Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
636 result(s) for "Electronic digital computers History."
Sort by:
The untold story of everything digital : Bright boys revisited
\"The Untold Story of Everything Digital: Bright Boys, Revisited celebrates the 70th anniversary (1949-2019) of the world \"going digital\" for the very first time-real-time digital computing's genesis story. That genesis story is taken from the 2010 edition of Bright Boys: The Making of Information Technology-1938-1958, and substantially expanded upon for this special, anniversary edition. Please join us for the incredible adventure that is The Untold Story of Everything Digital, when a band of misfit engineers, led by MIT's Jay Forrester and Bob Everett, birthed the digital revolution. The bright boys were the first to imagine an electronic landscape of computing machines and digital networks, and the first to blaze its high-tech trails\"-- Provided by publisher.
Journey to the Moon: The History of the Apollo Guidance Computer
Description Evolution of the Apollo Guidance Computer, Mr. Hall contends that the development of the Apollo computer supported and motivated the semiconductor industry during a time when integrated circuits were just emerging. This was the period just before the electronics revolution that gave birth to modern computers. In addition, the book recalls the history of computer technology, both hardware and software, and the applications of digital computing to missile guidance systems and manned spacecraft. The book also offers graphics and photos drawn from the Draper Laboratories’ archives that illustrate the technology and related events during the Apollo project. Written for experts as well as lay persons, Journey to the Moon is the first book of its kind and a must for anyone interested in the history of science and the relevance of computer technology to space exploration.
From machine-to-machine to the Internet of things : introduction to a new age of intelligence
This book outlines the background and overall vision for the Internet of Things (IoT) and Machine-to-Machine (M2M) communications and services, including major standards. Key technologies are described, and include everything from physical instrumentation of devices to the cloud infrastructures used to collect data. Also included is how to derive information and knowledge, and how to integrate it into enterprise processes, as well as system architectures and regulatory requirements. Real-world service use case studies provide the hands-on knowledge needed to successfully develop and implement M2M and IoT technologies sustainably and profitably. Finally, the future vision for M2M technologies is described, including prospective changes in relevant standards. This book is written by experts in the technology and business aspects of Machine-to-Machine and Internet of Things, and who have experience in implementing solutions. Standards included: ETSI M2M, IEEE 802.15.4, 3GPP (GPRS, 3G, 4G),  Bluetooth Low Energy/Smart, IETF 6LoWPAN, IETF CoAP, IETF RPL, Power Line Communication, Open Geospatial Consortium (OGC)  Sensor Web Enablement (SWE), ZigBee, 802.11, Broadband Forum TR-069, Open Mobile Alliance (OMA) Device Management (DM), ISA100.11a, WirelessHART, M-BUS, Wireless M-BUS, KNX, RFID, Object Management Group (OMG) Business Process Modelling Notation (BPMN)Key technologies for M2M and IoT covered: Embedded systems hardware and software, devices and gateways, capillary and M2M area networks, local and wide area networking, M2M Service Enablement, IoT data management and data warehousing, data analytics and big data, complex event processing and stream analytics, knowledge discovery and management, business process and enterprise integration, Software as a Service and cloud computingCombines both technical explanations together with design features of M2M/IoT and use cases.  Together, these descriptions will assist you to develop solutions that will work in the real worldDetailed description of the network architectures and technologies that form the basis of M2M and IoTClear guidelines and examples of M2M and IoT use cases from real-world implementations such as Smart Grid, Smart Buildings, Smart Cities, Participatory Sensing, and Industrial AutomationA description of the vision for M2M and its evolution towards IoT
Digital architecture beyond computers : fragments of a cultural history of computational design
'Digital Architecture Beyond Computers' explores the deep history of digital architecture, tracing design concepts as far back as the Renaissance and connecting them with the latest software used by designers today. It develops a critical account of how the tools and techniques of digital design have emerged, and allows designers to deepen their understanding of the digital tools they use every day. What aesthetic, spatial, and philosophical concepts converge within the digital tools architects employ? What is their history? And what kinds of techniques and designs have they given rise to?
Digital Futures Past — The Long Arc of Big Data in Medicine
Half a century ago, physicians and engineers shared a dream that computers would be able to deduce diagnoses, store medical records, and circulate information. Today, many fundamental problems with realizing this dream remain unchanged.
An Analysis and Survey of the Development of Mutation Testing
Mutation Testing is a fault-based software testing technique that has been widely studied for over three decades. The literature on Mutation Testing has contributed a set of approaches, tools, developments, and empirical results. This paper provides a comprehensive analysis and survey of Mutation Testing. The paper also presents the results of several development trend analyses. These analyses provide evidence that Mutation Testing techniques and tools are reaching a state of maturity and applicability, while the topic of Mutation Testing itself is the subject of increasing interest.
Digitising Command and Control
This book presents a human factors and ergonomics evaluation of a digital Mission Planning and Battle-space Management (MP/BM) system. It emphasises the activities at the Brigade (Bde) and the Battle Group (BG) headquarters (HQ) levels, with the analysts distributing their time evenly between these two locations. The book concludes with a summary of the research project's findings. It looks forward to the next generation digital MP/BM systems and in so doing considers the human factors issues in digitising mission planning.
Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure of the United States, little has been written about the use of cyberattack as an instrument of U.S. policy. Cyberattacks-actions intended to damage adversary computer systems or networks-can be used for a variety of military purposes. But they also have application to certain missions of the intelligence community, such as covert action. They may be useful for certain domestic law enforcement purposes, and some analysts believe that they might be useful for certain private sector entities who are themselves under cyberattack. This report considers all of these applications from an integrated perspective that ties together technology, policy, legal, and ethical issues. Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores important characteristics of cyberattack. It describes the current international and domestic legal structure as it might apply to cyberattack, and considers analogies to other domains of conflict to develop relevant insights. Of special interest to the military, intelligence, law enforcement, and homeland security communities, this report is also an essential point of departure for nongovernmental researchers interested in this rarely discussed topic.
Aesthetics of interaction in digital art
An art-historical perspective on interactive media art that provides theoretical and methodological tools for understanding and analyzing digital art.Since the 1960s, artworks that involve the participation of the spectator have received extensive scholarly attention. Yet interactive artworks using digital media still present a challenge for academic art history. In this book, Katja Kwastek argues that the particular aesthetic experience enabled by these new media works can open up new perspectives for our understanding of art and media alike. Kwastek, herself an art historian, offers a set of theoretical and methodological tools that are suitable for understanding and analyzing not only new media art but also other contemporary art forms. Addressing both the theoretician and the practitioner, Kwastek provides an introduction to the history and the terminology of interactive art, a theory of the aesthetics of interaction, and exemplary case studies of interactive media art.Kwastek lays the historical and theoretical groundwork and then develops an aesthetics of interaction, discussing such aspects as real space and data space, temporal structures, instrumental and phenomenal perspectives, and the relationship between materiality and interpretability. Finally, she applies her theory to specific works of interactive media art, including narratives in virtual and real space, interactive installations, and performance-with case studies of works by Olia Lialina, Susanne Berkenheger, Stefan Schemat, Teri Rueb, Lynn Hershman, Agnes Hegedüs, Tmema, David Rokeby, Sonia Cillari, and Blast Theory.