John Moore Techtarget

Advertisement



  john moore techtarget: Hyperautomation Matt Calkins, Neil Ward-Dutton, George Westerman, Lakshmi N, Sidney Fernandes, Alice Wei, Chris Skinner, Isaac Sacolick, John Rymer, Lisa Heneghan, Darren Blake, Rob Galbraith, Ron Tolido, Michael Beckley, 2020-11-20 HYPERAUTOMATION is a collection of expert essays on low-code development and the future of business process automation. In each chapter, an academic, analyst, implementer, or end-user examines different aspects of low-code and automation in the enterprise, clarifying both value and barriers through personal experiences and insights. With contributions from: Dr. George Westerman, MIT - Neil Ward-Dutton, IDC - Lakshmi N, Tata Consultancy Services - Sidney Fernandes & Alice Wei, University of South Florida - Lisa Heneghan, KPMG - Chris Skinner, FinTech expert - John R. Rymer, Forrester (Emeritus) - Isaac Sacolick, StarCIO - Darren Blake, Bexley Neighbourhood Care - Rob Galbraith, InsureTech expert - Ron Tolido, Capgemini - Michael Beckley, Appian All proceeds from the sale of this book will be donated to Black Girls Code, an organization providing young girls of color opportunities to learn in-demand skills in technology and computer programming.
  john moore techtarget: Learn Amazon SageMaker Julien Simon, 2020-08-27 Quickly build and deploy machine learning models without managing infrastructure, and improve productivity using Amazon SageMaker’s capabilities such as Amazon SageMaker Studio, Autopilot, Experiments, Debugger, and Model Monitor Key FeaturesBuild, train, and deploy machine learning models quickly using Amazon SageMakerAnalyze, detect, and receive alerts relating to various business problems using machine learning algorithms and techniquesImprove productivity by training and fine-tuning machine learning models in productionBook Description Amazon SageMaker enables you to quickly build, train, and deploy machine learning (ML) models at scale, without managing any infrastructure. It helps you focus on the ML problem at hand and deploy high-quality models by removing the heavy lifting typically involved in each step of the ML process. This book is a comprehensive guide for data scientists and ML developers who want to learn the ins and outs of Amazon SageMaker. You’ll understand how to use various modules of SageMaker as a single toolset to solve the challenges faced in ML. As you progress, you’ll cover features such as AutoML, built-in algorithms and frameworks, and the option for writing your own code and algorithms to build ML models. Later, the book will show you how to integrate Amazon SageMaker with popular deep learning libraries such as TensorFlow and PyTorch to increase the capabilities of existing models. You’ll also learn to get the models to production faster with minimum effort and at a lower cost. Finally, you’ll explore how to use Amazon SageMaker Debugger to analyze, detect, and highlight problems to understand the current model state and improve model accuracy. By the end of this Amazon book, you’ll be able to use Amazon SageMaker on the full spectrum of ML workflows, from experimentation, training, and monitoring to scaling, deployment, and automation. What you will learnCreate and automate end-to-end machine learning workflows on Amazon Web Services (AWS)Become well-versed with data annotation and preparation techniquesUse AutoML features to build and train machine learning models with AutoPilotCreate models using built-in algorithms and frameworks and your own codeTrain computer vision and NLP models using real-world examplesCover training techniques for scaling, model optimization, model debugging, and cost optimizationAutomate deployment tasks in a variety of configurations using SDK and several automation toolsWho this book is for This book is for software engineers, machine learning developers, data scientists, and AWS users who are new to using Amazon SageMaker and want to build high-quality machine learning models without worrying about infrastructure. Knowledge of AWS basics is required to grasp the concepts covered in this book more effectively. Some understanding of machine learning concepts and the Python programming language will also be beneficial.
  john moore techtarget: Arbitration’s Age of Enlightenment? Cavinder Bull, Loretta Malintoppi, Constantine Partasides, 2023-09-12 Directly presenting the considered views of a broad cross-section of the international arbitration community, this timely collection of essays addresses the criticism of the arbitral process that has been voiced in recent years, interpreting the challenge as an invitation to enlightenment. The volume records the entire proceedings of the twenty-fifth Congress of the International Council for Commercial Arbitration (ICCA), held in Edinburgh in September 2022. Topics range from the impact of artificial intelligence to the role of international arbitration in restraining resort to unilateralism, protectionism, and nationalism. The contributors tackle such contentious issues as the following: time and cost; gender and cultural diversity; confidentiality vs. transparency; investor-State dispute settlement procedures; the proposed establishment of a permanent international investment court system; how cross-fertilisation across different disciplines may impact international arbitration; determining whether a document request seeks documents that are relevant and material to the outcome of a dispute; whether we would be better off if investment arbitration were to disappear; and implications for international arbitration of the Russian invasion of Ukraine. There is consideration of global issues that are likely to give rise to disputes in the future, including climate change, environmental protection, access to depleting water resources, energy and mining transition, and human rights initiatives. Several contributions focus on developments in specific countries (China, India) and regions (Africa, the Middle East). Arbitrators, corporate counsel, and policymakers will appreciate this opportunity to engage with current thinking on key issues in international commercial and investment arbitration, especially given the diversity of thought presented by authors from all over the world.
  john moore techtarget: Zero Trust Networks Evan Gilman, Doug Barth, 2017-06-19 The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the trusted zone is breached, access to your data center is not far behind. That’s an all-too-familiar scenario today. With this practical book, you’ll learn the principles behind zero trust architecture, along with details necessary to implement it. The Zero Trust Model treats all hosts as if they’re internet-facing, and considers the entire network to be compromised and hostile. By taking this approach, you’ll focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. Understand how perimeter-based defenses have evolved to become the broken model we use today Explore two case studies of zero trust in production networks on the client side (Google) and on the server side (PagerDuty) Get example configuration for open source tools that you can use to build a zero trust network Learn how to migrate from a perimeter-based network to a zero trust network in production
  john moore techtarget: Computer Security Fundamentals Chuck Easttom, 2012 Intended for introductory computer security, network security or information security courses. This title aims to serve as a gateway into the world of computer security by providing the coverage of the basic concepts, terminology and issues, along with practical skills. -- Provided by publisher.
  john moore techtarget: The AI Advantage Thomas H. Davenport, 2018-10-16 Cutting through the hype, a practical guide to using artificial intelligence for business benefits and competitive advantage. In The AI Advantage, Thomas Davenport offers a guide to using artificial intelligence in business. He describes what technologies are available and how companies can use them for business benefits and competitive advantage. He cuts through the hype of the AI craze—remember when it seemed plausible that IBM's Watson could cure cancer?—to explain how businesses can put artificial intelligence to work now, in the real world. His key recommendation: don't go for the “moonshot” (curing cancer, or synthesizing all investment knowledge); look for the “low-hanging fruit” to make your company more efficient. Davenport explains that the business value AI offers is solid rather than sexy or splashy. AI will improve products and processes and make decisions better informed—important but largely invisible tasks. AI technologies won't replace human workers but augment their capabilities, with smart machines to work alongside smart people. AI can automate structured and repetitive work; provide extensive analysis of data through machine learning (“analytics on steroids”), and engage with customers and employees via chatbots and intelligent agents. Companies should experiment with these technologies and develop their own expertise. Davenport describes the major AI technologies and explains how they are being used, reports on the AI work done by large commercial enterprises like Amazon and Google, and outlines strategies and steps to becoming a cognitive corporation. This book provides an invaluable guide to the real-world future of business AI. A book in the Management on the Cutting Edge series, published in cooperation with MIT Sloan Management Review.
  john moore techtarget: Driving Digital Isaac Sacolick, 2017-08-24 Every organization makes plans for updating products, technologies, and business processes. But that’s not enough anymore for the twenty-first-century company. The race is now on for everyone to become a digital enterprise. For those individuals who have been charged with leading their company’s technology-driven change, the pressure is intense while the correct path forward unclear. Help has arrived! In Driving Digital, author Isaac Sacolick shares the lessons he’s learned over the years as he has successfully spearheaded multiple transformations and helped shape digital-business best practices. Readers no longer have to blindly trek through the mine field of their company’s digital transformation. In this thoroughly researched one-stop manual, learn how to: • Formulate a digital strategy • Transform business and IT practices • Align development and operations • Drive culture change • Bolster digital talent • Capture and track ROI • Develop innovative digital practices • Pilot emerging technologies • And more! Your company cannot avoid the digital disruption heading its way. The choice is yours: Will this mean the beginning of the end for your business, or will your digital practices be what catapults you into next-level success?
  john moore techtarget: Cloud Computing John W. Rittinghouse, James F. Ransome, 2016-04-19 Cloud Computing: Implementation, Management, and Security provides an understanding of what cloud computing really means, explores how disruptive it may become in the future, and examines its advantages and disadvantages. It gives business executives the knowledge necessary to make informed, educated decisions regarding cloud initiatives. The authors first discuss the evolution of computing from a historical perspective, focusing primarily on advances that led to the development of cloud computing. They then survey some of the critical components that are necessary to make the cloud computing paradigm feasible. They also present various standards based on the use and implementation issues surrounding cloud computing and describe the infrastructure management that is maintained by cloud computing service providers. After addressing significant legal and philosophical issues, the book concludes with a hard look at successful cloud computing vendors. Helping to overcome the lack of understanding currently preventing even faster adoption of cloud computing, this book arms readers with guidance essential to make smart, strategic decisions on cloud initiatives.
  john moore techtarget: The Cybersecurity Manager's Guide Todd Barnum, 2021-03-18 If you're a leader in Cybersecurity, then you know it often seems like no one cares about--or understands--information security. Infosec professionals struggle to integrate security into their companies. Most are under resourced. Most are at odds with their organizations. There must be a better way. This essential manager's guide offers a new approach to building and maintaining an information security program that's both effective and easy to follow. Author and longtime infosec leader Todd Barnum upends the assumptions security professionals take for granted. CISOs, CSOs, CIOs, and IT security professionals will learn a simple seven-step process that will help you build a new program or improve your current program. Build better relationships with IT and other teams within your organization Align your role with your company's values, culture, and tolerance for information loss Lay the groundwork for your security program Create a communications program to share your team's contributions and educate your coworkers Transition security functions and responsibilities to other teams Organize and build an effective infosec team Measure your progress with two key metrics: your staff's ability to recognize and report security policy violations and phishing emails.
  john moore techtarget: Windows NT Server 4 For Dummies Ed Tittel, Mary T. Madden, James M. Stewart, 1999-03-11 Become the master of your own domain -- and your Windows NT Server 4 network -- with the practical, plain-English advice and insider tricks you'll discover inside Windows NT Server 4 For Dummies. This unbeatable sourcebook delivers all the information you need to set up and maintain an NT network for a big company, a small business, and anything in between. Windows NT Server 4 For Dummies takes you straight to the heart of the NT Server environment and covers everything from installation to optimization. Install and configure Windows NT Server 4 software quickly and painlessly; situate servers, hubs, and other important hardware; make the necessary cable and interface connections that enable computers to communicate with each other; and mix and match network topologies to suit your own unique needs. Manage users, groups, shares, and backups in a networked environment, troubleshoot your systems when things go bad, and mediate hardware conflicts with the smart advice that authors Ed Tittel, Mary Madden, and James Michael Stewart bring to your aid.
  john moore techtarget: Real-Time Systems Design and Analysis Phillip A. Laplante, 1997 IEEE Press is pleased to bring you this Second Edition of Phillip A. Laplante's best-selling and widely-acclaimed practical guide to building real-time systems. This book is essential for improved system designs, faster computation, better insights, and ultimate cost savings. Unlike any other book in the field, REAL-TIME SYSTEMS DESIGN AND ANALYSIS provides a holistic, systems-based approach that is devised to help engineers write problem-solving software. Laplante's no-nonsense guide to real-time system design features practical coverage of: Related technologies and their histories Time-saving tips * Hands-on instructions Pascal code Insights into decreasing ramp-up times and more!
  john moore techtarget: Performance Dashboards Wayne W. Eckerson, 2005-10-27 Tips, techniques, and trends on how to use dashboard technology to optimize business performance Business performance management is a hot new management discipline that delivers tremendous value when supported by information technology. Through case studies and industry research, this book shows how leading companies are using performance dashboards to execute strategy, optimize business processes, and improve performance. Wayne W. Eckerson (Hingham, MA) is the Director of Research for The Data Warehousing Institute (TDWI), the leading association of business intelligence and data warehousing professionals worldwide that provide high-quality, in-depth education, training, and research. He is a columnist for SearchCIO.com, DM Review, Application Development Trends, the Business Intelligence Journal, and TDWI Case Studies & Solution.
  john moore techtarget: Cyber Security Engineering Nancy R. Mead, Carol Woody, 2016-11-07 Cyber Security Engineering is the definitive modern reference and tutorial on the full range of capabilities associated with modern cyber security engineering. Pioneering software assurance experts Dr. Nancy R. Mead and Dr. Carol C. Woody bring together comprehensive best practices for building software systems that exhibit superior operational security, and for considering security throughout your full system development and acquisition lifecycles. Drawing on their pioneering work at the Software Engineering Institute (SEI) and Carnegie Mellon University, Mead and Woody introduce seven core principles of software assurance, and show how to apply them coherently and systematically. Using these principles, they help you prioritize the wide range of possible security actions available to you, and justify the required investments. Cyber Security Engineering guides you through risk analysis, planning to manage secure software development, building organizational models, identifying required and missing competencies, and defining and structuring metrics. Mead and Woody address important topics, including the use of standards, engineering security requirements for acquiring COTS software, applying DevOps, analyzing malware to anticipate future vulnerabilities, and planning ongoing improvements. This book will be valuable to wide audiences of practitioners and managers with responsibility for systems, software, or quality engineering, reliability, security, acquisition, or operations. Whatever your role, it can help you reduce operational problems, eliminate excessive patching, and deliver software that is more resilient and secure.
  john moore techtarget: Cloud Security Ronald L. Krutz, Russell Dean Vines, 2010-08-31 Well-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces. The authors offer you years of unparalleled expertise and knowledge as they discuss the extremely challenging topics of data ownership, privacy protections, data mobility, quality of service and service levels, bandwidth costs, data protection, and support. As the most current and complete guide to helping you find your way through a maze of security minefields, this book is mandatory reading if you are involved in any aspect of cloud computing. Coverage Includes: Cloud Computing Fundamentals Cloud Computing Architecture Cloud Computing Software Security Fundamentals Cloud Computing Risks Issues Cloud Computing Security Challenges Cloud Computing Security Architecture Cloud Computing Life Cycle Issues Useful Next Steps and Approaches
  john moore techtarget: The Ethics of Cybersecurity Markus Christen, Bert Gordijn, Michele Loi, 2020-02-10 This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.
  john moore techtarget: Internet of Things From Hype to Reality Ammar Rayes, Samer Salam, 2016-10-22 This book comprehensively describes an end-to-end Internet of Things (IoT) architecture that is comprised of devices, network, compute, storage, platform, applications along with management and security components. It is organized into five main parts, comprising of a total of 11 chapters. Part I presents a generic IoT reference model to establish a common vocabulary for IoT solutions. This includes a detailed description of the Internet protocol layers and the Things (sensors and actuators) as well as the key business drivers to realize the IoT vision. Part II focuses on the IoT requirements that impact networking protocols and provides a layer-by-layer walkthrough of the protocol stack with emphasis on industry progress and key gaps. Part III introduces the concept of Fog computing and describes the drivers for the technology, its constituent elements, and how it relates and differs from Cloud computing. Part IV discusses the IoT services platform, the cornerstone of the solution followed by the Security functions and requirements. Finally, Part V provides a treatment of the topic of connected ecosystems in IoT along with practical applications. It then surveys the latest IoT standards and discusses the pivotal role of open source in IoT. “Faculty will find well-crafted questions and answers at the end of each chapter, suitable for review and in classroom discussion topics. In addition, the material in the book can be used by engineers and technical leaders looking to gain a deep technical understanding of IoT, as well as by managers and business leaders looking to gain a competitive edge and understand innovation opportunities for the future.” Dr. Jim Spohrer, IBM “This text provides a very compelling study of the IoT space and achieves a very good balance between engineering/technology focus and business context. As such, it is highly-recommended for anyone interested in this rapidly-expanding field and will have broad appeal to a wide cross-section of readers, i.e., including engineering professionals, business analysts, university students, and professors.” Professor Nasir Ghani, University of South Florida
  john moore techtarget: Management Information Systems Kenneth C. Laudon, Jane Price Laudon, 2004 Management Information Systems provides comprehensive and integrative coverage of essential new technologies, information system applications, and their impact on business models and managerial decision-making in an exciting and interactive manner. The twelfth edition focuses on the major changes that have been made in information technology over the past two years, and includes new opening, closing, and Interactive Session cases.
  john moore techtarget: The Security Development Lifecycle Michael Howard, With Expert Insights, This Introduction To The Security Development Lifecycle (Sdl) Provides You With A History Of The Methodology And Guides You Through Each Stage Of The Proven Process From Design To Release That Helps Minimize Security Defects. The So
  john moore techtarget: A Guide to Assessing Needs Ryan Watkins, Maurya West Meiers, Yusra Visser, 2012-01-06 Making informed decisions is the essential beginning to any successful development project. Before the project even begins, you can use needs assessment approaches to guide your decisions. This book is filled with practical strategies that can help you define the desired results and select the most appropriate activities for achieving them.
  john moore techtarget: Knowledge Management in the Public Sector David E McNabb, 2015-01-28 This comprehensive text introduces public management students and government and nonprofit administrators to the principles and practices of Knowledge Management. The first book to focus exclusively on knowledge management techniques in government agencies, it covers such important concepts as collecting, categorizing, processing, distributing, and archiving critical organization data and information - and then converting and disseminating these resources to all who need to share in the organizational knowledge. Written in an easy-to-read, non-technical style, the book includes a thorough review of the current literature in the field as well as a comprehensive presentation of Knowledge Management techniques. Extensive illustrations, models, checklists, and instructions lead readers through the steps involved in instituting KM programs in government and non-profit agencies.
  john moore techtarget: Trust and Transparency in an Age of Surveillance Lora Anne Viola, Paweł Laidler, 2021-11-29 Investigating the theoretical and empirical relationships between transparency and trust in the context of surveillance, this volume argues that neither transparency nor trust provides a simple and self-evident path for mitigating the negative political and social consequences of state surveillance practices. Dominant in both the scholarly literature and public debate is the conviction that transparency can promote better-informed decisions, provide greater oversight, and restore trust damaged by the secrecy of surveillance. The contributions to this volume challenge this conventional wisdom by considering how relations of trust and policies of transparency are modulated by underlying power asymmetries, sociohistorical legacies, economic structures, and institutional constraints. They study trust and transparency as embedded in specific sociopolitical contexts to show how, under certain conditions, transparency can become a tool of social control that erodes trust, while mistrust—rather than trust—can sometimes offer the most promising approach to safeguarding rights and freedom in an age of surveillance. The first book addressing the interrelationship of trust, transparency, and surveillance practices, this volume will be of interest to scholars and students of surveillance studies as well as appeal to an interdisciplinary audience given the contributions from political science, sociology, philosophy, law, and civil society. The Open Access version of this book, available at www.taylorfrancis.com, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.
  john moore techtarget: Information Systems John Gallaugher, 2018
  john moore techtarget: Internet of Things Qusay F. Hassan, Atta ur Rehman Khan, Sajjad A. Madani, 2017-12-15 Internet of Things: Challenges, Advances, and Applications provides a comprehensive introduction to IoT, related technologies, and common issues in the adoption of IoT on a large scale. It surveys recent technological advances and novel solutions for challenges in the IoT environment. Moreover, it provides detailed discussion of the utilization of IoT and its underlying technologies in critical application areas, such as smart grids, healthcare, insurance, and the automotive industry. The chapters of this book are authored by several international researchers and industry experts. This book is composed of 18 self-contained chapters that can be read, based on interest. Features: Introduces IoT, including its history, common definitions, underlying technologies, and challenges Discusses technological advances in IoT and implementation considerations Proposes novel solutions for common implementation issues Explores critical application domains, including large-scale electric power distribution networks, smart water and gas grids, healthcare and e-Health applications, and the insurance and automotive industries The book is an excellent reference for researchers and post-graduate students working in the area of IoT, or related areas. It also targets IT professionals interested in gaining deeper knowledge of IoT, its challenges, and application areas.
  john moore techtarget: A Decadal Survey of the Social and Behavioral Sciences National Academies of Sciences, Engineering, and Medicine, Division of Behavioral and Social Sciences and Education, Board on Behavioral, Cognitive, and Sensory Sciences, Committee on a Decadal Survey of Social and Behavioral Sciences for Applications to National Security, 2019-07-26 The primary function of the intelligence analyst is to make sense of information about the world, but the way analysts do that work will look profoundly different a decade from now. Technological changes will bring both new advances in conducting analysis and new risks related to technologically based activities and communications around the world. Because these changes are virtually inevitable, the Intelligence Community will need to make sustained collaboration with researchers in the social and behavioral sciences (SBS) a key priority if it is to adapt to these changes in the most productive ways. A Decadal Survey Of The Social and Behavioral Sciences provides guidance for a 10-year research agenda. This report identifies key opportunities in SBS research for strengthening intelligence analysis and offers ideas for integrating the knowledge and perspectives of researchers from these fields into the planning and design of efforts to support intelligence analysis.
  john moore techtarget: Distance Education for Teacher Training Hilary Perraton, 2002-03-11 Distance education, combining the use of correspondence texts, broadcasting and limited opportunities for face-to-face study, has been used in at least a hundred teacher training programmes over the last 25 years. Distance Education for Teacher Training is the first comparative review of the use of distance education and open learning for the training and upgrading of teachers. The book contains case studies using a broadly common format both to describe and analyse distance teacher training programmes in eleven countries across five continents. The case studies describe the methods used to examine how far the craft of teaching can be studied at a distance. Using a standardised microeconomic framework, they provide unique data on the comparative costs of training teachers by distance and conventional methods. The authors then draw general conclusions about the advantages and drawbacks of using distance education or open learning, about the conditions for success, and about comparative effects and costs. Distance Education for Teacher Training will be of value to all concerned with teacher education, whether in developing or industrialised countries, and to those working in and planning for distance education and open learning.
  john moore techtarget: Modern Database Management Fred R. McFadden, Jeffrey A. Hoffer, Mary B. Prescott, 1998 The fifth edition of Modern Database Management has been updated to reflect the most current database content available. It provides sound, clear, and current coverage of the concepts, skills, and issues needed to cope with an expanding organizational resource. While sufficient technical detail is provided, the emphasis remains on management and implementation issues pertinent in a business information systems curriculum. Modern Database Management, 5e is the ideal book for your database management course. *Includes coverage of today's leading database technologies: Oracle and Microsoft Access replace dBase and paradox. *Now organized to create a modern framework for a range of databases and the database development of information systems. *Expanded coverage of object-oriented techniques in two full chapters. Covers conceptual object-oriented modelling using the new Unified Modelling Language and object-oriented database development and querying using the latest ODMG standards. *Restructured to emphasize unique database issues that arise during the design of client/server applications. *Updated to reflect current developments in client/server issues including three-tiered architect
  john moore techtarget: The Promise of Assistive Technology to Enhance Activity and Work Participation National Academies of Sciences, Engineering, and Medicine, Health and Medicine Division, Board on Health Care Services, Committee on the Use of Selected Assistive Products and Technologies in Eliminating or Reducing the Effects of Impairments, 2017-09-01 The U.S. Census Bureau has reported that 56.7 million Americans had some type of disability in 2010, which represents 18.7 percent of the civilian noninstitutionalized population included in the 2010 Survey of Income and Program Participation. The U.S. Social Security Administration (SSA) provides disability benefits through the Social Security Disability Insurance (SSDI) program and the Supplemental Security Income (SSI) program. As of December 2015, approximately 11 million individuals were SSDI beneficiaries, and about 8 million were SSI beneficiaries. SSA currently considers assistive devices in the nonmedical and medical areas of its program guidelines. During determinations of substantial gainful activity and income eligibility for SSI benefits, the reasonable cost of items, devices, or services applicants need to enable them to work with their impairment is subtracted from eligible earnings, even if those items or services are used for activities of daily living in addition to work. In addition, SSA considers assistive devices in its medical disability determination process and assessment of work capacity. The Promise of Assistive Technology to Enhance Activity and Work Participation provides an analysis of selected assistive products and technologies, including wheeled and seated mobility devices, upper-extremity prostheses, and products and technologies selected by the committee that pertain to hearing and to communication and speech in adults.
  john moore techtarget: Agile 2 Cliff Berg, Kurt Cagle, Lisa Cooney, Philippa Fewell, Adrian Lander, Raj Nagappan, Murray Robinson, 2021-03-09 Agile is broken. Most Agile transformations struggle. According to an Allied Market Research study, 63% of respondents stated the failure of agile implementation in their organizations. The problems with Agile start at the top of most organizations with executive leadership not getting what agile is or even knowing the difference between success and failure in agile. Agile transformation is a journey, and most of that journey consists of people learning and trying new approaches in their own work. An agile organization can make use of coaches and training to improve their chances of success. But even then, failure remains because many Agile ideas are oversimplifications or interpreted in an extreme way, and many elements essential for success are missing. Coupled with other ideas that have been dogmatically forced on teams, such as agile team rooms, and an overall inertia and resistance to change in the Agile community, the Agile movement is ripe for change since its birth twenty years ago. Agile 2 represents the work of fifteen experienced Agile experts, distilled into Agile 2: The Next Iteration of Agile by seven members of the team. Agile 2 values these pairs of attributes when properly balanced: thoughtfulness and prescription; outcomes and outputs, individuals and teams; business and technical understanding; individual empowerment and good leadership; adaptability and planning. With a new set of Agile principles to take Agile forward over the next 20 years, Agile 2 is applicable beyond software and hardware to all parts of an agile organization including Agile HR, Agile Finance, and so on. Like the original Agile, Agile 2, is just a set of ideas - powerful ideas. To undertake any endeavor, a single set of ideas is not enough. But a single set of ideas can be a powerful guide.
  john moore techtarget: The Basics of Digital Forensics John Sammons, 2012-02-24 The Basics of Digital Forensics provides a foundation for people new to the field of digital forensics. This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Readers will also learn how to collect evidence, document the scene, and recover deleted data. This is the only resource your students need to get a jump-start into digital forensics investigations. This book is organized into 11 chapters. After an introduction to the basics of digital forensics, the book proceeds with a discussion of key technical concepts. Succeeding chapters cover labs and tools; collecting evidence; Windows system artifacts; anti-forensics; Internet and email; network forensics; and mobile device forensics. The book concludes by outlining challenges and concerns associated with digital forensics. PowerPoint lecture slides are also available. This book will be a valuable resource for entry-level digital forensics professionals as well as those in complimentary fields including law enforcement, legal, and general information security. Learn all about what Digital Forensics entails Build a toolkit and prepare an investigative plan Understand the common artifacts to look for during an exam
  john moore techtarget: Information Technology for Management Efraim Turban, Carol Pollard, Gregory Wood, 2015-06-22 Information Technology for Management by Turban, Volonino, and Wood engages students with up-to-date coverage of the most important IT trends today. Over the years, this leading IT textbook had distinguished itself with an emphasis on illustrating the use of cutting edge business technologies for achieving managerial goals and objectives. The 10th Edition continues this tradition with coverage of emerging trends in Mobile Computing and Commerce, IT virtualization, Social Media, Cloud Computing and the Management and Analysis of Big Data along with advances in more established areas of Information Technology.
  john moore techtarget: Developing Cybersecurity Programs and Policies Omar Santos, 2018-07-20 All the Knowledge You Need to Build Cybersecurity Programs and Policies That Work Clearly presents best practices, governance frameworks, and key standards Includes focused coverage of healthcare, finance, and PCI DSS compliance An essential and invaluable guide for leaders, managers, and technical professionals Today, cyberattacks can place entire organizations at risk. Cybersecurity can no longer be delegated to specialists: success requires everyone to work together, from leaders on down. Developing Cybersecurity Programs and Policies offers start-to-finish guidance for establishing effective cybersecurity in any organization. Drawing on more than 20 years of real-world experience, Omar Santos presents realistic best practices for defining policy and governance, ensuring compliance, and collaborating to harden the entire organization. First, Santos shows how to develop workable cybersecurity policies and an effective framework for governing them. Next, he addresses risk management, asset management, and data loss prevention, showing how to align functions from HR to physical security. You’ll discover best practices for securing communications, operations, and access; acquiring, developing, and maintaining technology; and responding to incidents. Santos concludes with detailed coverage of compliance in finance and healthcare, the crucial Payment Card Industry Data Security Standard (PCI DSS) standard, and the NIST Cybersecurity Framework. Whatever your current responsibilities, this guide will help you plan, manage, and lead cybersecurity–and safeguard all the assets that matter. Learn How To · Establish cybersecurity policies and governance that serve your organization’s needs · Integrate cybersecurity program components into a coherent framework for action · Assess, prioritize, and manage security risk throughout the organization · Manage assets and prevent data loss · Work with HR to address human factors in cybersecurity · Harden your facilities and physical environment · Design effective policies for securing communications, operations, and access · Strengthen security throughout the information systems lifecycle · Plan for quick, effective incident response and ensure business continuity · Comply with rigorous regulations in finance and healthcare · Plan for PCI compliance to safely process payments · Explore and apply the guidance provided by the NIST Cybersecurity Framework
  john moore techtarget: AI for Games and Animation John David Funge, 1999 John Funge introduces a new approach to creating autonomous characters. Cognitive modeling provides computer-animated characters with logic, reasoning, and planning skills. Individual chapters in the book provide concrete examples of advanced character animation, automated cinematography, and a real-time computer game. Source code, animations, images, and other resources are available at the book's website, listed below.
  john moore techtarget: The Fourth Transformation Robert Scoble, Shel Israel, 2016 Ten years from today, the center of our digital lives will no longer be the smart phone, but device that looks like ordinary eyeglasses: except those glasses will have settings for Virtual and Augmented Reality. What you really see and what is computer generated will be mixed so tightly together, that we won't really be able to tell what is real and what is illusion.Instead of touching and sliding on a mobile phone, we will make things happen by moving our eyes or by brainwaves. When we talk with someone or play an online game, we will see that person in the same room with us. We will be able to touch and feel her or him through haptic technology.We won't need to search online with words, because there will be a new Visual Web 100 times larger than the current Internet, and we will find things by images, buy things by brands, or just by looking at a logo on the jacket of a passerby. Language will be irrelevant, and a merchant in a developing world will have access to global markets.Medical devices will cure schizophrenia, allow quadriplegics to walk. People will be able to touch and feel objects and other people who are not actually there for conversations, games and perhaps intimate experiences. From Kindergarten to on-the-job, learning will become experiential. Children will visit great battlefields and tour historic places in VR rather than read about them in text books. Med students and surgeons will learn and practice on virtual humans rather than cadavers; oil rig workers will understand how to handle emergencies, before the ever leave the home office.The Fourth Transformation is based on two years of research and about 400 interviews with technologists and business decision makers. It explains the technology and product landscape on a level designed to be interesting and useful to business thinkers and general audiences. Mostly it talks about how VR and AR are already being used, or will be used in the next one-to-three years. It explains how this massive and fundamental transformation will be driven, nit just by Millennials, but by the generation following them, which the authors have named the Minecraft Generation.Robert Scoble and Shel Israel have written this book in the hope that it will serve as a business thinker's guidebook to the near-term future. They hope readers will walk away understanding the massive changes rapidly arising, so that they will navigate a successful course through the changes they will be facing sooner than they-or their competitors-- may realize just yet.
  john moore techtarget: The Fuzzy and the Techie Scott Hartley, 2018 A leading venture capitalist offers surprising revelations on who will be driving innovation in the years to come.
  john moore techtarget: The Cambridge Handbook of Surveillance Law David Gray, Stephen E. Henderson, 2019-03-21 Surveillance presents a conundrum: how to ensure safety, stability, and efficiency while respecting privacy and individual liberty. From police officers to corporations to intelligence agencies, surveillance law is tasked with striking this difficult and delicate balance. That challenge is compounded by ever-changing technologies and evolving social norms. Following the revelations of Edward Snowden and a host of private-sector controversies, there is intense interest among policymakers, business leaders, attorneys, academics, students, and the public regarding legal, technological, and policy issues relating to surveillance. This Handbook documents and organizes these conversations, bringing together some of the most thoughtful and impactful contributors to contemporary surveillance debates, policies, and practices. Its pages explore surveillance techniques and technologies; their value for law enforcement, national security, and private enterprise; their impacts on citizens and communities; and the many ways societies do - and should - regulate surveillance.
  john moore techtarget: Concepts in Enterprise Resource Planning Ellen F. Monk, Bret J. Wagner, 2013 Show your students how to master and maximize enterprise resource planning (ERP) software, which continues to become more critical in business today, with the latest edition of Monk/Wagner's successful CONCEPTS IN ENTERPRISE RESOURCE PLANNING, International Edition. Equip students to use ERP tools to increase growth and productivity as they learn how to effectively combine an organization's numerous functions into one comprehensive, integrated system. CONCEPTS IN ENTERPRISE RESOURCE PLANNING, 4E, International Edition reflects the latest trends and updates in ERP software while demonstrating how to make the most of this important technology.The authors introduce the basic functional areas of business and how they are related. The book demonstrates how information systems that are not effectively integrated fail to support business functions and business processes that extend across functional area boundaries. By contrast, students clearly see how integrated information systems help organizations improve business process and provide managers with accurate, consistent, and current data for making informed strategic decisions. All-new sidebar cases and real examples throughout this edition not only thoroughly introduce the practical aspects of enterprise resource planning, but also prepare readers for ongoing ERP success in business today and tomorrow.
  john moore techtarget: Current and Emerging Trends in Cyber Operations Frederic Lemieux, 2015-08-27 This book explores current and emerging trends in policy, strategy, and practice related to cyber operations conducted by states and non-state actors. The book examines in depth the nature and dynamics of conflicts in the cyberspace, the geopolitics of cyber conflicts, defence strategy and practice, cyber intelligence and information security.
  john moore techtarget: Artificial Intelligence in the 21st Century Stephen Lucci, Danny Kopec, 2015-12-08 This new edition provides a comprehensive, colorful, up to date, and accessible presentation of AI without sacrificing theoretical foundations. It includes numerous examples, applications, full color images, and human interest boxes to enhance student interest. New chapters on robotics and machine learning are now included. Advanced topics cover neural nets, genetic algorithms, natural language processing, planning, and complex board games. A companion DVD is provided with resources, applications, and figures from the book. Numerous instructors' resources are available upon adoption. FEATURES: * Includes new chapters on robotics and machine learning and new sections on speech understanding and metaphor in NLP * Provides a comprehensive, colorful, up to date, and accessible presentation of AI without sacrificing theoretical foundations * Uses numerous examples, applications, full color images, and human interest boxes to enhance student interest * Introduces important AI concepts e.g., robotics, use in video games, neural nets, machine learning, and more thorough practical applications * Features over 300 figures and color images with worked problems detailing AI methods and solutions to selected exercises * Includes DVD with resources, simulations, and figures from the book * Provides numerous instructors' resources, including: solutions to exercises, Microsoft PP slides, etc.
  john moore techtarget: Python for Programmers Paul Deitel, Harvey Deitel, 2019-03-15 The professional programmer’s Deitel® guide to Python® with introductory artificial intelligence case studies Written for programmers with a background in another high-level language, Python for Programmers uses hands-on instruction to teach today’s most compelling, leading-edge computing technologies and programming in Python–one of the world’s most popular and fastest-growing languages. Please read the Table of Contents diagram inside the front cover and the Preface for more details. In the context of 500+, real-world examples ranging from individual snippets to 40 large scripts and full implementation case studies, you’ll use the interactive IPython interpreter with code in Jupyter Notebooks to quickly master the latest Python coding idioms. After covering Python Chapters 1-5 and a few key parts of Chapters 6-7, you’ll be able to handle significant portions of the hands-on introductory AI case studies in Chapters 11-16, which are loaded with cool, powerful, contemporary examples. These include natural language processing, data mining Twitter® for sentiment analysis, cognitive computing with IBM® WatsonTM, supervised machine learning with classification and regression, unsupervised machine learning with clustering, computer vision through deep learning and convolutional neural networks, deep learning with recurrent neural networks, big data with Hadoop®, SparkTM and NoSQL databases, the Internet of Things and more. You’ll also work directly or indirectly with cloud-based services, including Twitter, Google TranslateTM, IBM Watson, Microsoft® Azure®, OpenMapQuest, PubNub and more. Features 500+ hands-on, real-world, live-code examples from snippets to case studies IPython + code in Jupyter® Notebooks Library-focused: Uses Python Standard Library and data science libraries to accomplish significant tasks with minimal code Rich Python coverage: Control statements, functions, strings, files, JSON serialization, CSV, exceptions Procedural, functional-style and object-oriented programming Collections: Lists, tuples, dictionaries, sets, NumPy arrays, pandas Series & DataFrames Static, dynamic and interactive visualizations Data experiences with real-world datasets and data sources Intro to Data Science sections: AI, basic stats, simulation, animation, random variables, data wrangling, regression AI, big data and cloud data science case studies: NLP, data mining Twitter®, IBM® WatsonTM, machine learning, deep learning, computer vision, Hadoop®, SparkTM, NoSQL, IoT Open-source libraries: NumPy, pandas, Matplotlib, Seaborn, Folium, SciPy, NLTK, TextBlob, spaCy, Textatistic, Tweepy, scikit-learn®, Keras and more Accompanying code examples are available here: http://ptgmedia.pearsoncmg.com/imprint_downloads/informit/bookreg/9780135224335/9780135224335_examples.zip. Register your product for convenient access to downloads, updates, and/or corrections as they become available. See inside book for more information.
  john moore techtarget: Inbound Marketing, Revised and Updated Brian Halligan, Dharmesh Shah, 2014-08-06 Attract, engage, and delight customers online Inbound Marketing, Revised and Updated: Attract, Engage, and Delight Customers Online is a comprehensive guide to increasing online visibility and engagement. Written by top marketing and startup bloggers, the book contains the latest information about customer behavior and preferred digital experiences. From the latest insights on lead nurturing and visual marketing to advice on producing remarkable content by building tools, readers will gain the information they need to transform their marketing online. With outbound marketing methods becoming less effective, the time to embrace inbound marketing is now. Cold calling, e-mail blasts, and direct mail are turning consumers off to an ever-greater extent, so consumers are increasingly doing research online to choose companies and products that meet their needs. Inbound Marketing recognizes these behavioral changes as opportunities, and explains how marketers can make the most of this shift online. This not only addresses turning strangers into website visitors, but explains how best to convert those visitors to leads, and to nurture those leads to the point of becoming delighted customers. Gain the insight that can increase marketing value with topics like: Inbound marketing – strategy, reputation, and tracking progress Visibility – getting found, and why content matters Converting customers – turning prospects into leads and leads into customers Better decisions – picking people, agencies, and campaigns The book also contains essential tools and resources that help build an effective marketing strategy, and tips for organizations of all sizes looking to build a reputation. When consumer behaviors change, marketing must change with them. The fully revised and updated edition of Inbound Marketing is a complete guide to attracting, engaging, and delighting customers online.
John 1 NIV - The Word Became Flesh - In the - Bible Gateway
John the Baptist Denies Being the Messiah. 19 Now this was John’s testimony when the Jewish leaders in Jerusalem sent priests and Levites to ask him who he was. 20 He did not fail to …

John 1 KJV - In the beginning was the Word, and the - Bible …
26 John answered them, saying, I baptize with water: but there standeth one among you, whom ye know not; 27 He it is, who coming after me is preferred before me, whose shoe's latchet I …

John 1 NLT - Prologue: Christ, the Eternal Word - In - Bible Gateway
6 God sent a man, John the Baptist, 7 to tell about the light so that everyone might believe because of his testimony. 8 John himself was not the light; he was simply a witness to tell …

John 1 NKJV - The Eternal Word - In the beginning was - Bible …
John’s Witness: The True Light. 6 There was a man sent from God, whose name was John. 7 This man came for a witness, to bear witness of the Light, that all through him might believe. 8 …

John 6 NIV - Jesus Feeds the Five Thousand - Some - Bible …
Jesus Feeds the Five Thousand - Some time after this, Jesus crossed to the far shore of the Sea of Galilee (that is, the Sea of Tiberias), and a great crowd of people followed him because they …

John 11 NIV - The Death of Lazarus - Now a man named - Bible …
The Death of Lazarus - Now a man named Lazarus was sick. He was from Bethany, the village of Mary and her sister Martha. (This Mary, whose brother Lazarus now lay sick, was the same …

John 5 NIV - The Healing at the Pool - Some time - Bible Gateway
John 5:4 Some manuscripts include here, wholly or in part, paralyzed—and they waited for the moving of the waters. 4 From time to time an angel of the Lord would come down and stir up …

John 16 NIV - “All this I have told you so that you - Bible Gateway
“All this I have told you so that you will not fall away. They will put you out of the synagogue; in fact, the time is coming when anyone who kills you will think they are offering a service to God. …

JOhn 19 NIV - Jesus Sentenced to Be Crucified - Bible Gateway
Jesus Sentenced to Be Crucified - Then Pilate took Jesus and had him flogged. The soldiers twisted together a crown of thorns and put it on his head. They clothed him in a purple robe …

John 8 NIV - but Jesus went to the Mount of Olives. - Bible Gateway
John 8:28 The Greek for lifted up also means exalted. John 8:38 Or presence. Therefore do what you have heard from the Father. John 8:39 Some early manuscripts “If you are Abraham’s …

John 1 NIV - The Word Became Flesh - In the - Bible Gateway
John the Baptist Denies Being the Messiah. 19 Now this was John’s testimony when the Jewish leaders in Jerusalem sent priests …

John 1 KJV - In the beginning was the Word, and the - Bible Gateway
26 John answered them, saying, I baptize with water: but there standeth one among you, whom ye know not; 27 He it is, who …

John 1 NLT - Prologue: Christ, the Eternal Word - In - Bible Gateway
6 God sent a man, John the Baptist, 7 to tell about the light so that everyone might believe because of his testimony. 8 John himself …

John 1 NKJV - The Eternal Word - In the beginning was - Bible Gateway
John’s Witness: The True Light. 6 There was a man sent from God, whose name was John. 7 This man came for a witness, to bear …

John 6 NIV - Jesus Feeds the Five Thousand - Some - Bible Gateway
Jesus Feeds the Five Thousand - Some time after this, Jesus crossed to the far shore of the Sea of Galilee (that is, the Sea of …