Listing 1 - 10 of 12 | << page >> |
Sort by
|
Choose an application
Computer networks --- Cyberspace --- Cyberinfrastructure --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Information technology --- Computer systems --- Distributed databases --- High performance computing --- Space and time --- Computers --- Telematics --- Distributed processing
Choose an application
Business enterprises --- Intelligent agents (Computer software) --- Cyberinfrastructure --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Information technology --- Computer networks --- Computer systems --- Distributed databases --- High performance computing --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Data processing --- Distributed processing
Choose an application
The Grid is an emerging infrastructure that will fundamentally change the way we think about-and use-computing. The word Grid is used by analogy with the electric power grid, which provides pervasive access to electricity and has had a dramatic impact on human capabilities and society. Many believe that by allowing all components of our information technology infrastructure-computational capabilities, databases, sensors, and people-to be shared flexibly as true collaborative tools the Grid will have a similar transforming effect, allowing new classes of applications to emerge.
Computer architecture. Operating systems --- Information systems --- gedistribueerde besturing --- virtuele organisatie --- databanken --- datacommunicatie --- infrastructuur --- computernetwerken --- sensoren --- Computational grids (Computer systems). --- Computational grids (Computer systems) --- Grid computing --- Grids, Computational (Computer systems) --- Computer systems --- Cyberinfrastructure --- Cyberinfrastructure. --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Information technology --- Computer networks --- Distributed databases --- High performance computing --- Distributed processing
Choose an application
Power resources --- Smart power grids --- Cyberinfrastructure --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Information technology --- Computer networks --- Computer systems --- Distributed databases --- High performance computing --- Grids, Smart power --- Power grids, Smart --- Smart grids (Electric power distribution) --- Electric power distribution --- Distributed processing --- Automation
Choose an application
Digital Technology is becoming ever more used by people with learning disabilities for information, entertainment and to enjoy self-expression. Despite this, there is a paucity of research into how this cohort negotiate electronic interfaces, interpret images, navigate pages and read online; what barriers there might be, and how these could be obviated. This book explores these issues, establishing how these and other factors facilitate or inhibit information access and behaviour more generally. There are plenty of guidelines and accessibility standards regarding electronic information presentation, but most are outdated or have been formulated without empirical evidence. Unlike prior literature this book is the result of many years's research in the field, considers specific information contexts, and develops new concepts in information behaviour. It is written in non-technical, jargon-free language, relevant for academics, students and professionals; from human-computer interaction researchers, learning disability specialists and information scientists to formal and informal carers and supporters, college tutors, family members and others.
People with mental disabilities --- Cyberinfrastructure. --- Computer network resources. --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Information technology --- Computer networks --- Computer systems --- Distributed databases --- High performance computing --- Intellectually disabled persons --- Mental disabilities, People with --- Mentally deficient persons --- Mentally disabled persons --- Mentally disordered persons --- Mentally handicapped --- Mentally retarded persons --- People with intellectual disabilities --- Retarded persons --- People with disabilities --- Intellectual disability --- Mentally ill --- Distributed processing
Choose an application
Gain a foundational understanding of SRE and learn its basic concepts and architectural best practices for deploying Azure IaaS, PaaS, and microservices-based resilient architectures. The book starts with the base concepts of SRE operations and developer needs, followed by definitions and acronyms of Service Level Agreements in real-world scenarios. Moving forward, you will learn how to build resilient IaaS solutions, PaaS solutions, and microservices architecture in Azure. Here you will go through Azure reference architecture for high-available storage, networking and virtual machine computing, describing Availability Sets and Zones and Scale Sets as main scenarios. You will explore similar reference architectures for Platform Services such as App Services with Web Apps, and work with data solutions like Azure SQL and Azure Cosmos DB. Next, you will learn automation to enable SRE with Azure DevOps Pipelines and GitHub Actions. You'll also gain an understanding of how an open culture around post-mortems dramatically helps in optimizing SRE and the overall company culture around managing and running IT systems and application workloads. You'll be exposed to incent management and monitoring practices, by making use of Azure Monitor/Log Analytics/Grafana, which forms the foundation of monitoring Azure and Hybrid-running workloads. As an extra, the book covers two new testing solutions: Azure Chaos Studio and Azure Load Testing. These solutions will make it easier to test the resilience of your services. After reading this book, you will understand the underlying concepts of SRE and its implementation using Azure public cloud.
Reliability (Engineering) --- Microsoft Azure (Computing platform) --- Engineering --- Cyberinfrastructure --- Management. --- Reliability of equipment --- Systems reliability --- Maintainability (Engineering) --- Probabilities --- Systems engineering --- Plant performance --- Safety factor in engineering --- Structural failures --- Windows Azure (Computing platform) --- Computing platforms --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Information technology --- Computer networks --- Computer systems --- Distributed databases --- High performance computing --- Civil engineering --- Structural engineering --- Distributed processing --- Management
Choose an application
"There is increasing concern that Air Force systems containing information technology are vulnerable to intelligence exploitation and offensive attack through cyberspace. In this report, the authors analyze how the Air Force acquisition/life-cycle management community can improve cybersecurity throughout the life cycle of its military systems. The focus is primarily on the subset of procured systems for which the Air Force has some control over design, architectures, protocols, and interfaces (e.g., weapon systems, platform information technology), as opposed to commercial, off-the-shelf information technology and business systems. The main themes in the authors' findings are that cybersecurity laws and policies were created to manage commercial, off-the-shelf information technology and business systems and do not adequately address the challenges of securing military systems. Nor do they adequately capture the impact to operational missions. Cybersecurity is mainly added on to systems, not designed in. The authors recommend 12 steps that the Air Force can take to improve the cybersecurity of its military systems throughout their life cycles"--Provided by publisher.
Computer networks --- Cyberinfrastructure --- Cyberspace --- Risk assessment --- Cyberterrorism --- National security --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Security measures --- Evaluation --- Prevention --- Computer security --- National security policy --- NSP (National security policy) --- Security policy, National --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Analysis, Risk --- Assessment, Risk --- Risk analysis --- Risk evaluation --- Cyber-based information systems --- Cyber-infrastructure --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Government policy --- Economic policy --- International relations --- Military policy --- Computer crimes --- Terrorism --- Electronic data processing --- Information technology --- Computer systems --- Distributed databases --- High performance computing --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Network computers --- Distributed processing --- Electronic terrorism (Cyberterrorism) --- United States. --- Rules and practice. --- AF (Air force) --- Air Force (U.S.) --- U.S.A.F. (Air force) --- United States Air Force --- US Air Force --- USAF (Air force)
Choose an application
In Knowledge Machines, Eric Meyer and Ralph Schroeder argue that digital technologies have fundamentally changed research practices in the sciences, social sciences, and humanities. Meyer and Schroeder show that digital tools and data, used collectively and in distributed mode -- which they term e-research -- have transformed not just the consumption of knowledge but also the production of knowledge. Digital technologies for research are reshaping how knowledge advances in disciplines that range from physics to literary analysis. Meyer and Schroeder map the rise of digital research and offer case studies from many fields, including biomedicine, social science uses of the Web, astronomy, and large-scale textual analysis in the humanities. They consider such topics as the challenges of sharing research data and of big data approaches, disciplinary differences and new forms of interdisciplinary collaboration, the shifting boundaries between researchers and their publics, and the ways that digital tools promote openness in science.This book considers the transformations of research from a number of perspectives, drawing especially on the sociology of science and technology and social informatics. It shows that the use of digital tools and data is not just a technical issue; it affects research practices, collaboration models, publishing choices, and even the kinds of research and research questions scholars choose to pursue. Knowledge Machines examines the nature and implications of these transformations for scholarly research.
Research --- Cyberinfrastructure. --- Interdisciplinary research. --- Open access publishing. --- Internet research. --- Communication in learning and scholarship --- Data processing. --- Technological innovations. --- Cyberinfrastructure --- Interdisciplinary research --- Open access publishing --- Internet research --- Data processing --- Technological innovations --- Science --- History as a science --- Communication in scholarship --- Scholarly communication --- Learning and scholarship --- Electronic data processing in research --- Open access to research --- Research, Open access to --- Electronic publishing --- IDR (Research) --- Research, Interdisciplinary --- Transdisciplinary research --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Information technology --- Computer networks --- Computer systems --- Distributed databases --- High performance computing --- Science research --- Scientific research --- Information services --- Methodology --- Research teams --- Distributed processing --- Research - Data processing --- Research - Technological innovations --- Communication in learning and scholarship - Technological innovations --- INFORMATION SCIENCE/General --- SCIENCE, TECHNOLOGY & SOCIETY/General --- INFORMATION SCIENCE/Internet Studies --- Web research
Choose an application
This book focuses on the vulnerabilities of state and local services to cyber-threats and suggests possible protective action that might be taken against such threats. Cyber-threats to U.S. critical infrastructure are of growing concern to policymakers, managers and consumers. Information and communications technology (ICT) is ubiquitous and many ICT devices and other components are interdependent; therefore, disruption of one component may have a negative, cascading effect on others. Cyber-attacks might include denial of service, theft or manipulation of data. Damage to critical infrastructure through a cyber-based attack could have a significant impact on the national security, the economy, and the livelihood and safety of many individual citizens. Traditionally cyber security has generally been viewed as being focused on higher level threats such as those against the internet or the Federal government. Little attention has been paid to cyber-security at the state and local level. However, these governmental units play a critical role in providing services to local residents and consequently are highly vulnerable to cyber-threats. The failure of these services, such as waste water collection and water supply, transportation, public safety, utility services, and communication services, would pose a great threat to the public. Featuring contributions from leading experts in the field, this volume is intended for state and local government officials and managers, state and Federal officials, academics, and public policy specialists.
Cyberinfrastructure --- Security measures. --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Information technology --- Computer networks --- Computer systems --- Distributed databases --- High performance computing --- Distributed processing --- Political science. --- Environmental pollution. --- Political Science. --- Waste Water Technology / Water Pollution Control / Water Management / Aquatic Pollution. --- Transportation. --- Chemical pollution --- Chemicals --- Contamination of environment --- Environmental pollution --- Pollution --- Contamination (Technology) --- Asbestos abatement --- Bioremediation --- Environmental engineering --- Environmental quality --- Factory and trade waste --- Hazardous waste site remediation --- Hazardous wastes --- In situ remediation --- Lead abatement --- Pollutants --- Refuse and refuse disposal --- Administration --- Civil government --- Commonwealth, The --- Government --- Political theory --- Political thought --- Politics --- Science, Political --- Social sciences --- State, The --- Environmental aspects --- Water pollution. --- Public transportation --- Transport --- Transportation --- Transportation, Primitive --- Transportation companies --- Transportation industry --- Locomotion --- Commerce --- Communication and traffic --- Storage and moving trade --- Aquatic pollution --- Fresh water --- Fresh water pollution --- Freshwater pollution --- Inland water pollution --- Lake pollution --- Lakes --- Reservoirs --- River pollution --- Rivers --- Stream pollution --- Water contamination --- Water pollutants --- Water pollution --- Waste disposal in rivers, lakes, etc. --- Economic aspects
Choose an application
An examination of the uses of data within a changing knowledge infrastructure, offering analysis and case studies from the sciences, social sciences, and humanities. "'Big Data' is on the covers of Science, Nature, the Economist, and Wired magazines, on the front pages of the Wall Street Journal and the New York Times. But despite the media hyperbole, as Christine Borgman points out in this examination of data and scholarly research, having the right data is usually better than having more data; little data can be just as valuable as big data. In many cases, there are no data -- because relevant data don't exist, cannot be found, or are not available. Moreover, data sharing is difficult, incentives to do so are minimal, and data practices vary widely across disciplines. Borgman, an often-cited authority on scholarly communication, argues that data have no value or meaning in isolation; they exist within a knowledge infrastructure -- an ecology of people, practices, technologies, institutions, material objects, and relationships. After laying out the premises of her investigation -- six "provocations" meant to inspire discussion about the uses of data in scholarship -- Borgman offers case studies of data practices in the sciences, the social sciences, and the humanities, and then considers the implications of her findings for scholarly practice and research policy. To manage and exploit data over the long term, Borgman argues, requires massive investment in knowledge infrastructures; at stake is the future of scholarship."
Information retrieval --- Information systems --- Communication in learning and scholarship --- Research --- Information technology. --- Information storage and retrieval systems. --- Cyberinfrastructure --- Communication savante --- Recherche --- Technologie de l'information --- Systèmes d'information --- Technological innovations. --- Methodology. --- Data processing. --- Innovations --- Méthodologie --- Informatique --- Cyberinfrastructure. --- Information technology --- Information storage and retrieval systems --- Technological innovations --- Methodology --- Data processing --- Systèmes d'information --- Méthodologie --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Computer networks --- Computer systems --- Distributed databases --- High performance computing --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Electronic data processing in research --- Communication in scholarship --- Scholarly communication --- Learning and scholarship --- Distributed processing --- Store datamengder --- Informasjonsteknologi --- Datautvinning --- Forskningsmetoder --- Cyberspace --- INFORMATION SCIENCE/Technology & Policy --- INFORMATION SCIENCE/Internet Studies --- INFORMATION SCIENCE/General --- Data centers --- Communication in learning and scholarship - Technological innovations --- Research - Methodology --- Research - Data processing
Listing 1 - 10 of 12 | << page >> |
Sort by
|