|
Books > Computing & IT > Computer hardware & operating systems
4 zettabytes (4 billion terabytes) of data generated in 2013, 44
zettabytes predicted for 2020 and 185 zettabytes for 2025. These
figures are staggering and perfectly illustrate this new era of
data deluge. Data has become a major economic and social challenge.
The speed of processing of these data is the weakest link in a
computer system: the storage system. It is therefore crucial to
optimize this operation. During the last decade, storage systems
have experienced a major revolution: the advent of flash memory.
Flash Memory Integration: Performance and Energy Issues contributes
to a better understanding of these revolutions. The authors offer
us an insight into the integration of flash memory in computer
systems, their behavior in performance and in power consumption
compared to traditional storage systems. The book also presents, in
their entirety, various methods for measuring the performance and
energy consumption of storage systems for embedded as well as
desktop/server computer systems. We are invited on a journey to the
memories of the future.
Mobile Sensors and Context-Aware Computing is a useful guide that
explains how hardware, software, sensors, and operating systems
converge to create a new generation of context-aware mobile
applications. This cohesive guide to the mobile computing landscape
demonstrates innovative mobile and sensor solutions for platforms
that deliver enhanced, personalized user experiences, with examples
including the fast-growing domains of mobile health and vehicular
networking. Users will learn how the convergence of mobile and
sensors facilitates cyber-physical systems and the Internet of
Things, and how applications which directly interact with the
physical world are becoming more and more compatible. The authors
cover both the platform components and key issues of security,
privacy, power management, and wireless interaction with other
systems.
Advances in Computers, the latest volume in the series published
since 1960, presents detailed coverage of innovations in computer
hardware, software, theory, design, and applications. In addition,
it provides contributors with a medium in which they can explore
their subjects in greater depth and breadth than journal articles
usually allow. As a result, many articles have become standard
references that continue to be of significant, lasting value in
this rapidly expanding field.
The Physics of Computing gives a foundational view of the physical
principles underlying computers. Performance, power, thermal
behavior, and reliability are all harder and harder to achieve as
transistors shrink to nanometer scales. This book describes the
physics of computing at all levels of abstraction from single gates
to complete computer systems. It can be used as a course for
juniors or seniors in computer engineering and electrical
engineering, and can also be used to teach students in other
scientific disciplines important concepts in computing. For
electrical engineering, the book provides the fundamentals of
computing that link core concepts to computing. For computer
science, it provides foundations of key challenges such as power
consumption, performance, and thermal. The book can also be used as
a technical reference by professionals.
This book gives a review of the principles, methods and techniques
of important and emerging research topics and technologies in
Channel Coding, including theory, algorithms, and applications.
Edited by leading people in the field who, through their
reputation, have been able to commission experts to write on a
particular topic. With this reference source you will: Quickly
grasp a new area of research Understand the underlying principles
of a topic and its applications Ascertain how a topic relates to
other areas and learn of the research issues yet to be resolved
Autonomic networking aims to solve the mounting problems created by
increasingly complex networks, by enabling devices and
service-providers to decide, preferably without human intervention,
what to do at any given moment, and ultimately to create
self-managing networks that can interface with each other, adapting
their behavior to provide the best service to the end-user in all
situations. This book gives both an understanding and an assessment
of the principles, methods and architectures in autonomous network
management, as well as lessons learned from, the ongoing
initiatives in the field. It includes contributions from industry
groups at Orange Labs, Motorola, Ericsson, the ANA EU Project and
leading universities. These groups all provide chapters examining
the international research projects to which they are contributing,
such as the EU Autonomic Network Architecture Project and Ambient
Networks EU Project, reviewing current developments and
demonstrating how autonomic management principles are used to
define new architectures, models, protocols, and mechanisms for
future network equipment.
This book is a celebration of Leslie Lamport's work on concurrency,
interwoven in four-and-a-half decades of an evolving industry: from
the introduction of the first personal computer to an era when
parallel and distributed multiprocessors are abundant. His works
lay formal foundations for concurrent computations executed by
interconnected computers. Some of the algorithms have become
standard engineering practice for fault tolerant distributed
computing - distributed systems that continue to function correctly
despite failures of individual components. He also developed a
substantial body of work on the formal specification and
verification of concurrent systems, and has contributed to the
development of automated tools applying these methods. Part I
consists of technical chapters of the book and a biography. The
technical chapters of this book present a retrospective on
Lamport's original ideas from experts in the field. Through this
lens, it portrays their long-lasting impact. The chapters cover
timeless notions Lamport introduced: the Bakery algorithm, atomic
shared registers and sequential consistency; causality and logical
time; Byzantine Agreement; state machine replication and Paxos;
temporal logic of actions (TLA). The professional biography tells
of Lamport's career, providing the context in which his work arose
and broke new grounds, and discusses LaTeX - perhaps Lamport's most
influential contribution outside the field of concurrency. This
chapter gives a voice to the people behind the achievements,
notably Lamport himself, and additionally the colleagues around
him, who inspired, collaborated, and helped him drive worldwide
impact. Part II consists of a selection of Leslie Lamport's most
influential papers. This book touches on a lifetime of
contributions by Leslie Lamport to the field of concurrency and on
the extensive influence he had on people working in the field. It
will be of value to historians of science, and to researchers and
students who work in the area of concurrency and who are interested
to read about the work of one of the most influential researchers
in this field.
Meeting People via WiFi and Bluetooth will contain an overview of
how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi)
and Bluetooth 802.15 Radio Frequencies. The content contained here
came from research and materials originally presented at Defcon
Wireless CTF Village in August 2015 entitled "Meeting People Via
Wi-Fi". The book will go over the hardware and software needed in
order to do this tracking, how to use these particular tools in
order to do attribution, and tips for protecting yourself from
being attributed via those signals.
Mobile Ad Hoc Networks (MANETs) are a popular form of network for
data transfer due to the fact that they are dynamic, require no
fixed infrastructure, and are scalable. However, MANETs are
particularly susceptible to several different types of widely
perpetrated cyberattack. One of the most common hacks aimed at
MANETs is the Black Hole attack, in which a particular node within
the network displays itself as having the shortest path for the
node whose packets it wants to intercept. Once the packets are
drawn to the Black Hole, they are then dropped instead of relayed,
and the communication of the MANET is thereby disrupted, without
knowledge of the other nodes in the network. Due to the
sophistication of the Black Hole attack, there has been a lot of
research conducted on how to detect it and prevent it. The authors
of this short format title provide their research results on
providing an effective solution to Black Hole attacks, including
introduction of new MANET routing protocols that can be implemented
in order to improve detection accuracy and network parameters such
as total dropped packets, end-to-end delay, packet delivery ratio,
and routing request overhead.
Intelligent systems and related designs have become important
instruments leading to profound innovations in automated control
and interaction with computers and machines. Such systems depend
upon established methods and tools for solving complex learning and
decision-making problems under uncertain and continuously varying
conditions. Intelligent Applications for Heterogeneous System
Modeling and Design examines the latest developments in intelligent
system engineering being used across industries with an emphasis on
transportation, aviation, and medicine. Focusing on the latest
trends in artificial intelligence, systems design and testing, and
related topic areas, this publication is designed for use by
engineers, IT specialists, academicians, and graduate-level
students.
 |
Ed Mastery
(Hardcover)
Michael W Lucas
|
R823
R750
Discovery Miles 7 500
Save R73 (9%)
|
Ships in 10 - 15 working days
|
|
Topics in Parallel and Distributed Computing provides resources and
guidance for those learning PDC as well as those teaching students
new to the discipline. The pervasiveness of computing devices
containing multicore CPUs and GPUs, including home and office PCs,
laptops, and mobile devices, is making even common users dependent
on parallel processing. Certainly, it is no longer sufficient for
even basic programmers to acquire only the traditional sequential
programming skills. The preceding trends point to the need for
imparting a broad-based skill set in PDC technology. However, the
rapid changes in computing hardware platforms and devices,
languages, supporting programming environments, and research
advances, poses a challenge both for newcomers and seasoned
computer scientists. This edited collection has been developed over
the past several years in conjunction with the IEEE technical
committee on parallel processing (TCPP), which held several
workshops and discussions on learning parallel computing and
integrating parallel concepts into courses throughout computer
science curricula.
Using HPC for Computational Fluid Dynamics: A Guide to High
Performance Computing for CFD Engineers offers one of the first
self-contained guides on the use of high performance computing for
computational work in fluid dynamics. Beginning with an
introduction to HPC, including its history and basic terminology,
the book moves on to consider how modern supercomputers can be used
to solve common CFD challenges, including the resolution of high
density grids and dealing with the large file sizes generated when
using commercial codes. Written to help early career engineers and
post-graduate students compete in the fast-paced computational
field where knowledge of CFD alone is no longer sufficient, the
text provides a one-stop resource for all the technical information
readers will need for successful HPC computation.
The definitive expert guide to Windows is now rewritten from the
ground up to deliver the most valuable, detailed hands-on insights
for maximizing your productivity with Windows 11. Legendary Windows
expert Ed Bott reveals the full power of Windows 11's most
innovative new features, and offers detailed guidance on making the
most of Microsoft's new Windows with modern PC hardware and cloud
services. Windows 11 isn't just an incremental update: it's a
thorough and thoughtful reworking of Windows, from user experience
to security-a new way of working, for more than 250,000,000 new
device owners every year. Now, backed with insider support from
Microsoft's own Windows teams, Bott presents better, smarter ways
to work with it: hundreds of timesaving tips, practical solutions,
troubleshooting techniques, and easy workarounds you won't find
anywhere else. In one supremely well-organized reference, you'll
find authoritative coverage of all this, and much more: Windows
11's new user experience, from reworked Start menu and Settings app
to voice input The brand-new Windows 365 option for running Windows
11 as a Cloud PC, accessible from anywhere Major security and
privacy enhancements that leverage the latest PC hardware Expert
insight and options for installation, configuration, deployment,
and management - from the individual to the enterprise Getting more
productivity out of Windows 11's built-in apps and advanced
Microsoft Edge browser Improving performance, maximizing power
efficiency, troubleshooting, and backup/recovery Managing and
automating Windows with PowerShell, Windows Terminal, and other pro
tools Running Android apps on Windows 11, and using the Windows
subsystem for Linux
This book provides a comprehensive coverage of hardware security
concepts, derived from the unique characteristics of emerging logic
and memory devices and related architectures. The primary focus is
on mapping device-specific properties, such as multi-functionality,
runtime polymorphism, intrinsic entropy, nonlinearity, ease of
heterogeneous integration, and tamper-resilience to the
corresponding security primitives that they help realize, such as
static and dynamic camouflaging, true random number generation,
physically unclonable functions, secure heterogeneous and
large-scale systems, and tamper-proof memories. The authors discuss
several device technologies offering the desired properties
(including spintronics switches, memristors, silicon nanowire
transistors and ferroelectric devices) for such security primitives
and schemes, while also providing a detailed case study for each of
the outlined security applications. Overall, the book gives a
holistic perspective of how the promising properties found in
emerging devices, which are not readily afforded by traditional
CMOS devices and systems, can help advance the field of hardware
security.
|
|