Browse Results

Showing 10,226 through 10,250 of 18,742 results

Netflixed

by Gina Keating

Netflix has come a long way since 1997, when two Silicon Valley entrepreneurs, Marc Ran­dolph and Reed Hastings, decided to start an online DVD store before most people owned a DVD player. They were surprised and elated when launch-day traffic in April 1998 crashed their server and resulted in 150 sales. Today, Netflix has more than 25 million subscribers and annual revenues above $3 billion. Yet long- term success-or even survival-is still far from guaranteed. Journalist Gina Keating recounts the absorbing, fast-paced drama of the company's turbulent rise to the top and its attempt to invent two new kinds of business. First it engaged in a grueling war against video-store behemoth Blockbuster, transforming movie rental forever. Then it jumped into an even bigger battle for online video streaming against Google, Hulu, Amazon, and the big cable companies. Netflix ushered in such innovations as DVD rental by mail, a patented online queue of upcom­ing rentals, and a recommendation algorithm called Cinematch that proved crucial in its struggle against bigger rivals. Yet for all its success, Netflix is still a polariz­ing company. Hastings is often heralded as a visionary-he was named Business Person of the Year in 2010 by Fortune-even as he has been called the nation's worst CEO. Netflix also faces disgruntled customers after price increases and other stumbles that could tarnish the brand forever. The quest to become the world's portal for pre­mium video on demand will determine nothing less than the future of entertainment and the Internet. Drawing on extensive new interviews and her years covering Netflix as a financial and entertainment reporter, Keating makes this tale as absorbing as it is important.

Netflixed: The Epic Battle for America's Eyeballs

by Gina Keating

Netflix has come a long way since 1997, when two Silicon Valley entrepreneurs, Marc Ran­dolph and Reed Hastings, decided to start an online DVD store before most people owned a DVD player. They were surprised and elated when launch-day traffic in April 1998 crashed their server and resulted in 150 sales. Today, Netflix has more than 25 million subscribers and annual revenues above $3 billion. Yet long- term success-or even survival-is still far from guaranteed. Journalist Gina Keating recounts the absorbing, fast-paced drama of the company's turbulent rise to the top and its attempt to invent two new kinds of business. First it engaged in a grueling war against video-store behemoth Blockbuster, transforming movie rental forever. Then it jumped into an even bigger battle for online video streaming against Google, Hulu, Amazon, and the big cable companies. Netflix ushered in such innovations as DVD rental by mail, a patented online queue of upcom­ing rentals, and a recommendation algorithm called Cinematch that proved crucial in its struggle against bigger rivals. Yet for all its success, Netflix is still a polariz­ing company. Hastings is often heralded as a visionary-he was named Business Person of the Year in 2010 by Fortune-even as he has been called the nation's worst CEO. Netflix also faces disgruntled customers after price increases and other stumbles that could tarnish the brand forever. The quest to become the world's portal for pre­mium video on demand will determine nothing less than the future of entertainment and the Internet. Drawing on extensive new interviews and her years covering Netflix as a financial and entertainment reporter, Keating makes this tale as absorbing as it is important.

Network Analysis and Architecture (Signals and Communication Technology)

by Jing Gao Yu-Chu Tian

This book covers network analysis and architecture for large-scale computer network planning. Networks and the Internet are essential for modern industries and societies. Building a new network, upgrading an existing network, or planning to use a public network requires integrating various network mechanisms and technologies in a cohesive fashion. This demands a deep understanding of the concepts, principles, processes, approaches, and good practices of advanced network planning. More specifically, emphasizing service-based networking, the book introduces structured processes for network planning, provides systematic approaches for network analysis and architecture, develops network planning specifications, and discusses high-level network architectural models from various perspectives. It also offers detailed discussions on component-based architecture about addressing, routing, performance, management, and security and privacy. Recent developments in data centers, virtualization, and cloud are also embedded into the network architecture. Moreover, the book includes a comprehensive introduction to building practical TCP/IP network communications via sockets with practical examples. The book is suitable for use as a textbook for senior undergraduate and postgraduate students or as a reference book for network practitioners looking to develop or enhance their skills in network planning.

Network Coding

by Khaldoun Al Agha

Network coding, a relatively new area of research, has evolved from the theoretical level to become a tool used to optimize the performance of communication networks – wired, cellular, ad hoc, etc. The idea consists of mixing “packets” of data together when routing them from source to destination. Since network coding increases the network performance, it becomes a tool to enhance the existing protocols and algorithms in a network or for applications such as peer-to-peer and TCP. This book delivers an understanding of network coding and provides a set of studies showing the improvements in security, capacity and performance of fixed and mobile networks. This is increasingly topical as industry is increasingly becoming more reliant upon and applying network coding in multiple applications. Many cases where network coding is used in routing, physical layer, security, flooding, error correction, optimization and relaying are given – all of which are key areas of interest. Network Coding is the ideal resource for university students studying coding, and researchers and practitioners in sectors of all industries where digital communication and its application needs to be correctly understood and implemented. Contents 1. Network Coding: From Theory to Practice, Youghourta Benfattoum, Steven Martin and Khaldoun Al Agha. 2. Fountain Codes and Network Coding for WSNs, Anya Apavatjrut, Claire Goursaud, Katia Jaffrès-Runser and Jean-Marie Gorce. 3. Switched Code for Ad Hoc Networks: Optimizing the Diffusion by Using Network Coding, Nour Kadi and Khaldoun Al Agha. 4. Security by Network Coding, Katia Jaffrès-Runser and Cédric Lauradoux. 5. Security for Network Coding, Marine Minier, Yuanyuan Zhang and Wassim Znaïdi. 6. Random Network Coding and Matroids, Maximilien Gadouleau. 7. Joint Network-Channel Coding for the Semi-Orthogonal MARC: Theoretical Bounds and Practical Design, Atoosa Hatefi, Antoine O. Berthet and Raphael Visoz. 8. Robust Network Coding, Lana Iwaza, Marco Di Renzo and Michel Kieffer. 9. Flow Models and Optimization for Network Coding, Eric Gourdin and Jeremiah Edwards.

Network Design: Management and Technical Perspectives

by Teresa C. Piliouras

There are hundreds of technologies and protocols used in telecommunications. They run the full gamut from application level to physical level. It is overwhelming to try to keep track of them. Network Design, Second Edition: Management and Technical Perspectives is a broad survey of the major technologies and networking protocols and how they interr

Network Embeddedness

by Milena Ratajczak-Mrozek

This book systematizes the concepts of business relationships and network embeddedness, taking a new approach to internationalization, relevant for the global economy. It reflects the growing importance of network internationalization theory and explores the impact of embeddedness in domestic and foreign relationships on a company's performance. The author questions the validity of the distinction between domestic and foreign activity of companies and demonstrates that in the B2B market, there are actually no exclusively domestic companies which are not directly or indirectly connected with foreign entities. Chapters cover both small to medium sized enterprises and large multinational corporations, presenting a qualitative analysis of over 400 companies including case studies from the IT and furniture industries. This informative study will provide useful insight for academics and students of business and management, international business and organization studies.

Network Function Virtualization: Concepts And Applicability In 5g Networks (Wiley - Ieee Ser.)

by Ying Zhang

A horizontal view of newly emerged technologies in the field of network function virtualization (NFV), introducing the open source implementation efforts that bring NFV from design to reality This book explores the newly emerged technique of network function virtualization (NFV) through use cases, architecture, and challenges, as well as standardization and open source implementations. It is the first systematic source of information about cloud technologies' usage in the cellular network, covering the interplay of different technologies, the discussion of different design choices, and its impact on our future cellular network. Network Function Virtualization: Concepts and Applicability in 5G Networks reviews new technologies that enable NFV, such as Software Defined Networks (SDN), network virtualization, and cloud computing. It also provides an in-depth investigation of the most advanced open source initiatives in this area, including OPNFV, Openstack, and Opendaylight. Finally, this book goes beyond literature review and industry survey by describing advanced research topics such as service chaining, VNF orchestrations, and network verification of NFV systems. In addition, this resource: Introduces network function virtualization (NFV) from both industrial and academic perspectives Describes NFV's usage in mobile core networks, which is the essence of 5G implementation Offers readers a deep dive on NFV's enabling techniques such as SDN, virtualization, and cloud computing Network Function Virtualization: Concepts and Applicability in 5G Networks is an ideal book for researchers and university students who want to keep up with the ever-changing world of network function virtualization.

Network Journalism: Journalistic Practice in Interactive Spheres (Routledge Research in Journalism)

by Ansgard Heinrich

Drawing on current theoretical debates in journalism studies, and grounded in empirical research, Heinrich here analyzes the interplay between journalistic practice and processes of globalization and digitalization. She argues that a new kind of journalism is emerging, characterized by an increasingly global flow of news as well as a growing number of news deliverers. Within this transformed news sphere the roles of journalistic outlets change. They become nodes, arranged in a dense net of information gatherers, producers, and disseminators. The interactive connections among these news providers constitute what Heinrich calls the sphere of "network journalism."

Network Mergers and Migrations

by Jan Ant?n Bernal van der Ven Gonzalo G?mez Herrero

This book provides you with guidelines to plan, design, roll out, and accomplish network migration activities with a variety of internetworking case studies. It considers both enterprise and service provider scenarios based on the expertise from Juniper Networks engineers. From Metro Ethernet migration approaches to comprehensive network protocol consolidation and integration, each case study covers JUNOS resources to ensure successful completion at each migration phase. In addition to an appendix of automation scripts and examples and guidelines for each step, the book also describes the modern challenges that evolve in IT networks.

Network Nations: A Transnational History of British and American Broadcasting

by Michele Hilmes

In Network Nations, Michele Hilmes reveals and re-conceptualizes the roots of media globalization through a historical look at the productive transnational cultural relationship between British and American broadcasting. Though frequently painted as opposites--the British public service tradition contrasting with the American commercial system--in fact they represent two sides of the same coin. Neither could have developed without the constant presence of the other, in terms not only of industry and policy but of aesthetics, culture, and creativity, despite a long history of oppositional rhetoric. Based on primary research in British and American archives, Network Nations argues for a new transnational approach to media history, looking across the traditional national boundaries within which media is studied to encourage an awareness that media globalization has a long and fruitful history. Placing media history in the framework of theories of nationalism and national identity, Hilmes examines critical episodes of transnational interaction between the US and Britain, from radio’s amateurs to the relationship between early network heads; from the development of radio features and drama to television spy shows and miniseries; as each other’s largest suppliers of programming and as competitors on the world stage; and as a network of creative, business, and personal relationships that has rarely been examined, but that shapes television around the world. As the global circuits of television grow and as global regions, particularly Europe, attempt to define a common culture, the historical role played by the British/US media dialogue takes on new significance.

Network Performance Analysis (Wiley-iste Ser.)

by Thomas Bonald Mathieu Feuillet

The book presents some key mathematical tools for the performance analysis of communication networks and computer systems. Communication networks and computer systems have become extremely complex. The statistical resource sharing induced by the random behavior of users and the underlying protocols and algorithms may affect Quality of Service. This book introduces the main results of queuing theory that are useful for analyzing the performance of these systems. These mathematical tools are key to the development of robust dimensioning rules and engineering methods. A number of examples illustrate their practical interest.

Network Reliability and Resilience

by Ilya Gertsbakh Yoseph Shpungin

This book is devoted to the probabilistic description of the behavior of a network in the process of random removal of its components (links, nodes) appearing as a result of technical failures, natural disasters or intentional attacks. It is focused on a practical approach to network reliability and resilience evaluation, based on applications of Monte Carlo methodology to numerical approximation of network combinatorial invariants, including so-called multidimensional destruction spectra. This allows to develop a probabilistic follow-up analysis of the network in the process of its gradual destruction, to identify most important network components and to develop efficient heuristic algorithms for network optimal design. Our methodology works with satisfactory accuracy and efficiency for most applications of reliability theory to real -life problems in networks.

Network Reliability: A Lecture Course (SpringerBriefs in Electrical and Computer Engineering)

by Ilya Gertsbakh Yoseph Shpungin

This introductory book equips the reader to apply the core concepts and methods of network reliability analysis to real-life problems. It explains the modeling and critical analysis of systems and probabilistic networks, and requires only a minimal background in probability theory and computer programming. Based on the lecture notes of eight courses taught by the authors, the book is also self-contained, with no theory needed beyond the lectures. The primary focus is on essential “modus operandi,” which are illustrated in numerous examples and presented separately from the more difficult theoretical material.

Network Robustness under Large-Scale Attacks

by Ruifang Liu Shuguang Cui Qing Zhou Long Gao

Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks. The book begins with a thorough overview of the latest research and techniques to analyze the network responses to different types of attacks over various network topologies and connection models. It then introduces a new large-scale physical attack model coined as area attack, under which a new network robustness measure is introduced and applied to study the network responses. With this book, readers will learn the necessary tools to evaluate how a complex network responds to random and possibly correlated attacks.

Network Routing: Fundamentals, Applications, and Emerging Technologies

by Sudip Misra Sumit Goswami

Network Routing: Fundamentals, Applications and Emerging Technologies serves as single point of reference for both advanced undergraduate and graduate students studying network routing, covering both the fundamental and more moderately advanced concepts of routing in traditional data networks such as the Internet, and emerging routing concepts currently being researched and developed, such as cellular networks, wireless ad hoc networks, sensor networks, and low power networks.

Network Science

by Desmond J. Higham Gian-Luca Oppo Ernesto Estrada Maria Fox

Network Science is the emerging field concerned with the study of large, realistic networks. This interdisciplinary endeavor, focusing on the patterns of interactions that arise between individual components of natural and engineered systems, has been applied to data sets from activities as diverse as high-throughput biological experiments, online trading information, smart-meter utility supplies, and pervasive telecommunications and surveillance technologies. This unique text/reference provides a fascinating insight into the state of the art in network science, highlighting the commonality across very different areas of application and the ways in which each area can be advanced by injecting ideas and techniques from another. The book includes contributions from an international selection of experts, providing viewpoints from a broad range of disciplines. It emphasizes networks that arise in nature--such as food webs, protein interactions, gene expression, and neural connections--and in technology--such as finance, airline transport, urban development and global trade. Topics and Features: begins with a clear overview chapter to introduce this interdisciplinary field; discusses the classic network science of fixed connectivity structures, including empirical studies, mathematical models and computational algorithms; examines time-dependent processes that take place over networks, covering topics such as synchronisation, and message passing algorithms; investigates time-evolving networks, such as the World Wide Web and shifts in topological properties (connectivity, spectrum, percolation); explores applications of complex networks in the physical and engineering sciences, looking ahead to new developments in the field. Researchers and professionals from disciplines as varied as computer science, mathematics, engineering, physics, chemistry, biology, ecology, neuroscience, epidemiology, and the social sciences will all benefit from this topical and broad overview of current activities and grand challenges in the unfolding field of network science.

Network Science and Cybersecurity

by Robinson E. Pino

Network Science and Cybersecurity introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of Defense, industry and academic laboratories. This book examines new algorithms and tools, technology platforms and reconfigurable technologies for cybersecurity systems. Anomaly-based intrusion detection systems (IDS) are explored as a key component of any general network intrusion detection service, complementing signature-based IDS components by attempting to identify novel attacks. These attacks may not yet be known or have well-developed signatures. Methods are also suggested to simplify the construction of metrics in such a manner that they retain their ability to effectively cluster data, while simultaneously easing human interpretation of outliers. This is a professional book for practitioners or government employees working in cybersecurity, and can also be used as a reference. Advanced-level students in computer science or electrical engineering studying security will also find this book useful .

Network Security

by André Perez

This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring.Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks.The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.

Network Security and Data Privacy in 6G Communication: Trends, Challenges, and Applications (Wireless Communications and Networking Technologies)

by Rajendra Kumar Vishal Jain Vinay Kukreja Danish Ather

This book proposes robust solutions for securing a network against intrusions for data privacy and safety. It includes theoretical models, commercialization of validated models, and case studies. Explains the integration of technologies such as artificial intelligence, the Internet of Things, and blockchain for network security in a 6G communication system. Highlights the challenges such as spectrum allocation and management, network architecture and heterogeneity, energy efficiency and sustainability, antenna, and radio frequency. Discuss theories like quantum-safe cryptography, zero-trust networking, and blockchain-based trust management. Covers emerging technologies including homomorphic encryption, secure multi-party computation, post-quantum cryptography, and distributed ledger technology for security and privacy in 6G communication systems. Presents light and deep secure algorithms to detect fake incidents in wireless communication. The text is primarily written for senior undergraduates, graduate students, and academic researchers in fields including electrical engineering, electronics and communications engineering, and computer science.

Network Slicing for 5G and Beyond Networks

by Nguyen H. Tran Choong Seon Hong S. M. Kazmi Latif U. Khan

This book provides a comprehensive guide to the emerging field of network slicing and its importance to bringing novel 5G applications into fruition. The authors discuss the current trends, novel enabling technologies, and current challenges imposed on the cellular networks. Resource management aspects of network slicing are also discussed by summarizing and comparing traditional game theoretic and optimization based solutions. Finally, the book presents some use cases of network slicing and applications for vertical industries. Topics include 5G deliverables, Radio Access Network (RAN) resources, and Core Network (CN) resources. Discusses the 5G network requirements and the challenges therein and how network slicing offers a solutionFeatures the enabling technologies of future networks and how network slicing will play a rolePresents the role of machine learning and data analytics for future cellular networks along with summarizing the machine learning approaches for 5G and beyond networks

Network Strategies for Regional Growth

by Martin Johanson Heléne Lundberg

In many regions the current focus of the state is to initiate and stimulate the emergence of inter-firm networks in order to produce growth. This book takes a management perspective on the operations and processes in these networks and describes and analyzes how and why geographical proximity influences inter-firm networks.

Network Traffic Engineering: Stochastic Models and Applications

by Andrea Baiocchi

A comprehensive guide to the concepts and applications of queuing theory and traffic theory Network Traffic Engineering: Models and Applications provides an advanced level queuing theory guide for students with a strong mathematical background who are interested in analytic modeling and performance assessment of communication networks. The text begins with the basics of queueing theory before moving on to more advanced levels. The topics covered in the book are derived from the most cutting-edge research, project development, teaching activity, and discussions on the subject. They include applications of queuing and traffic theory in: LTE networks Wi-Fi networks Ad-hoc networks Automated vehicles Congestion control on the Internet The distinguished author seeks to show how insight into practical and real-world problems can be gained by means of quantitative modeling. Perfect for graduate students of computer engineering, computer science, telecommunication engineering, and electrical engineering, Network Traffic Engineering offers a supremely practical approach to a rapidly developing field of study and industry.

Network Tutorial: A Complete Introduction to Networks Includes Glossary of Networking Terms

by Steve Steinke

Network Tutorial delivers insight and understanding about network technology to managers and executives trying to get up to speed or stay current with the complex challenges of designing, constructing, maintaining, upgrading, and managing the netwo

Network and Communication: Research on the Development of Electronic Information Engineering Technology in China

by Chinese Academy of Engineering

Currently, there are global endeavors to integrate network information into the natural world and human society. This process will lead to marked improvements in productivity and product quality, and to new production methods and lifestyles. Further, these advances will have significant impacts, similar to those of the agricultural and industrial revolutions. At the same time, it is profoundly changing competition around the globe. Security, economic, social, military and cultural trends generate new opportunities for national development, new living spaces for humans, new fields of social governance, and new momentum for industrial upgrading and international competition. Over the next 20 years, the development of network communication technologies will focus on three-domain human-network-thing interconnections and their systematic integration into various industries and regions. This will be made possible by digitalization, networking and intellectualization, and will result in the extended connection of human societies around the globe, and a continuously enriched and expanded network space.This book summarizes the development of network communication, both globally and in China, as well as its future prospects from the perspectives of academia, technology and industry. Further, in the context of technology and applications, it focuses on mobile communication, data communication, and optical fiber communication. Discussing application services related to the mobile Internet, Internet of Things, edge computing and quantum communication, it highlights the latest technological advances, future trends, technologies and industry development hotspots. Lastly, it explores 15 buzzwords in the field of network communication in technology and industrial development, providing definitions, and describing the state of development of related applications.

Network of Lies: The Epic Saga of Fox News, Donald Trump, and the Battle for American Democracy

by Brian Stelter

Fox News paid almost a billion dollars in legal settlements to bury the contents of this &“essential…grinding, momentum-building&” (The New York Times) account of the network&’s blatant attempts to manipulate the truth, mislead the public, and influence our elections—from the New York Times bestselling author of Hoax.The ongoing criminal trials of Donald Trump are also a trial for the nation he once led. We are undergoing a stress test of American democracy, the rule of law, and the very notion of a shared political reality. Can we achieve accountability for premeditated assaults on democracy and what forms should accountability take? In Network of Lies, New York Times bestselling author Brian Stelter answers these questions by weaving together private texts, unpublished emails, depositions, and other primary sources to tell the chilling story of Trump&’s alleged conspiracy to steal the 2020 election, and the right-wing media&’s mission to put him back in office in 2024. Trump couldn&’t have convinced millions of Americans of the Big Lie without Fox News. From the moment Joe Biden became president-elect in 2020, Fox hosts fueled a fire of misinformation and violence by spreading Trump&’s tales of election fraud and suppressing the truth. Come January, Sean Hannity insisted Trump needed to stop listening to &“crazy people&” who swore he could stay in power, but it was too late—thousands of Trump&’s deluded followers had stormed the Capitol and Trump operatives had breached Dominion Voting Systems&’ voting machines in Georgia. Now, the 2020 lies are at the center of numerous indictments and his reelection campaign, but Trump is not the only one under fire. The once-untouchable Rupert Murdoch has been held accountable. Dominion&’s legal war, chronicled in-depth for the first time here, revealed that the ninety-two-year-old Fox chairman knew Trump&’s lies were dangerous but he allowed the lies to fill Fox&’s airwaves because, as his &“pain sponge&” Suzanne Scott admitted, telling the truth was &“bad for business.&” Network of Lies goes inside the chat rooms, board rooms, and court rooms where the pro-Trump media&’s greed and selfishness were exposed. Featuring Stelter&’s &“thorough and damning&” (The New York Times) investigative prowess and direct quotations so shocking they read like fiction, Network of Lies is the definitive origin story of Trump&’s attempt to tear down the guardrails of American democracy, and an urgent plea to learn from past mistakes as we head into 2024&’s pivotal presidential election.

Refine Search

Showing 10,226 through 10,250 of 18,742 results