Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Berlin International  (85)
  • F.-Ebert-Stiftung  (5)
  • Kreisbibliothek des Landkreises Spree-Neiße  (4)
Type of Medium
Region
Library
Subjects(RVK)
Access
  • 1
    Online Resource
    Online Resource
    London :[Verlag nicht ermittelbar], ; Jahrgang 1, Nummer 1 (9. Januar 1888)-Nummer 39358 (30. Dezember 2016)
    UID:
    almahu_BV037321776
    Format: Online-Ressource.
    Edition: Digital. Ausg. London Gale, a Cengage Company Gale primary sources
    Note: Gesehen am 19.11.2021. - Die Nationallizenz umfasst den Zeitraum von 1888-2006. - Reproduktion , The Financial Times began as a City of London news sheet and grew to become one of the best-known and most-respected newspapers in the world. Along the way, the Financial Times - printed on its distinctive salmon-colored paper - has chronicled the critical financial and economic events that shaped the world, from the late nineteenth and entire twentieth centuries to today. This historical archive is a comprehensive, accurate, and unbiased research tool for those studying economic and business history and current affairs of the last 120 years. Initially focused on the global financial and economic issues that were to become the predominant forces of the twentieth century, the Financial Times expanded coverage in the postwar years, reporting on topics such as industry, energy, and international politics. In more recent decades, coverage of management, personal finance, and the arts has been added.An online, fully searchable facsimile, the Financial Times Historical Archive delivers the complete run of the London edition of this internationally known daily paper, from its first issue through 2010 (part 1) and through 2016 (part 2). Every article, advertisement, and market listing is included - shown both individually and in the context of the full page and issue of the day. , Periodizität: 6x wöchentl.
    Additional Edition: Elektronische Reproduktion von Financial times London ISSN 0307-1766
    Additional Edition: Elektronische Reproduktion von Financial times / Europe. Europe London
    Additional Edition: Elektronische Reproduktion von FT magazine
    Additional Edition: Elektronische Reproduktion von How to spend it Wien
    Language: English
    Keywords: Finanzwirtschaft ; Wirtschaftswissenschaften ; Politik ; Datenbank ; Zeitung ; Zeitschrift ; Online-Ressource ; Zeitschrift ; Datenbank ; Zeitung ; Datenbank ; Zeitung ; searchable full text ; Datenbank ; Zeitung ; Datenbank ; Zeitung
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Tokyo :Springer Japan,
    UID:
    almahu_9949602152602882
    Format: 1 online resource (225 pages)
    Edition: 1st ed.
    ISBN: 9784431566236
    Series Statement: Science for Sustainable Societies Series
    Note: Intro -- Preface: From "Vision 2050" to "New Vision 2050" -- Preface (1): Turning Point of Human History -- Twenty-First Century Is a Special Era -- Various Issues -- Global Warming and Abnormal Weather -- Is Capitalism Sustainable? -- Preface (2): The Latest Report -- Human Race Is Navigating in the Right Direction (1): SDGs -- Human Race Is Navigating in the Right Direction (2): COP21 -- IEA Report -- Japan's Experiences as a Leading Country in Resolving Societal Problems -- Essence of the Era of Saturation -- Saturation of the Population -- Saturation of Man-Made Objects -- Saturation of Minerals -- World in 2050 -- Preface (3): A Society We Are Aiming At -- Creation of a New Society and Values by Resolving Issues -- "Platinum Society": A Vision in the Twenty-First Century -- Essential Factors for a Platinum Society -- A Vision That Can be Realized -- Preface (4): Image of a Platinum Society Has Begun to Appear -- Creative Demand -- Low-Carbon Society -- Energy-Creating Houses and Zero-Energy Buildings -- From Eco-Cars, Eco-Factories, and Cars to Cars, and Zero CO2 -- Diversifying Means of Transportation -- Energy Conservation Is the Best Policy -- Urban Mines -- Renewable Energy -- Japan Will Become a Resource Self-Sufficient Society -- The World Will Become a Sustainable Recycling-Oriented Society -- Harmony with Nature -- Macro-Level Viewpoint of Harmony with Nature -- Health Support and Self-Reliance Support Are Important Industries -- Participation of Active Seniors Is Indispensable -- Various Options -- Free Participation -- Education of Information Technology Nurtures the Next Generation -- Society with Employment -- Society Where Children Will Be Born -- Knowledge Structuring Will Lead to Solutions -- How to Expand and Develop More Successful Examples -- Challenging the Issue Through Knowledge Structuring and Action. , Innovations from Mega-Cities -- Viable Business Ensures Sustainability -- A Society of Lifelong Learning -- Developed Countries Can Achieve Economic Growth -- GDP and IWI -- Platinum Industry and Economic Growth -- Developing Countries Aim at a Platinum Society Together -- Social Disparity and Social Security, the State and the Market -- A System for Innovations -- Twenty-First Century Is a Turning Point -- Platinum Society Network -- References -- Contents -- Chapter 1: The Message in "Vision 2050" -- 1.1 Behind the Birth of Vision 2050 -- 1.1.1 The Need for a "Macro" Vision -- 1.1.2 An Affluent Lifestyle for All -- 1.1.3 Why a Low-Carbon Society? -- 1.1.4 The Threat of Global Warming -- 1.2 What Is Vision 2050? -- 1.2.1 The Vision for 2050 -- 1.2.2 A Happy Low-Carbon Society Is Achievable -- 1.2.3 Saturation of Man-Made Objects and the Material-­Circulating System -- 1.2.4 Tripling Energy Efficiency -- 1.2.5 Doubling the Amount of Renewable Energy -- 1.2.6 Increases in Both Comfort and Economic Performance -- 1.2.7 Premises Consequent on Being a Realistic Vision -- Chapter 2: Progress on Vision 2050 Since 1995 -- 2.1 Saturation of Man-Made Objects and the Material-­Circulating System -- 2.1.1 Saturation of Population -- 2.1.2 Saturation of Man-Made Objects -- 2.1.3 Saturated Demand for Substances and Materials: Cement -- 2.1.4 Saturated Demand for Substances and Materials: Iron -- 2.1.5 Hope for a Circulating Society -- 2.2 Energy Saving and Renewable Energy -- 2.2.1 Further Development Achieved in Energy Saving -- 2.2.2 Putting Renewable Energy at the Core of Energy Investments -- 2.3 Vision 2050 as a Happy Vision -- 2.3.1 The Industrial Structure of Japan as a "Leading Country in Resolving Societal Problems" and Energy -- 2.3.2 Certainly Japan Led the World -- 2.3.3 The World Is Making Progress toward Achieving Vision 2050 -- Bibliography. , Chapter 3: Technology to Support Low-Carbon Society (Using Energy) -- 3.1 Direction of Improvement in Energy Efficiency -- 3.1.1 "Daily Living" and "Monozukuri" -- 3.2 Low Carbon Technologies in the Transportation Sector -- 3.2.1 Shipment Does Not Consume Energy? -- 3.2.2 Energy-Efficient Cars Appear One after Another -- 3.2.3 Car Energy Efficiency Increases Eightfold -- 3.2.4 A Rich Car Life with Diverse Eco Cars -- 3.2.5 Modal Shift in Movement -- 3.3 Low Carbon Technologies in the Home and Business Sectors -- 3.3.1 Promotion of Energy Saving Is Economically Advantageous -- 3.3.2 Energy Conservation Will Be a Business Opportunity -- 3.3.3 Household Energy Consumption Is Consolidated into Electricity -- 3.3.4 Eco Houses Are Also Friendly to Their Occupants -- 3.3.5 The Latest Heat Pump Situation -- 3.3.6 Domestic Fuel Cells Packed with Japanese Technologies -- 3.3.7 Globalize Japanese Environmental Technologies -- 3.4 Low-Carbon Technologies for Monozukuri -- 3.4.1 Shift from Blast Furnaces to Electric Furnaces -- 3.4.2 Aluminum Is an Excellent Material in Terms of Recycling -- 3.4.3 Achieving Material Cycling of Rare Metals -- 3.4.4 Expectations for Dissemination of Industrial Heat Pumps -- Bibliography -- Chapter 4: Technology to Support Low-Carbon Society (Utilizing Energy) -- 4.1 Future Image of Renewable Energy -- 4.1.1 Rethinking the Value of Renewable Energy -- 4.1.2 The Future Image of Solar Cells and Storage Batteries -- 4.1.3 Importance of Balance Between Future Cost and Investment -- 4.1.4 Which Storage Battery Will Be Playing the Leading Role in 2050? -- 4.1.5 Promising Markets Where Various Uses Can Be Considered -- 4.1.6 Dissemination of Hydropower Generation by Region -- 4.1.7 The Potential of Biomass -- 4.1.8 Hydrogen as a Partner of Renewable Energy -- 4.2 Innovations Emerging from Theory and IT. , 4.2.1 Pursuing Efficiency to the Utmost Limit -- 4.2.2 Enhance Efficiency with an Energy Management System -- 4.2.3 Japan Should Compete with High-Added-Value Items -- 4.2.4 Increased Sophistication of Demand Forecasting by Utilizing Big Data -- 4.2.5 The Possibility of Carbon Pricing -- Bibliography -- Chapter 5: Low-Carbon Society in 2050 -- 5.1 Low Carbon Power Supply Systems in 2050 -- 5.1.1 Means to Achieve Low Carbonization -- 5.1.2 80% Reduction and Power Generation Costs -- 5.1.3 Consideration of the Best Power Supply Configuration -- 5.2 Reducing Carbon in Major Fields -- 5.2.1 Value-Added Industry and Low Carbon -- 5.2.2 The Ideal State of the Steel Industry -- 5.3 Reducing CO2 Emissions by 80% Across Japan -- 5.3.1 Low Carbonization by Sector in 2050 -- 5.3.2 Value-Added by Industry and CO2 Emissions in 2050 -- 5.3.3 Image of CO2 Emissions and Changes in GDP in all Industries -- Chapter 6: Platinum Industry and a New Society -- 6.1 What Is a Platinum Society? -- 6.1.1 Per Capita GDP and Average Life Expectancy -- 6.1.2 From Quantitative Sufficiency to Qualitative Sufficiency -- 6.1.3 An Island (Ama-cho) that Increased the Number of Children Attending School Despite a Declining Birthrate -- 6.1.4 Contributing to Lowering Carbon in Asia from Actual Experiences (Kitakyushu) -- 6.1.5 Leadership that Achieved a Miracle (Yanedan) -- 6.1.6 Realizing a Vision in a Megalopolis (Futakotamagawa) -- 6.2 Towards Becoming a Nation Self-Sufficient in Resources -- 6.2.1 Making a Self-Sufficiency Rate of 70% a Reality with Vision 2050 -- 6.2.2 A Scenario for Reviving Forestry -- 6.3 Coexisting in Harmony with Beautiful Nature -- 6.3.1 A World that Is Comfortable for All Living Things -- 6.3.2 Initiatives by Corporations for Living in Harmony with Nature -- 6.4 Good Health and Self-Reliance for a Fulfilling Life. , 6.4.1 The Wisdom of Seniors Is a Social Resource -- 6.4.2 Making Use of the Knowledge and Experience of Seniors for the Next Generation -- 6.5 Diverse Options and Freedom of Participation -- 6.5.1 Why Are Bonds Being Sought After Now? -- 6.5.2 Freedom of Mobility Induces Changes to Work Styles -- 6.5.3 Spread of Multi-habitation -- 6.5.4 Tokyo Work Styles and Countermeasures for Declining Birthrates -- 6.6 New Industries Created in a Platinum Society -- 6.6.1 Marunouchi Platinum University - Thinking About Regional Issues in a Big City -- 6.6.2 Developing Human Resources for Realizing the Platinum Society -- 6.6.3 Education Changing Through ICT -- 6.6.4 Adult Education as a New Industry -- 6.6.5 Developing Leaders Who can Carve Out a Path to a New Era -- 6.6.6 Questioning Anew the Importance of Education -- 6.7 The Platinum Society Becomes More Visible -- 6.7.1 How to Promote a Platinum Society -- 6.7.2 The Platinum Network Society and the Platinum Vision Award -- 6.7.3 Creating the Platinum Society Handbook -- 6.8 The Platinum Society and Vision 2050 -- Bibliography -- Interview -- Interview 1: Toyota Environmental Challenge 2050 -- Challenges Unachievable Following the Lines Laid Before -- The Impact of Climate Change -- "Let's Do What We Have to Do." -- Parts Manufacturers Have a Major Presence -- Mid-To-Long-Term Targets for Clearing Regulations -- Interview 2: Regional Revitalization and New Work Styles -- Local Activation for Stronger Competitiveness -- Japanese Factories Are Competitive -- Relocation of Some Head Office Functions, 3.2 Times More Children -- Retirees Teaching Science to Young Children -- Interview 3: Considering Ways to Solve Social Problems -- There Is Much Room for Innovation of the Social System -- The Notion that a Decline in the Population Means the Economy will Falter Is Faulty. , It Is Innovation for Being Used at the Site.
    Additional Edition: Print version: Komiyama, Hiroshi New Vision 2050 Tokyo : Springer Japan,c2018 ISBN 9784431566229
    Language: English
    Keywords: Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9949301482702882
    Format: 1 online resource (263 pages)
    ISBN: 9781430265726
    Note: Intro -- Contents at a Glance -- Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: Cyber Security in the Mobile Age -- Three Pillars of Mobile Computing -- Power Efficiency -- Internet Connectivity -- Security -- BYOD -- Incident Case Study -- eBay Data Breach -- Target Data Breach -- OpenSSL Heartbleed -- Key Takeaways -- Strong Authentication -- Network Management -- Boot Integrity -- Hardware-Based Protection -- Open-Source Software Best Practice -- Third-Party Software Best Practice -- Security Development Lifecycle -- Assessment -- Architecture -- Design -- Implementation -- Deployment -- Interface Testing -- Penetration Testing -- CVSS -- Limitations -- References -- Chapter 2: Intel's Embedded Solutions: from Management to Security -- Management Engine vs. Intel AMT -- Intel AMT vs. Intel vPro Technology -- Management Engine Overview -- Hardware -- Overlapped I/O -- Firmware -- Software -- Platform and System Management -- Software Solutions -- Hardware Solutions -- In-Band Solutions -- Out-of-Band Solutions -- Intel AMT Overview -- BIOS Extension -- Local Management Service and Tray Icon -- Remote Management -- The Engine's Evolvement: from Management to Security -- Embedded System as Security Solution -- Security Applications at a Glance -- EPID -- PAVP -- IPT -- Boot Guard -- Virtual Security Core: ARM TrustZone -- Secure Mode and Nonsecure Mode -- Memory Isolation -- Bus Isolation -- Physical Isolation vs. Virtual Isolation -- References -- Chapter 3: Building Blocks of the Security and Management Engine -- Random Number Generation -- Message Authentication -- Hash with Multiple Calls -- Symmetric-Key Encryption -- AES -- DES/3DES -- Asymmetric-Key Encryption: RSA -- Key Pair Generation and Validation -- Encryption and Decryption -- Digital Signature -- RSA -- ECDSA. , Key Pair Generation and Validation -- Scalar Multiplication -- Window Method -- Dual Scalar Multiplication -- Hardware Acceleration -- Other Cryptography Functions -- Secure Storage -- Debugging -- Debug Messaging -- Special Production-Signed Firmware Based on Unique Part ID -- Secure Timer -- Host-Embedded Communication Interface -- Direct Memory Access to Host Memory -- References -- Chapter 4: The Engine: Safeguarding Itself before Safeguarding Others -- Access to Host Memory -- Communication with the CPU -- Triggering Power Flow -- Security Requirements -- Confidentiality -- Integrity -- Availability -- Threat Analysis and Mitigation -- Load Integrity -- Memory Integrity -- Memory Encryption -- Task Isolation -- Asset Protection -- Memory Manager -- Thread Manager -- Memory Protection Control -- Loader -- Inter-Task Call Management -- Exception Handler -- Nonprivileged Tasks -- Firmware Update and Downgrade -- Published Attacks -- "Introducing Ring -3 Rootkits " -- References -- Chapter 5: Privacy at the Next Level: Intel's Enhanced Privacy Identification (EPID) Technology -- Redefining Privacy for the Mobile Age -- Passive Anonymity -- Active Anonymity -- Processor Serial Number -- EPID -- Key Structures and Provisioning -- Revocation -- Private Key-Based Revocation -- Signature-Based Revocation -- Group-Based Revocation -- Signature Generation and Verification -- Signature Generation -- Base Name -- Signature Verification -- SIGMA -- Verifier's Certificate -- Messages Breakdown -- Implementation of EPID -- Key Recovery -- Attack Mitigation -- Applications of EPID -- Next Generation of EPID -- Two-way EPID -- Optimization -- References -- Chapter 6: Boot with Integrity, or Don't Boot -- Boot Attack -- Evil Maid -- BIOS and UEFI -- BIOS Alteration -- Software Replacement -- Jailbreaking -- Trusted Platform Module (TPM). , Platform Configuration Register -- Field Programmable Fuses -- Field Programmable Fuses vs. Flash Storage -- Field Programmable Fuse Task -- Intel Boot Guard -- Operating System Requirements for Boot Integrity -- OEM Configuration -- Measured Boot -- Verified Boot -- Manifests -- Verification Flow -- References -- Chapter 7: Trust Computing, Backed by the Intel Platform Trust Technology -- TPM Overview -- Cryptography Subsystem -- Storage -- Endorsement Key -- Attestation -- Binding and Sealing -- Intel Platform Trust Technology -- Cryptography Algorithms -- Endorsement Key Storage -- Endorsement Key Revocation -- Endorsement Certificate -- Supporting Security Firmware Applications -- Integrated vs. Discrete TPM -- References -- Chapter 8: Unleashing Premium Entertainment with Hardware-Based Content Protection Technology -- Rights Protection -- DRM Schemes -- Device Key Management -- Rights Management -- Playback -- UltraViolet -- End-to-End Content Protection -- Content Server -- License Server -- Software Stack -- External Display -- Weak Points -- Intel's Hardware-Based Content Protection -- Protected Audio and Video Path (PAVP) -- Device Key Provisioning -- Rights Management -- Intel Wireless Display -- Authentication and Key Exchange -- Content Protection on TrustZone -- References -- Chapter 9: Breaking the Boundaries with Dynamically Loaded Applications -- Closed-Door Model -- DAL Overview -- DAL Architecture -- Loading an Applet -- Secure Timer -- Host Storage Protection -- Security Considerations -- Reviewing and Signing Process -- References -- Chapter 10: Intel Identity Protection Technology: the Robust, Convenient, and Cost-Effective Way to Deter Identity Theft -- One-Time Password -- HOTP -- TOTP -- Transaction Signing -- OTP Tokens -- Embedded OTP and OCRA -- Token Installation -- TOTP and OCRA Generation -- Highlights and Lowlights. , Protected Transaction Display -- Drawing a Sprite -- Gathering the User's PIN Input -- Firmware Architecture -- Embedded PKI and NFC -- References -- Chapter 11: Looking Ahead: Tomorrow's Innovations Built on Today's Foundation -- Isolated Computing Environment -- Security-Hardening Measures -- Basic Utilities -- Anonymous Authentication and Secure Session Establishment -- Protected Input and Output -- Dynamic Application Loader -- Summary of Firmware Ingredients -- Software Guard Extensions -- More Excitement to Come -- References -- Index.
    Additional Edition: Print version: Ruan, Xiaoyu Platform Embedded Security Technology Revealed Berkeley, CA : Apress L. P.,c2014 ISBN 9781430265719
    Language: English
    Keywords: Electronic books. ; Electronic books ; Electronic books. ; Electronic books.
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Northampton, MA :Edward Elgar Pub.,
    UID:
    almahu_9948265329002882
    Format: 1 online resource (3 v. (2,608 p.)) ; , cm.
    ISBN: 9781785360589 (e-book)
    Series Statement: International library of critical writings in economics ; 327
    Content: This extensive research review discusses more than one hundred of the very best and most influential scholarly articles on the sovereign debt of central governments around the world. It examines discussions of the debt of many emerging nations as well as the largest sovereign debtors in the world thus providing a thorough understanding of sovereign debt as seen by the best economists from around the world. This research review is an essential tool to libraries, academic institutions, economic scholars and students alike.
    Note: The recommended readings are available in the print version, or may be available via the link to your library's holdings. , Recommended readings (Machine generated): Robert J. Barro (1974), 'Are Government Bonds Net Wealth?', Journal of Political Economy, 82 (6), November-December, 1095-117 -- Robert J. Barro (1979), 'On the Determination of the Public Debt', Journal of Political Economy, 87 (5, Part 1), October, 940-71 -- Martin Feldstein (1985), 'Debt and Taxes in the Theory of Public Finance', Journal of Public Economics, 28 (2), November, 233-45 -- Jonathan Eaton and Mark Gersovitz (1981), 'Debt with Potential Repudiation: Theoretical and Empirical Analysis', Review of Economic Studies, XLVII (2), April, 289-309 -- Jonathan Eaton, Mark Gersovitz and Joseph E. Stiglitz (1986), 'The Pure Theory of Country Risk', European Economic Review, 30 (3), June, 481-513 -- Herschel I. Grossman and John B. Van Huyck, (1988), 'Sovereign Debt as a Contingent Claim: Excusable Default, Repudiation, and Reputation', American Economic Review, 78 (5), December, 1088-97 -- Jeremy Bulow and Kenneth Rogoff (1989), 'Sovereign Debt: Is to Forgive to Forget?', American Economic Review, 79 (1), March, 43-50 -- Jeremy Bulow and Kenneth Rogoff (1989), 'A Constant Recontracting Model of Sovereign Debt', Journal of Political Economy, 97 (1), February, 155-78 -- Harold L. Cole and Patrick J. Kehoe (1998), 'Models of Sovereign Debt: Partial Versus General Reputations', International Economic Review, 39 (1), February, 55-70 -- Kenneth M. Kletzer and Brian D. Wright (2000), 'Sovereign Debt as Intertemporal Barter', American Economic Review, 90 (3), June, 621-39 -- John M. Veitch (1986), 'Repudiations and Confiscations by the Medieval State', Journal of Economic History, 46 (1), March, 31-6 -- J. Bradford De Long and Andrei Shleifer (1993), 'Princes and Merchants: European City Growth Before the Industrial Revolution', Journal Of Law and Economics, XXXVI (2), October, 671-702 -- James Conklin (1998), 'The Theory of Sovereign Debt and Spain under Philip II', Journal of Political Economy, 106 (3), June, 483-513 -- Mauricio Drelichman and Hans-Joachim Voth (2010), 'The Sustainable Debts of Philip II: A Reconstruction of Castile's Fiscal Position, 1566-1596', Journal of Economic History, 70 (4), December, 813-42 -- Mauricio Drelichman and Hans-Joachim Voth (2011), 'Lending to the Borrower from Hell: Debt and Default in the Age of Philip II', Economic Journal, 121 (557), December, 1205-27, technical appendix -- Mauricio Drelichman and Hans-Joachim Voth (2011), 'Serial Defaults, Serial Profits: Returns to Sovereign Lending in Habsburg Spain, 1566-1600', Explorations in Economic History, 48 (1), January, 1-19 -- Mauricio Drelichman and Hans-Joachim Voth (2015), 'Risk Sharing with the Monarch: Contingent Debt and Excusable Defaults in the Age of Philip II, 1556-1598', Cliometrica, 9 (1), January, 49-75 -- Earl J. Hamilton (1947), 'Origin and Growth of the National Debt in Western Europe', American Economic Review, 37 (2), May, 118-30 -- David R. Weir (1989), 'Tontines, Public Finance, and Revolution in France and England, 1688-1789', Journal of Economic History, 49 (1), March, 95-124. , Douglass C. North and Barry R. Weingast (1989), 'Constitutions and Commitment: The Evolution of Institutional Governing Public Choice in Seventeenth-Century England', Journal of Economic History, XLIX (4), December, 803-32 -- David Stasavage (2002), 'Credible Commitment in Early Modern Europe: North and Weingast Revisited', Journal of Law Economics and Organization, 18 (1), April, 155-86 -- Kenneth A. Schultz and Barry R. Weingast (2003), 'The Democratic Advantage: Institutional Foundations of Financial Power in International Competition', International Organization, 57 (1), Winter, 3-42 -- Sebastian M. Saiegh (2005), 'Do Countries Have a 'Democratic Advantage"?: Political Institutions, Multilateral Agencies, and Sovereign Borrowing', Comparative Political Studies, 38 (4), May, 366-87 -- David Stasavage (2007), 'Cities, Constitutions, and Sovereign Borrowing in Europe, 1274-1785', International Organization, 61 (3), July, 489-525 -- Candace C. Archer, Glen Biglaiser and Karl DeRouen Jr. (2007), 'Sovereign Bonds and the 'Democratic Advantage": Does Regime Type Affect Credit Rating Agency Ratings in the Developing World?', International Organization, 61 (2), April, 341-65 -- Glen Biglaiser and Joseph L. Staats (2012), 'Finding the 'Democratic Advantage" in Sovereign Bond Ratings: The Importance of Strong Courts, Property Rights Protection, and the Rule of Law', International Organization, 66 (3), July, 515-35 -- Emanuel Kohlscheen (2007), 'Why Are There Serial Defaulters? Evidence from Constitutions', Journal of Law and Economics, 50 (4), November, 713-30 -- Juan Carlos Hatchondo and Leonardo Martinez (2010), 'The Politics of Sovereign Defaults', Economic Quarterly, 96 (3), Third Quarter, 291-317 -- Atif Mian, Amir Sufi and Francesco Trebbi (2014), 'Resolving Debt Overhangs: Political Constraints in the Aftermath of Financial Crises', American Economic Journal: Macroeconomics, 6 (2), April, 1-28 -- Mark Dincecco (2010), 'The Political Economy of Fiscal Prudence in Historical Perspective', Economics and Politics, 22 (1), March, 1-36 -- Michael D. Bordo (1999), 'International Rescues versus Bailouts: A Historical Perspective', Cato Journal, 18 (3), Winter, 363-75 -- John Joseph Wallis (2000), 'American Government Finance in the Long Run: 1790 to 1990', Journal of Economic Perspectives, 14 (1), Winter, 61-82 -- Carmen M. Reinhart and Vincent R. Reinhart (2015), 'Financial Crises, Development, and Growth: A Long-Term Perspective', World Bank Economic Review, Annual Bank Conference on Development Economics 'The Role of Theory in Development Economics" June 2-3, 2014 Washington D.C., 29 (Supplement 1), April, S57-S76 -- Carmen M. Reinhart, Vincent R. Reinhart and Kenneth S. Rogoff (2012), 'Public Debt Overhangs: Advanced-Economy Episodes Since 1800', Journal of Economic Perspectives, 26 (3), Summer, 69-86 -- Moritz Schularick and Alan M. Taylor (2012), 'Credit Booms Gone Bust: Monetary Policy, Leverage Cycles, and Financial Crises, 1870-2008', American Economic Review, 102 (2), April, 1029-61 -- Michael D. Bordo and Eugene N. White (1991), 'A Tale of Two Currencies: British and French Finance During the Napoleonic Wars', Journal of Economic History, 51 (2), June, 303-16 -- Marc Flandreau and Juan H. Flores (2009), 'Bonds and Brands: Foundations of Sovereign Debt Markets, 1820-1830', Journal of Economic History, 69 (3), September, 646-84 -- Gerardo della Paolera and Alan M. Taylor (2013), 'Sovereign Debt in Latin America, 1820-1913', Revista de Historia Económica/Journal of Iberian and Latin American Economic History, 31 (2), September, 173-217. , Richard Sicotte, Catalina Vizcarra and Kirsten Wandschneider (2010), 'Military Conquest and Sovereign Debt: Chile, Peru and the London Bond Market, 1876-1890', Cliometrica, 4 (3), October, 293-319 -- Marc D. Weidenmier (2005), 'Gunboats, Reputation, and Sovereign Repayment: Lessons from the Southern Confederacy', Journal of International Economics, 66 (2), July, 407-22 -- Michael D. Bordo and Hugh Rockoff (1992), 'The Gold Standard as a 'Good Housekeeping Seal of Approval"', Journal of Economic History, 56 (2), June, 389-428 -- Niall Ferguson and Moritz Schularick (2006), 'The Empire Effect: The Determinants of Country Risk in the First Age of Globalization, 1880-1913', Journal of Economic History, 66 (2), June, 283-312 -- Theodore Roosevelt (1904) 'President Theodore Roosevelt's Annual Message to Congress', delivered December 6th, 1904 -- Kris Mitchener and Marc Weidenmier (2005), 'Empire, Public Goods, and the Roosevelt Corollary', Journal of Economic History, 65 (3), September, 658-92 -- Kris James Mitchener and Marc D. Weidenmier (2010), 'Supersanctions and Sovereign Debt Repayment', Journal of International Money and Finance, 29 (1), February, 19-36 -- Barry Eichengreen and Ricardo Hausmann (1999) 'Exchange Rates and Financial Fragility' in Federal Reserve Bank of Kansas City (eds.), New Challenges for Monetary Policy, 329-68 -- Michael D. Bordo and Christopher M. Meissner (2006), 'The Role of Foreign Currency Debt in Financial Crises: 1880-1913 versus 1972-1997', Journal of Banking and Finance, 30 (12), December, 3299-329 -- Lyndon Moore and Jakub Kaluzny (2005), 'Regime Change and Debt Default: The Case of Russia, Austro-Hungary, and the Ottoman Empire following World War One', Explorations in Economic History, 42 (2), April, 237-58 -- Kim Oosterlinck and John S. Landon-Lane (2006), 'Hope Springs Eternal - French Bondholders and the Soviet Repudiation (1915-1919)', Review of Finance, 10 (4), 507-35 -- Barry Eichengreen and Richard Portes (1986), 'Debt and Default in the 1930s: Causes and Consequences', European Economic Review, 30 (3), June, 599-640 -- Barry Eichengreen (1991), 'Historical Research on International Lending and Debt', Journal of Economic Perspectives, 5 (2), Spring, 149-69 -- Peter Boone and Simon Johnson (2014), 'Forty Years of Leverage: What Have We Learned About Sovereign Debt?', American Economic Review: Papers and Proceedings, 104 (5), May, 266-71 -- Paolo Manasse and Nouriel Roubini (2009), ''Rules for Thumb' for Sovereign Debt Crises', Journal of International Economics, 78 (2), July, 192-205 -- Bergljot Barkbu, Barry Eichengreen and Ashoka Mody (2012), 'Financial Crises and the Multilateral Response: What the Historical Record Shows', Journal of International Economics, 88 (2), November, 422-35 -- Allan H. Meltzer (1984), 'The International Debt Problem', Cato Journal, 4 (1), Sping/Summer, 63-9 -- Jeffrey Sachs (1986), 'Managing the LDC Debt Crisis', Brookings Paper on Economic Activity, No. 2, 397-431 -- Jeffrey Sachs and Harry Huizinga (1987), 'U.S. Commercial Banks and the Developing-Country Debt Crisis', Brookings Paper on Economic Activity, No. 2, 555-601. , Jeremy Bulow (2002), 'First World Governments and Third World Debt', Brookings Papers on Economic Activity, No. 1, 229-55 -- Allan H. Meltzer (2004), 'Argentina 2002: A Case of Government Failure', Cato Journal, 23 (1), Spring/Summer, 29-31 -- Eugenio Andrea Bruno (2006), 'The Failure of Debt-Based Development: Lessons from Argentina', Cato Journal, 26 (2), Spring/Summer, 357-65 -- Juan Carlos Hatchondo, Leonardo Martinez and Horacio Sapriza (2007), 'The Economics of Sovereign Default', Economic Quarterly, 93 (2), Spring, 163-87 -- Ugo Panizza, Federico Sturzenegger and Jeromin Zettelmeyer (2009), 'The Economics and Law of Sovereign Debt and Default', Journal of Economic Literature, 47 (3), September, 651-98 -- Michael Tomz and Mark L. J. Wright (2013), 'Empirical Research on Debt and Default', Annual Review of Economics, 5, August, 247-72 -- Fernando Broner, Alberto Martin and Jaume Ventura (2010), 'Sovereign Risk and Secondary Markets', American Economic Review, 100 (4), September, 1523-55 -- Michael Tomz and Mark L. J. Wright (2007), 'Do Countries Default in 'Bad Times'?', Journal of the European Economic Association, 5 (2-3), April-May, 352-60 -- Edward I. Altman and Herbert A. Rijken (2011), 'Toward a Bottom-Up Approach to Assessing Sovereign Default Risk', Journal of Applied Corporate Finance, 23 (1), Winter, 20-31 -- Federico Sturzenegger and Jeromin Zettelmeyer (2008), 'Haircuts: Estimating Investor Losses in Sovereign Debt Restructurings, 1998-2005', Journal of International Money and Finance, 27 (5), September, 780-805 -- Juan J. Cruces and Christoph Trebesch (2013), 'Sovereign Defaults: The Price of Haircuts', American Economic Journal: Macroeconomics, 5 (3), July, 85-117 -- Miguel Fuentes and Diego Saravia (2010), 'Sovereign Defaulters: Do International Capital Markets Punish Them?', Journal of Development Economics, 91 (2), March, 336-47 -- Eduardo Levy Yeyati and Ugo Panizza (2011), 'The Elusive Costs of Sovereign Defaults', Journal of Development Economics, 94 (1), January, 95-105 -- Alberto Alesina and David Dollar (2000), 'Who Gives Foreign Aid to Whom and Why?', Journal of Economic Growth, 5 (1), March, 33-63 -- Alberto Alesina and Beatrice Weder (2002), 'Do Corrupt Governments Receive Less Foreign Aid?', American Economic Review, 92 (4), September, 1126-37 -- Craig Burnside and David Dollar (2000), 'Aid, Policies and Growth', American Economic Review, 90 (4), September, 847-68 -- Robert J. Barro and Jong-Wha Lee (2005), 'IMF Programs: Who is Chosen and What Are the Effects?', Journal of Monetary Economics, 52 (7), October, 1245-69 -- William Easterly (2002), 'How Did Heavily Indebted Poor Countries Become Heavily Indebted? Reviewing Two Decades of Debt Relief', World Development, 30 (10), October, 1677-96 -- Serkan Arslanalp and Peter Blair Henry (2005), 'Is Debt Relief Efficient?', Journal of Finance, LX (2), April, 1017-51. , Federico Sturzenegger and Jeromin Zettelmeyer (2007), 'Creditors' Losses Versus Debt Relief: Results From a Decade of Sovereign Debt Crises', Journal of the European Economic Association, 5 (2-3), April-May, 343-51 -- Rutsel Silvestre J. Martha (1990), 'Preferred Creditor Status under International Law: The Case of the International Monetary Fund', International and Comparative Law Quarterly, 39 (4), October, 801-26 -- Raghuram G. Rajan (2005), 'Institutional Reform and Sovereign Debt Crises', Cato Journal, 25 (1), Winter, 17-24 -- Nouriel Roubini and Jeffrey Sachs (1989), 'Government Spending and Budget Deficits in the Industrial Countries', Economic Policy, 4 (8), April, 99-132 -- Marina Azzimonti, Eva de Francisco and Vincenzo Quadrini (2014), 'Financial Globalization, Inequality, and the Rising Public Debt', American Economic Review, 104 (8), August, 2267-302 -- Viral Acharya, Itamar Drechsler and Philipp Schnabl (2014), 'A Pyrrhic Victory? Bank Bailouts and Sovereign Credit Risk', Journal of Finance, LXIX (6), December, 2689-739 -- Mark Aguiar, Manuel Amador, Emmanuel Farhi and Gita Gopinath (2014), 'Sovereign Debt Booms in Monetary Unions', American Economic Review: Papers and Proceedings, 104 (5), May, 101-6 -- Laurence J. Kotlikoff (2004), 'Fiscal Policy and the Future of the Euro', Cato Journal, 24 (1-2), Spring/Summer, 51-5 -- Jerome L. Stein (2011), 'The Diversity of Debt Crises in Europe', Cato Journal, 31 (2), Spring/Summer, 199-215 -- Philip R. Lane (2012), 'The European Sovereign Debt Crisis', Journal of Economic Perspectives, 26 (3), Summer, 49-67 -- Kevin H. O'Rourke and Alan M. Taylor (2013), 'Cross of Euros', Journal of Economic Perspectives, 27 (3), March, 167-91 -- John Beirne and Marcel Fratzscher (2013), 'The Pricing of Sovereign Risk and Contagion During the European Sovereign Debt Crisis', Journal of International Money and Finance, 34, April, 60-82 -- Carmen M. Reinhart and Kenneth S. Rogoff (2010), 'Growth in a Time of Debt', American Economic Review, 100 (2), May, 573-78 -- Thomas Herndon, Michael Ash and Robert Pollin (2014), 'Does High Public Debt Consistently Stifle Economic Growth? A Critique of Reinhart and Rogoff', Cambridge Journal of Economics, 38 (2), December, 257-79 -- Ugo Panizza and Andrea F. Presbitero (2013), 'Public Debt and Economic Growth in Advanced Economies: A Survey', Swiss Journal of Economics in Statistics, 149 (2), 175-204 -- Anja Baum, Cristina Checherita-Westphal and Philipp Rother (2013), 'Debt and Growth: New Evidence from the Euro Area', Journal of International Money and Finance, 32, February, 809-21 -- Alan J. Auerbach, Jagadeesg Gokhale and Laurence J. Kotlikoff (1994), 'Generating Accounting: A Meaningful Way to Evaluate Fiscal Policy', Journal of Economic Perspectives, 8 (1), Winter, 73-94 -- Pierre Lemieux (2013), 'American and European Welfare States: Similar Causes, Similar Effects', Cato Journal, 33 (2), Spring/Summer, 227-32 -- Michael Tanner (2013), 'Is America Becoming Greece?', Cato Journal, 33 (2), Spring/Summer, 211-25. , John H. Cochrane (2011), 'Inflation and Debt', National Affairs, Fall, 56-78 -- Carmen Reinhart and M. Belen Sbrancia (2015), 'The Liquidation of Government Debt', Economic Policy, 30 (82), April, 291-333 -- James M. Buchanan (1986), 'The Ethics of Debt Default', in James M. Buchanan, Charles K. Rowley and Robert D. Tollison (eds.), Deficit, Oxford, UK: Basil Blackwell, 361-73 -- Geoffrey Brennan and Giuseppe Eusepi (2002), 'The Dubious Ethics of Debt Default', Public Finance Review, 30 (6), November, 546-61 -- Seema Jayachandran and Michael Kremer (2006), 'Odious Debt', American Economic Review, 96 (1), March, 82-92 -- Albert H. Choi and Eric A. Posner (2007), 'A Critique of the Odious Debt Doctrine', Law and Contemporary Problems, 70 (3), Summer, 33-51 -- Nouriel Roubini (2002), 'Do We Need a New Bankruptcy Regime?', Brookings Papers on Economic Activity, 1, 321-33 -- Andrei Shleifer (2003), 'Will the Sovereign Debt Market Survive?', American Economic Review, 93 (2), May, 85-90 -- Rohan Pitchford and Mark L. J. Wright (2012), 'Holdouts in Sovereign Debt Restructuring: A Theory of Negotiation in a Weak Contractual Environment', Review of Economic Studies, 79 (2), April, 812-37 -- Robert W. Kolb (2015), 'The Virtue of Vultures: Distressed Debt Investors in the Sovereign Debt Market', Journal of Social, Political, and Economic Studies, 40 (4), Winter, 368-412.
    Language: English
    Keywords: Electronic books. ; Electronic books ; Electronic books
    URL: FULL  ((Currently Only Available on Campus))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9949301323602882
    Format: 1 online resource (215 pages)
    ISBN: 9781484200704
    Note: Intro -- Contents at a Glance -- Contents -- About the Authors -- About the Technical Reviewers -- Acknowledgments -- Foreword -- Introduction -- Chapter 1: Introduction -- What Is Embedded Firmware? -- Where Is Firmware? -- What Do Firmware Engineers Do? -- Firmware Preparation for New Hardware -- The Mystery of Bits -- Programming Guides -- The Intel® Firmware Support Package -- The Uniqueness of Embedded Firmware -- The Choice of Firmware Stacks -- Welcome to the Era of the Internet of Things -- Technical Coverage in This Book -- The Future of Firmware -- Chapter 2: Firmware Stacks for Embedded Systems -- Is a One-Size-Fits-All Solution Possible? -- Microkernel -- Real-Time Operating S ystem (RTOS) -- Legacy BIOS -- Implementations of the UEFI Framework -- Open Source Firmware Stacks -- Proprietary Firmware Stacks -- Make o r Buy -- The Advantages of Outsourcing -- The Disadvantages of Outsourcing -- In-House Development -- Summary -- Chapter 3: Intel® Firmware Support Package (Intel® FSP) -- The Intel FSP Philosophy -- What Is in Intel FSP? -- Intel FSP Binary Format -- Sample Boot Flow -- Locating the Entries of Intel FSP -- The Hard Way to Find Intel FSP APIs: Use Data Structure -- The Easy Way to Find FSP APIs: Use Hard-Coded Constants -- Programming Interface: The APIs of Intel FSP -- TempRamInit -- FspInitEntry -- NotifyPhase -- Intel FSP Output -- API Execution Status -- Temporary Memory Data HOB -- Non-Volatile Storage HOB -- Sample Code for Parsing HOBs -- Customization of Intel FSP -- Downloading Intel FSP -- Microcode Patches -- Relocating Intel FSP -- Integration and Build -- The Future of Intel FSP -- What Is Coming in the Following Chapters -- Chapter 4: Building coreboot with Intel FSP -- The Introduction of coreboot -- The Philosophy of coreboot -- A Brief History -- v1: 1999-2000 -- v2: 2000-2005 -- v2+: 2005-2008. , v3: 2006-2008 -- 2008 LinuxBIOS Renamed "coreboot" -- v4: 2009-2012 -- v4+: 2012-2014 -- Further Reading -- Prerequisites for Working with coreboot -- Community Organization -- Git and Gerrit -- Git Commit Messages -- coreboot Sign-off Procedure -- Developer's Certificate of Origin 1.1 -- Adding Your Sign-off -- Working with the coreboot Community -- coreboot Do's -- coreboot Don'ts -- Nonsource Binaries in coreboot -- A Hands-on Example: Building coreboot for the MinnowBoard MAX Mainboard -- Environment -- Hardware: MinnowBoard MAX -- MinnowBoard MAX Platform Details -- Development Directory -- Downloading Intel FSP -- Installing Intel FSP -- Downloading the coreboot Source -- coreboot Toolchain -- coreboot Commit Hooks -- Creating a coreboot Development Branch -- Building the Mainboard -- On the Menuconfig Menu -- On the Chipset Menu -- On the Devices Menu -- Build -- Summary of Commands -- Flashing the ROM -- Preparing the Flash Programmer -- Flashing the ROM Image -- coreboot Internals -- Boot Stages -- Additional Files -- CBFS -- An Example of CBFS -- CBFS Size -- Special Binaries -- Boot Flow Using Intel FSP -- Reset Vector and Bootblock -- romstage -- ramstage -- Payload -- coreboot Source -- coreboot Device Tree -- Chips and Devices -- Device Tree Variables -- A Device Tree Example -- Chip Operations -- Device Operations -- coreboot Hardwaremain State Machine -- State Machine States -- State Machine Callbacks -- Mainboard -- The Chipset Driver -- Chipset FSP UPD Options -- The FSP Driver -- Kconfig -- xcompile -- Payloads -- SeaBIOS -- GRUB 2 -- FILO -- iPXE -- TianoCore -- Depthcharge -- U- Boot -- Memtest86+ -- libpayload -- coreboot Troubleshooting and Debugging -- Postcodes -- Serial Debug -- EHCI USB Debug -- Summary -- Chapter 5: Chrome book Firmware Internals -- About Chrome book and Chrome OS -- Chrome OS Firmware Overview. , Chrome OS Security Philosophy -- Chrome OS Security Guiding Principles -- Power wash -- Chrome OS Boot Modes -- Verified (Normal) Mode -- Recovery Mode -- Developer Mode -- Chrome OS Coreboot -- x86 -- ARM -- Depth charge Payload -- libpayload -- Verified Boot -- Verified Boot and Kernel Security -- Chrome OS Firmware Boot Log -- Boot Times Log -- Chrome OS Firmware Event Log -- Google SMI Linux Kernel Driver -- Chrome OS Extensions to the Firmware Image -- FMAP -- BOOT_STUB FMAP Section -- Chrome OS Firmware RW FMAP Sections -- An fmap.dts (RW_SECTION_A) Example -- Google Binary Block (GBB) -- GBB: HWID v3 -- GBB: Firmware Bitmaps -- GBB: Firmware Keys -- GBB: Boot Flags -- Vital Product Data ( VPD) -- Firmware TPM Usage -- Chrome OS Firmware Update -- Chrome OS Utilities -- flashrom -- gbb_utility -- GBB Flags Utility Script: set_gbb_flags.sh -- crossystem -- mosys -- Google Embedded Controller -- Power Sequencing -- Battery Charging -- Thermal Management -- Keyboard Controller -- Other Peripheral Controls -- Chrome EC Software Sync -- Software Sync Steps -- Summary -- Chapter 6: Intel FSP and UEFI Integration -- Introduction to EFI -- Introduction to FSP -- Introduction to EDK II -- Summary -- FSP Components -- FSP Wrapper Boot Flow -- Generic FSP Wrapper Boot Flow -- Normal Boot -- Boot Flow -- Memory Layout for a Normal Boot Flow -- FSP Normal Boot Data Structure -- S3 Boot -- Boot Flow -- S3 Memory Layout -- S3 NV Data Passing -- Capsule Flash Update -- Boot Flow -- Capsule Update Memory Layout -- Recovery Boot Flow -- FSP Recovery Memory Layout -- coreboot Payload Based upon EDK II -- Building Minnow and MinnowMax with FSP -- Future of the Intel FSP -- Conclusion -- Chapter 7: Building Firmware for Quark Processors -- Overview of UEFI and PI -- History of Implementations and Specifications -- Introduction to EDK II Building Blocks. , PKG: Packaging -- MdePkg -- MdeModulePkg -- IntelFrameworkPkg -- IntelFrameworkModulePkg -- Packages -- PCD: Platform Configuration Database -- Syntax -- DEC: Platform Declaration File -- Syntax -- DSC: Platform Description File -- FDF: Flash Description File -- Syntax -- Build: The EDK II Build Command -- INF: INF File -- More Information -- Introduction to the EDK II Subset -- Introduction to Quark -- ROM Flash Image Size Optimization -- Fixed Resource -- DRAM/SMRAM -- Remove Features -- Reduce Features -- Compiler Options -- Build Options -- Results of the TinyQuark Optimization -- RAM Footprint Optimization -- Optimization -- Result of Memory Usage Optimization -- Conclusion -- Chapter 8: Putting It All Together -- RTOS and Intel FSP -- Intel FSP and Open Source Philosophy -- Customization and Production of Intel FSP -- It Is a Community Effort After All -- Appendix A: Sample Boot Setting File (BSF) -- Index.
    Additional Edition: Print version: Zimmer, Vincent Embedded Firmware Solutions Berkeley, CA : Apress L. P.,c2015 ISBN 9781484200711
    Language: English
    Keywords: Electronic books. ; Electronic books.
    URL: FULL  ((Currently Only Available on Campus))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9949301350302882
    Format: 1 online resource (565 pages)
    ISBN: 9781484255742
    Note: Intro -- Table of Contents -- About the Authors -- Preface -- Acknowledgments -- Chapter 1: Introduction -- Read the Book, Not the Spec -- SYCL 1.2.1 vs. SYCL 2020, and DPC++ -- Getting a DPC++ Compiler -- Book GitHub -- Hello, World! and a SYCL Program Dissection -- Queues and Actions -- It Is All About Parallelism -- Throughput -- Latency -- Think Parallel -- Amdahl and Gustafson -- Scaling -- Heterogeneous Systems -- Data-Parallel Programming -- Key Attributes of DPC++ and SYCL -- Single-Source -- Host -- Devices -- Sharing Devices -- Kernel Code -- Kernel: Vector Addition (DAXPY) -- Asynchronous Task Graphs -- Race Conditions When We Make a Mistake -- C++ Lambda Functions -- Portability and Direct Programming -- Concurrency vs. Parallelism -- Summary -- Chapter 2: Where Code Executes -- Single-Source -- Host Code -- Device Code -- Choosing Devices -- Method#1: Run on a Device of Any Type -- Queues -- Binding a Queue to a Device, When Any Device Will Do -- Method#2: Using the Host Device for Development and Debugging -- Method#3: Using a GPU (or Other Accelerators) -- Device Types -- Accelerator Devices -- Device Selectors -- When Device Selection Fails -- Method#4: Using Multiple Devices -- Method#5: Custom (Very Specific) Device Selection -- device_selector Base Class -- Mechanisms to Score a Device -- Three Paths to Device Code Execution on CPU -- Creating Work on a Device -- Introducing the Task Graph -- Where Is the Device Code? -- Actions -- Fallback -- Summary -- Chapter 3: Data Management -- Introduction -- The Data Management Problem -- Device Local vs. Device Remote -- Managing Multiple Memories -- Explicit Data Movement -- Implicit Data Movement -- Selecting the Right Strategy -- USM, Buffers, and Images -- Unified Shared Memory -- Accessing Memory Through Pointers -- USM and Data Movement -- Explicit Data Movement in USM. , Implicit Data Movement in USM -- Buffers -- Creating Buffers -- Accessing Buffers -- Access Modes -- Ordering the Uses of Data -- In-order Queues -- Out-of-Order (OoO) Queues -- Explicit Dependences with Events -- Implicit Dependences with Accessors -- Choosing a Data Management Strategy -- Handler Class: Key Members -- Summary -- Chapter 4: Expressing Parallelism -- Parallelism Within Kernels -- Multidimensional Kernels -- Loops vs. Kernels -- Overview of Language Features -- Separating Kernels from Host Code -- Different Forms of Parallel Kernels -- Basic Data-Parallel Kernels -- Understanding Basic Data-Parallel Kernels -- Writing Basic Data-Parallel Kernels -- Details of Basic Data-Parallel Kernels -- The range Class -- The id Class -- The item Class -- Explicit ND-Range Kernels -- Understanding Explicit ND-Range Parallel Kernels -- Work-Items -- Work-Groups -- Sub-Groups -- Writing Explicit ND-Range Data-Parallel Kernels -- Details of Explicit ND-Range Data-Parallel Kernels -- The nd_range Class -- The nd_item Class -- The group Class -- The sub_group Class -- Hierarchical Parallel Kernels -- Understanding Hierarchical Data-Parallel Kernels -- Writing Hierarchical Data-Parallel Kernels -- Details of Hierarchical Data-Parallel Kernels -- The h_item Class -- The private_memory Class -- Mapping Computation to Work-Items -- One-to-One Mapping -- Many-to-One Mapping -- Choosing a Kernel Form -- Summary -- Chapter 5: Error Handling -- Safety First -- Types of Errors -- Let's Create Some Errors! -- Synchronous Error -- Asynchronous Error -- Application Error Handling Strategy -- Ignoring Error Handling -- Synchronous Error Handling -- Asynchronous Error Handling -- The Asynchronous Handler -- Invocation of the Handler -- Errors on a Device -- Summary -- Chapter 6: Unified Shared Memory -- Why Should We Use USM? -- Allocation Types -- Device Allocations. , Host Allocations -- Shared Allocations -- Allocating Memory -- What Do We Need to Know? -- Multiple Styles -- Allocations à la C -- Allocations à la C++ -- C++ Allocators -- Deallocating Memory -- Allocation Example -- Data Management -- Initialization -- Data Movement -- Explicit -- Implicit -- Migration -- Fine-Grained Control -- Queries -- Summary -- Chapter 7: Buffers -- Buffers -- Creation -- Buffer Properties -- use_host_ptr -- use_mutex -- context_bound -- What Can We Do with a Buffer? -- Accessors -- Accessor Creation -- What Can We Do with an Accessor? -- Summary -- Chapter 8: Scheduling Kernels and Data Movement -- What Is Graph Scheduling? -- How Graphs Work in DPC++ -- Command Group Actions -- How Command Groups Declare Dependences -- Examples -- When Are the Parts of a CG Executed? -- Data Movement -- Explicit -- Implicit -- Synchronizing with the Host -- Summary -- Chapter 9: Communication and Synchronization -- Work-Groups and Work-Items -- Building Blocks for Efficient Communication -- Synchronization via Barriers -- Work-Group Local Memory -- Using Work-Group Barriers and Local Memory -- Work-Group Barriers and Local Memory in ND-Range Kernels -- Local Accessors -- Synchronization Functions -- A Full ND-Range Kernel Example -- Work-Group Barriers and Local Memory in Hierarchical Kernels -- Scopes for Local Memory and Barriers -- A Full Hierarchical Kernel Example -- Sub-Groups -- Synchronization via Sub-Group Barriers -- Exchanging Data Within a Sub-Group -- A Full Sub-Group ND-Range Kernel Example -- Collective Functions -- Broadcast -- Votes -- Shuffles -- Loads and Stores -- Summary -- Chapter 10: Defining Kernels -- Why Three Ways to Represent a Kernel? -- Kernels As Lambda Expressions -- Elements of a Kernel Lambda Expression -- Naming Kernel Lambda Expressions -- Kernels As Named Function Objects. , Elements of a Kernel Named Function Object -- Interoperability with Other APIs -- Interoperability with API-Defined Source Languages -- Interoperability with API-Defined Kernel Objects -- Kernels in Program Objects -- Summary -- Chapter 11: Vectors -- How to Think About Vectors -- Vector Types -- Vector Interface -- Load and Store Member Functions -- Swizzle Operations -- Vector Execution Within a Parallel Kernel -- Vector Parallelism -- Summary -- Chapter 12: Device Information -- Refining Kernel Code to Be More Prescriptive -- How to Enumerate Devices and Capabilities -- Custom Device Selector -- Being Curious: get_info< -- > -- -- Being More Curious: Detailed Enumeration Code -- Inquisitive: get_info< -- > -- -- Device Information Descriptors -- Device-Specific Kernel Information Descriptors -- The Specifics: Those of "Correctness" -- Device Queries -- Kernel Queries -- The Specifics: Those of "Tuning/Optimization" -- Device Queries -- Kernel Queries -- Runtime vs. Compile-Time Properties -- Summary -- Chapter 13: Practical Tips -- Getting a DPC++ Compiler and Code Samples -- Online Forum and Documentation -- Platform Model -- Multiarchitecture Binaries -- Compilation Model -- Adding SYCL to Existing C++ Programs -- Debugging -- Debugging Kernel Code -- Debugging Runtime Failures -- Initializing Data and Accessing Kernel Outputs -- Multiple Translation Units -- Performance Implications of Multiple Translation Units -- When Anonymous Lambdas Need Names -- Migrating from CUDA to SYCL -- Summary -- Chapter 14: Common Parallel Patterns -- Understanding the Patterns -- Map -- Stencil -- Reduction -- Scan -- Pack and Unpack -- Pack -- Unpack -- Using Built-In Functions and Libraries -- The DPC++ Reduction Library -- The reduction Class -- The reducer Class -- User-Defined Reductions -- oneAPI DPC++ Library -- Group Functions. , Direct Programming -- Map -- Stencil -- Reduction -- Scan -- Pack and Unpack -- Pack -- Unpack -- Summary -- For More Information -- Chapter 15: Programming for GPUs -- Performance Caveats -- How GPUs Work -- GPU Building Blocks -- Simpler Processors (but More of Them) -- Expressing Parallelism -- Expressing More Parallelism -- Simplified Control Logic (SIMD Instructions) -- Predication and Masking -- SIMD Efficiency -- SIMD Efficiency and Groups of Items -- Switching Work to Hide Latency -- Offloading Kernels to GPUs -- SYCL Runtime Library -- GPU Software Drivers -- GPU Hardware -- Beware the Cost of Offloading! -- Transfers to and from Device Memory -- GPU Kernel Best Practices -- Accessing Global Memory -- Accessing Work-Group Local Memory -- Avoiding Local Memory Entirely with Sub-Groups -- Optimizing Computation Using Small Data Types -- Optimizing Math Functions -- Specialized Functions and Extensions -- Summary -- For More Information -- Chapter 16: Programming for CPUs -- Performance Caveats -- The Basics of a General-Purpose CPU -- The Basics of SIMD Hardware -- Exploiting Thread-Level Parallelism -- Thread Affinity Insight -- Be Mindful of First Touch to Memory -- SIMD Vectorization on CPU -- Ensure SIMD Execution Legality -- SIMD Masking and Cost -- Avoid Array-of-Struct for SIMD Efficiency -- Data Type Impact on SIMD Efficiency -- SIMD Execution Using single_task -- Summary -- Chapter 17: Programming for FPGAs -- Performance Caveats -- How to Think About FPGAs -- Pipeline Parallelism -- Kernels Consume Chip "Area" -- When to Use an FPGA -- Lots and Lots of Work -- Custom Operations or Operation Widths -- Scalar Data Flow -- Low Latency and Rich Connectivity -- Customized Memory Systems -- Running on an FPGA -- Compile Times -- The FPGA Emulator -- FPGA Hardware Compilation Occurs "Ahead-of-Time" -- Writing Kernels for FPGAs. , Exposing Parallelism.
    Additional Edition: Print version: Reinders, James Data Parallel C++ Berkeley, CA : Apress L. P.,c2020 ISBN 9781484255735
    Language: English
    Keywords: Electronic books. ; Electronic books
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    San Diego :Plural Publishing, Incorporated,
    UID:
    almahu_9949465355402882
    Format: 1 online resource (649 pages)
    Edition: 2nd ed.
    ISBN: 9781635501629
    Content: Covering an array of evidence-based content, including aphasia, traumatic brain injury, dementia, and language in aging, Aphasia and Other Acquired Neurogenic Language Disorders: A Guide for Clinical Excellence, Second Edition is a must-have textbook for clinicians and students studying to be speech-language pathologists. This clinical guide strategically addresses scientific foundations, service delivery, international and multicultural perspectives, assessment, and treatment.
    Note: Intro -- What Is Special About This Book? -- Acknowledgments -- About the Author -- Dedication -- Section I. Welcome and Introduction -- Chapter 1. Welcome to the Fantastic World of Research and Clinical Practice in Acquired Neurogenic Communication Disorders -- What Are Acquired Cognitive-Linguistic Disorders? -- Which Neurogenic Communication Disorders Are Not Acquired Language Disorders? -- What Is Clinical Aphasiology? -- What Is So Fantastic About the World of Neurogenic Communication Disorders? -- We Work With Wonderful People and Become Part of Their Rich Life Stories -- We Are Catalysts for Positive Change -- We Enjoy Empowerment of Others Through Advocacy and Leadership -- We Enjoy a Great Deal of Humor and Fascination -- We Enjoy Fantastic Local and Worldwide Professional Networks -- Our Work Is Multicultural and Multilingual -- We Are Lifelong Learners -- We Tap Into Our Most Scientific and Our Most Creative Selves at the Same Time -- We Have Rich Career Opportunities -- What Disciplines Are Relevant to Aphasia and Related Disorders? -- What Is Known About the Incidence and Prevalence of Acquired Neurogenic Language Disorders? -- Where Do Aphasiologists Work? -- What Is the Career Outlook for Clinical Aphasiologists? -- Learning and Reflection Activities -- Chapter 2. Becoming the Ultimate Excellent Clinician -- What Makes a Clinician Truly Excellent? -- What Can One Do to Become an Excellent Clinical Aphasiologist? -- How Do the People We Serve Characterize What They Most Want? -- What Are Some Traits of People Who Are Perceived as Unhelpful Clinicians? -- What Content Is Important to Master? -- What Credentials Are Required for a Career as an Aphasiologist? -- What Credentials May Aphasiologists Earn Beyond Their Basic Academic and Clinical Credentials? -- Is It Best to Specialize or Generalize?. , What Strategies Help Boost Career Development in Acquired Cognitive-Linguistic Disorders? -- What Organizations Support Professional Information Sharing and Networking Among Clinical Aphasiologists? -- Learning and Reflection Activities -- Chapter 3. Writing and Talking About the People With Whom We Work -- What Is Important to Consider in Writing and Talking About People With Neurogenic Cognitive-Linguistic Disorders? -- Person-First Language -- Alternatives to the Word Patient -- People With Disabilities -- Research Participants -- Older People -- Healthy Adults -- What Are Important Nuances in Terms We Use to Refer to People Who Care for People With Neurogenic Cognitive-Linguistic Disorders? -- What Is the Difference Between the Terms Therapy and Treatment ? -- Neurotypical People -- What Are Pros and Cons of Terms Used to Refer to SLPs? -- What Are the Preferred Terms When Referring to the Experts Who Work With People Who Have Neurogenic Communication Challenges? -- What Is Important to Keep in Mind Regarding Inclusive and Welcoming Language? -- What Other Terms Might Unintentionally Convey Negative Connotations? -- Why Are There Inconsistencies in the Prefixes Used in Terms for Characterizing Neurogenic Symptoms, and What Is the Rationale for Varied Prefix Choices? -- Learning and Reflection Activities -- Section II. Foundations for Considering Acquired Neurogenic Language Disorders -- Chapter 4. Defining and Conceptualizing Aphasia -- What Is a Good Way to Define Aphasia? -- Aphasia Is Acquired -- Aphasia Has a Neurological Cause -- Aphasia Affects Reception and Production of Language Across Modalities -- Aphasia Is Not a Speech, Intellectual, Sensory, or Psychiatric Disorder -- How Have Established Aphasiologists Defined Aphasia? -- What Are the Primary Frameworks for Conceptualizing Aphasia? -- Unidimensional Frameworks. , Multidimensional Frameworks -- Medical Frameworks -- Cognitive Neuropsychological, Psycholinguistic, and Neurolinguistic Frameworks -- Biopsychosocial Frameworks -- Social Frameworks -- Social Determinants of Health Frameworks -- Other Historically Relevant Frameworks -- How Does One Choose a Preferred Framework for Conceptualizing Aphasia? -- How Are the Frameworks for Conceptualizing Aphasia Relevant to Other Neurogenic Language Disorders? -- Learning and Reflection Activities -- Chapter 5. The WHO ICF, Human Rights Perspectives, and Life Participation Approaches -- What Is the WHO ICF? -- How Is the WHO ICF Relevant to Ethics and Human Rights? -- How Is the WHO ICF Specifically Relevant to Intervention and Research in Rehabilitation? -- How Is the WHO ICF Specifically Relevant to People With Neurogenic Language Disorders? -- Learning and Reflection Activities -- Chapter 6. Etiologies of Acquired Neurogenic Language Disorders -- What Is a Stroke? -- What Are Stroke Risk Factors, and What Causes Stroke? -- What Are the Physiological Effects of Stroke? -- How Crucial Is Timing for Medical Treatment After a Stroke? -- How Is the Sudden Onset of Stroke Relevant to Supporting Patients and Families? -- What Is a Transient Ischemic Attack? -- What Is Hypoperfusion? -- What Can Be Done to Prevent Stroke? -- Attending to Stroke Triggers -- What Is TBI? -- What Are Blast Injuries? -- What Are Concussion and Mild TBI? -- What Can Be Done to Prevent TBI? -- What Are Bacteria and Viruses? -- What Other Types of Infections Affect Cortical Function? -- What Is Neoplasm? -- What Is Toxemia? -- What Are Diabetes Mellitus and Diabetic Encephalopathy? -- What Is Metabolic Syndrome? -- What Other Metabolic Disorders Cause Encephalopathy? -- What Is Neurodegenerative Disease? -- What Is Dementia? -- What Is Mild Cognitive Impairment?. , What Is Primary Progressive Aphasia? -- What Are Some Special Challenges in Identifying Etiologies of Cognitive-Linguistic Disorders? -- Learning and Reflection Activities -- Chapter 7. Neurophysiology and Neuropathology of Acquired Neurogenic Language Disorders -- What Should SLPs Know About Neuroanatomy and Neurophysiology Associated With Neurogenic Cognitive-Linguistic Disorders? -- What Are Key Neurophysiological Principles Pertinent to Acquired Cognitive-Linguistic Disorders? -- Specialization of Structure and Function -- Interconnectivity Throughout the Brain -- The Brain's Plasticity -- What Is the Most Clinically Pertinent Knowledge an Aphasiologist Should Have About the Blood Supply to the Brain? -- What Factors Affect a Person's Prognosis for Recovery From a Stroke or Brain Injury? -- Why Is It Important for Clinical Aphasiologists to Know About the Visual System? -- What Aspects of the Visual System Are Most Relevant to People With Neurogenic Language Disorders? -- Anatomy and Physiology Associated With Visual Deficits -- How Are Visual Field Deficits Characterized? -- What Are Ocular Motor Deficits? -- What Are Visual Attention Deficits? -- What Are Higher-Level Visual Deficits? -- What Aspects of the Neurophysiology of Hearing Are Most Relevant to People With Neurogenic Language Disorders? -- Learning and Reflection Activities -- Supplemental Review of Neuroanatomy Related to Aphasiology -- Supplemental Review of Blood Supply to the Brain -- Supplemental Review of the Visual System -- Supplemental Review of the Auditory System -- Chapter 8. Neuroimaging and Other Neurodiagnostic Instrumentation -- What Are the Most Relevant Neuroimaging Techniques for Aphasiologists to Know About? -- Computed Axial Tomography (CAT or CT) -- Magnetic Resonance Imaging (MRI) -- Single Photon Emission Computed Tomography (SPECT) -- Cerebral Angiography. , What Other Neurodiagnostic Methods Are Important for Aphasiologists to Know About? -- Electroencephalography (EEG) -- Electrocorticography -- Additional Methods -- Learning and Reflection Activities -- Chapter 9. Aging, Which Is Not a Disorder, and Its Relevance to Aphasiology -- What Is Aging? -- What Are Key Theories About Aging That Are Especially Relevant to Cognition and Communication? -- What Is Aging Well? -- How Are Demographic Shifts in Aging Populations Relevant to Clinical Aphasiologists? -- What Are Normal Changes in the Brain as People Age? -- What Are Positive Aspects of the Aging Brain? -- Memory -- Word Finding -- Syntactic Processing -- Reading and Writing -- Discourse -- Pragmatics -- What Are General Guidelines for Differentiating Normal From Impaired Language in Older Adults? -- What Theories Have Been Proposed to Account for Cognitive-Linguistic Changes With Aging? -- Resource Capacity Theories -- Working Memory Theories -- Context-Processing Deficiency Theories -- Signal Degradation Theories -- Transmission Deficit Theories -- Speed-of-Processing Theories -- Inhibition Theories -- What Can Be Done to Ensure the Best Preservation of Language Abilities as People Age? -- What Is Elderspeak, and How May We Raise Awareness About It? -- What Sensitivities Related to Ageism Are Important for Aphasiologists to Demonstrate? -- Learning and Reflection Activities -- Section III. Features, Symptoms, and Syndromes in the Major Categories of Cognitive-Linguistic Disorders -- Chapter 10. Syndromes and Hallmark Characteristics of Aphasia -- How Are the Types of Aphasia Classified? -- What Are the Classic Syndromes of Aphasia, and What Are the Hallmark Characteristics of Each? -- Expressive/Receptive, Nonfluent/Fluent, and Anterior/Posterior Dichotomies -- Classic Aphasia Classification -- Wernicke's Aphasia -- Broca's Aphasia -- Global Aphasia. , Conduction Aphasia.
    Additional Edition: Print version: Hallowell, Brooke Aphasia and Other Acquired Neurogenic Language Disorders San Diego : Plural Publishing, Incorporated,c2019 ISBN 9781635501599
    Language: English
    Keywords: Electronic books. ; Electronic books ; Electronic books
    URL: FULL  ((OIS Credentials Required))
    URL: FULL  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almahu_BV043791421
    Format: XV, 192 Seiten.
    ISBN: 978-1-119-21234-8
    Content: "Case studies and strategies for more effective multi-generational management Clash of the Generations explores this new and increasingly common workplace phenomenon, and provides strategies to help managers navigate this ever more complex maze. Traditionally, older workers would retire and make room for the next generation; instead, Baby Boomers are now prolonging their time in the workplace, yet the successive generations are still coming in. Senior leaders are now left to manage a blended workplace comprised of up to four generations...each with their own ideas of work ethic, work/life balance, long-term career goals, and much more. Management is challenging at the best of times, but the new prevalence of generation gaps...sometimes even layered...add an entirely new dimension to an already complex responsibility. This book presents case studies and interviews with representatives of companies with age-diverse workforces, detailing innovative strategies for smoothing out the bumps and helping everyone work together. Managers have long wished that their positions came with an instruction manual, and this book delivers with a host of effective inter-generational management strategies illustrated by real-world companies. Manage the multi-generation workplace more effectively Navigate the generational culture clash Adopt proven strategies for helping everyone get along Promote a more positive culture amidst clashing expectations Every generation in the workplace has value, each has their own strengths, their own weaknesses, and their own unique talents. Each is indispensable, and when they come together as a synergistic force, they can be unstoppable. Effective management means bringing out the best in your workforce, and the strategies presented in Clash of the Generations help you streamline your varied workforce into a team more valuable than the sum of its parts"...
    Content: "Clash of the Generations details proven strategies that managers and senior leaders can employ to ensure that everyone gets along in the sandbox"...
    Note: Includes bibliographical references and index
    Additional Edition: Erscheint auch als Onlineausgabe, Adobe PDF ISBN 978-1-119-21246-1
    Additional Edition: Erscheint auch als Onlineausgabe, epub ISBN 978-1-119-21247-8
    Language: English
    Subjects: Economics
    RVK:
    RVK:
    RVK:
    Keywords: Personalpolitik ; Belegschaft ; Altersstruktur ; Generationskonflikt
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    b3kat_BV044377124
    Format: 1 Online-Ressource
    ISBN: 9781785420160
    Series Statement: Critical Climate Change
    Content: Following on from Theory and the Disappearing Future, Cohen, Colebrook and Miller turn their attention to the eco-critical and environmental humanities’ newest and most fashionable of concepts, the Anthropocene. The question that has escaped focus, as "tipping points" are acknowledged as passed, is how language, mnemo-technologies, and the epistemology of tropes appear to guide the accelerating ecocide, and how that implies a mutation within reading itself—from the era of extinction events.Only in this moment of seeming finality, the authors argue, does there arise an opportunity to be done with mourning and begin reading. Drawing freely on Paul de Man’s theory of reading, anthropomorphism and the sublime, Twilight of the Anthropocene Idols argues for a mode of critical activism liberated from all-too-human joys and anxieties regarding the future. It was quite a few decades ago (1983) that Jurgen Habermas declared that ‘master thinkers had fallen on hard times.’ His pronouncement of hard times was premature. For master thinkers it is the best of times. Not only is the world, supposedly, falling into a complete absence of care, thought and frugality, a few hyper-masters have emerged to tell us that these hard times should be the best of times. It is precisely because we face the end that we should embrace our power to geo-engineer, stage the revolution, return to profound thinking, reinvent the subject, and recognize ourselves fully as one global humanity. Enter anthropos
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-78542-015-3
    Language: English
    URL: Volltext  (kostenfrei)
    Author information: Miller, J. Hillis 1928-2021
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    New York : Oxford University Press
    UID:
    b3kat_BV043960972
    Format: xxii, 147 pages
    ISBN: 9780199742134 , 0199742138 , 9780195396348 , 0195396340 , 9780195396331 , 0195396332
    Series Statement: What everyone needs to know
    Note: Includes bibliographical references and index , Defining social entrepreneurship -- What is social entrepreneurship? -- When did it emerge as a global movement? -- Who are the pioneers? -- What does a social entrepreneur do? -- What are social entrepreneurs like? -- What is the difference between social and business entrepreneurship? -- What are the differences between social entrepreneurship and government? -- How is social entrepreneurship different from activism? -- What is the relationship between social entrepreneurship and democracy? -- Challenges of causing change -- What are the main financial constraints? -- How do social entrepreneurs build organizations and enterprises? -- Can the field attract and cultivate talented workers? -- How do social entrepreneurs evaluate their impact? -- What is the difference between scale and impact? -- What's stopping social change? -- Envisioning an innovating society -- How is social entrepreneurship changing minds? -- How could schools nurture social innovators? -- What is being done at the university level? -- What can governments do to engage more successfully with social entrepreneurs? -- How is social entrepreneurship influencing business? -- Can philanthropy be more effective? -- How will the field of social entrepreneurship influence journalism? -- How can individuals prepare themselves to participate in the field of social entrepreneurship? , "In development circles, there is now widespread consensus that social entrepreneurs represent a far better mechanism to respond to needs than we have ever had before, a decentralized and emergent force that remains our best hope for solutions that can keep pace with our problems and create a more peaceful world. The author's book on social entrepreneurship, How to Change the World, was hailed by Nicholas Kristof in The New York Times as 'a bible in the field' and published in more than twenty countries. Now, he shifts the focus from the profiles of successful social innovators in that book, and teams with Susan Davis, a founding board member of the Grameen Foundation, to offer the first general overview of social entrepreneurship. In a Q & A format allowing readers to go directly to the information they need, the authors map out social entrepreneurship in its broadest terms as well as in its particulars. They explain what social entrepreneurs are, how their organizations function, and what challenges they face. The book will give readers an understanding of what differentiates social entrepreneurship from standard business ventures and how it differs from traditional grant based non-profit work. Unlike the typical top down, model-based approach to solving problems employed by the World Bank and other large institutions, social entrepreneurs work through a process of iterative learning, learning by doing, working with communities to find unique, local solutions to unique, local problems. Most importantly, the book shows readers exactly how they can get involved. It is for anyone inspired by Barack Obama's call to service and who wants to learn more about the essential features and enormous promise of this new method of social change"--Provided by publisher
    Language: English
    Keywords: Entrepreneurship ; Nonprofit-Bereich ; Soziale Probleme ; Problemlösen ; Electronic books
    URL: FULL  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages