- Table View
- List View
Looking for a solution to get your students started in the computer world? This introductory text, CENTURY 21, JR. INPUT TECHNOLOGIES AND COMPUTER APPLICATIONS, 2e is the perfect companion for navigation of computer basics, file management, the Internet, keyboarding, handwriting recognition, speech recognition, tablet PCs, word processing, desktop publishing, spreadsheets, presentations, databases, HTML programming, and Web pages. CENTURY 21, JR. provides step-by-step guidance, with engaging activities labeled as Learn, Practice, and Apply. Units are divided into easy-to-manage chapters and projects will help students learn the features of Microsoft Office 2007.
Over 100 effective recipes to help you design, implement, and manage the software-defined and massively scalable Ceph storage system About This Book * Implement a Ceph cluster successfully and gain deep insights into its best practices * Harness the abilities of experienced storage administrators and architects, and run your own software-defined storage system * This comprehensive, step-by-step guide will show you how to build and manage Ceph storage in production environment Who This Book Is For This book is aimed at storage and cloud system engineers, system administrators, and technical architects who are interested in building software-defined storage solutions to power their cloud and virtual infrastructure. If you have basic knowledge of GNU/Linux and storage systems, with no experience of software defined storage solutions and Ceph, but eager to learn this book is for you. What You Will Learn * Understand, install, configure, and manage the Ceph storage system * Get to grips with performance tuning and benchmarking, and gain practical tips to run Ceph in production * Integrate Ceph with OpenStack Cinder, Glance, and nova components * Deep dive into Ceph object storage, including s3, swift, and keystone integration * Build a Dropbox-like file sync and share service and Ceph federated gateway setup * Gain hands-on experience with Calamari and VSM for cluster monitoring * Familiarize yourself with Ceph operations such as maintenance, monitoring, and troubleshooting * Understand advanced topics including erasure coding, CRUSH map, cache pool, and system maintenance In Detail Ceph is a unified, distributed storage system designed for excellent performance, reliability, and scalability. This cutting-edge technology has been transforming the storage industry, and is evolving rapidly as a leader in software-defined storage space, extending full support to cloud platforms such as Openstack and Cloudstack, including virtualization platforms. It is the most popular storage backend for Openstack, public, and private clouds, so is the first choice for a storage solution. Ceph is backed by RedHat and is developed by a thriving open source community of individual developers as well as several companies across the globe. This book takes you from a basic knowledge of Ceph to an expert understanding of the most advanced features, walking you through building up a production-grade Ceph storage cluster and helping you develop all the skills you need to plan, deploy, and effectively manage your Ceph cluster. Beginning with the basics, you'll create a Ceph cluster, followed by block, object, and file storage provisioning. Next, you'll get a step-by-step tutorial on integrating it with OpenStack and building a Dropbox-like object storage solution. We'll also take a look at federated architecture and CephFS, and you'll dive into Calamari and VSM for monitoring the Ceph environment. You'll develop expert knowledge on troubleshooting and benchmarking your Ceph storage cluster. Finally, you'll get to grips with the best practices to operate Ceph in a production environment. Style and approach This step-by-step guide is filled with practical tutorials, making complex scenarios easy to understand.
Part of Packt's Beginner's Guide series, this book guides you through setting up Cfengine to maximizing its potential. This book focuses on getting you through all the major learning points in a smooth, logical order. You'll also learn how to avoid some common pitfalls. If you are a System Administrator or Configuration manager with a growing infrastructure and if you are looking for a dependable tool to manage your infrastructure, then this book is for you. If your infrastructure is already big with hundreds and thousands of nodes and you are looking for a secure, versatile and stable configuration management tool, you will still find this book handy. You don't need any prior experience of Cfengine to follow this book.
Anyone can put a site up on the Web-but what makes people come back again and again? This indispensable reference is your guide to CGI (Common Gateway Interface), the key to tailoring your site to suit your visitors' needs by controlling and analyzing the flow of information on your site. No experience with C or Perl is assumed. Real-world examples are presented in easy-to follow tutorials.
A RAND team conducted a Delphi expert elicitation exercise, the results of which offer an assessment of the contemporary security situation in Mexico through the lens of existing RAND research on urban instability and unrest, historical insurgencies, and defense-sector reform. Assessment scorecards from these projects were used to obtain input from the expert panel and to guide the resulting discussion.
From Silicon Valley in California to Silicon Glen in Scotland, from Silicon Island in Taiwan to Silicon Paddy in China, the social, economic, and ecological effects of the international electronics industry are widespread. The production of electronic and computer components contaminates air, land, and water around the globe. As this eye-opening book reveals, the people who suffer the consequences are largely poor, female, immigrant, and minority. Challenging the Chip is the first comprehensive examination of the impacts of electronics manufacturing on workers and local environments across the planet. Contributors to this pioneering volume include many of the world's most articulate, passionate and progressive visionaries, scholars and advocates. Here they not only document the unsustainable and often devastating practices of the global electronics industry but also chronicle creative ways in which activists, government agencies, and others have attempted to reform the industry-through resistance, persuasion, and regulation.
The myth of innovation is that brilliant ideas leap fully formed from the minds of geniuses. In reality, most innovations are borne from rigor and discipline.
It's no wonder American higher education is facing a crisis.While low-income students can't find a spot in their local community colleges for lack of funding, public four-year universities are spending staggering sums on luxurious residence halls, ever-bigger football stadiums, and obscure research institutes. We have cosseted our most advantaged students even as we deny access to the working adults who urgently need higher education to advance their careers and our economy. In Change.edu: Rebooting for the new talent economy Andrew S. Rosen clearly and entertainingly details how far the American higher education system has strayed from the goals of access, quality, affordability, and accountability that should characterize our system, and offers a prescription to restore American educational pre-eminence.To change, our system will have to end its reflexive opposition to anything new and different. Rosen describes how each new wave of innovation and expansion of educational access-- starting with the founding of Harvard in 1636, and continuing with the advent of land-grant colleges in the 19th century, community colleges in the 20th century and private sector colleges over the last two decades--has been met with misunderstanding and ridicule. When colleges like the University of California, Cornell and Purdue were founded, they were scorned as "pretenders to the title of university" - language that tracks later criticisms of community colleges and most recently for-profit colleges.Avoiding that condescension is just one of the reasons colleges have come under the sway of "Harvard Envy" - schools that were founded to expand access feel an inexorable tug to become more prestigious and exclusive. Even worse, the competition for the best students has led universities to turn themselves into full-fledged resorts; they've built climbing walls, French bistros and 20-person hot-tubs to entice students to their campuses.How can America address an incentive system in higher education that is mismatched to the challenges of the years ahead? In Change.edu, Rosen outlines "seven certainties" of education in the coming 25 years, and presents an imperative for how our system must prepare for the coming changes. He proposes a new "playbook" for dealing with the change ahead, one that will enable American higher education to regain its global primacy and be a catalyst for economic growth in the 21st century.
More and more educational scenarios and learning landscapes are developed using blogs, wikis, podcasts and e-portfolios. Web 2.0 tools give learners more control, by allowing them to easily create, share or reuse their own learning materials, and these tools also enable social learning networks that bridge the border between formal and informal learning. However, practices of strategic innovation of universities, faculty development, assessment, evaluation and quality assurance have not fully accommodated these changes in technology and teaching. Ehlers and Schneckenberg present strategic approaches for innovation in universities. The contributions explore new models for developing and engaging faculty in technology-enhanced education, and they detail underlying reasons for why quality assessment and evaluation in new - and often informal - learning scenarios have to change. Their book is a practical guide for educators, aimed at answering these questions. It describes what E-learning 2.0 is, which basic elements of Web 2.0 it builds on, and how E-learning 2.0 differs from Learning 1.0. The book also details a number of quality methods and examples, such as self-assessment, peer-review, social recommendation, and peer-learning, using illustrative cases and giving practical recommendations. Overall, it offers a step-by-step guide for educators so that they can choose their own quality assurance or assessment methods, or develop their own evaluation methodology for specific learning scenarios. The book addresses everyone involved in higher education - university leaders, chief information officers, change and quality assurance managers, and faculty developers. Pedagogical advisers and consultants will find new insights and practices for the integration and management of novel learning technologies in higher education. The volume fosters in lecturers and teachers a sound understanding of the need and strategy for change, and it provides them with practical recommendations on competence and quality methodologies.
Advancement of telecommunications and information infrastructure occurs largely through private investment. The government affects the rate and direction of this progress through regulation and public investment. This book presents a range of positions and perspectives on those two classes of policy mechanism, providing a succinct analysis followed by papers prepared by experts in telecommunications policy and applications.
Channel coding lies at the heart of digital communication and data storage, and this detailed introduction describes the core theory as well as decoding algorithms, implementation details, and performance analyses. Known for their writing clarity, Professors Ryan and Lin provide the latest information on modern channel codes, including turbo and low-density parity-check (LDPC) codes. They also present detailed coverage of BCH codes, Reed-Solomon codes, convolutional codes, finite geometry codes, and product codes, providing a one-stop resource for both classical and modern coding techniques. Assuming no prior knowledge in the field of channel coding, the opening chapters begin with basic theory to introduce newcomers to the subject. Later chapters then extend to advanced topics such as code ensemble performance analyses and algebraic code design. 250 varied and stimulating end-of-chapter problems are also included to test and enhance learning, making this an essential resource for students and practitioners alike.
Liar's Poker meets The Social Network in an irreverent exposé of life inside the tech bubble, from industry provocateur Antonio García Martínez, a former Twitter advisor, Facebook product manager and startup founder/CEO.The reality is, Silicon Valley capitalism is very simple:Investors are people with more money than time.Employees are people with more time than money.Entrepreneurs are the seductive go-between.Marketing is like sex: only losers pay for it. Imagine a chimpanzee rampaging through a datacenter powering everything from Google to Facebook. Infrastructure engineers use a software version of this "chaos monkey" to test online services' robustness--their ability to survive random failure and correct mistakes before they actually occur. Tech entrepreneurs are society's chaos monkeys, disruptors testing and transforming every aspect of our lives, from transportation (Uber) and lodging (AirBnB) to television (Netflix) and dating (Tinder). One of Silicon Valley's most audacious chaos monkeys is Antonio García Martínez.After stints on Wall Street and as CEO of his own startup, García Martínez joined Facebook's nascent advertising team, turning its users' data into profit for COO Sheryl Sandberg and chairman and CEO Mark "Zuck" Zuckerberg. Forced out in the wake of an internal product war over the future of the company's monetization strategy, García Martínez eventually landed at rival Twitter. He also fathered two children with a woman he barely knew, committed lewd acts and brewed illegal beer on the Facebook campus (accidentally flooding Zuckerberg's desk), lived on a sailboat, raced sport cars on the 101, and enthusiastically pursued the life of an overpaid Silicon Valley wastrel.Now, this gleeful contrarian unravels the chaotic evolution of social media and online marketing and reveals how it is invading our lives and shaping our future. Weighing in on everything from startups and credit derivatives to Big Brother and data tracking, social media monetization and digital "privacy," García Martínez shares his scathing observations and outrageous antics, taking us on a humorous, subversive tour of the fascinatingly insular tech industry. Chaos Monkeys lays bare the hijinks, trade secrets, and power plays of the visionaries, grunts, sociopaths, opportunists, accidental tourists, and money cowboys who are revolutionizing our world. The question is, will we survive?
This work focuses on the characterization of adult lifelong learners' Personal Learning Environments (PLEs) by implicit and explicit tools of personalization. It aims aims toward creating a system for the development of a learning path for the characterisation of PLE for adult life learners. The synergy of formal and informal learning in the dynamic construction of a lifelong learner's PLE is fully explored, with the recognition that the majority of learning, especially for life long learners, occurs outside traditional learning formats. Specifically, this volume discusses the design, implementation, and validation of the SSW4LL (Social Semantic Web for Lifelong Learners) format, and the the SSW4LL system, built on Moodle 2.0 integrated with an adaptive mechanism (conditional activities) and some tools of Social Semantic Web (Semantic MediaWiki, Diigo and Google+). With thoroughly grounded cases studies, this volume makes the case that these systems are suitable to provide a dynamically personalized learning environment to the lifelong learner. All of these environments are fully discussed and cases made for each as a tool for constructing adult learners' PLEs.
Fourteen-year-old Morgan alienates her friends when she spends all of her time online talking to strangers in various chat rooms.
If you have some understanding of IT infrastructure principles and are ready to find out what Chef is all about, then this guide will show you all you need to know. In order to get the most out of this book, some experience of programming or scripting languages would be useful.
Chef Infrastructure Automation Cookbook contains practical recipes on everything you will need to automate your infrastructure using Chef. The book is packed with illustrated code examples to automate your server and cloud infrastructure.The book first shows you the simplest way to achieve a certain task. Then it explains every step in detail, so that you can build your knowledge about how things work. Eventually, the book shows you additional things to consider for each approach. That way, you can learn step-by-step and build profound knowledge on how to go about your configuration management automation.This book is for system engineers and administrators who have a fundamental understanding of information management systems and infrastructure. It helps if you've already played around with Chef; however, the book covers all the important topics you will need to know. If you don't want to dig through a whole book before you can get started, this book is for you, as it features a set of independent recipes you can try out immediately.
This book is for system engineers and administrators who have a fundamental understanding of information management systems and infrastructure. It helps if you've already played around with Chef; however, this book covers all the important topics you will need to know. If you don't want to dig through a whole book before you can get started, this book is for you, as it features a set of independent recipes you can try out immediately.
The book starts with two chapters dedicated to CherryPy, its history and installation. It then moves through a gentle introduction to the main features and concepts of CherryPy to a thorough review of its core capabilities. After laying this foundation the book dives into a real-world example, detailing important steps in the creation of a photoblog application. These chapters cover database manipulation via Object Relational Mapping (ORM), using web services to enhance the application, and client-side scripting through AJAX. Finally, the book covers the need for unit, functional, and performance testing before closing with deployment solutions for a CherryPy-based application. This book is principally geared towards Python web developers, who are looking to add the power of the CherryPy library to their existing Python skillset. It assumes a good working knowledge of Python. Although the CherryPy toolkit is at the core of the book, many other common libraries are introduced
Imagine living through the breakthrough moments of Bill Gates, Steve Jobs, and the other icons of today's new economy. The kind of technological revolution that they led in Silicon Valley is now sweeping through China, but with much more dramatic implications. The dynamic entrepreneurs who are using technology to radically transform business and cultural life in China are fighting not only outdated business models and a tumultuous economy but also an unpredictable government that has a love-hate relationship with the Net, at once pushing its expansion at a feverish pace and censoring it. As Duncan Clark, cofounder of BDA, an Internet consulting company in Beijing, told author David Sheff, "This environment -- the regulations, the competition, the political uncertainties -- makes these the fastest, most courageous, nimblest-thinking people globally. To deal with this level of risk and still sleep is no small accomplishment. But they're hooked on it like some Chinese are becoming hooked on Starbucks cappuccino."In this irresistible, groundbreaking book, Sheff takes us into the trenches of the Chinese technology revolution, introducing the major and minor players who are leading China into the twenty-first century. Players like Bo Feng, the charismatic former sushi chef who is now one of the leading venture capitalists in China. And Edward Tian, a national hero who has been described as China's Steve Jobs and Bill Gates combined, who left his own start-up on the eve of its IPO in order to lead the government's attempt to bring broadband to the entire nation, in the process leapfrogging the United States, Europe, and the rest of Asia with the longest and fastest network in the world. As the U.S. technological revolution wanes, business leaders will be looking to the billion-plus potential customers in China for new growth. In addition, the world's newest member of the World Trade Organization will no longer be a bystander in the global economy; it will be a fierce competitor. And when hundreds of million Chinese have access to unprecedented information and communication, China itself will be profoundly altered. Jay Chang, an analyst who covers China for Credit Suisse First Boston, sums the seismic nature of the changes: "What happens when China successfully transforms from a mainly agrarian/industrial nation into one that has significant input from the information technology industry? What happens when eighty percent of the state-owned enterprises in China are able to link economically to the global Internet on fast pipes? What happens when China's engineering talent pool is able to gain access to high-end computing resources and exchange ideas and information easily with their global peers? What happens when fifty percent of the Chinese population gets wired in ten years -- six hundred million people, the largest number of Internet users in the world?" With its compelling, character-driven story, researched over the course of three years, China Dawn will be the definitive book on the subject.
This handbook is a reference for those interested in information technologies and emerging management practices in China. The emphasis on information technologies and management provides a unique proposition and gives characteristics of flexibility and adoption to diverse audiences. The subject area is a combination of global information technology and management along with strategic management of IT. The handbook exploits state-of-the-art and emerging trends in theory and technology. This handbook is primarily designed for a professional and academic audience.
Dive into China's cool new web-based subculture with China Online!Using Baidu, China's form of Google, young Chinese web-surfers are creating their own language on the Internet. With this book, you can get an insider's view of the way the new wave of Chinese youth communicates in code. Author and translator Véronique Michel guides you on a tour of the lifestyles inhabiting modern-day "tribes" on the Internet: The "Moonlight" or "Starlight" TribeThe "Ant" TribeThe "Corporate Insects"The "Diamond Man"China Online describes a youth culture in transition-using humor and creativity to survive in a hugely competitive environment. They enjoy pun-including the ingenious "talking numbers" used to say more things with fewer keystrokes and characters. There is a great deal that lies under the surface. Learn the secret netspeak used by over half a billion of the coolest people in China, and be in the know!
Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the Help Center.
Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.
- Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
- DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
- BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
- MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
- DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivonas Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.