Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-peer computing, at least on a conceptual level, is a genuine paradigm
shift—intelligence is at the edge, computing is completely decentralized, and
the network is just there to knit the distributed intelligence together. Indeed,
with advancements in hardware technology, proliferation of the open source
development... Puppet Types and Providers
Puppet is a configuration management tool that has enjoyed phenomenal growth over
the last few years. Propelled by increasing demands on sysadmins, and the continuous
growth of infrastructure (both physical and virtual), Puppet has been one of the key
technology components of the DevOps movement. This cultural shift...
Encyclopedia of Cybercrime The first comprehensive encyclopedia to examine all aspects of the mysterious world of cybercrime
There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty years crime enabled by computing and...
|Result Page: 27 26 25 24 23 22 21 20 19 18 |