Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Interested in developing embedded systems? Since they dont tolerate inefficiency, these systems require a disciplined approach to programming. This easy-to-read guide helps you cultivate a host of good development practices, based on classic software design patterns and new patterns unique to embedded programming. Learn how to build system architecture for processors, not operating systems, and discover specific techniques for dealing with hardware difficulties and manufacturing requirements.Written by an expert whos created embedded systems ranging from urban surveillance and DNA scanners to childrens toys, this book is ideal for intermediate and experienced programmers, no matter what platform you use.Optimize your system to reduce cost and increase performanceDevelop an architecture that makes your software robust in resource-constrained environmentsExplore sensors, motors, and other I/O devicesDo more with less: reduce RAM consumption, code space, processor cycles, and power consumptionLearn how to update embedded code directly in the processorDiscover how to implement complex mathematics on small processorsUnderstand what interviewers look for when you apply for an embedded systems job"e;Making Embedded Systems is the book for a C programmer who wants to enter the fun (and lucrative) world of embedded systems. Its very well writtenentertaining, evenand filled with clear illustrations."e;Jack Ganssle, author and embedded system expert.
Bloker kæde, mest kendt som rygraden teknologien bag Bitcoin, er en af de hotteste og mest spændende teknologier i øjeblikket på markedet, men hvad er det - og kan det på en måde hjælpe dig? Kort sagt, Blok Chain er den digitale ækvivalent af en bankmand hovedbog, en, journaler og sikrer transaktioner mellem to parter. Indstil til cyberspace, denne form for programmering tillader overførsel af ikke blot data, men af værdi - hvilket gør det til et unikt og grundlæggende byggesten i vores spirende fremtid. "Bloker kæde teknologi" blev oprindeligt udviklet i 2009 for at gøre det muligt for enkeltpersoner og organisationer til at behandle transaktioner uden behov for en centralbank eller en anden mellemmand, ved hjælp af komplekse algoritmer og enighed om at verificere transaktioner. Nu er det blevet vedtaget og ændret af virksomheder og nystartede virksomheder verden over, og er ved at blive nøje gransket af verden Banker som det næste logiske skridt i digital finansiering. Denne bog forklarer Block Kæde i sin helhed; dets historie, anvendelser, potentiale, ulemper og endda sin fremtid. Forståelse denne værdifulde, åbne system er afgørende for at skabe den økonomiske frihed du tørster. Digital valuta er ikke længere en ønskedrøm af kælderen gamer, dens virkelige, er det her, og du har brug for at forstå, hvordan det bevæger sig og er sikret med henblik på at planlægge en fremtid, der vil se en revolution i vores nuværende banksystem.
Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of challenges has emerged, casting shadows over the very foundations of cloud computing. Improving Security, Privacy, and Trust in Cloud Computing unravels the complexities surrounding the cloud landscape, delving into the core concerns of security, privacy, and trust that have come to define its evolution. It aims to equip readers with the insights, knowledge, and practical strategies needed to navigate the intricate realm of cloud computing while safeguarding their most valuable assets. This book's exploration into security, privacy, and trust in cloud computing takes a holistic approach. Throughout the chapters of this book, readers will embark on a multidimensional expedition. This book will take them through real-world case studies of successful cloud security implementations and unfortunate breaches that underscore the urgency of robust defenses. From data encryption techniques to incident response protocols, this book offers practical insights and actionable strategies that can be implemented by IT professionals, security experts, and decision-makers alike.
Vous souhaitez apprendre à utiliser le système d'exploitation Linux, le plus populaire des systèmes libres et open source ?Ce livre vous initiera aux principes de base de Linux et vous guidera pas à pas dans la maîtrise des commandes essentielles pour manipuler et organiser vos fichiers, modifier votre environnement, gérer les processus, éditer des fichiers texte, programmer des scripts shells, et bien plus encore. À travers des exercices pratiques et des exemples concrets, vous apprendrez à manipuler les différentes commandes Linux, telles que ls, cd, cp, mv, rm, ps, kill, grep, sed, awk, ping ...En lisant ce livre, vous développerez vos compétences et votre confiance en tant qu'utilisateur de Linux, et vous pourrez exploiter tout le potentiel de ce système puissant et flexible..
A pattern language to cover from a small debugging trace to a distributed log with billions of messages from hundreds of computers, thousands of components, threads, and processes.
Long path to better systems that last longer and make engineers and customers happierThis book is a comprehensive guide to designing scalable and maintainable software written by an expert. It covers the principles, patterns, anti-patterns, trade-offs, and concepts that software developers and architects need to understand to design software that is both scalable and maintainable.The book begins by introducing the concept of monoliths and discussing the challenges associated with scaling and maintaining them. It then covers several anti-patterns that can lead to these challenges, such as lack of isolation and internal shared libraries.The next section of the book focuses on the principles of good software design, such as loose coupling and encapsulation. It also covers several software architecture patterns that can be used to design scalable and maintainable monoliths, such as the layered architecture pattern and the microservices pattern.The final section of the book guides how to migrate monoliths to distributed systems. It also covers how to test and deploy distributed systems effectively.WHAT YOU WILL LEARN¿ Understand the challenges of monoliths and the common anti-patterns that lead to them.¿ Learn the principles of good software design, such as loose coupling and encapsulation.¿ Discover software architecture patterns that can be used to design scalable and maintainable monoliths.¿ Get guidance on how to migrate monoliths to distributed systems.¿ Learn how to test and deploy distributed systems effectively. WHO THIS BOOK IS FORThis book is for software developers, architects, system architects, DevOps engineers, site reliability engineers, and anyone who wants to learn about the principles and practices of modernizing software architectures. The book is especially relevant for those who are working with legacy systems or want to design new systems that are scalable, resilient, and maintainable.
Gain practical knowledge and hands-on expertise in implementing Google Cloud Platform services and prepare to confidently pass the exam on your first attemptKey Features:Explore Google Cloud Platform services and operations in depthGain hands-on experience to effectively employ Google Cloud servicesReceive tailored guidance for Associate Cloud Engineer certification from Google expertsPurchase of the print or Kindle book includes a free PDF eBookBook Description:Google Cloud Platform (GCP) is a leading cloud provider, helping companies and users worldwide to solve the most challenging business issues. This book will teach cloud engineers working with GCP how to implement, configure, and secure cloud environment, and help students gain confidence in utilizing various GCP services.The book begins by introducing you to Google Cloud and the ACE exam, including various resources that can help you pass. The next set of chapters will help you explore the various compute options in Google Cloud, such as Google Kubernetes Engine and Google Compute Engine. As you advance, you'll gain a clear understanding of the essence of the cloud, including networking and storage, as well as the data analytics products that Google Cloud provides. The chapters also cover key topics such as monitoring, logging, diagnostics, and price estimation along with the most crucial of subjects, security, with a particular focus on identity and access management. Finally, you'll be given the chance to test your newfound knowledge with the help of two mock exams.By the end of this book, you'll have learned the difference between various Google Cloud Platform services, along with specific use cases, and be able to implement these services with the GCP console and command-line utilities.What You Will Learn:Grasp the key topics needed to achieve ACE certificationImport and export data to and from Google CloudImplement and configure various networking options in Google CloudDerive insights from data with Google Data AnalyticsGain knowledge and experience in monitoring and loggingTest yourself in various scenarios while reading the bookChoose the optimal options to manage your solution's dataWho this book is for:This book is for anyone preparing for Associate Cloud Engineer certification. It can be used by IT system administrators as well as DevOps and it will be most useful to cloud architects as it covers all areas of Google Cloud Platform. This guide is ideal for those who want to start working with Google Cloud, gain practical knowledge, and achieve certification.
The Internet of things (IoT) refers to the physical objects equipped with software, sensors, processing ability, and other technologies. They communicate and share data with other systems and devices through the Internet or other communication networks. IoT has a wide variety of practical applications ranging from business IoT and consumer IoT to industrial and manufacturing IoT. 5G wireless networks can be utilized to connect a large number of IoT devices, and meet its high communication requirements, even when the objects are in motion. 5G has three features that are helpful for supporting specific components of IoT, which include ultra-reliable low latency communications (URLLC), enhanced mobile broadband (eMBB), and massive machine type communications (mMTC). This book elucidates the concepts and innovative models around prospective developments with respect to Internet of things and sensor networks in 5G wireless communications. It will provide interesting topics for research, which interested readers can take up. This book is a resource guide for experts as well as students.
The concept of ubiquitous computing is used in computer science, software engineering and hardware engineering for computing which can take place in any format, any device and at any location, unlike desktop computing. The traditional view of computing systems has been irreversibly changed by the recent technical developments in hardware and software. They not only contain linked servers but also include a wide variety of embedded and pervasive devices, which lead to the development of ubiquitous computing systems. Cryptanalysis methodologies and tools are used to enhance the security of the ubiquitous computing environment, by providing protection and controlling access to data. Cryptanalysis is the process of examining information systems for understanding hidden aspects of the systems. It involves the study of theoretical and practical cryptographic mechanisms intended to provide privacy and security. This book unravels the recent studies on ubiquitous computing. It will elucidate the concepts and innovative models around security issues and threats in ubiquitous computing systems. The book will help the readers in keeping pace with the rapid changes in this field.
Discover various cloud services alongside modern software development practices and tools with the guidance of two industry leaders in DevOpsPurchase of the print or Kindle book includes a free PDF eBookKey Features:Modernize continuous delivery in the cloud with strategic goals and objectivesMaster continuous delivery with the right tools, applications, and use casesPerform multi-cluster and multi-cloud deployments efficientlyBook Description:Many organizations are embracing cloud technology to remain competitive, but implementing and adopting development processes while modernizing a cloud-based ecosystem can be challenging.Strategizing Continuous Delivery in Cloud helps you modernize continuous delivery and achieve infrastructure-application convergence in the cloud. You'll learn the differences between cloud-based and traditional delivery approaches and develop a tailored strategy. You'll discover how to secure your cloud delivery environment, ensure software security, run different test types, and test in the pre-production and production stages.You'll also get to grips with the prerequisites for onboarding cloud-based continuous delivery for organizational and technical aspects. Then, you'll explore key aspects of readiness to overcome core challenges in your cloud journey, including GitOps, progressive delivery controllers, feature flagging, differences between cloud-based and traditional tools, and implementing cloud chaos engineering.By the end of this book, you'll be well-equipped to select the right cloud environment and technologies for CD and be able to explore techniques for implementing CD in the cloud.What You Will Learn:Uncover the foundation for modernizing continuous delivery and prepare for continuous delivery in cloudBuild fast, efficient, secure, and interoperable software for real-world resultsUnderstand end-to-end continuous delivery for multi-cloud, hybrid, and on-premiseSet up and scale continuous delivery in the cloud for maximum returnImplement cost optimization for continuous delivery in the cloudDiscover trends and advancements in CD with cloud-native technologiesWho this book is for:This book is for developers, site reliability engineers, DevOps architects, and engineers looking to strategize, plan, and implement continuous delivery in the cloud. You must have a basic understanding of CI/CD concepts and be familiar with cloud ecosystem, DevOps, or CI/CD pipelines.
In this second part of the INFINITECH book series, which is a series of three books, the basic concepts for FinTech referring to the diversity in the use of technology to underpin the delivery of financial services are reviewed. The demand and the supply side in 16 of the most representatives scenarios in the financial sector are demonstrated, and further discussed is why FinTech nowadays is considered the most trendy topic in the Financial Industry, being responsible for waves of services digitization. Financial technology (FinTech) and insurance technology (InsuranceTech) are rapidly transforming the financial and insurance services industry. An overview of Reference Architecture (RA) for BigData, IoT and AI applications in the financial and insurance sectors (INFINITECH-RA) are also provided. Moreover, the book reviews the concept of innovation and its application in INFINITECH, and innovative technologies provided by the project for financial sector practical examples
Explore the methodologies and reasons behind successful legacy application moves to a hyper-space cloud, specifically AzurePurchase of the print or Kindle book includes a free PDF eBookKey Features:Discover tips and tricks to help you avoid common pitfalls and get up and running quicklyGain in-depth end-to-end knowledge of all things cloud to smoothen your learning journeyExplore everything from formulating a plan to governing the cloud over the long termBook Description:You've heard about the benefits of the cloud and you want to get on board, but you're not sure where to start, what services to use, or how to make sure your data is safe. Making the decision to move to the cloud can be daunting and it's easy to get overwhelmed, but if you're not careful, you can easily make mistakes that cost you time and money.Azure Cloud Adoption Framework Handbook is here to help. This guide will take you step-by-step through the process of making the switch to the Microsoft Azure cloud. You'll learn everything from foundational cloud concepts and planning workload migration through to upskilling and organization transformation. As you advance, you'll find out how to identify and align your business goals with the most suitable cloud technology options available. The chapters are designed in a way to enable you to plan for a smooth transition, while minimizing disruption to your day-to-day operations. You'll also discover how the cloud can help drive innovation in your business or enable modern software development practices such as microservices and CI/CD. Throughout the chapters, you'll see how decision makers can interact with other internal stakeholders to achieve success through the power of collaboration.By the end of this book, you'll be more informed and less overwhelmed about moving your business to the cloud.What You Will Learn:Understand cloud adoption and digital transformation generallyGet to grips with the real-world, day-to-day running of a cloud platformDiscover how to plan and execute the cloud adoption journeyGuide all levels of the organization through cloud adoptionInnovate with the business goals in mind in a fast and agile wayBecome familiar with advanced topics such as cloud governance, security, and reliabilityWho this book is for:This book provides actionable strategies for anyone looking to optimize their organization's cloud adoption journey or get back on course, from IT managers and system architects to CXOs and program managers. Whether you're an enterprise or a fledgling start-up, this handbook has everything you need to get started with your cloud journey. General IT knowledge and a basic understanding of the cloud, modern software development practices, and organizational change management concepts are all prerequisites.
The main objective of this book is to provide insights into recent advances in distributed intelligent circuits, systems and their applications. Distributed intelligence is the key enabler for innovations in machine-to-machine communications. The innovations are directed towards keeping existing algorithms as the base and developing new intelligent systems by employing smart technologies. Artificial intelligence (AI) and, more specifically, deep learning (DL) are receiving significant attention in assisting doctors in the detection of disease patterns without much human intervention. In agriculture, robots automate slow, repetitive and dull tasks, allowing farmers to focus more on improving overall production yields.The evolving trends point to the interface of artificial intelligence with machines being a factor in enhancing the decision-making capabilities of smart machines. This book provides relevant theoretical frameworks that include basic models, algorithms, circuit designs and the latest developments in experimental aspects in the field of distributed intelligence systems for industrial applications. The challenges encountered in the development of models for distributed intelligence systems for environmental monitoring are mitigated with artificial intelligence, machine learning and deep learning. This book identifies challenges and helps in applying solutions in the development of advanced intelligent systems for environmental monitoring.
"Mein MySQL Buch" mit Grundlagen, Fortgeschrittene Techniken und Best Practices ist das ultimative Handbuch für jeden, der seine Kenntnisse im Bereich Datenbankmanagement erweitern möchte. "Mein MySQL Buch" bietet eine umfassende Einführung in mySQL sowie zahlreiche fortgeschrittene Techniken und Best Practices, die von Einsteigern, Auszubildenden, Fortgeschrittenen und Experten gleichermaßen genutzt werden können."Mein MySQL Buch" ist in einer Schritt-für-Schritt-Struktur aufgebaut und bietet detaillierte Anleitungen, zahlreiche kommentierte Beispiele, Übungen, Multple Choise Aufgaben nach jedem Kapitel, Fallbeispiele, sowie ein umfangreiches Stichwortregister mit Erklärungen, um das Verständnis des Lesers zu verbessern. Jedes Kapitel baut auf den vorherigen Kapiteln auf, um eine nahtlose Lernumgebung zu schaffen.
OpenTelemetry is a revolution in observability data. Instead of running multiple uncoordinated pipelines, OpenTelemetry provides users with a single integrated stream of data, providing multiple sources of high-quality telemetry data: tracing, metrics, logs, RUM, eBPF, and more. This practical guide shows you how to set up, operate, and troubleshoot the OpenTelemetry observability system. Authors Austin Parker, head of developer relations at Lightstep and OpenTelemetry Community Maintainer, and Ted Young, cofounder of the OpenTelemetry project, cover every OpenTelemetry component, as well as observability best practices for many popular cloud, platform, and data services such as Kubernetes and AWS Lambda. You'll learn how OpenTelemetry enables OSS libraries and services to provide their own native instrumentation--a first in the industry. Ideal for application developers, OSS maintainers, operators and infrastructure teams, and managers and team leaders, this book guides you through: The principles of modern observability All OpenTelemetry components--and how they fit together A practical approach to instrumenting platforms and applications Methods for installing, operating, and troubleshooting an OpenTelemetry-based observability solution Ways to roll out and maintain end-to-end observability across a large organization How to write and maintain consistent, high-quality instrumentation without a lot of work.
Edge Computing Technology and Applications introduces all aspects of edge computing. Illustrations and graphics help make complex topics easy to understand. If you're a business decision maker, you'll welcome the jargon-free explanations of key concepts. Technical pros will appreciate the big-picture coverage of the central technologies of edge computing. You'll find essential coverage of the edge's systems and architectures, as well as how to prevent embarrassing and crippling cyber attacks. Throughout, the book's real-world use cases cut through the hype and reveal how edge computing is being effectively used in industry. about the reader For technology leaders and managers looking to rapidly get up to speed with edge computing.
Discover a collection of meta-heuristic algorithms for distributed systems in different application domains Meta-heuristic techniques are increasingly gaining favor as tools for optimizing distributed systems--generally, to enhance the utility and precision of database searches. Carefully applied, they can increase system effectiveness, streamline operations, and reduce cost. Since many of these techniques are derived from nature, they offer considerable scope for research and development, with the result that this field is growing rapidly. Meta-Heuristic Algorithms for Advanced Distributed Systems offers an overview of these techniques and their applications in various distributed systems. With strategies based on both global and local searching, it covers a wide range of key topics related to meta-heuristic algorithms. Those interested in the latest developments in distributed systems will find this book indispensable. Meta-Heuristic Algorithms for Advanced Distributed Systems readers will also find: Analysis of security issues, distributed system design, stochastic optimization techniques, and more Detailed discussion of meta-heuristic techniques such as the genetic algorithm, particle swam optimization, and many others Applications of optimized distribution systems in healthcare and other key industries Meta-Heuristic Algorithms for Advanced Distributed Systems is ideal for academics and researchers studying distributed systems, their design, and their applications.
Go beyond connecting services to understand the unique challenges encountered in industrial environments by building Industrial IoT architectures using AWSPurchase of the print or kindle book includes a free eBook in the PDF formatKey Features:Understand the key components of IoT Architecture and how it applies to Industry 4.0Walk through extensive examples and solutions across multiple IndustriesLearn how to collect, process, store, and analyse Industrial IoT dataBook Description:When it comes to using the core and managed services available on AWS for making decisions about architectural environments for an enterprise, there are as many challenges as there are advantages. This Industrial IoT book follows the journey of data from the shop floor to the boardroom, identifying goals and aiding in strong architectural decision-making.You'll begin from the ground up, analyzing environment needs and understanding what is required from the captured data, applying industry standards and conventions throughout the process. This will help you realize why digital integration is crucial and how to approach an Industrial IoT project from a holistic perspective. As you advance, you'll delve into the operational technology realm and consider integration patterns with common industrial protocols for data gathering and analysis with direct connectivity to data through sensors or systems. The book will equip you with the essentials for designing industrial IoT architectures while also covering intelligence at the edge and creating a greater awareness of the role of machine learning and artificial intelligence in overcoming architectural challenges.By the end of this book, you'll be ready to apply IoT directly to the industry while adapting the concepts covered to implement AWS IoT technologies.What You Will Learn:Discover Industrial IoT best practices and conventionsUnderstand how to get started with edge computingDefine and build IoT solution architectures from scratchUse AWS as the core of your solution platformApply advanced analytics and machine learning to your dataDeploy edge processing to react in near real time to events within your environmentWho this book is for:This book is for architects, engineers, developers, and technical professionals interested in building an edge and cloud-based Internet of Things ecosystem with a focus on industry solutions. Since the focus of this book is specifically on IoT, a solid understanding of core IoT technologies and how they work is necessary to get started. If you are someone with no hands-on experience, but are familiar with the subject, you'll find the use cases useful to learn how architectural decisions are made.
Data lakes and warehouses have become increasingly fragile, costly, and difficult to maintain as data gets bigger and moves faster. Data meshes can help your organization decentralize data, giving ownership back to the engineers who produced it. This book provides a concise yet comprehensive overview of data mesh patterns for streaming and real-time data services. Authors Hubert Dulay and Stephen Mooney examine the vast differences between streaming and batch data meshes. Data engineers, architects, data product owners, and those in DevOps and MLOps roles will learn steps for implementing a streaming data mesh, from defining a data domain to building a good data product. Through the course of the book, you'll create a complete self-service data platform and devise a data governance system that enables your mesh to work seamlessly. With this book, you will: Design a streaming data mesh using Kafka Learn how to identify a domain Build your first data product using self-service tools Apply data governance to the data products you create Learn the differences between synchronous and asynchronous data services Implement self-services that support decentralized data.
The exponential growth of data combined with the need to derive real-time business value is a critical issue today. An event-driven data mesh can power real-time operational and analytical workloads, all from a single set of data product streams. With practical real-world examples, this book shows you how to successfully design and build an event-driven data mesh. Building an Event-Driven Data Mesh provides: Practical tips for iteratively building your own event-driven data mesh, including hurdles you'll experience, possible solutions, and how to obtain real value as soon as possible Solutions to pitfalls you may encounter when moving your organization from monoliths to event-driven architectures A clear understanding of how events relate to systems and other events in the same stream and across streams A realistic look at event modeling options, such as fact, delta, and command type events, including how these choices will impact your data products Best practices for handling events at scale, privacy, and regulatory compliance Advice on asynchronous communication and handling eventual consistency
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.