![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
The object oriented paradigm has become one of the dominant forces in the computing world. According to a recent survey, by the year 2000, more than 80% of development organizations are expected to use object technology as the basis for their distributed development strategies.
Fast, Efficient and Predictable Memory Accesses presents techniques for designing fast, energy-efficient and timing predictable memory systems. By using a careful combination of compiler optimizations and architectural improvements, we can achieve more than what would be feasible at one of the levels in isolation. The described optimization algorithms achieve the goals of high performance and low energy consumption. In addition to these benefits, the use of scratchpad memories significantly improves the timing predictability of the entire system, leading to tighter worst case execution time bounds (WCET). The WCET is a relevant design parameter for all timing critical systems. In addition, the book covers algorithms to exploit the power down modes of main memories in SDRAM technology, as well as the execute-in-place feature of Flash memories. The final chapter considers the impact of the register file, which is also part of the memory hierarchy.
This book gathers the latest experience of experts, research teams and leading organizations involved in computer-aided design of user interfaces of interactive applications. This area investigates how it is desirable and possible to support, to facilitate and to speed up the development life cycle of any interactive system: requirements engineering, early-stage design, detailed design, development, deployment, evaluation and maintenance. In particular, it stresses how the design activity could be better understood for different types of advanced interactive systems such as context-aware systems, multimodal applications, multi-platform systems, pervasive computing, ubiquitous computing and multi-device environments.
"Programmers don't want to just read about the core concepts of operating systems. They want to learn how to apply the material by actually building applications. This new book motivates them by presenting numerous programming exercises at the code level. They are not only introduced to the OS concepts and abstractions, but also the implementation. Two design projects are integrated throughout the book that they'll be able to follow to get them into the code. Self-assessment and review material is presented at the end of each chapter to reinforce concepts. These features help to make this an excellent resource for programmers to gain invaluable experience."--
ITIL(R) 4 Direct, Plan and ImproveIf you've achieved your ITIL(R) 4 Foundation certificate, you're probably planning the next stage in your ITIL journey and which qualification to work towards. DPI provides essential knowledge and capabilities for service management professionals, supporting those involved in directing or planning based on strategy and continual improvement - a must-have skillset practitioners should seek beyond Foundation level. DPI is the only one of the ITIL 4 advanced level courses that leads to both Managing Professional (MP) and Strategic Leader (SL) status. The module is aimed at managers and aspiring managers at all levels, providing them with the practical skills needed to improve themselves and their organisation by way of effective strategic direction and delivering continual improvement. An excellent supplement to any training courseITIL(R) 4 Direct, Plan and Improve (DPI) - Your companion to the ITIL 4 Managing Professional and Strategic Leader DPI certification is a study guide designed to help students pass the ITIL(R) 4 Direct, Plan and Improve module. The majority of this book is based on the AXELOS ITIL(R) 4: Direct, Plan and Improve publication and the associated DPI Strategist syllabus. It provides students with the information they need to pass the DPI exam, and help them become a successful practitioner. Suitable for existing ITIL v3 experts, ITIL 4 Managing Professional (MP) students, ITSM (IT service management) practitioners who are adopting ITIL 4, approved training organisations, IT service managers, IT managers and those in IT support roles, the book covers: Key concepts: Scope, key principles and methods; The role of governance, risk and compliance; Continual improvement; Organisational change management; Measurement and reporting; Value streams and practices; and Exam preparation. A useful tool throughout your careerIn addition to being an essential study aid, the author - a seasoned ITSM professional - also provides additional guidance throughout the book which you can lean on once your training and exam are over. The book includes her own practical experience from which she gives advice and points to think about along the way so that you can refer back to this book for years to come - long after you've passed your exam. The essential link between your ITIL qualification and the real world - buy this book today!ITIL(R) is a registered trade mark of AXELOS Limited. All rights reserved. This book is an official AXELOS licensed product.
Prepare for Microsoft Exam 70-697--and help demonstrate your real-world mastery of configuring Windows 10 devices in the enterprise. Designed for experienced IT pros ready to advance their status, this Exam Ref focuses on the critical-thinking and decision-making acumen needed for success as a Microsoft specialist. Focus on the expertise measured by these objectives: Manage identity Plan desktop and device deployment Plan and implement a Microsoft Intune device management solution Configure networking and storage Manage data access and protection Manage remote access Manage apps Manage updates and recovery This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you have experience with Windows desktop administration, maintenance, and troubleshooting; basic experience and understanding of Windows networking; and introductory-level knowledge of Active Directory and Microsoft Intune
Experience learning made easy--and quickly teach yourself the essentials of working with Windows 7. With STEP BY STEP, you set the pace--building and practicing the skills you need, just when you need them Learn to manage windows and folders, sort and filter files, create an efficient Windows working environment, and safely access the Internet. You'll learn how to install and manage software and hardware, create and manage homegroups, share content with other computers and computer users, and instantly locate content stored on your PC or network. You'll also learn how to fine-tune your PC's performance and resolve common problems. Plus, the supplied practice files give you a chance to hone your skills and put the book's lessons to work. For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.
Your "get-started" guide to the world of macOS Big Sur Wherever you like to Mac--at home in front of your trusty iMac or over a coffee with your portable MacBook Air--macOS provides you with the seamless, efficient, and reliable user experience that makes these devices so famously a pleasure to use. macOS Big Sur For Dummies is here to heighten the experience for new users and upgraders alike by providing the very latest on the ways macOS Big Sur can enhance how you work and play. Written in a no-jargon style by Bob LeVitus--the Houston Chronicle's much-loved "Dr. Mac" since 1996--this guide starts with the basics, like getting set up, and explains more advanced uses, like making music and movies, exploring the expanding universe of apps and giving tips on how to save time and enhance productivity along the way. With this book, you'll learn to Set up and connect your Mac Get friendly with Siri Enhance your world with apps Work better and faster Use the comprehensive capabilities of macOS Big Sur to do anything and everything you would like to do--and do it even better. For beginners and experts alike, macOS Big Sur For Dummies is the best way to step into the magical world of getting things done with Mac.
With this book, Christopher Kormanyos delivers a highly practical guide to programming real-time embedded microcontroller systems in C++. It is divided into three parts plus several appendices. Part I provides a foundation for real-time C++ by covering language technologies, including object-oriented methods, template programming and optimization. Next, part II presents detailed descriptions of a variety of C++ components that are widely used in microcontroller programming. It details some of C++'s most powerful language elements, such as class types, templates and the STL, to develop components for microcontroller register access, low-level drivers, custom memory management, embedded containers, multitasking, etc. Finally, part III describes mathematical methods and generic utilities that can be employed to solve recurring problems in real-time C++. The appendices include a brief C++ language tutorial, information on the real-time C++ development environment and instructions for building GNU GCC cross-compilers and a microcontroller circuit. For this fourth edition, the most recent specification of C++20 is used throughout the text. Several sections on new C++20 functionality have been added, and various others reworked to reflect changes in the standard. Also several new example projects ranging from introductory to advanced level are included and existing ones extended, and various reader suggestions have been incorporated. Efficiency is always in focus and numerous examples are backed up with runtime measurements and size analyses that quantify the true costs of the code down to the very last byte and microsecond. The target audience of this book mainly consists of students and professionals interested in real-time C++. Readers should be familiar with C or another programming language and will benefit most if they have had some previous experience with microcontroller electronics and the performance and size issues prevalent in embedded systems programming.
In Symbolic Analysis for Parallelizing Compilers the author presents an excellent demonstration of the effectiveness of symbolic analysis in tackling important optimization problems, some of which inhibit loop parallelization. The framework that Haghighat presents has proved extremely successful in induction and wraparound variable analysis, strength reduction, dead code elimination and symbolic constant propagation. The approach can be applied to any program transformation or optimization problem that uses properties and value ranges of program names. Symbolic analysis can be used on any transformational system or optimization problem that relies on compile-time information about program variables. This covers the majority of, if not all optimization and parallelization techniques. The book makes a compelling case for the potential of symbolic analysis, applying it for the first time - and with remarkable results - to a number of classical optimization problems: loop scheduling, static timing or size analysis, and dependence analysis. It demonstrates how symbolic analysis can solve these problems faster and more accurately than existing hybrid techniques.
Prepare for Microsoft Exam AZ-500: Demonstrate your real-world knowledge of Microsoft Azure security, including tools and techniques for protecting identity, access, platforms, data, and applications, and for effectively managing security operations. Designed for professionals with Azure security experience, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified: Azure Security Engineer Associate level. Focus on the expertise measured by these objectives: Manage identity and access Implement platform protection Manage security operations Secure data and applications This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you have expertise implementing security controls and threat protection, managing identity and access, and protecting assets in cloud and hybrid environments About the Exam Exam AZ-500 focuses on the knowledge needed to manage Azure Active Directory identities; configure secure access with Azure AD; manage application access and access control; implement advanced network security; configure advanced security for compute; monitor security with Azure Monitor, Azure Firewall manager, Azure Security Center, Azure Defender, and Azure Sentinel; configure security policies; configure security for storage and databases; and configure and manage Key Vault. About Microsoft Certification Passing this exam fulfills your requirements for the Microsoft Certified: Azure Security Engineer Associate credential, demonstrating your expertise as an Azure Security Engineer capable of maintaining security posture, identifying and remediating vulnerabilities, implementing threat protection, and responding to incident escalations as part of a cloud-based management and security team. See full details at: microsoft.com/learn
Peer-to-peer (P2P) technology, or peer computing, is a paradigm that is viewed as a potential technology for redesigning distributed architectures and, consequently, distributed processing. Yet the scale and dynamism that characterize P2P systems demand that we reexamine traditional distributed technologies. A paradigm shift that includes self-reorganization, adaptation and resilience is called for. On the other hand, the increased computational power of such networks opens up completely new applications, such as in digital content sharing, scientific computation, gaming, or collaborative work environments. In this book, Vu, Lupu and Ooi present the technical challenges offered by P2P systems, and the means that have been proposed to address them. They provide a thorough and comprehensive review of recent advances on routing and discovery methods; load balancing and replication techniques; security, accountability and anonymity, as well as trust and reputation schemes; programming models and P2P systems and projects. Besides surveying existing methods and systems, they also compare and evaluate some of the more promising schemes. The need for such a book is evident. It provides a single source for practitioners, researchers and students on the state of the art. For practitioners, this book explains best practice, guiding selection of appropriate techniques for each application. For researchers, this book provides a foundation for the development of new and more effective methods. For students, it is an overview of the wide range of advanced techniques for realizing effective P2P systems, and it can easily be used as a text for an advanced course on Peer-to-Peer Computing and Technologies, or as a companion text for courses on various subjects, such as distributed systems, and grid and cluster computing.
An introduction to operating systems, covering processes, states of processes, synchronization, programming methods of synchronization, main memory, secondary storage and file systems. Although the book is short, it covers all the essentials and opens up synchronization by introducing a metaphor: producer--consumer that other authors have employed. The difference is that the concept is presented without the programming normally involved with the concept. The thinking is that using a warehouse, the size of which is the shared variable in synchronization terms, without the programming will aid in understanding to this difficult concept. The book also covers main memory, secondary storage with file systems, and concludes with a brief discussion of the client-server paradigm and the way in which client-server impacts the design of the World-Wide Web.
Compiler technology is fundamental to computer science since it provides the means to implement many other tools. It is interesting that, in fact, many tools have a compiler framework - they accept input in a particular format, perform some processing and present output in another format. Such tools support the abstraction process and are crucial to productive systems development. The focus of Compiler Technology: Tools, Translators and Language Implementation is to enable quick development of analysis tools. Both lexical scanner and parser generator tools are provided as supplements to this book, since a hands-on approach to experimentation with a toy implementation aids in understanding abstract topics such as parse-trees and parse conflicts. Furthermore, it is through hands-on exercises that one discovers the particular intricacies of language implementation. Compiler Technology: Tools, Translators and Language Implementation is suitable as a textbook for an undergraduate or graduate level course on compiler technology, and as a reference for researchers and practitioners interested in compilers and language implementation.
This is the most popular and most complete desktop reference book on Mac OS X now covers Tiger! Apple's Mac OS X operating system continues to capture the attention of consumers and programmers alike with its ability to run older Mac programs, classic Unix applications, and innovative open source software. And the latest and greatest version, Mac OS X 10.4 - otherwise known as "Tiger" - is more powerful and versatile (not to mention easier to use, faster, and better looking) than ever before. With unparalleled, up-to-the-minute detail on Tiger, "Mac OS X Tiger in a Nutshell" is loaded with new and updated material on practically every page. Sure, "Mac OS X Tiger in a Nutshell" covers all the essentials and most-talked-about new features of Tiger, including big-ticket items such as Spotlight for effortless searching, iChat AV for video conferencing, and Dashboard for one-click access to a calculator, weather reports, stock prices, flight times, and more. But, this fully updated edition also covers the hundreds of nips and tucks Tiger made to its underlying technologies and existing applications, including improvements to graphics and the Unix-based core and an easy way to automate time-consuming, repetitive manual or batch tasks. "Mac OS X Tiger in a Nutshell" offers a wealth of detail about the new user-interface elements, system and network administration, and scripting and development. It covers enhancements to the Finder, Safari RSS, Mail 2, and System Preferences. This indispensable guide also includes the most complete Unix[registered] command reference found in print - each command and option has been painstakingly tested and checked against Tiger. Even the manpages that ship with the system can't compete in accuracy! For longtime Mac loyalists, as well as recent converts, for consumers, developers and programmers, this fully updated edition provides the perfect overview of Mac OS X and all the nitty-gritty hints and how-tos you need to make it your all-purpose, must-have Tiger guide.
This book constitutes the refereed proceedings of the IFIP Industry Oriented Conferences held at the 20th World Computer Congress in Milano, Italy on September 7-10, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
In Europe, standardization activities in healthcare informatics officially started in the 90s. The papers featured in this publication were presented at a conference which presented the current standing of important activities connected with healthcare informatics/telematics standards and to explore the ways of ensuring international coordination and cooperation worldwide. The publications shows interest from communities from Europe, United States, Australia and Japan. This guarantees the elaboration of high quality implementable healthcare informatics standards, which play an important role in the achievement of better healthcare to the benefit of the patient.
Your no-fluff, fast-paced guide to everything Windows 10 This handy, jargon-free guide is designed to help you quickly learn whatever you need to know about Windows 10. Perfect for novices and experienced users alike, you'll get tips, tricks, and savvy advice on how to install programs, set up user accounts, play music and other media files, download photos from your digital camera, go online, set up and secure an email account, and much, much more. Shows how to perform more than 150 Windows tasks, including working with files, digital images, and media; customizing Windows; optimizing performance; and sharing a computer with multiple users Covers installing and repairing applications, system maintenance, setting up password-protected accounts, downloading photos to your computer, and staying safe online With concise, easy-to-follow instructions, and its small, portable size, this is the ideal, on-the-go guide for Windows 10 users everywhere.
Automatic transformation of a sequential program into a parallel form is a subject that presents a great intellectual challenge and promises great practical rewards. There is a tremendous investment in existing sequential programs, and scientists and engineers continue to write their application programs in sequential languages (primarily in Fortran), but the demand for increasing speed is constant. The job of a restructuring compiler is to discover the dependence structure of a given program and transform the program in a way that is consistent with both that dependence structure and the characteristics of the given machine. Much attention in this field of research has been focused on the Fortran do loop. This is where one expects to find major chunks of computation that need to be performed repeatedly for different values of the index variable. Many loop transformations have been designed over the years, and several of them can be found in any parallelizing compiler currently in use in industry or at a university research facility. Loop Transformations for Restructuring Compilers: The Foundations provides a rigorous theory of loop transformations. The transformations are developed in a consistent mathematical framework using objects like directed graphs, matrices and linear equations. The algorithms that implement the transformations can then be precisely described in terms of certain abstract mathematical algorithms. The book provides the general mathematical background needed for loop transformations (including those basic mathematical algorithms), discusses data dependence, and introduces the major transformations. The next volume will build a detailed theory of looptransformations based on the material developed here. Loop Transformations for Restructuring Compilers: The Foundations presents a theory of loop transformations that is rigorous and yet reader-friendly.
"Not only for MacOS and Linux users, but also a great resource for Windows PS users." - Bruce Bergman Learn PowerShell in a Month of Lunches: Covers Windows, Linux, and macOS is a task-focused tutorial for administering Linux and macOS systems using Microsoft PowerShell. Adapted by PowerShell team members Travis Plunk and Tyler Leonhardt from the bestselling Learn Windows PowerShell in a Month of Lunches by community legends Don Jones and Jeffrey Hicks, it features Linux-based examples covering core language features and admin tasks. Designed for busy IT professionals, this innovative guide will take you from the basics to PowerShell proficiency through 25 tutorials you can do in your lunch break. about the technology The PowerShell scripting language and administrative shell was initially created for Windows, providing a high-quality command-line interface and awesome automation features. As part of Microsoft's ongoing strategy to support non-Windows platforms with its Azure cloud service and .NET Core framework, PowerShell now runs on Linux and macOS. Like Bash, PowerShell can execute and script nearly any aspect of Linux, so you can easily manage repetitive daily tasks, servers, Cloud resources, Continuous Integration pipelines, and more. Because PowerShell is a full-featured programming language, however, it provides capability well beyond traditional shell scripting languages, such as the ability to treat OS components as objects. about the book Learn PowerShell in a Month of Lunches: Covers Windows, Linux, and macOS is a user-friendly tutorial to managing Linux and macOS systems with PowerShell. It's based on the bestselling Learn Windows PowerShell in a Month of Lunches, which has introduced PowerShell to nearly 100,000 readers. You'll learn how PowerShell shapes up to Bash or Python scripting as you write and run simple scripts that automate boring daily tasks. As you progress through the book, you'll use PowerShell to write Continuous Integration Pipelines and manage cloud-based servers. Just set aside one hour a day for a month, and you'll be automating tasks faster than you ever thought possible! what's inside - Why you should use PowerShell on Linux and macOS - Background jobs and automation techniques - Simple scripting to automate repetitive daily tasks - Common syntax and commands cheat sheet - Each lesson takes you an hour or less about the reader For IT professionals comfortable administering Windows or Linux. No previous experience with PowerShell or Bash required. about the author Travis Plunk has been a Software Engineer on various PowerShell teams since 2013, and at Microsoft since 1999. He was involved in open sourcing PowerShell and has worked on the project full time since shortly after the project was announced. James Petty is a Microsoft MVP, and the CEO and Executive Director for the DevOps Collective and PowerShell.org. Tyler Leonhardt has been a Software Engineer on the PowerShell team since 2017, and at Microsoft since 2016. He is a core maintainer of the PowerShell extension for Visual Studio Code. Learn Windows PowerShell in a Month of Lunches was written by PowerShell community legends Don Jones and Jeffrey Hicks, who have years of experience as successful PowerShell trainers.
A fully updated version covering Windows 8, the latest release of the widely-used Microsoft Operating System. When you're working on your PC and come up against a problem that you are unsure how to solve or want to accomplish something in application that you aren't sure how to do, Brilliant Windows 8 gives you the answers. Brilliant Windows 8 allows you to find the information you need easily and without fuss. It guides you through all tasks and applications using a highly visual, step-by-step approach. It tells you exactly what you need to know, when you need to know it. Spend less time reading and more time doing with a simple step-by-step approach to beginner and intermediate level office tasks. Brilliant guides provide the quick, easy-to-access information that you need - Numbered steps guide you through each task or problem Numerous screenshots illustrate each step Cross reference boxes point you to related tasks and information in the book "Did you know ?..." sections alert you to relevant expert tips, tricks and advice |
![]() ![]() You may like...
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, …
Hardcover
R1,317
Discovery Miles 13 170
PowerShell, IT Pro Solutions…
William R. Stanek, William Stanek
Hardcover
R1,569
Discovery Miles 15 690
|