Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • 2020-2024  (26)
  • Fleishman, Glenn  (15)
  • Gucer, Vasfi  (11)
  • Electronic books  (26)
  • Zeitschriften zur Ethnologie
Datenlieferant
Materialart
Sprache
Erscheinungszeitraum
Jahr
  • 1
    Online-Ressource
    Online-Ressource
    [Place of publication not identified] : Take Control Books
    Sprache: Englisch
    Seiten: 1 online resource (254 pages) , illustrations
    Ausgabe: Second edition.
    DDC: 004.6
    Schlagwort(e): Zoom (Electronic resource) ; Digital communications ; Internet videoconferencing ; Transmission numérique ; Visioconférences sur Internet ; Digital communications ; Internet videoconferencing ; Electronic books
    Kurzfassung: Take your videoconferencing skills from zero to Zoom! Version 2.1, updated January 31, 2022 The rise of Zoom during the pandemic has made many of us comfortable with this popular videoconferencing software. But the differences in Zoom from one platform to the next, the long list of complex features, and a constant stream of updates make it challenging to master. Take Control of Zoom, Second Edition provides a comprehensive look at Zoom from start to finish. Beginners will learn everything they need to get started, while more advanced users will sharpen their skills and discover new tricks. Everyone will benefit from extensive details on privacy and security. Many of us rarely touched a video chat or videoconferencing tool until the pandemic hit. Now, we videoconference daily (or more often) for all sorts of reasons--we've gone from zero to Zoom! Despite Zoom's broad adoption, users sometimes struggle to keep up with its features and interface. Zoom changes constantly, and often spreads useful features across several places. This new edition of the book covers all the latest changes and the differences among platforms. You'll learn which Zoom app to use, how to configure your account and app even before your first meeting, how to work in Zoom views and chat in a meeting, and how to create and manage your own meetings. The book also covers how to share your screen, make presentations with PowerPoint or Keynote, annotate shared images, record audio and video, use full-screen mode and multiple displays, and work with machine-learning transcription and captioning. You also learn about virtual cameras--software like Camo, mmHmm, OBS, and Zoom's built-in Slides as Virtual Background feature--that can take one or more media sources--still images, video, animation, app windows, and sometimes more--and mix into a camera feed you can simply select and broadcast as a host or participant in Zoom. This book provides comprehensive advice and directions on planning a meeting, starting it up, and managing it, including running polls and setting up and using breakout rooms. It also provides extensive insight into keeping meetings safe, and warning or removing problematic participants. But what about privacy and security? Since early 2020, Zoom has fixed bugs, promised improvements and delivered them, and come clean about where it fell short. The book covers the current state of Zoom security and privacy, including an end-to-end encryption (E2EE) preview available to all hosts. You can find out how E2EE works, Zoom's implementation of it, how to enable it, and how to make sure your E2EE session remains free of snoopers. Topics include: How to install and configure Zoom Choosing whether or when to use the Zoom web app Configuring your physical setup and hardware for best audio and video quality Mastering meeting participation, including the various methods of "speaking up" Zoom's many mobile and desktop views for seeing other people and shared screens The best ways to present using PowerPoint and Keynote Finding the best combination of screens and devices to manage each of your presentations Becoming a host and starting meetings with one other person or 1,000 Conducting polls and managing breakout rooms Using automatic transcription and captioning features How to preserve your privacy when sharing apps, presentations, or other parts of your screen Recording a meeting for later playback, presentation, or a podcast Deciding whether to upgrade to a paid Zoom tier for meetings you host Zoom's security options, including end-to-end encryption How co-host and alternate host roles work in managing a meeting.
    Anmerkung: Online resource; title from title details screen (O’Reilly, viewed February 23, 2022)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    [Place of publication not identified] : alt concepts
    ISBN: 9781990783029 , 1990783023
    Sprache: Englisch
    Seiten: 1 online resource (105 pages) , illustrations
    Ausgabe: [First edition].
    Serie: Take control
    DDC: 004.6
    Schlagwort(e): Computer networks Equipment and supplies ; Telecommunication Equipment and supplies ; Télécommunications ; Équipement ; Electronic books
    Kurzfassung: Frustrated with your peripheral cables? Tangled up in standards and compatibility? Glenn Fleishman figuratively cuts through the mess of ports, cables, and protocols with his new book, Take Control of Untangling Connections. The book sets out to answer the most common questions and troubleshoot frequently occurring problems. You’ll learn how to buy the best cable, identify the cables you have, and recognize and research ports. You get all the answers on how to connect USB, Thunderbolt, Ethernet, DisplayPort, HDMI, and audio at the fastest, best, or highest-fidelity method available. We spend our lives plugging stuff into our computers, smartphones, tablets, and other hardware. Why is it so hard to make it all work as we expect? Glenn Fleishman knows the answer to this: standards don’t develop in lock step, and whenever anything is out of sync, we wind up with frustration. He also knows the questions! As a writer about all things Apple for decades, he has used multiple generations of interface and connection standards, and he reads hundreds of questions a months from readers wrestling with their gear. Take Control of Untangling Connections is his attempt to put power (and video and data and more) back in your hands by helping you cut through cable clutter and confusion and find the right plug for the right jack—and the right cable. The book covers data networking with USB, Thunderbolt, and Ethernet; audio and video over DisplayPort, HDMI, and USB-C; and all the ins and outs of recognizing ports, researching your requirements, and finding or buying the right cables, adapters, and converters. There’s even a chapter on physical decluttering: how to organize your cables in your home and office.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    ISBN: 9780738460307 , 0738460303
    Sprache: Englisch
    Seiten: 1 online resource (62 pages) , illustrations
    Ausgabe: First edition.
    Serie: IBM redbooks
    DDC: 005.74
    Schlagwort(e): Computer storage devices ; Information storage and retrieval systems ; Database management ; Information technology Management ; Computer Storage Devices ; Information Systems ; Ordinateurs ; Mémoires ; Systèmes d'information ; Bases de données ; Gestion ; Technologie de l'information ; Gestion ; Electronic books
    Kurzfassung: Safeguarded Copy function that is available with IBM® Spectrum Virtualize Version 8.4.2 supports the ability to create cyber-resilient point-in-time copies of volumes that cannot be changed or deleted through user errors, malicious actions, or ransomware attacks. The system integrates with IBM Copy Services Manager to provide automated backup copies and data recovery. This IBM Redpaper® publication introduces the features and functions of Safeguarded Copy function by using several examples. This document is aimed at pre-sales and post-sales technical support specialists and storage administrators.
    Anmerkung: Includes bibliographical references
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    ISBN: 9780738460451 , 0738460451
    Sprache: Englisch
    Seiten: 1 online resource (162 pages) , illustrations
    Ausgabe: First edition.
    Serie: IBM redbooks
    DDC: 005.74
    Schlagwort(e): Database management Computer programs ; Information storage and retrieval systems ; Cloud computing ; Database Management Systems ; Information Systems ; Bases de données ; Gestion ; Logiciels ; Systèmes d'information ; Infonuagique ; Cloud computing ; Database management ; Computer programs ; Information storage and retrieval systems ; Electronic books
    Kurzfassung: IBM® Spectrum Virtualize for Public Cloud is now available on Microsoft Azure. With IBM Spectrum® Virtualize for Public Cloud 8.4.3, users can deploy a highly available two-node cluster running IBM Spectrum Virtualize for Public Cloud on supported Microsoft Azure virtual machines (VMs). This all-inclusive, bring your own license (BYOL) software offering provides the ability to virtualize, optimize, and provision supported Azure Managed Disk to applications that require the performance of block storage in the cloud with the added efficiencies that IBM Spectrum Virtualize for Public Cloud brings to native infrastructure as a service (IaaS) that is provided by Microsoft Azure. This IBM Redbooks publication gives a broad understanding of the IBM Spectrum Virtualize for Public Cloud on Azure architecture. It also provides planning and implementation details of the common use cases for this new product. This book helps storage and networking administrators plan, implement, install, and configure the IBM Spectrum Virtualize for Public Cloud on Azure offering. It also provides valuable troubleshooting tips.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    Saskatoon, Canada : alt concepts
    ISBN: 9781990783074 , 1990783074
    Sprache: Englisch
    Seiten: 1 online resource (183 pages) , illustrations
    Ausgabe: [First edition].
    DDC: 004.1675
    Schlagwort(e): iPhone (Smartphone) Mobile apps ; Text messaging (Cell phone systems) ; Electronic books
    Kurzfassung: Dig into FaceTime, Messages, and Phone from the basics through the most advanced and interesting features available, including screen sharing, group calls, and sending rich messages in Take Control of FaceTime and Messages. This comprehensive book will answer every question, and reveal useful features you never knew existed. FaceTime, Messages, and Phone form the core of Apple’s video, texting, and call tools for owners of iPhones, iPads, Macs, and Apple Watches. As FaceTime and Messages have expanded features, they’ve become more complicated to master and use exactly the way you want. How they interact with the phone network and the Phone app can be a blurry line, too. In this book, Glenn Fleishman lays out your options to best understand, use, and customize FaceTime and Messages for your needs and conversations. Start by mastering (or reviewing) the basics of each app, then move into group calls and texts, using rich media, maintaining your privacy, and adding whimsy to conversations. Covers iOS, iPadOS, macOS, and watchOS.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    ISBN: 9780738460581 , 0738460583
    Sprache: Englisch
    Seiten: 1 online resource (44 pages) , illustrations
    Ausgabe: [First edition].
    DDC: 005.8/6
    Schlagwort(e): Computer storage devices ; Virtual computer systems ; Computer storage devices ; Virtual computer systems ; Electronic books
    Kurzfassung: This IBM® Redpaper Product Guide describes the IBM SAN Volume Controller model SV3 solution, which is a next-generation IBM SAN Volume Controller. Built with IBM Spectrum® Virtualize software and part of the IBM Spectrum Storage family, IBM SAN Volume Controller is an enterprise-class storage system. It helps organizations achieve better data economics by supporting the large-scale workloads that are critical to success. Data centers often contain a mix of storage systems. This situation can arise as a result of company mergers or as a deliberate acquisition strategy. Regardless of how they arise, mixed configurations add complexity to the data center. Different systems have different data services, which make it difficult to move data from one to another without updating automation. Different user interfaces increase the need for training and can make errors more likely. Different approaches to hybrid cloud complicate modernization strategies. Also, many different systems mean more silos of capacity, which can lead to inefficiency. To simplify the data center and to improve flexibility and efficiency in deploying storage, enterprises of all types and sizes turn to IBM SAN Volume Controller, which is built with IBM Spectrum Virtualize software. This software simplifies infrastructure and eliminates differences in management, function, and even hybrid cloud support. IBM SAN Volume Controller introduces a common approach to storage management, function, replication, and hybrid cloud that is independent of storage type. It is the key to modernizing and revitalizing your storage, but is as easy to understand. IBM SAN Volume Controller provides a rich set of software-defined storage (SDS) features that are delivered by IBM Spectrum Virtualize, including the following examples:
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    ISBN: 9780738460604 , 0738460605
    Sprache: Englisch
    Seiten: 1 online resource (66 pages) , illustrations
    Ausgabe: [First edition].
    DDC: 005.74
    Schlagwort(e): Computer storage devices ; Information storage and retrieval systems ; Database management ; Information technology Management ; Electronic books
    Kurzfassung: This IBM® Redpaper Product Guide describes the IBM FlashSystem® 7300 solution, which is a next-generation IBM FlashSystem control enclosure. It combines the performance of flash and a Non-Volatile Memory Express (NVMe)-optimized architecture with the reliability and innovation of IBM FlashCore® technology and the rich feature set and high availability (HA) of IBM Spectrum® Virtualize. To take advantage of artificial intelligence (AI)-enhanced applications, real-time big data analytics, and cloud architectures that require higher levels of system performance and storage capacity, enterprises around the globe are rapidly moving to modernize established IT infrastructures. However, for many organizations, staff resources, and expertise are limited, and cost-efficiency is a top priority. These organizations have important investments in existing infrastructure that they want to maximize. They need enterprise-grade solutions that optimize cost-efficiency while simplifying the pathway to modernization. IBM FlashSystem 7300 is designed specifically for these requirements and use cases. It also delivers a cyber resilience without compromising application performance.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    ISBN: 9780738460314
    Sprache: Englisch
    Seiten: 1 online resource (638 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books
    Kurzfassung: This IBM® Redbooks® publication captures several of the preferred practices and describes the performance gains that can be achieved by implementing the IBM FlashSystem® products that are powered by IBM Spectrum® Virtualize Version 8.4.2. These practices are based on field experience. This book highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools and managed disks, volumes, Remote Copy services, and hosts. It explains how you can optimize disk performance with the IBM System Storage Easy Tier® function. It also provides preferred practices for monitoring, maintaining, and troubleshooting. This book is intended for experienced storage, SAN, IBM FlashSystem, SAN Volume Controller, and IBM Storwize® administrators and technicians. Understanding this book requires advanced knowledge of these environments.
    Anmerkung: Online resource; Title from title page (viewed February 2, 2022) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    ISBN: 9780738460291
    Sprache: Englisch
    Seiten: 1 online resource (640 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books
    Kurzfassung: This IBM® Redbooks® publication captures several of the preferred practices and describes the performance gains that can be achieved by implementing the IBM SAN Volume Controller powered by IBM Spectrum® Virtualize Version 8.4.2. These practices are based on field experience. This book highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools and managed disks, volumes, Remote Copy services and hosts. It explains how you can optimize disk performance with the IBM System Storage Easy Tier® function. It also provides preferred practices for monitoring, maintaining, and troubleshooting. This book is intended for experienced storage, SAN, IBM FlashSystem®, IBM SAN Volume Controller, and IBM Storwize® administrators and technicians. Understanding this book requires advanced knowledge of these environments.
    Anmerkung: Online resource; Title from title page (viewed January 17, 2022) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Online-Ressource
    Online-Ressource
    [Place of publication not identified] : Take Control Books
    Sprache: Englisch
    Seiten: 1 online resource (283 pages) , illustrations
    Ausgabe: Second edition.
    DDC: 005.4/46
    Schlagwort(e): iOS (Electronic resource) ; Mobile computing Security measures ; iPhone (Smartphone) Security measures ; iPad (Computer) Security measures ; iOS (Electronic resource) ; Informatique mobile ; Sécurité ; Mesures ; iPhone (Téléphone intelligent) ; Sécurité ; Mesures ; iPad (Ordinateur) ; Sécurité ; Mesures ; Electronic books
    Kurzfassung: Master networking, privacy, and security for iOS and iPadOS! Version 2.1.1, updated January 17, 2022 Ensuring that your iPhone or iPad's data remains secure and in your control and that your private data remains private isn't a battle--if you know what boxes to check and how to configure iOS and iPadOS to your advantage. Take Control of iOS & iPadOS Privacy and Security takes you into the intricacies of Apple's choices when it comes to networking, data sharing, and encryption. Updated for iOS 15 and iPadOS 15! Your iPhone and iPad have become the center of your digital identity, and it's easy to lose track of all the ways in which Apple and other parties access your data legitimately--or without your full knowledge and consent. While Apple nearly always errs on the side of disclosure and permission, many other firms don't. This book comprehensively explains how to configure iOS 15 and iPadOS 15 to best protect your privacy while messaging, email, browsing, and much more, and how to ensure your devices and data are secure from intrusion. Take Control of iOS & iPadOS Privacy and Security covers how to configure the hundreds of privacy and data sharing settings Apple offers in iOS and iPadOS, and which it mediates for third-party apps. You'll learn how Safari has been increasingly hardened to protect your web surfing habits, personal data, and identity--particularly with the addition of the iCloud Private Relay, an option for iCloud+ subscribers to anonymize their Safari browsing. In addition to privacy and security, this book also teachers you everything you need to know about networking, whether you're using cellular, Wi-Fi, Bluetooth, or combinations of all of them, as well as about AirDrop, AirPlay, Airplane Mode, and Personal Hotspot and tethering. You'll learn how to: Master all the options for a Personal Hotspot for yourself and in a Family Sharing group. Troubleshoot problematic Wi-Fi connections. Set up a device securely from the moment you power up a new or newly restored iPhone or iPad. Manage Apple's new built-in second factor verification code generator for extra-secure website and app logins. Protect your email by using an address Apple manages and relays messages through for you. Understand Safari's blocking techniques and how to review websites' attempts to track you. Anticipate Apple's potentially privacy-challenging changes designed to improve the safety of children, both those using Apple hardware and those who suffering abuse. Optimize cellular data use to avoid throttling or overage charges, while always getting the best throughput. Understand why Apple might ask for your iPhone, iPad, or Mac password when you log in on a new device using two-factor authentication. Share a Wi-Fi password with nearby contacts and via a QR Code. Differentiate between encrypted data sessions and end-to-end encryption. Stream music and video to other devices with AirPlay 2. Deter brute-force cracking by relying on a USB Accessories timeout. Configure Bluetooth devices. Transfer files between iOS and macOS with AirDrop. Block creeps from iMessage, FaceTime, text messages, and phone calls. Secure your data in transit with a Virtual Private Network (VPN) connection. Protect Apple ID account and iCloud data from unwanted access.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 11
    Online-Ressource
    Online-Ressource
    [Place of publication not identified] : Take Control Books
    Sprache: Englisch
    Seiten: 1 online resource (138 pages) , illustrations
    Ausgabe: Third edition.
    DDC: 004.165
    Schlagwort(e): Apple Computer, Inc ; Computers Access control ; Passwords ; Apple Computer, Inc ; Ordinateurs ; Accès ; Contrôle ; Mots de passe ; Computers ; Access control ; Passwords ; Electronic books
    Kurzfassung: Prevent (or solve) problems with your Apple ID! Version 3.2, updated January 17, 2022 This book covers everything someone needs to know about configuring an Apple ID account, interactions with iCloud-based services, and troubleshooting account access. Your Apple ID is much more than a simple username. It's a key that unlocks a long list of Apple products and services on any of numerous devices. iCloud uses an Apple ID, as does Apple Music; the App Store; the Music, TV, and Books apps; and more. An Apple ID protects your personal information, including email and iOS/iPadOS backups; helps you find a lost iPhone; and can even unlock your Mac. So it goes without saying that if something goes wrong with your Apple ID, you could be in for a world of hurt. Unfortunately, things go wrong with Apple IDs all the time. Fortunately, Glenn Fleishman, a veteran technology journalist and the author of Macworld's "Mac 911" column, is ready to help with expert advice on how to manage your Apple ID--including how to prevent, solve, or work around most common problems! In this book, Glenn answers questions like: What all is my Apple ID used for? How does my iCloud account relate to my Apple ID? What problems can two-factor authentication (2FA) solve, and how do I use it? Are there other mechanisms I can use to ensure that I can recover an Apple ID in the event of a problem? (Spoiler: yes!) What if I have a device that's too old to work with two-factor authentication? What should I do if I have two or more Apple IDs or iCloud accounts? Will I lose access to all my Apple media purchases if I move to another country? Can I share an Apple ID with someone else? What exactly should I do if I think someone is hacking my Apple ID account? How can I recover a forgotten Apple ID password? What steps should I take if Apple locks me out of my account? If I lose access to an email address associated with my Apple ID, what can I do? What Apple ID changes in iOS 15/iPadOS 15 and macOS 12 Monterey do I need to know about? How does "Sign in with Apple" work? How can I use Family Sharing to share data and purchases within my family? What types of subscriptions can I manage with my Apple ID, and how? Which payment methods can I associate with my Apple ID, and how do I manage them? And that's just the beginning. Glenn has packed a remarkable amount of concise problem-solving information into this compact book. Read it before you encounter Apple ID problems to minimize your risk, and if you've already encountered a problem, read it to find the best path to a rapid solution.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 12
    ISBN: 9780738460598 , 0738460591
    Sprache: Englisch
    Seiten: 1 online resource (68 pages) , illustrations
    Ausgabe: [First edition].
    DDC: 005.74
    Schlagwort(e): Computer storage devices ; Information storage and retrieval systems ; Database management ; Information technology Management ; Computer storage devices ; Database management ; Information storage and retrieval systems ; Information technology ; Management ; Electronic books
    Kurzfassung: This IBM® Redpaper® Product Guide describes the IBM FlashSystem® 9500 solution, which is a next-generation IBM FlashSystem control enclosure. It combines the performance of flash and a Non-Volatile Memory Express (NVMe)-optimized architecture with the reliability and innovation of IBM FlashCore® technology and the rich feature set and high availability (HA) of IBM Spectrum® Virtualize. Often, applications exist that are foundational to the operations and success of an enterprise. These applications might function as prime revenue generators, guide or control important tasks, or provide crucial business intelligence, among many other jobs. Whatever their purpose, they are mission critical to the organization. They demand the highest levels of performance, functionality, security, and availability. They also must be protected against the modern scourge, cyberattacks. To support such mission-critical applications, enterprises of all types and sizes turn to the IBM FlashSystem 9500. With the release of IBM Spectrum Virtualize V8.5, extra functions and features are available, including support for new third-generation IBM FlashCore Modules NVMe-type drives within the control enclosure, and 100 Gbps Ethernet adapters that provide NVMe Remote Direct Memory Access (RDMA) options. New software features include GUI enhancements and security enhancements, including multifactor authentication (MFA) and single sign-on (SSO), and Fibre Channel (FC) portsets.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 13
    ISBN: 9781990783166 , 1990783163
    Sprache: Englisch
    Seiten: 1 online resource (166 pages) , illustrations
    Ausgabe: Fourth edition.
    Serie: Take control
    DDC: 004.167
    Schlagwort(e): iOS (Electronic resource) ; Apple computer Programming ; Scheduling Computer programs ; Mobile computing ; Electronic books
    Kurzfassung: Manage your schedule more effectively using Calendar and Reminders! Learn how to unlock the full potential of Apple’s Calendar and Reminders! Take Control of Calendar and Reminders helps you get the most out of these apps, showing you how to customize them, sync data across devices, and share meeting invitations and reminder lists. You’ll also learn how to use Siri as a shortcut and how to fix common problems. In the days before personal computers and mobile devices, we had to rely on paper calendars and to-do lists to help us organize our time and activities. Now, we have powerful tools, like Apple’s Calendar and Reminders, that are much more responsive to our needs. Put an event on your schedule, invite others to join, or set yourself an alarm (or more than one). Or, keep a list of to-do items, add to it and view it on all your Apple devices, and share your list with family or friends. This book was originally written by veteran Mac journalist and editor Scholle McFarland, and the fourth edition was updated by Glenn Fleishman. Scholle and Glenn guide you through getting to know these incredibly helpful apps, including lesser-known (but handy) features. For example, did you know that in Calendar you can set an alert for when you need to leave for an event, based on the travel time calculated using the location you entered for the event? Or that Reminders can prompt you to do something not only at a certain time, but also once you’ve reached a specific destination, like the grocery store? If you’ve never taken the opportunity to explore Calendar and Reminders, this book will show you how to make them an important part of your daily routine. If you’ve already been using Calendar and Reminders, you’ll learn how to use them more effectively, troubleshoot common problems, and delve deeper into their capabilities. This fully revised fourth edition is now up to date with macOS 13 Ventura, iOS 16/iPadOS 16, and watchOS 9 (as well as covering the previous version of each operating system), and it has been expanded with new topics and additional tips.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 14
    Online-Ressource
    Online-Ressource
    Saskatoon, Canada : Take Control Books
    ISBN: 9781990783012 , 1990783015
    Sprache: Englisch
    Seiten: 1 online resource (106 pages) , color illustrations
    Ausgabe: [First edition].
    DDC: 004.165
    Schlagwort(e): Macintosh (Computer) ; Electronic data processing Backup processing alternatives ; Operating systems (Computers) ; Electronic books
    Kurzfassung: Make a smooth transition to Apple silicon Version 1.5, updated August 26, 2022 This book teaches you everything you need to know about hardware and related software changes in Apple's new M1- and M2-series Apple silicon Macs to make a transition from an Intel Mac, set up security with new options, create effective backups, and work with new options in recovery mode. Glenn Fleishman takes you through the details of how an M-series Mac handles startup, battery management, and running iOS, iPadOS, and Windows apps. Covers the 2020-22 Apple M1- and M2-series Macs: the Mac mini, MacBook Air, 13-inch MacBook Pro, 24-inch iMac, 14-inch and 16-inch MacBook Pro models (featuring the M1 Pro or M1 Max chip), and the Mac Studio (with the M1 Max or M1 Ultra chip). Apple's new Macs based on the M1- and M2-series Apple silicon system-on-a-chip offer remarkable advances in performance, battery life, and memory utilization. With those improvements comes a host of changes in hardware, from how a Mac starts up to making backups of your computer to understanding fundamental aspects of system security. Take Control of Your M-Series Mac teaches you everything you need to know about these topics and much more. You'll learn not just how to make a bootable clone of your Mac on an external drive, but whether it's necessary with Monterey or Big Sur and an M1- or M2-series Mac. Find out how to make a clean transition from an Intel Mac, while taking advantage of installing and running iOS and iPadOS apps natively within macOS. You'll also learn the early method of running Windows on an M1 or M2 Mac, with notions of what's to come. If you've already bought an M1- or M2-series Mac and want to get more out of it, or you're considering a purchase and trying to understand what you need to know, Take Control of Your M-Series Mac will fit your needs. NOTE: This book is intended for people who are already familiar with Macs. It is not a beginner's guide, nor is it a complete user manual. Its focus is on what's different about M-series Macs compared to Intel-based Macs. Future plans: This book will be updated as Apple releases updated features for existing M1 and M2 Macs and new Macs based on its M-series processors. Here's what you will learn from this book: Get to know the M1, M1 Pro, M1 Max, M1 Ultra, and M2 processors, and what's so different about them Understand the limits of emulation Control how apps for Intel Macs and universal Intel/M-series apps launch on an M-series Mac Learn the complexities of backing up an M-series Mac Decide whether you need a bootable duplicate of your startup volume Maximize battery life and longevity Work with recoveryOS, a substantially different process with an M-series Mac Walk through a new process of reviving or restoring low-level firmware on a non-responsive Mac Manage system security when you need to work with kernel extensions Install and run iOS and iPadOS apps Learn the current limits of using Windows in macOS on an M1- and M2-series system.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 15
    Online-Ressource
    Online-Ressource
    Saskatoon, Canada : alt concepts
    ISBN: 9781990783159 , 1990783155
    Sprache: Englisch
    Seiten: 1 online resource (182 pages) , illustrations
    Ausgabe: Second edition.
    Serie: Take control
    DDC: 005.4/46
    Schlagwort(e): Mac OS ; Macintosh (Computer) Security measures ; Electronic books
    Kurzfassung: Keep your Mac safe from intruders, malware, and more! Secure your Mac against attacks from the internet and physical intrusion with the greatest of ease. Glenn Fleishman guides you through configuring your Mac to protect against phishing, malware, network intrusion, social engineering, and invaders who might tap physically into your computer. Glenn teaches how to secure your data at rest and in motion. Learn about built-in privacy settings, the Secure Enclave, FileVault, sandboxing, VPNs, recovering a missing Mac, and much more. Covers Ventura and Monterey. The digital world has never seemed more riddled with danger, even as Apple has done a fairly remarkable job across decades at keeping our Macs safe. But the best foot forward with security is staying abreast of past risks and anticipating future ones. Take Control of Securing Your Mac gives you all the insight and directions you need to ensure your Mac is safe from external intrusion and thieves or other ne'er-do-wells with physical access. Security and privacy are tightly related, and Take Control of Securing Your Mac helps you understand how macOS has increasingly compartmentalized and protected your personal data, and how to allow only the apps you want to access specific folders, your contacts, and other information.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 16
    Online-Ressource
    Online-Ressource
    Saskatoon, Canada : Take Control Books
    ISBN: 9781778043932 , 1778043933
    Sprache: Englisch
    Seiten: 1 online resource (130 pages) , color illustrations, color maps
    Ausgabe: [First edition].
    DDC: 004.6
    Schlagwort(e): Location-based services ; Application software ; Electronic books
    Kurzfassung: Track your stuff, find your friends, and safely share your location Version 1.3, updated August 26, 2022 Take Control of Find My and AirTags takes you inside Apple's Find My ecosystem. Once a way to track the whereabouts of your iPhone by having it ping the internet at regular intervals, now Find My encompasses sharing and following people (with permission), much of Apple's hardware and some Beats audio gear, and new trackers from Apple and third parties (including the AirTag). This book helps you understand how it all fits together, and how to keep yourself safe by preventing, identifying, and blocking unwanted tracking. Since the introduction of Find My iPhone over a decade ago, Apple has made it possible to Find My Nearly Everything. The current ecosystem encompasses people, Apple devices, and low-power, long-life trackers. Take Control of Find My and AirTags takes you through the many parts of Find My so you can configure and refine how you and your stuff is tracked and shared. The book looks at three different kinds of tracking: People: Learn how to share your location safely, follow others who let you, and send and receive notifications about arrivals and departures. Devices: Apple lets you track the whereabouts of your and Family Sharing group members' iPhone, iPad, iPod touch, Mac, Watch, AirPods (all models), and Beats audio hardware (some models). Get to know the ins and outs of enabling Find My and taking remote actions, from playing a sound to wiping your data from a device. Items: Find out how AirTags make use of the crowdsourced network of other people's Apple devices to help you find a lost or forgotten purse, backpack, or even car, and about third-party devices licensing the technology from Apple. Also get to know the dangers of Find My stalking and how to identify the risk, deter unwanted tracking from happening, block it if you find it--and report it to law enforcement or get other help. The book also digs into how Family Sharing interacts with personal and device location sharing and finding, and how to help other people find their lost stuff if they don't have one of their own Apple devices handy. Covered operating systems are iOS and iPadOS versions 13 through 16, and macOS 10.15 Mojave through macOS 13 Ventura--and all the new options introduced in the latest releases of each. Here's more of what you can find in this book: Find out the difference between device-based Find My tracking and the Find My network. Figure out if your Apple or Beats audio hardware can be tracked just over Bluetooth nearby or via the Find My Network. Experience the joy of playing a sound over the internet or nearby to help find a missing device or item. See the place in Apple's ecosystem for third-party Find My tracking from Belkin (earbuds), Chipolo (ONE Spot tracker), and VanMoof (ebikes). Control and monitor the way you let others track your whereabouts. Get to know presence, the way you define which of your devices indicates where you are to other people. Learn about the capability in iOS 15/iPadOS 15 and later to track an iPhone or iPad even after it's been erased! Dig into Apple's efforts to prevent Find My from being used for stalking and unwanted tracking, and how to find out if someone's trying to track you without your permission. Discover buried controls for configuring exactly how Find My updates your device's location, including when power runs low. Understand Activation Lock, which protects devices from being reused even if someone has erased them. Help family members find lost and stolen gear through Find My's Family Sharing support. Revel in an expanding list of iOS, iPadOS, and macOS features that improve Find My's capabilities.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 17
    ISBN: 9780738459707
    Sprache: Englisch
    Seiten: 1 online resource (592 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local ; Electronic books
    Kurzfassung: This IBM® Redbooks® publication captures several of the preferred practices and describes the performance gains that can be achieved by implementing the IBM FlashSystem products. These practices are based on field experience. This book highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools and managed disks, volumes, remote copy services, and hosts. It explains how you can optimize disk performance with the IBM System Storage® Easy Tier® function. It also provides preferred practices for monitoring, maintaining, and troubleshooting. This book is intended for experienced storage, SAN, IBM FlashSystem, SAN Volume Controller (SVC), and IBM Storwize® administrators and technicians. Understanding this book requires advanced knowledge of these environments.
    Anmerkung: Online resource; Title from title page (viewed May 14, 2021) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 18
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : Take Control Books | Boston, MA : Safari
    ISBN: 9781954546127
    Sprache: Englisch
    Seiten: 1 online resource (108 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books
    Kurzfassung: Track your stuff, find your friends, and safely share your location Version 1.0.1, updated September 20, 2021 Take Control of Find My and AirTags takes you inside Apple’s Find My ecosystem. Once a way to track the whereabouts of your iPhone by having it ping the internet at regular intervals, now Find My encompasses sharing and following people (with permission), much of Apple’s hardware and some Beats audio gear, and new trackers from Apple and third parties (including the AirTag). This book helps you understand how it all fits together, and how to keep yourself safe by preventing, identifying, and blocking unwanted tracking. Since the introduction of Find My iPhone over a decade ago, Apple has made it possible to Find My Nearly Everything. The current ecosystem encompasses people, Apple devices, and low-power, long-life trackers. Take Control of Find My and AirTags takes you through the many parts of Find My so you can configure and refine how you and your stuff is tracked and shared. The book looks at three different kinds of tracking: People: Learn how to share your location safely, follow others who let you, and send and receive notifications about arrivals and departures. Devices: Apple lets you track the whereabouts of your and Family Sharing group members’ iPhone, iPad, iPod touch, Mac, Watch, AirPods (all models), and Beats audio hardware (some models). Get to know the ins and outs of enabling Find My and taking remote actions, from playing a sound to wiping your data from a device. Items: Find out how AirTags make use of the crowdsourced network of other people’s Apple devices to help you find a lost or forgotten purse, backpack, or even car, and about third-party devices licensing the technology from Apple. Also get to know the dangers of Find My stalking and how to identify the risk, deter unwanted tracking from happening, block it if you find it—and report it to law enforcement or get other help. The book also digs into how Family Sharing interacts with personal and device location sharing and finding, and how to help other people find their lost stuff if they don’t have one of their own Apple devices handy. Covered operating systems are iOS and iPadOS versions 13 through 15, and macOS 10.15 Mojave through macOS 12 Monterey—and all the new options introduced in the latest releases of each. Here’s more of what you can find in this book: Find out the difference between device-based Find My tracking and the Find My network. Figure ou...
    Anmerkung: Online resource; Title from title page (viewed September 20, 2021) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 19
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738459998
    Sprache: Englisch
    Seiten: 1 online resource (34 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books
    Kurzfassung: IBM® Storage as a Service (STaaS) extends your hybrid cloud experience with a new flexible consumption model enabled for both your on-premises and hybrid cloud infrastructure needs, giving you the agility, cash flow efficiency, and services of cloud storage with the flexibility to dynamically scale up or down and only pay for what you use beyond the minimal capacity. This IBM Redpaper provides a detailed introduction to the IBM STaaS service. The paper is targeted for data center managers and storage administrators.
    Anmerkung: Online resource; Title from title page (viewed October 28, 2021) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 20
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : Take Control Books | Boston, MA : Safari
    ISBN: 9781954546011
    Sprache: Englisch
    Seiten: 1 online resource (177 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local ; Electronic books
    Kurzfassung: Keep your Mac safe from intruders, malware, and more! Version 1.0.1, updated February 10, 2021 Secure your Mac against attacks from the internet and physical intrusion with the greatest of ease. Glenn Fleishman guides you through configuring your Mac to protect against phishing, malware, network intrusion, social engineering, and invaders who might tap physically into your computer. Glenn teaches how to secure your data at rest and in motion. Learn about built-in privacy settings, the Secure Enclave, FileVault, sandboxing, VPNs, recovering a missing Mac, and much more. Covers Mojave, Catalina, and Big Sur. The digital world has never seemed more riddled with danger, even as Apple has done a fairly remarkable job across decades at keeping our Macs safe. But the best foot forward with security is staying abreast of past risks and anticipating future ones. Take Control of Securing Your Mac gives you all the insight and directions you need to ensure your Mac is safe from external intrusion and thieves or other ne'er-do-wells with physical access. Security and privacy are tightly related, and Take Control of Securing Your Mac helps you understand how macOS has increasingly compartmentalized and protected your personal data, and how to allow only the apps you want to access specific folders, your contacts, and other information. Here's what the book has to offer: Master a Mac's privacy settings Calculate your level of risk and your tolerance for it Learn why you're asked to give permission for apps to access folders and personal data Moderate access to your audio, video, and other hardware inputs and outputs Get to know the increasing layers of system security through Mojave, Catalina, and Big Sur Prepare against a failure or error that might lock you out of your Mac Share files and folders securely over a network and through cloud services Set a firmware password and control other low-level security options to reduce the risk of someone gaining physical access to your Mac Track and recover a Mac---or erase it remotely---if it's lost or stolen Understand FileVault encryption and protection, and avoid getting locked out Investigate the security of a virtual private network (VPN) to see whether you should use one Learn how the Secure Enclave in Macs with a T2 chip or M-series Apple silicon affords hardware-level protections Dig into ransomware, the biggest potential threat to Mac users, but still a largely theoretical one Decide whether anti-malware s...
    Anmerkung: Online resource; Title from title page (viewed February 8, 2021) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 21
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : Take Control Books | Boston, MA : Safari
    ISBN: 9781954546073
    Sprache: Englisch
    Seiten: 1 online resource (193 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local ; Electronic books
    Kurzfassung: Understand and use Bitcoin, Ethereum, NFTs, and more! Published June 29, 2021 In Take Control of Cryptocurrency , Glenn Fleishman casts aside the headlines and hype around cryptocurrency to dig in on the fundamentals. You learn everything you need to know as an individual from the ground up about cryptocurrency, including details about the popular forms of it. You’ll find out what risks it poses for the planet—and for your pocketbook. Discover the role of a cryptocurrency wallet, how to find the best one, and how to use it safely. You will understand the ins and outs of buying and selling cryptocurrency and using it for real-world purchases and sales. Glenn also explains the mystery of NFTs (non-fungible tokens), which are a peculiar but popular use of cryptocurrency that lets you own unique digital artwork. Cryptocurrency is a new way of representing value that’s going through the throes of change and no one knows exactly what form of it will survive and thrive. It hit the mainstream years ago but 2021 seemed to whip people into a frenzy over Bitcoin, Ethereum, Tether, and several other popular forms. Valuations—the price in cash one could get when selling cryptocurrency—soared. But cryptocurrency doesn’t have an inherent price: it’s worth only what people will pay for it. In May 2021, most cryptocurrencies plunged in value by half or more. Meanwhile, a similar furor arose over the introduction of “non-fungible tokens” (NFTs), a way to use an aspect of cryptocurrency to buy and sell unique ownership of digital assets, like born-digital art and clips from NBA basketball games. NFTs similarly suffered a giant drop in value from a peak in May 2021. What is this all about, anyway? Why did cryptocurrency and NFTs tank? Take Control of Cryptocurrency ignores the hype in favor of the reality beneath it. This new form of currency is not going away, even if the price in dollars, euros, and renminbi may fluctuate madly. The future of the economy will incorporate cryptocurrency and you can get to know it in great but understandable detail with the help of author Glenn Fleishman. This book teaches you what cryptocurrency really is and how it relates to government-backed money. Glenn walks through all the parts of a cryptocurrency in clear detail—like a wallet, blockchain, and transactions—and explains how cryptocurrencies produce permanent transfers. He also lets you see two different kinds of risk: the side effects of Bitcoin and others in consuming ma...
    Anmerkung: Online resource; Title from title page (viewed June 29, 2021) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 22
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : Take Control Books | Boston, MA : Safari
    ISBN: 9781954546028
    Sprache: Englisch
    Seiten: 1 online resource (86 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local ; Electronic books
    Kurzfassung: Make a smooth transition to Apple silicon Version 1.0.1, updated April 6, 2021 This book teaches you everything you need to know about hardware and related software changes in Apple’s new M1 Apple silicon Macs to make a transition from an Intel Mac, set up security with new options, create effective backups, and work with new options in recovery mode. Glenn Fleishman takes you through the details of how an M1-based Mac handles startup, battery management, and running iOS, iPadOS, and Windows apps. Covers the 2020 Apple M1 Macs: the Mac mini, MacBook Air, 13-inch MacBook Pro. Apple’s new Macs based on the M1 Apple silicon system-on-a-chip offer remarkable advances in performance, battery life, and memory utilization. With those improvements comes a host of changes in hardware, from how a Mac starts up to making backups of your computer to understanding fundamental aspects of system security. Take Control of Your M-Series Mac teaches you everything you need to know about these topics and much more. You’ll learn not just how to make a bootable clone of your Mac on an external drive, but whether it’s necessary with Big Sur and an M1 Mac. Find out how to make a clean transition from an Intel Mac, while taking advantage of installing and running iOS and iPadOS apps natively within macOS. You’ll also learn the early method of running Windows on an M1 Mac, with notions of what’s to come. If you’ve already bought an M1 Mac and want to get more out of it, or you’re considering a purchase and trying to understand what you need to know, Take Control of Your M-Series Mac will fit your needs. Future plans: This book will be updated as Apple releases updated features for existing M1 Macs and new Macs based on its M-series processors. Here’s what you will learn from this book: Get to know the M1 processor, and what’s so different about it Understand the limits of emulation Control how apps for Intel Macs and universal Intel/M1 apps launch on an M-series Mac Learn the complexities of backing up an M-series Mac Decide whether you need a bootable duplicate of your startup volume Maximize battery life and longevity Work with recoveryOS, a substantially different process with an M-series Mac Walk through a new process of reviving or restoring low-level firmware on a non-responsive Mac Manage system security when you need to work with kernel extensions Install and run iOS and iPadOS apps Learn the current limits of using Windows in macOS on an M1 system
    Anmerkung: Online resource; Title from title page (viewed April 6, 2021) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 23
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : Take Control Books | Boston, MA : Safari
    ISBN: 9781947282650
    Sprache: Englisch
    Seiten: 1 online resource (124 pages)
    Ausgabe: 2nd edition
    Schlagwort(e): Electronic books ; local ; Electronic books
    Kurzfassung: Prevent (or solve) problems with your Apple ID! Version 2.0.2, updated April 6, 2021 This book covers everything someone needs to know about configuring an Apple ID account, interactions with iCloud-based services, and troubleshooting account access. Your Apple ID is much more than a simple username. It's a key that unlocks a long list of Apple products and services on any of numerous devices. iCloud uses an Apple ID, as does Apple Music; the App Store; the Music, TV, and Books apps; and more. An Apple ID protects your personal information, including email and iOS/iPadOS backups; helps you find a lost iPhone; and can even unlock your Mac. So it goes without saying that if something goes wrong with your Apple ID, you could be in for a world of hurt. Unfortunately, things go wrong with Apple IDs all the time. Fortunately, Glenn Fleishman, a veteran technology journalist and the author of Macworld's "Mac 911" column, is ready to help with expert advice on how to manage your Apple ID—including how to prevent, solve, or work around most common problems! In this book, Glenn answers questions like: What all is my Apple ID used for? How does my iCloud account relate to my Apple ID? What problems can two-factor authentication (2FA) solve, and how do I use it? Are there other mechanisms I can use to ensure that I can recover an Apple ID in the event of a problem? (Spoiler: yes!) What if I have a device that's too old to work with two-factor authentication? What should I do if I have two or more Apple IDs or iCloud accounts? Will I lose access to all my Apple media purchases if I move to another country? Can I share an Apple ID with someone else? What exactly should I do if I think someone is hacking my Apple ID account? How can I recover a forgotten Apple ID password? What steps should I take if Apple locks me out of my account? If I lose access to an email address associated with my Apple ID, what can I do? What Apple ID changes in iOS 14/iPadOS 14 and macOS 11 Big Sur do I need to know about? How does "Sign in with Apple" work? How can I use Family Sharing to share data and purchases within my family? What types of subscriptions can I manage with my Apple ID, and how? Which payment methods can I associate with my Apple ID, and how do I manage them? And that's just the beginning. Glenn has packed a remarkable amount of concise problem-solving information into this compact, 124-page book. Read it before you encounter Apple ID problems to minimize your r...
    Anmerkung: Online resource; Title from title page (viewed April 6, 2021) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 24
    ISBN: 9780738459592
    Sprache: Englisch
    Seiten: 1 online resource (572 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local ; Electronic books
    Kurzfassung: This IBM® Redbooks® publication describes several of the preferred practices and describes the performance gains that can be achieved by implementing the IBM SAN Volume Controller powered by IBM Spectrum® Virtualize V8.4. These practices are based on field experience. This book highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools, and managed disks, volumes, Remote Copy services, and hosts. Then, it provides performance guidelines for IBM SAN Volume Controller, back-end storage, and applications. It explains how you can optimize disk performance with the IBM System Storage Easy Tier® function. It also provides preferred practices for monitoring, maintaining, and troubleshooting IBM SAN Volume Controller. This book is intended for experienced storage, SAN, and IBM SAN Volume Controller administrators and technicians. Understanding this book requires advanced knowledge of the IBM SAN Volume Controller, IBM FlashSystem, and SAN environments.
    Anmerkung: Online resource; Title from title page (viewed April 16, 2021) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 25
    ISBN: 9780738460154
    Sprache: Englisch
    Seiten: 1 online resource (171 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books
    Kurzfassung: Object storage is the primary storage solution that is used in the cloud and on-premises solutions as a central storage platform for unstructured data. IBM® Cloud Object Storage (COS) is a software-defined storage platform that breaks down barriers for storing massive amounts of data by optimizing the placement of data on commodity x86 servers across the enterprise. This IBM Redbooks® publication describes the major features, use case scenarios, deployment options, configuration details, initial customization, performance, and scalability considerations of IBM Cloud® Object Storage on-premises offering. For more information about the IBM Cloud Object Storage architecture and technology that is behind the product, see IBM Cloud Object Storage Concepts and Architecture: System Edition, REDP-5537-02. The target audience for this publication is IBM Cloud Object Storage IT specialists and storage administrators.
    Anmerkung: Online resource; Title from title page (viewed November 11, 2021) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 26
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : Take Control Books | Boston, MA : Safari
    ISBN: 9781947282643
    Sprache: Englisch
    Seiten: 1 online resource (254 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local ; Electronic books
    Kurzfassung: Master networking, privacy, and security for iOS and iPadOS! Ensuring that your iPhone or iPad's data remains secure and in your control and that your private data remains private isn't a battle—if you know what boxes to check and how to configure iOS and iPadOS to your advantage. While Apple biases security and privacy in your favor, Take Control of iOS & iPadOS Privacy and Security takes you into the intricacies of Apple's choices when it comes to networking, data sharing, and encryption. The book comprehensively covers networking, privacy, and security in iOS 14 and iPadOS 14, answering any question you might have across all of those areas. The book covers Wi-Fi, Bluetooth, and cellular networking; third-party password managers; tracking an iOS device; USB port blocking to prevent brute-force passcode cracking; Low Data Mode for cellular and Wi-Fi data; using the Apple Watch on a Wi-Fi network; configuring and setting up Personal Hotspot and Instant Hotspot; blocking jerks and spam; two-factor authentication with an Apple ID; using AirDrop and AirPlay; solving connection problems; and much more. The book offers insight into what information you may unintentionally expose about yourself, and how to prevent Apple and third parties from gaining access to your details. This includes the several techniques Apple has built into Safari for iOS and iPadOS that prevent advertising and tracking companies from following your actions and connecting your browsing behavior on unrelated sites. You'll learn how to: Troubleshoot problematic Wi-Fi connections. Create and manage passwords for easy entry, including with third-party passwords tools. Understand Safari’s blocking techniques and how to review websites’ attempts to track you. Work with Find My to meet up and travel with friends and family, and track down lost devices. Master all the options for a Personal Hotspot for yourself and in a Family Sharing group. Share a Wi-Fi password with nearby contacts and via a QR Code. Use the option for COVID-19 contact tracing to preserve your privacy. Stream music and video to other devices with AirPlay 2. Deter brute-force cracking by relying on a USB Accessories timeout. Configure Bluetooth devices. Transfer files between iOS and macOS with AirDrop. Block creeps from iMessage, FaceTime, text messages, and phone calls. Secure your data in transit with a Virtual Private Network (VPN) connection. Protect Apple ID account and iCloud data from unwanted access. Under...
    Anmerkung: Online resource; Title from title page (viewed September 24, 2020) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...