Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari, an O’Reilly Media Company  (559)
  • Edward Elgar Publishing
  • NetLibrary, Inc
  • [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.  (405)
  • [Erscheinungsort nicht ermittelbar] : IBM Redbooks  (154)
Datasource
Material
Language
Subjects(RVK)
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (300 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: With Early Release ebooks, you get books in their earliest form—the author's raw and unedited content as he or she writes—so you can take advantage of these technologies long before the official release of these titles. JavaScript is the little scripting language that could. Once used chiefly to add interactivity to web browser windows, JavaScript is now a primary building block of powerful and robust applications. In this practical book, new and experienced JavaScript developers will learn how to use this language to create APIs as well as web, mobile, and desktop applications. Author and engineering leader Adam D. Scott covers technologies such as Node.js, GraphQL, React, and React Native. Ideal for developers who want to build full stack applications and web development beginners looking to bootstrap a startup, this book shows you how to create a single CRUD-style application that will work across several platforms. Explore GraphQL's simple process for querying data Learn about shared authentication for APIs, web apps, and native applications Build universal web applications with React and Next.js that perform and render on the server Use React Native to write cross-platform applications for iOS and Android that compile to native code Learn how to write desktop applications with Electron
    Note: Online resource; Title from title page (viewed March 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (250 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Learn the skills necessary to design, build, and deploy applications powered by machine learning. Through the course of this hands-on book, you’ll build an example ML-driven application from initial idea to deployed product. Data scientists, software engineers, and product managers with little or no ML experience will learn the tools, best practices, and challenges involved in building a real-world ML application step-by-step. Author Emmanuel Ameisen, who worked as a data scientist at Zipcar and led Insight Data Science’s AI program, demonstrates key ML concepts with code snippets, illustrations, and screenshots from the book’s example application. The first part of this guide shows you how to plan and measure success for an ML application. Part II shows you how to build a working ML model, and Part III explains how to improve the model until it fulfills your original vision. Part IV covers deployment and monitoring strategies. This book will help you: Determine your product goal and set up a machine learning problem Build your first end-to-end pipeline quickly and acquire an initial dataset Train and evaluate your ML model and address performance bottlenecks Deploy and monitor models in a production environment
    Note: Online resource; Title from title page (viewed February 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (200 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Threat modeling is one of the most essential—and most misunderstood—parts of the development lifecycle. Whether you’re a security practitioner or application developer, this book will help you gain a better understanding of core concepts and how to apply them to your practice to protect your systems from threats. Authors Izar Tarandach and Matthew Coles walk you through the myriad ways to approach and execute threat modeling. Contrary to popular belief, the process takes neither incredibly advanced security knowledge nor an unmanageable amount of effort. But it’s critical for spotting and addressing potential concerns in a cost-effective way before the code’s written and it’s too late to find a solution. Find out why threat modeling is important and how it can make you and your team better, more well-rounded architects and developers Learn the most effective ways to integrate threat modeling into your development lifecycle Use the results of a threat modeling exercise on other aspects of the system lifecycle
    Note: Online resource; Title from title page (viewed April 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Language: English
    Pages: 1 online resource (600 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Can a system ever truly be considered reliable if it isn't fundamentally secure? In two previous O'Reilly books, experts from Google showed how reliability is fundamental to service design. Site Reliability Engineering and The Site Reliability Workbook demonstrated how and why a commitment to the entire service lifecycle enables organizations to successfully build, deploy, monitor, and maintain software systems. Security is also crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, reliability, and availability. In a world where most products are connected to the internet, and with cloud technologies and machine learning becoming more prevalent, enabling security by default is increasingly important. This book shares best practices to help an organization of any size design scalable and reliable systems that are fundamentally secure. It also offers insights into how teams across an organization can collaborate on security and reliability. Specifically, you'll learn about: Design Strategies Implementation and Operations Preparing for the Worst: Detection and Response Scaling Security and the Organization
    Note: Online resource; Title from title page (viewed March 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (300 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Data is getting bigger, arriving faster, and coming in varied formats—and it all needs to be processed at scale for analytics or machine learning. How can you process such varied data workloads efficiently? Enter Apache Spark. Updated to emphasize new features in Spark 2.x., this second edition shows data engineers and scientists why structure and unification in Spark matters. Specifically, this book explains how to perform simple and complex data analytics and employ machine-learning algorithms. Through discourse, code snippets, and notebooks, you’ll be able to: Learn Python, SQL, Scala, or Java high-level APIs: DataFrames and Datasets Peek under the hood of the Spark SQL engine to understand Spark transformations and performance Inspect, tune, and debug your Spark operations with Spark configurations and Spark UI Connect to data sources: JSON, Parquet, CSV, Avro, ORC, Hive, S3, or Kafka Perform analytics on batch and streaming data using Structured Streaming Build reliable data pipelines with open source Delta Lake and Spark Develop machine learning pipelines with MLlib and productionize models using MLflow Use open source Pandas framework Koalas and Spark for data transformation and feature engineering
    Note: Online resource; Title from title page (viewed June 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (150 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Operators are a way of packaging, deploying, and managing Kubernetes applications. A Kubernetes application doesn’t just run on Kubernetes; it’s composed and managed in Kubernetes terms. Operators add application-specific operational knowledge to a Kubernetes cluster, making it easier to automate complex, stateful applications and to augment the platform. Operators can coordinate application upgrades seamlessly, react to failures automatically, and streamline repetitive maintenance like backups. Think of Operators as site reliability engineers in software. They work by extending the Kubernetes control plane and API, helping systems integrators, cluster administrators, and application developers reliably deploy and manage key services and components. Using real-world examples, authors Jason Dobies and Joshua Wood demonstrate how to use Operators today and how to create Operators for your applications with the Operator Framework and SDK. Learn how to establish a Kubernetes cluster and deploy an Operator Examine a range of Operators from usage to implementation Explore the three pillars of the Operator Framework: the Operator SDK, the Operator Lifecycle Manager, and Operator Metering Build Operators from the ground up using the Operator SDK Build, package, and run an Operator in development, testing, and production phases Learn how to distribute your Operator for installation on Kubernetes clusters
    Note: Online resource; Title from title page (viewed March 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (451 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Much has changed in technology over the past decade. Data is hot, the cloud is ubiquitous, and many organizations need some form of automation. Throughout all these transformations, Python has become one of the most popular languages in the world. This practical guide shows you how to use Python for everyday Linux systems administration tasks with today’s most useful DevOps tools, including Docker, Kubernetes, and Terraform. Learning how to interact and automate with Linux is an essential skill for millions of professionals. Python makes it much easier. With this book, you’ll learn how to develop software and solve problems using containers, as well as how to monitor, instrument, load-test, and operationalize your software. If you’re looking for effective ways to "get stuff done" in Python, this is your guide. Automate several tasks using Python Work more efficiently by using a smaller subset of the language Use continuous integration systems to increase software quality Mix shell and Python commands to solve problems
    Note: Online resource; Title from title page (viewed January 3, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (540 pages)
    Edition: 4th edition
    Keywords: Electronic books ; local
    Abstract: Why is PHP the most widely used programming language on the web? This updated edition teaches everything you need to know to create effective web applications using the latest features in PHP 7.3. You’ll start with the big picture and then dive into language syntax, programming techniques, and other details, using examples that illustrate both correct usage and common idioms. If you have a working knowledge of HTML and CSS, authors Kevin Tatroe and Peter MacIntyre provide style tips and practical programming advice in a clear, concise manner to help you become a top-notch PHP programmer. Get an overview of what’s possible when you use PHP programs Learn language fundamentals, including data types, variables, operators, and flow control statements Explore functions, strings, arrays, and objects Apply common web application techniques, such as form processing, data validation, session tracking, and cookies Interact with relational databases like MySQL or NoSQL databases such as MongoDB Generate dynamic images, create PDF files, and parse XML files Learn secure scripts, error handling, performance tuning, and other advanced topics Get a quick reference to PHP core functions and standard extensions
    Note: Online resource; Title from title page (viewed April 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (94 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: If you want to build an enterprise-quality application that uses natural language text, but aren’t sure where to begin or what tools to use, this practical guide will help get you started. You’ll explore special concerns for developing text-based applications, such as performance. Alex Thomas, data scientist at Indeed, shows software engineers and data scientists how to build scalable NLP applications using deep learning and the Apache Spark NLP library. Through concrete examples, practical and theoretical explanations, and hands-on exercises for using NLP on the Spark processing framework, this book teaches you everything from NLP basics to applications of powerful modern techniques. Process text in a distributed environment using Spark NLP, a production-ready library for NLP built on Spark Create, tune, and deploy your own word embeddings Adapt your NLP applications to multiple languages Use text in machine learning and deep learning Learn why these techniques work from a machine learning, linguistic, and practical point of view
    Note: Online resource; Title from title page (viewed July 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781492043423 , 1492043427 , 9781492043409 , 1492043400
    Language: English
    Pages: 1 online resource (500 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als
    DDC: 005.12
    Keywords: Software architecture ; Software architecture Vocational guidance ; Electronic books ; local ; Architecture logicielle ; Architecture logicielle ; Orientation professionnelle ; Software architecture
    Abstract: Although salary surveys worldwide regularly identify software architect as one of the top ten best jobs, no decent guides exist to help developers become architects. Until now. This practical guide provides the first comprehensive overview of software architecture’s many aspects. You’ll examine architectural characteristics, architectural patterns, component determination, diagramming and presenting architecture, evolutionary architecture, and many other topics. Authors Neal Ford and Mark Richards help you learn through examples in a variety of popular programming languages, such as Java, C#, JavaScript, and others. You’ll focus on architecture principles with examples that apply across all technology stacks.
    Note: Online resource; Title from title page (viewed February 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (300 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Every day, companies struggle to scale critical applications. As traffic volume and data demands increase, these applications become more complicated and brittle, exposing risks and compromising availability. And with the popularity of software as a service, scaling has never been more important. Updated with an expanded focus on modern architecture paradigms such as microservices and cloud computing, this practical guide provides techniques for building systems that can handle huge quantities of traffic, data, and demand without affecting the quality your customers expect. Author Lee Atchison shows architects, managers, and directors in both engineering andoperations organizations how to build applications at scale that run more smoothly and reliably and meet the needs of your customers. See how scaling affects the availability of your services, why that matters, and how to improve it Dive into a modern service-based application architecture that ensures high availability and reduces the effects of service failures Explore the Single Team Owned Service Architecture paradigm (STOSA)—a model for scaling your development organization as your application scales Understand, measure, and mitigate risk in your systems Use the cloud to build highly scalable applications
    Note: Online resource; Title from title page (viewed June 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (58 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als Yablonski, Jon Laws of UX
    RVK:
    Keywords: Electronic books ; local ; Webdesign ; Gebrauchsgrafik ; Mensch-Maschine-Kommunikation ; Benutzerfreundlichkeit ; Verhaltenspsychologie
    Abstract: Every designer today should learn the fundamentals of psychology. Instead of forcing users to conform to a product design or experience, designers need to learn how users behave and interact with various digital interfaces. This guide provides some key principles from psychology to help you design more intuitive, human-centered products and experiences. Humans have an underlying blueprint for how we perceive and process the world around us, and through simple lessons in psychology, this guide will help you define this blueprint.
    Note: Online resource; Title from title page (viewed April 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (250 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: With Early Release ebooks, you get books in their earliest form—the authors' raw and unedited content as they write—so you can take advantage of these technologies long before the official release of these titles. This book will enable you to apply graph thinking to solve complex problems. If you want to learn how to build architectures for extracting value for your domain’s complex problems, then this book is for you. You’ll learn how to think about your data as a graph, and how to determine if graph technology is right for your application. The book describes techniques for scalable, real-time, and multimodel architectures that solve complex problems, and shows how companies are successfully applying graph thinking in distributed production environments. Authors Denise Koessler Gosnell and Matthias Broecheler also introduce the Graph Schema Language, a set of terminology and visual illustrations to normalize how graph practitioners communicate conceptual graph models, graph schema, and graph database design.
    Note: Online resource; Title from title page (viewed April 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (280 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: As Python continues to grow in popularity, projects are becoming larger and more complex. Many Python developers are now taking an interest in high-level software architecture patterns such as hexagonal/clean architecture, event-driven architecture, and strategic patterns prescribed by domain-driven design (DDD). But translating those patterns into Python isn’t always straightforward. With this practical guide, Harry Percival and Bob Gregory from MADE.com introduce proven architectural design patterns to help Python developers manage application complexity. Each pattern is illustrated with concrete examples in idiomatic Python that explain how to avoid some of the unnecessary verbosity of Java and C# syntax. You’ll learn how to implement each of these patterns in a Pythonic way. Architectural design patterns include: Dependency inversion, and its links to ports and adapters (hexagonal/clean architecture) Domain-driven design’s distinction between entities, value objects, and aggregates Repository and Unit of Work patterns for persistent storage Events, commands, and the message bus Command Query Responsibility Segregation (CQRS) Event-driven architecture and reactive microservices
    Note: Online resource; Title from title page (viewed April 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (350 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Most applications today are distributed in some fashion. Monitoring the health and performance of these distributed architectures requires a new approach. Enter distributed tracing, a method of profiling and monitoring applications—especially those that use microservice architectures. There’s just one problem: distributed tracing can be hard. But it doesn’t have to be. With this practical guide, you’ll learn what distributed tracing is and how to use it to understand the performance and operation of your software. Key players at LightStep walk you through instrumenting your code for tracing, collecting the data that your instrumentation produces, and turning it into useful, operational insights. If you want to start implementing distributed tracing, this book tells you what you need to know. You’ll learn: The pieces of a distributed tracing deployment: Instrumentation, data collection, and delivering value Best practices for instrumentation (the methods for generating trace data from your service) How to deal with or avoid overhead, costs, and sampling How to work with spans (the building blocks of request-based distributed traces) and choose span characteristics that lead to valuable traces Where distributed tracing is headed in the future
    Note: Online resource; Title from title page (viewed June 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (375 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: If you want to build, iterate and scale NLP systems in a business setting and to tailor them for various industry verticals, this is your guide. Consider the task of building a chatbot or text classification system at your organization. In the beginning, there may be little or no data to work with. At this point, a basic solution that uses rule based systems or traditional machine learning will be apt. As you accumulate more data, more sophisticated—and often data intensive—ML techniques can be used including deep learning. At each step of this journey, there are dozens of alternative approaches you can take. This book helps you navigate this maze of options.
    Note: Online resource; Title from title page (viewed May 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (224 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Serverless is a revolution in the way organizations build and deploy software. With this hands-on guide, Java engineers will learn how to use their language experience in the new world of serverless computing. You’ll discover how this cloud computing model can drastically reduce the complexity in developing and operating applications while reducing costs and time to market. Engineering leaders John Chapin and Mike Roberts guide you through the process of developing serverless applications using AWS Lambda, Amazon’s event-driven, serverless computing platform. You’ll learn how to prepare the development environment, program Lambda functions, and deploy and operate your serverless software. Chapters includes exercises to help you through each aspect of the process. Get an introduction to serverless, functions-as-a-service, and AWS Lambda Learn how to deploy working Lambda functions to the cloud Program Lambda functions and learn how to get data in and out Build and package Java-based Lambda code and dependencies Create serverless applications by building a serverless API and data pipeline Test your serverless applications using automated techniques Apply advanced techniques to build production-ready applications
    Note: Online resource; Title from title page (viewed February 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (37 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Learn how to build a serverless real-world application in the cloud that’s reliable, secure, maintainable, and can handle millions of users. If you have experience building traditional web applications, this practical guide shows you how to get started with serverless. Cloud engineer Wietse Venema takes you through the steps necessary to build serverless applications with Cloud Run, a container-based serverless platform on Google Cloud. Through the course of the book, you’ll learn how to become productive with serverless technology. You will build and explore several example applications that highlight different parts of the serverless stack, using (light) frontend technology and Go on the back end. You can also follow the lessons in the book using your own project on Google Cloud Platform. You’ll learn how to: Build a serverless application with Google’s Cloud Run and Firestore Approach testing and development Handle user management and authentication Combine serverless with a traditional relational database Run and monitor production services Integrate your application with external APIs
    Note: Online resource; Title from title page (viewed July 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (232 pages)
    Edition: 7th edition
    Keywords: Electronic books ; local
    Abstract: For web developers and other programmers interested in using JavaScript, this bestselling book provides the most comprehensive JavaScript reference section on the market. The seventh edition represents a significant update, with new material for ECMAScript 2017 (ES8), and new chapters on language-specific features. JavaScript: The Definitive Guide is ideal for experienced programmers who want to learn the programming language of the web, and for current JavaScript programmers who want to master it.
    Note: Online resource; Title from title page (viewed July 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (450 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Coding and testing are generally considered separate areas of expertise. In this practical book, Java expert Scott Oaks takes the approach that anyone who works with Java should be equally adept at understanding how code behaves in the Java Virtual Machine—including the tunings likely to help performance. This updated second edition helps you gain in-depth knowledge of Java application performance using both the JVM and the Java platform. Developers and performance engineers alike will learn a variety of features, tools, and processes for improving the way Java 8 and 11 LTS releases perform. While the emphasis is on production-supported releases and features, this book also features previews of exciting new technologies such as ahead-of-time compilation and experimental garbage collections. Understand how various Java platforms and compilers affect performance Learn how Java garbage collection works Apply four principles to obtain best results from performance testing Use the JDK and other tools to learn how a Java application is performing Minimize the garbage collector’s impact through tuning and programming practices Tackle performance issues in Java EE and SE APIs Improve Java-driven database application performance
    Note: Online resource; Title from title page (viewed February 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (56 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Level up with Tableau to build eye-catching, easy-to-interpret data visualizations. In this follow-up guide to 2018’s Practical Tableau, author Ryan Sleeper takes you through a collection of unique tips and tutorials for using this popular software. Beginning to advanced Tableau users will learn how to go beyond Show Me to make better data charts and learn dozens of tricks to improve both the author and user experience. Featuring many tutorials he designed himself, Ryan shows you how to create charts that empower Tableau users to explore, understand, and derive value from their data. He also shares many of his favorite tricks that enabled him to become a Tableau Zen Master, Tableau Public Visualization of the Year author, and Tableau Iron Viz Champion. Learn what’s new in Tableau since Practical Tableau was released in 2018 Examine unique new charts—timelines, custom gauges, and leapfrog charts—plus innovations such as highlight tables, scatter plots, and maps Get tips that can help make a Tableau developer’s life easier Understand what developers can do to make users’ lives easier
    Note: Online resource; Title from title page (viewed July 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (87 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Your Python code may run correctly, but you need it to run faster. By exploring the fundamental theory behind design choices, the updated edition of this practical guide, expanded and enhanced for Python 3, helps you gain a deeper understanding of Python’s implementation. You’ll learn how to locate performance bottlenecks and significantly speed up your code in high-data-volume programs. How can you take advantage of multicore architectures or clusters? Or build a system that can scale up and down without losing reliability? Experienced Python programmers and students alike will learn concrete solutions to these and other issues, along with war stories from companies that use high-performance Python for social media analytics, productionized machine learning, and other situations. Get a better grasp of NumPy, Cython, and profilers Learn how Python abstracts the underlying computer architecture Understand performant pandas Use profiling to find bottlenecks in CPU time and memory usage Write efficient programs by choosing appropriate data structures Speed up matrix, vector, and even tensor computations Use tools to compile Python down to machine code, on CPUs and GPUs Manage multiple I/O and computational operations concurrently Convert multiprocessing code to run on a local or remote cluster Deploy code faster using tools like Docker Solve large problems while using less RAM Get real-life stories and lessons from Python programmers
    Note: Online resource; Title from title page (viewed June 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (52 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: With a new generation of services and frameworks, frontend and mobile developers can use their existing skill set to build full stack applications by leveraging the cloud. Developers can build robust applications with production-ready features such as authentication, APIs, data layers, machine learning, chatbots, and AR scenes more easily than ever by taking advantage of these new serverless and cloud technologies. This practical guide explains how. Nader Dabit, developer advocate at Amazon Web Services, shows developers how to build full stack applications using React, AWS, GraphQL, and the Amplify Framework. You’ll learn how to create and incorporate services into your client applications while exploring general best practices, deployment strategies, continuous integration and delivery, and rich media management along the way. Learn how to build applications that solve real problems Understand what is (and isn’t) possible when using these technologies Examine how authentication works—and learn the difference between authentication and authorization Discover how serverless functions work and why they’re important Use GraphQL in your application—and learn why it’s important Learn how to build full stack applications on AWS
    Note: Online resource; Title from title page (viewed November 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (66 pages)
    Edition: 3rd edition
    Keywords: Electronic books ; local
    Abstract: Imagine what you could do if scalability wasn't a problem. With this hands-on guide, you’ll learn how the Cassandra database management system handles hundreds of terabytes of data while remaining highly available across multiple data centers. This third edition—updated for Cassandra 4.0—provides the technical details and practical examples you need to put this database to work in a production environment. Authors Jeff Carpenter and Eben Hewitt demonstrate the advantages of Cassandra’s nonrelational design, with special attention to data modeling. If you’re a developer, DBA, or application architect looking to solve a database scaling issue or future-proof your application, this guide helps you harness Cassandra’s speed and flexibility. Understand Cassandra’s distributed and decentralized structure Use the Cassandra Query Language (CQL) and cqlsh—the CQL shell Create a working data model and compare it with an equivalent relational model Develop sample applications using client drivers for languages including Java, Python, and Node.js Explore cluster topology and learn how nodes exchange data
    Note: Online resource; Title from title page (viewed July 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (800 pages)
    Edition: 3rd edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Want to create devices that interact with the physical world? This cookbook is perfect for anyone who wants to experiment with the popular Arduino microcontroller and programming environment. You’ll find more than 200 tips and techniques for building a variety of objects and prototypes such as IoT solutions, environmental monitors, location and position-aware systems, and products that can respond to touch, sound, heat, and light. You don’t need to have mastered Arduino or programming to get started. Updated for the Arduino 1.5 release, the recipes in this third edition include practical examples and guidance to help you begin, expand, and enhance your projects right away—whether you’re an engineer, designer, artist, student, or hobbyist. Get up to speed on the Arduino board and essential software concepts quickly Learn basic techniques for reading digital and analog signals Use Arduino with a variety of popular input devices and sensors Drive visual displays, generate sound, and control several types of motors Interact with devices that use remote controls, including TVs and appliances Learn techniques for handling time delays and time measurement Apply advanced coding and memory-handling techniques
    Note: Online resource; Title from title page (viewed April 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (300 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Early system administration required in-depth knowledge of a variety of services on individual systems. Now, the job is increasingly complex and different from one company to the next with an ever-growing list of technologies and third-party services to integrate. How does any one individual stay relevant in systems and services? This practical guide helps anyone in operations—sysadmins, automation engineers, IT professionals, and site reliability engineers—understand the essential concepts of the role today. Collaboration, automation, and the evolution of systems change the fundamentals of operations work. No matter where you are in your journey, this book provides you the information to craft your path to advancing essential system administration skills. Author Jennifer Davis provides examples of modern practices and tools with recommended materials to advance your skills. Topics include: Development and testing: Version control, fundamentals of virtualization and containers, testing, and architecture reviewDeploying and configuring services: Infrastructure management, networks, security, storage, serverless, and release managementScaling administration: Monitoring and observability, capacity planning, log management and analysis, and security and compliance
    Note: Online resource; Title from title page (viewed July 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (150 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: If you’re among the Python developers put off by Asyncio’s complexity, it’s time to take another look. Asyncio is complicated because it aims to solve problems in concurrent network programming for both framework developers and end-user developers like you. The features you need to consider are a small subset of the whole Asyncio API, but picking out the right features is the tricky part. That’s where this practical book comes in. Veteran Python developer Caleb Hattingh helps end-user developers gain a basic understanding of Asyncio’s building blocks—enough to get you started writing simple event-based programs. You’ll learn why Asyncio offers a safer alternative to preemptive multitasking (threading) and how this API provides a simple way to support thousands of simultaneous socket connections. Get a critical comparison of Asyncio and threading for concurrent network programming Take an Asyncio walkthrough, including a quickstart guide to help you hit the ground looping with event-based programming Learn the difference between Asyncio features for end-user developers and those for framework developers Understand Asyncio’s new async/await language syntax, including coroutines and task and future APIs Get detailed case studies (with code) of some popular Asyncio-compatible third-party libraries
    Note: Online resource; Title from title page (viewed March 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (51 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking—until now. This practical guide provides both defensive and offensive security concepts that software engineers can easily learn and apply. Andrew Hoffman, a product security lead at Salesforce.com, introduces three pillars of web application security: recon, offense, and defense. You’ll learn methods for effectively researching and analyzing modern web applications—including those you don’t have direct access to. You’ll also learn how to apply countermeasures to your own applications in order to prevent or mitigate risk from hackers. Ideal as a reference guide or educational text, this book helps you: Explore common vulnerabilities that plague today's web applications Learn essential hacking techniques that attackers use for exploiting applications Map and document web applications for which you do not have direct access Hack your application by applying the OWASP 10 exploits and other attacks Learn how to code your application to protect against the attacks you’ve identified Get practical tips to help you improve the overall security of your web products Develop and deploy your own customized exploits that can bypass many defenses
    Note: Online resource; Title from title page (viewed June 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (93 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Statistical methods are a key part of data science, yet few data scientists have formal statistical training. Courses and books on basic statistics rarely cover the topic from a data science perspective. The second edition of this practical guide—now including examples in Python as well as R—explains how to apply various statistical methods to data science, tells you how to avoid their misuse, and gives you advice on what’s important and what’s not. Many data scientists use statistical methods but lack a deeper statistical perspective. If you’re familiar with the R or Python programming languages, and have had some exposure to statistics but want to learn more, this quick reference bridges the gap in an accessible, readable format. With this updated edition, you’ll dive into: Exploratory data analysis Data and sampling distributions Statistical experiments and significance testing Regression and prediction Classification Statistical machine learning Unsupervised learning
    Note: Online resource; Title from title page (viewed May 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (50 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The future will be increasingly decentralized. As the publicity surrounding bitcoin and blockchain has shown, decentralized technology and distributed business models are already popular. Yet the disruptive potential of this technology is obscured by hype and misconceptions in equal measure. In this detailed guide, Lorne Lantz and Daniel Cawrey distill the complex ideas behind blockchain into an easily digestible reference that shows what is really going on under the hood. Finance and technology professionals will learn how a blockchain works as they explore the evolution and current state of cryptocurrencies, and the function of smart contracts. If you’re evaluating whether to invest your time in the cryptocurrency and blockchain industry, this book is for you. Get beyond the buzzwords and discover what the technology has to offer. Learn why Bitcoin was fundamentally important to the birth of blockchain Explore altcoin and altchain successes and failures, to see what can be done with blockchains and cryptocurrencies Understand the challenges of scaling a blockchain and forking a blockchain project See what Ethereum offers beyond Bitcoin Examine how the money flows in crypto markets Discover why, how, and where governments are intervening in the cryptocurrency and blockchain industry Understand the perspectives of real-world practitioners in the space
    Note: Online resource; Title from title page (viewed October 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (210 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: How can startups successfully scale customer acquisition and revenue growth with a lean team? Out-of-the-box acquisition solutions from Facebook, Google, and others provide a good start, but the companies that can tailor those solutions to meet their specific needs, objectives, and goals will come out winners. With this practical book, author Lomit Patel shows you how to use AI and machine learning (ML) to provide an operational layer atop those acquisition solutions to deliver meaningful results for your company. You’ll learn how to adapt, customize, and personalize cross-channel user journeys to help your company attract and maintain customers. Learn how AI and ML can support the customer acquisition efforts of a lean startup Dive into Customer Acquisition 3.0, an initiative for gaining and retaining customers Explore ways to use ML for marketing purposes Understand the key metrics for determining the growth of your startup Determine the right strategy to foster user acquisition in your company Manage the increased complexity and risk inherent in AI projects
    Note: Online resource; Title from title page (viewed March 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (600 pages)
    Edition: 4th edition
    Keywords: Electronic books ; local
    Abstract: Java continues to grow and evolve, and this Cookbook continues to evolve in tandem. This book helps to get you up to speed right away with hundreds of hands-on recipes across a broad range of Java topics. You’ll learn useful techniques for everything from string handling and functional programming to network communication. Each recipe includes self-contained code solutions that you can freely use, along with a discussion of how and why they work. If you are familiar with the basics of the Java language, this cookbook will bolster your knowledge of the language in general and its many recent changes and how to apply them in your day-to-day development. Recipes include: Methods for compiling, running, and debugging “Packaging” Java classes and building applications Manipulating, comparing, and rearranging text Regular expressions for string- and pattern-matching Handling numbers, dates, and times Structuring data with collections, arrays, and other types Object-oriented and functional programming techniques Input/Output, Directory and filesystem operations Network programming on both client and server Processing JSON for data interchange Multithreading and concurrency Using Java in Big Data applications Interfacing Java with other languages The 4th Edition of this book has been updated to cover changes through Java 12 and includes new recipes for Big Data and data science.
    Note: Online resource; Title from title page (viewed April 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (275 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Companies are spending billions on machine learning projects, but it’s money wasted if the models can’t be deployed effectively. In this practical guide, Hannes Hapke and Catherine Nelson walk you through the steps of automating a machine learning pipeline using the TensorFlow ecosystem. You’ll learn the techniques and tools that will cut deployment time from days to minutes, so that you can focus on developing new models rather than maintaining legacy systems. Data scientists, machine learning engineers, and DevOps engineers will discover how to go beyond model development to successfully productize their data science projects, while managers will better understand the role they play in helping to accelerate these projects. The book also explores new approaches for integrating data privacy into machine learning pipelines. Understand the machine learning management lifecycle Implement data pipelines with Apache Airflow and Kubeflow Pipelines Work with data using TensorFlow tools like ML Metadata, TensorFlow Data Validation, and TensorFlow Transform Analyze models with TensorFlow Model Analysis and ship them with the TFX Model Pusher Component after the ModelValidator TFX Component confirmed that the analysis results are an improvement Deploy models in a variety of environments with TensorFlow Serving, TensorFlow Lite, and TensorFlow.js Learn methods for adding privacy, including differential privacy with TensorFlow Privacy and federated learning with TensorFlow Federated Design model feedback loops to increase your data sets and learn when to update your machine learning models
    Note: Online resource; Title from title page (viewed August 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Language: English
    Pages: 1 online resource (55 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redpaper publication describes the advantages of using IBM Power System AC922 for cognitive solutions, and how it can enhance clients' businesses. In order to optimize the hardware and software, IBM partners with NVIDIA, Mellanox, H2O.ai, SQream, Kinetica, and other prominent companies to design the Power AC922 server, specifically enhanced for the cognitive era. Most of its outstanding hardware features, such as NVIDIA NVLink 2.0 and PCIe 4.0, are described in this publication to illustrate the advantages that clients can realize in comparison with IBM competitors. We also include a brief description about what cognitive computing is, and how to use IBM Watson® Machine Learning cognitive solutions to bring more value to your business ecosystem. Additionally, we show performance charts that show the advantages of using Power AC922 versus x86 competitors. In the last chapter, we describe the most remarkable use cases in which IBM solves real problems using cognitive solutions. This IBM Redpaper publication is aimed at IT technical audiences, especially decision-making levels that need a full look at the benefits and improvements that an IBM Cognitive Solution can offer. It also provides valuable information to data science professionals, enabling them to plan their modeling needs. Finally, it offers information to the infrastructure support group in charge of maintaining the solution.
    Note: Online resource; Title from title page (viewed October 17, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Language: English
    Pages: 1 online resource (100 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption environment for . In addition, this book concentrates on the planning and preparing of the environment. It offers implementation, configuration, and operational examples that can be used in Linux on Z volume encryption environments. This publication is intended for IT architects, system administrators, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
    Note: Online resource; Title from title page (viewed April 8, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (270 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® publication provides information to help clients that have JES3 and want to migrate to JES2. It provides a comprehensive list of the differences between the two job entry subsystems and provides information to help you determine the migration effort and actions. This book considers the features of JES2 as available on releases of IBM z/OS® V2R3 and V2R4. It should be used with JES3 to JES2 Migration Considerations, SG24-8083. This publication is divided into three parts: Part 1, "Planning to migrate from JES3 to JES2" on page 1, gives you information to make the decision and plan your migration. Part 2, "Use case study" on page 111, provides a Use Case Study that is based on an actual customer experience in a successful migration. Part 3, "Appendixes" on page 193, provides an appendix with sample tools that can help the migration process and exploitation of some of the new JES2 functions. This book is aimed at operations personnel, system programmers, and application developers
    Note: Online resource; Title from title page (viewed November 6, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (244 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: As deep neural networks (DNNs) become increasingly common in real-world applications, the potential to deliberately "fool" them with data that wouldn’t trick a human presents a new attack vector. This practical book examines real-world scenarios where DNNs—the algorithms intrinsic to much of AI—are used daily to process image, audio, and video data. Author Katy Warr considers attack motivations, the risks posed by this adversarial input, and methods for increasing AI robustness to these attacks. If you’re a data scientist developing DNN algorithms, a security architect interested in how to make AI systems more resilient to attack, or someone fascinated by the differences between artificial and biological perception, this book is for you. Delve into DNNs and discover how they could be tricked by adversarial input Investigate methods used to generate adversarial input capable of fooling DNNs Explore real-world scenarios and model the adversarial threat Evaluate neural network robustness; learn methods to increase resilience of AI systems to adversarial data Examine some ways in which AI might become better at mimicking human perception in years to come
    Note: Online resource; Title from title page (viewed July 23, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Language: English
    Pages: 1 online resource (256 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: As workloads are being offloaded to IBM® LinuxONE based cloud environments, it is important to ensure that these workloads and environments are secure. This IBM Redbooks® publication describes the necessary steps to secure your environment from the hardware level through all of the components that are involved in a LinuxONE cloud infrastructure that use Linux and IBM z/VM®. The audience for this book is IT architects, IT Specialists, and those users who plan to use LinuxONE for their cloud environments.
    Note: Online resource; Title from title page (viewed August 1, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (26 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This document is intended to facilitate the deployment of the Multicloud Solution for Business Continuity by using IBM Spectrum Virtualize for Public Cloud on AWS. To complete the tasks it describes, you must understand the IBM FlashSystem 9100, IBM Spectrum Virtualize for Public Cloud on AWS Cloud. The information in this document is distributed on an "as is" basis without any warranty that is either expressed or implied. Support assistance for the use of this material is limited to situations where IBM Storwize® or IBM FlashSystem storage devices are supported and entitled and where the issues are specific to a blueprint implementation.
    Note: Online resource; Title from title page (viewed June 11, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (175 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Most companies work hard to avoid costly failures, but in complex systems a better approach is to embrace and learn from them. Through chaos engineering, you can proactively hunt for evidence of system weaknesses before they trigger a crisis. This practical book shows software developers and system administrators how to plan and run successful chaos engineering experiments. System weaknesses go beyond your infrastructure, platforms, and applications to include policies, practices, playbooks, and people. Author Russ Miles explains why, when, and how to test systems, processes, and team responses using simulated failures on Game Days. You’ll also learn how to work toward continuous chaos through automation with features you can share across your team and organization. Learn to think like a chaos engineer Build a hypothesis backlog to determine what could go wrong in your system Develop your hypotheses into chaos engineering experiment Game Days Write, run, and learn from automated chaos experiments using the open source Chaos Toolkit Turn chaos experiments into tests to confirm that you’ve overcome the weaknesses you discovered Observe and control your automated chaos experiments while they are running
    Note: Online resource; Title from title page (viewed July 15, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (89 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redpaper publication provides an update to the original description of IBM Reference Architecture for Genomics. This paper expands the reference architecture to cover all of the major vertical areas of healthcare and life sciences industries, such as genomics, imaging, and clinical and translational research. The architecture was renamed IBM Reference Architecture for High Performance Data and AI in Healthcare and Life Sciences to reflect the fact that it incorporates key building blocks for high-performance computing (HPC) and software-defined storage, and that it supports an expanding infrastructure of leading industry partners, platforms, and frameworks. The reference architecture defines a highly flexible, scalable, and cost-effective platform for accessing, managing, storing, sharing, integrating, and analyzing big data, which can be deployed on-premises, in the cloud, or as a hybrid of the two. IT organizations can use the reference architecture as a high-level guide for overcoming data management challenges and processing bottlenecks that are frequently encountered in personalized healthcare initiatives, and in compute-intensive and data-intensive biomedical workloads. This reference architecture also provides a framework and context for modern healthcare and life sciences institutions to adopt cutting-edge technologies, such as cognitive life sciences solutions, machine learning and deep learning, Spark for analytics, and cloud computing. To illustrate these points, this paper includes case studies describing how clients and IBM Business Partners alike used the reference architecture in the deployments of demanding infrastructures for precision medicine. This publication targets technical professionals (consultants, technical support staff, IT Architects, and IT Specialists) who are responsible for providing life sciences solutions and support.
    Note: Online resource; Title from title page (viewed September 8, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (70 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redpaper™ publication is a comprehensive guide that covers the IBM Power Systems™ LC921 and LC922 (9006-12P and 9006-22P)) servers that use the current IBM POWER9™ processor-based technology and supports Linux operating systems (OSes). The objective of this paper is to introduce the offerings and their capacities and available features. These new Linux scale-out systems provide differentiated performance, scalability, and low acquisition cost, and include the following features: Superior throughput and performance for high-value Linux workloads. Low acquisition cost through system optimization (industry-standard memory and industry-standard three-year warranty). Rich I/O options in the system unit. There are 12 large form factor (LFF)/small form factor (SFF) bays for 12 SAS/SATA hard disk drives (HDDs) or solid-state drives (SSDs), and four bays that are available for Non-Volatile Memory Express (NVMe) Gen3 adapters. Includes Trusted Platform Module (TPM) 2.0 Nuvoton NPCT650ABAWX through I2C (for secure boot and trusted boot). Integrated MicroSemi PM8069 SAS/SATA 16-port Internal Storage Controller Peripheral Component Interconnect Express (PCIe) 3.0 x8 with RAID 0, 1, 5, and 10 support (no write cache). Integrated Intel XL710 Quad Port 10 GBase-T PCIe 3.0 x8 UIO built-in local area network (LAN) (one shared management port). Dedicated 1 Gb Intelligent Platform Management Interface (IPMI) port. This publication is for professionals who want to acquire a better understanding of IBM Power Systems products. The intended audience includes: Clients Sales and marketing professionals Technical support professionals IBM Business Partners Independent software vendors (ISVs)
    Note: Online resource; Title from title page (viewed May 16, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (331 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: With this practical book, architects, CTOs, and CIOs will learn a set of patterns for the practice of architecture, including analysis, documentation, and communication. Author Eben Hewitt shows you how to create holistic and thoughtful technology plans, communicate them clearly, lead people toward the vision, and become a great architect or Chief Architect. This book covers each key aspect of architecture comprehensively, including how to incorporate business architecture, information architecture, data architecture, application (software) architecture together to have the best chance for the system’s success. Get a practical set of proven architecture practices focused on shipping great products using architecture Learn how architecture works effectively with development teams, management, and product management teams through the value chain Find updated special coverage on machine learning architecture Get usable templates to start incorporating into your teams immediately Incorporate business architecture, information architecture, data architecture, and application (software) architecture together
    Note: Online resource; Title from title page (viewed October 2, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (68 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This book was written by IBM® IT specialists who have experience implementing Linux solutions on IBM LinuxONE™ (LinuxONE). The contents of this book follow the guidelines from Linux regarding LinuxONE installations. The preferred practices that are described in this book are gathered from the experiences of those specialists in hundreds of projects at IBM and customer environments. This IBM Redbooks® publication provides you with the information needed in making a decision on scaling architecture when implementing Linux on LinuxONE. This book has the following goals: To inform you about x86 sprawl problems To inform you that x86 Vertical Scale out architectures are problematic going forward To provide solutions to x86 server sprawl problems To inform you about the LinuxONE solution for each x86 server sprawl problem To provide virtulization and security options for LinuxOne The scaling up and scaling out architectures enable you to scale the capacity of an existing system to accommodate sporadic application demands or application workloads. This provides some freedom to operate in the environment. However, if this activity is performed without correct planning and the correct architecture choice, it leads to server sprawl where your environment houses more servers than it should based on its current and predicted requirements. This can potentially cause your enterprise to both waste resources and increase costs. Although scaling out on x86 systems is a common form of growth because of inexpensive x86 systems, the scale out can easily become a problem in terms of total cost of ownership (TCO) when the environment starts to increase the number of physical servers and the resources needed to maintain them. LinuxONE servers solve the sprawl problem caused by the scaling out of x86 servers, and are an excellent choice for cloud, mobile, big data, blockchain, analytics, and other workloads that require a robust and flexible environment. This publication describes the advantages and disadvantages of the LinuxONE scaling option. The audience for this publication consists of the following groups: Customers, IBM Business Partners, IT architects and IT Specialists planning and installing Linux on LinuxONE System administrators managing the Linux Systems
    Note: Online resource; Title from title page (viewed July 17, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Language: English
    Pages: 1 online resource (55 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redpaper™ publication gives a broad understanding of a new architecture of the IBM Power System E950 (9040-MR9) server that supports IBM AIX®, and Linux operating systems. The objective of this paper is to introduce the major innovative Power E950 offerings and relevant functions: The IBM POWER9™ processor, which is available at frequencies of 2.8 - 3.4 GHz. Significantly strengthened cores and larger caches. Supports up to 16 TB of memory, which is four times more than the IBM POWER8® processor-based IBM Power System E850 server. Integrated I/O subsystem and hot-pluggable Peripheral Component Interconnect Express (PCIe) Gen4 slots, which have double the bandwidth of Gen3 I/O slots. Supports EXP12SX and ESP24SX external disk drawers, which have 12 Gb Serial Attached SCSI (SAS) interfaces and support Active Optical Cables (AOCs) for greater distances and less cable bulk. New IBM EnergyScale™ technology offers new variable processor frequency modes that provide a significant performance boost beyond the static nominal frequency. This publication is for professionals who want to acquire a better understanding of IBM Power Systems™ products. The intended audience includes the following roles: Clients Sales and marketing professionals Technical support professionals IBM Business Partners Independent software vendors (ISVs) This paper expands the current set of Power Systems documentation by providing a desktop reference that offers a detailed technical description of the Power E950 server. This paper does not replace the current marketing materials and configuration tools. It is intended as an extra source of information that, together with existing sources, can be used to enhance your knowledge of IBM server solutions.
    Note: Online resource; Title from title page (viewed May 31, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Language: English
    Pages: 1 online resource (508 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® publication helps strengthen the position of the IBM PowerHA® SystemMirror® for Linux solution with well-defined and documented deployment models within an IBM Power Systems™ environment, which provides customers a planned foundation for business resilience and disaster recovery (DR) for their IBM Power Systems infrastructure solutions. This book addresses topics to help answer customers' complex high availability (HA) and DR requirements for IBM AIX® and Linux on IBM Power Systems servers to help maximize system availability and resources and provide technical documentation to transfer the how-to-skills to users and support teams. This publication is targeted at technical professionals (consultants, technical support staff, IT architects, and IT specialists) who are responsible for providing HA and DR solutions and support for IBM PowerHA SystemMirror for AIX and Linux Standard and Enterprise Editions on IBM Power Systems servers.
    Note: Online resource; Title from title page (viewed September 16, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Language: English
    Pages: 1 online resource (352 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® publication documents and addresses topics to set up a complete infrastructure environment and tune the applications to use an IBM POWER9™ hardware architecture with the technical computing software stack. This publication is driven by a CORAL project solution. It explores, tests, and documents how to implement an IBM High-Performance Computing (HPC) solution on a POWER9 processor-based system by using IBM technical innovations to help solve challenging scientific, technical, and business problems. This book documents the HPC clustering solution with InfiniBand on IBM Power Systems™ AC922 8335-GTH and 8335-GTX servers with NVIDIA Tesla V100 SXM2 graphics processing units (GPUs) with NVLink, software components, and the IBM Spectrum™ Scale parallel file system. This solution includes recommendations about the components that are used to provide a cohesive clustering environment that includes job scheduling, parallel application tools, scalable file systems, administration tools, and a high-speed interconnect. This book is divided into three parts: Part 1 focuses on the planners of the solution, Part 2 focuses on the administrators, and Part 3 focuses on the developers. This book targets technical professionals (consultants, technical support staff, IT architects, and IT specialists) who are responsible for delivering cost-effective HPC solutions that help uncover insights among clients' data so that they can act to optimize business results, product development, and scientific discoveries.
    Note: Online resource; Title from title page (viewed May 2, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Language: English
    Pages: 1 online resource (30 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Object Storage is the primary storage solution that is used in the cloud and on-premises solutions as a central storage platform for unstructured data. Object Storage is growing more popular for the following reasons: It is designed for exabyte scale. It is easy to manage and yet meets the growing demands of enterprises for a broad set of applications and workloads. It allows users to balance storage cost, location, and compliance control requirements across data sets and essential applications. IBM Cloud™ Object Storage (IBM COS) system provides industry-leading flexibility that enables your organization to handle unpredictable but always changing needs of business and evolving workloads. IBM COS system is a software-defined storage solution that is hardware aware. This allows IBM COS to be an enterprise grade storage solution that is highly available and reliable utilizing commodity x86 servers. IBM COS takes full advantage of this hardware awareness by ensuring that the server performs optimally from a monitoring, management, and performance perspective. The target audience for this paper is IBM COS architects, IT specialists, and technologists.`
    Note: Online resource; Title from title page (viewed May 29, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Language: English
    Pages: 1 online resource (44 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management software for deep inspection, detection, and prioritization of threats has become a necessity of any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, combined with the log analysis, deep inspection, and detection of threats provided by IBM QRadar®, helps reduce the impact of incidents on business data. Such integration provides an excellent platform for hosting unstructured business data that is subject to regulatory compliance requirements. This paper describes how IBM Spectrum Scale file audit logging can be integrated with IBM QRadar. Using QRadar, an administrator can monitor, inspect, detect, and derive insights for identifying potential threats to the data stored on IBM Spectrum Scale. When the threats are identified, you can quickly act on them to mitigate or reduce the impact of incidents. This paper is intended for chief technology officers, solution engineers, security architects, and systems administrators. NOTE: This paper assumes a basic understanding of IBM Spectrum Scale, IBM QRadar, and their administration.
    Note: Online resource; Title from title page (viewed September 23, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (35 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: C++, Java, Python, and other established programming languages may yet be with us for a long time, but our current software development landscape has given rise to new languages that benefit from the lessons learned over decades of programming. In this report, you’ll examine six of the fastest-growing programming languages: Crystal, Elixir, Elm, Julia, Kotlin, and Rust. The O’Reilly editorial team covers the issues that drive modern language development and provides an overview of each language’s origins, features, usage, and trends. You’ll learn the answers to several key questions: Why are these languages important to software developers and the programming community? What makes them good at challenging other, more established languages? What problems do they solve for programmers and software architects? This report examines: Issues addressed by these modern languages such as concurrency, visibility, environment, syntax, robustness, data types, and functions The purpose that motivated each language’s creation, as well as choices and trade-offs made in the process Unique features that each language offers to programmers What their rapid rise reveals about the shifting ecosystem
    Note: Online resource; Title from title page (viewed June 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (35 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Despite the size or scale of your production environment, your organization can gain significant value by adopting DevOps practices. Yet most organizations today still deploy application code and packages manually. To facilitate your adoption of DevOps-style practices, this hands-on guide shows you how to automate your IT operations using HashiCorp Terraform and VMware. DevOps is as much a people and process change as it is a technology change. Terraform and VMware provide the automation infrastructure, so you can focus on acquiring and adapting DevOps skills and processes. Eric Wright, technology evangelist at Turbonomic, shows architects and administrators how to build and operate VMware vSphere virtual machines and infrastructure using the Terraform CLI. With this report, you will: Learn how to codify virtual infrastructure step-by-step Understand how DevOps processes apply to VMware infrastructure Easily build VMware virtual machines and applications as Terraform resources Perform lifecycle management and immutable concepts using Terraform and VMware
    Note: Online resource; Title from title page (viewed September 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Language: English
    Pages: 1 online resource (64 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Economic globalization requires data to be available globally. With most data stored in file systems, solutions to make this data globally available become more important. Files that are in file systems can be protected or shared by replicating these files to another file system that is in a remote location. The remote location might be just around the corner or in a different country. Therefore, the techniques that are used to protect and share files must account for long distances and slow and unreliable wide area network (WAN) connections. IBM® Spectrum Scale is a scalable clustered file system that can be used to store all kinds of unstructured data. It provides open data access by way of Network File System (NFS); Server Message Block (SMB); POSIX Object Storage APIs, such as S3 and OpenStack Swift; and the Hadoop Distributed File System (HDFS) for accessing and sharing data. The IBM Aspera® file transfer solution (IBM Aspera Sync) provides predictable and reliable data transfer across large distance for small and large files. The combination of both can be used for global sharing and protection of data. This IBM Redpaper™ publication describes how IBM Aspera Sync can be used to protect and share data that is stored in IBM Spectrum™ Scale file systems across large distances of several hundred to thousands of miles. We also explain the integration of IBM Aspera Sync with IBM Spectrum Scale™ and differentiate it from solutions that are built into IBM Spectrum Scale for protection and sharing. We also describe different use cases for IBM Aspera Sync with IBM Spectrum Scale.
    Note: Online resource; Title from title page (viewed March 29, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (300 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als Dahlström, Anna Storytelling in design
    Keywords: Electronic books ; local ; Erzählen ; Benutzeroberfläche ; Produktgestaltung ; Design
    Abstract: The number of devices we use on a daily basis is growing, with different devices playing different role at different times. Our ability as designers to control where users are coming from and how they get around the experiences we design is fading. Yet our need to ensure we understand where they are in their journey, so that we can deliver the right content and interactions at the right time and on the right device, is ever more important. By examining tried-and-tested storytelling principles from film, fiction, and music and applying them to the context of design and business, this book takes you on a journey to explore why storytelling matters and how you can apply it to your multi-device design projects and to your organization. For UX designers who want to learn how to apply simple storytelling tools, this comprehensive guide is a must. Understand the role of storytelling and why it matters in multi-device design Learn how to apply storytelling principles and tools to your project Define multi-device interaction design, and create a better user experience across devices Use storytelling principles to tell, sell, and present your multi-device design work Take advantage of case studies and examples of DOs and DON’Ts
    Note: Online resource; Title from title page (viewed December 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (52 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® publication provides an introduction and overview of the latest products in the IBM Storwize® V5000 Family, including their hardware and software features. Advanced topics that apply to the IBM Storwize and IBM Spectrum® Virtualize family can be found in other IBM Redbooks publications about Storwize and IBM Spectrum Virtualize.
    Note: Online resource; Title from title page (viewed September 9, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (72 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: IBM Storage Solutions for IBM Cloud™ Private delivers a blueprint for multicloud architecture. IBM, delivering solutions to help you win. In this blueprint, learn how to: Combine the benefits of IBM Systems with the performance of IBM Storage solutions so that you can deliver the right services to your clients today. Deliver optimized private cloud services ahead of schedule and under budget with a complete IBM Cloud Private stack. Containerize applications and deliver the SLAs that your team needs to thrive and win. Implement IBM Cloud Private to deploy modern applications like blockchain and AI or modernize what you already have. You now have the capabilities. This edition applies to IBM Storage Solutions for IBM Cloud Private Version 1 Release 5.0.
    Note: Online resource; Title from title page (viewed April 15, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    ISBN: 9780738457413
    Language: English
    Pages: 1 online resource (102 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redpaper™ publication introduces and describes the IBM Elastic Storage™ Server as a scalable, high-performance data and file management solution. The solution is built on proven IBM Spectrum™ Scale technology, formerly IBM General Parallel File System (GPFS™). IBM Elastic Storage Servers can be implemented for a range of diverse requirements, providing reliability, performance, and scalability. This publication helps you to understand the solution and its architecture and helps you to plan the installation and integration of the environment. The following combination of physical and logical components are required: Hardware Operating system Storage Network Applications This paper provides guidelines for several usage and integration scenarios. Typical scenarios include Cluster Export Services (CES) integration, disaster recovery, and multicluster integration. This paper addresses the needs of technical professionals (consultants, technical support staff, IT Architects, and IT Specialists) who must deliver cost-effective cloud services and big data solutions.
    Note: Online resource; Title from title page (viewed February 5, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (229 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Developers often struggle when first encountering the cloud. Learning about distributed systems, becoming familiar with technologies such as containers and functions, and knowing how to put everything together can be daunting. With this practical guide, you’ll get up to speed on patterns for building cloud native applications and best practices for common tasks such as messaging, eventing, and DevOps. Authors Boris Scholl, Trent Swanson, and Peter Jausovec describe the architectural building blocks for a modern cloud native application. You’ll learn how to use microservices, containers, serverless computing, storage types, portability, and functions. You’ll also explore the fundamentals of cloud native applications, including how to design, develop, and operate them. Explore the technologies you need to design a cloud native application Distinguish between containers and functions, and learn when to use them Architect applications for data-related requirements Learn DevOps fundamentals and practices for developing, testing, and operating your applications Use tips, techniques, and best practices for building and managing cloud native applications Understand the costs and trade-offs necessary to make an application portable
    Note: Online resource; Title from title page (viewed August 28, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (117 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Is microservice architecture right for your organization? Microservices have many benefits, but they also come with their own set of drawbacks. With this updated edition, Java developers and architects will learn how to navigate popular application frameworks such Spring Boot and MicroProfile to deploy and manage microservices at scale with Linux containers. This hands-on, example-driven guide provides step-by-step instructions to help you get started. Adopting microservices requires much more than changes to your technology. Author Rafael Benevides, director of developer experience at Red Hat, also examines the organizational agility necessary to deliver these services. This concise ebook shows you how rapid feedback cycles, autonomous teams, and shared purpose are key to making microservices work. Learn why microservices require you to think differently about building, deploying, and operating cloud-native applications Design microservices using the popular Spring Boot and Eclipse MicroProfile frameworks Build an API gateway with Apache Camel to help clients access microservices Use Docker and Kubernetes to deploy microservices, regardless of language Run microservices at scale using cluster management, failover, and load-balancing techniques Use OpenTracing to monitor requests, response time, and the path of particular invocations
    Note: Online resource; Title from title page (viewed June 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (569 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Arista Networks has become a key player in software-driven cloud networking solutions for large data center, storage, and computing environments, and is poised to make an impact in other areas as well. In this updated edition, renowned trainer, consultant, and technical author Gary A. Donahue ( Network Warrior ) provides an in-depth, objective guide to Arista’s products. You’ll learn why the company’s network switches, software products, and Extensible Operating System (EOS) are so effective. Anyone who has or is pursuing networking certification (especially Arista’s own!) or who is just curious about why Arista is better will benefit from this book, especially entrenched administrators, engineers, or architects tasked with building an Arista network. Pick up this in-depth guide and find out how Arista can help both you and your company. Topics in the second edition include: Configuration Management: config sessions, config replace, and config checkpoints CloudVision: Arista’s management, workload orchestration, workflow automation, and configuration tool VXLAN: Layer 2 overlay networking FlexRoute: two million routes in hardware Tap Aggregation: make your switch or blade into a Tap Aggregation device Advanced Mirroring: mirror to a port-channel or even the CPU eAPI: Arista’s fabulous extended Application Programmable Interface
    Note: Online resource; Title from title page (viewed July 2, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (38 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: With more and more companies moving on-prem applications to the cloud, software and cloud solution architects alike are busy investigating ways to improve load balancing, performance, security, and high availability for workloads. This practical report describes Microsoft Azure’s load balancing options and explains how NGINX can contribute to a comprehensive solution. Cloud solution architect Arlan Nugara takes you through the steps necessary to design a practical solution for your network. Software developers and technical managers will learn how these technologies have a direct impact on application development and architecture. While the examples are specific to Azure, these load balancing concepts and implementations also apply to cloud providers such as AWS, Google Cloud Platform, DigitalOcean, and IBM Cloud. Understand load balancing—what it is and why it’s important Explore load balancing in Azure, including the traffic manager and application gateway Learn how NGINX Plus on Azure lets you create an ideal end-to-end application platform Walk through three load balancing options with Azure and NGINX Plus Explore security choices including NGINX management, NGINX Web Application Firewall, and Azure Firewall integration
    Note: Online resource; Title from title page (viewed July 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (35 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: As your business tries to make sense of today’s staggering amount of structured and unstructured data, traditional analytics will take you only so far. The key to success over the next few years will depend on augmented analytics, a method that embeds machine learning and natural language processing (NLP) in the process. This report explains how augmented analytics can help you uncover hidden insights, predict results, and even prescribe solutions. Author Alice LaPlante provides best practices for deploying augmented analytics, along with real-world case studies that show you how to take full advantage of this method. IT professionals, business managers, and CFOs will learn ways to democratize data use among business users and executives, using a self-service model. The future belongs to those who can get more from their data. This report shows you how. Get a primer on the key components and learn how they work together Delve into the benefits of—and roadblocks to—adopting augmented analytics Learn how companies use this method in marketing, sales, finance, and human resources Examine case studies of companies including Accenture and Riverbed
    Note: Online resource; Title from title page (viewed October 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Language: English
    Pages: 1 online resource (34 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® Product Guide is an overview of the main characteristics, features, and technology that are used in IBM FlashSystem® A9000Model 425, with IBM FlashSystem A9000 Software V12.3.2. Software version 12.3.2, with Hyper-Scale Manager version 5.6 or later, introduces support for VLAN tagging and port trunking. IBM FlashSystem A9000 storage system uses the IBM FlashCore® technology to help realize higher capacity and improved response times over disk-based systems and other competing flash and solid-state drive (SSD)-based storage. The extreme performance of IBM FlashCore technology with a grid architecture and comprehensive data reduction creates one powerful solution. Whether you are a service provider who requires highly efficient management or an enterprise that is implementing cloud on a budget, FlashSystem A9000 provides consistent and predictable microsecond response times and the simplicity that you need. The A9000 features always on data reduction and now offers intelligent capacity management for deduplication. As a cloud optimized solution, FlashSystem A9000 suits the requirements of public and private cloud providers who require features, such as inline data deduplication, multi-tenancy, and quality of service. It also uses powerful software-defined storage capabilities from IBM Spectrum™ Accelerate, such as Hyper-Scale technology, VMware, and storage container integration.
    Note: Online resource; Title from title page (viewed June 10, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (6 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: IBM® FlashCore Modules (FCMs) are storage devices that are available in 4.8 TB, 9.6 TB, and 19.2 TB capacities. They are a 2.5-inch drive form factor device and use second-generation 3D triple-level cell (TLC) flash memory on which to store data. This paper describes the cryptographic erasure of data that is stored on these devices when used in an IBM FlashSystem® 9100 (9846-AF7, 9846-AF8, 9848-AF7, 9848-AF8, 9848-UF7, and 9848-UF8), or IBM Storwize® V5100 (2077-424, 2077-A4F, 2078-424, and 2078-A4F).
    Note: Online resource; Title from title page (viewed April 8, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Language: English
    Pages: 1 online resource (86 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redpaper™ publication explains the IBM DS8880 Safeguarded Copy functionality. With Safeguarded Copy, organizations have the ability to improve their cyber resiliency by frequently creating protected point-in-time backups of their critical data, with minimum impact and effective resource utilization. The paper introduces Safeguarded Copy and discusses the need for logical corruption protection (LCP) and information about regulatory requirements. It presents the general concepts of LCP, and then explore various use cases for recovery. The paper is intended for IT security architects, who plan and design an organization's cyber security strategy, as well as the infrastructure technical specialists who implement them.
    Note: Online resource; Title from title page (viewed February 5, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (218 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: -update for Release 8.5 - IBM experts recognize the need for data protection, both from hardware or software failures, and also from physical relocation of hardware, theft, and retasking of existing hardware. The IBM DS8880 supports encryption-capable hard disk drives (HDDs) and flash drives. These Full Disk Encryption (FDE) drive sets are used with key management services that are provided by IBM Security Key Lifecycle Manager software or Gemalto SafeNet KeySecure to allow encryption for data at rest on a DS8880. Use of encryption technology involves several considerations that are critical for you to understand to maintain the security and accessibility of encrypted data. The IBM Security Key Lifecycle Manager software also supports Transparent Cloud Tiering (TCT) data object encryption, which is part of this publication. With TCT encryption, data is encrypted before it is transmitted to the Cloud. The data remains encrypted in cloud storage and is decrypted after it is transmitted back to the DS8000®. This IBM Redpaper™ publication contains information that can help storage administrators plan for disk and TCT data object encryption. It also explains how to install and manage the encrypted storage and how to comply with IBM requirements for using the IBM DS8000 encrypted disk storage system. This edition focuses on IBM Security Key Lifecycle Manager Version 3.0 which enables support Key Management Interoperability Protocol (KMIP) with the DS8000 Release 8.5 code or later and updated GUI for encryption functions. The publication also discusses support for data at rest encryption with Gemalto SafeNet KeySecure Version 8.3.2.
    Note: Online resource; Title from title page (viewed April 16, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Language: English
    Pages: 1 online resource (132 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: IBM® Z has a close and unique relationship to its storage. Over the years, improvements to the Z processors and storage software, the disk storage systems, and their communication architecture consistently reinforced this synergy. This IBM Redpaper™ Redbooks publication summarizes and highlights the various aspects, advanced functions, and technologies that are often pioneered by IBM, and that make the IBM Z® and the IBM DS8880 products an ideal combination. This paper is intended for those users who have some familiarity with IBM Z and the IBM DS8000® series and want a condensed but comprehensive overview of the synergy items up to the IBM z14™ server and the IBM DS8880 Release 8.51 firmware.
    Note: Online resource; Title from title page (viewed April 5, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    ISBN: 9780738457635
    Language: English
    Pages: 1 online resource (399 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: IBM® Cloud Private is an application platform for developing and managing containerized applications across hybrid cloud environments, on-premises and public clouds. It is an integrated environment for managing containers that includes the container orchestrator Kubernetes, a private image registry, a management console, and monitoring frameworks. This IBM Redbooks covers tasks performed by IBM Cloud Private system administrators such as installation for high availability, configuration, backup and restore, using persistent volumes, networking, security, logging and monitoring. Istio integration, troubleshooting and so on. As part of this project we also developed several code examples and you can download those from the IBM Redbooks GitHub location: https://github.com/IBMRedbooks. The authors team has many years of experience in implementing IBM Cloud Private and other cloud solutions in production environments, so throughout this document we took the approach of providing you the recommended practices in those areas. If you are an IBM Cloud Private system administrator, this book is for you. If you are developing applications on IBM Cloud Private, you can see the IBM Redbooks publication IBM Cloud Private Application Developer's Guide, SG24-8441.
    Note: Online resource; Title from title page (viewed June 27, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Language: English
    Pages: 1 online resource (260 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM Redbooks® publication gives a broad understanding of several important concepts that are used when describing IBM CICS Transaction Server (TS) for IBM z/OS (CICS TS) performance. This publication also describes many of the significant performance improvements that can be realized by upgrading your environment to the most recent release of CICS TS. This book targets the following audience: Systems Architects wanting to understand the performance characteristics and capabilities of a specific CICS TS release. Capacity Planners and Performance Analysts wanting to understand how an upgrade to the latest release of CICS TS affects their environment. Application Developers wanting to design and code highly optimized applications for deployment into a CICS TS environment. This book covers the following topics: A description of the factors that are involved in the interaction between IBM z® Systems hardware and a z/OS software environment. A definition of key terminology that is used when describing the results of CICS TS performance benchmarks. A presentation of how to collect the required data (and the methodology used) when applying Large Scale Performance Reference (LSPR) capacity information to a CICS workload in your environment. An outline of the techniques that are applied by the CICS TS performance team to achieve consistent and accurate performance benchmark results. High-level descriptions of several key workloads that are used to determine the performance characteristics of a CICS TS release. An introduction to the open transaction environment and task control block (TCB) management logic in CICS TS, including a reference that describes how several configuration attributes combine to affect the behavior of the CICS TS dispatcher. Detailed information that relates to changes in performance characteristics between successive CICS TS releases, covering comparisons that relate to CICS TS V4.2, V5.1, V5.2, V5.3, V5.4, and V5.5. The results of several small performance studies to determine the cost of using a specific CICS functional area.
    Note: Online resource; Title from title page (viewed August 8, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 48 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Being a successful architect requires more than just a good understanding of architecture. Patrick Kua (N26) explores the breadth of skills and experience an architect should focus on and outlines the balance of traits that makes a well-rounded architect. Patrick examines the architect role from a number of perspectives—looking both inward and outward—to determine the different skill areas an architect requires to be successful. Patrick also shares some of the typical traps that an architect who focuses too much on a single aspect falls into and discusses their negative consequences to teams and organizations. Patrick concludes by offering a map for you to assess and plan your own development to learn and maintain a balanced set of skills and become a well-rounded architect. This session was recorded at the 2019 O'Reilly Software Architecture Conference in New York.
    Note: Online resource; Title from title screen (viewed October 31, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (60 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The Java release train is moving faster than ever. Beginning with Java 9 in 2017, the platform’s one-to-three year release cycle accelerated to every six months, ensuring that timely new features and fixes would reach developers quickly. But as this ebook explains, Java 11 is more than just another incremental release. Benjamin Muschko, software engineer and consultant, examines the many changes in Java 11, including several new features and the removal or deprecation of some older ones. You’ll also learn the intricate differences between the Oracle JDK and other open source JDK distributions when it comes to licensing terms and patch update availability. This ebook covers: The merging of Oracle JDK and OpenJDK: Flight Recorder, Java Mission Control, and other commercial features are now free. Latest features and API enhancements: Java 11 includes a modern HTTP client, Unicode 10, nest-based access control, and more. Removed APIs and deprecations: Java 11 eliminates Java EE modules as well as applets and Java Web Start and decouples JavaFX from the JDK. Performance and security: Java 11 features two new garbage collectors and supports TLS 1.3, the latest version of the Transport Layer Security protocol.
    Note: Online resource; Title from title page (viewed January 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 53 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Blockchain: there’s a lot of excitement around this technology that decentralizes data, and even more opportunity. Ultimately, a business and social strategy that integrates blockchain can have a major impact on your organization, making it more efficient and increasing transparency. Recorded on January 9, 2019. See the original event page for resources for further learning. Find future live events to attend or watch recordings of other past events . O’Reilly Spotlight explores emerging business and technology topics and ideas through a series of one-hour interactive events. In live conversations, participants share their questions and ideas while hearing the experts’ unique perspectives, insights, fears, and predictions for the future. In every edition of Spotlight on Innovation , you’ll discover what successful companies have in common and how you can follow their lead with small practical steps to transform your organization and prepare for the Next Economy.
    Note: Online resource; Title from title screen (viewed August 1, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 60 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Our online lives have long left data traces, and the adoption of smartphones, wearables, smart speakers, smart doorbells, and smart everything else has expanded the range of data-collection devices. The early practice of data science on exhaust data—data generated as the by-product of operations—primed the operational use of data. But we can now craft data assets that move beyond exhaust data to unlock an entire suite of new opportunities—new business models, new value propositions, and new methods of strengthening customer relationships. In this edition of Spotlight on Data , Friederike Schüür and Jen van der Meer present an approach to data strategy that goes beyond the mere operational use of data. You'll learn how our current thinking about data strategy—about everything from technology to people and process recommendations—must be reconfigured to move toward data as an asset: a strategy that accelerates and compounds and a set of smart choices that unlocks more value over time. Recorded on May 20, 2019. See the original event page for resources for further learning. Find future live events to attend or watch recordings of other past events . O’Reilly Spotlight explores emerging business and technology topics and ideas through a series of one-hour interactive events. In live conversations, participants share their questions and ideas while hearing the experts’ unique perspectives, insights, fears, and predictions for the future. In every edition of Spotlight on Data , you’ll learn about, discuss, and debate the tools, techniques, questions, and quandaries in the world of data. You’ll discover how successful companies leverage data effectively and how you can follow their lead to transform your organization and prepare for the Next Economy.
    Note: Online resource; Title from title screen (viewed October 4, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 41 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Mobile gaming is a $50+ billion industry. Much of the industry’s growth has been fueled by the sale of in-game virtual resources and items to help players progress further or improve their overall gaming experience. One of the biggest concerns for mobile gaming developers is improving their overall monetization without getting in the way of players enjoying the game. KIXEYE—a developer of complex mobile strategy games—periodically provides its player base with a handful of in-app purchase options that provide different in-game content at different price points and discounts. The problem that companies run into using this model is what in-app purchases should be shown and when in order to maximize the number of in-app purchases. This is made more difficult at KIXEYE due to the massive number of in-app purchases available in the company’s games. So how do you solve this problem? Bysshe Easton and Thomas Dobbs explain how KIXEYE used hybrid recommendation engine techniques to create personalized in-app purchase recommendations for its customers, resulting in a 20%+ lift in user revenue. Along the way, they cover some parallelization techniques the company used to nearly eliminate scaling issues. This session was recorded at the 2019 O'Reilly Strata Data Conference in San Francisco.
    Note: Online resource; Title from title screen (viewed October 31, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 40 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: From determining the most convenient rider pickup points to predicting the fastest routes, Uber uses data-driven analytics to create seamless trip experiences. Uber’s analysts and engineers wanted to run real-time analytics with deep learning models. But copying data from one source to another is pretty expensive. Zhenxiao Luo explains how Uber supports real-time analytics with deep learning on the fly, without any data copying. He starts with the company’s big data infrastructure, specifically Hadoop, Spark, and Presto, and discusses how Uber uses Presto as an interactive SQL engine and deployed Hadoop Distributed File System, Pinot, MySQL, and Elasticsearch as storage solutions. He then details how Uber built a Presto Elasticsearch connector from scratch to support real-time analytics on heterogeneous data. He concludes by sharing the company’s production experience and roadmap. This session was recorded at the 2019 O'Reilly Strata Data Conference in San Francisco.
    Note: Online resource; Title from title screen (viewed October 31, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (36 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Websites, applications, and online services are critical business assets, but these services are also among the most vulnerable to attack. When cyberthreats succeed, your company can quickly drop customers, lose revenue, and suffer brand damage. This practical ebook explores today’s major threat patterns and provides security professionals with strategies and techniques for preventing and protecting against a host of attacks. Gary Sloper, a vice president at Oracle Dyn, and industry journalist Ken Hess examine current dangers to cloud-based everything-as-a-service (XaaS) offerings—a threat landscape as big and diverse as the internet itself. You’ll learn how attackers have become successful and explore current remedies to counteract their efforts. This ebook also looks at the future of web application protection according to industry experts. Get an overview of today’s top cyberthreats and their impact on businesses Protect web applications from evolving threats using an integrated approach Use industry guidelines to help prevent injection, XSS, and session hijacking attacks Learn why companies are moving threat protection to third-party entities and the cloud Build layered security with firewalls, multifactor authentication, AI, secure programming, and data analytics
    Note: Online resource; Title from title page (viewed June 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 59 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Artificial intelligence can be intimidating. There are complex, sticky challenges of data collection and verification, algorithms and bias, and deploying AI services to production, plus ever-expanding ethical concerns. New trends in hardware, algorithms, tools, and data ecosystems are quickly transforming AI into a must-have for today’s organizations. Progress is accelerating, but so are obstacles; a successful, real-world implementation of AI depends on balancing many interdependent concerns. Recorded on March 13, 2019. See the original event page for resources for further learning. Find future live events to attend or watch recordings of other past events . O’Reilly Spotlight explores emerging business and technology topics and ideas through a series of one-hour interactive events. In live conversations, participants share their questions and ideas while hearing the experts’ unique perspectives, insights, fears, and predictions for the future. In every edition of Spotlight on Innovation , you’ll discover what successful companies have in common and how you can follow their lead with small practical steps to transform your organization and prepare for the Next Economy.
    Note: Online resource; Title from title screen (viewed August 1, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 0 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: If you’re considering Kubernetes, you’ve probably thought about the potential time and cost savings you could stand to gain. At Gannett and USA TODAY, migrating to Kubernetes cut their daily infrastructure spend in half and reduced their network failover time from almost four hours to about 10 minutes. These are huge savings for any company. That said, there were a number of costs to migrating that they didn't anticipate. Gannett’s migration to Kubernetes had a ripple effect through its entire stack—from its CI pipelines to its approach to monitoring and even employee happiness. In this case study, Bridget Lane, Gannett’s manager of developer solutions, details the problems her team faced while migrating and explain how they dealt with them. Recorded on September 19, 2019. See the original event page for resources for further learning. Find future live events to attend or watch recordings of other past events . O’Reilly Spotlight explores emerging business and technology topics and ideas through a series of one-hour interactive events. In live conversations, participants share their questions and ideas while hearing the experts’ unique perspectives, insights, fears, and predictions for the future. In every edition of Spotlight on Cloud , you’ll learn about the complex, ever-evolving world of the cloud. You’ll discover how successful companies have adopted and embraced this massive network of shared information and how you can follow their lead to transform your organization and prepare for the Next Economy.
    Note: Online resource; Title from title screen (viewed October 4, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 43 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: As acute shortages for data scientists and engineers further develop in competitive talent markets, it’s imperative to address biases and bottlenecks in the hiring of data scientists and engineers. Most companies approach hiring and talent management as an art, relying on judgment and experience when conceptualizing jobs, drafting JDs, and screening and assessing candidates. Maryam Jahanshahi (TapRecruit) explains how often-innocuous recruiting decisions have dramatic impacts on hiring outcomes, from the success of a hiring process to the candidate pool composition and the amount of time it takes to hire. She then discusses how using data-driven approaches provide an arbitrage opportunity that has significant impact on both the quality and diversity of candidate pools for data science and engineering roles. Maryam covers the role of confounders in the hiring process, explores the complexity of job descriptions, and shares how she extracted signal from noise to extract the key conclusions she presents. She then presents key hiring heuristics in three vignettes: the one word that creates significant ripple effects at every stage of the hiring process; the surprising way that startups do better in the talent war for data scientists and engineers; and hacking diversity, or how she and her team learned to reproducibly and robustly recruit a diverse pool of data scientists and engineers. This session was recorded at the 2019 O'Reilly Strata Data Conference in San Francisco.
    Note: Online resource; Title from title screen (viewed October 31, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 27 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: These days, you can’t swing a dry-erase marker without hitting someone talking about microservices. Developers are studying Eric Evans’s prescient book Domain-Driven Design . Teams are refactoring monolithic apps, looking for bounded contexts, and defining a ubiquitous language. And while there have been countless articles, videos, and talks to help you convert to microservices, few have spent any appreciable time asking if a given application should be a microservice. Nathaniel Schutta (Pivotal) shows you a set of factors you can apply to help you decide if something deserves to be a microservice or not. You’ll also look at what you need to do to maintain a healthy micro(services)biome. This session was recorded at the 2019 O'Reilly Software Architecture Conference in San Jose.
    Note: Online resource; Title from title screen (viewed October 31, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 160 hr., 43 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local ; Electronic videos
    Abstract: OSCON Portland 2019 brought together a vibrant and diverse collection of talented speakers (open source leaders from around the globe) who do amazing things with open source technologies. This outstanding group provided the conference attendees (thousands of software developers, programmers, architects, engineers, CxOs, hackers, geeks, and analysts) with the opportunity to explore the latest open source tools and technologies; get expert in-depth training in crucial languages, frameworks, and best practices; and gain exposure to the open source stack in all its possible configurations. This video compilation offers you the chance to see and hear the best of OSCON Portland 2019. If you want to know how to build an open source culture at your company, work in a cloud environment that isn't always open source-friendly, understand how machine learning can make or break your code, or implement new technologies like Kubernetes and TensorFlow, then getting the OSCON Portland 2019 video compilation is for you. Highlights include: Complete video recordings of OSCON Portland 2019’s best keynotes, tutorials, and tech sessions offering hours of material to study and absorb at your own pace and schedule Keynotes, including Adam Jacob (Chef) on the war for the soul of open source; Kay Williams (Microsoft Azure) on lessons learned building a strong Kubernetes/VSCode open source community; Adrian Cockcroft (AWS) on leveraging cloud vendors to boost open source business success; and Pete Skomoroch (Workday) on the urgent need for a new open source ML development stack Tutorials offering deep dives into open source tech like Apache Kafka, Rust, extended Berkeley Packet Filters, Spring/Spring Boot, Ethereum DApps, Jenkins 2, Vault/Kubernetes, and Kubeflow The OSCON Business Summit: sessions offering an insider’s look at the open source implementations that have the most profound impact on business with talks by open source specialists at Uber, Pacific Life, Verizon Media, The Home Depot, Baidu, the BBC, and more Open Source do-it-now sessions, including Deb Nicholson’s (Software Freedom Conservancy) whirlwind tour of what not to do when running an open source project; Russell Rutledge’s (Nike) take on how to build an open source culture at your company; and Angie Jones (Applitools) and a panel of experts from Persea Consulting, Red Hat, Magento, and ForgeRock on the best ways to build and maintain open source communities Emerging Languages and Frameworks session...
    Note: Online resource; Title from title screen (viewed July 17, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 2 hr., 46 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: We’ll make the Keynotes available here as soon as possible after they happen. Video of the sessions and tutorials will be available a few weeks after the end of the conference. Open source TensorFlow 2.0 is driving the machine learning (ML) revolution around the globe. The TensorFlow World Conference Santa Clara 2019—the first international conference devoted to TensorFlow—provided the thousands who attended the conference with an extraordinary opportunity to see TensorFlow 2.0 in action, discover new ways to use it, and learn how to successfully implement it in their own enterprises. This video compilation offers you the chance to experience the TensorFlow World Conference yourself. If you get it and explore it, you’ll come away with a firm understanding of the entire machine learning stack, TensorFlow 2.0, and the reasons why companies like Spotify, LinkedIn, Amazon, Twitter, and Uber use TensorFlow to solve complex business problems. Highlights include: A front row view for all of the best keynotes, tutorials, and technical sessions from the TensorFlow World Conference Santa Clara 2019. Complete presentations from some of the world’s top TensorFlow practitioners, including talks by the people and teams who developed TensorFlow. Keynote addresses from TensorFlow’s leaders, such as Google Brain co-founder Jeff Dean; Theodore Summe, the head of product for Cortex, Twitter’s central ML organization; and Megan Kacholia, VP of Engineering for Google Research. Deep-dive tutorials, including Laurence Moroney’s (Google Brain) primer on ML with TensorFlow; Sandeep Gupta’s (Google) review of ML in JavaScript using TensorFlow.js; and Neelima Mukiri’s (Cisco) intro to model building and optimization for TensorFlow in any Kubernetes environment. Applications sessions focusing on real-world TensorFlow implementations, like Asif Hasan’s (Quantiphi) talk on using ML to both predict cancer recurrence and recommend treatment; Bhushan Jagyasi’s (Accenture) survey of TensorFlow successes in banking and insurance; and Hamel Husain’s (GitHub) review of automating developer workflows on GitHub with TensorFlow. Core Technologies sessions, where you’ll hear directly from TensorFlow team members such as Paige Bailey (Google) on TensorFlow Swift, a next-generation ML platform; Raziel Alverez (Google) on TensorFlow model optimization techniques; and Robby Neale (Google) on how to build models with tf.text. Accelerators sessions, including Victoria Rege (Graphcore) on h...
    Note: Online resource; Title from title screen (viewed November 1, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 63 hr., 23 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: The O'Reilly Software Architecture Conference San Jose 2019 (SACON) gathered the world's leading software architects and engineers to give presentations on software architecture's most useful technologies, trends, and techniques. This video compilation gives you complete access to the best of SACON's keynotes, tutorials, and technical sessions. It contains hours of material to review and study at your own pace. Whether you are optimizing legacy systems or migrating to cloud native architecture, this compilation from SACON San Jose 2019 offers you the insights and training you need to get to the next level. Highlights include: Contains hours of video recordings from the best of SACON San Jose 2019's keynotes, tutorials, and technical sessions. 3.5 hour tutorials like Christian Hernandez's (Red Hat) hands-on introduction to Kubernetes and OpenShift; Nathaniel Schutta's (Pivotal) deep dive into trade-off analysis and how to use it to strategically choose the correct technology for your projects; and Valentina Rodriguez's (Independent) reveal of the twelve essential principles of architecture design in Agile environments. Keynotes from Rebecca Wirfs-Brock (Wirfs-Brock Associates), Michael Feathers (R7K Research and Conveyance), Adam Tornhill (Empear), Rebecca Parsons (ThoughtWorks), and Neal Ford (ThoughtWorks). Application Architecture sessions, such as Stefania Stefansdottir's (ThoughtWorks) walk through of the practices all new architects and tech leads should keep in mind when starting a new project; Ian Varley (Salesforce) on spotting and correcting the cognitive biases that undermine your software architecture; and Andrew Bonham and Thiagarajan Subramanian's (Capital One) review of how to use reactive architecture and microservices, machine learning, H20, Akka, and Kafka. Microservices sessions, including Kasun Indrasiri's (WSO2) in-depth overview of common microservice resiliency patterns such as timeout, retry, circuit breaker, fail-fast, bulkhead, transactions, and more; Nathaniel Schutta (Pivotal) on the factors used to decide if something deserves to be a microservice or not; and Samir Behara (EBSCO) on building scalable microservice architectures with Envoy, Kubernetes, and Isti. Enterprise Architecture sessions, including Heidi Waterhouse (Launch Darkly) on the smartest ways to achieve build-versus-buy decisions; Cat Swetel (Ticketmaster) on using value network mapping and real options theory to evolve monolithic software; and Paula ...
    Note: Online resource; Title from title screen (viewed June 13, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (56 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: If you’re considering a multicloud approach to host applications, you’re in good company. According to a recent survey, 42% of the world’s organizations have adopted this strategy. But there are significant challenges and complexities to overcome. This practical report walks you through the pros and cons of migrating to these environments, particularly for securing your applications. Cybersecurity experts Laurent Gil and Allan Liska show you how to orchestrate and manage multicloud environments, including edge technologies designed to secure and protect your environment. Managers and leaders will learn methods for distributing workloads across cloud providers as well as ways to avoid potential pitfalls when pursuing this strategy. Understand the benefits of adopting a multicloud architecture—along with the trade-offs and short-term costs Learn how orchestration lets you manage dozens of applications across thousands of containers in a multicloud environment Explore ways to apply a consistent security policy across all cloud platforms Implement layered security that includes vulnerability scanning, API gateway deployment, and web application firewalls Delve into specific use cases for delivering web application security across all cloud providers
    Note: Online resource; Title from title page (viewed November 5, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 41 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Machine learning has allowed Twitter to drive engagement, promote healthier conversations, and deliver catered advertisements. Cibele Montez Halasz and Satanjeev Banerjee describe one of those use cases: timeline ranking. They share some of the optimizations that the team has made—from modeling to infrastructure—in order to have models that are both expressive and efficient. You’ll explore the feature pipeline, modeling decisions, platform improvements, hyperparameter tuning, and architecture (alongside discretization and isotonic calibration) as well as some of the challenges Twitter faced by working with heavily text-based (sparse) data and some of the improvements the team made in its TensorFlow-based platform to deal with these use cases. Join in to gain a holistic view of one of Twitter’s most prominent machine learning use cases. This session was recorded at the 2019 O'Reilly Artificial Intelligence Conference in New York.
    Note: Online resource; Title from title screen (viewed October 31, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (66 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: LinuxONE is a hardware system designed to support and exploit the Linux operating system based on the value of its unique underlying architecture. LinuxONE can be used within a private and multi-cloud environment to support a range of workloads and service a variety of needs. On LinuxONE, security is built into both the hardware and software. This IBM® Redpaper publication gives a broad understanding of how to leverage the various security features that exploit and complement the LinuxONE hardware security features, such as these: Hardware accelerated encryption of data, delivered with near-zero overhead by the on-chip Central Processor Assist for Cryptographic Function (CPACF) and a dedicated Crypto Express adapter. Virtualization and industry leading isolation capabilities with PR/SM, EAL 5+ LPARs, DPM, KVM, and IBM z/VM®. The IBM Secure Service Container technology, which provides workload isolation, restricted administrator access, and tamper protection against internal threats, including from systems administrators. Other technologies that exploit LinuxONE security capabilities and deeper dives into practical use cases for these technologies. This IBM Redpaper publication was written for IT executives, architects, specialists, security administrators, and others who consider security when using LinuxONE.
    Note: Online resource; Title from title page (viewed October 16, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 40 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Machine learning is increasingly used to make decisions that affect people’s lives in critical domains like criminal justice, fair lending, and medicine. While most of the research in machine learning focuses on improving the performance of models on held-out datasets, this is seldom enough to convince end users that these models are trustworthy and reliable in the wild. To address this problem, a new line of research has emerged that focuses on developing interpretable machine learning methods and helping end users make informed decisions. Despite the growing body of work in developing interpretable models, there is still no consensus on the definition and quantification of interpretability. Forough Poursabzi-Sangdeh (Microsoft Research NYC) argues that to understand interpretability, we need to bring humans in the loop and run human-subject experiments. Forough approaches the problem of interpretability from an interdisciplinary perspective built on decades of research in psychology, cognitive science, and social science to understand human behavior and trust. She describes a set of controlled user experiments in which researchers manipulated various design factors in models that are commonly thought to make them more or less interpretable and measured their influence on users’ behavior. The findings emphasize the importance of studying how models are presented to people and empirically verifying that interpretable models achieve their intended effects on end users. This session was recorded at the 2019 O'Reilly Artificial Intelligence Conference in New York.
    Note: Online resource; Title from title screen (viewed October 31, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 42 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Asset managers of all stripes are ramping up their data science capabilities. Andrew Chin and Celia Chen (AllianceBernstein) offer an overview of data science applications within the asset management industry, covering case studies spanning different functions within an asset management organization. Along the way, they look at an investment research project that used a new “big dataset” as well as a machine algorithm to create a more powerful prediction model and detail a machine learning model they developed to understand their clients better. This session was recorded at the 2019 O'Reilly Artificial Intelligence Conference in New York.
    Note: Online resource; Title from title screen (viewed October 31, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (300 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: If you want to learn how to build efficient React applications, this is your book. Ideal for web developers and software engineers who understand how JavaScript, CSS, and HTML work in the browser, this updated edition provides best practices and patterns for writing modern React code. No prior knowledge of React or functional programming is necessary. Authors Alex Banks and Eve Porcello show you how to create UIs that can deftly display changes without page reloads on large-scale data-driven websites. You’ll also discover how to work with functional programming and the latest ECMAScript features. Once you learn how to build React components with this hands-on guide, you’ll understand just how useful React can be in your organization. Understand key functional programming concepts with JavaScript Look under the hood to learn how React runs in the browser Create application presentation layers with React components Manage data and reduce the time you spend debugging applications Explore React’s component lifecycle to improve UI performance Use a routing solution for single-page application features Learn how to structure React applications with servers in mind
    Note: Online resource; Title from title page (viewed December 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (204 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Kotlin is the fastest-growing "alternative" language on the JVM, and its use is becoming pervasive in Android, native applications, and other areas. Other books on Kotlin teach the language in the traditional manner. The appeal of a cookbook is that it lets you find exactly the techniques you need exactly when you need them. This book will be a daily reference for existing Kotlin developers and those programmers learning to apply the language to new areas.
    Note: Online resource; Title from title page (viewed November 5, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Language: English
    Pages: 1 online resource (792 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Continuing its commitment to developing and delivering industry-leading storage technologies, IBM® introduces the IBM Storwize® V7000 solution powered by IBM Spectrum™ Virtualize. This innovative storage offering delivers essential storage efficiency technologies and exceptional ease of use and performance, all integrated into a compact, modular design that is offered at a competitive, midrange price. The IBM Storwize V7000 solution incorporates some of the top IBM technologies that are typically found only in enterprise-class storage systems, which raises the standard for storage efficiency in midrange disk systems. This cutting-edge storage system extends the comprehensive storage portfolio from IBM and can help change the way organizations address the ongoing information explosion. This IBM Redbooks® publication introduces the features and functions of the IBM Storwize V7000 and IBM Spectrum Virtualize™ V8.2.1 system through several examples. This book is aimed at pre-sales and post-sales technical support and marketing and storage administrators. It helps you understand the architecture of the Storwize V7000, how to implement it, and how to take advantage of its industry-leading functions and features.
    Note: Online resource; Title from title page (viewed November 7, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Language: English
    Pages: 1 online resource (88 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® publication introduces the latest member of the IBM Z® platform, the IBM z15™ (machine type 8561). It includes information about the Z environment and how it helps integrate data and transactions more securely. It also provides insight for faster and more accurate business decisions. The z15 is a state-of-the-art data and transaction system that delivers advanced capabilities, which are vital to any digital transformation. The z15 is designed for enhanced modularity, which is in an industry-standard footprint. The z15 system excels at the following tasks: Using multicloud integration services Securing data with pervasive encryption Providing resilience with key to zero downtime Transforming a transactional platform into a data powerhouse Getting more out of the platform with IT Operational Analytics Accelerating digital transformation with agile service delivery Revolutionizing business processes Blending open source and Z technologies This book explains how this system uses new innovations and traditional Z strengths to satisfy growing demand for cloud, analytics, and open source technologies. With the z15 as the base, applications can run in a trusted, reliable, and secure environment that improves operations and lessens business risk.
    Note: Online resource; Title from title page (viewed October 9, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Language: English
    Pages: 1 online resource (100 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redpaper introduces the IBM Spectrum® Scale Erasure Code Edition (ECE) as a scalable, high-performance data and file management solution. ECE is designed to run on any commodity server that meets the ECE minimum hardware requirements. ECE provides all the functionality, reliability, scalability, and performance of IBM Spectrum Scale with the added benefit of network-dispersed IBM Spectrum Scale RAID, which provides data protection, storage efficiency, and the ability to manage storage in hyperscale environments that are composed from commodity hardware. In this publication, we explain the benefits of ECE and the use cases where we believe it fits best. We also provide a technical introduction to IBM Spectrum Scale RAID. Next, we explain the key aspects of planning an installation, provide an example of an installation scenario, and describe the key aspects of day-to-day management and a process for problem determination. We conclude with an overview of possible enhancements that are being considered for future versions of IBM Spectrum Scale Erasure Code Edition. Overall knowledge of IBM Spectrum Scale Erasure Code Edition is critical to planning a successful storage system deployment. This paper is targeted toward technical professionals (consultants, technical support staff, IT Architects, and IT Specialists) who are responsible for delivering cost effective storage solutions. The goal of this paper is to describe the benefits of using IBM Spectrum Scale Erasure Code Edition for the creation of high performing storage systems.
    Note: Online resource; Title from title page (viewed October 15, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 38 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: In recent years, we’ve seen tremendous improvements in artificial intelligence, due to the advances of neural-based models. However, the more popular these algorithms and techniques get, the more serious the consequences of data and user privacy. These issues will drastically impact the future of AI research—specifically how neural-based models are developed, deployed, and evaluated. Yishay Carmiel (IntelligentWire) shares techniques and explains how data privacy will impact machine learning development and how future training and inference will be affected. Yishay first dives into why training on private data should be addressed, federated learning, and differential privacy. He then discusses why inference on private data should be addressed, homomorphic encryption and neural networks, a polynomial approximation of neural networks, protecting data in neural networks, data reconstruction from neural networks, and methods and techniques to secure data reconstruction from neural networks. This session was recorded at the 2019 O'Reilly Artificial Intelligence Conference in New York.
    Note: Online resource; Title from title screen (viewed October 31, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (495 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Work with petabyte-scale datasets while building a collaborative, agile workplace in the process. This practical book is the canonical reference to Google BigQuery, the query engine that lets you conduct interactive analysis of large datasets. BigQuery enables enterprises to efficiently store, query, ingest, and learn from their data in a convenient framework. With this book, you’ll examine how to analyze data at scale to derive insights from large datasets efficiently. Valliappa Lakshmanan, tech lead for Google Cloud Platform, and Jordan Tigani, engineering director for the BigQuery team, provide best practices for modern data warehousing within an autoscaled, serverless public cloud. Whether you want to explore parts of BigQuery you’re not familiar with or prefer to focus on specific tasks, this reference is indispensable.
    Note: Online resource; Title from title page (viewed October 30, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (39 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: There’s a powerful new tool in the fight against malware. The US National Security Agency (NSA) recently released its reverse engineering framework, Ghidra, as free and open source software. This practical report explains how engineers can use Ghidra to analyze malware and determine its impact on vulnerable systems. Developers can also use this tool to get a detailed look at compiled programs. Information security experts Ric Messier and Matthew Berninger show you how Ghidra helps you to analyze compiled code on Linux, Windows, and macOS. You’ll be able to visually inspect a program, follow the path of execution, and analyze the code from function call to function call. The more you work with Ghidra, the more you’ll understand how effective this platform is. Get a feature overview of Ghidra, including a quick look into its origins Explore program use cases, including malware analysis, compiler comparison, and efficiency improvements Learn the advantages of running this Java-based framework in a container Perform code analysis by disassembling and graphing a program using Ghidra’s CodeBrowser tool Run Ghirdra on innocuous programs before analyzing code that may be infected
    Note: Online resource; Title from title page (viewed October 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (84 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Blockchains have many uses beyond cryptocurrencies such as Bitcoin. These shared, distributed ledgers also enable businesses to record transactions between parties in an efficient, verifiable, and permanent manner—unlike traditional methods. Using a blockchain in business can still pose numerous challenges, however. This ebook explains how developers can establish a blockchain network to handle business-to-business transactions while maintaining privacy and confidentiality. Members of IBM’s global blockchain team show you how to start using these open, distributed ledgers to add value to your business networks. Unlike simple ledgers and contracts, blockchains offer irrefutable proof that all parties involved in a transaction agree to the details—creating a source of truth that today’s conventional business-to-business systems lack. You’ll learn: How blockchains for business provide a shared, distributed ledger with smart contracts How to identify and implement the scenarios for which blockchain is most suited What developers need to know about enterprise blockchain The important design and architectural considerations when building a blockchain-based platform How chaincode encapsulates business logic to define assets and the terms of transactions How to implement a blockchain application based on a commercial paper case study What the future holds for blockchain
    Note: Online resource; Title from title page (viewed July 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 40 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: In many industrial ML applications, feature engineering consumes the lion’s share of time, energy, and resources. Deep learning promises to replace feature engineering with models that learn end to end from “close-to-reality” data and has convincingly realized this promise for computer vision and natural language processing. But does this promise apply outside of these domains? Pamela Vagata (Stripe) explains how Stripe has applied deep learning techniques to predict fraud from raw behavioral data. Since fraud detection is a critical business problem for Stripe, the company already had a well-tuned feature-engineered model for comparison. Stripe found that the deep learning model outperforms the feature-engineered model both on predictive performance and in the effort spent on data engineering, model construction, tuning, and maintenance. Join in to discover how common industry practice could shift toward deeper models trained end to end and away from labor-intensive feature engineering. This session was recorded at the 2019 O'Reilly Artificial Intelligence Conference in New York.
    Note: Online resource; Title from title screen (viewed October 31, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (45 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Kubernetes use has grown quickly—not simply for convenience or efficiency but for its extensibility and capacity to adapt to any environment. If you’re a software engineer with a working knowledge of Kubernetes, this practical report demonstrates how to extend this container orchestration system to take advantage of all its capabilities. Specifically, you’ll learn how to use work queues, reconciliation loops, controllers, and operators. Gianluca Arbezzano from InfluxData shows you why Kubernetes is much more than an end application. Extending Kubernetes with its API to implement and automate flows or to gain more visibility into your system more than justifies the system’s cost and complexity. With this report, you’ll learn the right way to use everything it has to offer. Make Kubernetes a commodity to achieve stability, security, and a simpler UX Learn why Kubernetes extensibility can help you provide a solid user experience Explore the Kubernetes API and its software development kits, including the Go SDK Create easy but powerful integration using the CRUD client or kubectl plug-ins Explore Kubernetes primitives, including shared informers, the work queue, and custom resource definitions
    Note: Online resource; Title from title page (viewed July 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (14 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM Redpaper describes a case study that involves software and hardware from Cisco Systems, Inc. Specifically, a Cisco FirePOWER module — also known as a SourceFire (SFR) module — was installed on a Cisco Adaptive Security Appliance (ASA). The case study reveals the steps, issues, and decision points of such an installation. The scope of this case study is as follows: FirePOWER 6.2.0 on an ASA 5525-X running code level 9.6.2 from the Command Line Interface (CLI). We do not discuss the ASDM installation method. This document addresses the needs of Network Administrators, Security Administrators, and other staff who install and manage Intrusion Prevention or Intrusion Detection systems (IPS / IDS). The reader should have a basic understanding of computer networking and be familiar with basic networking terms such as Interface, Access Control Lists (ACL), Domain Name Service (DNS), and Internet Protocol (IP) address.
    Note: Online resource; Title from title page (viewed October 7, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 37 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Much progress has been made over the past decade on process and tooling for managing large-scale, multitier cloud apps and APIs, but there is far less common knowledge on best practices for managing machine-learned models (classifiers, forecasters, etc.), especially beyond the modeling, optimization, and deployment process once these models are in production. A key mindset shift required to address these issues is understanding that model development is different than software development in fundamental ways. David Talby (Pacific AI) shares real-world case studies showing why this is true and explains what you can do about it, covering key best practices that executives, solution architects, and delivery teams must take into account when committing to successfully deliver and operate data science-intensive systems in the real world. Topics include: Concept drift (Machine-learned models begin degrading as soon as they’re deployed and must adapt to a changing environment.) Locality and limited reuse and generalization of models A/B testing challenges, which make it very hard in practice to know which model will perform better in production Semisupervised and adversarial learning scenarios, which require modeling and optimizing models only once they’re in production The impact of all of the above on product planning, staffing, and client expectation management This session was recorded at the 2019 O'Reilly Strata Data Conference in San Francisco.
    Note: Online resource; Title from title screen (viewed October 31, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...