Snapshot


Book Description




Who We Were


Book Description

From the sod houses of South Dakota to the skyscrapers of New York City, these personal photographs form the first people's photo history of America.




Geometry, Morphology, and Computational Imaging


Book Description

This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Theoretical Foundations of Computer Vision, held in Dagstuhl Castle, Germany in April 2002. The 27 revised full papers presented went through two rounds of reviewing and improvement and assess the state of the art in geometry, morphology, and computational imaging. The papers are organized in sections on geometry - models and algorithms; property measurement in the grid and on finite samples; features, shape, and morphology; and computer vision and scene analysis.




Modernism


Book Description

Modernism: An Anthology is the most comprehensive anthology of Anglo-American modernism ever to be published. Amply represents the giants of modernism - James Joyce, Gertrude Stein, Virginia Woolf, T.S. Eliot, Ezra Pound, Wallace Stevens, Marianne Moore, Samuel Beckett. Includes a generous selection of Continental texts, enabling readers to trace modernism’s dialogue with the Futurists, the Dadaists, the Surrealists, and the Frankfurt School. Supported by helpful annotations, and an extensive bibliography. Allows readers to encounter anew the extraordinary revolution in language that transformed the aesthetics of the modern world .




Monitoring and Managing the IBM Elastic Storage Server Using the GUI


Book Description

The IBM® Elastic Storage Server GUI provides an easy way to configure and monitor various features that are available with the IBM ESS system. It is a web application that runs on common web browsers, such as Chrome, Firefox, and Edge. The ESS GUI uses Java Script and Ajax technologies to enable smooth and desktop-like interfacing. This IBM Redpaper publication provides a broad understanding of the architecture and features of the ESS GUI. It includes information about how to install and configure the GUI and in-depth information about the use of the GUI options. The primary audience for this paper includes experienced and new users of the ESS system.




Theory of Cryptography


Book Description

This book constitutes the refereed proceedings of the Fifth Theory of Cryptography Conference, TCC 2008, held in New York, USA, March 19-21, 2008. The 33 revised full papers presented were carefully reviewed and selected from 81 submissions. The papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic problems.




Transaction Processing on Modern Hardware


Book Description

The last decade has brought groundbreaking developments in transaction processing. This resurgence of an otherwise mature research area has spurred from the diminishing cost per GB of DRAM that allows many transaction processing workloads to be entirely memory-resident. This shift demanded a pause to fundamentally rethink the architecture of database systems. The data storage lexicon has now expanded beyond spinning disks and RAID levels to include the cache hierarchy, memory consistency models, cache coherence and write invalidation costs, NUMA regions, and coherence domains. New memory technologies promise fast non-volatile storage and expose unchartered trade-offs for transactional durability, such as exploiting byte-addressable hot and cold storage through persistent programming that promotes simpler recovery protocols. In the meantime, the plateauing single-threaded processor performance has brought massive concurrency within a single node, first in the form of multi-core, and now with many-core and heterogeneous processors. The exciting possibility to reshape the storage, transaction, logging, and recovery layers of next-generation systems on emerging hardware have prompted the database research community to vigorously debate the trade-offs between specialized kernels that narrowly focus on transaction processing performance vs. designs that permit transactionally consistent data accesses from decision support and analytical workloads. In this book, we aim to classify and distill the new body of work on transaction processing that has surfaced in the last decade to navigate researchers and practitioners through this intricate research subject.




The Semantic Web


Book Description

Chapters “No. 10 and No. 21” are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.




Data Hiding Techniques in Windows OS


Book Description

- "This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run's on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can see this book siting on the shelves of Cyber Security Professionals, and those working in the world of Digital Forensics – it is a recommended read, and is in my opinion a very valuable asset to those who are interested in the landscape of unknown unknowns. This is a book which may well help to discover more about that which is not in immediate view of the onlooker, and open up the mind to expand its imagination beyond its accepted limitations of known knowns." - John Walker, CSIRT/SOC/Cyber Threat Intelligence Specialist - Featured in Digital Forensics Magazine, February 2017 In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files. Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows® machine to conceal their private data. Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques. Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world. Computer forensic investigators, law enforcements officers, intelligence services and IT security professionals need a guide to tell them where criminals can conceal their data in Windows® OS & multimedia files and how they can discover concealed data quickly and retrieve it in a forensic way. Data Hiding Techniques in Windows OS is a response to all these concerns. Data hiding topics are usually approached in most books using an academic method, with long math equations about how each hiding technique algorithm works behind the scene, and are usually targeted at people who work in the academic arenas. This book teaches professionals and end users alike how they can hide their data and discover the hidden ones using a variety of ways under the most commonly used operating system on earth, Windows®.




IBM XIV Storage System Business Continuity Functions


Book Description

The IBM XIV® Storage System has a rich set of copy functions suited for various data protection scenarios that enable you to enhance your business continuance, disaster recovery, data migration, and online backup solutions. These functions allow point-in-time copies, known as snapshots and full volume copies, and also include remote copy capabilities in either synchronous or asynchronous mode. A three-site mirroring function is now available to further improve availability and disaster recovery capabilities. These functions are included in the XIV software and all their features are available at no extra charge. The various copy functions are reviewed in separate chapters, which include detailed information about usage and practical illustrations. The book also illustrates the use of IBM® Tivoli® Storage Productivity Center for Replication to manage XIV Copy Services. This IBM Redbooks® publication is intended for anyone who needs a detailed and practical understanding of the XIV copy functions.