Communities have built collections of information in a collaborative manner for
centuries. Around 250 years ago, more than 140 people wrote l’Encyclopedie in 28
volumes with 70,000 articles. More recently, Wikipedia has demonstrated how
collaborative efforts can be a powerful method of building a massive data storage. It
is...
The specifications in this book are the result of a number of case studies performed by
researchers from the Programming Research Group at the University of Amsterdam.
The primary goal was to study the use of the techniques developed by the
Programming Research Group for the specification of real-life protocols. From the
pool of...
Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...
Lync 2013 is a product that enables users to IM, and have audio and video conferences, including multi-party video. The mobile client permits the use of all the features in every device with an access-from-everywhere logic. The company’s Active Directory users, SharePoint documents, and Exchange objects integrate with Lync to deliver...
Apple has a history of alternating its releases between user-focus and developer-focus. The good news about iOS 5 is that it's all about the developers. The
addition of Automatic Reference Counting (ARC) alone is worth the upgrade for developers. In one move, Apple has eliminated the number one cause of
crashes in iOS applications,...
Citrix XenServer is a complete, managed server virtualization platform built on the
Xen hypervisor. You can use XenServer for virtualizing Microsoft Windows and
Linux servers easily and efficiently.
XenServer is the enterprise-ready, cloud-proven virtualization platform that contains
all the capabilities required...
Many readers may be awaiting the third edition of IPv6 Essentials. The event on February 3, 2011, when the IANA (Internet Assigned Numbers Authority) finally announced the depletion of the global IPv4 address pool changed the world. People seemed to wake up and realize it was high time to start planning for IPv6. But where to start? ...
For a long time—and especially around 1994, when the World Wide Web
was just getting its jumpstart—the Internet appeared to many as a vast pool
of information just sitting in cyberspace. People who used the Internet for
research “cast their nets” by entering queries into a search engine, and then
pulled...
As global networks expand the interconnection of the world’s information systems, the
smooth operation of communication and computing solutions becomes vital. However,
recurring events such as virus and worm attacks and the success of criminal attackers illustrate
the weaknesses in current information technologies and the...
Robotic welding systems have been used in different types of manufacturing. They can
provide several benefits in welding applications. The most prominent advantages of
robotic welding are precision and productivity. Another benefit is that labor costs can be
reduced. Robotic welding also reduces risk by moving the human...
With scores of step-by-step solutions, this cookbook helps you work with VMware ESXi in a wide range of network environments. You’ll not only learn the basics—how to pool resources from hardware servers, computer clusters, networks, and storage, and then distribute them among virtual machines—but also how to...
Creating video game environments similar to the best 3D games on the market is now within the capability of hobbyists for the first time, with the free availability of game development software such as Unity 3D, and the ease with which groups of enthusiasts can get together to pool their skills for a game project. The sheer number of these...