Becoming a Salesforce Certified Technical Architect - Second Edition
Gain practical experience designing and building high-performance, secure, and scalable Salesforce solutions using real-world scenarios.Purchase of the book unlocks access to web-based exam prep resources like flashcards and a free eBook PDF.Key Features: Master each knowledge domain by applying key concepts to a real-world scenarioPut all the skills covered in the book into action with two full mock scenariosGain access to additional online assets including flashcards and exam tipsBook Description: This book is a complete guide to learning essential architectural concepts that'll enable you to deliver secure, high-performant Salesforce solutions and pass the Salesforce CTA review board exam with confidence. This second edition comes with updated content, additional supporting material such as cheat sheets, and detailed practical examples, and helps you learn key soft skills to craft a winning presentation.You'll begin by reviewing vital architectural concepts needed to create a scalable end-to-end Salesforce solution. Next, you'll find out how to identify requirements and break down a problem into smaller, more solvable parts. As you advance, you'll gain practical experience in managing design decisions and defending them using real-world scenarios. The book also helps familiarize you with the correct methodology to structure your solution presentation and the necessary supporting artifacts. Finally, you'll practice providing solutions for two full hypothetical scenarios and structuring your playback step by step.By the end of this Salesforce book, you'll be able to design a highly scalable Salesforce solution and create suitable material to comfortably explain the end-to-end solution to the CTA review board and potentially your customer, and have a higher chance of passing.What You Will Learn: Explore core architectural concepts essential for any Salesforce architectUnderstand Salesforce knowledge domains using practical examplesPractice creating solutions using scenarios focusing on particular knowledge domainsDiscover key artifacts needed to document and explain an end-to-end solutionApply data life cycle management effectively in the Salesforce ecosystemDesign appropriate enterprise integration interfaces to build your connected solutionKnow what to expect on the day of the review board along with valuable tips and tricksWho this book is for: This book is for Salesforce architects who want to design secure, performant, and scalable technical solutions for their organizations and ultimately become Salesforce Certified Technical Architects. A solid understanding of the Salesforce platform is required, ideally combined with three to five years of practical experience as an application architect, system architect, enterprise architect, or solution architect.
Control, Optimization, and Mathematical Modeling of Complex Systems
Complex systems have long been an integral part of modern life and can be encountered everywhere. Undertaking a comprehensive study of such systems is a challenging problem, one which is impossible to solve without the use of contemporary mathematical modeling techniques. Mathematical models form the basis for the optimal design and control of complex systems. The present reprint contains all the articles accepted and published in the Special Issue of Mathematics entitled "Control, Optimization, and Mathematical Modeling of Complex Systems". This Special Issue is focused on recent theoretical and computational studies of complex systems modeling, control, and optimization. The topics addressed in this Special Issue cover a wide range of areas, including numerical simulation in physical, social, and life sciences; the modeling and analysis of complex systems based on mathematical methods and AI/ML approaches; control problems in robotics; design optimization of complex systems, modeling in economics and social sciences; stochastic models in physics and engineering; mathematical models in material science; and high-performance computing for mathematical modeling. It is our hope that the scientific results presented in this reprint will serve as valuable sources of documentation and inspiration to those seeking to delve into complex systems modeling, control, and optimization and examine their wide-ranging applications.
Bioinformatics
This book contains the latest material in the subject, covering NGS applications and meeting the requirements of a complete semester course. This book provides both concept and practice to satisfy the exact need of researchers seeking to use NGS data reprocessing, genome assembly, variant discovery, gene profiling, epigenetics, and metagenomics.
Translational Application of Artificial Intelligence in Healthcare
In the era of 'Algorithmic Medicine, ' the integration of Artificial Intelligence (AI) in healthcare holds immense potential to address critical challenges faced by the industry. This textbook goes beyond theoretical discussions to outline practical steps for transitioning
Computational Science - Iccs 2023
The five-volume set LNCS 14073-14077 constitutes the proceedings of the 23rd International Conference on Computational Science, ICCS 2023, held in Prague, Czech Republic, during July 3-5, 2023. The total of 188 full papers and 94 short papers presented in this book set were carefully reviewed and selected from 530 submissions. 54 full and 37 short papers were accepted to the main track; 134 full and 57 short papers were accepted to the workshops/thematic tracks. The theme for 2023, "Computation at the Cutting Edge of Science", highlights the role of Computational Science in assisting multidisciplinary research. This conference was a unique event focusing on recent developments in scalable scientific algorithms, advanced software tools; computational grids; advanced numerical methods; and novel application areas. These innovative novel models, algorithms, and tools drive new science through efficient application in physical systems, computational andsystems biology, environmental systems, finance, and others.
Computational Science - Iccs 2023
The five-volume set LNCS 14073-14077 constitutes the proceedings of the 23rd International Conference on Computational Science, ICCS 2023, held in Prague, Czech Republic, during July 3-5, 2023. The total of 188 full papers and 94 short papers presented in this book set were carefully reviewed and selected from 530 submissions. 54 full and 37 short papers were accepted to the main track; 134 full and 57 short papers were accepted to the workshops/thematic tracks. The theme for 2023, "Computation at the Cutting Edge of Science", highlights the role of Computational Science in assisting multidisciplinary research. This conference was a unique event focusing on recent developments in scalable scientific algorithms, advanced software tools; computational grids; advanced numerical methods; and novel application areas. These innovative novel models, algorithms, and tools drive new science through efficient application in physical systems, computational andsystems biology, environmental systems, finance, and others.
Computational Science - Iccs 2023
The five-volume set LNCS 14073-14077 constitutes the proceedings of the 23rd International Conference on Computational Science, ICCS 2023, held in Prague, Czech Republic, during July 3-5, 2023. The total of 188 full papers and 94 short papers presented in this book set were carefully reviewed and selected from 530 submissions. 54 full and 37 short papers were accepted to the main track; 134 full and 57 short papers were accepted to the workshops/thematic tracks. The theme for 2023, "Computation at the Cutting Edge of Science", highlights the role of Computational Science in assisting multidisciplinary research. This conference was a unique event focusing on recent developments in scalable scientific algorithms, advanced software tools; computational grids; advanced numerical methods; and novel application areas. These innovative novel models, algorithms, and tools drive new science through efficient application in physical systems, computational andsystems biology, environmental systems, finance, and others.
Translational Application of Artificial Intelligence in Healthcare
In the era of 'Algorithmic Medicine, ' the integration of Artificial Intelligence (AI) in healthcare holds immense potential to address critical challenges faced by the industry. This textbook goes beyond theoretical discussions to outline practical steps for transitioning
The NFT Revolution in 50 Use Cases
Similar to the internet in the 2000s, the technological revolution of NFTs was accompanied by an unprecedented speculative bubble. In 2021-2022, speculation was running rampant, with some NFTs selling for millions of dollars. They were making headlines in the media, and it's highly likely that you first heard about them during that time. While we can appreciate this sudden visibility, it's important to move away from certain clich矇s. No, NFTs are not just million-dollar JPEG images... And no, they are not limited to the art world either. Speculation is inherent in the early stages of any new technology, so we shouldn't blame this controversial image. Instead, we should seek to understand. And for those of you reading these lines, understand this: NFTs are a technology that will disrupt our daily lives, just like the internet does today. For the first time in history, NFTs allow us to create digital scarcity. Imagine that! It's a true paradigm shift, much like the birth of social networks two decades ago. And we're only at the beginning... By reading this book, you too will be part of this incredible revolution. TABLE OF CONTENTS: 1. - REAL ESTATE 2. - MUSIC 3. - SUPPLY CHAIN 4. - SOCIAL MEDIA 5. - DOMAIN NAMES 6. - BOOKS 7. - EMAILS 8. - HEALTH 9. - DIPLOMAS AND CVs 10. - TICKETS 11. - THE VOTE 12. - GAMING 13. - DIGITAL ART 14.☔ - INSURANCE 15. - DONATIONS AND ASSOCIATIONS 16. - POLITICS 17.⚽ - WORLD OF SPORTS 18. - PRECIOUS METALS 19. - ADMINISTRATION 20. - PHOTOGRAPHY 21. - MARKETING 22. - PORNOGRAPHY 23. - LOYALTY PROGRAMS 24. - CINEMA 25. ⚖ - JUSTICE 26. - CARS 27. - FASHION 28.⌚ - LUXURY WATCHES 29. - DIGITAL IDENTITY 30. - WINE 31. - GOVERNANCE (DAO) 32. - SCIENCE 33. - E-COMMERCE 34. - MUSEUMS AND EXHIBITIONS 35. - FINANCE 36. - METAVERSE 37. - COLLECTIBLE CARDS 38. - ECOLOGY 39. - MEDIA 40.⛩ - TOURISM 41.✅ - PERSONAL DATA 42. - INTELLECTUAL PROPERTY 43.✍ - NOTARIES 44. - ONLINE REVIEWS 45. - EDUCATION 46. - POLLS AND PETITIONS 47. - GAMBLING 48. - SOULBOUND TOKENS 49. - AI AND DEEPFAKE 50.❌ - SCAMS AND FRAUDS
Humberto Maturana
This volume is grounded in a deep appreciation of the rich and cohesive constellation of ideas developed by Humberto Maturana which, taken as a whole, can be understood as a biocultural matrix of human understanding. As a way of thinking, these ideas comprise an epistemological shift that changes the way we regard 'reality' as we are compelled by his work to consider not only how we do what we do, but also how we know what we know.The backgrounds of the contributing authors reveal how Maturana's work resonates with a variety of domains that range from art to family therapy, from education to organizational life, and from biology to dialogue. At the same time, these authors offer transdisciplinary perspectives rooted in cybernetic understanding. The papers in this volume invite us to reflect on Maturana's contributions to our ways of being in the world, and of constituting and living in the worlds we create.
Peripheral Vision
How the S-C 4020--a mainframe peripheral intended to produce scientific visualizations--shaped a series of early computer art projects that emerged from Bell Labs. In 1959, the electronics manufacturer Stromberg-Carlson produced the S-C 4020, a device that allowed mainframe computers to present and preserve images. In the mainframe era, the output of text and image was quite literally peripheral; the S-C 4020--a strange and elaborate apparatus, with a cathode ray screen, a tape deck, a buffer unit, a film camera, and a photo-paper camera--produced most of the computer graphics of the late 1950s and early 1960s. At Bell Laboratories in Murray Hill, New Jersey, the S-C 4020 became a crucial part of ongoing encounters among art, science, and technology. In this book, Zabet Patterson examines the extraordinary uses to which the Bell Labs SC-2040 was put between 1961 and 1972, exploring a series of early computer art projects shaped by the special computational affordances of the S-C 4020. The S-C 4020 produced tabular data, graph plotting and design drawings, grid projections, and drawings of axes and vectors; it made previously impossible visualizations possible. Among the works Patterson describes are E. E. Zajac's short film of an orbiting satellite, which drew on the machine's graphic capacities as well as the mainframe's calculations; a groundbreaking exhibit of "computer generated pictures" by B矇la Julesz and Michael Noll, two scientists interested in visualization; animations by Kenneth Knowlton and the Bell Labs artist-in-residence Stan VanDerBeek; and Lillian Schwartz's "cybernetic" film Pixillation. Arguing for the centrality of a peripheral, Patterson makes a case for considering computational systems not simply as machines but in their cultural and historical context.
Mary Catherine Bateson
In bringing cybernetic insights to her work as a cultural anthropologist, Mary Catherine Bateson inspired new ways of thinking about contemporary global challenges. This collection of essays from authors representing a range of disciplines from anthropology to design to creativity and spirituality, as well as transdisciplinary perspectives that are at the heart of cybernetics, honours Mary Catherine's life and work. Just as Mary Catherine found resonance in the metaphor of composing as a creative process that unfolds over time in response to ever-changing contingencies, these essays bring forth and build upon the many themes from her work, such as interdependence, reflexivity, continuity/discontinuity, and cybernetics as a living process, recombining them in new ways to offer novel insights.
Security Orchestration, Automation, and Response for Security Analysts
Become a security automation expert and build solutions that save time while making your organization more secureKey Features: What's insideAn exploration of the SOAR platform's full features to streamline your security operationsLots of automation techniques to improve your investigative abilityActionable advice on how to leverage the capabilities of SOAR technologies such as incident management and automation to improve security postureBook Description: What your journey will look likeWith the help of this expert-led book, you'll become well versed with SOAR, acquire new skills, and make your organization's security posture more robust.You'll start with a refresher on the importance of understanding cyber security, diving into why traditional tools are no longer helpful and how SOAR can help.Next, you'll learn how SOAR works and what its benefits are, including optimized threat intelligence, incident response, and utilizing threat hunting in investigations.You'll also get to grips with advanced automated scenarios and explore useful tools such as Microsoft Sentinel, Splunk SOAR, and Google Chronicle SOAR.The final portion of this book will guide you through best practices and case studies that you can implement in real-world scenarios.By the end of this book, you will be able to successfully automate security tasks, overcome challenges, and stay ahead of threats.What You Will Learn: Reap the general benefits of using the SOAR platformTransform manual investigations into automated scenariosLearn how to manage known false positives and low-severity incidents for faster resolutionExplore tips and tricks using various Microsoft Sentinel playbook actionsGet an overview of tools such as Palo Alto XSOAR, Microsoft Sentinel, and Splunk SOARWho this book is for: You'll get the most out of this book ifYou're a junior SOC engineer, junior SOC analyst, a DevSecOps professional, or anyone working in the security ecosystem who wants to upskill toward automating security tasksYou often feel overwhelmed with security events and incidentsYou have general knowledge of SIEM and SOAR, which is a prerequisiteYou're a beginner, in which case this book will give you a head startYou've been working in the field for a while, in which case you'll add new tools to your arsenal
Recent Advances in Theory and Application of Dynamical Systems
Dynamical system theory has been widely used to study scientific problems. The purpose of this reprint is to introduce the latest research results related to dynamical system theory. This reprint is a reference for researchers engaged in applied mathematics, biomathematics and related fields.
Formal Methods for Software Engineering
Software programs are formal entities with precise meanings independent of their programmers, so the transition from ideas to programs necessarily involves a formalisation at some point. The first part of this graduate-level introduction to formal methods develops an understanding of what constitutes formal methods and what their place is in Software Engineering. It also introduces logics as languages to describe reasoning and the process algebra CSP as a language to represent behaviours. The second part offers specification and testing methods for formal development of software, based on the modelling languages CASL and UML. The third part takes the reader into the application domains of normative documents, human machine interfaces, and security. Use of notations and formalisms is uniform throughout the book. Topics and features: Explains foundations, and introduces specification, verification, and testing methods Exploresvarious application domains Presents realistic and practical examples, illustrating concepts Brings together contributions from highly experienced educators and researchers Offers modelling and analysis methods for formal development of software Suitable for graduate and undergraduate courses in software engineering, this uniquely practical textbook will also be of value to students in informatics, as well as to scientists and practical engineers, who want to learn about or work more effectively with formal theories and methods. Markus Roggenbach is a Professor in the Dept. of Computer Science of Swansea University. Antonio Cerone is an Associate Professor in the Dept. of Computer Science of Nazarbayev University, Nur-Sultan. Bernd-Holger Schlingloff is a Professor in the Institut f羹r Informatik of Humboldt-Universit瓣t zu Berlin. Gerardo Schneider is a Professor in the Dept. of Computer Science and Engineering of University of Gothenburg. Siraj Ahmed Shaikh is a Professor in the Institute for Future Transport and Cities of Coventry University.The companion site for the book offers additional resources, including further material for selected chapters, prepared lab classes, a list of errata, slides and teaching material, and virtual machines with preinstalled tools and resources for hands-on experience with examples from the book. The URL is: https: //sefm-book.github.io
Elements of Digital Transformation
As modern enterprises are accelerating the digital transformation process to modernize their core technology capabilities and processes, the book serves as a practitioner's guide for the modern enterprises. It discusses such key tenets of the digital transformation as digital transformation process, principles and proven methods.
Swarms and Network Intelligence
This reprint covers a wide range of topics related to collective intelligence, exploring the interplay between swarm intelligence, network intelligence, and other emerging technologies. The first set of chapters focuses on the behavior and mechanisms of swarming. One chapter describes a locust-inspired model of collective marching on rings, while another demonstrates the experimental validation of entropy-driven swarm exploration under sparsity constraints using sparse Bayesian learning. These studies provide new insights into the principles of swarming and its potential applications in fields such as robotics and mobile crowdsensing. The next set of chapters discusses the integration of swarm intelligence with other emerging technologies such as deep learning and graph theory. These studies show how swarm intelligence can be combined with other advanced technologies to solve complex problems and improve decision-making processes. The reprint also covers the topic of network intelligence, including the study of social network analysis, Twitter user activity, and crowd-sourced financial predictions. These studies provide insights into how network intelligence can be harnessed to understand social dynamics and improve decision-making processes in various domains. The reprint concludes with a chapter that proposes a generative design approach for the efficient mathematical modeling of complex systems.
Parallel Computational Technologies
This book constitutes the refereed post proceedings of the 17th International Conference on Parallel Computational Technologies, PCT 2023, held in Saint Petersburg, Russia, during March 28-30, 2023.The 25 full papers included in this book were carefully reviewed and selected from 71 submissions. They were organized in topical sections as follows: "High Performance Architectures, Tools and Technologies", "Parallel Numerical Algorithms", and "Supercomputer Simulation".
Advances in Computing and Data Sciences
This book constitutes the refereed proceedings of the 7th International Conference on Advances in Computing and Data Sciences, ICACDS 2023, held in Kolkata, India, during April 27-28, 2023. The 47 full papers included in this book were carefully reviewed and selected from 22 submissions. The papers focus on advances of next generation computing technologies in the areas of advanced computing and data sciences.
Modern Distributed Tracing in .NET
Instrument .NET apps using OpenTelemetry and explore logs and .NET diagnostic tools to debug, monitor, and analyze the performance of complex systems in the cloudPurchase of the print or Kindle book includes a free PDF eBookKey Features: Get a clear understanding of complex systems using .NET and OpenTelemetryAdopt a systematic approach toward performance analysis and debuggingExplore instrumentation techniques for common distributed patternsBook Description: As distributed systems become more complex and dynamic, their observability needs to grow to aid the development of holistic solutions for performance or usage analysis and debugging. Distributed tracing brings structure, correlation, causation, and consistency to your telemetry, thus allowing you to answer arbitrary questions about your system and creating a foundation for observability vendors to build visualizations and analytics.Modern Distributed Tracing in .NET is your comprehensive guide to observability that focuses on tracing and performance analysis using a combination of telemetry signals and diagnostic tools. You'll begin by learning how to instrument your apps automatically as well as manually in a vendor-neutral way. Next, you'll explore how to produce useful traces and metrics for typical cloud patterns and get insights into your system and investigate functional, configurational, and performance issues. The book is filled with instrumentation examples that help you grasp how to enrich auto-generated telemetry or produce your own to get the level of detail your system needs, along with controlling your costs with sampling, aggregation, and verbosity.By the end of this book, you'll be ready to adopt and leverage tracing and other observability signals and tools and tailor them to your needs as your system evolves.What You Will Learn: Understand the core concepts of distributed tracing and observabilityAuto-instrument .NET applications with OpenTelemetryManually instrument common scenarios with traces and metricsSystematically debug issues and analyze the performanceKeep performance overhead and telemetry volume under controlAdopt and evolve observability in your organizationWho this book is for: This book is for software developers, architects, and systems operators running .NET services who want to use modern observability tools and standards and take a holistic approach to performance analysis and end-to-end debugging. Software testers and support engineers will also find this book useful. Basic knowledge of the C# programming language and .NET platform is assumed to grasp the examples of manual instrumentation, but it is not necessary.
Information Signals Processing and Transmitting
Author trying to show what is what art is and how it can be economically transmitted without spoiling the main thing. What is meant here is that Art is that what remains.
Information Signals Processing and Transmitting
Author trying to show what is what art is and how it can be economically transmitted without spoiling the main thing. What is meant here is that Art is that what remains.
Advancement of Mathematical Methods in Feature Representation Learning for Artificial Intelligence, Data Mining and Robotics
The present reprint contains 33 articles accepted and published in the Special Issue entitled "Advancement of Mathematical Methods in Feature Representation Learning for Artificial Intelligence, Data Mining and Robotics, 2022" in the MDPI journal, Mathematics, which covers a wide range of topics connected to the theory and applications of feature representation learning for image processing, artificial intelligence, data mining and robotics. These topics include, among others, elements from image blurring, image aesthetic quality assessment, pedestrian detection, visual tracking, vehicle re-identification, face recognition, 3D reconstruction, the stability of switched systems, domain adaption, deep reinforcement, sentiment analysis, graph convolutional networks, knowledge graphs, geometric metric learning, etc.It is hoped that this reprint will be interesting and useful for those working in the area of image processing, computer vision, machine learning, natural language processing and robotics, as well as for those with backgrounds in machine learning who are willing to become familiar with recent advancements in artificial intelligence, which, today, is present in almost all aspects of human life and activities.
The Busy It Manager's Guide to Data Recovery
Part of any modern defensive IT strategy for a business is guaranteeing data recoverability. Will you, as a busy IT manager, sleep well at night knowing you have a comprehensive plan to enable data recovery? This book focuses on what you need to do to be ready for successful data recovery. And that should help you sleep better at night.
Study and design of a simulator based on a process language
The book deals with the study and design of a multi-agent simulation model based on a concurrent process environment. The aim is to design a distributed simulation model under a concurrent process language, in particular Erlang, and to analyze its feasibility, with a view to achieving a higher level of complexity. Our approach is to show that this model can be adapted to the types of applications that enable us to monitor the evolution of a fish population in space and time in the face of multiple environmental disturbances. The first is to propose a new multi-agent design model in this process environment. The second is to adapt the model to the application context, so that it can be validated with a real example. This work will be partly based on the model initiated in the Rapsodie project, which has shown certain limitations linked to a slow simulation speed and rapid saturation due to the cumbersome nature of the chosen simulation tool (Cormas).
The Busy It Manager's Guide to Data Recovery
No IT manager or worker enjoys being woken up the middle of the night over a system fault. But arguably the worst way to be awakened is over a situation where data loss has occurred - and the recovery is going wrong.The Busy IT Manager's Guide to Data Recovery takes a razor focus on the details IT managers (and their teams) responsible for data recovery and resiliency within their business need to be aware of in the design of robust data protection systems. This book covers key architectural requirements of a data resilient system and the types of technology a business can deploy for data protection that maximises the potential for a successful recovery.With cyber-attacks being a daily challenge for IT and business now, the book also takes an in-depth look at the special considerations companies need to take in order to guarantee the recoverability of data after a destructive cyber event.Regardless of whether your IT infrastructure runs on-premises or in the public cloud, this book gives you the information you need to plan and run a successful data recovery solution that meets your business needs. Preston de Guise has been working with data recovery products for his entire career - designing, implementing, and supporting solutions for governments, universities, and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery, but the management and procedural aspects too.
Latent Modes of Nonlinear Flows
Extracting the latent underlying structures of complex nonlinear local and nonlocal flows is essential for their analysis and modeling. In this Element the authors attempt to provide a consistent framework through Koopman theory and its related popular discrete approximation - dynamic mode decomposition (DMD). They investigate the conditions to perform appropriate linearization, dimensionality reduction and representation of flows in a highly general setting. The essential elements of this framework are Koopman eigenfunctions (KEFs) for which existence conditions are formulated. This is done by viewing the dynamic as a curve in state-space. These conditions lay the foundations for system reconstruction, global controllability, and observability for nonlinear dynamics. They examine the limitations of DMD through the analysis of Koopman theory and propose a new mode decomposition technique based on the typical time profile of the dynamics.
Progress in Laser Accelerator and Future Prospects
The Laser Wakefield Acceleration (LWFA) has advanced the accelerating gradient many orders of magnitude over the conventional technologies. Their application to high energy accelerators has been considered, while a new field of micrometric accelerators appears for medical applications.
10th Anniversary of Axioms
We are honored to announce this reprint, containing contributions from the top experts in the field of logic and fuzzy logic. In total, this reprint consists of 10 papers that were selected from more than 20 submissions. The 10 papers comprising the reprint are the product of re-known experts in fuzzy logic from all over the world, such as Canada, Poland, China, Slovakia, Lithuania, Turkey, Pakistan, Germany, Serbia, Portugal, Taiwan, Norway, India, Saudi Arabia, Thailand, and Mexico. We expect that the papers comprising the Special Issue will contribute to an advancement in the state of the art in the fields of logic and also fuzzy logic.
Analyzing Election Results and Predictions Using Machine Learning
By using the data from assembly choices 2019, we present a process grounded on Feature Engineering and a set of machine learning algorithms to assay and compare the performance by accessing the same dataset. The general principles therefore, won't only aid analysts and intelligencers to present their preceptions more frequently and effectively but also empower the readers, depending on their position of interest and communal engagement to go beyond what is presented and to discover new Preceptivity for themselves.
Mastering Kubernetes - Fourth Edition
Go beyond the basics of Kubernetes and explore more advanced concepts, including Kubernetes in production, governance, serverless computing, and service meshes.Purchase of the print or Kindle book includes a free eBook in PDF format.Key FeaturesMaster Kubernetes architecture and design to build, deploy, and secure large-scale distributed systemsLearn advanced concepts like autoscaling, multi-cluster management, serverless computing, service meshes and policy enginesExplore Kubernetes 1.25 and its rich ecosystem of tools like Kubectl, Krew, K9s, Lens, and HelmBook DescriptionThe fourth edition of the bestseller Mastering Kubernetes includes the most recent tools and code to enable you to learn the latest features of Kubernetes 1.25. This book contains a thorough exploration of complex concepts and best practices to help you master the skills of designing and deploying large-scale distributed systems on Kubernetes clusters.You'll learn how to run complex stateless and stateful microservices on Kubernetes, including advanced features such as horizontal pod autoscaling, rolling updates, resource quotas, and persistent storage backends. In addition, you'll understand how to utilize serverless computing and service meshes.Further, two new chapters have been added. "Governing Kubernetes" covers the problem of policy management, how admission control addresses it, and how policy engines provide a powerful governance solution. "Running Kubernetes in Production" shows you what it takes to run Kubernetes at scale across multiple cloud providers, multiple geographical regions, and multiple clusters, and it also explains how to handle topics such as upgrades, capacity planning, dealing with cloud provider limits/quotas, and cost management.By the end of this Kubernetes book, you'll have a strong understanding of, and hands-on experience with, a wide range of Kubernetes capabilities.What you will learnLearn how to govern Kubernetes using policy enginesLearn what it takes to run Kubernetes in production and at scaleBuild and run stateful applications and complex microservicesMaster Kubernetes networking with services, Ingress objects, load balancers, and service meshesAchieve high availability for your Kubernetes clustersImprove Kubernetes observability with tools such as Prometheus, Grafana, and JaegerExtend Kubernetes with the Kubernetes API, plugins, and webhooksWho this book is forIf you're a system administrator or cloud developer who wants to become comfortable with Kubernetes and would like to master its advanced features, then this book is for you. Software and DevOps engineers with a working knowledge of Kubernetes, as well as technical managers of Kubernetes-based systems, will also find this book useful. Those deciding on whether to migrate to Kubernetes and are curious about its inner workings will find plenty of answers here as well. Basic familiarity with networking concepts will prove beneficial.Table of ContentsUnderstanding Kubernetes ArchitectureCreating Kubernetes ClustersHigh Availability and ReliabilitySecuring KubernetesUsing Kubernetes Resources in PracticeManaging StorageRunning Stateful Applications with KubernetesDeploying and Updating ApplicationsPackaging ApplicationsExploring Kubernetes NetworkingRunning Kubernetes on Multiple ClustersServerless Computing on KubernetesMonitoring Kubernetes ClustersUtilizing Service MeshesExtending KubernetesGoverning KubernetesRunning Kubernetes in ProductionThe Future of Kubernetes
Hands-On Guide to Apache Spark 3
This book explains how to scale Apache Spark 3 to handle massive amounts of data, either via batch or streaming processing. It covers how to use Spark's structured APIs to perform complex data transformations and analyses you can use to implement end-to-end analytics workflows. This book covers Spark 3's new features, theoretical foundations, and application architecture. The first section introduces the Apache Spark ecosystem as a unified engine for large scale data analytics, and shows you how to run and fine-tune your first application in Spark. The second section centers on batch processing suited to end-of-cycle processing, and data ingestion through files and databases. It explains Spark DataFrame API as well as structured and unstructured data with Apache Spark. The last section deals with scalable, high-throughput, fault-tolerant streaming processing workloads to process real-time data. Here you'll learn about Apache Spark Streaming's execution model, the architecture of Spark Streaming, monitoring, reporting, and recovering Spark streaming. A full chapter is devoted to future directions for Spark Streaming. With real-world use cases, code snippets, and notebooks hosted on GitHub, this book will give you an understanding of large-scale data analysis concepts--and help you put them to use.Upon completing this book, you will have the knowledge and skills to seamlessly implement large-scale batch and streaming workloads to analyze real-time data streams with Apache Spark.What You Will LearnMaster the concepts of Spark clusters and batch data processingUnderstand data ingestion, transformation, and data storageGain insight into essential stream processing concepts and different streaming architecturesImplement streaming jobs and applications with Spark StreamingWho This Book Is ForData engineers, data analysts, machine learning engineers, Python and R programmers
Advances in Boundary Value Problems for Fractional Differential Equations
This reprint covers new aspects of the recent developments in the theory and applications of fractional differential equations, including inclusions, inequalities, and systems of fractional differential equations with Riemann-Liouville derivatives, Caputo derivatives, or other generalized fractional derivatives, subject to various boundary conditions. The authors study the existence, uniqueness, multiplicity, and nonexistence of classical or mild solutions, the approximation of solutions, and the approximate controllability of mild solutions for diverse mathematical models.
Dynamical Systems in Engineering
This collection of articles includes the latest results related to applications of dynamical systems in the mathematical modelling of engineering problems, such as those concerning power system dynamics, material science, energy systems, gas dynamical networks, etc.Its purpose is to bring together mathematicians with engineers and physicists, as well as other scientists. The articles accepted and included are of a high quality and have original research results.
Generative AI
This Book is designed to provide a comprehensive understanding of generative AI and its implications for businesses. Students will explore the dynamics and impact of generative AI on the economy, society, and work. Throughout the course, they will delve into the anatomy of generative AI models, learn about the basic business models of generative AI applications, and examine the major industries undergoing rapid changes due to generative AI. Additionally, the Book will cover topics related to AI ethics, including ethical and regulatory risks, and institutional approaches to overcome these challenges. Students will also learn how companies and individuals can effectively prepare for the integration of generative AI in the economy.
AI for Scientific Discovery
AI for Scientific Discovery provides an accessible introduction to the wide-ranging applications of artificial intelligence technologies in scientific research and discovery across the full breadth of scientific disciplines.
Quantitative User Experience Research
This book is your definitive guide to the rapidly growing role of Quantitative User Experience (Quant UX) Research in product development. The book provides an overview of the skills you need on the job, presents hands-on projects with reusable code, and shares advice on starting and developing a career. The book goes beyond basic skills to focus on what is unique to Quant UX. The authors are two of the most widely recognized practitioners in Quant UX research, and this book shares insights from their combined decades of experience. Organizations today have more data about user needs and behaviors than ever before. With this large-scale data, Quant UX researchers work to understand usage patterns, measure the impact of design changes, and inform strategic decisions. In the Quant UX role, interdisciplinary researchers apply analytical skills to uncover user needs, inform engineering and design, answer strategic business questions, and optimize software and hardware products for human interaction. This book provides guidance around customer satisfaction surveys, understanding user behavior from log analysis, and the statistical methods that are commonly used to assess user outcomes. What You Will LearnDiscover the role of Quantitative User Experience (Quant UX) researchUnderstand how Quant UX research differs from other disciplines such as data sciencePlan common research projects and know how to achieve successPosition Quant UX activities in product development, engineering, and UX organizationsApply the HEART framework to measure user experience outcomesEvaluate your skills and potential to be hired as a Quant UX researcherKnow what to expect during job interviewsFind examples of common Quant UX projects with shared R code and data setsWho This Book Is ForPractitioners and managers who seek a comprehensive guide to the new field of Quantitative User Experience Research. Readers will understand the Quant UX role, build research skills, find examples of hands-on code and analyses, learn about UX organizations and stakeholders, and receive advice on job interviews and career paths. Data scientists, social scientists, and other researchers will learn how their skills transfer to Quant UX, where they can help teams build better, more successful products.
Neuromorphic Computing Principles and Organization
This book focuses on neuromorphic computing principles and organization and how to build fault-tolerant scalable hardware for large and medium scale spiking neural networks with learning capabilities. In addition, the book describes in a comprehensive way the organization and how to design a spike-based neuromorphic system to perform network of spiking neurons communication, computing, and adaptive learning for emerging AI applications. The book begins with an overview of neuromorphic computing systems and explores the fundamental concepts of artificial neural networks. Next, we discuss artificial neurons and how they have evolved in their representation of biological neuronal dynamics. Afterward, we discuss implementing these neural networks in neuron models, storage technologies, inter-neuron communication networks, learning, and various design approaches. Then, comes the fundamental design principle to build an efficient neuromorphic system in hardware. The challenges that needto be solved toward building a spiking neural network architecture with many synapses are discussed. Learning in neuromorphic computing systems and the major emerging memory technologies that promise neuromorphic computing are then given.A particular chapter of this book is dedicated to the circuits and architectures used for communication in neuromorphic systems. In particular, the Network-on-Chip fabric is introduced for receiving and transmitting spikes following the Address Event Representation (AER) protocol and the memory accessing method. In addition, the interconnect design principle is covered to help understand the overall concept of on-chip and off-chip communication. Advanced on-chip interconnect technologies, including si-photonic three-dimensional interconnects and fault-tolerant routing algorithms, are also given. The book also covers the main threats of reliability and discusses several recovery methods for multicore neuromorphic systems. This is important for reliable processing in several embedded neuromorphic applications. A reconfigurable design approach that supports multiple target applications via dynamic reconfigurability, network topology independence, and network expandability is also described in the subsequent chapters. The book ends with a case study about a real hardware-software design of a reliable three-dimensional digital neuromorphic processor geared explicitly toward the 3D-ICs biological brain's three-dimensional structure. The platform enables high integration density and slight spike delay of spiking networks and features a scalable design. We present methods for fault detection and recovery in a neuromorphic system as well.Neuromorphic Computing Principles and Organization is an excellent resource for researchers, scientists, graduate students, and hardware-software engineers dealing with the ever-increasing demands on fault-tolerance, scalability, and low power consumption. It is also an excellent resource for teaching advanced undergraduate and graduate students about the fundamentals concepts, organization, and actual hardware-software design of reliable neuromorphic systems with learning and fault-tolerance capabilities.
Mathematical Modeling and Intelligent Optimization in Green Manufacturing & Logistics
To address the increasingly prominent environmental pollution and energy shortage, many countries devote themselves to green manufacturing and logistics in which some optimization problems are common and challenging, e.g., production planning and scheduling, supply chain management, location and allocation problems, vehicle routing problem, resource optimization, and pricing strategies. The present book contains all of the articles accepted and published in the Special Issue "Mathematical Modeling and Intelligent Optimization in Green Manufacturing & Logistics" from the MDPI Mathematics journal. This Special Issue is focused on collecting recent mathematical modeling and intelligent optimization research in green manufacturing and logistics, including operations research, game theory, (meta)heuristics, machine learning, knowledge-driven, digital twin, and so on. We hope that the scientific results presented in this book will serve as a valuable source of documentation and inspiration to those researching the modeling and optimization of green manufacturing and sustainable logistics.
Cybercrime in Social Media
This reference text presents the important components for grasping the potential of social computing with an emphasis on concerns, challenges, and benefits of the social platform in depth. It discusses detection of social-cyber issues, including hate speech, cyberbullying, etc. using deep learning, natural language processing, etc.
Agile Software Development
The book covers software development methods and in detail agile methods with scrum. Best practices for software development are covered; DevOps, software quality and clean code are covered in separate chapters. It is an introduction to those who want to adopt agile methods or are already working with agile methods.
The Concept of Enterprise Architecture from Theory to Practice
Even though the field of enterprise architecture (EA) has matured, many organisations still struggle with its development and implementation, particularly those organisations involved in continuous transformational cycles and subjected to different environmental trends. This book is intended to assist organisations in getting a grip on the factors influencing EA implementation and gaining a deeper understanding of why things happen the way they do in the practice of EA. It is a comprehensive and definitive resource that is useful to both business professionals and academics.The book presents an approach for the development, implementation, or institutionalisation of EA that is independent of any method or other architecture frameworks. It can be applied directly using a realistic selection of organizational variables. The approach has two distinctive features that support EA, even in complex environments: From both technical and non-technical perspectives, it identifies influencing factors and how they manifest in the practice of EA in an organization It offers linear and practical mechanisms for developing and implementing EA to fortify the practice of the concept in an organisation This approach represents a significant contribution to EA.Starting with descriptions for EA, the book offers deepened models and frameworks for the development and implementation of EA at the domain level. It also covers factors upon which a model is built for the institutionalisation of the concept. Additionally, the book discusses the implications of EA for sponsors, architects, and other stakeholders responsible for EA development, implementation, and institutionalisation.
SRv6 Network Programming
The book collects the research results of Huawei SRv6 experts and reflects the latest development direction of SRv6. Beginning with the challenges for IPv6 network development, the background, design roadmap, and implementation of SRv6, as well as the application of this technology in traditional and emerging services is described.
Agile Software Development
The book covers software development methods and in detail agile methods with scrum. Best practices for software development are covered; DevOps, software quality and clean code are covered in separate chapters. It is an introduction to those who want to adopt agile methods or are already working with agile methods.
The Implementation Challenges to Bring Your Own Device Concept (BYOD) in Relation to Information Assurance and Security
Doctoral Thesis / Dissertation from the year 2016 in the subject Computer Science - Commercial Information Technology, grade: 3.923, Capella University (School of Technology), course: PHD in Information Technology, language: English, abstract: Research conducted by Tech Pro (2014) indicated that the Bring Your Own Device (BYOD) concept is gaining momentum, with 74% of organizations already having some BYOD program or planning to implement one. While BYOD offers several benefits, it also presents challenges that concern information technology leaders and information security managers. This correlational study used the systems theory framework to examine the relationship between information security managers' intentions, perceptions of security, and compliance regarding BYOD implementation. Participants of the study consisted of information security managers in Kenya who had obtained the Certified Information Systems Manager certification. Data was collected from 54 information security managers through a survey instrument. The survey instrument integrated three other instruments with proven reliability developed by other researchers. Data was analyzed using a multiple regression analysis to test for a relationship between the variables of the study (security, compliance, and intent to implement BYOD). The multiple regression conducted in this study was insignificant, indicating a relationship did not exist between the study's variables (F(2, 86) = 0.33, p = .718, R2 = .00). A significant negative relationship was found between security and compliance, indicating a weakly negative correlation (r = -.26, p = .016). Using the results from the study, information technology leaders may be able to develop strategies from which to implement BYOD successfully. Implications for social change include increased knowledge of securing personal devices for employees and consumers in general and reduction in costs associated with security and data breaches.
Head First Software Architecture
What will you learn from this book? If you're a software developer looking for a quick on-ramp to software architecture, this handy guide is a great place to start. From the authors of Fundamentals of Software Architecture, Head First Software Architecture teaches you how to think architecturally and explores the unique challenges of software architecture. You'll learn the distinction between architecture and design and the relationship between code, components, and architectural styles. You'll also learn how to work with some common architectural styles through vivid, fun examples. Quick, easy, and entertaining, this book is a valuable introduction to the world of software architecture. Why does this book look so different? Based on the latest research in cognitive science and learning theory, Head First Software Architecture uses a visually rich format to engage your mind, rather than a text-heavy approach that puts you to sleep. Why waste your time struggling with new concepts? This multisensory learning experience is designed for the way your brain really works.
Artificial Era
Presenting a ground-breaking view of technology trends and their impact on our society, Artificial Era contributes to the current debate about the consequences of technological innovations. Alongside different viewpoints and statistics on the use of robots worldwide, productivity, and job displacement, Gissel Velarde identifies the particular problem of the lack of diversity in AI communities - and how that can exacerbate representation issues in employment, civil rights, gender, and education if no actions are taken. A timely, inciteful book which will be required reading for scholars and professionals working with AI and automation, and leaders in business and government interested in better understanding it and its effects on business and society.
Pearson BTEC Level 1/2 Tech Award in Digital Information Technology C3
This popular book covers all of the externally examined Component 3 of the Level 1/2 BTEC Tech Award for the current specification and the new specification for first examination in 2024. It provides comprehensive yet concise coverage of the component through case studies and questioning. It will be invaluable both as a course text and as a revision guide for students nearing the end of their course.It is divided into four sections covering every element of the Component 3 specification.