|
Books > Computing & IT > Computer hardware & operating systems > Storage media & peripherals
Winner, Bronze Award, APEX 2018 and 2018 INDIES Book of the Year
Honorable Mention/Health This full-color introduction to the smart
home has been written from the ground up with one audience in mind:
seniors. No ordinary "beginner's book," My Smart Home for Seniors
approaches every topic from a 50+ person's point of view, using
meaningful, realistic examples. Full-color, step-by-step tasks-in
legible print-walk you through making your home safer and easier to
live in using smart technology. Learn how to: * Control your home's
lighting with smart bulbs and switches * Make your home more secure
with smart doorbells, door locks, and security cameras *
Automatically control your home's temperature with a smart
thermostat * Make cooking and cleaning easier with smart appliances
* Use voice commands or your smart phone to control your smart
devices * Use If This Then That (IFTTT) to make your smart devices
interact with each other automatically * Get smart about the
security and privacy concerns of smart devices * Set up your smart
devices and get them to work with one another * Compare and select
the best smart hub for your smart home needs * Learn to use Amazon
Alexa (TM), Google Home (TM) and other voice-activated devices, as
well as Apple's HomeKit (TM) on the iPhone, to make your smart
devices work together
Storage Area Networks (SANs) and Network Attached Storage (NAS) allow organizations to manage and back up huge file systems quickly. W. Curtis Preston's insightful book takes you through the ins and outs of building and managing large data centers using SANs and NAS. Whether you're a seasoned storage administrator or a network administrator charged with taking on this role, you'll find all the information you need to make informed architecture and data management decisions.
In 1942, Lt. Herman H. Goldstine, a former mathematics
professor, was stationed at the Moore School of Electrical
Engineering at the University of Pennsylvania. It was there that he
assisted in the creation of the ENIAC, the first electronic digital
computer. The ENIAC was operational in 1945, but plans for a new
computer were already underway. The principal source of ideas for
the new computer was John von Neumann, who became Goldstine's chief
collaborator. Together they developed EDVAC, successor to ENIAC.
After World War II, at the Institute for Advanced Study, they built
what was to become the prototype of the present-day computer.
Herman Goldstine writes as both historian and scientist in this
first examination of the development of computing machinery, from
the seventeenth century through the early 1950s. His personal
involvement lends a special authenticity to his narrative, as he
sprinkles anecdotes and stories liberally through his text.
Understand .NET memory management internal workings, pitfalls, and
techniques in order to effectively avoid a wide range of
performance and scalability problems in your software. Despite
automatic memory management in .NET, there are many advantages to
be found in understanding how .NET memory works and how you can
best write software that interacts with it efficiently and
effectively. Pro .NET Memory Management is your comprehensive guide
to writing better software by understanding and working with memory
management in .NET. Thoroughly vetted by the .NET Team at
Microsoft, this book contains 25 valuable troubleshooting scenarios
designed to help diagnose challenging memory problems. Readers will
also benefit from a multitude of .NET memory management "rules" to
live by that introduce methods for writing memory-aware code and
the means for avoiding common, destructive pitfalls. What You'll
Learn Understand the theoretical underpinnings of automatic memory
management Take a deep dive into every aspect of .NET memory
management, including detailed coverage of garbage collection (GC)
implementation, that would otherwise take years of experience to
acquire Get practical advice on how this knowledge can be applied
in real-world software development Use practical knowledge of tools
related to .NET memory management to diagnose various
memory-related issues Explore various aspects of advanced memory
management, including use of Span and Memory types Who This Book Is
For .NET developers, solution architects, and performance engineers
Semiconductor Memories provides in-depth coverage in the areas of
design for testing, fault tolerance, failure modes and mechanisms,
and screening and qualification methods including.
* Memory cell structures and fabrication technologies.
* Application-specific memories and architectures.
* Memory design, fault modeling and test algorithms, limitations,
and trade-offs.
* Space environment, radiation hardening process and design
techniques, and radiation testing.
* Memory stacks and multichip modules for gigabyte storage.
Written for scientists, researchers, and engineers, Non-volatile
Memories describes the recent research and implementations in
relation to the design of a new generation of non-volatile
electronic memories. The objective is to replace existing memories
(DRAM, SRAM, EEPROM, Flash, etc.) with a universal memory model
likely to reach better performances than the current types of
memory: extremely high commutation speeds, high implantation
densities and retention time of information of about ten years.
This book introduces readers to the latest advances in sensing
technology for a broad range of non-volatile memories (NVMs).
Challenges across the memory technologies are highlighted and their
solutions in mature technology are discussed, enabling innovation
of sensing technologies for future NVMs. Coverage includes sensing
techniques ranging from well-established NVMs such as hard disk,
flash, Magnetic RAM (MRAM) to emerging NVMs such as ReRAM, STTRAM,
FeRAM and Domain Wall Memory will be covered.
This book presents the state-of-the-art work in terms of searchable
storage in cloud computing. It introduces and presents new schemes
for exploring and exploiting the searchable storage via
cost-efficient semantic hashing computation. Specifically, the
contents in this book include basic hashing structures (Bloom
filters, locality sensitive hashing, cuckoo hashing), semantic
storage systems, and searchable namespace, which support multiple
applications, such as cloud backups, exact and approximate queries
and image analytics. Readers would be interested in the searchable
techniques due to the ease of use and simplicity. More importantly,
all these mentioned structures and techniques have been really
implemented to support real-world applications, some of which offer
open-source codes for public use. Readers will obtain solid
backgrounds, new insights and implementation experiences with basic
knowledge in data structure and computer systems.
Hinrich Schroeder und Arno Muller stellen einen Ansatz vor, mit
dessen Hilfe die Aufgaben in der Unternehmens-IT analysiert und den
Aufgabentragern zugeordnet werden koennen. Moegliche Szenarien der
sich so ergebenden IT-Organisation werden daraus abgeleitet und
situativ beurteilt. Getrieben durch die fortschreitende
Digitalisierung ergeben sich voellig neue Anforderungen an die
Organisationseinheiten im Unternehmen, die fur die Bereitstellung
von IT-Services verantwortlich sind. Die zunehmende Komplexitat der
Aufgabenstellungen erfordert eine veranderte Aufgabenverteilung
zwischen der IT-Abteilung, den Fachabteilungen sowie externen
Partnern und fuhrt somit zu tiefgreifenden Veranderungen der
IT-Organisation.
This book introduces readers to the latest advances in sensing
technology for a broad range of non-volatile memories (NVMs).
Challenges across the memory technologies are highlighted and their
solutions in mature technology are discussed, enabling innovation
of sensing technologies for future NVMs. Coverage includes sensing
techniques ranging from well-established NVMs such as hard disk,
flash, Magnetic RAM (MRAM) to emerging NVMs such as ReRAM, STTRAM,
FeRAM and Domain Wall Memory will be covered.
Dieses Kryptographiebuch ist geschrieben fur Studierende der
Mathematik, Informatik, Physik, Elektrotechnik oder andere Leser
mit mathematischer Grundbildung und wurde in vielen Vorlesungen
erfolgreich eingesetzt. Es behandelt die aktuellen Techniken der
modernen Kryptographie, zum Beispiel Verschlusselung und digitale
Signaturen. Das Buch vermittelt auf elementare Weise alle
mathematischen Grundlagen, die zu einem prazisen Verstandnis der
Kryptographie noetig sind, mit vielen Beispielen und UEbungen. Die
Leserinnen und Leser erhalten ein fundiertes Verstandnis der
modernen Kryptographie und werden in die Lage versetzt
Forschungsliteratur zur Kryptographie zu verstehen.
This book constitutes the refereed proceedings of the 9th
International Conference on Reversible Computation, RC 2017, held
in Kolkata, India, in July 2017. The 13 full and 5 short papers
included in this volume together with one invited paper were
carefully reviewed and selected from 47 submissions. The papers are
organized in the following topical sections: foundations;
reversible circuit synthesis; reversible circuit optimization;
testing and fault tolerance; and quantum circuits.
|
|