![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
Explore the cloud-native paradigm for event-driven and service-oriented applications In Cloud-Native Computing: How to Design, Develop, and Secure Microservices and Event-Driven Applications, a team of distinguished professionals delivers a comprehensive and insightful treatment of cloud-native computing technologies and tools. With a particular emphasis on the Kubernetes platform, as well as service mesh and API gateway solutions, the book demonstrates the need for reliability assurance in any distributed environment. The authors explain the application engineering and legacy modernization aspects of the technology at length, along with agile programming models. Descriptions of MSA and EDA as tools for accelerating software design and development accompany discussions of how cloud DevOps tools empower continuous integration, delivery, and deployment. Cloud-Native Computing also introduces proven edge devices and clouds used to construct microservices-centric and real-time edge applications. Finally, readers will benefit from: Thorough introductions to the demystification of digital transformation Comprehensive explorations of distributed computing in the digital era, as well as reflections on the history and technological development of cloud computing Practical discussions of cloud-native computing and microservices architecture, as well as event-driven architecture and serverless computing In-depth examinations of the Akka framework as a tool for concurrent and distributed applications development Perfect for graduate and postgraduate students in a variety of IT- and cloud-related specialties, Cloud-Native Computing also belongs in the libraries of IT professionals and business leaders engaged or interested in the application of cloud technologies to various business operations.
To provide ubiquitous and various services, 6G networks tend to be more comprehensive and multidimensional by integrating current terrestrial networks with space-/air-based information networks and marine information networks; then, heterogeneous network resources, as well as different types of users and data, will be also integrated. Driven by the exponentially growing demands of multimedia data traffic and computation-heavy applications, 6G heterogenous networks are expected to achieve a high QoS with ultra-reliability and low latency. In response, resource allocation has been considered an important factor that can improve 6G performance directly by configuring heterogeneous communication, computing and caching resources effectively and efficiently. The book addresses a range of technical issues in cooperative resource allocation and information sharing for the future 6G heterogenous networks, from the terrestrial ultra-dense networks and space-based networks to the integrated satellite-terrestrial networks, as well as introducing the effects of cooperative behavior among mobile users on increasing capacity, trustworthiness and privacy. For the cooperative transmission in heterogeneous networks, the authors commence with the traffic offloading problems in terrestrial ultra-dense networks, and the cognitive and cooperative mechanisms in heterogeneous space-based networks, the stability analysis of which is also provided. Moreover, for the cooperative transmission in integrated satellite-terrestrial networks, the authors present a pair of dynamic and adaptive resource allocation strategies for traffic offloading, cooperative beamforming and traffic prediction based cooperative transmission. Later, the authors discuss the cooperative computation and caching resource allocation in heterogeneous networks, with the highlight of providing our current studies on the game theory, auction theory and deep reinforcement learning based approaches. Meanwhile, the authors introduce the cooperative resource and information sharing among users, in which capacity oriented-, trustworthiness oriented-, and privacy oriented cooperative mechanisms are investigated. Finally, the conclusion is drawn.
This book investigates the impact of information and communication technologies (ICTs) on development and well-being (beyond economic benefits) and highlights some emerging issues relating to the realities, constraints and digital divides with particular reference to India. It collects a series of novel contributions, studying the Indian experience in an international cross-country perspective. The book also discusses economic, social, and behavioural aspects of well-being as well as access to ICTs across regions, states and individuals to account for the digital divide. The book establishes an aggregate relationship between ICT exposure and well-being at the country level and addresses a number of fundamental issues, such as whether ICT raises the level of transparency and governance. Based on case studies and anecdotal evidence, it then further assesses the effective implementation of service delivery through ICT innovations. The book is divided into four parts: The introductory part surveys the literature and presents background information on the Indian case; introduces the main themes on the relationships between ICT, socio-economic development and digital divides; and provides a summary and roadmap to the chapters of the book. Part II focuses on the impact of ICT on economic performance, including economic growth, productivity and trade. Part III examines the extent of the digital divides in India, including international, regional as well as inter-personal inequality. Finally, Part IV investigates the impact of ICT on governance, users' well-being and social outcomes. Combining insights from analyses of a variety of socio-economic dimensions related to digitalisation, this book is relevant for a wide range of scholars and researchers across disciplines, as well as practitioners and policy-makers. While the book has a main focus on India, various contributions take an international cross-country comparative perspective, and the results have general relevance for digitalisation and development. On the whole, the main message of this book is that the impact of ICTs is contingent upon other assets, capabilities and institutional conditions. National policies should, therefore, not only promote digitalization as such but also ensure its co-evolution and complementarity with a variety of other country-specific factors. Chapter 'Digitalisation and Development: Issues for India and Beyond' of this book is available open access under a CC BY 4.0 license at link.springer.com
This book constitutes the refereed proceedings of the 22nd IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2021, held in Saint-Etienne, and virtually in November 2021. The 70 papers (15 full and 55 short) presented with 5 industrial workshop papers were carefully reviewed and selected from 189 submissions. They provide a comprehensive overview of major challenges and recent advances in various domains related to the digital transformation and collaborative networks and their applications with a strong focus on the following areas related to the main theme of the conference: sustainable collaborative networks; sustainability via digitalization; analysis and assessment of business ecosystems; human factors in collaboration 4.0; maintenance and life-cycle management; policies and new digital services; safety and collaboration management; simulation and optimization; complex collaborative systems and ontologies; value co-creation in digitally enabled ecosystems; digitalization strategy in collaborative enterprises' networks; pathways and tools for DIHs; socio-technical perspectives on smart product-service systems; knowledge transfer and accelerated innovation in FoF; interoperability of IoT and CPS for industrial CNs; sentient immersive response network; digital tools and applications for collaborative healthcare; collaborative networks and open innovation in education 4.0; collaborative learning networks with industry and academia; and industrial workshop.
The state of the art in space-time code design This cutting-edge text presents the state of the art in space-time (ST) coded multi-antenna systems operating over broadband wireless mobile channels, including an analysis of the most recent research findings. Specifically, the authors focus on the algorithms and performance analysis of ST coded systems at the physical layer. This text is a complement to previously published works covering ST coded multi-antenna systems and offers several unique features and benefits: Systematic coverage of one of the most promising techniques that will support the next generation of broadband multimedia services Unified and comprehensive exposition on the design of ST codes, which places all the latest research in context Thorough designs of ST codes for the gamut of frequency-selective, time-selective, and doubly-selective MIMO channels that are encountered with broadband wireless mobile links, in addition to ST codes for flat fading MIMO channels Recent advances in complex field coded transmissions, sphere decoding algorithms, closed-loop ST coded systems, operation in the presence of colored interference, and multi-user, multi-antenna systems Development and analysis of novel algorithms and techniques that have arisen from recent research Numerical and simulated examples are given for most of the algorithms presented in the text to help readers better visualize and understand how they work. In addition, the authors provide background information on wireless communications basics, diversity techniques, and capacity of MIMO channels, giving readers the necessary foundation to grasp all the key concepts and techniques presentedin the text. This text will not only bring engineers, network designers, and graduate students in wireless communications up to date with the latest findings, it will also provide them with the latest applications.
Eckert's HANDS-ON MICROSOFT (R) WINDOWS (R) SERVER 2019 equips you with a solid foundation in basic server administration -- no prior experience required. It empowers you with the knowledge to manage servers on small to large networks and maximize Windows (R) Server 2019 administration. Using a logical topic flow and step-by-step exercises, it delivers thorough coverage of core Windows (R) Server 2019 features. You will learn how to deploy Windows (R) Server 2019 in a variety of different environments -- including those that rely on virtualization and containers -- and how to configure and manage server storage, troubleshoot performance issues and work with common Windows (R) Server technologies and network services, such as Active Directory, DNS, DHCP, IPAM, file sharing, printing and remote access. Numerous hands-on projects and MindTap activities enable you to put what you learn into real-world practice.
The growing complexity of projects today, as well as the uncertainty inherent in innovative projects, is making obsolete traditional project management practices and procedures, which are based on the notion that much about a project is known at its start. The current high level of change and complexity confronting organizational leaders and managers requires a new approach to projects so they can be managed flexibly to embrace and exploit change. What once used to be considered extreme uncertainty is now the norm, and managing planned projects is being replaced by managing projects as they evolve. Successfully managing projects in extreme situations, such as polar and military expeditions, shows how to manage successfully projects in today's turbulent environment. Executed under the harshest and most unpredictable conditions, these projects are great sources for learning about how to manage unexpected and unforeseen situations as they occur. This book presents multiple case studies of managing extreme events as they happened during polar, mountain climbing, military, and rescue expeditions. A boat accident in the Artic is a lesson on how an effective project manager must be ambidextrous: on one hand able to follow plans and on the other hand able to abandon those plans when disaster strikes and improvise new ones in response. Polar expeditions also illustrate how a team can use "weak links" to go beyond its usual information network to acquire strategic information. Fire and rescues operations illustrate how one team member's knowledge can be transferred to the entire team. Military operations provide case material on how teams coordinate and make use of both individual and collective competencies. This groundbreaking work pushes the definitions of a project and project management to reveal new insight that benefits researchers, academics, and the practitioners managing projects in today's challenging and uncertain times.
Designing the Total Area Network tackles the many issues surrounding one of the most important assets in any company: its network. Modern networks need to be fast and effective to meet an ever-increasing demand for more information and faster communication. This text offers a clear and concise presentation of the key issues for those involved in the purchase, management, planning and implementation of communication networks. It provides the broad technical understanding required to ask the right questions, set viable plans and avoid expensive investment and deployment mistakes.
The book consists of high-quality papers presented at the International Conference on Computational Science and Applications (ICCSA 2019), held at Maharashtra Institute of Technology World Peace University, Pune, India, from 7 to 9 August 2019. It covers the latest innovations and developments in information and communication technology, discussing topics such as soft computing and intelligent systems, web of sensor networks, drone operating systems, web of sensor networks, wearable smart sensors, automated guided vehicles and many more.
This book presents both state-of-the-art research developments and practical guidance on approaches, technologies and frameworks for the emerging cloud paradigm. Topics and features: presents the state of the art in cloud technologies, infrastructures, and service delivery and deployment models; discusses relevant theoretical frameworks, practical approaches and suggested methodologies; offers guidance and best practices for the development of cloud-based services and infrastructures, and examines management aspects of cloud computing; reviews consumer perspectives on mobile cloud computing and cloud-based enterprise resource planning; explores software performance testing, open-source cloudware support, and assessment methodologies for modernization, migration and pre-migration; describes emerging new methodologies relevant to the cloud paradigm, and provides suggestions for future developments and research directions.
An engineer’s guide to systems engineering of software-radio architectures As a crucial element of wireless technology, software radio is fast becoming a hot topic in the telecommunications field. This new book provides complete, up-to-date coverage of software radio architecture, discussing in detail functions, components, design procedures for complex radio systems, and large-scale software engineering methods such as UML and CORBA. The author bridges the inter-disciplinary gap in the field, covering what software engineers need to know about how radio "waveforms" are defined in software. Plus, he provides tutorial material on how the Unified Modeling Language–UML–is used for specifying radio architecture. The architecture tradeoffs–how to deliver predictably robust performance without unnecessarily expensive hardware, economic principles, cost considerations, and marketplace trends–are also addressed. Coverage includes:
Systems Management is emerging as the predominant area for computer science in the enterprise, with studies showing that the bulk (up to 80%) of an enterprise IT budget is spent on management/operational issues and is the largest piece of the expenditure. This textbook provides an overview of the field of computer systems and network management. Systems management courses are being taught in different graduate and undergraduate computer science programs, but there are no good books with a comprehensive overview of the subject. This text book will provide content appropriate for either an undergraduate course (junior or senior year) or a graduate course in systems management.
Highlights developments, discoveries, and practical and advanced experiences related to responsive distributed computing and how it can support the deployment of trajectory-based applications in intelligent systems. Presents metamodeling with new trajectories patterns which are very useful for intelligent transportation systems. Examines the processing aspects of raw trajectories to develop other types of semantic and activity-type and space-time path type trajectories. Discusses Complex Event Processing (CEP), Internet of Things (IoT), Internet of Vehicle (IoV), V2X communication, Big Data Analytics, distributed processing frameworks, and Cloud Computing. Presents a number of case studies to demonstrate smart trajectories related to spatio-temporal events such as traffic congestion, viral contamination, and pedestrian accidents.
After reading this book, I now have a clear understanding of how Nagios works, how to implement it across all types of networked equipment, and even how to shut it off during my week of on-call. I give this book a 10/10. -- Joe Topjian, Adminspotting.net "Pro Nagios 2.0" explains how to install and administer Nagios, the web-based enterprise management tool that helps monitor Unix, Windows, network devices, infrastructure equipment, and applications. Youll learn how to architect Nagios installations, deploy agents and plug-ins, and monitor a variety of assets, which include applications across a variety of platforms and operating systems. Nagios has the power to alert you to current and future incidents that could impact the availability, performance, and security of monitored assets. The books real-world configurations and supporting materials will enable you to deploy Nagios and integrate other tools (like MRTG and Snort) on a helpful step-by-step basis. Integrating Nagios with a variety of other tools can add more functionality to its internal monitoring and alerting capabilities. The book covers additional topics like security, redundancy and failover, and plug-in development. And it shows you how to create your own Nagios plug-ins, to monitor devices for which Nagios may not provide plug-ins.
Many professionals and students in engineering, science, business, and other application fields need to develop Windows-based and web-enabled information systems to store and use data for decision support, without help from professional programmers. However, few books are available to train professionals and students who are not professional programmers to develop these information systems. Developing Windows-Based and Web-Enabled Information Systems fills this gap, providing a self-contained, easy-to-understand, and well-illustrated text that explores current concepts, methods, and software tools for developing Windows-based and web-enabled information systems. Written in an easily accessible style, the book details current concepts, methods, and software tools for Windows-based and web-enabled information systems that store and use data. It is self-contained with easy-to-understand small examples to walk through concepts and implementation details along with large-scale case studies. The book describes data modeling methods including entity-relationship modeling, relational modeling and normalization, and object-oriented data modeling, to develop data models of a database. The author covers how to use software tools in the Microsoft application development environment, including Microsoft Access, MySQL, SQL, Visual Studio, Visual Basic, VBA, HTML, and XML, to implement databases and develop Windows-based and web-enabled applications with the database, graphical user interface, and program components. The book takes you through the entire process of developing a computer and network application for an information system, highlighting concepts and operation details. In each chapter, small data examples are used to manually walk through concepts and operational details. These features and more give you the conceptual understanding and practical skill required, even if you don't have a computer science background, to develop Windows-based or web-enabled applications for your specialized information system.
Even leading organizations with sophisticated IT infrastructures and teams of lawyers can find themselves unprepared to deal with the range of issues that can arise in IT contracting. Written by two seasoned attorneys, A Guide to IT Contracting: Checklists, Tools, and Techniques distills the most critical business and legal lessons learned through the authors' decades of experience drafting and negotiating IT-related agreements. In a single volume, readers can quickly access information on virtually every type of technology agreement. Structured to focus on a particular type of IT agreement, each chapter includes a checklist of essential terms, a brief summary of what the agreement is intended to do, and a complete review of the legal and business issues that are addressed in that particular agreement. Providing non-legal professionals with the tools to address IT contracting issues, the book: Contains checklists to help readers organize key concepts for ready reference Supplies references to helpful online resources and aids for contract drafting Includes downloadable resources with reusable checklists and complete glossary that defines key legal, business, and technical terms Costly mistakes can be avoided, risk can be averted, and better contracts can be drafted if you have access to the right information. Filled with reader-friendly checklists, this accessible reference will set you down that path. Warning you of the most common pitfalls, it arms you with little-known tips and best practices to help you negotiate the key terms of your IT agreements with confidence and ensure you come out on top in your next contract negotiation.
Design Science Research is a powerful paradigm enabling researchers to make important contributions to society and industry. Simply stated, the goal of DSR is to generate knowledge on how to find innovative solutions to important problems in the form of models, methods, constructs and instantiations. Over the past 20 years, the design science research (DSR) paradigm has developed into an established paradigm in Information Systems Research and it is of strong uptake in many other disciplines, including Management Science and Computer Science. This book provides a collection of twelve DSR cases, presented by experienced researchers in the field. It offers readers access to real-world DSR studies, together with the authors' reflections on their research processes. These cases will support researchers who want to engage in DSR, and represent a valuable addition to existing introductions to DSR methods and processes. Readers will learn from the hands-on experiences of respected experts who have conducted extensive DSR in a range of application contexts.
In recent years, scientists have become more focused on the research, development, and integration of Heterogeneous Wireless Networks (HWN) platforms in order to both converge the existing telecom technology and to deliver multimedia services of high intrinsic and perceived Quality of Service (QoS) to users. The Handbook of Research on Heterogeneous Next Generation Networking: Innovations and Platforms identifies key issues facing next generation networks and highlights promising technologies. With over 20 research contributions from 47 international experts, this comprehensive collection explores the technical characteristics of the shared core network and multiple access networks, and the associated modeling, security, and performance issues essential to quality service delivery of integrated data, video, and voice. Enhanced with far-reaching considerations of the societal and commercial implications in such domains as e-government and e-commerce, this essential addition to library reference collections will also benefit academics, technology specialists, managers, and policy makers in a broad range of settings.
Today's organizations find themselves in a race to adopt new technologies in order to keep up with their competition. However, two questions must be answered: Are these organizations ready for new technological advancements, and are these new technologies appropriate for every organization? Technological Challenges and Management: Matching Human and Business Needs focuses on the new advances and challenges that today's organizations face in the areas of human resources and business, resulting from continuous and highly complex changes in technological resources. Organizations need to implement a more proactive and flexible management, matching their human and business needs. Due to this reality, it is important to study and understand varied contributions made by researchers, academics, and practitioners in this field of study worldwide. With the focus of this reality, this book exchanges experiences and perspectives about the state of technological challenges and management research, and future directions for this field of study. It also takes into account the deep implications that these challenges have in the organization of human resources. The authors support academics and researchers and those operating in the management field in dealing with different challenges that organizations face today. This is especially true concerning the relationship between technological changes, human resources management, and business. They propose the sharing of knowledge, through debate and information exchange, about technological challenges and management, matching the critical items of human and business needs. The book is divided into seven chapters that span from evaluating new technologies to finding the perfect fit.
This volume represents the proceedings of the Second International Conference on Innovation through Knowledge Transfer, InnovationKT'2010, organised jointly by KES International and the Institute of Knowledge Transfer, and taking place in Coventry, UK on 7&8 December 2010. Featuring world-class invited speakers and contributions from a range of backgrounds and countries, the conference provided an excellent opportunity to disseminate, share and discuss the impact of university-business interaction through knowledge transfer in all its forms. There were two main motivations in initiating the Innovation through Knowledge Transfer series. The first aim was to provide the chance for publication on a subject where few opportunities exist already. The second motivation was to foster the development of a community from the diverse range of individuals practicing knowledge transfer. It is becoming clear that the delegates of the conference are drawn from a diverse community of practice. InnovationKT'2010 has succeeded in bringing together contributions from both the academic and practitioner sections of the knowledge transfer community. The programme contained seven invited keynote talks, 40 oral presentations grouped into eight sessions, and one interactive workshop. The proceedings contain 29 chapters drawn from this material. There were 91 registered delegates drawn from 10 countries of the world. The field of knowledge transfer is still immature, but these proceedings demonstrate that InnovationKT conference is making a significant contribution to its academic development. "
This book provides a range of application areas of data and knowledge management and their solutions for the fields related to the convergence of information and communication technology (ICT), healthcare, and telecommunication services. The authors present approaches and case studies in future technological trends and challenges in the aforementioned fields. The book acts as a scholarly forum for researchers both in academia and industry.
This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, "Hybrid Encryption Algorithms over Wireless Communication Channels", examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik's cube is used afterwards in order to maximize the number of permutations. Transmission of images and videos is vital in today's communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality. Complete simulation experiments with MATLAB (R) codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements.
This book contains a selection of research articles written by prominent researchers participating in The 27th World Congress on Engineering (WCE 2019) which was held in London, UK, July 3-5, 2019. Topics covered include engineering mathematics, electrical engineering, communications systems, computer science, chemical engineering, systems engineering, manufacturing engineering, and industrial applications. With contributions carefully chosen to represent the most cutting-edge research presented during the conference, the book contains some of the state of the art in engineering technologies and the physical sciences and their applications and serves as a useful reference for researchers and graduate students working in these fields.
Since computer vision¿s humble beginnings in the 1960s, a substantial amount of related research has been biologically inspired, using the human eye and visual perception as a model from which to work. Panoramic vision is a subset of computer vision that focuses on the creation and analysis of images with unusually wide fields of view that extend far beyond a single camera snapshot. It has broad implications for commercial and web-based multimedia applications, such as games, virtual reality, surveillance, and teleconferencing. This volume collects the works of researchers who have worked extensively in the field and covers a wide array of topics in this promising new area. In addition to providing a concise historical perspective on panoramic imaging, the book features representative sections on the design of panoramic image capturing systems, the theory involved in the imaging process, software techniques for creating panoramic images, and applications that use panoramic images. It will help readers to understand the more technical aspects of panoramic vision, such as sensor design and imaging techniques. Interest in panoramic vision will only increase over time, as faster computers and larger bandwidth become available and as specialized cameras become cheaper through economies of scale. Researchers and professionals in computer vision, imaging and robotics (machine vision) will find the book an authoritative and indispensable resource for panoramic vision concepts and methods. |
You may like...
Moral Understandings - A Feminist Study…
Margaret Urban Walker
Hardcover
R2,155
Discovery Miles 21 550
Manipulation - Theory and Practice
Christian Coons, Michael Weber
Hardcover
R3,837
Discovery Miles 38 370
|