Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2015-2019  (15)
  • 1995-1999
  • Safari, an O'Reilly Media Company  (15)
  • [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.  (15)
  • Electronic books ; local  (15)
Datasource
Material
Language
Years
Year
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (46 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Fast access to data has become a critical game changer. Today, a new breed of company understands that the faster they can build, access, and share well-defined datasets, the more competitive they'll be in our data-driven world. In this practical report, Scott Haines from Twilio introduces you to operational analytics, a new approach for making sense of all the data flooding into business systems. Data architects and data scientists will see how Apache Kafka and other tools and processes laid the groundwork for fast analytics on a mix of historical and near-real-time data. You'll learn how operational analytics feeds minute-by-minute customer interactions, and how NewSQL databases have entered the scene to drive machine learning algorithms, AI programs, and ongoing decision-making within an organization. Understand the key advantages that data-driven companies have over traditional businesses Explore the rise of operational analytics-and how this method relates to current tech trends Examine the impact of can't wait business decisions and won't wait customer experiences Discover how NewSQL databases support cloud native architecture and set the stage for operational databases Learn how to choose the right database to support operational analytics in your organization
    Note: Online resource; Title from title page (viewed December 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (857 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Apple gives macOS new features and improvements right on your desktop and under the hood with Catalina-aka OS X 10.15. With this updated guide, you'll learn how to use your iPad as a second screen, work with iPad apps on your Mac, and use Screen Time on your Mac. This new edition of the #1 bestselling Mac book shows you how to use the revamped apps for Music, Podcasts, and TV. Loaded with illustrations, step-by-step instructions, tips, and tricks, this book from David Pogue-Missing Manual series creator, New York Times columnist, and Emmy-winning tech correspondent for CNBC, CBS, and NPR-covers everything Catalina has to offer with lots of humor and technical insight.
    Note: Online resource; Title from title page (viewed December 18, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (47 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Enterprises are learning that a large measure of success for adopting devops is the spirit of collaboration it instills among teams. While companies introduce devops to solve technical issues and shorten the development life cycle, many soon realize that people working together is a key part of the process. This practical report provides managers with practices and strategies for fostering collaboration within their organizations. Authors Jennifer Davis and Ryn Daniels ( Effective DevOps ) explain how collaboration among development and operations teams is about building trust, empathy, and psychological safety. You'll learn how to promote these essential building blocks and help teams apply them through each stage of your development lifecycle. Discover how to empower employees, create more productive and innovative teams, and build a respectful workplace. Build durable, long-lasting relationships with colleagues by instilling trust, empathy, and team psychological safety Promote effective communication to increase understanding, assert influence, give recognition, and build community Strengthen engineering effectiveness by putting collaboration principles into practice throughout the development lifecycle Get actionable advice for promoting effective collaboration during your product's discovery, development, and production phases
    Note: Online resource; Title from title page (viewed December 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (86 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: As countless breaches have proved, application security is no longer optional. But most established and trusted app sec tools were developed 10-15 years ago for a different world of software development. The next generation of software brings a different set of risks that requires new processes to manage. This report examines the security implications involved in next-generation software, from the code itself to the methodologies by which it's developed and the infrastructure surrounding its use. Cindy Blake shows you what this new software landscape looks like, covering new and evolving development technologies, tools, and frameworks and why they're relevant to security. CISOs will see why cloud native and serverless architectures (for building software) and DevOps and Agile methodologies (for managing it) are critical areas for application security as they learn the 10 steps for securing next-generation software. Discover the DevOps principles that CISOs often overlook Explore three critical shifts of next-gen software and how they impact security Dive into a next-gen application security program Get practical advice for securing next generation software
    Note: Online resource; Title from title page (viewed November 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (38 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: For nearly a decade, Apache Kafka has been the go-to publish-subscribe (pub-sub) messaging system-and for good reason. It offers functionality for a wide range of enterprise use cases, along with a large ecosystem of tools and a dedicated community. But lately, upstart Apache Pulsar has been gaining ground. This detailed report explains why. Apache Pulsar takes the best parts of Kafka and expands on them to solve problems that were out of scope of Kafka's original design. Author Chris Bartholomew shows you how Kafka and Pulsar compare and where they differ. Engineers and other technical decision makers will learn the advantages that make Pulsar a compelling alternative to Kafka. Explore the architecture and major components of Kafka and Pulsar Discover the benefits of Pulsar's subscription model for messaging Understand how Pulsar simplifies the messaging system for organizations that need high performance pub-sub messaging, delivery guarantees, and traditional messaging patterns Learn how Pulsar's separation of serving and storing makes it natural to run in cloud native environments like Kubernetes See how Kafka and Pulsar perform on the OpenMessage Project benchmark
    Note: Online resource; Title from title page (viewed December 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (78 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Monitoring and managing API traffic can be a complicated undertaking. Most companies today need to deal with securing API traffic from outside their organizational boundaries as well as optimizing traffic between services running behind the company firewall. In this practical report, author Mike Amundsen introduces developers and network administrators to the basic concepts and challenges of monitoring and managing API traffic. You'll learn approaches for observing and controlling external traffic (known as the North/South model) and for optimizing internal traffic (the East/West model). You'll also examine the business value of good API traffic practice that connects your business goals and internal progress measurements to useful traffic monitoring, reporting, and analysis. Understand the challenges and advantages of initiating API traffic management Examine the North/South and East/West models for handling API traffic Monitor the health of your API system using traffic metrics and formulas Explore security basics including API keys, authentication, authorization, and encryption Maintain network reliability and resilience to provide a healthy and scalable infrastructure for your API platform Learn options for diagnosing and automating your traffic management approach
    Note: Online resource; Title from title page (viewed December 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (29 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The demand for data scientists is well-known, but when it comes time to build solutions based on data, your company also needs data engineers-people with strong data warehousing and programming backgrounds. In fact, whether you're powering self-driving cars or creating music playlists, this field has emerged as one of the most important in modern business. In this report, Lewis Gavin explores key aspects of data engineering and presents a case study from Spotify that demonstrates the tremendous value of this role.
    Note: Online resource; Title from title page (viewed December 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (38 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The most common Agile framework for project management and product delivery today is Scrum. If you combine Scrum with Kanban-an Agile method for process improvement and workflow management-you get Scrumban: a project management/product delivery tool that features pull systems, workflow visualization, and process improvement. In this report, Andrew Stellman examines the fundamentals of Scrum and Kanban, and explains how a Scrumban hybrid can combine Scrum and Kanban effectively and take both of them to the next level. A widely recognized expert in transforming and improving software organizations, teams, and code, Stellman explains how teams that adopt Scrumban combine the core parts of both approaches to deliver better products today while continuing to improve into the future. Agile practitioners will discover why a growing number of software teams now use Scrumban. Review the core elements of Scrum and Kanban for product delivery and process improvement Understand how Scrumban incorporates the empirical process control of Scrum with the pull systems of Kanban to maintain the integrity of both Explore common misconceptions, including the notion that Scrum and Kanban have the same goals or that Scrumban is just "iterationless" Scrum Learn how to use your current Scrum implementation as a starting point for meaningful process improvement that can make your product delivery even more effective Examine a case study that describes a successful real-world implementation of a Scrum and Kanban hybrid
    Note: Online resource; Title from title page (viewed November 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (31 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Facing unprecedented challenges, the financial services industry is undergoing a fundamental transformation. Regulatory requirements to minimize systemic risk now encourage fair competition and transparency, transforming the "winner takes all" concept into a "co-opetition" environment. Now, companies must compete and collaborate to remain relevant in today's digital economy. How exactly will this work? That's where Distributed Ledger Technologies (DLT) come into play. This report-a resource for business and tech professionals alike-examines the potential that DLT and blockchain have for transforming the banking industry. Jorge Lesmes, Global Head of everis Blockchain Banking Practice, examines how these technologies have moved from pilot projects to in-production applications that provide real value and benefits to end users. In three separate use cases, you'll learn how DLT and blockchain can help bring about the "Internet of Value"-a secure method of sending and receiving value in the same way we transact data. You'll examine: How DLT platforms have the power to make the Internet of Value a reality How DLT and blockchain are used in real production environments The current challenges associated with DLT platform interconnectivity Using DLT to enable self-sovereign digital identity management Enabling interoperability among DLT platforms and traditional ledgers Using DLT to enable streaming micropayments
    Note: Online resource; Title from title page (viewed November 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (46 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: With nation-states, organized crime groups, and other attackers scouring systems to steal funds, information, or intellectual property, incident response has become one of today's most important technology sectors. If you're not familiar with incident response, this practical report shows security operations center (SOC) analysts, network engineers, system administrators, and management how to conduct a complete incident response program throughout your organization. Incident response is essential for every business and organization online as more and more attackers look to make a statement, gather information, or make a buck. In this short primer, author Ric Messier explains foundational concepts and then shows you how to identify and categorize incidents. You'll learn why preparation is key for detecting activity and responding quickly. Explore incident response concepts, including the precise meaning of risk , events , incidents , and threats Understand the steps necessary to conduct incident identification and categorization Learn how threat intelligence helps you discover who's attacking and why Use threat intelligence to conduct threat hunting and inform your prevention and detection strategies Understand why an incident response program will help you limit the number of investigations you conduct
    Note: Online resource; Title from title page (viewed December 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (44 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Blockchain-based protocols like Bitcoin and Ethereum have made sending digital values in the form of tokens as cheap and easy as sending an email. But while cryptographic tokens (sometimes called "cryptocurrencies") may be as important to the next-generation internet as the World Wide Web was to Web 1.0, people aren't yet sure how to best design tokens or even what to do with them. In this report, Shermin Voshmgir, director of the Research Institute for Crypto Economics at the Vienna University of Economics, walks you through the different types of tokens, along with their properties and both operational and conceptual use cases. You'll get a concise overview of the current state of tokenization in our economy and explore the potential effects and dynamics of a future "token economy." You'll learn: What a token is A framework for determining the properties of a token Common use cases for different token types The relationship between tokens and money (including the functions of money that most current tokens don't fulfill) Where the token economy is headed
    Note: Online resource; Title from title page (viewed October 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (38 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Microservices have become an increasingly popular architecture choice over the past five years. With the ability to deliver software faster and support newer technologies, these independently releasable services give software architects, programmers, and developers more freedom to react, make different decisions, and respond faster to change. In this report, you'll explore the benefits of microservices and their limitations. You'll learn what microservices are, how they work, and why this approach is different than other ways of decomposing your architecture. Author Sam Newman ( Building Microservices , Monolith to Microservices ) explains that while many companies have shown how effective microservices can be, this architecture also adds a lot of complexity to your system. This report helps you determine if microservices are right for your organization. Learn the key concepts of a microservices architecture Examine microservice advantages, including robustness, scaling, and ease of deployment Contrast microservices with single-process, modular, and distributed monoliths Explore enabling technologies such as containers and Kubernetes, streaming, public cloud, and serverless Understand microservice pain points: technology overhead, monitoring and troubleshooting, security, and data consistency Learn situations where microservices work well-and situations where they don't
    Note: Online resource; Title from title page (viewed December 5, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (38 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: If you're rolling out a large-scale infrastructure change, you know it can be like swapping out a jet engine while flying. Staying aloft takes coordination and communication with many teams, good processes and documentation, risk identification and management, monitoring, and tracking of the change progress-not to mention dealing with the catastrophic challenges that crop up midflight. In this report, technical program managers in Google SRE take you through case studies that demonstrate how infrastructure change projects are managed at Google. Authors Wendy Look and Mark Dallman offer an overview of two long-term projects at Google: one to migrate all of Google's systems from Google File System (GFS) to its successor, Colossus, and the other to move from local disk storage to diskless compute nodes for all jobs. You'll dive into the tools and processes used to manage the changes, see what worked (and what didn't), and discover lessons learned along the way. Best of all, you'll get a preflight checklist drawn from these experiences that will help you keep your own projects on course.
    Note: Online resource; Title from title page (viewed November 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (63 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Serverless is taking the cloud native world by storm. This new approach promises extraordinary value, from increased developer productivity to dramatic cost savings. In some aspects, serverless also boasts significant security advantages compared to the server model. But as this practical report explains, securing serverless still requires diligence from the developers and application security professionals involved in the process. Guy Podjarny and Liran Tal from Snyk examine the significant benefits that serverless brings to application security, as well as the considerable risks involved when you configure a serverless system. You'll also learn a platform-agnostic security model known as CLAD that will help you address C ode vulnerabilities, L ibrary vulnerabilities, A ccess and permissions, and D ata security. This report helps you: Understand what serverless is and how this model evolved from cloud native processes Explore the three primary areas where serverless improves security Learn how the CLAD model provides four categories to help you home in on specific security issues Follow a detailed example that demonstrates how poor security manifests in real-world serverless applications
    Note: Online resource; Title from title page (viewed November 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (294 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Tap into the wisdom of experts to learn what every engineering manager should know. With 97 short and extremely useful tips for engineering managers, you'll discover new approaches to old problems, pick up road-tested best practices, and hone your management skills through sound advice. Managing people is hard, and the industry as a whole is bad at it. Many managers lack the experience, training, tools, texts, and frameworks to do it well. From mentoring interns to working in senior management, this book will take you through the stages of management and provide actionable advice on how to approach the obstacles you'll encounter as a technical manager. A few of the 97 things you should know: "Three Ways to Be the Manager Your Report Needs" by Duretti Hirpa "The First Two Questions to Ask When Your Team Is Struggling" by Cate Huston "Fire Them!" by Mike Fisher "The 5 Whys of Organizational Design" by Kellan Elliott-McCrea "Career Conversations" by Raquel Vélez "Using 6-Page Documents to Close Decisions" by Ian Nowland "Ground Rules in Meetings" by Lara Hogan
    Note: Online resource; Title from title page (viewed November 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...