Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Computer und IT

Produkte filtern

Produktbild für Samsung Galaxy S23/ S23+

Samsung Galaxy S23/ S23+

Die verständliche Anleitung für Ihr Smartphone:- Alle Funktionen & Einstellungen auf einen Blick- Schritt für Schritt erklärt – mit praktischen TippsMit diesem smarten Praxisbuch gelingt Ihnen der schnelle und sichere Einstieg in Ihr Smartphone. Lernen Sie die Samsung Galaxy S23-Modelle kennen und beherrschen! Anschauliche Anleitungen, Beispiele und Bilder zeigen Ihnen gut nachvollziehbar, wie Sie Ihr mobiles Gerät optimal handhaben – von der Ersteinrichtung und Personalisierung über die große Funktionsvielfalt bis zu den wichtigsten Anwendungen. Nutzen Sie darüber hinaus die übersichtlichen Spicker-Darstellungen: Damit können Sie jene Bedienungsschritte, die man am häufigsten braucht, aber immer wieder vergisst, auf einen Blick finden und umsetzen. Freuen Sie sich auf viele hilfreiche Tipps und legen Sie ganz einfach los!Aus dem Inhalt:- Alle Bedienelemente der Samsung Galaxy S23-Modelle auf einen Blick- Ersteinrichtung und Tipps zum Umzug- Google-Konto erstellen und verwalten- Die Benutzeroberfläche Ihres Smartphones personalisieren- Apps aus dem Play Store herunterladen- Kontakte anlegen und im Adressbuch verwalten- Anrufe tätigen und SMS austauschen - Nachrichten über Mail und WhatsApp versenden und empfangen- Uhr, Kalender, Maps und andere praktische Apps nutzen - Fotos sowie Videos aufnehmen, verwalten und teilen- Ins Internet gehen über WLAN und mobile Daten - Updates, Datenschutz und Sicherheit

Regulärer Preis: 9,99 €
Produktbild für Zeitwirtschaft mit SAP

Zeitwirtschaft mit SAP

Erfassen Sie die Arbeitszeit Ihrer Mitarbeitenden schnell und rechtssicher in Ihrem SAP-System! Dieses Buch zeigt Ihnen, wie Sie das Customizing und die einzelnen Prozessschritte der Zeitwirtschaft in SAP ERP und SAP S/4HANA am besten durchlaufen. Mit vielen Beispielen, Anleitungen und Tipps für die Anpassung an Ihr Unternehmen. Aus dem Inhalt: Arbeitszeitpläne und InfotypenZeitbindung und KollisionsprüfungZeitereignissePaarbildung und TageszuordnungToleranzen und FehlerprüfungenZeitlohnarten und ZeitkontenSoll- und MehrarbeitszeitZeitnachweisSelf-Services mit SAP FioriSystem Landscape Optimization (SLO)SAP SuccessFactors Employee Central Time Management (inkl. Time Tracking)User-Exits und BAdIs   Einleitung ... 19   1.  Customizing der Arbeitszeitpläne ... 25        1.1 ... Grundlagen ... 25        1.2 ... Personalteilbereiche gruppieren ... 29        1.3 ... Arbeitspausenpläne ... 29        1.4 ... Tagesarbeitszeitpläne ... 32        1.5 ... Periodenarbeitszeitpläne ... 38        1.6 ... Regeln für Tagestypen ... 41        1.7 ... Arbeitszeitplanregeln ... 42        1.8 ... Arbeitszeitplanregeln generieren ... 46        1.9 ... Fazit ... 48   2.  Customizing der Infotypen der Zeitwirtschaft ... 49        2.1 ... Infotyp 2001 (Abwesenheiten) ... 49        2.2 ... Infotyp 2002 (Anwesenheiten) ... 64        2.3 ... Infotyp 2003 (Vertretungen) ... 67        2.4 ... Infotyp 2004 (Bereitschaften) ... 71        2.5 ... Infotyp 2005 (Mehrarbeiten) ... 75        2.6 ... Infotyp 2006 (Abwesenheitskontingente) ... 77        2.7 ... Infotyp 2007 (Anwesenheitskontingente) ... 97        2.8 ... Infotyp 2010 (Entgeltbelege) ... 102        2.9 ... Infotyp 2011 (Zeitereignisse) ... 106        2.10 ... Infotyp 2012 (Zeitumbuchungsvorgaben) ... 106        2.11 ... Infotyp 2013 (Kontingentkorrekturen) ... 112        2.12 ... Fazit ... 113   3.  Zeitbindung und Kollisionsprüfungen ... 115        3.1 ... Einführung ... 115        3.2 ... Beispiel: Zeitbindung in der Zeitwirtschaft ... 117        3.3 ... Customizing der Zeitbindungsklassen der Abwesenheiten ... 119        3.4 ... Customizing der Zeitbindungsklassen bei Vertretungsarten ... 121        3.5 ... Customizing der Zeitbindungsklassen bei Anwesenheiten ... 123        3.6 ... Customizing der Zeitbindungsklassen bei Abwesenheitskontingenten ... 124        3.7 ... Customizing der Zeitbindungsklassen bei Bereitschaftsarten ... 125        3.8 ... Customizing der Zeitbindungsklassen bei Anwesenheitskontingenten ... 126        3.9 ... Zeitbindungsreaktionen ... 127        3.10 ... Fazit ... 128   4.  Customizing der Personalzeitereignisse ... 131        4.1 ... Personalzeitereignisarten ... 131        4.2 ... Gruppierungen für Personalzeitereignisarten ... 134        4.3 ... Schnittstellen ... 135        4.4 ... Die Tabelle TEVEN und ihre Besonderheiten ... 147        4.5 ... Weitere Funktionen der HR-PDC-Schnittstelle ... 148        4.6 ... Fazit ... 151   5.  User Interfaces ... 153        5.1 ... Arbeitsvorrat ... 154        5.2 ... Time Manager's Workplace ... 157        5.3 ... Kundeneigene User Interfaces ... 163        5.4 ... Zeiterfassung mit FLOW ... 172        5.5 ... Fazit ... 177   6.  Schemen der Zeitwirtschaft ... 179        6.1 ... Schema TM00 ... 179        6.2 ... Schema TM01 ... 181        6.3 ... Schema TM02 ... 181        6.4 ... Schema TM04 ... 182        6.5 ... Der Schemeneditor ... 183        6.6 ... Arbeiten mit dem Schemeneditor ... 184        6.7 ... Fazit ... 198   7.  Initialisierung der Zeitauswertung ... 201        7.1 ... Der Initialisierungsblock ... 202        7.2 ... Die Personalrechenregel MODT ... 203        7.3 ... Verarbeitung des Initialisierungsblocks ... 206        7.4 ... Fazit ... 207   8.  Paarbildung, Tageszuordnung und Verarbeitungszustände ... 209        8.1 ... Verarbeitungszustände ... 210        8.2 ... Fehler aus der Paarbildung/Tageszuordnung ... 222        8.3 ... Fazit ... 224   9.  Zeitdaten bereitstellen ... 225        9.1 ... Arbeitszeitplan und Zeitereignisse ... 225        9.2 ... Abwesenheiten ... 236        9.3 ... Anwesenheiten ... 239        9.4 ... Kurzarbeit ... 241        9.5 ... Zeitdaten prüfen ... 244        9.6 ... Fazit ... 246 10.  Toleranzen und Fehlerprüfungen ... 247        10.1 ... Abwesenheiten ausrichten ... 247        10.2 ... Auf fehlerhaften Tag prüfen ... 250        10.3 ... Paare auf Fehler überprüfen ... 251        10.4 ... Toleranzen aus dem Tagesarbeitszeitplan verarbeiten ... 253        10.5 ... Fazit ... 253 11.  Sollarbeitszeiten ermitteln ... 255        11.1 ... Tabelle TZP (Tageszeitpunkte) ... 255        11.2 ... Zeitpaare runden ... 257        11.3 ... Funktion DYNBR (Bestimme dynamische Pausen) ... 260        11.4 ... Funktion TIMTP (Zuordnung der Zeitarten) ... 264        11.5 ... Funktion PBRKS (Pausen einbauen) ... 266        11.6 ... Funktion DEFTP (Sollpaarermittlung) ... 267        11.7 ... Abwesenheiten kürzen ... 270        11.8 ... Abwesenheiten mit Zeitkompensation ... 274        11.9 ... Dienstgänge kürzen ... 275        11.10 ... Fallbeispiele ... 278        11.11 ... Fazit ... 288 12.  Mehrarbeitszeiten ermitteln ... 291        12.1 ... Mehrarbeitsermittlung im Schema TM00 ... 292        12.2 ... Mehrarbeitsberechnung mit Kontingenten ... 293        12.3 ... Mehrarbeitsberechnung nach dem Infotyp 0050 (Zeiterfassungsinformationen) ... 299        12.4 ... Mehrarbeitsberechnung mit Genehmigung TAZP ... 300        12.5 ... Mehrarbeitsberechnung ohne Genehmigung ... 301        12.6 ... Mehrarbeitsermittlung mit Rundung ... 301        12.7 ... Mehrarbeitsermittlung auf Wochenbasis ... 305        12.8 ... Sonderanforderungen ... 320        12.9 ... Vereinfachtes Genehmigungsverfahren im Time Manager's Workplace ... 324        12.10 ... Bestimmung der Kernnachtarbeitskennzeichen ... 327        12.11 ... Fazit ... 330 13.  Zeitlohnartengenerierung ... 333        13.1 ... Organisatorische Voraussetzungen ... 333        13.2 ... Einfluss von Bewertungsklassen ... 335        13.3 ... Einstieg in die Lohnartengenerierung ... 337        13.4 ... Fazit ... 351 14.  Zeitkonten führen ... 353        14.1 ... Tagessalden bilden ... 354        14.2 ... Zeitzuschläge/Zeitabzüge gewähren ... 356        14.3 ... Gleitzeitsaldo, Mehrarbeits- und Produktivstunden ... 359        14.4 ... Zeitsalden durch Abwesenheiten abbauen ... 360        14.5 ... Abwesenheitskontingente führen ... 361        14.6 ... Kumulierte Salden fortschreiben ... 363        14.7 ... Fazit ... 366 15.  Endeverarbeitung ... 367        15.1 ... Der Block »Endeverarbeitung« ... 367        15.2 ... Gleitzeitsaldoüberschuss in Mehrarbeit ... 369        15.3 ... Funktion LIMIT (Grenzwerte für Zeitsalden) ... 370        15.4 ... Funktion EXPRT (Export der Abrechnungsergebnisse) ... 381        15.5 ... Fazit ... 381 16.  Funktionen der Zeitauswertung ... 383        16.1 ... Einführung ... 383        16.2 ... Verzeichnis der Funktionen in der Zeitauswertung ... 387        16.3 ... Beschreibung der wichtigsten Funktionen in der Zeitauswertung ... 394        16.4 ... Fazit ... 402 17.  Operationen der Zeitwirtschaft ... 403        17.1 ... Entscheidungsoperationen ... 403        17.2 ... Operationen, die eine oder mehrere Aktionen einleiten ... 418        17.3 ... Verzweigungsoperationen ... 436        17.4 ... Zusammenhang von Funktionen, Operationen und Tabellen ... 439        17.5 ... Fazit ... 439 18.  Kundeneigene Funktionen und Operationen ... 441        18.1 ... Kundeneigene Operationen anlegen ... 441        18.2 ... Kundeneigene Funktionen anlegen ... 448        18.3 ... Fazit ... 454 19.  Integration in die Personalabrechnung ... 455        19.1 ... Zeitauswertung im Rahmen der Personalabrechnung ... 455        19.2 ... Verarbeitung der Zeitlohnarten ... 461        19.3 ... Verarbeitung von Kurzarbeit aus Zeitwirtschaftssicht ... 462        19.4 ... Entgeltumwandlung in ein Zeitkonto ... 463        19.5 ... Fazit ... 464 20.  Zeitnachweis ... 465        20.1 ... Übersicht der Technologien ... 465        20.2 ... Neuen Zeitnachweis einrichten ... 469        20.3 ... Erweiterungen und Use Cases ... 472        20.4 ... Fazit ... 478 21.  SAP-Fiori-Self-Services in der Zeitwirtschaft ... 479        21.1 ... Einführung in SAP Fiori ... 479        21.2 ... Übersicht der SAP-Fiori-Self-Services ... 481        21.3 ... Technische Einrichtung und Konfiguration ... 482        21.4 ... Erweiterungen und Use Cases ... 496        21.5 ... Fazit ... 500 22.  Zeitwirtschaft in SAP SuccessFactors ... 501        22.1 ... Unterschiede zwischen SAP ERP HCM und SAP SuccessFactors Employee Central -- Time Management ... 502        22.2 ... SAP SuccessFactors Employee Central Time Management ... 503        22.3 ... Objekte in SAP SuccessFactors Employee Central Time Management ... 509        22.4 ... SAP SuccessFactors Employee Central Time Tracking ... 511        22.5 ... Geplante Funktionserweiterungen ... 516        22.6 ... Fazit ... 517   Anhang ... 519        A ... User-Exits und BAdIs ... 521        B ... Tabellen ... 635        C ... Personalrechenregeln ... 643        D ... Operationen ... 661        E ... Funktionen ... 683        F ... Merkmale ... 705        G ... Schemen ... 707        H ... Transaktionen ... 711   Die Autoren ... 715   Index ... 717

Regulärer Preis: 89,90 €
Produktbild für Das Computerlexikon für Einsteiger

Das Computerlexikon für Einsteiger

Ihr Computer oder Mobiltelefon meldet sich ständig mit unverständlichen Forderungen zu Wort, der Besuch im Elektronikfachmarkt ist regelrechter Stress, und die Gespräche der Kinder und Enkelkinder klingen oft nach Kauderwelsch? Wenn Sie endlich wissen möchten, ob Sie wirklich einen 4.0-GHz-Quad-Core-Prozessor benötigen, ein Add-on im Internet installieren sollen, oder einfach neugierig sind, was hinter Bitcoin, Streaming, Smart Home & Co. steckt – dieses Wörterbuch spricht Ihre Sprache und hilft Ihnen über alle Verständnishürden im digitalen Alltag hinweg. Aus dem Inhalt:- Über 1.800 Fachbegriffe aus dem digitalen Alltag- Neu mit ausführlichen Infos zu Smart Home, Künstliche Intelligenz, Bitcoin u.v.m.- Alle Abkürzungen zum schnellen Nachschlagen- Über 600 Abbildungen zu Geräten, Anschlüssen und Programmen- Basiswissen: Tastatur, Maus und Touchscreen- Grundwortschatz und Computerbedienung Englisch-Deutsch- Tipps zum Computer- und Tabletkauf- Mit Aussprachehinweisen für Fachbegriffe und Fremdwörter im Anhang

Regulärer Preis: 19,90 €
Produktbild für Interaction Design

Interaction Design

A DELIGHTFUL, ENGAGING, AND COMPREHENSIVE OVERVIEW OF INTERACTION DESIGNEffective and engaging design is a critical component of any digital product, from virtual reality software to chatbots, smartphone apps, and more. In the newly updated sixth edition of Interaction Design: Beyond Human-Computer Interaction, a team of accomplished technology, design, and computing professors delivers an intuitive and instructive discussion of the principles underlying the design of effective interactive technologies. The authors discuss how to design and apply digital technologies in the real world, illustrated with numerous examples. The book explores the interdisciplinary foundations of interaction design, including skills from product design, computer science, human and social psychology, and others. The book builds on the highly successful fifth edition and draws on extensive new research and interviews with accomplished professionals and researchers in the field that reflect a rapidly-changing landscape. It is supported by a website hosting digital resources that add to and complement the material contained within. Readers will also find:* Explorations of the social and emotional components of interacting with apps, digital devices and computers* Descriptions about how to design, prototype, evaluate and construct technologies that support human-computer interaction* Discussions of the cognitive aspects of interaction design, as well as design and evaluation, including usability testing and expert reviews. An essential text for undergraduate and graduate students of human-computer interaction, interaction design, software engineering, web design, and information studies, Interaction Design will also prove to be indispensable for interaction design and user experience professionals. YVONNE ROGERS is the Director of the Interaction Centre at University College London as well as a Professor of Interaction Design. HELEN SHARP is Professor of Software Engineering at the Open University, UK. JENNIFER PREECE is Professor and Dean Emerita in the College of Information, Maryland’s iSchool – at the University of Maryland.

Regulärer Preis: 61,99 €
Produktbild für Practical OpenTelemetry

Practical OpenTelemetry

Learn the value that OpenTelemetry can bring to organizations that aim to implement observability best practices, and gain a deeper understanding of how different building blocks interact with each other to bring out-of-the-box, vendor-neutral instrumentation to your stack. With examples in Java, this book shows how to use OpenTelemetry APIs and configure plugins and SDKs to instrument services and produce valuable telemetry data. You’ll learn how to maximize adoption of OpenTelemetry and encourage the change needed in debugging workflows to reduce cognitive load for engineers troubleshooting production workloads.Adopting observability best practices across an organization is challenging. This book begins with a discussion of how operational monitoring processes widely followed for decades fall short at providing the insights needed for debugging cloud-native, distributed systems in production. The book goes on to show how the Cloud Native Computing Foundation’s OpenTelemetry project helps you standardize instrumentation and transport of telemetry signals, providing a common language for all observability tooling.YOU WILL LEARN* Why observability is a necessity in modern distributed systems* The value of OpenTelemetry for engineers and organizations * OpenTelemetry component specification and general design* Tracing, metrics, and logs APIs and SDKs, with examples in Java* OpenTelemetry Collectors and recommended transport and processing pipelines* How to adopt observability standards across an organizationWHO THIS BOOK IS FORSoftware engineers familiar with cloud-native technologies and operational monitoring who want to instrument and export telemetry data from their services; observability leads who want to roll out OpenTelemetry standards and best practices across their organizations; and Java developers who want a book with OpenTelemetry examples in that languageDANIEL GOMEZ BLANCO is a Principal Engineer at Skyscanner, leading their observability transformation across hundreds of services to ensure that travelers get a reliable and performant experience when booking their next holiday. He is an advocate of open standards and CNCF projects such as OpenTelemetry to back the instrumentation and collection of operational data. Daniel has experience working in organizations of all sizes, from international institutions such as CERN in Geneva, to London startups such as SKIPJAQ. His main focus has always been building software and adopting solutions to minimize the cognitive load required for engineers to support and operate production services. PART I. THE NEED FOR OBSERVABILITY WITH OPENTELEMETRY1. The Need for Observabilitya. Why Observability Mattersb. Context and Correlation2. How OpenTelemetry Enables Observabilitya. OpenTelemetry’s Missionb. The Power of Open Standardsc. The Shift In Vendor Added ValuePART II. OPENTELEMETRY COMPONENTS AND BEST PRACTICES3. OpenTelemetry Fundamentalsa. OpenTelemetry Specificationb. Semantic Conventions4. Auto-Instrumentationa. Resource SDKb. Instrumentation Libraries5. Context, Baggage, and Propagatorsa. Telemetry Context and the Context APIb. Baggage APIc. Cross-Service Context and the Propagators API6. Tracinga. What is a Distributed Trace?b. Tracing APIc. Tracing SDKd. Trace Context Propagation7. Metricsa. Measurements, Metrics and Time Seriesb. Metrics APIc. Metrics SDK8. Logginga. The Purpose of Logs for Observabilityb. Logging APIc. Logging SDKd. Integrations with Logging Frameworks9. Protocol and Collectora. Protocolb. Collector10. Sampling and Common Deployment Modelsa. Common Deployment Modelsb. Trace SamplingPART III. ROLLING OUT OPENTELEMETRY ACROSS YOUR ORGANISATION11. Maximizing Adoption by Minimizing Frictiona. Investing in Telemetry Enablementb. Adopting OpenTelemetry12. Adopting Observabilitya. Shifting Debugging Workflowsb. Expanding Contextc. Keeping Telemetry Valuable

Regulärer Preis: 56,99 €
Produktbild für Machine Learning for Business Analytics

Machine Learning for Business Analytics

MACHINE LEARNING FOR BUSINESS ANALYTICSMACHINE LEARNING—ALSO KNOWN AS DATA MINING OR DATA ANALYTICS—IS A FUNDAMENTAL PART OF DATA SCIENCE. IT IS USED BY ORGANIZATIONS IN A WIDE VARIETY OF ARENAS TO TURN RAW DATA INTO ACTIONABLE INFORMATION.Machine Learning for Business Analytics: Concepts, Techniques and Applications in RapidMiner provides a comprehensive introduction and an overview of this methodology. This best-selling textbook covers both statistical and machine learning algorithms for prediction, classification, visualization, dimension reduction, rule mining, recommendations, clustering, text mining, experimentation and network analytics. Along with hands-on exercises and real-life case studies, it also discusses managerial and ethical issues for responsible use of machine learning techniques. This is the seventh edition of Machine Learning for Business Analytics, and the first using RapidMiner software. This edition also includes:* A new co-author, Amit Deokar, who brings experience teaching business analytics courses using RapidMiner* Integrated use of RapidMiner, an open-source machine learning platform that has become commercially popular in recent years* An expanded chapter focused on discussion of deep learning techniques* A new chapter on experimental feedback techniques including A/B testing, uplift modeling, and reinforcement learning* A new chapter on responsible data science* Updates and new material based on feedback from instructors teaching MBA, Masters in Business Analytics and related programs, undergraduate, diploma and executive courses, and from their students* A full chapter devoted to relevant case studies with more than a dozen cases demonstrating applications for the machine learning techniques * End-of-chapter exercises that help readers gauge and expand their comprehension and competency of the material presented* A companion website with more than two dozen data sets, and instructor materials including exercise solutions, slides, and case solutions This textbook is an ideal resource for upper-level undergraduate and graduate level courses in data science, predictive analytics, and business analytics. It is also an excellent reference for analysts, researchers, and data science practitioners working with quantitative data in management, finance, marketing, operations management, information systems, computer science, and information technology. GALIT SHMUELI, PHD, is Distinguished Professor at National Tsing Hua University’s Institute of Service Science, College of Technology Management. She has designed and instructed business analytics courses since 2004 at University of Maryland, Statistics.com, The Indian School of Business, and National Tsing Hua University, Taiwan. PETER C. BRUCE, is Founder of the Institute for Statistics Education at Statistics.com, and Chief Learning Officer at Elder Research, Inc. AMIT V. DEOKAR, PHD, is Associate Dean of Undergraduate Programs and an Associate Professor of Management Information Systems at the Manning School of Business at University of Massachusetts Lowell. Since 2006, he has developed and taught courses in business analytics, with expertise in using the RapidMiner platform. He is an Association for Information Systems Distinguished Member Cum Laude. NITIN R. PATEL, PHD, is cofounder and lead researcher at Cytel Inc. He was also a co-founder of Tata Consultancy Services. A Fellow of the American Statistical Association, Dr. Patel has served as a visiting professor at the Massachusetts Institute of Technology and at Harvard University. He is a Fellow of the Computer Society of India and was a professor at the Indian Institute of Management, Ahmedabad, for 15 years. Foreword by Ravi Bapna xxiPreface to the RapidMiner Edition xxiiiAcknowledgments xxviiPART I PRELIMINARIESCHAPTER 1INTRODUCTION 31.1 What Is Business Analytics? 31.2 What Is Machine Learning? 51.3 Machine Learning, AI, and Related Terms 51.4 Big Data 71.5 Data Science 81.6 Why Are There So Many Different Methods? 91.7 Terminology and Notation 91.8 Road Maps to This Book 121.9 Using RapidMiner Studio 14CHAPTER 2OVERVIEW OF THE MACHINE LEARNING PROCESS 192.1 Introduction 192.2 Core Ideas in Machine Learning 202.3 The Steps in a Machine Learning Project 232.4 Preliminary Steps 252.5 Predictive Power and Overfitting 322.6 Building a Predictive Model with RapidMiner 372.7 Using RapidMiner for Machine Learning 452.8 Automating Machine Learning Solutions 472.9 Ethical Practice in Machine Learning 52PART II DATA EXPLORATION AND DIMENSION REDUCTIONCHAPTER 3DATA VISUALIZATION 633.1 Introduction 633.2 Data Examples 653.3 Basic Charts: Bar Charts, Line Charts, and Scatter Plots 663.4 Multidimensional Visualization 753.5 Specialized Visualizations 873.6 Summary: Major Visualizations and Operations, by Machine Learning Goal 92CHAPTER 4DIMENSION REDUCTION 974.1 Introduction 974.2 Curse of Dimensionality 984.3 Practical Considerations 984.4 Data Summaries 1004.5 Correlation Analysis 1034.6 Reducing the Number of Categories in Categorical Attributes 1054.7 Converting a Categorical Attribute to a Numerical Attribute 1074.8 Principal Component Analysis 1074.9 Dimension Reduction Using Regression Models 1174.10 Dimension Reduction Using Classification and Regression Trees 119PART III PERFORMANCE EVALUATIONCHAPTER 5EVALUATING PREDICTIVE PERFORMANCE 1255.1 Introduction 1255.2 Evaluating Predictive Performance 1265.3 Judging Classifier Performance 1315.4 Judging Ranking Performance 1465.5 Oversampling 151PART IV PREDICTION AND CLASSIFICATION METHODSCHAPTER 6MULTIPLE LINEAR REGRESSION 1636.1 Introduction 1636.2 Explanatory vs. Predictive Modeling 1646.3 Estimating the Regression Equation and Prediction 1666.4 Variable Selection in Linear Regression 171CHAPTER 7K-NEAREST NEIGHBORS (K-NN) 1897.1 The k-NN Classifier (Categorical Label) 1897.2 K-NN for a Numerical Label 2007.3 Advantages and Shortcomings of K-NN Algorithms 202CHAPTER 8THE NAIVE BAYES CLASSIFIER 2098.1 Introduction 2098.2 Applying the Full (Exact) Bayesian Classifier 2118.3 Solution: Naive Bayes 2138.4 Advantages and Shortcomings of the Naive Bayes Classifier 223CHAPTER 9CLASSIFICATION AND REGRESSION TREES 2299.1 Introduction 2299.2 Classification Trees 2329.3 Evaluating the Performance of a Classification Tree 2409.4 Avoiding Overfitting 2459.5 Classification Rules from Trees 2559.6 Classification Trees for More Than Two Classes 2569.7 Regression Trees 2569.8 Improving Prediction: Random Forests and Boosted Trees 2599.9 Advantages and Weaknesses of a Tree 261CHAPTER 10 LOGISTIC REGRESSION 26910.1 Introduction 26910.2 The Logistic Regression Model 27110.3 Example: Acceptance of Personal Loan 27210.4 Logistic Regression for Multi-class Classification 28310.5 Example of Complete Analysis: Predicting Delayed Flights 286CHAPTER 11 NEURAL NETWORKS 30511.1 Introduction 30611.2 Concept and Structure of a Neural Network 30611.3 Fitting a Network to Data 30711.4 Required User Input 32111.5 Exploring the Relationship Between Predictors and Target Attribute 32211.6 Deep Learning 32311.7 Advantages and Weaknesses of Neural Networks 334CHAPTER 12 DISCRIMINANT ANALYSIS 33712.1 Introduction 33712.2 Distance of a Record from a Class 34012.3 Fisher’s Linear Classification Functions 34112.4 Classification Performance of Discriminant Analysis 34612.5 Prior Probabilities 34812.6 Unequal Misclassification Costs 34812.7 Classifying More Than Two Classes 34912.8 Advantages and Weaknesses 351CHAPTER 13 GENERATING, COMPARING, AND COMBINING MULTIPLE MODELS 35913.1 Automated Machine Learning (AutoML) 35913.2 Explaining Model Predictions 36713.3 Ensembles 37313.4 Summary 381PART V INTERVENTION AND USER FEEDBACKCHAPTER 14 INTERVENTIONS: EXPERIMENTS, UPLIFT MODELS, AND REINFORCEMENT LEARNING 38714.1 A/B Testing 38714.2 Uplift (Persuasion) Modeling 39314.3 Reinforcement Learning 40014.4 Summary 405PART VI MINING RELATIONSHIPS AMONG RECORDSCHAPTER 15 ASSOCIATION RULES AND COLLABORATIVE FILTERING 40915.1 Association Rules 40915.2 Collaborative Filtering 42415.3 Summary 438CHAPTER 16 CLUSTER ANALYSIS 44516.1 Introduction 44516.2 Measuring Distance Between Two Records 44916.3 Measuring Distance Between Two Clusters 45516.4 Hierarchical (Agglomerative) Clustering 45716.5 Non-Hierarchical Clustering: The k-Means Algorithm 466PART VII FORECASTING TIME SERIESCHAPTER 17 HANDLING TIME SERIES 47917.1 Introduction 48017.2 Descriptive vs. Predictive Modeling 48117.3 Popular Forecasting Methods in Business 48117.4 Time Series Components 48217.5 Data Partitioning and Performance Evaluation 486CHAPTER 18 REGRESSION-BASED FORECASTING 49718.1 A Model with Trend 49818.2 A Model with Seasonality 50418.3 A Model with Trend and Seasonality 50818.4 Autocorrelation and ARIMA Models 509CHAPTER 19 SMOOTHING AND DEEP LEARNING METHODS FOR FORECASTING 53319.1 Smoothing Methods: Introduction 53419.2 Moving Average 53419.3 Simple Exponential Smoothing 54119.4 Advanced Exponential Smoothing 54519.5 Deep Learning for Forecasting 549PART VIII DATA ANALYTICSCHAPTER 20 SOCIAL NETWORK ANALYTICS 56320.1 Introduction 56320.2 Directed vs. Undirected Networks 56420.3 Visualizing and Analyzing Networks 56720.4 Social Data Metrics and Taxonomy 57120.5 Using Network Metrics in Prediction and Classification 57720.6 Collecting Social Network Data with RapidMiner 58420.7 Advantages and Disadvantages 584CHAPTER 21 TEXT MINING 58921.1 Introduction 58921.2 The Tabular Representation of Text: Term–Document Matrix and “Bag-of-Words’’ 59021.3 Bag-of-Words vs. Meaning Extraction at Document Level 59221.4 Preprocessing the Text 59321.5 Implementing Machine Learning Methods 60221.6 Example: Online Discussions on Autos and Electronics 60221.7 Example: Sentiment Analysis of Movie Reviews 60721.8 Summary 614CHAPTER 22 RESPONSIBLE DATA SCIENCE 61722.1 Introduction 61722.2 Unintentional Harm 61822.3 Legal Considerations 62022.4 Principles of Responsible Data Science 62122.5 A Responsible Data Science Framework 62422.6 Documentation Tools 62822.7 Example: Applying the RDS Framework to the COMPAS Example 63122.8 Summary 641PART IX CASESCHAPTER 23 CASES 64723.1 Charles Book Club 64723.2 German Credit 65323.3 Tayko Software Cataloger 65823.4 Political Persuasion 66223.5 Taxi Cancellations 66523.6 Segmenting Consumers of Bath Soap 66723.7 Direct-Mail Fundraising 67023.8 Catalog Cross-Selling 67223.9 Time Series Case: Forecasting Public Transportation Demand 67323.10 Loan Approval 675Index 685

Regulärer Preis: 107,99 €
Produktbild für Coding und Making mit Scratch und MakeyMakey

Coding und Making mit Scratch und MakeyMakey

Scratch ist eine visuelle Programmiersprache, sie wurde von der Lifelong Kindergarten Group am MIT entwickelt. Viele neuere erziehungsorientierte Programmiersprachen nehmen sich das Design von Scratch als Vorbild (Snap!, Ozoblockly, Touchdevelop).Scratch ist so einfach in der Bedienung, dass bereits Volksschulkinder damit erste Erfahrungen im Programmieren machen können. Scratch läuft ab Version 2 im Browser, eine Installation ist nicht nötig. Die einzelnen Befehle werden per Drag & Drop zu Sequenzen verbunden, eine kindgerechte Bedienung steht im Vordergrund. Die Projekte werden online gespeichert und können veröffentlicht werden, so sind erste Ergebnisse schnell online verfügbar, aber auch ein lokales Speichern ist möglich.Mit Beiträgen von Bernhard Abfalter, Sabine Apfler, Moritz Brinnich, Elieser Grill, Duy Ho David Tran, Natalie Traxler und Andreas Weiner.Gerhard Brandhofer:HS-Prof. Mag. Dr. Gerhard Brandhofer, BEd hat eine Hochschulprofessur für Mediendidaktik und informatische Bildung an der PH Niederösterreich inne. Zu den Arbeitsschwerpunkten gehören die Planung, Lehre und Forschung im Bereich des Einsatzes von digitalen Medien im Unterricht der Primar- und Sekundarstufe Forschungsaktivitäten und Veröffentlichungen umfassen die Themenfelder der Nutzung digitaler Medien in der Schule wie auch in der Hochschule, die Bedingungen für gelingende informatische Bildung, die Implementierung visueller Programmiersprachen in der Schulbildung.

Regulärer Preis: 13,99 €
Produktbild für Blogging All-in-One For Dummies

Blogging All-in-One For Dummies

BLOG WITH THE BEST OF ‘EM!If you’re looking for a complete guide to creating and solidifying your place in the blogosphere, you’ve come to the right place! With 8 books in one, Blogging All-in-One For Dummies is the only resource you’ll need to get started or to improve your existing blog. Learn about the most popular blogging platforms, creating content worth reading, and methods for driving traffic to your blog. Cut through the confusion and find the facts about monetizing your blog, using the best blogging tools for you, and increasing reader engagement to become an active, successful member of the blogging community. You're ready to start blogging, so let Dummies show you the way!* Perfect your blog idea and choose the best platform for you* Get people to read your blog through search engine optimization and social media promotion* Learn about the latest trends in the blogosphere* Make money from your blog with creative monetization ideasBloggers of all skill and experience levels will find valuable information in Blogging All-in-One For Dummies. AMY LUPOLD BAIR is the founder of Resourceful Mommy Media, LLC, and the author of the parenting and lifestyle blog, Resourceful Mommy. She is the author of Blogging For Dummies, 7th Edition. Introduction 1BOOK 1: ENTERING THE BLOGOSPHERE 7Chapter 1: Joining the Blogosphere 9Chapter 2: Preparing to Start and Write a Blog 27Chapter 3: Blogging Basics 43Chapter 4: Blogging Best Practices 67BOOK 2: NICHE BLOGGING 81Chapter 1: Understanding Niche Blogging 83Chapter 2: Benefiting from a Niche Blog Approach 99Chapter 3: Choosing Your Niche 111Chapter 4: Writing for Your Niche 127BOOK 3: CORPORATE AND NON-PROFIT BLOGGING 149Chapter 1: Starting a Business Blog 151Chapter 2: Developing a Blog Plan 177Chapter 3: Choosing Bloggers 199Chapter 4: Writing an Organization’s Blog 215Chapter 5: Keeping Yourself and Your Organization Out of Trouble 227BOOK 4: FIGURING OUT BLOGGING PLATFORMS 241Chapter 1: Choosing a Blogging Platform 243Chapter 2: Finding the Right Blogging Platform 253Chapter 3: Taking a Look at WordPress 269Chapter 4: Using Google Blogger 301Chapter 5: Understanding Medium 331Chapter 6: Blogging with Wix 365BOOK 5: BLOGGING TOOLS 401Chapter 1: Optimizing for Search Engines 403Chapter 2: Measuring Blog Performance 419Chapter 3: Enhancing Content 435Chapter 4: Staying Organized 455BOOK 6: PROMOTING AND GROWING YOUR BLOG 479Chapter 1: Secrets to Blogging Success 481Chapter 2: Building Community 491Chapter 3: Social Networking 499Chapter 4: Distributing Content 515Chapter 5: Inviting or Being a Guest Blogger 529BOOK 7: MAKING MONEY FROM YOUR BLOG 539Chapter 1: Blog Advertising 101 541Chapter 2: Publishing Advertising 549Chapter 3: Making Money with Affiliate Marketing 575Chapter 4: Publishing Sponsored Posts 589Chapter 5: Monetizing with Social Commerce 603Chapter 6: Selling Ad Space Directly 623Chapter 7: Benefiting from Indirect Monetization Opportunities 633BOOK 8: MOVING BEYOND WRITING BLOG POSTS 641Chapter 1: Painting a Picture with Visual Content 643Chapter 2: Reaching Your Audience with Video Content 665Chapter 3: Getting Social with Social Media 683Chapter 4: Creating a Podcast 711Index 727

Regulärer Preis: 25,99 €
Produktbild für TCP/IP - Grundlagen und Praxis (3. Auflg.)

TCP/IP - Grundlagen und Praxis (3. Auflg.)

Seit vielen Jahren das unverzichtbare Standardwerk. Jetzt in 3., aktualisierter und überarbeiteter Auflage aus Februar 2023. TCP/IP gilt als Standard für die Kommunikation in Netzwerken – sowohl im lokalen Bereich als auch im weltumspannenden Internet. Wie jede Protokollfamilie so setzt sich auch TCP/IP aus verschiedenen Komponenten zusammen. Sie werden im Rahmen dieses Buches mit folgenden Schwerpunktthemen umfassend erläutert:Entwicklung und Funktion von NetzwerkenSwitching und RoutingProtokolle der TCP/IP-FamilieAdressierung im Netzwerk (statisch, dynamisch per DHCP)Namensauflösung im IP-Netzwerk (Domain Name Service)Routing-Protokolle im IP-Netzwerk und deren FunktionSpezielle Dienste auf Basis von TCP/IPTCP/IP in kabellosen Netzwerken (WLAN, Bluetooth, DSL-Vectoring usw.)Sicherheit im IP-Netzwerk (IPsec, VPN, SSL)Weiterentwicklungen auf Basis von IPv6Internet der Dinge (IoT)Implementierung von TCP/IP in BetriebssystemenNeben den Grundlagen werden auch praktische Aspekte beleuchtet, die für die tägliche Arbeit von Relevanz sein können. So wird beispielsweise der Analyse von Netzwerkstörungen ein ganzes Kapitel gewidmet. Außerdem wird beispielhaft im Anhang die TCP/IP-Konfiguration auf verschiedenen Betriebssystemplattformen dargestellt oder zum Thema »Sicherheit« ein datenzentrisch abgesicherter »Sicherheitsschild« vorgestellt.Zum Autor:Gerhard Lienemann arbeitete ab 1991 für etwa 12 Jahre als Netzwerkadministrator in einem produzierenden Betrieb, bevor er ins technische Management wechselte. Seitdem war er zunächst zuständig für operative Kommunikationssicherheit und übernahm dann zusätzlich die Betreuung eines europäischen Netzwerkteams. Nur kurze Zeit später erweiterte er seine Verantwortung auf ein globales Netzwerkteam in Asien, Nord- und Südamerika. Seiner Leidenschaft „IT-Kommunikation“ ist er auch nach dem Ausscheiden aus dem aktiven Berufsleben treu geblieben.

Regulärer Preis: 39,90 €
Produktbild für Angular (4. Auflg.)

Angular (4. Auflg.)

Grundlagen, fortgeschrittene Themen und Best Practices. Inkl. RxJS, NgRx und a11y in aktueller 4. Auflage aus Februar 2023.Das große Praxisbuch zu Angular!Mit einem anspruchsvollen Beispielprojekt führen die Autoren Sie durch die Welt von Angular. Entwickeln Sie Schritt für Schritt eine umfangreiche modulare Single-Page-Anwendung und üben Sie Angular im praktischen Einsatz. Mit seinen umfangreichen Theorieteilen ist dieses Buch außerdem Ihr praktischer Begleiter im Entwicklungsalltag.Die Autoren sind erfahrene Workshopleiter, Entwickler und internationale Konferenzsprecher. In dieser vollständig überarbeiteten Auflage vermitteln sie die Best Practices aus ihrer täglichen Arbeit mit Angular. Aufgrund ihres Engagements rund um das Buch und Angular wurden Ferdinand und Johannes als Google Developer Experts (GDE) ausgezeichnet.Aus dem Inhalt:Reaktive Programmierung mit RxJSState Management mit Redux und NgRxTesting mit Jasmine, Karma, Jest und CypressModule und Standalone ComponentsRouting und GuardsHTTP und InterceptorsFormularverarbeitungDependency Injection und ServicesBarrierefreiheit (a11y)Internationalisierung (i18n)Progressive Web Apps (PWA)Erste Kenntnisse in JavaScript und HTML sind von Vorteil, aber keine Voraussetzung. Wer nicht mit TypeScript vertraut ist, findet im Buch eine fundierte Einführung.Auf der Website zum Buch werden außerdem regelmäßig Aktualisierungen und Neuigkeiten rund um Angular veröffentlicht.Über die Autoren:Ferdinand Malcher ist Google Developer Expert (GDE) und arbeitet als selbständiger Entwickler, Berater und Mediengestalter mit Schwerpunkt auf Angular, RxJS und TypeScript. Gemeinsam mit Johannes Hoppe hat er die Angular.Schule gegründet und bietet Schulungen zu Angular an.Danny Koppenhagen arbeitet als Softwarearchitekt und Entwickler. Sein Schwerpunkt liegt in der Frontend-Architektur und der Entwicklung von Enterprise Webanwendungen auf Basis von Node.js, TypeScript, Angular und Vue. Neben der beruflichen Tätigkeit ist Danny als Autor mehrerer Open-Source-Projekte aktiv.Johannes Hoppe ist Google Developer Expert (GDE) und arbeitet als selbständiger Trainer und Berater für Angular, .NET und Node.js. Zusammen mit Ferdinand Malcher hat er die Angular.Schule gegründet und bietet Workshops und Beratung zu Angular an. Johannes ist Organisator des Angular Heidelberg Meetup.Sie erreichen das Autorenteam auf Twitter unter @angular_buch.Mehr Infos und Kontaktmöglichkeiten finden Sie unter https://angular-buch.com/autoren.Zielgruppe: Webentwickler*innenJavaScript-Entwickler*innenApp-Entwickler*innen

Regulärer Preis: 42,90 €
Produktbild für Reinventing ITIL® and DevOps with Digital Transformation

Reinventing ITIL® and DevOps with Digital Transformation

The second edition of this book has been fully updated to show how the DevOps way of working has continued to adapt to changing technologies. The ITIL processes which were an integral part of the DevOps world have been merged with the DevOps framework, reflecting the current emphasis on product models rather than viewing project and support models separately.This book starts with the basics of digital transformation before exploring how this works in practice: that is, people, processes and technology, and org structures. It delves into value streams that are the basis for ITIL and DevOps, highlighting the differences between the methods of the past and new methodologies needed to ensure products to meet contemporary expectations. This updated edition includes new chapters that discuss digital transformation for business success, introduce the battle tank framework, leading people in the digital world, managing work in a remote working model, and the product-led transformation model. These new chapters provide the guidance necessary to move beyond DevOps into a holistic digital transformation exercise.The ideas, recommendations, and solutions you'll learn over the course of this book can be applied to develop solutions or create proposals for clients, and to deliver seamless services for DevOps projects.WHAT YOU WILL LEARN* Understand digital transformation* Leverage the battle tank framework for digital transformation* Gain insight into the confluence of DevOps and ITIL* Adapt ITIL processes in DevOps projects* Move organizations from a project to a product-led model * Lead teams in a digital world* Manage the work of remote teamsWHO THIS BOOK IS FORIT consultants and IT professionals who are looking for guidance to strategize, plan and implement digital transformation initiatives; design and redesign ITIL processes to adapt to the digital ways of working; moving organizations to product-led business; and leading people and managing work in the digital age.ABHINAV KRISHNA KAISER works as a consulting partner in a leading consulting firm. He has led several digital transformation programmes across customers from various sectors. He consults with clients on various transformation initiatives that can be undertaken to come ahead of the curve.Abhinav has worked in past as DevOps architect, Agile coach, service architect and programme manager among other roles. He has conducted several trainings in multiple geographies on DevOps, Agile and ITIL in classroom and remote setting. His achievements include successfully transforming customers into digital ways of working, modernizing applications, implementing DevOps and automation, developing customized service frameworks for specific customer needs among others.In 2004, Abhinav started to write technical blogs and was one of the few leading bloggers at the time. He has written on several leading blogs such as Tech Republic, Train Signal and Plural Sight. He has written four books on ITIL and DevOps topics - Become ITIL Foundation Certified in 7 Days, Become ITIL 4 Foundation Certified in 7 Days, Reinventing ITIL® in the Age of DevOps, and Workshop in a Box: Communication Skills for IT Professionals.CHAPTER 1: DIGITAL TRANSFORMATION: THE DRIVER FOR BUSINESS SUCCESSChapter Goal: Introduction chapter where I bring in a common understanding of digital transformation, and some of the big pieces that make it upNo of pages : 25 pagesSub -Topics• Disrupting Business Models• Connected Systems• Digital Competition• Digital Principles• Rethinking Value• Voice of the CustomerCHAPTER 2: ITIL 4, VALUE STREAMS AND ITS EVOLUTION FROM ITIL 2011Chapter Goal: ITIL 4 is introduced from the perspective of value streams. The importance of looking from a value stream perspective is brought forth and compared against the previous versions of ITILNo of pages : 30 pagesSub -Topics• ITIL 4 in a Snippet• ITIL 2011 vs ITIL 4• Value Streams• Measuring and Assessing Value StreamsCHAPTER 3: DEVOPS OVERVIEWChapter Goal: A DevOps 101 for context settingNo of pages : 25 pagesSub -Topics• What is DevOps?• DevOps Benefits• Principles and MethodologiesCHAPTER 4: DEVOPS TEAMSChapter Goal: A look at the DevOps teams and the inclusion of ITIL rolesNo of pages: 20Sub – Topics:• Introduction to DevOps teams• Role definitions• DevOps, ITIL and Other Roles• Finding synergyChapter 5: DEVOPS VS ITILChapter Goal: Current setting of ITIL in DevOps projectsNo of pages : 25 pagesSub -Topics• DevOps vs ITIL Conflicts• Misalignment of goals and objectives• How DevOps is assumed to have replaced ITIL• Obsolete Processes• Future of ITILChapter 6: MANAGING INCIDENTS AND OTHER SUPPORT RELATED PROCESSESChapter Goal: The objectives around incident resolution remains the same, however, in the age of digital transformation, going about resolving incidents is a different game altogether.No of pages : 35 pagesSub - Topics:• Incident management objectives• Lean version of incident management• Incident management tools• DevOps fitmentChapter 7: THE FUTURE OF CHANGE AND RELEASE MANAGEMENTChapter Goal: Change management was once a bureaucratic process involving multiple approvals. The chapter discusses the modifications required for this process to be effectiveNo of pages: 40Sub – Topics:• Continuous Delivery vs Continuous Deployment• Change and Release Management Scope• Release cycles• change and release toolsCHAPTER 8: CONFIGURATION MANAGEMENT ADAPTATIONChapter Goal: Adapt the ITIL configuration management process to fit into a DevOps modelNo of pages: 35Sub - Topics:• Comprehensive configuration management• Management of CCM• Configuration management tools• DevOps fitmentCHAPTER 9: PRODUCT MODELChapter Goal: In the new ways of working, we move away from working on projects and start to center around a product. This chapter delves into how this is done and why this is required.No of pages: 25 pagesSub - Topics• Project to Product Model Shift• Operating models• Leveraging CrowdCHAPTER 10: PEOPLE AND LEADERSHIPChapter Goal: This chapter is on people and how people drive digital transformation more than the technology. I further talk about the leadership aspects of the digital ageNo of pages : 25 pagesSub -Topics• Digital Transformation is from People• Digital Leadership• People and Talent

Regulärer Preis: 56,99 €
Produktbild für Software Engineering

Software Engineering

Das Handbuch fürs Selbststudium, für den Job oder vorlesungsbegleitend* erfahrungsbasierter Über- und Einblick ins Software Engineering, der sowohl die Theorie als auch die Praxis abdeckt* umfassend, verständlich und praxiserprobtDas Buch vermittelt die Grundlagen, Erfahrungen und Techniken, die den Kern des Software Engineerings bilden. Es ist als Material zu Vorlesungen über Software Engineering konzipiert. Auch für Praktiker, die mit der Softwareentwicklung und -bearbeitung und den dabei auftretenden Problemen vertraut sind, ist das Buch sehr gut geeignet, um die Kenntnisse im Selbststudium zu ergänzen und zu vertiefen. Der Inhalt des Buches ist in fünf Hauptteile gegliedert:- Grundlagen- Menschen und Prozesse- Daueraufgaben im Softwareprojekt- Techniken der Softwarebearbeitung- Verwaltung und Erhaltung von SoftwareAuch auf die Ausbildung zukünftiger Software Engineers wird eingegangen. Ergänzende Informationen sind auf der Webseite der Autoren verfügbar: https://se-buch.de.Prof. Dr. rer. nat. Jochen Ludewig geboren 1947 in Hannover. Studium der Elektrotechnik (TU Hannover) und Informatik (TU München); Promotion 1981. 1975 bis 1980 Gesellschaft für Kernforschung, Karlsruhe, dann Brown Boveri Forschungszentrum in Baden/Schweiz. 1986 Assistenzprofessor an der ETH Zürich, 1988 Ruf auf den neuen Lehrstuhl Software Engineering an der Universität Stuttgart. Arbeitsgebiete: Softwareprojekt-Management, Software-Prüfung und Software-Qualität, Software-Wartung. Ab 1996 Konzeption und Aufbau des Diplomstudiengangs Softwaretechnik, der inzwischen in einen Bachelor- und einen Masterstudiengang umgewandelt wurde. Seit 2009 Fellow der Gesellschaft für Informatik (GI). Prof. Dr. rer. nat. Horst Lichter geboren 1960 in Trier. Studium der Informatik und Betriebswirtschaftslehr (TU Kaiserslautern). Wissenschaftlicher Mitarbeiter (ETH Zürich und Universität Stuttgart), Promotion 1993. Anschließend Schweizerische Bankgesellschaft Zürich und ABB Forschungszentrum Heidelberg. 1998 Ruf an die RWTH Aachen University, Leiter des Lehr- und Forschungsgebiets Software-Konstruktion. Arbeitsgebiete: Software-Architektur, Qualitätssicherung, Software-Evolution. Seit 2005 Lecturer an der Thai German Graduate School of Engineering (TGGS) in Bangkok. Von 2018-2021 Adjunct Lecturer an der Universiti Teknologi Petronas (UTP) Malaysia.

Regulärer Preis: 49,90 €
Produktbild für IT-Governance

IT-Governance

Ordnungsrahmen und Handlungsfelder für eine erfolgreiche Steuerung der Unternehmens-ITDas Werk behandelt sowohl Grundsätzliches zu IT-Governance als auch die einzelnen Handlungsfelder der IT-Governance im Detail. Dabei geht die Darstellung insbesondere über die weit verbreitete GRC-Fokussierung hinaus. Dies führt dazu, dass die Gebiete der IT-Governance integriert dargestellt werden, so wie dies in der Praxis auch erforderlich ist. Insofern befasst sich das Buch neben der grundlegenden Darstellung der IT-Governance mit den Stakeholdern der IT-Governance und der Governance-Verantwortung in den Bereichen der Organisation der Unternehmens-IT, der IT-Risiken, der IT-Compliance, der Data Governance, des Wertbeitrags der IT, dem Business/IT-Alignment und der IT-Sicherheit. Auch auf für IT-Governance relevante Normen und Standards (ISO 38500, COBIT etc.) wird kontinuierlich Bezug genommen. Vor allem wird immer wieder die Schnittstelle zwischen IT-Governance und IT-Management dargestellt, sodass klar zwischen Governance- und Managementverantwortung unterschieden wird.Autoren:Prof. Dr. Michael Klotz ist seit 1999 Professor für Betriebswirtschaftslehre, insb. Informationsmanagement, Organisation und Datenverarbeitung an der Hochschule Stralsund. Davor war er 15 Jahre in der IT-Branche als Berater, Projektmanager und Geschäftsführer tätig. Seine fachliche Arbeit dokumentiert sich in über 100 Publikationen zu IT-Governance, IT-Compliance und Projektmanagement.Prof. Dr. Matthias Goeken ist Professor für Wirtschaftsinformatik an der Hochschule der Deutschen Bundesbank. Zuvor war er Juniorprofessor an der Frankfurt School of Finance & Management und dort Mitbegründer und Leiter einer Forschungsgruppe zum Themengebiet IT-Governance. Zu seinen weiteren Forschungsgebieten zählen Business Intelligence und Machine Learning. Im ISACA Germany Chapter ist er Vizepräsident für Publikationen.Dr. Martin Fröhlich ist selbstständiger IT-Berater mit den Schwerpunkten Strategie-, IKS-Beratung und IT-Compliance. Davor war er 30 Jahre bei einer Big-Four-Wirtschaftsprüfungsgesellschaft tätig, davon knapp 20 Jahre als Partner verantwortlich für IT-Prüfung und Beratung im Finanzdienstleistungssektor. Dr. Fröhlich ist Mitglied des FAIT beim IDW und Vizepräsident des ISACA Germany Chapter.Die Autoren sind Mitherausgeber der Zeitschrift „IT-Governance“.Zielgruppe:IT-Governance-VerantwortlicheIT-Compliance-OfficerRisk-Manager*innenIT-Manager*innen, CIOsIT-Berater*innenIT-Auditor*innenStudierende

Regulärer Preis: 49,90 €
Produktbild für Excel Power Pivot und Power Query für Dummies

Excel Power Pivot und Power Query für Dummies

Wie Sie mit Microsoft Power Pivot und Power Query große Datenmengen in Excel zusammenführen, untersuchen und weiterführende Erkenntnisse daraus gewinnen, zeigt Ihnen dieses Buch. Angefangen bei der Anbindung an Datenbanken bis hin zur Verwendung eigener Formeln und Funktionen: Sie erfahren, wie Sie Daten aus verschiedenen Datenquellen in einem einheitlichen Datenmodell verarbeiten, interpretieren und übersichtlich in Berichten darstellen. Schritt-für-Schritt-Anleitungen und wertvolle Praxistipps unterstützen Sie dabei, Analysen und Geschäftsprozesse weiter zu optimieren. Michael Alexander ist Microsoft Certified Application Developer und hat mehrere Bücher zu Access und Excel geschrieben.Über den Autor 9Einführung 19TEIL I: FORTGESCHRITTENES REPORTING MIT POWER PIVOT 23Kapitel 1: Denken wie eine Datenbank 25Kapitel 2: Einführung in Power Pivot 35Kapitel 3: Die grundlegende Pivot- Tabelle 49Kapitel 4: Verwendung externer Daten mit Power Pivot 85Kapitel 5: Direkt mit dem internen Datenmodell arbeiten 113Kapitel 6: Hinzufügen von Formeln zu Power Pivot 127Kapitel 7: Dax 147TEIL II: DATEN MIT POWER QUERY VERARBEITEN 165Kapitel 8: Einführung in Power Query 167Kapitel 9: Power- Query- Verbindungstypen 185Kapitel 10: Bessere Daten durch Transformation 201Kapitel 11: Abfragen miteinander verknüpfen 233Kapitel 12: Power Query mit benutzerdefinierten Funktionen erweitern 251TEIL III: DER TOP-TEN-TEIL 271Kapitel 13: Zehn Wege zur Verbesserung der Power- Pivot- Leistung 273Kapitel 14: Zehn Tipps für die Arbeit mit Power Query 281Abbildungsverzeichnis 293Stichwortverzeichnis 303

Regulärer Preis: 18,99 €
Produktbild für Nextcloud Schnelleinstieg

Nextcloud Schnelleinstieg

Ein Überblick über die wichtigsten Einstellungen wie das Erstellen von Benutzern und Gruppen, ein Kapitel zum Thema Sicherheit sowie praktische Tipps für die optimale Strukturierung der eigenen Cloud runden diesen praktischen Einstieg ab. So sind Sie bestens vorbereitet, das Potenzial Ihrer Cloud voll auszuschöpfen.Ein Kapitel über die optimale Strukturierung der eigenen Cloud rundet diesen praktischen Einstieg ab. So sind Sie bestens vorbereitet, das Potenzial Ihrer Cloud voll auszuschöpfen.Herbert Hertramph publiziert neben seiner Tätigkeit als Sozialwissenschaftler an der Universität Ulm Artikel zu Themen der Selbstorganisation und des digitalen Informationsmanagements. Im mitp-Verlag sind von ihm mehrere Bücher zu Evernote, Raspberry Pi und zur Dateiorganisation erschienen.

Regulärer Preis: 24,99 €
Produktbild für AutoCAD 2023 und AutoCAD LT 2023 für Architekten und Ingenieure

AutoCAD 2023 und AutoCAD LT 2023 für Architekten und Ingenieure

* Einführung in die wichtigsten Bedienelemente * Konstruktionsbeispiele aus Architektur, Handwerk und Technik * Zahlreiche Praxisbeispiele und Übungen Dieses Grundlagen- und Lehrbuch zeigt Ihnen anhand konkreter Praxisbeispiele aus Architektur, Handwerk und Technik die Möglichkeiten von AutoCAD 2023 und AutoCAD LT 2023 und bietet insbesondere AutoCAD-Neulingen einen gründlichen und praxisnahen Einstieg in CAD. Mit dem Buch und der 30-Tage-Testversion von der Autodesk-Webseite können Sie sofort beginnen und Ihre ersten Zeichnungen erstellen. Sie arbeiten von Anfang an mit typischen Konstruktionsaufgaben aus Studium und Praxis. Zu jedem Kapitel finden Sie Übungsaufgaben, Testfragen und Lösungen. Zahlreiche Befehle werden detailliert erläutert, wie zum Beispiel: * Zeichnen mit LINIE, KREIS, BOGEN, Polylinie, Schraffur und weitere * Bearbeiten (VERSETZ, STUTZEN, DEHNEN, STRECKEN, Skalieren und weitere), Anordnungen rechteckig, polar oder entlang Pfaden, Griffe, Eigenschaften-Manager * Komplexe Objekte: BLOCK, Palette, Editor, Attribute, externe Referenzen * Einführung in 3D-Volumenkörper, Netzkörper und NURBS-Flächen (Freiformmodellierung) * Vergleichsfunktion für Zeichnungen und externe Referenzen * Benutzeroberfläche anpassen, Makro-Aufzeichnung * Deutsche Beschreibung der englischen Expresstools Aus dem Inhalt: * Allgemeine Bedienung mit Multifunktionsleisten, Registern und Paletten * Schnelleinstieg ins Zeichnen mit Rasterfang * Exaktes Zeichnen mit Koordinaten, Objektfang und Spurlinien * Zeichnungsorganisation mit Layern, Vorlagen und Standards * Texte, Schriftfelder und Tabellen, Verbindung zu Excel * Bemaßungsbefehle und Bemaßungsstile, Spezialfälle * Parametrische Variantenkonstruktionen, dynamische Blöcke * Zusammenarbeit über Web- und Mobil-App, Ablaufverfolgung mit BAND-Funktion * Maßstäbliches Plotten, auch bei verschiedenen Einheiten (mm, cm, m) * Neue Funktionen für Web und Mobile * Zahlreiche Übungsfragen mit Antworten Zum Download: * Alle Beispiele * zusätzliche Übungen, 3D-Beispiele und AutoLISP-Anleitung * Video-Tutorials * Vorlagen * Mac-spezifische Bedienung Für PC und Mac: Alle Funktionen werden anhand der PC-Versionen ausführlich beschrieben. Auch die grundlegenden Abweichungen in der Benutzeroberfläche der Mac-Versionen werden vorgestellt. Detlef Ridder hat bereits zahlreiche Bücher zu AutoCAD, Inventor, Revit und ArchiCAD veröffentlicht und gibt Schulungen zu diesen Programmen und im Bereich CNC.

Regulärer Preis: 49,99 €
Produktbild für Blogging All-in-One For Dummies

Blogging All-in-One For Dummies

BLOG WITH THE BEST OF ‘EM!If you’re looking for a complete guide to creating and solidifying your place in the blogosphere, you’ve come to the right place! With 8 books in one, Blogging All-in-One For Dummies is the only resource you’ll need to get started or to improve your existing blog. Learn about the most popular blogging platforms, creating content worth reading, and methods for driving traffic to your blog. Cut through the confusion and find the facts about monetizing your blog, using the best blogging tools for you, and increasing reader engagement to become an active, successful member of the blogging community. You're ready to start blogging, so let Dummies show you the way!* Perfect your blog idea and choose the best platform for you* Get people to read your blog through search engine optimization and social media promotion* Learn about the latest trends in the blogosphere* Make money from your blog with creative monetization ideasBloggers of all skill and experience levels will find valuable information in Blogging All-in-One For Dummies. AMY LUPOLD BAIR is the founder of Resourceful Mommy Media, LLC, and the author of the parenting and lifestyle blog, Resourceful Mommy. She is the author of Blogging For Dummies, 7th Edition. Introduction 1BOOK 1: ENTERING THE BLOGOSPHERE 7Chapter 1: Joining the Blogosphere 9Chapter 2: Preparing to Start and Write a Blog 27Chapter 3: Blogging Basics 43Chapter 4: Blogging Best Practices 67BOOK 2: NICHE BLOGGING 81Chapter 1: Understanding Niche Blogging 83Chapter 2: Benefiting from a Niche Blog Approach 99Chapter 3: Choosing Your Niche 111Chapter 4: Writing for Your Niche 127BOOK 3: CORPORATE AND NON-PROFIT BLOGGING 149Chapter 1: Starting a Business Blog 151Chapter 2: Developing a Blog Plan 177Chapter 3: Choosing Bloggers 199Chapter 4: Writing an Organization’s Blog 215Chapter 5: Keeping Yourself and Your Organization Out of Trouble 227BOOK 4: FIGURING OUT BLOGGING PLATFORMS 241Chapter 1: Choosing a Blogging Platform 243Chapter 2: Finding the Right Blogging Platform 253Chapter 3: Taking a Look at WordPress 269Chapter 4: Using Google Blogger 301Chapter 5: Understanding Medium 331Chapter 6: Blogging with Wix 365BOOK 5: BLOGGING TOOLS 401Chapter 1: Optimizing for Search Engines 403Chapter 2: Measuring Blog Performance 419Chapter 3: Enhancing Content 435Chapter 4: Staying Organized 455BOOK 6: PROMOTING AND GROWING YOUR BLOG 479Chapter 1: Secrets to Blogging Success 481Chapter 2: Building Community 491Chapter 3: Social Networking 499Chapter 4: Distributing Content 515Chapter 5: Inviting or Being a Guest Blogger 529BOOK 7: MAKING MONEY FROM YOUR BLOG 539Chapter 1: Blog Advertising 101 541Chapter 2: Publishing Advertising 549Chapter 3: Making Money with Affiliate Marketing 575Chapter 4: Publishing Sponsored Posts 589Chapter 5: Monetizing with Social Commerce 603Chapter 6: Selling Ad Space Directly 623Chapter 7: Benefiting from Indirect Monetization Opportunities 633BOOK 8: MOVING BEYOND WRITING BLOG POSTS 641Chapter 1: Painting a Picture with Visual Content 643Chapter 2: Reaching Your Audience with Video Content 665Chapter 3: Getting Social with Social Media 683Chapter 4: Creating a Podcast 711Index 727

Regulärer Preis: 25,99 €
Produktbild für Outlook professionell nutzen für Dummies

Outlook professionell nutzen für Dummies

Ein überquellendes Postfach, zu viele Meetings, nie genügend Zeit? Nutzen Sie Outlook richtig - nicht nur zum Mailen, sondern auch und vor allem zur Organisation Ihrer Kontakte, Termine und Aufgaben. Christine Peyton und Andre Möller zeigen Ihnen, wie Ihnen Outlook hilft, sich zu organisieren, Prioritäten zu setzen und vieles mehr. Planen Sie Besprechungen mit mehreren Teilnehmern und nutzen Sie die Funktionen von Microsoft 365 für die Zusammenarbeit. Halten Sie Ihren Posteingang aufgeräumt, finden Sie Mails und Unterlagen schnell wieder, lassen Sie sich Terminüberschneidungen anzeigen, reservieren Sie Räume und Geräte und archivieren Sie mit System. Beherrschen Sie das Chaos! Christine Peyton schreibt seit fast 20 Jahren EDV-Fachbücher für namhafte Verlage. Ihr Schwerpunkt liegt im Office-Bereich, sie hat aber auch Bücher zu Windows, zur Fotobearbeitung und zum Internet veröffentlicht. Außerdem arbeitet sie als Dozentin in der Erwachsenenbildung. Sie unterrichtet neben EDV-Themen auch Englisch sowie Business-Englisch.Andre Möller ist ein langjähriger EDV-Fachbuchautor, außerdem arbeitet er als Trainer und Programmierer. Als Programmierer liegt sein Schwerpunkt auf Datenbanken und Web-Entwicklung.Über die Autoren 9Einleitung 19TEIL I: OUTLOOK KENNENLERNEN: DIE GRUNDLAGEN 23Kapitel 1: Outlook als Alleskönner – die Module im Überblick 25Kapitel 2: Outlook als E- Mail- Programm 33Kapitel 3: E- Mails mit und ohne Anhang verschicken 65Kapitel 4: E- Mails mit Pfiff 83Kapitel 5: Nachrichten empfangen 101TEIL II: DATEN VERWALTEN, ARCHIVIEREN UND VERSCHLÜSSELN 139Kapitel 6: PST- Dateien, mehrere Konten und Mails archivieren 141Kapitel 7: Sicherheit und Sicherheitsrisiken 161TEIL III: SO ORGANISIEREN SIE IHREN ARBEITSALLTAG MIT OUTLOOK 189Kapitel 8: Termine in Outlook 191Kapitel 9: Termine eingeben, bearbeiten und verwalten 213Kapitel 10: Aufgaben erstellen 265Kapitel 11: Kontakte managen 281Kapitel 12: Outlook- Kontakte für den Serienbrief nutzen 305Kapitel 13: Praktische Gedächtnisstützen – Notizen 319Kapitel 14: Importieren, exportieren und synchronisieren 325Kapitel 15: Kollaboration in einer Organisation 357TEIL IV: TOP-TEN-TEIL 373Kapitel 16: Zehn Tipps für den geschickten Umgang mit Outlook 375Abbildungsverzeichnis 385Stichwortverzeichnis 399

Regulärer Preis: 17,99 €
Produktbild für Software Architect

Software Architect

A STRATEGIC STATE-OF-THE-ART SOFTWARE ARCHITECTURE MANUAL FOR ALL SKILL LEVELSIn Software Architect, veteran enterprise and solution architect Michael Bell delivers a hands-on playbook of best practices for aspiring and practicing software architects, seeking to improve their software design, integration, communication, presentation, and knowledge acquisition skills. He explores the career enablement, career planning, self-training, and self-improvement topics you’ll need to increase your ability to offer powerful and effective business and technological solutions. In the book, you’ll learn how to help companies promote business and technological transformation by implementing modern and first-class software design, deployment, integration, and operations. Software Architect also includes:* A modern software architect’s toolbox that includes best practices for multi-dimensional software design and integration in an enterprise quantum computing ecosystem * A breakdown of the various types of software architects, as well as useful self-assessments for aspiring and practicing professionals* Skill acquisition strategies for software architects along with strategic approaches to ace software architecture interviews An indispensable manual for aspiring to be architects, software architects-in-training, and practicing software architects. Software Architect is an essential read for anyone hoping to improve their ability to deliver robust business and technical solutions to enterprises everywhere. MICHAEL BELL is an enterprise and solution architect with hands-on experience in business and software architecture modeling. He has consulted for organizations including J.P. Morgan Chase, Citibank, Bank One, UBS-Paine Webber, American Express, AIG, and the US government. He is the best-selling author of software architecture books, and he offers a variety of enterprise integration solutions for back-end and customer-facing systems. Introduction xxiiiPART 1 SOFTWARE ARCHITECT CAPABILITY MODEL 1CHAPTER 1 SOFTWARE ARCHITECT CAPABILITY MODEL 3Software Architect Capability Model: Benefits 4How Should Organizations Utilize the Software Architect Capability Model? 4Why Create a Personal Software Architect Capability Model? 5Rudimentary Guiding Principles 6Software Architect Capability Model Creation Process 6Requirements Drive Architecture Solutions 7Requirements Issued by Problem and Solution Domain Entities 7How Do the Problem and Solution Domains Collaborate? 7Important Facts to Remember 9Create a Software Architect Capability Model in Five Steps 9Step 1: Provide Requirements and Specifications 10Business Requirements 10Technical Specifications 11Ensure Clear Requirements 11Step 2: Identify Software Architecture Practices 12Establish Architecture Practices 12Step 3: Establish Software Architecture Disciplines 13Apply Architecture Disciplines to Architecture Practices 14Applying Disciplines to the Application Architecture Practice 14Applying Disciplines for the Data Architecture Practice 16Step 4: Add Software Architecture Deliverables 17About Software Architecture Deliverables 17Add the Deliverables Section 18Step 5: Quantify Skill Competencies 21Quantifying Architecture Skills 22Measuring the Application Architect Skill Levels 22Measuring Data Architect Skill Levels 24Skill Competency Patterns for Architects 25How Can Organizations Utilize the Skill Competency Pattern? 26How an Individual Can Utilize the Skill Competency Pattern 27Interview Questions 28PART 2 SOFTWARE ARCHITECTURE CAREER PLANNING 29CHAPTER 2 TYPES OF SOFTWARE ARCHITECTS 31Business Needs for Technological Solutions 32Business Needs for Software Architecture: Strategic Collaboration 32How Does Software Architecture Respond to Business Needs? 33Business Needs for Software Architecture: Technological Mediation 33How Could Technological Mediation Efforts Be Utilized? 34Business Needs for Software Architecture: Technological Implementation 34How Does the Implementation of Software Products Meet Business Needs? 34Organizational Leading Software Architect Levels 35Ranking Leading Software Architects 35Collaboration Hierarchy of Leading Software Architects 36Level I: Enterprise Architect Responsibilities 38Enterprise Architect Summary of Responsibilities 38Enterprise Architect Responsibility Table 39Level II: Solution Architect Responsibilities 40Solution Architect Summary of Responsibilities 41Solution Architect Responsibility Table 42Level III: Application Architect Responsibilities 44Application Architect Summary of Responsibilities 44Application Architect Responsibilities Table 46Comparing Responsibilities of Leading Software Architects 48Types of Domain Software Architects 49Data Architect 49Data Architect Summary of Responsibilities 50Data Architect Responsibilities Table 51Cloud Architect 51Cloud Architect Summary of Responsibilities 54Cloud Architect Responsibilities Table 55Security Architect 57Security Architect Summary of Responsibilities 58Security Architect Responsibilities Table 60Business Architect 62Business Architect Summary of Responsibilities 62Business Architect Responsibilities Table 63Collaboration Between Leading Software Architects and Domain Software Architects 65Use Case I: Collaboration Between an Application Architect and a Data Architect 66Application Architect and Data Architect Collaboration Table 66Use Case II: Solution Architect and Security Architect 68Solution Architect and Security Architect Collaboration Table 68Use Case III: Business Architect and Enterprise Architect Collaboration 70Business Architect and Enterprise Architect Collaboration Table 70CHAPTER 3 CAREER PLANNING FOR SOFTWARE ARCHITECTS: A WINNING STRATEGY 73Software Architecture Career Planning Process 74Career Planning Step 1: Conduct Self- Discovery 75Discovery of Technological and Social Talents 75Career Planning Self- Discovery Subjects 76Career Planning Step 2: Pursue Research 76Formal Education, Training, and Certification 77Employment Opportunities and Interviews 77Subjects of Research 77Career Planning Step 3: Devise an Approach 78Setting Software Architecture Career Goals 78Setting Software Architecture Career Milestones 80Decision- Making 81Action Planning 82Career Planning Step 4: Plan Career Execution 85Use Case I: A Software Architecture Career Execution Plan with Alternative Tasks 85Use Case II: Optimized Software Architecture Execution Plan 88Self- Discovery Process: The Six Ws 89The “Why” 90The “Who” 91The “What” 92Self- Discovery Questions for Software Architecture Candidates 93Self- Discovery Queries for Software Architects 93The “Where” 94The “When” 95The “How” 96“How” Self- Queries for Software Architecture Applicants 97“How” Self- Questions for Practicing Software Architects 97Carving a Software Architecture Career Path 98The 4D Software Architecture Career Perspectives 99Social- Driven Career Perspective 100Social- Driven Career Chart 100Carve Out a Social- Driven Career Chart 101Social- Driven Career Path 102Create a Social- Driven Career Path 102Technology- Driven Career Perspective 103Technology- Driven Career Chart 104Create a Technology- Driven Career Chart 105Technical- Driven Career Path 106Develop a Technical- Driven Career Path 106Leadership- Driven Career Perspective 107Leadership- Driven Career Chart 108Create a Leadership- Driven Career Chart 109Leadership- Driven Career Path 110Develop a Leadership- Driven Career Path 110Strategy- Driven Career Perspective 112Strategy- Driven Career Chart 112Create a Strategy- Driven Career Chart 114Strategy- Driven Career Path 114Develop a Strategy- Driven Career Path 115CHAPTER 4 SELF- ASSESSMENT FOR SOFTWARE ARCHITECTS 117Social Intelligence 118Teamwork 118Partnership 119Self- consciousness 119Communication 120Networking 120Soft Skills 120Trust Building 121Learning from Others 121Negotiation 122Self- presentation 122Teleworking 123Fellowship 123Self- sufficiency 124Handling Customer Relationships 124Social Intelligence Skill Assessment 124Software Architecture Practice 126Software Architecture Strategy 126Software Architecture Vision 127Software Architecture Role 127System Integration 128Interoperability 128Software Reuse 129Distributed Architecture Model 129Federated Architecture Model 129Architecture Styles 130Architecture and Design Patterns 130Componentization 130Software Architecture Frameworks 131Software Development 131Software Architecture Practice Skill Assessment 132Leadership 133Managing Time 134Decision- Making 134Problem-solving 134Diversity, Equity, and Inclusion 135Responsibility and Accountability 135Hiring Preferences 136Creative Thinking 136Critical Thinking 136Being Proactive 137Establishment of Trust 137Administrative Duties 138Coaching and Training 138Team Building 139Resolving Conflicts 139Assessment of Leadership Competencies 140Strategy 141Software Architecture Strategy 142Strategic Thinking 142Problem Identification 142Problem-solving 143Abstraction 143Generalization 144Visualization 144Software Design Approaches 145Simplification 145Analytical Capabilities 145Influencing 146Promoting Culture 146Strategy Execution Plan 147Assessment of Strategic Competencies 147PART 3 SOFTWARE ARCHITECTURE TOOLBOX 149CHAPTER 5 EMPLOYING INNATE TALENTS TO PROVIDE POTENT ORGANIZATIONAL SOLUTIONS 151Innate Skills Promote Software Architecture Effectiveness 152Remember: Survival, Survival, Survival 152Consequences of Failing to Invoke Innate Talents 153Employ Chief Innate Talents to Become an Effective Software Architect 154The Power of Creativity 154The Benefits of Unleashing Software Architecture Creativity 155Unleash the Power of Software Architecture Creativity 155The Potency of Imagination 157The Benefits of Harnessing Imagination 158Unleash the Power of Imagination 159Software Design Aesthetic 162Technical Proficiency and Aesthetic Talents Drive Software Design 162The Chief Contribution of Design Aesthetic Talents to Software Architecture 163Curiosity Attributes 167The Contribution of Curiosity to Software Architecture 167The Influencing Facets of Curiosity on Software Architecture Practices 168CHAPTER 6 SOFTWARE ARCHITECTURE ENVIRONMENT CONSTRUCTION 173Benefits of the Software Architecture Environment Construction Discipline 174Must Haves: Problem Statements and Requirements 174Never Start a Software Design Project Without Understanding the Problems 175Never Start a Software Design Project Without Requirements 176Software Architecture Structures 176Micro Level: Multidimensional Structures of Software Implementations 176Macro Level: 3D Software Architecture Environment Structure 177Software Architecture Environment: Driven by an Uncontrolled Quantum Landscape Behavior 178Software Architecture Environment: An Intelligent Topological Space 179Deformation Aspects of a Multidimensional Software Architecture Environment 181Entanglement Effects in a Software Architecture Environment 182Software Architecture Environment Forces Drive Software Behavior 183Probability Assessment of Software Operations and Behavior 184Software Architecture Environment Positive and Negative Forces 184Software Architecture Environment Gravitational Forces 185The Impetus for Granting Software Architecture Gravitational Powers to Software Implementations 186Software Architecture Gravitational Force Intensity 187The Cost of Unbalanced Software Architecture Environment Gravitational Forces 187Competing Software Architecture Environment Forces 188Software Architecture Environment: A Survival Game Space 188Maintaining a Pragmatic Balance Between Competing Software Architecture Forces 189Mitigating the Competing Forces Challenge 190Software Architecture Environment Harmonizing and Disharmonizing Forces 190Chief Properties of Harmonizing Forces in a Software Architecture Environment 191Chief Properties of Disharmonizing Forces in a Software Architecture Environment 193Genetic Encoding of a Software Architecture Environment 194Difficulties of Restructuring a Software Architecture Environment 194Encoding a Software Architecture Environment 195Influences on Social, Behavioral, and Business Goals 195Software Architecture Environment Construction Life Cycle 196Software Architecture Environment Construction Process 197Creating a Software Architecture Environment Construction Balance Table 197Software Architecture Environment Construction Design Activities 199Use Case I: Software Architecture Environment Composition and Decomposition Design Activities 201Design- Time vs. Runtime Environment Composition and Decomposition Design Activities 201Composition and Decomposition Design Methods 202Composition and Decomposition Process Outline 203Use Case II: Software Architecture Environment Integration and Disintegration Design Activities 204When to Apply Integration and Disintegration Design Activities 205Integration and Disintegration Design Methods 205Integration and Disintegration Process Outline 206Use Case III: Software Architecture Environment Centralization and Decentralization Design Activities 208When to Employ the Software Environment Centralization and Decentralization Design Activities 208Centralization and Decentralization Design Methods 209Software Architecture Environment Centralization and Decentralization Process Outline 210Use Case IV: Software Architecture Environment Elasticity and Inelasticity Design Activities 211CHAPTER 7 WHEN TO EMPLOY ELASTICITY AND INELASTICITY DESIGN ACTIVITIES 212Elasticity and Inelasticity Design Methods 213Software Architecture Elasticity and Inelasticity Design Process Outline 214Use Case V: Software Architecture Environment Synchronization and Desynchronization Design Activities 215When to Employ Environment Synchronization and Desynchronization Design Activities 216Environment Synchronization and Desynchronization Design Methods 216Software Architecture Environment Synchronization and Desynchronization Design Process Outline 218Construction Laws of a Software Architecture Environment 219Best Practices for Software Architecture Environment Construction 220Structural Construction of Software Implementations in Multidimensional Environments 223Software Architecture Solids: Rudimentary Geometrical Design Structures 224Atomic Solid 225Composite Solid 227Monolithic Solid 228Interface Solid 229Pipe Solid 230Inclusive Utilization of Pipe Solids 231Exclusive Utilization of Pipe Solids 232Internal Utilization of Pipe Solids 233Data Solid 234Software Architecture Solids’ Attribute Summary 236Software Architecture Dimensional Model 237Software Architecture: Zero Dimension 238Software Architecture: One Dimension 239Software Architecture: Two Dimensions 240What Impacts the Length and Width Dimensions of a2D Software Structure? 241Software Architecture: Three Dimensions 242Volumes of 3D Software Structures 242Increase in Software Architecture Level of Specificity in a3D Computing World 243Software Population Sustainability in an Architecture Environment Space: A Capacity Planning Challenge 245Comparative Perspectives in a Software Architecture Space 2463D Software Structures in a Software Architecture Computing Space 247The Impetus for Establishing a 3D Software Architecture Space 247Chief Features of Software Architecture Computing Space 249Influences of Software Structures on Software Architecture Computing Space 250Relative Positions in a 3D Software Architecture Computing Space 250Coordinate Axes: Skeleton of a Software Architecture Computing Space 251Software Architecture Computing Space Logical Coordinate System 252Cardinal and Intercardinal Physical Directions in Software Architecture Computing Space 253Applying Cardinal and Intercardinal Directions to Software Architecture Computing Space 254Marrying a Logical Coordinate System with Cardinal and Intercardinal Physical Directions System 255Leveraging the Z- Axis to Create Floors in a Software Architecture Computing Space 256Distribution Styles of 3D Software Implementations in an Architecture Computing Space 257Federated Distribution Style 258Flooring Distribution Style 260Symmetrical and Asymmetrical Distribution Styles 261Symmetrical Distribution Style 261Asymmetrical Distribution Style 263Construction Life Cycle of Software Implementations 264Software Construction Process 265Creating a Software Construction Balance Table 265Software Construction Design Activities 266Use Case I: Thicken and Contract Design Activities 267When to Apply Thicken and Contract Design Activities 268Thicken and Contract Design Methods 269Software Structure Thickening and Contracting Process Outline 270Use Case II: Lengthen and Shorten Design Activities 272When to Apply the Lengthen and Shorten Design Activities 273Lengthen and Shorten Design Methods 273Software Structure Lengthening and Shortening Process Outline 275Use Case III: Layer and Delayer Design Activities 277When to Apply Layer and Delayer Design Activities 277Layer and Delayer Design Methods 278Layer and Delayer Process Outline 279Governing Laws for Software Construction in a 3D Computing World 281Best Practices for Constructing Software Implementations 282PART 4 SOFTWARE ARCHITECTURE INTERVIEW PREPARATIONS 285CHAPTER 8 PREPARING FOR A SOFTWARE ARCHITECTURE INTERVIEW: A WINNING STRATEGY 287Software Architecture Job Interview Strategy 288Preparing a Job Interview Defense Plan 288Preparing a Job Interview Attack Plan 289Software Architecture Job Interview Preparation Model 290Software Architecture Job Interview Defense Plan 291Study and Analyze the Job Description 291Start with Identifying the Scope of the Software Architecture Job Requirements 292Dive Deep into the Software Architect Job Description 293Start with Analyzing the Summary Portion of the Job Requirements 294Create a Findings Table Version I for the Job Description 295Next, Analyze the Responsibilities Portion of the Job Requirements 296Then, Update the Findings Table Version II of the Job Description 296Last, Analyze the Software Architect Skills Portion of the Job Requirements 297Do Not Forget to Update the Findings Table of the Job Description 298Create a Software Architect Skill Competency Model for the Job Description 299Skill Competency Model’s Requirements and Practices 300Skill Competency Model’s Disciplines 301Design Discipline’s Deliverables 301Cybersecurity Discipline Deliverables 301Products Selection and Evaluation Discipline’s Deliverables 302SDLC Discipline’s Deliverables 302The Competency Part of the Skill Competency Model 303Discover the Personal Knowledge Gap Before Attending a Job Interview 303Assess Whether the Next Software Architecture Job Is a Strategic Career Move 304Conduct a Software Architecture Mock Interview 305Prepare a Software Architecture Interview Cheat Sheet 306Prepare for Possible Software Architecture Interview Questions 307Software Architecture Job Interview Attack Plan 308Study the Hiring Organization’s Business 309Start by Finding Information About the Hiring Organization 309CHAPTER 9 LEVERAGING BUSINESS KNOWLEDGE DURING AN INTERVIEW 311Understand the Business Model 312Get Familiar with the Hiring Company’s Culture 314Conduct a Quick SWOT Analysis 315Understand the Hiring Organization’s Technology 316Technological Information Sources 316Discover the Environment’s Technology Stack 318Learn About the Development Technology Stack 319Study the Applications 320Identify Specific IT Projects 321Demonstrate Enterprise Architecture Knowledge of the Hiring Organization 321Adopt Software Architecture Lingo 323Use Design Patterns Vocabulary 323Use the Software Architecture Guidelines Lingo to Communicate Solutions 324Remember Software Architecture Tools 328Classification of Software Architecture Tools 329Especially Prepare for Architecture Visualization Tools Questions 332Get Familiar with Software Architecture Analysis and Evaluation Methods 333Be Aware of Early Architecture Evaluation Methods 334Be Aware of Late Architecture Evaluation Methods 335Talk About Software Architecture Analysis Standards 335An Outline for Software Architecture Job Interview Questions 337Behavioral Questions 338Communication 339Interpersonal Relationships 340Software Architecture Leadership 340Skill Assessment Questions 341Software Architecture Attributes Questions 342Software Architecture LifeCycle Questions 343Software Architecture Concepts Questions 346Design Building Blocks Concepts 347Employ Design Building Blocks Concepts to Depict Solutions 347Prepare for the “How to Design” Interview Questions 348Software Architecture Environment Concepts 349Business Concepts 351Consumer Concepts 352Architecture Style, Architecture Pattern, and Design Pattern Questions 353Architecture Patterns vs. Design Patterns 353Understand Architecture Styles 355Remember Contextual Hierarchy of Patterns 355Why Interviewers Ask Architecture and Design Pattern Questions 356Prepare for Architecture and Design Pattern Questions 357Problem-solving and decision- making Questions 358Embrace the Software Architecture Problem- Solving and Decision- Making Process 358Identifying Business Problems 358Attend to the Problem- Solving and Decision- Making Process 359Prepare for Problem- Solving and Decision- Making Questions 360Data- Related Questions 360Focus on Data Aspects Related to Software Architecture 361More Data- Related Interview Questions 361Production Environment Questions 362Characteristics of Software Architecture Environment Hosted in Production 363Production Environment-Related Questions 364Software Architecture Framework Questions 365Focus on Array of Framework Contributions 365Software Architecture Framework Questions 367Index 369

Regulärer Preis: 25,99 €
Produktbild für Apple Device Management

Apple Device Management

Working effectively with Apple platforms at a corporate or business level includes not only infrastructure, but a mode of thinking that administrators have to adopt to find success. A mode of thinking that forces you to leave 30 years of IT dogma at the door. This book is a guide through how to integrate Apple products in your environment with a minimum of friction. Because the Apple ecosystem is not going away.You'll start by understanding where Apple, third-party software vendors, and the IT community is taking us. What is Mobile Device Management and how does it work under the hood. By understanding how MDM works, you will understand what needs to happen on your networks in order to allow for MDM, as well as the best way to give the least amount of access to the servers or services that’s necessary. You'll then look at management agents that do not include MDM, as well as when you will need to use an agent as opposed to when to use other options. Once you can install a management solution, you can deploy profiles on a device or you can deploy profiles on Macs using scripts.With Apple Device Management as your guide, you'll customize and package software for deployment and lock down devices so they’re completely secure. You’ll also work on getting standard QA environments built out, so you can test more effectively with less effort.This thoroughly revised and expanded Second Edition provides new coverage and updates on daemons and agents, declarative management, Gatekeeper, script options, SSO tools, Azure/Apple Business Essentials integrations and much more.YOU WILL* Deploy profiles across devices effectively and securely* Install apps remotely both from the app store and through custom solutions* Work natively with Apple environments rather than retrofitting older IT solutionsWHO THIS BOOK IS FORMac administrators within organizations that want to integrate with the current Apple ecosystem, including Windows administrators learning how to use/manage Macs, mobile administrators working with iPhones and iPads, and mobile developers tasked with creating custom apps for internal, corporate distribution.CHARLES EDGE is the Director of the Marketplace at Jamf. He holds 30 years of experience as a developer, administrator, network architect, product manager and CTO. He is the author of 20 books and more than 6,000 blog posts on technology, and has served as an editor and author for many publications. Charles also serves on the board of multiple companies and conferences, and frequently speaks at industry conferences around the world, including DefCon, BlackHat, LinuxWorld, the Apple Worldwide Developers Conference, and a number of Apple-focused conferences. Charles is also the author of krypted.com and a cohost of the MacAdmins Podcast.RICH TROUTON has been doing Macintosh system and server administration for 20+ years and has supported Macs in a number of different environments, including university, government, medical research, advertising and enterprise software development. His current position is at SAP, where he works with the rest of the Apple CoE team to support SAP's Apple community. CHAPTER 1: THE EVOLUTION OF APPLE DEVICE MANAGEMENTNeXTMac + Unix = Mac OS XEcosystem CoexistenceiOS Device ManagementiOS + Mac OS X = macOSImaging Is Dead?macOS – Unix = appleOSDon’t Forget The AppsSERVERSBALANCED APPLE SCORECARDAccess to organizational resourcesCradle to Grave device managementDirectory ServicesEndpoint ProtectionWorld class supportSummaryCHAPTER 2: AGENT-BASED MANAGEMENTDaemons and AgentsServicesLaunchDaemons and LaunchAgentsCreate Your Own DaemonThird Party DaemonsUse Lingon To See and change Daemons and Agents EasilyWorking with Daemons and Agents in ScriptsJamfMunkiChefPuppetRootlessThe Impact of UAMDMSummaryCHAPTER 3: PROFILESUse Apple Configurator to Create a ProfileView the Raw Contents of a ProfilesInstall a ProfileView a Profile from iOSView the Effects of a Profile on a MacRemove a ProfileRestrict Profile Installation on iOSUse the Profiles Command on macOSSummaryCHAPTER 4: A DEEP DIVE INTO MDMManaged PreferencesManaged ClientAPNsEnrollmentUAMDMHow MDM Commands WorkSending A CommandProfiles As CommandsDevice SupervisionSummaryCHAPTER 4: EXPLORING MDM WORKFLOWSWiping a Device Using Profile ManagerLocking a Device Using VMware Workspace ONEResetting a Device Lock Using Jamf ProDisabling the Camera Using MobileIronInstalling a Package from Jamf NowPushing a Password Policy from IntuneSummaryCHAPTER 5: APPS, VPP, AND APPLICATION DISTRIBUTIONInstall an ipa on iOSRewrapping an ipaInstall a .app on macOSInstall an installation Package on macOSSummaryCHAPTER 6: THE APP AND OS DISTRIBUTION BUILD TRAINAutopkgAutopkgrIntegrate Autopkgr With JamfIntegrate Autopkgr With Other ProductsSummaryCHAPTER 7: ACCESSING NETWORK SERVICESGetting on the Network802.1xDEP and Guest NetworksIdentity Providers and SaaS AppsAccessing FilesRemote ControlSummaryCHAPTER 7: SECURING YOUR FLEETSecuring the PlatformCombat Malware on macOSXprotectClamAVThird Party SolutionsThreat Management on iOSBinary WhitelistingComplianceCentralized Log Capture and AnalysisBeyond AgentsSummaryCHAPTER 8: A CULTURE OF CONTINUAL TESTINGManual TestingBuild A Testing MatrixAutomated TestingSikuliTestplantExpect ScriptingKanbanRelease ManagementSummaryCHAPTER 9: THE FUTURE OF APPLE DEVICE MANAGEMENTThe Future Of AgentsSummaryAPPENDIX 1: THE APPLE ECOSYSTEMAntivirusAutomation ToolsBackupCollaboration Suites and File SharingCRMDEP Splash Screens and Help MenusDevelopment Tools, IDEs, and Text ManipulatorsDigital Signage and KiosksDirectory Services and Authentication ToolsIdentity ManagementImaging and Configuration ToolsLog Collection and AnalysisManagement SuitesMiscPoint of SalePrint ServersRemote ManagementSecurity ToolsService Desk ToolsSoftware Packaging and Package ManagementStorageTroubleshooting, Repair, and Service ToolsVirtualization and EmulationHonorable MentionAPPENDIX 2: COMMON APPLE PORTS

Regulärer Preis: 84,99 €
Produktbild für Building With Ethereum

Building With Ethereum

Build products on top of Ethereum's new and expansive technological stack.Writing any good web application requires planning, care, and deft technical skills, but Ethereum's execution model presents its own challenges for engineers wishing to build applications on top of its smart contract layer. Building performant and engaging product experiences is one of the most important – and often underappreciated – roles in any company.This book looks at the full product stack needed to build such experiences on top of Ethereum smart contracts, weaving tutorials and case studies through more conversational discussions of the various constraints, trade-offs, and complexities involved in doing so. You’ll learn about the fundamentals of Ethereum from a new perspective, developing a strong understanding of how the Ethereum Virtual Machine (EVM) works and how it affects product engineering, as well as all the pieces of technology that go into decentralized apps (dapps) behind the front end: RPC nodes, wallets, indexers, application hosts, and more. You’ll be exposed to plenty of UI, JavaScript code, and idiomatic ways to bring on-chain data into your front ends. And you’ll be given up-to-date knowledge of the best practices and future possibilities that decentralized computation might offer the product engineer.WHAT YOU WILL LEARN* Understand the EVM and how it works* Gain insight into smart contracts and how apps connect to them* Understand the difference between live data and indexed data* How decentralization affects the UI of applications* Build engaging, tasteful product experiences on top of EthereumWHO THIS BOOK IS FORA confident – mid-level or senior – software engineer or web developer who hasn’t properly branched out into Ethereum; someone who might have scratched the surface, but wants a deeper understanding of the principles behind dapps, and who wants a head start on the hurdles faced while building them.JAMIE RUMBELOW is a software engineer and writer based in London, U.K. Until recently, he was a product engineer at Fei Labs, a major Ethereum protocol, where he built technologies and products at the intersection between the web2 and web3 stacks. He worked as a Founding Engineer and Senior Software Engineer in startups, responsible for training and mentoring as well as writing code. He has worked in the tech industry for over a decade, seeing organizations at varying levels of scale and the ways that teams and technologies get shaped by product decisions. He has also studied philosophy at the graduate level, which has given him the tools to think about computing in a deeper way. Over the past few years, he has built up a set of principles and opinions on what makes for great software and a great engineering culture.CHAPTER 1. INTRODUCTIONWe introduce the core concepts discussed in the book, and situate them with respect to the foundational principles of cryptocurrencies and web3. We discuss decentralisation. We describe the key design decisions of the EVM (Ethereum Virtual Machine) and how they raise some problems for product engineers. We describe the book ahead and what will be covered, chapter by chapter.CHAPTER 2. THE LIFECYCLE OF AN ETHEREUM TRANSACTIONWe discuss the lifecycle of a request on Ethereum, guiding the user through: how is a request initiated by a UI and confirmed by a user; sent to a node, validated, how can UIs display its status, when is a transaction confirmed. We ask: what is a smart contract? We frame smart contracts as APIs. We also set up the following three chapters with the tripartite structure of write, read, and side-effect.CHAPTER 3. WALLETSWe discuss the role of wallets as both stores and signers. We discuss the popular MetaMask model for wallet injection, WalletConnect, EIP-1193, and other attempts to standardise the wallet interface. We explore wallets as identities, and describe approaches to 'logging in' with Ethereum. We explore different attack vectors that integrating wallets might raise.CHAPTER 4. NODES AND INDEXESWe talk about nodes – the programmatic gateway to the blockchain – in more detail: how to connect to them and use them to retrieve information. We discuss the difference between live data and indexed data. We discuss how external RPC nodes allow external function calls with and friends. We discuss ABIs and contract interfaces.CHAPTER 5. EVENTSWe investigate Ethereum's event model, and how to reconstruct a contract's state from the event log. We talk about Bloom filters and how to process many events efficiently.CHAPTER 6. TRANSACTIONSThis chapter builds more on the first chapter, diving into detail about the implementation of transactions. We discuss interfaces for creating, signing, and viewing transactions. We frame transactions theoretically and practically. We discuss the RPC call and its interface. We break down the minutiae of cryptographic signing and nonces, and consider how it affects the UI of applications. We discuss transaction statuses and estimation.CHAPTER 7. ERROR HANDLINGIn this chapter, we discuss the various failure modes of smart contracts and how to build rich, useful user interfaces around them. We consider gas, nonces, and transaction synchronisation. We talk about ways of building error-resilience into your product with input validation. We talk about standardising error messages at the smart contract level.CHAPTER 8. TOOLINGIn this chapter, we investigate the sorts of tools available to the product engineer, drawing on problems faced in the previous chapters. We discuss running manual tests, declarative provisioning of infrastructure, and keeping private keys safe. We also discuss current lacunas and places where existing tooling could be improved.CHAPTER 9. DATA-FIRST APPLICATIONSWe wrap-up the preceding discussion with a more opinionated chapter on a data-first approach to application design. In particular, I'll make the case for single-page applications backed by a data scraper as a strong model for building application infrastructure around smart contracts, tying together the themes of the preceding few chapters.CHAPTER 10. CONCLUSION: SMART CONTRACTS, SMARTER PRODUCTSWe discuss the ways that the surface area of smart contracts rubs against the surface area of web applications, with an emphasis on the more commercial and conceptual. We explore how detaching state from interface allows for more decentralised and censorship-resistant protocols – and how product engineers can profit from this split. We talk about the many ways that thoughtful product engineering can improve the user experience of crypto, and ruminate on the future direction of the ecosystem.Appendix 1: A Common-Sense Crypto-Native ChecklistWe provide a summary of the main questions and action points found in the book, with an easy reference checklist for engineers to work through when building their crypto-native applications.Appendix 2: Resources and BibliographyWe provide one or two pages of QR codes, with links to relevant resources. We provide a more comprehensive, traditional bibliography.

Regulärer Preis: 62,99 €
Produktbild für iOS Architecture Patterns

iOS Architecture Patterns

Develop well-structured applications using tested techniques and patterns. When you start to develop an application, you not only have to think about the idea of the finished application, but also about how it will evolve as it is built. This book shows you how to plan for changes, scope creep, and for the possibility of other developers joining in.Start by learning what architecture patterns for an application are. You’ll find out why it’s important for your applications to be based on these patterns and which ones are the most common. Then you’ll look at the MVC as one of the best known and used patterns. You’ll see how and when it can be implemented in your applications, as well as its advantages and disadvantages.From there, you’ll discover the first evolution of the MVC model: the MVP, which introduces a new layer (Presenter) to better manage views. The next evolution after that is the MVVM, which introduces the ViewModel layer and its connection with the views through Data Binding. With those prominent patterns covered, you’ll read about VIPER and VIP, Architecture Patterns that seeks to make applications easily maintainable, modularized, and highly scalable. All of which are hallmarks of Clean Architecture.Architecture patterns have developed and evolved to give your applications solid foundations. Understanding these patterns, you will reduce the problems that may arise when modifying existing functions, adding new ones, or correcting errors that may arise in the development process.WHAT YOU'LL LEARN* Code cleanly with solid foundations* Start your project ready to adapt and evolve as features and other developers are added* Find and apply the right patterns for the best results WHO THIS BOOK IS FORDevelopers with some programming knowledge who want to learn different architecture patterns, those who already have more experience and are looking for a starting point on complex patterns such as VIPER or VIP, and beginner programmersRAÚL FERRER GARCÍA holds a doctorate in Chemistry and started short-circuiting computer science by programming with a ZX Spectrum when he was 14. For the past decade as a Mobile Tech Lead, he has dedicated himself completely to the development and management of mobile applications for iOS. He also maintains a blog in which he tries to explain everything he’s learned and studied about the world of mobile development.1. Introduction1.1. What are architecture patterns?1.2. Why we need an architecture pattern for our apps?1.3. The search for a ‘Clean Architecture’.1.4. How to choose the right architecture.1.5. Most used architecture patterns.2. MVC: Model-View-Controller2.1. What is MVC.2.2. Components in MVC.2.3. How it works.2.4. When to use MVC.2.5. Applying MVC.2.6. Testing.2.7. Advantages and disadvantages of MVC.3. MVP: Model-View-Presenter3.1. What is MVP.3.2. Components in MVP.3.3. How it works.3.4. When to use MVP.3.5. Applying MVP.3.6. Testing.3.7. Advantages and disadvantages of MVP.4. MVVM: Model-View-ViewModel4.1. What is MVVM.4.2. Components in MVVM.4.3. How it works: Data binding.4.4. When to use MVVM.4.5. Applying MVVM.4.6. Testing.4.7. Advantages and disadvantages of MVVM4.8. MVVM-C: Abstracting Navigation from MVVM5. VIPER: View-Interactor-Presenter-Entity-Router5.1. What is VIPER.5.2. Components in VIPER.5.3. How it works.5.4. When to use VIPER.5.5. Applying VIPER.5.6. Testing.5.7. Advantages and disadvantages of VIPER6. VIP: View-Interactor-Presenter6.1. What is VIP.6.2. Components in VIP.6.3. How it works.6.4. When to use VIP.6.5. Applying VIP.6.6. Testing.6.7. Advantages and disadvantages of VIP7. Other Architecture Patterns7.1. RIBs: Router, Interactor and Builder7.2. TCA: The Composable Architecture7.3. Redux7.4. TEA: The Elm Architecture8. Conclusion8.1. Importance of Clean Architecture.8.2. Moving ForwardAudience: Intermediate

Regulärer Preis: 62,99 €
Produktbild für AWS for Public and Private Sectors

AWS for Public and Private Sectors

Assess, plan, develop, implement, and manage AWS EC2 Instances, Cloud Formation using JSON Template with Bash programming language, and Cloud Watch monitoring. This book helps the public and private sectors comprehend how to assess and evaluate AWS cloud software as a service (SaaS), infrastructure as a service (IaaS), and platform as a service (PaaS).Government and business sector entities are looking for strategies to upgrade on-premises information systems to virtual cloud infrastructure orchestration and automation. You'll gain a step-by-step approach to planning, developing, implementing, and managing cloud infrastructure, services, and platforms that help reduce cost increases, scalability, and improves security. Outline your strategy to research how cloud infrastructure is planned and developed before being deployed and managed by on-premises IT team members. This book also supports cloud services for AWS and helps you understand why supporting and using AWS for cloud services is beneficial both short and long-term.Once you complete this book, you'll be able to make logical decisions regarding AWS use cases for public and private sector entities, including disaster recovery and backup, IT self-service, Web applications, and messaging.WHAT YOU'LL LEARN* Assess different cloud services provided by Amazon* Look at Cloud as a Service (CAAS)* Understand internet protocol, packet switching, authoritative, recursive, and open-flow* Review cloud infrastructure planning methods* Examine Cloud orchestration and automation* Work with the AWS total cost of ownership calculatorWHO THIS BOOK IS FORThis book is aimed at business, government, non-profit organizations, academic institutions, and financial institutions interested in upgrading to AWS cloud architect infrastructure as a primary mode of data transmission, storage, and security at a scalable and economical annual cost.BRADLEY FOWLER has worked in the technology industry since 2012, when he became Webmaster for the American Alliance of Paralegals, Inc. In 2015, Bradley became co-owner of Construction eMarketing a Web site development and eMarketing company that provides services remotely, including Cybersecurity Analysis, Web Page security integration, and cloud computing architecture consulting.Bradley earned a Master of Science in Cloud Computing Architecture from the University of Maryland Global Campus-Cum Laude, where he began working with BalletOnline as the Intern Cloud Architect, and climbed up to become Chief Cloud Architect. Bradley also earned a Master of Public Policy in Cybersecurity Policy from American Public University System-Summa Cum Laude, a Master of Science in Cybersecurity, and a Master of Science in Managing Information Systems in Information Security Management, both from Bellevue University, both Summa Cum Laude. Bradley acquired his Bachelor of Arts in eMarketing from the University of Arizona Global Campus. He is currently completing a Master of Science in Technology Management at University of Arizona Global Campus as well as a Doctor of Management in Information Systems & Technology at University of Phoenix.Chapter I Cloud Services and TechnologiesChapter goal: This chapter enables readers to understand the value of assessing and evaluating cloud services provided by Amazon Web Services (AWS) and Microsoft Azure, prior to making an executive decision to partner with either service provider. Readers will comprehend how to calculate the total cost of ownership for usage of cloud services rendered by both service providers, and acquire knowledge of the advantages and disadvantage of services rendered by both services providers. Readers will also acquire knowledge of applicable laws regarding usage of cloud services in alignment with federal laws and guidelines as well as gain knowledge regarding policy enforcement mechanisms, system monitoring and audit mechanisms, and finally complete discussion questions that help readers comprehend their study of this chapter and the valued components that should be remembered.Sub-topics:1. Total Cost of Ownership2. Functional requirements3. Nonfunctional requirements4. Risk analysis and management guidelines5. Six components of GDPR6. Understand physical security issues7. Critical IT requirements related to data storage8. Potential privacy issues and migration strategiesChapter 2: Network EngineeringChapter goal: This chapter helps readers gain knowledge about Internet protocol and its impact in cloud architecture. Readers will also learn about packet switching, IP addressing, DNS, IP subnetting, IP address classes, CIDR Notation, multiple subnets in a LAN, subnetting proposal, Transport Control Protocol (TCP), transport reliability, TCP sliding windows, software defined networking, networking in the cloud, cloud command line interfaces, and cloud APIs. Having this knowledge helps improve decision making regarding what strategies best serve the needs of an enterprise migrating from an on-premises legacy information system to a cloud infrastructure. By the time readers conclude this chapter, they will understand the meaning of internet protocol, packet switching, authoritative, recursive, and what makes open-flow so popular. Most importantly, readers acquire knowledge about subnetting proposals and their role in supporting enterprises.Subtopics:1. TCP Connections2. SDN Enables BalletOnline Cloud Deployment3. Declarative resource definitions4. AWS Migration Environment and Configure Web ServicesChapter 3: Infrastructure Planning and MigrationChapter goal: This chapter will educate readers about cloud infrastructure planning methods that increase organizational structure that aligns with business acumen and helps readers understand migration prerequisites. This enables a reduction of setbacks arises during the migration from on-premises to cloud infrastructure. Furthermore, readers will be able to effectively assess migration tools and comprehend AWS Application Discovery. Most important, readers will acquire methods that have proven beneficial and provides a return on the initial investment.Sub-topics:1. Cloud premigration considerations2. Cloud migration tool assessment3. AWS Application Discovery Services4. Agentbase options5. Agentless options6. Evaluation of discovery application and infrastructure data7. Migration recommendationsChapter 4: Computing Development and ManagementChapter goal: Readers will gain knowledge about cloud service offering for email and how AWS services help reduce concerns of vulnerability. Readers will also learn about AWS Cloud Watch and how this tool helps capture metrics and reports statistics regarding the consumption for backup and archiving. Additionally, readers will learn about AWS backup and archiving as well as AWS virtual private cloud and the value of relying on VPN (Virtual Private Networks). Furthermore, readers will attain information about AWS S3 buckets and cloud synchronization services.Subtopics:1. Data Backups and Archiving to Cloud Using Cloud Sync Services2. AWS Cloud Watch Monitoring3. AWS Service Catalog4. Cloud operations end-users’ guides5. Cloud operations administrative guides6. LimitationsChapter V Cloud Computing Orchestration and AutomationChapter goals: This chapters prepares readers for the orchestration and automation of AWS cloud services. Readers will also learn about cloud advanced features as well as advanced data solutions in the cloud. Most importantly, readers will acquire knowledge about Symantec Cloud Workload Protection for Storage Overview. Attaining this knowledge will increase readers trust with AWS services and the ability to effectively manage their cloud virtual private infrastructure with security strategies that are impenetrable.Subtopics:1. Monthly cost analysis2. Total costs of ownership analysis3. Use casesa. Web applicationsb. Messagingc. Disaster recovery and backupd. IT service planning4. Return on investment analysisGlossaryIndex

Regulärer Preis: 62,99 €
Produktbild für Natural Language Processing mit Transformern

Natural Language Processing mit Transformern

Sprachanwendungen mit Hugging Face erstellenTransformer liefern hervorragende Ergebnisse bei der maschinellen Sprachverarbeitung und haben sich in den letzten Jahren zur vorherrschenden Architektur im Natural Language Processing (NLP) entwickelt. Dieses Praxisbuch zeigt Data Scientists und Programmierer*innen, wie sie NLP-Modelle mit Hugging Face Transformers, einer Python-basierten Deep-Learning-Bibliothek, trainieren und skalieren. Transformer kommen beispielsweise beim maschinellen Schreiben von Nachrichtenartikeln, bei der Verbesserung von Google-Suchanfragen oder bei Chatbots zum Einsatz.Lewis Tunstall, Leandro von Werra und Thomas Wolf, die die Transformers-Bibliothek von Hugging Face mitentwickelt haben, erklären in diesem Buch, wie Transformer-basierte Modelle funktionieren und wie Sie sie in Ihre Anwendungen integrieren. Sie erfahren, wie Transformer für eine Vielzahl von Aufgaben erfolgreich eingesetzt werden können.Erstellen, debuggen und optimieren Sie Transformer-Modelle für zentrale NLP-Aufgaben wie Textklassifizierung, Named Entity Recognition oder Question AnsweringLernen Sie, wie Transformer für sprachenübergreifendes Transfer Learning verwendet werdenWenden Sie Transformer auf reale Anwendungsfälle an, bei denen nur auf wenige gelabelte Daten zurückgegriffen werden kannOptimieren Sie Transformer-Modelle für das Deployment mit Techniken wie Distillation, Pruning und QuantisierungTrainieren Sie Transformer von Grund auf und lernen Sie, wie sie auf mehreren GPUs und verteilten Umgebungen skalierenÜber die Autoren:Lewis Tunstall ist Machine Learning Engineer bei Hugging Face. Der Schwerpunkt seiner Arbeit liegt derzeit auf der Entwicklung von Tools für die NLP-Community und darauf, Menschen zu schulen, diese effektiv zu nutzen.Leandro von Werra ist Machine Learning Engineer im Open-Source-Team von Hugging Face. Er konzentriert sich hauptsächlich auf Modelle, die Code generieren können, und auf die Zusammenarbeit mit der Community.Thomas Wolf ist Chief Science Officer und Mitgründer von Hugging Face. Sein Team hat sich der Aufgabe verschrieben, die KI-Forschung voranzutreiben und sie weiter zu demokratisieren.

Regulärer Preis: 46,90 €