Mostrando 2,101 - 2,120 Resultados de 2,723 Para Buscar '"Cloud computing"', tiempo de consulta: 0.13s Limitar resultados
  1. 2101
    por UPADRISTA, VENKATESH
    Publicado 2017
    Tabla de Contenidos: “…Chapter 10: Agile MethodologyChapter 11: The Art of Six Sigma; Chapter 12: Master Data Management; Chapter 13: Application Portfolio Rationalization; Chapter 14: Cloud Computing; Chapter 15: Business Process Management; References; Resources; About the Author; Back Cover…”
    Libro electrónico
  2. 2102
    Publicado 2016
    Tabla de Contenidos: “…Setting up KVM for full virtualization on CentOS 7Setting up OpenVZ virtualization on CentOS 7; Setting up VirtualBox virtualization on CentOS 7; Setting up Docker on CentOS 7; Establishing services' high availability using HAProxy; References; Summary; Chapter 7: Cloud Computing; An overview of cloud computing; Software as a Service; Platform as a Service (PaaS); Infrastructure as a Service (IaaS); Cloud computing services; Public cloud; Private Cloud; Hybrid Cloud; Introducing OpenStack; OpenStack compute; OpenStack networking; OpenStack storage; Components of OpenStack…”
    Libro electrónico
  3. 2103
    Publicado 2018
    “…Combine the power of analytics and cloud computing for faster and efficient insights About This Book Master the concept of analytics on the cloud: and how organizations are using it Learn the design considerations and while applying a cloud analytics solution Design an end-to-end analytics pipeline on the cloud Who This Book Is For This book is targeted at CIOs, CTOs, and even analytics professionals looking for various alternatives to implement their analytics pipeline on the cloud. …”
    Libro electrónico
  4. 2104
    Publicado 2021
    “…This book will show you how you can manage environments across platforms without having to migrate workloads from on-premises or multi-cloud to Azure every time.Implementing Hybrid Cloud with Azure Arc starts with an introduction to Azure Arc and hybrid cloud computing, covering use cases and various supported topologies. …”
    Libro electrónico
  5. 2105
    Publicado 2018
    “…For many enterprises, the move to cloud computing has raised concerns for security, but when applications are architected with focus on security, cloud platforms can be made just as secure as on-premises platforms. …”
    Libro electrónico
  6. 2106
    Publicado 2014
    “…Between the pace of financial regulatory reform and the cloud computing revolution, the old banking model is on the fast track to extinction. …”
    Libro electrónico
  7. 2107
    Publicado 2023
    “…It focuses on the design and development of machine learning and metaheuristics-enabled methods as well as blockchain for various challenges like security, resource management, computation offloading, trust management, and others in edge, fog, and cloud computing, Internet of Things (IoT), Internet of Everything (IoE), and smart cities. …”
    Libro electrónico
  8. 2108
    por Freeman, Robert G., 1965-
    Publicado 2010
    “…Work from the command line or Oracle Enterprise Manager, automate the backup process, perform Oracle Flashback recoveries, and integrate cloud computing technology. This authoritative resource also shows you how to create reports, optimize performance, and implement third-party administration utilities"--Resource description page…”
    Libro electrónico
  9. 2109
    Publicado 2013
    “…The target audience for this book is anyone from the IT industry who wants to acquire a better understanding of IBM PureApplication System, including technical consultants, business partners, and independent software vendors who are considering migrating to a cloud computing solution. This book also is applicable to system administrators, middleware specialists, and software engineers who need a more in-depth approach to PureApplication System features and capabilities…”
    Libro electrónico
  10. 2110
    Publicado 2019
    “…This, along with the advent of the Internet of Things (IoT) and cloud computing resources is creating a mind-boggling torrent of data that companies, government agencies, and organizations of all kinds are collecting every day. …”
    Video
  11. 2111
    Publicado 2020
    “…Ming Zeng, the former chief of staff and strategy adviser to Alibaba Group's founder Jack Ma, explains how the latest technological developments, such as artificial intelligence, machine learning, the mobile internet, and cloud computing are redefining how value is created. Written especially for those outside the technology industry or the startup arena, this book introduces a simple, overarching framework to guide strategy formulation and execution in this data-rich and highly interactive environment.Revealing the revolutionary practices that he and his team have developed at Alibaba, Zeng shows how to: automate decisions through machine learning; create products informed by real-time data from customers; determine the right strategic positioning to maximize value from platforms and suppliers; repurpose your organization to further human insight and enable creativity; and lead your company's transformation into a smart business…”
    Grabación musical
  12. 2112
    Publicado 2015
    “…In this book, Samuel Greengard offers a guided tour through this emerging world and how it will change the way we live and work.Greengard explains that the Internet of Things (IoT) is still in its early stages. Smart phones, cloud computing, RFID (radio-frequency identification) technology, sensors, and miniaturization are converging to make possible a new generation of embedded and immersive technology. …”
    Grabación musical
  13. 2113
    Publicado 2024
    “…This book will cover Artificial Intelligence (AI), analytics, robotics process automation (RPA), computing (edge computing, cloud computing, quantum computing), blockchain, ancillary technologies (virtual reality/augmented reality, internet of things, 3-D printing, 5G data networks), cybersecurity, and ethics in digital computing…”
    Libro electrónico
  14. 2114
    Publicado 2017
    Tabla de Contenidos: “…The Point-To-Point Messaging Paradigm -- JMS interfaces -- Developing a JMS application -- Publish-Subscribe (topic) programming -- Point-To-Point (queue) programming -- Web services -- Web service architectures -- SOAP web services -- RESTful web services -- Building a SOAP web service using the JAX-WS API in RPC Style -- Building SOAP web service using the JAX-WS API in Document style -- Building a RESTful web service using the JAX-RS API (using the Jersey implementation) -- Enterprise integration patterns -- Summary -- Chapter 5: HPC Cluster Computing -- Era of computing -- Commanding parallel system architectures -- MPP -- SMP -- Distributed systems -- Clusters -- Network of workstations -- Cluster computer architecture -- Cluster system software and tools -- HPCC -- Java support for high-performance computing -- Java support for parallel programming models -- Multithreading -- Parallelism -- Synchronization -- JOMP -- Java message passing -- The Spliterator interface -- Parallel stream processing -- Java 9 updates for processing an API -- Summary -- Chapter 6: Distributed Databases -- Distributed and decentralized databases -- Motivation for distributed databases -- Distributed database environments -- Homogeneous distributed database environment -- Heterogeneous distributed database environment -- Distributed database setup methodologies -- Replication -- Horizontal partitioning -- Vertical partitioning -- Hybrid setup -- Distributed DBMS architecture -- Java Database Connectivity -- JTA for distributed transactions -- Switching between the transaction modes -- Sample program for the XA transaction -- Summary -- Chapter 7: Cloud and Distributed Computing -- What is cloud computing? -- Cloud deployment models -- Cloud computing patterns -- Features of cloud computing -- Cloud versus distributed computing -- Cloud service providers -- AWS…”
    Libro electrónico
  15. 2115
    Tabla de Contenidos: “…Research on the detection of coal mine underground ventilation capacity based on cloud computing k-unth algorithmA privacy protection model for location-based social networking services; Marine controlled source electromagnetic acquisition station with low power consumption technology; Research on automatic monitoring system of medium and small size reservoirs based on internet of things; An innovative framework for database web services; Comparison of A* and Lambda* algorithm for path planning; Research on the comparison testing technique of induction coil sensor…”
    Libro electrónico
  16. 2116
    Publicado 2010
    Tabla de Contenidos: “…Let Us Count the Ways; Chapter 2: Characteristics of Secure and Resilient Software; Chapter 3: Security and Resilience in the Software Development Life Cycle; Chapter 4: Proven Best Practices for Resilient Applications; Chapter 5: Designing Applications for Security and Resilience; Chapter 6: Programming Best Practices; Chapter 7: Special Considerations for Embedded Systems, Cloud Computing, and Mobile Computing Devices…”
    Libro electrónico
  17. 2117
    Publicado 2013
    Tabla de Contenidos: “…Development Strategy of E-health in China -- E-commerce of Eco Bags on Basis of Pareto Improvement -- The Impact of Technical Barriers to Trade: The Cases of Trade between China, Japan, Korea, and the US -- An Appraisal of Internet Business Models as a Research Paradigm -- The Study of Usability Performance in the E-Commerce Websites -- E-Business and Cloud Computing: A New Practice or a Trend -- Multi-Level Access Control in the Data Pipeline of the International Supply Chain System -- A Smart Parking and Reservation System for QR-Code-Based Car Park -- A Study on Smart Work Center -- An OGS-based Dynamic Time Warping Algorithm for Time Series Data -- Analysis of Operators’ Smart Home Products Industry Chain Cooperation Model Based on Game Theory Perspective -- Examining Factors Correlated with Consumer Online Shopping Behaviour -- Effects of Social Needs, Social Influences and Convenience on Smartphones Dependency…”
    Libro electrónico
  18. 2118
    Publicado 2012
    Tabla de Contenidos: “…-- chapter 2 - Digital Forensic Approaches and Best Practices -- chapter 3 - Digital Forensics Tool Kit -- chapter 4 - Internet and E-Mail Examinations -- chapter 5 - Mobile Forensics -- chapter 6 CLOUD COMPUTING AND DIGITAL FORENSICS PROF. GER ALDEM ER ICK -- chapter 7 - Incident Response / chapter 8 - Report Writing and Presentation -- chapter 9 SOCIAL MEDIA FORENSICS DR. …”
    Libro electrónico
  19. 2119
    Publicado 2016
    Tabla de Contenidos: “…Crowdsourcing and remote sensing data -- section 10. Cloud computing and remote sensing -- section 11. Google earth for remote sensing -- section 12. …”
    Libro electrónico
  20. 2120
    Publicado 2021
    Tabla de Contenidos: “…Part I: Foundations -- 1: Introduction -- 2: Cryptography Fundamentals -- 3: Mathematical Background and Its Applicability -- 4: Large Integer Arithmetic -- 5: Floating Point Arithmetic -- 6: New Features in C++20 -- 7: Secure Coding Guidelines -- 8: Cryptography Libraries in C/C++20 -- Part II: Pro Cryptography -- 9: Elliptic Curve Cryptography -- 10: Lattice-based Cryptography -- 11: earchable Encryption -- 12: Homomorphic Encryption -- 13: (Ring) Learning with Errors Cryptography -- 14: Chaos-based Cryptography -- 15: Big Data Cryptography16:Cloud Computing Cryptography -- Part III: Pro Cryptanalysis -- 17: Getting Started with Cryptanalysis -- 18: Cryptanalysis Attacks and Techniques -- 19: Linear and Differential Cryptanalysis -- 20: Integral Cryptanalysis -- 21: Brute Force and Buffer Overflow Attacks -- 22: Text Characterization -- 23: Implementation and Practical Approach of Cryptanalysis Methods…”
    Libro electrónico