Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional
  • [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers
  • [Erscheinungsort nicht ermittelbar] : CRC Press
  • [Erscheinungsort nicht ermittelbar] : IBM Redbooks
Datasource
Material
Language
Years
Publisher
Subjects(RVK)
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional
    ISBN: 9780138223076 , 0138223076
    Language: Undetermined
    Pages: 1 online resource
    DDC: 005.13/3
    Keywords: MySQL (Electronic resource) ; SQL (Computer program language) ; Database management ; MySQL (Electronic resource) ; SQL (Langage de programmation) ; Bases de données ; Gestion ; Database management ; SQL (Computer program language)
    Abstract: MySQL is one of the most popular database management systems available, powering everything from Internet powerhouses to individual corporate databases to simple end-user applications, and everything in between. This book will teach you all you need to know to be immediately productive with the latest version of MySQL. By working through 30 highly focused hands-on lessons, your MySQL Crash Course will be both easier and more effective than youd have thought possible. Learn How To Retrieve and Sort Data Filter Data Using Comparisons, Regular Expressions, Full Text Search, and Much More Join Relational Data Create and Alter Tables Insert, Update, and Delete Data Leverage the Power of Stored Procedures and Triggers Use Views and Cursors Manage Transactional Processing Create User Accounts and Manage Security via Access Control.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9780738460253
    Language: English
    Pages: 1 online resource (78 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This IBM® Redpaper® publication describes best practices for deploying and using advanced Broadcom Fabric Operating System (FOS) features to identify, monitor, and protect Fibre Channel (FC) SANs from problematic devices and media behavior. Note that this paper primarily focuses on the FOS command options and features that are available since version 8.2 with some coverage of new features that were introduced in 9.0. This paper covers the following recent changes: SANnav Fabric Performance Impact Notification
    Note: Online resource; Title from title page (viewed January 5, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 4 hr., 37 min.)
    Edition: 1st edition
    Keywords: Electronic videos
    Abstract: Developing Classification and Regression Systems (Machine Learning with Python for Everyone Series), Part 3 Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. Dr. Mark Fenner, owner of Fenner Training and Consulting, LLC, has taught computing and mathematics to diverse adult audiences since 1999, and holds a PhD in computer science. His research has included design, implementation, and performance of machine learning and numerical algorithms; developing learning systems to detect user anomalies; and probabilistic modeling of protein function.
    Note: Online resource; Title from title screen (viewed January 5, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 8 hr., 59 min.)
    Edition: 1st edition
    Keywords: Electronic videos
    Abstract: 7+ Hours of Video Instruction 7+ hours of video training exploring key threat intelligence and threat hunting concepts Overview: A cybersecurity professional needs to understand threats, threat actors, and have a clear understanding of where attackers are trying to take advantage of vulnerabilities. With more than 7 hours of video training, Threat Intelligence and Threat Hunting LiveLessons provides learners with a look at where the vulnerabilities in software, cloud, and other attack surfaces exist. Throughout the course, the learner will explore how to classify threats, work with the vulnerabilities, and use common assessment methodologies. The course will also dive into understanding threats against Internet of Things, real-time operating systems, and cloud-based environments. Threat Intelligence and Threat Hunting LiveLessons is taught by expert trainer, author, and cybersecurity expert Aamir Lakhani using hands-on demos, in-depth discussions, and lightboard explanations. The course will cover the best practices for cybersecurity in a way that is easy to access and implement in real world situations. Topics include: Importance of Threat Data and Intelligence Utilizing Threat Intelligence to Support Organization Security Vulnerability Management Activities Analyzing Output from Common Vulnerability Assessment Tools Threats Associated with the Cloud and Specialized Technology Implementing Controls to Mitigate Attacks and for Software Vulnerabilities Analyzing Logs and Impact Analysis About the Instructor Aamir Lakhani is a leading senior security strategist. He is responsible for providing IT security solutions to major enterprises and government organizations. Mr. Lakhani creates technical security strategies and leads security implementation projects for Fortune 500 companies. Industries of focus include healthcare providers, educational institutions, financial institutions, and government organizations. Aamir has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies. He has also assisted organizations with safeguarding IT and physical environments from attacks perpetrated by underground cybercriminal groups. His areas of expertise include cyber defense, mobile application threats, malware management, Advanced Persistent Threat (APT) research, and investigations relating to the Internet’s dark security movement. Skill Level: Beginner Learn How To: Apply key threat int...
    Note: Online resource; Title from title screen (viewed January 12, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 7 hr., 25 min.)
    Edition: 1st edition
    Keywords: Electronic videos
    Abstract: 7+ Hours of Video Instruction Overview Learn How to Program with Java LiveLessons takes the learner from beginner to proficient, covering all the important concepts in Java: from basic syntax, to object-oriented basics, to using libraries, to building user interfaces. Description The Java programming language is designed specifically to be readable, secure, and highly performant; therefore, small and large companies make use of it, and knowing Java guarantees you a variety of career options for the foreseeable future. Becoming an effective Java programmer requires much more training than learning languages such as Python or JavaScript. In this course, Shaun bridges the gap and provides students with all the resources they need to effectively program in Java. This course provides a solid foundation in programming with Java. Shaun starts off teaching the basics, such as data types, basic syntax, and program structure with simple operations. He then moves into the basics of object-oriented programming in Java, then into more granular topics, such as mapping and user interfaces. About the Instructor Shaun Wassell is a senior software developer who specializes in full-stack development and software architecture. He manages teams of developers and teaches hundreds of thousands more how to create enterprise-ready applications. Shaun’s online courses have more than 300,000 learners, largely because of his passion for development and his focus on helping people apply their programming skills in the real world. He is a lifelong programmer and problem-solving addict whose goal is to help people solve meaningful problems by mastering the art of software development. Please don’t hesitate to get in touch with him about any opportunities or if you’d like to stay up to date on his other courses and live trainings. Skill Level Beginner What You Will Learn The art of thinking like a programmer The basics of Java in a fun and hands-on way Object-oriented programming and how it works, with many examples How to build user interfaces with Java’s Swing library How to use Java Collections to work with data effectively How to run multiple operations at the same time in Java Deployment options for Java applications Who Should Take This Course Junior developers Mid-level developers Course Requirements This is an entry-level course, so there are no mandatory prerequisites. Some existing knowledge of basic programming concepts might be he...
    Note: Online resource; Title from title screen (viewed January 13, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780738460291
    Language: English
    Pages: 1 online resource (640 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This IBM® Redbooks® publication captures several of the preferred practices and describes the performance gains that can be achieved by implementing the IBM SAN Volume Controller powered by IBM Spectrum® Virtualize Version 8.4.2. These practices are based on field experience. This book highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools and managed disks, volumes, Remote Copy services and hosts. It explains how you can optimize disk performance with the IBM System Storage Easy Tier® function. It also provides preferred practices for monitoring, maintaining, and troubleshooting. This book is intended for experienced storage, SAN, IBM FlashSystem®, IBM SAN Volume Controller, and IBM Storwize® administrators and technicians. Understanding this book requires advanced knowledge of these environments.
    Note: Online resource; Title from title page (viewed January 17, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738460345
    Language: English
    Pages: 1 online resource (42 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: The document describes the configuration and end-to-end architecture for configuring the logical air-gap solution for cyber resiliency using IBM® Spectrum Virtualize for Public Cloud (SV4PC) on Azure, IBM Spectrum® Virtualize Safeguarded Copy, and IBM FlashSystem®. This blueprint guide provides the following information: • A solutions architecture and related solution configuration workflows, with the following essential software and hardware components: – IBM FlashSystem – IBM Spectrum Virtualize for Public Cloud on Azure – IBM Copy Services Manager • Detailed technical configuration steps for building the cyber resiliency solutions This technical report does not provide performance analysis from a user perspective or replace any official IBM manuals or documents. This technical paper assumes that the reader is familiar with the following areas: • Basic kowledge of IBM FlashSystem • Azure Cloud fundamentals • Hybrid Cloud network connectivity • IBM Copy Services Manager
    Note: Online resource; Title from title page (viewed January 31, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523092901
    Language: English
    Pages: 1 online resource (208 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This is the first book to offer detailed guidance on how scenarios can be used to help organizations make their toughest decisions in a world of ever-escalating crisis and opportunity. To reap the full benefits of scenarios, you have to be able to apply them in the real world. This groundbreaking book goes beyond the theoretical to clearly explain different ways scenarios can be used in business decision-making—from strategic planning and financial modeling to crisis response. Connecting scenarios to strategy and action can have many benefits, including the ability to react quickly, anticipate major changes in the environment, and identify major opportunities. Thomas Chermack, a top expert on scenario planning, offers seven specific ways organizations can use scenarios and provides a wide variety of examples, along with proven processes, exercises, and workshops that have been used successfully in organizations across industries and countries for more than fifteen years.
    Note: Online resource; Title from title page (viewed February 1, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9780738460215
    Language: English
    Pages: 1 online resource (452 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: The next-generation IBM® c-type Directors and switches for IBM Storage Networking provides high-speed Fibre Channel (FC) and IBM Fibre Connection (IBM FICON®) connectivity from the IBM Z® platform to the storage area network (SAN) core. It enables enterprises to rapidly deploy high-density virtualized servers with the dual benefit of higher bandwidth and consolidation. This IBM Redpaper Redbooks publication helps administrators understand how to implement or migrate to an IBM c-type SAN environment. It provides an overview of the key hardware and software products, and it explains how to install, configure, monitor, tune, and troubleshoot your SAN environment.
    Note: Online resource; Title from title page (viewed January 11, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9780738460031
    Language: English
    Pages: 1 online resource (268 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: IBM® Hyper Protect Data Controller is designed to provide privacy protection of your sensitive data and give ease of control and auditability. It can manage how data is shared securely through a central control. Hyper Protect Data Controller can protect data wherever it goes—security policies are kept and honored whenever the data is accessed and future data access can be revoked even after data leaves the system of record. This IBM Redbooks® publication can assist you with determining how to get started with IBM Hyper Protect Data Controller through a use case approach. It will help you plan for, install, tailor and configure the Hyper Protect Data Controller. It includes information about the following topics: Concepts and reference architecture Common use cases with implementation guidance and advice Implementation and policy examples Typical operational tasks for creating policies and preparing for audits Monitoring user activity and events This IBM Redbooks publication is written for IT Managers, IT Architects, Security Administrators, data owners, and data consumers.
    Note: Online resource; Title from title page (viewed January 4, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523092116
    Language: English
    Pages: 1 online resource (520 pages)
    Edition: 3rd edition
    Keywords: Electronic books
    Abstract: The third edition of this classic is a must-have text for the human resource development (HRD) profession. It has with brand-new material on the impact of technology, globalization, and emerging business trends on HRD practice. Human Resource Development is a large field of practice but a relatively young academic discipline. For the last two decades, Foundations of Human Resource Development has fulfilled the field's need for a complete and thoughtful foundational text. This essential text provides an up-to-date overview of the HRD profession, along with the terminology and processes required for sound HRD research and practice. Readers will gain a basic understanding of • HRD models and theories that support best practice • History and philosophical foundations of the field • HRD's role in learning, performance, and change in organizations This new edition has been updated throughout and contains new chapters on assessment, technology, globalization, and future challenges. Examples of best practices are included, along with variations in core thinking, processes, interventions, tools, and much more. This must-have reference will help both practitioners and academics add clarity to their professional journeys.
    Note: Online resource; Title from title page (viewed March 8, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 4 hr., 31 min.)
    Edition: 1st edition
    Keywords: Electronic videos
    Abstract: 4+ Hours of Video Instruction 4+ hours of deep-dive training covering key system privacy and data protection concepts Overview: Cybersecurity is not only about preventing data breaches and hunting for attackers, it also involves many aspects of system and data privacy. With more than 4 hours of video training, System and Privacy Data Protection LiveLessons provides learners with an understanding of how to protect and store existing data, as well as understand that data confidentiality and business impacts are critical to data protection. In this course, the learner will examine multiple aspects of system privacy and data protection ranging from basic concepts to tools that are commonly used by data practitioners. System and Privacy Data Protection LiveLessons is taught by expert trainer, author, and cybersecurity expert Aamir Lakhani using hands-on demos, in-depth discussions, and lightboard explanations. This course will cover the best practices cybersecurity fundamentals in a way that is easy to access and implement in real world situations. Topics include: Data Privacy and Protection Risk Mitigation Importance of Policies, Procedures, and Controls Analyzing Logs and Impact Analysis SIEMs and Query Writing E-Mail Analysis Automation About the Instructor Aamir Lakhani is a leading senior security strategist. He is responsible for providing IT security solutions to major enterprises and government organizations. Mr. Lakhani creates technical security strategies and leads security implementation projects for Fortune 500 companies. Industries of focus include healthcare providers, educational institutions, financial institutions, and government organizations. Aamir has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies. He has also assisted organizations with safeguarding IT and physical environments from attacks perpetrated by underground cybercriminal groups. His areas of expertise include cyber defense, mobile application threats, malware management, Advanced Persistent Threat (APT) research, and investigations relating to the Internet’s dark security movement. Skill Level: Beginner Learn How To: Manage your security and privacy Protect and store existing data Use common tools to analyze and store logs Conduct impact analysis and risk mitigation Who Should Take This Course: Cybersecurity Professionals Anyone interested in learning cyber security fundamentals Cours...
    Note: Online resource; Title from title screen (viewed January 12, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    ISBN: 9780738460314
    Language: English
    Pages: 1 online resource (638 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This IBM® Redbooks® publication captures several of the preferred practices and describes the performance gains that can be achieved by implementing the IBM FlashSystem® products that are powered by IBM Spectrum® Virtualize Version 8.4.2. These practices are based on field experience. This book highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools and managed disks, volumes, Remote Copy services, and hosts. It explains how you can optimize disk performance with the IBM System Storage Easy Tier® function. It also provides preferred practices for monitoring, maintaining, and troubleshooting. This book is intended for experienced storage, SAN, IBM FlashSystem, SAN Volume Controller, and IBM Storwize® administrators and technicians. Understanding this book requires advanced knowledge of these environments.
    Note: Online resource; Title from title page (viewed February 2, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523000647
    Language: English
    Pages: 1 online resource (176 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: Leadership legend and bestselling author Ken Blanchard and trust expert and thought leader Randy Conley present this carefully curated collection of fifty-two essential leadership principles that are easy to implement and practice. Effective leadership is an influence process where leaders implement everyday, commonsense approaches that help people and organizations thrive. Yet somehow, many of these fundamental principles are still missing from most workplaces. In Simple Truths of Leadership, legendary servant leadership expert Ken Blanchard, whose books have sold millions of copies worldwide, and his colleague Randy Conley, known and recognized for his many years of thought leadership and expertise in the field of trust, share fifty-two Simple Truths about leadership that will help leaders everywhere make commonsense leadership common practice. Readers will discover profound, memorable, and in some cases counterintuitive leadership wisdom such as • Who should make the first move to extend trust • What role a successful apology plays in building trust • When to use different strokes (leadership styles) for different folks—and for the same folks • Where the most important part of leadership happens • How to create autonomy through boundaries • Why the key to developing people is catching them doing something right A fun, easy read that will make a positive difference in leadership and organizational success, Simple Truths of Leadership will show readers how to incorporate simple but essential practices into their leadership style, build trust through servant leadership, and enhance their own lives and the lives of everyone around them.
    Note: Online resource; Title from title page (viewed January 31, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    ISBN: 9780136875758
    Language: English
    Pages: 1 online resource (464 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: Write More Elegant C++ Programs and Improve Legacy Code "We are very pleased to see Rainer Grimm applying his teaching skills and industrial background to tackling the hard and necessary task of making the C++ Core Guidelines accessible to more people." -- Bjarne Stroustrup and Herb Sutter, co-editors, C++ Core Guidelines The official C++ Core Guidelines provide consistent best practices for writing outstanding modern C++ code, but they aren't organized for easy usage by working developers. In C++ Core Guidelines Explained , expert C++ instructor Rainer Grimm has distilled them to their essence, removing esoterica, sharing new insights and context, and presenting well-tested examples from his own training courses. Grimm helps experienced C++ programmers use the Core Guidelines with any recent version of the language, from C++11 onward. Most of his code examples are written for C++17, with added coverage of newer versions and C++20 wherever appropriate, and references to the official C++ Core Guidelines online. Whether you're creating new software or improving legacy code, Grimm will help you get more value from the Core Guidelines' most useful rules, as you write code that's safer, clearer, more efficient, and easier to maintain. Apply the guidelines and the underlying programming philosophy Correctly use interfaces, functions, classes, enum, resources, expressions, and statements Optimize performance, implement concurrency and parallelism, and handle errors Work with constants, immutability, templates, generics, and metaprogramming Program in C++ style, manage source files, and use the Standard Library
    Note: Online resource; Title from title page (viewed March 25, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    ISBN: 9780738460277
    Language: English
    Pages: 1 online resource (58 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: With Remote Direct Memory Access (RDMA), you can make a subset of a host's memory directly available to a remote host. RDMA is available on standard Ethernet-based networks by using the RDMA over Converged Ethernet (RoCE) interface. The RoCE network protocol is an industry-standard initiative by the InfiniBand Trade Association. This IBM® Redpaper publication describes how to set up RoCE to use within an IBM Spectrum® Scale cluster and IBM Elastic Storage® Systems (ESSs). This book is targeted at technical professionals (consultants, technical support staff, IT Architects, and IT Specialists) who are responsible for delivering cost-effective storage solutions with IBM Spectrum Scale and IBM ESSs.
    Note: Online resource; Title from title page (viewed February 7, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523092550
    Language: English
    Pages: 1 online resource (240 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This is the first in-depth examination of the important ongoing fusion of activism, capitalism, and social change masterfully told through a compelling narrative filled with vivid stories and striking studies. Today, corporations and their executives are at the front lines of some of the most important and contentious social and political issues of our time, such as voting rights, gun violence, racial justice, immigration reform, climate change, and gender equality. Why is this sea change in business and activism happening? How should executives and activists engage one another to create meaningful progress? What are potential pitfalls and risks for each side? What can they learn from each other? What first principles should guide leaders moving forward? The Capitalist and the Activist offers an engaging and thoughtful look at the new reality of corporate social activism—its driving forces, promises and perils, and implications for our businesses and personal lives. Weaving deep research and fascinating stories that span business, entertainment, history, science, and politics, Tom Lin provides an insightful road map for how society arrived here and a practical compass for moving forward. Drawing together examples from the civil rights movement, campaign finance litigation, gun regulation, Black Lives Matter, the Confederate flag controversy, the Trump presidency, and other historical events, Lin brilliantly reveals and charts the course for a changing society of capitalists and activists seeking both profit and progress. The Capitalist and the Activist is a must-read for anyone trying to understand the emerging future of activism, business, and politics.
    Note: Online resource; Title from title page (viewed January 10, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 53 min.)
    Edition: 1st edition
    Keywords: Electronic videos
    Abstract: 4 Hours of Video Instruction Learn DevOps key concepts, including its values, principles, and, at a high level, its practices. With this in mind, understand why the business is driving DevOps and where and how to start achieving a DevOps transformation. Overview In this course, you learn the key concepts—the what and why— of DevOps. Join Donna Knapp, curriculum development manager for ITSM Academy, to learn how this movement is enabling organizations to establish workplace cultures and environments that enable them to continuously deliver software rapidly, frequently, and reliably. Explore the business benefits of DevOps through real-world examples paired with industry statistics. Also, dive into the relationship between DevOps and other frameworks, such as Agile, Lean, IT service management (ITSM), DevSecOps, Site Reliability Engineering (SRE), and Value Stream Management. About the Instructor Donna Knapp has more than 30 years of experience in the IT industry and for the past 15 years has been ITSM Academy’s curriculum development manager. Donna’s years of practical experience and love of learning show in her engaging and informative speaking style and many certifications, including ITIL Managing Professional, ITIL Strategic Leader, Certified Process Design Engineer, DevOps Foundation, DevOps Leader, DevOps Test Engineering, Continuous Delivery Architecture, DevSecOps Foundation, Site Reliability Engineering Foundation, Certified Scrum Master, Certified Agile Service Manager, Certified Agile Process Owner, Knowledge-Centered Support, and VeriSM Foundation. Donna was the lead developer for the DevOps Institute’s DevOps Foundation course, is the author of the ITSM for DevOps and Certified Agile Process Owner (CAPO) courses, and recently teamed with Michael Orzen (co-author of Lean IT) to develop a Value Stream Mapping Fundamentals course. Donna is the author of The ITSM Process Design Guide: Developing, Reengineering, and Improving IT Service Management (which serves as the foundation for the Certified Process Design Engineer qualification), as well as two college textbooks, A Guide to Service Desk Concepts , Fourth Edition, and A Guide to Customer Service Skills for Service Desk Professionals , Fourth Edition. Donna is also a member of the ITIL 4 examination panel. Donna is a huge fan of W. Edwards Deming and is notorious for evoking his wisdom (#donnasaiddeming). Learn How To Get a high-level understanding of DevOps, including i...
    Note: Online resource; Title from title screen (viewed January 19, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Sebastopol, CA : O'Reilly Media Inc.
    ISBN: 9781523000029
    Language: English
    Pages: 1 Online-Ressource (264 pages)
    Edition: 1st edition
    DDC: 305.809
    Abstract: White privilege damages and distorts societies around the world, not just in the United States. This book exposes its pervasive global reach and creates a new space for discourse on worldwide racial equality. As Chandran Nair shows in this uncompromising new book, a belief in the innate superiority of White people and Western culture, once the driving force behind imperialism, is now woven into the very fabric of globalization. It is so insidious that, as Nair points out, even many non-White people have internalized it, judging themselves by an alien standard. It has no rival in terms of longevity, global reach, harm done, and continuing subversion of other cultures and societies. Nair takes a comprehensive look at the destructive influence of global White privilege. He examines its impact on geopolitics, the reframing of world history, and international business practices. In the soft-power spheres of White privilege—entertainment, the news media, sports, and fashion—he offers example after example of how White cultural products remain the aspirational standard. Even environmentalism has been corrupted, dominated by a White savior mentality whereby technologies and practices built in the West will save the supposedly underdeveloped, poorly governed, and polluted non-Western world. For all these areas, Nair gives specific suggestions for breaking the power of White privilege. It must be dismantled—not just because it is an injustice but also because we will be creating a post-Western world that has less conflict, is more united, and is better able to respond to the existential challenges facing all of us.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523090327
    Language: English
    Pages: 1 online resource (224 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: What does it mean to “go to work” when you don't actually leave the house? This is the ultimate guide for remote workers who want to stay engaged as team members, maintain robust work relationships, and keep an eye on their long-term career goals. Even before the coronavirus hit, remote work was growing at nearly 30 percent per year, and now it's just a fact of life. There are many millions of people who once worked at a central location every day who now find themselves facing an entirely new way of working. Written by the founders of the Remote Leadership Institute, this book is the most authoritative single resource for helping remote workers get work done effectively, build relationships that are both productive and satisfying, and maintain a career trajectory when they are not in constant close contact with their leader, coworkers, or the organization in general. The Long-Distance Teammate tackles three important issues: navigating the personal and interpersonal, growing the skills to be productive, and communicating effectively—all from a distance. In short, there is a big difference between working at home and being an effective member of a team. This practical guide describes that difference and allows you to be a great remote teammate.
    Note: Online resource; Title from title page (viewed January 19, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks
    ISBN: 9780738459547 , 0738459542
    Language: Undetermined
    Pages: 1 online resource
    Note: Title from content provider
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks
    ISBN: 9780738459486 , 0738459488
    Language: Undetermined
    Pages: 1 online resource
    Note: Title from content provider
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    ISBN: 9780738459400 , 0738459402
    Language: Undetermined
    Pages: 1 online resource
    Note: Title from content provider
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks
    ISBN: 9780738459301 , 0738459305
    Language: Undetermined
    Pages: 1 online resource
    Note: Title from content provider
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks
    ISBN: 9780738459608 , 0738459607
    Language: Undetermined
    Pages: 1 online resource
    Note: Title from content provider
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks
    ISBN: 9780738459738 , 0738459739
    Language: Undetermined
    Pages: 1 online resource
    Note: Title from content provider
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks
    ISBN: 9780738459417 , 0738459410
    Language: Undetermined
    Pages: 1 online resource
    Note: Title from content provider
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks
    ISBN: 9780738459585 , 0738459585
    Language: Undetermined
    Pages: 1 online resource
    Note: Title from content provider
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks
    ISBN: 9780738458908 , 0738458902
    Language: Undetermined
    Pages: 1 online resource
    Note: Title from content provider
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks
    ISBN: 9780738459554 , 0738459550
    Language: Undetermined
    Pages: 1 online resource
    Note: Title from content provider
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks
    ISBN: 9780738459776 , 0738459771
    Language: Undetermined
    Pages: 1 online resource
    Note: Title from content provider
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks
    ISBN: 9780738459622 , 0738459623
    Language: Undetermined
    Pages: 1 online resource
    Note: Title from content provider
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    ISBN: 9780134191164
    Language: English
    Pages: 1 online resource (816 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Complete Agile Roadmap for Planning Product Development and Analyzing Customer Needs "With his vast experience in the field, Howard Podeswa demonstrates how business analysis and agile practitioners can apply fundamental business analysis practices and techniques across the most widely used agile frameworks." -- Alain Arseneault, business analysis enthusiast, thought leader, and creative insurgent The Agile Guide to Business Analysis and Planning presents clear, actionable guidance for every product owner, analyst, requirements engineer, and stakeholder seeking to improve agile analysis and planning. Renowned author and consultant Howard Podeswa teaches best-practices drawn from agile and agile-adjacent frameworks, including Lean Thinking, Lean Startup/MVP, Circumstance-Based Market Segmentation, theories of disruptive-innovation, DevOps, ATDD, Kanban, Scrum, XP and SAFe. He offers a comprehensive agile roadmap for planning product development and analyzing customer needs, including discussion of legacy business analysis tools that still offer immense value. Using a running case study, Podeswa walks through the full product lifecycle, from visioning through release. You learn how to engage more productively with the business, using tools such as Kano Analysis, Circumstance-Market Segmentation, MVPs, Story Maps, Product Roadmaps, Customer Journey Mapping, Value Stream Mapping, and Business Process Modeling (BPM). Podeswa presents each technique in context: what you need to know and when to apply each tool. Master principles, frameworks, concepts, and practices of agile analysis and planning Explore planning and analysis in short-term, long-term, and scaled agile initiatives Use early analysis activities to envision new products or significant enhancements Prepare, plan, and estimate individual features Master unique techniques needed by large agile organizations Implement 13 practices for optimizing enterprise responsiveness to change Supported by 175+ tools, techniques, examples, diagrams, templates, checklists, and other job aids, this book is a complete toolkit for every practitioner. Whatever your role, you'll find indispensable guidance on planning and analysis responsibilities so you can help your organization respond more nimbly to its fast-changing environment. Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
    Note: Online resource; Title from title page (viewed April 23, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523092642
    Language: English
    Pages: 1 online resource (192 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: This worldwide bestseller offers simple guidance for building the kind of open and trusting relatonships vital for tackling global systemic challenges and developing adaptive, innovative organizations—over 200,000 copies sold and translated into seventeen languages! We live, say Edgar and Peter Schein, in a culture of “tell.” All too often we tell others what we think they need to know or should do. But whether we are leading or following, what matters most is we get to the truth. We have to develop a commitment to sharing vital facts and identifying faulty assumptions—it can mean the difference between success and failure. This is why we need Humble Inquiry more than ever. The Scheins define Humble Inquiry as “the gentle art of drawing someone out, of asking questions to which you do not know the answer, of building relationships based on curiosity and interest in the other person.” It was inspired by Edgar's twenty years of work in high-hazard industries and the health-care system, where honest communication can literally mean the difference between life and death. In this new edition the authors look at how Humble Inquiry differs from other kinds of inquiry, offer examples of it in action, and show how to overcome the barriers that keep us telling when we should be asking. This edition offers a deepening and broadening of this concept, seeing it as not just a way of posing questions but an entire attitude that includes better listening, better responding to what others are trying to tell us, and better revealing of ourselves. Packed with case examples and a full chapter of exercises and simulations, this is a major contribution to how we see human conversational dynamics and relationships, presented in a compact, personal, and eminently practical way.
    Note: Online resource; Title from title page (viewed February 23, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 12 hr., 39 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. Building Linux Servers: DHCP, DNS, and Directory Services LiveLessons
    Note: Online resource; Title from title screen (viewed February 11, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523092215
    Language: English
    Pages: 1 online resource (192 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: If your people know you care about them, they will move mountains. Employee engagement and loyalty expert Heather Younger outlines nine ways to manifest the radical power of caring support in the workplace. Heather Younger argues that if you are looking for increased productivity, customer satisfaction, or employee engagement, you need to care for your employees first. People will go the extra mile for leaders who show they are genuinely concerned not just with what employees can do but with who they are and can become. But while most leaders think of themselves as caring leaders, not all demonstrate that care in consistent ways. Your employees will judge you by your actions, not your intentions. Based on Younger's interviews with over eighty leaders for her podcast Leadership with Heart—including Howard Behar, former president of the Starbucks Coffee Company; Judith Scimone, senior vice president and chief talent officer at MetLife; Garry Ridge, CEO and chairman of the board of the WD-40 Company; and Shawnté Cox Holland, head of culture and engagement at Vanguard—this book outlines nine ways that leaders can make all employees feel included and cared for. She even provides access to a self-assessment so you can measure your progress as a caring leader. But this is not a cookie-cutter approach: just as Monet and Picasso expressed themselves very differently, each leader should express caring in his or her own unique, personal style. Younger takes an often nebulous, subjective concept and makes it concrete and actionable. Leaders have the power to change the lives of those they lead. They shouldn't just want to care, they should see caring as imperative for the success of their employees and their organization.
    Note: Online resource; Title from title page (viewed April 13, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738459455
    Language: English
    Pages: 1 online resource (58 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This publication is for software developers who want to understand the Matrix-Mulitply Assist (MMA) function, particularly those writing libraries for high performance computing and machine learning applications.
    Note: Online resource; Title from title page (viewed April 15, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738459288
    Language: English
    Pages: 1 online resource (50 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The IBM® Db2® Analytics Accelerator (Accelerator) is a logical extension of Db2 for IBM z/OS® that provides a high-speed query engine that efficiently and cost-effectively runs analytics workloads. The Accelerator is an integrated back-end component of Db2 for z/OS. Together, they provide a hybrid workload-optimized database management system that seamlessly manages queries that are found in transactional workloads to Db2 for z/OS and queries that are found in analytics applications to Accelerator. Each query runs in its optimal environment for maximum speed and cost efficiency. The incremental update function of Db2 Analytics Accelerator for z/OS updates Accelerator-shadow tables continually. Changes to the data in original Db2 for z/OS tables are propagated to the corresponding target tables with a high frequency and a brief delay. Query results from Accelerator are always extracted from recent, close-to-real-time data. An incremental update capability that is called IBM InfoSphere® Change Data Capture (InfoSphere CDC) is provided by IBM InfoSphere Data Replication for z/OS up to Db2 Analytics Accelerator V7.5. Since then, an extra new replication protocol between Db2 for z/OS and Accelerator that is called IBM Integrated Synchronization was introduced. With Db2 Analytics Accelerator V7.5, customers can choose which one to use. IBM Integrated Synchronization is a built-in product feature that you use to set up incremental updates. It does not require InfoSphere CDC, which is bundled with IBM Db2 Analytics Accelerator. In addition, IBM Integrated Synchronization has more advantages: Simplified administration, packaging, upgrades, and support. These items are managed as part of the Db2 for z/OS maintenance stream. Updates are processed quickly. Reduced CPU consumption on the mainframe due to a streamlined, optimized design where most of the processing is done on the Accelerator. This situation provides reduced latency. Uses IBM Z® Integrated Information Processor (zIIP) on Db2 for z/OS, which leads to reduced CPU costs on IBM Z and better overall performance data, such as throughput and synchronized rows per second. On z/OS, the workload to capture the table changes was reduced, and the remainder can be handled by zIIPs. With the introduction of an enterprise-grade Hybrid Transactional Analytics Processing (HTAP) enabler that is also known as the Wait for Data protocol, the integrated low latency protocol is now enabled to support more analyti...
    Note: Online resource; Title from title page (viewed January 27, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    ISBN: 9780738459530
    Language: English
    Pages: 1 online resource (72 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Modernization of enterprise IT applications and infrastructure is key to the survival of organizations. It is no longer a matter of choice. The cost of missing out on business opportunities in an intensely competitive market can be enormous. To aid in their success, organizations are facing increased encouragement to embrace change. They are pushed to think of new and innovative ways to counter, or offer, a response to threats that are posed by competitors who are equally as aggressive in adopting newer methods and technologies. The term modernization often varies in meaning based on perspective. This IBM® Redbooks® publication focuses on the technological advancements that unlock computing environments that are hosted on IBM Z® to enable secure processing at the core of hybrid. This publication is intended for IT executives, IT managers, IT architects, System Programmers, and Application Developer professionals.
    Note: Online resource; Title from title page (viewed March 15, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738459509
    Language: English
    Pages: 1 online resource (22 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This document is intended to facilitate the deployment of Red Hat Ansible for IBM® FlashSystem. The document showcases the automation and orchestration of storage provisioning and copy services, such as Global Mirror, Global Mirror with change volumes, and Metro Mirror for IBM FlashSystem® in hybrid cloud environments that use Red Hat Ansible. To complete the tasks it describes, you must understand IBM FlashSystem and Red Hat Ansible. The information in this document is distributed on an "as is" basis without any warranty that is either expressed or implied. Support assistance for the use of this material is limited to situations where IBM FlashSystem storage devices are supported and entitled and where the issues are specific to a blueprint implementation. With Ansible modules for IBM FlashSystem Storage, clients can easily exploit cutting-edge technology by automating tasks such as configuration management, storage provisioning , storage replication management, and workflow orchestration for complete storage management tasks .
    Note: Online resource; Title from title page (viewed March 10, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523091843
    Language: English
    Pages: 1 online resource (240 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Corporate culture is critical to any organizational change effort—this book offers a proven model for identifying and leveraging the essential elements of any culture. In a world that changes at a dizzying pace, what can leaders do to build flexible and adaptive workplaces that inspire people to achieve extraordinary results? According to the authors, the answer lies in recognizing and aligning the elusive forces—or the “puzzling” pieces—that shape an organization's culture. With a combined seventy-five years' worth of research, teaching, and consulting experience, Mario Moussa, Derek Newberry, and Greg Urban bring a wealth of knowledge to creating nimble organizations. Globally recognized business anthropologists and management experts, they explain how to access the full power of your culture by harnessing the Four Forces that drive it: Vision: Embrace a common purpose that illuminates shared aspirations and plans. Interest: Foster a deep commitment to authentic relationships and your organization's future. Habit: Establish routines and rituals that reinforce “the way we do things around here.” Innovation: Promote the constant tinkering that produces surprising new solutions to old problems. Filled with case studies, personal anecdotes, and solid, practical advice, this book includes a four-part Evaluator to help you build resilient organizations and teams. The Culture Puzzle offers the definitive playbook for thriving amid constant transformation.
    Note: Online resource; Title from title page (viewed June 22, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    ISBN: 9780738459653
    Language: English
    Pages: 1 online resource (1000 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® publication covers IBM TS7700 R5.1. The IBM TS7700 is part of a family of IBM Enterprise tape products. This book is intended for system architects and storage administrators who want to integrate their storage systems for optimal operation. Building on over 20 years of virtual tape experience, the TS7770 supports the ability to store virtual tape volumes in an object store. The TS7700 supported off loading to physical tape for over two decades. Off loading to physical tape behind a TS7700 is utilized by hundreds of organizations around the world. By using the same hierarchical storage techniques, the TS7700 (TS7770 and TS7760) can also off load to object storage. Because object storage is cloud-based and accessible from different regions, the TS7700 Cloud Storage Tier support essentially allows the cloud to be an extension of the grid. As of this writing, the TS7700C supports the ability to off load to IBM Cloud® Object Storage and Amazon S3. This publication explains features and concepts that are specific to the IBM TS7700 as of release R5.1. The R5.1 microcode level provides IBM TS7700 Cloud Storage Tier enhancements, IBM DS8000® Object Storage enhancements, Management Interface dual control security, and other smaller enhancements. The R5.1 microcode level can be installed on the IBM TS7770 and IBM TS7760 models only. TS7700 provides tape virtualization for the IBM z environment. Tape virtualization can help satisfy the following requirements in a data processing environment: Improved reliability and resiliency Reduction in the time that is needed for the backup and restore process Reduction of services downtime that is caused by physical tape drive and library outages Reduction in cost, time, and complexity by moving primary workloads to virtual tape Increased efficient procedures for managing daily batch, backup, recall, and restore processing On-premises and off-premises object store cloud storage support as an alternative to physical tape for archive and disaster recovery New and existing capabilities of the TS7700 5.1 include the following highlights: Eight-way Grid Cloud, which consists of up to three generations of TS7700 Synchronous and asynchronous replication Full AES256 encryption for replication data that is in-flight and at-rest Tight integration with IBM Z and DFSMS policy management Optional target for DS8000 Transparent Cloud Tier using DFSMS DS8000 Object Store AES256 in-flight encryption and compressi...
    Note: Online resource; Title from title page (viewed May 4, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523092420
    Language: English
    Pages: 1 online resource (168 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The impression you make as a leader has the power to build, enhance, or sabotage your authority and ideas. Discover how to convey the essence of leadership with every interaction. Every communication leaders make—speaking, writing, posting, sharing, and even listening—has the power to either secure or sabotage their impact. But wanting to inspire and engage their team and knowing how to do it are two different things. In this book, Joel Schwartzberg suggests mindsets, tactics, tips, and examples to help readers reach that goal using the most powerful leadership tool available: a leader's voice. Whether managers are giving speeches, telling stories, sending emails, posting messages, recording videos, or running Zoom meetings, these are essential tools for establishing authority and galvanizing an audience. Readers will learn how to inspire instead of inform, communicate with purpose and power, and sell—not just share—their most important ideas.
    Note: Online resource; Title from title page (viewed July 13, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    ISBN: 9780738459691
    Language: English
    Pages: 1 online resource (150 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redpaper Redbooks publication provides guidance about a backup and recovery solution for SAP High-performance Analytic Appliance (HANA) running on IBM Power Systems. This publication provides case studies and how-to procedures that show backup and recovery scenarios. This publication provides information about how to protect data in an SAP HANA environment by using IBM Spectrum® Protect and IBM Spectrum Copy Data Manager. This publication focuses on the data protection solution, which is described through several scenarios. The information in this publication is distributed on an as-is basis without any warranty that is either expressed or implied. Support assistance for the use of this material is limited to situations where IBM Spectrum Scale or IBM Spectrum Protect are supported and entitled, and where the issues are specific to a blueprint implementation. The goal of the publication is to describe the best aspects and options for backup, snapshots, and restore of SAP HANA Multitenant Database Container (MDC) single and multi-tenant installations on IBM Power Systems by using theoretical knowledge, hands-on exercises, and documenting the findings through sample scenarios. This document provides resources about the following processes: Describing how to determine the best option, including SAP Landscape aspects to back up, snapshot, and restore of SAP HANA MDC single and multi-tenant installations based on IBM Spectrum Computing Suite, Red Hat Linux Relax and Recover (ReAR), and other products. Documenting key aspects, such as recovery time objective (RTO) and recovery point objective (RPO), backup impact (load, duration, scheduling), quantitative savings (for example, data deduplication), integration and catalog currency, and tips and tricks that are not covered in the product documentation. Using IBM Cloud® Object Storage and documenting how to use IBM Spectrum Protect to back up to the cloud. SAP HANA 2.0 SPS 05 has this feature that is built in natively. IBM Spectrum Protect for Enterprise Resource Planning (ERP) has this feature too. Documenting Linux ReaR to cover operating system (OS) backup because ReAR is used by most backup products, such as IBM Spectrum Protect and Symantec Endpoint Protection (SEP) to back up OSs. This publication targets technical readers including IT specialists, systems architects, brand specialists, sales teams, and anyone looking for a guide about how to implement the best options for SAP HANA back...
    Note: Online resource; Title from title page (viewed May 27, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    ISBN: 9780738459707
    Language: English
    Pages: 1 online resource (592 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: This IBM® Redbooks® publication captures several of the preferred practices and describes the performance gains that can be achieved by implementing the IBM FlashSystem products. These practices are based on field experience. This book highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools and managed disks, volumes, remote copy services, and hosts. It explains how you can optimize disk performance with the IBM System Storage® Easy Tier® function. It also provides preferred practices for monitoring, maintaining, and troubleshooting. This book is intended for experienced storage, SAN, IBM FlashSystem, SAN Volume Controller (SVC), and IBM Storwize® administrators and technicians. Understanding this book requires advanced knowledge of these environments.
    Note: Online resource; Title from title page (viewed May 14, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738459783
    Language: English
    Pages: 1 online resource (42 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: With IBM® Spectrum Virtualize and the Object-Based Access Control, you can implement multi-tenancy and secure storage usage in a Red Hat OpenShift environment. This IBM Redpaper® publication shows you how to secure the storage usage from the Openshift user to the IBM Spectrum® Virtualize array. You see how to restrict storage usage in a Red Hat Openshift Container Platform to avoid the over-consumption of storage by one or more user. These uses cases can be expanded to the use of this control to provide assistance with billing.
    Note: Online resource; Title from title page (viewed June 18, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523093854
    Language: English
    Pages: 1 online resource (240 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This practical guide, the first to show how leaders can achieve extraordinary results through the positive energy generated by virtuous interactions with employees, is written by one of the giants in the study of positive leadership. This book is about one of the most important factors that leads to spectacular performance in organizations. Kim Cameron, a true pioneer in the study of positive leadership, offers validated scientific evidence that all individuals are inherently attracted to and flourish in the presence of positive energy. Further, he shows that the positive relational energy generated by leaders' virtuous behaviors—for example, generosity, compassion, gratitude, trustworthiness, forgiveness, and kindness—is tightly linked to extraordinary organizational outcomes like greater innovation, higher profits, and increased engagement and retention. Cameron has not written a feel-good tome about the power of positive thinking, “happiology,” or unbridled optimism. This book is a research-based exploration of how to capitalize on an inherent tendency in all living systems. He provides practical suggestions and exercises for how leaders can assess the level of their positive energy and recommends specific practices that will increase positive relational energy. Positively Energizing Leadership is a major contribution to the theory and practice of leadership.
    Note: Online resource; Title from title page (viewed August 3, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 7 hr., 15 min.)
    Edition: 2nd edition
    Keywords: Electronic videos ; local ; Electronic videos
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. Git Essentials, 2nd Edition
    Note: Online resource; Title from title screen (viewed July 8, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523091386
    Language: English
    Pages: 1 online resource (168 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: When so many enterprises have the strategic goal of maximizing product value to customers, changing their project management office (PMO) into a value management office (VMO) will help them do it. Because of the widespread adoption of agile methods in organizations, there is a rapidly growing shift from a focus on projects to one on products. This shift brings dramatic changes in how organizations manage and deliver not only IT services but their entire product and service value streams. Whatever methodology is being implemented, success at all levels is inextricably linked back to a clear understanding of customer value and customer-driven outcomes across teams. This book shows program and project managers how to maximize their professional relevancy in this new world. They must shift from being program managers to value managers, maximizing value through the entire organization. This book defines the role and skills of the value manager, using case studies and step-by-step guidance to help readers visualize and implement a new path where middle management and the value management office are valued leaders in the age of business agility.
    Note: Online resource; Title from title page (viewed September 7, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    ISBN: 9780137487806
    Language: English
    Pages: 1 online resource (336 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Experience is a powerful teacher, but it is also slow and painful -- and software practitioners cannot afford to make every mistake others have suffered. This book helps you compress your learning curve and bypass much of the pain by absorbing lessons from others who served in the trenches before you. Drawing on 20+ years helping software teams succeed in nearly 150 organizations, Karl Wiegers presents 60 concise lessons and practical recommendations you can apply to all kinds of projects, regardless of your application domain, technology, development lifecycle, or platform infrastructure. The principles, perspectives, and philosophical observations Wiegers holds have proven valid for decades, and will remain relevant for many years to come. Embodying both wisdom for deeper understanding and guidance for practical use, they represent an invaluable complement to the technical "nuts and bolts" software developers usually study. Software Development Pearls covers multiple crucial domains of project success: requirements, design, project management, culture and teamwork, quality, and process improvement. Each chapter suggests several "first steps" and "next steps" to help you begin immediately applying the author's hard-won lessons -- and writing code that is more successful in every way that matters.
    Note: Online resource; Title from title page (viewed October 22, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523093489
    Language: English
    Pages: 1 online resource (416 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This guide shows readers how to transform a traditional organization into an evolutionary one with a framework and mindset that offer a new way of leading and approaching change. Now more than ever, society is demanding change, and organizations are being asked to shift into more conscious and agile business practices. Yet, most of what people believe about leadership, effective workplaces, and how to create lasting change is either incomplete or outright incorrect. And even if the desire to change is there, understanding of how to achieve it is elusive. This book holds the key. It introduces the Shift Evolutionary Leadership Framework (SELF), which helps leaders create the understanding and application needed to evolve high performance. At the core of the book are dozens of business patterns that cut across seven dimensions of organizational functioning. The traps of traditional organizations are contrasted with the high-performance practices of evolutionary organizations. Authors Michael Sahota and Audree Tata Sahota explain the steps of leading beyond change—evolving beyond servant leadership to make the inner shift needed to unlock the practical skills and techniques. Whether readers call this shift business agility, Teal Agility, evolutionary, or the future of work, it is possible to create high-performing organizations filled with energized people who are able to surf the waves of change.
    Note: Online resource; Title from title page (viewed August 23, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    ISBN: 9780136915805
    Language: English
    Pages: 1 online resource (432 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: In Clean Craftsmanship , the legendary Robert C. Martin ("Uncle Bob") has written every programmer's definitive guide to working well. Martin brings together the disciplines, standards, and ethics you need to deliver robust, effective code quickly and productively, and be proud of all the software you write -- every single day. Martin, the best-selling author of The Clean Coder , begins with a pragmatic, technical, and prescriptive guide to five foundational disciplines of software craftsmanship: test-driven development, refactoring, simple design, collaborative programming (pairing), and acceptance tests. Next, he moves up to standards -- outlining the baseline expectations the world has of software developers, illuminating how those often differ from their own perspectives, and helping you repair the mismatch. Finally, he turns to the ethics of the programming profession, describing ten fundamental promises all software developers should make to their colleagues, their users, and above all, themselves . With Martin's guidance and advice, you can consistently write code that builds trust instead of undermining it -- trust among your users and throughout a society that depends on software for its very survival.
    Note: Online resource; Title from title page (viewed October 22, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    ISBN: 9780136767206
    Language: English
    Pages: 1 online resource (672 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Gain a Deep, Practical Understanding of 5G Technology, Applications, Architecture, Standards, and Ecosystem The 5G ultra-high-speed wireless communication standard is a major technological leap forward–substantially increasing speed and capacity, enhancing current use cases, and making many new applications practical. For technical professionals, managers, and students, 5G requires significant new knowledge and expertise. In 5G Wireless: A Comprehensive Introduction , renowned information technology author William Stallings presents a comprehensive and unified explanation of 5G’s key applications, technologies, and standards. Like Stallings’ other award-winning texts, this guide will help you quickly find the information and gain the mastery to succeed with critical new technology. Stallings first explains how cellular networks have evolved through 4G and now 5G, and surveys 5G’s application areas and use cases. Next, he thoroughly introduces the 5G core network, covering SDN, NFV, network slicing, QoS, and edge computing–and provides a detailed coverage of the 5G air interface and radio access network. Throughout, key concepts are illuminated through realistic examples, review questions help you test your understanding, and references support further exploration. Understand the 5G ecosystem, its building blocks, standards, and R&D roadmaps Explore the Enhanced Mobile Broadband (eMBB) use case, where 5G enhances 4G in applications such as smart offices and dense urban communications Learn how Massive Machine Type Communications (mMTC) and Ultra-Reliable and Low-Latency Communications (URLCC) support new applications such as fog, IoT, and cloud Discover how 5G NextGen core (backbone) networks serve and interconnect wireless access networks that connect user devices Master key 5G NR Air Interface and Radio Access Network (RAN) concepts, including millimeter-wave transmission, MIMO antennas, and OFDM multiplexing
    Note: Online resource; Title from title page (viewed June 30, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9781000427325
    Language: English
    Pages: 1 online resource (280 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers. Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. This increased connectivity and the devices used for edge computing will create more room for cyber criminals to exploit the system’s vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge. The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse-use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked when they are most needed to fight cyber crime and ensure data privacy. Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of the network. In this context, this book addresses the cyber security challenges associated with edge computing, which provides a bigger picture of the concepts, techniques, applications, and open research directions in this area. In addition, the book serves as a single source of reference for acquiring the knowledge on the technology, process and people involved in next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.
    Note: Online resource; Title from title page (viewed August 12, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    ISBN: 9780738459943
    Language: English
    Pages: 1 online resource (116 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The goal of this IBM® Redbooks® publication is to demonstrate the ability to perform single click automated deployments of multi-platform applications that include IBM Db2 for z/OS database schema changes by using the capabilities of IBM Db2 DevOps Experience for z/OS. Pushing the application and database code changes to a source control management system (SCM) triggers a single CI/CD pipeline execution for application and database changes. Therefore, it mitigates the dependency on the DBA to deploy those database changes in a separate process. At the same time, DBAs can safeguard the integrity of their organization's data by implementing site rules in Db2 DevOps Experience. DBAs define whether a schema change can be approved automatically after all site rules are satisfied or whether it must be approved manually. In this publication, we e provide an overview of the CI/CD pipeline architecture in the context of a sample application. We also describe the steps that are relevant to the roles of the DevOps engineer who implements the enterprise CI/CD pipeline, the DBA who is responsible for database code changes in Db2 for z/OS and for defining site rules that ensure quality in production, and the application developer who changes the application code and communicates requirements for changes in the database schema.
    Note: Online resource; Title from title page (viewed September 3, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738459967
    Language: English
    Pages: 1 online resource (36 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks Product Guide provides an overview of the features and functions that are available with the IBM DS8900F models that run microcode Release 9.2 (Bundle 89.20 / Licensed Machine Code 7.9.20). As of August 2021, the DS8900F with DS8000 Release 9.2 is the latest addition. The DS8900F is an all-flash system exclusively, and it offers three classes: IBM DS8980F: Analytic Class: The DS8980F Analytic Class offers best performance for organizations that want to expand their workload possibilities to artificial intelligence (AI), Business Intelligence, and Machine Learning. IBM DS8950F: Agility Class: The agility class is efficiently designed to consolidate all your mission-critical workloads for IBM Z, IBM LinuxONE, IBM Power Systems, and distributed environments under a single all-flash storage solution.. IBM DS8910F: Flexibility Class: The flexibility class delivers significant performance for midrange organizations that are looking to meet storage challenges with advanced functionality delivered as a single rack solution.
    Note: Online resource; Title from title page (viewed August 30, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738459875
    Language: English
    Pages: 1 online resource (52 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: The focus of this document is to demonstrate an early threat detection by using IBM® QRadar® and the Safeguarded Copy feature that is available as part of IBM FlashSystem® and IBM SAN Volume Controller. Such early detection protects and quickly recovers the data if a cyberattack occurs. This document describes integrating IBM FlashSystem audit logs with IBM QRadar, and the configuration steps for IBM FlashSystem and IBM QRadar. It also explains how to use the IBM QRadar's device support module (DSM) editor to normalize events and assign IBM QRadar identifier (QID) map to the events. Post IBM QRadar configuration, we review configuring Safeguarded Copy on the application volumes by using volume groups and applying Safeguarded backup polices on the volume group. Finally, we demonstrate the use of orchestration software IBM Copy Services Manager to start a recovery, restore operations for data restoration on online volumes, and start a backup of data volumes.
    Note: Online resource; Title from title page (viewed August 17, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523093663
    Language: English
    Pages: 1 online resource (232 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: Twenty-nine leading scholars and executives provide a visionary look at the future of business, propelling past damaging industrial-age values to uncover the key ingredients of humanistic, ecologically sustainable, and intergenerational prosperity. Through the exploration of robust cases and stories packed with deep insight and vital science, this extraordinary collection explores how we can adapt our notions of value, markets, and models of cooperation and collective action to create a world where economies and businesses excel, all people thrive, and nature flourishes. In part I, “The Business of Business Is Betterment,” the contributors show how enterprises today are further developing—and even taking a quantum leap beyond—the multistakeholder logic of “shared value creation.” Part II, “Net Positive = Innovation's New Frontier,” is focused on what companies can and are doing to move away from “doing no harm” to playing an active role in solving environmental, social, and economic problems. The final section, “Ultimate Advantage: A Leadership Revolution That Is Changing Everything,” looks at new leadership paradigms—characterized by unexpected qualities like virtue, love, compassion, and connection—that are crucial to creating engaged, empowered, innovative, and out-performing enterprises. This book is designed to galvanize change and unite a global community of inquiry and action. It establishes the conceptual cornerstones for a new kind of business practice that will lead the way to an equitable, sustainable, and flourishing future.
    Note: Online resource; Title from title page (viewed November 9, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9781000289336
    Language: English
    Pages: 1 online resource (176 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This book explains engineering practice, what engineers actually do in their work. The first part explains how to find paid engineering work and prepare for an engineering career. The second part explains the fundamentals of engineering practice, including how to gain access to technical knowledge, how to gain the willing collaboration of other people to make things happen, and how to work safely in hazardous environments. Other chapters explain engineering aspects of project management missed in most courses, how to create commercial value from engineering work and estimate costs, and how to navigate cultural complexities successfully. Later chapters provide guidance on sustainability, time management and avoiding the most common frustrations encountered by engineers at work. This book has been written for engineering students, graduates and novice engineers. Supervisors, mentors and human resources professionals will also find the book helpful to guide early-career engineers and assess their progress. Engineering schools will find the book helpful to help students prepare for professional internships and also for creating authentic practice and assessment exercises.
    Note: Online resource; Title from title page (viewed January 14, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    ISBN: 9780137458974
    Language: English
    Pages: 1 online resource (272 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als Hofer, Stefan Domain storytelling
    Keywords: Electronic books ; local
    Abstract: Rapidly Understand New Domains, So You Can Build Great Software for Them Using Domain Storytelling, you can quickly gain clarity about a new domain's people, tasks, tools, work items, and events, avoiding costly misunderstandings and building better software. In Domain Storytelling , the method's inventors show how domain experts can clearly tell their stories, capture their insights with simple pictographs, show their work, get feedback, and get everyone on the same page. Stefan Hofer and Henning Schwentner explain how and why Domain Storytelling works. They introduce the method's easy pictographic language, scenario-based modeling techniques, workshop format, and relationship to other modeling methods. And using step-by-step case studies, they guide you through solving many common problems, from creating new domain languages to deriving requirements, optimizing workflows to uncovering "shadow IT." Fully align all project participants and stakeholders, both technical and business-focused Master a simple set of symbols and rules for modeling any process or workflow Use workshop-based collaborative modeling to find better solutions faster Organize domains for manageability, and transform domain knowledge into requirements Move your models from diagrams and sticky notes to code Make better decisions about whether to build or buy software Gain better visibility into your IT landscape so you can consolidate or optimize it This guide is for everyone who wants more effective software -- from developers, architects, and team leads to the domain experts and executives who rely on it every day.
    Note: Online resource; Title from title page (viewed October 11, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    ISBN: 9780738459745
    Language: English
    Pages: 1 online resource (476 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Enterprises require support and agility to work with big data repositories and relational databases. FUJITSU Enterprise Postgres is one of the leading relational database management systems (RDBMSs), and it is designed to work with large data sets. As more companies transform their infrastructures with hybrid cloud services, they require environments that protect the safety of their data and business rules. At IBM®, we believe that your data is yours and yours alone. The insights and advantages that come from your data are yours to use in the pursuit of your business objectives. IBM is dedicated to this mission, and the IBM LinuxONE platform is designed around this core statement. IBM LinuxONE is a secure and scalable data serving and computing platform that is made for today's critical workloads. IBM LinuxONE is an all-Linux enterprise platform for open innovation that combines the best of Linux and open technology with the best of enterprise computing in one system. Combining FUJITSU Enterprise Postgres, which is a robust Relational Database Management System (RDBMS) that provides strong query performance and high availability (HA), with IBM LinuxONE can transform your application and data portfolio by providing innovative data privacy, security, and cyber resiliency capabilities, which are all delivered with minimal downtime. This IBM Redbooks® publication describes data serving with FUJITSU Enterprise Postgres 12 that is deployed on IBM LinuxONE, which provides the scalability, business-critical availability, and security that your enterprise requires. This publication is useful to IT architects, system administrators, and others who are interested in understanding the significance of using FUJITSU Enterprise Postgres on IBM LinuxONE. This publication is written for those who are familiar with IBM LinuxONE and have some experience in the use of PostgreSQL.
    Note: Online resource; Title from title page (viewed July 14, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    ISBN: 9780738459899
    Language: English
    Pages: 1 online resource (22 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Red Hat OpenShift is a great platform for developing, testing, and running applications. It handles multitenancy within Red Hat OpenShift Cluster by using users and namespaces, which allows it to run different production applications and workloads on the same Red Hat OpenShift Cluster. This IBM® Redpaper describes network isolation on a multitenant Red Hat OpenShift cluster.
    Note: Online resource; Title from title page (viewed July 28, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523091706
    Language: English
    Pages: 1 online resource (240 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This practical guide shows how to facilitate collaboration among diverse individuals and organizations to navigate complexity and create change in our interconnected world. The social and environmental challenges we face today are not only complex, they are also systemic and structural and have no obvious solutions. They require diverse combinations of people, organizations, and sectors to coordinate actions and work together even when the way forward is unclear. Even so, collaborative efforts often fail because they attempt to navigate complexity with traditional strategic plans, created by hierarchies that ignore the way people naturally connect. By embracing a living-systems approach to organizing, impact networks bring people together to build relationships across boundaries; leverage the existing work, skills, and motivations of the group; and make progress amid unpredictable and ever-changing conditions. As a powerful and flexible organizing system that can span regions, organizations, and silos of all kinds, impact networks underlie some of the most impressive and large-scale efforts to create change across the globe. David Ehrlichman draws on his experience as a network builder; interviews with dozens of network leaders; and insights from the fields of network science, community building, and systems thinking to provide a clear process for creating and developing impact networks. Given the increasing complexity of our society and the issues we face, our ability to form, grow, and work through networks has never been more essential.
    Note: Online resource; Title from title page (viewed October 12, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523000418
    Language: English
    Pages: 1 online resource (256 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Change initiatives fail because humans are hardwired to return to what's worked for us in the past. This book offers a straightforward process for rewiring ourselves and those we lead to be more change-capable. Erika Andersen says avoiding change has been a historical imperative. In this book, she shows how we can overcome that reluctance and get good at making necessary change. Using a fictional story about a jewelry business changing generational hands, Andersen lays out a five-step model for addressing both this human side of change and its practical aspects: Step 1: Clarify the change and why it's needed—Get clear on what the change is and the benefits it will bring. Step 2: Envision the future state—Build a shared picture of the post-change future. Step 3: Build the change—Bring together a change team, engage key stakeholders, and plan the change. Step 4: Lead the transition—Build a transition plan that supports the human side of the change, then engage the whole organization in making the change. Step 5: Keep the change going—Work to make your organization permanently more change-capable. With opportunities to self-reflect and try out the ideas and approaches throughout, this book is a practical guide to thriving in this era of nonstop change.
    Note: Online resource; Title from title page (viewed October 26, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 5 hr., 13 min.)
    Edition: 1st edition
    Keywords: Electronic videos
    Abstract: Getting Started with Containers Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.
    Note: Online resource; Title from title screen (viewed September 28, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9781000357653
    Language: English
    Pages: 1 online resource (168 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy. Despite their effectiveness for remote work and online interactions, cyberspace alternatives ignited several Cybersecurity challenges. Malicious hackers capitalized on global anxiety and launched cyberattacks against unsuspecting victims. Internet fraudsters exploited human and system vulnerabilities and impacted data integrity, privacy, and digital behaviour. Cybersecurity in the COVID-19 Pandemic demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data. The book simplifies the socio-technical aspects of Cybersecurity and draws valuable lessons from the impacts COVID-19 cyberattacks exerted on computer networks, online portals, and databases. The book also predicts the fusion of Cybersecurity into Artificial Intelligence and Big Data Analytics, the two emerging domains that will potentially dominate and redefine post-pandemic Cybersecurity research and innovations between 2021 and 2025. The book’s primary audience is individual and corporate cyberspace consumers across all professions intending to update their Cybersecurity knowledge for detecting, preventing, responding to, and recovering from computer crimes. Cybersecurity in the COVID-19 Pandemic is ideal for information officers, data managers, business and risk administrators, technology scholars, Cybersecurity experts and researchers, and information technology practitioners. Readers will draw lessons for protecting their digital assets from email phishing fraud, social engineering scams, malware campaigns, and website hijacks.
    Note: Online resource; Title from title page (viewed March 16, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738460062
    Language: English
    Pages: 1 online resource (262 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This IBM® Redbooks® publication is Volume 2 of a five-volume series of books entitled The Virtualization Cookbook for IBM Z®. This volume includes the following chapters: Chapter 1, "Installing Red Hat Enterprise Linux on LNXADMIN" on page 3, describes how to install and configure Red Hat Enterprise Linux onto the Linux Administration server, which performs the cloning and other tasks. Chapter 2, "Automated Red Hat Enterprise Linux installations by using Kickstart" on page 37, describes how to use Red Hat's kickstart tool to create Linux systems. This tool is fundamentally different from cloning in that an automated installation is implemented. You can try kickstart and cloning. Understand that these applications attempt to accomplish the same goal of quickly getting Linux systems up and running, and that you do not need to use both. Chapter 3, "Working with subscription-manager, yum, and DaNdiFied" on page 47, describes how the Red Hat Network works. It provides centralized management and provisioning for multiple Red Hat Enterprise Linux systems. Kickstart is an easy and fast way to provision your Linux guests in any supported Linux platform. It re-creates the operating system from the beginning by using the kickstart profile configuration file that installs the new operating system unattended. It also sets up the new guest according to the definition that was set up in the kickstart file. Usually, Linux is administered by the same team that manages Linux on all platforms. By using kickstart, you can create a basic profile that can be used in all supported platforms and customize Linux profiles, as needed. Cloning requires a better understanding of the z/VM environment and z/VM skills. It is a fast process if you enable the IBM FlashCopy® feature in advance. It clones the disks from a golden image to new disks that are used by the new Linux guest. The process can be automated by using the cloning scripts that are supplied with this book. It is recommended that you start with The Virtualization Cookbook for IBM Z Volume 1: IBM z/VM 7.2, SG24-8147 of this series because the IBM® z/VM hypervisor is the foundation (or base "layer") for installing Linux on IBM Z.
    Note: Online resource; Title from title page (viewed October 19, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523001217
    Language: English , Spanish
    Pages: 1 online resource (192 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: Time management remains a huge challenge for most people. This book shares the habits and processes used by top leaders worldwide to minimize distractions and maximize accomplishments. In researching more than 1,260 managers and executives from more than 108 different organizations, Steve and Rob Shallenberger discovered that 68 percent of them feel like their number one challenge is time management, yet 80 percent don't have a clear process for how to prioritize their time. Drawing on their forty years of leadership research, this book offers three powerful habits that the top 10 percent of leaders use to Do What Matters Most. These three high performance habits are developing a written personal vision, identifying and setting Roles and Goals, and consistently doing Pre-week Planning. And Steve and Rob make an audacious promise: these three habits can increase anyone's productivity by at least 30 to 50 percent. For organizations, this means higher profits, happier employees, and increased innovation. For individuals, it means you'll find hours in your week that you didn't know were there--imagine what you could do! You will learn how acquiring this skillset turned an "average" employee into her company's top producer, enabled a senior vice president to reignite his team and achieve record results, transformed a stressed-out manager's work and home life, helped a CEO who felt like he'd lost his edge regain his fire and passion, and much more. By implementing these simple and easy-to-understand habits, supported by tools like the Personal Productivity Assessment, you will learn how to lead a life by design, not by default. You'll feel the power that comes with a sense of control, direction, and purpose. En nuestra investigación de más 1260 gerentes, descubrimos que más del 68% sentían que su mayor desafío es cómo priorizar su tiempo, pero el 80% de los mismos carecían de un proceso para organizarlo y centrarse en lo que más importa. Este libro trata sobre los tres hábitos de alto rendimiento que te empoderarán para tomar el control de tu horario, priorizar el tiempo y aumentar la productividad entre un 30 y 50%. Esto se traduce en un mejor liderazgo, un aumento de las ventas, una mayor productividad, más beneficios y una cultura mejorada. A nivel personal, implica un mejor equilibrio vital, mejoras en la salud, menos estrés, mejores relaciones, más dinero y un enfoque preciso en tus prioridades.
    Note: Online resource; Title from title page (viewed August 1, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 13 hr., 17 min.)
    Edition: 1st edition
    Keywords: Electronic videos
    Abstract: 13+ Hours of Video Instruction Overview Learn how to use Angular, Node.js, Express, and MongoDB to create unique web applications and learn the fundamentals of full-stack development with the MEAN stack. Description MEAN (MongoDB, Express.js, Angular, and Node.js) is one of the most popular stacks for building full-stack web applications. It enables developers to quickly write an entire application—front end, back end, and database—using only JavaScript. In this course, expert Shaun Wassell demonstrates the MEAN stack through five unique projects. It’s best to learn by doing, and this LiveLessons offers hands-on experience. Shaun leads you through five sample projects of increasing complexity that demonstrate many different aspects and possibilities of full-stack development with the MEAN stack. Visit the author’s GitHub site to download companion files: https://github.com/shaunwa/full-stack-angular-projects . About the Instructor Shaun Wassell ’s goal is to create a world where people are empowered to use programming as a way to solve meaningful problems; a world where writing code is just as natural for most people as walking or breathing. To help make this a reality, he has dedicated the past few years to helping people learn and master software-development skills through video courses, live training sessions, and one-on-one tutoring. Shaun has been programming since he was a kid, when creating video games was his gateway into the world of software. Since then, he’s been fortunate enough to be a contributing member on many amazing software projects and work with some incredible mentors along the way. Skill Level Beginner to Intermediate What You Will Learn How to build full-stack applications using Angular, Node.js, Express, and MongoDB How to use network requests and REST APIs to communicate between the front and back end How to correctly divide application logic between the front and back end How to structure full-stack applications for maximum readability and ease of maintenance How to implement an authentication flow that enables users to log in and save data How to integrate powerful third-party APIs into your full-stack applications Who Should Take This Course JavaScript developers/engineers, front-end developers/engineers, Angular developers/engineers, back-end developers/engineers, and full-stack developers Course Requirements Learners should know the basics of HTML, CSS, and JavaScript and have a strong und...
    Note: Online resource; Title from title screen (viewed November 8, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523091560
    Language: English
    Pages: 1 online resource (648 pages)
    Edition: 7th edition
    Keywords: Electronic books
    Abstract: The seventh edition of this pragmatic guide to determining right and wrong in the workplace is updated with new case studies, exercises, and ancillary materials. Joseph Weiss's Business Ethics is a pragmatic, hands-on guide for determining right and wrong in the business world. To be socially responsible and ethical, Weiss maintains, businesses must acknowledge the impact their decisions can have on the world beyond their walls. An advantage of the book is the integration of a stakeholder perspective with an issues and crisis management approach so students can look at how a business's actions affect not just share price and profit but the well-being of employees, customers, suppliers, the local community, the larger society, other nations, and the environment. Weiss includes twenty-three cases that immerse students directly in contemporary ethical dilemmas. Eight new cases in this edition include Facebook's (mis)use of customer data, the impact of COVID-19 on higher education, the opioid epidemic, the rise of Uber, the rapid growth of AI, safety concerns over the Boeing 737, the Wells Fargo false saving accounts scandal, and plastics being dumped into the ocean. Several chapters feature a unique point/counterpoint exercise that challenges students to argue both sides of a heated ethical issue. This edition has eleven new point/counterpoint exercises, addressing questions like, Should tech giants be broken apart? What is the line between free speech and dangerous disinformation? Has the Me Too movement gone too far? As with previous editions, the seventh edition features a complete set of ancillary materials for instructors: teaching guides, test banks, and PowerPoint presentations.
    Note: Online resource; Title from title page (viewed November 23, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    ISBN: 9780738460161
    Language: English
    Pages: 1 online resource (138 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: IBM DFSMS and the IBM DS8000 added functionality to provide elements of serverless data movement, and for IBM z/OS® to communicate with a storage cloud. The function is known as Transparent Cloud Tiering and is composed of the following key elements: A gateway in the DS8000, which allows the movement of data to and from Object Storage by using a network connection, with the option to encrypt data in the Cloud. DFSMShsm enhancements to support Migrate and Recall functions to and from the Object Storage. Other commands were enhanced to monitor and report on the new functionality. DFSMShsm uses the Web Enablement toolkit for z/OS to create and access the metadata for specific clouds, containers, and objects. DFSMSdss enhancements to provide some basic backup and restore functions to and from the cloud. The IBM TS7700 can also be set up to act as if it were cloud storage from the DS8000 perspective. This IBM Redbooks publication is divided into the following parts: Part 1 provides you with an introduction to clouds. Part 2 shows you how we set up the Transparent Cloud Tiering in a controlled laboratory and how the new functions work. We provide points to consider to help you set up your storage cloud and integrate it into your operational environment. Part 3 shows you how we used the new functionality to communicate with the cloud and to send data and retrieve data from it.. This edition applies to DS8900F Release 9.2 and covers more recent features of TCT such as multi-cloud connections. along with additional advice for high availabilty cloud connectivity and DFSMShsm improvements.
    Note: Online resource; Title from title page (viewed December 1, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 6 hr., 47 min.)
    Edition: 1st edition
    Keywords: Electronic videos
    Abstract: Data Engineering Foundations Part 1: Using Spark, Hive, and Hadoop Scalable Tools Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.
    Note: Online resource; Title from title screen (viewed December 3, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 40 min.)
    Edition: 1st edition
    Keywords: Electronic videos
    Abstract: These videos are meant to be used with the book: Clean Craftsmanship: Disciplines, Standards and Ethics . The videos demonstrate the code examples in Chapters 2 and 3 on TDD. We recommend that you access the book in a new tab to view the companion videos with the book.
    Note: Online resource; Title from title screen (viewed November 15, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    ISBN: 9780137653515
    Language: English
    Pages: 1 online resource (400 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: Becoming a coder is all fun and games! Everyone should learn to code. Much like drawing and sketching, playing an instrument, cooking, or taking pictures and shooting videos, coding is a creative endeavor, which means it's a way to actually create stuff, and creating stuff is incredibly rewarding and satisfying. Sure, it's fun to spend hours on your phone looking at what other people have created; but that's nothing compared to the joy and satisfaction of creating things that other people consume and use. Yep, coding is fun! And if that weren't enough, when you learn to code you develop all sorts of invaluable skills and traits beyond just coding. These include planning, problem solving, communication, logic, empathy, attention to detail, patience, resilience, persistence, and creativity. And it turns out that these skills (especially creativity and creative problem solving) are some of the most in-demand out there. So, coding will help your future career, too, regardless of what that career may be. But, where to start? Captain Code is a welcoming, engaging, and fun introduction to becoming a coder, designed for the young (ages 10-17) and young-at-heart. Experienced educators and coders Ben & Shmuel Forta will guide you using Python, one of the most popular programming languages in the world. You'll learn by creating games, yes, games, from simple projects to retro text-based adventures to complete graphical arcade style games. Captain Code is 400 glossy color pages of goodness packed with welcoming images, useful tips and tidbits, and engaging, readable text that focuses on doing while having fun. All code listings are in full-color and QR codes link to bonus content, downloads, challenge solutions, and more. Captain Code makes coding exciting and rewarding, as it prepares a new generation to take their next steps forwardin education, careers, or both. So, are you ready to unleash your coding superpower and become Captain Code?
    Note: Online resource; Title from title page (viewed December 25, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 5 hr., 59 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: 6+ Hours of Video Instruction Learn to write performant back-end applications in JavaScript by leveraging the Node.js runtime. Shaun Wassell teaches JavaScript developers how to write and run server-side JavaScript applications for the powerful Node.js runtime. It includes topics such as working with the file system, creating web servers, installing, using, and publishing NPM packages, Google V8 engine, testing, and much more. Description Several years ago, it wasn’t possible to write JavaScript programs for the back-end. JavaScript was strictly limited to running in a browser, and if a developer wanted to write back-end software, they had little choice but to learn another programming language, such as PHP. Now, that has all changed. Thanks to Node.js, which allows JavaScript to be run outside the browser, JavaScript developers can write web-servers, server-side scripts, and any number of other useful back-end programs. This LiveLessons video shows developers how to write and run server-side JavaScript applications for the powerful Node.js runtime. The code repository for this LiveLesson can be accessed at https://github.com/shaunwa/node-course . About the Instructor Shaun Wassell 's goal is to create a world where people are empowered to use programming as a way to solve meaningful problems--a world where writing code is just as natural for most people as walking or breathing. To help make this a reality, he has dedicated the past few years to helping people learn and master software development skills through video courses, live training sessions, and one-on-one tutoring. Shaun has been programming since he was a kid, when creating video games was his gateway into the world of software. Since then, he's been fortunate enough to be a contributing member on many amazing software projects and work with some incredible mentors along the way. Skill Level Intermediate What You Will Learn Learn to quickly and easily write performant back-end applications in JavaScript by leveraging the Node.js runtime: Write useful server-side programs using modern JavaScript Build Node.js web servers using several different frameworks Deploy your Node.js applications so that they can be accessed from anywhere Create and publish an open-source NPM package Shaun also covers more advanced features for developers, such as: Maximizing the performance of your Node.js programs by learning about how Nodes V8 runtime works Interfacing with databases in Nod...
    Note: Online resource; Title from title screen (viewed February 8, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523089376
    Language: English
    Pages: 1 online resource (336 pages)
    Edition: 6th edition
    Keywords: Electronic books ; local
    Abstract: This sixth edition of the number one bestselling employee retention book in the world (over 800,000 copies sold) puts a new emphasis on diversity and inclusion but keeps the same appealing format: twenty-six simple strategies from A to Z. Despite booms and busts, technology advances, talent wars, layoffs, and even a global pandemic, people want what they've always wanted. Employees want—and now expect—meaningful work, supportive bosses, regular recognition, and a chance to learn and grow. And managers want their amazing people to stay—for at least a little while longer. For two decades, this Wall Street Journal bestseller—over 800,000 sold—has offered twenty-six simple strategies, from A to Z, that managers can use to address their employees' real concerns and keep them engaged. The authors have gone over every word of the previous edition, revising, updating, and streamlining. This edition includes a timely focus on diversity and inclusion in every chapter. For example, chapter 6 focuses on family. Different cultures view family responsibilities differently, so the authors address how to take that into consideration when a treasured employee asks for extended leave to care for a grandparent. And a new section called “Conversations That Count” offers discussion questions for sparking deeper conversation around the topics in the book. This new edition will ensure that Love 'Em or Lose 'Em will continue to help managers all over the world create a supportive workplace culture so they can fight burnout and keep the people they can least afford to lose.
    Note: Online resource; Title from title page (viewed March 2, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523092376
    Language: English
    Pages: 1 online resource (240 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Bob Nelson, author of the multimillion-copy bestseller 1001 Ways to Reward Employees, and human performance expert Mario Tamayo offer hundreds of practical, creative tips for helping employees—and their managers—make work more fun. According to the employees that work for firms listed in Fortune's “100 Best Companies to Work for in America,” the most defining characteristic of these organizations is they are all “fun” places to work. Fun is the secret sauce every business needs to better engage and motivate its employees today. Work Made Fun Gets Done! gives readers simple, practical ideas for instantly bringing fun into their work and workplace. Based on examples from scores of companies like Zoom, Pinterest, Bank of America, Zappos, Honda, Microsoft, and many more, this book provides clear examples of exactly what managers and employees alike can do to lighten the tone in the work environment and allow employees to have more fun at work. From AAA's “Dump a Dog” program where workers can pass their least-wanted project on to their manager and Houzz's complimentary office slippers to CARFAX's themed-wardrobe Zoom meetings and Google's company-approved Nerf-gun battles and paper airplane contests, you'll find dozens of ideas you can immediately adapt and implement in your own workplace. Work and fun have typically been considered polar opposites, but this book proves they can be integrated in ways that produce more motivated workers—and exceptional results.
    Note: Online resource; Title from title page (viewed May 11, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523093014
    Language: English
    Pages: 1 online resource (200 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Without trust, people and businesses fail. Trusted Leader provides a framework for building trust so that you and your organizations can perform at your best. “A lack of trust is your biggest expense,” says Wall Street Journal bestselling author David Horsager. Without trust, transactions cannot occur. Without trust, influence is destroyed. Without trust, leaders lose their people. Trust can be either your most vulnerable weakness or your greatest asset. Horsager introduces readers to his Eight Pillars of Trust through the journey of a senior leader who thought success was certain. Follow CEO Ethan Parker as he discovers the power of trust and how to apply it amid the complexities of leadership, change, and culture transformation. The Eight Pillars of Trust (Clarity, Compassion, Character, Competency, Commitment, Connection, Contribution, and Consistency) are based on Horsager's original research and extensive experience working with Fortune 500 companies and top government agencies around the globe. In addition to the business parable, this book is rich in practical advice for implementing each of the Eight Pillars. You will learn strategies to increase alignment, overcome attrition, and get absolutely clear on executing your top priorities. Horsager offers a road map for how to become the most trusted expert in your industry.
    Note: Online resource; Title from title page (viewed March 30, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    ISBN: 9780136885979
    Language: English
    Pages: 1 online resource (464 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The Definitive, Practical, Proven Guide to Architecting Modern Software--Now Fully Updated Now with nine new chapters, Software Architecture in Practice, Fourth Edition, thoroughly explains what software architecture is, why it’s important, and how to design, instantiate, analyze, evolve, and manage it in disciplined and effective ways. Three renowned software architects cover the entire lifecycle, presenting practical guidance, expert methods, and tested models for use in any project, no matter how complex. You'll learn how to use architecture to address accelerating growth in requirements, system size, and abstraction, and to manage emergent quality attributes as systems are dynamically combined in new ways. With insights for utilizing architecture to optimize key quality attributes--including performance, modifiability, security, availability, interoperability, testability, usability, deployability, and more--this guide explains how to manage and refine existing architectures, transform them to solve new problems, and build reusable architectures that become strategic business assets. Discover how architecture influences (and is influenced by) technical environments, project lifecycles, business profiles, and your own practices Leverage proven patterns, interfaces, and practices for optimizing quality through architecture Architect for mobility, the cloud, machine learning, and quantum computing Design for increasingly crucial attributes such as energy efficiency and safety Scale systems by discovering architecturally significant influences, using DevOps and deployment pipelines, and managing architecture debt Understand architecture's role in the organization, so you can deliver more value
    Note: Online resource; Title from title page (viewed July 27, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523092260
    Language: English
    Pages: 1 online resource (240 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Organizational change doesn't have to be so difficult. Leading change expert Jake Jacobs shares eight fail-safe ways to make any change initiative at any organization easier, faster, and more effective. In a recent Fast Company article, nine CEOs said the biggest challenges their companies face are all related to change. Change is a constant need and a constant challenge for every organization—large or small, for-profit, nonprofit, or governmental. Is there a way to make it easier? If you're trying to lift something heavy, it helps to have a lever. In this book, Jake Jacobs provides eight levers that can transform the typical change process into something far smoother and more efficient—he calls the new process Leverage Change. Jacobs offers proven advice and real-life examples that will accelerate every step of the change process, including designing your own customized change process, figuring out where the real energy for change is in your organization, striking the right balance between explicit direction and creative collaboration, making change work as part of people's regular routines, and more. Archimedes said with the right lever, he could move the world—with Jacobs' eight levers, you can change your world.
    Note: Online resource; Title from title page (viewed May 4, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    ISBN: 9780738459332
    Language: English
    Pages: 1 online resource (78 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: In this IBM® Redpaper publication, we focus on the importancequality. This paper explains how this testing can be achieved only in an effective and efficient way by autenable such automation. We specifically focus on Galasa. Galasa is an open-source deep integration test framework for hybrid cloud applications that allows teams to automate tests to run as part of a DevOps pipeline. Galasa was built as an integration test framework to test applications spanning multiple platforms as part of a hybrid multi-cloud. It also integrates all the test tools that are needed to test such an application. This feature gives you a single test catalog, single endpoint to run tests and a single UI to review the reports from those tests. These enterprise-level features are key to unlocking the value of your automation and allow you to deliver your DevOps journey.
    Note: Online resource; Title from title page (viewed March 29, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    ISBN: 9780738459196
    Language: English
    Pages: 1 online resource (488 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: IBM® Spectrum Protect Plus is a data protection solution that provides near-instant recovery, replication, retention management, and reuse for virtual machines, databases, and applications backups in hybrid multicloud environments. IBM Knowledge Center for IBM Spectrum® Protect Plus provides extensive documentation for installation, deployment, and usage. In addition, build and size an IBM Spectrum Protect Plus solution. The goal of this IBM Redpaper® publication is to summarize and complement the available information by providing useful hints and tips that are based on the authors' practical experience in installing and supporting IBM Spectrum Protect Plus in customer environments. Over time, our aim is to compile a set of best practices that cover all aspects of the product, from planning and installation to tuning, maintenance, and troubleshooting.
    Note: Online resource; Title from title page (viewed March 31, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    ISBN: 9780738459578
    Language: English
    Pages: 1 online resource (596 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® publication helps you plan, install, configure, and manage Copy Services on the IBM DS8000® operating in an IBM Z® or Open Systems environment. This book helps you design and implement a new Copy Services installation or migrate from an existing installation. It includes hints and tips to maximize the effectiveness of your installation, and information about tools and products to automate Copy Services functions. It is intended for anyone who needs a detailed and practical understanding of the DS8000 Copy Services. This edition is an update for the DS8900 Release 9.1. Note that the Safeguarded Copy feature is covered in IBM DS8000 Safeguarded Copy, REDP-5506.
    Note: Online resource; Title from title page (viewed April 9, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    ISBN: 9780738459325
    Language: English
    Pages: 1 online resource (88 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redpaper publication focuses on data orchestration in enterprise data pipelines. It provides details about data orchestration and how to address typical challenges that customers face when dealing with large and ever-growing amounts of data for data analytics. While the amount of data increases steadily, artificial intelligence (AI) workloads must speed up to deliver insights and business value in a timely manner. This paper provides a solution that addresses these needs: Data Accelerator for AI and Analytics (DAAA). A proof of concept (PoC) is described in detail. This paper focuses on the functions that are provided by the Data Accelerator for AI and Analytics solution, which simplifies the daily work of data scientists and system administrators. This solution helps increase the efficiency of storage systems and data processing to obtain results faster while eliminating unnecessary data copies and associated data management.
    Note: Online resource; Title from title page (viewed January 20, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 56 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Almost 4 Hours of Video Instruction Create a continuous security posture by defining all your AWS security and compliance as code, and run in a continuous delivery workflow with every change using services and tools such as AWS CloudFormation, AWS CodePipeline, and many others. Overview In this course, you will learn how to use AWS services, which provide the ability to create an end-to-end continuous security solution. These services include AWS CloudFormation, AWS CodePipeline, Amazon EventBridge, AWS Lambda, AWS Step Functions, AWS Organizations, AWS Security Hub, Amazon GuardDuty, AWS Config Rules, Amazon Inspector, AWS Secrets Manager, Amazon VPC, Amazon Macie, and AWS Audit Manager--among many others. You will learn how to use a combination of these services to apply key design principles for security and build continuous security solutions within your software systems. Throughout the course, you will see working examples of how to automate security using AWS services. About the Instructor Paul Duvall is a founder and former CTO of Stelligent--a Premier Consulting Partner with the DevOps and Security Competencies. He holds multiple AWS certifications including AWS Certified Security - Specialty. He has architected, implemented, and managed software and systems solutions for over 20 years. He is principal author of Continuous Integration: Improving Software Quality and Reducing Risk (Addison-Wesley, 2007), a 2008 Jolt Award winner. He is also the author of many other publications, including the videos Continuous Compliance on AWS and Continuous Encryption on AWS , and Continuous Security on AWS , which are part of Addison-Wesley's DevSecOps on AWS Series. He hosted the “DevOps on AWS Radio” podcast for over three years. He enjoys blogging and speaking on all topics related to DevSecOps, Serverless, and AWS. You can find his blog posts and other content at paulduvall.io . Skill Level Intermediate to Advanced Learn How To Apply key design principles for security Apply event-based design patterns for security Utilize AWS Developer Tools for DevSecOps Use AWS CodePipeline and AWS CloudFormation to model continuous security workflows Define your AWS Organizations as code using org-formation Automate detective controls using AWS CloudFormation, AWS Security Hub, AWS Config Rules, and Amazon Inspector Protect network and host-level boundaries with Amazon VPC Perform data classification using AWS CloudFormation and Amazon Macie Cre...
    Note: Online resource; Title from title screen (viewed March 19, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    ISBN: 9780738457291
    Language: English
    Pages: 1 online resource (24 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redpaper™ publication introduces a new data virtualization capability that enables IBM z/OS® data to be combined with other enterprise data sources in real-time, which allows applications to access any live enterprise data anytime and use the power and efficiencies of the IBM Z® platform. Modern businesses need actionable and timely insight from current data. They cannot afford the time that is necessary to copy and transform data. They also cannot afford to secure and protect each copy of personally identifiable information and corporate intellectual property. Data virtualization enables direct connections to be established between multiple data sources and the applications that process the data. Transformations can be applied, in line, to enable real-time access to data, which opens up many new ways to gain business insight with less IT infrastructure necessary to achieve those goals. Data virtualization can become the backbone for advanced analytics and modern applications. The IBM Data Virtualization Manager for z/OS (DVM) can be used as a stand-alone product or as a utility that is used by other products. Its goal is to enable access to live mainframe transaction data and make it usable by any application. This 〈〈 this what?〉〉 enables customers to use the strengths of mainframe processing with new agile applications. Additionally, its modern development environment and code-generating capabilities enable any developer to update, access, and combine mainframe data easily by using modern APIs and languages. If data is the foundation for building new insights, IBM DVM is a key tool for providing easy, cost-efficient access to that foundation.
    Note: Online resource; Title from title page (viewed April 13, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523093069
    Language: English
    Pages: 1 online resource (256 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: America has an urgent need for Latino and Latina executives. This book identifies a path to uplift and amplify their representation in leadership. Latinos and Latinas will account for a third of our workforce by 2050—yet they make up only 5 percent of senior roles in corporate America. Dr. Robert Rodriguez and Andrés T. Tapia call this low percentage of Latino and Latina corporate executives today the “5 percent Shame.” Inspired by Price M. Cobbs's seminal work on the secrets of successful Black leaders, this book seeks to understand the impact on Latinos and Latinas of the external forces of conscious and unconscious biases and of the internal forces of whether to assimilate or double down on their cultural identities in their quest to get ahead. The second edition features a new foreword by Henry Cisneros, former secretary of the Department of Housing and Urban Development, as well as updated statistics and graphs to represent how America's career landscape for Latinos has and has not changed and how to ensure Latinos can rise to their fullest potential. Using insights from in-depth interviews with twenty highly successful boomer Latino and Latina executives and focus groups with dozens of Gen X and millennial leaders, the authors have captured lessons about how these individuals chose their career paths, addressed challenges, and seized opportunities. The discussions are interpreted through the lenses of the authors' different personal experiences as Latino leaders in corporate America and synthesized as a guide for future leaders.
    Note: Online resource; Title from title page (viewed July 6, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738459790
    Language: English
    Pages: 1 online resource (16 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The focus of this Blueprint is to demonstrate how IBM FlashSystem® with IBM Spectrum® Virtualize can be used as a preferred back-end persistent storage for VMware Tanzu-based deployments. This document describes the use of IBM® FlashSystem storage volumes as virtual volumes (vVols) that are made available to provision persistent volumes for a VMware Tanzu deployment. All models of IBM FlashSystem family are supported by this document, including: FlashSystem 9100 and 9200 FlashSystem 7200 FlashSystem 5000 IBM SAN Volume Controller All storage that is running IBM Spectrum Virtualize software By using IBM Spectrum Connect VASA provider with IBM Spectrum Virtualize, the vVols are used to create a data store under vCenter. Post provisioning of VMware Tanzu Kubernetes grid service (TKGS), the vVols data store is used to provision the persistent volumes for future applications that are deployed on the worker nodes.
    Note: Online resource; Title from title page (viewed June 16, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 6 hr., 28 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. Jon Krohn is Chief Data Scientist at the machine learning company untapt. He presents a popular series of deep learning tutorials published by Addison-Wesley and is the author of the bestselling book Deep Learning Illustrated . Jon teaches his deep learning curriculum in-classroom at the New York City Data Science Academy, as well as guest lecturing at Columbia University and New York University. He holds a doctorate in neuroscience from Oxford University and has been publishing on machine learning in leading journals since 2010.
    Note: Online resource; Title from title screen (viewed June 14, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 8 hr., 13 min.)
    Edition: 2nd edition
    Keywords: Electronic videos ; local
    Abstract: 8 Hours of Video Instruction Overview Bash is the best way for you to efficiently and effectively execute commands in your daily work. It sounds difficult, but the beauty of Bash is that it is quick, powerful and not particularly complex. Bash Shell Scripting Complete Video Course is a full resource to obtaining the power of Bash. So whether you're new to shell scripting or an experienced developer, administrator, or user, this course will introduce you to the world of efficient scripting so you can get the job done. This 8-hour video course consists of 13 lessons in which all concepts that are relevant to Bash shell scripting are explained. It includes demos and exercises throughout that are relevant to Bash Shell scripting; these examples are relevant for anyone using Bash. This video course was designed to teach through clear training followed by practical examples that show how scripting solutions are being used in the real world. At the end of each lesson you will find an exercise that you should attempt on your own; this is then followed by a video explanation so you can see a real-time walkthrough of the exercise. Doing the work is the best way to learn Bash, and this course provides you with the tools to learn by doing. Topics include Shell scripting fundamentals Using conditional statements Advanced Bash scripting options Real-world scripting examples The GitHub associated with this LiveLesson can be found at https://github.com/sandervanvugt/bash-scripting . About the Instructor Sander van Vugt has many years of experience working with, writing about, and teaching Linux and open-source topics. He is the author of the best-selling Red Hat RHCSA Cert Guide and Red Hat RHCSA Complete Video Course , along with many other titles on topics that include RHCE, Bash, Kubernetes, Ansible, and more. Sander also works as a Linux instructor, teaching on-site and online classes for customers around the world. Skill Level Beginner to Intermediate Learn How To Write Bash script fundamentals Write Bash script fundamentals and advanced commands Write Bash shell scripts on intermediate and advanced commands Write your first hello world shell script See how to work with variables Use positional parameters Apply pattern matching substitution Explore looping structures in shell scripts Who Should Take This Course Developers and administrators who want to automate tasks using Bash shell scripts IT users and professionals who want to g...
    Note: Online resource; Title from title screen (viewed September 1, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    ISBN: 9781523093380
    Language: English
    Pages: 1 online resource (192 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This hilarious and profound workplace guide proves the rigorously rational and the supremely sympathetic can meet in the middle and merge their strengths. Readers will discover how blending with their opposite opens the pathway to being their truest selves. The famed Myers-Briggs personality scale says that Feelers (who lead with their hearts) put more weight on personal concerns and the people involved, and Thinkers (who lead with their heads) are guided by objective principles and impartial facts. This book calls them Cacti and Snowflakes—each singularly transcendent. But can people with such fundamentally different ways of making sense of and engaging with the world work together? Yes, says Devora Zack! The key is not to try to change each other. Zack says we can directly control only three things: what we say, what we think, and what we do. The best use of our energy is to focus on our own reactions and perceptions rather than try to “fix” other people. This book includes an assessment so readers can learn where they are on the Thinker/Feeler spectrum—and because it's a spectrum, readers might well be a snowcactus or a cactusflake. Then Zack helps them figure out where other people might be, guiding them through a myriad of modes of communication and motivation based on personality type. She includes real-life scenarios that show how to nurture one's nature while successfully connecting with those on the other side. As always, Zack fearlessly and entertainingly dispels myths, squashes stereotypes, and transforms perceived liabilities into strengths. And she once again affirms that, like chocolate and peanut butter, we are better together.
    Note: Online resource; Title from title page (viewed November 2, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    ISBN: 9780738460024
    Language: English
    Pages: 1 online resource (20 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This IBM® Redpaper chapterexplains how to take a backup of your data by using either of two methods, and it explains how to recover your data if there is a disaster. This paper addresses topics for IT architects, IT specialists, developers, sellers, and anyone looking to implement and manage backups in the cloud. Moreover, this publication provides documentation to transfer the how-to-skills to the technical teams and solution guidance to the sales team. This book complements the documentation that is available at IBM Documentation and aligns with the educational materials that are provided by IBM Garage™ for Systems Technical Education.
    Note: Online resource; Title from title page (viewed September 14, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738460185
    Language: English
    Pages: 1 online resource (16 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: In the midst of global disruptions, every element of IBM® Supply Chain has been affected. the IBM cognitive supply chain is positioned to win the future by using the exponential technologies that are inherent to our supply chains, and with flexibility, resiliency, and end-to-end visibility. The constant commitment of IBM to building smarter supply chains over the past decade has primed IBM to quickly and effectively navigate these disruptions and course-correct by using cognitive innovation. As a result, IBM Supply Chain teams were able to deliver exceptional outcomes without client disruption. In addition, this widespread impact inspired numerous new solutions that include exponential technologies that better prepare IBM for future disruptions in constantly changing markets.
    Note: Online resource; Title from title page (viewed November 30, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 10 hr., 48 min.)
    Edition: 1st edition
    Keywords: Electronic videos
    Abstract: Cloud Native Java with Kubernetes, 2nd Edition Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.
    Note: Online resource; Title from title screen (viewed December 3, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 6 hr., 14 min.)
    Edition: 1st edition
    Keywords: Electronic videos
    Abstract: 6+ Hours of Video Instruction Learn the most efficient way to manage and run Microservices in Kubernetes and Istio. Overview Microservices are the new development model for running complex applications. Building and Managing Microservices with Kubernetes and Istio LiveLessons will cover the topics you will need to run successful Microservices in Kubernetes and Istio. Building and Managing Microservices with Kubernetes and Istio LiveLessons starts with an overview of Microservices and why it is the right choice to run complex applications. The course will then discuss how to automatically implement Microservices using Kubernetes, a procedure that starts with source files in Git, before exploring topics of container images and how to build them efficiently. Lastly, it will also cover how to apply decoupling in Kubernetes for full implementation of automated and orchestrated Microservice environment. Instructor Sander van Vugt uses hands-on-labs to give you a deeper understanding of the topics covered in the course. About the Instructor Sander van Vugt has many years of experience working with, writing about, and teaching Linux and Open Source topics. He is the author of the best-selling Red Hat RHCSA Cert Guide and the Red Hat RHCSA Complete Video Course along with many other titles on topics that include RHCE, Bash, Kubernetes, Ansible and more. Sander also works as a Linux instructor, teaching on-site and on-line classes for customers around the world. Topics include: Understanding Microservices Using Git Containers QuickStart Understanding Container Orchestration and Service Mesh Getting Started with Kubernetes Creating Container-based Microservices in Kubernetes Getting Started with Istio Service Mesh Managing Microservices with Istio Service Mesh Skill Level Beginner to Intermediate Learn How To Manage source code for microservices Build custom container images Use Kubernetes technology to manage Microservices Use Service Mesh Who Should Take This Course This course is for anyone who wants to learn how to move from traditional applications that are installed on a server platform to orchestrated containers in a Microservices environment. The course is for developers and DevOps engineers who want to know what happens after the code is written, as well as administrators responsible for implementing the Microservices infrastructure. Course Requirements A computer with a recent operating system and at least 4GB RAM and 20GB...
    Note: Online resource; Title from title screen (viewed December 3, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 35 min.)
    Edition: 1st edition
    Keywords: Electronic videos
    Abstract: 3+ Hours of Video Instruction 3+ hours of introductory training on understanding secure operations and protections concepts. Overview: Understanding how to keep data operations secure and protect data is a critical part of any organizations day-to-day business. With more than 3 hours of video training, Secure Operations and Protections LiveLessons dives into the methodologies behind how organizations and secure operation centers observe, collect, and secure data. This course provides the learner with an understanding of basic operations and architectures that a Security Operations Center would encounter by examining standard software development life cycles and change control processes. Secure Operations and Protections LiveLessons is taught by expert trainer, author and cybersecurity expert Aamir Lakhani. Using hands-on demos, in-depth discussions and lightboard work to teach cyber security fundamentals, this video course teaches you cybersecurity best practices in a way that is easy to access and implement in real world situations. Topics include: Security Solutions for Infrastructure Management Software Assurance Best Practices Change Control Communications Process Response Coordination Process Data Criticality Process Skill Level: Beginner Learn How To: Protect data and secure an organizations operations in their day-to-day business Observe, collect, and secure date Detect common security encounters and be prepared for them Implement processes that allow communication of information in a correct and timely manner Who Should Take This Course: Cybersecurity Professionals Anyone interested in learning cyber security fundamental Course Requirements: There is no required prerequisite About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video. Video Lessons are available for download for offline viewing within the streaming format. Look for the green arrow in each lesson.
    Note: Online resource; Title from title screen (viewed December 15, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 60 min.)
    Edition: 1st edition
    Keywords: Electronic videos
    Abstract: 2 Hours of Video Instruction 2 hours of introductory training covering key malware and incident response concepts Overview: Threats, viruses, and attacks are unavoidable and as a cybersecurity professional you will need to understand how to analyze these threats. With 2 hours of video training, Malware and Incident Response LiveLessons provides learners with an understanding of basic malware analysis and how to respond to incidents when they happen. Leaners will also explore the basics of how malware works and how to set up a safe environment to analyze malware in a lab. This course is meant to be an introduction to simple tools and techniques for those new to cyber security. Malware and Incident Response LiveLessons is taught by expert trainer, author and cybersecurity expert Aamir Lakhani. Using hands-on demos, in-depth discussions and lightboard work to teach cyber security fundamentals, this video course teaches you cybersecurity best practices in a way that is easy to access and implement in real world situations. Topics include: Threat Landscape Malware Labs Dynamic Analysis Malware Packet Analysis PE File Identification File Persistence String Analysis Skill Level: Beginner Learn How To: Set up a safe environment to analyze malware in a lab Use simple tools and techniques for malware analysis Respond to threats, viruses, and attacks Who Should Take This Course: Cybersecurity Professionals Anyone interested in learning cyber security fundamentals Course Requirements: There is no required prerequisite. About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video. Video Lessons are available for download for offline viewing within the streaming format. Look for the green arrow in each lesson.
    Note: Online resource; Title from title screen (viewed December 15, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 4 hr., 14 min.)
    Edition: 1st edition
    Keywords: Electronic videos
    Abstract: 4+ Hours of Video Overview 1. Humane Code: Why are most code bases bad? Why is it that, despite our best intentions, code rots between our fingers? The answer is that most of us still think of code as merely a technical tool to reach a goal: to implement a feature, or fix a bug. While code certainly can do those things, it’s also a written medium for communicating with other people: your colleagues, and your future self. We spend more time reading code than we do writing it, so we should optimise code for readability, instead of focusing on how fast we can produce it. Learn how to think productively about software development, so that you can maintain a sustainable pace, even with a growing code base. This video is about humane code, and how programming is first and foremost an activity that ought to focus on communication. 2. Composite as Universal Abstraction: How do you make code readable? How do you make code fit in your head? How do you create good abstractions? How do you amplify the essentials while eliminating the irrelevant? One useful tool is to employ the Composite design pattern, but when can you apply it? When are objects composable? There’s a simple answer to that question. In this episode, you’ll learn to tell at a glance whether an interface is composable or not. This will also set you on the path of being able to deliberately design APIs in such a way that they’re composable—that is, so that they are intuitively understandable abstractions. Composite is a universal abstraction. It’s not tied to a particular programming language or specific development paradigm. Under a different name, it exists independently of software development. This makes it a powerful abstraction. 3. Much Ado About Nothing: How do you create abstractions that fit in your brain? How do you define abstractions that truly amplify the essentials and eliminate the irrelevant? A Composite makes many objects look like one object, so that’s one way to hide details. As the previous episode revealed, a Composite can be turned into a precise abstraction by realizing that it’s just a monoid. What’s a monoid, then? In this video, you’ll get all the details with easy-to-understand examples in C#. Not only will you learn just how a Composite is a monoid, but you’ll also come to the realization that the Null Object design pattern is a monoid as well; it’s simply a special case of the Composite pattern. This episode gives you the tools to identify monoids in your own cod...
    Note: Online resource; Title from title screen (viewed December 6, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    ISBN: 9780738460222
    Language: English
    Pages: 1 online resource (252 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
    Note: Online resource; Title from title page (viewed December 10, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9781000359725
    Language: English
    Pages: 1 online resource (298 pages)
    Edition: 2nd edition
    Keywords: Electronic books
    Abstract: This second edition of C# Game Programming Cookbook for Unity 3D expounds upon the first with more details and techniques. With a fresh array of chapters, updated C# code and examples, Jeff W. Murray’s book will help the reader understand structured game development in Unity unlike ever before. New to this edition is a step-by-step tutorial for building a 2D infinite runner game from the framework and scripts included in the book. The book contains a flexible and reusable framework in C# suitable for all game types. From game state handling to audio mixers to asynchronous scene loading, the focus of this book is building a reusable structure to take care of many of the most used systems. Improve your game's sound in a dedicated audio chapter covering topics such as audio mixers, fading, and audio ducking effects, or dissect a fully featured racing game with car physics, lap counting, artificial intelligence steering behaviors, and game management. Use this book to guide your way through all the required code and framework to build a multi-level arena blaster game. Features Focuses on programming, structure, and an industry-level, C#-based framework Extensive breakdowns of all the important classes Example projects illustrate and break down common and important Unity C# programming concepts, such as coroutines, singletons, static variables, inheritance, and scriptable objects. Three fully playable example games with source code: a 2D infinite runner, an arena blaster, and an isometric racing game The script library includes a base Game Manager, timed and proximity spawning, save profile manager, weapons control, artificial intelligence controllers (path following, target chasing and line-of-sight patrolling behaviors), user interface Canvas management and fading, car physics controllers, and more. Code and screenshots have been updated with the latest versions of Unity. These updates will help illustrate how to create 2D games and 3D games based on the most up-to-date methods and techniques. Experienced C# programmers will discover ways to structure Unity projects for reusability and scalability. The concepts offered within the book are instrumental to mastering C# and Unity. In his game career spanning more than 20 years, Jeff W. Murray has worked with some of the world's largest brands as a Game Designer, Programmer, and Director. A Unity user for over 14 years, he now works as a consultant and freelancer between developing his own VR ga...
    Note: Online resource; Title from title page (viewed March 24, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...