Products related to Virtualization:
-
Social Commerce : Marketing, Technology and Management
This is a multidisciplinary textbook on social commerce by leading authors of e-commerce and e-marketing textbooks, with contributions by several industry experts.It is effectively the first true textbook on this topic and can be used in one of the following ways:Textbook for a standalone elective course at the undergraduate or graduate levels (including MBA and executive MBA programs)Supplementary text in marketing, management or Information Systems disciplines Training courses in industrySupport resources for researchers and practitioners in the fields of marketing, management and information managementThe book examines the latest trends in e-commerce, including social businesses, social networking, social collaboration, innovations and mobility.Individual chapters cover tools and platforms for social commerce; supporting theories and concepts; marketing communications; customer engagement and metrics; social shopping; social customer service and CRM contents; the social enterprise; innovative applications; strategy and performance management; and implementing social commerce systems.Each chapter also includes a real-world example as an opening case; application cases and examples; exhibits; a chapter summary; review questions and end-of-chapter exercises.The book also includes a glossary and key terms, as well as supplementary materials that include PowerPoint lecture notes, an Instructor’s Manual, a test bank and five online tutorials.
Price: 59.99 £ | Shipping*: 0.00 £ -
Services Marketing: People, Technology, Strategy (Ninth Edition)
Services Marketing: People, Technology, Strategy is the ninth edition of the globally leading textbook for Services Marketing by Jochen Wirtz and Christopher Lovelock, extensively updated to feature the latest academic research, industry trends, and technology, social media, and case examples.This book takes on a strong managerial approach presented through a coherent and progressive pedagogical framework rooted in solid academic research.It features cases and examples from all over the world and is suitable for students who want to gain a wider managerial view.
Price: 55.00 £ | Shipping*: 0.00 £ -
Integrated Security Technologies and Solutions - Volume II : Cisco Security Solutions for Network Access Control, Segmentation, Context Sharing, Secure Connectivity and Virtualization
The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization Integrated Security Technologies and Solutions – Volume II brings together more expert-level instruction in security design, deployment, integration, and support.It will help experienced security and network professionals manage complex solutions, succeed in their day-to-day jobs, and prepare for their CCIE Security written and lab exams. Volume II focuses on the Cisco Identity Services Engine, Context Sharing, TrustSec, Application Programming Interfaces (APIs), Secure Connectivity with VPNs, and the virtualization and automation sections of the CCIE v5 blueprint.Like Volume I, its strong focus on interproduct integration will help you combine formerly disparate systems into seamless, coherent, next-generation security solutions. Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint.Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting. Review the essentials of Authentication, Authorization, and Accounting (AAA) Explore the RADIUS and TACACS+ AAA protocols, and administer devices with them Enforce basic network access control with the Cisco Identity Services Engine (ISE) Implement sophisticated ISE profiling, EzConnect, and Passive Identity features Extend network access with BYOD support, MDM integration, Posture Validation, and Guest Services Safely share context with ISE, and implement pxGrid and Rapid Threat Containment Integrate ISE with Cisco FMC, WSA, and other devices Leverage Cisco Security APIs to increase control and flexibility Review Virtual Private Network (VPN) concepts and types Understand and deploy Infrastructure VPNs and Remote Access VPNs Virtualize leading Cisco Security products Make the most of Virtual Security Gateway (VSG), Network Function Virtualization (NFV), and microsegmentation
Price: 59.99 £ | Shipping*: 0.00 £ -
Internet Strategy : The Road to Web Services Solutions
Internet Strategy: The Road to Web Services Solutions reminds readers that several attempts have been made to convince the world that DOT.COM was developed to take over businesses, and the traditional way of creating businesses and running organizations would be condemned to the past.One of those attempts led to the Application Service Provision model, from which the current Web Services business model takes its origins.As organizations start to carefully invest again, ""Internet Strategy: The Road to Web Services Solutions"" shows that the focus is on delivering value and enabling growth.The book concentrates on how to create, execute and evolve a customer-centric strategy of any Internet-based management strategy in order to provide valuable customer experiences. ""Internet Strategy: The Road to Web Services Solutions"" presents how enabling technologies are as important as ever.It points out that there's a need to move to new levels in thinking and execution, to help organizations maintain cost efficiencies and enable growth in revenues and profitability.
Price: 89.95 £ | Shipping*: 0.00 £ -
Radio Access Network Slicing and Virtualization for 5G Vertical Industries
Learn how radio access network (RAN) slicing allows 5G networks to adapt to a wide range of environments in this masterful resource Radio Access Network Slicing and Virtualization for 5G Vertical Industriesprovides readers with a comprehensive and authoritative examination of crucial topics in the field of radio access network (RAN) slicing.Learn from renowned experts as they detail how this technology supports and applies to various industrial sectors, including manufacturing, entertainment, public safety, public transport, healthcare, financial services, automotive, and energy utilities. Radio Access Network Slicing and Virtualization for 5G Vertical Industries explains how future wireless communication systems must be built to handle high degrees of heterogeneity, including different types of applications, device classes, physical environments, mobility levels, and carrier frequencies.The authors describe how RAN slicing can be utilized to adapt 5G technologies to such wide-ranging circumstances. The book covers a wide range of topics necessary to understand RAN slicing, including: Physical waveforms designMultiple service signals coexistenceRAN slicing and virtualizationApplications to 5G vertical industries in a variety of environments This book is perfect for telecom engineers and industry actors who wish to identify realistic and cost-effective concepts to support specific 5G verticals.It also belongs on the bookshelves of researchers, professors, doctoral, and postgraduate students who want to identify open issues and conduct further research.
Price: 103.95 £ | Shipping*: 0.00 £ -
E-Commerce Business through Social Media Marketing : Simple Steps to Start your E-Commerce Brand/Company through Facebook and Instagram Marketing
Are you confused about what kind of marketing strategy you should invest in?,Do you also have a limited marketing budget and want to spend it wisely?,If answers to the above questions are YES, I have found a really wise way to spend your limited marketing budget and, in return, gain a really impressive marketing method through social media. The use of social media platforms to interact with your audience in order to develop your brand, boost sales, and drive website traffic is known as social media marketing. Publishing excellent content, listening to and interacting with your followers, evaluating your outcomes, and executing social advertising are all part of this process. Over time, the idea of social media marketing has changed. The primary aim of utilizing social media platforms a few years ago was to increase website traffic. It has evolved into much more than simply a platform for content distribution.Social media marketing gives you access to tools and strategies that make it simple to reach out to a new audience. You may utilize material on Facebook and other social media sites to interact with prospective customers and warm them up. While it may be difficult to attract people's attention, interesting material can help you stand out. Rethink your perception of social media marketing as only about selling and advertising. To create long-term connections, successful businesses interact and engage with their social media consumers.In this book, you will learn about the following topics in detail:Basic Understanding of Ecommerce,How to Build Your Own Ecommerce Business?,What is Ecommerce Marketing?,How can You Market Your Ecommerce Business through Facebook and Instagram?,So, do not waste your time and get this book now!!!
Price: 18.99 £ | Shipping*: 3.99 £ -
Building Services, Technology and Design
Building Services, Technology and Design provides a concise guide to the installation and design of principal services in domestic and commercial buildings.It covers the level 2 module of The CIOB's Education Framework and is officially sanctioned by the CIOB as the recognised text for that module.The book combines theory, design and application in one volume and is supported throughout with illustrations, design examples, tables and charts. Services covered include: cold and hot water; heating; ventilation; air conditioning; gas; electricity; security; fire control; sanitation; drainage and transport systems. Building Services, Technology and Design is a core text for the CIOB level 2 module, as well as BTEC HNC/D building studies and degree courses in building.It is also an essential reference for all members of the facilities management and construction industry.
Price: 71.99 £ | Shipping*: 0.00 £ -
Building Services, Technology and Design
Building Services, Technology and Design provides a concise guide to the installation and design of principal services in domestic and commercial buildings.It covers the level 2 module of The CIOB's Education Framework and is officially sanctioned by the CIOB as the recognised text for that module.The book combines theory, design and application in one volume and is supported throughout with illustrations, design examples, tables and charts. Services covered include: cold and hot water; heating; ventilation; air conditioning; gas; electricity; security; fire control; sanitation; drainage and transport systems. Building Services, Technology and Design is a core text for the CIOB level 2 module, as well as BTEC HNC/D building studies and degree courses in building.It is also an essential reference for all members of the facilities management and construction industry.
Price: 120.00 £ | Shipping*: 0.00 £
Similar search terms for Virtualization:
-
Which virtualization?
There are several types of virtualization, including server virtualization, desktop virtualization, network virtualization, and storage virtualization. Each type serves a different purpose and has its own set of benefits. Server virtualization allows multiple virtual servers to run on a single physical server, increasing efficiency and reducing costs. Desktop virtualization enables users to access their desktop environment from any device. Network virtualization abstracts network resources to create a virtual network that can be customized and managed independently. Storage virtualization pools physical storage from multiple devices into a single virtual storage unit for easier management and scalability.
-
How can I disable the virtualization technology in the BIOS?
To disable virtualization technology in the BIOS, you will need to access the BIOS settings during the computer's startup process. This is typically done by pressing a specific key (such as F2, F10, or Del) as the computer boots up. Once in the BIOS settings, look for an option related to virtualization technology (often labeled as Intel VT-x or AMD-V) and disable it. Save the changes and exit the BIOS settings to apply the changes. Keep in mind that the exact steps may vary depending on the manufacturer and model of your computer.
-
Where is virtualization used?
Virtualization is used in various industries and settings, including data centers, cloud computing environments, software development, and testing environments. It is also commonly used in server consolidation, allowing multiple virtual servers to run on a single physical server, reducing hardware costs and improving resource utilization. Additionally, virtualization is used in disaster recovery solutions, enabling organizations to quickly recover and restore systems in case of a failure.
-
What is hardware virtualization?
Hardware virtualization is the process of creating a virtual version of a physical computer system. This is achieved by using a hypervisor, which is a software that allows multiple operating systems to run on a single physical machine. Hardware virtualization enables the efficient use of physical resources by allowing multiple virtual machines to run on a single physical server, leading to cost savings and improved flexibility in managing IT infrastructure. It also provides isolation between virtual machines, allowing them to run independent of each other.
-
What is UAC virtualization?
UAC virtualization, also known as User Account Control virtualization, is a feature in Windows operating systems that allows legacy applications to run in a limited user environment without requiring administrative privileges. When a legacy application attempts to write to a protected system location, UAC virtualization redirects the write operation to a virtualized location within the user's profile, allowing the application to function without compromising system security. This helps to maintain system integrity and security while still allowing older applications to run on newer versions of Windows.
-
What is CPU virtualization?
CPU virtualization is the process of creating multiple virtual instances of a physical CPU, allowing multiple operating systems and applications to run simultaneously on a single physical machine. This technology enables better utilization of hardware resources, improved flexibility, and cost savings by reducing the need for multiple physical servers. CPU virtualization is a key component of cloud computing and is commonly used in data centers to optimize server performance and resource allocation.
-
Windows or macOS for web design/web development?
Both Windows and macOS are viable options for web design and development. Windows is known for its compatibility with a wide range of software and hardware, making it a popular choice for developers. On the other hand, macOS is preferred by many designers for its sleek interface and seamless integration with other Apple products. Ultimately, the choice between Windows and macOS comes down to personal preference and the specific tools and software you prefer to use for your web design and development projects.
-
Is virtualization with Bluestacks dangerous?
Virtualization with Bluestacks is not inherently dangerous. Bluestacks is a legitimate Android emulator that allows users to run Android apps on their computers. However, as with any software, there may be potential security risks associated with virtualization, such as the possibility of malware or other security vulnerabilities. It is important for users to download Bluestacks from a reputable source and to keep their virtualization software and operating system up to date with the latest security patches to minimize any potential risks.
* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.