challenges in uniquely African ways, and to take advantage of the once-in-a-generation opportunity AI represents for every industry, sector, and person, everywhere.
ChatGPT Travel Planner
ChatGPT Travel Planner: Creating Memorable Vacations by Bill Vincent is your ultimate guide to crafting unforgettable travel experiences. Leveraging the power of AI, this book provides travelers with personalized recommendations, travel plans, and cost estimates, ensuring every adventure is unique and enriching. By integrating the innovative Time Capsule framework, each aspect of your journey-from understanding your goals to refining your itinerary-becomes a tailored, seamless process. Whether you dream of breathtaking landscapes, cultural encounters, or simply want a hassle-free vacation, this book is your trusted companion. Dive into the world of smart travel planning and transform your travel dreams into reality.
Moral und künstliche Intelligenz im Marketing
Konsumentendaten lassen sich zunehmend effektiv mit künstlicher Intelligenz (KI) kombinieren, um die Online Journey kalkuliert zu beeinflussen. Dieses Buch befasst sich anhand dreier Forschungsarbeiten mit den Fragen wann Marketing-KI Konsumentenentscheidungen vielmehr manipuliert als bereichert und wie Marketing-KI infolgedessen moralischer gestaltet werden kann. Die erste Forschungsarbeit untersucht, inwieweit Manipulationswahrnehmungen vom Menschenbild des Konsumenten abhängen. Hierfür werden zwei Studien mit 1.151 Teilnehmern durchgeführt. Daran anknüpfend stellt sich die Frage, ob Manager Konsumentenbilder auf opportunistische Weise instrumentalisieren, um Marketingaktivitäten zu legitimieren. Die zweite Forschungsarbeit kombiniert daher Methoden der Ökonometrie und des Natural Language Processing, um Menschenbilder von Managern aus Textdaten (33.407 Earnings Call Transkripte) zu analysieren. Die dritte Forschungsarbeit möchte Marketing-KI moralischer gestalten. Hierfür werden neuronale Netze mithilfe psychografischer Daten von 762 Teilnehmern trainiert, um faire personalisierte Preise anzubieten und Reaktionen mittels Laborexperiment (203 Probanden) zu untersuchen.
Homeland and territorial security with AI
This book explores the innovative concept of a knowledge cartridge dedicated to internal and territorial security, employing the Aitek platform - a cutting-edge AI and Big Data framework enriched by 25,000 man-days of research and development. It delves into the foundational principles of the knowledge cartridge system and subsequently addresses the critical challenges inherent in homeland and territorial security, with a particular focus on counter-terrorism efforts. Through a detailed examination, the thesis presents how artificial intelligence can be strategically applied to these challenges, offering a novel approach to enhancing security measures and operational efficiency within the domain of internal and territorial security. This work not only contributes to the academic discourse on AI's role in security but also proposes practical AI-driven solutions to complex security problems, thereby bridging the gap between theoretical research and real-world application.Bruno Ciroussel:Bruno Ciroussel, born in Lyon in 1964, is a french and swiss businessman. He is an engineer and author of the "Aitek methodology" dedicated to Auto-ML, now in its 6th edition, and has implemented his methodology in an universal Auto-ML platform: the "Aitek Engine", applicable in multiple functional domains such as banking, insurance, healthcare, logistics and telecom. He has also adapted his Aitek platform for deployment in the territorial surveillance, Homeland, and customs security sectors and delivered.Bruno Ciroussel is also author, lecturer and speaker on various issues encompassing Artificial Intelligence, Machine Learning as well as the impact of these and other technologies on business, security, gover-nment, and the democratic system.
Understanding Generative AI Business Applications
This guide covers the fundamental technical principles and various business applications of Generative AI for planning, developing, and evaluating AI-driven products. It equips you with the knowledge you need to harness the potential of Generative AI for enhancing business creativity and productivity.The book is organized into three sections: text-based, senses-based, and rationale-based. Each section provides an in-depth exploration of the specific methods and applications of Generative AI. In the text-based section, you will find detailed discussions on designing algorithms to automate and enhance written communication, including insights into the technical aspects of transformer-based Natural Language Processing (NLP) and chatbot architecture, such as GPT-4, Claude 2, Google Bard, and others. The senses-based section offers a glimpse into the algorithms and data structures that underpin visual, auditory, and multisensory experiences, including NeRF, 3D Gaussian Splatting,Stable Diffusion, AR and VR technologies, and more. The rationale-based section illuminates the decision-making capabilities of AI, with a focus on machine learning and data analytics techniques that empower applications such as simulation models, agents, and autonomous systems.In summary, this book serves as a guide for those seeking to navigate the dynamic landscape of Generative AI. Whether you’re a seasoned AI professional or a business leader looking to harness the power of creative automation, these pages offer a roadmap to leverage Generative AI for your organization’s success.WHAT YOU WILL LEARN* What are the technical elements that constitute the makeup of Generative AI products?* What are the practical applications of Generative AI?* How can algorithms be designed to automate and improve written communication?* What are the latest Generative AI architectures and algorithms?WHO THIS BOOK IS FORData scientists, data analysts, decision makers, and business executives interested in gaining an understanding of Generative AI productsIRENA CRONIN is SVP of Product for DADOS Technology, which is making an app for the Apple Vision Pro that does data analytics and visualization. She is also the CEO of Infinite Retina, which provides research to help companies develop and implement AI, AR and other new technologies for their businesses. Prior to this, she worked for several years as an equity research analyst and gained extensive experience in evaluating both public and private companies.Irena has a joint MBA/MA from the University of Southern California and an MS with Distinction in Management and Systems from New York University. She graduated with a BA from the University of Pennsylvania with a major in Economics (summa cum laude).Chapter 1: Introduction to the World of Generative AI.- Chapter 2: Core Technical Concepts.- Chapter 3: The Business Case for Generative AI.- Chapter 4: The World of Text-based Generative AI.- Chapter 5: Unpacking Transformer-based NLP.- Chapter 6: Exploring Chatbot Technologies.- Chapter 7: Advanced Applications of Text-based AI.- Chapter 8: Senses-based Generative AI Demystified.- Chapter 9: In-depth Look at Supportive Visual Algorithms and Computer Vision.- Chapter 10: The Auditory and Multisensory Experience.- Chapter 11: Autonomous AI Agents: Decision Making, Data, and Algorithms.- Chapter 12: Text-based Generative Intelligent Agents: Beyond Traditional Chatbots and Virtual Assistants.- Chapter 13: Applications and Real-world Case Studies.- Chapter 14: Summarizing Key Insights.- Chapter 15: The Evolving World of Generative AI.
Living with the Algorithm: Servant or Master?
An authoritative guide to what is needed for AI governance and regulation from expert authors internationally involved in the practical world of AI. This book tackles the question of why AI is a distinct challenge from other technologies and how we should seek to implement innovation-friendly approaches to regulation. It sets out many of the risks to be considered, why regulation is needed, and the form this should take to promote international convergence on AI governance and the responsible deployment of AI.This is a highly readable prescription for AI governance and regulation designed to encourage the technological goals of humanity whilst ensuring that potential risks are mitigated or prevented and, most importantly, that AI remains our servant and does not become our master.
Eco-responsible web design
In the vast world of the web, the notion of sustainable development is becoming increasingly important. Beyond simply reducing environmental impact, it also encompasses social and economic aspects, seeking to strike a balance between present needs and long-term imperatives.This book aims to become a tool for those seeking to harmonise the imperatives of web development with the requirements of preserving our planet and the well-being of its inhabitants.Grégory Clément:Born in 1971, Grégory Clément has been an entrepreneur, author, and speaker in the world of digital communications for over twenty years. After working for major accounts in the automotive, retail and e-commerce sectors, the sustainable and eco-responsible aspects of his job have become increas- ingly important to him. He now wants to pass on the knowledge and experience he has acquired over the years.
Fortschritte in der nicht-invasiven biomedizinischen Signalverarbeitung mit ML
Dieses Buch präsentiert Fortschritte in der biomedizinischen Technologie. IoT und Machine Learning haben neue Ansätze im mobilen Gesundheitswesen ermöglicht, mit Fokus auf kontinuierlicher Überwachung kritischer Gesundheitssituationen. Intelligente Hybridisierung von IoT, drahtlosen Implantaten und Cloud-Computing wird derzeit von verschiedenen Einrichtungen entwickelt und getestet. Biomedizinische Signale und Bildmodalitäten werden nicht-invasiv erfasst und erfordern eine mehrkanalige Erfassung für wirksame Überwachung. Automatisierte Gesundheitssysteme basieren auf Signal- und Bildaufnahme, Vorverarbeitung, Merkmalsextraktion und Klassifikation. Das Buch beschreibt zeitgenössische Ansätze in der biomedizinischen Signalerfassung und -verarbeitung mit maschinellem und tiefem Lernen. Jedes Kapitel ist eigenständig und bietet eine umfassende Übersicht über Theorien, Algorithmen und Herausforderungen im Bereich moderner Gesundheitssysteme.SAEED MIAN QAISAR erlangte seinen M.S. und Ph.D. in Elektro- und Informationstechnik an der Universität Grenoble Alpes, Frankreich, 2005 bzw. 2009. Danach absolvierte er einen Postdoc-Aufenthalt an der Universität Bordeaux, Frankreich, und arbeitete in verschiedenen F&E-Positionen in Frankreich. Derzeit ist er Associate Professor und Forscher am Fachbereich Elektro- und Informationstechnik an der Effat University, Jeddah, Saudi-Arabien. Er wurde mit dem Queen Effat Award für hervorragende Lehre im Mai 2016 ausgezeichnet, besitzt zwei Patente und hat über 200 veröffentlichte Artikel in Fachzeitschriften, Buchkapiteln und Konferenzbeiträgen. Er ist Herausgeber mehrerer internationaler Zeitschriften und Mitglied technischer und Überprüfungskomitees mehrerer internationaler Zeitschriften und Konferenzen.HUMAIRA NISAR hat einen B.Sc. (mit Auszeichnung) in Elektrotechnik von der University of Engineering and Technology, Lahore, Pakistan, einen M.Sc. in Kernenergie von der Quaid-i-Azam University, Islamabad, Pakistan, einen weiteren M.Sc. in Mechatronik und einen Ph.D. in Information und Mechatronik vom Gwangju Institute of Science and Technology, Gwangju, Südkorea. Mit über zwanzig Jahren Forschungserfahrung ist sie derzeit als Full Professor am Fachbereich Elektrotechnik an der Universiti Tunku Abdul Rahman, Kampar, Malaysia, tätig. Ihre Forschungsinteressen umfassen Signal- und Bildverarbeitung, biomedizinische Bildgebung, Neuro-Signalverarbeitung und -analyse, Brain-Computer Interface und Neurofeedback. Sie hat über 200 internationale Zeitschriften- und Konferenzartikel veröffentlicht und ist Senior-Mitglied der IEEE.ABDULHAMIT SUBASI ist auf künstliche Intelligenz, maschinelles Lernen, biomedizinische Signal- und Bildanalyse spezialisiert. Er schrieb über 30 Buchkapitel und über 200 veröffentlichte Artikel in Zeitschriften und Konferenzen zu verschiedenen Anwendungen von maschinellem Lernen. Er ist auch Autor der Bücher "Practical Guide for Biomedical Signals Analysis Using Machine Learning Techniques" und "Practical Machine Learning for Data Analysis Using Python". Darüber hinaus ist er Herausgeber des Buches "Applications of Artificial Intelligence in Medical Imaging". Er arbeitete an verschiedenen Institutionen als Akademiker und am Georgia Institute of Technology, Georgia, USA, als Forscher. Im Mai 2018 wurde er mit dem Queen Effat Award für hervorragende Forschung ausgezeichnet. Zwischen 2015 und 2020 arbeitete er als Professor für Informatik an der Effat University, Jeddah, Saudi-Arabien. Seit 2020 ist er als Professor an der Medizinischen Fakultät der Universität Turku, Turku, Finnland, tätig.1. Einführung in nicht-invasive biomedizinische Signale für das Gesundheitswesen.- 2. Signalerfassung Vorverarbeitung und Feature-Extraktion Techniken für biomedizinische Signale.- 3. Die Rolle von EEG als Neuro-Marker für Patienten mit Depressionen: Ein systematischer Überblick.- 4. Brain-Computer Interface (BCI) basierend auf der EEG-Signal-Zerlegung Butterfly-Optimierung und maschinelles Lernen.- 5. Fortschritte bei der Analyse des Elektrokardiogramms im Rahmen des Massenscreenings: technologische Trends und Anwendung der Erkennung von Anomalien durch künstliche Intelligenz.- 6. Anwendung der Wavelet-Zerlegung und des maschinellen Lernens für die sEMG-Signal-basierte Gestenerkennung.- 7. Überblick über die Klassifizierung von EEG-Signalen mit Hilfe von maschinellem Lernen und Deep-Learning-Techniken.- 8. "Biomedizinische Signalverarbeitung und künstliche Intelligenz in EOG-Signalen".- 9. Segmentierung und Klassifizierung von Phonokardiogrammsignalen auf der Grundlage von Peak-Spektrogrammen und neuronalen Faltungsnetzwerken .- 10. Segmentierung von Ekzem-Hautläsionen mit Hilfe eines tiefen neuronalen Netzes (U-Netz) .- 11. Biomedizinische Signalverarbeitung für die automatische Erkennung von Schlaf-Arousals auf der Basis von Multi-Physiologischen Signalen mit Ensemble-Lernmethoden.- 12. Deep Learning Assisted Biofeedback.- 13. Schätzung von emotionalen Synchronisationsindizes für Hirnregionen mittels Elektroenzephalogrammsignalanalyse.- 14. Recognition Enhancement of Dementia Patients' Working Memory using Entropy-based Features and Local Tangent Space Alignment Algorithm.
Die Struktur des Spieledesigns
Die Struktur des Spieledesigns soll angehenden und erfahrenen Spieleentwicklern helfen, ihre Ideen in funktionierende Spiele umzusetzen. Die Erstellung eines Spiels erfordert das Verständnis der grundlegenden Elemente aller Arten von Spielen, angefangen von papierbasierten Spielen bis hin zu den neuesten Videospielen. Durch das Verständnis, wie diese grundlegenden Prinzipien in allen Arten von Spielen funktionieren, können Sie dieselben Prinzipien anwenden, um Ihr eigenes Spiel zu entwerfen.Spiele handeln von Zielen, Struktur, Spiel und Spaß. Während jeder seine eigene Vorstellung davon haben wird, was "Spaß" sein könnte, kann jeder Spieleentwickler die Freude der Spieler maximieren, indem er bedeutungsvolle Entscheidungen anbietet, die verschiedene Risiken und Belohnungen mit sich bringen. Solche Herausforderungen, kombiniert mit Regeln und Einschränkungen, zwingen die Spieler, Hindernisse und Probleme mit verschiedenen Fähigkeiten wie Geschicklichkeit, Rätsellösung,Intelligenz und Strategie zu überwinden. Im Wesentlichen ermöglichen Spiele den Spielern, in neuen Welten voranzukommen und Probleme in einer sicheren, aber aufregenden Umgebung zu überwinden, die es ihnen ermöglicht, am Ende zu triumphieren.Genau wie das Spielen von Spielen weltweit bei allen Altersgruppen, Geschlechtern und Kulturen beliebt ist, erfreut sich auch das Game Design gleichermaßen großer Beliebtheit. Spiele können die Spieler herausfordern, den besten Zug zu machen, Rätsel zu lösen, sich im Kampf zu engagieren, Ressourcen zu verwalten und Geschichten zu erzählen. Indem man versteht, wie Zufall, Psychologie und Balance die Art und Weise beeinflussen können, wie Spiele gespielt werden, können die Leser entscheiden, welche Spielelemente am besten für ihre eigene Spielkreation geeignet sind.Ob Ihr Ziel darin besteht, Geld zu verdienen, etwas Neues zu lernen, eine soziale Aussage zu machen, eine bestehende Spielidee zu verbessern oder Ihre künstlerischen, programmierenden oder gestalterischen Fähigkeiten zu testen, kann das Game Design genauso viel Spaß machen wie das Spielen von Spielen. Indem Sie die Teile eines Spiels kennen, wie sie funktionieren, wie sie interagieren und warum sie Spaß machen, können Sie Ihr Wissen nutzen, um jede Idee in ein Spiel zu verwandeln, das andere spielen und genießen können.Wallace Wang ist der Autor von über 40 Büchern, darunter "Steal This Computer Book", "Microsoft Office For Dummies" und "Beginning iPhone Development with SwiftUI". Als begeisterter Spieleenthusiast hat er "Orbit War" entworfen, das von Steve Jackson Games veröffentlicht wurde und ein Brettspiel ist, das Satellitenkriege in der erdnahen Umlaufbahn simuliert. Er hat auch Stand-up-Comedy im Riviera Hotel & Casino in Las Vegas aufgeführt, trat in "A&E's Evening at the Improv" und dem "SiTV's Latino Laugh Festival" auf. Darüber hinaus hat er mehrere Radiosendungen in San Diego moderiert, die sich auf Politik, Comedy und Esports konzentrierten. Derzeit unterrichtet er iOS-Programmierung und Game Engine-Programmierung an der UCSD Extended Studies in San Diego.Die Erstellung einer Spielidee.- Definition einer Spielidee.- Die Anziehungskraft von Spielen.- Spielelemente des Game Designs.- Verständnis von Spielzyklen.- Zufälligkeit in Spielen.- Psychologie in Spielen.- Spielbalance.- Verständnis von Spaß.- Spaß in der Bewegung.- Spaß in Rätseln.- Spaß im Kampf.- Spaß in der Strategie.- Spaß in der Wirtschaft.- Spaß im Geschichtenerzählen.- Eine Spielidee in ein echtes Spiel umwandeln.- Prototyping.- Prototypen für Kartenspiele.- Verständnis von Spiele-Engines.- Prototypen für Spielfelder.- Prototypen für Level-Design.- Prototypen für Bewegung.- Prototypen für Kampf.- Prototypen für Ressourcenmanagement.- Prototypen für Rätsel.- Ein Spiel auf dem Markt verkaufen.
Design and Deploy Microsoft Defender for IoT
Microsoft Defender for IoT helps organizations identify and respond to threats aimed at IoT devices, increasingly becoming targets for cyberattacks. This book discusses planning, deploying, and managing your Defender for IoT system. The book is a comprehensive guide to IoT security, addressing the challenges and best practices for securing IoT ecosystems. The book starts with an introduction and overview of IoT in Azure. It then discusses IoT architecture and gives you an overview of Microsoft Defender. You also will learn how to plan and work with Microsoft Defender for IoT, followed by deploying OT Monitoring. You will go through air-gapped OT sensor management and enterprise IoT monitoring. You also will learn how to manage and monitor your Defender for IoT systems with network alerts and data. After reading this book, you will be able to enhance your skills with a broader understanding of IoT and Microsoft Defender for IoT-integrated best practices to design, deploy, and manage a secure enterprise IoT environment using Azure. What You Will Learn * Understand Microsoft security services for IoT * Get started with Microsoft Defender for IoT * Plan and design a security operations strategy for the IoT environment * Deploy security operations for the IoT environment * Manage and monitor your Defender for IoT System Who This Book Is For Cybersecurity architects and IoT engineers Chapter 1: Get Started with IoT.- Chapter 2: Develop Architecture and Strategy for IoT.- Chapter 3: Plan Microsoft Defender for IoT.- Chapter 4: Deploy Microsoft Defender for IoT.- Chapter 5: Manage and Monitor your Defender for IoT System.
Praxiseinstieg Large Language Models
Praxiseinstieg Large Language Models - Strategien und Best Practices für den Einsatz von ChatGPT und anderen LLMs, erscheint am 16.05.2024Large Language Models (LLMs) wie ChatGPT sind enorm leistungsfähig, aber auch sehr komplex. Praktikerinnen und Praktiker stehen daher vor vielfältigen Herausforderungen, wenn sie LLMs in ihre eigenen Anwendungen integrieren wollen. In dieser Einführung räumt Data Scientist und KI-Unternehmer Sinan Ozdemir diese Hürden aus dem Weg und bietet einen Leitfaden für den Einsatz von LLMs zur Lösung praktischer Probleme des Natural Language Processings.Sinan Ozdemir hat alles zusammengestellt, was Sie für den Einstieg benötigen: Schritt-für-Schritt-Anleitungen, Best Practices, Fallstudien aus der Praxis, Übungen und vieles mehr. Er stellt die Funktionsweise von LLMs vor und unterstützt Sie so dabei, das für Ihre Anwendung passende Modell und geeignete Datenformate und Parameter auszuwählen. Dabei zeigt er das Potenzial sowohl von Closed-Source- als auch von Open-Source-LLMs wie GPT-3, GPT-4 und ChatGPT, BERT und T5, GPT-J und GPT-Neo, Cohere sowie BART.Lernen Sie die Schlüsselkonzepte kennen: Transfer Learning, Feintuning, Attention, Embeddings, Tokenisierung und mehrNutzen Sie APIs und Python, um LLMs an Ihre Anforderungen anzupassenBeherrschen Sie Prompt-Engineering-Techniken wie Ausgabe-Strukturierung, Gedankenketten und Few-Shot-PromptingPassen Sie LLM-Embeddings an, um eine Empfehlungsengine mit eigenen Benutzerdaten neu zu erstellenKonstruieren Sie multimodale Transformer-Architekturen mithilfe von Open-Source-LLMsOptimieren Sie LLMs mit Reinforcement Learning from Human and AI Feedback (RLHF/RLAIF)Deployen Sie Prompts und benutzerdefinierte, feingetunte LLMs in die Cloud
Einstieg in die Suchmaschinenoptimierung
Bekommen Sie einen grundlegenden, aber umfassenden Überblick über die Arbeitsweise von Suchmaschinen und wie sie Inhalte von Websites auslesen und bewerten. Lernen Sie Möglichkeiten zur Optimierung der eigenen Website kennen und steigern Sie so die Besuchszahlen Ihrer Website. Wie optimiert man die eigene Website, um das Potenzial der Suchmaschinenoptimierung (SEO) auszuschöpfen und die Erwartungshaltung hinter der Suchanfrage so zu erfüllen, dass ein positives Nutzungserlebnis geschaffen wird? Welche Faktoren einer Website können zu einem Rankingverlust führen und sollten vermieden werden, um nicht dem Wettbewerb die bessere Position in den Suchergebnissen zu überlassen?Als selbstständiger Fachinformatiker mit dem Fokus auf Webentwicklung/IT-Beratung konzipiert und entwickelt MARK HINDERER moderne Online-Lösungen für unterschiedliche Branchen. Für seine Kunden ist er hauptsächlich Ansprechpartner, wenn es um Detailfragen und komplexere Probleme geht. Ob beim Aufbau eines neuen Onlineportals, dem Relaunch eines Onlineshops oder der Anbindung von Schnittstellen (APIs): Durch seine langjährige Erfahrung ist er tatkräftiger Sparringspartner für digitale Projekte.Einleitung.- Keine Raketenwissenschaft! Das Wichtigste, was man über Suchmaschinen wissen muss.- Wie man seine Website für Suchmaschinen optimiert.- Messen und Fehler vermeiden.- Fazit und Ausblick.
Künstliche Intelligenz im Bauwesen
Dieses Fachbuch demonstriert das Potenzial Künstlicher Intelligenz (KI) im Bauwesen. Die rasant wachsende Menge an Daten sowie die in Bauprojekten eingesetzte Hard- und Software bilden die Grundlage für projektübergreifende und vorausschauende Analysen, die u.a. durch Ansätze des maschinellen Lernens und der Robotik ermöglicht werden. Die einzelnen Beiträge dieses Buches geben einen allgemeinen Überblick über Methoden der Künstlichen Intelligenz (KI) und veranschaulichen deren Einsatz im Bauwesen anhand konkreter Anwendungsfälle aus Forschung und Praxis. KI-Methoden versprechen hier sowohl Effizienzgewinne und Fehlerreduzierung durch Automatisierung repetitiver Tätigkeiten als auch völlig neue Möglichkeiten der Entscheidungsunterstützung in Bauplanung, -ausführung und -betrieb. Die Publikation richtet sich insbesondere an Führungskräfte und Fachexperten der Bauwirtschaft, die mit KI-Methoden eine nachhaltige Verbesserung ihrer Unternehmensprozesse erreichen wollen. Grundlagen.- Künstliche Intelligenz in der Bauplanung.- Künstliche Intelligenz in der Bauausführung.-Künstliche Intelligenz im Betrieb.- Robotik in der Bauwirtschaft.