Browse Results

Showing 19,701 through 19,725 of 53,910 results

Creative Provocations: Speculations on the Future of Creativity, Technology & Learning (Creativity Theory and Action in Education #7)

by Danah Henriksen Punya Mishra

This book explores the complex, yet critical, relationship between technology and creativity, specifically in educational contexts. Creativity is important for success in today’s rapidly changing, radically contingent and hyperconnected world. This is even more relevant in the context of teaching and learning—where the psychological, sociological and cultural aspects of human learning confront the challenges of a rapidly changing, technologically saturated world. Written by some of the foremost thinkers and researchers in the area of creativity and/or technology, the chapters in this volume examine the impact of recent and future technologies on creativity, teaching and learning. Individually and collectively, they help us develop an understanding of this nexus of creativity and technology for education. They offer new perspectives on this rapidly evolving future—exploring issues, paradoxes, tensions, and points of interest for creativity and technology. They position these issues in ways that consider implications for thinking, learning, teaching, and education in general.

Creativity, Technology & Education: Exploring their Convergence (SpringerBriefs in Educational Communications and Technology)

by Danah Henriksen Punya Mishra

In this collection of beautifully written essays, Mishra, Henriksen, and the Deep-play Research Group challenge myths about technology and creativity, debate time-honored instructional practices, and play with new ideas for schools to care for and nurture, rather than constrain, creativity. These essays are provocative . . . refreshing, [and] insightful --Dr. Yong Zhao, Foundation Distinguished Professor, University of Kansas and Fellow, Mitchell Institute for Health and Education Policy, Victoria University, Australia. What is creativity? Why is it important? What does it look like across different disciplines and contexts? What role does technology play, if any, in the creative process? And finally, what do creativity and technology have to do with education? These are the questions that underlie the collection of articles in this book. These essays provide a broad analytic frame for thinking about creativity, technology and education and describe classroom examples as well as strategies for evaluating creative artifacts and creative environments. All of these are grounded in specific examples from across a wide range of disciplines and contexts--art, mathematics, engineering, computer science, graphic design, architecture, science to name just a few. The final essays take a broader perspective on creativity and technology focusing both on our highly inter-connected YouTube world but also possibilities for the future. Creativity, Technology & Education: Exploring their Convergence is a vital resource for educators and practitioners as they seek to incorporate creative work and thoughtful pedagogy in their personal and professional lives.

Microsoft System Center Endpoint Protection Cookbook - Second Edition

by Nicolai Henriksen

Over 31 simple yet incredibly effective recipes for installing and managing System Center 2016 Endpoint Protection About This Book • This is the most practical and up-to-date book covering important new features of System Center 2016 Endpoint protection • Gain confidence in managing IT and protecting your server against malware and other threats • Configure and automate reporting features and also prepare yourself for a simple and pain-free migration process Who This Book Is For If you are a System Administrator or Engineer using System Center 2016 Endpoint Protection, then this book is for you. You should have a good background with Microsoft products in general, although no knowledge of Endpoint Protection is required. What You Will Learn • Explore the best practices for Endpoint Protection in System Center Configuration Manager • Provision the Endpoint Protection Client in a Disk Image in Configuration Manager • Get to know more about the Security Center • Configure definition and engine client updates to be optimum for your bandwidth • Make your application or server work with Endpoint Protection enabled • Find out how to deal with typical issues that may occur with Endpoint Protection • Know how to respond to infections that often occur In Detail System Center Configuration Manager is now used by over 70% of all the business in the world today and many have taken advantage engaging the System Center Endpoint Protection within that great product. Through this book, you will gain knowledge about System Center Endpoint Protection, and see how to work with it from System Center Configuration Manager from an objective perspective. We'll show you several tips, tricks, and recipes to not only help you understand and resolve your daily challenges, but hopefully enhance the security level of your business. Different scenarios will be covered, such as planning and setting up Endpoint Protection, daily operations and maintenance tips, configuring Endpoint Protection for different servers and applications, as well as workstation computers. You'll also see how to deal with malware and infected systems that are discovered. You'll find out how perform OS deployment, Bitlocker, and Applocker, and discover what to do if there is an attack or outbreak. You'll find out how to ensure good control and reporting, and great defense against threats and malware software. You'll see the huge benefits when dealing with application deployments, and get to grips with OS deployments, software updates, and disk encryption such as Bitlocker. By the end, you will be fully aware of the benefits of the System Center 2016 Endpoint Protection anti-malware product, ready to ensure your business is watertight against any threat you could face. Style and approach Build robust SCEP and AV policies and discover the new potential of exciting new features of SCEP 2016.

XV Mediterranean Conference on Medical and Biological Engineering and Computing – MEDICON 2019: Proceedings of MEDICON 2019, September 26-28, 2019, Coimbra, Portugal (IFMBE Proceedings #76)

by Jorge Henriques Nuno Neves Paulo De Carvalho

This book gathers the proceedings of MEDICON 2019 – the XV Mediterranean Conference on Medical and Biological Engineering and Computing – which was held in September 26-28, 2019, in Coimbra, Portugal. A special emphasis has been given to practical findings, techniques and methods, aimed at fostering an effective patient empowerment, i.e. to position the patient at the heart of the health system and encourages them to be actively involved in managing their own healthcare needs. The book reports on research and development in electrical engineering, computing, data science and instrumentation, and on many topics at the interface between those disciplines. It provides academics and professionals with extensive knowledge on cutting-edge techniques and tools for detection, prevention, treatment and management of diseases. A special emphasis is given to effective advances, as well as new directions and challenges towards improving healthcare through holistic patient empowerment.

The Art of War in the Network Age: Back to the Future

by Joseph Henrotin

Examining the influence of information technology on the art of war theoretical structure and, beyond, the concrete effects of those technologies on the conduct of war (thus, not warfare) itself. What could be the influence of information technology on the art of war theoretical structure and, beyond, what are the concrete effects of those technologies on the conduct of war itself? "Art build upon a science", strategy is often forgotten by publications dealing with the impacts of technology on warfare, but are network-centric warfare and all those technological artefacts really a revolution for war? The interaction of theoretical strategy and information networks has not really been systematically treated before this book.

Platform and Collective Intelligence: Digital Ecosystem of Organizations

by Antoine Henry

Organizations, both private and public, are now evolving in a globalized "information society" that has been accelerated by digitization. They find themselves drawn into a spiral of transformations fueled by the incessant reinvention of information and communication technologies (ICT) that are changing digital uses and practices. They transform through the mediating action of ICTs, work activities and associated action situations. Platform and Collective Intelligence analyzes a specific declination of an organization that has become irreversibly reticular: the "platform organization". The network, at the heart of this new conception, proposes a model combining cybernetics and computing. The organization can thus be seen as an interface for contact, via its information systems, for employees or citizens, whatever their geographical location. With a view going beyond technocentrism and technological determinism, this book combines collective intelligence and sociotechnics with the platform to arrive at the notion of "organizational experience".

Girl Forgotten

by April Henry

Piper Gray starts a true-crime podcast investigating a seventeen-year-old cold case in this thrilling YA murder mystery by New York Times bestselling author April Henry. Seventeen years ago, Layla Trello was murdered and her killer was never found. Enter true-crime fan Piper Gray who is determined to reopen Layla&’s case and get some answers. With the help of Jonas—who has a secret of his own—Piper starts a podcast investigating Layla&’s murder. But as she digs deeper into the mysteries of the past, Piper begins receiving anonymous threats telling her to back off the investigation, or else. The killer is still out there, and Piper must uncover their identity before they silence her forever.

Virtual Natives: How a New Generation is Revolutionizing the Future of Work, Play, and Culture

by Catherine D. Henry Leslie Shannon

The eclipse of Digital Natives and the dawn of virtual culture—how Gen A, Z are radically redefining the future of work, play, economics, and social life. We’re living through what is arguably one of the most exciting, confusing, and powerful social moments in the history of humanity, the shift from the Digital Age to the Virtual Age. This shift is being driven by technology, and the people who are leading it are the ones who know it best: the Virtual Natives. This book will introduce you to the Virtual Native cohort and mindset, decipher their socio-cultural and economic experiences, and unpack their expectations of companies looking to engage, market, or employ them. In this book, we explore: How Virtual Natives are deploying the new technologies driving the virtualized world How relationships and work habits are being virtualized Identify ten main Virtual Native-led behaviors that are upending work and culture How Virtual Natives are evolving their expertise into a full-blown economy This is nothing short of a cultural revolution. Virtual Natives are the driving force behind a seismic change that is redefining the world through technology and virtual worlds: this book tells you how they are navigating everything from AI to Augmented and virtual reality, gaming, blockchain and Web3 in easy, accessible language. To understand the future, read Virtual Natives.

Handbook of Statistical Bioinformatics (Springer Handbooks of Computational Statistics)

by Henry Horng-Shing Lu Bernhard Schölkopf Martin T. Wells Hongyu Zhao

Now in its second edition, this handbook collects authoritative contributions on modern methods and tools in statistical bioinformatics with a focus on the interface between computational statistics and cutting-edge developments in computational biology. The three parts of the book cover statistical methods for single-cell analysis, network analysis, and systems biology, with contributions by leading experts addressing key topics in probabilistic and statistical modeling and the analysis of massive data sets generated by modern biotechnology. This handbook will serve as a useful reference source for students, researchers and practitioners in statistics, computer science and biological and biomedical research, who are interested in the latest developments in computational statistics as applied to computational biology.

Penetration Testing

by Kevin M. Henry

Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system in the event of a real attack. The Certified Penetration Testing Engineer (CPTE) examination is a widely recognized certification for penetration testers. Penetration Testing: Protecting networks and systems is a preparation guide for the CPTE examination. It describes the range of techniques employed by professional pen testers, and also includes advice on the preparation and delivery of the test report. The author's in-the-field experiences, combined with other real-world examples, are used to illustrate common pitfalls that can be encountered during testing and reporting. Special attention is also paid to new technologies that improve business operations, but which can create new vulnerabilities, such as employee remote access, wireless communications and public-facing web applications. This book will give you a better understanding of how to conduct a penetration test, and also how to deliver a client-focused report that assesses the security of the system and whether the level of risk to the organization is within acceptable levels. Kevin Henry has 35 years' experience working on computer systems, initially as a computer operator, and then in various programmer and analyst roles, before moving into audit and security. Kevin currently provides security auditing, training and educational programs for major clients and governments around the world and is a frequent speaker on the security conference circuit. A business-aligned approach to penetration testing!

Web Accessibility: Web Standards and Regulatory Compliance

by Shawn Lawton Henry Andrew Kirkpatrick Patrick H. Lauke Bruce Lawson Bob Regan Richard Rutter Mark Urban Christian Heilmann Cynthia Waddell Jim Thatcher Michael R. Burks

The power of the Web lies in the fact that anyone and everyone can access it. However, this should also extend to users with disabilities--accessibility is about making websites accessible to those with aural, visual, or physical disabilities, or rather, constructing websites that don't exclude these people from accessing the content or services being provided. This isn't difficult to do, and doesn't require anything more than your normal toolset, be it HTML, CSS, JavaScript, Flash, or whatever else. All you need to do is use these tools in the right way, and bear in mind the guidelines that exist to help you keep your web sites accessible, and the laws that enforce web accessibility around the world. This book gives you all you need to know about web accessibility, whether you are a web designer or developer who wants their sites to be accessible, or a business manager who wants to learn what impact the web accessibility laws have on their businesses' web sites.

Catalog of the Heteroptera or True Bugs, of Canada and the Continental United States

by Thomas J. Henry

A primary aim of this catalog is to offer an accounting for each species as originally proposed and for the first usage only of all its name combinations (including valid names, synonymies, and misspellings) that have been published for our area. We follow the policy outlined by the 1985 Code of Zoological Nomenclature for nonmenclatorial proposes that a dissertation for an advanced educational degree is not published unless it satisfies the criteria present in Articles 8 and 9.

Practical LTE based security forces PMR networks

by Arnaud Henry-Labordère

Security forces PMR networks are moving from proprietary technologies for their Mission Critical Push-To-Talk basic service, and their data services which must provide large bandwidth real-time access, to the databases. LTE Based is adopted with backup access to public MNOs to complement their own radio coverage. Specific technologies such as multicasting of visio are required so the MCPTT works within a restricted bandwidth. The need to be able to change the main MNOs to provide resilient coverage requires specific choices of SIM cards, with OTAble security domains. Practical LTE Based Security Forces PMR Networks assumes that the reader has a basic knowledge of the 4G network architecture and services, and the book focusses on the specific features and choices required to fulfill the need of security forces PMR networks. These include tactical and centralized, including LTE based voice services VoLTE and IMS. It can be used as a reference or textbook, with many detailed call flows and traces being included. The author, who has also a long teaching career in Operations Research, provides mathematical models for the optimization of tactical network federations, multicast coverage and allocation of preemptive priorities to PMR group members. He is a pioneer in the area of Virtual Roaming, an application of graph theory and telecommunications to provide roaming without direct relations, having previously published books on SMS Hubs, SS7 Hubs, Diameter Hubs, GTP Hubs. The use of M2M (monitoring devices) for security forces with mobility is covered in detail in the book, including the new LoRa virtual roaming which goes beyond the scope of PMR.

The Amazon Incubator: Grow Your Business or Hatch a New One

by Lesley Hensell

The real story about how to be a successful seller on Amazon, from a leading consultant. Amazon is the most powerful business incubator in the history of the world. Unfortunately, where there is great opportunity, get-rich-quick schemes abound. Most available books about selling on Amazon peddle a dream that is unattainable for sellers. They promise riches at the cost of only five hours a week, or a long-term income for an initial investment of just $1,000.The Amazon Incubator is different. This book instead offers realistic, sustainable strategies for building a long-term, profitable business on Amazon. Whether sellers are burgeoning entrepreneurs or own the ecommerce channel at an established brand, they will benefit from the strategic thinking and in-depth Amazon know-how delivered in an easily digestible format. The reader will be guided through exercises to define their goals, determine their product set, and execute like a champ. The Amazon Incubator is written in short, easy-to-digest chapters that include case studies and real-world examples of Amazon seller success and failure. Readers will better identify with and understand the information when case studies are included. In addition, each chapter includes a brief summary at the end, as well as suggested action steps, so it can easily be used as a tool for the reader to share with teammates and business associates.

Constraint-based Local Search

by Pascal Van Hentenryck Laurent Michel

The ubiquity of combinatorial optimization problems in our society is illustrated by the novel application areas for optimization technology, which range from supply chain management to sports tournament scheduling. Over the last two decades, constraint programming has emerged as a fundamental methodology to solve a variety of combinatorial problems, and rich constraint programming languages have been developed for expressing and combining constraints and specifying search procedures at a high level of abstraction. Local search approaches to combinatorial optimization are able to isolate optimal or near-optimal solutions within reasonable time constraints.This book introduces a method for solving combinatorial optimization problems that combines constraint programming and local search, using constraints to describe and control local search, and a programming language, COMET, that supports both modeling and search abstractions in the spirit of constraint programming.After an overview of local search including neighborhoods, heuristics, and metaheuristics, the book presents the architecture and modeling and search components of constraint-based local search and describes how constraint-based local search is supported in COMET. The book describes a variety of applications, arranged by meta-heuristics. It presents scheduling applications, along with the background necessary to understand these challenging problems. The book also includes a number of satisfiability problems, illustrating the ability of constraint-based local search approaches to cope with both satisfiability and optimization problems in a uniform fashion.

Hybrid Optimization: The Ten Years of CPAIOR (Springer Optimization and Its Applications #45)

by Pascal Van Hentenryck Michela Milano

Hybrid Optimization focuses on the application of artificial intelligence and operations research techniques to constraint programming for solving combinatorial optimization problems. This book covers the most relevant topics investigated in the last ten years by leading experts in the field, and speculates about future directions for research. This book includes contributions by experts from different but related areas of research including constraint programming, decision theory, operations research, SAT, artificial intelligence, as well as others. These diverse perspectives are actively combined and contrasted in order to evaluate their relative advantages. This volume presents techniques for hybrid modeling, integrated solving strategies including global constraints, decomposition techniques, use of relaxations, and search strategies including tree search local search and metaheuristics. Various applications of the techniques presented as well as supplementary computational tools are also discussed.

Process-Driven SOA: Patterns for Aligning Business and IT

by Carsten Hentrich Uwe Zdun

Process-Driven SOA: Patterns for Aligning Business and IT supplies detailed guidance on how to design and build software architectures that follow the principles of business-IT alignment. It illustrates the design process using proven patterns that address complex business/technical scenarios, where integrated concepts of service-oriented architecture (SOA), Business Process Management (BPM), and Event-Driven Architecture (EDA) are required. The book demonstrates that SOA is not limited to technical issues but instead, is a holistic challenge where aspects of SOA, EDA, and BPM must be addressed together. An ideal guide for SOA solution architects, designers, developers, managers, and students about to enter the field, the book: Provides an accessible introduction to basic and more advanced concepts in process-driven SOA Illustrates how to manage the complexities of business aligned IT architectures with detailed examples and industry cases Outlines a step-by-step design process using proven patterns to address complex business/ technical scenarios Integrates SOA, BPM, and EDA into practical patterns promoting SOA 2.0 Describing how to synchronize parallel enterprise processes, the authors explain how to cope with the architectural and design decisions you are likely to encounter when designing and implementing process-driven SOA systems. The decisions are described in the form of software patterns to provide you with a practical guideline for addressing key problems using time-tested solutions.

DevOps with OpenShift: Cloud Deployments Made Easy

by Mike Hepburn Noel O'Connor Stefano Picozzi

For many organizations, a big part of DevOps’ appeal is software automation using infrastructure-as-code techniques. This book presents developers, architects, and infra-ops engineers with a more practical option. You’ll learn how a container-centric approach from OpenShift, Red Hat’s cloud-based PaaS, can help your team deliver quality software through a self-service view of IT infrastructure.Three OpenShift experts at Red Hat explain how to configure Docker application containers and the Kubernetes cluster manager with OpenShift’s developer- and operational-centric tools. Discover how this infrastructure-agnostic container management platform can help companies navigate the murky area where infrastructure-as-code ends and application automation begins.Get an application-centric view of automation—and understand why it’s importantLearn patterns and practical examples for managing continuous deployments such as rolling, A/B, blue-green, and canaryImplement continuous integration pipelines with OpenShift’s Jenkins capabilityExplore mechanisms for separating and managing configuration from static runtime softwareLearn how to use and customize OpenShift’s source-to-image capabilityDelve into management and operational considerations when working with OpenShift-based application workloadsInstall a self-contained local version of the OpenShift environment on your computer

Women in Game Development: Breaking the Glass Level-Cap

by Jennifer Brandes Hepler

Videogame development is usually seen as a male dominated field; even playing videogames is often wrongly viewed as a pastime for men only. But behind the curtain, women have always played myriad important roles in gaming. From programmers to artists, designers to producers, female videogame developers endure not only the pressures of their jobs but also epic levels of harassment and hostility. Jennifer Brandes Hepler’s Women in Game Development: Breaking the Glass Level-Cap gives voice to talented and experienced female game developers from a variety of backgrounds, letting them share the passion that drives them to keep making games. Key Features Experience the unique stories of nearly two dozen female game developers, from old-school veterans to rising stars. Understand the role of women in videogames, from the earliest days of development to the present day. Hear first-hand perspectives from working professionals in fields including coding, design, art, writing, community management, production and journalism. Get tips for how to be a better ally and make your company and teams more inclusive. Learn about the obstacles you face if you’re an aspiring female developer, and how to overcome them. Meet the human face of some of the women who have endured the industry’s worst harassment… and kept on going.

Euro-Par 2017: Euro-par 2017 International Workshops, Santiago De Compostela, Spain, August 28-29, 2017, Revised Selected Papers (Lecture Notes in Computer Science #10659)

by Dora B. Heras Luc Bougé

This book constitutes the proceedings of the workshops of the 23rd International Conference on Parallel and Distributed Computing, Euro-Par 2017, held in Santiago de Compostela. Spain in August 2017. The 59 full papers presented were carefully reviewed and selected from 119 submissions.Euro-Par is an annual, international conference in Europe, covering all aspects of parallel and distributed processing. These range from theory to practice, from small to the largest parallel and distributed systems and infrastructures, from fundamental computational problems to full-edged applications, from architecture, compiler, language and interface design and implementation to tools, support infrastructures, and application performance aspects.

Asia Pacific Advanced Network: 56th International Conference, APANConf 2023, Colombo, Sri Lanka, August 24–25, 2023, Revised Selected Papers (Communications in Computer and Information Science #1995)

by Damayanthi Herath Susumu Date Upul Jayasinghe Vijaykrishnan Narayanan Roshan Ragel Jilong Wang

This book constitutes the refereed proceedings of the 56th International Conference onAsia Pacific Advanced Network, APANConf 2023, held in, Colombo, Sri Lanka,during August 24–25, 2023.The 10 full papers and 1 short papers included in this book were carefully reviewed andselected from 37 submissions. They are organized in topical sections as follows: artificial intelligence and machine learning, accelerated computing and distributed systems and communications and networking.

Robots and Art

by Damith Herath Christian Kroos Stelarc

The first compendium on robotic art of its kind, this book explores theintegration of robots into human society and our attitudes, fears and hopes ina world shared with autonomous machines. It raises questions about thebenefits, risks and ethics of the transformative changes to society that are the consequence of robotstaking on new roles alongside humans. It takes the reader on a journey into the world of the strange,the beautiful, the uncanny and the daring - and into the minds and works ofsome of the world's most prolific creators of robotic art. Offering anin-depth look at robotic art from the viewpoints of artists, engineers andscientists, it presentsoutstanding works of contemporary robotic art and brings together for the first time some of themost influential artists in this area in the last three decades. Starting froma historical review, this transdisciplinary work explores the nexus betweenrobotic research and the arts andexamines the diversityof robotic art, the encounter with robotic otherness, machine embodiment andhuman-robot interaction. Stories of difficulties, pitfalls and successes arerecalled, characterising the multifaceted collaborations across the diversedisciplines required to create robotic art. Although the book isprimarily targeted towards researchers, artists and students in robotics,computer science and the arts,its accessible style appeals to anyone intrigued by robots and the arts.

Foundations of Robotics: A Multidisciplinary Approach with Python and ROS

by Damith Herath David St-Onge

This open access book introduces key concepts in robotics in an easy to understand language using an engaging project-based approach. It covers contemporary topics in robotics, providing an accessible entry point to fundamentals in all the major domains. A section is dedicated to introducing programming concepts using Python, which has become a language of choice in robotics and AI. The book also introduces the reader to the Robot Operating System (ROS), the ubiquitous software and algorithmic framework used by researchers and the industry. The book provides an inspired, up-to-date and multidisciplinary introduction to robotics in its many forms, including emerging topics related to robotics on Machine Learning, ethics, Human-Robot Interaction, and Design Thinking. The book also includes interviews with industry experts, providing an additional layer of insight into the world of robotics. The book is made open access through the generous support from Kinova Robotics. The book is suitable as an undergraduate textbook in a relevant engineering course. It is also suitable for students in art and design, high school students, and self-learners who would like to explore foundational concepts in robotics. “This book provides the ‘foundation’ for understanding how robots work. It is the accessible introduction that artists and engineers have been waiting for.” - Ken Goldberg, William S. Floyd Jr. Distinguished Chair in Engineering, UC Berkeley.

Azure Cloud Security for Absolute Beginners: Enabling Cloud Infrastructure Security with Multi-Level Security Options

by Pushpa Herath

Implement cloud security with Azure security tools, configurations and policies that address the needs of businesses and governments alike. This book introduces you to the most important security solutions available in Azure and provides you with step-by-step guidance to effectively set up security and deploy an application on top of Azure platform services, as well as on top of Azure infrastructure. Author Pushpa Herath begins by teaching you the fundamentals of Azure security. An easy to follow exploration of management groups, subscriptions, management locks and Azure policies further elaborate the concepts underlying Azure cloud security. Next, you will learn about Azure Active Directory (AAD) and the utilization of AAD in application and infrastructure security. Essential aspects of maintaining secure application keys and certificates are further explained in the context of Azure Key Vault. New application security implementations such as Azure configurations and Azure Defender for Azure storage are discussed, as are key platform security factors. Network security groups, gateways, load balancers, virtual networks and firewall configurations are all demonstrated in detail. Finally, you’ll learn how to create a much more secure environment through Azure App Service Environment in the context of securing infrastructure. If you want to learn the basics of securing Azure, Azure Cloud Security for Absolute Beginners is for you. After reading the book, you will be able to begin implementing secure cloud solutions with Microsoft Azure. What Will You Learn Get up and running quickly securing AzureMaster the basic language of Azure securityUnderstand the security features available in Azure cloudConfigure and maintain Azure cloud security featuresSecure Azure PaaS ServicesLearn identity and access management options in Azure Cloud Who Is This Book For Cloud engineers, DevOps engineers, software developers and architects who are asked to manage or are involved in the Azure infrastructure management but have not had all that much experience with security.

Fault-Tolerance Techniques for High-Performance Computing

by Thomas Herault Yves Robert

This timely text presents a comprehensive overview of fault tolerance techniques for high-performance computing (HPC). The text opens with a detailed introduction to the concepts of checkpoint protocols and scheduling algorithms, prediction, replication, silent error detection and correction, together with some application-specific techniques such as ABFT. Emphasis is placed on analytical performance models. This is then followed by a review of general-purpose techniques, including several checkpoint and rollback recovery protocols. Relevant execution scenarios are also evaluated and compared through quantitative models. Features: provides a survey of resilience methods and performance models; examines the various sources for errors and faults in large-scale systems; reviews the spectrum of techniques that can be applied to design a fault-tolerant MPI; investigates different approaches to replication; discusses the challenge of energy consumption of fault-tolerance methods in extreme-scale systems.

Refine Search

Showing 19,701 through 19,725 of 53,910 results