green computing PDF: 21 to 30 of 1000 results fetched - page 3 [ec]

Zoolz is the only cloud solution that keeps your data even when you disconnect your drives
Now you can translate your PDF documents automatically to dozens of languages.

Tools for High Performance Computing 2014

www.ebooks.com/cj.asp?IID=2094472&cjsku=2094472...
Numerical simulation and modelling using High Performance Computing has evolved into an established technique in academic and industrial research. At the same time, the High Performance Computing infrastructure is becoming ever more complex. For instance, most of the current top systems around the world use thousands of nodes in which classical CPUs are combined with accelerator cards in order to enhance their compute power and energy efficiency. This complexity can only be mastered with adequate development and optimization tools. Key topics addressed by these tools include parallelization on heterogeneous systems, performance optimization for CPUs and accelerators, debugging of increasingly complex scientific applications and optimization of energy usage in the spirit of green IT. This book represents the proceedings of the 8 th International Parallel Tools Workshop, held October 1-2, 2014 in Stuttgart, Germany which is a forum to discuss the latest advancements in the parallel tools.
Category: Computers. ISBN: 9783319160115

The Healthy PC: Preventive Care, Home Remedies, and Green Computing, 2nd Edition

www.ebooks.com/cj.asp?IID=829106&cjsku=829106...
Get your PC running at full speed again--and remove malevolent software Save yourself time, money, and frustration by becoming your own computer guru. The Healthy PC: Preventive Care, Home Remedies, and Green Computing , Second Edition shows you how to find out what's wrong with your PC and solve the problems yourself. You'll get expert tips for making your PC start up faster, keeping its hard drive in good shape, and updating Windows with the latest security fixes. This hands-on guide also explains how to protect your PC for free using Microsoft Security Essentials, use the Internet safely, and configure parental controls to protect your children both online and offline. Disable unnecessary startup items and boost virtual memory Defragment your PC's hard disk and reclaim wasted space Armor your PC against attacks, viruses, malware, and spyware Protect Windows by applying the latest patches and fixes Lock down your wired and wireless Internet and network connections against intruders Surf safely and reduce risks from e-mail, IM, and social networking Keep your children safe online Maximize your PC's memory and add external hard drives Upgrade to Windows 7 and transfer your files and settings Guy Hart-Davis is the author of more than 70 computer books, including iPad and iPhone Administrator's Guide , Integrating Macs into Windows Networks , Mac OS X System Administration , and How to Do Everything: iPad and iTunes, Sixth Edition.
Category: Computers. ISBN: 9780071752916

Cloud Computing

www.ebooks.com/cj.asp?IID=918802&cjsku=918802...
In this book, three internationally renowned experts use jargon-free language and relevant examples, analogies and diagrams to give an up-to-date, clear and comprehensive guide to the security, governance, risk, and compliance elements of Cloud Computing.
Category: Business. ISBN: 9781849283595

Parallel Computing

www.ebooks.com/cj.asp?IID=1361856&cjsku=1361856...
Parallel Computing
Category: Computers. ISBN: 9780815513292

Quantum Computing

www.ebooks.com/cj.asp?IID=339337&cjsku=339337...
Covering both theory and progressive experiments, Quantum Computing: From Linear Algebra to Physical Realizations explains how and why superposition and entanglement provide the enormous computational power in quantum computing. This self-contained, classroom-tested book is divided into two sections, with the first devoted to the theoretical aspects of quantum computing and the second focused on several candidates of a working quantum computer, evaluating them according to the DiVincenzo criteria. Topics in Part I Linear algebra Principles of quantum mechanics Qubit and the first application of quantum information processingquantum key distribution Quantum gates Simple yet elucidating examples of quantum algorithms Quantum circuits that implement integral transforms Practical quantum algorithms, including Grover's database search algorithm and Shor's factorization algorithm The disturbing issue of decoherence Important examples of quantum error-correcting codes (QECC) Topics in Part II DiVincenzo criteria, which are the standards a physical system must satisfy to be a candidate as a working quantum computer Liquid state NMR, one of the well-understood physical systems Ionic and atomic qubits Several types of Josephson junction qubits The quantum dots realization of qubits Looking at the ways in which quantum computing can become reality, this book delves into enough theoretical background and experimental research to support a thorough understanding of this promising field.
Category: Computers. ISBN: 9780750309837

Quantum Computing

www.ebooks.com/cj.asp?IID=481823&cjsku=481823...
The result of a lecture series, this textbook is oriented towards students and newcomers to the field and discusses theoretical foundations as well as experimental realizations in detail. The authors are experienced teachers and have tailored this book to the needs of students. They present the basics of quantum communication and quantum information processing, leading readers to modern technical implementations. In addition, they discuss errors and decoherence as well as methods of avoiding and correcting them.
Category: Science. ISBN: 9783527404384

Petascale Computing

www.ebooks.com/cj.asp?IID=334034&cjsku=334034...
Although the highly anticipated petascale computers of the near future will perform at an order of magnitude faster than today's quickest supercomputer, the scaling up of algorithms and applications for this class of computers remains a tough challenge. From scalable algorithm design for massive concurrency toperformance analyses and scientific visualization, Petascale Computing: Algorithms and Applications captures the state of the art in high-performance computing algorithms and applications. Featuring contributions from the world's leading experts in computational science, this edited collection explores the use of petascale computers for solving the most difficult scientific and engineering problems of the current century. Covering a wide range of important topics, the book illustrates how petascale computing can be applied to space and Earth science missions, biological systems, weather prediction, climate science, disasters, black holes, and gamma ray bursts. It details the simulation of multiphysics, cosmological evolution, molecular dynamics, and biomolecules. The book also discusses computational aspects that include the Uintah framework, Enzo code, multithreaded algorithms, petaflops, performance analysis tools, multilevel finite element solvers, finite element code development, Charm++, and the Cactus framework. Supplying petascale tools, programming methodologies, and an eight-page color insert, this volume addresses the challenging problems of developing application codes that can take advantage of the architectural features of the new petascale systems in advance of their first deployment.
Category: Computers. ISBN: 9781584889090

Granular Computing

www.ebooks.com/cj.asp?IID=1255706&cjsku=1255706...
This book is about Granular Computing (GC) - an emerging conceptual and of information processing. As the name suggests, GC concerns computing paradigm processing of complex information entities - information granules. In essence, information granules arise in the process of abstraction of data and derivation of knowledge from information. Information granules are everywhere. We commonly use granules of time (seconds, months, years). We granulate images; millions of pixels manipulated individually by computers appear to us as granules representing physical objects. In natural language, we operate on the basis of word-granules that become crucial entities used to realize interaction and communication between humans. Intuitively, we sense that information granules are at the heart of all our perceptual activities. In the past, several formal frameworks and tools, geared for processing specific information granules, have been proposed. Interval analysis, rough sets, fuzzy sets have all played important role in knowledge representation and processing. Subsequently, information granulation and information granules arose in numerous application domains. Well-known ideas of rule-based systems dwell inherently on information granules. Qualitative modeling, being one of the leading threads of AI, operates on a level of information granules. Multi-tier architectures and hierarchical systems (such as those encountered in control engineering), planning and scheduling systems all exploit information granularity. We also utilize information granules when it comes to functionality granulation, reusability of information and efficient ways of developing underlying information infrastructures.
Category: Computers. ISBN: 9781402072734

Trusted Computing

www.ebooks.com/cj.asp?IID=750728&cjsku=750728...
Trusted Computing markiert einen grundstzlichen Wandel der IT-Sicherheitsarchitekturen. Erstmals werden die Potenziale von sicherer integrierten Hard- und Software verfgbar. Seit 1999 sind die wesentlichen Konzepte, Standards, Baugruppen und Softwaremodule entwickelt und zur Anwendungsreife gebracht worden. Das Buch fasst die vorliegenden Grundlagen zusammen. Es behandelt erstmals wichtige Anwendungsszenarien mit signifikantem Sicherheitsgewinn fr IT-Systembetreiber und -anwender. Besonders bercksichtigt wird dabei Open Source Software als Beitrag zur Vertrauenswrdigkeit der Lsungen. Es wird gezeigt, dass Trusted Computing die traditionellen chipkartenbasierten Konzepte der IT-Sicherheit wirkungsvoll ergnzt und dass Datenschutz und andere rechtliche Vorgaben erfllt werden.
Category: Business. ISBN: 9783834803092

Ubiquitous Computing

www.ebooks.com/cj.asp?IID=750925&cjsku=750925...
Ubiquitous Computing has been the subject of discussion in various research areas for some time now. Over the past several years RFID and Near Field Communication (NFC) technologies have become the driving force behind the vision of Ubiquitous Computing. In particular, NFC could become a real Ubiquitous Computing technology in consumer hands if it succeeds in capturing distribution channels, for example due to integration into the mobile devices market. Even if that will be the case in the future, application developers and entrepreneurs interested in using RFID or NFC technologies will be faced with the challenges of negotiating the process of moving early prototypes into a final product. In particular, given the physical nature of the technology, it is imperative that the user be involved in the very early stages of development in order to bring successful, consumer-accepted applications to market. In 2009, NFC technology still finds itself in the starting blocksaccordingly, these research results come at the right time. Previous approaches to the challenge of developing NFC applications have neither applied research methods specific to Ubiquitous Computing, nor have they integrated the appropriate design guidelines. Florian Resatsch's work focuses specifically on these issues and makes use of a unified developmental and evaluation process model. The work draws on knowledge from a range of disciplines and combines these into a process for developing and evaluating Ubiquitous Computing applications using Near Field Communication (NFC) as an enabling technology.
Category: Business. ISBN: 9783834921673
Previous12 [3] 4567Next