Listing 1 - 10 of 158 | << page >> |
Sort by
|
Choose an application
Choose an application
Autismespectrumstoornis --- Jongere --- Begeleiding --- Communicatie --- Informatieverwerking --- Visualisatie --- Digitale informatie
Choose an application
7866306
ICT informatie- en communicatietechnologie --- ICT ; onderwijs --- ICT --- Onderwijs --- Onderwijsvernieuwing --- Opvoeding --- Pedagogiek --- Statistische gegevens --- Sport
Choose an application
Choose an application
"Running Mainframe z on Distributed Platforms is particularly suitable for a more detailed discussion." Bill Ogden, IBM zPDT Redbook, April 2015 "The authors offer very well-reasoned solutions accompanied by case studies, which will be useful to specialists. The book is made even more useful as the System z mainframe-based solutions offer an advanced systems management environment for significant segments of data within large companies." Eugen Petac, Computing Reviews, Oct. 8, 2014 "Should you choose to implement zPDT, RDz UT, or RD&T in your team's arsenal, you will find Barrett and Norris’s insights, genius, and hard work illuminating as to how to rationally and economically manage the environment." —Scott Fagen, Chief Architect—System z Business, CA Technologies "A must-read for anyone interested in successfully deploying cost-efficient zPDT environments with agility in an enterprise that requires simple or complex configurations. The case-study-based exposition of the content allows for its easy consumption and use. Excellent!" —Mahendra Durai, SVP & Information Technology Officer, CA Running Mainframe z on Distributed Platforms reveals alternative techniques not covered by IBM for creatively adapting and enhancing multi-user IBM zPDT environments so that they are more friendly, stable, and reusable than those envisaged by IBM. The enhancement processes and methodologies taught in this book yield multiple layers for system recovery, 24x7 availability, and superior ease of updating and upgrading operating systems and subsystems without having to rebuild environments from scratch. Most of the techniques and processes covered in this book are not new to either the mainframe or distributed platforms. What is new in this book are the authors’ innovative methods for taking distributed environments running mainframe virtual machine (VM) and multiple virtual storage (MVS) and making them look and feel like other MVS systems. The authors’ combined expertise involves every aspect of the implementation of IBM zPDT technology to create virtualized mainframe environments by which the mainframe operations on a z series server can be transitioned to distributed platforms. All of the enhancement methods consecutively laid out in this book have been architected and developed by the authors for the CA Technologies distributed platform. Barrett and Norris impart these techniques and processes to CIOs and CTOs across the mainframe and distributed fields, to zPDT and RDz UT implementers, and to IBM’s independent software vendors and customers.
Computer science --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- computers --- informatica --- informatiesystemen --- computerkunde
Choose an application
BizTalk 2013 EDI for Healthcare – EDI 834Enrollment Solutions eliminates the complexity anddemonstrates how to build both inbound and outbound EDI 834 processes inBizTalk server that follow the required patterns for integrations with theseexchanges. Archiving, mapping,reconstituting EDI 837 data, exception handling and advanced logging andreporting (without the need for BAM!) are all covered in enough detail to allowyou to implement your own fully functional solution. The Affordable CareAct and the requirements to integrate with state Exchanges have securedBizTalk’s role with integrations within the healthcare industry. EDI 834 documents are the heart to allintegrations, dealing with enrollment and the maintenance of enrollments. In order to successfully integrate with theexchanges, companies are required to implement a number of architectural componentsthat can be daunting and complex to work through. High-quality resources for IT professional to handle these challenges are sorely needed, and this resource has been designed to provide concise solutions.
Computer science --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- computers --- informatica --- informatiesystemen --- computerkunde
Choose an application
The volume “Storing and Transmitting Data” is based on Rudolf Ahlswede's introductory course on "Information Theory I" and presents an introduction to Shannon Theory. Readers, familiar or unfamiliar with the technical intricacies of Information Theory, will benefit considerably from working through the book; especially Chapter VI with its lively comments and uncensored insider views from the world of science and research offers informative and revealing insights. This is the first of several volumes that will serve as a collected research documentation of Rudolf Ahlswede’s lectures on information theory. Each volume includes comments from an invited well-known expert. Holger Boche contributed his insights in the supplement of the present volume. Classical information processing concerns the main tasks of gaining knowledge, storage, transmitting and hiding data. The first task is the prime goal of Statistics. For the two next, Shannon presented an impressive mathematical theory called Information Theory, which he based on probabilistic models. The theory largely involves the concept of codes with small error probabilities in spite of noise in the transmission, which is modeled by channels. The lectures presented in this work are suitable for graduate students in Mathematics, and also in Theoretical Computer Science, Physics, and Electrical Engineering with background in basic Mathematics. The lectures can be used as the basis for courses or to supplement courses in many ways. Ph.D. students will also find research problems, often with conjectures, that offer potential subjects for a thesis. More advanced researchers may find the basis of entire research programs.
Ergodic theory. Information theory --- Mathematics --- Information systems --- ICT (informatie- en communicatietechnieken) --- coderen --- informatiesystemen --- wiskunde --- informatietheorie
Choose an application
This volume comprehends a selection of papers presented during the 26th International Cartographic Conference held in Dresden from the 26th to the 30th of August 2013. It covers many fields of relevant Mapping and GIS research subjects, such as cartographic applications, cartographic tools, generalisation and update Propagation, higher dimensional visualisation and augmented reality, planetary mapping issues, cartography and environmental modelling, user generated content and spatial data infrastructure, use and usability as well as cartography and GIS in education.
Geodesy. Cartography --- Information systems --- Geography --- geodesie --- ICT (informatie- en communicatietechnieken) --- GIS (geografisch informatiesysteem) --- informatiesystemen --- geografie
Choose an application
Plagiarism is a problem with far-reaching consequences for the sciences. However, even today’s best software-based systems can only reliably identify copy&paste plagiarism. Disguised plagiarism forms, including paraphrased text, cross-language plagiarism, as well as structural and idea plagiarism often remain undetected. This weakness of current systems results in a large percentage of scientific plagiarism going undetected. Bela Gipp provides an overview of the state-of-the art in plagiarism detection and an analysis of why these approaches fail to detect disguised plagiarism forms. The author proposes Citation-based Plagiarism Detection to address this shortcoming. Unlike character-based approaches, this approach does not rely on text comparisons alone, but analyzes citation patterns within documents to form a language-independent "semantic fingerprint" for similarity assessment. The practicability of Citation-based Plagiarism Detection was proven by its capability to identify so-far non-machine detectable plagiarism in scientific publications. Contents Current state of plagiarism detection approaches and systems Citation-based Plagiarism Detection Target Groups Readers interested in the problem of plagiarism in the sciences Faculty and students from all disciplines, but especially computer science The Author Bela Gipp is a postdoctoral researcher at the University of California, Berkeley.
Computer science --- Programming --- Information systems --- ICT (informatie- en communicatietechnieken) --- computers --- informatiesystemen --- systeemontwikkeling (informatica) --- methodologieën --- computerkunde --- gegevensverwerking
Choose an application
Listing 1 - 10 of 158 | << page >> |
Sort by
|