Narrow your search

Library

KBC (4)

KU Leuven (3)

Odisee (3)

Thomas More Kempen (3)

Thomas More Mechelen (3)

UCLL (3)

VIVES (3)

UGent (2)

ULiège (2)

LUCA School of Arts (1)

More...

Resource type

book (5)


Language

English (5)


Year
From To Submit

2023 (1)

2022 (1)

2021 (1)

2018 (2)

Listing 1 - 5 of 5
Sort by

Book
Bootstrapping service mesh implementations with Istio : build reliable, scalable, and secure microservices on kubernetes with service mesh
Author:
ISBN: 1803235969 Year: 2023 Publisher: Birmingham, England : Packt Publishing, Limited,

Loading...
Export citation

Choose an application

Bookmark

Abstract

A step-by-step guide to Istio Service Mesh implementation, with examples of complex and distributed workloads built using microservices architecture and deployed in Kubernetes Purchase of the print or Kindle book includes a free PDF eBook Key Features Learn the design, implementation, and troubleshooting of Istio in a clear and concise format Grasp concepts, ideas, and solutions that can be readily applied in real work environments See Istio in action through examples that cover Terraform, GitOps, AWS, Kubernetes, and Go Book Description Istio is a game-changer in managing connectivity and operational efficiency of microservices, but implementing and using it in applications can be challenging. This book will help you overcome these challenges and gain insights into Istio's features and functionality layer by layer with the help of easy-to-follow examples. It will let you focus on implementing and deploying Istio on the cloud and in production environments instead of dealing with the complexity of demo apps. You'll learn the installation, architecture, and components of Istio Service Mesh, perform multi-cluster installation, and integrate legacy workloads deployed on virtual machines. As you advance, you'll understand how to secure microservices from threats, perform multi-cluster deployments on Kubernetes, use load balancing, monitor application traffic, implement service discovery and management, and much more. You'll also explore other Service Mesh technologies such as Linkerd, Consul, Kuma, and Gloo Mesh. In addition to observing and operating Istio using Kiali, Prometheus, Grafana and Jaeger, you'll perform zero-trust security and reliable communication between distributed applications. After reading this book, you'll be equipped with the practical knowledge and skills needed to use and operate Istio effectively. What you will learn Get an overview of Service Mesh and the problems it solves Become well-versed with the fundamentals of Istio, its architecture, installation, and deployment Extend the Istio data plane using WebAssembly (Wasm) and learn why Envoy is used as a data plane Understand how to use OPA Gatekeeper to automate Istio's best practices Manage communication between microservices using Istio Explore different ways to secure the communication between microservices Get insights into traffic flow in the Service Mesh Learn best practices to deploy and operate Istio in production environments Who this book is for The book is for DevOps engineers, SREs, cloud and software developers, sysadmins, and architects who have been using microservices in Kubernetes-based environments. It addresses challenges in application networking during microservice communications. Working experience on Kubernetes, along with knowledge of DevOps, application networking, security, and programming languages like Golang, will assist with understanding the concepts covered.


Book
Quick boot : a guide for embedded firmware developers
Author:
ISBN: 1501506722 Year: 2018 Publisher: Boston : DeG Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Quick Boot is designed to give developers a background in the basic architecture and details of a typical boot sequence. More specifically, this book describes the basic initialization sequence that allows developers the freedom to boot an OS without a fully featured system BIOS. Various specifications provide the basics of both the code bases and the standards. This book also provides insights into optimization techniques for more advanced developers. With proper background information, the required specifications on hand, and diligence, many developers can create quality boot solutions using this text. Pete Dice is Engineering Director of Verifone, where he manages OS Engineering teams in Dublin, Ireland and Riga Latvia. Dice successfully launched Intel® Quark™, Intel's first generation SoC as well as invented the Intel® Galileo™ development board and developed a freemium SW strategy to scale Intel IoT gateway features across product lines. He is also credited with architecting the "Moon Island" software stack and business model.


Book
Bootstrapping
Author:
ISBN: 9783110693348 3110693348 Year: 2021 Publisher: Berlin Boston

Loading...
Export citation

Choose an application

Bookmark

Abstract

Bootstrapping is a conceptually simple statistical technique to increase the quality of estimates, conduct robustness checks and compute standard errors for virtually any statistic. This book provides an intelligible and compact introduction for students, scientists and practitioners. It not only gives a clear explanation of the underlying concepts but also demonstrates the application of bootstrapping using Python and Stata.


Book
System Firmware : An Essential Guide to Open Source and Embedded Solutions
Authors: ---
ISBN: 1484279387 1484279395 Year: 2022 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Find the right bootloader solution or combination of firmware required to boot a platform considering its security, product features, and optimized boot solutions. This book covers system boot firmware, focusing on real-world firmware migration from closed source to open source adaptation. The book provides an architectural overview of popular boot firmware. This includes both closed sourced and/or open source in nature, such as Unified Extensible Firmware Interface (UEFI), coreboot, and Slim Bootloader and their applicable market segments based on product development and deployment requirements. Traditional system firmware is often complex and closed sourced whereas modern firmware is still a kind of hybrid between closed and open source. But what might a future firmware model look like? The most simplistic boot firmware solution uses open source firmware development. This book helps you decide how to choose the right boot firmware for your products and develop your own boot firmware using open source. Coverage includes: Why open source firmware is used over closed source The pros and cons of closed and open source firmware A hybrid work model: for faster bring-up activity using closed source, binary integrated with open source firmware What You Will Learn Understand the architecture of standard and popular boot firmware Pick the correct bootloader for your required target hardware Design a hybrid workflow model for the latest chipset platform Understand popular payload architectures and offerings for embedded systems Select the right payload for your bootloader solution to boot to the operating system Optimize the system firmware boot time based on your target hardware requirement Know the product development cycle using open source firmware development.


Book
Network Intelligence Meets User Centered Social Media Networks
Authors: --- --- --- ---
ISBN: 331990311X 3319903128 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This edited volume presents advances in modeling and computational analysis techniques related to networks and online communities. It contains the best papers of notable scientists from the 4th European Network Intelligence Conference (ENIC 2017) that have been peer reviewed and expanded into the present format. The aim of this text is to share knowledge and experience as well as to present recent advances in the field. The book is a nice mix of basic research topics such as data-based centrality measures along with intriguing applied topics, for example, interaction decay patterns in online social communities. This book will appeal to students, professors, and researchers working in the fields of data science, computational social science, and social network analysis. .

Keywords

Computer networks --- Computer bootstrapping. --- Online social networks. --- Electronic social networks --- Social networking Web sites --- Social media --- Social networks --- Sociotechnical systems --- Web sites --- Booting, Computer --- Bootstrapping, Computer --- Computer booting --- Computer systems --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Mathematical models. --- Distributed processing --- Social sciences—Data processing. --- Social sciences—Computer programs. --- Data mining. --- Internet marketing. --- Computational Social Sciences. --- Applications of Graph Theory and Complex Networks. --- Data Mining and Knowledge Discovery. --- Online Marketing/Social Media. --- Graph Theory. --- Online marketing --- Web marketing --- World Wide Web marketing --- Electronic commerce --- Marketing --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Physics. --- Graph theory. --- Graph theory --- Graphs, Theory of --- Theory of graphs --- Combinatorial analysis --- Topology --- Natural philosophy --- Philosophy, Natural --- Physical sciences --- Dynamics --- Extremal problems

Listing 1 - 5 of 5
Sort by