Rejoignez-nous pour un voyage dans le monde des livres!
Ajouter ce livre à l'électronique
Grey
Ecrivez un nouveau commentaire Default profile 50px
Grey
Abonnez-vous pour lire le livre complet ou lisez les premières pages gratuitement!
All characters reduced
Tech Adjacent - The Exponential Guide to Leveraging Technology for Business Success - cover

Tech Adjacent - The Exponential Guide to Leveraging Technology for Business Success

Mushambi Mutuma

Maison d'édition: Tracey McDonald Publishers

  • 0
  • 0
  • 0

Synopsis

It is almost impossible to keep up with the pace and direction in which business and technology are moving today.
ARTIFICIAL INTELLIGENCE. AUTOMATION. BLOCKCHAIN. BIG DATA. INTERNET OF THINGS. THE FOURTH INDUSTRIAL REVOLUTION.
Who actually knows what any of these concepts mean for their business, much less how to integrate them? Things are moving at a faster pace than ever before and trying to keep up has become intimidating and overwhelming. It's tempting to bury your head in the sand than try to make head or tail of it all.
But none of the buzzwords actually matter! You don't have to jump aboard every single change and adjustment in the market, or trade in your suit for a T-shirt, jeans and sneaker combo. If you have the right context, it's a lot simpler to understand and use technological shifts as an opportunity to transform your business.
Tech Adjacent is about understanding the principles of tech and its pace, hearing the footsteps of where it might be going, knowing how disruption and innovation work tangibly and, most importantly, leveraging it for your individual exponential success.
Innovation is contextual, so while Uber, Airbnb and Facebook are grandiose Silicon Valley success stories, they have little relevance in the African market. This book shares stories and case studies of African businesses, exposing who is getting disrupted as we speak and why, as well as how new companies are leading the next wave of growth.
Mushambi Mutuma's experience and expertise in both business and as a tech entrepreneur give real-life context to rapid change, unlocking future opportunities and offering tools to predict where your audience and industry are heading. He sells no big ideas, but genuinely shares his unique perspectives and know-how to help whoever he can in the process.
Tech Adjacent isn't just another book on growing your business in 100 days, nor is it dry academic theory. It is the guidebook for not only surviving but excelling in a world of exponential growth. Whether you are a start-up entrepreneur or a corporate executive, this guide is a must for both present and future leaders.
Don't get left behind!
Disponible depuis: 01/08/2019.
Longueur d'impression: 184 pages.

D'autres livres qui pourraient vous intéresser

  • The Language God Talks - On Science and Religion - cover

    The Language God Talks - On...

    Herman Wouk

    • 0
    • 0
    • 0
    "More years ago than I care to reckon up, I met Richard Feynman." So begins THE LANGUAGE GOD TALKS, Herman Wouk's gem on navigating the divide between science and religion. In one rich, compact volume, Wouk draws on stories from his life as well as on key events from the 20th century to address the eternal questions of why we are here, what purpose faith serves, and how scientific fact fits into the picture. He relates wonderful conversations he's had with scientists such as Feynman, Murray Gell-Mann, Freeman Dyson, and Steven Weinberg, and brings to life such pivotal moments as the 1969 moon landing and the Challenger disaster. Brilliantly written, THE LANGUAGE GOD TALKS is a scintillating and lively investigation and a worthy addition to the literature.
    Voir livre
  • The History of Life - A Very Short Introduction - cover

    The History of Life - A Very...

    Michael J. Benton

    • 0
    • 0
    • 0
    Here is the extraordinary story of the unfolding of life on Earth, told by Michael J. Benton, a world-renowned authority on biodiversity. Ranging over four billion years, Benton weaves together the latest findings on fossils, earth history, evolutionary biology, and many other fields to highlight the great leaps that enabled life to evolve from microbe to human—big breakthroughs that made whole new ways of life possible—including cell division and multicellularity, hard skeletons, the move to land, the origin of forests, the move to the air. He describes the mass extinctions, especially the Permian, which obliterated 90% of life, and he sheds light on the origins of human beings, and of the many hominids that went before us. He ends by pointing out that studying the past helps us to predict the future: what happens if the atmosphere warms by five degrees? What happens if we destroy much of the biodiversity on Earth? These things have happened before, Benton notes. We need only look to the distant past to know the future of life on Earth.
    Voir livre
  • Comet Madness - How the 1910 Return of Halley's Comet (Almost) Destroyed Civilization - cover

    Comet Madness - How the 1910...

    Richard J. Goodrich

    • 0
    • 0
    • 0
    Since the dawn of civilization, humans had believed comets were evil portents. In 1705, Edmond Halley liberated humanity from these primordial superstitions, proving that Newtonian mechanics rather than the will of the gods brought comets into our celestial neighborhood. Despite this scientific advance, when Halley's Comet returned in 1910, newspapers gleefully provoked a global hysteria that unfolded with tragic consequences.In Comet Madness, author and historian Richard J. Goodrich examines the 1910 appearance of Halley's Comet and the ensuing frenzy sparked by media manipulation, bogus science, and outright deception.As the comet neared Earth, scientists and journalists alike scrambled to get the story straight as citizens the world over panicked.As a result, workmen shelved their tools, farmers refused to plant crops they would never harvest, and formerly reliable people stopped paying their creditors. Others suffered mental breakdowns, and some took their own lives.Comet Madness reveals how humans confront the unknown, how scientists learn about the world we inhabit, and how certain people—from outright hucksters to opportunistic journalists—harness fear to produce a profit.
    Voir livre
  • Wolves for Kids: Amazing Facts and True Stories about the Gray Wolf and Arctic Wolf - cover

    Wolves for Kids: Amazing Facts...

    Tristan Keefer

    • 0
    • 0
    • 0
    Embark on a journey of discovery and wonder with fun facts and tidbits about wolves! 
    Are you ready to learn lots of fascinating facts about one of nature's most intriguing animals?  
    Do you want to find out about wolves' amazing life and behavior?  
    Would you like to learn more about these enthralling creatures by listening to an audiobook full of interesting facts and amazing tidbits? 
    This captivating audiobook will appeal to kids who love stories about wild wolves. It's full of amazing facts and true stories about gray wolves and Arctic wolves. Every day is different for these wild animals as they fight to survive in the rough terrain of North America.  
    In this audiobook, you will:Learn about the natural habitat of wolvesDiscover what arctic wolves eat in the wildFind out how gray wolves behave toward each otherListen to how wolves are depicted in legends, myths, and even literatureMeet real kids who have awesome wolf stories to share! 
    Humans have always found wolves fascinating, from ancient times right through to modern society. In Wolves for Kids, you will discover why these animals inspire such awe and wonder in our hearts. If you're a parent/caretaker who wants to teach their children about animals in an exciting, fun, and captivating way, then this audiobook is perfect for you! "Wolves for Kids" audiobook is an essential guide to all things wolves. 
    So, click the “add to cart” button and take your children on a glorious journey of discovery!
    Voir livre
  • Zero Trust Networks - Building Secure Systems in Untrusted Networks (2nd Edition) - cover

    Zero Trust Networks - Building...

    Razi Rais, Christina Morillo,...

    • 0
    • 0
    • 0
    Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile.In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.You'll also explore fundamental concepts of a zero trust network, including trust engine, policy engine, and context aware agents; discover how this model embeds security within the system's operation, rather than layering it on top; use existing technology to establish trust among the actors in a network; migrate from a perimeter-based network to a zero trust network in production; examine case studies that provide insights into various organizations' zero trust journeys; and learn about the various zero trust architectures, standards, and frameworks.
    Voir livre
  • Defensive Security Handbook - Best Practices for Securing Infrastructure (2nd Edition) - cover

    Defensive Security Handbook -...

    Amanda Berlin

    • 0
    • 0
    • 0
    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with issues such as breaches and disasters, compliance, network infrastructure, password management, vulnerability scanning, penetration testing, and more. Network engineers, system administrators, and security professionals will learn how to use frameworks, tools, and techniques to build and improve their cybersecurity programs.This book will help you plan and design incident response, disaster recovery, compliance, and physical security; learn and apply basic penetration testing concepts through purple teaming; conduct vulnerability management using automated processes and tools; and use IDS, IPS, SOC, logging, and monitoring. You'll also bolster Microsoft and Unix systems, network infrastructure, and password management; use segmentation practices and designs to compartmentalize your network; and reduce exploitable errors by developing code securely.
    Voir livre