Listing 1 - 10 of 18 | << page >> |
Sort by
|
Choose an application
The Grid is an emerging infrastructure that will fundamentally change the way we think about-and use-computing. The word Grid is used by analogy with the electric power grid, which provides pervasive access to electricity and has had a dramatic impact on human capabilities and society. Many believe that by allowing all components of our information technology infrastructure-computational capabilities, databases, sensors, and people-to be shared flexibly as true collaborative tools the Grid will have a similar transforming effect, allowing new classes of applications to emerge.
Computer architecture. Operating systems --- Information systems --- gedistribueerde besturing --- virtuele organisatie --- databanken --- datacommunicatie --- infrastructuur --- computernetwerken --- sensoren --- Computational grids (Computer systems). --- Computational grids (Computer systems) --- Grid computing --- Grids, Computational (Computer systems) --- Computer systems --- Cyberinfrastructure --- Cyberinfrastructure. --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Information technology --- Computer networks --- Distributed databases --- High performance computing --- Distributed processing
Choose an application
Digital Technology is becoming ever more used by people with learning disabilities for information, entertainment and to enjoy self-expression. Despite this, there is a paucity of research into how this cohort negotiate electronic interfaces, interpret images, navigate pages and read online; what barriers there might be, and how these could be obviated. This book explores these issues, establishing how these and other factors facilitate or inhibit information access and behaviour more generally. There are plenty of guidelines and accessibility standards regarding electronic information presentation, but most are outdated or have been formulated without empirical evidence. Unlike prior literature this book is the result of many years's research in the field, considers specific information contexts, and develops new concepts in information behaviour. It is written in non-technical, jargon-free language, relevant for academics, students and professionals; from human-computer interaction researchers, learning disability specialists and information scientists to formal and informal carers and supporters, college tutors, family members and others.
People with mental disabilities --- Cyberinfrastructure. --- Computer network resources. --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Information technology --- Computer networks --- Computer systems --- Distributed databases --- High performance computing --- Intellectually disabled persons --- Mental disabilities, People with --- Mentally deficient persons --- Mentally disabled persons --- Mentally disordered persons --- Mentally handicapped --- Mentally retarded persons --- People with intellectual disabilities --- Retarded persons --- People with disabilities --- Intellectual disability --- Mentally ill --- Distributed processing
Choose an application
Gain a foundational understanding of SRE and learn its basic concepts and architectural best practices for deploying Azure IaaS, PaaS, and microservices-based resilient architectures. The book starts with the base concepts of SRE operations and developer needs, followed by definitions and acronyms of Service Level Agreements in real-world scenarios. Moving forward, you will learn how to build resilient IaaS solutions, PaaS solutions, and microservices architecture in Azure. Here you will go through Azure reference architecture for high-available storage, networking and virtual machine computing, describing Availability Sets and Zones and Scale Sets as main scenarios. You will explore similar reference architectures for Platform Services such as App Services with Web Apps, and work with data solutions like Azure SQL and Azure Cosmos DB. Next, you will learn automation to enable SRE with Azure DevOps Pipelines and GitHub Actions. You'll also gain an understanding of how an open culture around post-mortems dramatically helps in optimizing SRE and the overall company culture around managing and running IT systems and application workloads. You'll be exposed to incent management and monitoring practices, by making use of Azure Monitor/Log Analytics/Grafana, which forms the foundation of monitoring Azure and Hybrid-running workloads. As an extra, the book covers two new testing solutions: Azure Chaos Studio and Azure Load Testing. These solutions will make it easier to test the resilience of your services. After reading this book, you will understand the underlying concepts of SRE and its implementation using Azure public cloud.
Reliability (Engineering) --- Microsoft Azure (Computing platform) --- Engineering --- Cyberinfrastructure --- Management. --- Reliability of equipment --- Systems reliability --- Maintainability (Engineering) --- Probabilities --- Systems engineering --- Plant performance --- Safety factor in engineering --- Structural failures --- Windows Azure (Computing platform) --- Computing platforms --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Information technology --- Computer networks --- Computer systems --- Distributed databases --- High performance computing --- Civil engineering --- Structural engineering --- Distributed processing --- Management
Choose an application
Cyberinfrastructure --- Computer networks --- Computer security. --- Situational awareness. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Information technology --- Computer systems --- Distributed databases --- High performance computing --- Situation awareness --- SA (Cognitive psychology) --- Awareness --- Human engineering --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Security measures. --- Distributed processing --- Protection --- Security measures
Choose an application
Grids are a crucial enabling technology for scientific and industrial development. Grid and Services Evolution, the 11th edited volume of the CoreGRID series, was based on The CoreGRID Middleware Workshop, held in Barcelona, Spain , June 5-6, 2008. Grid and Services Evolution provides a bridge between the application community and the developers of middleware services, especially in terms of parallel computing. This edited volume brings together a critical mass of well-established researchers worldwide, from forty-two institutions active in the fields of distributed systems and middleware, programming models, algorithms, tools and environments. Grid and Services Evolution is designed for a professional audience composed of researchers and practitioners within the Grid community industry. This volume is also suitable for advanced-level students in computer science. .
Information Technology --- Computer Science (Hardware & Networks) --- Computational grids (Computer systems) --- Cyberinfrastructure --- Cyber-based information systems --- Cyber-infrastructure --- Computer science. --- Computer organization. --- Microprocessors. --- Computer communication systems. --- Computer Science. --- Computer Communication Networks. --- Processor Architectures. --- Computer Systems Organization and Communication Networks. --- Electronic data processing --- Information technology --- Computer networks --- Computer systems --- Distributed databases --- High performance computing --- Distributed processing --- Computer network architectures. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Informatics --- Science --- Organization, Computer --- Electronic digital computers --- Minicomputers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Network computers
Choose an application
Information technology --- Cloud computing --- Cyberinfrastructure --- Information warfare --- Telecommunication --- Computer networks --- S10/0835 --- S10/0700 --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Electronic data processing --- Network computers --- Military art and science --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Cyber-based information systems --- Cyber-infrastructure --- Computer systems --- Distributed databases --- High performance computing --- Web services --- Government policy --- Management --- China: Economics, industry and commerce--Postal service and telecommunications: since 1949 (including E-commerce) --- China: Economics, industry and commerce--International economic relations (incl. development aid and problems, WTO) --- Distributed processing
Choose an application
On various examples ranging from geosciences to environmental sciences, this book explains how to generate an adequate description of uncertainty, how to justify semiheuristic algorithms for processing uncertainty, and how to make these algorithms more computationally efficient. It explains in what sense the existing approach to uncertainty as a combination of random and systematic components is only an approximation, presents a more adequate three-component model with an additional periodic error component, and explains how uncertainty propagation techniques can be extended to this model. The book provides a justification for a practically efficient heuristic technique (based on fuzzy decision-making). It explains how the computational complexity of uncertainty processing can be reduced. The book also shows how to take into account that in real life, the information about uncertainty is often only partially known, and, on several practical examples, explains how to extract the missing information about uncertainty from the available data.
Engineering. --- Computational Intelligence. --- Data Mining and Knowledge Discovery. --- Statistics for Engineering, Physics, Computer Science, Chemistry and Earth Sciences. --- Data mining. --- Ingénierie --- Exploration de données (Informatique) --- Engineering & Applied Sciences --- Computer Science --- Uncertainty (Information theory) --- Cyberinfrastructure. --- Cyber-based information systems --- Cyber-infrastructure --- Measure of uncertainty (Information theory) --- Shannon's measure of uncertainty --- System uncertainty --- Statistics. --- Computational intelligence. --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Statistical analysis --- Statistical data --- Statistical methods --- Statistical science --- Mathematics --- Econometrics --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Construction --- Industrial arts --- Technology --- Electronic data processing --- Information technology --- Computer networks --- Computer systems --- Distributed databases --- High performance computing --- Information measurement --- Probabilities --- Questions and answers --- Distributed processing --- Statistics .
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International ICST Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2012, held in Yaounde, Cameroon, in November 2012. The 24 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers cover a wide range of topics in the field of information and communication infrastructures and are grouped in topical sections on: e-Infrastructure, e-Services, e-Society, e-Health, and e-Security.
Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Computers and civilization. --- Computer Science. --- Computers and Society. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Computer networks --- Information technology --- Cyberinfrastructure --- Wireless communication systems --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Telecommunication systems --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Computer systems --- Distributed databases --- High performance computing --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Network computers --- Distributed processing --- Informatics --- Science --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Civilization and computers --- Civilization
Choose an application
"There is increasing concern that Air Force systems containing information technology are vulnerable to intelligence exploitation and offensive attack through cyberspace. In this report, the authors analyze how the Air Force acquisition/life-cycle management community can improve cybersecurity throughout the life cycle of its military systems. The focus is primarily on the subset of procured systems for which the Air Force has some control over design, architectures, protocols, and interfaces (e.g., weapon systems, platform information technology), as opposed to commercial, off-the-shelf information technology and business systems. The main themes in the authors' findings are that cybersecurity laws and policies were created to manage commercial, off-the-shelf information technology and business systems and do not adequately address the challenges of securing military systems. Nor do they adequately capture the impact to operational missions. Cybersecurity is mainly added on to systems, not designed in. The authors recommend 12 steps that the Air Force can take to improve the cybersecurity of its military systems throughout their life cycles"--Provided by publisher.
Computer networks --- Cyberinfrastructure --- Cyberspace --- Risk assessment --- Cyberterrorism --- National security --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Security measures --- Evaluation --- Prevention --- Computer security --- National security policy --- NSP (National security policy) --- Security policy, National --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Analysis, Risk --- Assessment, Risk --- Risk analysis --- Risk evaluation --- Cyber-based information systems --- Cyber-infrastructure --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Government policy --- Economic policy --- International relations --- Military policy --- Computer crimes --- Terrorism --- Electronic data processing --- Information technology --- Computer systems --- Distributed databases --- High performance computing --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Network computers --- Distributed processing --- Electronic terrorism (Cyberterrorism) --- United States. --- Rules and practice. --- AF (Air force) --- Air Force (U.S.) --- U.S.A.F. (Air force) --- United States Air Force --- US Air Force --- USAF (Air force)
Choose an application
Protection of enterprise networks from malicious intrusions is critical to the economy and security of our nation. This article gives an overview of the techniques and challenges for security risk analysis of enterprise networks. A standard model for security analysis will enable us to answer questions such as “are we more secure than yesterday” or “how does the security of one network configuration compare with another one”. In this article, we will present a methodology for quantitative security risk analysis that is based on the model of attack graphs and the Common Vulnerability Scoring System (CVSS). Our techniques analyze all attack paths through a network, for an attacker to reach certain goal(s).
Computer networks --- Cyberinfrastructure --- Cyber-based information systems --- Cyber-infrastructure --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Computer network security --- Network security, Computer --- Security of computer networks --- Security measures. --- Risk assessment --- Methodology. --- Computer science. --- Computer software --- Computer communication systems. --- Computer system failures. --- Computer security. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Performance and Reliability. --- System Performance and Evaluation. --- Reusability. --- Electronic data processing --- Information technology --- Computer systems --- Distributed databases --- High performance computing --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Network computers --- Computer security --- Distributed processing --- Operating systems (Computers). --- Computer system performance. --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Operating systems --- Protection --- Security measures --- Computer software—Reusability. --- Computer failures --- Computer malfunctions --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Failures
Listing 1 - 10 of 18 | << page >> |
Sort by
|