![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems
Der PC macht nie das, was er soll? Arbeiten am Computer dauern immer viel langer als geplant? Dann sollten Sie dieses Buch lesen. Dan Gookin - Computerexperte der ersten Stunde und Bestseller-Autor - bringt Ihnen geduldig die Tipps und Tricks im Umgang mit dem PC bei. Er spricht von der Maschine als gutem Freund. Fachbegriffe und TechnikausdrA1/4cke vermeidet er konsequent. Das Buch begleitet Sie vom Auspacken des Computers bis ins Internet. So verlieren Sie schnell die Ehrfurcht vor diesem allgegenwartigen und im Alltag mittlerweile unverzichtbaren Gerat. Und sind fix auf dem neuesten Stand: Windows 10 und die Cloud werden genauso verstandlich behandelt wie der Rest.
1. It is a practical guide to understanding and implementation 2. It assumes no prior in depth knowledge 3. It is written in plain language and may be understood by anyone, whether or not they are qualified or involved with IT. It is therefore equally suitable for senior management, IT practitioners, students and interested individuals.
The book is designed to provide graduate students and research novices with an introductory review of recent developments in the field of magneto-optics. The field encompasses many of the most important subjects in solid state physics, chemical physics and electronic engineering. The book deals with (1) optical spectroscopy of paramagnetic, antiferromagnetic, and ferromagnetic materials, (2) studies of photo-induced magnetism, and (3) their applications to opto-electronics. Many of these studies originate from those of ligand-field spectra of solids, which are considered to have contributed to advances in materials research for solid-state lasers.
Performance Evaluation, Prediction and Visualization in Parallel Systems presents a comprehensive and systematic discussion of theoretics, methods, techniques and tools for performance evaluation, prediction and visualization of parallel systems. Chapter 1 gives a short overview of performance degradation of parallel systems, and presents a general discussion on the importance of performance evaluation, prediction and visualization of parallel systems. Chapter 2 analyzes and defines several kinds of serial and parallel runtime, points out some of the weaknesses of parallel speedup metrics, and discusses how to improve and generalize them. Chapter 3 describes formal definitions of scalability, addresses the basic metrics affecting the scalability of parallel systems, discusses scalability of parallel systems from three aspects: parallel architecture, parallel algorithm and parallel algorithm-architecture combinations, and analyzes the relations of scalability and speedup. Chapter 4 discusses the methodology of performance measurement, describes the benchmark- oriented performance test and analysis and how to measure speedup and scalability in practice. Chapter 5 analyzes the difficulties in performance prediction, discusses application-oriented and architecture-oriented performance prediction and how to predict speedup and scalability in practice. Chapter 6 discusses performance visualization techniques and tools for parallel systems from three stages: performance data collection, performance data filtering and performance data visualization, and classifies the existing performance visualization tools. Chapter 7 describes parallel compiling-based, search-based and knowledge-based performance debugging, which assists programmers to optimize the strategy or algorithm in their parallel programs, and presents visual programming-based performance debugging to help programmers identify the location and cause of the performance problem. It also provides concrete suggestions on how to modify their parallel program to improve the performance. Chapter 8 gives an overview of current interconnection networks for parallel systems, analyzes the scalability of interconnection networks, and discusses how to measure and improve network performances. Performance Evaluation, Prediction and Visualization in Parallel Systems serves as an excellent reference for researchers, and may be used as a text for advanced courses on the topic.
This unique text/reference describes an exciting and novel approach to supercomputing in the DataFlow paradigm. The major advantages and applications of this approach are clearly described, and a detailed explanation of the programming model is provided using simple yet effective examples. The work is developed from a series of lecture courses taught by the authors in more than 40 universities across more than 20 countries, and from research carried out by Maxeler Technologies, Inc. Topics and features: presents a thorough introduction to DataFlow supercomputing for big data problems; reviews the latest research on the DataFlow architecture and its applications; introduces a new method for the rapid handling of real-world challenges involving large datasets; provides a case study on the use of the new approach to accelerate the Cooley-Tukey algorithm on a DataFlow machine; includes a step-by-step guide to the web-based integrated development environment WebIDE.
This volume explores the diverse applications of advanced tools and technologies of the emerging field of big data and their evidential value in business. It examines the role of analytics tools and methods of using big data in strengthening businesses to meet today's information challenges and shows how businesses can adapt big data for effective businesses practices. This volume shows how big data and the use of data analytics is being effectively adopted more frequently, especially in companies that are looking for new methods to develop smarter capabilities and tackle challenges in dynamic processes. Many illustrative case studies are presented that highlight how companies in every sector are now focusing on harnessing data to create a new way of doing business.
Derived from industry-training classes that the author teaches at the Embedded Systems Institute at Eindhoven, the Netherlands and at Buskerud University College at Kongsberg in Norway, Systems Architecting: A Business Perspective places the processes of systems architecting in a broader context by juxtaposing the relationship of the systems architect with enterprise and management. This practical, scenario-driven guide fills an important gap, providing systems architects insight into the business processes, and especially into the processes to which they actively contribute. The book uses a simple reference model to enable understanding of the inside of a system in relation to its context. It covers the impact of tool selection and brings balance to the application of the intellectual tools versus computer-aided tools. Stressing the importance of a clear strategy, the authors discuss methods and techniques that facilitate the architect's contribution to the strategy process. They also give insight into the needs and complications of harvesting synergy, insight that will help establish an effective synergy-harvesting strategy. The book also explores the often difficult relationship between managers and systems architects. Written in an approachable style, the book discusses the breadth of the human sciences and their relevance to systems architecting. It highlights the relevance of human aspects to systems architects, linking theory to practical experience when developing systems architecting competence.
Are memory applications more critical than they have been in the
past? Yes, but even more critical is the number of designs and the
sheer number of bits on each design. It is assured that
catastrophes, which were avoided in the past because memories were
small, will easily occur if the design and test engineers do not do
their jobs very carefully. High Performance Memory Testing: Design Principles, Fault Modeling and Self Test is written for the professional and the researcher to help them understand the memories that are being tested.
Component Models and Systems for Grid Applications is the essential reference for the most current research on Grid technologies. This first volume of the CoreGRID series addresses such vital issues as the architecture of the Grid, the way software will influence the development of the Grid, and the practical applications of Grid technologies for individuals and businesses alike. Part I of the book, "Application-Oriented Designs," focuses on development methodology and how it may contribute to a more component-based use of the Grid. "Middleware Architecture," the second part, examines portable Grid engines, hierarchical infrastructures, interoperability, as well as workflow modeling environments. The final part of the book, "Communication Frameworks," looks at dynamic self-adaptation, collective operations, and higher-order components. With Component Models and Systems for Grid Applications, editors Vladimir Getov and Thilo Kielmann offer the computing professional and the computing researcher the most informative, up-to-date, and forward-looking thoughts on the fast-growing field of Grid studies.
Multiprocessing: Trade-Offs in Computation and Communication presents an in-depth analysis of several commonly observed regular and irregular computations for multiprocessor systems. This book includes techniques which enable researchers and application developers to quantitatively determine the effects of algorithm data dependencies on execution time, on communication requirements, on processor utilization and on the speedups possible. Starting with simple, two-dimensional, diamond-shaped directed acyclic graphs, the analysis is extended to more complex and higher dimensional directed acyclic graphs. The analysis allows for the quantification of the computation and communication costs and their interdependencies. The practical significance of these results on the performance of various data distribution schemes is clearly explained. Using these results, the performance of the parallel computations are formulated in an architecture independent fashion. These formulations allow for the parameterization of the architecture specitific entities such as the computation and communication rates. This type of parameterized performance analysis can be used at compile time or at run-time so as to achieve the most optimal distribution of the computations. The material in Multiprocessing: Trade-Offs in Computation and Communication connects theory with practice, so that the inherent performance limitations in many computations can be understood, and practical methods can be devised that would assist in the development of software for scalable high performance systems.
This book will resonate with anyone no matter where you reside on this journey, whether newbie or old guard. If you want to be part of this change, you need to understand all about the messy middle that Leda so expertly describes in this book. If you read this book and it doesn't resonate, then I suggest you think about stepping aside. -Curt Queyrouze, President, CCBX, A Division of Coastal Community Bank The world is going digital, and so is banking-in fits, starts, and circles. Why is it so hard? Why is the industry constantly getting in the way of its own technological progress and what can we do about it all? This book looks at the human and structural obstacles to innovation-driven transformation and at the change in habits, mindsets and leadership needed for the next stage of the digital journey and argues that this change will be brought about, not by external heroes and saviours, not by a generation yet to be born, but people just like us. People who understand the industry and its quirks. Bankers who have the grit, determination and energy to drive change. Bankers like us. This book celebrates and chronicles the shared experience of bankers like us. It starts with a 'this is who we are' piece, including the author's trench credentials. It then present an overview of corporate culture (this is what we deal with and a few ideas on how to handle it), as well as a piece on why transformation is so difficult and so many get it wrong; a piece on the challenges our lack of diversity brings or compounds, and a hopeful look-ahead on what a team of principled, dedicated folks can do despite everything.
- Totally unique, and incredibly damning, concerning information and overview of the world's first Cyberwar. - The first ever Cyberwar and the precursor to the first war in Europe since 1945, it will be discussed for decades to come and go down in history as a defining point. - Will be of interest to all citizens of the world, literally.
Coding is one of the most in-demand skills in the job market. Whether you're a recent graduate or a professional, Confident Coding offers the career insights and technical knowledge you need for success. A unique combination of technical insights and fascinating career guidance, this book highlights the importance of coding, whatever your professional profile. For entrepreneurs, being able to create your own website or app can grant you valuable freedom and revolutionize your business. For aspiring developers, this book will give you the building blocks to embark on your career path. This new and improved third edition of the award-winning book gives you a step-by-step learning guide to HTML, CSS, JavaScript, Python, building iPhone and Android apps and debugging. Confident Coding is the essential guide to mastering the fundamentals of coding. About the Confident series... From coding and data science to cloud and cyber security, the Confident books are perfect for building your technical knowledge and enhancing your professional career.
This book provides students and practicing chip designers with an easy-to-follow yet thorough, introductory treatment of the most promising emerging memories under development in the industry. Focusing on the chip designer rather than the end user, this book offers expanded, up-to-date coverage of emerging memories circuit design. After an introduction on the old solid-state memories and the fundamental limitations soon to be encountered, the working principle and main technology issues of each of the considered technologies (PCRAM, MRAM, FeRAM, ReRAM) are reviewed and a range of topics related to design is explored: the array organization, sensing and writing circuitry, programming algorithms and error correction techniques are reviewed comparing the approach followed and the constraints for each of the technologies considered. Finally the issue of radiation effects on memory devices has been briefly treated. Additionally some considerations are entertained about how emerging memories can find a place in the new memory paradigm required by future electronic systems. This book is an up-to-date and comprehensive introduction for students in courses on memory circuit design or advanced digital courses in VLSI or CMOS circuit design. It also serves as an essential, one-stop resource for academics, researchers and practicing engineers.
I am very pleased to play even a small part in the publication of this book on the SIGNAL language and its environment POLYCHRONY. I am sure it will be a s- ni?cant milestone in the development of the SIGNAL language, of synchronous computing in general, and of the data?ow approach to computation. In data?ow, the computation takes place in a producer-consumer network of - dependent processing stations. Data travels in streams and is transformed as these streams pass through the processing stations (often called ?lters). Data?ow is an attractive model for many reasons, not least because it corresponds to the way p- duction, transportation, andcommunicationare typicallyorganizedin the real world (outside cyberspace). I myself stumbled into data?ow almost against my will. In the mid-1970s, Ed Ashcroft and I set out to design a "super" structured programming language that, we hoped, would radically simplify proving assertions about programs. In the end, we decided that it had to be declarative. However, we also were determined that iterative algorithms could be expressed directly, without circumlocutions such as the use of a tail-recursive function. The language that resulted, which we named LUCID, was much less traditional then we would have liked. LUCID statements are equations in a kind of executable temporallogic thatspecifythe (time)sequencesof variablesinvolvedin aniteration.
Step-by-step instructions with callouts to Apple TV screenshots that show you exactly what to do. Help when you run into problems or limitations. Tips and Notes to help you get the most from Apple TV. Full-color, step-by-step tasks walk you through doing everything you want to do with your Apple TV. Learn how to: Set up your Apple TV-and how to do it faster with an iPhone Control a home entertainment system using the Apple TV Use Siri to find content, launch apps, and get useful information Rent and buy movies and TV shows from iTunes Stream video from Netflix (R), Hulu, HBO (R), and Showtime (R) Find every app that offers the movie or TV show you're looking for with just one search Make your Apple TV even more fun by finding and using the best apps and games Use your Apple TV remote as a motion-sensitive game controller Enjoy music on your TV, including how to use Apple Music Set restrictions to prevent kids from accessing adult material Control your Apple TV using an iPhone Customize your Apple TV to fit how you use it Configure settings for people with visual impairments Solve common problems with the device Discover the hidden features and shortcuts that let you truly master the Apple TV Register Your Book at www.quepublishing.com/register and save 35% off your next purchase.
This book aids in the rehabilitation of the wrongfully deprecated work of William Parry, and is the only full-length investigation into Parry-type propositional logics. A central tenet of the monograph is that the sheer diversity of the contexts in which the mereological analogy emerges - its effervescence with respect to fields ranging from metaphysics to computer programming - provides compelling evidence that the study of logics of analytic implication can be instrumental in identifying connections between topics that would otherwise remain hidden. More concretely, the book identifies and discusses a host of cases in which analytic implication can play an important role in revealing distinct problems to be facets of a larger, cross-disciplinary problem. It introduces an element of constancy and cohesion that has previously been absent in a regrettably fractured field, shoring up those who are sympathetic to the worth of mereological analogy. Moreover, it generates new interest in the field by illustrating a wide range of interesting features present in such logics - and highlighting these features to appeal to researchers in many fields.
Cache And Interconnect Architectures In Multiprocessors Eilat, Israel May 25-261989 Michel Dubois UniversityofSouthernCalifornia Shreekant S. Thakkar SequentComputerSystems The aim of the workshop was to bring together researchers working on cache coherence protocols for shared-memory multiprocessors with various interconnect architectures. Shared-memory multiprocessors have become viable systems for many applications. Bus based shared-memory systems (Eg. Sequent's Symmetry, Encore's Multimax) are currently limited to 32 processors. The fIrst goal of the workshop was to learn about the performance ofapplications on current cache-based systems. The second goal was to learn about new network architectures and protocols for future scalable systems. These protocols and interconnects would allow shared-memory architectures to scale beyond current imitations. The workshop had 20 speakers who talked about their current research. The discussions were lively and cordial enough to keep the participants away from the wonderful sand and sun for two days. The participants got to know each other well and were able to share their thoughts in an informal manner. The workshop was organized into several sessions. The summary of each session is described below. This book presents revisions of some of the papers presented at the workshop."
A clear, comprehensive guide to VMware's latest virtualization solution Mastering VMware NSX for vSphere is the ultimate guide to VMware's network security virtualization platform. Written by a rock star in the VMware community, this book offers invaluable guidance and crucial reference for every facet of NSX, with clear explanations that go far beyond the public documentation. Coverage includes NSX architecture, controllers, and edges; preparation and deployment; logical switches; VLANS and VXLANS; logical routers; virtualization; edge network services; firewall security; and much more to help you take full advantage of the platform's many features. More and more organizations are recognizing both the need for stronger network security and the powerful solution that is NSX; usage has doubled in the past year alone, and that trend is projected to grow--and these organizations need qualified professionals who know how to work effectively with the NSX platform. This book covers everything you need to know to exploit the platform's full functionality so you can: Step up security at the application level Automate security and networking services Streamline infrastructure for better continuity Improve compliance by isolating systems that handle sensitive data VMware's NSX provides advanced security tools at a lower cost than traditional networking. As server virtualization has already become a de facto standard in many circles, network virtualization will follow quickly--and NSX positions VMware in the lead the way vSphere won the servers. NSX allows you to boost security at a granular level, streamline compliance, and build a more robust defense against the sort of problems that make headlines. Mastering VMware NSX for vSphere helps you get up to speed quickly and put this powerful platform to work for your organization.
Proceedings of the International Symposium on High Performance Computational Science and Engineering 2004 (IFIP World Computer Congress) is an essential reference for both academic and professional researchers in the field of computational science and engineering. Computational Science and Engineering is increasingly becoming an emerging and promising discipline in shaping future research and development activities in academia and industry ranging from engineering, science, finance, economics, arts and humanitarian fields. New challenges are in modeling of complex systems, sophisticated algorithms, advanced scientific and engineering computing, and associated (multi-disciplinary) problem solving environments. The papers presented in this volume are specially selected to address the most up-to-date ideas, results, work-in-progress and research experience in the area of high performance computational techniques for science and engineering applications. This state-of-the-are volume presents the proceedings of the International Symposium on High Performance Computational Science and Engineering, held in conjunction with the IFIP World Computer Congress, August 2004, in Toulouse, France. The collection will be important not only for computational science and engineering experts and researchers but for all teachers and administrators interested in high performance computational techniques.
Gain a thorough understanding of today's sometimes daunting, ever-changing world of technology as you learn how to apply the latest technology to your academic, professional and personal life with TECHNOLOGY FOR SUCCESS: COMPUTER CONCEPTS. Written by a team of best-selling technology authors and based on extensive research and feedback from students like you, this edition breaks each topic into brief, inviting lessons that address the "what, why and how" behind digital advancements to ensure deep understanding and application to today's real world. Optional online MindTap and SAM (Skills Assessment Manager) learning tools offer hands-on and step-by-step training, videos that cover the more difficult concepts and simulations that challenge you to solve problems in the actual world. You leave this course able to read the latest technology news and understand its impact on your daily life, the economy and society.
ITIL(R) 4 Direct, Plan and ImproveIf you've achieved your ITIL(R) 4 Foundation certificate, you're probably planning the next stage in your ITIL journey and which qualification to work towards. DPI provides essential knowledge and capabilities for service management professionals, supporting those involved in directing or planning based on strategy and continual improvement - a must-have skillset practitioners should seek beyond Foundation level. DPI is the only one of the ITIL 4 advanced level courses that leads to both Managing Professional (MP) and Strategic Leader (SL) status. The module is aimed at managers and aspiring managers at all levels, providing them with the practical skills needed to improve themselves and their organisation by way of effective strategic direction and delivering continual improvement. An excellent supplement to any training courseITIL(R) 4 Direct, Plan and Improve (DPI) - Your companion to the ITIL 4 Managing Professional and Strategic Leader DPI certification is a study guide designed to help students pass the ITIL(R) 4 Direct, Plan and Improve module. The majority of this book is based on the AXELOS ITIL(R) 4: Direct, Plan and Improve publication and the associated DPI Strategist syllabus. It provides students with the information they need to pass the DPI exam, and help them become a successful practitioner. Suitable for existing ITIL v3 experts, ITIL 4 Managing Professional (MP) students, ITSM (IT service management) practitioners who are adopting ITIL 4, approved training organisations, IT service managers, IT managers and those in IT support roles, the book covers: Key concepts: Scope, key principles and methods; The role of governance, risk and compliance; Continual improvement; Organisational change management; Measurement and reporting; Value streams and practices; and Exam preparation. A useful tool throughout your careerIn addition to being an essential study aid, the author - a seasoned ITSM professional - also provides additional guidance throughout the book which you can lean on once your training and exam are over. The book includes her own practical experience from which she gives advice and points to think about along the way so that you can refer back to this book for years to come - long after you've passed your exam. The essential link between your ITIL qualification and the real world - buy this book today!ITIL(R) is a registered trade mark of AXELOS Limited. All rights reserved. This book is an official AXELOS licensed product.
Make the most of your Mac with this witty, authoritative guide to macOS Big Sur. Apple updates its Mac operating system every year, adding new features with every revision. But after twenty years of this updating cycle without a printed user guide to help customers, feature bloat and complexity have begun to weigh down the works. For thirty years, the Mac faithful have turned to David Pogue's Mac books to guide them. With Mac Unlocked, New York Times bestselling author Pogue introduces readers to the most radical Mac software redesign in Apple history, macOS Big Sur. Beginning Mac users and Windows refugees will gain an understanding of the Mac philosophy; Mac veterans will find a concise guide to what's new in Big Sur, including its stunning visual and sonic redesign, the new Control Center for quick settings changes, and the built-in security auditing features. With a 300 annotated illustrations, sparkling humor, and crystal-clear prose, Mac Unlocked is the new gold-standard guide to the Mac.
This book delves into the essential concepts and technologies of acquiring systems. It fills the gap left by manuals and standards and provides practical knowledge and insight that allow engineers to navigate systems as well as the massive tomes containing standards and manuals. Dedicated to card acquiring exclusively, the book covers: Payment cards and protocols EMV contact chip and contactless transactions Disputes, arbitration, and compliance Data security standards in the payment card industry Validation algorithms Code tables Basic cryptography Pin block formats and algorithms When necessary the book discusses issuer-side features or standards insomuch as they are required for the sake of completeness. For example, protocols such as EMV 3-D Secure are not covered to the last exhaustive detail. Instead, this book provides an overview, justification, and logic behind each message of the protocol and leaves the task of listing all fields and their formats to the standard document itself. The chapter on EMV contact transactions is comprehensive to fully explain this complex topic in order to provide a basis for understanding EMV contactless transaction. A guide to behind-the-scenes business processes, relevant industry standards, best practices, and cryptographic algorithms, Acquiring Card Payments covers the essentials so readers can master the standards and latest developments of card payment systems and technology |
![]() ![]() You may like...
Computing in Communication Networks…
Frank H. P. Fitzek, Fabrizio Granelli, …
Paperback
R2,757
Discovery Miles 27 570
The System Designer's Guide to VHDL-AMS…
Peter J Ashenden, Gregory D. Peterson, …
Paperback
R2,355
Discovery Miles 23 550
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, …
Hardcover
R1,317
Discovery Miles 13 170
Inclusive Radio Communications for 5G…
Claude Oestges, Francois Quitin
Paperback
R2,996
Discovery Miles 29 960
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright
Paperback
R1,531
Discovery Miles 15 310
Constraint Decision-Making Systems in…
Santosh Kumar Das, Nilanjan Dey
Hardcover
R7,388
Discovery Miles 73 880
|