Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Internet > Network computers
The Cisco Unified Computing System (UCS) can be found in the majority of data centers across the world. However, getting hands-on practice to learn this infrastructure can be difficult, as many companies will push to have it production-ready as soon as possible. Home-labs are also cost-prohibitive, cumbersome, electricity-hungry, and noisy. So, how do you get hands-on experience? With Unified Computing System Platform Emulator (UCSPE) and this book. UCSPE is free and can run on a laptop. Using it along with this book, you will learn how to set up, manage and troubleshoot a UCS, including the fabric interconnects, chassis and IOMs, and servers through the GUI and the CLI. All from the comfort of your own home. Introducing Cisco Unified Computing System will show you how to set up a UCS (comparing the UCSPE to a real-world deployment), customize the hardware, configure the UCS system, and secure it. You'll start by creating an organization and then the policies to control storage, networking, boot options, maintenance policies, and server pools. Once you have the required policies you'll use them to create service profiles (using the policies) and templates and assign these to the blade and rack-mount servers in the virtual environment. You'll also be looking at real-life scenarios such as upgrades (and downgrades), northbound networking, and Storage Area Networking (SAN) connectivity. Using the GUI and the CLI you'll look at real-world examples that data center engineers may encounter. What You'll Learn Set up the Cisco UCSPE on VMWare Create UCS service profiles Secure the UCS system Troubleshoot the UCS Who This Book Is For Datacenter and network engineers and individuals studying for the CCNA and CCNP Cisco data center qualification.
This book constitutes the refereed post-conference proceedings of the 2nd International Conference on Edge Computing and IoT, ICECI 2021, held in December 2021 in Shenzhen, China. Due to COVID-19 pandemic the conference was held virtually. The explosion of the big data generated by ubiquitous edge devices motivates the emergence of applying machine learning systems for edge computing and Internet of Things (IoT) services. Machine learning techniques are delivering a promising solution to the industry for building IoT systems and to make innovation at a rapid pace. The 12 full papers of ICECI 2021 were selected from 26 submissions and present results and ideas in the area of edge computing and IoT.
This book constitutes refereed proceedings of the Second International Conference on Smart Technologies, Systems and Applications, held in Quito, Ecuador, in December 2021. Due to the COVID-19 pandemic the conference was held in a hybrid format. The 29 full papers along with 1 short paper presented were carefully reviewed and selected from 104 submissions. The papers of this volume are organized in topical sections on smart technologies; smart systems; smart trends and applications.
In modern computing a program is usually distributed among several processes. The fundamental challenge when developing reliable and secure distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail. Failures may range from crashes to adversarial attacks by malicious processes. Cachin, Guerraoui, and Rodrigues present an introductory description of fundamental distributed programming abstractions together with algorithms to implement them in distributed systems, where processes are subject to crashes and malicious attacks. The authors follow an incremental approach by first introducing basic abstractions in simple distributed environments, before moving to more sophisticated abstractions and more challenging environments. Each core chapter is devoted to one topic, covering reliable broadcast, shared memory, consensus, and extensions of consensus. For every topic, many exercises and their solutions enhance the understanding This book represents the second edition of "Introduction to Reliable Distributed Programming". Its scope has been extended to include security against malicious actions by non-cooperating processes. This important domain has become widely known under the name "Byzantine fault-tolerance".
This book constitutes the refereed proceedings of the 6th ECML PKDD Workshop on Advanced Analytics and Learning on Temporal Data, AALTD 2021, held during September 13-17, 2021. The workshop was planned to take place in Bilbao, Spain, but was held virtually due to the COVID-19 pandemic. The 12 full papers presented in this book were carefully reviewed and selected from 21 submissions. They focus on the following topics: Temporal Data Clustering; Classification of Univariate and Multivariate Time Series; Multivariate Time Series Co-clustering; Efficient Event Detection; Modeling Temporal Dependencies; Advanced Forecasting and Prediction Models; Cluster-based Forecasting; Explanation Methods for Time Series Classification; Multimodal Meta-Learning for Time Series Regression; and Multivariate Time Series Anomaly Detection.
Das Buch richtet sich an alle, die Kenntnisse uber die
faszinierende Welt der Computernetze und des Internets benotigen.
Es begleitet Sie zuverlassig vom ersten Einstieg in das Thema bis
hin in die berufliche Praxis. Es unterstutzt Sie auf dem Wege zu
Prufungen und in der beruflichen Weiterbildung.
This book constitutes the thoroughly refereed post-workshop proceedings of the First International Workshop on Datalog 2.0, held in Oxford, UK, in March 2010. The 22 revised full papers presented were carefully selected during two rounds of reviewing and improvements from numerous submissions. The papers showcase the state-of-the-art in theory and systems for datalog, divided in three sections: Properties, applications, and extensions of datalog.
This book constitutes the refereed proceedings of the Third International Conference on Big Data and Security, ICBDS 2021, held in Shenzhen, China, in November 2021 The 46 revised full papers and 13 short papers were carefully reviewed and selected out of 221 submissions. The papers included in this volume are organized according to the topical sections on cybersecurity and privacy; big data; blockchain and internet of things, and artificial intelligence/ machine learning security.
This important text provides a single point of reference for state-of-the-art cloud computing design and implementation techniques. The book examines cloud computing from the perspective of enterprise architecture, asking the question; how do we realize new business potential with our existing enterprises? Topics and features: with a Foreword by Thomas Erl; contains contributions from an international selection of preeminent experts; presents the state-of-the-art in enterprise architecture approaches with respect to cloud computing models, frameworks, technologies, and applications; discusses potential research directions, and technologies to facilitate the realization of emerging business models through enterprise architecture approaches; provides relevant theoretical frameworks, and the latest empirical research findings.
This book constitutes the refereed proceedings of the 19th
International Conference on Case-Based Reasoning, held in London,
UK, in September 2011.
FTTX Networks: Technology Implementation and Operation provides an in-depth treatment of the technology and implementation of FTTX networks, discusses the environment that gave rise to FTTX, provides a survey of the available FTTX technologies, and gives users the state-of-the-art knowledge needed for successful deployment of FTTX. The book includes hands-on project planning engineering design and operations checklists, as well as recommended best practices for configuring FTTH systems and the data networks preceding them for IPTV, voice, and data, with case studies of actual FTTH systems and a methodology for predicting the performance of real systems. This book is a must-read for all network engineers, technical businesspeople, and technical specialists engaged in building FTTX networks, from technology selection, to fielding the network in production, to implementation.
The book features original papers from International Conference on Pervasive Computing and Social Networking (ICPCSN 2021), organized by NSIT, Salem, India during 19 - 20 march 2021. It covers research works on conceptual, constructive, empirical, theoretical and practical implementations of pervasive computing and social networking methods for developing more novel ideas and innovations in the growing field of information and communication technologies.
This revised and expanded edition of Encyclopedia of Database Systems provides easy access to crucial concepts relevant to all aspects of very large databases, data management, and database systems, including areas of current interest and research results of historical significance. This comprehensive reference is organized alphabetically and each entry presents basic terminology, concepts, methods and algorithms, key results to date, references to the literature, and cross-references to other entries. Topics for the encyclopedia-including areas of current interest as well as research results of historical significance-were selected by a distinguished international advisory board and written by world-class experts in the field. New entries that reflect recent developments and technological advances in very large databases include: big data, big data technology, cloud computing, cloud data centers, business analytics, social networks, ranking, trust management, query over encrypted data, and more. Entirely new entries include database systems, relational database systems, databases, multimedia databases, bioinformatics, workflow systems, and web data management. Encyclopedia of Database Systems, 2nd edition, is designed to meet the needs of researchers, professors, graduate and undergraduate students in computer science and engineering. Industry professionals, from database specialists to software developers, will also benefit from this valuable reference work.
This book presents applications of cognitive management and cognitive computing in the fields of risk management, cognitive fraud detection, and in business decision making. The book provides insights on how cognitive management and cognitive computing enable businesses to quickly augment human intelligence and help humans perform tasks better. For example, the authors describe how by analyzing patterns in big data, small data, and "dark data," cognitive technologies can detect human behavior and suggest options for personalizing of products and services. The book studies companies in industries such as automotive, airline, health care, retail, wealth management, and litigation who have adopted these approaches. Presents applications of cognitive computing and cognitive management used in augmenting and empowering business decisions; Shows how to employ the Internet of Things in businesses using a cognitive management framework; Discusses technical aspects and alternatives to traditional tools, algorithms, and methodologies in cognitive computing.
This book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.
This book constitutes the refereed proceedings of the 15th Conference on Image and Graphics Technologies and Applications, IGTA 2020, held in Beijing, China in September, 2020.*The 24 papers presented were carefully reviewed and selected from 115 submissions. They provide a forum for sharing progresses in the areas of image processing technology; image analysis and understanding; computer vision and pattern recognition; big data mining, computer graphics and VR, as well as image technology applications. *The conference was held virtually due to the COVID-19 pandemic.
This book constitutes the refereed proceedings of the Third EAI International Conference on Smart Grid and Internet of Things, SGIoT 2019, held in TaiChung, Taiwan, in November 2019. The 10 papers presented were carefully reviewed and selected from 22 submissions and present results on how to achieve more efficient use of resources based largely on the IoT-based machine-to-machine (M2M) interactions of millions of smart meters and sensors in the smart grid specific communication networks such as home area networks, building area networks, and neighborhood area networks. The smart grid also encompasses IoT technologies, which monitor transmission lines, manage substations, integrate renewable energy generation. Through these technologies, the authorities can smartly identify outage problems, and intelligently schedule the power generation and delivery to the customers. Furthermore, the smart grid should teach us a valuable lesson that security must be designed in from the start of any IoT deployment.
This book comprises select proceedings of the 4th International Conference on Innovative Computing (IC 2021) focusing on cutting-edge research carried out in the areas of information technology, science, and engineering. Some of the themes covered in this book are cloud communications and networking, high performance computing, architecture for secure and interactive IoT, satellite communication, wearable network and system, infrastructure management, etc. The essays are written by leading international experts, making it a valuable resource for researchers and practicing engineers alike.
A thorough treatment of UAV wireless communications and networking research challenges and opportunities. Detailed, step-by-step development of carefully selected research problems that pertain to UAV network performance analysis and optimization, physical layer design, trajectory path planning, resource management, multiple access, cooperative communications, standardization, control, and security is provided. Featuring discussion of practical applications including drone delivery systems, public safety, IoT, virtual reality, and smart cities, this is an essential tool for researchers, students, and engineers interested in broadening their knowledge of the deployment and operation of communication systems that integrate or rely on unmanned aerial vehicles.
Communications and Controls in Cyber Physical Systems: Theory, Design and Applications in Smart Grids provides readers with all they need to know about cyber physical systems (CPSs), such as smart grids, which have attracted intensive studies in recent years. Communications and controls are of key importance for maintaining and stabilizing the operation of the physical dynamics in these complicated systems. This book presents a systematic treatment on the communication and control aspects of CPSs, along with applications to the smart grid in four parts, including the basics of CPS, communications and controls, an explanation of the integration with CPS, coverage of controls with information constraints in CPS, and an applications oriented focus on smart grids as a CPS. Drawing upon years of practical experience and using numerous examples and illustrations, the authors' discuss key communication and controls design methods that can be integrated into a CPS, how communication and control schemes can be applied in practical systems such as smart grids, new directions and approaches for traditional engineers and researchers in communications, and controls and power systems as they relates to CPSs.
This textbook integrates the most advanced topics of physical-layer security, cryptography, covert/stealth communications, quantum key distribution (QKD), and cyber security to tackle complex security issues. After introducing the reader to various concepts and practices, the author addresses how these can work together to target problems, rather than treating them as separate disciplines. This book offers students an in-depth exposition on: cryptography, information-theoretic approach to cryptography, physical-layer security, covert/stealth/low-probability of detection communications, quantum information theory, QKD, and cyber security; to mention few. The goal is to provide a unified description of the most advanced topics related to: (i) modern cryptography, (ii) physical-layer security, (iii) QKD, (iv) covert communications, and (v) cyber security. Each chapter is followed by a set of problems. Also, for readers to better understand the book, an appendix covers all needed background. Homework problems and lecture notes are available online. The book does not require any prior knowledge or prerequisite material.
This book constitutes the refereed proceedings of the 22nd IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2021, held in Saint-Etienne, and virtually in November 2021. The 70 papers (15 full and 55 short) presented with 5 industrial workshop papers were carefully reviewed and selected from 189 submissions. They provide a comprehensive overview of major challenges and recent advances in various domains related to the digital transformation and collaborative networks and their applications with a strong focus on the following areas related to the main theme of the conference: sustainable collaborative networks; sustainability via digitalization; analysis and assessment of business ecosystems; human factors in collaboration 4.0; maintenance and life-cycle management; policies and new digital services; safety and collaboration management; simulation and optimization; complex collaborative systems and ontologies; value co-creation in digitally enabled ecosystems; digitalization strategy in collaborative enterprises' networks; pathways and tools for DIHs; socio-technical perspectives on smart product-service systems; knowledge transfer and accelerated innovation in FoF; interoperability of IoT and CPS for industrial CNs; sentient immersive response network; digital tools and applications for collaborative healthcare; collaborative networks and open innovation in education 4.0; collaborative learning networks with industry and academia; and industrial workshop.
Implement successful and cost-effective enterprise architecture projects. This book provides a new approach to developing enterprise architecture based on the idea of emergent behaviors-where instead of micromanaging system implementation, the enterprise architecture effort establishes clear goals and leaves the details to the implementation teams. System development efforts are measured based on their contribution to achieving business goals instead of implementing specific (possibly outdated) requirements. Most enterprise architecture initiatives employ one of the existing system architecture frameworks such as Zachman or The Open Group Architecture Framework, but these are not well-suited for enterprise architecture in a modern, agile organization. The new approach presented in this book is based on the author's experience with large enterprise architecture efforts. The approach leverages research into complex adaptive systems and emergent behaviors, where a few simple rules result in complex and efficient enterprise behaviors. Simplifying the task of establishing and maintaining the enterprise architecture cuts the costs of building and maintaining the architecture and frees up those resources for more productive pursuits. System implementers are given the freedom to rapidly adapt to changing user needs without the blessing of the enterprise modeling priesthood, and the architecture is transformed from a static pile of obscure models and documents into an operational framework that can be actively used to manage an enterprise's resources to better achieve business goals. The enterprise architect is free to stop focusing on building and maintaining models and start focusing on achieving business goals. What You'll Learn Refocus enterprise architecture on business needs by eliminating most of the enterprise-level models Delegate tasks to the development teams who do system implementation Document business goals, establish strategies for achieving those goals, and measure progress toward those goals Measure the results and gauge whether the enterprise architecture is achieving its goals Utilize appropriate modeling techniques that can be effectively used in an enterprise architecture Who This Book Is For Architecture practitioners and architecture managers: Practitioners are experienced architects who have used existing frameworks such as Zachman, and have experience with formal architecture modeling and/or model-based system engineering; managers are responsible for managing an enterprise architecture project and either have experience with enterprise architecture projects that were ineffective or are looking for a different approach that will be more cost-effective and allow for more organizational agility. Government program managers looking for a different approach to make enterprise architecture more relevant and easier to implement will also find this book of value.
This book discusses the birth and background of the Industrial Internet, clarifying its definition and structure, and reviewing the related development trends in China and around the globe, mainly in terms of policies, networks, platforms, security, application and standards. Lastly, it provides insights into the integration of the Industrial Internet with a series of next-gen information technologies, such as time sensitive networking, 5G, edge computing, blockchain and artificial intelligence. Intended for researchers and industrial practitioners who have been following the evolution of and trends in the Industrial Internet, the book is also a valuable reference resource for practitioners, scholars, and technical and engineering managers at various levels and in various fields.
The interplay of electronic textiles and wearable technology, wearables for short, and fashion, design and science is a highly promising and topical subject. Offered here is a compact survey of the theory involved and an explanation of the role technology plays in a fabric or article of clothing. The practical application is explained in detail and numerous illustrations serve as clarification. Over 50 well-known designers, research institutes, companies and artists, among them Philips, Burton, MIT Media Lab, XS Labs, New York University, Hussein Chalayan, Cute Circuit or International Fashion Machines are introduced by means of their latest, often still unpublished, project, and a survey of their work to date. Given for the first time is a list of all the relevant information on research institutes, materials, publications etc. A must for all those wishing to know everything about fashionable technology. |
You may like...
Peering Carrier Ethernet Networks
Sachidananda Kangovi
Paperback
Digital Transformation of Collaboration…
Aleksandra Przegalinska, Francesca Grippa, …
Hardcover
R2,889
Discovery Miles 28 890
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, …
Paperback
Data Science - 7th International…
Jianchao Zeng, Pinle Qin, …
Paperback
R3,183
Discovery Miles 31 830
Connecting Networks v6 Course Booklet
Cisco Networking Academy
Paperback
|