Listing 1 - 10 of 27 | << page >> |
Sort by
|
Choose an application
A step-by-step guide to Istio Service Mesh implementation, with examples of complex and distributed workloads built using microservices architecture and deployed in Kubernetes Purchase of the print or Kindle book includes a free PDF eBook Key Features Learn the design, implementation, and troubleshooting of Istio in a clear and concise format Grasp concepts, ideas, and solutions that can be readily applied in real work environments See Istio in action through examples that cover Terraform, GitOps, AWS, Kubernetes, and Go Book Description Istio is a game-changer in managing connectivity and operational efficiency of microservices, but implementing and using it in applications can be challenging. This book will help you overcome these challenges and gain insights into Istio's features and functionality layer by layer with the help of easy-to-follow examples. It will let you focus on implementing and deploying Istio on the cloud and in production environments instead of dealing with the complexity of demo apps. You'll learn the installation, architecture, and components of Istio Service Mesh, perform multi-cluster installation, and integrate legacy workloads deployed on virtual machines. As you advance, you'll understand how to secure microservices from threats, perform multi-cluster deployments on Kubernetes, use load balancing, monitor application traffic, implement service discovery and management, and much more. You'll also explore other Service Mesh technologies such as Linkerd, Consul, Kuma, and Gloo Mesh. In addition to observing and operating Istio using Kiali, Prometheus, Grafana and Jaeger, you'll perform zero-trust security and reliable communication between distributed applications. After reading this book, you'll be equipped with the practical knowledge and skills needed to use and operate Istio effectively. What you will learn Get an overview of Service Mesh and the problems it solves Become well-versed with the fundamentals of Istio, its architecture, installation, and deployment Extend the Istio data plane using WebAssembly (Wasm) and learn why Envoy is used as a data plane Understand how to use OPA Gatekeeper to automate Istio's best practices Manage communication between microservices using Istio Explore different ways to secure the communication between microservices Get insights into traffic flow in the Service Mesh Learn best practices to deploy and operate Istio in production environments Who this book is for The book is for DevOps engineers, SREs, cloud and software developers, sysadmins, and architects who have been using microservices in Kubernetes-based environments. It addresses challenges in application networking during microservice communications. Working experience on Kubernetes, along with knowledge of DevOps, application networking, security, and programming languages like Golang, will assist with understanding the concepts covered.
Choose an application
Bootstrapping is a conceptually simple statistical technique to increase the quality of estimates, conduct robustness checks and compute standard errors for virtually any statistic. This book provides an intelligible and compact introduction for students, scientists and practitioners. It not only gives a clear explanation of the underlying concepts but also demonstrates the application of bootstrapping using Python and Stata.
Python (Computer program language) --- Computer bootstrapping. --- Booting, Computer --- Bootstrapping, Computer --- Computer booting --- Computer systems --- Scripting languages (Computer science) --- Bootstrapping. --- Computational Statistics. --- Resampling. --- Variance Estimation Methods.
Choose an application
This book is about helping entrepreneurs sift through the "noise" regarding bootstrapping a start-up. Ultimately, the cold-hard facts on bootstrapping will be presented. Practically speaking, most entrepreneurs should avoid bootstrapping. However, realistically, most entrepreneurs will need to engage in some form of bootstrapping. The argument then, importantly, shifts to how should one bootstrap? In this era of lean start-ups, effectuation, and bricolage, bootstrapping is oft romanticized but seldom analyzed. This book is different from other bootstrapping books in two key ways. First, it draws on evidence from scientific study to offer best practices. Second, it utilizes this evidence to help entrepreneurs thrive-- not just survive.
New business enterprises --- Finance. --- Bootstrapping --- new venture strategy --- new venture finance
Choose an application
Quick Boot is designed to give developers a background in the basic architecture and details of a typical boot sequence. More specifically, this book describes the basic initialization sequence that allows developers the freedom to boot an OS without a fully featured system BIOS. Various specifications provide the basics of both the code bases and the standards. This book also provides insights into optimization techniques for more advanced developers. With proper background information, the required specifications on hand, and diligence, many developers can create quality boot solutions using this text. Pete Dice is Engineering Director of Verifone, where he manages OS Engineering teams in Dublin, Ireland and Riga Latvia. Dice successfully launched Intel® Quark™, Intel's first generation SoC as well as invented the Intel® Galileo™ development board and developed a freemium SW strategy to scale Intel IoT gateway features across product lines. He is also credited with architecting the "Moon Island" software stack and business model.
Computer firmware. --- Computer bootstrapping. --- Basic input-output system. --- BIOS. --- Boot. --- CPU. --- Embedded. --- Firmware. --- Memory map. --- PCI. --- Processor. --- UEFI.
Choose an application
This article evaluates the effect of the overdraft facility (or line of credit) policy by comparing a large sample of overdraft facilitated firms and matched non-overdraft facilitated firms from Eastern Europe at the sector level. The sample firms are compared with respect to rates of different performance indicators including: technical efficiency (a Data Envelopment Analysis approach is applied to estimate the technical efficiency level for individual sectors), production workers trained, expenditures on research and development, and export activity. In order to avoid the selectivity problem, propensity score matching methodologies are adopted. The results suggest that a certain level of overdraft facility provided to firms would be needed to stimulate investment in research and development, which will eventually result in increased growth in productivity.
Access to Finance --- Bootstrapping --- Data Envelopment Analysis (DEA) --- Debt Markets --- Economic Theory & Research --- Environmental Economics & Policies --- Finance and Financial Sector Development --- Labor Policies --- Overdraft Facility Policy --- Private Sector Development --- Propensity Score Matching --- Technical Efficiency
Choose an application
This article evaluates the effect of the overdraft facility (or line of credit) policy by comparing a large sample of overdraft facilitated firms and matched non-overdraft facilitated firms from Eastern Europe at the sector level. The sample firms are compared with respect to rates of different performance indicators including: technical efficiency (a Data Envelopment Analysis approach is applied to estimate the technical efficiency level for individual sectors), production workers trained, expenditures on research and development, and export activity. In order to avoid the selectivity problem, propensity score matching methodologies are adopted. The results suggest that a certain level of overdraft facility provided to firms would be needed to stimulate investment in research and development, which will eventually result in increased growth in productivity.
Access to Finance --- Bootstrapping --- Data Envelopment Analysis (DEA) --- Debt Markets --- Economic Theory & Research --- Environmental Economics & Policies --- Finance and Financial Sector Development --- Labor Policies --- Overdraft Facility Policy --- Private Sector Development --- Propensity Score Matching --- Technical Efficiency
Choose an application
Find the right bootloader solution or combination of firmware required to boot a platform considering its security, product features, and optimized boot solutions. This book covers system boot firmware, focusing on real-world firmware migration from closed source to open source adaptation. The book provides an architectural overview of popular boot firmware. This includes both closed sourced and/or open source in nature, such as Unified Extensible Firmware Interface (UEFI), coreboot, and Slim Bootloader and their applicable market segments based on product development and deployment requirements. Traditional system firmware is often complex and closed sourced whereas modern firmware is still a kind of hybrid between closed and open source. But what might a future firmware model look like? The most simplistic boot firmware solution uses open source firmware development. This book helps you decide how to choose the right boot firmware for your products and develop your own boot firmware using open source. Coverage includes: Why open source firmware is used over closed source The pros and cons of closed and open source firmware A hybrid work model: for faster bring-up activity using closed source, binary integrated with open source firmware What You Will Learn Understand the architecture of standard and popular boot firmware Pick the correct bootloader for your required target hardware Design a hybrid workflow model for the latest chipset platform Understand popular payload architectures and offerings for embedded systems Select the right payload for your bootloader solution to boot to the operating system Optimize the system firmware boot time based on your target hardware requirement Know the product development cycle using open source firmware development.
Embedded computer systems. --- Embedded computer systems --- Design and construction. --- Embedded systems (Computer systems) --- Computer systems --- Architecture Analysis and Design Language --- Computer firmware. --- Computer bootstrapping. --- Open source software. --- Free software (Open source software) --- Open code software --- Opensource software --- Computer software --- Booting, Computer --- Bootstrapping, Computer --- Computer booting --- Firmware, Computer --- Computer programs --- Software engineering. --- Computers. --- Data protection. --- Software Engineering. --- Open Source. --- Computer Hardware. --- Data and Information Security. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer software engineering --- Engineering
Choose an application
This edited volume presents advances in modeling and computational analysis techniques related to networks and online communities. It contains the best papers of notable scientists from the 4th European Network Intelligence Conference (ENIC 2017) that have been peer reviewed and expanded into the present format. The aim of this text is to share knowledge and experience as well as to present recent advances in the field. The book is a nice mix of basic research topics such as data-based centrality measures along with intriguing applied topics, for example, interaction decay patterns in online social communities. This book will appeal to students, professors, and researchers working in the fields of data science, computational social science, and social network analysis. .
Computer networks --- Computer bootstrapping. --- Online social networks. --- Electronic social networks --- Social networking Web sites --- Social media --- Social networks --- Sociotechnical systems --- Web sites --- Booting, Computer --- Bootstrapping, Computer --- Computer booting --- Computer systems --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Mathematical models. --- Distributed processing --- Social sciences—Data processing. --- Social sciences—Computer programs. --- Data mining. --- Internet marketing. --- Computational Social Sciences. --- Applications of Graph Theory and Complex Networks. --- Data Mining and Knowledge Discovery. --- Online Marketing/Social Media. --- Graph Theory. --- Online marketing --- Web marketing --- World Wide Web marketing --- Electronic commerce --- Marketing --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Physics. --- Graph theory. --- Graph theory --- Graphs, Theory of --- Theory of graphs --- Combinatorial analysis --- Topology --- Natural philosophy --- Philosophy, Natural --- Physical sciences --- Dynamics --- Extremal problems
Choose an application
In this book, Ernest Sosa explains the nature of knowledge through an approach originated by him years ago, known as virtue epistemology. Here he provides the first comprehensive account of his views on epistemic normativity as a form of performance normativity on two levels. On a first level is found the normativity of the apt performance, whose success manifests the performer's competence. On a higher level is found the normativity of the meta-apt performance, which manifests not necessarily first-order skill or competence but rather the reflective good judgment required for proper risk assessment. Sosa develops this bi-level account in multiple ways, by applying it to issues much disputed in recent epistemology: epistemic agency, how knowledge is normatively related to action, the knowledge norm of assertion, and the Meno problem as to how knowledge exceeds merely true belief. A full chapter is devoted to how experience should be understood if it is to figure in the epistemic competence that must be manifest in the truth of any belief apt enough to constitute knowledge. Another takes up the epistemology of testimony from the performance-theoretic perspective. Two other chapters are dedicated to comparisons with ostensibly rival views, such as classical internalist foundationalism, a knowledge-first view, and attributor contextualism. The book concludes with a defense of the epistemic circularity inherent in meta-aptness and thereby in the full aptness of knowing full well.
Virtue epistemology. --- Epistemic virtue --- Epistemology, Virtue --- Knowledge, Theory of --- Virtue epistemology --- AAA normativity. --- AAA structure. --- Meno problem. --- Meno. --- Plato. --- Platonic problems. --- Theaetus. --- apprehension. --- assertion. --- awareness. --- belief. --- bootstrapping. --- circularity. --- contextualism. --- contextualist fallacy. --- epistemic agency. --- epistemic circularity. --- epistemic faculties. --- epistemic normativity. --- epistemic performances. --- epistemology. --- experience. --- experiential states. --- human knowledge. --- ignorance. --- interlocutors. --- knowledge first. --- knowledge. --- meta-aptness. --- normativity. --- perceptual knowledge. --- performance aims. --- performance based. --- performance normativity. --- proper action. --- propositional experience. --- radical knowledge. --- relevant alternatives. --- sensa. --- sense data. --- sensory experience. --- skeptic. --- testimonial knowledge. --- testimonies. --- testimony. --- threshold setting. --- traditional knowledge. --- true belief. --- trust. --- virtue epistemology. --- Ethics --- Philosophy
Choose an application
We live in a world of big data: the amount of information collected on human behavior each day is staggering, and exponentially greater than at any time in the past. Additionally, powerful algorithms are capable of churning through seas of data to uncover patterns. Providing a simple and accessible introduction to data mining, Paul Attewell and David B. Monaghan discuss how data mining substantially differs from conventional statistical modeling familiar to most social scientists. The authors also empower social scientists to tap into these new resources and incorporate data mining methodologies in their analytical toolkits. Data Mining for the Social Sciences demystifies the process by describing the diverse set of techniques available, discussing the strengths and weaknesses of various approaches, and giving practical demonstrations of how to carry out analyses using tools in various statistical software packages.
Social sciences --- Data mining. --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Data processing. --- Statistical methods. --- analyzing data. --- bayesian networks. --- big data. --- bootstrapping. --- business analytics. --- chaid. --- classification and regression trees. --- classification trees. --- confusion matrix. --- data analysis. --- data mining. --- data processing. --- data scholarship. --- data science. --- hardware for data mining. --- heteroscedasticity. --- naive bayes. --- partition trees. --- permutation tests. --- scholarly data. --- social science. --- social scientists. --- software for data mining. --- statistical methods. --- statistical modeling. --- studying data. --- text mining. --- vif regression. --- weka.
Listing 1 - 10 of 27 | << page >> |
Sort by
|