1 - 20
Next
- ueller, John, 1958- author.
- 1st edition. - New York, N.Y. : McGraw-Hill Education LLC, c2016.
- Description
- Book — 1 online resource (xxvi, 292 pages) : illustrations, figures, tables
- Summary
-
- A. Dedication
- B. About the Author
- C. Acknowledgments
- D. Introduction
- About This Book
- Icons Used in This Book
- What You Should Know
- Use the Online Resources
- A. Part I—Developing a PC Plan
- 1. Defining What You Want
- Considering Why Off-the-Shelf Systems Aren't Appealing
- Writing Down Goals for Your System
- Creating a Budget
- Identifying the Parts You Have Now
- 2. Introducing the Major Parts
- Opening the Case
- Understanding the Role of the Motherboard
- Providing Power to the System
- Considering the Add-on Boards
- Deciding on Storage Devices
- Connecting with Cables
- Keeping Things Cool
- Focusing on External Connectivity
- 3. Considering the Vendors
- Getting on Vendor Sites
- Performing Apples-to-Apples Comparisons
- Finding Reliable Reviews
- Understanding the Compatibility Pitfalls
- Reading Between the Lines
- 4. Getting What You Need
- Creating and Verifying a Purchase List
- Making the Purchases
- Verifying the Package Contents
- Getting the Extras You Need
- Ensuring the Documentation Is Complete
- Inventorying the Required Tools
- Setting Up a Work Area
- B. Part II—Building the Hardware
- 5. Adding RAM and Processor
- Understanding Static Electricity
- Verifying the Processor and RAM Positions
- Adding Cooling to the Processor
- Inserting the Processor
- Installing the RAM
- 6. Installing the Motherboard
- Configuring the Case
- Installing a Power Supply
- Identifying the Power Plugs and Sockets
- Setting Up the Motherboard
- Ensuring the Motherboard Is in Place
- Connecting the Case Features to the Motherboard
- Testing Your Initial Setup
- 7. Providing Video
- Understanding the Video Basics
- Installing the Video Card Correctly
- Connecting Any Required Cables
- Considering CrossFire and SLI Configuration Needs
- Considering TV Tuner Configuration Needs
- Connecting Devices
- Performing a Quick Video Test
- 8. Mounting Permanent Storage
- Understanding Permanent Storage Basics
- Installing a SATA Drive
- Installing an Optical Drive
- Working with Solid-State Drives
- Using USB Storage
- Working with External Drives
- Considering Other Permanent Storage Options
- 9. Attaching Auxiliary Devices
- Choosing Keyboard and Other Input Devices Carefully
- Connecting the Keyboard
- Connecting the Mouse or Trackball
- Testing the Basic Setup
- Adding a Printer
- Working with Webcams
- Providing Other Device Connections
- C. Part III—Considering Networks
- 10. Installing a LAN
- Understanding LAN Basics
- Configuring the Motherboard LAN
- Installing a Separate LAN Card
- Using External LAN Solutions
- Understanding WLAN Essentials
- Considering LAN Security
- 11. Connecting to the Internet
- Configuring Multiple LANs
- Connecting a MODEM
- Using Alternative Connectivity Options
- Considering Internet Security.
- 12. Accessing Wireless Devices
- Understanding the Common Wireless Standards
- Ensuring You Have the Correct Wireless Support
- Configuring Common Computer Devices
- Configuring Alternative Devices
- Considering Wireless Device Security
- D. Part IV—Installing the Software
- 13. Installing the Operating System
- Choosing an Operating System
- Obtaining the Vendor Installation Instructions
- Ensuring You Have All the Details
- Performing the Installation
- 14. Accessing the Devices
- Understanding the Operating System to Device Connection
- Relying on Operating System Drivers
- Obtaining and Using Device Vendor Drivers
- Installing the Device Drivers
- Overcoming Driver-Specific Problems
- 15. Choosing Applications
- Matching Applications to Your System
- Verifying the Hardware Requirements
- Obtaining Application Reviews
- Installing the Application
- Correcting Application Installation Problems
- Removing Errant and Unused Applications
- E. Part V—Performing Maintenance
- 16. Maintaining the Hardware
- Cleaning the Outside
- Cleaning the Inside
- Inspecting Your Hardware
- Keeping Things Cool
- Obtaining Spare Parts
- Maintaining Essential Spares
- Creating a Maintenance Schedule
- 17. Managing the Software
- Performing Required Updates
- Keeping Things Secure
- Dealing with System Slowdowns
- Keeping Data Safe
- Overcoming Disasters
- 18. Preparing for Updates
- Maintaining a Wish List
- Building with Expansion in Mind
- Considering the Role of Software
- Obtaining and Installing Hardware Updates
- Knowing When to Retire Your Old System.
(source: Nielsen Book Data)
2. Memory allocation problems in embedded systems [electronic resource] : optimization methods [2013]
- London : Iste ; Hoboken, NJ : Wiley, 2013.
- Description
- Book — 1 online resource : ill.
- Summary
-
- I. Context II. Unconstrained memory allocation problem III. Memory allocation with constraint on the number of memory banks IV. General memory allocation problem V. Dynamic memory allocation problem VI. Conclusion.
- (source: Nielsen Book Data)
- Introduction ix
- Chapter 1. Context 1 1.1. Embedded systems 2 1.1.1. Main components of embedded systems 3 1.2. Memory management for decreasing power consumption, performance and area in embedded systems 4 1.3. State of the art in optimization techniques for memory management and data assignment 8 1.3.1. Software optimization 9 1.3.2. Hardware optimization 11 1.3.3. Data binding 16 1.3.3.1. Memory partitioning problem for low energy 17 1.3.3.2. Constraints on memory bank capacities and number of accesses to variables 18 1.3.3.3. Using external memory 19 1.4. Operations research and electronics 21 1.4.1. Main challenges in applying operations research to electronics 23
- Chapter 2. Unconstrained Memory Allocation Problem 27 2.1. Introduction 28 2.2. An ILP formulation for the unconstrained memory allocation problem 31 2.3. Memory allocation and the chromatic number 32 2.3.1. Bounds on the chromatic number 33 2.4. An illustrative example 35 2.5. Three new upper bounds on the chromatic number 38 2.6. Theoretical assessment of three upper bounds 45 2.7. Computational assessment of three upper bounds 49 2.8. Conclusion 53
- Chapter 3. Memory Allocation Problem With Constraint on the Number of Memory Banks 57 3.1. Introduction 58 3.2. An ILP formulation for the memory allocation problem with constraint on the number of memory banks 61 3.3. An illustrative example 64 3.4. Proposed metaheuristics 65 3.4.1. A tabu search procedure 66 3.4.2. A memetic algorithm 69 3.5. Computational results and discussion 71 3.5.1. Instances 72 3.5.2. Implementation 72 3.5.3. Results 73 3.5.4. Discussion 75 3.6. Conclusion 75
- Chapter 4. General Memory Allocation Problem 77 4.1. Introduction 78 4.2. ILP formulation for the general memory allocation problem 80 4.3. An illustrative example 84 4.4. Proposed metaheuristics 85 4.4.1. Generating initial solutions 86 4.4.1.1. Random initial solutions 86 4.4.1.2. Greedy initial solutions 86 4.4.2. A tabu search procedure 89 4.4.3. Exploration of neighborhoods 91 4.4.4. A variable neighborhood search hybridized with a tabu search 93 4.5. Computational results and discussion 94 4.5.1. Instances used 95 4.5.2. Implementation 95 4.5.3. Results 96 4.5.4. Discussion 97 4.5.5. Assessing TabuMemex 101 4.6. Statistical analysis 105 4.6.1. Post hoc paired comparisons 106 4.7. Conclusion 107
- Chapter 5. Dynamic Memory Allocation Problem 109 5.1. Introduction 110 5.2. ILP formulation for dynamic memory allocation problem 113 5.3. An illustrative example 116 5.4. Iterative metaheuristic approaches 119 5.4.1. Long-term approach 119 5.4.2. Short-term approach 122 5.5. Computational results and discussion 123 5.5.1. Results 124 5.5.2. Discussion 125 5.6. Statistical analysis 128 5.6.1. Post hoc paired comparisons 129 5.7. Conclusion . 130
- Chapter 6. MemExplorer: Cases Studies 131 6.1. The design flow 131 6.1.1. Architecture used 131 6.1.2. MemExplorer design flow 132 6.1.3. Memory conflict graph 134 6.2. Example of MemExplorer utilization 139
- Chapter 7. General Conclusions and Future Work 147 7.1. Summary of the memory allocation problem versions 147 7.2. Intensification and diversification 149 7.2.1. Metaheuristics for memory allocation problem with constraint on the number of memory banks 149 7.2.1.1. Tabu-Allocation 149 7.2.1.2. Evo-Allocation 151 7.2.2. Metaheuristic for general memory allocation problem 151 7.2.3. Approaches for dynamic memory allocation problem 152 7.3. Conclusions 152 7.4. Future work 154 7.4.1. Theoretical perspectives 154 7.4.2. Practical perspectives 156 Bibliography 159 Index 181.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
3. The designer's guide to the Cortex-M processor family [electronic resource] : a tutorial approach [2013]
- Martin, Trevor.
- Oxford : Elsevier Science, c2013.
- Description
- Book — 1 online resource (331 p.)
- Summary
-
- Introduction to ARM Cortex Processors
- Developing with Cortex M Processors
- Cortex-M Architecture
- Debugging with CoreSight
- Cortex Microcontroller Interface Standard
- Advanced Architecture Features
- Developing with an RTOS
- Practical DSP for Cortex-M4
- Future Trends.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Heckman, Rocky, author.
- 1st. - Hoboken : Wiley-IEEE Press, 2016.
- Description
- Book — 1 online resource.
- Summary
-
- LIST OF FIGURES xi LIST OF TABLES xiii PREFACE xv ACKNOWLEDGMENTS xvii
- CHAPTER 1 THE MOBILE LANDSCAPE 1 1.1 Introduction 1 1.2 Previous Attempts at Cross-Platform 2 1.2.1 Java 2 1.2.2 Early Web Apps 5 1.2.3 Multiple Codebases 7 1.3 Breadth Versus Depth 9 1.4 The Multi-Platform Targets 10 1.4.1 Traditional 10 1.4.2 Mobile 11 1.4.3 Wearables 12 1.4.4 Embedded 13
- CHAPTER 2 PLATFORM-INDEPENDENT DEVELOPMENT TECHNOLOGIES 15 The Golden Rule 15 2.1 Vendor Lock-In 16 2.2 Recommended Standards and Guidelines 18 2.2.1 Respecting the Device 18 2.2.2 Respecting the Network 19 2.2.3 Communication Protocols 21 2.2.4 Data Formats 31 2.2.5 Mobile User Experience Guidelines 40 2.2.6 Authentication 45 2.2.7 Dealing with Offline and Partially Connected Devices 47 2.3 Wrapping Up 63
- CHAPTER 3 PLATFORM-INDEPENDENT DEVELOPMENT STRATEGY 64 3.1 High-Level App Development Flow 64 3.2 Five-Layer Architecture 65 3.3 Five-Layer Architecture Detail 66 3.3.1 The User Interface Layer 66 3.3.2 The Service Interface Layer 68 3.3.3 The Service Layer 69 3.3.4 The Data Abstraction Layer 70 3.3.5 The Data Layer 70
- CHAPTER 4 THE USER INTERFACE LAYER 72 4.1 Porting Versus Wrapping 72 4.2 Multi-Client Development Tools 73 4.2.1 PhoneGap (http://phonegap.com/) 73 4.2.2 Xamarin (http://xamarin.com/) 74 4.2.3 Unity (http://www.unity3d.com) 75 4.2.4 Visual Studio 76 4.3 Cross-Platform Languages 76 4.4 Avoid Writing for the Least Common Denominator 77 4.5 Wrapping Up 78
- CHAPTER 5 THE SERVICE INTERFACE LAYER 79 5.1 Message Processing 79 5.1.1 Push versus Pull 80 5.1.2 Partially Connected Scenarios 81 5.2 Message Processing Patterns 82 5.3 High-Volume Messaging Patterns 85 5.3.1 Queue Services and Microsoft Azure Event Hubs 86 5.3.2 Web Sockets 89 5.4 High-Volume Push Notifications 91 5.4.1 Third Party Notification Hubs 93 5.5 Message Translation and Routing 97 5.5.1 Message Translation 97 5.5.2 Message Routing 103 5.5.3 Handling Large Amounts of Data 108 5.6 Wrapping Up 111
- CHAPTER 6 THE SERVICE LAYER 114 6.1 Thinking in Nodes 114 6.1.1 Scale Out and Scale Up 114 6.1.2 Scale Out versus Scale Up 114 6.2 Planning for Horizontal Scaling 117 6.2.1 Node Sizing 117 6.2.2 Statelessness 120 6.3 Designing Service Layers for Mobile Computing 121 6.3.1 Service Componentization 122 6.4 Implementation Abstraction 124 6.4.1 Service Interface Abstraction 124 6.5 Using CQRS/ES for Service Implementation 127 6.5.1 CQRS Overview 127 6.5.2 Why CQRS 129 6.5.3 Being Able to Separate Data Models 129 6.5.4 Aggregates and Bounded Contexts 131 6.5.5 The Read and Write Sides 132 6.5.6 CQRS Communications 132 6.6 Side by Side Multi-Versioning 140 6.7 Service Agility 141 6.8 Consumer, Business, and Partner Services 141 6.9 Portable and Modular Service Architectures 142 6.9.1 Designing Pluggable Services 145 6.9.2 Swapping Services 147 6.9.3 Deployment and Hosting Strategies 151 6.10 Wrapping up 152
- CHAPTER 7 THE DATA ABSTRACTION LAYER 154 7.1 Objects to Data 154 7.2 Using the DAL with External Services 157 7.3 Components of a DAL 159 7.3.1 Data Mapper 160 7.3.2 Query Mapper 161 7.3.3 Repository 166 7.3.4 Serializers 168 7.3.5 Storage Consideration 169 7.3.6 Cache 172 7.4 Wrapping Up 174
- CHAPTER 8 THE DATA LAYER 176 8.1 Overview 177 8.2 Business Rules in the Data Layer 178 8.3 Relational Databases 178 8.4 NoSQL Databases 181 8.4.1 Key Value Database 183 8.4.2 Document Database 186 8.4.3 Column Family Databases 189 8.4.4 Graph Database 194 8.4.5 How to Choose? 197 8.5 File Storage 197 8.6 Blended Approach 200 8.6.1 The Polyglot Data Layer 201 8.7 Wrapping up 203
- CHAPTER 9 STRATEGIES FOR ONGOING IMPROVEMENT 204 9.1 Feature Expansion 204 9.1.1 User Interface 206 9.1.2 Service Interface Layer 206 9.1.3 Service Layer 206 9.1.4 Data Abstraction Layer 206 9.1.5 Data Layer 207 9.2 Data Collection Matters 207 9.3 Multi-Versioning 209 9.4 Version Retirement 212 9.4.1 Scale Back 214 9.5 Client Upgrades 216 9.6 Wrapping Up 220
- CHAPTER 10 CONCLUSION 221 REFERENCES 225 INDEX 229.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Boswarthick, David.
- Hoboken : John Wiley & Sons, 2012.
- Description
- Book — 1 online resource (334 p.)
- Summary
-
- Foreword List of Contributors List of Acronyms
- 1 Introduction to M2M 1.1 What is M2M? 1.2 The Business of M2M 1.3 Accelerating M2M Maturity 1.3.1 High-Level M2M Frameworks 1.3.2 Policy and Government Incentives 1.4 M2M Standards 1.4.1 Which Standards for M2M? 1.5 Roadmap of the Book References Part I M2M CURRENT LANDSCAPE
- 2 The Business of M2M 2.1 The M2M Market 2.1.1 Healthcare 2.1.2 Transportation 2.1.3 Energy 2.2 The M2M Market Adoption: Drivers and Barriers 2.3 The M2M Value Chain 2.4 Market Size Projections 2.5 Business Models 2.5.1 Network Operator- or CSP-Led Model 2.5.2 MVNO-Led Model 2.5.3 Corporate Customer-Led Model 2.6 M2M Business Metrics 2.7 Market Evolution Reference
- 3 Lessons Learned from Early M2M Deployments 3.1 Introduction 3.2 Early M2M Operational Deployments 3.2.1 Introduction 3.2.2 Early M2M Operational Deployment Examples 3.2.3 Common Questions in Early M2M Deployments 3.2.4 Possible Optimization of M2M Deployments 3.3 Chapter Conclusion Reference Part II M2M ARCHITECTURE AND PROTOCOLS
- 4 M2M Requirements and High-Level Architectural Principles 4.1 Introduction 4.2 Use-Case-Driven Approach to M2M Requirements 4.2.1 What is a Use Case? 4.2.2 ETSI M2M Work on Use Cases 4.2.3 Methodology for Developing Use Cases 4.3 Smart Metering Approach in ETSI M2M 4.3.1 Introduction 4.3.2 Typical Smart Metering Deployment Scenario 4.4 eHealth Approach in ETSI M2M 4.4.1 Introduction 4.5 ETSI M2M Service Requirements: High-Level Summary and Applicability to Different Market Segments 4.6 Traffic Models-/Characteristics-Approach to M2M Requirements and Considerations for Network Architecture Design 4.6.1 Why Focus on Wireless Networks? 4.7 Description of M2M Market Segments/Applications 4.7.1 Automotive 4.7.2 Smart Telemetry 4.7.3 Surveillance and Security 4.7.4 Point of Sale (PoS) 4.7.5 Vending Machines 4.7.6 eHealth 4.7.7 Live Video 4.7.8 Building Automation 4.7.9 M2M Industrial Automation 4.8 M2M Traffic Characterization 4.8.1 Detailed Traffic Characterization for Smart Metering 4.8.2 Global Traffic Characterization 4.9 High-Level Architecture Principles for M2M Communications 4.10 Chapter Conclusions References
- 5 ETSI M2M Services Architecture 5.1 Introduction 5.2 High-Level System Architecture 5.3 ETSI TC M2M Service Capabilities Framework 5.4 ETSI TC M2M Release 1 Scenarios 5.5 ETSI M2M Service Capabilities 5.5.1 Reachability, Addressing, and Repository Capability (xRAR) 5.5.2 Remote Entity Management Capability (x REM) 5.5.3 Security Capability (xSEC) 5.6 Introducing REST Architectural Style for M2M 5.6.1 Introduction to REST 5.6.2 Why REST for M2M? 5.6.3 REST Basics 5.6.4 Applying REST to M2M 5.6.5 Additional Functionalities 5.7 ETSI TC M2M Resource-Based M2M Communication and Procedures 5.7.1 Introduction 5.7.2 Definitions Used in this Section 5.7.3 Resource Structure 5.7.4 Interface Procedures 5.8 Chapter Conclusion References
- 6 M2M Optimizations in Public Mobile Networks 6.1 Chapter Overview 6.2 M2M over a Telecommunications Network 6.2.1 Introduction 6.2.2 M2M Communication Scenarios 6.2.3 Mobile or Fixed Networks 6.2.4 Data Connections for M2M Applications 6.3 Network Optimizations for M2M 6.3.1 Introduction 6.3.2 3GPP Standardization of Network Improvements for Machine Type Communications 6.3.3 Cost Reduction 6.3.4 M2M Value-Added Services 6.3.5 Numbering, Identifiers, and Addressing 6.3.6 Triggering Optimizations 6.3.7 Overload and Congestion Control References
- 7 The Role of IP in M2M 7.1 Introduction 7.1.1 IPv6 in Brief 7.1.2 Neighbor Discovery Protocol 7.2 IPv6 for M2M 7.3 6LoWPAN 7.3.1 Framework 7.3.2 Header Compression 7.3.3 Neighbor Discovery 7.4 Routing Protocol for Low-Power and Lossy Networks (RPL) 7.4.1 RPL Topology 7.5 CoRE 7.5.1 Message Formats 7.5.2 Transport Protocol 7.5.3 REST Architecture References
- 8 M2M Security 8.1 Introduction 8.1.1 Security Characteristics of Cellular M2M 8.2 Trust Relationships in the M2M Ecosystem 8.3 Security Requirements 8.3.1 Customer/M2M Device User 8.3.2 Access Network Provider 8.3.3 M2M Service Provider 8.3.4 Application Provider 8.3.5 Bootstrapping Requirements 8.4 Which Types of Solutions are Suitable? 8.4.1 Approaches Against Hijacking 8.4.2 Public Key Solutions 8.4.3 Smart Card-Based Solutions 8.4.4 Methods Based on Pre-Provisioned Symmetric Keys 8.4.5 Protocol for Automated Bootstrapping Based on Identity-Based Encryption 8.4.6 Security for Groups of M2M Devices 8.5 Standardization Efforts on Securing M2M and MTC Communications 8.5.1 ETSI M2M Security 8.5.2 3GPP Security Related to Network Improvements for Machine Type Communications References
- 9 M2M Terminals and Modules 9.1 M2M Module Categorization 9.1.1 Access Technology 9.1.2 Physical Form Factors 9.2 Hardware Interfaces 9.2.1 Power Interface 9.2.2 USB (Universal Serial Bus) Interface 9.2.3 UART (Universal Asynchronous Receiver/ Transmitter) Interface 9.2.4 Antenna Interface 9.2.5 UICC (Universal Integrated Circuit Card) Interface 9.2.6 GPIO (General-Purpose Input/Output Port) Interface 9.2.7 SPI (Serial Peripheral Interface) Interface 9.2.8 I2C (Inter-Integrated Circuit Bus) Interface 9.2.9 ADC (Analog-to-Digital Converter) Interface 9.2.10 PCM (Pulse Code Modulation) Interface 9.2.11 PWM (Pulse Width Modulation) Interface 9.2.12 Analog Audio Interface 9.3 Temperature and Durability 9.4 Services 9.4.1 Application Execution Environment 9.4.2 Connectivity Services 9.4.3 Management Services 9.4.4 Application Services 9.5 Software Interface 9.5.1 AT Commands 9.5.2 SDK Interface 9.6 Cellular Certification 9.6.1 Telecom Industry Certification 9.6.2 MNO Certification
- 10 Smart Cards in M2M Communication 10.1 Introduction 10.2 Security and Privacy Issues in M2M Communication 10.3 The Grounds for Hardware-Based Security Solutions 10.4 Independent Secure Elements and Trusted Environments 10.4.1 Trusted Environments in M2M Devices 10.4.2 Trusting Unknown Devices: The Need for Security Certification 10.4.3 Advantages of the Smart Card Model 10.5 Specific Smart Card Properties for M2M Environments 10.5.1 Removable Smart Cards versus Embedded Secure Elements 10.5.2 UICC Resistance to Environmental Constraints 10.5.3 Adapting the Card Application Toolkit to Unattended Devices 10.5.4 Reaching UICC Peripheral Devices with Toolkit Commands 10.5.5 Confidential Remote Management of Third-Party Applications 10.6 Smart Card Future Evolutions in M2M Environments 10.6.1 UICC-Based M2M Service Identity Module Application 10.6.2 Internet Protocol Integration of the UICC 10.7 Remote Administration of M2M Secure Elements 10.7.1 Overview 10.7.2 Late Personalization of Subscription 10.7.3 Remote Management of Subscriptions on the Field References Part III BOOK CONCLUSIONS AND FUTURE VISION
- 11 Conclusions Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Washington, D.C. : United States. Dept. of Energy. Office of Advanced Scientific Computing Research ; Oak Ridge, Tenn. : distributed by the Office of Scientific and Technical Information, U.S. Dept. of Energy, 2016
- Description
- Book — 1 online resource.
- Online
- Pajankar, Ashwin, author.
- Birmingham, UK : Packt Publishing, 2016.
- Description
- Book — 1 online resource : illustrations
- Summary
-
Explore the powers of Raspberry Pi and build your very own projects right out of the box About This Book * From robotics to gaming, this Learning Path will unlock your creativity! * Build your own impressive IoT projects to transform your home * Featuring some of Packt's very best Raspberry Pi content, this Learning Path doesn't just get you to your destination - it opens up a whole horizon of possibilities! Who This Book Is For Want new ideas for your next Raspberry Pi project? Got one lying around gathering dust? This Learning Path gets you straight into the creative dirty work of programming and playing with your pi. Whether your new to Raspberry Pi, or an experienced maker, we think this Learning Path will inspire you and get your creative juices flowing! What You Will Learn * Discover an aweome range of Raspberry Pi projects * Bridge the gap between software and hardware through your Pi and find out how to make an operating system interact with cameras and other hardware * Find out how to use your Raspberry Pi for gaming * Secure your home with this tiny computer! * Make science fiction a reality - build a walking robot In Detail Looking for inspiration for your next Raspberry Pi project? Not sure where to begin? This Learning Path is the perfect place to begin, providing you with an accessible yet comprehensive journey through Raspberry Pi. Following three modules, you'll soon be confident and prepared to get creative with your microcomputer. Raspberry Pi by Example is the first module in this Learning Path - and it does exactly what it says. It doesn't just teach, it shows you how to go and build some awesome Raspberry Pi projects immediately. Build and play your own games with the Pi, build a complete Internet of Things home automation system that controls your house through Twitter... let your imagination run wild! In the next module we'll look in more depth at building a home security system. You'll be using some of the skills you devoped through the first module, but apply them to something more intricate and impressive. Using a Linux based operating system as the foundations, you'll gradually build up an entire security infrastructure adding cameras, remote controls, and even intrusion alerts! In the final module, we'll take you into the world of Raspberry Pi robotics. By the end of it, you'll have built a biped robot that can interact with its environment! This Learning Path combines some of the best that Packt has to offer in one complete, curated package. It includes content from the following Packt products: * Raspberry Pi By Example by Ashwin Pajankar and Arush Kakkar * Building a Home Security System with Raspberry Pi by Matthew Pole * Raspberry Pi Robotics Essentials by Richard Grimmett Style and approach It's not every day you build a home automation system. It's not every day you build a walking robot. But with this Learning Path you'll do just that. So get started and let this tiny computer expand your imagination.
(source: Nielsen Book Data)
- Wagner, Andrew J. (Andrew Joseph), 1988- author.
- Birmingham, UK : Packt Publishing, 2016.
- Description
- Book — 1 online resource (1 volume) : illustrations
- Summary
-
Unleash the power of Swift and discover the skills required to build incredible robust iOS applications About This Book * Write expressive, understandable, and maintainable Swift 2 code with this hands-on course * Unveil the complex underpinnings of Swift to turn your app ideas into reality * Specialize in developing real iOS apps, and 2D and 3D video games using Swift and Cocoapods * Dive deep into protocol extensions, learn new error handling model and use featured Swift design patterns to write more efficient code Who This Book Is For This course would be for app developers who are new to developing for iOS or OSX and are trying to get grips with Swift for the first time. What You Will Learn * From a solid understanding of the Swift 2 language * Get to know the practical aspects of how a computer program actually works * Understand the paradigms used by Apple's frameworks, so you are not intimidated by them * Create a server in Swift to deliver JSON data to an iOS app * Take advantage of Cocoapods to use third-party libraries * Build games with SpriteKit and SceneKit * Develop an app running on the cloud to act as an API server for your client's apps * Dive into the core components of Swift 2 including operators, collections, control flow, and functions * Create and use classes, structures, and enums including object-oriented topics such as inheritance, protocols, and extensions * Develop a practical understanding of subscripts, optionals, and closures * Master Objective-C interoperability with mix and match * Access network resources using Swift * Implement various standard design patterns in the Swift language In Detail The Swift--Developing iOS Applications course will take you on a journey to become an efficient iOS and OS X developer, with the latest trending topic in town. Right from the basics to the advanced level topics, this course would cover everything in detail. We'll embark our journey by dividing the learning path into four modules. Each of these modules are a mini course in their own right; and as you complete each one, you'll gain key skills and be ready for the material in the next module. The first module is like a step-by-step guide to programming in Swift 2. Each topic is separated into compressible sections that are full of practical examples and easy-to-understand explanations. Each section builds on the previous topics, so you can develop a proficient and comprehensive understanding of app development in Swift 2. By the end of this module, you'll have a basic understanding of Swift 2 and its functionalities. The second module will be the an easy-to-follow guide filled with tutorials to show you how to build real-world apps. The difficulty and complexity level increases chapter by chapter. Each chapter is dedicated to build a new app, beginning from a basic and unstyled app through to a full 3D game. The last two chapters show you how to build a complete client-server e-commerce app right from scratch. You'll be able to build well-designed apps, effectively use AutoLayout, develop videogames, and build server apps. The third and the last module of our course will take an example-based approach where each concept covered is supported by example code to not only give you a good understanding of the concept, but also to demonstrate how to properly implement it. Style and approach This course includes all the resources that will help you jump into the app development .This course covers all the important aspects Swift application development and is divided into individual modules so that you develop your skill after the completion of a module and get ready for the next. Through this comprehensive course, you'll learn how to use Swift programming with hands-on examples from scratch to finish!.
(source: Nielsen Book Data)
- Goldman, Rik, author.
- Birmingham, UK : Packt Publishing, 2016.
- Description
- Book — 1 online resource : illustrations.
- Summary
-
- Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewer; www.PacktPub.com; Table of Contents; Preface;
- Chapter 1: Proxmox VE Fundamentals; Proxmox VE in brief; Virtualization with Proxmox VE; KVM; QEMU; OS Virtualization with Proxmox VE; Summary;
- Chapter 2: Installing Proxmox VE; Hardware requirements and recommendations for Proxmox VE; a //aDownloading Proxmox VE; Verifying the downloaded image; Ensuring hardware virtualization extensions are installed; Enabling hardware virtualization extensions; Preparing for the Proxmox VE Installer; Installing Proxmox VE
- Upgrading PVE from the command lineDisabling the enterprise repository; Enabling a non-subscriber repository; Updating and upgrading Proxmox VE; Summary;
- Chapter 3: Creating Containers; Understanding the container advantage; Proxmox VE and the case for LXC; Container templates; Downloading templates; Logging in to Proxmox VE's web interface; Browsing available container templates; Downloading a container; a //aFrom template to container; Starting and stopping containers; Changing container states with the command line; Accessing a container; Summary;
- Chapter 4: Creating Virtual Machines
- Distinguishing features of virtual machinesScenarios for system virtualization; Creating a virtual machine; Installation media; Uploading an ISO file to local storage on PVE; Preparing a virtual machine; Anticipating the configuration tabs; General; OS; CD/DVD; Hard Disk; CPU; Memory; Network; Confirm; Controlling the state of a virtual machine; Controlling a VM from the PVE command line; Practicing the creation of virtual machines; Virtualizing Windows Server 2012r2 with Proxmox VE; Configuring and creating the virtual machine; Starting the VM and installing Windows Server
- Creating a VM for Fedora 23 ServerCommand line virtual machine creation; Summary;
- Chapter 5: Working with Virtual Disks; Understanding virtual disks; Coming to terms; Understanding virtual disk configuration; Choosing a virtual disk format; QCOW2; RAW; VMDK; Choosing a bus; Understanding cache options; a //aLearning more; Summary;
- Chapter 6: Networking with Proxmox VE; Proxmox VE network model; Bridged configuration; NAT configuration; Routed configuration; VLAN support; NIC bonding; Network configuration for virtual servers; Providing basic connectivity; Of VMs and vNICs
- Bridge configurationUsing NAT configuration; Summary;
- Chapter 7: Securing Proxmox VE; Security benefits of virtualization; Attack surface reduction; Isolation; Availability of prior states; Hardware abstraction; Segmentation; Encapsulation and portability; Physical security; Fine privilege control; PVE firewall features; Aggravated vulnerabilities; Denial of service attacks; VM escape and hyper jumping; Virtualization sprawl; At war with complexity; ; Taking action; Protecting the boot process; pagebreak //pagebreakLocking down the bootloader; Locking down BIOS/UEFI
(source: Nielsen Book Data)
- Lusa, John.
- Milton : Auerbach Publications, 2018.
- Description
- Book — 1 online resource (587 p.)
- Summary
-
- 1.Introduction
- 2. The Management Team
- 3. Maintaining the Network
- 4. The Network Providers
- 5. The Data Network
- 6. The Voice Network
- 7. New Technologies
- 8. Support for the Network Manager
- 9. Education Support for the Network Manager.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
11. Trustworthy cloud computing [2017]
- Safonov, V. O. (Vladimir Olegovich), author.
- Hoboken, New Jersey : John Wiley & Sons, Inc., [2017]
- Description
- Book — 1 online resource.
- Summary
-
- Preface ix Acknowledgments xiii Introduction xv 1 Principles and Concepts of Cloud Computing 1 1.1 Kinds of Modern Software Architectures 1 1.2 Characteristic Features of Modern Software 3 1.3 Basic Concepts of Modern Software Architecture 4 1.4 Service-Oriented Architecture (SOA) 6 1.5 Software as A Service (SaaS) 8 1.6 Key Ideas and Principles of Cloud Computing 8 1.7 Components of Cloud Platforms and Kinds of Cloud Servicing 11 1.8 Layers of the Cloud Architecture 14 1.9 Scheme of Architecture of the Cloud 15 1.10 Roles of People in Cloud Computing 16 1.11 Standards of Cloud Computing 17 1.12 How the Clouds Come True: Organization of Datacenters and Cloud Hardware 20 1.13 Specifics and Components of Software for Cloud Computing 22 1.14 Cloud Computing-Related Trends Activities and Resources 25 Exercises to
- Chapter 1 29 2 Platforms of Cloud Computing 33 2.1 A Variety of Cloud Platforms: The First Impression 33 2.2 Amazon AWS Cloud Platform A Pioneer of Cloud Computing 36 2.3 IBM Cloud 49 2.4 Oracle Cloud 58 2.5 Google Cloud Platform 64 2.6 HP Helion Cloud Platform 70 2.7 Salesforce Cloud Platform 79 Exercises to
- Chapter 2 88 3 Principles and Pillars of Trustworthy Computing 91 3.1 Vital Issues of Trustworthy Computing 91 3.2 The Trustworthy Computing Initiative by Microsoft 93 3.3 The Security Pillar 94 3.4 The Reliability Pillar 99 3.5 The Privacy Pillar 101 3.6 The Business Integrity Pillar 103 3.7 Tools and Software Lifecycle Models to Support Trustworthy Computing 106 Exercises to
- Chapter 3 110 4 Making Cloud Computing Trustworthy 113 4.1 Psychological Barriers Between the Customers and the Cloud and the Ways to Overcome Them 113 4.2 User Interface for Cloud Computing Its Convenience Usability and Functionality for Trustworthy Cloud Computing 116 4.3 Threats and Attacks to Clouds 120 4.4 Trustworthy Cloud Computing from Hardware Side: Datacenter Architecture Servers Clusters Hypervisors 124 4.5 Trustworthy Cloud Computing from Operating System Side: Desirable OS Features to Implement Clouds and Datacenters 126 4.6 Using Aspect-Oriented Programming for Refactoring Cloud Services and Making Them Trustworthy: The Contribution of St. Petersburg University 129 Exercises to
- Chapter 4 142 5 Example of a Trustworthy Cloud Computing Platform in Detail: Microsoft Azure 147 5.1 Overview of Microsoft Azure Architecture and its Evolution 147 5.2 User Interface and the Management Portal of Microsoft Azure 152 5.3 The Compute Component: Managing and Operating Cloud Services 161 5.4 The Storage Component: Managing and Operating Cloud Storage 178 5.5 The SQL Azure Component: The Cloud Database 187 5.6 Networking in the Azure Cloud: Network-as-a-Service (NaaS) Content Delivery Network (CDN) Virtual Network Traffic Manager 196 5.7 Active Directory in the Cloud: A Way of Structuring User Accounts 202 5.8 Development of Microsoft Azure Cloud Services with Microsoft Visual Studio 206 5.9 Visual Studio Online and its Relation to Microsoft Azure 215 5.10 Developing Mobile Services and Connected Mobile Applications for Microsoft Azure 220 5.11 Media Services 234 5.12 The .NET Platform The Basis of Azure Implementation 237 5.13 Azure Tools 252 5.14 Machine Learning in the Cloud: Azure Machine Learning Studio 257 5.15 Parallel Processing of Big Data in the Cloud: Using Apache Hadoop in Microsoft Azure 261 5.16 Perspectives of Microsoft Azure 265 Exercises to
- Chapter 5 266 6 Conclusions: Perspectives of Trustworthy Cloud Computing 271 6.1 Integration of Clouds. The Intercloud IEEE Standard 271 6.2 The TCLOUDS Project by the European Union 280 6.3 Further Developments and Trends of Trustworthy Cloud Computing 291 Exercises to Conclusions 296 Appendix A Example of Microsoft Azure Cloud Service: Filemanager 299 References 309 Index 317.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Faynberg, Igor.
- Chichester, West Sussex, UK : John Wiley & Sons, Ltd., [2016]
- Description
- Book — 1 online resource.
- Summary
-
- About the Authors ix Acknowledgments xi
- 1 Introduction 1 References 6
- 2 The Business of Cloud Computing 7 2.1 IT Industry Transformation through Virtualization and Cloud 7 2.2 The Business Model Around Cloud 13 2.2.1 Cloud Providers 14 2.2.2 Software and Service Vendors 15 2.3 Taking Cloud to the Network Operators 15 References 18
- 3 CPU Virtualization 19 3.1 Motivation and History 20 3.2 A Computer Architecture Primer 21 3.2.1 CPU, Memory, and I/O 21 3.2.2 How the CPU Works 23 3.2.3 In-program Control Transfer: Jumps and Procedure Calls 25 3.2.4 Interrupts and Exceptions the CPU Loop Refined 28 3.2.5 Multi-processing and its Requirements The Need for an Operating System 34 3.2.6 Virtual Memory Segmentation and Paging 38 3.2.7 Options in Handling Privileged Instructions and the Final Approximation of the CPU Loop 42 3.2.8 More on Operating Systems 44 3.3 Virtualization and Hypervisors 48 3.3.1 Model, Requirements, and Issues 49 3.3.2 The x86 Processor and Virtualization 52 3.3.3 Dealing with a Non-virtualizable CPU 55 3.3.4 I/O Virtualization 57 3.3.5 Hypervisor Examples 60 3.3.6 Security 65 References 69
- 4 Data Networks The Nervous System of the Cloud 71 4.1 The OSI Reference Model 74 4.1.1 Host-to-Host Communications 74 4.1.2 Interlayer Communications 76 4.1.3 Functional Description of Layers 79 4.2 The Internet Protocol Suite 85 4.2.1 IP The Glue of the Internet 87 4.2.2 The Internet Hourglass 98 4.3 Quality of Service in IP Networks 102 4.3.1 Packet Scheduling Disciplines and Traffic Specification Models 103 4.3.2 Integrated Services 105 4.3.3 Differentiated Services 109 4.3.4 Multiprotocol Label Switching (MPLS) 112 4.4 WAN Virtualization Technologies 117 4.5 Software-Defined Network 120 4.6 Security of IP 125 References 129
- 5 Networking Appliances 131 5.1 Domain Name System 131 5.1.1 Architecture and Protocol 134 5.1.2 DNS Operation 140 5.1.3 Top-Level Domain Labels 142 5.1.4 DNS Security 145 5.2 Firewalls 149 5.2.1 Network Perimeter Control 153 5.2.2 Stateless Firewalls 155 5.2.3 Stateful Firewalls 158 5.2.4 Application-Layer Firewalls 161 5.3 NAT Boxes 163 5.3.1 Allocation of Private IP Addresses 165 5.3.2 Architecture and Operation of the NAT Boxes 168 5.3.3 Living with NAT 172 5.3.4 Carrier-Grade NAT 180 5.4 Load Balancers 184 5.4.1 Load Balancing in a Server Farm 185 5.4.2 A Practical Example: A Load-Balanced Web Service 187 5.4.3 Using DNS for Load Balancing 188 References 191
- 6 Cloud Storage and the Structure of a Modern Data Center 193 6.1 Data Center Basics 195 6.1.1 Compute 196 6.1.2 Storage 196 6.1.3 Networking 198 6.2 Storage-Related Matters 198 6.2.1 Direct-Attached Storage 200 6.2.2 Network-Attached Storage 208 6.2.3 Storage Area Network 215 6.2.4 Convergence of SAN and Ethernet 221 6.2.5 Object Storage 230 6.2.6 Storage Virtualization 233 6.2.7 Solid-State Storage 236 References 242
- 7 Operations, Management, and Orchestration in the Cloud 245 7.1 Orchestration in the Enterprise 247 7.1.1 The Service-Oriented Architecture 253 7.1.2 Workflows 255 7.2 Network and Operations Management 259 7.2.1 The OSI Network Management Framework and Model 261 7.2.2 Policy-Based Management 264 7.3 Orchestration and Management in the Cloud 267 7.3.1 The Life Cycle of a Service 268 7.3.2 Orchestration and Management in OpenStack 274 7.4 Identity and Access Management 287 7.4.1 Implications of Cloud Computing 289 7.4.2 Authentication 291 7.4.3 Access Control 295 7.4.4 Dynamic Delegation 299 7.4.5 Identity Federation 302 7.4.6 OpenStack Keystone (A Case Study) 303 References 309 Appendix: Selected Topics 313 A.1 The IETF Operations and Management Standards 313 A.1.1 SNMP 313 A.1.2 COPS 316 A.1.3 Network Configuration (NETCONF) Model and Protocol 319 A.2 Orchestration with TOSCA 324 A.3 The REST Architectural Style 329 A.3.1 The Origins and Development of Hypermedia 329 A.3.2 Highlights of the World Wide Web Architecture 332 A.3.3 The Principles of REST 334 A.4 Identity and Access Management Mechanisms 336 A.4.1 Password Management 336 A.4.2 Kerberos 338 A.4.3 Access Control Lists 341 A.4.4 Capability Lists 342 A.4.5 The Bell LaPadula Model 343 A.4.6 Security Assertion Markup Language 345 A.4.7 OAuth 2.0 347 A.4.8 OpenID Connect 349 A.4.9 Access Control Markup Language 351 References 353 Index 355.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- New York : Nova Science Publishers, 2016.
- Description
- Book — 1 online resource.
- Summary
-
This book presents original results on the leading edge of computer science research. The first chapter begins by presenting several supervised machine learning methods and their applications in analysing microarray and genotyping data to classify and predict sample phenotypes. Chapter two presents the design and implementation of the EstiNet cloud, and evaluates its performance. Chapter three proposes a simple high switching power supply designed especially for large battery charging. Chapter four studies the constant control of temperature, with the microcontroller PIC, by iterative adjustments of the temperature on a thermal sensor from the heat source. Chapter five proposes two types of pinning control protocols to ensure group consensus regardless of the magnitude of the coupling strengths among the agents. Chapter six describes how point clouds are constructed, and provides a brief discussion on the currently available software that is used for the processing of point clouds. The final chapter reviews the metamodels used to approximate computationally expensive simulations.
(source: Nielsen Book Data)
14. Lean computing for the cloud [2016]
- Bauer, Eric, author.
- [Princeton, NJ] : IEEE Press/Wiley, 2016.
- Description
- Book — 1 online resource
- Summary
-
- Introduction xi Acknowledgments xv Abbreviations xvii
- 1. Basics 1 1.1 Cloud Computing Fundamentals 1 1.2 Roles in Cloud Computing 6 1.3 Applications 9 1.3.1 Application Service Quality 11 1.4 Demand, Supply, Capacity, and Fungibility 13 1.5 Demand Variability 16 1.6 Chapter Review 18
- 2. Rethinking Capacity Management 19 2.1 Capacity Management 19 2.2 Demand Management 21 2.3 Performance Management 21 2.4 Canonical Capacity Management 23 2.4.1 Traditional Capacity Management 24 2.4.2 ITIL Capacity Management 27 2.4.3 eTOM Capacity Management 28 2.4.4 Discussion 30 2.5 Three Cloud Capacity Management Problems 30 2.5.1 Physical Resource Capacity Management 31 2.5.2 Virtual Resource Capacity Management 32 2.5.3 Application Capacity Management 33 2.6 Cloud Capacity Management as a Value Chain 36 2.7 Chapter Review 39
- 3. Lean Thinking on Cloud Capacity Management 41 3.1 Lean Thinking Overview 41 3.2 Goal 42 3.3 Seeing Waste (Nonvalue-Adding Activities) 43 3.3.1 Reserve Capacity 45 3.3.2 Excess Application Capacity 46 3.3.3 Excess Online Infrastructure Capacity 46 3.3.4 Excess Physical Infrastructure Capacity 46 3.3.5 Inadequate Capacity 47 3.3.6 Infrastructure Overhead 48 3.3.7 Capacity Management Overhead 48 3.3.8 Resource Overhead 49 3.3.9 Power Management Overhead 50 3.3.10 Workload Migration 50 3.3.11 Complexity Overhead 51 3.3.12 Resource Allocation Failure 51 3.3.13 Leaking and Lost Resources 53 3.3.14 Waste Heat 53 3.3.15 Carbon Footprint 54 3.4 Key Principles 54 3.4.1 Move toward Flow 55 3.4.2 Pull versus Push 55 3.4.3 Level the Workload 55 3.4.4 Stop and Fix Problems 55 3.4.5 Master Practices 56 3.4.6 Visual Management 57 3.4.7 Use Well-Tested Technology 57 3.4.8 Take a Long-Term Perspective 58 3.4.9 Grow, Learn, and Teach Others 58 3.4.10 Develop Exceptional People 58 3.4.11 Partners Help Each Other Improve 58 3.4.12 Go See 59 3.4.13 Implement Rapidly 59 3.4.14 Become a Learning Organization 59 3.5 Pillar: Respect 59 3.6 Pillar: Continuous Improvement 61 3.7 Foundation 62 3.8 Cadence 62 3.9 Lean Capacity Management Philosophy 63 3.10 Chapter Review 64
- 4. Lean Cloud Capacity Management Strategy 67 4.1 Lean Application Service Provider Strategy 68 4.1.1 User Workload Placement 71 4.1.2 Application Performance Management 73 4.2 Lean Infrastructure Service Provider Strategies 73 4.2.1 Physical Resource Capacity Management 76 4.3 Full Stream Optimization 77 4.4 Chapter Review 79
- 5. Electric Power Generation as Cloud Infrastructure Analog 81 5.1 Power Generation as a Cloud Infrastructure Analog 81 5.2 Business Context 83 5.3 Business Structure 86 5.4 Technical Similarities 88 5.5 Impedance and Fungibility 91 5.6 Capacity Ratings 94 5.7 Bottled Capacity 95 5.8 Location of Production Considerations 95 5.9 Demand Management 97 5.10 Demand and Reserves 98 5.11 Service Curtailment 99 5.12 Balance and Grid Operations 100 5.13 Chapter Review 103
- 6. Application Capacity Management as an Inventory Management Problem 105 6.1 The Application Capacity Management Service Delivery Chain 105 6.2 Traditional Application Service Production Chain 107 6.3 Elasticity and Demand-Driven Capacity Management 108 6.4 Application Service as Retail Analog 110 6.4.1 Locational Consideration 112 6.4.2 Inventory and Capacity 112 6.4.3 Service Level 113 6.4.4 Inventory Carrying Costs 114 6.4.5 Inventory Decision, Planning, and Ordering 115 6.4.6 Agility 118 6.4.7 Changing Consumption Patterns 118 6.5 Chapter Review 118
- 7. Lean Demand Management 119 7.1 Infrastructure Demand Management Techniques 120 7.1.1 Resource Scheduling 121 7.1.2 Resource Curtailment 121 7.1.3 Mandatory Demand Shaping 122 7.1.4 Voluntary Demand Shaping 123 7.1.5 Scheduling Maintenance Actions 123 7.1.6 Resource Pricing 123 7.2 Application Demand Management Techniques 124 7.2.1 Queues and Buffers 124 7.2.2 Load Balancers 124 7.2.3 Overload Controls 125 7.2.4 Explicit Demand Management Actions 125 7.2.5 Scheduling Maintenance Actions 125 7.2.6 User Pricing Strategies 126 7.3 Full Stream Analysis Methodology 126 7.3.1 Analyze Applications' Natural Demand Patterns 127 7.3.2 Analyze Applications' Tolerances 128 7.3.3 Create Attractive Infrastructure Pricing Models 129 7.3.4 Deploy Optimal Infrastructure Demand Management Models 130 7.4 Chapter Review 131
- 8. Lean Reserves 133 8.1 What Is Reserve Capacity? 133 8.2 Uses of Reserve Capacity 135 8.2.1 Random Demand Peaks 135 8.2.2 Component or Resource Failure 136 8.2.3 Infrastructure Element Failure 136 8.2.4 Infrastructure Resource Curtailment or Demand Management Action 137 8.2.5 Demand Exceeding Forecast 137 8.2.6 Lead Time Demand 137 8.2.7 Catastrophic Failures and Force Majeure Events 139 8.3 Reserve Capacity as a Feature 139 8.4 Types of Reserve Capacity 140 8.4.1 Automatic Infrastructure Power Management Controls 140 8.4.2 Utilize Application Reserve Capacity 141 8.4.3 Place/Migrate Demand into Underutilized Capacity 141 8.4.4 Grow Online Capacity 141 8.4.5 Service Curtailment/Degradation 141 8.4.6 Mandatory Demand Shaping 141 8.4.7 Voluntary Demand Shaping 142 8.4.8 Emergency Reserves 142 8.5 Limits of Reserve Capacity 144 8.6 Ideal Reserve 144 8.6.1 Normal (Co-located) Reserve 144 8.6.2 Emergency (Geographically Distributed) Reserve 146 8.7 Chapter Review 147
- 9. Lean Infrastructure Commitment 149 9.1 Unit Commitment and Infrastructure Commitment 150 9.2 Framing the Unit Commitment Problem 151 9.3 Framing the Infrastructure Commitment Problem 153 9.4 Understanding Element Startup Time 155 9.5 Understanding Element Shutdown Time 157 9.6 Pulling It All Together 160 9.7 Chapter Review 166
- 10. Lean Cloud Capacity Management Performance Indicators 167 10.1 Perfect Capacity Metrics 168 10.2 Capacity Management Metrics 172 10.3 Infrastructure Commitment Metrics 173 10.4 Waste Metrics 174 10.4.1 Reserve Capacity Waste Metrics 174 10.4.2 Excess Application Capacity Metrics 175 10.4.3 Excess Online Infrastructure Capacity Metrics 175 10.4.4 Excess Physical Infrastructure Capacity Metrics 175 10.4.5 Inadequate Capacity Metrics 175 10.4.6 Infrastructure Overhead Waste Metrics 176 10.4.7 Capacity Management Overhead Waste Metrics 176 10.4.8 Resource Overhead Waste Metrics 176 10.4.9 Power Management Overhead Waste Metrics 177 10.4.10 Workload Migration Metrics 177 10.4.11 Complexity Overhead Metrics 178 10.4.12 Resource Allocation Failure Metrics 178 10.4.13 Leaking and Lost Resources 179 10.4.14 Waste Heat Metrics 179 10.4.15 Carbon Footprint Metrics 180 10.5 Key Principle Indicators 180 10.6 Cost of Poor Quality 181 10.7 Metrics and Service Boundaries 182 10.8 Measurements and Maturity 183 10.9 Chapter Review 185
- 11. Summary 187 11.1 Cloud Computing as a Service Delivery Chain 187 11.2 Lean Cloud Computing 190 11.3 Reimagining Cloud Capacity 192 11.4 Lean Demand Management 195 11.5 Lean Reserves 197 11.6 Lean Infrastructure Service Provider Considerations 198 11.7 Lean Application Service Provider Considerations 198 11.8 Lean Infrastructure Commitment 199 11.9 Visualizing Perfect Capacity 201 11.10 Lean Cloud Computing Metrics 203 11.11 Concluding Remarks 204 References 207 About the Author 211 Index 213.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Verma, Dinesh C.
- Hoboken, New Jersey : John Wiley & Sons Inc., [2014]
- Description
- Book — 1 online resource.
- Summary
-
This book provides an overview of technologies to maximize the quality of user experience for mobile, data-centric applications. Chapters cover techniques mobile network operators can use to maximize the effectiveness of congested networks, techniques that mobile application developers can use to minimize the impact of congested networks on user experience, and techniques that websites and data center operators can use to support a growing number of mobile users. With no technical jargon and a practical approach, this book offers a useful resource for a wide range of mobile network developers
16. Computer architecture technology trends [1991]
- Second edition. - Minneapolis, Minnesota : Architecture Technology Corporation, 1991. Oxford, United Kingdom : Distributed outside the USA/Canada by Elsevier Advanced Technology,
- Description
- Book — 1 online resource.
- Chebel-Morello, Brigitte, author.
- London, UK : ISTE, Ltd. ; Hoboken, NJ : Wiley, 2017.
- Description
- Book — 1 online resource.
- Summary
-
- Part 1. Traceability of Information and Knowledge Management 1. Intelligent Traceability of Equipment. 2. A Knowledge-orientedâ ¨ Maintenance Platform. 3. Intelligent Traceability Application.
- Part 2. Post-prognostic Decision 4. Position of Decision within the PHM Context. 5. Towards a Policy ofâ ¨ Predictive Maintenance. 6. Maintenance in Operational Conditions.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
18. Horizons in computer science research [2017]
- New York : Nova Science Publishers, [2017]
- Description
- Book — 1 online resource.
- Summary
-
- Preface
- Trajectory Planning
- Mobile Technology: Advances, Applications & Challenges
- Accessibility Models of Cloud Services Based on a Distributed Cloud Architecture
- Parallel Dynamic Programming for Large-Scale Data Applications
- Ensemble of Both Texture & Color Features for Reliable Person Re-Identification
- Detecting Movement within Indoor Environments Using Passive & Active Tracking Technologies
- Quadratic Programming Formulation for Controlling the Emissions of Air Pollution Point Sources
- Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Houndmills, Basingstoke, Hampshire ; New York : Palgrave Macmillan, 2016.
- Description
- Book — 1 online resource (viii, 298 pages.)
- Summary
-
- Introduction -Leslie Willcocks, Chris Sauer and Mary Lacity.- PART I. CRITICAL RESEARCH.- Chapter 1: Doolin, B. (1998), "Information technology as disciplinary technology: being critical in interpretive research on information systems, " JIT, Vol. 13, pp. 301-311.- Chapter 2: Brooke, C. (2002), "What does it mean to be 'critical' in IS research?" JIT, Vol. 17, pp. 49-57.- Chapter 3: Brook, C. (2002), "Critical perspectives on information systems-- an impression of the research landscape, " JIT, Vol. 17, pp. 271-283.- Chapter 4: Doolin, B. and Lowe, A. (2002), "To reveal is to critique: actor-network theory and critical information systems research, " JIT, Vol. 17, 69-78-. Chapter 5: Cecez-Kecmanovic, D., Janson, M., and Brown, A. (2002), "The rationality framework for a critical study of information systems, JIT, Vol. 17, pp. 215-227.- PART II. GROUNDED THEORY APPROACHES.- Chapter 6: Urquhart, C. and Fernandez, W. (2013), "Using grounded theory method in information systems: the researcher as blank slate and other myths, " JIT, Vol. 28, pp. 224-236.- Chapter 7: Seidel, S., and Urquhart, C. (2013), "On emergence and forcing in information systems grounded theory studies: the case of Strauss and Corbin, " JIT, Vol. 28, pp. 237-260.- PART III. HISTORICAL APPROACHES.- Chapter 8: Land, F. (2010), "The use of history in IS research: an opportunity missed?" JIT, Vol. 25, pp. 385-394.- Chapter 9: Mitev, N., de Vaujany, F.X. (2012), "Seizing the opportunity: towards a historiography of information systems, " JIT, Vol. 27, pp. 110-124-. Chapter 10: Bonner, W. (2013), "History and IS - Broadening our view and understanding: Actor-Network Theory as a methodology, " JIT, Vol. 28, pp. 111-123.
- .
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
20. Ionic 2 blueprints : build real-time, scalable, and interactive mobile apps with the Ionic framework [2016]
- Siṃha, Indramohana, author.
- Birmingham : Packt Publishing [2016].
- Description
- Book — 1 online resource.
- Summary
-
Build real-time, scalable, and interactive mobile apps with the Ionic framework About This Book * Create amazing, cross-platform hybrid native apps using a projects-based approach * Discover ways to make the best use of the latest features in Ionic to build on a wide array of applications * This is the right learning curve for you if you want to take the leap from an intermediate-level to a pro front-end developer with Ionic Who This Book Is For This book is for intermediate-level Ionic developers who have some experience in working with Ionic, but don't yet have a complete idea how powerful Ionic can be to create real-time apps with dynamic functionality. What You Will Learn * Get to grips with the features of Ionic for application development * Build a Chat app with Firebase and Ionic * Make a stock tracking app using the third-party REST API and build its layouts with Ionic Navigation and Pages * Use Cordova plugins with Ionic to build a media player app * Create a production-ready application by using Ionic components, services, and Firebase as a back end * Get to know the best practices to create real-time Ionic applications In Detail Ionic 2, the latest version of Ionic Mobile SDK, is built on the top of latest technologies such as Angular 2, TypeScript, SASS, and lot more. The idea behind Ionic 2 is to make the entire app development process even more fun. This book makes it possible to build fun and engaging apps using Ionic 2. You will learn how to use various Ionic components, integrate external services, derive capabilities, and most importantly how to make professional apps with Ionic 2. It will help you in understanding the fundamentals of Ionic 2 app development and will show how to build applications, gradually increasing your capabilities and the complexity of applications so that you can learn Ionic app development in a consistent and convenient way. You will also explore services such as Firebase, using LocalStorage, the WordPress JSON API, and REST API, which will help you turn your next billion dollar idea into reality. By the end of this book, you will be able to proudly call yourself a pro Ionic developer who can create a host of different apps with Ionic, and you'll have a deeper practical understanding of Ionic. Style and approach A practical project-based approach helps you create five-six different apps on your own using the various features of Ionic in each project.
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.