Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
34
result(s) for
"Computer software Popular works."
Sort by:
Hybrid cloud for dummies
2012
Choose the right combination of public, private, and data center resources to empower your business Hybrid clouds are transforming the way that organizations do business. This handy guide helps you find out what this new cloud deployment model is all about. You'll get down- to-earth information about cloud technology, questions to consider, and how to plan and deliver your move to a hybrid environment.
How software works : the magic behind encryption, CGI, search engines, and other everyday technologies
\"A guide for non-technical readers that explores topics like data encryption; computer graphics creation; password protection; video compression; how data is found in huge databases; how programs can work together on the same problem without conflict; and how map software finds routes.\"-- Provided by publisher.
How software works : the magic behind encryption, CGI, search engines, and other everyday technologies
2015
We use software every day to perform all kinds of magical, powerful tasks. It's the force behind stunning CGI graphics, safe online shopping, and speedy Google searches. Software drives the modern world, but its inner workings remain a mystery to many. This book explains how computers perform common-yet-amazing tasks that we take for granted every day.
The software arts
\"Software now constitutes a new form of logic, rhetoric, and grammar, a new means of thinking, arguing, and interpreting. The Software Arts argues that the foundational ideas and practices of computing come from the arts -- specifically, from a coupling of the liberal and the mechanical arts. The claim is that the software arts is a new name for something that has been ongoing for centuries: the pursuit of methods that provide us the means to invent and interrogate statements that can be or already are widely accepted as statements of connection, equivalence, or identity. The book accomplishes this by analyzing how a certain number of disciplines that were supposed to be at the heart of literacy or education in general (the famous liberal arts) are altered by their digitalization\"-- Provided by publisher.
The culture of connectivity : a critical history of social media
This book studies the rise of social media in the first decade of the twenty-first century, up until 2012. It provides both a historical and a critical analysis of the emergence of networking services in the context of a changing ecosystem of connective media. Such history is needed to understand how the intricate constellation of platforms profoundly affects our experience of online sociality. In a short period of time, services like Facebook, YouTube and many others have come to deeply penetrate our daily habits of communication and creative production. While most sites started out as amateur-driven community platforms, half a decade later they have turned into large corporations that do not just facilitate user connectedness, but have become global information and data mining companies extracting and exploiting user connectivity. Offering a dual analytical prism to examine techno-cultural as well as socio-economic aspects of social media, the author dissects five major platforms: Facebook, Twitter, Flickr, YouTube, and Wikipedia. Each of these microsystems occupies a distinct position in the larger ecosystem of connective media, and yet, their underlying mechanisms for coding interfaces, steering users, filtering content, governance and business models rely on shared ideological principles. Reconstructing the premises on which these platforms are built, this study highlights how norms for online interaction and communication gradually changed. “Sharing,” “friending,” “liking,” “following,” “trending,” and “favoriting” have come to denote online practices imbued with specific technological and economic meanings. This process of normalization is part of a larger political and ideological battle over information control in an online world where everything is bound to become “social.”
Digital literacy for dummies
2014,2015
Develop and implement essential computer technology—with confidence Do you want to develop an understanding of technology to enhance your education, career, or personal life, but feel inhibited by your digital literacy? Fear not! Written in plain English and absent of undecipherable high-tech jargon, Digital Literacy For Dummies makes it easy to get a grip on computer basics, the Internet, the Cloud, browsing the web, productivity programs and applications for school and the workplace, computer security and privacy, the latest in digital lifestyle topics, and so much more. -Walks you through the basics of developing essential computer technology skills -Shows you how to gain the digital literacy skills required to succeed in education, at home, and in the workforce -Explains how the use of smartphones and digital cameras contribute to digital literacy With the introduction of 3G and 4G services in emerging countries like India, worldwide Internet usage is increasing exponentially. With this technological growth comes an opportunity for people of all ages and from all walks of life to learn new skills to keep them ahead of the curve. Packed with easy-to-follow explanations and seasoned with a bit of humor and fun, Digital Literacy For Dummies makes it easy and accessible for anyone to harness the power of technology to remain relevant in school or at work.
Web Security
2015
This book presents a comprehensive guide to web security and explains how companies can build a highly effective and sustainable security system. It reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, click jacking, injection attacks, web frame security, leaks, transactions security, and security development lifecycle.
OS X Mountain Lion for Dummies
2012
Bob \"Dr. Mac\" LeVitus is among the world's leading authorities on the iPad, iPhone, and OS X. He's been one of the Mac community's most trusted gurus for more than 25 years and has written or cowritten more than 60 books. He is also a columnist for the Houston Chronicle and The Mac Observer.
Apps, iPads, and Literacy: Examining the Feasibility of Speech Recognition in a First-Grade Classroom
2017
Informed by sociocultural and systems theory tenets, this study used ethnographic research methods to examine the feasibility of using speech recognition (SR) technology to support struggling readers in an early elementary classroom setting. Observations of eight first graders were conducted as they participated in a structured SR-supported writing center four days a week for five months. Participant observation, field notes, transcripts of audio and video recordings, and student artifacts (classroom worksheets, SR screenshots, and writing center compositions) were used to document students' use of SR as they wrote assigned compositions. Data analysis was recursive and ongoing. Constant comparison of in actu theoretical notes was used to form provisional patterns and develop and refine hypotheses. Triangulation of data sets, triangulation of informants, and negative case analyses were used to (dis)confirm hypotheses. Findings indicate that using SR was supportive of these struggling readers. Previous concepts of SR as an isolated entity and of the Language Experience Approach as cumbersome and reifying teacher hegemony are examined. Graphosemantic awareness, new literacies, and the possibilities for supporting struggling readers of all ages across expansive geographies are discussed. Finally, child safety, tensions between student independence and lost opportunities for teacher metacognitive modeling, questions about encoding as a viable or antiquated skill, and the need for additional research conducted in classroom settings to grasp sociocultural insights are discussed.
Journal Article