Catalogue - page 1

Affiche du document No-code -2e édition

No-code -2e édition

Alexis Kovalenko

2h01min30

  • Informatique
  • Livre epub
  • Livre lcp
162 pages. Temps de lecture estimé 2h01min.
Les technologies no-code ont récemment atteint un niveau de maturité qui en font une vraie alternative au développement Web traditionnel. Comme dans tout mouvement émergent, il est difficile de faire la part des choses entre l'offre qui est en train de naître et les messages que peuvent véhiculer les acteurs du secteur. Développer des sites ou applis en exploitant le no-code est également déontologique. Le but est de se réapproprier les moyens de production numérique (relocalisation, "déGAFAïsation", etc.). Afin de permettre au lecteur d'évoluer et de suivre la tendance, l'objectif de l'ouvrage est également de partager les conseils pratiques des auteurs et les meilleurs outils pour avoir une approche contenant un fort versant de "productivité". Tout ceci en illustrant l'ouvrage de cas concrets et de mises en oeuvre pratique. Cette nouvelle édition est enrichie et mise à jour de nouveaux exemples concrets de Nocode. Avant-proposPARTIE 1 - LE NO-CODE, QU’EST-CE QUE C’EST ?1 Émergence du no-code2 Panorama de projets réalisés sans coder3 Qu’est-ce qu’un outil no-code ?4 Histoire et origines techniques du no-code PARTIE 2 - EXISTE-T-IL UN MOUVEMENT NO-CODE ?5 Mouvement et communautés6 Une variété d’approches et d’attitudes PARTIE 3 COMMENT BIEN PRATIQUER LE NO-CODE ?7 Lancer des projets numériques sans coder8 Organiser, collaborer et automatiser en mode no-code ops9 Implémenter Conclusion
Accès libre
Affiche du document Cracking the Data Code

Cracking the Data Code

Richard C. Robinson

1h15min00

  • Informatique
  • Youscribe plus
  • Livre epub
  • Livre lcp
100 pages. Temps de lecture estimé 1h15min.
Why do we continue to struggle with data? With all the powerful tools we have in processing power, data tools, and computer programming, we still search for some elusive truth to pervasive problems. AI hallucinates, 'good data' that we started with is suddenly unintelligible, systems that should talk to each other seamlessly continually experience errors and need correction.What we fail to incorporate into our data world is the fact that data is language and has entwined in that language its own code that does not get captured in databases, APIs, LLMs and the systems we use day in and day out. So, how can we crack this data code?By stepping back, we can incorporate the tools that already exist in applied linguistics used to crack the human language code into our approaches in how we tackle the data code challenge. Just because we call it data doesn’t mean that it doesn’t suffer from bias or the need for context. But by recognizing these linguistic challenges, and infusing that inside the data, we can create data code that can be cracked, data that tells us its biases, context, and purpose, and for who that data is actually useful to, and for whom it is not.If you are interested in data, and why understanding language and jargon can help you crack the data code, this book is for you. If you’ve had a data challenge and have struggled to find a way to understand it, the practical foundational principles inside can help you frame your problem in a different way. And in doing so, help you crack the data code.
Accès libre
Affiche du document AI in the Boardroom

AI in the Boardroom

Tom Petro

1h43min30

  • Informatique
  • Youscribe plus
  • Livre epub
  • Livre lcp
138 pages. Temps de lecture estimé 1h43min.
Why Every Corporate Leader Needs This Book to Master AI GovernanceAI is reshaping industries faster than most leadership teams can adapt. Companies with strong digital and AI capabilities are outperforming peers by two to six times in Total Shareholder Return. The gap is widening as leaders compound their advantages, making it increasingly difficult for others to keep pace. Without proper governance, directors expose their organizations to costly failures. AI in the Boardroom equips leaders with the frameworks and tools to harness AI’s potential responsibly, drive innovation, and avoid costly missteps.This book provides:An essential guide to the twelve foundational AI techniques with real-world commercial applications that board members need to understand.Insight into why most companies are not AI-ready due to immature data governance, along with actionable strategies to close this critical gap.A comprehensive AI governance framework that addresses AI-specific risks, which often fall outside the scope of traditional ERM frameworks.Real-world use cases to inspire how AI can drive innovation and competitive advantage, showcasing the art of the possible for your organization.This is a must-read for directors, C-suite executives, and governance leaders committed to unlocking AI’s potential. Lead your organization with confidence, leveraging AI for growth while ensuring a solid governance foundation.
Accès libre
Affiche du document Quantum Cybersecurity Program Management

Quantum Cybersecurity Program Management

Gregory J. Skulmoski

1h38min15

  • Informatique
  • Youscribe plus
  • Livre epub
  • Livre lcp
131 pages. Temps de lecture estimé 1h38min.
Quantum technology interest is accelerating for two key reasons: first, quantum technologies promise transformative capabilities. Indeed, quantum computing is seen as a strategic necessity by the world’s leading economies. Second, experts unanimously agree that a cryptographically-relevant quantum computer will have the capability to break classical encryption that keeps our data and transactions private. Thus, organizations are challenged to protect their most sensitive information data and systems before a cryptographically-relevant quantum computer is accessible to hackers despite already over-burdened cybersecurity teams.Quantum Cybersecurity Program Management by Dr Greg Skulmoski and Dr Ashkan Memari is part of a series of books: Shields Up: Cybersecurity Project Management outlines a risk-based approach to cybersecurity project management including technology and process improvement projects. Cybersecurity Training: A Pathway to Readiness outlines best practices in training and instructional design to upskill the organization’s people. Quantum Cybersecurity builds upon Shields Up (technology and process) and Cybersecurity Training (people) to provide a program approach to deliver the diversity of quantum projects and initiatives organizations encounter.The authors of Quantum Cybersecurity bring together best practices found in standards and frameworks in a risk-based approach to implementing a quantum program of projects. Tailored for quantum champions, IT security architects, business leaders, project managers, digital leadership, and board members, Quantum Cybersecurity offers actionable guidance. Urgent and early adopters will find a practical guide for a quick start to their quantum projects.
Accès libre
Affiche du document Artificial Intelligence Literacy in Higher Education

Artificial Intelligence Literacy in Higher Education

Imre Fekete

1h21min45

  • Informatique
  • Youscribe plus
  • Livre epub
  • Livre lcp
109 pages. Temps de lecture estimé 1h22min.
Seeks to prepare educators and students to interact with AI responsibly and effectivelyThis book explores the concept of artificial intelligence (AI) literacy within higher education, addressing both instructors’ and students’ preparedness to engage with AI technologies responsibly and effectively. By synthesising existing frameworks and empirical studies, alongside presenting two original research studies, the book bridges theoretical foundations with practical applications tailored for modern educational contexts. Practical recommendations include methods to develop AI literacy skills, focusing on ethical awareness, technological competence, and the potential for AI to enhance teaching and learning processes. Aimed at higher education instructors, stakeholders and students, the book offers actionable insights and tools for fostering informed and critical engagement with AI, aligned with lifelong learning goals and professional development needs.Acknowledgements Foreword: What is this Book About and How is it Structured? Chapter 1. Artificial Intelligence in the Educational Arena Chapter 2. Conceptual and Theoretical Background of AI in Education Chapter 3. Previous Studies into the Application of AI in Higher Education Chapter 4. A Study into Learners’ AI Literacy Chapter 5. The Study into Instructors’ AI Literacy  Chapter 6. Tools for AI Literacy Development and Ways to Enhance Instructors’ Methodological Repertoire  Chapter 7. Conclusion and Future Directions References Appendices Index
Accès libre
Affiche du document Dopamine Fast 2.0: The Myth-Proof Method

Dopamine Fast 2.0: The Myth-Proof Method

Kenny Flink

16min30

  • Informatique
  • Youscribe plus
  • Livres audio
22 pages. Temps de lecture estimé 16min.
Scrolling, snacking, swiping, and still not satisfied? Your brain’s dopamine loop has been hijacked. Dopamine Fast 2.0 gives you a sharp two-day protocol that resets reward circuits and erases digital cravings without white-knuckle willpower. Built on updated neuroscience and myth-busting research, this method cuts through the noise of TikTok detox hacks and delivers results you can feel before the weekend ends.Inside you will complete four fast, repeatable phases:• Phase Zero – Map the triggers. A fifteen-minute audit shows exactly which apps, tabs, and habits spike your dopamine and drain your focus.• Phase One – Hard stop. A structured forty-eight hour break pulls the plug on micro hits so receptor sites can normalize.• Phase Two – Sensory swap. Targeted inputs like cold water, rhythmic breathing, and nature sound loops supply low-dose stimulus that soothes withdrawal without cramming your receptors again.• Phase Three – Smart re-entry. You will rebuild your digital diet using the Twenty-Five Percent Rule so you never rebound into binge territory.What you will learn:• Why dopamine itself is not evil and how the real villain is reward prediction error• How to combine short cold exposure and nasal breathing to spike noradrenaline, restoring alert calm in three minutes• The One-Screen Reset that drops notifications by 70 percent yet keeps essential comms live• A five-word refusal script that stops “just one quick video” suggestions from friends without sounding preachy• A minimalist tracking sheet that shows your craving curve flattening in real timeCase studies range from a coder who chopped daily phone pickups from 312 to 103 in two days, to a new parent who reclaimed deep focus work blocks despite chaotic nights. Every tactic is field tested, peer reviewed, and stripped of jargon.
Accès libre
Affiche du document Start Concurrent

Start Concurrent

Aditya Mathur

6h09min00

  • Informatique
  • Youscribe plus
  • Livre epub
  • Livre lcp
492 pages. Temps de lecture estimé 6h09min.
Multicore microprocessors are now at the heart of nearly all desktop and laptop computers. While these chips offer exciting opportunities for the creation of newer and faster applications, they also challenge students and educators. How can the new generation of computer scientists growing up with multicore chips learn to program applications that exploit this latent processing power? This unique book is an attempt to introduce concurrent programming to first-year computer science students, much earlier than most competing products.This book assumes no programming background but offers a broad coverage of Java. It includes over 150 numbered and numerous inline examples as well as more than 300 exercises categorized as "conceptual," "programming," and "experiments." The problem-oriented approach presents a problem, explains supporting concepts, outlines necessary syntax, and finally provides its solution. All programs in the book are available for download and experimentation. A substantial index of at least 5000 entries makes it easy for readers to locate relevant information.In a fast-changing field, this book is continually updated and refined. The 2014 version is the seventh "draft edition" of this volume, and features numerous revisions based on student feedback.A list of errata for this version can be found on the Purdue University Department of Computer Science website.Contents Contents Preface Acknowledgements 1 Computer Basics 1 2 Problem Solving and Programming 3 Primitive Types and Strings 4 Selection 5 Repetition 6 Arrays 7 Simple Graphical User Interfaces 8 Methods 9 Classes 10 Interfaces 11 Inheritance 12 Exceptions 13 Concurrent Programming 14 Synchronization 15 Constructing Graphical User Interfaces 16 Testing and Debugging 17 Polymorphism 18 Dynamic Data Structures 19 Recursion 20 File I/O 21 Network Communication Index
Accès libre
Affiche du document Research Data Management

Research Data Management

3h09min45

  • Informatique
  • Youscribe plus
  • Livre epub
  • Livre lcp
253 pages. Temps de lecture estimé 3h10min.
It has become increasingly accepted that important digital data must be retained and shared in order to preserve and promote knowledge, advance research in and across all disciplines of scholarly endeavor, and maximize the return on investment of public funds. To meet this challenge, colleges and universities are adding data services to existing infrastructures by drawing on the expertise of information professionals who are already involved in the acquisition, management and preservation of data in their daily jobs. Data services include planning and implementing good data management practices, thereby increasing researchers' ability to compete for grant funding and ensuring that data collections with continuing value are preserved for reuse. This volume provides a framework to guide information professionals in academic libraries, presses, and data centers through the process of managing research data from the planning stages through the life of a grant project and beyond. It illustrates principles of good practice with use-case examples and illuminates promising data service models through case studies of innovative, successful projects and collaborations.Contents Introduction to Research Data Management, by Joyce M. Ray PART 1: UNDERSTANDING THE POLICY CONTEXT 1 The Policy and Institutional Framework, by James L. Mullins 2 Data Governance: Where Technology and Policy Collide, by MacKenzie Smith PART 2: PLANNING FOR DATA MANAGEMENT 3 The Use of Life Cycle Models in Developing and Supporting Data Services, by Jake Carlson 4 Data Management Assessment and Planning Tools, by Andrew Sallans and Sherry Lake 5 Trustworthy Data Repositories: The Value and Benefits of Auditing and Certification, by Bernard F. Reilly, Jr., and Marie E. Waltz PART 3: MANAGING PROJECT DATA 6 Copyright, Open Data, and the Availability-Usability Gap: Challenges, Opportunities, and Approaches for Libraries, by Melissa Levine 7 Metadata Services, by Jenn Riley 8 Data Citation: Principles and Practice, by Jan Brase, Yvonne Socha, Sarah Callaghan, Christine L. Borgman, Paul F. Uhlir, and Bonnie Carroll PART 4: ARCHIVING AND MANAGING RESEARCH DATA IN REPOSITORIES 9 Assimilating Digital Repositories Into the Active Research Process, by Tyler Walters 10 Partnering to Curate and Archive Social Science Data, by Jared Lyle, George Alter, and Ann Green 11 Managing and Archiving Research Data: Local Repository and Cloud-Based Practices, by Michele Kimpton and Carol Minton Morris 12 Chronopolis Repository Services, by David Minor, Brian E. C. Schottlaender, and Ardys Kozbial PART 5: MEASURING SUCCESS 13 Evaluating a Complex Project: DataONE, by Suzie Allard 14 What to Measure? Toward Metrics for Research Data Management, by Angus Whyte, Laura Molloy, Neil Beagrie, and John Houghton PART 6: BRINGING IT ALL TOGETHER: CASE STUDIES 15 An Institutional Perspective on Data Curation Services: A View from Cornell University, by Gail Steinhart 16 Purdue University Research Repository: Collaborations in Data Management, by D. Scott Brandt 17 Data Curation for the Humanities: Perspectives From Rice University, by Geneva Henry 18 Developing Data Management Services for Researchers at the University of Oregon, by Brian Westra CLOSING REFLECTIONS: LOOKING AHEAD 19 The Next Generation of Challenges in the Curation of Scholarly Data, by Clifford Lynch About the Contributors Index
Accès libre
Affiche du document The AI Dilemma

The AI Dilemma

Juliette Powell

1h15min00

  • Informatique
  • Youscribe plus
  • Livre epub
  • Livre lcp
100 pages. Temps de lecture estimé 1h15min.
The misuse of AI has led to wrongful arrests, denial of medical care, even genocide-this book offers 7 powerful principles that business can use now to end the harm.AI holds incredible promise to improve virtually every aspect of our lives, but we can't ignore its risks, mishaps and misuses. Juliette Powell and Art Kleiner offer seven principles for ensuring that machine learning supports human flourishing. They draw on Powell's research at Columbia University and use a wealth of real-world examples. Four principles relate to AI systems themselves. Human risk must be rigorously determined and consciously included in any design process. AI systems must be understandable and transparent to any observer, not just the engineers working on them. People must be allowed to protect and manage their personal data. The biases embedded in AI must be confronted and reduced. The final three principles pertain to the organizations that create AI systems. There must be procedures in place to hold them accountable for negative consequences. Organizations need to be loosely structured so that problems in one area can be isolated and resolved before they spread and sabotage the whole system. Finally, there must be psychological safety and creative friction, so that anyone involved in software development can bring problems to light without fear of reprisal. Powell and Kleiner explore how to implement each principle, citing current best practices, promising new developments, and sobering cautionary tales. Incorporating the perspectives of engineers, businesspeople, government officials, and social activists, this book will help us realize the unprecedented benefits and opportunities AI systems can provide.
Accès libre
Affiche du document The Autonomous Revolution

The Autonomous Revolution

William H. Davidow

1h49min30

  • Informatique
  • Youscribe plus
  • Livre epub
  • Livre lcp
146 pages. Temps de lecture estimé 1h49min.
The coauthors of the seminal book The Virtual Corporation describe how the rise of artificial intelligence and virtual environments are ushering in an epic cultural transformation—and how we can thrive in this new era.The coauthors of the seminal book The Virtual Corporation describe how the rise of artificial intelligence and virtual environments are ushering in an epic cultural transformation—and how we can thrive in this new era.We are at the dawn of the Autonomous Revolution, a turning point in human history as decisive as the Agricultural and Industrial Revolutions. More and more, AI-based machines are replacing human beings, and online environments are gathering our data and using it to manipulate us. This loss of human autonomy amounts to nothing less than a societal phase change, a fundamental paradigm shift. The same institutions will remain—schools, banks, churches, and corporations—but they will radically change form, obey new rules, and use new tools. William H. Davidow and Michael S. Malone go deeply into the enormous implications of these developments. They show why increases in productivity no longer translate into increases in the GDP and how zero cost, one-to-many communications have been turned into tools for cybercrime and propaganda. Many of the book's recommendations—such as using taxes to control irresponsible internet behavior and enabling people to put their data into what are essentially virtual personal information “safety deposit boxes”—are bold and visionary, but we must figure out how we will deal with these emerging challenges now, before the Autonomous Revolution overcomes us.
Accès libre
Affiche du document There's No Such Thing as an IT Project

There's No Such Thing as an IT Project

Bob Lewis

1h21min00

  • Informatique
  • Youscribe plus
  • Livre epub
  • Livre lcp
108 pages. Temps de lecture estimé 1h21min.
Learn how to stop pouring vast sums of money into technology projects that don’t have a lasting impact by closing the communication gap between IT and leadership.Learn how to stop pouring vast sums of money into technology projects that don't have a lasting impact by closing the communication gap between IT and leadership.Too many businesses miss opportunity after opportunity to design, plan, and achieve intentional business change. Why? Because they charter projects focused on delivering software products: IT projects. But as this groundbreaking book points out, there's no such thing as an IT project—or at least there shouldn't be. It's always about intentional business change, or what's the point?It's time to stop providing simplistic, one-dimensional, all-you-gotta-do panaceas. When the only constant in business is change, truly useful IT has to help you change instead of build solutions that are obsolete even before they are completed. IT consultant Bob Lewis, author of the bestselling Bare Bones Project Management, has joined forces with seasoned CIO Dave Kaiser to give you the tools you need. It's a multidimensional, relentlessly practical guide. Condensed to handbook length and seasoned with Lewis's trademark sardonic humor, it's an enjoyable and digestible read as well.Lewis and Kaiser take you step by step through the process of building a collaboration between IT and the rest of the business that really works. Insisting on intentional business change takes patience, communication, and courage, but it has a huge payoff. More to the point, insist on anything else and every penny you spend will be a wasted dime and a waste of time.
Accès libre
Affiche du document The Inside Guide to the Federal IT Market

The Inside Guide to the Federal IT Market

David Perera

2h37min30

  • Informatique
  • Youscribe plus
  • Livre epub
  • Livre lcp
210 pages. Temps de lecture estimé 2h37min.
Unlock the Door to the Federal IT MarketplaceHere's your key to selling IT goods and services to the government. David Perera and Steve Charles present the ins and outs of successfully competing for—and winning—a share of the tens of billions of dollars the federal government spends each year on IT. Getting a piece of that business is not easy—it takes accurate knowledge of systems and procedures, as well as sharp insight into the structure and details of government procurement.The Inside Guide to the Federal IT Market penetrates the haze of jargon and apparent complexity to reveal the inner workings of the IT contracting process. Whether you're just setting out or seek a bigger share, this comprehensive book provides valuable information you can put to immediate use. The Inside Guide to the Federal IT Market covers:• Technology standards• Basic contracting concepts• Advanced contracting concepts, such as getting on and staying on the GSA schedules• The effect of the federal budget process on the sales cycle• What you need to know about ethics to earn business fairly, without avoidable delays and hassleThis book's focus on the IT market makes it a unique reference on federal procurement for private companies. Government procurement personnel will also find the depth and breadth of coverage useful in reviewing and evaluating IT offerings.
Accès libre

...

x Cacher la playlist

Commandes > x
     

Aucune piste en cours de lecture

 

 

--|--
--|--
Activer/Désactiver le son