Computer und IT
Windows Server für Dummies
Ganz gleich, ob Sie Einsteiger oder Umsteiger sind: Dieses Buch verschafft Ihnen einen guten Einblick in Windows Server und die Möglichkeiten, die Ihnen das komfortable und flexible Serverbetriebssystem von Microsoft gibt. Das Buch zeigt Ihnen, wie Sie das Betriebssystem installieren, aktivieren und einrichten, wie Sie Rollen und Features anlegen und verwalten, wie Sie eine Domäne erstellen und betreiben, wie Sie DNS und DHCP einrichten, wie Sie mit Hyper-V virtualisieren und vor allem wie Sie Ihre Daten sichern und die Prozesse überwachen. Willkommen in der Windows-Server-Welt! Thomas Bär ist seit Ende der neunziger Jahre in der IT tätig. Er hat weitreichende Erfahrungen bei der Einführung und Umsetzung von IT-Prozessen im Gesundheitswesen. Dieses in der Praxis gewonnene Wissen hat er seit Anfang 2000 in zahlreichen Publikationen als Fachjournalist in einer großen Zahl von Artikeln beschrieben. Er lebt und arbeitet in Günzburg.Frank-Michael Schlede arbeitet seit den achtziger Jahren in der IT und ist seit 1990 als Trainer und Fachjournalist tätig. Nach unterschiedlichen Tätigkeiten als Redakteur und Chefredakteur in verschiedenen Verlagen arbeitet er seit Ende 2009 als freier IT-Journalist für verschiedene Online- und Print-Publikationen sowie als Trainer für LinkedIn Learning. Er lebt und arbeitet in Pfaffenhofen an der Ilm.Über die Autoren 7EINFÜHRUNG17Über dieses Buch 17Was Sie nicht lesen müssen 18Törichte Annahmen über den Leser 18Wie dieses Buch aufgebaut ist 18Teil I – Die Grundlagen des Windows-Servers 19Teil II – Einrichtung und wichtige Rollen 19Teil III – Das richtige Leben: Windows Server im Einsatz 19Teil IV – Der Top-Ten- Teil 20Symbole, die in diesem Buch verwendet werden 20Wie es weitergeht 20TEIL I: WINDOWS-SERVER- RUNDLAGEN 23KAPITEL 1 WINDOWS-SERVER- GRUNDLAGEN 25Das kleine 1x1 der Server 25Hardware-Anforderungen 27Hardware Compatibility List – HCL 29Darf es ein bisschen mehr sein? Sizing des Servers 30KAPITEL 2 WER ZÄHLT DIE VERSIONEN UND EDITIONEN?33Server-Geschichte: Windows NT Server bis 2019 33Windows Server 2019: Neuerungen und Vorteile 35Editionen, Versionen und Service-Kanäle 36Andere Welten (1): Windows-Subsystem für Linux 37Andere Welten (2): Container, Docker, Kubernetes 39Windows Server 2022 – die kommende Generation 40KAPITEL 3 CLOUD UND LOKAL43Installation: Cloud oder lokal? 43Windows Server in der Azure Cloud 44Alternative Cloud-Anbieter und deren Anbindungen 46KAMP DHP 47VPN-Zugriff in die Cloud 52KAPITEL 4 FENSTER ODER KONSOLE?55Windows-Oberfläche versus Kommandozeile 55Was die Eingabeaufforderung so kann 57Kommandozeile: Arbeiten direkt »am Prompt« 59KAPITEL 5 POWERSHELL UND DER SERVER61Wichtige PowerShell-Grundlagen 62Begriffe und Besonderheiten der PowerShell 63Erste Schritte zum eigenen Skript 67Einige Informationen zu Objekten 67Wichtig für viele Zwecke: Vergleichsoperatoren 70Verzweigungen und Schleifen 73Wie Sie ein Skript »zum Laufen« bringen 78PowerShell in der Server-Verwaltung einsetzen 80Prozesse finden und überwachen 80Drucker im Griff behalten 83Das Netzwerk und dessen Geräte 86TEIL II: EINRICHTUNG UND WICHTIGE ROLLEN 93KAPITEL 6 INSTALLATION VON WINDOWS SERVER95Die Frage nach dem Boot-Medium 95Schritt für Schritt: die Installation 97Alternative: Core-Server installieren 101KAPITEL 7 ACTIVE DIRECTORY105Was ist überhaupt ein Active Directory? 106Grundbegriffe rund um das Active Directory 107Installation einer Active-Directory- Domäne 108Erste Benutzer und Computer 113Administrative Konten 118Weiteren Domänencontroller in einer Domäne installieren 121Replikation 126Betriebsmasterrollen 128Entfernung eines Domänencontrollers 130Active-Directory- Verwaltung über den Client 132Active-Directory- Papierkorb 133Active-Directory- Verwaltungscenter 134Gruppen, Benutzer, Container und OUs 136Erstellung von Gruppen 138Benutzer Gruppen zuweisen 140Benutzerkontentypen 143Standardbenutzerkonten und Gruppen 143Rechte und Privilegien 145KAPITEL 8 DNS UND DHCP147Grundlagen der Namensauflösung 147Basiseinrichtung des DNS-Server- Diensts 150DNS-Konfiguration 155DNS-Stammhinweise wiederherstellen 157Verwalten von DNS-Einträgen 158Anlage einer Reverse-Lookupzone 159Anlage eines Hosteintrags 160Primärer und sekundärer DNS-Server 161Zoneneigenschaften 165Batch-Export von DNS-Einträgen 168Microsoft-DNS- Server- Historie 170Allgemeine DNS-Sicherheit 172DNS absichern mit DNSSEC und DANE 172Konfiguration von DNSSEC 173Grundlagen von DHCP 178APIPA 179Installieren eines DHCP-Servers 180DHCP-Reservierungen 183DHCP-Optionen 186DHCP-Failover 187IPAM 190KAPITEL 9 SPEICHERDIENSTE – DATEI-SERVER195Platten und Storage 196RAID, iSCSI-Zielserver und iSCSI-Initiator 196iSCSI-Zielspeicheranbieter 201Server für NFS 203Freigaben, Datei-Server, Ressourcenmanager 207Datendeduplizierung 214DFS-Namespaces 217DFS-Replikation 219Grundlagen zu BranchCache für Datei-Server 221Grundlagen zu Arbeitsordnern 223KAPITEL 10 ERWEITERTE RESSOURCENFREIGABEN225Versteckte und administrative Freigaben 225Dateifreigaben organisieren 228Laufwerkfreigabe per Gruppenrichtlinie zuordnen 228Lassen Sie sich nicht ausschließen 230Vor Blicken schützen – ABE 231Dynamic Access Control 233Prüfung des effektiven Zugriffs 241KAPITEL 11 HYPER-V245Virtualisierung: Begriffe und Bestandteile 245Vorteile beim Einsatz von Hyper-V 246Einrichtung der Hyper-V- Rolle 247Hyper-V konfigurieren 250Manager für virtuelle Switches 254Einrichten eines virtuellen Switches 255Virtueller Switch und die PowerShell 257KAPITEL 12 VIRTUELLE COMPUTER EINSETZEN 261Anlegen einer virtuellen Maschine 261Konfiguration der virtuellen Maschine 266KAPITEL 13 WINDOWS UND LINUX ALS GASTSYSTEM277Virtuelle Computer mit der PowerShell im Griff 283Ein genauerer Blick auf die Prüfpunkte 285Erstellen eines Prüfpunkts 286Anwenden eines Prüfpunkts 288Löschen eines Prüfpunkts 290Ubuntu-Linux als Gastsystem 291KAPITEL 14 DRUCKDIENSTE297Begrifflichkeiten 299Installation von Druck-und Dokumentendiensten 301Druckerserver in der Druckerverwaltung hinzufügen 305Arbeiten mit Druckfiltern 305Drucker in der Druckerverwaltung hinzufügen 307Drucker bereitstellen 311Drucker im-und exportieren 313Druckaufträge im Spooler ansehen 314Line Printer Daemon und Line Printer Remote 315Druckertreiberisolation 316Internetdrucken 317TEIL III: WINDOWS-SERVER IM EINSATZ 321KAPITEL 15 DOMÄNEN-BEITRITT323Vorbedingungen für den Domänen-Beitritt 323Einbinden in die Domäne 327Offline einer Domäne beitreten 329GRUPPENRICHTLINIEN 333Gruppenrichtlinienobjekt verknüpfen 338Gruppenrichtlinienobjekt löschen 339Gruppenrichtlinien und Gruppen 340WMI-Filter 342WMI Query Language 344Zielgruppenadressierung 346Administrative Vorlagen 349Central Store 351Handlungsempfehlung für Gruppenrichtlinien 352Praktische Empfehlungen 354Anmeldung am Computer verweigern 354Desktophintergrundbild festlegen 357Sicherheitsrelevante Gruppenrichtlinien 359Standardbrowser per Gruppenrichtlinie 362Office-VBA per Gruppenrichtlinie ausschalten 363Softwareinstallation per Gruppenrichtlinie 365Entfernen eines Pakets und Updates 367Loopback 368Programme per GPO sperren 368Troubleshooting für Gruppenrichtlinien 370KAPITEL 17 ÜBERWACHUNG DES SERVER-BETRIEBS373Der Server-Manager 373Verwalten des lokalen Servers 377Lokalen Server konfigurieren 379Überblick über das Tools-Menü 381KAPITEL 18 DAS WINDOWS ADMIN CENTER385Was ist das Windows Admin Center (WAC)? 385Installation 387Konfiguration und erster Einsatz 390Grundsätzliche Einstellungen und Erweiterungen 394Weitere Einstellungen und Features 399KAPITEL 19 WINDOWS-SERVER- UPDATES405Einstellungen und Features für die Updates 406Update-Richtlinien verändern 414Update-Einstellungen mittels sconfig ändern 416KAPITEL 20 BACKUP419Grundlagen der Sicherung und Wiederherstellung 420Windows-Server- Sicherung 422Einrichten von Backup-Jobs 423Recovery-Medium nutzen 425Einzelne Dateien wiederherstellen 426Worum handelt es sich beim Azure-Backup- Dienst? 427KAPITEL 21 AUSFÄLLE UND DEREN VERMEIDUNG431Vermeidung von Ausfällen 432Windows aktuell halten 433Applikationen aktuell halten 434RAM-Test 435Festplattenspeicherplatz beachten 436Monitoring 437PRTG 438Nagios und Nagios XI 438Syspectr 439KAPITEL 22 FERNZUGRIFFE441Konsolenzugriffe 442Microsoft Management Console (MMC) 445Remote Desktop (RDP) 446Dritthersteller-Tools 447KAPITEL 23 TROUBLESHOOTING451Erst die Ereignisanzeige – dann der Rest! 453Eigene Dokumentationen 454Server-Manager als Hilfestellung 455IPv6 unterdrücken 456Wo finde ich Unterstützung? 458TEIL IV: DER TOP-TEN- TEIL 461KAPITEL 24 DIE 10 BESTEN SERVER-TOOLS463Veeam Backup & Replication Community Edition 463AD Replication Status Tool 463Specops Password Auditor für Active Directory 463Winscp 463Microsoft Security Compliance Toolkit 1 0 (SCT) 464WiseDateman Password Control 464WireShark 464RSAT 464SysMon 464SysInternals Suite (komplett) 464Stichwortverzeichnis 467
Samsung Galaxy M12
Die verständliche Anleitung für Ihr Smartphone:- Alle Funktionen & Einstellungen auf einen Blick- Schritt für Schritt erklärt – mit praktischen TippsMit diesem smarten Praxisbuch gelingt Ihnen der schnelle und sichere Einstieg in Ihr Smartphone. Lernen Sie das Samsung Galaxy M12 von Grund auf kennen und beherrschen! Anschauliche Anleitungen, Beispiele und Bilder zeigen Ihnen gut nachvollziehbar, wie Sie Ihr mobiles Gerät optimal handhaben – von der Ersteinrichtung und Personalisierung über die große Funktionsvielfalt bis zu den wichtigsten Anwendungen. Nutzen Sie darüber hinaus die übersichtlichen Spicker-Darstellungen: Damit können Sie jene Bedienungsschritte, die man am häufigsten braucht, aber immer wieder vergisst, auf einen Blick finden und umsetzen. Freuen Sie sich auf viele hilfreiche Tipps und legen Sie ganz einfach los!Aus dem Inhalt:- Alle Bedienelemente des Samsung Galaxy M12 auf einen Blick- Ersteinrichtung und Tipps zum Umzug- Google-Konto erstellen und verwalten- Die Benutzeroberfläche Ihres Smartphones personalisieren- Apps aus dem Play Store herunterladen- Kontakte anlegen und im Adressbuch verwalten- Anrufe tätigen und SMS austauschen - Nachrichten über Mail und WhatsApp versenden und empfangen- Uhr, Kalender, Maps und andere praktische Apps nutzen - Fotos sowie Videos aufnehmen, verwalten und teilen- Ins Internet gehen über WLAN und mobile Daten - Updates, Datenschutz und Sicherheit
Windows 11 Reparaturhandbuch
- Windows 11 aktivieren, optimieren, absichern und reparieren- Fehler im Betriebssystem finden, beiseitigen und umgehen- Sicherheit: den Computer vor Viren und Hackern schützenSeit dem Windows 11-Update läuft Ihr PC oder Laptop nicht mehr so "rund" wie bisher und es ist einfach der Wurm drin? Ihr Windows braucht ewig zum Starten und Ihr Netzwerk ist viel langsamer als gewöhnlich? Oder haben Sie Ihr Windows-Passwort vergessen? Dann ist dieses Handbuch der ideale Helfer für Sie! Der Experte Christian Immler kennt alle Kniffe, Schwachstellen und auch die verstecktesten Checkboxen von Windows 11. Übersichtlich gegliedert führt er Sie durch die Fallstricke des Betriebssystems und zeigt systematisch, wie Sie jedes Problem identifizieren und schnell wieder in den Griff bekommen. Freuen Sie sich auf 270 leicht verständliche Schritt-für-Schritt-Anleitungen sowie auf praktische Tipps und Tricks zur Selbsthilfe, mit denen Sie Windows 11 entmüllen, optimieren und reparieren. Selbst Änderungen an der Registry werden kein Hindernis mehr darstellen: Denn die wichtigsten .reg-Dateien zur Verbesserung Ihres Systems stehen zum kostenlosen Download bereit.Aus dem Inhalt:- Alle Neuerungen von Windows 11- Vertraute Komponenten aus Windows 10 wiederfinden und nachinstallieren- Windows 11 reparieren und optimieren- Gewohnte Desktop-Optik wiederherstellen - Systembremsen erkennen- Einstellungen optimieren und richtige Konfigurationen vornehmen- Probleme beim Booten beheben- Hardware und Treiber korrekt einrichten- Netzwerkfunktionen optimieren und Fallstricke umgehen- Festplattenfehler beheben und Daten retten- Sicherheitssperren und Passwörter richtig verwenden
Samsung Galaxy S21 / S21+ / S21 Ultra
Die verständliche Anleitung für Ihr Smartphone:- Alle Funktionen & Einstellungen auf einen Blick- Schritt für Schritt erklärt – mit praktischen TippsMit diesem smarten Praxisbuch gelingt Ihnen der schnelle und sichere Einstieg in Ihr Smartphone. Lernen Sie Ihr Handymodell von Grund auf kennen und beherrschen! Anschauliche Anleitungen, Beispiele und Bilder zeigen Ihnen gut nachvollziehbar, wie Sie Ihr mobiles Gerät optimal handhaben – von der Ersteinrichtung und Personalisierung über die große Funktionsvielfalt bis zu den wichtigsten Anwendungen. Nutzen Sie darüber hinaus die übersichtlichen Spicker-Darstellungen: Damit können Sie jene Bedienungsschritte, die man am häufigsten braucht, aber immer wieder vergisst, auf einen Blick finden und umsetzen. Freuen Sie sich auf viele hilfreiche Tipps und legen Sie ganz einfach los!Aus dem Inhalt:- Alle Bedienelemente des Smartphones auf einen Blick- Ersteinrichtung und Tipps zum Umzug- Google-Konto erstellen und verwalten- Die Benutzeroberfläche Ihres Smartphones personalisieren- Apps aus dem Play Store herunterladen- Kontakte anlegen und im Adressbuch verwalten- Anrufe tätigen und SMS austauschen - Nachrichten über Mail und WhatsApp versenden und empfangen- Uhr, Kalender, Maps und andere praktische Apps nutzen - Fotos sowie Videos aufnehmen, verwalten und teilen- Ins Internet gehen über WLAN und mobile Daten - Updates, Datenschutz und Sicherheit
Website Design and Development with HTML5 and CSS3
COMBINING THEORY AND PRACTICE, WEBSITE DESIGN AND DEVELOPMENT WITH HTML5 AND CSS3 IS AIMED AT BOTH BEGINNERS WHO WANT TO DESIGN THEIR FIRST WEBSITE, AND EXPERIENCED DEVELOPERS WHO WANT TO CONSOLIDATE THEIR TECHNICAL SKILLS.This book addresses the theoretical aspects of HTML5 and CSS3, including: HTML elements, semantic containers, semantic text formatting, multimedia elements, forms, tables, definition and integration of CSS styles, text formatting, and container and box styles. It also encompasses a practical section which presents the process of creating a website, as well as the key rules to apply in order to not only achieve project success, but also to meet user needs. Illustrated by numerous examples, this book includes corrected practical work, structured according to an evolutionary logic ranging from the design of a simple HTML5 page to the creation of a professional website.HASSEN BEN REBAH is Professor at the Higher Institute of Technological Studies of Mahdia, Tunisia, specializing in web programming and computer security.HAFEDH BOUKTHIR is Professor at the Higher Institute of Technological Studies of Mahdia, Tunisia, and a webmaster and web developer. He specializes in SEO and natural referencing.ANTOINE CHEDEBOIS, an engineer by training, has been developing websites for nearly twenty years. He is a specialist in HTML, CSS, JavaScript, PHP and Python, and is currently the lead developer of an international team of developers at GAFA.Foreword xiTeddy PAYETPreface xiiiCHAPTER 1 THE WEB AND ITS FUTURE 11.1 Background 11.2 Phases of evolution of the Web 31.3 Web application architecture 7CHAPTER 2 THE LANGUAGE OF THE WEB: HTML5 132.1 Overview 132.2 Structure of an HTML5 document 182.3 Structuring the content of a web page 212.4 Text organization 282.5 Creating hyperlinks 522.6 Inserting images and multimedia objects 582.7 Tables 652.8 Forms 70CHAPTER 3 STYLE SHEETS: CSS3 1013.1 Overview 1013.2 Text formatting 1213.3 List formatting 1313.4 Backgrounds, borders and shadows 1333.5 Table formatting 1443.6 Layout of the site 148CHAPTER 4 DESIGN AND CREATION OF A WEBSITE 1674.1 Process of creating a website 1674.2 Ergonomics of the website 1754.3 Different website types 181CHAPTER 5 PRACTICAL EXERCISES 1855.1 PE1: structure of an HTML5 web page 1855.2 PE2: simple forms 1955.3 PE3: table formatting 2115.4 TP 4: media (image, video and audio) 2405.5 PE: element positioning 2705.6 PE6: creating a template model 2965.7 PE7: creating a website from A to Z 313References 323Index 325
GLOBALE PROVINZ
Zu Beginn der 2020er-Jahre hat die digitale Transformation unseren Alltag und fast alle Bereiche von Wirtschaft und Verwaltung erreicht. Die Informationsgesellschaft ist eine selbstverständliche Realität geworden. Die sozio-ökonomische Bedeutung der Internet-basierten Systeme und der »Elektronengehirne« ist vergleichbar mit der Bedeutung der großen Entdeckungen der Renaissancezeit und anderen epochalen Entwicklungen wie der Weltraumfahrt, der Nutzung der Atomenergie, oder auch den Erfindungen von Eisenbahn und Automobil.Dieser Bericht vom Werden unserer Informationsgesellschaft basiert auf den Erinnerungen eines Vertreters der »Generation X«, die erlebt hat, wie in circa 40 Jahren das private, berufliche und öffentliche Leben vom Gebrauch des sogenannten »Netzes« und der Mensch-Maschine-Symbiose immer mehr – sowohl positiv als auch negativ – geprägt wurde. Georg Rainer Hofmann, einer der Aktivisten dieser Entwicklung in Deutschland, zeichnet in einem komplexen Bild die technischen, ökomischen, sozio-politischen, und auch ethisch-philosophischen Hintergründe und Herausforderungen. Ein wichtiger Beitrag zur Geschichte unserer digitalen Welt.Mit einem Geleitwort von Alexander Rabe und mit Beiträgen von: Wolfgang Alm, Bernd Becker, Christof Blum, Ralf Cordes, Peter Egloff, José Luis Encarnação, Lucia Falkenberg, Andreas Hufgard, Andreas Kindt, Richard Knapp, Günter Koch, Detlef Krömker, Guerino Mazzola, Radu Popescu-Zeletin, Olaf Reubold, Gerd Rossbach, Gerd Schürmann, Hans-Georg Stark, Harald Summa, Rainer Thome, Thomas Wolf, Ruben Zimmermann.Der Informatiker und Ökonom Prof. Dr. Georg Rainer Hofmann (geb. 1961) ist Professor und Direktor des Information Management Instituts (IMI) an der Technischen Hochschule in Aschaffenburg. Er hat viele Entwicklungen der Informationsgesellschaft selbst erleben und daran mitwirken dürfen. Seine mit dem Zeitgeist verflochtenen Erinnerungen umfassen circa 40 Jahre voller richtungsweisender Erkenntnis- und Technikfortschritte, aber auch voller Zu-, Glücks- und Problemfälle des allmählich-plötzlichen Digitalen Wandels. Er erzählt von richtungsweisenden Ereignissen und von Begegnungen mit prägenden Personen, von denen sich einige auch selbst zu Wort melden. Viele von ihnen wären sicher Nobelpreisträger geworden – gäbe es einen »Nobelpreis für Digitalwissenschaften«
PyTorch kompakt
Syntax, Design Patterns und Codebeispiele für Deep-Learning-Modelle Mit diesem benutzerfreundlichen Nachschlagewerk zu PyTorch haben Sie kompaktes Wissen zu einem der beliebtesten Frameworks für Deep Learning immer zur Hand. Der Autor Joe Papa bietet Ihnen mit dieser Referenz den sofortigen Zugriff auf Syntax, Design Patterns und gut nachvollziehbare Codebeispiele. Sie erhalten eine Fülle an gesammelten Informationen, die Ihre Entwicklungsarbeit beschleunigen und die Zeit minimieren, die Sie mit der Suche nach Details verbringen. Leseprobe (PDF-Link)Inhaltsverzeichnis (PDF-Link)Zielgruppe:Data ScientistsSoftwareentwickler*innenDatenanalyst*innenStudierende der Informatik Autor: Joe Papa verfügt über 25 Jahre Erfahrung in Forschung und Entwicklung und ist Gründer von TeachMe.AI. Seinen Abschluss „Master of Science in Electrical Engineering“ hat er an der Universität Rutgers erworben. Bei Booz Allen Hamilton und Perspecta Labs hat er KI-Forschungsteams mit PyTorch geleitet. Joe hat Hunderte von Datenwissenschaftlern als Mentor betreut und mehr als 6.000 Studenten auf der ganzen Welt auf Udemy unterrichtet.
Beginning VFX with Autodesk Maya
Dive into the nuances of visual effects (VFX) design, from planning to execution, using Autodesk Maya. This book introduces the methods and techniques required for your first foray into 3D FX generation from scratch.You will start with the fundamentals of visual effects, including a history of VFX, tools and techniques for creating believable visual effects, and popular tools used in the industry. Next, you are introduced to Autodesk Maya and its various components that make it a favorite among professionals. You will learn how to create rigid body collisions and simulate realistic particles such as dust, fire, water, and more.This book also presents strategies for creating a vortex, rain, hair, fluids, and other soft body simulations and also demonstrates nature element simulations for computer-generated production.At the end of the book, there is a capstone project to make your own visual effects scene in a practical way. After going through this book, you will be able to start building computer-generated visual effects from your imagination through to production.WHAT YOU WILL LEARN* Understand the basic physics behind effect creation* Create 3D visual effects scenes from scratch* Know the details of dynamic simulation in the computer generation space using various functionalities available in Autodesk MayaWHO THIS BOOK IS FORBeginning-level users; students from the field of visual effects design, 3D modeling, and simulation; game designers; those creating computer graphics; FX artists and aspirants looking for a career in the field of 3DDR ABHISHEK KUMAR is an Apple Certified Associate, Adobe Education Trainer, and certified by Autodesk. He received a PhD in computer applications and a master’s degree in animation and computer science. He also received a post-doctoral fellowship at Imam Mohammad Ibn Saud Islamic University, Saudi Arabia.Dr Kumar is actively involved in course development in animation and design engineering for various institutions and universities. He has published a number of research papers and covered a wide range of topics in various digital scientific areas (image analysis, visual identity, graphics, digital photography, motion graphics, 3D animation, visual effects, editing, composition). He holds 10 patents in the field of AI, design, and IoT.Dr Kumar has completed professional studies related to animation, computer graphics, virtual reality, stereoscopy, filmmaking, visual effects, and photography from Norwich University of Arts, University of Edinburg, and Wizcraft MIME & FXPHD, Australia. He is passionate about the media and entertainment industry and has directed two animation short films. Dr Kumar has trained more than 100,000 students across the globe from 153 countries (top five: India, Germany, USA, Spain, Australia). His alumni have worked for national and international movies.Dr Kumar has delivered sessions for more than 100 workshops and seminars as a subject matter expert and resource person at universities, institutes, and colleges such as Delhi University, GGU Central University, Savitribai Phule University, Anna University, Rajiv Gandhi Central University, Allahabad University, Banaras Hindu University, MANNU Hyderabad, Gujrat Technological University ,TMU, GIET University, NIT’s, IIT’s, and several international institutes and universities to make career opportunities and immersive technology opportunities for educators in awareness about the future of elearning, MOOCs, virtual reality, animation design, and the VFX industry.Chapter 1: Introduction to Visual Effects• Scope of this book• Topics to be covered• The importance of Visual Effects• The need for the creation of the visual magicChapter 2: History of VFX• The Evolution of Science in visual design• The State of Art technology in the Digital EraChapter 3: Industrial application for VFX• How to approach the planning of a VFX shot• Industry practices• Software, tools, and techniques used in the rendition of the visual splendor on ScreenChapter 4: Introduction to FX in Maya• Maya Nucleus• nParticle System• Fluids• ncloth • nHairChapter 5: Working with nParticle FX• Fun with Emitter• nParticle tool• Identical object creation with InstancerChapter 6: Creating effects with Particle Emission, Fields/Solvers• Real-life simulation with Gravity• Creation of galaxy• Tinker bell magical dust particle generationChapter 7: Maya Rigid and Soft Body Systems• Introduction to Rigid Body and Constraints• Rigid & Soft Body exampleChapter 8: Working with Maya Fluids• Introduction to fluid -working with container• Working with 2D container• Working with 3D containerChapter 9: Maya Effects• Get Effect Asset Library• Collision with effects• Creating fire, fireworks, lightening, shatter, and smoke effectsChapter 10: Playing with MAYA nucleus Cloth & nConstraint• Creating nCloth• Working with passive collider• Play with nCloth Attributes• Power of nConstraints for effective and efficient simulation.Chapter 11: Working with Hair and Fur Styling• Foundation concept of hair and fur creation• Long hair creation and simulation• Maya Hair libraryChapter 12: Technical Fluid Simulation with Bifrost• Importance of Bifrost Fluids• Working with Bifrost library• Learn to compute and execute water simulation shot EfficientlyChapter 13: FX Capstone Project• Creating a 3D Scene• Integrating the 2D and the 3D worlds• Render FX scene• Conclusion
Microsoft 365 - Das Praxisbuch für Anwender
SO GEHT »IM TEAM ARBEITEN« HEUTE: MODERN UND PRODUKTIV IN DER CLOUD * Lernen Sie Microsoft Teams sowie die anderen Online-Apps und ihre Möglichkeiten kennen * Erfahren Sie, wie Sie welche Apps für welche Aufgaben einsetzen * Entdecken Sie, wie Sie effektiv online im Team an Projekten und Dokumenten zusammenarbeiten Sie stehen vor der Aufgabe, Microsoft 365 (ehemals Office 365) in Ihrem Team für die Online-Zusammenarbeit einzuführen, oder nutzen es bereits als Anwender? Dieses Praxisbuch unterstützt Sie dabei als Anleitung, Ratgeber und Nachschlagewerk. Microsoft 365- und SharePoint-Expertin Melanie Schmidt zeigt Ihnen in diesem Buch, welche Anwendungen wie Teams, SharePoint Online und OneDrive for Business Ihnen mit Microsoft 365 im Unternehmen zur Verfügung gestellt werden, wofür Sie welche App nutzen und worin ihre Unterschiede bestehen. Sie lernen nicht nur das Microsoft 365-Portal kennen, sondern erkunden die bereitgestellten Tools und deren Einsatz anhand von einfachen Schritt-für-Schritt-Anleitungen und vielen Praxisbeispielen, sodass Sie die für Sie relevanten Anwendungen schnell auswählen und meistern können. Mit zahlreichen nützlichen Tipps und Empfehlungen steht Ihnen die Autorin beim Einsatz von Microsoft 365 im Unternehmen zur Seite, ganz gleich, ob am Windows-PC, Mac, Smartphone oder Tablet, im Büro, im Homeoffice oder von unterwegs, sodass Sie effektiv und erfolgreich am Arbeitsplatz 4.0 mit Ihrem Team, Ihrer Arbeitsgruppe, Ihrer Abteilung oder Ihrem Fachbereich zusammenarbeiten können. Aus dem Inhalt: - Microsoft 365 im Überblick - OneDrive for Business - SharePoint Online - Office Online: Word, Excel und PowerPoint - OneNote - Outlook im Web - Microsoft 365-Gruppen - Teams - Planner - Yammer - Forms, Stream und PowerApps
Scott Kelbys 7-Punkte-System für die perfekte RAW-Entwicklung in Lightroom
SO ENTWICKELN SIE IHRE BILDER EFFIZIENT UND ZIELSICHER * Kelbys 7-Schritte-System gibt Ihnen Orientierung und Sicherheit * Herunterladbare Beispielbilder erlauben Ihnen das genaue Nachvollziehen aller Entwicklungsschritte * Die Workshops behandeln viele Foto-Genres und auch komplexe Bearbeitungen Ihre Bilder zielsicher und effizient in Lightroom entwickeln – das lernen Sie mit diesem Buch. Scott Kelbys einfach zu merkendes 7-Schritte-System gibt Ihnen Orientierung und Sicherheit, damit Sie in Zukunft bei der Bearbeitung Ihrer Bilder optimale Ergebnisse erhalten. In 21 Workshops wenden Sie Scott Kelbys 7-Schritte-System in ganz unterschiedlichen Genres an – von Reise- und Landschaft- über Porträt- bis zu Hochzeits- und Nachthimmelfotorafie. Dabei lernen Sie die Funktionen von Lightrooms Entwicklungsmodul nacheinander kennen und setzen sie auch für fortgeschrittene Bearbeitungen wie Schwarzweiß-Konvertierung oder Color-Grading ein. Jeder Workshop zeigt genau, wie Sie die 7 Schritte durchlaufen und vom Ausgangsbild zum Ergebnis gelangen. Die Bildbeispiele aus jedem Workshop können Sie herunterladen, alle Bearbeitungsschritte selbst nachvollziehen und so das Gelernte üben und festigen. Alle Workshops bauen aufeinander auf, so dass Sie am Ende des Buches auch komplexe Bearbeitung vornehmen können – sogar in Photoshop.
Financial Modeling in Excel For Dummies
TURN YOUR FINANCIAL DATA INTO INSIGHTFUL DECISIONS WITH THIS STRAIGHTFORWARD GUIDE TO FINANCIAL MODELING WITH EXCELInterested in learning how to build practical financial models and forecasts but concerned that you don’t have the math skills or technical know-how? We’ve got you covered! Financial decision-making has never been easier than with Financial Modeling in Excel For Dummies. Whether you work at a mom-and-pop retail store or a multinational corporation, you can learn how to build budgets, project your profits into the future, model capital depreciation, value your assets, and more.You’ll learn by doing as this book walks you through practical, hands-on exercises to help you build powerful models using just a regular version of Excel, which you’ve probably already got on your PC. You’ll also:* Master the tools and strategies that help you draw insights from numbers and data you’ve already got * Build a successful financial model from scratch, or work with and modify an existing one to your liking * Create new and unexpected business strategies with the ideas and conclusions you generate with scenario analysis Don’t go buying specialized software or hiring that expensive consultant when you don’t need either one. If you’ve got this book and a working version of Microsoft Excel, you’ve got all the tools you need to build sophisticated and useful financial models in no time!DANIELLE STEIN FAIRHURSTis a Sydney-based financial modeling consultant who helps her clients create meaningful financial models for business analysis. She is regularly engaged around Australia and globally as a speaker and course facilitator. She received the Microsoft MVP Award in 2021 in recognition of her technical expertise and contributions to the community.INTRODUCTION 1About This Book 1Foolish Assumptions 2Icons Used in This Book 2Beyond the Book 3Where to Go from Here 3PART 1: GETTING STARTED WITH FINANCIAL MODELING 5CHAPTER 1: INTRODUCING FINANCIAL MODELING 7Defining Financial Modeling 7What it is 8Who uses it 9Why it matters 10Looking at Examples of Financial Models 10Project finance models 11Pricing models 12Integrated financial statement models 12Valuation models 12Reporting models 13CHAPTER 2: GETTING ACQUAINTED WITH EXCEL 15Making Sense of the Different Versions of Excel 15A rundown of recent Excel versions 16Focusing on file formats 23Defining Modern Excel 23Recognizing the Dangers of Using Excel 25Capacity 26Lack of discipline 27Errors 28Looking at Alternatives and Supplements to Excel 31CHAPTER 3: PLANNING AND DESIGNING YOUR FINANCIAL MODEL 35Identifying the Problem That Your Financial Model Needs to Solve 35Designing How the Problem’s Answer Will Look 39Gathering Data to Put in Your Model 45Documenting the Limitations of Your Model 46Considering the Layout and Design of Your Model 47Structuring your model: What goes where 49Defining inputs, calculations, and output blocks 50Determining your audience 51CHAPTER 4: BUILDING A FINANCIAL MODEL BY THE RULEBOOK 53Document Your Assumptions 53Create Dynamic Formulas Using Links 59Only Enter Data Once 61Model with Consistent Formulas 62Build in Error Checks 64Allowing tolerance for error 66Applying conditional formatting to an error check 67Format and Label for Clarity 68CHAPTER 5: USING SOMEONE ELSE’S FINANCIAL MODEL 71Considering Templates for Building a Financial Model 72Why templates can be appealing 72What’s wrong with using templates 72Why you should build your own model 74Inheriting a File: What to Check For 75Meeting a model for the first time 76Inspecting the workbook 77Using Audit Tools to Find and Correct Errors 84Checking a model for accuracy 85Making sense of the formulas 88Sharing and Version Control 95PART 2: DIVING DEEP INTO EXCEL 97CHAPTER 6: EXCEL TOOLS AND TECHNIQUES FOR FINANCIAL MODELING 99Referencing Cells 100Relative cell referencing 101Absolute cell referencing 103Mixed cell referencing 106Naming Ranges 109Understanding why you may want to use a named range 109Creating a named range 110Finding and using named ranges 111Editing or deleting a named range 113Dynamic Ranges 113Linking in Excel 114Internal links 115External links 117Using Shortcuts 120Restricting and Validating Data 123Restricting user data entry 124Creating drop-down boxes with data validations 125Protecting and locking cells 126Goal Seeking 127Limiting project costs with a goal seek 128Calculating a break-even point with a goal seek 129CHAPTER 7: USING FUNCTIONS IN EXCEL 131Identifying the Difference between a Formula and a Function 131Finding the Function You Need 132Getting Familiar with the Most Important Functions 133SUM 134MAX and MIN 135AVERAGE 139COUNT and COUNTA 140ROUND, ROUNDUP, and ROUNDDOWN 146IF 153COUNTIF and SUMIF 156Reporting sales with SUMIF 158VLOOKUP, HLOOKUP, and XLOOKUP 161Being Aware of Advanced Functions and Functionality 170CHAPTER 8: APPLYING SCENARIOS TO YOUR FINANCIAL MODEL 173Identifying the Differences among Types of Analysis 174Building Drop-Down Scenarios 175Using data validations to model profitability scenarios 175Applying formulas to scenarios 178Applying Sensitivity Analysis with Data Tables 181Setting up the calculation 181Building a data table with one input 182Building a data table with two inputs 184Applying probability weightings to your data table 186Using Scenario Manager to Model Loan Calculations 189Setting up the model 189Applying Scenario Manager 191CHAPTER 9: CHARTING AND PRESENTING MODEL OUTPUT 195Deciding Which Data to Display 196Conveying Your Message by Charting Scenarios 198Deciding Which Type of Chart to Use 200Line charts 201Bar charts 206Combo charts 209Pie charts 211Charts in newer versions of Excel 214Dynamic Charting 219Building the chart on formula-driven data 219Linking the chart titles to formulas 220Creating dynamic text 221Preparing a Presentation 225PART 3: BUILDING YOUR FINANCIAL MODEL 227CHAPTER 10: BUILDING AN INTEGRATED FINANCIAL STATEMENTS MODEL 229Getting to Know the Case Study 230Entering Assumptions 231Revenue assumptions 232Expense assumptions 233Other assumptions 234Calculating Revenue 234Projecting sales volume 235Projecting dollar sales 237Calculating Expenses 238Staff costs 238Other costs 239Depreciation and amortization 240Building the Income Statement 243Building the Cash Flow Statement 248Building the Balance Sheet 252Building Scenarios 258Entering your scenario assumptions 258Building a drop-down box 259Building the scenario functionality 260CHAPTER 11: BUILDING A DISCOUNTED CASH FLOW VALUATION 263Understanding How the Discounted Cash Flow Valuation Works 264Step 1: Calculating Free Cash Flow to Firm 265Step 2: Calculating Weighted Average Cost of Capital 268Step 3: Finding the Terminal Value 269Discounting Cash Flows and Valuation 270CHAPTER 12: BUDGETING FOR CAPITAL EXPENDITURE AND DEPRECIATION 273Getting Started 274Making a reusable budget model template 274Creating dynamic titles 277Output 1: Calculating Cash Required for Budgeted Asset Purchases 277Output 2: Calculating Budgeted Depreciation 282Useful life 283Written-down date 284The depreciation schedule for the current year 285Depreciation in prior periods 287Output 3: Calculating the Written-Down Value of Assets for the Balance Sheet 288PART 4: THE PART OF TENS 291CHAPTER 13: TEN STRATEGIES FOR REDUCING ERROR 293Using the Enter Key 293Checking Your Work 294Checking It Again 295Getting Someone Else to Check Your Work 296Documenting Assumptions 297Documenting Methodology with a Flowchart 297Stress-Testing with Sensitivity Analysis 298Conducting a Scenario Analysis 299Taking Note of Excel Error Values 300Including Error Checks 302CHAPTER 14: TEN COMMON PITFALLS TO AVOID 303The Numbers Don’t Add Up 303You’re Getting #REF! Errors 304You Have Circular References 304The Model Has Too Much Detail 307The File Size Is Out of Control 307Your Model Is Full of “Spaghetti” Links 309The Formulas Are Unnecessarily Long and Complicated 311No One Is Paying Attention to the Model 312You Don’t Want to Let Go 313Someone Messes Up Your Model 313Index 315
Microsoft 365 - Das Praxisbuch für Anwender (2. Auflg.)
Die Zusammenarbeit mit Teams, SharePoint Online, OneDrive for Business, Outlook und Co. Sie stehen vor der Aufgabe, Microsoft 365 in Ihrem Team für die Online-Zusammenarbeit einzuführen, oder nutzen es bereits als Anwender? Dieses Praxisbuch unterstützt Sie dabei als Anleitung, Ratgeber und Nachschlagewerk. Microsoft 365- und SharePoint-Expertin Melanie Schmidt zeigt Ihnen in diesem Buch, welche Anwendungen wie Teams, SharePoint Online und OneDrive for Business Ihnen mit Microsoft 365 im Unternehmen zur Verfügung gestellt werden, wofür Sie welche App nutzen und worin ihre Unterschiede bestehen. Sie lernen nicht nur das Microsoft 365-Portal kennen, sondern erkunden die bereitgestellten Tools und deren Einsatz anhand von einfachen Schritt-für-Schritt-Anleitungen und vielen Praxisbeispielen, sodass Sie die für Sie relevanten Anwendungen schnell auswählen und meistern können. Mit zahlreichen nützlichen Tipps und Empfehlungen steht Ihnen die Autorin beim Einsatz von Microsoft 365 im Unternehmen zur Seite, ganz gleich, ob am Windows-PC, Mac, Smartphone oder Tablet, im Büro, im Homeoffice oder von unterwegs, sodass Sie effektiv und erfolgreich am Arbeitsplatz 4.0 mit Ihrem Team, Ihrer Arbeitsgruppe, Ihrer Abteilung oder Ihrem Fachbereich zusammenarbeiten können. Zielgruppe: Anwender*innenBerater*innenTrainer*innenAutorin: Melanie Schmidt ist seit 1991 in der IT-Branche tätig. Sie arbeitet freiberuflich als Business Consultant für Microsoft 365 und SharePoint für zahlreiche IT-Dienstleister und Kunden. Außerdem verfasst sie anwenderspezifische Fachbücher und Videotrainings für Microsoft-Produkte, in denen sie ihr Praxiswissen an alle Anwendergruppen weitergibt.
Java 17 for Absolute Beginners
Write your first code in Java 17 using simple, step-by-step examples that model real-word objects and events, making learning easy. With Java 17 for Absolute Beginners you’ll be able to pick up the concepts without fuss. It teaches Java development in language anyone can understand, giving you the best possible start.You’ll see clear code descriptions and layout so that you can get your code running as soon as possible. Author Iuliana Cosmina focuses on practical knowledge and getting you up to speed quickly—all the bits and pieces a novice needs to get started programming in Java.First, you’ll discover what type of language Java is, what it is good for, and how it is executed. With the theory out of the way, you’ll install Java, choose an editor such as IntelliJ IDEA, and write your first simple Java program. Along the way you’ll compile and execute this program so it can run on any platform that supports Java. As part of this tutorial you’ll see how to write high-quality code by following conventions and respecting well-known programming principles, making your projects more professional and efficient.Java 17 for Absolute Beginners gives you all you need to start your Java programming journey. No experience necessary. After reading this book, you'll come away with the basics to get started writing programs in Java.WHAT YOU WILL LEARN* Get started with Java 17 from scratchUse data types, operators, and the stream API * Install and use the IntelliJ IDEA and the Gradle build tool* Exchange data using the new JSON APIs * Play with images using multi-resolution APIs* Implement the publish-subscribe architectureWHO THIS BOOK IS FORThose who are new to programming and who want to start with Java.IULIANA COSMINA is currently a software engineer for NCR Edinburgh. She has been writing Java code since 2002 and contributed to various types of applications such as experimental search engines, ERPs, track and trace, and banking. During her career, she has been a teacher, a team leader, software architect, DevOps professional, and software manager. She is a Spring-certified Professional, as defined by Pivotal, the makers of Spring Framework, Boot, and other tools, and considers Spring the best Java framework to work with. When she is not programming, she spends her time reading, blogging, learning to play piano, travelling, hiking, or biking.Chapter 1: An Introduction to Java- When every version was released, how were they called and what were the particularities- What is Java, how it is executed, what type of language it is and what is it good for-Chapter 2: Preparing your development environment- Installing Java, choosing an editor, choosing a build tool-Chapter 3: Getting your feet wet- Writing a simple program, compile and execute- Adding a dependency of somebody else’s code through dependencies of existing libraries- Mention best tools for java and most used frameworks like SpringChapter 4: Java syntax- what is a package, module- class- enums- interface ( private methods & default methods)- class, constructor, methods… etc- removal of _Chapter 5: Data Types- primitive, object types (emphasis on String, Collections, Calendar API)- String – compact Strings- Collections: Immutable collections, factory methods for Collections(JEP 269)- mention Generics- optional – enhancements- threads, futures – CompletableFuture (JEP 266)Chapter 6: Operators- unary, binary, ternary, logic, and the diamond operator (used in conjunction with anonymous inner classes)Chapter 7: Controlling the flow- if, loops- try catch (try with resources with managed variables)- recursionChapter 8: The Stream API- streams , optional to Stream, enhancementsChapter 9: Debugging , testing and documenting- what is a break point- loggers : unified JVM logging (JEP 264)- mocks and stubs- jmc, jps, jcmd – JDK utilities- The new Doclet API- the JShell Command Line Tool- accessing the process API- @Deprecated enhancements (JEP 277)Chapter 10: Making your application interactive- request data with System.in- Swing- Web applications (use the new HTTP client)- JavaFX UI (JEP 253)- Internationalization (JEP 267)Chapter 11: Writing files- storing data to files, reading it from them- serialization to Binary, XML, JSON, YML (JEP290)- playing with images – multi-resolution APIChapter 12: Publish-Subscribe Framework- reactive streamsChapter 13: Garbage Collection- JEP 214,248,271,291
Excel Workbook For Dummies
GET PRACTICAL WALKTHROUGHS FOR THE MOST USEFUL EXCEL FEATURESLooking for easy-to-understand, practical guidance on how to go from Excel newbie to number crunching pro? Excel Workbook For Dummies is the hands-on tutorial you've been waiting for.This step-by-step guide is packed with exercises that walk you through the basic and advanced functions and formulas included in Excel. At your own speed, you'll learn how to enter data, format your spreadsheet, and apply the mathematical and statistical capabilities of the program.Work through the book from start to finish or, if you'd prefer, jump right to the section that's giving you trouble, whether that's data visualization, macros, analysis, or anything else. You can also:* Brush up on and practice time-saving keyboard shortcuts for popular commands and actions* Get a handle on multi-functional and practical pivot tables with intuitive practice exercises* Learn to secure your data with spreadsheet password protectionsPerfect for new users of Excel, Excel Workbook For Dummies is also the ideal resource for those who know their way around a spreadsheet but need a refresher on some of the more advanced features of this powerful program.PAUL MCFEDRIES has published over 100 books, with topics ranging from Windows 10 to Microsoft Office, Apple gadgets, and Amazon Alexa. He is the author of the recently released Excel Data Analysis For Dummies and Google’s G Suite For Dummies.GREG HARVEY, PHD was author of over 30 For Dummies titles covering Excel. Introduction 1PART 1: BUILDING WORKSHEETS 5Chapter 1: Getting Familiar with the Excel Interface 7Chapter 2: Entering the Worksheet Data 21Chapter 3: Formatting the Worksheet 37Chapter 4: Printing Worksheet Reports 59Chapter 5: Modifying the Worksheet 79PART 2: USING FORMULAS AND FUNCTIONS 101Chapter 6: Building Formulas 103Chapter 7: Copying and Correcting Formulas 123Chapter 8: Creating Date and Time Formulas 145Chapter 9: Financial Formulas and Functions 155Chapter 10: Using Math Functions 167Chapter 11: Using Common Statistical Functions 179Chapter 12: Using Lookup Functions 187Chapter 13: Using Logical Functions 197Chapter 14: Text Formulas and Functions 209PART 3: WORKING WITH GRAPHICS 217Chapter 15: Charting Worksheet Data 219Chapter 16: Adding Graphics to Worksheets 231PART 4: MANAGING AND SECURING DATA 249Chapter 17: Building and Maintaining Tables 251Chapter 18: Protecting Workbooks and Worksheet Data 271PART 5: DOING DATA ANALYSIS 283Chapter 19: Performing What-If Analysis 285Chapter 20: Generating PivotTables 299PART 6: MACROS AND VISUAL BASIC FOR APPLICATIONS 315Chapter 21: Using Macros 317Chapter 22: Using the Visual Basic Editor 327PART 7: THE PART OF TENS 341Chapter 23: Top Ten Features in Excel 343Chapter 24: Top Ten Tips for Using Excel Like a Pro 347Index 355
Nature-Inspired Optimization Algorithms with Java
Gain insight into the world of nature-inspired optimization techniques and algorithms. This book will prepare you to apply different nature-inspired optimization techniques to solve problems using Java.You'll start with an introduction to the hidden algorithms that nature uses and find the approximate solutions to optimization problems. You'll then see how living creatures such as fish and birds are able to perform computation to solve specific optimization tasks. This book also covers various nature-inspired algorithms by reviewing code examples for each one followed by crisp and clear explanations of the algorithm using Java code. You'll examine the use of each algorithm in specific industry scenarios such as fleet scheduling in supply chain management, and shop floor management in industrial and manufacturing applications.Nature-Inspired Optimization Algorithms with Java is your pathway to understanding a variety of optimization problems that exist in various industries and domains and it will develop an ability to apply nature-inspired algorithms to find approximate solutions to them.WHAT YOU'LL LEARN* Study optimization and its problems* Examine nature-inspired algorithms such as Particle Swarm, Gray wolf, etc.* See how nature-inspired algorithms are being used to solve optimization problems* Use Java for solving the different nature-inspired algorithms with real-world examplesWHO THIS BOOK IS FORSoftware developers/architects who are looking to hone their skills in area of problem solving related to optimization with Java.Shashank Jain has been working in the IT industry for about 20 years, mainly in areas of cloud computing and distributed systems. He has a keen interest in virtualization techniques, security, and complex systems. Shashank has 32 software patents (many yet to be published) in the area of cloud computing, IoT, and machine learning. He is a speaker at multiple reputed cloud conferences. Shashank holds Sun, Microsoft, and Linux kernel certifications. He is also the author of the book "Linux Containers and Virtualization" published by Apress.1. Intro to Optimization Problems2. Nature Inspired Optimization Methods3. Birdsa. Particle swarm Optimizationb. Cuckoo search algorithmc. Pigeon inspired optimization4. Mammalsa. Grey wolf optimizerb. Lion Pride optimizerc. Cat swarm optimizationd. Bat algorithme. Monkey algorithm5. Insectsa. Ant colony optimizationb. Artificial Bee colonyc. Grasshopper optimizationd. Pigeon inspired algorithme. Social spider optimizationf. Mosquito host seeking optimization6. Sea Creaturesa. Whale optimization algorithmb. Artificial fish swarm algorithmc. Fish school search7. Simple Organismsa. Bacteria foraging optimizationb. Slime mould optimization
Introducing Qt 6
Get started quickly with Qt, the popular open source C++ framework for building C++-based applications and games. This book will have you building both fully functional desktop and mobile applications in no time, including some simple game applications.Introducing Qt 6 begins by guiding you in setting up your tools and environment, and then walks you through the first "baby steps" of Qt framework. Next, you'll learn the basics of how project and app structure are set up using Qt. Then, you’ll begin your first real hands-on projects using Qt, including a task and problem management application and two games.As you progress, you can enhance these apps and games using additional Qt components and features. The book then delves into advanced topics in Qt, learning above and beyond what the Qt docs can offer, including local storage, C++ integration, deployment to Windows and Android, custom components and how to work with them.Upon completing this book, you'll come away knowing how to build a C++ application from design to deployment, top to bottom. And, you'll have actual application and game examples that you can apply to your own work or hobby.WHAT YOU WILL LEARN* Learn to build your first applications and games using Qt 6 framework* Design, create, build and deploy your first Qt applications or games as finished products* Explore local storage integration in theory and practice* Cover deployment on Windows and on Android* Integrate with C++ language to leverage additional functionality* Dive into Custom Components and how to work with them* Explore different project structures and moreWHO THIS BOOK IS FORSoftware programmers, developers who are new to C++ or the Qt framework. Some prior programming experience though may be helpful.Ben Cöppicus is a software developer, trainer, and author specializing in native C++ development as well as some web development. He builds mostly web, mobile and desktop applications. It is his hope that his work and writing can help you learn new things, experience the wonderful world of programming and maybe make you a better programmer, developer as well. Part 11. IntroductionPart 2 - Content2. Setting up the Tools3. First Baby Steps with Qt4. Explaining the Basics of Project and App Structure5. First Real Projects6. Taskmaster7. Hang-Man Game8. Rock, Paper, Scissors GamePart 3 - Components, Features and Things9. Components10. Features11. Writing Diagrams in Qt12. Advanced Topics in Qt
Software-Architekturen dokumentieren und kommunizieren
Dokumentation wird oft als lästige Pflicht angesehen und in vielen Softwareprojekten stark vernachlässigt, die Architektur wird manchmal überhaupt nicht beschrieben. Damit das in Ihren Projekten nicht passiert, schlägt dieses Buch praxiserprobte und schlankere Bestandteile für eine wirkungsvolle Architekturdokumentation vor.Anhand eines durchgängigen Beispiels erfahren Sie, wie Sie architekturrelevante Einflussfaktoren erfassen und Ihre Softwarelösung angemessen und ohne Ballast festhalten. Sie lernen nicht nur die Vorgehensweise für das Dokumentieren während des Entwickelns kennen, sondern auch, wie Sie bestehende Systeme im Nachhinein beschreiben. Neben der Methodik diskutiert das Buch auch typische Formate und Werkzeuge wie Wikis, UML-Werkzeuge unter anderem, mit denen Sie Architekturdokumentation erfassen, verwalten und verbreiten kann.Checklisten und Übungsaufgaben geben Ihnen die nötige Sicherheit, um die Architekturdokumentation zu einem integralen Bestandteil Ihres Softwarevorhabens zu machen. Autor:Stefan Zörner arbeitet als Softwarearchitekt und Berater bei embarc in Hamburg. Er wirkt bei Entwurfs- und Umsetzungsfragen mit, unterstützt beim Festhalten von Architektur und beleuchteten Lösungsansätzen in Bewertungen. Sein Wissen und seine Erfahrung teilt er regelmäßig in Vorträgen, Artikeln und Workshops.
Practical C++ Design
Go from competent C++ developer to skilled designer or architect using this book as your personal C++ design master class. Updated for the C++20 standard, this title will guide you through the design and implementation of an engaging case study that forms the backdrop for learning the art of applying design patterns and modern C++ techniques to create a high quality, robust application.Starting with a quick exploration of the requirements for building the application, you'll delve into selecting an appropriate architecture, eventually designing and implementing all of the necessary modules to meet the project’s requirements. By the conclusion of Practical C++ Design, you'll have constructed a fully functioning calculator capable of building and executing on any platform that supports both Qt and C++20. Access to the complete source code will help speed your learning.Utilize the Model-View-Controller pattern as the basis for the architecture of the calculator; the observer pattern to design an event system; the singleton pattern as you design the calculator’s central data repository, a reusable stack; the command pattern to design a command system supporting unlimited undo/redo; the abstract factory pattern to build a cross-platform plugin infrastructure for extensibility; coroutines to implement a command line interface with a lazy tokenizer; and more.After reading and using this book, you’ll have begun the transition from C++ programmer to architect.WHAT YOU WILL LEARN* Read a specification document and translate it into a practical C++ design using some of the latest language features from C++20* Understand trade-offs in selecting between alternative design scenarios* Gain practical experience in applying design patterns to realistic development scenarios* Learn how to effectively use language elements of modern C++ to create a lasting design* Develop a complete C++ program from a blank canvas through to a fully functioning, cross platform application* Read, modify, and extend existing, high quality code* Learn the fundamentals of API design, including class, module, and plugin interfacesWHO THIS BOOK IS FORThe experienced C++ developer ready to take the next step to becoming a skilled C++ designer.ADAM B. SINGER graduated first in his class at the Georgia Institute of Technology in 1999 with a bachelors degree in chemical engineering. He subsequently attended the Massachusetts Institute of Technology on a National Defense, Science, and Engineering Graduate Fellowship. He graduated from MIT with a Ph.D. in chemical engineering in 2004 after defending his thesis titled Global Dynamic Optimization. Since graduation, Adam has been a member of the research and engineering staff at an oil and gas major, where he has worked in software development, design, and project management in areas such as optimization, reservoir simulation, decision support under uncertainty, basin modeling, well log modeling, and stratigraphy. He has also served on and chaired committees designing in-house training in the areas of technical software development and computational and applied mathematics. He currently holds a research supervisory position. Adam additionally held the title of adjunct assistant professor in the Department of Computational and Applied Mathematics at Rice University from 2007-2012. In both 2006 and 2007, he taught a graduate level course, CAAM 520, on computational science. The course focused on the design and implementation of high performance parallel programs.Preface (5 pages)The preface details my motivation for writing the book, the target audience for the book, thegeneral structure of the book, and how to contact the author. Of particular importance is therationale behind choosing the case study, the target language (C++), and the GUI toolkit (Qt).Chapter 1: Defining the Case Study (6 pages)The first chapter describes, in detail, the case study to be examine in the book. The chapterdiscusses requirements in the abstract and then transitions to the calculator’s specific requirements.This sets the stage for the remainder of the book, which describes, in detail, the design andimplementation of the calculator, pdCalc, proposed in Chapter 1.1. A Brief Introduction2. A Few Words About Requirements3. Reverse Polish Notation (RPN)4. The Calculator’s Requirements5. The Source Code1The advice, information, and conclusions discussed in this book are those of the author and have not beenendorsed by, or reflect the opinions or practices of, ExxonMobil Corporation or its affiliates.5Chapter 2: Decomposition (18 pages)In this chapter, I explain the elements of a good decomposition and strategies for decomposing aproblem into manageable pieces. Subsequently, an architecture for pdCalc is selected, the calculatoris modularized, and use cases are used to develop interfaces for the high level calculator modules.The four high level modules are the stack, the command dispatcher, the user interface (subdividedinto a command line interface and a graphic user interface), and a plugin manager.1. The Elements of a Good Decomposition2. Selecting An Architecture3. Interfaces4. Assessment of Our Current Design5. Next StepsChapter 3: The Stack (20 pages)The stack is the first module discussed in detail. The stack is the fundamental data repositoryof the calculator. As part of the calculator’s design and implementation, the singleton pattern isexplored. The stack also affords the first opportunity to discuss an event system for the calculator,which provides a backdrop for exploration of the observer pattern, including the design andimplementation of reusable publisher and observer abstract classes.1. Decomposition of the Stack Module2. The Stack Class3. Adding Events4. A Quick Note on TestingChapter 4: The Command Dispatcher (32 pages)This chapter describes the design and implementation of the command dispatcher, the module ofthe calculator responsible for the creation, storage, and execution of commands. Of particular notein this chapter is the exposition on the command pattern and how it can be used to implement apractical undo/redo framework. In addition to exploring a traditional deep hierarchy method forimplementing commands, a C++11 alternative using lambda expressions and the standard functiontemplate are presented as a modern alternative design.1. The Decomposition of the Command Dispatcher2. The Command Class3. The Command Repository4. The Command Manager5. The Command Dispatcher6. Revisiting Earlier Decisions6Chapter 5: The Command Line Interface (14 pages)This chapter marks an important milestone, the creation of the first user executable program.In addition to building a simple command line interface, we’ll explore how to create an abstractsoftware interface suitable for both a command line interface and a graphical user interface. Withinthe context of the command line interface, we’ll learn techniques for simple parsing and tokenizingof input text streams.1. The User Interface Abstraction2. The Concrete CLI Class3. Tying It Together: A Working ProgramChapter 6: The Graphical User Interface (24 pages)In this chapter, we build the Qt-based graphical user interface for the calculator. Here, we’llexamine different strategies for building GUIs, abstraction of GUI elements, and modularization ofthe overall GUI design. Included in the discussion is design for the separation of on-screen widgetsfrom look-and-feel.1. Requirements2. Building GUIs3. Modularization4. A Working Program5. A Microsoft Windows Build NoteChapter 7: Plugins (38 pages)In this chapter, I describe how to build a cross-platform plugin system. This system includes theabstract interface for C++ plugins as well as the operating system specific mechanics involved withloading plugins and executing plugin functions. In the concrete case of the plugin loader, I explainthe many build tricks that can be used to handle cross-platform code and demonstrate how theabstract factory pattern provides an elegant design solution to this problem.1. What Is a Plugin?2. Problem 1: The Plugin Interface3. Problem 2: Loading Plugins4. Problem 3: Retrofitting pdCalc5. Incorporating Plugins6. A Concrete Plugin7. Next Steps7Chapter 8: New Requirements (24 pages)Any developer who has ever worked on a production software project quickly learns that newrequirements are always added late in the development cycle. In this chapter, we explore theaddition of new user requests after the original requirements have already been satisfied. Thediscussion progresses from fully implemented solutions to design only solutions to vague ideas forthe reader to explore on her own.1. Fully Designed New Features2. Designs Toward a More Useful Calculator3. Some Interesting Extensions for Self-ExplorationAppendix A: Acquiring, Building, and Executing pdCalc (4 pages)This appendix explains how to download the source code from GitHub and how to build the casestudy on Linux and Windows. Once the program is built, readers will want to execute the codeand its included test suite; execution instructions are therefore provided.1. Getting The Source Code2. Dependencies3. Building pdCalc4. Executing pdCalcAppendix B: Organization of the Source Code (6 pages)This appendix simply explains the organization of the source tree for pdCalc. This appendix isuseful for finding the locations for the source files referenced in the text.1. The src Directory2. The test DirectoryReferences (2 pages)This section lists twenty-nine references cited in the book.Index (3 pages)This section is a complete index for the book.
Hands-On Guide to AgileOps
Discover the best practices for transforming cloud and infrastructure operations by using Agile, Scrum, Kanban, Scrumban and Spotify models. This book will help you gain an in-depth understanding of these processes so that you can apply them to your own work.The book begins by offering an overview of current processes and methods used in IT Operations using ITIL and IT4IT. The Authors provide a background of the Agile, Scrum, Kanban, SaFe, Scrumban, and Spotify models used in software development. You’ll then gain in-depth guidance and best practices to implement Agile in the Operations world. You’ll see how Agile, Site Reliability Engineering and DevOps work in tandem to provide the foundation for modern day infrastructure and cloud operations. The book also offers a comparison of various agile processes and their suitability to the infrastructure and cloud operations world.After completing this is hands-on guide, you’ll know how to adopt Agile, DevOps and SRE and select the most suitable processes for your organization to achieve higher reliability, agility and lower costs while running cloud and infrastructure operations.WHAT YOU WILL LEARN* Understand how cloud computing and microservices architecture are changing operations dynamics* Understand ITIL, IT4IT, and Lean* Learn how Site Reliability Engineering, Agile and DevOps work in tandem* Leverage Agile, Scrum, Kanban, Scrumban, and Spotify models to run cloud operations* Use Site Reliability techniques along with Agile and DevOps* Study the different agile frameworks (Spotify, SAFe, LeSS, DAD, Nexus), their purpose, benefits and implementation approaches.* Learn a step-by-step process to identify and implement these frameworks in your organizationWHO THIS BOOK IS FORInfrastructure architects, DevOps architects, Agile practitioners, DevSecOps Experts, Product Managers/Scrum Masters, DevOps Engineers.NAVIN SABHAWAL, currently is the Chief Architect and Head of Strategy for Autonomics, named ‘DRYiCE’ at HCL Technologies. He is responsible for innovation, presales, and delivery of award-winning autonomics platforms for HCL Technologies.He is an innovator, thought leader, author and a consultant in areas of AI and Machine Learning, Cloud Computing, Big Data Analytics, Software Product Development, Engineering and R&D. He is responsible for IP Development & Service Delivery in the Areas of AI and Machine Learning, Automation products, Cloud Computing, Public Cloud AWS, Microsoft Azure, VMWare Private Cloud, Microsoft Private Cloud, Data Center Automation, Analytics for IT Operations, IT Service Management.RAMINDER RATHORE , an enthusiastic IT Practitioner with close to about two decades of work experience ranging from research and development to product management, to enabling organizations towards digitalization through agile ways of working. She currently leads the DevOps Centre of Excellence (CoE) at HCL Technologies, Canada.She holds a Master’s degree in Computer Science and is certified in a couple of areas on IBM Rational tools, Microsoft Azure, Scrum and ITIL methodologies. She started her career as a developer and progressed into product lifecycle management and consulting. She has been driving enterprise transformative programs on Automation (CI/CD), Cloud and DevOps for multiple customers. She has strong expertise in analyzing ecosystems, designing transformation roadmaps with milestones, building, and implementing accelerators / tools that drive end to end product traceability with agility and resiliency.UDITA AGRAWAL , an agile and automation transformation expert with over seventeen years of work experience, working with HCL Technologies. She holds a Master's degree in Business Administration in Information Technology and is also a PMP certified professional. She has wide experience in managing and leading engagements across different domains that includes Java, Data science and Automation. She is a passionate consultant running digital transformation programs for various customers. She also delivers enablement sessions on Agile and DevOps and works closely with product teams to practice agile methods. She also runs workshops on planning and implementing automated pipelines using various tools that includes COTS and open-source tools.Chapter 1: IntroductionCHAPTER GOAL: UNDERSTANDING THE AGILE JOURNEY AND THE NEED TO BRIDGE DEVELOPMENT AND OPERATIONS AREANO OF PAGES 17SUB -TOPICS1. Agile History2. Evolving software teams3. Bridging the gap4. Complementing Agile5. Agile in InfraOps6. Agile ManifestoChapter 2: Traditional Infrastructure OperationsCHAPTER GOAL: QUICK BRIEF ON TRADITIONAL ITSM APPROACH AND THE NEED TO TRANSITION TO AGILE OPERATIONS.No of pages: 20SUB - TOPICS1. ITSM and its phase2. Drawbacks3. Need to changeChapter 3: Agile and DevOpsCHAPTER GOAL: INTRODUCE CORE CONCEPTS TO AGILE AND DEVOPS AND UNDERSTAND ITS RELEVANCE IN THE PRODUCT LIFECYCLE.NO OF PAGES : 13SUB - TOPICS:1. When to adopt Agile2. Agile principles and values3. Scaling Agile with DevOps4. When to adopt DevOps5. DevOps in product lifecycleChapter 4: Factors leading to Agile OperationsCHAPTER GOAL: GET TO LEARN THE FACTORS THAT ARE MOTIVATING ORGANIZATIONS TO TRANSITION THEIR INFRASTRUCTURE OPERATIONS TO AGILE OPERATIONSNO OF PAGES: 29SUB - TOPICS:1.Shift towards Agile2.Benefits with Agility3.Cloud Computing4. Microservices5. Deployment patterns6. Shift left testing7. Changes in architectureChapter 5: Introduction to Agile MethodsCHAPTER GOAL: Introduce agile methods, roles, ceremonies and best practicesNO OF PAGES: 40SUB - TOPICS:1. Scrum2. Kanban3. ScrumbanChapter 6: Introduction to Agile FrameworksChapter Goal: INTRODUCE AGILE FRAMEWORKS, ROLES, AND STUDY THEIR COMPARISON.NO. OF PAGES : 47SUB - TOPICS:1. Agile ITSM2. IT4IT3. Lean IT4. SAFe5. Spotify6. LeSS7. Nexus8. DAD9. Site Reliability EngineeringChapter 7: Using Agile for Infrastructure OperationsCHAPTER GOAL:WITH THE BASIC UNDERSTANDING ON AGILE, THIS CHAPTER FOCUSES ON THE STRATEGY FOR ADOPTING AGILE IN INFRASTRUCTURE OPERATIONS SPACE.NO. OF PAGES : 22SUB - TOPICS:1. Adopting the right agile method2. Identify the right tools3. Upskill teams4. Redefine roles and responsibilities5. Continuously monitoring team performance6. Pilot-Expand-SustainChapter 8: Infrastructure as CodeCHAPTER GOAL:LEARN HOW TO LEVERAGE AGILE METHODS WHILE IMPLEMENTING INFRASTRUCTURE AS CODE PIPELINES AND EXTEND ITS INTEGRATION WITH DEVELOPMENT PIPELINES.NO. OF PAGES : 21SUB - TOPICS:1. Getting started with Scrum2. Estimating stories3. Defining acceptance criteria4. Integrating IaC with development pipelines5. IaC ExampleChapter 9: Success PathCHAPTER GOAL:THIS CHAPTER SHARES THE JOURNEY OF AN IMAGINARY COMPANY ON HOW THEY TRANSITION INTO AGILE OPS WITH A WELL-DEFINED TRANSFORMATION MAP AND MILESTONES.NO. OF PAGES : 7SUB - TOPICS:1. Enterprise Alpha2. New operating model3. OutcomesChapter 10: Learnings and Way forwardCHAPTER GOAL:AS ORGANIZATIONS ADOPT AGILE, THEY ALSO NEED TO PLAN FOR THE TRENDING TECHNOLOGIES THAT WILL BENEFIT THEM. THIS LAST CHAPTER SUMMARIZES THE LEARNINGS FROM THE EARLIER CHAPTERS AND SHARES UPCOMING TRENDS AND NEXT STEPS TO CONSIDER.NO. OF PAGES : 6SUB - TOPICS:1. Our Learnings2. Emerging Trends3. Next Steps
Statistical Analysis with Excel For Dummies
BECOME A STATS SUPERSTAR BY USING EXCEL TO REVEAL THE POWERFUL SECRETS OF STATISTICSMicrosoft Excel offers numerous possibilities for statistical analysis—and you don’t have to be a math wizard to unlock them. In Statistical Analysis with Excel For Dummies, fully updated for the 2021 version of Excel, you’ll hit the ground running with straightforward techniques and practical guidance to unlock the power of statistics in Excel.Bypass unnecessary jargon and skip right to mastering formulas, functions, charts, probabilities, distributions, and correlations. Written for professionals and students without a background in statistics or math, you’ll learn to create, interpret, and translate statistics—and have fun doing it!In this book you’ll find out how to:* Understand, describe, and summarize any kind of data, from sports stats to sales figures * Confidently draw conclusions from your analyses, make accurate predictions, and calculate correlations * Model the probabilities of future outcomes based on past data * Perform statistical analysis on any platform: Windows, Mac, or iPad * Access additional resources and practice templates through Dummies.com For anyone who’s ever wanted to unleash the full potential of statistical analysis in Excel—and impress your colleagues or classmates along the way—Statistical Analysis with Excel For Dummies walks you through the foundational concepts of analyzing statistics and the step-by-step methods you use to apply them.JOSEPH SCHMULLER works on the Digital & Enterprise Architecture Team at Availity. He has taught statistics at the undergraduate and graduate levels. He has created and delivered courses for LinkedIn Learning, and he is the author of all previous editions of Statistical Analysis with Excel For Dummies.INTRODUCTION 1About This Book 2What’s New in This Edition 2What’s New in Excel (Microsoft 365) 3Foolish Assumptions 3Icons Used in This Book 4Where to Go from Here 5Beyond This Book 5PART 1: GETTING STARTED WITH STATISTICAL ANALYSIS WITH EXCEL: A MARRIAGE MADE IN HEAVEN 7CHAPTER 1: EVALUATING DATA IN THE REAL WORLD 9The Statistical (and Related) Notions You Just Have to Know 9Samples and populations 10Variables: Dependent and independent 11Types of data 12A little probability 13Inferential Statistics: Testing Hypotheses 14Null and alternative hypotheses 15Two types of error 16Some Excel Fundamentals 18Autofilling cells 22Referencing cells 25CHAPTER 2: UNDERSTANDING EXCEL’S STATISTICAL CAPABILITIES 29Getting Started 30Setting Up for Statistics 32Worksheet functions 32Quickly accessing statistical functions 36Array functions 38What’s in a name? An array of possibilities 41Creating Your Own Array Formulas 50Using data analysis tools 51Additional data analysis tool packages 56Accessing Commonly Used Functions 58The New Analyze Data Tool 59Data from Pictures! 60PART 2: DESCRIBING DATA 63CHAPTER 3: SHOW-AND-TELL: GRAPHING DATA 65Why Use Graphs? 65Examining Some Fundamentals 67Gauging Excel’s Graphics (Chartics?) Capabilities 68Becoming a Columnist 69Stacking the Columns 73Slicing the Pie 74A word from the wise 76Drawing the Line 77Adding a Spark 80Passing the Bar 82The Plot Thickens 84Finding Another Use for the Scatter Chart 88CHAPTER 4: FINDING YOUR CENTER 91Means: The Lore of Averages 91Calculating the mean 92AVERAGE and AVERAGEA 93AVERAGEIF and AVERAGEIFS 95TRIMMEAN 99Other means to an end 100Medians: Caught in the Middle 102Finding the median 102MEDIAN 103Statistics à la Mode 104Finding the mode 104MODE.SNGL and MODE.MULT 104CHAPTER 5: DEVIATING FROM THE AVERAGE 107Measuring Variation 108Averaging squared deviations: Variance and how to calculate it 108VAR.P and VARPA 111Sample variance 113VAR.S and VARA 114Back to the Roots: Standard Deviation 114Population standard deviation 115STDEV.P and STDEVPA 115Sample standard deviation 116STDEV.S and STDEVA 116The missing functions: STDEVIF and STDEVIFS 117Related Functions 121DEVSQ 121Average deviation 122AVEDEV 123CHAPTER 6: MEETING STANDARDS AND STANDINGS 125Catching Some Z’s 126Characteristics of z-scores 126Bonds versus the Bambino 127Exam scores 128STANDARDIZE 128Where Do You Stand? 131RANK.EQ and RANK.AVG 131LARGE and SMALL 133PERCENTILE.INC and PERCENTILE.EXC 134PERCENTRANK.INC and PERCENTRANK.EXC 137Data analysis tool: Rank and Percentile 138CHAPTER 7: SUMMARIZING IT ALL 141Counting Out 141COUNT, COUNTA, COUNTBLANK, COUNTIF, COUNTIFS 141The Long and Short of It 144MAX, MAXA, MIN, and MINA 144Getting Esoteric 145SKEW and SKEW.P 146KURT 148Tuning In the Frequency 150FREQUENCY 150Data analysis tool: Histogram 152Can You Give Me a Description? 154Data analysis tool: Descriptive Statistics 154Be Quick About It! 156Instant Statistics 159CHAPTER 8: WHAT’S NORMAL? 161Hitting the Curve 161Digging deeper 162Parameters of a normal distribution 163NORM.DIST 165NORM.INV 167A Distinguished Member of the Family 168NORM.S.DIST 169NORM.S.INV 170PHI and GAUSS 170Graphing a Standard Normal Distribution 171PART 3: DRAWING CONCLUSIONS FROM DATA 173CHAPTER 9: THE CONFIDENCE GAME: ESTIMATION 175Understanding Sampling Distributions 176An EXTREMELY Important Idea: The Central Limit Theorem 177(Approximately) simulating the Central Limit Theorem 178The Limits of Confidence 183Finding confidence limits for a mean 183CONFIDENCE.NORM 186Fit to a t 187CONFIDENCE.T 188CHAPTER 10: ONE-SAMPLE HYPOTHESIS TESTING 189Hypotheses, Tests, and Errors 190Hypothesis Tests and Sampling Distributions 191Catching Some Z’s Again 193Z.TEST 196t for One 197T.DIST, T.DIST.RT, and T.DIST.2T 198T.INV and T.INV.2T 200Visualizing a t-Distribution 201Testing a Variance 203CHISQ.DIST and CHISQ.DIST.RT 205CHISQ.INV and CHISQ.INV.RT 206Visualizing a Chi-Square Distribution 208CHAPTER 11: TWO-SAMPLE HYPOTHESIS TESTING 211Hypotheses Built for Two 211Sampling Distributions Revisited 212Applying the Central Limit Theorem 213Z’s once more 215Data analysis tool: z-Test: Two Sample for Means 216t for Two 219Like peas in a pod: Equal variances 220Like p’s and q’s: Unequal variances 221T.TEST 222Data analysis tool: t-Test: Two Sample 223A Matched Set: Hypothesis Testing for Paired Samples 227T.TEST for matched samples 228Data analysis tool: t-Test: Paired Two Sample for Means 230t-tests on the iPad with StatPlus 232Testing Two Variances 235Using F in conjunction with t 237F.TEST 238F.DIST and F.DIST.RT 240F.INV and F.INV.RT 241Data analysis tool: F-test: Two Sample for Variances 242Visualizing the F-Distribution 244CHAPTER 12: TESTING MORE THAN TWO SAMPLES 247Testing More than Two 247A thorny problem 248A solution 249Meaningful relationships 253After the F-test 254Data analysis tool: Anova: Single Factor 258Comparing the means 260Another Kind of Hypothesis, Another Kind of Test 262Working with repeated measures ANOVA 262Getting trendy 264Data analysis tool: Anova: Two-Factor Without Replication 268Analyzing trend 271ANOVA on the iPad 272ANOVA on the iPad: Another Way 274Repeated Measures ANOVA on the iPad 277CHAPTER 13: SLIGHTLY MORE COMPLICATED TESTING 281Cracking the Combinations 281Breaking down the variances 282Data analysis tool: Anova: Two-Factor Without Replication 284Cracking the Combinations Again 286Rows and columns 286Interactions 287The analysis 288Data analysis tool: Anova: Two-Factor With Replication 289Two Kinds of Variables — at Once 292Using Excel with a Mixed Design 293Graphing the Results 298After the ANOVA 300Two-Factor ANOVA on the iPad 300CHAPTER 14: REGRESSION: LINEAR AND MULTIPLE 303The Plot of Scatter 303Graphing a line 305Regression: What a Line! 307Using regression for forecasting 309Variation around the regression line 309Testing hypotheses about regression 311Worksheet Functions for Regression 317SLOPE, INTERCEPT, STEYX 318FORECAST.LINEAR 319Array function: TREND 319Array function: LINEST 323Data Analysis Tool: Regression 325Working with tabled output 327Opting for graphical output 329Juggling Many Relationships at Once: Multiple Regression 330Excel Tools for Multiple Regression 331TREND revisited 331LINEST revisited 333Regression data analysis tool revisited 336Regression Analysis on the iPad 338CHAPTER 15: CORRELATION: THE RISE AND FALL OF RELATIONSHIPS 341Scatterplots Again 341Understanding Correlation 342Correlation and Regression 345Testing Hypotheses about Correlation 347Is a correlation coefficient greater than zero? 348Do two correlation coefficients differ? 349Worksheet Functions for Correlation 350CORREL and PEARSON 350RSQ 351COVARIANCE.P and COVARIANCE.S 352Data Analysis Tool: Correlation 353Tabled output 354Multiple correlation 355Partial correlation 356Semipartial correlation 357Data Analysis Tool: Covariance 358Using Excel to Test Hypotheses about Correlation 358Worksheet functions: FISHER, FISHERINV 359Correlation Analysis on the iPad 360CHAPTER 16: IT’S ABOUT TIME 363A Series and Its Components 363A Moving Experience 364Lining up the trend 365Data analysis tool: Moving Average 365How to Be a Smoothie, Exponentially 368One-Click Forecasting 369Working with Time Series on the iPad 374CHAPTER 17: NONPARAMETRIC STATISTICS 379Independent Samples 380Two samples: Mann-Whitney U test 380More than two samples: Kruskal-Wallis one-way ANOVA 382Matched Samples 383Two samples: Wilcoxon matched-pairs signed ranks 384More than two samples: Friedman two-way ANOVA 386More than two samples: Cochran’s Q 387Correlation: Spearman’s rS 389A Heads-Up 391PART 4: PROBABILITY 393CHAPTER 18: INTRODUCING PROBABILITY 395What Is Probability? 395Experiments, trials, events, and sample spaces 396Sample spaces and probability 396Compound Events 397Union and intersection 397Intersection, again 398Conditional Probability 399Working with the probabilities 400The foundation of hypothesis testing 400Large Sample Spaces 400Permutations 401Combinations 402Worksheet Functions 403FACT 403PERMUT and PERMUTIONA 403COMBIN and COMBINA 404Random Variables: Discrete and Continuous 405Probability Distributions and Density Functions 405The Binomial Distribution 407Worksheet Functions 409BINOM.DIST and BINOM.DIST.RANGE 409NEGBINOM.DIST 411Hypothesis Testing with the Binomial Distribution 412BINOM.INV 413More on hypothesis testing 414The Hypergeometric Distribution 415HYPGEOM.DIST 416CHAPTER 19: MORE ON PROBABILITY 419Discovering Beta 419BETA.DIST 421BETA.INV 423Poisson 424POISSON.DIST 425Working with Gamma 427The gamma function and GAMMA 427The gamma distribution and GAMMA.DIST 428GAMMA.INV 430Exponential 431EXPON.DIST 431CHAPTER 20: USING PROBABILITY: MODELING AND SIMULATION 433Modeling a Distribution 434Plunging into the Poisson distribution 434Visualizing the Poisson distribution 435Working with the Poisson distribution 436Using POISSON.DIST again 437Testing the model’s fit 437A word about CHISQ.TEST 440Playing ball with a model 441A Simulating Discussion 444Taking a chance: The Monte Carlo method 444Loading the dice 444Data analysis tool: Random Number Generation 445Simulating the Central limit Theorem 448Simulating a business 452CHAPTER 21: ESTIMATING PROBABILITY: LOGISTIC REGRESSION 457Working Your Way Through Logistic Regression 458Mining with XLMiner 460PART 5: THE PART OF TENS 465CHAPTER 22: TEN (12, ACTUALLY) STATISTICAL AND GRAPHICAL TIPS AND TRAPS 467Significant Doesn’t Always Mean Important 467Trying to Not Reject a Null Hypothesis Has a Number of Implications 468Regression Isn’t Always Linear 468Extrapolating Beyond a Sample Scatterplot Is a Bad Idea 469Examine the Variability Around a Regression Line 469A Sample Can Be Too Large 470Consumers: Know Your Axes 470Graphing a Categorical Variable as a Quantitative Variable Is Just Plain Wrong 471Whenever Appropriate, Include Variability in Your Graph 472Be Careful When Relating Statistics Textbook Concepts to Excel 472It’s Always a Good Idea to Use Named Ranges in Excel 472Statistical Analysis with Excel on the iPad Is Pretty Good! 473CHAPTER 23: TEN TOPICS (THIRTEEN, ACTUALLY) THAT JUST DON’T FIT ELSEWHERE 475Graphing the Standard Error of the Mean 475Probabilities and Distributions 479PROB 479WEIBULL.DIST 479Drawing Samples 480Testing Independence: The True Use of CHISQ.TEST 481Logarithmica Esoterica 484What is a logarithm? 484What is e? 486LOGNORM.DIST 489LOGNORM.INV 490Array Function: LOGEST 491Array Function: GROWTH 494The logs of Gamma 497Sorting Data 498PART 6: APPENDICES 501APPENDIX A: WHEN YOUR DATA LIVE ELSEWHERE 503APPENDIX B: TIPS FOR TEACHERS (AND LEARNERS) 507Augmenting Analyses Is a Good Thing 507Understanding ANOVA 508Revisiting regression 510Simulating Data Is Also a Good Thing 512When All You Have Is a Graph 514APPENDIX C: MORE ON EXCEL GRAPHICS 515Tasting the Bubbly 515Taking Stock 516Scratching the Surface 518On the Radar 519Growing a Treemap and Bursting Some Sun 520Building a Histogram 521Ordering Columns: Pareto 522Of Boxes and Whiskers 5233D Maps 524Filled Maps 527APPENDIX D: THE ANALYSIS OF COVARIANCE 529Covariance: A Closer Look 529Why You Analyze Covariance 530How You Analyze Covariance 531ANCOVA in Excel 532Method 1: ANOVA 533Method 2: Regression 537After the ANCOVA 540And One More Thing 542Index 545
Communicating in Risk, Crisis, and High Stress Situations: Evidence-Based Strategies and Practice
COMMUNICATING IN R!SK, CRISIS, AND HIGH STRESS SITUATIONSLEARN THE UNIFYING PRINCIPLES BEHIND RISK, CRISIS, AND HIGH STRESS COMMUNICATION WITH THIS STATE-OF-THE-ART REFERENCE WRITTEN BY A MAJOR LEADER IN THE FIELDCommunicating in Risk, Crisis, and High Stress Situations: Evidence-Based Strategies and Practice is about communicating with people in the most challenging circumstances: high stress situations characterized by high risks and high stakes. The ability to communicate effectively in a high stress situation is an essential communication competency for managers, engineers, scientists, and professionals in every field who can be thrust into demanding situations complicated by stress. Whether you are confronting an external crisis, an internal emergency, or leading organizational change, this book was written for you. Communicating in Risk, Crisis, and High Stress Situations brings together in one resource proven scientific research with practical, hands-on guidance from a world leader in the field. The book covers such critical topics as trust, stakeholder engagement, misinformation, messaging, and audience perceptions in the context of stress. This book is uniquely readable, thorough, and useful, thanks to features that include:* Evidence-based theories and concepts that underlie and guide practice* Tools and guidelines for practical and effective planning and application* Experience-based advice for facing challenges posed by mainstream and social media * Provocative case studies that bring home the key principles and strategies* Illuminating case diaries that use the author’s breadth and depth of experience to create extraordinary learning opportunitiesThe book is a necessity for managers, engineers, scientists, and others who must communicate difficult technical concepts to a concerned public. It also belongs on the bookshelves of leaders and communicators in public and private sector organizations looking for a one-stop reference and evidence-based practical guide for communicating effectively in emotionally charged situations. Written by a highly successful academic, consultant, and trainer, the book is also designed as a resource for training and education. VINCENT T. COVELLO, PHD, is a leading expert in risk, crisis, and high stress communications. He is currently Director of the Center for Risk Communication in New York City, an organization that applies evidence-based knowledge to a wide range of high concern, high stakes situations. He has served as a senior adviser to the World Health Organization, the US Department of Health and Human Services, the US Environmental Protection Agency, the US Department of Agriculture, the US Centers for Disease Control and Prevention, and other national and international organizations. Over the past 40 years, Dr. Covello has published more than 150 scientific articles on risk, crisis, and high stress communications.A Note from the Series Editor xiiiAcknowledgments xvAuthor Biography xvii1 THE CRITICAL ROLE OF RISK, HIGH CONCERN, AND CRISIS COMMUNICATION 11.1 Case Diary: A Collision of Facts and Perceptions 21.2 What Will Readers Find in This Book? 31.3 Why You Will Use This Book 41.4 The Need for This Book – Now 51.4.1 New Literature, New Research 51.4.2 Changes in the Communications Landscape 61.4.3 Changes in Journalism and the Perception of Facts 71.4.4 Changes in Laws, Regulations, and Societal Expectations 71.4.5 Changes in Concerns about Health, Safety, and the Environment 71.4.6 Changes in Levels of Trust 71.4.7 Changes in the Global Political Environment 81.4.8 The COVID- 19 Pandemic and the Changed Communication Landscape 82 CORE CONCEPTS 112.1 Case Diary: Recognizing Change as a High Concern Issue 112.2 Defining the Concept and Term Risk 132.3 Defining the Concept and Term Risk Communication 142.4 Risk Communication and Its Relationship to Risk Analysis 172.5 Defining the Concepts and Terms High Concern and High Concern Communication 192.6 Defining the Concept and Term Crisis 222.7 Defining the Concept and Term Crisis Communication 242.8 Chapter Resources 25Endnotes 313 AN OVERVIEW OF RISK COMMUNICATION 333.1 Case Diary: Complex Issues Destroy Homes 333.2 Challenges and Difficulties Faced in Communicating Risk Information 353.2.1 Characteristics and Limitations of Scientific and Technical Data about Risks 353.2.2 Characteristics and Limitations of Spokespersons in Communicating Information about Risks 353.2.2.1 Case Study: “Go Hard, Go Early”: Risk Communication Lessons from New Zealand’s Response to COVID-19 373.2.3 Characteristics and Limitations of Risk Management Regulations and Standards 413.2.3.1 Debates and Disagreements 413.2.3.2 Limited Resources for Risk Assessment and Management 413.2.3.3 Underestimating the Difficulty of and Need for Risk Communication 423.2.3.4 Lack of Coordination and Collaboration 423.2.4 Characteristics and Limitations of Traditional Media Channels in Communicating Information about Risks 423.2.5 Characteristics and Limitations of Social Media Channels in Communicating Information about Risks 433.2.6 Characteristics and Limitations of People in their Ability to Evaluate and Interpret Risk Information 443.3 Changes in How the Brain Processes Information Under Conditions of High Stress 483.4 Risk Communication Theory 493.4.1 Trust Determination Theory 493.4.2 Negative Dominance Theory 503.4.3 Mental Noise Theory 503.4.4 Risk Perception Theory 503.5 Risk Communication Principles and Guidelines 553.5.1 Principle 1. Accept and Involve All Interested and Affected Persons as Legitimate Partners 553.5.2 Principle 2. Plan Carefully and Evaluate Performance 553.5.3 Principle 3. Listen to Your Audience 573.5.4 Principle 4. Be Honest, Frank, and Open 573.5.5 Principle 5. Coordinate and Collaborate with Other Credible Sources 583.5.6 Principle 6. Meet the Needs of Traditional and Social Media 583.5.7 Principle 7. Speak Clearly and with Compassion 583.6 Key Takeaway Concepts and Conclusions from this Overview Chapter 593.7 Chapter Resources 59Endnotes 664 DEVELOPMENT OF RISK COMMUNICATION THEORY AND PRACTICE 694.1 Case Diary: Origin Story 694.2 Introduction 704.2.1 Historical Phase 1: Presenting Risk Numbers 714.2.2 Historical Phase 2: Listening and Planning 714.2.3 Historical Phase 3: Stakeholder Engagement 724.2.4 Covello and Sandman’s Four Stages of Risk Communication 724.2.4.1 Stage 1: Ignore the Public 734.2.4.2 Stage 2: Explaining Risk Data Better 734.2.4.3 Stage 3: Stakeholder Engagement 774.2.4.4 Stage 4: Empowerment 784.3 Summary 794.4 Chapter Resources 79Endnotes 835 STAKEHOLDER ENGAGEMENT AND EMPOWERMENT 875.1 Case Diary: A Town Hall Public Meeting Goes Very Wrong 875.2 Introduction 895.3 Levels of Stakeholder Engagement 915.3.1 Types of Stakeholder Engagement 935.4 Benefits of Stakeholder Engagement 955.5 Limitations and Challenges of Stakeholder Engagement 965.6 Techniques and Approaches for Effective Stakeholder Engagement 975.7 Meetings with Stakeholders 1005.7.1 Town Hall Meetings 1015.7.2 Open House Meetings/Information Workshops 1025.7.3 Tips for Meetings with Stakeholders 1025.8 Chapter Resources 104Endnotes 1076 COMMUNICATING IN A CRISIS 1116.1 Case Diary: The Challenge of Partnership in a Crisis 1126.2 The Three Phases of a Crisis 1136.3 Communication in the Precrisis Preparedness Phase 1156.3.1 Precrisis Communication Activity: Identifying Potential Crises 1176.3.2 Case Study: The 2010 BP Deepwater Horizon Oil Spill 1186.3.3 Precrisis Communication Activity: Identify Goals and Objectives 1206.3.4 Precrisis Communication Activity: Develop a Crisis Communication Plan 1216.3.5 Precrisis Communication Activity: Identify, Train, and Test Crisis Communication Spokespersons 1246.3.6 Precrisis Communication Activity: Engaging Stakeholders 1246.3.7 Precrisis Communication Activity: Identifying Stakeholders’ Questions and Concerns 1266.3.8 Drafting Messages for Anticipated Stakeholder Questions and Concerns 1266.3.9 Precrisis Communication Activity: Conducting Exercises to Test the Crisis Communication Plan 1286.3.10 Precrisis Communication Activity: Incident Command System (ICS) and the Joint Information Center (JIC) 1296.4 Communications in the Crisis Response Phase 1306.4.1 Case Study: Lac-Mégantic Rail Tragedy 1346.4.2 Disaster and Emergency Warnings 1366.4.2.1 Designing Effective Warnings 1376.4.2.2 Steps in the Disaster and Emergency Warning Process 1376.5 Communicating Effectively about Blame, Accountability, and Responsibility 1396.6 Communicating an Apology 1406.6.1 Case Study: Maple Leaf Foods and the Listeria Food Contamination Crisis 1416.6.2 Case Study: Southwest Airlines Apology 1446.7 Communications in the Postcrisis Recovery Phase 1456.7.1 Case Study and Case Diary: New York City’s Communication Trials by Fire, from West Nile to 9/11 1466.7.2 Case Study: Johnson & Johnson and the Tylenol Tampering Case 1476.7.3 Case Study: Flint, Michigan and Contaminated Drinking Water 1496.8 Chapter Resources 151Endnotes 1597 FOUNDATIONAL PRINCIPLES: PERCEPTIONS, BIASES, AND INFORMATION FILTERS 1657.1 Case Diary: “A” Is for “Apples” 1657.2 Message Perception and Reception in High Concern Situations 1687.3 Message Filter Theory: A Set of Principles Drawn from the Behavioral and Neuroscience Literature 1697.4 Case Study: COVID- 19 and Risk Perception Factors 1717.4.1 Social Amplification Filters 1737.4.2 Mental Shortcut Filters 1747.4.3 Knowledge and Belief Filters 1767.4.4 Personality Filters 1777.4.5 Negative Dominance/Loss Aversion Filters 1777.5 Message Filters and the Brain 1797.6 Message Filters, Perceptions, and Models of Human Behavior 1797.7 Message Filters, Perceptions, and Persuasion 1807.8 Message Filters, Perceptions, and Ethics 1817.9 Message Filters and the Issue of Acceptable Risk 1827.9.1 Factors in Determining Acceptable Risk 1837.9.2 Strategies for Addressing Acceptable Risk 1847.10 The Message is in the Mind of the Receiver 1867.11 Chapter Resources 186Endnotes 1928 FOUNDATIONAL PRINCIPLES: TRUST, CULTURE, AND WORLDVIEWS 1978.1 Case Diary: A Disease Outbreak in Africa 1988.2 Trust Determination 2008.3 Characteristics and Attributes of Trust 2018.3.1 Trust and First Impressions 2038.3.2 Loss of Trust 2048.3.3 Gaining Trust 2068.3.3.1 Gaining Trust through Stakeholder Engagement 2068.3.3.2 Gaining Trust through Trust Transference 2068.3.3.3 Gaining Trust through Actions and Behavior 2078.4 Case Study: Trust and the Chernobyl Nuclear Power Plant Accident 2078.5 Case Diary: The Fukushima Japan Nuclear Power Plant Accident 2088.6 Gaining Trust in High- Stakes Negotiations 2108.7 Case Diary: Gaining Trust and the SARS Outbreak in Hong Kong 2118.8 Trust and Culture 2128.9 Cultural Competency 2128.9.1 Different Communication Styles 2138.9.2 Different Attitudes and Approaches toward Conflict 2148.9.3 Different Nonverbal Communication 2148.9.4 Different Attitudes and Approaches to Decision Making 2148.9.5 Different Attitudes and Approaches toward Information Disclosure 2158.9.6 Different Attitudes and Approaches to Knowing 2158.9.7 Different Attitudes and Approaches toward Conversation and Discourse 2158.9.8 Different Attitudes and Approaches toward the Use of Humor 2158.10 Risk Perceptions, Trust, and Cultural Theory 2158.11 Risk Perceptions, Trust, and Worldviews 2178.12 Case Diary: Fame, Family, and Fear in Public Health Communications 2188.13 Chapter Resources 221Endnotes 2279 BEST PRACTICES FOR MESSAGE DEVELOPMENT IN HIGH CONCERN SITUATIONS 2319.1 Case Diary: Mapping Through a Maze of COVID Confusion 2319.2 Introduction 2329.3 Crafting Messages in the Context of Stress and High Concern Decision- Making 2339.3.1 Trust Determination and Messaging in High-Stress Situations 2339.3.1.1 The CCO Best Practice 2339.3.2 Impaired Comprehension and Messaging in High-Stress Situations 2349.3.3 Negative Dominance and Messaging in High-Stress Situations 2349.3.4 Emotional Impact and Messaging in High-Stress Situations 2359.3.4.1 Case Study: Hoarding Toilet Paper at the Outset of the 2020 COVID-19 Pandemic 2369.4 Message Mapping 2389.4.1 Benefits of Message Maps 2389.4.2 Message Maps and the Brain 2419.4.3 The Development of Message Mapping 2439.4.4 Case Study: Message Maps and Asbestos 2449.4.5 Steps in Developing a Message Map 2459.4.5.1 Step 1: Identify, Profile, and Prioritize Key Stakeholders 2459.4.5.2 Step 2: Develop Lists of Stakeholder Questions and Concerns 2489.4.5.3 Case Study: Stakeholder Questions, Terrorism, and Disasters 2499.4.5.4 Step 3: Develop Key Messages 2499.4.5.5 Step 4: Develop Supporting Information 2529.4.5.6 Step 5: Testing the Message Map 2539.4.5.7 Step 6: Repurpose Maps through Appropriate Information Channels 2549.5 Summary 2549.6 Chapter Resources 255Endnotes 263Appendices 265Appendix 9.1 265Appendix 9.2 267Appendix 9.3 277Appendix 9.4 28010 Communicating Numbers, Statistics, and Technical Information about a Risk or Threat 28510.1 Case Diary: A Civil Action 28510.2 Introduction 28810.3 Case Study: Numbers, Statistics, and COVID-19 28910.4 Brain Processes That Filter How Technical Information about Risk or Threat Is Received and Understood 29210.4.1 Risk and Threat Perception Filters 29310.4.2 Thought Processing Filters 29410.4.3 Mental Model Filters 29410.4.4 Emotional Filters 29510.4.5 Motivational Filters 29510.5 Challenges in Explaining Technical Information About a Risk or Threat 29610.6 Framing 29710.7 Technical Jargon 29810.8 Information Clarity 29910.9 Units of Measurement 30010.10 Case Study: Risk Numbers, Risk Statistics, and the Challenger Accident 30310.11 Comparisons 30410.12 Lessons Learned 30810.13 Chapter Resources 308Endnotes 31511 EVALUATING RISK, HIGH CONCERN, AND CRISIS COMMUNICATIONS 32111.1 Case Diary: Finding the Road to Rio 32111.1.1 The Mosquito Front 32211.1.2 The Citizen Front 32211.1.3 The Olympic Athlete and Visitor Front 32311.1.4 Communication Strategy: The Citizen Front 32311.1.5 Communication Strategy: Olympic Athlete and Visitor Front 32311.2 Introduction 32411.3 Benefits of Evaluation 32611.4 Evaluation Practices for Risk, High Concern, and Crisis Communication 32711.5 Case Studies of Evaluation Comparison to Best Practice: Hurricane Katrina, COVID-19and Vaccination Hesitancy, and Outbreak of COVID-19 in Wuhan, China 32911.5.1 Hurricane Katrina 32911.5.2 COVID-19 and Vaccination Hesitancy 33011.5.3 Outbreak of COVID-19 in Wuhan, China 33011.6 Barriers and Challenges to Evaluation 33211.6.1 Differences in Values 33211.6.2 Differences in Goals 33211.6.3 Competition for Resources 33211.6.4 Ability to Learn from Results 33311.7 Evaluation Measures 33811.7.1 Process/Implementation Evaluation Measures 33811.7.2 Outcome/Impact Evaluation Measures 33911.7.3 Formative Evaluation Measures 34011.8 An Integrated Approach to Evaluation 34111.9 Resource: Case Study of Focus Group Testing of Mosquito-Control Messages, Florida, 2018–2019 34211.10 Evaluation Tools 34711.11 Chapter Resources 348Endnotes 35312 COMMUNICATING WITH MAINSTREAM NEWS MEDIA 35712.1 Case Diary: A High Stakes Chess Game with a News Media Outlet 35712.2 Introduction 35912.3 Characteristics of the Mainstream News Media 36112.3.1 Content 36112.3.2 Clarity 36212.3.3 Avoiding Prejudice 36212.3.4 Topicality 36212.3.5 Diversity 36312.3.6 Subject Matter Expertise 36312.3.7 Resources 36312.3.8 Career Advancement 36412.3.9 Watchdogs 36412.3.10 Amplifiers 36412.3.11 Skepticism 36412.3.12 Source Dependency 36512.3.13 Professionalism and Independence 36512.3.14 Covering Uncertainty 36612.3.15 Legal Constraints 36612.3.16 Special Populations 36612.3.17 Competition 36612.3.18 Confidentiality and Protection of Sources 36712.3.19 Deadlines 36712.3.20 Trust 36712.3.21 Storytelling 36812.3.22 Balance and Controversy 36812.4 Guidelines and Best Practices for Interacting with Mainstream News Media 36812.5 The Media Interview 37012.6 Lessons and Trends 37512.7 Case Diary: A Ten-Round Exercise 37712.8 Chapter Resources 378Endnotes 38113 Social Media and the Changing Landscape for Risk, High Concern, and Crisis Communication 38513.1 Case Diary: Myth-Busting: Mission Impossible? 38513.2 Introduction 38713.3 Benefits of Social Media Outlets for Risk, High Concern, and Crisis Communication 38913.3.1 Speed 38913.3.2 Access 39013.3.3 Reach 39013.3.4 Amplification 39013.3.5 Transparency 39013.3.6 Understanding 39013.3.7 Changes in Behaviors 39113.3.8 Relationship Building 39113.3.9 Timeliness 39113.3.10 Hyperlocal Specificity 39113.3.11 Listening and Feedback 39213.3.12 Taking Advantage of the Benefits of Social Media 39213.4 Challenges of Social Media for Risk, High Concern, and Crisis Communication 39313.4.1 Rising Expectations 39313.4.2 Repostings/Redistribution 39313.4.3 Permanent Storage 39413.4.4 Hacking/Security 39413.4.5 Rise and Fall of Social Media Platforms 39413.4.6 Resources 39413.4.7 Privacy and Confidentiality 39413.4.8 Cognitive Overload 39513.4.9 Players on the Field 39513.4.10 Misinformation, Disinformation, and Rumors 39513.5 Case Study: Social Media and the 2007 and 2011 Shooter Incidents at Virginia Polytechnic Institute and State University (Virginia Tech) 39713.6 Case Study: Social Media and the 2013 Southern Alberta/Calgary Flood 39813.7 Best Practices for Using Social Media in Risk, High Concern, and Crisis Situations 40013.7.1 Create a Social Media Plan 40013.7.2 Staff Appropriately for Social Media Communication 40013.7.3 Ensure Continuous Updating 40113.7.4 Identify Your Partners 40113.7.5 Assess and Reassess Your Selection of Platforms 40113.7.6 Create and Maintain as Many Social Media Accounts as You and Your Stakeholders Need 40113.7.7 Be Prepared for the Special Social Media Requirements and Pressures in a Crisis 40113.7.8 Provide Guidance for Employees and Engage Them in the Process 40213.7.9 Don’t Skip Evaluation 40313.8 Case Diary: Social Media and the Negative Power of“Junk”Information about Risks and Threats 40313.9 Lessons Learned and Trends 40413.10 Chapter Resources 404Endnotes 408Index 411
Office For Seniors For Dummies
SEND EMAILS, STAY ON TOP OF YOUR FINANCES, AND MANAGE YOUR EVERYDAY LIFE WITH THIS NO-EXPERIENCE-NECESSARY OFFICE 2021 HANDBOOKMicrosoft Office offers huge benefits to people of all ages. The popular software suite has always made creating to-do lists, sending emails, drafting documents, and processing spreadsheets a breeze, and the updates and upgrades found in Office 2021 make those tasks even easier. Office For Seniors For Dummies offers step-by-step instructions to learn every part of Office 2021, including Word, Excel, and PowerPoint. This trusted guide starts at the very beginning, showing you how to start each application and understand the interface. It walks you through the most commonly used functions of each program and explains how to apply it in your everyday life. Written in large, crystal-clear type and full of helpful images and screenshots, the book also demonstrates how to:* Stay in touch with friends and family using Office 2021's built-in communications tools, including Outlook* Keep your finances up to date with functional spreadsheets in Excel* Take advantage of existing Office templates for things like budgets, letters, faxes, and moreYou don't have to be a computer scientist to get the most out of Office 2021. Let this handy guide clarify and demystify some of the most practical and user-friendly applications available today. FAITHE WEMPEN, M.A., is a Microsoft Office Master Instructor who has been writing and teaching about Microsoft Office for more than 25 years. She is an adjunct professor of Computer Information Technology with more than 150 books to her credit, including Computers For Seniors For Dummies and Outlook For Dummies, as well as a CompTIA A+ certified computer technician.INTRODUCTION 1About This Book 1Foolish Assumptions 3Icons Used in This Book 3Beyond the Book 4Where to Go from Here 4PART 1: GETTING STARTED WITH OFFICE 5CHAPTER 1: THE TWO-DOLLAR TOUR 7Start an Office Application 8Start a New Document 9Explore the Office Ribbon and Tabs 10Understand the File Menu (Backstage View) 15Create a Document 16Type Text 17Insert a Picture 19Move Around in a Document 20Select Content 22Zoom In and Out 24Change the View 25CHAPTER 2: EXPLORING THE COMMON FEATURES OF OFFICE APPLICATIONS 27Edit Text 28Move and Copy Content 29Choose Fonts and Font Sizes 33Apply Text Formatting 36Use the Mini Toolbar 38Work with Themes 39Check Your Spelling and Grammar 43CHAPTER 3: OPENING, SAVING, AND PRINTING FILES 49Save Your Work 50The Basic Save 50Changing the Save Location 52Choosing a File Type 57Open a Previously Saved File 57Change the File Listing View 59Email Your Work to Others 60Emailing a Link to a Document 61Emailing a Copy of a Document 63Share Your Work in Other Formats 65Print Your Work 68Recover Lost Work 70PART 2: WORD 73CHAPTER 4: COMPOSING YOUR THOUGHTS IN WORD 75Examine the Word Interface 76Move Around and Select Text 77Choose Paper Size and Orientation 79Set Margins 80Select the Right Screen View 82Align and Indent Paragraphs 84Change Line Spacing 90Create Bulleted and Numbered Lists 92CHAPTER 5: DRESSING UP YOUR DOCUMENTS 95Apply Styles and Style Sets 96Insert Pictures 101Size and Format a Picture 105Position a Picture 106Add a Page Border 108Apply a Background Color to a Page 110Create Tables 112Format a Table 115CHAPTER 6: TAKING WORD TO THE NEXT LEVEL 117Number the Pages 118Use Headers and Footers 120Insert Cover Pages and Other Building Blocks 123Print an Envelope 125Perform a Mail Merge 127Insert the Date and Time 133PART 3: EXCEL 135CHAPTER 7: CREATING BASIC SPREADSHEETS IN EXCEL 137Understand Excel’s Unique Features 138Get Familiar with Spreadsheet Structure 140Move the Cell Cursor 140Select a Range 142Type and Edit Cell Contents 145Insert and Delete Rows, Columns, and Cells 147Work with Worksheets 151CHAPTER 8: DOING THE MATH: FORMULAS AND FUNCTIONS 155Learn How Formulas Are Structured 156Write Formulas That Reference Cells 156Move and Copy Cell Content 157Reference a Cell on Another Sheet 159Understand Functions 160Take a Tour of Some Basic Functions 163Explore Financial Functions 165CHAPTER 9: CREATING VISUAL INTEREST WITH FORMATTING AND CHARTS 169Adjust Row Height and Column Width 170Wrap Text in a Cell 172Apply Gridlines or Borders 172Apply Fill Color 176Format Text in Cells 177Format the Spreadsheet as a Whole 179Create a Basic Chart 181Identify the Parts of a Chart 183Format a Chart 185CHAPTER 10: USING EXCEL AS A DATABASE 189Understand Databases 190Prepare a List for a Mail Merge 190Store Data in a Table 191Sort a Table 193Filter Data in a Table 196Split a Column’s Content 199Merge the Contents of Columns 201PART 4: OUTLOOK 205CHAPTER 11: MANAGING EMAIL WITH OUTLOOK 207Set Up Outlook for the First Time 208Set Up Additional Mail Accounts 209Troubleshoot Mail Setup Problems 210Take a Quick Tour of Outlook’s Mail Feature 214Choose a Ribbon Layout 216Receive and Read Your Mail 216View and Download Photos and Other Attachments 218Reply to a Message 219Forward a Message 221Compose a Message 221Attach a File to a Message 224Avoid Frauds, Scams, and Viruses 226CHAPTER 12: MANAGING THE DETAILS: CONTACTS, NOTES, AND TASKS 229Store Contact Information 230Edit and Delete Contacts 233Choose How the Contacts List Appears 235Use the Contacts List 235Create Notes 238Categorize Notes 240Use Tasks and the To-Do List 243Update the Status of a Task 246Set a Task Reminder 247CHAPTER 13: YOUR BUSY LIFE: USING THE CALENDAR 249View Your Calendar 250Create and Delete a Calendar Event 252Set an Event to Recur 254Configure Event Reminders 255Add Holidays 257Print a Hard Copy of Your Calendar 258PART 5: POWERPOINT 261CHAPTER 14: GETTING STARTED WITH POWERPOINT 263Explore the PowerPoint Interface 264Work with PowerPoint Files 266Understand PowerPoint Views 266Create New Slides 268Use Slide Placeholders 270Turn Text AutoFit Off or On 271Change Slide Layouts 273Move or Resize Slide Content 274Manually Place Text on a Slide 275Navigate and Select Text 276Select Content 277CHAPTER 15: DRESSING UP YOUR PRESENTATIONS 279Understand and Apply Themes and Variants 280Change the Presentation Colors 281Edit Slide Masters 283Format Text Boxes and Placeholders 284Insert Pictures 286Create a Photo Album Presentation 290CHAPTER 16: ADDING MOVEMENT AND SOUND 293Animate Objects on a Slide 294Add Slide Transition Effects 301Set Slides to Automatically Advance 302Add a Musical Soundtrack 303CHAPTER 17: PRESENTING THE SHOW 305Display a Slide Show On-Screen 306Use the Slide Show Tools 308Print Copies of a Presentation 311Package a Presentation for Distribution 313Make a Video of the Presentation 316PART 6: GOING DEEPER WITH OFFICE 319CHAPTER 18: INTEGRATING OFFICE WITH OTHER APPS 321Use Microsoft Money in Excel to Track Bank Accounts 322Subscribe to a Google Calendar in Outlook 324Import a Google Calendar Into Outlook 327Access Gmail Contacts in Outlook 329Integrating Office with iCloud 332Share Content Between Google Apps and Office Apps 337Include Online Videos in PowerPoint Presentations 339CHAPTER 19: CUSTOMIZING OFFICE APPLICATIONS 341Customize the Quick Access Toolbar 342Customize the Ribbon 346Customize the Status Bar 349Set Options in Word, Excel, and PowerPoint 351Set Outlook Options 352CHAPTER 20: TROUBLESHOOTING COMMON PROBLEMS 355Recover Lost Work 356Repair a Malfunctioning App 357Fix Inconsistent Formatting in Word 360Improve an Ugly Presentation in PowerPoint 363Fix Formula Errors in Excel 364Pick the Right Function in Excel 365Minimize Document File Size 367Move Outlook Data Files to Another PC 368Index 373
Windows 10 Troubleshooting
Troubleshoot Windows 10 the way the experts do, whatever device or form factor you are using. Focus on the problems that most commonly plague PC users and fix each one with a step-by-step approach that helps you understand the cause, solution, and tools required.Windows 10 is constantly evolving and changing and a great many aspects of the operating system, including many associated with troubleshooting and repair, have been changed, removed, replaced, or expanded since the first edition of this book was published. This new edition is updated with a dedicated chapter on using scripting tools for troubleshooting along with numerous updates on Windows device and update installation, Microsoft Sysinternals Suite, and Troubleshooting malware attacks. Additionally, there is extensive coverage of the technical diagnosis and troubleshooting tools you need from Event Viewer to Recovery Console.This book will help you discover the connections between different hardware and software in your devices, and how their bonds with external hardware, networks, and the Internet are more inter-dependent than you think. You will also learn how to support the increasing volume of home workers, and make sure they can stay online and active on PCs from your own organization or their own devices.If you are fed up with those nagging, day-to-day issues, want to avoid costly repairs, or just want to learn more about how PCs work, _Windows 10 Troubleshooting_ is your ideal one-stop guide to the Windows 10 operating system.What You Will Learn* Understand your PC’s ecosystem and how to connect the dots, so you can successfully track problems to their source* Support home workers using PCs from your organization and family devices, and keep workers productive and online* Make your PC safe and secure for family and everyone in your workplace, and ensure that data is kept secure from loss or attack* Understand the threat from malware and viruses and a range of approaches to dealing with them, depending on the situation* Know tips and tricks for researching difficult problems, including third-party tools and useful web resourcesWHO THIS BOOK IS FORAnyone using Windows 10 on a desktop, laptop, or hybrid deviceMIKE HALSEY has been a Microsoft MVP (Most Valuable Professional) awardee since 2011 and is a recognized technical expert. As the author of Windows 7, 8, and 10 troubleshooting books and associated video courses, he is well versed in the problems and issues that PC users, IT pros, and system administrators face when administering and maintaining all aspects of a PC ecosystem.Mike understands that some subjects can be intimidating for some people and that everybody is different, so he approaches each subject area in straightforward and easy-to-understand ways.Mike is originally from the UK, but now lives in the south of France with his rescue border collies, Evan and Robbie. You can contact Mike on Twitter @MikeHalsey.Part 1: Getting Started with Windows TroubleshootingChapter 1: Introducing Troubleshooting in Windows 10The Three Seashells…The Problems We EncounterHardware ProblemsSoftware and App ProblemsNetworking ProblemsStartup ProblemsOS Installation and Update Problems“Prevention Is Better Than Cure”The Security and Maintenance CenterAutomatically Check for Solutions to ProblemsWindows Reliability HistoryWindows Automatic MaintenanceManaging Diagnostic Feedback and PrivacyRecovery OptionsWindows’ Security SystemsWindows Defender Anti-malwareWindows FirewallWindows SmartScreenUACUser Account ManagementAdministrators vs. Standard UsersLocal Accounts vs. Microsoft AccountsAzure ADUser Identity and Sign-In ManagementAn Introduction to Family SafetyManaging and Deleting User AccountsChapter 2: Building a Safe and Secure OSCreating a Recovery DriveBacking Up and Restoring Windows 10.ResetSystem Image BackupCreating a System Image Backup.Restoring a System Image BackupUsing Windows System RestoreConfiguring System RestoreUsing the Windows 10 Media Creation ToolSetting Up and Managing OneDriveBacking Up Your Files with OneDriveUsing OneDrive Personal and OneDrive ProfessionalRestoring Deleted and Previous Versions of FilesChapter 3: Configuring Windows 10The Settings AppSystem > StorageSystem > Default AppsSystem > AboutDevices > Printers & Scanners / Connected DevicesDevices > AutoPlayNetwork & InternetAccountsTime & LanguageUpd^ Windows UpdateUpdate & Security > Windows Defender / BackupUpdate & Security > ActivationUpdate & Security > For DevelopersIntroducing the Control PanelManaging the Virtual Memory, Paging FileManaging Remote Connections to the PCMoving the Shell User Folders.Creating, Managing, and Deleting PartitionsManaging Startup AppsChapter 4: Fixing Windows 10 QuicklyThe Disk Cleanup WizardManaging EdgeCleaning Temporary and Other Files from EdgeResetting - EdgeResetting the Windows Store and Store AppsDefragmenting Your Hard DisksManaging Running Apps and Services with Task ManagerManaging win32 App CompatibilityUsing the System File CheckerMicrosoft Answers, Service Status Site, and Being a TwitChapter 5: Understanding Tasks and EventsThe Windows Event ViewerIntroducing the Microsoft Management ConsoleThe Main Events ViewMaking Sense of Error LogsCreating Custom Event ViewsCreating Event SubscriptionsAttaching a Task to an EventSaving, Exporting, and Importing Event InformationChapter 6: Understanding PC HardwareBIOS and UEFIBIOS Virus/Malware AttackResetting BIOS and UEFI FirmwarePower SuppliesJump-Starting a PCThe MotherboardThe Rear Panel Connectors and CablesMemoryHard Disks, SSDs, M.2, and PCIe DrivesExpansion CardsMonitors and CablingKeyboards and MiceChapter 7: Diagnosing and Repairing Problem Hardware and PeripheralsGetting USB Devices to Work ReliablyInstalling and Managing Bluetooth DevicesInstalling and Configuring PrintersInstalling Different Types of PrinterFinding the Name or IP Address of a PrinterManaging Printing PoliciesHave You Tried [Not] Turning It Off and On Again?Chapter 8: Troubleshooting StartupHave You Tried Turning It Off and On Again?Using Startup RepairThe Windows Recovery Options MenuUsing the Command Prompt to Repair Windows StartupChapter 9: Troubleshooting NetworksThe Network and Sharing CenterConfiguring Network ConnectionsManaging Network AdaptersManaging Network Connections in the Settings AppSetting Up and Managing Your RouterTroubleshooting Wi-Fi Connection ProblemsRecovering Lost Wi-Fi PasswordsChapter 10: Troubleshoot and Manage EdgeManaging EdgeManaging Permissions, Security and Privacy in EdgeManaging Temporary and Other Files in EdgeUsing the Edge Task Manager to Manage Running Web AppsResetting EdgeOther Useful Settings in EdgePart 2: Becoming a Proficient TroubleshooterChapter 11: Dealing with Common Windows AnnoyancesIncorrect File AssociationsSetting Disk and File PermissionsManaging Audio DevicesTroubleshooting Windows ActivationTroubleshooting and Resetting Windows UpdateTroubleshooting Power Loss During an Update InstallationManaging and Resetting Windows SearchTroubleshooting Slow StartupWindows 10 Hangs on StartupWindows 10 Shuts Down SlowlyWindows Fails to Sleep/Resume from Sleep.Gaining Access After Bitlocker LockoutTroubleshooting Touch Screen ProblemsUSB Type-C and Thunderbolt ProblemsNo Picture on Desktop PC Monitor or TVDisappearing and Conflicting DrivesUnderstanding the BSODChapter 12: Remote HelpThe Problem Steps RecorderRecording an App with Game DVRQuick AssistWindows Remote AssistanceSending and Responding to a Remote Assistance RequestSending Unsolicited Remote Assistance OffersRemote DesktopChapter 13: Repairing Windows Startup ProblemsManually Repairing Windows StartupRepairing BIOS Startup FilesRepairing UEFI Startup FilesAdditional Repair Commands for BIOS and UEFIRecreating or Moving the Boot PartitionStep 1a: Create a New Boot Partition (Command Prompt)Step 1b: Create a New Boot Partition (Disk Management Console)Step 2: Create the New Boot FilesSetting Up and Managing Dual/Multiboot SystemsSecure BootBitlocker and Dual-Boot SystemsManaging Boot Systems with BCDEditBCDEdit IdentifiersBCDEdit Data FormatsExamples of BCDEdit UseEffecting Repairs on the Boot Partition StructuresChapter 14: Networks and Internet ConnectionsChecking the Status of a Network ConnectionDisplaying Information About Wi-Fi NetworksCreating Wi-Fi HotspotsPrioritizing Network ConnectionsDiagnosing Network Connection ProblemsGetting Network Diagnostic Reports from the Event ViewerSee the Status of Your Connection with the Performance Monitor.See What’s Using Your Bandwidth with the Resource MonitorTroubleshooting in the Network and Sharing CenterChanging a Network Type Between Private and PublicSetting Advanced Network Configuration OptionsUsing and Managing Ad-Hoc NetworksHOSTS, LMHOSTS and WINSUsing Authentication TechnologiesUnderstanding TCP/IPOSI Network LayersIPv4 vs IPv6 AddressingDCHPDNSUsing TCP/IP Management ToolsPingTraceRTIPConfigNetshManaging User ProfilesRoaming ProfilesAzure and AD Domain Profiles and SettingsChapter 15: Managing Device Drivers and PC ResourcesDeciphering the Device ManagerIdentifying and Installing Unknown DevicesInstalling Legacy HardwareForcibly installing a Device DriverUninstalling and Deleting Device DriversBlocking Device Driver and Device App InstallationFinding Device Driver Details and InformationTroubleshooting Device DriversBacking Up and Restoring the Driver StoreManaging Driver PropertiesChapter 16: Windows Update and System UpgradesDeferring Updates in Windows 10Long-Term Servicing ChannelChoosing How Updates Are DeliveredUninstalling and Blocking UpdatesTroubleshooting and Repairing Windows UpdateWindows Upgrades and the Reset ImageThe Windows Insider Programme (for Business)Chapter 17: Maintaining App and Web Site CompatibilityMaintaining Compatibility with Win32 AppsManaging Web Site and Intranet CompatibilityUsing Edge in IE Compatibility ModeManaging Security in EdgeInstalling and Managing Browser Plug-ins in EdgeSynchronizing Settings in EdgeSetting Your Default Web BrowserInstalling, Removing, Managing and Using Progressive Web AppsUsing the Software Compatibility TroubleshooterDPI ScalingProgram Compatibility AssistantMicrosoft Application Compatibility ToolkitShimsStandard User AnalyzerChapter 18: Managing Security and PrivacyCreating a Strong Password?Using Two-Factor AuthenticationTFA for Microsoft ServicesTFA for Third-Party ServicesMicrosoft TFA AppGoogle TFA AppManaging Safety and Privacy for ChildrenUsing the Credential ManagerManaging Passwords in EdgeManaging Encryption in Windows 10Using the EFSManaging EFS Encryption with Cipher.exeManaging Device EncryptionEncrypting Your PC with BitlockerManaging a TPM on Your PC and in Windows 10Managing Bitlocker Encryption on Your PCUsing Bitlocker To GoChapter 19: Malware and VirusesHow to Defend Against MalwareSo What Is This Malware Stuff Anyway?Viruses and WormsSpywareAdwareTrojansBotsRootkits / BootkitsBackdoorsRansomwareSpam and Phishing EmailDefending PCs Against MalwareDefending Your Files Against RansomwareSecure BootTrusted BootUsing EncryptionApp ContainersIdentifying a Malware AttackHow Malware Infects PCsHow Malware Infects NetworksIdentifying External AttacksIdentifying Internal AttacksTraining Staff for VigilanceManually Removing Malware from a PCFirst Steps – IsolationIdentifying the Running ProcessesDeactivating the MalwareTest and RetestFinishing UpRemoving RootkitsUsing BCDEdit to Repair Malware DamageUsing Third-Party Tools to Remove MalwareMalware Protection CenterBaseline Security AmalyzerMicrosoft DaRTWindows Defender OfflineESET Online (and Offline) ScannerNorton Bootable Recovery ToolSophos Bootable AntivirusKaspersky Rescue DiskKaspersky Ransomware DecryptorAVG Bootkit RemoverF-Secure Rescue CDTrend Micro Rescue DiskMcAfee Free ToolsD7IIRKillJunkware/Adware Removal ToolsMicrosoft SysInternals SuiteResearching Virus Removal OnlineChapter 20: Using Virtualization to Protect PCsCreating and Managing VMs in Hyper-VManaging Networks in Hyper-VCreating Backups of VMs in Hyper-VBooting and Repurposing Your PC from a VMCreating a VHDAdding a VHD to the Boot MenuVirtual Switches in Hyper-VCreating a Virtual SwitchManaging a Virtual SwitchManaging Hyper-V with PowerShellTroubleshooting Hyper-V ConnectionsPart 3: Mastering Windows 10 TroubleshootingChapter 21: Bomb-Proofing Your PCCreating a Robust Backup StrategyLock Down Your PCs with Group PolicyUsing the Group Policy EditorConfiguring a GPOUsing Server-Side Group PoliciesAdvanced Usage of Group PolicyUsing the Group Policy Management ConsoleActivating and Configuring the GPMCUsing the GPMCTroubleshooting Group Policy IssuesManaging Windows ServicesManage Your Local Security PolicyManaging Advanced Firewall PolicyChapter 22: Microsoft SysinternalsFile and Disk UtilitiesAccessChksAccessEnumContigDisk2VhdDiskExtDiskmonDiskViewEFSDumpMoveFile and PendMovesNTFSInfoPsFileSDeleteShareEnumSigcheckNetworking UtilitiesPSPingPsToolsTCPViewWhoIsProcess UtilitiesAutoRunsHandleListDLLsPortmonProcDumpProcess ExplorerProcess MonitorPSExecPsKillPsListPsServicePsSuspendShellRunasVMMapSecurity UtilitiesLogonSessionsPsLoggedOnPsLogListSysmon/Sysmon64System Information UtilitiesHandleLiveKdLoadOrderRAMMapMiscellaneous UtilitiesRegDelNullRegistry UsageRegJumpChapter 23: Best Practice in the WorkplaceManaging Power and BatteriesManaging Users and BYOD PCsMDMGroup PolicyBackups Best PracticeDeployment and Recovery Best PracticeManaging External and Network HardwareChapter 24: Managing BYOD HardwareManaging VPNs and Secure ConnectionsWorkplace JoinConnecting to an Exchange or ActiveSync AccountConnecting to Office 365 or Microsoft AzureWork FoldersChapter 25: Getting Advanced InformationThe Task ManagerThe Performance MonitorData Collector SetsThe Resource MonitorThe Computer Management ConsoleSystem InformationDXDiagChapter 26: The Registry in DepthRegistry FilesRegistry Keys and ValuesHKEY_CLASSES_ROOT (HKCR)HKEY_CURRENT_USER (HKCU)HKEY_LOCAL_MACHINE (HKLM)HKEY_USERS (HKU)HKEY_CURRENT_CONFIG (HKCC)HKEY_PERFORMANCE_DATARegistry Value TypesThe Registry EditorBacking Up and Restoring the RegistryCreating and Modifying Registry KeysEditing Other Users’ Registry DatabasesConnecting to a Remote RegistryUsing PowerShellUsing Group PolicyComparing RegistriesREGINI.EXEEditing the Registry with PowerShellScanRegEdit the Registry from the Recovery PanelThird-Party Registry UtilitiesChapter 27: Using Scripting Tools for TroubleshootingUsing the Windows Command LineUseful Command Line Tools for TroubleshootingUsing the Command Line from the Recovery ConsoleTroubleshooting Using PowerShellGetting Started with PowerShellUsing the Event Log in PowerShellGathering Detailed Reports and InformationManaging AppsManaging Running ProcessesManaging the RegistryManaging Windows UpdateManaging ServicesAdditional Troubleshooting with PowerShellThe Windows TerminalInstalling and Using the Windows TerminalChapter 28: Windows 10 File Structure in DepthThe Windows 10 File and Folder StructureRoot Windows FoldersWin32 and Store App FoldersWindows Operating System FoldersUser Account FoldersWindows Log FoldersWindows Temporary File FoldersWindows File TypesManaging the Shell User FoldersFile System Tools and UtilitiesFile Management from the Command LineHow File Systems Handle Files DifferentlyTroubleshooting File and Folder PermissionsACLs, DACLs, and PermissionsNTFS InheritanceUsign GroupsEffective AccessTaking OwnershipAuditingTroubleshooting File and Folder SharingChapter 29: Researching Difficult ProblemsReading the Windows Log FilesLog Text FilesReading .xml and .etl FilesReading .dmp filesSearching the Internet for SolutionsAnswers.Microsoft.comSupport.Microsoft.comTechnet.Microsoft.com and MSDN.Microsoft.comOther Microsoft and Third-Party Support SitesHardware Driver and Support SitesThird-Party Support ToolsChapter 30: Troubleshooting Difficult Problems“Mike Halsey’s Holistic Troubleshooting Agency”Gauging Both Internal and External FactorsUsing Troubleshooting Tools TogetherTroubleshooting and Repairing HardwareMinimal Boot Configuration and Jumpstarting PCsChapter 31: Installation and RestoreTroubleshooting the Windows 10 UpgradeInstalling Windows 10Obtaining Up-to-Date Installation MediaCreating Customized Installation MediaNondestructively Reinstalling Windows 10Windows 10 SysPrep
Computer Vision and Augmented Reality in iOS
Learn how computer vision works, how augmented reality renders digital graphics into the physical world via an iPhone’s camera, and how to incorporate these technologies into your own apps. This book shows you how to take full advantage of computer vision technologies.Interacting with other people online usually involves user-generated images and videos; whether it be “memes”, short videos, or heavily-modified images. Before smart phones, generating this content required a professional using high-level image and video editing software. Not any more.This book will teach you to use computer vision in the most popular ways, such as for facial recognition, image to text analysis and, of course, recording a video of a dancing hot dog in your living room. Starting with the history of computer vision, image and video processing fundamentals, and an introduction to developing augmented reality applications, you’ll learn to incorporate computer vision both in the content you create and the apps you develop for end users.Computer Vision and Augmented Reality in iOS reveals how every user with access to the Internet and a smart phone can easily generate heavily-modified images and videos.WHAT YOU'LL LEARN* Incorporate mathematics related to computer vision into your apps* Host computer vision models remotely for mobile use* Implement visual-inertial state estimation algorithms for mobile augmented realityWHO THIS BOOK IS FORProfessionals or post graduate students in software development or engineering who have a basic understanding of how software development works and are interested in implementing computer vision into their development. It's recommended that readers already have a working knowledge of C++ and Swift. AHMED BEKHIT is the Co-Founder and Chief Technology Officer at Magic Studio; a software company based in Boca Raton, Florida that focuses on developing cutting edge video processing and streaming technologies. In the early days of Ahmed’s career in Software Engineering, he was awarded the Apple WWDC Scholarship three times in a row and was also titled “Apple’s Whiz Kid” by the Wall Street Journal at the age of 15. As of today, Ahmed has been writing software for over a decade. He also regulary contributes to the open-source community and has been known for creating ARVideoKit; an iOS framework that renders ARKit content to capture videos, GIFs, and live photos with augmented reality components. Ahmed has developed and published independent iOS applications that have reached over three million users.1. Brief History of Computer VisionThis chapter will focus on the history of computer vision, what it is, the importance of it and its applications.a. What is Computer Vision?b. Why do we need it?c. The evolution of Computer Visiond. Computer Vision Applications2. Introduction to Augmented RealityThis chapter will introduce Augmented Reality and its different applications to the reader.a. What is augmented reality?b. How does it work?c. How can I use this technology?3. Image and Video Processing FundamentalsThis chapter will go over fundamental mathematics and algorithms that will be used throughout the book.a. Math overviewb. Computer Vision basicsc. Standard algorithmsd. Implementing standard algorithms using OpenCV4. Building Computer Vision Applications using OpenCV & Vision FrameworkThis chapter will cover various Computer Vision applications and how to implement them.a. Face Detection / Recognitionb. Body Detection / Trackingc. Image to Text Analysis5. Building Custom ModelsThis chapter will cover developing custom Computer Vision models / algorithms.a. Custom Object Trackingb. Custom Barcode Generator / Reader (similar to Snapchat Codes aka Snapcodes)6. Augmented Reality using OpenCVThis chapter will cover the two main approaches used in the Augmented Reality industry; marker-based & marker-less AR.a. Marker-based Augmented Realityb. Marker-less Augmented Reality using Visual Inertial Estimation on a Phone7. Augmented Reality using ARKit & OpenCVThis chapter will cover how to use both ARKit and OpenCV technologies simultaneously.a. Using Body Tracking with ARKitb. Using Face Detection with ARKit