Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Business Models for the Data Economy
You're sitting on a pile of interesting data. How do you transform that into money? It's easy to focus on the contents of the data itself, and to succumb to the (rather unimaginative) idea of simply collecting and reselling it in raw form. While that's certainly profitable right now, you'd do well to explore other opportunities ...
Paris Bride
In July 1905, in Paris, a young Anglo-French woman called Marie Wheeler became the bride of a Swiss émigré, Johannes Schad. Immediately after the wedding, Marie and Johannes moved to London. And there they lived for nineteen years. In 1924, however, something happened to change their lives, and Marie, in many respects, simply disappeared. Pari...
Python Data Science Handbook
For many researchers, Python is a first-class tool mainly because of its libraries for storing, manipulating, and gaining insight from data. Several resources exist for individual pieces of this data science stack, but only with the Python Data Science Handbook do you get them all - IPython, NumPy, Pandas, Matplotlib, Scikit-Learn, and other relate...
Git Internals
It took me a pretty long time to really get Git. As I've continued to use Git more and more where I work, I've found myself trying to teach people what it is and why we use it over and over again, and the reality is that Git generally has a pretty steep learning curve compared to many other systems. I've seen case after case of devel...
HackSpace Magazine: Issue 55
There's a huge range of computer-controlled machines used by makers - 3D printers, laser cutters, CNC mills and more - but the plotter is the easiest to make. This makes it a great build for getting started in the world of computer-controlled machines. For around £15 you can create your own drawing machine with our guide. - Learn how hydra...
.NET Performance Testing and Optimization
As we develop the applications to meet current and future needs, it is only natural to use current best practices and techniques for our designs and implementations. In the quest to improve how we develop, we can access a true wealth of information which is available on design patterns, object-oriented analysis, low-level code techniques and langua...
Sensing Absence: How to See What Isn't There in the Study of Science and Security
This is a chapter from Absence in Science, Security and Policy edited by Brian Rappert and Brian Balmer. Part reflection on the forthcoming chapters, part analysis of academic literature, and part programmatic agenda setting, this introduction chapter forwards the importance of questioning taken for granted assumptions in sensing what is absent as ...
Cultural Heritage in a Changing World
The central purpose of this collection of essays is to make a creative addition to the debates surrounding the cultural heritage domain. In the 21st century the world faces epochal changes which affect every part of society, including the arenas in which cultural heritage is made, held, collected, curated, exhibited, or simply exists. The book is a...
Scaling a Software Business
Software has changed the rules of the game. The world talks about the digitalization in industry and society – how the focus has shifted from producing tangible things towards software and services. This trend started many years ago, but is now affecting every company, whether it's a software company or not. There are many companies that hav...
Model-Based Demography
Late in a career of more than sixty years, Thomas Burch, an internationally known social demographer, undertook a wide-ranging methodological critique of demography. This open access volume contains a selection of resulting papers, some previously unpublished, some published but not readily accessible [from past meetings of The International Union...
The Ethics of Vaccination
This book discusses individual, collective, and institutional responsibilities with regard to vaccination from the perspective of philosophy and public health ethics. It addresses the issue of what it means for a collective to be morally responsible for the realisation of herd immunity and what the implications of collective responsibility are for ...
Reconsidering Constitutional Formation I National Sovereignty
Legal studies and consequently legal history focus on constitutional documents, believing in a nominalist autonomy of constitutional semantics.Reconsidering Constitutional Formation in the late 18th and 19th century, kept historic constitutions from being simply log-books for political experts through a functional approach to the interdependencies ...
Integrated Groundwater Management
The aim of this book is to document for the first time the dimensions and requirements of effective integrated groundwater management (IGM). Groundwater management is a formidable challenge, one that remains one of humanity's foremost priorities. It has become a largely non-renewable resource that is overexploited in many parts of the world. I...
S-BPM Illustrated
S-BPM stands for "subject-oriented business process management" and focuses on subjects that represent the entities (people, programs etc.) that are actively engaged in processes. S-BPM has become one of the most widely discussed approaches for process professionals. Its potential particularly lies in the integration of advanced informati...
International Reflections on the Netherlands Didactics of Mathematics
This book, inspired by the ICME 13 Thematic Afternoon on "European Didactic Traditions", takes readers on a journey with mathematics education researchers, developers and educators in eighteen countries, who reflect on their experiences with Realistic Mathematics Education (RME), the domain-specific instruction theory for mathematics educ...
Physical (A)Causality
This book addresses the physical phenomenon of events that seem to occur spontaneously and without any known cause. These are to be contrasted with events that happen in a (pre-)determined, predictable, lawful, and causal way. All our knowledge is based on self-reflexive theorizing, as well as on operational means of empirical perception. Some of ...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do co...
Rethinking the Internet of Things
Rethinking the Internet of Things was a 2014 Jolt Award Finalist, the highest honor for a programming book. And the amazing part is that there is no code in the book. Over the next decade, most devices connected to the Internet will not be used by people in the familiar way that personal computers, tablets and smart phones are. Billions of inter...
Purpose-driven Organizations
Symbolising the motivations of our actions and efforts, it reflects something much more aspirational and contributes to our global society. This book offers novel solutions to ensure employees support a wider organizational meaning whilst guaranteeing that the company benefits from the employee's individual sense of purpose. Advocating a shift...
The Challenge of Chance
This book presents a multidisciplinary perspective on chance, with contributions from distinguished researchers in the areas of biology, cognitive neuroscience, economics, genetics, general history, law, linguistics, logic, mathematical physics, statistics, theology and philosophy. The individual chapters are bound together by a general introductio...
Interdisciplinary Perspectives on Mortality and its Timings
This volume provides a series of illuminating perspectives on the timings of death, through in-depth studies of Shakespearean tragedy, criminal execution, embalming practices, fears of premature burial, rumours of Adolf Hitler's survival, and the legal concept of brain death. In doing so, it explores a number of questions, including: how do we...
Graph Databases For Beginners
Whether you're a business executive or a seasoned developer, something has led you on the quest to learn more about graphs - and what they can do for you. This ebook will take those new to the world of graphs through the basics of graph technology, including: Using the intuitive Cypher query language; The importance of data relationships; K...
Innovation, Economic Development, and Intellectual Property in India and China
This book analyses intellectual property and innovation governance in the development of six key industries in India and China. These industries are reflective of the innovation and economic development of the two economies, or of vital importance to them: the IT Industry, the film industry, the pharmaceutical industry, plant varieties and food sec...
Bioimage Data Analysis Workflows
This Open Access textbook provides students and researchers in the life sciences with essential practical information on how to quantitatively analyze data images. It refrains from focusing on theory, and instead uses practical examples and step-by step protocols to familiarize readers with the most commonly used image processing and analysis platf...
Performance Tuning with SQL Server Dynamic Management Views
Dynamic Management Views (DMVs) are a significant and valuable addition to the DBA's troubleshooting armory, laying bare previously unavailable information regarding the under-the-covers activity of your database sessions and transactions. Why, then, aren't all DBAs using them? Why do many DBAs continue to ignore them in favour of &quo...
Producing Open Source Software
The corporate market is now embracing free, "open source" software like never before, as evidenced by the recent success of the technologies underlying LAMP (Linux, Apache, MySQL, and PHP). Each is the result of a publicly collaborative process among numerous developers who volunteer their time and energy to create better software. The...
CS Unplugged
Computers are everywhere. We all need to learn how to use them, and many of us use them every day. But how do they work? How do they think? And how can people write software that is fast and easy to use? Computer science is a fascinating subject that explores these very questions. The easy and fun activities in this book, designed for studentren of...
Electromagnetics, Volume 1
Electromagnetics, volume 1 by Steven W. Ellingson is a 225-page, peer-reviewed open educational resource intended for electrical engineering students in the third year of a bachelor of science degree program. It is intended as a primary textbook for a one-semester first course in undergraduate engineering electromagnetics. The book employs the &quo...
Electromagnetics, Volume 2
Electromagnetics, volume 2 by Steven W. Ellingson is a 216-page peer-reviewed open textbook designed especially for electrical engineering students in the third year of a bachelor of science degree program. It is intended as the primary textbook for the second semester of a two-semester undergraduate engineering electromagnetics sequence. The book ...
GIS Succinctly
Geographic information systems (GIS) use a complex mix of cartography, statistical analysis, and database technology to provide everything from web-based interfaces, such as Bing Maps and Google Maps, to tracking applications for delivery services. With GIS Succinctly, author Peter Shaw guides you through it all, starting with a detailed examinatio...
An Introduction to Matlab and Mathcad
This free book, or really a "coursebook" for a college freshman-level class, has been updated for Spring 2014 and provides an introduction to programming and problem solving using both Matlab and Mathcad. We provide a balanced selection of introductory exercises and real-world problems (i.e. no "contrived" problems). We include ...
SQL Server Backup and Restore
In this book, you'll discover how to perform each of these backup and restore operations using SQL Server Management Studio (SSMS), basic T-SQL scripts and Redgate's SQL Backup tool. Capturing backups using SSMS or simple scripts is perfectly fine for one-off backup operations, but any backups that form part of the recovery strategy for a...

1 2 3