LEADER 04609nam 22006255 450 001 9910865249703321 005 20240716132309.0 010 $a9798868803857$b(electronic bk.) 010 $z9798868803840 024 7 $a10.1007/979-8-8688-0385-7 035 $a(MiAaPQ)EBC31466791 035 $a(Au-PeEL)EBL31466791 035 $a(CKB)32274071600041 035 $a(DE-He213)979-8-8688-0385-7 035 $a(OCoLC)1439603613 035 $a(OCoLC-P)1439603613 035 $a(CaSebORM)9798868803857 035 $a(EXLCZ)9932274071600041 100 $a20240611d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe IT Support Handbook $eA How-To Guide to Providing Effective Help and Support to IT Users /$fby Mike Halsey 205 $a2nd ed. 2024. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2024. 215 $a1 online resource (248 pages) 300 $aDescription based upon print version of record. 300 $aChapter 9: The Human Factor 311 08$aPrint version: Halsey, Mike The IT Support Handbook Berkeley, CA : Apress L. P.,c2024 9798868803840 327 $aPart I: IT Support Fundamentals -- 1. An Introduction to IT Support -- 2. Understanding Your IT System Better -- 3. Understanding Your Users: How Much Do They Know? -- Part II: IT Support Methodology -- 4. Flow Logic and Troubleshooting -- 5. Querying Users Effectively -- 6. Supporting Remote and Hybrid Workers. - 7. Joining The Dots: Finding the Root Cause of an IT Issue -- Part III: Understanding IT System Problems -- 8. How IT Systems are Structured -- 9. The Human Factor -- 10. The Peripheral Problem -- 11. Building and Environmental Factors -- 12. How Climate Change Affects IT Support. - Part IV: Documentation and Reporting -- 13. Why Good Documentation Matters -- 14. Creating Troubleshooting Guides -- 15. Creating and Managing Reporting -- 14. Harnessing System and Error Reporting in Windows -- 17. Obtaining Advanced Error and Status Information on PCs -- Part V: Providing Remote Support -- 18. Remote Support Tools -- 19. Gathering Information Remotely -- 20. Helping Your Users to Help You. ? 21. Taking IT Support to the Next Level. 330 $aBecome a more effective tech professional by learning how to provide the most useful IT support for your users. You'll learn how to efficiently and effectively deal with any type of problem, including operating systems, software, and hardware. IT support is often complex, time-consuming, and expensive, but it doesn't have to be with the right processes in place. Whether you're an individual, part of an IT support team, or managing staff supporting PC users in their homes, this book will help you understand the right way to approach, troubleshoot, and isolate problems so they can be handled efficiently, with the least disruption and cost to your business. Expanded and revised for this second edition, you'll make yourself popular with your colleagues, and keep your clients and users happy and productive. New To This Edition The world of work has changed, with remote and hybrid working now the new normal and with IT Support departments worldwide having to adapt to this new paradigm. This expanded edition highlights the skills, tools, and structures needed to support businesses of any size in the new normal. What You'll Learn Manage reporting, and keep a record of issues that occur Provide effective remote support for users working from home or elsewhere in the world Use error and system reporting in Windows to obtain high-quality, relevant information Spot patterns in user behavior that may be causing difficult-to-diagnose problems Be familiar with best practices to make you a better support professional. 606 $aApplication software 606 $aMicrosoft software 606 $aMicrosoft .NET Framework 606 $aComputer systems 606 $aComputer and Information Systems Applications 606 $aMicrosoft 606 $aComputer System Implementation 615 0$aApplication software. 615 0$aMicrosoft software. 615 0$aMicrosoft .NET Framework. 615 0$aComputer systems. 615 14$aComputer and Information Systems Applications. 615 24$aMicrosoft. 615 24$aComputer System Implementation. 676 $a005.3 700 $aHalsey$b Mike$0887467 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910865249703321 996 $aThe IT Support Handbook$92528843 997 $aUNINA LEADER 09587nam 22008055 450 001 9910770270303321 005 20251113181027.0 010 $z9783031487309 010 $a9783031487316 010 $a3031487311 024 7 $a10.1007/978-3-031-48731-6 035 $a(MiAaPQ)EBC31020229 035 $a(Au-PeEL)EBL31020229 035 $a(CKB)29374295500041 035 $a(DE-He213)978-3-031-48731-6 035 $a(EXLCZ)9929374295500041 100 $a20231214d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMathematical Research for Blockchain Economy $e4th International Conference MARBLE 2023, London, United Kingdom /$fedited by Panos Pardalos, Ilias Kotsireas, William J. Knottenbelt, Stefanos Leonardos 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (193 pages) 225 1 $aLecture Notes in Operations Research,$x2731-0418 311 08$aPrint version: Pardalos, Panos Mathematical Research for Blockchain Economy Cham : Springer,c2024 9783031487309 327 $aIntro -- Preface -- Contents -- Deep Reinforcement Learning-Based Rebalancing Policies for Profit Maximization of Relay Nodes in Payment Channel Networks -- 1 Introduction -- 2 Background -- 2.1 Payment Channel Networks and the Need for Rebalancing -- 2.2 The Submarine Swap Rebalancing Mechanism -- 3 Problem Formulation -- 3.1 System Evolution -- 3.2 Writing the Problem as a Markov Decision Process -- 4 Heuristic and Reinforcement Learning-Based Policies -- 4.1 Heuristic Policies -- 4.2 Deep Reinforcement Learning Algorithm Design -- 5 Evaluation -- 6 Related Work -- 7 Conclusion -- A Causes of Channel Depletion -- B The Submarine Swap Protocol -- C An Equivalent Objective -- D Deep Reinforcement Learning Algorithm Design Details -- D.1 Helping a Swap-In Succeed -- D.2 Design Choices -- D.3 Practical Applicability -- E Hyperparameters and Rewards -- F Additional Experimental Results -- F.1 The RebEL Policy Under Even Demand -- F.2 The Role of the Initial Conditions -- References -- Game-Theoretic Randomness for Proof-of-Stake -- 1 Introduction -- 2 Preliminaries -- 2.1 Games and Equilibria -- 2.2 Publicly-Verifiable Secret Sharing -- 2.3 Verifiable Delay Functions -- 3 Random Integer Generation Game (RIG) -- 3.1 Overview of RIG -- 3.2 Analysis of Alliance-Resistant Nash Equilibria -- 3.3 Dense RIG Bimatrix Game -- 4 Designing a Random Beacon Based on RIG -- 4.1 Commitment Scheme and VDF Approach -- 4.2 PVSS Approach -- 4.3 Further Details of the Approach -- 4.4 Assumptions and Limits to Applicability -- 5 RIG in Proof of Stake Protocols -- 5.1 RIG in Ouroboros Praos -- 5.2 RIG in Algorand -- 6 Conclusion -- References -- Incentive Schemes for Rollup Validators -- 1 Introduction -- 2 Model -- 2.1 Extension to n+1 Validators -- 2.2 Silent Validators -- 3 Protocol Level Incentives -- 4 Conclusions and Future Work -- References. 327 $aCharacterizing Common Quarterly Behaviors in DeFi Lending Protocols -- 1 Introduction -- 2 Methods -- 2.1 Data Sources -- 2.2 Transaction-Level Data -- 2.3 Address-Level Summaries -- 2.4 Computation of Clusters -- 3 Results -- 3.1 Interpretations of Clusters -- 3.2 Insights Derived From Clusters -- 4 Related Work -- 5 Discussion and Future Work -- References -- Blockchain Transaction Censorship: (In)secure and (In)efficient? -- 1 Introduction -- 2 Background -- 2.1 Blockchain and Smart Contracts -- 2.2 Centralized Transaction Propagation Services -- 2.3 ZKP Mixers -- 2.4 Blockchain Regulation and Censorship -- 3 System Model -- 3.1 System Components -- 3.2 Blockchain Censoring -- 3.3 Threat Model -- 4 Censorship During Transaction Validation -- 4.1 Miners' Censorship on Tainted Transactions -- 4.2 DoS Censoring Miners Through Crafting Tainted Transactions -- 4.3 Attack Cost -- 5 Censorship During Transaction Propagation -- 5.1 FaaS Workflow -- 5.2 FaaS Censorship Mechanism -- 5.3 DoS Censoring FaaS Searchers and Builders -- 6 Censorship During Transaction Generation -- 6.1 Non-transparent Frontend-Level Censorship -- 6.2 Investigating DeFi Platforms' Censorship -- 6.3 Tainting Innocent Addresses -- 6.4 Bypassing Frontend-Level Censorship -- 7 Related Work -- 8 Conclusion -- References -- An Automated Market Maker Minimizing Loss-Versus-Rebalancing -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Organization of the Paper -- 2 Related Work -- 3 Preliminaries -- 3.1 Constant Function Market Makers -- 3.2 Loss-Versus-Rebalancing -- 3.3 Auctions -- 4 Diamond -- 4.1 Model Assumptions -- 4.2 Core Protocol -- 4.3 Per-block Conversion Versus Future Contracts -- 4.4 Periodic Conversion Auction -- 5 Diamond Properties -- 6 Implementation -- 6.1 Core Protocol -- 6.2 Conversion Protocols -- 7 Experimental Analysis -- 8 Conclusion -- A Proofs -- References. 327 $aProfit Lag and Alternate Network Mining -- 1 Introduction -- 1.1 Nakamoto Consensus -- 1.2 Mining Process -- 1.3 Selfish Mining -- 1.4 Smart Mining -- 1.5 Intermittent Selfish Mining -- 1.6 Alternate Network Mining -- 1.7 Organization of This Article -- 2 Modelization -- 2.1 Mining and Difficulty Adjustment Formula -- 2.2 Notations -- 2.3 Profitability of a Mining Strategy -- 2.4 Attack Cycles -- 2.5 Performant Strategy and Profit Lag -- 3 Selfish Mining Revisited -- 3.1 Previous State-Machine Approach Revisited -- 3.2 Profit Lag -- 4 Intermittent Selfish Mining Strategy -- 4.1 Profit Lag -- 5 Alternate Network Mining Strategy -- 5.1 Profit Lag -- 6 Conclusion -- References -- Oracle Counterpoint: Relationships Between On-Chain and Off-Chain Market Data -- 1 Introduction -- 2 Methods -- 2.1 Fundamental Economic Features from On-Chain Markets -- 2.2 Data-Driven Feature Analysis -- 2.3 Modeling Off-Chain Prices -- 3 Results -- 3.1 Feature Analysis -- 3.2 Recovering Off-Chain Prices from On-Chain Data -- 3.3 Performance of Price Recovery -- 4 Discussion -- A More Details on Dataset Features -- A.1.1 Economic Features -- B Further Information on Ethereum Analysis -- B.1.1 Performance of Price Recovery -- C Analysis of Celo PoS Data -- References -- Exploring Decentralized Governance: A Framework Applied to Compound Finance -- 1 Introduction -- 1.1 Motivation -- 1.2 Contribution Summary -- 2 Compound -- 2.1 Governance -- 3 Relevant Work -- 3.1 Literature Discussion -- 4 Methodology and Data -- 4.1 Data -- 4.2 Methodology -- 4.3 Top 100 Leaderboard -- 4.4 Proposals -- 5 Discussion -- 6 Conclusions -- Appendix A Proof for Gini and Nakamoto Coefficients When n = 2 and u1 = u2 -- References -- A Mathematical Approach on the Use of Integer Partitions for Smurfing in Cryptocurrencies -- 1 Introduction -- 2 Related Work. 327 $a3 Using Integer Partitions to Create Patterns for Smurfing -- 3.1 Problem Formulation -- 3.2 Possible Implications of the Conceptualization of Smurfing via Integer Partitions -- 3.3 Examples for Integer Partitions and Smurfing -- 4 Conclusion and Future Work -- References -- Bigger Than We Thought: The Upbit Hack Gang -- 1 Introduction -- 2 Rough ML Network Construction -- 2.1 Crawling Tool and Event -- 2.2 Account and Transaction Data Crawling -- 2.3 Network Construction -- 3 ML Network Refinement -- 3.1 Design an ML Suspiciousness Indicator -- 3.2 Calculate ML Risks of Accounts -- 4 Results and Analysis -- 5 Conclusion -- References -- Staking Pools on Blockchains. 330 $aThis book presents the best papers from the 4th International Conference on Mathematical Research for Blockchain Economy (MARBLE) 2023, held in London, UK. While most blockchain conferences and forums are dedicated to business applications, product development, or Initial Coin Offering (ICO) launches, this conference focused on the mathematics behind blockchain to bridge the gap between practice and theory. The book spans the divide between theoretical promise and practical reality in blockchain technology and explores the challenges hindering its real-world integration across diverse sectors, offering comprehensive insights into issues like scalability, security, and privacy. . 410 0$aLecture Notes in Operations Research,$x2731-0418 606 $aFinance 606 $aBlockchains (Databases) 606 $aMathematical optimization 606 $aSocial sciences$xMathematics 606 $aBusiness enterprises$xFinance 606 $aEconometrics 606 $aFinancial Economics 606 $aBlockchain 606 $aOptimization 606 $aMathematics in Business, Economics and Finance 606 $aCorporate Finance 606 $aQuantitative Economics 615 0$aFinance. 615 0$aBlockchains (Databases) 615 0$aMathematical optimization. 615 0$aSocial sciences$xMathematics. 615 0$aBusiness enterprises$xFinance. 615 0$aEconometrics. 615 14$aFinancial Economics. 615 24$aBlockchain. 615 24$aOptimization. 615 24$aMathematics in Business, Economics and Finance. 615 24$aCorporate Finance. 615 24$aQuantitative Economics. 676 $a332 700 $aPardalos$b Panos$01334074 701 $aKotsireas$b Ilias$0950774 701 $aKnottenbelt$b William J$01460727 701 $aLeonardos$b Stefanos$01460728 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910770270303321 996 $aMathematical Research for Blockchain Economy$93660695 997 $aUNINA