Lync 2013 is a product that enables users to IM, and have audio and video conferences, including multi-party video. The mobile client permits the use of all the features in every device with an access-from-everywhere logic. The company’s Active Directory users, SharePoint documents, and Exchange objects integrate with Lync to deliver...
How well a Web site performs while receiving heavy user traffic is an essential factor in an organization's overall success. How can you be sure your site will hold up under pressure?
Performance Analysis for Java(TM) Web Sites is an information-packed guide to...
The definitive guide to building more powerful network applications using the .NET Framework. Learn the best ways to exploit the networking APIs in the .NET Framework—and deliver greater flexibility, interoperability, and power to your network applications. Three network programming specialists from Microsoft demonstrate how to use the...
You're not alone. At any given moment, somewhere in the world someone struggles with the same software design problems you have. You know you don't want to reinvent the wheel (or worse, a flat tire), so you look to Design Patterns--the lessons learned by those who've faced the same problems. With Design Patterns, you get to take...
Have you ever wanted to know how data travels from computer to computer, around the world? Have you ever wondered how Web sites can track users or how newsgroups work? How the Internet Works shows you how with easy-to-follow, four-color visual spreads tracking the path data flows and the hardware involved. Now entering its fourth year, How the...
Squid proxy server enables you to cache your web content and return it quickly on subsequent requests. System administrators often struggle with delays and too much bandwidth being used, but Squid solves these problems by handling requests locally. By deploying Squid in accelerator mode, requests are handled faster than on normal web servers,...
All of the big viruses of recent times (think "Melissa" and the "Love Bug") have used e-mail protocols to propagate themselves--often taking advantage of the address-book features of e-mail clients to identify their victims. The E-mail Virus Protection Handbook explores how you, as an administrator of an e-mail server...
Build an in-depth understanding of the Istio service mesh and see why a service mesh is required for a distributed application. This book covers the Istio architecture and its features using a hands-on approach with language-neutral examples. To get your Istio environment up and running, you will go through its setup and...
Learn how to download, compile, and configure Squid proxy on your server and client computers of different configurations for everyday use. Debugging and troubleshooting is also addressed.
Using Squid is a book that explains the basics of Squid. This book explains how to download, compile, and configure Squid proxy on...