Mostrando 2,521 - 2,540 Resultados de 2,723 Para Buscar '"Cloud computing"', tiempo de consulta: 0.16s Limitar resultados
  1. 2521
    por Laudon, Kenneth
    Publicado 2021
    Tabla de Contenidos: “…The Evolution of the Internet: 1961-The Present -- The Internet: Key Technology Concepts -- Packet Switching -- Transmission Control Protocol/Internet Protocol (TCP/IP) -- IP Addresses -- Domain Names, DNS, and URLs -- Client/Server Computing -- The Mobile Platform -- The Internet "Cloud Computing" Model: Hardware and Software as a Service -- Other Internet Protocols and Utility Programs -- 3.2 Internet Infrastructure and Access -- The Internet Backbone -- Internet Exchange Points -- Tier 3 Internet Service Providers -- Campus/Corporate Area Networks -- Mobile Internet Access -- Telephone-based versus Computer Network-based Wireless Internet Access -- Other Innovative Internet Access Technologies: Drones, Balloons, and White Space -- The Internet of Things -- Insight on Business: The Internet of Everything: Opportunities and Challenges -- Who Governs the Internet? …”
    Libro electrónico
  2. 2522
    por Blyth, Andrew
    Publicado 2024
    “…Extending the scope to cloud computing environments, particularly MS Azure and AWS, this book will guide you through conducting penetration tests in cloud settings, covering governance, reconnaissance, and networking intricacies. …”
    Libro electrónico
  3. 2523
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Artificial Intelligence-The Driving Force of Industry 4.0 -- 1.1 Introduction -- 1.2 Methodology -- 1.3 Scope of AI in Global Economy and Industry 4.0 -- 1.3.1 Artificial Intelligence-Evolution and Implications -- 1.3.2 Artificial Intelligence and Industry 4.0-Investments and Returns on Economy -- 1.3.3 The Driving Forces for Industry 4.0 -- 1.4 Artificial Intelligence-Manufacturing Sector -- 1.4.1 AI Diversity-Applications to Manufacturing Sector -- 1.4.2 Future Roadmap of AI-Prospects to Manufacturing Sector in Industry 4.0 -- 1.5 Conclusion -- References -- Chapter 2 Industry 4.0, Intelligent Manufacturing, Internet of Things, Cloud Computing: An Overview -- 2.1 Introduction -- 2.2 Industrial Transformation/Value Chain Transformation -- 2.2.1 First Scenario: Reducing Waste and Increasing Productivity Using IIoT -- 2.2.2 Second Scenario: Selling Outcome (User Demand)-Based Services Using IIoT -- 2.3 IIoT Reference Architecture -- 2.4 IIoT Technical Concepts -- 2.5 IIoT and Cloud Computing -- 2.6 IIoT and Security -- References -- Chapter 3 Artificial Intelligence of Things (AIoT) and Industry 4.0-Based Supply Chain (FMCG Industry) -- 3.1 Introduction -- 3.2 Concepts -- 3.2.1 Internet of Things -- 3.2.2 The Industrial Internet of Things (IIoT) -- 3.2.3 Artificial Intelligence of Things (AIoT) -- 3.3 AIoT-Based Supply Chain -- 3.4 Conclusion -- References -- Chapter 4 Application of Artificial Intelligence in Forecasting the Demand for Supply Chains Considering Industry 4.0 -- 4.1 Introduction -- 4.2 Literature Review -- 4.2.1 Summary of the First Three Industrial Revolutions -- 4.2.2 Emergence of Industry 4.0 -- 4.2.3 Some of the Challenges of Industry 4.0 -- 4.3 Application of Artificial Intelligence in Supply Chain Demand Forecasting -- 4.4 Proposed Approach…”
    Libro electrónico
  4. 2524
    Publicado 2018
    Tabla de Contenidos: “…Just a Significant Evolution -- How the Supply Chain Works -- Production -- Inventory -- Location -- Transportation -- Information -- The Evolving Structure of Supply Chains -- Participants in the Supply Chain -- Producers -- Distributors -- Retailers -- Customers -- Service Providers -- Aligning the Supply Chain with Business Strategy -- Understand the Markets Your Company Serves -- Define Core Competencies of Your Company -- Develop Needed Supply Chain Capabilities -- Chapter Summary -- Chapter 2: Supply Chain Operations: Planning and Sourcing -- A Useful Model of Supply Chain Operations -- Plan -- Source -- Make -- Deliver -- Demand Forecasting and Planning (Plan) -- Forecasting Methods -- Aggregate Planning -- Product Pricing (Plan) -- Relationship of Cost Structure to Pricing -- Inventory Management (Plan) -- Cycle Inventory -- Economic Order Quantity -- Seasonal Inventory -- Safety Inventory -- Procurement (Source) -- Purchasing -- Consumption Management -- Vendor Selection -- Contract Negotiation -- Contract Management -- Credit and Collections (Source) -- Set Credit Policy -- Implement Credit and Collections Practices -- Manage Credit Risk -- Chapter Summary -- Chapter 3: Supply Chain Operations: Making and Delivering -- Product Design (Make) -- Production Scheduling (Make) -- Facility Management (Make) -- Order Management (Deliver) -- Delivery Scheduling (Deliver) -- Direct Deliveries -- Milk-Run Deliveries -- Delivery Sources -- Return Processing (Deliver) -- Supply Chain Operations Can Be Outsourced -- Chapter Summary -- Chapter 4: New Technology Changes How Work Is Done -- New Technology Is Changing Supply Chain Operations -- Key Components of Information Technology -- Cloud Computing…”
    Libro electrónico
  5. 2525
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Key Concepts of Supply Chain Management -- Nothing Entirely New-Just a Significant Evolution -- How the Supply Chain Works -- Production -- Inventory -- Location -- Transportation -- Information -- The Evolving Structure of Supply Chains -- Participants in the Supply Chain -- Producers -- Distributors -- Retailers -- Customers -- Service Providers -- Aligning the Supply Chain with Business Strategy -- Understand the Markets Your Company Serves -- Define Core Competencies of Your Company -- Develop Needed Supply Chain Capabilities -- Chapter Summary -- Chapter 2 Supply Chain Operations: Planning and Sourcing -- A Model of Supply Chain Operations -- Plan -- Source -- Make -- Deliver -- Demand Forecasting and Planning (Plan) -- Forecasting Methods -- Aggregate Planning -- Product Pricing (Plan) -- Relationship of Cost Structure to Pricing -- Inventory Management (Plan) -- Cycle Inventory -- Economic Order Quantity -- Seasonal Inventory -- Safety Inventory -- Procurement (Source) -- Purchasing -- Consumption Management -- Vendor Selection -- Contract Negotiation -- Contract Management -- Credit and Collections (Source) -- Set Credit Policy -- Implement Credit and Collections Practices -- Manage Credit Risk -- Chapter Summary -- Chapter 3 Supply Chain Operations: Making and Delivering -- Product Design (Make) -- Production Scheduling (Make) -- Facility Management (Make) -- Order Management (Deliver) -- Delivery Scheduling (Deliver) -- Direct Deliveries -- Milk Run Deliveries -- Delivery Sources -- Return Processing (Deliver) -- Supply Chain Operations Can Be Outsourced -- Chapter Summary -- Chapter 4 New Technology Changes How Work Is Done -- New Technology Is Changing Supply Chain Operations -- Key Components of Information Technology -- Cloud Computing…”
    Libro electrónico
  6. 2526
    por Sagar, Shrddha
    Publicado 2025
    Tabla de Contenidos: “…3.1.1 Need for Sustainable and Efficient Power Generation Through Smart Grid Technology and Cyber-Physical Technologies -- 3.1.2 CPES: The Integration of Physical and Digital Worlds -- 3.2 Cyber-Physical Energy Systems (CPES) -- 3.3 Forming Energy Systems -- 3.4 Energy Efficiency -- 3.4.1 CPES Usage on Smart Grids -- 3.5 Smart Grids -- 3.6 Cyber-Physical Systems -- 3.7 SG: A CPS Viewpoint -- 3.7.1 Challenges and Solutions for Coordinating Smart Grids and Cyber-Physical Systems -- 3.7.2 Techniques of Correspondence -- 3.7.3 Data Protection -- 3.7.4 Data Skill and Engineering -- 3.7.5 Distributed Computation -- 3.7.6 Distributed Intellect -- 3.7.7 Distributed Optimization -- 3.7.8 Distributed Controller -- 3.8 Upcoming Prospects and Contests -- 3.8.1 Big Data -- 3.8.2 Cloud Computing -- 3.8.3 IoT -- 3.8.4 Network Science -- 3.8.5 Regulation and Guidelines -- 3.9 Conclusion -- References -- Chapter 4 Evolution of AI in CPS: Enhancing Technical Capabilities and Human Interactions -- 4.1 Introduction to Cyber-Physical System -- 4.2 The Cyber-Physical Systems Architecture -- 4.2.1 5C Architecture or CPS -- 4.2.1.1 Connection -- 4.2.1.2 Conversion -- 4.2.1.3 Cyber -- 4.2.1.4 Knowledge -- 4.2.1.5 Configuration -- 4.3 Cyber-Physical Systems as Real-Time Applications -- 4.3.1 Robotics Distributed -- 4.3.2 Manufacturing -- 4.3.3 Distribution of Water -- 4.3.4 Smart Greenhouses -- 4.3.5 Healthcare -- 4.3.6 Transportation -- 4.4 Impact of AI on Cyber-Physical Systems -- 4.5 Policies -- 4.6 Expected Benefits and Core Promises -- 4.7 Unintended Consequences and Implications for Policy -- 4.7.1 Negative Social Impacts -- 4.7.2 Cybersecurity Risks -- 4.7.3 Impact on the Environment -- 4.7.4 Ethical Issues -- 4.7.5 Policy Implications -- 4.8 Employment and Delegation of Tasks -- 4.9 Safety, Responsibility, and Liability -- 4.10 Privacy Concerns…”
    Libro electrónico
  7. 2527
    Publicado 2011
    “…Haletky’s Complete, Solutions-Focused Guide to Running ESX Server 3.5, vSphere, and VMware 4.x Extensively updated and revised, this is the definitive real-world guide to planning, deploying, and managing VMware ESX Server 3.5, VMware vSphere Hypervisor (ESXi), or VMware vSphere 4.x cloud computing in mission-critical environments. Drawing on his extensive experience consulting on enterprise VMware implementations, renowned expert Edward L. …”
    Libro electrónico
  8. 2528
    Publicado 2012
    Tabla de Contenidos: “…Intro -- Contents -- Preface -- Acknowledgments -- Introduction -- Part I: Enterprise Security -- 1 Cryptographic Tools -- Determine Appropriate Tools and Techniques -- Advanced PKI Concepts -- Hashing -- Cryptographic Applications -- Digital Signatures -- Code Signing -- Nonrepudiation -- Transport Encryption -- Implications of Cryptographic Methods and Design -- Entropy -- Pseudorandom Number Generation -- Perfect Forward Secrecy -- Confusion -- Diffusion -- Two-Minute Drill -- Q&amp -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 2 Computing Platforms -- Advantages and Disadvantages of Virtualizing Servers and Minimizing Physical Space Requirements -- VLAN -- Securing Virtual Environments, Appliances, and Equipment -- Vulnerabilities Associated with a Single Physical Server Hosting Multiple Companies' Virtual Machines -- Vulnerabilities Associated with a Single Platform Hosting Multiple Companies' Virtual Machines -- Secure Use of On-demand/Elastic Cloud Computing -- Vulnerabilities Associated with Co-mingling of Hosts with Different Security Requirements -- Virtual Desktop Infrastructure (VDI) -- Terminal Services -- Two-Minute Drill -- Q&amp -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 3 Enterprise Storage -- Explain the Security Implications of Enterprise Storage -- Virtual Storage -- NAS-Network Attached Storage -- SAN-Storage Area Network -- VSAN -- iSCSI -- FCOE -- LUN Masking -- HBA Allocation -- Redundancy (Location) -- Secure Storage Management -- Two-Minute Drill -- Q&amp -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 4 Infrastructure -- Advanced Network Design -- Complex Network Security Solutions for Data Flow -- Secure Data Flows to Meet Changing Business Needs -- Secure DNS -- Secure Directory Services -- Network Design Consideration…”
    Libro electrónico
  9. 2529
    Publicado 2024
    Tabla de Contenidos: “…4.5.1 Transcriptomic Profiling (Bulk and Single-Cell RNA-Seq) -- 4.5.2 Genetic Mutation and Variation Identification -- 4.5.3 De Novo Genome Assembly -- 4.5.4 Protein-DNA Interaction Analysis (ChIP-Seq) -- 4.5.5 Epigenomics and DNA Methylation Study (Methyl-Seq) -- 4.5.6 Metagenomics -- References -- 5 Early-Stage Next-Generation Sequencing (NGS) Data Analysis: Common Steps -- 5.1 Basecalling, FASTQ File Format, and Base Quality Score -- 5.2 NGS Data Quality Control and Preprocessing -- 5.3 Read Mapping -- 5.3.1 Mapping Approaches and Algorithms -- 5.3.2 Selection of Mapping Algorithms and Reference Genome Sequences -- 5.3.3 SAM/BAM as the Standard Mapping File Format -- 5.3.4 Mapping File Examination and Operation -- 5.4 Tertiary Analysis -- References -- 6 Computing Needs for Next-Generation Sequencing (NGS) Data Management and Analysis -- 6.1 NGS Data Storage, Transfer, and Sharing -- 6.2 Computing Power Required for NGS Data Analysis -- 6.3 Cloud Computing -- 6.4 Software Needs for NGS Data Analysis -- 6.4.1 Parallel Computing -- 6.5 Bioinformatics Skills Required for NGS Data Analysis -- References -- Part III Application-Specific NGS Data Analysis -- 7 Transcriptomics By Bulk RNA-Seq -- 7.1 Principle of RNA-Seq -- 7.2 Experimental Design -- 7.2.1 Factorial Design -- 7.2.2 Replication and Randomization -- 7.2.3 Sample Preparation and Sequencing Library Preparation -- 7.2.4 Sequencing Strategy -- 7.3 RNA-Seq Data Analysis -- 7.3.1 Read Mapping -- 7.3.2 Quantification of Reads -- 7.3.3 Normalization -- 7.3.4 Batch Effect Removal -- 7.3.5 Identification of Differentially Expressed Genes -- 7.3.6 Multiple Testing Correction -- 7.3.7 Gene Clustering -- 7.3.8 Functional Analysis of Identified Genes -- 7.3.9 Differential Splicing Analysis -- 7.4 Visualization of RNA-Seq Data -- 7.5 RNA-Seq as a Discovery Tool -- References…”
    Libro electrónico
  10. 2530
    Publicado 2022
    Tabla de Contenidos: “…2.9.1 Newspapers in US and worldwide -- 2.9.2 TV networks in US -- 2.10 Text editing and formatting languages -- 2.11 Online books sources -- 2.12 Free book download web sites -- 2.13 Data, image, audio and video compression -- 2.13.1 Data compression -- 2.13.2 Huffman coding/encoding -- 2.13.3 Lempel-Ziv - LZ encoding -- 2.13.4 Arithmetic coding -- 2.13.5 Miscellaneous topics on data compression -- 2.13.6 Universal Resource Locator - URL shortener -- 2.13.7 Image compression -- 2.13.8 Video/audio compression -- 2.14 Main memory data compression -- 2.15 Data deduplication in storage systems -- 2.15.1 Data deduplication at Microsoft -- 2.15.2 The Venti prototype at Bell Labs/Lucent -- 2.15.3 Data Domain deduplication -- 2.15.4 Datrium -- 2.15.5 Summary of a major survey on data deduplication -- 2.16 Up and coming data deduplication companies -- 2.17 Storage research at IBM's Almaden Research Center in 1990s -- 2.18 Cleversafe and its information dispersal technology -- 2.19 Recent developments at IBM Research at ARC -- 2.20 Storage research at Hewlett-Packard - HP -- 2.21 Primary storage vendors and enterprise companies in 2020 -- 2.22 All-flash upstart storage companies -- 2.23 Hyperconverged infrastructure for storage systems -- 2.24 Top enterprise storage backup players -- 2.25 Data storage companies: up and coming storage vendors -- 2.26 Parallel file systems -- 2.27 Cloud storage -- 2.27.1 Cloud computing price models -- 2.27.2 Storage as a service in cloud computing -- 2.27.3 Cloud storage elasticity and its benchmarking -- 2.28 Jai Menon's predictions on the future of clouds -- 2.29 Cloud storage companies -- 2.30 Distributed systems research related to clouds -- 2.30.1 OceanStore -- 2.30.2 Inktomi and CAP theorem -- 2.30.3 Replicated data -- 2.30.4 Sky Computing -- 2.31 Data encryption -- 2.31.1 Data encryption for cloud storage…”
    Libro electrónico
  11. 2531
    Publicado 2014
    Tabla de Contenidos: “…cover -- RIVER PUBLISHERS SERIES IN COMMUNICATIONS -- Tittle - Internet of Things From Research and Innovation to Market Deployment -- Copyright -- Dedication -- Acknowledgement -- Contents -- Preface -- Shaping the Future of Internet of Things Applications -- Editors Biography -- 1 Introduction -- 2 Putting the Internet of Things Forwardto the Next Nevel -- 2.1 The Internet of Things Today -- 2.2 The Internet of Things Tomorrow -- 2.3 Potential Success Factors -- References -- 3 Internet of Things Strategic Research and Innovation Agenda -- 3.1 Internet of Things Vision -- 3.1.1 Internet of Things Common Definition -- 3.2 IoT Strategic Research and Innovation Directions -- 3.2.1 IoT Applications and Use Case Scenarios -- 3.2.2 IoT Functional View -- 3.2.3 Application Areas -- 3.3 IoT Smart-X Applications -- 3.3.1 Smart Cities -- 3.3.2 Smart Energy and the Smart GridThere is increasing public awareness about the -- 3.3.3 Smart Mobility and Transport -- 3.3.4 Smart Home, Smart Buildings and Infrastructure -- 3.3.5 Smart Factory and Smart Manufacturing -- 3.3.6 Smart Health -- 3.3.7 Food andWater Tracking and Security -- 3.3.8 Participatory Sensing -- 3.3.9 Smart Logistics and Retail -- 3.4 Internet of Things and Related Future Internet Technologies -- 3.4.1 Cloud Computing -- 3.4.2 IoT and Semantic Technologies -- 3.5 Networks and Communication -- 3.5.1 Networking Technology -- 3.5.2 Communication Technology -- 3.5.2.1 Unfolding the potential of communication technologies -- 3.5.2.2 Correctness of construction -- 3.5.2.3 An unified theoretical framework for communication -- 3.5.2.4 Energy-limited Internet of Things devices and their communication -- 3.5.2.5 Challenge the trend to complexity -- 3.5.2.6 Disruptive approaches -- 3.5.1.1 Complexity of the networks of the future -- 3.5.1.2 Growth of wireless networks -- 3.5.1.3 Mobile networks…”
    Libro electrónico
  12. 2532
    Publicado 2024
    Tabla de Contenidos: “…2.7.2 Face Detection and Identification in Real-World Situations -- 2.8 Future Direction in Object Detection and Tracking -- 2.8.1 Future Plans for Object Tracking and Detection -- 2.8.1.1 Multiobject Tracking -- 2.8.2 3D Object Tracking and Detection -- 2.8.3 Real-Time Performance -- 2.9 Conclusion -- References -- Chapter 3 Printing Organs with 3D Technology -- 3.1 Introduction -- 3.2 Bioprinting in Three Dimensions (3D) -- 3.3 3D Printing Types -- 3.3.1 Inkjet Bioprinting -- 3.3.2 Microextrusion Bioprinting -- 3.3.3 Laser-Assisted Printing -- 3.3.4 Stereolithography -- 3.3.5 3D Bioprinting Materials and Cells -- 3.4 Applications for 3D Printing in Cells -- 3.4.1 Blood Vessels -- 3.4.2 Liver -- 3.4.3 Cartilage -- 3.4.4 Muscle -- 3.4.5 Bone -- 3.4.6 Skin -- 3.4.7 Neutralization of Neurons -- 3.4.8 Pancreas -- 3.5 New Developments -- 3.6 Progress in India -- 3.7 Limitation -- 3.8 A Future Point of View -- 3.9 Conclusion -- References -- Chapter 4 Comparative Evaluation of Machine Learning Algorithms for Bank Fraud Detection -- 4.1 Introduction -- 4.2 Proposed Framework -- 4.3 Results -- 4.4 Concluding Remarks and Future Scope -- References -- Chapter 5 An Overview of Computational-Based Strategies for Drug Repositioning -- 5.1 Introduction -- 5.2 Drug Repositioning -- 5.2.1 Computational Strategies for Drug Repositioning -- 5.2.1.1 IoT in Drug Repositioning -- 5.2.1.2 AI and ML in Drug Repositioning -- 5.2.1.3 Digital Twin in Drug Repurposing -- 5.2.1.4 Cloud Computing in Drug Repositioning -- 5.2.1.5 Big Data in Drug Repositioning -- 5.3 Challenges and Opportunities for Drug Repurposing -- 5.4 Conclusion -- References -- Chapter 6 Improving Performance With Feature Selection, Extraction, and Learning -- 6.1 Introduction -- 6.2 Feature Selection -- 6.2.1 Filter Methods -- 6.2.1.1 Procedure -- 6.2.1.2 Advantages -- 6.2.1.3 Disadvantages…”
    Libro electrónico
  13. 2533
    Publicado 2013
    Tabla de Contenidos: “…Experiencias en Ciencias de la Salud -- Una experiencia docente para gestionar la información académica, siempre accesible y privada, mediante códigos QR / Ana Isabel Allueva Pinilla , José Luis Alejandre Marco -- Cloud Computing (Dropbox) como soporte de gestión y coordinación en el diseño de una nueva asignatura del Grado de Veterinaria: Integración en Porcino / María Victoria Falceto Recio, Fernando Forcada Miranda , J. …”
    Libro
  14. 2534
    Publicado 2019
    Tabla de Contenidos: “…Impacto de la estrategia de mercado digital de la Unión Europea / Remedios Campoy Gómez -- Internet of things y cloud computing: nuevos retos normativos de carácter internacional / Antonio Merchán Murillo -- Smart contracts: trascendencia jurídica en el desarrollo del comercio electrónico / Alba Paños Pérez -- Instrumentos electrónicos de financiación a la luz de los principios que rigen la contratación. …”
    Libro
  15. 2535
    Publicado 2018
    Tabla de Contenidos: “…10.2 Defending Against Buffer Overflows -- 10.3 Other forms of Overflow Attacks -- 10.4 Key Terms, Review Questions, and Problems -- Chapter 11 Software Security -- 11.1 Software Security Issues -- 11.2 Handling Program Input -- 11.3 Writing Safe Program Code -- 11.4 Interacting with the Operating System and Other Programs -- 11.5 Handling Program Output -- 11.6 Key Terms, Review Questions, and Problems -- Chapter 12 Operating System Security -- 12.1 Introduction to Operating System Security -- 12.2 System Security Planning -- 12.3 Operating Systems Hardening -- 12.4 Application Security -- 12.5 Security Maintenance -- 12.6 Linux/Unix Security -- 12.7 Windows Security -- 12.8 Virtualization Security -- 12.9 Key Terms, Review Questions, and Problems -- Chapter 13 Cloud and IoT Security -- 13.1 Cloud Computing -- 13.2 Cloud Security Concepts -- 13.3 Cloud Security Approaches -- 13.4 The Internet of Things -- 13.5 IoT Security -- 13.6 Key Terms and Review Questions -- Part Three Management Issues -- Chapter 14 IT Security Management and Risk Assessment -- 14.1 IT Security Management -- 14.2 Organizational Context and Security Policy -- 14.3 Security Risk Assessment -- 14.4 Detailed Security Risk Analysis -- 14.5 Case Study: Silver Star Mines -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 IT Security Controls, Plans, and Procedures -- 15.1 IT Security Management Implementation -- 15.2 Security Controls or Safeguards -- 15.3 IT Security Plan -- 15.4 Implementation of Controls -- 15.5 Monitoring Risks -- 15.6 Case Study: Silver Star Mines -- 15.7 Key Terms, Review Questions, and Problems -- Chapter 16 Physical and Infrastructure Security -- 16.1 Overview -- 16.2 Physical Security Threats -- 16.3 Physical Security Prevention and Mitigation Measures -- 16.4 Recovery from Physical Security Breaches…”
    Libro electrónico
  16. 2536
    Publicado 2017
    Tabla de Contenidos: “…Adaptability in Modern Systems -- 1.5.2.1. Cloud computing -- 1.5.2.2. Service-based adaptation to QoS -- 1.5.2.3. …”
    Libro electrónico
  17. 2537
    Publicado 2017
    Tabla de Contenidos: “…7.6 Conclusion -- References -- 8 Performance Isolation in Cloud-Based Big Data Architectures -- 8.1 Introduction -- 8.2 Background -- 8.2.1 Cloud Computing -- 8.2.2 Big Data Architecture -- 8.3 Case Study and Problem Statement -- 8.3.1 Case Study -- 8.3.2 Problem Statement -- 8.4 Performance Monitoring in Cloud-Based Systems -- 8.5 Application Framework for Performance Isolation -- 8.6 Evaluation of the Framework -- 8.6.1 Evaluation Results -- 8.7 Discussion -- 8.8 Related Work -- 8.9 Conclusion -- References -- 9 From Legacy to Cloud: Risks and Bene ts in Software Cloud Migration -- 9.1 Introduction -- 9.2 Research Method -- 9.2.1 Pilot Study -- 9.2.2 Search Strategy -- 9.2.2.1 Research question -- 9.2.2.2 Data sources -- 9.2.2.3 Search query -- 9.2.2.4 Search process -- 9.2.2.5 Selection of primary studies -- 9.2.2.6 Included and excluded studies -- 9.2.2.7 Search result management -- 9.2.2.8 Quality assessment of primary studies -- 9.2.3 Data Extraction -- 9.2.4 Data Analysis Method -- 9.3 Results -- 9.3.1 Overview of Primary Studies and Quality Evaluation -- 9.3.2 Bene ts and Risks -- 9.3.3 General Measures -- 9.3.4 Models and Frameworks for Cloud Migration -- 9.4 Discussion -- 9.4.1 Findings and Lessons Learned -- 9.4.2 Threats to Validity -- 9.5 Conclusion -- References -- 10 Big Data: A Practitioners Perspective -- 10.1 Big Data Is a New Paradigm - Differences With Traditional Data Warehouse, Pitfalls and Consideration -- 10.1.1 Differences With Traditional Data Warehouse -- 10.1.2 Pitfalls -- 10.1.2.1 Insuf cient volume of data -- 10.1.2.2 Not having a business challenge -- 10.1.2.3 Ignoring the data quality -- 10.1.2.4 Big data can predict the future -- 10.1.3 Considerations -- 10.2 Product Considerations for Big Data - Use of Open Source Products for Big Data, Pitfalls and Considerations…”
    Libro electrónico
  18. 2538
    Publicado 2010
    Tabla de Contenidos: “…Cover -- Media Table of Contents -- Chapter 1: Introducing the Office Web Apps -- Tell Me: More Media 1.1-Understanding Cloud Computing -- Show Me: Media 1.2-Signing Up for a Windows Live ID -- Show Me: Media 1.3-Installing Silverlight in Firefox -- Show Me: Media 1.4-Signing in to SkyDrive -- Chapter 2: Learning Windows Live SkyDrive Essentials -- Show Me: Media 2.1-Applying a Windows Live Theme -- Tell Me: More Media 2.2-Organizing Your SkyDrive Folders -- Show Me: Media 2.3-Saving a Word 2010 Document to SkyDrive -- Show Me: Media 2.4-Disabling File Comments -- Chapter 3: Learning SharePoint 2010 Essentials -- Tell Me: More Media 3.1-Organizing Your SharePoint Libraries -- Show Me: Media 3.2-Filtering and Grouping a SharePoint Library -- Show Me: Media 3.3-Saving a Word 2010 Document to SharePoint -- Show Me: Media 3.4-Converting an Office Document for Editing in an Office Web App -- Chapter 4: Collaborating with the Office Web Apps -- Tell Me: More Media 4.1-Understanding SkyDrive Permissions -- Show Me: Media 4.2-Inviting Your Facebook Friends to Your SkyDrive Network -- Show Me: Media 4.3-Adding the SkyDrive Public RSS Feed to Google Reader -- Tell Me: More Media 4.4-Creating Unique SharePoint Permissions -- Show Me: Media 4.5-Creating a Custom SharePoint Group -- Show Me: Media 4.6-Viewing a SharePoint Library as an RSS Feed -- Chapter 5: Formatting Your Office Web Apps Documents -- Show Me: Media 5.1-Applying Text and Fill Colors in the Excel Web App -- Tell Me: More Media 5.2-Using Fonts Wisely -- Show Me: Media 5.3-Converting an Existing List of Items to a Bulleted List -- Chapter 6: Working with the Office Web Apps File Features -- Tell Me: More Media 6.1-Why You Need to Save Files -- Show Me: Media 6.2-Saving a Copy of a File in the Excel Web App -- Show Me: Media 6.3-Downloading a Snapshot of an Excel Workbook…”
    Libro electrónico
  19. 2539
    Publicado 2015
    “…The book is multi-disciplinary in nature, and aims to cover a whole host of intertwined subjects that will predominantly influence the 5G landscape, including Future Internet, cloud computing, small cells and self-organizing networks (SONs), cooperative communications, dynamic spectrum management and cognitive radio, Broadcast-Broadband convergence, 5G security challenge, and green RF. …”
    Libro electrónico
  20. 2540
    Publicado 2015
    Tabla de Contenidos: “…Penttinen -- 6.1 Introduction 135 -- 6.2 Network Topologies 135 -- 6.3 Redundancy 138 -- 6.4 Telephone Network 139 -- 6.5 User Devices 140 -- 6.6 Plain Old Public Telephone System (POTS) 145 -- 6.7 Integrated Services Digital Network (ISDN) 149 -- 6.8 Intelligent Network (IN) 153 -- 6.9 SIP 155 -- 6.10 Telephony Solutions for Companies 159 -- 6.11 Transport 161 -- 6.12 Cloud Computing 161 -- References 163 -- 7 Data Networks 165 /Jyrki T. …”
    Libro electrónico