Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Birmingham, UK : Packt Publishing
  • [Erscheinungsort nicht ermittelbar] : IBM Redbooks
  • [Place of publication not identified] : Apress
Datasource
Material
Language
Years
Subjects(RVK)
  • 1
    Online Resource
    Online Resource
    Birmingham, UK : Packt Publishing
    ISBN: 9781835087695
    Language: English
    Pages: 1 online resource (374 pages) , illustrations
    Edition: Second edition.
    DDC: 518.0285/536
    Keywords: MATLAB ; Machine learning ; Computer programming
    Abstract: Master MATLAB tools for creating machine learning applications through effective code writing, guided by practical examples showcasing the versatility of machine learning in real-world applications Key Features Work with the MATLAB Machine Learning Toolbox to implement a variety of machine learning algorithms Evaluate, deploy, and operationalize your custom models, incorporating bias detection and pipeline monitoring Uncover effective approaches to deep learning for computer vision, time series analysis, and forecasting Purchase of the print or Kindle book includes a free PDF eBook Book Description Discover why the MATLAB programming environment is highly favored by researchers and math experts for machine learning with this guide which is designed to enhance your proficiency in both machine learning and deep learning using MATLAB, paving the way for advanced applications. By navigating the versatile machine learning tools in the MATLAB environment, you'll learn how to seamlessly interact with the workspace. You'll then move on to data cleansing, data mining, and analyzing various types of data in machine learning, and visualize data values on a graph. As you progress, you'll explore various classification and regression techniques, skillfully applying them with MATLAB functions. This book teaches you the essentials of neural networks, guiding you through data fitting, pattern recognition, and cluster analysis. You'll also explore feature selection and extraction techniques for performance improvement through dimensionality reduction. Finally, you'll leverage MATLAB tools for deep learning and managing convolutional neural networks. By the end of the book, you'll be able to put it all together by applying major machine learning algorithms in real-world scenarios. What you will learn Discover different ways to transform data into valuable insights Explore the different types of regression techniques Grasp the basics of classification through Naive Bayes and decision trees Use clustering to group data based on similarity measures Perform data fitting, pattern recognition, and cluster analysis Implement feature selection and extraction for dimensionality reduction Harness MATLAB tools for deep learning exploration Who this book is for This book is for ML engineers, data scientists, DL engineers, and CV/NLP engineers who want to use MATLAB for machine learning and deep learning. A fundamental understanding of programming concepts is necessary to get started.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9781835087732
    Language: English
    Pages: 1 online resource (396 pages) , illustrations
    Edition: Third edition.
    DDC: 005.1
    Keywords: Jenkins (Software development tool) ; Computer software Reliability ; Computer software Reusability ; Computers, Pipeline ; Logiciels ; Fiabilité ; Logiciels ; Réutilisation ; Ordinateurs pipelines
    Abstract: Integrate Jenkins, Kubernetes, and more on cloud into a robust, GitOps-driven CI/CD system, leveraging JCasC, IaC, and AI for a streamlined software delivery process Key Features Follow the construction of a Jenkins CI/CD pipeline start to finish through a real-world example Construct a continuous deployment (CD) pipeline in Jenkins using GitOps principles and integration with Argo CD Craft and optimize your CI pipeline code with ChatGPT and GitHub Copilot Purchase of the print or Kindle book includes a free PDF eBook Book Description This updated edition of Learning Continuous Integration with Jenkins is your one-stop guide to implementing CI/CD with Jenkins, addressing crucial technologies such as cloud computing, containerization, Infrastructure as Code, and GitOps. Tailored to both beginners and seasoned developers, the book provides a practical path to mastering a production-grade, secure, resilient, and cost-effective CI/CD setup. Starting with a detailed introduction to the fundamental principles of CI, this book systematically takes you through setting up a CI environment using Jenkins and other pivotal DevOps tools within the CI/CD ecosystem. You'll learn to write pipeline code with AI assistance and craft your own CI pipeline. With the help of hands-on tutorials, you'll gain a profound understanding of the CI process and Jenkins' robust capabilities. Additionally, the book teaches you how to expand your CI pipeline with automated testing and deployment, setting the stage for continuous deployment. To help you through the complete software delivery process, this book also covers methods to ensure that your CI/CD setup is maintainable across teams, secure, and performs optimally. By the end of the book, you'll have become an expert in implementing and optimizing CI/CD setups across diverse teams. What you will learn Understand CI with the Golden Circle theory Deploy Jenkins on the cloud using Helm charts and Jenkins Configuration as Code (JCasC) Implement optimal security practices to ensure Jenkins operates securely Extend Jenkins for CI by integrating with SonarQube, GitHub, and Artifactory Scale Jenkins using containers and the cloud for optimal performance Master Jenkins declarative syntax to enrich your pipeline coding vocabulary Enhance security and improve pipeline code within your CI/CD process using best practices Who this book is for This book is for a diverse audience, from university students studying Agile software development to seasoned developers, testers, release engineers, and project managers. If you're already using Jenkins for CI, this book will assist you in elevating your projects to CD. Whether you're new to the concepts of Agile, CI, and CD, or a DevOps engineer seeking advanced insights into JCasC, IaC, and Azure, this book will equip you with the tools to harness Jenkins for improved productivity and streamlined deliveries in the cloud.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9781837635290 , 1837635293 , 9781837637836
    Language: English
    Pages: 1 online resource (418 pages) , illustrations
    Parallel Title: Erscheint auch als
    DDC: 004.6023
    Keywords: Computer network architectures ; Réseaux d'ordinateurs ; Architectures
    Abstract: Follow a step-by-step roadmap to developing essential competencies in network architecture design, relationship management, systems, and services, coupled with certification guidance and expert tips Key Features Grasp the big picture of information technology infrastructure to become a successful network architect Overcome challenges in network performance and configuration management Enhance your skills for career advancement using real-life examples and tips Purchase of the print or Kindle book includes a free PDF eBook Book Description Becoming a network architect is challenging--it demands hands-on engineering skills, encompassing hardware installation, configuration, and fabric layout design. Equally crucial, it involves collaboration with internal teams and C-Suite stakeholders, and adeptly managing external entities like vendors and service providers. The Network Architect's Handbook comprehensively covers these vital aspects, guiding you to evolve into an effective network architect within an organization, fostering seamless communication with leadership teams and other stakeholders. Starting with a clear definition of a network architect's role, this book lays out a roadmap and delves into the attributes and mindset for success. You'll then explore network architect design, physical infrastructure routing and switching, and network services such as DNS, MLAG, and service insertion. As you progress, you'll gain insights into the necessary skills and typical daily challenges faced by network architects. And to thoroughly prepare you to advance in your career, this handbook covers certifications and associated training for maintaining relevance in an organization, along with common interview questions for a network architect's position. Armed with essential concepts, techniques, and your newfound skills, you'll be well-prepared to pursue a career as a network architect. What you will learn Examine the role of a network architect Understand the key design makers in an organization Choose the best strategies to meet stakeholder needs Be well-versed with networking concepts Prepare for a network architect position interview Distinguish the different IT architects in an organization Identify relevant certification for network architects Understand the various de facto network/fabric architect models used today Who this book is for This book is for network engineers and technicians aspiring to transition into the role of a network architect. Whether you are at the beginning of your journey or seeking guidance along the path, this book will support you with its deep coverage of key aspects such as design concepts, architectural requirements, relevant experience, certifications, and advanced education with a special emphasis on cloud best practices. A practical understanding of IT networking is necessary to get the most out of this book.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9781805124061
    Language: English
    Pages: 1 online resource (214 pages) , illustrations
    Edition: [First edition].
    DDC: 005.75/8
    Keywords: Edge computing
    Abstract: Master edge computing architectures, unlock industry-specific patterns, apply proven best practices, and progress from basics to end-to-end solutions Key Features Unlock scalable edge solutions by mastering proven archetypes for real-world success Learn industry-specific patterns, tailoring solutions for diverse sector needs Make strategic decisions between cloud-out and edge-in strategies with confidence Purchase of the print or Kindle book includes a free PDF eBook Book Description Enriched with insights from a hyperscaler's perspective, Edge Computing Patterns for Solution Architects will prepare you for seamless collaboration with communication service providers (CSPs) and device manufacturers and help you in making the pivotal choice between cloud-out and edge-in approaches. This book presents industry-specific use cases that shape tailored edge solutions, addressing non-functional requirements to unlock the potential of standard edge components. As you progress, you'll navigate the archetypes of edge solution architecture from the basics to network edge and end-to-end configurations. You'll also discover the weight of data and the power of automation for scale and immerse yourself in the edge mantra of low latency and high bandwidth, absorbing invaluable do's and don'ts from real-world experiences. Recommended practices, honed through practical insights, have also been added to guide you in mastering the dynamic realm of edge computing. By the end of this book, you'll have built a comprehensive understanding of edge concepts and terminology and be ready to traverse the evolving edge computing landscape. What you will learn Distinguish edge concepts, recognizing that definitions vary among different audiences Explore industry-specific architecture patterns that shape custom solutions Analyze three proven edge computing archetypes for real-world scalability Apply best practices judiciously, adapting patterns to meet specific requirements Evaluate data for storage or discarding based on compliance and industry norms Advance from the foundational basics to complex end-to-end edge configurations Gain practical insights for achieving low-latency, high-bandwidth edge solutions Who this book is for Ideal for VPs of IT infrastructure, enterprise architects, solution architects, and SRE professionals with a background in cloud computing, this book is for individuals involved in crafting edge reference architectures and tailored solutions across diverse industries. It provides valuable insights and practical patterns drawn from real-world implementations in sectors such as retail, telecommunications, and manufacturing. Foundational knowledge of cloud computing is assumed to align with the advanced nature of the content covered.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9781837636303
    Language: English
    Pages: 1 online resource (326 pages) , illustrations
    Edition: Third edition.
    DDC: 005.75/65
    Keywords: Data mining ; Quantitative research
    Abstract: Transform your data into insights with must-know techniques and mathematical concepts to unravel the secrets hidden within your data Key Features Learn practical data science combined with data theory to gain maximum insights from data Discover methods for deploying actionable machine learning pipelines while mitigating biases in data and models Explore actionable case studies to put your new skills to use immediately Purchase of the print or Kindle book includes a free PDF eBook Book Description Principles of Data Science bridges mathematics, programming, and business analysis, empowering you to confidently pose and address complex data questions and construct effective machine learning pipelines. This book will equip you with the tools to transform abstract concepts and raw statistics into actionable insights. Starting with cleaning and preparation, you'll explore effective data mining strategies and techniques before moving on to building a holistic picture of how every piece of the data science puzzle fits together. Throughout the book, you'll discover statistical models with which you can control and navigate even the densest or the sparsest of datasets and learn how to create powerful visualizations that communicate the stories hidden in your data. With a focus on application, this edition covers advanced transfer learning and pre-trained models for NLP and vision tasks. You'll get to grips with advanced techniques for mitigating algorithmic bias in data as well as models and addressing model and data drift. Finally, you'll explore medium-level data governance, including data provenance, privacy, and deletion request handling. By the end of this data science book, you'll have learned the fundamentals of computational mathematics and statistics, all while navigating the intricacies of modern ML and large pre-trained models like GPT and BERT. What you will learn Master the fundamentals steps of data science through practical examples Bridge the gap between math and programming using advanced statistics and ML Harness probability, calculus, and models for effective data control Explore transformative modern ML with large language models Evaluate ML success with impactful metrics and MLOps Create compelling visuals that convey actionable insights Quantify and mitigate biases in data and ML models Who this book is for If you are an aspiring novice data scientist eager to expand your knowledge, this book is for you. Whether you have basic math skills and want to apply them in the field of data science, or you excel in programming but lack the necessary mathematical foundations, you'll find this book useful. Familiarity with Python programming will further enhance your learning experience.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9781803245478 , 1803245476
    Language: English
    Pages: 1 online resource (318 pages) , illustrations
    DDC: 006.6/9
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Affichage tridimensionnel ; three-dimensional
    Abstract: Master the art of modeling, shading, and rendering low poly 3D creations to transform into the 3D artist you've aspired to become Key Features Create minimalistic low poly 3D models based on reference images Breathe life into your creations by adding vibrant colors and appealing textures using materials Arrange your low poly models in a 3D environment, set up lighting to achieve the desired ambiance, and render the final scene Purchase of the print or Kindle book includes a free PDF eBook Book Description Step into the world of low poly 3D art with Low Poly 3D Modeling in Blender--your entry point into Blender and mastering the fundamentals of 3D art. This beginner-friendly guide ensures that you're fully prepared for the creative adventure that follows. Through a step-by-step learning process starting with the principles of low poly art, this book gradually immerses you in the intricacies of modeling. As you progress, you'll gain hands-on experience creating diverse projects ranging from designing a simple 3D crate to rendering complete low poly scenes. The book covers a wide spectrum of topics as you navigate Blender's interface, mastering essential modeling tools and exploring both basic and advanced modeling techniques. Advancing to the final chapters, you'll find ways to breathe life into your models with material creation and gain practical insights into modeling a variety of low poly objects. From end-to-end scene construction to configuring Blender for rendering high-quality images, you'll be equipped with the foundational skills to propel your career in 3D modeling and explore the boundless creative possibilities that Blender offers. By the end of this book, you'll have a solid understanding of Blender, 3D modeling, low poly methodologies, material design, 3D rendering techniques, and the broader world of 3D art. What you will learn Understand how Blender's interface works and how to configure it Gain proficiency in navigating 3D space in Blender Familiarize yourself with Blender's core modeling tools Get to grips with the workflow and techniques to create low poly 3D models Texture your low poly models using the UV and Shader editors Configure Blender's Asset Browser for instant access to your models Set up a complete scene, adjust the lighting, and create a high-quality, portfolio-ready render Who this book is for If you're new to 3D modeling, low poly modeling is a great starting point. This book is an invaluable guide for 3D artists, modelers, and beginners to begin without prior knowledge of Blender or 3D modelling experience, although a basic familiarity with these topics will be beneficial.
    Note: Includes index. - Online resource; title from title details screen (O'Reilly, viewed February 14, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Birmingham, UK : Packt Publishing
    ISBN: 9781805127123
    Language: English
    Pages: 1 online resource (592 pages)
    Edition: Third edition.
    DDC: 005.3
    Keywords: AngularJS (Software framework) ; Application software Development ; Web applications ; JavaScript (Computer program language)
    Abstract: Harness the full power of Angular 17 with up-to-date tools and enterprise-level best practices Purchase of the print or Kindle book includes a free PDF eBook Key Features Dive straight into the most relevant topics that will help you build large, complex, and high-performance web applications Find updated examples, projects, and an overview of the latest tools and updates - including Jest, Cypress, NgRx workspace, Apollo GraphQL, and Angular Dev Tools Get to grips with reactive code and learn how to resolve potential issues before they crop up Book Description If you're looking to upskill and build sophisticated, minimalist web applications suited for enterprise use, Angular for Enterprise Applications is your guide to the next level of engineering mastery. In its third edition, this Angular book distils hard-earned lessons into a lucid roadmap for success. Adopting a pragmatic approach founded on a robust technical base, you'll utilize both JavaScript and TypeScript fundamentals. You'll also embrace agile engineering coding principles and learn to architect optimally sized enterprise solutions employing the freshest concepts in Angular. You'll gradually build upon this foundation through insightful recipes, sample apps, and crystal-clear explanations. You'll master authentication and authorization and achieve optimal performance through reactive programming and lazy loading, build complex yet flexible UIs with Router-first principles, and then integrate with backend systems using REST and GraphQL APIs. You'll cover modern tools like RxAngular, Qwik, and Signals. You'll construct master/detail views using data tables and NgRx for state management. You'll explore DevOps using Docker and build CI/CD pipelines necessary for high-performance teams. By the end of this book, you'll be proficient in leveraging Angular in enterprise and design robust systems that scale effortlessly. What you will learn Best practices for architecting and leading enterprise projects Minimalist, value-first approach to delivering web apps How standalone components, services, providers, modules, lazy loading, and directives work in Angular Manage your app's data reactivity using Signals or RxJS State management for your Angular apps with NgRx Angular ecosystem to build and deliver enterprise applications Automated testing and CI/CD to deliver high quality apps Authentication and authorization Building role-based access control with REST and GraphQL Who this book is for This book is for mid-to-senior developers looking to gain mastery by learning how to write, test, and deploy Angular in an enterprise environment. Working experience with JavaScript is a prerequisite, and a familiarity with TypeScript and RESTful APIs will help you understand the topics covered in this book more effectively.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Birmingham, UK : Packt Publishing
    ISBN: 9781835469385
    Language: English
    Pages: 1 online resource (544 pages) , illustrations
    Edition: Sixth edition.
    DDC: 006.6/86
    Keywords: Adobe Photoshop elements ; Photography Digital techniques ; Image processing Digital techniques
    Abstract: "Take complete control of all your image-editing ambitions using this beautifully illustrated, easy-to-understand, jargon-free guide on Photoshop Elements 2024 packed with best practices and expert insights. Key Features Comprehensive coverage of Adobe Photoshop Elements 2024, including new AI-powered tools and advanced features Practical guidance on photo organization, editing, and sharing, with an emphasis on creative and professional techniques Rich, illustrative content with updated examples, tutorials, and mini creative projects Book Description Dive into the world of digital photo editing with this latest edition, crafted by Robin Nichols, a seasoned photographer and digital imaging expert, which brings the latest Photoshop Elements 2024 to your fingertips. With a unique blend of in-depth tutorials and practical applications, this book is an essential resource for photographers at all levels. It introduces new features like Dark Mode, Match Color, and Photo Reels, along with advanced techniques like layering and artistic effects. The book also addresses common user feedback from previous editions, ensuring a refined and user-friendly experience. Elements 2024 extends its AI capabilities by simplifying complex editing processes. Learn to stitch widescreen panoramas, remove people from backgrounds, de-focus backgrounds, re-compose images, and even create a range of calendars and greeting cards for your friends and family. Take your prowess to the next level by learning how to correct optical distortion, re-shape images, exploit layers, layer masking, and sharpening techniques--create the perfect picture or imaginative fantasy illustration. You'll also learn the online realms of animation, video creation, and third-party plug-ins. By the end of this book, you'll learn how to leverage the incredible features of Photoshop Elements 2024 with complete confidence. What you will learn Master new features in Photoshop Elements 2024, including AI-powered tools and one-click fixes on mobile Create captivating photo collages, digital paintings, and graphic designs Efficiently organize your photo collections for easy access and management Enhance your social media presence with professionally edited photos and artworks Employ advanced layer techniques for more powerful and immersive illustrations Gain comprehensive knowledge to become a proficient Photoshop Elements user Who this book is for ""Mastering Adobe Photoshop Elements - 6th Edition"" is perfect for photographers of all skill levels - from hobbyists to professionals. Whether you are new to photo editing or looking to upgrade your skills with the latest Photoshop Elements features, this book offers valuable insights and guidance.".
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9781837636099 , 1837636095 , 9781837630141
    Language: English
    Pages: 1 online resource (434 pages) , illustrations
    Parallel Title: Erscheint auch als
    DDC: 332.0285/58
    Keywords: Finance Data processing ; Finance Computer programs ; Security measures ; Computer security ; Finances ; Informatique ; Sécurité informatique
    Abstract: Level up your career by learning best practices for managing the data quality and integrity of your financial data Key Features Accelerate data integrity management using artificial intelligence-powered solutions Learn how business intelligence tools, ledger databases, and database locks solve data integrity issues Find out how to detect fraudulent transactions affecting financial report integrity Book Description Data integrity management plays a critical role in the success and effectiveness of organizations trying to use financial and operational data to make business decisions. Unfortunately, there is a big gap between the analysis and management of finance data along with the proper implementation of complex data systems across various organizations. The first part of this book covers the important concepts for data quality and data integrity relevant to finance, data, and tech professionals. The second part then focuses on having you use several data tools and platforms to manage and resolve data integrity issues on financial data. The last part of this the book covers intermediate and advanced solutions, including managed cloud-based ledger databases, database locks, and artificial intelligence, to manage the integrity of financial data in systems and databases. After finishing this hands-on book, you will be able to solve various data integrity issues experienced by organizations globally. What you will learn Develop a customized financial data quality scorecard Utilize business intelligence tools to detect, manage, and resolve data integrity issues Find out how to use managed cloud-based ledger databases for financial data integrity Apply database locking techniques to prevent transaction integrity issues involving finance data Discover the methods to detect fraudulent transactions affecting financial report integrity Use artificial intelligence-powered solutions to resolve various data integrity issues and challenges Who this book is for This book is for financial analysts, technical leaders, and data professionals interested in learning practical strategies for managing data integrity and data quality using relevant frameworks and tools. A basic understanding of finance concepts, accounting, and data analysis is expected. Knowledge of finance management is not a prerequisite, but it'll help you grasp the more advanced topics covered in this book.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9781804617281
    Language: English
    Pages: 1 online resource (332 pages) , illustrations
    Edition: [First edition].
    DDC: 006.7/86
    Keywords: Adobe After effects ; Image processing Digital techniques ; Cinematography Special effects ; Data processing
    Abstract: Discover the top tricks and techniques to make the most of Adobe After Effects and elevate your graphics design skills by creating real-world projects with this comprehensive illustrated guide Key Features Master After Effects through hands-on engagement with small projects, following the best practices Leverage the settings and uncover hidden options in After Effects to optimize your workflow Acquire skills and techniques that will set you apart from other graphic designers Purchase of the print or Kindle book includes a free PDF eBook Book Description Visual effects and motion graphics are everywhere, shaping the film, TV, games, websites, and application landscape. Navigating a field this complex and ever-expanding demands more than mere familiarity with tools; you need to stand out to get ahead. Creative Motion Mastery with Adobe After Effects is the definitive guide that not only equips you with the essential skills to distinguish yourself, but also takes you through real projects that you can add to your portfolio. Guided by a hands-on learning approach, you'll master the UI, workflow, and diverse projects such as text animation, shape layers, and rotoscoping. With this newfound knowledge, you'll take your graphic design and post-production skills to the next level using chroma keying, particle simulations, and 2D and 3D tracking. You'll progress faster than someone taking a formal course in Adobe After Effects! And it's not all about creating; you'll import graphics from Illustrator and Photoshop and apply post-production effects to give them a new life. Finally, you'll discover how seamlessly you can export and manage your projects, ensuring end-to-end coverage of all you need. By the end of the book, you'll have a thorough understanding of Adobe After Effects, equipped with the skills and practice you need to propel your career in graphic design. What you will learn Create and customize text layers, including text animations, using shape layers Enhance projects with audio elements and apply audio effects to shape layers Develop editable motion graphics templates for Premiere Pro Implement color correction and grading techniques to enhance footage in projects Use rotoscoping to remove and mask objects seamlessly Generate realistic effects such as rain, fire, and smoke using particle simulations Master the art of compositing through Chroma Keying Get to grips with 2D and 3D tracking for seamless element integration Who this book is for This book is for graphic designers, UX and UI designers, e-learning designers, motion graphics artists, video editors, and VFX artists. A fundamental grasp and minimal experience with After Effects will help you follow long the concepts covered in this book. Additionally, familiarity with Illustrator and Photoshop will provide an added advantage.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    ISBN: 9781804614327 , 1804614327 , 9781804612583
    Language: English
    Pages: 1 online resource (300 pages) , illustrations
    Parallel Title: Erscheint auch als
    DDC: 005.1
    Keywords: Software engineering ; Programming languages (Electronic computers) ; Génie logiciel
    Abstract: Take your data engineering skills to the next level by learning how to utilize Scala and functional programming to create continuous and scheduled pipelines that ingest, transform, and aggregate data Key Features Transform data into a clean and trusted source of information for your organization using Scala Build streaming and batch-processing pipelines with step-by-step explanations Implement and orchestrate your pipelines by following CI/CD best practices and test-driven development (TDD) Purchase of the print or Kindle book includes a free PDF eBook Book Description Most data engineers know that performance issues in a distributed computing environment can easily lead to issues impacting the overall efficiency and effectiveness of data engineering tasks. While Python remains a popular choice for data engineering due to its ease of use, Scala shines in scenarios where the performance of distributed data processing is paramount. This book will teach you how to leverage the Scala programming language on the Spark framework and use the latest cloud technologies to build continuous and triggered data pipelines. You'll do this by setting up a data engineering environment for local development and scalable distributed cloud deployments using data engineering best practices, test-driven development, and CI/CD. You'll also get to grips with DataFrame API, Dataset API, and Spark SQL API and its use. Data profiling and quality in Scala will also be covered, alongside techniques for orchestrating and performance tuning your end-to-end pipelines to deliver data to your end users. By the end of this book, you will be able to build streaming and batch data pipelines using Scala while following software engineering best practices. What you will learn Set up your development environment to build pipelines in Scala Get to grips with polymorphic functions, type parameterization, and Scala implicits Use Spark DataFrames, Datasets, and Spark SQL with Scala Read and write data to object stores Profile and clean your data using Deequ Performance tune your data pipelines using Scala Who this book is for This book is for data engineers who have experience in working with data and want to understand how to transform raw data into a clean, trusted, and valuable source of information for their organization using Scala and the latest cloud technologies.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    ISBN: 9781837631100 , 1837631107 , 9781837631971
    Language: English
    Pages: 1 online resource (270 pages) , illustrations
    Parallel Title: Erscheint auch als
    DDC: 005.3
    Keywords: Web applications Development ; Applications Web ; Développement
    Abstract: Unleash the full potential of Angular 17 to create more robust and feature-rich applications effortlessly Key Features Boost your Angular app development productivity by leveraging often-overlooked advanced features and best practices Enhance the quality of your Angular applications by simplifying code Gain practical knowledge through real-world examples of advanced Angular features and design patterns Purchase of the print or Kindle book includes a free PDF eBook Book Description Single page applications (SPAs) have become the standard for most web experiences. Angular, with its batteries-included approach, has emerged as a powerful framework for simplifying the development of these interfaces by offering a comprehensive toolbox. This book guides you through the Angular ecosystem, uncovering invaluable design patterns and harnessing its essential features. The book begins by laying a strong foundation, helping you understand when and why Angular should be your web development framework of choice. The next set of chapters will help you gain expertise in component design and architecting efficient, flexible, and high-performing communication patterns between components. You'll then delve into Angular's advanced features to create forms in a productive and secure way with robust data model typing. You'll also learn how to enhance productivity using interceptors to reuse code for common functionalities, such as token management, across various apps. The book also covers micro frontend architecture in depth to effectively apply this architectural approach and concludes by helping you master the art of crafting tests and handling errors effortlessly. By the end of this book, you'll have unlocked the full potential of the Angular framework. What you will learn Discover effective strategies for organizing your Angular project for enhanced efficiency Harness the power of TypeScript to boost productivity and the overall quality of your Angular project Implement proven design patterns to streamline the structure and communication between components Simplify complex applications by integrating micro frontend and standalone components Optimize the deployment process for top-notch application performance Leverage Angular signals and standalone components to create performant applications Who this book is for Whether you're a web developer or a tech leader engaged in frontend development, be it for small-scale projects or large, complex systems, you'll find this book useful to enhance both the quality and performance of your applications. Web architects seeking to design robust and adaptable frontend applications while leveraging Angular's extensive feature set will discover valuable insights within these pages.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    ISBN: 1835084842 , 9781835084847 , 9781835080542
    Language: English
    Pages: 1 online resource (xix, 794 pages) , illustrations
    Edition: Third edition.
    Series Statement: Expert insight
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Computer programming ; C++ (Langage de programmation) ; Programmation (Informatique) ; computer programming
    Abstract: The updated third edition of Modern C++ Programming Cookbook addresses the latest features of C++23, such as the stack library, the expected and mdspan types, span buffers, formatting library improvements, and updates to the ranges library. It also gets into more C++20 topics not previously covered, such as sync output streams and source_location. The book is organized in the form of practical recipes covering a wide range of real-world problems. It gets into the details of all the core concepts of modern C++ programming, such as functions and classes, iterators and algorithms, streams and the file system, threading and concurrency, smart pointers and move semantics, and many others. You will cover the performance aspects of programming in depth, and learning to write fast and lean code with the help of best practices. You will explore useful patterns and the implementation of many idioms, including pimpl, named parameter, attorney-client, and the factory pattern. A chapter dedicated to unit testing introduces you to three of the most widely used libraries for C++: Boost.Test, Google Test, and Catch2. By the end of this modern C++ programming book, you will be able to effectively leverage the features and techniques of C++11/14/17/20/23 programming to enhance the performance, scalability, and efficiency of your applications.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Birmingham, UK : Packt Publishing
    ISBN: 9781805128137
    Language: English
    Pages: 1 online resource (306 pages) , illustrations
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Rust (Computer program language) ; Asynchronous transfer mode
    Abstract: Get a fundamental understanding of asynchronous programming and Rust's futures by working through examples that show you how everything really works Key Features Master asynchronous Rust through examples focusing on key concepts Build a solid understanding of concepts such as coroutines, fibers, futures, and callbacks Explore Rust's futures, craft your own runtime, and excel in handling stacks, ABIs, syscalls, and inline assembly Purchase of the print or Kindle book includes a free PDF eBook Book Description Step into the world of asynchronous programming with confidence by conquering the challenges of unclear concepts with this hands-on guide. Using functional examples, this book simplifies the trickiest concepts, exploring goroutines, fibers, futures, and callbacks to help you navigate the vast Rust async ecosystem with ease. You'll start by building a solid foundation in asynchronous programming and explore diverse strategies for modeling program flow. The book then guides you through concepts like epoll, coroutines, green threads, and callbacks using practical examples. The final section focuses on Rust, examining futures, generators, and the reactor-executor pattern. You'll apply your knowledge to create your own runtime, solidifying expertise in this dynamic domain. Throughout the book, you'll not only gain proficiency in Rust's async features but also see how Rust models asynchronous program flow. By the end of the book, you'll possess the knowledge and practical skills needed to actively contribute to the Rust async ecosystem. What you will learn Explore the essence of asynchronous program flow and its significance Understand the difference between concurrency and parallelism Gain insights into how computers and operating systems handle concurrent tasks Uncover the mechanics of async/await Understand Rust's futures by implementing them yourself Implement green threads from scratch to thoroughly understand them Who this book is for This book is for programmers who want to enhance their understanding of asynchronous programming, especially those experienced in VM'ed or interpreted languages like C#, Java, Python, JavaScript, and Go. If you work with C or C++ but have had limited exposure to asynchronous programming, this book serves as a resource to broaden your knowledge in this area. Although the examples are predominantly in Rust, the intricacies of Rust's futures are covered in detail. So, anyone with a keen interest in learning Rust or with working knowledge of Rust will be able to get the most out of this book.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    ISBN: 9781805123224
    Language: English
    Pages: 1 online resource (294 pages) , illustrations
    Edition: [First edition].
    DDC: 005.1
    Keywords: Kubernetes ; Application software Development ; Computer programs
    Abstract: Gain hands-on skills in Kubernetes Secrets management, ensuring a comprehensive overview of the Secrets lifecycle and prioritizing adherence to regulatory standards and business sustainability Key Features Master Secrets encryption, encompassing complex life cycles, key rotation, access control, backup, and recovery Build your skills to audit Secrets consumption, troubleshoot, and optimize for efficiency and compliance Learn how to manage Secrets through real-world cases, strengthening your applications' security posture Purchase of the print or Kindle book includes a free PDF eBook Book Description Securing Secrets in containerized apps poses a significant challenge for Kubernetes IT professionals. This book tackles the critical task of safeguarding sensitive data, addressing the limitations of Kubernetes encryption, and establishing a robust Secrets management system for heightened security for Kubernetes. Starting with the fundamental Kubernetes architecture principles and how they apply to the design of Secrets management, this book delves into advanced Kubernetes concepts such as hands-on security, compliance, risk mitigation, disaster recovery, and backup strategies. With the help of practical, real-world guidance, you'll learn how to mitigate risks and establish robust Secrets management as you explore different types of external secret stores, configure them in Kubernetes, and integrate them with existing Secrets management solutions. Further, you'll design, implement, and operate a secure method of managing sensitive payload by leveraging real use cases in an iterative process to enhance skills, practices, and analytical thinking, progressively strengthening the security posture with each solution. By the end of this book, you'll have a rock-solid Secrets management solution to run your business-critical applications in a hybrid multi-cloud scenario, addressing operational risks, compliance, and controls. What you will learn Explore Kubernetes Secrets, related API objects, and CRUD operations Understand the Kubernetes Secrets limitations, attack vectors, and mitigation strategies Explore encryption at rest and external secret stores Build and operate a production-grade solution with a focus on business continuity Integrate a Secrets Management solution in your CI/CD pipelines Conduct continuous assessments of the risks and vulnerabilities for each solution Draw insights from use cases implemented by large organizations Gain an overview of the latest and upcoming Secrets management trends Who this book is for This handbook is a comprehensive reference for IT professionals to design, implement, operate, and audit Secrets in applications and platforms running on Kubernetes. For developer, platform, and security teams experienced with containers, this Secrets management guide offers a progressive path--from foundations to implementation--with a security-first mindset. You'll also find this book useful if you work with hybrid multi-cloud Kubernetes platforms for organizations concerned with governance and compliance requirements.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    ISBN: 9781835085936 , 1835085938 , 9781835086315
    Language: English
    Pages: 1 online resource (350 pages) , illustrations
    Parallel Title: Erscheint auch als
    DDC: 005.7/2
    Keywords: Web site development ; Web applications ; Sites Web ; Développement ; Applications Web
    Abstract: Unlock the full potential of Streamlit, mastering web app development from setup to deployment with practical guidance, advanced techniques, and real-world examples Key Features Identify and overcome web development challenges, crafting dedicated application skeletons using Streamlit Understand how Streamlit's widgets and components work to implement any kind of web app Manage web application development and deployment with ease using the Streamlit Cloud service Purchase of the print or Kindle book includes a free PDF eBook Book Description This book is a comprehensive guide to the Streamlit open-source Python library and simplifying the process of creating web applications. Through hands-on guidance and realistic examples, you'll progress from crafting simple to sophisticated web applications from scratch. This book covers everything from understanding Streamlit's central principles, modules, basic features, and widgets to advanced skills such as dealing with databases, hashes, sessions, and multipages. Starting with fundamental concepts like operation systems virtualization, IDEs, development environments, widgets, scripting, and the anatomy of web apps, the initial chapters set the groundwork. You'll then apply this knowledge to develop some real web apps, gradually advancing to more complex apps, incorporating features like natural language processing (NLP), computer vision, dashboards with interactive charts, file uploading, and much more. The book concludes by delving into the implementation of advanced skills and deployment techniques. By the end of this book, you'll have transformed into a proficient developer, equipped with advanced skills for handling databases, implementing secure login processes, managing session states, creating multipage applications, and seamlessly deploying them on the cloud. What you will learn Develop interactive web apps with Streamlit and deploy them seamlessly on the cloud Acquire in-depth theoretical and practical expertise in using Streamlit for app development Use themes and customization for visually appealing web apps tailored to specific needs Implement advanced features including secure login, signup processes, file uploaders, and database connections Build a catalog of scripts and routines to efficiently implement new web apps Attain autonomy in adopting new Streamlit features rapidly and effectively Who this book is for This book is for Python programmers, web developers, computer science students, and IT enthusiasts with a foundation in Python (or any programming language) who have a passion for creating visually appealing applications. If you already know how to write programs, this book will help you evolve into an adept web application developer skilled at converting command-line tools into impressive, cloud-hosted applications.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    ISBN: 9781837630707 , 1837630704 , 9781837638406
    Language: English
    Pages: 1 online resource (472 pages) , illustrations
    Parallel Title: Erscheint auch als
    DDC: 004.67/82
    Keywords: Cloud computing Security measures ; Infonuagique ; Sécurité ; Mesures
    Abstract: Strengthen your security posture in all aspects of CSPM technology, from security infrastructure design to implementation strategies, automation, and remedial actions using operational best practices across your cloud environment Key Features Choose the right CSPM tool to rectify cloud security misconfigurations based on organizational requirements Optimize your security posture with expert techniques for in-depth cloud security insights Improve your security compliance score by adopting a secure-by-design approach and implementing security automation Purchase of the print or Kindle book includes a free PDF eBook Book Description This book will help you secure your cloud infrastructure confidently with cloud security posture management (CSPM) through expert guidance that'll enable you to implement CSPM effectively, ensuring an optimal security posture across multi-cloud infrastructures. The book begins by unraveling the fundamentals of cloud security, debunking myths about the shared responsibility model, and introducing key concepts such as defense-in-depth, the Zero Trust model, and compliance. Next, you'll explore CSPM's core components, tools, selection criteria, deployment strategies, and environment settings, which will be followed by chapters on onboarding cloud accounts, dashboard customization, cloud assets inventory, configuration risks, and cyber threat hunting. As you progress, you'll get to grips with operational practices, vulnerability and patch management, compliance benchmarks, and security alerts. You'll also gain insights into cloud workload protection platforms (CWPPs). The concluding chapters focus on Infrastructure as Code (IaC) scanning, DevSecOps, and workflow automation, providing a thorough understanding of securing multi-cloud environments. By the end of this book, you'll have honed the skills to make informed decisions and contribute effectively at every level, from strategic planning to day-to-day operations. What you will learn Find out how to deploy and onboard cloud accounts using CSPM tools Understand security posture aspects such as the dashboard, asset inventory, and risks Explore the Kusto Query Language (KQL) and write threat hunting queries Explore security recommendations and operational best practices Get to grips with vulnerability, patch, and compliance management, and governance Familiarize yourself with security alerts, monitoring, and workload protection best practices Manage IaC scan policies and learn how to handle exceptions Who this book is for If you're a cloud security administrator, security engineer, or DevSecOps engineer, you'll find this book useful every step of the way--from proof of concept to the secured, automated implementation of CSPM with proper auto-remediation configuration. This book will also help cybersecurity managers, security leads, and cloud security architects looking to explore the decision matrix and key requirements for choosing the right product. Cloud security enthusiasts who want to enhance their knowledge to bolster the security posture of multi-cloud infrastructure will also benefit from this book.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    ISBN: 9781484295021 , 1484295021
    Language: English
    Pages: 1 online resource (370 pages) , illustrations (black and white, and color).
    Parallel Title: Erscheint auch als
    Keywords: Artificial intelligence ; New business enterprises ; Intelligence artificielle ; Nouvelles entreprises ; artificial intelligence
    Abstract: Gain exclusive access to the secrets to building an enterprise AI start-up. AI innovation helps with every aspect of the business, from the supply chain, marketing, and advertising, customer service, risk management, operations to security. Industries from different verticals have been adopting AI and get real business values out of it. This book guides you through each step, from defining the business need and business model, all the way to registering IP and calculating your AI start-up valuation. You see how to perform market and technology validation, perform lean AI R&D, design AI architecture, AI product development and operationalization. The book also cover building and managing an AI team, along with attracting and keeping business and developer users, Building an Enterprise AI start-up is hard because Enterprise AI is an effort to build applications to mimic human intelligence to solve business problems. Hence it has a different challenge from building traditional non-AI applications, such as scouting, recruiting and managing AI talents; designing the most cost-efficient and scalable Enterprise AI; or establishing the best practice to operationalize AI in production As we are in the dawn of the AI-first product wave, AI-powered products for enterprises will be created for many years to come and AI Startup Strategy is the one-stop guide for it. You will: Match customers expectation VS technical feasibility Justify business values and ROI for customers Review the best business models for high valuation enterprise AI start-ups Design an AI product that gives a satisfactory experience for the user Register and value AI IP.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484293737 , 1484293738
    Language: English
    Pages: 1 online resource (1 video file (27 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Android (Electronic resource) ; Application software Development ; JSON (Document markup language) ; Mobile computing ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Working with JSON in Android is one of the most useful skills for a developer. This is used on a daily basis in all kinds of apps. Displaying online data in an app is an essential part of the Android ecosystem. This video course will teach you how to download JSON data from an online location into the Android app. For example a list of contacts with email addresses, phone numbers, names, and other relevant information. Then you'll learn how to format the data properly and list it in a TableView to be more user friendly to read by the user of the app. What You'll Learn How to download text from a server How to properly format JSON data How to build a custom ListView with custom rows How to place everything in the layout How to populate the ListView with the formatted JSON data represented by a List of custom items Who This Video Is For People with more advanced skills in Android Studio and Java are targeted, but the video will also be useful for total beginners.
    Note: Online resource; title from title details screen (O'Reilly, viewed May 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484293744 , 1484293746
    Language: English
    Pages: 1 online resource (1 video file (28 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Android (Electronic resource) ; Application software Development ; Global Positioning System ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This is very simple but useful skill for every Android developer to learn how to get GPS data and display it in its proper format. Based on this knowledge, the developer can create tracking apps and other useful location based apps. Viewers of this video course will learn how to create a basic Android Studio project for Android, reach the GPS module on the device, get location permission, and display the coordinates in proper format on the screen. The video also includes a map so viewers can see not only coordinates but a location on the map too. This is one more amazing skill for the developers. What You'll Learn How to set up the project How to create the use interface How to create the code for the user interface How to write the main logic for getting the location and formatting the data Who This Video Is For People with more advanced skills in Android Studio and Java are the main audience, but the video will be useful for total beginners as well.
    Note: Online resource; title from title details screen (O'Reilly, viewed May 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484294543 , 1484294548
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 30 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Computer networks Management ; TCP/IP (Computer network protocol) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Python offers software engineers a multitude of inter-process communications (IPC) options. With the popularization of cross-cloud communications today, sockets - be they managing TCP, UDP, or even RAW octets - remain the predominate way to monitor, aggregate, as well as to participate in point-to-point, as well as multi-process signaling and information sharing activities. The purpose of the PSL-3000 Socket IPC is to review how to use TCP/IP and UDP/IP - the most popular and ubiquitous of all modern communication patterns and protocols. Along the way not only will PSL-3000 Socket IPC demonstrate how to share data between cooperating computer processes using IP, but many supporting options - as well as Python's built-in, object-oriented socket frameworks. From protocols, options, and failure recovery, along the way hands-on "beyond the basics" discussions, demonstrations, and coding activities are provided. Evolutionary IPC concepts destined to help viewers demystify common networking terms, trends, technologies, as well as techniques. Split into three (3) major sections, the PSL-3000 Socket IPC educational opportunity viewers will enjoy many IPC coding activities. Projects encompass short and simple snippets designed to review basic networking concepts, common design patterns, bit manipulations, and even hexadecimal network-mask encodings. - Viewers will also enjoy completing an evolutionary set of IPC activities covering client, server, peer-to-peer (multicasting,) as well as Python 3's "batteries included" socketed Framework. Timeouts, testing, as well as error recovery strategies are also demonstrated & practiced. What you will learn: Understand common communications terms, technologies, as well as testing techniques. How to use advanced techniques to multicast. What are the advantage of Python's socketserver object oriented design. How to simulate, as well as to recover from, common communication errors. Who this book is for: Both beginner and intermediate 'Pythoneers understanding functional Python, as well as the basics of inheriting from Python classes, will guarantee a larger audience. DevOps, Cloud, and IT security roles will also enjoy discovering how quick & easy it can be to create, monitor as well as to share data, events, and operational telemetries using Python 3.
    Note: Online resource; title from title details screen (O'Reilly, viewed May 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484295557 , 1484295552
    Language: English
    Pages: 1 online resource (1 video file (25 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: iOS (Electronic resource) ; Application software Development ; iPhone (Smartphone) Programming ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Software widgets are relatively simple and easy-to-use software applications or components made for one or more different software platforms. Popular examples of widgets include event countdowns, website visitors counter, clocks, daily weather report, etc. Lots of people can build a widget for iOS. But few can integrate them with an image downloader and show the downloaded image in the widget with custom intervals. This video will show how you can build very simple iOS widget in Xcode. The widget will have big image, front and center. Then on custom intervals, the widget will update the image with a new random one. Images will be stored on an online location so the widget will have to download them and show them one by one. What You'll Learn The basics of iOS widgets Image downloading Basics of SwiftUI How to update the widget with custom functions Who This Video Is For People with more advanced skills in Xcode and Swift are targeted, but the video will be useful for total beginners as well.
    Note: Online resource; title from title details screen (O'Reilly, viewed May 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    ISBN: 9781484294826 , 1484294823
    Language: English
    Pages: 1 online resource (1 video file (48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Git (Computer file) ; Computer software Development ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This video will get you up and running with GitHub Actions, GitHub's DevOps pipeline engine, which will allow you to automate just about any task. Author and trainer Yas Adel Mehraban takes a very practical hands-on approach for you to follow along, getting you up-to-speed on the terminology and then diving into concepts and code to create basic and more complex workflows. From there you learn how to share workflows within your organization and standardize your work using templates. To conclude the video, you will learn about more complex components such as triggers, expressions, contexts and using environment variables and secrets. What You Will Learn Understand core concepts and benefits of DevOps and CI/CD pipelines Use Yaml syntax for your GitHub workflows Run your first GitHub Action workflow Manage complex scenarios such as handling secrets, integrating depending jobs, configuring stages, environments, and adding labels to workflows Share GitHub Actions within an organization and learn about the templates and triggers available Set custom environment variables in your workflow file Understand the different billing options and limitations Who This Video Is For Any developer, system administrator, IT professionals, devops engineer, or cloud architect, who is already familiar with the fundamentals of GitHub repos source control.
    Note: Online resource; title from title details screen (O'Reilly, viewed May 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484296837 , 1484296834
    Language: English
    Pages: 1 online resource (1 video file (30 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Xcode ; Application software Development ; Mobile apps ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: In the video you will learn how to build a simple reminder app for iOS. The user will be able to input some text, set a time and the app will show this text as a notification at the specified time. This app is very useful for people to schedule reminders and notes at specific time. The developers will be able to build that kind of app and will learn how to work with notifications which is very important skill for an iOS developer. What You'll Learn How to create the design of the app How to connect the design with the Swift code How to write logic for background process How to write logic for notification How to write logic for the app Who This Video Is For People with more advanced skills in Xcode and Swift are targeted but the video will be useful for total begin-ners as well.
    Note: Online resource; title from title details screen (O'Reilly, viewed August 3, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484298725 , 1484298721
    Language: English
    Pages: 1 online resource (1 video file (40 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Computer networks Security measures ; Data protection ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: With cyber attacks on the rise, all individuals - and especially professionals handling potentially confidential company data - should be well-versed in how to protect their information from bad actors. This video will take you through the steps you can take to protect both your private and company data. The video will explain why cybersecurity is important on an individual and personal level, how cyber attacks have been evolving and what vulnerabilities you need to be aware of and protect. It'll go through topics and tricks to deal with these threats and explore the costs and impact of not protecting your data. What You Will Learn The financial impact of (non)-action How to deal with the evolving needs of security How attacks and vulnerabilities are evolving in the world Who This Video is For Non-technical professionals who are looking to understand how they can be careful with both their personal and professional data.
    Note: Online resource; title from title details screen (O'Reilly, viewed September 19, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484296813 , 1484296818
    Language: English
    Pages: 1 online resource (90 pages) , illustrations (black and white, and color).
    Parallel Title: Erscheint auch als
    Keywords: Amazon Web Services (Firm) ; Cloud computing Security measures ; Service-oriented architecture (Computer science) ; Infonuagique ; Sécurité ; Mesures ; Architecture orientée service (Informatique)
    Abstract: Improve cloud security within your organization by leveraging AWSs Shared Responsibility Model, Well-Architected Framework, and the Cloud Adoption Framework. This book will show you to use these tools to make the best decisions for securing your cloud environment. Youll start by understanding why security is important in the cloud and then review the relevant services offered to meet an organizations needs. Youll then move on to the finer points of building a secure architecture and take a deep look into the differences of responsibility of managed services and those that allow customers more control. With multiple AWS services available, organizations must weigh the tradeoffs between those that provide granular control (IaaS), a managed service (PaaS), delivering applications remotely over the internet instead of locally on machines (SaaS). This book will help you to identify the appropriate resources and show you how to implement them to meet an organizations business, technical, and security perspective in the Cloud Adoption Framework. Finally, you'll see how organizations can launch a secure and optimized cloud architecture and use monitoring tools to be proactive in security measures. With Beginning AWS Security, you'll understand frameworks, models, and the services needed to build a secure architecture. You will: Review the similarities and differences between cloud and traditional computing. See how security changes when using on-site, hybrid, and cloud models Develop an understanding that security is not one and done Reinforce the need for updates and monitoring as a continued part of AWS security.
    Note: Includes index. - Print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484294789 , 1484294785
    Language: English
    Pages: 1 online resource (1 video file (31 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Small business Computer networks ; Security measures ; Computer security Government policy ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Cybersecurity is not just for large businesses. Smaller organizations are becoming a prime target for attacks. Consider that about 60% of small businesses close down within six months of being hacked. Unfortunately, the risks keep growing. There are more than 4,000 ransomware attacks daily. Every eight seconds, there is a phishing attempt. But cybersecurity is not just about fending off hackers. It is actually important for a company's growth. If you want to sell your products or services to larger companies, you will likely need to go through cybersecurity due diligence. The good news is that there are cost-effective ways to improve your security systems and policies -- and this video will show how. What You Will Learn How to assess your cybersecurity risks How to evaluate software protections and countermeasures How to train your employees to improve security Who This Video is For Small business owners and startup founders.
    Note: Online resource; title from title details screen (O'Reilly, viewed May 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484298640 , 1484298640
    Language: English
    Pages: 1 online resource (1 video file (35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Android (Electronic resource) ; Application software Development ; Card games ; Mobile computing Software ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: In the video, you will learn how to build the classic War card game for Android. The game is played with a full deck of 52 cards. The players play cards one by one and the bigger card gets the smaller one. The point of the game is to win all of the cards. In this game, the user will be able to play vs device. This video is a valuable resource for developers looking to grasp the fundamentals of creating Android games with Java. It covers various aspects, including game design, creating a deck of cards, playing cards on the table, and delving into the intricacies of card games. What You'll Learn How to create Android games with Java How to create game design How to write the logic for card dealing How to play cards one by one and challenge the device Who This Video Is For People with more advanced skills in Android and Java are targeted but the video will be useful for total beginners as well.
    Note: Online resource; title from title details screen (O'Reilly, viewed September 19, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484295748 , 1484295749
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Application program interfaces (Computer software) ; C (Computer program language) ; Regular expressions (Computer science) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Learn everything you need to work with regular expressions in C# and how to apply them to your projects effectively. Regular expressions provide an extremely powerful method for pattern matching with strings. They are very useful for parsing information such as dates, phone numbers, or zip codes from important text files such as code files, log files, spreadsheets, or documents. This video will teach you about how to perform pattern matching with regular expressions using the latest C# version 11. it starts by introducing the topic of regular expressions and their use cases before exploring the C# API for regular expressions. This video discusses everyday use cases of regular expressions, e.g., data validation, information extraction, pattern matching, and search and replace. The video concludes with a look at advanced topics such as performance optimization and troubleshooting. After completing this video, you will be able to use regular expressions in C# 11 for practical applications such as data validation, text processing, and more. What Will You Learn Understand the basics of using regular expressions Format regular expression's output Master the different C# APIs available for working with regular expressions Who Is This Video For Software and application developers .
    Note: Online resource; title from title details screen (O'Reilly, viewed May 23, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    ISBN: 9781804613788 , 1804613789 , 9781804610541
    Language: English
    Pages: 1 online resource (398 pages) , illustrations
    Parallel Title: Erscheint auch als
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Machine learning ; Computer programming ; Python (Langage de programmation) ; Apprentissage automatique ; Programmation (Informatique) ; computer programming
    Abstract: Take your data preparation, machine learning, and GenAI skills to the next level by learning a range of Python algorithms and tools for data labeling Key Features Generate labels for regression in scenarios with limited training data Apply generative AI and large language models (LLMs) to explore and label text data Leverage Python libraries for image, video, and audio data analysis and data labeling Purchase of the print or Kindle book includes a free PDF eBook Book Description Data labeling is the invisible hand that guides the power of artificial intelligence and machine learning. In today's data-driven world, mastering data labeling is not just an advantage, it's a necessity. Data Labeling in Machine Learning with Python empowers you to unearth value from raw data, create intelligent systems, and influence the course of technological evolution. With this book, you'll discover the art of employing summary statistics, weak supervision, programmatic rules, and heuristics to assign labels to unlabeled training data programmatically. As you progress, you'll be able to enhance your datasets by mastering the intricacies of semi-supervised learning and data augmentation. Venturing further into the data landscape, you'll immerse yourself in the annotation of image, video, and audio data, harnessing the power of Python libraries such as seaborn, matplotlib, cv2, librosa, openai, and langchain. With hands-on guidance and practical examples, you'll gain proficiency in annotating diverse data types effectively. By the end of this book, you'll have the practical expertise to programmatically label diverse data types and enhance datasets, unlocking the full potential of your data. What you will learn Excel in exploratory data analysis (EDA) for tabular, text, audio, video, and image data Understand how to use Python libraries to apply rules to label raw data Discover data augmentation techniques for adding classification labels Leverage K-means clustering to classify unsupervised data Explore how hybrid supervised learning is applied to add labels for classification Master text data classification with generative AI Detect objects and classify images with OpenCV and YOLO Uncover a range of techniques and resources for data annotation Who this book is for This book is for machine learning engineers, data scientists, and data engineers who want to learn data labeling methods and algorithms for model training. Data enthusiasts and Python developers will be able to use this book to learn data exploration and annotation using Python libraries. Basic Python knowledge is beneficial but not necessary to get started.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    ISBN: 9781484293409 , 1484293401
    Language: English
    Pages: 1 online resource (450 pages) , illustrations (black and white).
    Parallel Title: Erscheint auch als
    Keywords: Cloud computing Management ; Business enterprises Computer networks ; Management ; Infonuagique ; Gestion ; Entreprises ; Réseaux d'ordinateurs ; Gestion ; Business enterprises ; Computer networks ; Management
    Abstract: This project-oriented book gives you a hands-on approach to designing, developing, and templating your Snowflake platform delivery. Written by seasoned Snowflake practitioners, the book is full of practical guidance and advice to accelerate and mature your Snowflake journey. Working through the examples helps you develop the skill, knowledge, and expertise to expand your organizations core Snowflake capability and prepare for later incorporation of additional Snowflake features as they become available. Your Snowflake platform will be resilient, fit for purpose, extensible, and guarantee rapid, consistent, and repeatable, pattern-based deployments ready for application delivery. When a Snowflake account is delivered there are no controls, guard rails, external monitoring, nor governance mechanisms baked in. From a large organization perspective, this book explains how to deliver your core Snowflake platform in the form of a Landing Zone, a consistent, templated approach that assumes familiarity with Snowflake core concepts and principles. The book also covers Snowflake from a governance perspective and addresses the who can see what? question, satisfying requirements to know for certain that your Snowflake accounts properly adhere to your organizations data usage policies. The book provides a proven pathway to success by equipping you with skill, knowledge, and expertise to accelerate Snowflake adoption within your organization. The patterns delivered within this book are used for production deployment, and are proven in real-world use. Examples in the book help you succeed in an environment in which governance policies, processes, and procedures oversee and control every aspect of your Snowflake platform development and delivery life cycle. Your environment may not be so exacting, but youll still benefit from the rigorous and demanding perspective this books authors bring to the table. The book shows you how to leverage what you already know and adds what you dont know, all applied to deliver your Snowflake accounts. You will know how to position your organization to deliver consistent Snowflake accounts that are prepared and ready for immediate application development. What You Will Learn Create a common, consistent deployment framework for Snowflake in your organization Enable rapid up-skill and adoption of Snowflake, leveraging the benefits of cloud platforms Develop a deep understanding of Snowflake administration and configuration Implement consistent, approved design patterns that reduce account provisioning times Manage data consumption by monitoring and controlling access to datasets.
    Note: Print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    ISBN: 9781803235851
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Parallel Title: Erscheint auch als
    DDC: 006.6/9
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Electronic books
    Abstract: Blender is a powerful tool for creating all kinds of visual assets, but with such power comes complexity. Creating a photorealistic 3D scene seems like a Herculean task for more than 90% of 3D designers, but don't be discouraged! 3D Environment Design with Blender will get you up and running. This practical guide helps reduce the complexity of 3D environment design, advance your Blender skills, and produce lifelike scenes and animations in a time-efficient manner. You'll start by learning how to fix the most common mistakes 3D designers make with modeling and scale matching that stop them from achieving photorealism. Next, you'll understand the basics of realistic texturing, efficient unwrapping and achieving photorealistic lighting by turning an actual reference of a wood cabin into a realistic 3D scene. These skills will be used and expanded as you build a realistic 3D environment with natural assets and materials that you'll create from scratch. Once you've developed your natural environment, you'll advance to creating realistic render shots by applying cool camera features, and compositing tricks that will make your final render look photorealistic and pleasing to the eye. By the end of this book, you'll be able to implement modeling tricks and best practices to make your 3D environments look stunningly lifelike.
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    ISBN: 9781484290293 , 1484290291
    Language: English
    Pages: 1 online resource (253 pages) , illustrations (black and white, and colour).
    Parallel Title: Erscheint auch als
    Keywords: Artificial intelligence ; Python (Computer program language)
    Abstract: Understand how to use Explainable AI (XAI) libraries and build trust in AI and machine learning models. This book utilizes a problem-solution approach to explaining machine learning models and their algorithms. The book starts with model interpretation for supervised learning linear models, which includes feature importance, partial dependency analysis, and influential data point analysis for both classification and regression models. Next, it explains supervised learning using non-linear models and state-of-the-art frameworks such as SHAP values/scores and LIME for local interpretation. Explainability for time series models is covered using LIME and SHAP, as are natural language processing-related tasks such as text classification, and sentiment analysis with ELI5, and ALIBI. The book concludes with complex model classification and regression-like neural networks and deep learning models using the CAPTUM framework that shows feature attribution, neuron attribution, and activation attribution. After reading this book, you will understand AI and machine learning models and be able to put that knowledge into practice to bring more accuracy and transparency to your analyses. You will: Create code snippets and explain machine learning models using Python Leverage deep learning models using the latest code with agile implementations Build, train, and explain neural network models designed to scale Understand the different variants of neural network models.
    Note: Includes index. - Print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    ISBN: 9780738460291
    Language: English
    Pages: 1 online resource (640 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This IBM® Redbooks® publication captures several of the preferred practices and describes the performance gains that can be achieved by implementing the IBM SAN Volume Controller powered by IBM Spectrum® Virtualize Version 8.4.2. These practices are based on field experience. This book highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools and managed disks, volumes, Remote Copy services and hosts. It explains how you can optimize disk performance with the IBM System Storage Easy Tier® function. It also provides preferred practices for monitoring, maintaining, and troubleshooting. This book is intended for experienced storage, SAN, IBM FlashSystem®, IBM SAN Volume Controller, and IBM Storwize® administrators and technicians. Understanding this book requires advanced knowledge of these environments.
    Note: Online resource; Title from title page (viewed January 17, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    Language: English
    Pages: 1 online resource (1 video file (26 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3/82
    Keywords: iOS (Electronic resource) ; Application software Development ; Logiciels d'application ; Développement ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Add support for different languages in your iOS apps. You'll start by constructing a basic user interface that's ready for multilingual support. Then add files with strings in different languages. Once you have the basics established, you'll learn to translate via code and also via storyboard. All languages are auto-picked according to each users' system settings. So that your users will always be interacting with your app in their native lan-guage. Adding support for multiple languages and adaptability to your apps will help reach wider audiences of users in different countries. Grow your userbase and support a more diverse and inclusive world! What You'll Learn Create simple UIs via storyboard Add strings in different languages Set app languages to the system device settings Who This Video Is For Intermediate to advanced Swift developers creating iOS apps with the expectation of a global audience.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 10, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    Language: English
    Pages: 1 online resource (1 video file (53 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.2762
    Keywords: JavaScript (Computer program language) ; JavaScript (Langage de programmation) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Learn how to build high-performing Java 17 applications using the GraalVM 21.3 Native Image compiler tool. You'll start with an introduction to GraalVM, then dive into its architecture and the benefits of running applications on GraalVM. This video also covers polyglot programming, and how to profile applications for analyzing its memory consumption and performance. What You Will Learn Get started with GraalVM while using JDK 17 Dive into GraalVM, its architecture and more Running code written in different languages on the same VM. Build a high-performing Java application with native image code and more Who This Video Is For Java programmers, software developers and engineers who are interested in learning about the capabilities of the GraalVM Native Image compiler tool. Prior experience with Java is recommended.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 30, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Birmingham, UK : Packt Publishing
    ISBN: 9781803235257
    Language: English
    Pages: 1 online resource (714 pages) , illustrations
    Edition: Third edition.
    DDC: 005.13/3
    Keywords: Microsoft .NET Framework ; C # (Computer program language) ; Software architecture ; Application software Development ; Cloud computing ; Microsoft .NET Framework ; Architecture logicielle ; Logiciels d'application ; Développement ; Infonuagique ; Application software ; Development ; Cloud computing ; Software architecture ; Electronic books
    Abstract: Design scalable and high-performance enterprise applications using the latest features of C# 10 and .NET 6 Key Features Gain comprehensive software architecture knowledge and the skillset to create fully modular apps Solve scalability problems in web apps using enterprise architecture patterns Master new developments in front-end architecture and the application of AI for software architects Book Description Software architecture is the practice of implementing structures and systems that streamline the software development process and improve the quality of an app. This fully revised and expanded third edition, featuring the latest features of .NET 6 and C# 10, enables you to acquire the key skills, knowledge, and best practices required to become an effective software architect. Software Architecture with C# 10 and .NET 6, Third Edition features new chapters that describe the importance of the software architect, microservices with ASP.NET Core, and analyzing the architectural aspects of the front-end in the applications, including the new approach of .NET MAUI. It also includes a new chapter focused on providing a short introduction to artificial intelligence and machine learning using ML.NET, and updated chapters on Azure Kubernetes Service, EF Core, and Blazor. You will begin by understanding how to transform user requirements into architectural needs and exploring the differences between functional and non-functional requirements. Next, you will explore how to choose a cloud solution for your infrastructure, taking into account the factors that will help you manage a cloud-based app successfully. Finally, you will analyze and implement software design patterns that will allow you to solve common development problems. By the end of this book, you will be able to build and deliver highly scalable enterprise-ready apps that meet your business requirements. What you will learn Use proven techniques to overcome real-world architectural challenges Apply architectural approaches such as layered architecture Leverage tools such as containers to manage microservices effectively Get up to speed with Azure features for delivering global solutions Program and maintain Azure Functions using C# 10 Understand when it is best to use test-driven development (TDD) Implement microservices with ASP.NET Core in modern architectures Enrich your application with Artificial Intelligence Get the best of DevOps principles to enable CI/CD environments Who this book is for This book is for engineers and senior software developers aspiring to become architects or looking to build enterprise applications with the .NET Stack. Basic familiarity with C# and .NET is required to get the most out of this book.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    ISBN: 9781803231891
    Language: English
    Pages: 1 online resource (288 pages) , illustrations
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Computer security ; Examinations ; Electronic data processing personnel ; Certification ; Electronic books ; Study guides
    Abstract: Remediate active attacks to reduce risk to the organization by investigating, hunting, and responding to threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender Key Features Detect, protect, investigate, and remediate threats using Microsoft Defender for endpoint Explore multiple tools using the M365 Defender Security Center Get ready to overcome real-world challenges as you prepare to take the SC-200 exam Book Description Security in information technology has always been a topic of discussion, one that comes with various backgrounds, tools, responsibilities, education, and change! The SC-200 exam comprises a wide range of topics that introduce Microsoft technologies and general operations for security analysts in enterprises. This book is a comprehensive guide that covers the usefulness and applicability of Microsoft Security Stack in the daily activities of an enterprise security operations analyst. Starting with a quick overview of what it takes to prepare for the exam, you'll understand how to implement the learning in real-world scenarios. You'll learn to use Microsoft's security stack, including Microsoft 365 Defender, and Microsoft Sentinel, to detect, protect, and respond to adversary threats in your enterprise. This book will take you from legacy on-premises SOC and DFIR tools to leveraging all aspects of the M365 Defender suite as a modern replacement in a more effective and efficient way. By the end of this book, you'll have learned how to plan, deploy, and operationalize Microsoft's security stack in your enterprise and gained the confidence to pass the SC-200 exam. What you will learn Discover how to secure information technology systems for your organization Manage cross-domain investigations in the Microsoft 365 Defender portal Plan and implement the use of data connectors in Microsoft Defender for Cloud Get to grips with designing and configuring a Microsoft Sentinel workspace Configure SOAR (security orchestration, automation, and response) in Microsoft Sentinel Find out how to use Microsoft Sentinel workbooks to analyze and interpret data Solve mock tests at the end of the book to test your knowledge Who this book is for This book is for security professionals, cloud security engineers, and security analysts who want to learn and explore Microsoft Security Stack. Anyone looking to take the SC-200 exam will also find this guide useful. A basic understanding of Microsoft technologies and security concepts will be beneficial.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    ISBN: 9781803246864 , 1803246863 , 9781803232485
    Language: English
    Pages: 1 online resource (280 pages) , illustrations
    Edition: Fourth edition.
    Parallel Title: Erscheint auch als
    DDC: 004.167
    Keywords: iOS (Electronic resource) ; Swift (Computer program language) ; Application software Development ; Swift (Langage de programmation) ; Logiciels d'application ; Développement ; Electronic books ; Electronic books
    Abstract: Test-driven development (TDD) is a proven way to find software bugs earlier on in software development. Writing tests before you code improves the structure and maintainability of your apps, and so using TDD in combination with Swift 5.5's improved syntax leaves you with no excuse for writing bad code. Developers working with iOS will be able to put their knowledge to work with this practical guide to TDD in iOS. This book will help you grasp the fundamentals and show you how to run TDD with Xcode. You'll learn how to test network code, navigate between different parts of the app, run asynchronous tests, and much more. Using practical, real-world examples, you'll begin with an overview of the TDD workflow and get to grips with unit testing concepts and code cycles. You'll then develop an entire iOS app using TDD while exploring different strategies for writing tests for models, view controllers, and networking code. Additionally, you'll explore how to test the user interface and business logic of iOS apps and even write tests for the network layer of the sample app. By the end of this TDD book, you'll be able to implement TDD methodologies comfortably in your day-to-day development for building scalable and robust applications.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484289341 , 148428934X
    Language: English
    Pages: 1 online resource (1 video file (46 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658/.05
    Keywords: Expert systems (Computer science) ; Artificial intelligence ; Computer software Development ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This course is targeted toward both novice and experienced developers and software architects and will help build a solid understanding of what Amazon Lex is capable of and what the best practices associated with it are. The author shares his experience in successfully building chatbots and what that success entailed. Part 2 of Building Bots with Amazon Lex begins with an introduction to the Amazon Lex service. The author then dives into the details of creating intents, utterances, prompts, and context. This is a complete hands-on course, and the audience can easily map it with the basics covered in Part 1 of this vidoe series. Building Bots with Amazon Lex covers not only text-based but will also delve into voice-based bots. After completing this course, you will be able to implement chatbots within your organization and define clear goals and objectives for stakeholders. What You Will Learn How to configure Lex bot for multiple locales How to build a natural conversation on bots How to enable and use Sentiment Analysis with the bot How to enable and collect conversational logs from the bot Who This Video Is For Software developers, cloud developers, and cloud architects.
    Note: Online resource; title from title details screen (O'Reilly, viewed October 18, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484287392 , 1484287398
    Language: English
    Pages: 1 online resource (1 video file (29 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658/.05
    Keywords: Expert systems (Computer science) ; Artificial intelligence ; Computer software Development ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This course is targeted towards novice or experienced developers and software architects. This course will help build a solid understanding of what Amazon Lex is capable of and what are the best practices associated with it. The author shares his experience on how he successfully built chatbots and what were the attributes for success. The course begins with an introduction to chatbot history, and terminologies like Persona, Utterances, Slots, and contexts. Next, it covers Amazon Lex with comparing chatbots between cloud providers, Amazon Lex history, and a use case on HR Bot. This is followed by describing the Life Cycle of the bot by explaining the Analysis phase activities, Design phase activities, and Development phase activities. There is a segment on Developing Business Logic for the bot. It concludes with discussing testing of the bot, deployment, and the channel for hosting the bot. The course will not only cover the text-based but will also delve into the voice-based bot. After completing this course, the audience will be able to visualize use cases where they can implement chatbots within their organization, define clear goals and objectives for the stakeholders. What you will learn What is Amazon Lex Understand life-cycle of a bot How to create your first bot How to host bot on Microsoft Teams Who this video is for Software developer, Cloud developers, Cloud Architects.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    ISBN: 9780738460215
    Language: English
    Pages: 1 online resource (452 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: The next-generation IBM® c-type Directors and switches for IBM Storage Networking provides high-speed Fibre Channel (FC) and IBM Fibre Connection (IBM FICON®) connectivity from the IBM Z® platform to the storage area network (SAN) core. It enables enterprises to rapidly deploy high-density virtualized servers with the dual benefit of higher bandwidth and consolidation. This IBM Redpaper Redbooks publication helps administrators understand how to implement or migrate to an IBM c-type SAN environment. It provides an overview of the key hardware and software products, and it explains how to install, configure, monitor, tune, and troubleshoot your SAN environment.
    Note: Online resource; Title from title page (viewed January 11, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738460345
    Language: English
    Pages: 1 online resource (42 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: The document describes the configuration and end-to-end architecture for configuring the logical air-gap solution for cyber resiliency using IBM® Spectrum Virtualize for Public Cloud (SV4PC) on Azure, IBM Spectrum® Virtualize Safeguarded Copy, and IBM FlashSystem®. This blueprint guide provides the following information: • A solutions architecture and related solution configuration workflows, with the following essential software and hardware components: – IBM FlashSystem – IBM Spectrum Virtualize for Public Cloud on Azure – IBM Copy Services Manager • Detailed technical configuration steps for building the cyber resiliency solutions This technical report does not provide performance analysis from a user perspective or replace any official IBM manuals or documents. This technical paper assumes that the reader is familiar with the following areas: • Basic kowledge of IBM FlashSystem • Azure Cloud fundamentals • Hybrid Cloud network connectivity • IBM Copy Services Manager
    Note: Online resource; Title from title page (viewed January 31, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 41 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Application program interfaces (Computer software) ; Application software Development ; Computer multitasking ; Python (Langage de programmation) ; Interfaces de programmation d'applications ; Logiciels d'application ; Développement ; Fonctionnement multitâche ; APIs (interfaces) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Asynchronous Python Programming using asyncio and async/await lets you write code that runs many processes concurrently. It makes your code more responsive and stops it from wasting time waiting for slow file and internet access. It is simpler to write, easier to reason about, and uses less memory than threads and processes. We start the video with an overview of asyncio, showing the building blocks and core syntax in a few simple examples. Next, you will see how to make normal Python code work in an asynchronous environment, to minimize blocking and facilitate cooperative multi-tasking. Further, we cover an asyncio use-case working with network connections such as web servers using asynio's streams API, followed by communication between coroutines and synchronization of coroutines. We will also look at using the asyncio library to easily wrap blocking code into threads and processes, and some non-blocking replacement libraries used with asyncio such as aiohttp and aiofiles. The uvloop and unsync libraries will be discussed as ways to speed up and simplify your asyncio code. The following section covers writing more robust asyncio code to test and debug your code, handle stuck tasks using time out, logging and error handling and task management. Having gained a firm understanding of how to code using asyncio, the course finishes with a look under the hood. This starts by walking you through a hand-coded example of an event loop (the core of asyncio), an overview of the different types of awaitables and some useful functions of the event loop which gives you fine grain control What you will learn: What are the differences between asyncio, threads and processes How to run code concurrently using coroutines, asyncio, and async/await How to work with network connections using streams How to write robust and modern asynchronous code How asyncio works and how to use the low level functions for fine-grain control Who this video is for Intermediate to experienced Python programmers who want to speed up existing Python code and make it more responsive by using async/await and asyncio.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 10, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Birmingham, UK : Packt Publishing
    ISBN: 9781801815536
    Language: English
    Pages: 1 online resource (478 pages) , color illustrations
    Edition: Second edition.
    DDC: 004.67/82
    Keywords: Microsoft Azure (Computing platform) ; Cloud computing Security measures ; Infonuagique ; Sécurité ; Mesures ; Microsoft Azure (Computing platform) ; Electronic books
    Abstract: Learn how to set up, configure, and use Microsoft Sentinel to provide security incident and event management services for your multi-cloud environment Key Features Collect, normalize, and analyze security information from multiple data sources Integrate AI, machine learning, built-in and custom threat analyses, and automation to build optimal security solutions Detect and investigate possible security breaches to tackle complex and advanced cyber threats Book Description Microsoft Sentinel is a security information and event management (SIEM) tool developed by Microsoft that helps you to integrate cloud security and artificial intelligence (AI). This book will enable you to implement Microsoft Sentinel and understand how it can help detect security incidents in your environment with integrated AI, threat analysis, and built-in and community-driven logic. The book begins by introducing you to Microsoft Sentinel and Log Analytics. You'll then get to grips with data collection and management, before learning how to create effective Microsoft Sentinel queries to detect anomalous behaviors and activity patterns. Moving ahead, you'll learn about useful features such as entity behavior analytics and Microsoft Sentinel playbooks along with exploring the new bi-directional connector for ServiceNow. As you progress, you'll find out how to develop solutions that automate responses needed to handle security incidents. Finally, you'll grasp the latest developments in security, discover techniques to enhance your cloud security architecture, and explore how you can contribute to the security community. By the end of this Microsoft Sentinel book, you'll have learned how to implement Microsoft Sentinel to fit your needs and be able to protect your environment from cyber threats and other security issues. What you will learn Implement Log Analytics and enable Microsoft Sentinel and data ingestion from multiple sources Get to grips with coding using the Kusto Query Language (KQL) Discover how to carry out threat hunting activities in Microsoft Sentinel Connect Microsoft Sentinel to ServiceNow for automated ticketing Find out how to detect threats and create automated responses for immediate resolution Use triggers and actions with Microsoft Sentinel playbooks to perform automations Who this book is for If you are an IT professional with prior experience in other Microsoft security products and Azure and are now looking to expand your knowledge to incorporate Microsoft Sentinel, then this book is for you. Security experts using an alternative SIEM tool who want to adopt Microsoft Sentinel as an additional service or as a replacement will also find this book useful.
    Note: Online resource; title from title details screen (O’Reilly, viewed February 22, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Language: English
    Pages: 1 online resource (1 video file (59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Microsoft software ; Electronic spreadsheets Computer programs ; Database management ; Logiciels Microsoft ; Tableurs ; Logiciels ; Bases de données ; Gestion ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: The introductory Excel tutorial covers topics related to entering data and demonstrates various ways of accepting and deleting data. You'll learn how to justify data within a cell and then have an opportunity to put it to practice. You will experiment with SmartLookup to search for anything on the Internet, whether it be Excel related or not, and then learn to place that information into an Excel pane. You will try out the Ribbon, a feature which drives the user-friendly resources in Excel. You'll learn the parts of the ribbon: tabs, groups, and command buttons and see how to hide and unhide the ribbon. Practice using short keys to run the commands and learn how to customize the ribbon to meet your needs. Add and remove commands, tabs and groups, change their order, add commands not normally used, then reset your ribbon back to the way it was before you made your changes. Finally, as Office 365 is is a product that regularly goes through changes, methods of getting help to stay up on the latest changes and support are demonstrated, including how to access Excel's built-in training videos. What you will learn • Know what Excel is and know some of its capabilities • Create, save, and open a workbook • Identify the current cell • Use the ribbon • Enter data in a worksheet • Get Help by using Screen Tips and the "Smart Lookup" feature This video is for anyone who wants to get up to speed on the many useful features and shortcuts of Excel.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 30, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484289334 , 1484289331
    Language: English
    Pages: 1 online resource (1 video file (37 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658/.05
    Keywords: Expert systems (Computer science) ; Artificial intelligence ; Computer software Development ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This course is targeted toward novice or experienced developers and software architects and will help build a solid understanding of what Amazon Lex is capable of and what the best practices associated with it are. The author shares his experience in successfully building chatbots and what that success entailed. Part 3 of Building Bots with Amazon Lex begins with an introduction to the Amazon Lambda service. The author then dives into the details of how to connect Amazon Lex and Amazon Lambda services to extend the functionality of bots. He then shows how to test and deploy a bot with voice and text inputs. The course culminates with a demonstration of a virtual reality environment that is enhanced by chatbots. The course covers not only text-based but also delves into voice-based bots. After completing this course, you will be able to implement chatbots within your organization and define clear goals and objectives for stakeholders. What You Will Learn How to integrate with serverless functions on AWS How to validate and fulfill the user request How to publish a bot for user consumption How to test a bot with voice and text inputs Who This Video Is For Software developers, cloud developers, and cloud architects.
    Note: Online resource; title from title details screen (O'Reilly, viewed October 17, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484282229 , 1484282221
    Language: English
    Pages: 1 online resource (1 video file (56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 776
    Keywords: Adobe Photoshop ; Adobe Illustrator (Computer file) ; Logos (Symbols) Design ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Learn how to take your client's logo from a flat 2-dimensional business card and turn it into a polished, three-dimensional design for use on merchandise using Photoshop. In this video, you will learn how to create a logo in Illustrator that can later be modified in Photoshop. You'll start by setting up your Illustrator workspace by importing a client's logo for tracing using the Pen and Shape Tools. Next, you'll see how to add text and effects and how to place the logo as a Smart Object in Photoshop for quick modifications. What You Will Learn Set up Illustrator and import image for tracing Understand Symbols panel and how to use it Add color and graphic styles to enhance the logo Who Is This Video For Beginners who have little knowledge of Adobe's Illustrator and Photoshop and want to learn how to design logos.
    Note: Online resource; title from title details screen (O'Reilly, viewed October 18, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    ISBN: 9781484286784 , 1484286782
    Language: English
    Pages: 1 online resource (1 video file (59 mi n.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Oracle (Computer file) ; Cloud computing ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Learn how to setup an Oracle cloud account in Oracle's Cloud Infrastructure (OCI). Experiment with provisioning and using the latest version of Oracle's enterprise-level database. Use Oracle's interface to create tables, manipulate data, and test new features. Even learn to create Blockchain tables, a new table type useful for when immutable records of change over time are needed. All of this can be done for free. The skills you learn from using the free access translate directly to Oracle's paid cloud offerings, making you more valuable to employers who are invested in Oracle's cloud platform. Once your database is provisioned, you can use Oracle's cloud tools to design and manage database objects. This video shows you how to design your database using Oracle's graphical cloud database modeler. Then you'll learn to use Oracle's web-based, graphical tools to explore your database, and to create and query database objects such as users and tables. You will also learn how to connect to OCI databases in the cloud directly from on-premises servers via locally installed SQL client software. This gives you a flexible set of tools to explore Oracle's cloud feature set using tools both on premises and in the cloud. What You Will Learn Create a free Oracle Cloud Infrastructure (OCI) account Provision databases and virtual machines Manage your database and its users from the OCI interface Use graphical tools to explore your database and create users and tables Design your database using Oracle's graphical cloud database modeler Create Blockchain tables to preserve immutable historical records Who This Video Is For For Oracle developers and database administrators who want free access to the latest Oracle technologies in the cloud. For those who want to learn about Oracle's cloud platform and host their databases in the cloud.
    Note: Online resource; title from title details screen (O'Reilly, viewed October 18, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484289020 , 1484289021
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.74
    Keywords: Blockchains (Databases) ; Microsoft Azure (Computing platform) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This video shows how to use blockchain technology in Azure SQL and SQL Server to provide an immutable record of data change over time, and to prove and attest to business partners that your data is accurate and has not been tempered with. You'll learn about the new, Ledger tables feature in Azure SQL and soon to be in SQL Server 2022 that enables this blockchain feature set. This video shows how Ledger-enabled tables protect your data from even high-privileged users, preventing even database and system administrators from making changes without a record of those changes being made. Also covered in this video is the older feature set around system-versioned, temporal tables. You'll learn how temporal tables are used as the base infrastructure for maintaining the blockchain history in Ledger tables. The video shows how Ledger provides additional protection to ensure that - unlike the case with just temporal tables - rows are cryptographically hashed to ensure against tampering. You can even combine both features, temporal and ledger tables; while ledger tables protect the data, temporal tables allow you to easily see the state of the data on a specific time point. What You Will Learn Understand the technology behind Azure SQL Ledger Create a database with ledger-enabled tables Combine ledger and system-versioning technology in a single table Modify the data in the ledger-enabled table Change the structure of ledger-enabled tables Verify that the ledger data has not been tampered with Understand ledger technology limitations Who This Book Is For For advanced database administrators of Azure SQL Databases who are required to prove that sensitive data has not been tampered with. For administrators requiring a tamper-proof record of history over time. For those who are running SQL Server 2022 either on-premises or through Managed Instances who have the same needs.
    Note: Online resource; title from title details screen (O'Reilly, viewed October 18, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484288061 , 1484288068
    Language: English
    Pages: 1 online resource (1 video file (51 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658/.05
    Keywords: Business Data processing ; Application software Development ; Artificial intelligence ; Human-computer interaction ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This course will help you in your day to day journey with SAP. It covers how to find and use Parameter Id in SAP. Parameter Id personalizes all the daily transaction code and reports you are running and helps you to post and get data based on your requirement. You will learn about the usage of personal value list. This helps SAP users to store their data points inside SAP and use it whenever needed. This course also covers how to create layouts and variants so that you can get different reports and selection based on your daily requirement. This process helps tremendously in reducing error and confusion as you have all the data points pre built. Additionally, you will learn how you can default the values for certain fields in a transaction code so that the number of entries you have to key is much less and it's ready for automation. Finally, you can learn how to default the values in SAP FIORI apps which is the future of user experience and gives the flavor of buying in amazon shopping while running in SAP. This course will help you use SAP in a more productive way with less clicks and optimizing your work. This course will make you the driver that SAP needs it to operate. What you'll learn: how to create default layout and variants How to change your SAP themes and play with different SAP options Learn personal value list which will help you to move all your excel cheat sheet stored in SAP Study parameter Id which will help you to enter less duplicate stuff Who is this book for: Beginning to intermediate end users, SAP S/4HANA users, SAP ECC.
    Note: Online resource; title from title details screen (O'Reilly, viewed October 17, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    ISBN: 9780738460277
    Language: English
    Pages: 1 online resource (58 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: With Remote Direct Memory Access (RDMA), you can make a subset of a host's memory directly available to a remote host. RDMA is available on standard Ethernet-based networks by using the RDMA over Converged Ethernet (RoCE) interface. The RoCE network protocol is an industry-standard initiative by the InfiniBand Trade Association. This IBM® Redpaper publication describes how to set up RoCE to use within an IBM Spectrum® Scale cluster and IBM Elastic Storage® Systems (ESSs). This book is targeted at technical professionals (consultants, technical support staff, IT Architects, and IT Specialists) who are responsible for delivering cost-effective storage solutions with IBM Spectrum Scale and IBM ESSs.
    Note: Online resource; Title from title page (viewed February 7, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 17 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.165
    Keywords: iOS (Electronic resource) ; Operating systems (Computers) ; Swift (Computer program language) ; Application software Development ; Systèmes d'exploitation (Ordinateurs) ; Swift (Langage de programmation) ; Logiciels d'application ; Développement ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Use a declarative approach to build UIs for iOS and macOS. Start with a review of what declarative programming is by building with SwiftUI. We will review all the basic SwiftUI components needed for a modern iOS app. Once we have a solid understanding of SwiftUI, we will cover reactive programming with the Combine framework. Understanding these components will allow us to incorporate SwiftUI with the Combine framework and make a fully declarative/reactive (MVVM) application. The goal is not to make you an expert but build a solid foundation of knowledge and instill the confidence to keep exploring these new technologies. With SwiftUI and the Combine framework, you can take a step closer to a Functional Reactive Programming development process. What You'll Learn Understand the relevant architectures and underlying components of Swift Work with SwiftUI to build basic UIs Build a full app with SwiftUI and the Combine framework Who This Video Is For Developers working on iOS or macOS apps. Familiarity with Swift is beneficial.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 10, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Birmingham, UK : Packt Publishing
    ISBN: 9781803246918
    Language: English
    Pages: 1 online resource (506 pages) , illustrations
    Edition: Second edition.
    DDC: 004.36
    Keywords: Computer networks Monitoring ; Client/server computing ; Zabbix (Computer file) ; Réseaux d'ordinateurs ; Surveillance ; Architecture client-serveur (Informatique) ; Electronic books
    Abstract: Discover practical recipes to help you efficiently monitor enterprise IT infrastructure for Microsoft Windows, Linux, networking, and more. This updated second edition of the Zabbix 6 IT Infrastructure Monitoring Cookbook brings you new recipes, updated with Zabbix 6 functionality. You'll learn how to set up Zabbix with built-in high availability, use the improved Business Service Monitoring, set up automatic reporting, and create advanced triggers. Zabbix offers useful insights into your infrastructure performance and issues and enables you to enhance your monitoring setup with its powerful features. This book covers hands-on, easy-to-follow recipes for using Zabbix 6 to monitor effectively the performance of devices and applications over the network. You'll start by working your way through the installation and most prominent features of Zabbix and make the right design choices for building a scalable and easily manageable environment. This Zabbix book contains recipes for building items and triggers for different types of monitoring, building templates, and using Zabbix proxies. Next, you'll use the Zabbix API for customization and manage your Zabbix server and database efficiently. Finally, you'll find quick solutions to the common and not-so-common problems that you may encounter in your Zabbix monitoring work. By the end of this book, you'll be able to use Zabbix for all your monitoring needs and build a solid Zabbix setup by leveraging its key functionalities.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    ISBN: 9781800560659
    Language: English
    Pages: 1 online resource (246 pages)
    Edition: [First edition].
    DDC: 005.74
    Keywords: Database management ; SQL (Computer program language) ; Cloud computing ; Application software Development ; Web applications ; Relational databases ; Bases de données ; Gestion ; SQL (Langage de programmation) ; Infonuagique ; Logiciels d'application ; Développement ; Applications Web ; Bases de données relationnelles ; Application software ; Development ; Cloud computing ; Database management ; Relational databases ; SQL (Computer program language) ; Web applications ; Electronic books ; Electronic books
    Abstract: Get hands-on with deploying and managing your database services to provide scalable and high-speed data access on CockroachDB. Getting Started with CockroachDB will introduce you to the inner workings of CockroachDB and help you to understand how it provides faster access to distributed data through a SQL interface. The book will also uncover how you can use the database to provide solutions where the data is highly available. Starting with CockroachDB's installation, setup, and configuration, this SQL book will familiarize you with the database architecture and database design principles. You'll then discover several options that CockroachDB provides to store multiple copies of your data to ensure fast data access. The book covers the internals of CockroachDB, how to deploy and manage it on the cloud, performance tuning to get the best out of CockroachDB, and how to scale data across continents and serve it locally. In addition to this, you'll get to grips with fault tolerance and auto-rebalancing, how indexes work, and the CockroachDB Admin UI. The book will guide you in building scalable cloud services on top of CockroachDB, covering administrative and security aspects and tips for troubleshooting, performance enhancements, and a brief guideline on migrating from traditional databases. By the end of this book, you'll have gained sufficient knowledge to manage your data on CockroachDB and interact with it from your application layer.
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484282922 , 1484282922
    Language: English
    Pages: 1 online resource (1 video file (31 min.)) , sound, color.
    Edition: [First edition].
    DDC: 331.2/1649
    Keywords: Employee stock options ; Finance, Personal ; Employee stock options ; Finance, Personal ; Instructional films ; Internet videos ; Nonfiction films ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The focus of this video will be on how to navigate the complexities of employee stock options and look at the ways to get the most value from them. While your 401(k) and home can be valuable sources of wealth, your employee stock options could potentially be worth much more. As seen with companies like Microsoft, Facebook and Amazon, employees can become millionaires. Yet employee stock options can be extremely complicated and risky. Making a wrong decision on taxes, for example, can be costly and this video will help you navigate it. What You Will Learn · The main types of options: nonqualified stock options and incentive stock options. · How to look at other equity compensation, like restricted stock and employee stock purchase plans (ESPPs). · How to evaluate the risks of employee stock options. Who This Video is For Employees, especially ones working in the tech world.
    Note: Online resource; title from title details screen (O'Reilly, viewed June 21, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484287668 , 1484287665
    Language: English
    Pages: 1 online resource (1 video file (1 hr.)) , sound, color.
    Edition: [First edition].
    DDC: 776
    Keywords: Adobe Photoshop ; Adobe Illustrator (Computer file) ; Logos (Symbols) Design ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Learn how to take your client's logo from a flat 2-dimensional business card and turn it into a polished, three-dimensional design for use on merchandise using Photoshop. In this video, you will learn how to place the logo as a smart object in the Photoshop and to modify it with various effects. You will next see how to make altercation as per client request and visualize it in Photoshop. Next, you will learn to incorporate the logo on various merchandise for your client and show it on Photoshop to clients. What You Will Learn Place logos as smart objects in Photoshop See how to open Smart Object Layer to make alterations Learn to incorporate Logo on various merchandise Who Is This Video For Beginners who have little knowledge of Adobe's Illustrator and Photoshop and want to learn how to design logos.
    Note: Online resource; title from title details screen (O'Reilly, viewed October 18, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    ISBN: 9780738460253
    Language: English
    Pages: 1 online resource (78 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This IBM® Redpaper® publication describes best practices for deploying and using advanced Broadcom Fabric Operating System (FOS) features to identify, monitor, and protect Fibre Channel (FC) SANs from problematic devices and media behavior. Note that this paper primarily focuses on the FOS command options and features that are available since version 8.2 with some coverage of new features that were introduced in 9.0. This paper covers the following recent changes: SANnav Fabric Performance Impact Notification
    Note: Online resource; Title from title page (viewed January 5, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    ISBN: 9780738460031
    Language: English
    Pages: 1 online resource (268 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: IBM® Hyper Protect Data Controller is designed to provide privacy protection of your sensitive data and give ease of control and auditability. It can manage how data is shared securely through a central control. Hyper Protect Data Controller can protect data wherever it goes—security policies are kept and honored whenever the data is accessed and future data access can be revoked even after data leaves the system of record. This IBM Redbooks® publication can assist you with determining how to get started with IBM Hyper Protect Data Controller through a use case approach. It will help you plan for, install, tailor and configure the Hyper Protect Data Controller. It includes information about the following topics: Concepts and reference architecture Common use cases with implementation guidance and advice Implementation and policy examples Typical operational tasks for creating policies and preparing for audits Monitoring user activity and events This IBM Redbooks publication is written for IT Managers, IT Architects, Security Administrators, data owners, and data consumers.
    Note: Online resource; Title from title page (viewed January 4, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    ISBN: 9780738460314
    Language: English
    Pages: 1 online resource (638 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This IBM® Redbooks® publication captures several of the preferred practices and describes the performance gains that can be achieved by implementing the IBM FlashSystem® products that are powered by IBM Spectrum® Virtualize Version 8.4.2. These practices are based on field experience. This book highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools and managed disks, volumes, Remote Copy services, and hosts. It explains how you can optimize disk performance with the IBM System Storage Easy Tier® function. It also provides preferred practices for monitoring, maintaining, and troubleshooting. This book is intended for experienced storage, SAN, IBM FlashSystem, SAN Volume Controller, and IBM Storwize® administrators and technicians. Understanding this book requires advanced knowledge of these environments.
    Note: Online resource; Title from title page (viewed February 2, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    Language: English
    Pages: 1 online resource (1 video file (43 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1/33
    Keywords: Java (Computer program language) ; Java (Langage de programmation) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Learn the many new features, enhancements, and updated technologies in the recent long-term support (LTS) release of Java Platform, Standard Edition (Java SE) 17. This video offers an overview of the JDK Release Process, differences between the more frequent non-LTS and the less frequent LTS releases, and various kinds of features such as preview, experimental, incubation and stable. You will understand how to enable and use preview features, as well as the steps to download the latest Java Development Kit (JDK). You'll also gain insight into the deprecation plan of some unused or obsolete APIs which will streamline the future releases of Java SE platform. What You Will Learn Understand what you need to know before upgrading to Java 17 Get familiar with the Java release process Explore the new features and capabilities of Java SE 17 in detail Upgrade to Java SE 17 Enable and Evaluate Preview features of Java SE 17 Who This Video Is For New programmers and software developers, or even some experienced programmers and developers in Java who are new to Java 17.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 30, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Birmingham, UK : Packt Publishing
    ISBN: 9781801073004
    Language: English
    Pages: 1 online resource (264 pages) , illustrations
    Edition: [First edition].
    DDC: 005.5
    Keywords: Google Apps ; Integrated software ; Cloud computing ; Logiciels intégrés ; Infonuagique ; Electronic books
    Abstract: Explore the suite of apps that enhance productivity and promote efficient collaboration in your business Key Features Set up your own project in Google Workspace and improve your ability to interact with different services Understand how a combination of options can help businesses audit their data to be highly secure Deploy Google Workspace, configure users, and migrate data using Google Workspace Book Description Google Workspace has evolved from individual Google services to a suite of apps that improve productivity and promote efficient collaboration in an enterprise organization. This book takes you through the evolution of Google Workspace, features included in each Workspace edition, and various core services, such as Cloud Identity, Gmail, and Calendar. You'll explore the functionality of each configuration, which will help you make informed decisions for your organization. Later chapters will show you how to implement security configurations that are available at different layers of Workspace and also how Workspace meets essential enterprise compliance needs. You'll gain a high-level overview of the core services available in Google Workspace, including Google Apps Script, AppSheet, and Google Cloud Platform. Finally, you'll explore the different tools Google offers when you're adopting Google Cloud and migrating your data from legacy mail servers or on-premises applications over to cloud servers. By the end of this Google Workspace book, you'll be able to successfully deploy Google Workspace, configure users, and migrate data, thereby helping with cloud adoption. What you will learn Manage and configure users in your organization's Workspace account Protect email messages from phishing attacks Explore how to restrict or allow certain Marketplace apps for your users Manage all endpoints connecting to Google Workspace Understand the differences between Marketplace apps and add-ons that access Drive data Manage devices to keep your organization's data secure Migrate to Google Workspace from existing enterprise collaboration tools Who this book is for This book is for admins as well as home users, business users, and power users looking to improve their efficiency while using Google Workspace. Basic knowledge of using Google Workspace services is assumed.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484285985 , 1484285980
    Language: English
    Pages: 1 online resource (1 video file (35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3/82
    Keywords: iOS (Electronic resource) ; Application software Development ; iOS (Electronic resource) ; Application software ; Development ; Instructional films ; Internet videos ; Nonfiction films ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Spice up the design of your apps by adding functionality for user customization. You'll program your apps to allow users to pick different icons. From assets you've imported and made available, users can update their homescreen icon for your app to reflect the season, match their wallpaper, or sync with a current Holiday. This meshes nicely with the newer implementation of widgets to bring more life to users' homescreens and your apps. What You'll Learn Create a basic Xcode project for iOS Import assets for icons Program a UI element for picking between icons Who This Video Is For Developers with some experience using Xcode and Swift.
    Note: Online resource; title from title details screen (O'Reilly, viewed June 21, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484286142 , 1484286146
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 29 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Computer programming ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This video provides you with instruction in the fundamentals of Java. You will begin by learning how to set up a programming environment on your personal computer using freely available open-source tools. Once set up, you will learn how to model the real world in a program using the various data types available to you. From there, you learn about expressions and statements that allow you to do useful work. Organizing code into classes and methods comes next. Learning to program involves acquiring several skills, especially if your goal is to become a professional programmer. This first video in the Java Tutorial Series helps you take the first steps toward the goal of programming in Java at the professional level. You will learn how and why to use the syntax of the Java language. But more important than just the syntax, this course teaches you the skills you will need to develop code as part of a team in a professional working environment. What You Will Learn Establish a Java development environment on your computer Write and run basic Java programs that can display information with just a text editor Learn about and use the primitive data types available in Java Solve a range of basic math problems taken from everyday life such as calculating loan payments for money that is borrowed Understand the concepts of structured programming and object-oriented programming Control how your code can be used by applying access control Who This Video Is For For those with little or no experience in programming who wish to learn the Java language. For those fluent in other languages who are making the transition into Java programming.
    Note: Online resource; title from title details screen (O'Reilly, viewed October 18, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    [Place of publication not identified] : Apress
    ISBN: 9781484287569 , 1484287568
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 9 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Application software Development ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Angular is a framework that provides rich and interactive features for single page application, increase development speed and faster user experience. This video course will help you create a strong foundation on angular framework. The video starts with an introduction on angular covering the basics and installation section of it. Moving forward, you will learn components of angular, it will discuss the different parts of angular so that you'll be able develop the app easily. As we progress, the author talks about the binding part of the angular like forms of module, data binding, input and output, validations and much more. After completion of this course you will easily develop a single page application and understand the basic concepts of angular as framework. What you'll learn: Learn the installation process in angular Develop app in an easier way Study the forms and validations in angular Who is this video for: Professionals interested to develop their career in the field of web development.
    Note: Online resource; title from title details screen (O'Reilly, viewed October 18, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    ISBN: 9781801811583
    Language: English
    Pages: 1 online resource (566 pages) , illustrations
    Edition: Third edition.
    DDC: 794.8/151
    Keywords: Computer games Programming ; C++ (Computer program language) ; Computer programming ; Electronic books
    Abstract: Unreal Engine's Blueprint visual scripting system enables designers to script their games and programmers to create base elements that can be extended by designers. With this book, you'll explore all the features of the Blueprint Editor, along with expert tips, shortcuts, and best practices. The book guides you through using variables, macros, and functions, and helps you learn about object-oriented programming (OOP). You'll discover the Gameplay Framework and advance to learning how Blueprint Communication allows one Blueprint to access information from another Blueprint. Later chapters focus on building a fully functional game step by step. You'll start with a basic first-person shooter (FPS) template, and each chapter will build on the prototype to create an increasingly complex and robust game experience. You'll then progress from creating basic shooting mechanics to more complex systems such as user interface elements and intelligent enemy behavior. The book demonstrates how to use arrays, maps, enums, and vector operations and introduces the elements needed for VR game development. In the final chapters, you'll learn how to implement procedural generation and create a product configurator. By the end of this book, you'll have learned how to build a fully functional game and have the skills required to develop an entertaining experience for your audience.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    ISBN: 9781803240664
    Language: English
    Pages: 1 online resource (490 pages) , illustrations
    Edition: Second edition.
    DDC: 005.3
    Keywords: Windows Azure Study guides Examinations ; Application software Study guides Development ; Examinations ; Electronic books
    Abstract: The AZ-400 Designing and Implementing Microsoft DevOps Solutions certification helps DevOps engineers and administrators get to grips with practices such as continuous integration and continuous delivery (CI/CD), containerization, and zero downtime deployments using Azure DevOps Services. This new edition is updated with advanced topics such as site reliability engineering (SRE), continuous improvement, and planning your cloud transformation journey. The book begins with the basics of CI/CD and automated deployments, and then moves ahead to show you how to apply configuration management and Infrastructure as Code (IaC) along with managing databases in DevOps scenarios. As you make progress, you'll explore fitting security and compliance with DevOps and find out how to instrument applications and gather metrics to understand application usage and user behavior. This book will also help you implement a container build strategy and manage Azure Kubernetes Services. Lastly, you'll discover quick tips and tricks to confidently apply effective DevOps practices and learn to create your own Azure DevOps organization. By the end of this DevOps book, you'll have gained the knowledge needed to ensure seamless application deployments and business continuity.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    ISBN: 9781800207653
    Language: English
    Pages: 1 online resource (822 pages) , illustrations
    Edition: [First edition].
    DDC: 006.6/8
    Keywords: Tableau (Computer file) ; Information visualization Computer programs ; Visual analytics Data processing ; Electronic books ; Electronic books
    Abstract: Learning Tableau has never been easier, thanks to this practical introduction to storytelling with data. The Tableau Workshop breaks down the analytical process into five steps: data preparation, data exploration, data analysis, interactivity, and distribution of dashboards. Each stage is addressed with a clear walkthrough of the key tools and techniques you'll need, as well as engaging real-world examples, meaningful data, and practical exercises to give you valuable hands-on experience. As you work through the book, you'll learn Tableau step by step, studying how to clean, shape, and combine data, as well as how to choose the most suitable charts for any given scenario. You'll load data from various sources and formats, perform data engineering to create new data that delivers deeper insights, and create interactive dashboards that engage end-users. All concepts are introduced with clear, simple explanations and demonstrated through realistic example scenarios. You'll simulate real-world data science projects with use cases such as traffic violations, urban populations, coffee store sales, and air travel delays. By the end of this Tableau book, you'll have the skills and knowledge to confidently present analytical results and make data-driven decisions.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    ISBN: 9781801070638
    Language: English
    Pages: 1 online resource (384 pages) , illustrations
    Edition: Second edition.
    DDC: 005.1
    Keywords: Application software Development ; Application software Programming ; User interfaces (Computer systems) ; JavaScript (Computer program language) ; Electronic books
    Abstract: Learn how to develop real-world applications of varying complexity for the web, mobile, and VR devices using React, React Native, React 360, and more. Developed by Facebook, React is a popular library for building impressive user interfaces. React extends its capabilities to mobile platforms using the React Native framework and integrates with popular web and mobile tools to build scalable applications. React Projects is your guide to learning React development by using modern development patterns and integrating React with powerful web tools, such as GraphQL, Expo, and React 360. You'll start building a real-world project right from the first chapter and get hands-on with developing scalable applications as you advance to building more complex projects. Throughout the book, you'll use the latest versions of React and React Native to explore features such as routing, Context, and Hooks on multiple platforms, which will help you build full-stack web and mobile applications efficiently. Finally, you'll get to grips with unit testing with Jest and end-to-end testing with Cypress to build test-driven apps. By the end of this React book, you'll have developed the skills necessary to start building scalable React apps across web and mobile platforms.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    ISBN: 9781801812870
    Language: English
    Pages: 1 online resource (540 pages) , illustrations
    Edition: Third edition.
    DDC: 005.13/3
    Keywords: SQL (Computer program language) ; Data mining ; Electronic books
    Abstract: Every day, businesses operate around the clock, and a huge amount of data is generated at a rapid pace. This book helps you analyze this data and identify key patterns and behaviors that can help you and your business understand your customers at a deep, fundamental level. SQL for Data Analytics, Third Edition is a great way to get started with data analysis, showing how to effectively sort and process information from raw data, even without any prior experience. You will begin by learning how to form hypotheses and generate descriptive statistics that can provide key insights into your existing data. As you progress, you will learn how to write SQL queries to aggregate, calculate, and combine SQL data from sources outside of your current dataset. You will also discover how to work with advanced data types, like JSON. By exploring advanced techniques, such as geospatial analysis and text analysis, you will be able to understand your business at a deeper level. Finally, the book lets you in on the secret to getting information faster and more effectively by using advanced techniques like profiling and automation. By the end of this book, you will be proficient in the efficient application of SQL techniques in everyday business scenarios and looking at data with the critical eye of analytics professional.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Birmingham, UK : Packt Publishing
    ISBN: 9781803238531
    Language: English
    Pages: 1 online resource (308 pages) , illustrations
    Edition: Fifth edition.
    DDC: 794.8/1526
    Keywords: Unity (Electronic resource) ; Computer games Programming ; Artificial intelligence ; Three-dimensional display systems ; Artificial Intelligence ; Jeux d'ordinateur ; Programmation ; Intelligence artificielle ; Affichage tridimensionnel ; artificial intelligence ; three-dimensional ; Electronic books
    Abstract: Learn and implement game AI in Unity to build smart environments and enemies with A* pathfinding, finite state machines, behavior trees, and the NavMesh. Developing artificial intelligence (AI) for game characters in Unity has never been easier. Unity provides game and app developers with a variety of tools to implement AI, from basic techniques to cutting-edge machine learning-powered agents. Leveraging these tools via Unity's API or built-in features allows limitless possibilities when it comes to creating game worlds and characters. The updated fifth edition of Unity Artificial Intelligence Programming starts by breaking down AI into simple concepts. Using a variety of examples, the book then takes those concepts and walks you through actual implementations designed to highlight key concepts and features related to game AI in Unity. As you progress, you'll learn how to implement a finite state machine (FSM) to determine how your AI behaves, apply probability and randomness to make games less predictable, and implement a basic sensory system. Later, you'll understand how to set up a game map with a navigation mesh, incorporate movement through techniques such as A* pathfinding, and provide characters with decision-making abilities using behavior trees. By the end of this Unity book, you'll have the skills you need to bring together all the concepts and practical lessons you've learned to build an impressive vehicle battle game.
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    ISBN: 9781801816786
    Language: English
    Pages: 1 online resource (378 pages) , illustrations
    Edition: Third edition.
    DDC: 005.3
    Keywords: Spring (Software framework) ; Application software Development ; Application program interfaces (Computer software) ; Web applications ; Electronic books
    Abstract: Getting started with full stack development can be daunting. Even developers who are familiar with the best tools, such as Spring Boot and React, can struggle to nail the basics, let alone master the more advanced elements. If you're one of these developers, this comprehensive guide covers everything you need! This updated edition of the Full Stack Development with Spring Boot 2 and React book will take you from novice to proficient in this expansive domain. Taking a practical approach, this book will first walk you through the latest Spring Boot features for creating a robust backend, covering everything from setting up the environment and dependency injection to security and testing. Once this has been covered, you'll advance to React frontend programming. If you've ever wondered about custom Hooks, third-party components, and MUI, this book will demystify all that and much more. You'll explore everything that goes into developing, testing, securing, and deploying your applications using all the latest tools from Spring Boot, React, and other cutting-edge technologies. By the end of this book, you'll not only have learned the theory of building modern full stack applications but also have developed valuable skills that add value in any setting.
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    ISBN: 9781800566491
    Language: English
    Pages: 1 online resource (780 pages) , illustrations
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: C# (Computer program language) ; Computer programming ; Application software Development
    Abstract: C# is a powerful, versatile language that can unlock a variety of career paths. But, as with any programming language, learning C# can be a challenging process. With a wide range of different resources available, it's difficult to know where to start. That's where The C# Workshop comes in. Written and reviewed by industry experts, it provides a fast-paced, supportive learning experience that will quickly get you writing C# code and building applications. Unlike other software development books that focus on dry, technical explanations of the underlying theory, this Workshop cuts through the noise and uses engaging examples to help you understand how each concept is applied in the real world. As you work through the book, you'll tackle realistic exercises that simulate the type of problems that software developers work on every day. These mini-projects include building a random-number guessing game, using the publisher-subscriber model to design a web file downloader, creating a to-do list using Razor Pages, generating images from the Fibonacci sequence using async/await tasks, and developing a temperature unit conversion app which you will then deploy to a production server. By the end of this book, you'll have the knowledge, skills, and confidence to advance your career and tackle your own ambitious projects with C#.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    ISBN: 9781803234519
    Language: English
    Pages: 1 online resource (666 pages) , illustrations
    Edition: Second edition.
    Series Statement: Expert insight
    Parallel Title: Erscheint auch als Ledin, Jim Modern computer architecture and organization
    DDC: 004.2/2
    RVK:
    Keywords: Computer organization ; Computer architecture ; Electronic books ; Computerarchitektur
    Abstract: Are you a software developer, systems designer, or computer architecture student looking for a methodical introduction to digital device architectures, but are overwhelmed by the complexity of modern systems? This step-by-step guide will teach you how modern computer systems work with the help of practical examples and exercises. You'll gain insights into the internal behavior of processors down to the circuit level and will understand how the hardware executes code developed in high-level languages. This book will teach you the fundamentals of computer systems including transistors, logic gates, sequential logic, and instruction pipelines. You will learn details of modern processor architectures and instruction sets including x86, x64, ARM, and RISC-V. You will see how to implement a RISC-V processor in a low-cost FPGA board and write a quantum computing program and run it on an actual quantum computer. This edition has been updated to cover the architecture and design principles underlying the important domains of cybersecurity, blockchain and bitcoin mining, and self-driving vehicles. By the end of this book, you will have a thorough understanding of modern processors and computer architecture and the future directions these technologies are likely to take.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    ISBN: 9781803237480
    Language: English
    Pages: 1 online resource (374 pages) , illustrations
    Edition: Third edition.
    DDC: 005.1
    Keywords: Application software Development ; Web applications Development ; Electronic books ; Electronic books
    Abstract: Create a complete continuous delivery process using modern DevOps tools such as Docker, Jenkins, Kubernetes, Ansible, Terraform, and many more Key Features Build reliable and secure applications using Docker containers Create a highly available environment to scale Jenkins and your services using Kubernetes Automate your release process end-to-end Book Description This updated third edition of Continuous Delivery with Docker and Jenkins will explain the advantages of combining Jenkins and Docker to improve the continuous integration and delivery process of app development. You'll start by setting up a Docker server and configuring Jenkins on it. Next, you'll discover steps for building applications and microservices on Dockerfiles and integrating them with Jenkins using continuous delivery processes such as continuous integration, automated acceptance testing, configuration management, and Infrastructure as Code. Moving ahead, you'll learn how to ensure quick application deployment with Docker containers, along with scaling Jenkins using Kubernetes. Later, you'll explore how to deploy applications using Docker images and test them with Jenkins. Toward the concluding chapters, the book will focus on missing parts of the CD pipeline, such as the environments and infrastructure, application versioning, and non-functional testing. By the end of this continuous integration and continuous delivery book, you'll have gained the skills you need to enhance the DevOps workflow by integrating the functionalities of Docker and Jenkins. What you will learn Grasp Docker fundamentals and dockerize applications for the CD process Understand how to use Jenkins on-premises and in the cloud Scale a pool of Docker servers using Kubernetes Write acceptance tests using Cucumber Run tests in the Docker ecosystem using Jenkins Provision your servers and infrastructure using Ansible and Terraform Publish a built Docker image to a Docker registry Deploy cycles of Jenkins pipelines using community best practices Who this book is for The book is for DevOps engineers, system administrators, Docker professionals, or anyone who wants to explore the power of working with Docker and Jenkins together. No prior knowledge of DevOps is required to get started.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    ISBN: 9781803242507
    Language: English
    Pages: 1 online resource (696 pages) , illustrations
    Edition: Second edition.
    DDC: 005.7/1376
    Keywords: Directory services (Computer network technology) ; Computer security ; Computer networks Security measures ; Information technology Management ; Client/server computing Security measures ; Cloud computing Security measures ; Electronic books
    Abstract: Updated to the Windows Server 2022, this second edition covers effective recipes for Active Directory administration that will help you leverage AD's capabilities for automating network, security, and access management tasks in the Windows infrastructure. Starting with a detailed focus on forests, domains, trusts, schemas, and partitions, this book will help you manage domain controllers, organizational units, and default containers. You'll then explore Active Directory sites management as well as identify and solve replication problems. As you progress, you'll work through recipes that show you how to manage your AD domains as well as user and group objects and computer accounts, expiring group memberships, and Group Managed Service Accounts (gMSAs) with PowerShell. Once you've covered DNS and certificates, you'll work with Group Policy and then focus on federation and security before advancing to Azure Active Directory and how to integrate on-premise Active Directory with Azure AD. Finally, you'll discover how Microsoft Azure AD Connect synchronization works and how to harden Azure AD. By the end of this AD book, you'll be able to make the most of Active Directory and Azure AD Connect.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    ISBN: 9781803232157
    Language: English
    Pages: 1 online resource (398 pages) , illustrations
    Edition: Third edition.
    DDC: 005.7/1376
    Keywords: Microsoft Windows server ; Electronic books
    Abstract: Deploy, set up, and deliver network services with Windows Server 2022, along with exploring Microsoft's role-based certifications. This third edition gets you up and running with Windows Server 2022, Microsoft's new server operating system, as part of the Windows NT family of operating systems, developed concurrently with Windows 10, version 21H2. The book begins by introducing computer networking and Windows Server concepts, gradually moving towards Windows Server 2022. With the help of step-by-step instructions and easy-to-understand graphics, you'll become well versed with the roles, features, and functionalities of Windows Server 2022. Topics such as the installation process, upgrades, post-installation tasks, and initial server configuration are covered in detail. As you make progress, you'll explore roles, features, and role services such as Active Directory, DNS, Hyper-V, remote access, storage, and printers, among others. The book then takes you through maintenance and troubleshooting tasks to guide you in efficiently managing Windows Server 2022. Finally, by working with numerous questions in each chapter and detailed answers at the end, you can test your understanding of the concepts covered. By the end of this Windows Server book, you'll be equipped with the knowledge needed to update, maintain, and troubleshoot servers to ensure business continuity by relying on best practices and using step-by-step graphic-driven examples. If you are an IT professional who wants to deploy and configure Windows Server 2022, then this book is for you. You can also use this book to learn about Microsoft's role-based certifications if you're planning to enroll in a course. No prior experience with Windows Server operating systems or familiarity with networking concepts is required.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    ISBN: 9780738459318
    Language: English
    Pages: 1 online resource (32 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: There is a growing insider security risk to organizations. Human error, privilege misuse, and cyberespionage are considered the top insider threats. One of the most dangerous internal security threats is the privileged user with access to critical data, which is the "crown jewels" of the organization. This data is on storage, so storage administration has critical privilege access that can cause major security breaches and jeopardize the safety of sensitive assets. Organizations must maintain tight control over whom they grant privileged identity status to for storage administration. Extra storage administration access must be shared with support and services teams when required. There also is a need to audit critical resource access that is required by compliance to standards and regulations. IBM® Security™ Verify Privilege Vault On-Premises (Verify Privilege Vault), formerly known as IBM Security™ Secret Server, is the next-generation privileged account management that integrates with IBM Storage to ensure that access to IBM Storage administration sessions is secure and monitored in real time with required recording for audit and compliance. Privilege access to storage administration sessions is centrally managed, and each session can be timebound with remote monitoring. You also can use remote termination and an approval workflow for the session. In this IBM Redpaper, we demonstrate the integration of IBM Spectrum® Scale and IBM Elastic Storage® Server (IBM ESS) with Verify Privilege Vault, and show how to use privileged access management (PAM) for secure storage administration. This paper is targeted at storage and security administrators, storage and security architects, and chief information security officers.
    Note: Online resource; Title from title page (viewed January 8, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    ISBN: 9780738459356
    Language: English
    Pages: 1 online resource (132 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redpaper™ publication is a comprehensive guide that covers the IBM Power System H922 (9223-22S), and IBM Power System H924 (9223-42S) servers that support memory-intensive workloads, such as SAP HANA, and deliver superior price and performance for mission-critical applications in IBM AIX®, IBM i, and Linux® operating systems. The goal of this paper is to provide a hardware architecture analysis and highlight the changes, new technologies, and major features that are being introduced in these systems' 2020 release, such as the following examples: Availability of new IBM POWER9™ processor configurations for the number of cores per socket. More performance by using industry-leading IBM Peripheral Component Interconnect® Express (PCIe) Gen4 slots. Enhanced internal disk configuration options, with up to 14 NVMe adapters (four U.2 NVMe plus up to 10 PCIe add-in cards). Twice as fast back-end I/O enables seamless maximum speed and throughput between on-premises and multiple public cloud infrastructures with high availability (HA). This publication is for professionals who want to acquire a better understanding of IBM Power Systems products. The intended audience includes the following roles: Clients Sales and marketing professionals Technical support professionals IBM Business Partners Independent software vendors (ISVs) This paper expands the current set of IBM Power Systems documentation by providing a desktop reference that offers a detailed technical description of the Power H922 and Power H924 systems.
    Note: Online resource; Title from title page (viewed January 26, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    ISBN: 9780738459424
    Language: English
    Pages: 1 online resource (180 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® publication is a guide to IBM Power Private Cloud with Shared Utility Capacity featuring Power Enterprise Pools 2.0 (also known as PEP 2.0). This technology allows multiple servers in an to share base processor and memory resources, and draw upon pre-paid credits when the base is exceeded. Previously, the Shared Utility feature supported IBM Power System E950 (9040-MR9) and IBM Power System E980 (9080-M9S). It was extended in August 2020 to include the Scale-out Power Systems announced on July 14th 2020 and received dedicated processor support later in the year. The IBM Power System S922 (9009-22G), and IBM Power System S924 (9009-42G) servers which use the latest IBM POWER9™ processor-based technology and support the IBM AIX®, IBM i, and Linux operating systems are now supported. The previous Scale-out models: IBM Power System S922 (9009-22A), and IBM Power System S924 (9009-42A) servers cannot be added to an Enterprise Pool. The goal of this book is to provide an overview of the environment and guidance for planning a deployment. The paper also covers how to configure PEP 2.0. There are also chapters on migrating from PEP 1.0 to PEP 2.0 and various use cases. This publication is for professionals who want to acquire a better understanding of IBM Power Private Cloud, and Shared Utility. The intended audience includes: Clients Sales and marketing professionals Technical support professionals IBM Business Partners This book expands the set of Power Systems documentation by providing a desktop reference which offers a detailed technical description of IBM Power Private Cloud, and Shared Utility.
    Note: Online resource; Title from title page (viewed March 11, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738459462
    Language: English
    Pages: 1 online resource (16 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The IBM® FlashSystem 5015, 5035, and 5200 help you meet the challenges of rapid data growth while staying within limited IT budgets. These systems allow you to quickly consolidate, simplify, and optimize your IT infrastructure with an efficient, highly flexible, yet easy-to-use storage system with powerful virtualization features. This IBM Redpaper™ publication is intended for mid-market clients.
    Note: Online resource; Title from title page (viewed March 30, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    ISBN: 9780738457291
    Language: English
    Pages: 1 online resource (24 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redpaper™ publication introduces a new data virtualization capability that enables IBM z/OS® data to be combined with other enterprise data sources in real-time, which allows applications to access any live enterprise data anytime and use the power and efficiencies of the IBM Z® platform. Modern businesses need actionable and timely insight from current data. They cannot afford the time that is necessary to copy and transform data. They also cannot afford to secure and protect each copy of personally identifiable information and corporate intellectual property. Data virtualization enables direct connections to be established between multiple data sources and the applications that process the data. Transformations can be applied, in line, to enable real-time access to data, which opens up many new ways to gain business insight with less IT infrastructure necessary to achieve those goals. Data virtualization can become the backbone for advanced analytics and modern applications. The IBM Data Virtualization Manager for z/OS (DVM) can be used as a stand-alone product or as a utility that is used by other products. Its goal is to enable access to live mainframe transaction data and make it usable by any application. This 〈〈 this what?〉〉 enables customers to use the strengths of mainframe processing with new agile applications. Additionally, its modern development environment and code-generating capabilities enable any developer to update, access, and combine mainframe data easily by using modern APIs and languages. If data is the foundation for building new insights, IBM DVM is a key tool for providing easy, cost-efficient access to that foundation.
    Note: Online resource; Title from title page (viewed April 13, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    ISBN: 9780738459653
    Language: English
    Pages: 1 online resource (1000 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® publication covers IBM TS7700 R5.1. The IBM TS7700 is part of a family of IBM Enterprise tape products. This book is intended for system architects and storage administrators who want to integrate their storage systems for optimal operation. Building on over 20 years of virtual tape experience, the TS7770 supports the ability to store virtual tape volumes in an object store. The TS7700 supported off loading to physical tape for over two decades. Off loading to physical tape behind a TS7700 is utilized by hundreds of organizations around the world. By using the same hierarchical storage techniques, the TS7700 (TS7770 and TS7760) can also off load to object storage. Because object storage is cloud-based and accessible from different regions, the TS7700 Cloud Storage Tier support essentially allows the cloud to be an extension of the grid. As of this writing, the TS7700C supports the ability to off load to IBM Cloud® Object Storage and Amazon S3. This publication explains features and concepts that are specific to the IBM TS7700 as of release R5.1. The R5.1 microcode level provides IBM TS7700 Cloud Storage Tier enhancements, IBM DS8000® Object Storage enhancements, Management Interface dual control security, and other smaller enhancements. The R5.1 microcode level can be installed on the IBM TS7770 and IBM TS7760 models only. TS7700 provides tape virtualization for the IBM z environment. Tape virtualization can help satisfy the following requirements in a data processing environment: Improved reliability and resiliency Reduction in the time that is needed for the backup and restore process Reduction of services downtime that is caused by physical tape drive and library outages Reduction in cost, time, and complexity by moving primary workloads to virtual tape Increased efficient procedures for managing daily batch, backup, recall, and restore processing On-premises and off-premises object store cloud storage support as an alternative to physical tape for archive and disaster recovery New and existing capabilities of the TS7700 5.1 include the following highlights: Eight-way Grid Cloud, which consists of up to three generations of TS7700 Synchronous and asynchronous replication Full AES256 encryption for replication data that is in-flight and at-rest Tight integration with IBM Z and DFSMS policy management Optional target for DS8000 Transparent Cloud Tier using DFSMS DS8000 Object Store AES256 in-flight encryption and compressi...
    Note: Online resource; Title from title page (viewed May 4, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738459783
    Language: English
    Pages: 1 online resource (42 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: With IBM® Spectrum Virtualize and the Object-Based Access Control, you can implement multi-tenancy and secure storage usage in a Red Hat OpenShift environment. This IBM Redpaper® publication shows you how to secure the storage usage from the Openshift user to the IBM Spectrum® Virtualize array. You see how to restrict storage usage in a Red Hat Openshift Container Platform to avoid the over-consumption of storage by one or more user. These uses cases can be expanded to the use of this control to provide assistance with billing.
    Note: Online resource; Title from title page (viewed June 18, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    ISBN: 9780738459325
    Language: English
    Pages: 1 online resource (88 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redpaper publication focuses on data orchestration in enterprise data pipelines. It provides details about data orchestration and how to address typical challenges that customers face when dealing with large and ever-growing amounts of data for data analytics. While the amount of data increases steadily, artificial intelligence (AI) workloads must speed up to deliver insights and business value in a timely manner. This paper provides a solution that addresses these needs: Data Accelerator for AI and Analytics (DAAA). A proof of concept (PoC) is described in detail. This paper focuses on the functions that are provided by the Data Accelerator for AI and Analytics solution, which simplifies the daily work of data scientists and system administrators. This solution helps increase the efficiency of storage systems and data processing to obtain results faster while eliminating unnecessary data copies and associated data management.
    Note: Online resource; Title from title page (viewed January 20, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    ISBN: 9780738459387
    Language: English
    Pages: 1 online resource (32 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redpaper publication provides guidance on building an enterprise-grade data lake by using IBM Spectrum® Scale and Cloudera Data Platform (CDP) Private Cloud Base for performing in-place Cloudera Hadoop or Cloudera Spark-based analytics. It also covers the benefits of the integrated solution and gives guidance about the types of deployment models and considerations during the implementation of these models.
    Note: Online resource; Title from title page (viewed April 23, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    ISBN: 9780738459707
    Language: English
    Pages: 1 online resource (592 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: This IBM® Redbooks® publication captures several of the preferred practices and describes the performance gains that can be achieved by implementing the IBM FlashSystem products. These practices are based on field experience. This book highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools and managed disks, volumes, remote copy services, and hosts. It explains how you can optimize disk performance with the IBM System Storage® Easy Tier® function. It also provides preferred practices for monitoring, maintaining, and troubleshooting. This book is intended for experienced storage, SAN, IBM FlashSystem, SAN Volume Controller (SVC), and IBM Storwize® administrators and technicians. Understanding this book requires advanced knowledge of these environments.
    Note: Online resource; Title from title page (viewed May 14, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738459790
    Language: English
    Pages: 1 online resource (16 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The focus of this Blueprint is to demonstrate how IBM FlashSystem® with IBM Spectrum® Virtualize can be used as a preferred back-end persistent storage for VMware Tanzu-based deployments. This document describes the use of IBM® FlashSystem storage volumes as virtual volumes (vVols) that are made available to provision persistent volumes for a VMware Tanzu deployment. All models of IBM FlashSystem family are supported by this document, including: FlashSystem 9100 and 9200 FlashSystem 7200 FlashSystem 5000 IBM SAN Volume Controller All storage that is running IBM Spectrum Virtualize software By using IBM Spectrum Connect VASA provider with IBM Spectrum Virtualize, the vVols are used to create a data store under vCenter. Post provisioning of VMware Tanzu Kubernetes grid service (TKGS), the vVols data store is used to provision the persistent volumes for future applications that are deployed on the worker nodes.
    Note: Online resource; Title from title page (viewed June 16, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    ISBN: 9780738460000
    Language: English
    Pages: 1 online resource (466 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® RedpaperRedbooks® publication describes the concepts, architecture, and implementation of the IBM DS8900F family. The WhitepaperRedpaperbook provides reference information to assist readers who need to plan for, install, and configure the DS8900F systems. This edition applies to DS8900F systems with IBM DS8000® Licensed Machine Code (LMC) 7.9.20 (bundle version 89.20.xx.x), referred to as Release 9.2. The DS8900F is an all-flash system exclusively, and it offers three classes: DS8980F: Analytic Class: The DS8980F Analytic Class offers best performance for organizations that want to expand their workload possibilities to artificial intelligence (AI), Business Intelligence (BI), and machine learning (ML). IBM DS8950F: Agility Class all-flash: The Agility Class consolidates all your mission-critical workloads for IBM Z®, IBM LinuxONE, IBM Power Systems, and distributed environments under a single all-flash storage solution.. IBM DS8910F: Flexibility Class all-flash: The Flexibility Class reduces complexity while addressing various workloads at the lowest DS8900F family entry cost. . TThe DS8900F architecture relies on powerful IBM POWER9™ processor-based servers that manage the cache to streamline disk input/output (I/O), which maximizes performance and throughput. These capabilities are further enhanced by High-Performance Flash Enclosures (HPFE) Gen2. Like its predecessors, the DS8900F supports advanced disaster recovery (DR) solutions, business continuity solutions, and thin provisioning. The IBM DS8910F Rack-Mounted model 993 is described in IBM DS8910F Model 993 Rack-Mounted Storage System Release 9.1, REDP-5566.
    Note: Online resource; Title from title page (viewed September 9, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738459967
    Language: English
    Pages: 1 online resource (36 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks Product Guide provides an overview of the features and functions that are available with the IBM DS8900F models that run microcode Release 9.2 (Bundle 89.20 / Licensed Machine Code 7.9.20). As of August 2021, the DS8900F with DS8000 Release 9.2 is the latest addition. The DS8900F is an all-flash system exclusively, and it offers three classes: IBM DS8980F: Analytic Class: The DS8980F Analytic Class offers best performance for organizations that want to expand their workload possibilities to artificial intelligence (AI), Business Intelligence, and Machine Learning. IBM DS8950F: Agility Class: The agility class is efficiently designed to consolidate all your mission-critical workloads for IBM Z, IBM LinuxONE, IBM Power Systems, and distributed environments under a single all-flash storage solution.. IBM DS8910F: Flexibility Class: The flexibility class delivers significant performance for midrange organizations that are looking to meet storage challenges with advanced functionality delivered as a single rack solution.
    Note: Online resource; Title from title page (viewed August 30, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738459875
    Language: English
    Pages: 1 online resource (52 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: The focus of this document is to demonstrate an early threat detection by using IBM® QRadar® and the Safeguarded Copy feature that is available as part of IBM FlashSystem® and IBM SAN Volume Controller. Such early detection protects and quickly recovers the data if a cyberattack occurs. This document describes integrating IBM FlashSystem audit logs with IBM QRadar, and the configuration steps for IBM FlashSystem and IBM QRadar. It also explains how to use the IBM QRadar's device support module (DSM) editor to normalize events and assign IBM QRadar identifier (QID) map to the events. Post IBM QRadar configuration, we review configuring Safeguarded Copy on the application volumes by using volume groups and applying Safeguarded backup polices on the volume group. Finally, we demonstrate the use of orchestration software IBM Copy Services Manager to start a recovery, restore operations for data restoration on online volumes, and start a backup of data volumes.
    Note: Online resource; Title from title page (viewed August 17, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    ISBN: 9780738460017
    Language: English
    Pages: 1 online resource (68 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, when combined with the log analysis, deep inspection, and detection of threats that are provided by IBM QRadar®, help reduce the impact of incidents on business data. Such integration provides an excellent platform for hosting unstructured business data that is subject to regulatory compliance requirements. This paper describes how IBM Spectrum Scale File Audit Logging can be integrated with IBM QRadar. Using IBM QRadar, an administrator can monitor, inspect, detect, and derive insights for identifying potential threats to the data that is stored on IBM Spectrum Scale. When the threats are identified, you can quickly act on them to mitigate or reduce the impact of incidents. We further demonstrate how the threat detection by IBM QRadar can proactively trigger data snapshots or cyber resiliency workflow in IBM Spectrum Scale to protect the data during threat. This third edition has added the section "Ransomware threat detection", where we describe a ransomware attack scenario within an environment to leverage IBM Spectrum Scale File Audit logs integration with IBM QRadar. This paper is intended for chief technology officers, solution engineers, security architects, and systems administrators. This paper assumes a basic understanding of IBM Spectrum Scale and IBM QRadar and their administration.
    Note: Online resource; Title from title page (viewed September 13, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738459998
    Language: English
    Pages: 1 online resource (34 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: IBM® Storage as a Service (STaaS) extends your hybrid cloud experience with a new flexible consumption model enabled for both your on-premises and hybrid cloud infrastructure needs, giving you the agility, cash flow efficiency, and services of cloud storage with the flexibility to dynamically scale up or down and only pay for what you use beyond the minimal capacity. This IBM Redpaper provides a detailed introduction to the IBM STaaS service. The paper is targeted for data center managers and storage administrators.
    Note: Online resource; Title from title page (viewed October 28, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    ISBN: 9780738460086
    Language: English
    Pages: 1 online resource (144 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: IBM® Z has a close and unique relationship to its storage. Over the years, improvements to the Z processors and storage software, the disk storage systems, and their communication architecture consistently reinforced this synergy. This IBM Redpaper publication summarizes and highlights the various aspects, advanced functions, and technologies that are often pioneered by IBM, and that make the IBM Z® and the IBM DS8000 products an ideal combination. This paper is intended for users who have some familiarity with IBM Z and the IBM DS8000® series and want a condensed but comprehensive overview of the synergy items up to the IBM z15™ server with z/OS v2.5 and the IBM DS8900 Release 9.2 firmware.
    Note: Online resource; Title from title page (viewed October 28, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    ISBN: 9780738460161
    Language: English
    Pages: 1 online resource (138 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: IBM DFSMS and the IBM DS8000 added functionality to provide elements of serverless data movement, and for IBM z/OS® to communicate with a storage cloud. The function is known as Transparent Cloud Tiering and is composed of the following key elements: A gateway in the DS8000, which allows the movement of data to and from Object Storage by using a network connection, with the option to encrypt data in the Cloud. DFSMShsm enhancements to support Migrate and Recall functions to and from the Object Storage. Other commands were enhanced to monitor and report on the new functionality. DFSMShsm uses the Web Enablement toolkit for z/OS to create and access the metadata for specific clouds, containers, and objects. DFSMSdss enhancements to provide some basic backup and restore functions to and from the cloud. The IBM TS7700 can also be set up to act as if it were cloud storage from the DS8000 perspective. This IBM Redbooks publication is divided into the following parts: Part 1 provides you with an introduction to clouds. Part 2 shows you how we set up the Transparent Cloud Tiering in a controlled laboratory and how the new functions work. We provide points to consider to help you set up your storage cloud and integrate it into your operational environment. Part 3 shows you how we used the new functionality to communicate with the cloud and to send data and retrieve data from it.. This edition applies to DS8900F Release 9.2 and covers more recent features of TCT such as multi-cloud connections. along with additional advice for high availabilty cloud connectivity and DFSMShsm improvements.
    Note: Online resource; Title from title page (viewed December 1, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    ISBN: 9780738459332
    Language: English
    Pages: 1 online resource (78 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: In this IBM® Redpaper publication, we focus on the importancequality. This paper explains how this testing can be achieved only in an effective and efficient way by autenable such automation. We specifically focus on Galasa. Galasa is an open-source deep integration test framework for hybrid cloud applications that allows teams to automate tests to run as part of a DevOps pipeline. Galasa was built as an integration test framework to test applications spanning multiple platforms as part of a hybrid multi-cloud. It also integrates all the test tools that are needed to test such an application. This feature gives you a single test catalog, single endpoint to run tests and a single UI to review the reports from those tests. These enterprise-level features are key to unlocking the value of your automation and allow you to deliver your DevOps journey.
    Note: Online resource; Title from title page (viewed March 29, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    ISBN: 9780738459592
    Language: English
    Pages: 1 online resource (572 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: This IBM® Redbooks® publication describes several of the preferred practices and describes the performance gains that can be achieved by implementing the IBM SAN Volume Controller powered by IBM Spectrum® Virtualize V8.4. These practices are based on field experience. This book highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools, and managed disks, volumes, Remote Copy services, and hosts. Then, it provides performance guidelines for IBM SAN Volume Controller, back-end storage, and applications. It explains how you can optimize disk performance with the IBM System Storage Easy Tier® function. It also provides preferred practices for monitoring, maintaining, and troubleshooting IBM SAN Volume Controller. This book is intended for experienced storage, SAN, and IBM SAN Volume Controller administrators and technicians. Understanding this book requires advanced knowledge of the IBM SAN Volume Controller, IBM FlashSystem, and SAN environments.
    Note: Online resource; Title from title page (viewed April 16, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    ISBN: 9780738459530
    Language: English
    Pages: 1 online resource (72 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Modernization of enterprise IT applications and infrastructure is key to the survival of organizations. It is no longer a matter of choice. The cost of missing out on business opportunities in an intensely competitive market can be enormous. To aid in their success, organizations are facing increased encouragement to embrace change. They are pushed to think of new and innovative ways to counter, or offer, a response to threats that are posed by competitors who are equally as aggressive in adopting newer methods and technologies. The term modernization often varies in meaning based on perspective. This IBM® Redbooks® publication focuses on the technological advancements that unlock computing environments that are hosted on IBM Z® to enable secure processing at the core of hybrid. This publication is intended for IT executives, IT managers, IT architects, System Programmers, and Application Developer professionals.
    Note: Online resource; Title from title page (viewed March 15, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    ISBN: 9780738459196
    Language: English
    Pages: 1 online resource (488 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: IBM® Spectrum Protect Plus is a data protection solution that provides near-instant recovery, replication, retention management, and reuse for virtual machines, databases, and applications backups in hybrid multicloud environments. IBM Knowledge Center for IBM Spectrum® Protect Plus provides extensive documentation for installation, deployment, and usage. In addition, build and size an IBM Spectrum Protect Plus solution. The goal of this IBM Redpaper® publication is to summarize and complement the available information by providing useful hints and tips that are based on the authors' practical experience in installing and supporting IBM Spectrum Protect Plus in customer environments. Over time, our aim is to compile a set of best practices that cover all aspects of the product, from planning and installation to tuning, maintenance, and troubleshooting.
    Note: Online resource; Title from title page (viewed March 31, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    ISBN: 9780738459264
    Language: English
    Pages: 1 online resource (486 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM Redbooks publication describes the concepts, architecture, and implementation of the IBM DS8900F family. The book provides reference information to assist readers who need to plan for, install, and configure the DS8900F systems. This edition applies to DS8900F systems with IBM DS8000® Licensed Machine Code (LMC) 7.9.10 (bundle version 89.10.xx.x), referred to as Release 9.1. The DS8900F family offers two classes: IBM DS8910F: Flexibility Class all-flash: The Flexibility Class is designed to reduce complexity while addressing various workloads at the lowest DS8900F family entry cost. IBM DS8950F: Agility Class all-flash: The Agility Class is designed to consolidate all your mission-critical workloads for IBM Z®, IBM LinuxONE, IBM Power Systems, and distributed environments under a single all-flash storage solution. The DS8900F architecture relies on powerful IBM POWER9™ processor-based servers that manage the cache to streamline disk input/output (I/O), which maximizes performance and throughput. These capabilities are further enhanced by High-Performance Flash Enclosures (HPFE) Gen2. Like its predecessors, the DS8900F supports advanced disaster recovery (DR) solutions, business continuity solutions, and thin provisioning. The IBM DS8910F Rack-Mounted model 993 is described in a separate publication: IBM DS8910F Model 993 Rack-Mounted Storage System Release 9.1, REDP-5566.
    Note: Online resource; Title from title page (viewed April 22, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...