Computer und IT
Enterprise Systems Architecture
Enhance your technical and business skills to better manage your organization’s technology ecosystem. This book aims to explain how to align the technology landscape to service your company’s business operating model.The book begins by exploring different architectural approaches before taking a deep dive into multiple layers of the architectural stack and the methodology of each component. You’ll also learn about the many products delivered by enterprise architecture. To complete the book, author Daljit Banger delves into the various roles and responsibilities of an enterprise architect.After completing Enterprise Systems Architecture, you will understand how to develop an ICT (Information Communication Technology) strategy to meet the needs of your organization.WHAT WILL YOU LEARN* Gain a complete understanding of enterprise architecture* Conceptualize the enterprise ecosystem using the EsA canvas* Master the products and services of an enterprise architecture functionWHO THIS BOOK IS FORArchitects (Enterprise, Solution, or Technical), CTOs, Business Analysts, or any stakeholder in delivering technology services to their organization.DALJIT BANGER has 40 years of solid IT Industry experience, having undertaken assignments in locations across the globe, including the UK, USA, Sweden, Switzerland, Finland, Hong Kong, and Brazil on behalf of large multinational companies.Daljit has successfully managed several large professional teams of Architects, written in several publications and is the author of several freeware software products for Enterprise Architecture.Daljit holds a Master of Science (MSc) Degree and is a Chartered IT Fellow of the British Computer Society and Chairs the British Computer Society Enterprise Architecture Specialist Group.Chapter 1: Architectural Approaches* MODAF (Ministry of Defense Architecture Framework)* DODAF (Department of Defense Architecture Framework)* TOGAF (The Open Group Architecture Framework)* Zachman Framework* Federal Enterprise Architecture* Meta ModelsChapter 2: Layers Expanded and Explores* Layer 0 (Business Operating Model)* Layer 1 (Business Process Later)* Layer 2 (Capabilities and Services)* Layer 3 (Applications)* Layer 4 (Data/Information Services)* Layer 5 (Technological Services)Chapter 3: Products for Delivering the EA.* Background* Contributing Factors* IT Governance * Technical Debt Management Chapter 4: Roles and Responsibilities* Enterprise Architect * Solutions Architect* Technical Architect* Aligning Architect Chapter 5: Developing the ICT Strategy* Simple Strategy Plan * Strategy CycleChapter 6: Final Note
Swift Recipes for iOS Developers
Boost your iOS developer career by learning from real-life examples and start writing code for one of the most successful platforms ever. No matter if you’re an experienced developer or just a beginner, you’ll find something new and something useful for your future projects here.All of the recipes in this book are taken from real-life commercial projects that have been approved by Apple and published on the App Store. You won’t write “Hello, world!” and similar programs. Instead you'll see how to parse different data formats; run JavaScript code right inside your iOS app; and enhance storyboard editor with several simple extensions. You’ll make beautiful modern-looking dialogs with blurs, shadows and rounded corners using only a few lines of code, and safely convert data after analyzing text strings. Go on to animate your layout and get your app shored up to crash as little as possibleEach recipe offers a code snippet to copy and paste to your project as a tool to boost your knowledge, as well as, create plug-and-play features. Each of recipe shows the description for each line of code while explaining the logic of it, contains references to documentation, and gives you an opportunity to modify or write something similar that fits your project better.A good piece of code should not work but also be short, clear, and stable. And that combo will be our priority in these code recipes. Well-written code snippets must run in any environment and be easily transferrable from one project to another. Most of the provided recipes will migrate from one project to another with little to no changes at all, and with years of real-world application have proven themselves to be useful and stable. Dive into the world of iOS development and write clear, functioning, and safe Swift code!WHAT YOU'LL LEARN* Parse, convert, and print Swift data* Develop stunning UIs quickly* Write effective and portable Swift extensions* Make your code cleaner and saferWHO THIS BOOK IS FORBeginners in iOS development who want to improve their skills with real-life examples. Developers switching to mobile development from other areas. All iOS developers looking for code recipes.ALEX NEKRASOV wrote his first line of code 27 years ago when he was 8 years old and could see himself thriving as a software developer ever since. In 2008, he graduated from university with a diploma with honors as a System Engineer. By that point, he had already been working in the IT field for 3 years. In 2013, he wrote his first iOS app and, in 2014, he switched completely to mobile development. Almost 10 years of freelance experience has given Alex an opportunity to work on many interesting projects and earn real-life experience. Alex runs a succesful blog where he writes about mobile development.Chapter 1. IntroductionChapter 2. Working with Data· Conversion between data types· Extracting data from dictionaries· Parsing JSON, XML and other formats· Serialization and deserializationChapter 3. Working with Strings· String and NSString· Analyzing String content· Data verification. Emails and phone numbers· Encoding and decoding Base64· MD5 and other hashesChapter 4. UIKit and Storyboards· Navigation between screens· Popups and dialogs· Maps and navigation· Rounded corners, shadows and other effectsChapter 5. Image Processing· Reading and writing images· Downloading and caching images· Resizing and cropping· Preparing and showing profile picture· Image masks· Effects and filtersChapter 6. Text Editing· Analyzing user input in real time· Formatting users input· Work with emojis· Floating prefix or suffix· Keyboard handlingChapter 7. UI Animations and Effects· Animating views· Parallax effect· Hero animationChapter 8. SwiftUI· Inserting UIKit components· Applying styles with ViewModifier· Creating custom viewsAudience: Beginning
Mastering Windows Server 2022 with Azure Cloud Services
EXTEND YOUR ON-PREMISES WINDOWS SERVER DEPLOYMENTS TO THE CLOUD WITH AZUREIn Mastering Windows Server 2022 with Azure Cloud Services: IaaS, PaaS, and SaaS, 5-time Microsoft MVP Winner William Panek delivers a comprehensive and practical blueprint for planning, implementing, and managing environments that include Azure IaaS-hosted Windows Server-based workloads. You’ll learn to use the expansive, hybrid capabilities of Azure, how to migrate virtual and physical server workloads to Azure IaaS, PaaS, and SaaS, and how to manage and secure Azure virtual machines running Windows Server 2022. This book also offers:* Foundational explanations of core Azure capabilities, including Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS)* Explorations of the tools you’ll need to implement Azure solutions, including Windows Admin Center and PowerShell* Examples of implementing identity in Hybrid scenarios, including Azure AD DS on Azure IaaS and managed AD DSPerfect for IT professionals who manage on-premises Windows Server environments, seek to use Azure to manage server workloads, and want to secure virtual machines running on Windows Server 2022, Mastering Windows Server 2022 with Azure Cloud Services: IaaS, PaaS, and SaaS is also a must-read resource for anyone involved in administering or operating Microsoft Azure IaaS workloads. WILLIAM PANEK is a 5-time Microsoft MVP Winner. He has taught at Boston University, Clark University, and the University of Maryland and trained members of the United States Secret Service, Cisco, the United States Air Force, and the United States Army in technology and IT. He also produces training videos to help students prepare for some Microsoft certification exams which can be found at: www.youtube.com/c/williampanek. Introduction xxiCHAPTER 1 UNDERSTANDING WINDOWS SERVER 2022 1Features and Advantages of Windows Server 2022 1Deciding Which Windows Server 2022 Version to Use 6Deciding on the Type of Installation 13Removed Features 17The Bottom Line 20CHAPTER 2 UNDERSTANDING VIRTUALIZATION 21Introduction to Virtualization 21Hyper-V Features 23Hyper-V Architecture 28Hyper-V Operating Systems 29Linux and FreeBSD Image Deployments 29Virtualization in Azure 30The Bottom Line 30CHAPTER 3 INSTALLING AND CONFIGURING HYPER-V 31Hyper-V Installation and Configuration 31Hyper-V Requirements 31Install the Hyper-V Role 32Hyper-V in Server Manager 35Using Hyper-V Manager 35Configure Hyper-V Settings 36Manage Virtual Switches 38Managing Virtual Hard Disks 40Configuring Virtual Machines 45Creating and Managing Virtual Machines 45Linux and FreeBSD Image Deployments 56PowerShell Commands 59The Bottom Line 62CHAPTER 4 INSTALLING WINDOWS SERVER 2022 63Installing the Windows Server 2022 OS 63Installing with the Desktop Experience 63Installing Windows Server 2022 Server Core 68Activating and Servicing Windows 71Key Management Service 71Automatic Virtual Machine Activation 73Active Directory-Based Activation 74Servicing Windows Server 2022 74Configuring Windows Server Updates 75Windows Update 76Using Windows Server Update Services 80Understanding Features On Demand 93The Bottom Line 94CHAPTER 5 UNDERSTANDING IP 97Understanding TCP/IP 97Details of the TCP/IP Model 97How TCP/IP Layers Communicate 98Understanding Port Numbers 98Understanding IP Addressing 100The Hierarchical IP Addressing Scheme 100Understanding Network Classes 101Subnetting a Network 104Implementing Subnetting 105An Easier Way to Apply Subnetting 110Applying Subnetting the Traditional Way 114Working with Classless Inter-Domain Routing 121Supernetting 124Understanding IPv6 124IPv6 History and Need 124New and Improved IPv6 Concepts 125IPv6 Addressing Concepts 127IPv6 Integration/Migration 132The Bottom Line 136CHAPTER 6 IMPLEMENTING DNS 137Introducing DNS 137HOSTS File 138Understanding Servers, Clients, and Resolvers 142Understanding the DNS Process 142Introducing DNS Database Zones 147Understanding Primary Zones 148Understanding Secondary Zones 149Understanding Active Directory Integrated DNS 150Understanding Stub Zones 152GlobalName Zones 153Zone Transfers and Replication 153Advantages of DNS in Windows Server 2022 156Background Zone Loading 157Support for IPv6 Addresses 157Support for Read-Only Domain Controllers 157DNS Socket Pools 158DNS Cache Locking 158Response Rate Limiting 158Unknown Record Support 159IPv6 Root Hints 159DNS Security Extensions 159DNS Devolution 161Record Weighting 161Netmask Ordering 161DnsUpdateProxy Group 161DNS Policies 161Introducing DNS Record Types 162Start of Authority (SOA) Records 162Name Server Records 164Host Record 164Alias Record 165Pointer Record 165Mail Exchanger Record 166Service Record 166Configuring DNS 167Installing DNS 167Load Balancing with Round Robin 168Configuring a Caching-Only Server 168Setting Zone Properties 168Configuring Zones for Dynamic Updates 172Delegating Zones for DNS 173DNS Forwarding 174Manually Creating DNS Records 175DNS Aging and Scavenging 176DNS PowerShell Commands 176The Bottom Line 179CHAPTER 7 UNDERSTANDING ACTIVE DIRECTORY 181Verifying the File System 181Resilient File System (ReFS) 182NTFS 183Verifying Network Connectivity 185Basic Connectivity Tests 185Tools and Techniques for Testing Network Configuration 186Understanding Active Directory 188Domains 188Trees 188Forests 189Understanding Domain and Forest Functionality 189About the Domain Functional Level 190About Forest Functionality 191Planning the Domain Structure 193Installing Active Directory 193Improved Active Directory Features 194Read-Only Domain Controllers 194Active Directory Prerequisites 194The Installation Process 194Installing Additional Domain Controllers by Using Install from Media 201Verifying Active Directory Installation 201Using Event Viewer 201Using Active Directory Administrative Tools 203Testing from Clients 204Creating and Configuring Application Data Partitions 206Creating Application Data Partitions 206Managing Replicas 207Removing Replicas 208Using ntdsutil to Manage Application Data Partitions 208Configuring DNS Integration with Active Directory 210The Bottom Line 211CHAPTER 8 ADMINISTERING ACTIVE DIRECTORY 213Active Directory Overview 213Understanding Active Directory Features 214Understanding Security Principals 215An Overview of OUs 216The Purpose of OUs 217Benefits of OUs 217Planning the OU Structure 217Logical Grouping of Resources 218Understanding OU Inheritance 219Delegating Administrative Control 220Applying Group Policies 221Creating OUs 221Managing OUs 224Moving, Deleting, and Renaming OUs 225Administering Properties of OUs 225Delegating Control of OUs 227Creating and Managing Active Directory Objects 228Overview of Active Directory Objects 229Managing Object Properties 235Understanding Groups 238Filtering and Advanced Active Directory Features 240Moving, Renaming, and Deleting Active Directory Objects 241Resetting an Existing Computer Account 242Understanding Dynamic Access Control 243Managing Security and Permissions 244Publishing Active Directory Objects 245Making Active Directory Objects Available to Users 245Publishing Printers 245Publishing Shared Folders 246PowerShell for Active Directory 247The Bottom Line 248CHAPTER 9 CONFIGURING DHCP 249Understanding DHCP 249Introducing the DORA Process 250Advantages and Disadvantages of DHCP 251Ipconfig Lease Options 252Understanding Scope Details 253Installing and Authorizing DHCP 255Installing DHCP 255Introducing the DHCP Snap-In 256Authorizing DHCP for Active Directory 257Creating and Managing DHCP Scopes 259Creating a New Scope in IPv4 259Creating a New Scope in IPv6 267Changing Scope Properties (IPv4 and IPv6) 269Changing Server Properties 270Managing Reservations and Exclusions 272Setting Scope Options for IPv4 274Activating and Deactivating Scopes 276Creating a Superscope for IPv4 276Creating IPv4 Multicast Scopes 277Integrating Dynamic DNS and IPv4 DHCP 279Using DHCP Failover Architecture 281Working with the DHCP Database Files 281Working with Advanced DHCP Configuration Options 283Implement DHCPv6 283Configure High Availability for DHCP, Including DHCP Failover and Split Scopes 284Configure DHCP Name Protection 286PowerShell Commands 287The Bottom Line 289CHAPTER 10 BUILDING GROUP POLICIES 291Introducing Group Policy 291Understanding Group Policy Settings 292The Security Settings Section of the GPO 295Client-Side Extensions 296Group Policy Objects 296Group Policy Inheritance 297Planning a Group Policy Strategy 298Implementing Group Policy 298Creating GPOs 299Linking Existing GPOs to Active Directory 301Forcing a GPO to Update 302Managing Group Policy 303Managing GPOs 303Security Filtering of a Group Policy 304Delegating Administrative Control of GPOs 306Controlling Inheritance and Filtering Group Policy 307Assigning Script Policies 308Understanding the Loopback Policy 310Managing Network Configuration 310Configuring Network Settings 311Automatically Enrolling User and Computer Certificates in Group Policy 311Redirecting Folders 313Managing GPOs with Windows PowerShell Group Policy Cmdlets 314Item-Level Targeting 315Back Up, Restore, Import, Copy, and Migration Tables 316The Bottom Line 319CHAPTER 11 ADVANCED GROUP POLICY OPTIONS 321Deploying Software Through a GPO 321The Software Management Life Cycle 322The Windows Installer 323Deploying Applications 326Implementing Software Deployment 328Preparing for Software Deployment 328Software Restriction Policies 329Using AppLocker 329Group Policy Slow Link Detection 329Publishing and Assigning Applications 329Applying Software Updates 331Verifying Software Installation 332Configuring Automatic Updates in Group Policy 332Configuring Software Deployment Settings 333The Software Installation Properties Dialog Box 333Removing Programs 335Microsoft Windows Installer Settings 337Troubleshooting Group Policies 337RSoP in Logging Mode 338RSoP in Planning Mode 342Using the gpresult.exe Command 342Using the Group Policy Infrastructure Status Dashboard 343The Bottom Line 343CHAPTER 12 UNDERSTANDING CLOUD CONCEPTS 345Understand Cloud Concepts 345Cloud Advantages 345Understanding CapEx vs. OpEx 346Understanding Different Cloud Concepts 348Understanding the difference between IaaS, PaaS, and SaaS 349Infrastructure as a Service 350Platform as a Service 350Software as a Service 351Compare and Contrast the Service Types 352The Bottom Line 353CHAPTER 13 CONFIGURING AZURE 355Understanding Azure Benefits 355Azure Benefits 355Understanding the Azure Dashboards 357Using the Azure Dashboard 357Configuring the Azure Portal Settings 366The Bottom Line 372CHAPTER 14 UNDERSTANDING AZURE ACTIVE DIRECTORY 373Azure Active Directory 373Understanding Azure AD 373Self-Service Password Reset 392The Bottom Line 394CHAPTER 15 CREATING A HYBRID NETWORK 395Creating a Hybrid Network 395Password Hash Synchronization with Azure AD 396Azure Active Directory Pass-Through Authentication 396Federation with Azure AD 397Common Identity Scenarios 399Azure AD Connect 400Implement Active Directory Federation Services 405What Is a Claim? 406AD FS in Windows Server 2022 409Configuring a Web Application Proxy 411Active Directory Federation Services Installation 413AD FS and AD Connect 421Planning Azure AD Authentication Options 423Azure AD Multi-Factor Authentication 423Azure AD Connect Sync—Understand and Customize Synchronization 426Creating an Azure Recovery Policy 427Model Apps 427Automate Tasks in Recovery Plans 428Run a Test Failover on Recovery Plans 429Create a Recovery Plan 429The Bottom Line 432CHAPTER 16 UNDERSTANDING MICROSOFT ENDPOINT 433Using Microsoft Endpoint Manager 433Understanding AutoPilot 440Autopilot Benefits 441Autopilot Prerequisites 441Deployment Scenarios 443Planning for Secure Applications Data on Devices 446Configuring Managed Apps for Mobile Application Management (MAM) 446Protecting Enterprise Data using Windows Information Protection (WIP) 449The Bottom Line 458CHAPTER 17 CONFIGURING SECURITY 459Managing Windows Security 459Windows Defender Security Center 460Configuring Windows Firewall 463Understanding Windows Firewall Basics 463Windows Firewall with Advanced Security 464Managing Security 469Implementing Azure Windows Defender Advanced Threat Protection 469Understanding Windows Defender Application Guard 471Understanding Windows Defender Credential Guard 476Implementing and Managing Windows Defender Exploit Guard 478Using Windows Defender Application Control 481The Bottom Line 482CHAPTER 18 CREATING AZURE POLICIES 483Azure Devices and Policies 483Compliance Policies 484Device Configuration Profiles 489PowerShell Commands 492The Bottom Line 494Appendix The Bottom Line 495
Programming and GUI Fundamentals
PROGRAMMING AND GUI FUNDAMENTALSDISCOVER THE FOUNDATIONS OF TCL PROGRAMMING AND GUI DEVELOPMENTProgramming and GUI Fundamentals: Tcl-Tk for Electronic Design Automation (EDA), delivers a comprehensive exploration of the major design challenges and potential present in application and tool development with Tcl-Tk. Accessibly written and easy-to-understand, the book can be used by students at a variety of levels, as well as researchers and working professionals. The authors present the fundamental concepts of Tcl programming and graphic user interface (GUI) development using images, and photographs, assisting with concept understanding and retention. They describe real-time system designs and offer students and designers the opportunity to learn about critical concepts in scripting and GUI development. Readers will learn to design their own GUI, place and package widgets on the GUI, and allow EDA professionals, chip designers and students to code and design in TCL-TK. They will also benefit from:* A thorough introduction to scripting languages and wish interpreters, including their fundamental concepts, TCL tips and tricks, and command, variable, and procedure examples* Comprehensive explorations of the TCL data structure, including datatypes, strings and commands, lists and commands, and arrays and commands* Practical discussions of TCL control flow, including conditional commands, multi-condition commands, and loop commands* In-depth examinations of file input/output processing, including TCL file read-write, open and close commands, gets, and puts.Perfect for undergraduate and graduate students studying programming or computer science, as well as professionals working on electronic design automation and chip design, Programming and GUI Fundamentals: Tcl-Tk for Electronic Design Automation (EDA) is also an indispensable resource for programming professionals seeking to upskill. SUMAN LATA TRIPATHI, PHD, is Professor of VLSI Design at Lovely Professional University. She is a Senior Member of the IEEE and obtained her doctorate in Microelectronics and VLSI Design from Motilal Nehru National Institute of Technology, Allahabad, India. ABHISHEK KUMAR, PHD, is Associate Professor at Lovely Professional University. He received his doctorate in VLSI Design for Low Power and Secured Architecture from Lovely Professional University, Punjab, India. JYOTIRMOY PATHAK is Assistant Professor at Lovely Professional University, Punjab India. He has published over 10 research papers, holds 9 patents, and 1 copyright. Author BiographiesChapter 1 - IntroductionChapter 2 – Basic CommandChapter 3 - Program Flow ControlChapter 4 - Tcl Data StructureChapter 5 - Tcl Object-Oriented ProgrammingChapter 6: File ProcessingChapter 7: Toolkit WidgetChapter 8 - Binding Command and Other WidgetChapter 9 - Canvas Widget and Tk CommandsChapter 10 - Tcl-Tk for EDA ToolIndex
Einführung in Domain-Driven Design
Hands-On DDD: von der Strategie bis zum technischen DesignSoftwareentwicklung ist heutzutage anspruchsvoller denn je: Als Entwicklerin oder Entwickler müssen Sie technologische Trends im Blick behalten, aber genauso die Fachdomänen hinter der Software verstehen. Dieses Praxisbuch beschreibt zentrale Patterns, Prinzipien und Praktiken, mit denen Sie Geschäftsbereiche analysieren, die Business-Strategie verstehen und, was am wichtigsten ist, Ihr Softwaredesign besser an den Geschäftsanforderungen ausrichten.DDD-Experte Vlad Khononov zeigt, wie diese Praktiken helfen, von der Geschäftslogik ausgehend zu einem robusten Softwaredesign und einer zukunftsfähigen Softwarearchitektur zu kommen. Er beschreibt, wie DDD mit anderen Methoden kombiniert werden kann, um geeignete Architekturentscheidungen zu treffen. Das reale Beispiel eines Start-ups, das DDD einführt, bietet dabei viele praxisnahe Einblicke.In diesem Buch erfahren Sie, wie Sie:die Fachdomäne analysieren, um herauszufinden, welche Anforderungen an Ihr Systemdie strategischen und taktischen Werkzeuge von DDD nutzen, um effektive Softwarelösungen zu entwickeln, die diesen Geschäftsanforderungen entsprechenein gemeinsames Verständnis der Fachdomänen entwickelnein System in Bounded Contexts aufgliederndie Arbeit mehrerer Teams koordinierenDDD schrittweise in Brownfield-Projekten einführenAutor:Vlad (Vladik) Khononov ist Softwareentwickler mit über 20 Jahren Branchenerfahrung, in denen er für große und kleine Firmen gearbeitet hat – in unterschiedlichsten Rollen vom Webmaster bis zum Chefarchitekten. Vlad ist zudem als Sprecher, Blogger und Autor unterwegs. Er ist überall auf der Welt aktiv, um zu beraten und über Domain-Driven Design, Microservices und Softwarearchitektur ganz allgemein zu sprechen. Vlad hilft Firmen dabei, aus ihren Fachdomänen Sinn zu ziehen, Legacy-Systeme zu entwirren und komplexe Architekturaufgaben anzugehen. Er lebt im Norden Israels zusammen mit seiner Frau und einer fast vernünftigen Anzahl an Katzen.Zielgruppe:Softwareentwickler*innenSoftwarearchitekt*innenProjektleitung(IT-)Manager*innenLeseprobe (PDF-Link)
Python für Excel
Befreien Sie sich aus dem Chaos der riesigen Arbeitsmappen, Tausenden von Formeln und hässlichen VBA-HacksExcel ist nach wie vor ein unverzichtbares Analysetool und hat in den letzten Jahren viele neue Funktionen hinzubekommen, doch die Automatisierungssprache VBA hat sich nicht parallel weiterentwickelt. Viele Excel-Poweruser nutzen daher bereits Python, um Routinearbeiten zu automatisieren. Felix Zumstein zeigt in diesem praktischen Leitfaden erfahrenen Excel-Benutzerinnen und -Benutzern, wie sich Python als Skriptsprache für Excel effizient verwenden lässt.Dieses Buch bietet Ihnen einen schnell zugänglichen Einstieg in Python, sodass Sie direkt in die Praxis starten können:Verwenden Sie Python ohne fortgeschrittene ProgrammierkenntnisseArbeiten Sie mit modernen Tools wie Jupyter-Notebooks und Visual Studio CodeNutzen Sie pandas zum Erfassen, Bereinigen und Analysieren von Daten und ersetzen Sie typische Excel-BerechnungenAutomatisieren Sie mühsame Aufgaben wie die Konsolidierung von Excel-Arbeitsmappen und das Erstellen von Excel-BerichtenSetzen Sie xlwings ein, um interaktive Excel-Tools zu erstellen, die Python als Berechnungsmodul verwendenVerbinden Sie Excel mit Datenbanken und CSV-Dateien und rufen Sie mit Python-Code Daten aus Internetquellen abVerwenden Sie Python als Universalwerkzeug, um VBA, Power Query und Power Pivot zu ersetzenAutor:Felix Zumstein ist der Schöpfer und Betreuer von xlwings, einem beliebten Open-Source-Paket, das die Automatisierung von Excel mit Python unter Windows und macOS ermöglicht. Er organisiert auch die xlwings-Treffen in London und New York City, um eine breite Palette innovativer Lösungen für Excel zu fördern.Als CEO von xltrail, einem Versionskontrollsystem für Excel-Dateien, hat er mit Hunderten von Anwendern gesprochen, die Excel für geschäftskritische Aufgaben verwenden, und ist daher mit den typischen Excel-Anwendungsfällen und -Problemen in verschiedenen Branchen bestens vertraut.Zielgruppe:Excel-Praktiker*innenBusiness-Analyst*innenVBA-Entwickler*innenData ScientistsLeseprobe (PDF-Link)
Test Your Skills in C# Programming
Review the fundamental constructs in C# using Q&As and program segments to boost your confidence and gain expertise. This book will help you analyze your programs more efficiently and enhance your programming skills.The book is divided into three parts, where you will learn the fundamentals, object-oriented programming, and some advanced features of C#. In the first part, you will review C# and .NET basics along with the important constructs such as strings, arrays, and structures. In the second part, you'll review the concepts of object-oriented programming in detail. Here, you will go through various program segments in class and objects, inheritance, polymorphism, abstraction, encapsulation, and much more. You will also analyze the output of the given programs with the help of Q&A sections. The uses of interfaces, static class, and exception handling are discussed in the book along with some other important concepts in C#. In the third and last part, you will learn advanced features of C# programming such as delegates, events, lambdas, generics, and multithreading. Here, you'll also cover some of the latest features of C#.After reading this book, you will be able to analyze and apply the basic and frequently used features along with the advanced features of C#.WHAT WILL YOU LEARN* Understand the core and some of the latest features in C#* Review your programming skills along with some of the latest features in C#* Know how object-oriented programming (OOP) is used in C#* Get up and running on the advanced features of C# such as delegates, lambdas, generics, and moreWHO THIS IS BOOK FORProgrammers with basic knowledge of C#VASKARAN SARCAR obtained his Master of Engineering in software engineering from Jadavpur University, Kolkata (India) and an MCA from Vidyasagar University, Midnapore (India). He was a National Gate Scholar (2007-2009) and has more than 12 years of experience in education and the IT industry. Vaskaran devoted his early years (2005-2007) to the teaching profession at various engineering colleges, and later he joined HP India PPS R&D Hub Bangalore. He worked there until August 2019. At the time of his retirement from HP, he was a Senior Software Engineer and Team Lead at HP. To follow his dream and passion, Vaskaran is now an independent full-time author. Other Apress books by him include: _Java Design Patterns Third Edition, _Simple and Efficient Programming in C#, _Design Patterns in C# Second Edition, __Getting Started with Advanced C#, __Interactive Object-Oriented Programming in Java Second Edition,__ __Java Design Patterns Second Edition, __Design Patterns in C#, __Interactive C#, __Interactive Object-Oriented Programming in Java, _Java Design Patterns.PART I FUNDAMENTALSCHAPTER 1: LANGUAGE BASICSCHAPTER GOAL: THIS CHAPTER DISCUSSES THE FOLLOWING TOPICS:The important concepts in .NETThe basic programming constructs in C#.Use of some useful data types including the var type.Use of some useful operators and explicit-casting.Use of the selection statements and case guards.Use of iteration statements.Use of the jump statements.Use of the ternary operator.No of pages: 28SUB - TOPICS NCHAPTER 2: STRING AND ARRAYSCHAPTER GOAL:ONCE YOU FINISH THIS CHAPTER, YOU CAN ANSWER THE FOLLOWING QUESTIONS AND RELATED AREAS:How can you use string datatype in your program?How can you use the common in-built methods from the String class?How a String variable is different from a StringBuilder?How can you convert a string to an int?How can you use nullable reference type in a program?How to create arrays in C#?What are the different types of C# arrays and how to use them?How to use common in-built methods from the System.Array class?How can you iterate over a string or an array?NO OF PAGES 23SUB - TOPICS NACHAPTER 3: ENUMERATION AND STRUCTURESCHAPTER GOAL: This chapter discusses the following topics:The enum fundamentalsFlags enumerationDefaut value expressionsThe struct fundamentalsNon-destructive mutationsNO OF PAGES: 26SUB - TOPICS NAPART II OBJECT-ORIENTED PROGRAMMINGCHAPTER 4: CLASS AND OBJECTSCHAPTER GOAL: This chapter focuses on the following topics:Classes and objects creations.Instance fields and methods.Constructors and their usage.Optional parameters.Object initializers.Nested classes.The uses of private, internal, and public modifiers inside a class.NO OF PAGES: 17SUB - TOPICS NACHAPTER 5: INHERITANCECHAPTER GOAL: This chapter covers the following topics:Inheritance and types.Method and constructor overloading.Method overriding.Use of virtual, override, and new keywords.Use of the sealed keyword.Introductory discussion on covariance and contravarianceNO OF PAGES 33Sub - Topics NAChapter 6: PolymorphismCHAPTER GOAL: This chapter helps you to review:Polymorphism and its benefits.Abstract classes and their uses.Interfaces and their uses.Different types of interfaces.Writing polymorphic codes using abstract classes and interfacesNO OF PAGES: 30SUB - TOPICS NAChapter 7: EncapsulationCHAPTER GOAL: This chapter covers the following topics:What is encapsulation? How is it different from an abstraction?Properties and their usage.Different ways to create a property.The usage of the get and set accessors.Virtual and abstract properties.The discussion of the init accessor.Indexers and their usage.How can the indexers and properties work with an interface?Discussion on different aspects of properties and indexers.NO OF PAGES: 26SUB - TOPICS NAChapter 8: Exception HandlingCHAPTER GOAL: This chapter covers the following topics:Exception and its uses in C# programming.Use of the try, catch, and finally blocks.Use of multiple catch blocks in a program.Use of a general catch block.How to throw and re-throw an exception.Use of exception filters.Custom exception class and its usage.NO OF PAGES: 23SUB - TOPICS NAChapter 9: Useful ConceptsChapter Goal: Q&A and program segments on some useful constructs such as casting and boxing, static class and methods, passing value type by value, passing value type by references(using ref and out keyword), extension methods, and so on.NO OF PAGES: 15-25+SUB - TOPICS NAPart III Advanced Features Chapter 10: DelegatesCHAPTER GOAL: This chapter covers the following topics:Delegates and their usesMulticast delegatesSome commonly used in-built delegatesCovariance and contravariance using delegatesNO OF PAGES: 20SUB - TOPICS NAChapter 11: EventsCHAPTER GOAL: This chapter helps you to review your understanding of events and discusses the following:Events creation and their uses.How to pass the event data.Use of event accessors.Use of interface events (both implicit and explicit).Simplified coding with events.NO OF PAGES: 22SUB - TOPICS NAChapter 12: LambdasCHAPTER GOAL: This chapter focuses on this and covers the following topics:Lambda expressions and their useExpression-bodied membersUse of local variables inside lambda expressions.Event handling using lambda expressions.Use of a static lambda.Understanding natural type.NO OF PAGES: 22SUB - TOPICS NACHAPTER 13: GENERICSCHAPTER GOAL: This chapter focuses on the following topics:The motivation behind generics.The fundamentals of generic programs.Use of generic interfaces.Use of generic constraints.Use of covariance and contravariance using generics.Self-referencing generic type.Experimenting with generic method’s overloading and overriding.Analyzing the static data in the context of generics.NO OF PAGES: 35SUB - TOPICS NACHAPTER 14: MULTITHREADINGChapter Goal: Upon completion of this chapter, you’ll be able to answer the following questions:What are the threads and how can you create them?What is a multithreaded program? How does it differ from a single-threaded application?Why are the ThreadStart and ParameterizedThreadStart delegates important in thread programming?How to block a thread using Sleep or Join methods?How can you use lambda expressions in a multithreaded program?How to use important Thread class members?How a foreground thread is different from a background thread?What is synchronization and why is it needed?How can you implement thread safety in C# using lock statements?How can you implement an alternative approach to lock statements using Monitor’s Entry and Exit Method?What is a deadlock and how can you detect the deadlock in your system?What is the purpose of using the ThreadPool class? What are the associative pros and cons of using it?How to cancel a running thread in the managed environment?And many more.NO OF PAGES: 40SUB - TOPICS NACHAPTER 15: MISCELLANEOUSCHAPTER GOAL: Q&A and program segments on the related latest features that are covered in the previous chapters and any other important topics(if any).NO OF PAGES: 10-20+SUB - TOPICS NA
Data Science and Analytics for SMEs
Master the tricks and techniques of business analytics consulting, specifically applicable to small-to-medium businesses (SMEs). Written to help you hone your business analytics skills, this book applies data science techniques to help solve problems and improve upon many aspects of a business' operations.SMEs are looking for ways to use data science and analytics, and this need is becoming increasingly pressing with the ongoing digital revolution. The topics covered in the books will help to provide the knowledge leverage needed for implementing data science in small business. The demand of small business for data analytics are in conjunction with the growing number of freelance data science consulting opportunities; hence this book will provide insight on how to navigate this new terrain.This book uses a do-it-yourself approach to analytics and introduces tools that are easily available online and are non-programming based. Data science will allow SMEs to understand their customer loyalty, market segmentation, sales and revenue increase etc. more clearly. Data Science and Analytics for SMEs is particularly focused on small businesses and explores the analytics and data that can help them succeed further in their business.WHAT YOU'LL LEARN* Create and measure the success of their analytics project* Start your business analytics consulting career* Use solutions taught in the book in practical uses cases and problems WHO THIS BOOK IS FORBusiness analytics enthusiasts who are not particularly programming inclined, small business owners and data science consultants, data science and business students, and SME (small-to-medium enterprise) analystsAfolabi Ibukun is a Data Scientist and is currently a Senior Lecturer in the Department of Computer and Information Sciences, Covenant University. She holds a B.Sc in Engineering Physics, an M.Sc and Ph.D in Computer Science. Afolabi Ibukun has over 15 years working experience in Computer Science research, teaching and mentoring. Her specific areas of interest are Data & Text Mining, Programming and Business Analytics. She has supervised several undergraduate and postgraduate students and published several articles in international journals and conferences. Afolabi Ibukun is also a Data Science Nigeria Mentor and currently runs a Business Analytics Consulting and Training firm named I&F Networks SolutionsINTRODUCTIONWe introduce data science generally and narrow it down to data science for business which is also referred to as business analytics. We then give a detailed explanation of the process involved in business analytics in form of the business analytics journey. In this journey, we explain what it takes from start to finish to carry out an analytics project in the business world, focusing on small business consulting, even though the process is generic to all types of business, small or large. We also give a description of what small business refers to in this book and the peculiarities of navigating an analytics project in such a terrain. To conclude the chapter, we talk about the types of analytics problems that is common to small business and the tools available to solve these problems given the budget situation of small businesses when it comes to analytics project.· DATA SCIENCE· DATA SCIENCE FOR BUSINESS· BUSINESS ANALYTICS JOURNEY· SMALL AND MEDIUM BUSINESS (SME)· BUSINESS ANALYTICS IN SMALL BUSINESS· TYPES OF ANALYTICS PROBLEMS IN SME· ANALYTICS TOOLS FOR SMES· ROAD MAPS TO THIS BOOK· PROBLEMS· REFERENCESCHAPTER 1: DATA FOR ANALYSIS IN SMALL BUSINESSIn this chapter, we would look at the various sources of data generally and in small business. This chapter is important because the major challenge of consulting for small business is the lack of data or quality data for analysis. This chapter will therefore detail the sources of data for analysis explaining first the type or form that data exists and some general ideas of how to collect such data. It gives an overview on data quality and integrity issues and touches on data literacy. The chapter also includes the typical data preparation procedures for the common types of techniques used in small business analytics and by extension used in this book. To conclude the chapter, we look at data visualization, particularly towards preparing data for various analytics task as explained in section 1.3.· SOURCE OF DATA· DATA QUALITY & INTEGRITY· DATA GOVERNANCE· DATA PREPARATION· DATA VISUALIZATION· PROBLEMS· REFERENCESCHAPTER 2: BUSINESS ANALYTICS CONSULTINGIn this chapter, we will look at business analytics consulting, particularly what the concept implies and how to build such a career path. We will explain the types of business analytics consulting that exist and then narrow it down to how to navigate the world of business analytics consulting for small business. In this chapter, we will look at how to manage a typical analytics project and measure the success of analytics projects. In conclusion, we will discuss issues revolving around how to bill analytics project particularly as a consultant.· BUSINESS ANALYTICS CONSULTING· MANAGING ANALYTICS PROJECT· SUCCESS METRICS IN ANALYTICS PROJECT· BILLING ANALYTICS PROJECT· PROBLEMS· REFERENCESCHAPTER 3: BUSINESS ANALYTICS CONSULTING PHASESIn this chapter we will look at the stages involved business analytics consulting, particularly when the analytics service is offered as a product from either within or outside the business. We will look at the proposal and initial analysis stage which gives direction to the analytics project. Then we look at the details involved in the pre-engagement, engagement and post engagement phase. It is important to know that the stages are presented in a typical or generic way but when implemented, there might be reason to modify or customize them for the application scenario.· PROPOSAL & INITIAL ANALYSIS· PRE- ENGAGEMENT PHASE· ENGAGEMENT PHASE· POST ENGAGEMENT PHASE· PROBLEMS· REFERENCESCHAPTER 4: DESCRIPTIVE ANALYTICS TOOLSThis chapter is focused on the mostly common descriptive analytics tools used in business generally and specifically in small businesses. The chapter will help to use descriptive analytics tools to understand your business and make recommendations that can improve your business profits. For small business, descriptive analytics helps SMEs to make sense of available data in order to monitor business indicators at a glance, helps SME owners to observe sales trends and patterns on an overall basis, as well as deep-dive into product categories and customer groups. It also helps SME’s to plan product strategy, pricing policies that will maximize their projected revenues and derive a lot of valuable insights for getting more customers.· INTRODUCTION· BAR CHART· HISTOGRAM· LINE GRAPHS· SCATTER PLOTS· PACKED BUBBLES CHARTS· HEAT MAPS· GEOGRAPHICAL MAPS· A PRACTICAL BUSINESS PROBLEM I· PROBLEMS· REFERENCESCHAPTER 5: PREDICTION TECHNIQUESIn this chapter, we will explore the popular techniques used for prediction, particularly in retails business. The approach used in explaining these techniques us to use them in solving a business problem. The second business problem to be addressed is the sales prediction problem which is common in retail business. The chapter first explain the fundamental concept of prediction techniques, next we look at how such techniques are evaluated. After this, we describe the business problem we intend solving. We then pick each of the selected techniques one by one and explain the algorithms involved and how they can be used to solve the problem described. The prediction techniques used and compared are the Multiple linear regression, the Regression Trees and the Neural Network. To conclude the chapter, we compare the results of the three algorithms and conclude on the problem in question. In this chapter therefore, the analytics products being offered is to solve sales prediction problem for small retail business.· INTRODUCTION· PRACTICAL BUSINESS PROBLEM II (SALES PREDICTION)· MULTIPLE LINEAR REGRESSION· REGRESSIN TREES· NEURAL NETWORK (PREDICTION)· CONCLUSION ON SALES PREDICTION· PROBLEMS· REFERENCESCHAPTER 6: CLASSIFICATION TECHNIQUESIn this chapter, even though there are several classification techniques, we will explore the popular ones used for classification in the business domain. In doing this, we will use the third business problem centered on customer loyalty comparing neural network, classification tree and random forest algorithms. In solving this problem, we are particular about how to get and retain more customers for our small business. We will also introduce some other classification based techniques such as K-nearest neighbour logistic regression and persuasion modelling. We will use persuasion modelling for the fourth practical business problem. In using these techniques to solve the problem we explain the fundamental concepts in the chosen algorithms and use them to demonstrate how this problems solving process can be adopted in real business scenarios.· CLASSIFICATION MODELS & EVALUATION· PRACTICAL BUSINESS PROBLEM III (CUSTOMER LOYALTY)· NEURAL NETWORK· CLASSIFICATION TREE· RANDOM FOREST & BOOSTED TREES· K NEAREST NEIGHBOUR· LOGISTIC REGRESSION· PROBLEMS· REFERENCESCHAPTER 7: ADVANCED DESCRIPTIVE ANALYTICSThis chapter is focused mainly on advanced descriptive analytics techniques. In this chapter, we will first explain the concept of clustering which is a type of unsupervised learning approach. We will then pick one clustering technique which is the K means clustering. Using the fourth practical business problem, we will explain how we can use the K means clustering technique to solve a real business problem. Next will explain the association rule example and finally Network analysis. We conclude with the fifth business problem which is focused on using network analytics for employee efficiency.· CLUSTERING· K MEANS· PRACTICAL BUSINESS PROBLEM IV (Customer Segmentation)· ASSOCIATION ANALYSIS· NETWORK ANALYSIS· PRACTICAL BUSINESS PROBLEM V (Staff Efficiency)· PROBLEMS· REFERENCESCHAPTER 8: CASE STUDY PART IThis chapter is the beginning part of major consulting case study for this book. We will explain what transpired during a typical business analytics consulting and help to create a road map or an example of how to navigate a business analytics consulting project. We start with a description of the SME Ecommerce environment generally, since this is the business environment of our selected case study, we then talk about the sources of data for analytics peculiar this environment. Next we describe the business to be used as case study briefly, followed by the analytics road map peculiar to consulting for this business. This chapter ends with the results of the initial analysis and pre engagement phase which forms the bases for the detailed analytics and implementation phase in chapter 10.· SME ECORMERCE· INTRODUCTION TO SME CASE STUDY· INITIAL ANALYSIS· ANALYTICS APPROACH· PRE –ENGAGEMENT· PROBLEMS· REFERENCESCHAPTER 9: CASE STUDY PART IIIn this chapter, we will conclude the case study used for illustration of a typical business analytics consulting for an SME by presenting the details of the engagement phase for the case study in question. The post engagement phase is left out as the implementation of the recommendations is determined by the systems and procedures of the business. It is important to note that the consulting steps can be customized for any small business based on the intended problem. The whole steps described in chapter 9 and 10 have been made simple for understanding, though in real life business application there might be need to iterate the process until satisfactory results have been gotten. This is because you constantly need to incorporate feedback from the stakeholders and domain experts.· GOAL 1: INCREASE WEBSITE TRAFFIC· GOAL 2: INCREASE WEBSITE SALES REVENUE· PROBLEMS· REFERENCES
Practical Haskell
Get a practical, hands-on introduction to the Haskell language, its libraries and environment, and to the functional programming paradigm that is fast growing in importance in the software industry. This updated edition includes more modern treatment of Haskell's web framework and APIs.This book contains excellent coverage of the Haskell ecosystem and supporting tools, including Cabal and Stack for managing projects, HUnit and QuickCheck for software testing, WAI and Elm to develop the back end and front end of web applications, Persistent and Esqueleto for database access, and parallel and distributed programming libraries.You’ll see how functional programming is gathering momentum, allowing you to express yourself in a more concise way, reducing boilerplate, and increasing the safety of your code. Haskell is an elegant and noise-free pure functional language with a long history, having a huge number of library contributors and an active community.This makes Haskell the best tool for both learning and applying functional programming, and Practical Haskell, Third Edition takes advantage of this to show off the language and what it can do. Free source code available on the Apress GitHub page for this book.WHAT YOU WILL LEARN* Get started programming with Haskell* Examine the different parts of the language* Gain an overview of the most important libraries and tools in the Haskell ecosystem* Apply functional patterns in real-world scenarios* Understand monads and monad transformers* Proficiently use laziness and resource managementWHO THIS BOOK IS FORExperienced programmers who may be new to the Haskell programming language. However, some prior exposure to Haskell is recommended.ALEJANDRO SERRANO MENA has more than a decade of experience as a developer, trainer, and researcher in functional programming, with an emphasis on Haskell and related languages. He holds a Ph.D. from Utrecht University on the topic of error message customization in compilers. He's an active member of the community, maintaining a few open-source projects, writing books about Haskell, and collaborating on podcasts and conferences.PART I: FIRST STEPS1. Going Functional2. Declaring the Data Model3. Increasing Code Reuse4. Using Containers and Type Classes5. Laziness and Infinite StructuresPART II: DATA MINING6. Knowing Your Clients Using Monads7. More Monads: Now for Recommendations8. Working in Several CoresPART III: RESOURCE HANDLING9. Dealing with Files: IO and Conduit10. Building and Parsing Text11. Safe Database Access12. Web ApplicationsPART IV: DOMAIN SPECIFIC LANGUAGES13. Strong Types14. Interpreting Offers with AttributesPART V: ENGINEERING THE STORE15. Documenting, Testing, and Verifying16. Architecting Your Application17. Looking Further
Produktion und Logistik in der digitalen Transformation
Dieses Buch beschreibt zahlreiche Erfahrungen, die in Produktionsunternehmen und in der Lehre mit der Umsetzung der Digitalisierung gesammelt wurden. Es werden unterschiedliche Entwicklungspfade aufgezeigt, die nicht alle beim Industrie-4.0-Musterunternehmen enden. Einbezogen werden dabei beispielsweise auch die neuen Anforderungen an Mitarbeiter und das Zusammenwirken mit anderen Unternehmen. Reifegradmodelle, Kennzahlensysteme sowie Praxisbeispiele bieten mögliche Wege, um die Digitalisierung in Unternehmen zu analysieren und neue Strategien umzusetzen. Zudem werden Kompromisslösungen und Maßnahmen beschrieben, die Wirtschaftlichkeit, Wettbewerbsfähigkeit und Weiterentwicklung bieten.
ESP32 steuert Roboterfahrzeug
• Open-Source-Code mit Arduino IDE und PlatformIO• Autonomes Fahren: GPS, Accelerometer, Gyroskop• PS3-ControllerMikrocontroller wie der Arduino und Einplatinenrechner wie der Raspberry Pi haben sich zu beliebten Komponenten entwickelt. Dritter im Bunde ist der ESP32 der Firma Espressif. Mikrocontroller dieser Baureihe zeichnen sich durch eine Vielzahl implementierter Funktionen aus, die bei einem Arduino konventioneller Prägung mit einem Atmel-AVR-Mikrocontroller erst mit weiterer Hardware möglich sind. Prominentes Beispiel sind hier die WiFi- und Bluetooth- Funktionalitäten. Gegenüber einem Raspberry Pi zeichnen sie sich durch einen deutlich geringeren Preis aus.Allgemeine Informationen für die Realisierung eines Roboterauto- Projekts mit dem ESP32 sind leicht zu finden. Dabei handelt es sich aber oft nur um Ausführungen zu einem Teilaspekt, ohne inhaltliche oder funktionale Abstimmung. So ist nicht nur die Beschaffung der benötigten Informationen mühselig und zeitaufwändig, sie kann auch außerordentlich fehlerträchtig sein.Ansatzpunkt dieses Buches ist, diese Lücke zu schließen. Es geht auf verschiedene Möglichkeiten eines Chassis ein, vermittelt nötige Kenntnisse und führt schrittweise von einer einfachen Motorsteuerung zu einem komplexen sensor- und sprachgesteuerten Roboterauto. Hacks rund um GPS und eine Playstation 3 runden die Sache ab.InhaltBei der Reihenfolge der Kapitel wurde versucht – beginnend bei der Darstellung von grundlegenden Informationen – über die Lösung einfacher Aufgaben zu etwas anspruchsvolleren Techniken zu führen.> Der Mikrocontroller ESP32> Die Software erstellen> Die Stromversorgung> Rund um die Hardware> Das Chassis> Der Gleichstrommotor> Kabellose Steuerung über WiFi> Mit Sensoren Hindernisse erkennen> Eine eigene Roboterauto-App> Servo und Lichtsensor> GPS> Accelerometer / Gyroskop> PS3-Controller> Roboterauto-AppUdo Brandes war lange Jahre als Systementwickler beim Rechenzentrum der Finanzverwaltung des Landes Nordrhein-Westfalen tätig. Verschiedene Aufgaben bei der Stadt Wuppertal markierten seinen weiteren beruflichen Weg. Seit einigen Jahren arbeitet er als selbstständiger Programmierer, IT-Entwickler und Autor. Ansätze und Möglichkeiten der Mikrocontrollerprogrammierung sind Zukunftsthemen, die den Autor faszinieren und mit deren Chancen und Risiken er sich seit langem intensiv befasst.
Drawing Product Ideas
EXPLORE STRAIGHTFORWARD DRAWING SKILLS TO HELP YOU COMMUNICATE PRODUCT IDEAS EXPONENTIALLY FASTER THAN YOU COULD WITH TEXTIn Drawing Product Ideas: Fast and Easy UX Drawing for Anyone, RSA Fellow and Google Data Visualization Lead, Kent Eisenhuth delivers a new and exciting guide to effectively communicating product ideas by drawing just two simple things: boxes and lines! In the book, you'll learn why drawing is important and how it supports the design thinking process. You'll also discover how to build your drawing toolkit by exploring your own personal drawing style.The author also includes:* Strategies for how to use your drawing to support your solutions to real-world problems* Tips and tricks for applying your new drawing skills in a workshop setting, in real-time* An illuminating foreword by the celebrated Manuel Lima, a Fellow of the Royal Society of ArtsAn essential volume for engineers, researchers, and product managers, Drawing Product Ideas is also an indispensable blueprint for anyone seeking to improve their public, ad-hoc drawing skills.Foreword ixPreface xiIntroduction xvCHAPTER 1 WHY DRAW? 1Explore an Idea 2Gain a Shared Understanding 5Improve Collaboration 7Anyone Can Draw 7Right Time and Place 10CHAPTER 2 REFRAMING OUR THINKING 15Breaking It Down 17Introducing the System 19Common Drawings 23CHAPTER 3 LINES AND POINTS 33Telling Stories with Lines 34Making Meaning with Points 42Tools and Materials 45CHAPTER 4 BUILDING FROM RECTANGLES 47Creating Diagrams 48Content Elements 55Navigation Elements 58Forms 65CHAPTER 5 BUILDING FROM CIRCLES, TRIANGLES, AND MORE 81Circular Elements 81Triangular Elements 89Advanced Icons and Symbols 92Representing Interactions 98CHAPTER 6 ILLUSTRATING LIGHT, MOTION, AND OTHER CONCEPTS 103Shading Techniques 103Using Accent Marks 105Looking at Lighting 105Using Elevation 110Using Texture 116Capturing Motion 119Conveying Luminance 120Communicating Sound 121CHAPTER 7 THE SYSTEM 127Putting It Together 128Creating Something New 134CHAPTER 8 USING FLOWS TO TELL STORIES 139Starting with the Syntax 139Showing Interactions 142Just Enough Information 144Depicting Transitions 145Labels and Annotations 147Being Conscious of Composition 150CHAPTER 9 TELLING ENGAGING STORIES 157Real-WorldConstraints 160Invoking Emotion 166Adapting the Visual Language 170Wayfinding and Landmarks 174Choreography and Timing 178Packaging Your Drawings 180CHAPTER 10 MOVING FORWARD 183Works Cited 185Index 187
Edge Networking
The Internet of Edges is a new paradigm whose objective is to keep data and processing close to the user. This book presents three different levels of Edge networking: MEC (Multi-access Edge Computing), Fog and Far Edge (sometimes called Mist or Skin). It also reviews participatory networks, in which user equipment provides the resources for the Edge network.Edge networks can be disconnected from the core Internet, and the interconnection of autonomous edge networks can then form the Internet of Edges.This book analyzes the characteristics of Edge networks in detail, showing their capacity to replace the imposing Clouds of core networks due to their superior server response time, data security and energy saving.KHALDOUN AL AGHA is a professor at the University of Paris-Saclay, France, and an expert in telecommunications and networks. He is a co-founder of Green Communications.PAULINE LOYGUE is chief marketing officer and director of product development at Green Communications. She is an expert in Edge and IoT innovation.GUY PUJOLLE is a co-founder and president of Green Communications. He is also professor emeritus at Sorbonne University, France.Introduction ixCHAPTER 1. EDGE ARCHITECTURES 11.1. The three levels of Edge Networking 11.2. Edge Computing architectures 41.3. Security and domain name system on Edge 141.4. The digital infrastructure of the participatory Internet 161.5. Conclusion 171.6. References 18CHAPTER 2. MEC NETWORKS 212.1. The MEC level of 5G architecture 212.2. 5G 252.3. 5G Edge 292.4. Conclusion 372.5. References 37CHAPTER 3. FOG NETWORKS 393.1. Fog architectures 393.2. Fog controllers 443.3. Fog and the Internet of Things 483.4. Wi-Fi in the Fog’s digital infrastructure 503.5. The new generation Wi-Fi 543.6. The next generation of mobile Wi-Fi 633.7. Private 5G for Fog Networking 643.8. Conclusion 693.9. References 69CHAPTER 4. SKIN NETWORKS 734.1. The architecture of Skin networks 734.2. Virtual access points 744.3. Participatory Internet networks 774.4. Conclusion 824.5. References 83CHAPTER 5. AD HOC AND MESH NETWORKS 855.1. Ad hoc networks 855.2. Routing 885.3. Mesh networks 935.4. Participatory networks 955.5. Local services 965.6. The digital infrastructure of the Internet of the Edges 975.7. Conclusion 1015.8. References 102CHAPTER 6. APPLICATIONS OF THE INTERNET OF EDGES 1056.1. Civil security and defense applications 1076.2. Applications of the Internet of Things 1086.3. The tactile Internet. 1106.4. Telecom applications 1156.5. Industry 4.0 1166.6. The smart city 1186.7. Conclusion 1216.8. References 121CHAPTER 7. VEHICULAR NETWORKS 1237.1. Communication techniques for vehicular networks 1237.2. Vehicular Ad hoc NETworks 1267.3. Connected and intelligent vehicles 1277.4. The MEC and the VEC 1287.5. Intelligent transport systems (ITS)-G5 1307.6. 5G V2X 1337.7. The VLC 1397.8. Conclusion 1407.9. References 140CHAPTER 8. VIRTUALIZATION OF THE INTERNET OF EDGES 1438.1. Network virtualization 1438.2. Virtualization on the Edge 1458.3. Using virtual networks on the Edge 1518.3.1. Isolation 1528.3.2. Extending network virtualization 1538.4. Mobile Edge Computing 1558.4.1. Examples of MEC applications 1558.4.2. Geolocation 1568.4.3. Augmented reality 1568.4.4. Video analytics 1578.4.5. Content optimization 1588.4.6. Content cache and DNS cache 1588.4.7. Performance optimization 1598.4.8. Positioning of MEC servers 1598.5. Conclusion 1628.6. References 162CHAPTER 9. SECURITY 1659.1. Cloud of security on the Edge 1659.2. Secure element 1709.2.1. Security based on secure elements 1749.2.2. The TEE 1759.2.3. The trusted service manager 1769.2.4. The Cloud-based security solution 1779.2.5. Solutions for security 1789.3. Blockchain 1839.3.1. Blockchain consensus 1849.3.2. Blockchain in Edge Computing. 1859.4. Conclusion 1889.5. References 188CHAPTER 10. THE EXAMPLE OF GREEN COMMUNICATIONS 19310.1. The Green PI solution 19410.2. The Edge Cloud 19410.3. The IoE 19510.4. The IoE platform 19910.5. Use cases: IoT in constrained environments 20110.6. IoT in motion 20210.7. Massive IoT 20310.8. The advantages 20510.9. References 205CHAPTER 11. DEPLOYMENT OF THE PARTICIPATORY INTERNET 20711.1. The deployment 20711.2. The Green Cloud 20811.2.1. My Network 21111.2.2. Chat 21211.2.3. Talk 21211.2.4. Storage 21211.2.5. vCard Editor 21211.3. Scaling up 21211.4. Energy savings 21411.5. Security 21911.6. Wi-Fi and LTE hybridization 22011.7. Conclusion 22311.8. References 223CHAPTER 12. THE FUTURE 22512.1. The short-term future 22512.2. The medium-term future 22612.3. The long-term future 22712.4. Participatory Internet and IPV6 22812.5. References 231List of Authors 235Index 237
C# für Kids
Einfacher Einstieg in die C#-Programmierung mit vielen Schritt-für-Schritt-Anleitungen Zahlreiche kleine Spiele programmieren wie ein Quiz, ein Würfel-Glücksspiel und eine Spinnen-Animation Mit Fragen und Aufgaben am Ende jedes Kapitels sowie Code zum Download Hans-Georg Schumann zeigt in einfachen Schritten, wie du in die Programmiersprache C# einsteigst und schnell erste Programme schreibst. Anhand selbst programmierter Spiele erfährst du, wie du Buttons und Labels anlegst, mit Variablen umgehst und Klassen festlegst. Die frei verfügbare Community-Version der Entwicklungsumgebung Visual Studio hilft dir, wie ein Profi zu programmieren bis hin zur Objektorientierten Programmierung. Du lernst, Schaltflächen zu verwenden, ein Quiz zu entwickeln und sogar eine Spinne über den Bildschirm zu jagen. So wird dir das Programmieren richtig Spaß machen! Zwischendurch kannst du immer wieder Fragen und Aufgaben beantworten, um das Gelernte zu festigen. Die richtigen Antworten und Lösungen sowie alle Codebeispiele findest du im Internet zum Download. Aus dem Inhalt: Mit C# ein erstes kleines Programm schreiben Was eine Entwicklungsumgebung ist und wie du z.B. mit Visual Studio programmierst Variablen und Kontrollstrukturen im ersten Projekt kennenlernen Kleine Spiele entwickeln: Zensuren umrechnen und Zahlen raten Grundlagen der Objektorientierten Programmierung Eine Lottoziehung und ein Rätselspiel programmieren Den Wortschatz von C# selber erweitern Mit Kapselung und Vererbung umgehen lernen Hilfreiche Buttons und andere optische Komponenten verwenden Die grafischen Möglichkeiten von C# nutzen Gleichzeitig spielen und lernen: ein größeres Quizprojekt programmieren Viele Anregungen für eigene Spiele: vom Würfel-Glücksspiel bis zur Spinnen-Animation Ausführlicher Anhang zur Installation und zur Fehlersuche Hans-Georg Schumann war Informatik- und Mathematiklehrer an einer Gesamtschule. Er hat bereits viele erfolgreiche Bücher in der mitp-Buchreihe »... für Kids« geschrieben.
Practical Database Auditing for Microsoft SQL Server and Azure SQL
Know how to track changes and key events in your SQL Server databases in support of application troubleshooting, regulatory compliance, and governance. This book shows how to use key features in SQL Server ,such as SQL Server Audit and Extended Events, to track schema changes, permission changes, and changes to your data. You’ll even learn how to track queries run against specific tables in a database.Not all changes and events can be captured and tracked using SQL Server Audit and Extended Events, and the book goes beyond those features to also show what can be captured using common criteria compliance, change data capture, temporal tables, or querying the SQL Server log. You will learn how to audit just what you need to audit, and how to audit pretty much anything that happens on a SQL Server instance. This book will also help you set up cloud auditing with an emphasis on Azure SQL Database, Azure SQL Managed Instance, and AWS RDS SQL Server.You don’t need expensive, third-party auditing tools to make auditing work for you, and to demonstrate and provide value back to your business. This book will help you set up an auditing solution that works for you and your needs. It shows how to collect the audit data that you need, centralize that data for easy reporting, and generate audit reports using built-in SQL Server functionality for use by your own team, developers, and organization’s auditors.WHAT YOU WILL LEARN* Understand why auditing is important for troubleshooting, compliance, and governance* Track changes and key events using SQL Server Audit and Extended Events* Track SQL Server configuration changes for governance and troubleshooting* Utilize change data capture and temporal tables to track data changes in SQL Server tables* Centralize auditing data from all your databases for easy querying and reporting* Configure auditing on Azure SQL, Azure SQL Managed Instance, and AWS RDS SQL Server WHO THIS BOOK IS FORDatabase administrators who need to know what’s changing on their database servers, and those who are making the changes; database-savvy DevOps engineers and developers who are charged with troubleshooting processes and applications; developers and administrators who are responsible for generating reports in support of regulatory compliance reporting and auditingJOSEPHINE BUSH has more than 10 years of experience as a database administrator. Her experience is extensive and broad-based, including experience in financial, business, and energy data systems using SQL Server, MySQL, Oracle, and PostgreSQL. She is a Microsoft Certified Solutions Expert: Data Management and Analytics. She holds a BS in Information Technology, an MBA in IT Management, and an MS in Data Analytics. She is the author of Learn SQL Database Programming. You can reach her on Twitter @hellosqlkitty.IntroductionPART I. GETTING STARTED WITH AUDITINGChapter 1. Why Auditing is ImportantChapter 2. Types of AuditingPART II. IMPLEMENTING AUDITINGChapter 3. What is SQL Server Audit?Chapter 4. Implementing SQL Server Audit via the GUIChapter 5. Implementing SQL Server Audit via SQL ScriptsChapter 6: What is Extended Events?Chapter 7: Implementing Extended Events via the GUIChapter 8: Implementing Extended Events via SQL ScriptsChapter 9. Tracking SQL Server Configuration ChangesChapter 10. Additional SQL Server Auditing and Tracking MethodsPART III. CENTRALIZING AND REPORTING ON AUDITING DATAChapter 11. Centralizing Audit DataChapter 12. Create Reports from Audit DataPART IV. CLOUD AUDITING OPTIONSChapter 13. Auditing Azure SQL DatabasesChapter 14. Auditing Azure SQL Managed InstanceChapter 15. Other Cloud Provider Auditing OptionsPART V. APPENDIXESAppendix A. Database Auditing Options Comparison
The Art of Site Reliability Engineering (SRE) with Azure
Gain a foundational understanding of SRE and learn its basic concepts and architectural best practices for deploying Azure IaaS, PaaS, and microservices-based resilient architectures.The book starts with the base concepts of SRE operations and developer needs, followed by definitions and acronyms of Service Level Agreements in real-world scenarios. Moving forward, you will learn how to build resilient IaaS solutions, PaaS solutions, and microservices architecture in Azure. Here you will go through Azure reference architecture for high-available storage, networking and virtual machine computing, describing Availability Sets and Zones and Scale Sets as main scenarios. You will explore similar reference architectures for Platform Services such as App Services with Web Apps, and work with data solutions like Azure SQL and Azure Cosmos DB.Next, you will learn automation to enable SRE with Azure DevOps Pipelines and GitHub Actions. You’ll also gain an understanding of how an open culture around post-mortems dramatically helps in optimizing SRE and the overall company culture around managing and running IT systems and application workloads. You’ll be exposed to incent management and monitoring practices, by making use of Azure Monitor/Log Analytics/Grafana, which forms the foundation of monitoring Azure and Hybrid-running workloads.As an extra, the book covers two new testing solutions: Azure Chaos Studio and Azure Load Testing. These solutions will make it easier to test the resilience of your services.After reading this book, you will understand the underlying concepts of SRE and its implementation using Azure public cloud.WHAT WILL YOU LEARN:* Learn SRE definitions and metrics like SLI/SLO/SLA, Error Budget, toil, MTTR, MTTF, and MTBF* Understand Azure Well-Architected Framework (WAF) and Disaster Recovery scenarios on Azure* Understand resiliency and how to design resilient solutions in Azure for different architecture types and services* Master core DevOps concepts and the difference between SRE and tools like Azure DevOps and GitHub* Utilize Azure observability tools like Azure Monitor, Application Insights, KQL or Grafana* Understand Incident Response and Blameless Post-Mortems and how to improve collaboration using ChatOps practices with Microsoft toolsWHO IS THIS BOOK FOR:IT operations administrators, engineers, security team members, as well as developers or DevOps engineers.UNAI HUETE BELOKI is a Microsoft Technical Trainer (MTT) working at Microsoft, based in San Sebastian (Spain).From February 2017 to July 2020 he worked as a PFE (Premier Field Engineer), offering support and education as a DevOps Expert to Microsoft customers all around EMEA , mainly focused in the following technologies: GitHub, Azure DevOps, Azure Cloud Architecture and Monitoring, Azure AI/Cognitive Services.Since July 2020, he has worked as a Microsoft Technical Trainer (MTT) on the technologies mentioned above, and served as the MTT lead for the AZ-400 DevOps Solutions exam, helping shape content of the exam/course.In his free time, he loves traveling, water sports like surfing and spearfishing, and mountain-related activities such as MTB and snowboarding.CHAPTER 1: THE FOUNDATION OF SREThis chapter lays out the foundation of Site Resiliency Engineering, founded by Google. From the base concepts of how IT Operations and Developers need to collaborate, to how SRE helps organizations in running business-critical workloads without major downtimeCHAPTER 2: SERVICE LEVEL MANAGEMENT DEFINITIONS AND ACRONYMS AND THEIR MEANING IN A REAL-LIFE CONTEXTThis Chapter describes all common Service Level Agreements (SLA) definitions and acronyms, looked at from a real-world scenario to provide a clear understandingo Some examples, SLA, SLO, MTTF, MTBF, MTTR,…CHAPTER 3: ARCHITECTING RESILIENT INFRASTRUCTURE AS A SERVICE (IAAS) SOLUTIONS IN AZURESRE is all about providing ultimate uptime of your organization’s workloads, and this chapter will cover that in relation to Azure IaaS Compute solutions. Explaining the Azure reference architecture for high-available storage, networking and Virtual Machine computing, describing Availability Sets and Zones and ScaleSets as main scenarios. It will also touch on preparing for Disaster Recovery with Azure Backup and Azure Site Recovery, helping you to quickly mitigate outages in case of a failureCHAPTER 4: ARCHITECTING RESILIENT PLATFORM AS A SERVICE (PAAS) SOLUTIONS IN AZUREFollowing on the scenario of Virtual Machines, this chapter details similar reference architectures for Platform Services such as App Services with Web Apps, but also touching on data solutions like Azure SQL and Azure Cosmos DBCHAPTER 5: ARCHITECTING RESILIENT SERVERLESS AND MICROSERVICES ARCHITECTURES IN AZUREThis third chapter in the reference architecture topic describes how to build high-available, business-critical scenarios using Serverless Functions and Azure LogicApps, as well as Microservices scenarios using Azure Container Instance and Azure Kubernetes Service (AKS).CHAPTER 6: AUTOMATION TO ENABLE SRE WITH AZURE DEVOPS PIPELINES / GITHUB ACTIONSAutomation is the cornerstone to SRE, allowing businesses to not only deploy new workloads in a easy way, but also relying on SRE to avoid critical outages or, when an outage occurs, relying on automation to mitigate the problem as fast as possible. Sharing several examples from both Azure DevOps Pipelines and GitHub Actions, this chapter provides the reader a lot of real-life examples to reuse in their own environmentCHAPTER 7: EFFICIENTLY HANDLING BLAMELESS POST-MORTEMSPost-Mortems are the way to look back at what caused the outage, and describe any lessons learned for the future, helping in avoiding a similar outage in the future, or assist in quickly fixing an identical incident. Blameless is where the focus is on finding the root-cause of the problem, without pinpointing any individual or team as being the victim. This chapter describes how an open culture around post-mortems dramatically helps in optimizing SRE and the overall company culture around managing and running IT systems and application workloads.CHAPTER 8: MONITORING AS THE KEY TO KNOWLEDGEBesides the automated deployments, monitoring is the 2nd big technical topic in any SRE scenario. You can’t manage what you don’t know. This chapter provides an overview of Azure Monitor and Log Analytics, which forms the foundation of monitoring Azure and Hybrid-running workloads. Starting from metrics for the different Azure services touched on in earlier chapters, this chapter also covers how to export logs to 3rd party solutions such as Splunk or integrating dashboarding tools like Grafana
iPhone iOS 16
Die verständliche Anleitung für Ihr Smartphone:- Alle Funktionen & Einstellungen auf einen Blick- Schritt für Schritt erklärt – mit praktischen TippsMit diesem smarten Praxisbuch gelingt Ihnen der schnelle Einstieg in Ihr iPhone. Lernen Sie das Smartphone mit iOS 16 von Grund auf kennen und beherrschen! Anschauliche Anleitungen, Beispiele und Bilder zeigen Ihnen gut nachvollziehbar, wie Sie Ihr mobiles Gerät optimal handhaben – von der Ersteinrichtung und Personalisierung über die große Funktionsvielfalt bis zu den wichtigsten Anwendungen. Nutzen Sie darüber hinaus die übersichtlichen Spicker-Darstellungen: Damit können Sie jene Bedienungsschritte, die man am häufigsten braucht, aber immer wieder vergisst, auf einen Blick finden und umsetzen. Freuen Sie sich auf viele hilfreiche Tipps und legen Sie ganz einfach los! Aus dem Inhalt:- Alle Bedienelemente des Apple-Betriebssystems iOS 16 auf einen BlickErsteinrichtung und Tipps zum UmzugApple ID erstellen und nutzenDie Benutzeroberfläche Ihres iPhones personalisierenApps aus dem App Store herunterladenKontakte anlegen und im Adressbuch verwaltenAnrufe tätigen und SMS austauschen Nachrichten über Mail und WhatsApp versenden und empfangenUhr, Kalender, Karten und andere praktische Apps nutzen Fotos sowie Videos aufnehmen, verwalten und teilenIns Internet gehen über WLAN und mobile Daten Updates und Datenschutz
Drawing Product Ideas
EXPLORE STRAIGHTFORWARD DRAWING SKILLS TO HELP YOU COMMUNICATE PRODUCT IDEAS EXPONENTIALLY FASTER THAN YOU COULD WITH TEXTIn Drawing Product Ideas: Fast and Easy UX Drawing for Anyone, RSA Fellow and Google Data Visualization Lead, Kent Eisenhuth delivers a new and exciting guide to effectively communicating product ideas by drawing just two simple things: boxes and lines! In the book, you'll learn why drawing is important and how it supports the design thinking process. You'll also discover how to build your drawing toolkit by exploring your own personal drawing style.The author also includes:* Strategies for how to use your drawing to support your solutions to real-world problems* Tips and tricks for applying your new drawing skills in a workshop setting, in real-time* An illuminating foreword by the celebrated Manuel Lima, a Fellow of the Royal Society of ArtsAn essential volume for engineers, researchers, and product managers, Drawing Product Ideas is also an indispensable blueprint for anyone seeking to improve their public, ad-hoc drawing skills.Foreword ixPreface xiIntroduction xvCHAPTER 1 WHY DRAW? 1Explore an Idea 2Gain a Shared Understanding 5Improve Collaboration 7Anyone Can Draw 7Right Time and Place 10CHAPTER 2 REFRAMING OUR THINKING 15Breaking It Down 17Introducing the System 19Common Drawings 23CHAPTER 3 LINES AND POINTS 33Telling Stories with Lines 34Making Meaning with Points 42Tools and Materials 45CHAPTER 4 BUILDING FROM RECTANGLES 47Creating Diagrams 48Content Elements 55Navigation Elements 58Forms 65CHAPTER 5 BUILDING FROM CIRCLES, TRIANGLES, AND MORE 81Circular Elements 81Triangular Elements 89Advanced Icons and Symbols 92Representing Interactions 98CHAPTER 6 ILLUSTRATING LIGHT, MOTION, AND OTHER CONCEPTS 103Shading Techniques 103Using Accent Marks 105Looking at Lighting 105Using Elevation 110Using Texture 116Capturing Motion 119Conveying Luminance 120Communicating Sound 121CHAPTER 7 THE SYSTEM 127Putting It Together 128Creating Something New 134CHAPTER 8 USING FLOWS TO TELL STORIES 139Starting with the Syntax 139Showing Interactions 142Just Enough Information 144Depicting Transitions 145Labels and Annotations 147Being Conscious of Composition 150CHAPTER 9 TELLING ENGAGING STORIES 157Real-WorldConstraints 160Invoking Emotion 166Adapting the Visual Language 170Wayfinding and Landmarks 174Choreography and Timing 178Packaging Your Drawings 180CHAPTER 10 MOVING FORWARD 183Works Cited 185Index 187
HTML & CSS für Dummies 2. Auflage
Auch heute noch sind HTML und CSS die Basis aller Webseiten. Wer mehr möchte, als nur einen unflexiblen Website-Baukasten zu nutzen, kommt an beidem schwer vorbei. Egal, ob Sie eine Website komplett neu aufbauen oder ob Sie beim Einsatz eines Content-Management-Systems individuelle Anpassungen vornehmen möchten: Dieses Buch hilft Ihnen weiter. Florence Maurice erklärt Ihnen mit vielen Beispielen und Schritt für Schritt alle wichtigen Grundlagen, wie HTML funktioniert, wofür Sie CSS benötigen und wie Sie am Ende all dieses Wissen anwenden.Florence Maurice ist Trainerin, Autorin und Programmiererin für Webthemen und das seit 2001. Sie hat viele erfolgreiche Webbücher geschrieben, publiziert regelmäßig Fachartikel in Fachzeitungen und nimmt auch Videotrainings auf; insbesondere für LinkedIn Learning. Außerdem schult sie live sowohl an einer Volkshochschule als auch in Firmen; ab und an ist sie auch Speaker auf Konferenzen. Ansonsten arbeitet sie noch als Fernlehrerin. Kurz: Sie vermittelt Wissen in allen erdenklichen Formen. In der übrigen Zeit programmiert sie Webseiten, um ihre Kenntnisse in der Praxis zu verfeinern.
Security in Vehicular Networks
Vehicular networks were first developed to ensure safe driving and to extend the Internet to the road. However, we can now see that the ability of vehicles to engage in cyber-activity may result in tracking and privacy violations through the interception of messages, which are frequently exchanged on road.This book serves as a guide for students, developers and researchers who are interested in vehicular networks and the associated security and privacy issues. It facilitates the understanding of the technologies used and their various types, highlighting the importance of privacy and security issues and the direct impact they have on the safety of their users. It also explains various solutions and proposals to protect location and identity privacy, including two anonymous authentication methods that preserve identity privacy and a total of five schemes that preserve location privacy in the vehicular ad hoc networks and the cloud-enabled internet of vehicles, respectively.Leila Benarous is an associate professor in the Computer Science department and a researcher at LIM Laboratory, University of Laghouat, Algeria. She is also an associate member of UPEC-LiSSi-TincNET Research Team, France.Salim Bitam is a professor of Computer Science and vice rector responsible for post-graduation training and scientific research at the University of Biskra, Algeria. His main research interests include vehicular networks, cloud computing and bio-inspired methods.Abdelhamid Mellouk is currently the director of IT4H High School Engineering Department, a professor at the University of Paris-Est Créteil (UPEC) and Head of UPEC-LiSSi-TincNET Research Team, France. He is the founder of the Network Control Research and Curricula activities in UPEC, the current co President of the French Deep Tech Data Science and Artificial Intelligence Systematic Hub, member of the Algerian High Research Council (CNRST) and an associate editor of several top ranking scientific journals.Preface xiList of Acronyms xiiiIntroduction xixCHAPTER 1 VEHICULAR NETWORKS 11.1 Introduction 11.2 Motivation by numbers 21.3 Evolution 31.4 Architecture 41.5 Characteristics 51.6 Technical challenges and issues 61.7 Wireless technology 71.8 Standards 71.8.1 IEEE WAVE stack 81.8.2 ETSI standards 91.8.3 The 3GPP standard 91.9 Types 101.9.1 The autonomous vehicle (self-dependent) 101.9.2 VANET 111.9.3 Vehicular clouds 111.9.4 Internet of vehicles 121.9.5 Social Internet of vehicles 141.9.6 Data named vehicular networks 151.9.7 Software-defined vehicular networks 151.10 Test beds and real implementations 161.11 Services and applications 171.12 Public opinion 191.13 Conclusion 20CHAPTER 2 PRIVACY AND SECURITY IN VEHICULAR NETWORKS 212.1 Introduction 212.2 Privacy issue in vehicular networks 222.2.1 Types 232.2.2 When and how it is threatened? 242.2.3 Who is the threat? 242.2.4 What are the consequences? 242.2.5 How can we protect against it? 252.3 State-of-the-art location privacy-preserving solutions 282.3.1 Non-cooperative change 282.3.2 Silence approaches 282.3.3 Infrastructure-based mix-zone approach 282.3.4 The cooperation approach (distributed mix-zone) 362.3.5 Hybrid approach 362.4 Authentication issues in vehicular networks 492.4.1 What is being authenticated in vehicular networks? 492.4.2 Authentication types 502.4.3 How does authentication risk privacy? 512.5 Identity privacy preservation authentication solutions: state of the art 522.6 Conclusion 54CHAPTER 3 SECURITY AND PRIVACY EVALUATION METHODOLOGY 553.1 Introduction 553.2 Evaluation methodology 583.2.1 Security 583.2.2 Privacy 663.3 Conclusion 74CHAPTER 4 THE ATTACKER MODEL 754.1 Introduction 754.2 Security objectives 764.3 Security challenges 784.4 Security attacker 794.4.1 Aims 804.4.2 Types 804.4.3 Means 814.4.4 Attacks 82Contents vii4.4.5 Our attacker model 854.5 Conclusion 90CHAPTER 5 PRIVACY-PRESERVING AUTHENTICATION IN CLOUD-ENABLED VEHICLE DATA NAMED NETWORKS (CVDNN) FOR RESOURCES SHARING 915.1 Introduction 915.2 Background 925.2.1 Vehicular clouds 925.2.2 Vehicular data named networks 945.3 System description 945.4 Forming cloud-enabled vehicle data named networks 955.5 Migrating the local cloud virtual machine to the central cloud 975.6 Privacy and authentication when using/providing CVDNN services 975.6.1 The authentication process 985.6.2 The reputation testimony 1005.7 The privacy in CVDNN 1025.8 Discussion and analysis 1035.8.1 The privacy when joining the VC 1035.8.2 Privacy while using the VC 1065.9 Conclusion 106CHAPTER 6 PRIVACY-PRESERVING AUTHENTICATION SCHEME FOR ON-ROAD ON-DEMAND REFILLING OF PSEUDONYM IN VANET 1096.1 Introduction 1096.2 Network model and system functionality 1116.2.1 Network model 1116.2.2 The system functionality 1136.3 Proposed scheme 1146.4 Analysis and discussion 1196.4.1 Security analysis 1196.4.2 Burrows, Abadi and Needham (BAN) logic 1246.4.3 SPAN and AVISPA tools 1266.5 Conclusion 129CHAPTER 7 PRESERVING THE LOCATION PRIVACY OF VEHICULAR AD HOC NETWORK USERS 1317.1 Introduction 1317.2 Adversary model 1337.3 Proposed camouflage-based location privacy-preserving scheme 1337.3.1 Analytical model 1357.3.2 Simulation 1367.4 Proposed hybrid pseudonym change strategy 1417.4.1 Hypothesis and assumptions 1417.4.2 Changing the pseudonyms 1427.4.3 The simulation 1457.5 Conclusion 148CHAPTER 8 PRESERVING THE LOCATION PRIVACY OF INTERNET OF VEHICLES USERS 1518.1 Introduction 1518.2 CE-IoV 1538.3 Privacy challenges 1568.4 Attacker model 1578.5 CLPPS: cooperative-based location privacy-preserving scheme for Internet of vehicles 1588.5.1 Simulation 1598.5.2 Comparative study and performance analysis 1638.6 CSLPPS: concerted silence-based location privacy-preserving scheme for Internet of vehicles 1668.6.1 The proposed solution 1668.6.2 Simulation results 1678.6.3 Comparative study performance analysis 1698.7 Obfuscation-based location privacy-preserving scheme in cloud-enabled Internet of vehicles 1718.7.1 The proposition 1718.7.2 Study of feasibility using game theoretic approach 1738.7.3 The simulation 1748.7.4 Analytical model 1778.7.5 Comparative study 1788.8 Conclusion 180CHAPTER 9 BLOCKCHAIN-BASED PRIVACY-AWARE PSEUDONYM MANAGEMENT FRAMEWORK FOR VEHICULAR NETWORKS 1819.1 Introduction 1819.2 Background 1839.2.1 Public key infrastructure (PKI) 1839.2.2 Vehicular PKI 1859.2.3 Blockchain technology 1859.2.4 Blockchain of blockchains 1909.3 Related works 1919.3.1 Blockchain-based PKI 1919.3.2 Privacy-aware blockchain-based PKI 1919.3.3 Monero 1919.3.4 Blockchain-based vehicular PKI 1929.4 Key concepts 1929.4.1 Ring signature 1929.4.2 One-time address 1949.5 Proposed solution 1959.5.1 General description 1959.5.2 Registration to the blockchain 1969.5.3 Certifying process 1969.5.4 Revocation process 1979.5.5 Transaction structure and validation 1979.5.6 Block structure and validation 2009.5.7 Authentication using blockchain 2019.6 Analysis 2029.7 Comparative study 2069.8 Conclusion 206Conclusion 211References 215Index 229
Product Ownership meistern (2. Auflg.)
Produkte erfolgreich entwickelnAls Product Owner stehen Sie jeden Tag vor der Herausforderung, Produkte Wirklichkeit werden zu lassen. Sie sind stets auf der Suche nach dem Wert für ihre Kunden und müssen dabei Stakeholder, Unternehmenspolitik und Kundinnen unter einen Hut bringen. »Product Ownership meistern« zeigt auf, warum heutiges Produktmanagement nicht nur kompliziert, sondern komplex ist und gibt Ihnen Hilfestellungen, wie Sie die Komplexität meistern können – von der ersten Produktidee bis zur Produktablöse den gesamten Lebenszyklus entlang.Autoren: Frank Düsterbeck macht Arbeit wert(e)voll – als Geschäftsführer der Kurswechsel Unternehmensberatung GmbH, Berater bei der HEC GmbH, Dozent, Fachbeirat und Sprecher auf diversen Konferen-zen und Veranstaltungen. Er ist Experte in den Bereichen digitale Produktentwicklung, Innovation sowie Organisationsentwicklung und -Transformation. Immer mit dem klaren Ziel, wirklich etwas im Denken seiner Gegenüber zu bewirken und über den Einsatz mo-derner Verfahren und Methoden, eine wertbringende und wert-schöpfende Zusammenarbeit zu ermöglichen.Ina Einemann arbeitet als agiler Coach mit dem Schwerpunkt An-forderungsmanagement und Product Ownership bei der Open Knowlege GmbH in Oldenburg. Seit zehn Jahren beschäftigt sie sich mit agilen Methoden und Vorgehensmodellen und berät Teams bei der Umsetzung agiler Praktiken mit dem Ziel, Teams zu motivieren, tolle Produkte umzusetzen. Sie spricht regelmäßig auf agilen Konferenzen, ist Kuratorin diverser Konferenzen und einer der Hosts vom agilen Podcast „Mein Scrum ist kaputt“.Zielgruppen: Product OwnerProduktmanager*innenProjektmanager*innenScrum Master
Make: Elektronik (3. Auflage)
Eine unterhaltsame Einführung für Maker, Kids, Tüftlerinnen und Bastler in 3. Auflage.Dinge verheizen, Sachen vermasseln – so lernt man. Beginnend mit den grundlegenden Konzepten können Sie anhand eigener praktischer Experimente und unter Verwendung erschwinglicher Teile und Werkzeuge lernen.Auf dem Weg dorthin können Sie eine Sicherung durchbrennen lassen, ein Relais zum Summen bringen und eine Leuchtdiode durchbrennen lassen. In Make: Elektronik gibt es kein misslungenes Experiment, denn alle Experimente sind ein wertvoller Lernprozess. Mit dieser dritten Auflage wird das bewährte Buch jetzt noch besser.Innerhalb weniger Stunden bauen Sie einen Reflexionstester, einen Einbruchsalarm, ein Quizspiel oder ein Zahlenschloss – und modifizieren sie, um noch viel mehr zu tun. Nachdem Sie die Grundlagen von Spannung, Strom, Widerstand, Kapazität und Induktivität kennengelernt haben, werden Sie die Grundlagen von Logikchips, Funk, Mikrocontrollern und Elektromagnetismus entdecken. Jedes Projekt passt auf ein einziges Breadboard, und die meisten erfordern keine Lötarbeiten.Alle Experimente arbeiten mit sicheren, niedrigen Spannungen, die meist von einer einzigen 9-Volt-Batterie geliefert werden. Make:-Elektronik zieht Leserinnen und Leser aller Altersgruppen angezogen, von 10-Jährigen bis hin zu Rentnerinnen und Rentnern, die endlich freie Zeit haben, um ihre Neugierde an Elektronik zu befriedigen.Zum Autor:Charles Platts erstes Elektronik-Projekt war ein Telefonanrufbeantworter, den er mit 15 selbst baute. Er wurde Science-Fiction-Autor (The Silicon Man), brachte Leuten das Erstellen von Computergrafiken bei und war Redakteur bei der Zeitschrift Wired, ehe er wieder zu seiner ersten Liebe, der Elektronik, zurückkehrte. Er ist Editor beim amerikanischen Make:-Magazin.
Practical MATLAB Deep Learning
Harness the power of MATLAB for deep-learning challenges. Practical MATLAB Deep Learning, Second Edition, remains a one-of a-kind book that provides an introduction to deep learning and using MATLAB's deep-learning toolboxes. In this book, you’ll see how these toolboxes provide the complete set of functions needed to implement all aspects of deep learning. This edition includes new and expanded projects, and covers generative deep learning and reinforcement learning.Over the course of the book, you'll learn to model complex systems and apply deep learning to problems in those areas. Applications include:* Aircraft navigation* An aircraft that lands on Titan, the moon of Saturn, using reinforcement learning* Stock market prediction* Natural language processing* Music creation usng generative deep learning* Plasma control* Earth sensor processing for spacecraft* MATLAB Bluetooth data acquisition applied to dance physics WHAT YOU WILL LEARN* Explore deep learning using MATLAB and compare it to algorithms* Write a deep learning function in MATLAB and train it with examples* Use MATLAB toolboxes related to deep learning* Implement tokamak disruption prediction* Now includes reinforcement learningWHO THIS BOOK IS FOREngineers, data scientists, and students wanting a book rich in examples on deep learning using MATLAB.MICHAEL PALUSZEK is the co-author of MATLAB Recipes published by Apress. He is President of Princeton Satellite Systems, Inc. (PSS) in Plainsboro, New Jersey. Mr. Paluszek founded PSS in 1992 to provide aerospace consulting services. He used MATLAB to develop the control system and simulation for the Indostar-1 geosynschronous communications satellite, resulting in the launch of PSS' first commercial MATLAB toolbox, the Spacecraft Control Toolbox, in 1995. Since then he has developed toolboxes and software packages for aircraft, submarines, robotics, and fusion propulsion, resulting in PSS' current extensive product line. He is currently leading an Army research contract for precision attitude control of small satellites and working with the Princeton Plasma Physics Laboratory on a compact nuclear fusion reactor for energy generation and propulsion. Prior to founding PSS, Mr. Paluszek was an engineer at GE Astro Space in East Windsor, NJ. At GE he designed the Global Geospace Science Polar despun platform control system and led the design of the GPS IIR attitude control system, the Inmarsat-3 attitude control systems and the Mars Observer delta-V control system, leveraging MATLAB for control design. Mr. Paluszek also worked on the attitude determination system for the DMSP meteorological satellites. Mr. Paluszek flew communication satellites on over twelve satellite launches, including the GSTAR III recovery, the first transfer of a satellite to an operational orbit using electric thrusters. At Draper Laboratory Mr. Paluszek worked on the Space Shuttle, Space Station and submarine navigation. His Space Station work included designing of Control Moment Gyro based control systems for attitude control. Mr. Paluszek received his bachelors in Electrical Engineering, and master's and engineer’s degrees in Aeronautics and Astronautics from the Massachusetts Institute of Technology. He is author of numerous papers and has over a dozen U.S. Patents.STEPHANIE THOMAS is the co-author of MATLAB Recipes, published by Apress. She received her bachelor's and master's degrees in Aeronautics and Astronautics from the Massachusetts Institute of Technology in 1999 and 2001. Ms. Thomas was introduced to PSS' Spacecraft Control Toolbox for MATLAB during a summer internship in 1996 and has been using MATLAB for aerospace analysis ever since. She built a simulation of a lunar transfer vehicle in C++, LunarPilot, during the same internship. In her nearly 20 years of MATLAB experience, she has developed many software tools including the Solar Sail Module for the Spacecraft Control Toolbox; a proximity satellite operations toolbox for the Air Force; collision monitoring Simulink blocks for the Prisma satellite mission; and launch vehicle analysis tools in MATLAB and Java, to name a few. She has developed novel methods for space situation assessment such as a numeric approach to assessing the general rendezvous problem between any two satellites implemented in both MATLAB and C++. Ms. Thomas has contributed to PSS' Attitude and Orbit Control textbook, featuring examples using the Spacecraft Control Toolbox, and written many software User's Guides. She has conducted SCT training for engineers from diverse locales such as Australia, Canada, Brazil, and Thailand and has performed MATLAB consulting for NASA, the Air Force, and the European Space Agency.ERIC HAM is a a Technical Specialist, Princeton Satellite Systems. His expertise lies with deep learning, programming using MATLAB, C++ and related.1. What is deep learning? – no changes except editoriala. Machine learning vs. deep learningb. Approaches to deep learningc. Recurrent deep learningd. Convolutional deep learning2. MATLAB machine and deep learning toolboxesa. Describe the functionality and applications of each toolboxb. Demonstrate MATLAB toolboxes related to Deep Learningc. Include the text toolbox generative toolbox and reinforcement learning toolboxd. Add more detail on each3. Finding Circles – no changes except editorial.4. Classifying movies – no changes except editorial.5. Tokamak disruption detection – this would be updated.6. Classifying a pirouette – no changes except editorial.7. Completing sentences - This would be revamped using the MATLAB Text Processing Toolbox.8. Terrain based navigation-The example in the original book would be changed to a regression approach that can interpolate position. We would switch to a terrestrial example applicable to drones.9. Stock prediction – this is a very popular chapter. We would improve the algorithm.10. Image classification – no changes except editorial.11. Orbit Determination – add inclination to the algorithm.12. Earth Sensors – a new example on how to use neural networks to measure roll and yaw from any Earth sensor.13. Generative deep learning example. This would be a neural network that generates pictures after learning an artist’s style.14. Reinforcement learning. This would be a simple quadcopter hovering control system. It would be simulation based although readers would be able to apply this to any programmable quadcopter.
CO-PA in SAP S/4HANA Finance
Wirksames Ergebniscontrolling ist für den Erfolg Ihres Unternehmens entscheidend. In diesem Buch lernen Sie, wie Sie die Ergebnis- und Marktsegmentrechnung in SAP S/4HANA Finance an Ihre Bedürfnisse anpassen. Anhand von Beispielen und Screenshots erfahren Sie alles zur Stammdatenpflege und Berichterstellung. Und Sie lernen, wie Sie Predictive Accounting nutzen, um vorausschauend bessere und schnellere Entscheidungen zu treffen. Auch die Migration von SAP ERP zu SAP S/4HANA Finance wird ausführlich behandelt. Aus dem Inhalt: Ergebnisrechnung mit CO-PA in SAP S/4HANA FinanceErgebnisbereich und Grundeinstellungen für die ErgebnisrechnungMerkmalkonfigurationKonfiguration von Wert- und MengenfeldernBuchhalterische ErgebnisrechnungMargenanalyseIst-Wertflüsse Einleitung ... 13 1. Einführung in die Ergebnisrechnung ... 17 1.1 ... Zweck der Ergebnisrechnung ... 17 1.2 ... Kosten- und Erlösträger ... 19 1.3 ... Arten der Ergebnisrechnung ... 20 1.4 ... Technische Struktur ... 30 1.5 ... Zusammenfassung ... 32 2. Customizing des Ergebnisbereichs und Grundeinstellungen für die Ergebnisrechnung ... 35 2.1 ... Einen Ergebnisbereich pflegen ... 35 2.2 ... Währungen ... 50 2.3 ... Nummernkreise ... 54 2.4 ... Versionen ... 59 2.5 ... Ergebnisbereich transportieren ... 61 2.6 ... Ergebnisbereich setzen ... 64 2.7 ... Erweiterungsledger für die Ergebnisrechnung anlegen ... 65 2.8 ... Zusammenfassung ... 68 3. Merkmale konfigurieren ... 69 3.1 ... Merkmale ... 69 3.2 ... Merkmalsableitungen ... 86 3.3 ... Merkmale in Belegen ableiten ... 121 3.4 ... Zusammenfassung ... 137 4. Customizing der Wert- und Mengenfelder für die kalkulatorische Ergebnisrechnung ... 139 4.1 ... Wertfelder konfigurieren ... 139 4.2 ... Mengenfelder konfigurieren ... 143 4.3 ... Wert- und Mengenfelder dem Ergebnisbereich zuordnen ... 146 4.4 ... Zusammenfassung ... 150 5. Customizing des Werteflusses für die Margenanalyse ... 151 5.1 ... Einführung ... 151 5.2 ... Predictive Accounting ... 152 5.3 ... Überleitung von Fakturen ... 160 5.4 ... Herstellkosten in der Margenanalyse ... 177 5.5 ... Split der Umsatzkosten ... 179 5.6 ... Abweichungsermittlung ... 189 5.7 ... Ableitung für Belegzeilen ohne Ergebnisobjekt ... 210 5.8 ... Abrechnung Projekte/PSP-Elemente ... 219 5.9 ... Kostenstellenumlage ... 230 5.10 ... Direktkontierung ... 245 5.11 ... Zusammenfassung ... 247 6. Customizing des Werteflusses für die kalkulatorische Ergebnisrechnung ... 249 6.1 ... Einführung ... 249 6.2 ... Kundenauftragsbestand ... 252 6.3 ... Fakturaüberleitung ... 260 6.4 ... Herstellkosten in CO-PA ... 275 6.5 ... Kalkulation nach CO-PA übernehmen ... 284 6.6 ... Abweichungsermittlung ... 297 6.7 ... Projekte/PSP-Elemente abrechnen ... 315 6.8 ... Kostenstellenumlage ... 324 6.9 ... Direktkontierung ... 338 6.10 ... Zusammenfassung ... 342 7. Planung ... 343 7.1 ... Was ändert sich für die Planung mit SAP S/4HANA Finance? ... 343 7.2 ... Planung in der Margenanalyse ... 345 7.3 ... Planung in der kalkulatorischen Ergebnisrechnung ... 354 7.4 ... Zusammenfassung ... 366 8. Reporting ... 369 8.1 ... Übersicht des Reportings in der Ergebnisrechnung ... 369 8.2 ... Reporting in der Margenanalyse ... 373 8.3 ... Reporting in der kalkulatorischen Ergebnisrechnung ... 402 8.4 ... Zusammenfassung ... 412 A. Änderungen am Datenmodell ... 413 Die Autorin ... 415 Index ... 417