The book also discusses research development of managing supply chain disruptive risks, supply chain risk conduction and loss assessment methods of supply chain disruptive events. It also includes the consideration of supply chain coordinating models in the cases of demand and supply disruption risks. It also deals on the subject of managing models of supply chain disruption risks by looking at manufacturers and responding decision methods oriented towards demand in disruption and coordination. It also summarizes the relevant findings and provides future research questions and orientations.
The book will contributes significantly to the growing body of knowledge concerning the theory of managing supply chains.
The scope of areas covered includes operations management, decision analysis, and business administration. This book focuses on several key issues of risk management in supply chains. Specifically, an analysis framework is presented for studying the supplier selection problem and identifying the optimal sourcing strategy in a one-retailer two-suppliers supply chain with random yields. The optimal sourcing strategy of a retailer and the pricing strategies of two suppliers under an environment of supply disruption are investigated. Besides, the authors study the dynamic inventory control problems with cash flow constraints, financing decisions as well as delayed cash payment. In addition, originating from the annual international iron ore price negotiation, the authors model the bargaining process to deal with the risk of wholesale price in the game analysis context.
Within the three perspectives of risk management in supply chains, the modeling of decision maker's risk preference has been extensively studied and many results have been obtained to guide the practice. However, the analysis on the other two kinds of topics is still in its infancy, and needs more efforts from academia. It is thus the ambition and innovation for this book to contribute on risk management in supply chains in the following ways:
(1) characterizing the explicit sourcing strategy (i.e., single sourcing or dual sourcing) to deal with supply disruption risk;
(2) introducing the concepts of financial risk measurement by incorporating cash flow constraints, inventory financing and delayed cash payment into inventory management models; and
(3) providing insights for the iron ore price negotiation to help steel manufacturers handle the risk of price increase.
The 19 revised full papers and 5 short papers presented were carefully reviewed and selected from 31 submissions. The papers focus on the following topics: mathematical issues in data science; big data issues and applications; data quality and data preparation; data-driven scientific research; evaluation and measurement in data service; big data mining and knowledge management; case study of data science; social impacts of data science.
The 37 revised full papers, including two workshop papers from BAI 2016, presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on cognitive and computational foundations of brain science; investigations of human information processing systems; brain big data analytics, curation and management; new methodologies for brain and mental health; brain-inspired intelligence and computing; brain and artificial intelligence.
The 15 revised full papers presented together with 4 invited papers and 4 keynote lectures were carefully reviewed and selected from numerous submissions. Topics addressed by the workshops are business intelligence and data mining (BIDM 2008), health data management (IWHDM 2008), and data engineering and Web technology research (DeWeb 2008). The papers focus on issues such as Web searching, Web services, database, data mining, bioinformatics, and business intelligence.
The book will be of invaluable use to scholars and graduate students interested in comovements among different financial markets and financial market microstructure and to investors and regulation departments looking to improve their risk management.
Optimization based Data Mining: Theory and Applications, mainly focuses on MCP and SVM especially their recent theoretical progress and real-life applications in various fields. These include finance, web services, bio-informatics and petroleum engineering, which has triggered the interest of practitioners who look for new methods to improve the results of data mining for knowledge discovery.
Most of the material in this book is directly from the research and application activities that the authors’ research group has conducted over the last ten years. Aimed at practitioners and graduates who have a fundamental knowledge in data mining, it demonstrates the basic concepts and foundations on how to use optimization techniques to deal with data mining problems.
The book is intended to serve as a research source, scientific reference and business support source, as well as a book of student readings that will appeal to a larger international audience.
Contents:Behavioral Issues in Decision MakingMultiple Criteria and Decision Support SystemsObjective Space AnalysisRisk and Efficiency ManagementTradeoff Analysis in Decision MakingData Environment AnalysisMultiple Criteria System EngineeringMultiple Criteria Applications
Readership: Students, professors, researchers and practitioners in business, management and operations research.
Keywords:Multiple Criteria;Decision Making;Decision Support Systems;Tradeoff Analysis;System Engineering;Linear Programming
Contract Analysis and Design for Supply Chains with Stochastic Demand contains eight chapters and each chapter is summarized as follows: Chapter 1 provides a comprehensive review of the classical development of supply chain contracts. Chapter 2 examines the effects of demand uncertainty on the applicability of buyback contracts. Chapter 3 conducts a mean-risk analysis for wholesale price contracts, taking into account contracting value risk and risk preferences. Chapter 4 studies the optimization of product service system by franchise fee contracts in the service-oriented manufacturing supply chain with demand information asymmetry. Chapter 5 develops a bidirectional option contract model and explores the optimal contracting decisions and supply chain coordination issue with the bidirectional option. Chapter 6 addresses supply chain options pricing issue and a value-based pricing scheme is developed for the supply chain options. With a cooperative game theory approach, Chapter 7 explores the issues concerning supply chain contract selection/implementation with the option contract under consideration. Chapter 8 concludes the book and suggests worthy directions for future research.
“Artfully envisions a breathtakingly better world.” —Los Angeles Times
“Elaborate, smart and persuasive.” —The Boston Globe
“A pleasure to read.” —The Wall Street Journal
One of CBS News’s Best Fall Books of 2005 • Among St Louis Post-Dispatch’s Best Nonfiction Books of 2005 • One of Amazon.com’s Best Science Books of 2005
A radical and optimistic view of the future course of human development from the bestselling author of How to Create a Mind and The Age of Spiritual Machines who Bill Gates calls “the best person I know at predicting the future of artificial intelligence”
For over three decades, Ray Kurzweil has been one of the most respected and provocative advocates of the role of technology in our future. In his classic The Age of Spiritual Machines, he argued that computers would soon rival the full range of human intelligence at its best. Now he examines the next step in this inexorable evolutionary process: the union of human and machine, in which the knowledge and skills embedded in our brains will be combined with the vastly greater capacity, speed, and knowledge-sharing ability of our creations.
From the Trade Paperback edition.
Artificial Intelligence helps choose what books you buy, what movies you see, and even who you date. It puts the "smart" in your smartphone and soon it will drive your car. It makes most of the trades on Wall Street, and controls vital energy, water, and transportation infrastructure. But Artificial Intelligence can also threaten our existence.
In as little as a decade, AI could match and then surpass human intelligence. Corporations and government agencies are pouring billions into achieving AI's Holy Grail—human-level intelligence. Once AI has attained it, scientists argue, it will have survival drives much like our own. We may be forced to compete with a rival more cunning, more powerful, and more alien than we can imagine.
Through profiles of tech visionaries, industry watchdogs, and groundbreaking AI systems, Our Final Invention explores the perils of the heedless pursuit of advanced AI. Until now, human intelligence has had no rival. Can we coexist with beings whose intelligence dwarfs our own? And will they allow us to?
Ray Kurzweil is arguably today’s most influential—and often controversial—futurist. In How to Create a Mind, Kurzweil presents a provocative exploration of the most important project in human-machine civilization—reverse engineering the brain to understand precisely how it works and using that knowledge to create even more intelligent machines.
Kurzweil discusses how the brain functions, how the mind emerges from the brain, and the implications of vastly increasing the powers of our intelligence in addressing the world’s problems. He thoughtfully examines emotional and moral intelligence and the origins of consciousness and envisions the radical possibilities of our merging with the intelligent technology we are creating.
Certain to be one of the most widely discussed and debated science books of the year, How to Create a Mind is sure to take its place alongside Kurzweil’s previous classics which include Fantastic Voyage: Live Long Enough to Live Forever and The Age of Spiritual Machines.
From the Hardcover edition.
Jeff Hawkins, the man who created the PalmPilot, Treo smart phone, and other handheld devices, has reshaped our relationship to computers. Now he stands ready to revolutionize both neuroscience and computing in one stroke, with a new understanding of intelligence itself.
Hawkins develops a powerful theory of how the human brain works, explaining why computers are not intelligent and how, based on this new theory, we can finally build intelligent machines.
The brain is not a computer, but a memory system that stores experiences in a way that reflects the true structure of the world, remembering sequences of events and their nested relationships and making predictions based on those memories. It is this memory-prediction system that forms the basis of intelligence, perception, creativity, and even consciousness.
In an engaging style that will captivate audiences from the merely curious to the professional scientist, Hawkins shows how a clear understanding of how the brain works will make it possible for us to build intelligent machines, in silicon, that will exceed our human ability in surprising ways.
Written with acclaimed science writer Sandra Blakeslee, On Intelligence promises to completely transfigure the possibilities of the technology age. It is a landmark book in its scope and clarity.
This textbook provides a comprehensive introduction to forecasting methods and presents enough information about each method for readers to use them sensibly.
Which paint color is most likely to tell you that a used car is in good shape? How can officials identify the most dangerous New York City manholes before they explode? And how did Google searches predict the spread of the H1N1 flu outbreak?
The key to answering these questions, and many more, is big data. “Big data” refers to our burgeoning ability to crunch vast collections of information, analyze it instantly, and draw sometimes profoundly surprising conclusions from it. This emerging science can translate myriad phenomena—from the price of airline tickets to the text of millions of books—into searchable form, and uses our increasing computing power to unearth epiphanies that we never could have seen before. A revolution on par with the Internet or perhaps even the printing press, big data will change the way we think about business, health, politics, education, and innovation in the years to come. It also poses fresh threats, from the inevitable end of privacy as we know it to the prospect of being penalized for things we haven’t even done yet, based on big data’s ability to predict our future behavior.
In this brilliantly clear, often surprising work, two leading experts explain what big data is, how it will change our lives, and what we can do to protect ourselves from its hazards. Big Data is the first big book about the next big thing.
This instructional manual focuses on pin tumbler locks, the construction and function of which are illustrated with the aid of several diagrams. Everything from straightforward lock picking to quick-entry techniques like shimming, bumping, and bypassing are explained and shown. Guides and exercises demonstrate the use of basic lock-picking tools in order to manipulate and open these locks. The text also describes the most common "alternative" designs of pin tumbler locks and summarizes the tools and techniques that can be effective against them. It comes with a DVD filled with indispensable lock picking videos and color photos.
This book is an ideal reference for penetration testers, security consultants, and IT security professionals as well as hackers.Detailed photos make learning as easy as picking a lockDVD is filled with indispensible lock picking videos and color photosExtensive appendix details tools and toolkits currently available for all your lock picking needs
Each chapter presents a self-contained lesson on a key SQL concept or technique, with numerous illustrations and annotated examples. Exercises at the end of each chapter let you practice the skills you learn. With this book, you will:
Move quickly through SQL basics and learn several advanced featuresUse SQL data statements to generate, manipulate, and retrieve dataCreate database objects, such as tables, indexes, and constraints, using SQL schema statementsLearn how data sets interact with queries, and understand the importance of subqueriesConvert and manipulate data with SQL's built-in functions, and use conditional logic in data statements
Knowledge of SQL is a must for interacting with data. With Learning SQL, you'll quickly learn how to put the power and flexibility of this language to work.
Inside, you’ll learn about:Interaction design and physical computing The Arduino hardware and software development environment Basics of electricity and electronics Prototyping on a solderless breadboard Drawing a schematic diagram
Getting started with Arduino is a snap. To use the introductory examples in this guide, all you need an Arduino Uno or earlier model, along with USB A-B cable and an LED. The easy-to-use Arduino development environment is free to download.
Join hundreds of thousands of hobbyists who have discovered this incredible (and educational) platform. Written by the co-founder of the Arduino project, Getting Started with Arduino gets you in on all the fun!
Mullins presents realistic, thorough, and up-to-date coverage of every DBA task, including creating database environments, data modeling, normalization, design, performance, data integrity, compliance, governance, security, backup/recovery, disaster planning, data and storage management, data movement/distribution, data warehousing, connectivity, metadata, tools, and more.
This edition adds new coverage of “Big Data,” database appliances, cloud computing, and NoSQL. Mullins includes an entirely new chapter on the DBA’s role in regulatory compliance, with substantial new material on data breaches, auditing, encryption, retention, and metadata management. You’ll also find an all-new glossary, plus up-to-the-minute DBA rules of thumb.
The CWNA: Certified Wireless Network Administrator Official Study Guide: Exam CWNA-106 is the officially endorsed CWNA test prep for the leading wireless certification. Expert authors and CWNEs David D. Coleman and David A. Westcott guide readers through the skills and concepts candidates need to know for the exam, using hands-on methods to convey an in-depth understanding of wireless network administration. Readers should have a basic knowledge of Radio Frequency behavior, experience with WLAN hardware peripherals and protocols, and an interest in designing, installing, and managing wireless networks.
Wireless technology is taking over the tech industry, and the demand for competent, certified professionals is far outpacing the supply. A CWNA certification denotes advanced-level proficiency in the field, with a complete understanding of wireless LAN components, features, and function—but the only way to pass the exam is to truly understand the material, not just the talking points. The CWNA: Certified Wireless Network Administrator Official Study Guide thoroughly covers each exam objective, and includes review questions, assessment tests, and exercises to test your skills. Topics include:Radio Frequency technologies, regulations, and standards 802.11 protocols Network implementation and security 802.11 RF site surveying
Readers also get access to a suite of study tools including an electronic test engine with hundreds or practice test questions, electronic flashcards, exercise peripherals, and industry White Papers, which serve as valuable backup references. In preparing for the CWNA-106 exam, the ideal study guide should cover all of the exam topics in depth—CWNA: Certified Wireless Network Administrator Official Study Guide does just that, making it an excellent, comprehensive study guide.
In the world's top research labs and universities, the race is on to invent the ultimate learning algorithm: one capable of discovering any knowledge from data, and doing anything we want, before we even ask. In The Master Algorithm, Pedro Domingos lifts the veil to give us a peek inside the learning machines that power Google, Amazon, and your smartphone. He assembles a blueprint for the future universal learner-the Master Algorithm-and discusses what it will mean for business, science, and society. If data-ism is today's philosophy, this book is its bible.
From the Trade Paperback edition.
More than ever, the effective management of technology is critical for business competitiveness. For decades, technology leaders have struggled to balance agility, reliability, and security. The consequences of failure have never been greater―whether it's the healthcare.gov debacle, cardholder data breaches, or missing the boat with Big Data in the cloud.
And yet, high performers using DevOps principles, such as Google, Amazon, Facebook, Etsy, and Netflix, are routinely and reliably deploying code into production hundreds, or even thousands, of times per day.
Following in the footsteps of The Phoenix Project, The DevOps Handbook shows leaders how to replicate these incredible outcomes, by showing how to integrate Product Management, Development, QA, IT Operations, and Information Security to elevate your company and win in the marketplace.
Take the DORA DevOps X-ray Assessment and see where you stand! Visit devops-survey.com with your access code to take the DevOps X-ray Assessment.
Updated to reflect recent advances in MySQL and InnoDB performance, features, and tools, this third edition not only offers specific examples of how MySQL works, it also teaches you why this system works as it does, with illustrative stories and case studies that demonstrate MySQL’s principles in action. With this book, you’ll learn how to think in MySQL.Learn the effects of new features in MySQL 5.5, including stored procedures, partitioned databases, triggers, and viewsImplement improvements in replication, high availability, and clusteringAchieve high performance when running MySQL in the cloudOptimize advanced querying features, such as full-text searchesTake advantage of modern multi-core CPUs and solid-state disksExplore backup and recovery strategies—including new tools for hot online backups
Based on an MBA course Provost has taught at New York University over the past ten years, Data Science for Business provides examples of real-world business problems to illustrate these principles. You’ll not only learn how to improve communication between business stakeholders and data scientists, but also how participate intelligently in your company’s data science projects. You’ll also discover how to think data-analytically, and fully appreciate how data science methods can support business decision-making.Understand how data science fits in your organization—and how you can use it for competitive advantageTreat data as a business asset that requires careful investment if you’re to gain real valueApproach business problems data-analytically, using the data-mining process to gather good data in the most appropriate wayLearn general concepts for actually extracting knowledge from dataApply data science principles when interviewing data science job candidates
Designed for horizontal scalability, OpenStack lets you build a cloud by integrating several technologies. This approach provides flexibility, but knowing which options to use can be bewildering. Once you complete this book, you’ll know the right questions to ask while you organize compute, storage, and networking resources. If you already know how to manage multiple Ubuntu machines and maintain MySQL, you’re ready to:Set up automated deployment and configurationDesign a single-node cloud controllerUse metrics to improve scalabilityExplore compute nodes, network design, and storageInstall OpenStack packagesUse an example architecture to help simplify decision-makingBuild a working environment to explore an IaaS cloudManage users, projects, and quotasTackle maintenance, debugging, and network troubleshootingMonitor, log, backup, and restore
If you want to find out how to use Python to start answering critical questions of your data, pick up Python Machine Learning – whether you want to get started from scratch or want to extend your data science knowledge, this is an essential and unmissable resource.What You Will LearnExplore how to use different machine learning models to ask different questions of your dataLearn how to build neural networks using Keras and TheanoFind out how to write clean and elegant Python code that will optimize the strength of your algorithmsDiscover how to embed your machine learning model in a web application for increased accessibilityPredict continuous target outcomes using regression analysisUncover hidden patterns and structures in data with clusteringOrganize data using effective pre-processing techniquesGet to grips with sentiment analysis to delve deeper into textual and social media dataIn Detail
Machine learning and predictive analytics are transforming the way businesses and other organizations operate. Being able to understand trends and patterns in complex data is critical to success, becoming one of the key strategies for unlocking growth in a challenging contemporary marketplace. Python can help you deliver key insights into your data – its unique capabilities as a language let you build sophisticated algorithms and statistical models that can reveal new perspectives and answer key questions that are vital for success.
Python Machine Learning gives you access to the world of predictive analytics and demonstrates why Python is one of the world's leading data science languages. If you want to ask better questions of data, or need to improve and extend the capabilities of your machine learning systems, this practical data science book is invaluable. Covering a wide range of powerful Python libraries, including scikit-learn, Theano, and Keras, and featuring guidance and tips on everything from sentiment analysis to neural networks, you'll soon be able to answer some of the most important questions facing you and your organization.Style and approach
Python Machine Learning connects the fundamental theoretical principles behind machine learning to their practical application in a way that focuses you on asking and answering the right questions. It walks you through the key elements of Python and its powerful machine learning libraries, while demonstrating how to get to grips with a range of statistical models.
Jim Whitehurst, CEO of Red Hat, one of the world’s most revolutionary companies, shows how open principles of management—based on transparency, participation, and community—reinvent the organization for the fast-paced connected era. Whitehurst gives readers an insider’s look into how an open and innovative organizational model works. He shows how to leverage it to build community, respond quickly to opportunities, harness resources and talent both inside and outside the organization, and inspire, motivate, and empower people at all levels to act with accountability.
The Open Organization is a must-read for leaders struggling to adapt their management practices to the values of the digital and social age. Brimming with Whitehurst’s personal stories and candid advice for leading an open organization, as well as with instructive examples from employees and managers at Red Hat and companies such as Google, The Body Shop, and Whole Foods, this book provides the blueprint for reinventing your organization.
Best Android Apps leads you beyond the titles in Android Market's "Top Paid" and "Top Free" bins to showcase apps that will truly delight, empower, and entertain you. The authors have tested and handpicked more than 200 apps and games, each listed with a description and details highlighting the app's valuable tips and special features. Flip through the book to browse their suggestions, or head directly to the category of your choice to find the best apps to use at work, on the town, at play, at home, or on the road.
Discover great Android apps to help you:Juggle tasksConnect with friendsPlay gamesOrganize documentsExplore what's nearbyGet in shapeTravel the worldFind new musicDine outManage your money
...and much more!
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.
Linux Pocket Guide provides an organized learning path to help you gain mastery of the most useful and important commands. Whether you’re a novice who needs to get up to speed on Linux or an experienced user who wants a concise and functional reference, this guide provides quick answers.
Selected topics include:The filesystem and shellFile creation and editingText manipulation and pipelinesBackups and remote storageViewing and controlling processesUser account managementBecoming the superuserNetwork connectionsAudio and videoInstalling softwareProgramming with shell scripts
The company's new IT initiative, code named Phoenix Project, is critical to the future of Parts Unlimited, but the project is massively over budget and very late. The CEO wants Bill to report directly to him and fix the mess in ninety days or else Bill's entire department will be outsourced.
With the help of a prospective board member and his mysterious philosophy of The Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined. With the clock ticking, Bill must organize work flow, streamline interdepartmental communications, and effectively serve the other business functions at Parts Unlimited.
In a fast-paced and entertaining style, three luminaries of the DevOps movement deliver a story that anyone who works in IT will recognize. Readers will not only learn how to improve their own IT organizations, they'll never view IT the same way again.
The example code for this unique data science book is maintained in a public GitHub repository. It’s designed to be easily accessible through a turnkey virtual machine that facilitates interactive learning with an easy-to-use collection of IPython Notebooks.
Leading-edge companies like Amazon and Google are applying DevOps and Agile principles to deliver large software projects faster than anyone thought possible. But most executives don’t understand how to transform their current legacy systems and processes to scale these principles across their organizations.
Leading the Transformation is an executive guide, providing a clear framework for improving development and delivery. Instead of the traditional Agile and DevOps approaches that focus on improving the effectiveness of teams, this book targets the coordination of work across teams in large organizations—an improvement that executives are uniquely positioned to lead.
Let's face it, SQL is a deceptively simple language to learn, and many database developers never go far beyond the simple statement: SELECT columns FROM table WHERE conditions. But there is so much more you can do with the language. In the SQL Cookbook, experienced SQL developer Anthony Molinaro shares his favorite SQL techniques and features. You'll learn about:
Window functions, arguably the most significant enhancement to SQL in the past decade. If you're not using these, you're missing out
Powerful, database-specific features such as SQL Server's PIVOT and UNPIVOT operators, Oracle's MODEL clause, and PostgreSQL's very useful GENERATE_SERIES function
Pivoting rows into columns, reverse-pivoting columns into rows, using pivoting to facilitate inter-row calculations, and double-pivoting a result set
Bucketization, and why you should never use that term in Brooklyn.
How to create histograms, summarize data into buckets, perform aggregations over a moving range of values, generate running-totals and subtotals, and other advanced, data warehousing techniques
The technique of walking a string, which allows you to use SQL to parse through the characters, words, or delimited elements of a string
Written in O'Reilly's popular Problem/Solution/Discussion style, the SQL Cookbook is sure to please. Anthony's credo is: "When it comes down to it, we all go to work, we all have bills to pay, and we all want to go home at a reasonable time and enjoy what's still available of our days." The SQL Cookbook moves quickly from problem to solution, saving you time each step of the way.