Search
Search Results
-
Computer Control of a Telescope
Using a computer to control an amateur telescope adds functionality that wasn’t possible previously and turns a hobby telescope into one capable of... -
Carbon Strategies: De-risking Exposures
Some strategies can decouple energy consumption from revenue, profits, and other financial indicators. At the nexus of finance, energy, and carbon,... -
Data Moves: Libraries and Data Science Workflows
This chapter compares examples of data workflows across disciplines to identify common data-analysis “moves.” Drawing on the precedent of so-called... -
A Voice That Doesn’t Use Words
And then, in a moment that seemed almost staged, she shifted her eyes, looked right at me, and smiled. That moment of contact, of connection and real... -
Micro-innovations: Incremental Process Improvements
Micro-innovations are ideas that squeeze out efficiencies from existing processes. The approach philosophy is to reduce variability of a process so... -
A Place in History
As Mike Haddad explained, “Everyone who worked Level-IV came away having learned their own lessons, but also with a larger picture of lessons... -
Discovery, Access, and Use of Information in a “Digital Ecosystem”
This chapter examines the process by which new digital methods are reconciled with traditional library services and collections. Emphasizing the... -
Introduction: Libraries and Archives in the Digital Age
This introductory chapter outlines the themes of the book and contextualizes recent developments in the roles of libraries and archives and the... -
From Natural and Artificial Intelligence to Superintelligence?
Classical AI research is based on the capabilities of a program-controlled computer which, according to Church’s thesis, is in principle equivalent... -
Towards that First Payload
During the mid to late 1970s, many Kennedy Space Center (KSC) facilities were being converted from supporting the Apollo program to preparing for the... -
Supporting Manuscript Translation in Library and Archival Collections: Toward Decolonial Translation Methods
Using the example of the Cherokee syllabary, this chapter makes the case for the necessity of Decolonial translation methods to ensure that... -
Introduction
Our goal is to provide valuable insights and lessons learned about mentoring and sponsorship to ambitious early and mid-career people. People who are... -
Image Integration
Whether your light frames were calibrated, cosmetically corrected, debayered (OSC), and aligned using independent processes as covered so far, or... -
Our Research on Comparing Idea-Sharing Versus Unmindcuffing the Crowd
We describe our field research in which we compare the rated innovativeness of crowds who were exposed to the Idea-Sharing process against... -
Leadership Development and Mindsets—From Directive to Collective Behaviour
This chapter examines leadership development from the perspective of educating mindsets and is the final part of a trio of chapters that looks... -
IT-Sicherheit, Rollen- und Rechtemanagement 4.0
Dieser Abschnitt beschreibt ein alternatives Konzept, um Rollen und Rechte in IT-Systemen zu verwalten. Kern ist eine zentrale Systemkomponente, die... -
Diagrammatic Decomposition of Corporate Functions
Thus far I have tried to convince you of the profound opportunity we have to make our organizations run better, faster, cheaper, safer, and more... -
Building an Automaton from a Diagram Blueprint
You have a technological base from which to work, given the steps we described in the previous chapter. Next comes the actual building part. Central... -
Managing Internal and External Network Complexity: How Digitalization and New Technology Influence the Modeling Approach
Networks can be observed both within financial institutions and in the interaction between these institutions and the financial industry as a whole.... -
Big Data and the CRO of the Future
This article section deals with the challenges of a Chief Risk Officer and how to go about solving them. It investigates the potential of big data...