Narrow your search
Listing 1 - 10 of 27 << page
of 3
>>
Sort by

Book
Bootstrapping service mesh implementations with Istio : build reliable, scalable, and secure microservices on kubernetes with service mesh
Author:
ISBN: 1803235969 Year: 2023 Publisher: Birmingham, England : Packt Publishing, Limited,

Loading...
Export citation

Choose an application

Bookmark

Abstract

A step-by-step guide to Istio Service Mesh implementation, with examples of complex and distributed workloads built using microservices architecture and deployed in Kubernetes Purchase of the print or Kindle book includes a free PDF eBook Key Features Learn the design, implementation, and troubleshooting of Istio in a clear and concise format Grasp concepts, ideas, and solutions that can be readily applied in real work environments See Istio in action through examples that cover Terraform, GitOps, AWS, Kubernetes, and Go Book Description Istio is a game-changer in managing connectivity and operational efficiency of microservices, but implementing and using it in applications can be challenging. This book will help you overcome these challenges and gain insights into Istio's features and functionality layer by layer with the help of easy-to-follow examples. It will let you focus on implementing and deploying Istio on the cloud and in production environments instead of dealing with the complexity of demo apps. You'll learn the installation, architecture, and components of Istio Service Mesh, perform multi-cluster installation, and integrate legacy workloads deployed on virtual machines. As you advance, you'll understand how to secure microservices from threats, perform multi-cluster deployments on Kubernetes, use load balancing, monitor application traffic, implement service discovery and management, and much more. You'll also explore other Service Mesh technologies such as Linkerd, Consul, Kuma, and Gloo Mesh. In addition to observing and operating Istio using Kiali, Prometheus, Grafana and Jaeger, you'll perform zero-trust security and reliable communication between distributed applications. After reading this book, you'll be equipped with the practical knowledge and skills needed to use and operate Istio effectively. What you will learn Get an overview of Service Mesh and the problems it solves Become well-versed with the fundamentals of Istio, its architecture, installation, and deployment Extend the Istio data plane using WebAssembly (Wasm) and learn why Envoy is used as a data plane Understand how to use OPA Gatekeeper to automate Istio's best practices Manage communication between microservices using Istio Explore different ways to secure the communication between microservices Get insights into traffic flow in the Service Mesh Learn best practices to deploy and operate Istio in production environments Who this book is for The book is for DevOps engineers, SREs, cloud and software developers, sysadmins, and architects who have been using microservices in Kubernetes-based environments. It addresses challenges in application networking during microservice communications. Working experience on Kubernetes, along with knowledge of DevOps, application networking, security, and programming languages like Golang, will assist with understanding the concepts covered.


Book
Bootstrapping : an integrated approach with Python and Stata
Author:
ISBN: 9783110693348 3110693348 Year: 2021 Publisher: Berlin ; Boston : De Gruyter,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Bootstrapping is a conceptually simple statistical technique to increase the quality of estimates, conduct robustness checks and compute standard errors for virtually any statistic. This book provides an intelligible and compact introduction for students, scientists and practitioners. It not only gives a clear explanation of the underlying concepts but also demonstrates the application of bootstrapping using Python and Stata.


Book
Strategic bootstrapping
Author:
ISBN: 1606496999 Year: 2015 Publisher: New York, New York (222 East 46th Street, New York, NY 10017) : Business Expert Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is about helping entrepreneurs sift through the "noise" regarding bootstrapping a start-up. Ultimately, the cold-hard facts on bootstrapping will be presented. Practically speaking, most entrepreneurs should avoid bootstrapping. However, realistically, most entrepreneurs will need to engage in some form of bootstrapping. The argument then, importantly, shifts to how should one bootstrap? In this era of lean start-ups, effectuation, and bricolage, bootstrapping is oft romanticized but seldom analyzed. This book is different from other bootstrapping books in two key ways. First, it draws on evidence from scientific study to offer best practices. Second, it utilizes this evidence to help entrepreneurs thrive-- not just survive.


Book
Quick boot : a guide for embedded firmware developers
Author:
ISBN: 1501506722 Year: 2018 Publisher: Boston : DeG Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Quick Boot is designed to give developers a background in the basic architecture and details of a typical boot sequence. More specifically, this book describes the basic initialization sequence that allows developers the freedom to boot an OS without a fully featured system BIOS. Various specifications provide the basics of both the code bases and the standards. This book also provides insights into optimization techniques for more advanced developers. With proper background information, the required specifications on hand, and diligence, many developers can create quality boot solutions using this text. Pete Dice is Engineering Director of Verifone, where he manages OS Engineering teams in Dublin, Ireland and Riga Latvia. Dice successfully launched Intel® Quark™, Intel's first generation SoC as well as invented the Intel® Galileo™ development board and developed a freemium SW strategy to scale Intel IoT gateway features across product lines. He is also credited with architecting the "Moon Island" software stack and business model.


Book
Overdraft Facility Policy and Firm Performance : An Empirical Analysis in Eastern European Union Industrial Firms
Authors: ---
Year: 2012 Publisher: Washington, D.C., The World Bank,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This article evaluates the effect of the overdraft facility (or line of credit) policy by comparing a large sample of overdraft facilitated firms and matched non-overdraft facilitated firms from Eastern Europe at the sector level. The sample firms are compared with respect to rates of different performance indicators including: technical efficiency (a Data Envelopment Analysis approach is applied to estimate the technical efficiency level for individual sectors), production workers trained, expenditures on research and development, and export activity. In order to avoid the selectivity problem, propensity score matching methodologies are adopted. The results suggest that a certain level of overdraft facility provided to firms would be needed to stimulate investment in research and development, which will eventually result in increased growth in productivity.


Book
Overdraft Facility Policy and Firm Performance : An Empirical Analysis in Eastern European Union Industrial Firms
Authors: ---
Year: 2012 Publisher: Washington, D.C., The World Bank,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This article evaluates the effect of the overdraft facility (or line of credit) policy by comparing a large sample of overdraft facilitated firms and matched non-overdraft facilitated firms from Eastern Europe at the sector level. The sample firms are compared with respect to rates of different performance indicators including: technical efficiency (a Data Envelopment Analysis approach is applied to estimate the technical efficiency level for individual sectors), production workers trained, expenditures on research and development, and export activity. In order to avoid the selectivity problem, propensity score matching methodologies are adopted. The results suggest that a certain level of overdraft facility provided to firms would be needed to stimulate investment in research and development, which will eventually result in increased growth in productivity.


Book
System Firmware : An Essential Guide to Open Source and Embedded Solutions
Authors: ---
ISBN: 1484279387 1484279395 Year: 2022 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Find the right bootloader solution or combination of firmware required to boot a platform considering its security, product features, and optimized boot solutions. This book covers system boot firmware, focusing on real-world firmware migration from closed source to open source adaptation. The book provides an architectural overview of popular boot firmware. This includes both closed sourced and/or open source in nature, such as Unified Extensible Firmware Interface (UEFI), coreboot, and Slim Bootloader and their applicable market segments based on product development and deployment requirements. Traditional system firmware is often complex and closed sourced whereas modern firmware is still a kind of hybrid between closed and open source. But what might a future firmware model look like? The most simplistic boot firmware solution uses open source firmware development. This book helps you decide how to choose the right boot firmware for your products and develop your own boot firmware using open source. Coverage includes: Why open source firmware is used over closed source The pros and cons of closed and open source firmware A hybrid work model: for faster bring-up activity using closed source, binary integrated with open source firmware What You Will Learn Understand the architecture of standard and popular boot firmware Pick the correct bootloader for your required target hardware Design a hybrid workflow model for the latest chipset platform Understand popular payload architectures and offerings for embedded systems Select the right payload for your bootloader solution to boot to the operating system Optimize the system firmware boot time based on your target hardware requirement Know the product development cycle using open source firmware development.


Book
Network Intelligence Meets User Centered Social Media Networks
Authors: --- --- --- ---
ISBN: 331990311X 3319903128 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This edited volume presents advances in modeling and computational analysis techniques related to networks and online communities. It contains the best papers of notable scientists from the 4th European Network Intelligence Conference (ENIC 2017) that have been peer reviewed and expanded into the present format. The aim of this text is to share knowledge and experience as well as to present recent advances in the field. The book is a nice mix of basic research topics such as data-based centrality measures along with intriguing applied topics, for example, interaction decay patterns in online social communities. This book will appeal to students, professors, and researchers working in the fields of data science, computational social science, and social network analysis. .

Keywords

Computer networks --- Computer bootstrapping. --- Online social networks. --- Electronic social networks --- Social networking Web sites --- Social media --- Social networks --- Sociotechnical systems --- Web sites --- Booting, Computer --- Bootstrapping, Computer --- Computer booting --- Computer systems --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Mathematical models. --- Distributed processing --- Social sciences—Data processing. --- Social sciences—Computer programs. --- Data mining. --- Internet marketing. --- Computational Social Sciences. --- Applications of Graph Theory and Complex Networks. --- Data Mining and Knowledge Discovery. --- Online Marketing/Social Media. --- Graph Theory. --- Online marketing --- Web marketing --- World Wide Web marketing --- Electronic commerce --- Marketing --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Physics. --- Graph theory. --- Graph theory --- Graphs, Theory of --- Theory of graphs --- Combinatorial analysis --- Topology --- Natural philosophy --- Philosophy, Natural --- Physical sciences --- Dynamics --- Extremal problems


Book
Knowing full well
Author:
ISBN: 1282964542 9786612964541 1400836913 9781400836918 9781282964549 9780691143972 0691143978 6612964545 Year: 2011 Publisher: Princeton, N.J. : Princeton University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In this book, Ernest Sosa explains the nature of knowledge through an approach originated by him years ago, known as virtue epistemology. Here he provides the first comprehensive account of his views on epistemic normativity as a form of performance normativity on two levels. On a first level is found the normativity of the apt performance, whose success manifests the performer's competence. On a higher level is found the normativity of the meta-apt performance, which manifests not necessarily first-order skill or competence but rather the reflective good judgment required for proper risk assessment. Sosa develops this bi-level account in multiple ways, by applying it to issues much disputed in recent epistemology: epistemic agency, how knowledge is normatively related to action, the knowledge norm of assertion, and the Meno problem as to how knowledge exceeds merely true belief. A full chapter is devoted to how experience should be understood if it is to figure in the epistemic competence that must be manifest in the truth of any belief apt enough to constitute knowledge. Another takes up the epistemology of testimony from the performance-theoretic perspective. Two other chapters are dedicated to comparisons with ostensibly rival views, such as classical internalist foundationalism, a knowledge-first view, and attributor contextualism. The book concludes with a defense of the epistemic circularity inherent in meta-aptness and thereby in the full aptness of knowing full well.


Book
Data mining for the social sciences : an introduction
Authors: ---
ISBN: 0520280989 0520960599 9780520960596 9780520280977 0520280970 9780520280984 Year: 2015 Publisher: Oakland, California : University of California Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

We live in a world of big data: the amount of information collected on human behavior each day is staggering, and exponentially greater than at any time in the past. Additionally, powerful algorithms are capable of churning through seas of data to uncover patterns. Providing a simple and accessible introduction to data mining, Paul Attewell and David B. Monaghan discuss how data mining substantially differs from conventional statistical modeling familiar to most social scientists. The authors also empower social scientists to tap into these new resources and incorporate data mining methodologies in their analytical toolkits. Data Mining for the Social Sciences demystifies the process by describing the diverse set of techniques available, discussing the strengths and weaknesses of various approaches, and giving practical demonstrations of how to carry out analyses using tools in various statistical software packages.

Listing 1 - 10 of 27 << page
of 3
>>
Sort by