Computer und IT
Interprocess Communication with macOS
Build highly modular software in macOS that interacts deeply and intuitively with other programs. This book explores all techniques available for Inter-process communications (IPC) from high level macOS layers to deep kernel options while applying theoretical concepts into practical implementations on real world scenarios.You'll see how IPC techniques are used for exchanging data and messages among multiple threads in one or more processes, which may be running on one or more computers connected by a network or running locally. IPC methods can be divided into methods for message passing, synchronization, shared memory, and remote procedure calls (RPC). A poorly conceived IPC can even expose an entire network to over-the-network attacks. Despite the risks, processes and applications absolutely need to communicate with each other across your system and the network. You'll see how these communications facilitate information sharing, computational speedup, modularity, convenience, and privilege separation.In macOS, a program has a number of ways to communicate with other programs. These mechanisms for IPC often exist in different layers of the system. You'll examine how each has its own specific purposes, limitations, and intended scenarios. Some are more suitable than others for code written at a certain level of the system. For example, a kernel extension would not make use of Apple events.Additionally, the book reveals that different users have different rights when it comes to accessing files, changing system wide settings, and so on, depending on whether they are admin users or ordinary users. Running code with root or administrative privileges can intensify the dangers posed by security vulnerabilities. You'll learn that to elevate privileges safely, it is mandatory for the application to perform the task through a secure Helper process.WHAT YOU'LL LEARN* Expand the capabilities of your programs by sharing data within multiple applications* Understand and dig deep into the world of Helper tools to create apps that need user privilege elevation* Enhance the modularity of a system by allowing your applications to interact and share data with a websiteWHO THIS BOOK IS FORSoftware engineers and architects designing and developing secure applications for macOS and iOS who have hands-on knowledge of Swift with XCode.HEM DUTT started his software engineering career in 2010 as a macOS (OS X) application developer and thereafter designed and developed numerous native macOS and iOS applications for various clients across the globe while working in multiple MNCs. With more than a continuous decade of experience working in macOS, Hem Dutt has developed applications in multiple domains; including healthcare, insurance, VPN clients, publishing, and IOT. His passion for designing and developing secure, reliable, and modular software is evident from his blogs, client awards/recommendations, and open source projects.CHAPTER 1 : INTRODUCTION TO IPC ON MACOSChapter Goal : In this chapter, we’ll explore the basics of IPC and touch upon various techniques.· Evolution of IPC.· IPC on macOS.· Real world problems requiring an IPC solution.· Available IPC techniques on macOS.CHAPTER 2 : IPC THROUGH SHARED MEMORYChapter Goal : In this chapter, we’ll learn IPC using shared memory techniques.· Introduction to shared memory.· Creating a server application to pass data to a client application.· Implementing a client to consume data passed by a server application.· Pros of IPC through Shared Memory.· Cons of IPC through Shared Memory.· Discussion on real world scenarios and applications.CHAPTER 3 : IPC THROUGH MACH PORTSChapter Goal : In this chapter, we’ll learn IPC using Mach Ports.· Introduction to Mach Ports.· Creating a server application to pass data to a client application.· Implementing a client to consume data passed by a server application.· Pros of IPC through Mach Ports.· Cons of IPC through Mach Ports.· Discussion on real world scenarios and applications.CHAPTER 4 : IPC THROUGH SOCKETSChapter Goal : In this chapter, we’ll learn IPC using Sockets.· Introduction to Sockets· Using Socket and Socket Streams.· Creating a server application to pass data to a client application.· Implementing a client to consume data passed by a server application.· Pros of IPC through Socket.· Cons of IPC through Socket.· Discussion on real world scenarios and applications.CHAPTER 5 : IPC THROUGH APPLE EVENTSChapter Goal : In this chapter, we’ll learn IPC using Apple Events.· Introduction to Apple Events.· Introduction to Apple Scripts.· Apple Script Lexical convention.· Apple Script Fundamentals.· Script objects and Handlers.· Apple Script references.· Working with libraries and errors.· Creating a server application to pass data to a client application.· Implementing a client to consume data passed by a server application.· Pros of IPC through Apple Events.· Cons of IPC through Apple Events.· Discussion on real world scenarios and applications.CHAPTER 6 : IPC THROUGH DISTRIBUTED NOTIFICATIONSChapter Goal : In this chapter, we’ll learn IPC using Distributed Notifications.· Introduction to Notifications.· Key value observing.· Notification center.· Notification Queue.· Distributed Notifications.· Creating a server application to pass data to a client application.· Implementing a client to consume data passed by a server application.· Pros of IPC through Distributed Notifications.· Cons of IPC through Distributed Notifications.· Discussion on real world scenarios and applications.CHAPTER 7 : IPC THROUGH PASTEBOARDSChapter Goal : In this chapter, we’ll learn IPC using Pasteboards.· Introduction to Pasteboards.· Creating a Pasteboard item.· Reading and writing to a pasteboard.· Pasteboard data provider—content options and ownership.· Creating a server application to pass data to a client application.· Implementing a client to consume data passed by a server application.· Pros of IPC through Pasteboards.· Cons of IPC through Pasteboards.· Discussion on real world scenarios and applications.CHAPTER 8 : IPC THROUGH DISTRIBUTED OBJECTSChapter Goal : In this chapter, we’ll learn IPC using Distributed Objects.· Introduction to Distributed Objects.· Distributed Objects architecture.· Connections and proxies.· Ports and name servers.· Message encapsulation.· Vending an Object.· Getting a vended object.· Configure a connection.· Authenticating connections.· Error handling.· Substitution during message encoding.· NSInvocation· Creating a server application to pass data to a client application.· Implementing a client to consume data passed by a server application.· Pros of IPC through Distributed Objects.· Cons of IPC through Distributed Objects.· Discussion on real world scenarios and applications.CHAPTER 9 : IPC BETWEEN A NATIVE APP AND WEB APPChapter Goal : In this chapter, we’ll learn about techniques for implementing IPC between a native app and a web app.· Introduction to WebKit.· Understanding Deep linking with URL schemes and Universal links.· Embedding webview in a native app.· Capturing url redirects from webview in a native app.· Call Java Script methods on a website from a native app.· Call native functions in an app from a web page.· Implement SSL pinning for enhanced security.· Creating a server application to pass data to a client application.· Implementing a client to consume data passed by a server application.· Pros of IPC through Distributed Objects.· Cons of IPC through Distributed Objects.· Discussion on real world scenarios and applications.CHAPTER 10 : ADVANCED HELPER TOOLSChapter Goal : In this chapter, we’ll learn about techniques for implementing IPC using Helper tools.· Introduction to macOS Daemons and Services.· Daemon architecture and lifecycle.· Service management.· Creating XPC services.· Creating launch daemons and agents.· Introduction to privileges.· Security vulnerabilities with enhanced privileges.· Validating input for IPC.· Elivating privilages safely.· Designing secure helpers· Creating an application to pass data to a Helper application.· Implementing Helper to consume data passed by an application.· Pros of Helper tools.· Cons of Helper tools.· Discussion on real world scenarios and applications.
Extending Kubernetes
Rely on this comprehensive guide to understand the extension patterns and discover the extension plugins for Kubernetes.In this book, state-of-the-art extension patterns and extension points of Kubernetes are covered in depth with real-life use cases and examples. There are comprehensive discussions in the text on all possible aspects of Kubernetes, starting from end-user to the fully-automated controller development. The book focuses on creating applications that work on Kubernetes and also interact and operate Kubernetes itself.The book starts with a recap of Kubernetes, its rich configuration options, extension patterns, and points. The journey of extending Kubernetes starts with the CLI tool plugins. By the end of this section, you will be able to create and manage kubectl plugins. Then, the API access plugins with authentication and authorization webhooks are presented. In this section, you will learn how to extend and interfere with the API flow of Kubernetes. You then move on to learn how to extend Kubernetes API with new resources and controllers. You will make Kubernetes API work for you by creating a Kubernetes operator. Extensions for Kubernetes schedulers are covered to create a custom scheduler and run it side-by-side with the default scheduler. Finally, the last extension points will be discussed for the infrastructure, such as networking or storage. At the end of the text, you will learn the upcoming extension points. This book is designed to cover all the extension points of Kubernetes with state-of-the-art implementations.This book is intended for those who wish to understand Kubernetes in depth and go further by making Kubernetes work for their custom requirements. By the end of this book, readers with a cloud-native mindset will broaden their vision to create future-proof applications. Rather than focus on overwhelming theoretical information and YAML files for Kubernetes resources, readers are provided with the philosophy behind Kubernetes extensions. With real-life examples and hands-on development steps, you will be more confident in working with Kubernetes.WHAT YOU WILL LEARN* Know the Kubernetes extension patterns and available extension points * Be familiar with the philosophy behind Kubernetes extensions and how they should be integrated into the clusters* Design Kubernetes extensions and make Kubernetes work for you* Develop, deploy, and operate plugins for Kubernetes ranging from the CLI tool to custom resources, schedulers, infrastructure, and more * Study real-life use cases for extending Kubernetes with code examplesWHO THIS BOOK IS FORSoftware engineers, developers, DevOps engineers, cloud security analysts, architects, and managers who have Kubernetes in their short- and long-term plansONUR YILMAZ is a senior software engineer at a multinational enterprise software company. He is a Certified Kubernetes Administrator (CKA) and works on Kubernetes and cloud management systems. He is a keen supporter of cutting-edge technologies, including Docker, Kubernetes, and cloud-native applications. He is the author of multiple books on Kubernetes, Docker, serverless architectures, and cloud-native continuous integration and delivery. He has one master and two bachelor degrees in the engineering field.Chapter 1: IntroductionCHAPTER GOAL: Provide an introduction to Kubernetes, configuration options, extension patterns, and extension points with real-life use casesNO OF PAGES: 25-30SUB-TOPICS:1. Kubernetes Recap2. Configuring Kubernetes Cluster3. Kubernetes Extension Patterns4. Kubernetes Extension PointsChapter 2: kubectl pluginsCHAPTER GOAL: Understand how to extend Kubernetes CLI tool, kubectl, for the custom requirements. How to develop, install and release new plugins for kubectlNO OF PAGES: 30-35SUB-TOPICS:* kubectl Installation and Usage* kubectl Plugin Design* Create Your First kubectl Plugin* Plugin Repository and LifecycleCHAPTER 3: API FLOW EXTENSIONSCHAPTER GOAL: Understand the flow of Kubernetes API server to handle requests. Learn how to extend the flow with authentication, authorization, and admission controls.NO OF PAGES: 25-30SUB -TOPICS:* Authentication WebhooksAuthorization Webhooks * Dynamic Admission ControlCHAPTER 4: EXTENDING KUBERNETES APICHAPTER GOAL: Discuss how Kubernetes API can be extended with custom resources and the automation of the custom resources, namely operators.NO OF PAGES: 50-55SUB-TOPICS:* Kubernetes API Overview* Kubernetes Client Libraries* Custom Resources in Kubernetes* Operator Pattern in Kubernetes* kubebuilder Framework* Operators in ActionCHAPTER 5: SCHEDULER EXTENSIONSCHAPTER GOAL: Learn how Kubernetes scheduling mechanism works and how it could be extended. Write, deploy, and use a custom scheduler for Kubernetes cluster.NO OF PAGES: 35-40SUB-TOPICS:* Kubernetes Scheduler OverviewDevelop and Deploy a Custom Scheduler * Configure and Manage Multiple Schedulers CHAPTER 6: INFRASTRUCTURE EXTENSIONSCHAPTER GOAL: Discover how Kubernetes interacts with the infrastructure in terms of storage and networking. Learn how to extend Kubernetes clusters with new pod networking and volume drivers.NO OF PAGES: 25-30SUB-TOPICS:* Storage Plugins* Network Plugins (They are still in development, and in alpha stage, if they become stable, it is an excellent asset to have in the book) CHAPTER 7: UPCOMING EXTENSION POINTSCHAPTER GOAL: Summarize the extension points of Kubernetes and discuss the upcoming trends and libraries in the market.NO OF PAGES: 20-25
Programmieren lernen für Dummies (2. Auflg.)
Haben Sie auch schon mal den Wunsch verspürt, programmieren zu können? Oder wenigstens zu verstehen, wie Computer ticken, die unser Leben bestimmen? Dieses Buch führt in die Denkweise von Programmierern und die Funktionsweise von Programmen ein und zeigt Ihnen, worauf Sie beim Programmieren achten müssen: Geben Sie eindeutige Anweisungen, sichern Sie sich immer gegen alle Eventualitäten ab und kommen Sie mit den gegebenen, beschränkten Mitteln aus. Gut, dass der Computer wenigstens nicht murrt, wenn er monotone Tätigkeiten ausführen muss! Am Ende des Buches angelangt, haben Sie einen wichtigen Ausschnitt unserer Welt besser kennen gelernt und Einblicke in allgemeine Programmierkonzepte und zwei Programmiersprachen erhalten. Dann sind Sie in der Lage, fundiert zu entscheiden, ob und wie Sie Ihr Wissen weiter vertiefen wollen. Daniel Lorig programmiert bereits seit seiner Schulzeit und hat 2010 sein Master-Studium in Informatik an der Universität des Saarlandes in Saarbrücken abgeschlossen. Danach hat er als Softwareentwickler in einem saarländischen Unternehmen gearbeitet. Mittlerweile selbstständig, liegt sein Fokus nun auf der Programmierung und Gestaltung von Webseiten.Über den Autor 7Einleitung 21TEIL I: GRUNDLAGEN DER PROGRAMMIERUNG29Kapitel 1: Von der Idee zum Programm 31Kapitel 2: Programmiersprachen: Ein Überblick 41Kapitel 3: So lernen Sie programmieren 53Kapitel 4: Was sich alles programmieren lässt 61Kapitel 5: Algorithmen erstellen 77Kapitel 6: Wichtige Konzepte in Programmiersprachen 87Kapitel 7: Fortgeschrittene Programmiertechniken 107TEIL II: PROGRAMMIEREN MIT JAVA135Kapitel 8: Compiler und Entwicklungsumgebung 137Kapitel 9: Die ersten Schritte in der Java-Programmierung 145Kapitel 10: Variablen und Datentypen in Java 161Kapitel 11: Ablaufsteuerung in Java 177Kapitel 12: Objektorientierte Programmierung in Java 189Kapitel 13: Weitere Features von Java 221Kapitel 14: Die Klassenbibliothek von Java 241Kapitel 15: Grafische Benutzeroberflächen 263TEIL III: PROGRAMMIERUNG FÜR DAS WEB MIT PHP291Kapitel 16: Einführung in HTML 293Kapitel 17: Werkzeuge für die Webprogrammierung 311Kapitel 18: Einstieg in die PHP-Programmierung 321Kapitel 19: Datenbankprogrammierung 349Kapitel 20: Dynamische Webseiten programmieren 365TEIL IV: WERKZEUGE FÜR PROGRAMMIERER399Kapitel 21: Fehler finden und beseitigen 401Kapitel 22: Die Macht des Internets nutzen 419Kapitel 23: Versionskontrolle 427TEIL V: DER TOP-TEN-TEIL439Kapitel 24: (Ungefähr) 10 externe Zusatzbibliotheken für Java 441Kapitel 25: (Mehr als) 10 nützliche Webseiten für Programmierer 447Stichwortverzeichnis 453
Mastering Swift Package Manager
Maintaining an iOS project often results in thousands of code files scattered around your folders. Did you ever wanted to reuse those files with other projects but found yourself making copies of Swift files? You are not alone! Many iOS developers struggle with this issue as well—unorganized projects, duplicated files, difficulty in testing, and long complication times. This book will show how Swift Package Manager can help you handle these problems by restructuring your project to make it efficient and straightforward.Swift Package Manager isn’t magic, but you’ll likely need a little guidance in using this nifty tool. You'll see how to reorganize projects smartly and efficiently, create your first Swift package, and learn what libraries are in this context. Then share your package with the rest of your projects. Next test your library’s quality. And then take your library to the next level of power by including files that go beyond just code.By going over the methodology of big project organization, you will have the ability to extend your project into the future as Apple sees it. Make no mistake—the path for a modular and flexible project is not easy. With the help of Swift Package Manager, it becomes possible and worth it.WHAT YOU'LL LEARN* Create a Swift package both from the command line and from Xcode* Manage Swift packages in public and private Git repositories* Build test suites to test integrations between packagesWHO THIS BOOK IS FORSenior iOS developers and team leaders who already have professional experience with Swift. AVI TSADOK is an accomplished iOS Developer with almost a decade of experience. He currently heads mobile developemnt at Any.do, a leading productivity app. He's also a regular contributor to "Better Programming" and has an active presence on Medium. He uses writing to combine his passion for helping educate the development community while working on refining his own skills in developing. Chapter 1 – Introduction – Clean Your RoomIntroductionPersonal ViewModularity is not a slogan – it’s a way of livingThe Future by AppleHow to read this bookSummaryChapter 2 – Organized MessIntroductionOur Weather AppThe Project NavigatorModular AppsPrinciplesDesign a modular app.Frameworks and BundlesCocoapods and CarthageStatic and Dynamic LibrariesSummaryChapter 3 – Swift Package to the RescueIntroductionCreate our first packageCommand Line ToolOr from XcodeDocument your package with Readme.md fileMeet the package brain – the manifest fileIntegrate our package within the appSummaryChapter 4 – Manage DependenciesIntroductionDependencies’ MethodologicReorganize our project.Remote DependencyManifest FileVersion LockLocal DependencySwift Build commandSummaryChapter 5 – Move to GITIntegrateUpload our first package to gitIntegrate our package to XcodeIntegrate our package to another packageDealing with private repositoriesThe importance of Integration TestsSummaryChapter 6 – Stay Local with Mono RepoIntroductionCode Sharing is Not SimpleMeet Mono RepoMono Repo Best PracticesSummaryChapter 7 – Unit and Integration TestsIntroductionTesting is carryingWriting the package unit testTest a package from the command lineBuild an integration test projectSummaryChapter 8 – Add Some Spice with ResourcesIntroductionAdding Files to a swift packageTypes of resourcesImagesLocalization filesUI files (Xib, storyboards)SwifttUIUse CasesSummary
UX-Design überzeugend vermitteln
Erfolgreich mit Kunden und Stakeholdern kommunizieren und die bestmögliche User Experience erzielen.Wie gut Ihr Design auch sein mag: Ohne die Unterstützung von Nicht-Designerkollegen, Stakeholdern und Kunden werden aus Ihren Entwürfen niemals Produkte. UX-Designer und -Designerinnen verbringen den größten Teil ihrer Arbeitszeit nicht mit dem Design selbst, sondern mit der Kommunikation und Diskussion von Designentscheidungen.Dieser praktische Leitfaden konzentriert sich auf Prinzipien, Taktiken und umsetzbare Methoden zur erfolgreichen Präsentation Ihrer Entwürfe. Ganz gleich, ob Sie Apps, Websites oder Produkte designen: Sie werden lernen, wie Sie sich die Unterstützung derjenigen Personen sichern, die wirklichen Einfluss auf ein Projekt haben – immer mit dem Ziel, die bestmögliche User Experience zu realisieren.Zum AutorTom Greever entwirft seit mehr als 20 Jahren Schnittstellen und leitet Designteams. Sein umfangreiches Wissen darüber, wie bessere Kommunikation zu großartigem Design führt, geht auf seine breite Erfahrung als UX Designer, Executive Design Leader und Consultant zurück. Er coacht und berät Teams zu Designpraktiken und Kommunikation sowohl in großen Unternehmen als auch in kleinen Start-ups rund um die Welt.
Pro PHP 8 MVC
Examine the building blocks that make any good MVC framework using PHP 8. This book exposes all the considerations that many developers take for granted when using a popular framework, and teaches you how to make this MVC framework your own.You'll quickly get started writing your first bit of framework code, then, you build a variety of examples using aspects of an MVC framework, including a router, a template engine, a database library, a persistence engine (ORM), and a testing framework. In the next section, you'll implement sessions, caches, file systems, queues, logging, and mail. You'll wrap up by building a larger scale sample web application: a sales website for a company that sells rockets.Along the way, this book lays bare all the secret parts of MVC to take with you to apply to your own PHP-based MVC projects.WHAT YOU WILL LEARN* Build PHP-based web applications using the model view controller (MVC) architecture * Write your first bit of framework code* Compare the code you write with how the popular frameworks do the same kinds of thingsCreate various aspects of applications, engines, and other frameworks * Wrap up with a sample case study applicationWHO THIS BOOK IS FORExperienced PHP and web developers. Some prior experience with PHP and web development at least recommended.Christopher Pitt is an experienced PHP and JavaScript/CSS web developer and writer, working at SilverStripe. He usually works on application architecture, though sometimes you’ll find him building compilers or robots. He is also the author of several web development books and is a contributor on various open source projects such as AdonisJs and Masonite.1: Ways to Use PHP2: Writing Our First Bit of Code3: Building a Router4: Building a Template Engine5: Building a Validator6: Building a Database Library7: Building an Object-Relational Mapper Library8: Building a Dependency Injection Container9: Testing Our Framework10: Config, Cache, Sessions, Filesystems11: Queues, Logging, Emails12: Publishing Your CodeAfterword: Wrapping Up
Geniale Apps für Senioren
60 neue Apps fur mehr Lebensqualitat - von cleveren Alltagshelfern uber Fitness und Gesundheit bis hin zu Kultur, Genuss und Freizeit. Die Stiftung Warentest prasentiert die praktischsten Apps und stellt die jeweiligen Pros und Kontras vor. Die Experten erklaren Schritt fur Schritt, wie Apps sicher installiert, verwaltet und geloscht werden, woran man vertrauenswurdige Apps erkennt und wie man seine Daten am besten schutzt. Bleiben Sie mit Ihrer Familie in Kontakt und lernen Sie Menschen in Ihrer Nhe kennen. Behalten Sie Ihre Gesundheit im Blick und entdecken neue Rezepte fr eine ausgewogene Ernhrung. Finden Sie Wochenmrkte in Ihrer Umgebung und durchstreifen Sie auf Ihrem Smartphone die schnsten Museen. Erledigen Sie Ihre Bankgeschfte bequem vom Sofa aus und behalten Sie Ihre Depots im Blick. Erstellen Sie Fotobcher, verschicken eigene Fotos als echte Postkarten, planen Sie Ausflge und Touren mit dem E-Bike. 60 Apps, die Spa machen und ganz neue Mglichkeiten erffnen - alle fr iPhone und Android.
Introduction to Python Network Automation
Learn and implement network automation within the Enterprise network using Python 3. This introductory book will be your guide to building an integrated virtual networking lab to begin your Network Automation journey and master the basics of Python Network Automation.The book features a review of the practical Python network automation scripting skills and tips learned from the production network, so you can safely test and practice in a lab environment first, various Python modules such as paramiko and netmiko, pandas, re, and much more. You'll also develop essential skills such as Python scripting, regular expressions, Linux and Windows administration, VMware virtualization, and Cisco networking from the comfort of your laptop/PC with no actual networking hardware. Finally, you will learn to write a fully automated and working Cisco IOS XE upgrade application using Python.Introduction to Python Network Automation uses a canonical order, where you begin at the bottom and by the time you have completed this book, you will at least reach the intermediate level of Python coding for enterprise networking automation using native Python tools.WHAT YOU'LL LEARN* Build a proper GNS3-based networking lab for Python network automation needs* Write the basics of Python code in both the Windows and Linux environments* Control network devices using telnet, SSH, and SNMP protocols using Python codes* Understand virtualization and how to use VMware workstation* Examine virtualization and how to use VMware Workstation Pro* Develop a working Cisco IOS upgrade application WHO THIS BOOK IS FORIT engineers and developers, network managers and students, who would like to learn network automation using Python.Brendan is currently working as a Senior Technical Consultant for Australia’s leading Telco, Telstra. Telstra is the largest Australian Internet Service Provider (ISP) as well as one of the leading IT System Integrator and Managed Services Provider in Australian IT industry. He has more than 15 years of hands-on experience working with Cisco Networking, Unified Collaboration, VMware Virtualization and Operating System Administration. He began his IT career in Cisco Systems and then moved onto various roles in leading System Integrators in Australian IT scenes. He is currently working on a number of external clients’ environment and supports a diverse IT ecosystem, currently focusing on Python Network Automation. This book is largely based on Python network Automation he has developed in his previous job and the original book, “Python Network Automation: by building a virtual lab”. Also, this book is a memoir of Network Automation Journey leveraging off the power of Python as the preferred Programming Language.INTRODUCTION TO PYTHON NETWORK AUTOMATIONChapter 1: Introduction to Python Network AutomationChapter 2: Learn Python Basics on WindowsChapter 3: More Python ExercisesChapter 4: Introduction to VMware WorkstationChapter 5: Creating Virtual Machines Using Ubuntu 20 Server ImageChapter 6: Creating Virtual Machines Using CentOS 8 Server ImageChapter 7: Linux FundamentalsChapter 8: Linux Basic AdministrationChapter 9: Regular Expressions for Network AutomationChapter 10: GNS3 BasicsChapter 11 Cisco IOS LabsChapter 12. Building a Python Automation Lab EnvironmentChapter 13. Python Network Automation Lab: Basic TelnetChapter 14. Python Network Automation Labs: SSH Paramiko and NetmikoChapter 15. Python Network Automation Labs: Cron and SNMPv3Chapter 16. Python Network Automation Labs: Ansible, pyATS, Docker, and Twilio APIChapter 17. Upgrading Multiple Cisco IOS XE RoutersChapter 18. Python Network Automation Lab: Cisco IOS Upgrade mini-tools DevelopmentChapter 19. Python Network Automation Labs Combining and Completing Cisco IOS Upgrade Application
Comparison between Internet Fax Services
Internet faxing uses the same principles as facsimile transmission, but it uses a Web interface instead of a fax machine. It can be a flexible, inexpensive option for transmitting documents.Internet fax services usually assign a fax number to each person who signs up for the service. people can send faxes to this number, and customers can send faxes via e-mail without using a fax machine.To send a fax through an Internet fax service:• The sender attaches a document to an e-mail message. The document can be a scan of a paper document, or it can be created in a program like Microsoft Word.• The sender addresses the message to the recipient's fax number, followed by the name of the faxing service (for example: 18005551234@emailfaxes.com).• The service translates the attachment so that a fax machine can read it.• The service sends the data across the phone line.• The recipient's fax machine decodes the data and prints the fax.To receive a document from a traditional fax machine through an Internet fax service:• The sender dials the fax number that the service has assigned to the recipient.• The fax machine translates the data and transmits it over the phone line.• The service receives the data, translates it into an image file and sends the image to the recipient's e-mail address.• The recipient opens the em-ail message and the attachment and views the file.As getting cheap internet fax service is important, I tried to look for cheap internet fax service that can fax to any country worldwide and can also use PayPal as it is safe payment than credit card. Unfortunately, I could not find cheap fax service for international destination. All internet fax services offer only cheap services to the free zones countries such as usa and Canada. I could not find cheap service to international destinations.Maybe the best of my search for faxing to international destination was FAX.PLUS that allows also paypal. But when I tried to subscribe to basic plane using paypal, paypal asked me to give them permission to access my registered credit card, and I refused that and so I could not subscribe.I will divide web sites that I had look to their internet fax services in the following groups1-Part1: Websites that accepts paypal payments and supports faxing to international countries. Some of these are:• Gotfreefax• fax.to• Faxfresh• PamFax.biz• Faxzero• FAX.PLUS2-Part2: Websites that accepts only credit/debit card payments and supports faxing to international countries• Hellofax• J2 global services vendors. It includes Metrofax, myfax, smartfax, efax, trustfax, rapidfax and fax.com3-Part3: Websites that supports faxing to usa and Canada only• Nextiva• FAXAGE• FAXBetterIn this report, I will compare the internet fax services according to the cost for sending fax to United Arab Emirate. I will assume that I have three pages to be sent to any fax number in UAE.I am Dr. Hidaia Mahmoud Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator.I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering.I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http:// www.anticorruption.000space.comMy personal website: www.hidaia-alassouli.000space.comEmail: hidaia_alassouli@hotmail.com
Data Engineering 4.0
Digitale Systeme und Infrastrukturen werden in der Regel gemeinsam oder wie im öffentlichen Sprachgebrauch üblich, „geteilt“ genutzt.Das gilt sowohl für die Systeme und Infrastrukturen selbst, als auch für Daten, die häufig als das Öl der Digitalisierung bezeichnet werden.In industriellen Nutzungen sind Daten in den meisten Fällen eine geschäftskritische Ressource und können nicht, wie im privaten Nutzungsumfeld, bedingungslos und uneigennützig Dritten überlassen werden. Dennoch ist das Teilen von Daten für industrielle Anwendungen gewünscht und häufig auch zwingend notwendig, aber ebenso häufig unzulässig und gefährlich. Genauso zwingend wie das Teilen von Daten ist in industriellen Anwendungen das nutzungsgerechte und passgerechte Zusammenführen von Daten unterschiedlicher Bedeutung zu Daten-Konglomeraten.Um die digitale Souveränität gemeinsam berechtigter Nutzer von Daten gewährleisten zu können, muss zur Bewältigung dieser beiden Aufgaben ein systematisches Data Engineering bereitgestellt werden.HERBERT WEBEr war Universitätsprofessor im Fachbereich Informatik der Technischen Universität Berlin sowie Gründer und langjähriger Leiter des Fraunhofer-Instituts für Software und Systemtechnik. Informationen und Informationsmodelle.- Informationsmodellierung für industrielle Anwendungen.- Methoden der Informationsmodellierung.- Kompositionale konstruierte Informationsmodelle.- Extensionale Konstruktionen.- Intensionale Konstruktionen.- Das HERMES Komponentenmodell.- Zusammenfassung.
Multi-Site Network and Security Services with NSX-T
Know the basics of network security services and other stateful services such as NAT, gateway and distributed firewalls (L2-L7), virtual private networks (VPN), load balancing (LB), and IP address management. This book covers these network and security services and how NSX-T also offers integration and interoperability with various other products that are not only created by VMware, but are also referred by VMware as third-party integrated vendors.With the integration of VMware vRealize Automation, you can automate full application platforms consisting of multiple virtual machines with network and security services orchestrated and fully automated.From the operational perspective, this book provides best practices on how to configure logging, notification, and monitoring features and teaches you how to get the required visibility of not only your NSX-T platform but also your NSX-T-enabled network infrastructure.Another key part of this book is the explanation of multi-site capabilities and how network and security services can be offered across multiple on-premises locations with a single management pane. Interface with public cloud services also is included. The current position of NSX-T operation in on-premises private clouds and the position and integration with off-premises public clouds are covered as well.This book provides a good understanding of integrations with other software to bring the best out of NSX-T and offer even more features and capabilities.WHAT YOU WILL LEARN* Understand the NSX-T security firewall and advanced security* Become familiar with NAT, DNS, DHCP, and load balancing features* Monitor your NSX-T environment* Be aware of NSX-T authentication and authorization possibilities* Understand integration with cloud automation platforms* Know what multi-cloud integrations are possible and how to integrate NSX-T with the public cloudWHO THIS BOOK IS FORVirtualization administrators, system integratorsIWAN HOOGENDOORN started his IT career in 1999 as a help desk agent. Soon after, he started to learn Microsoft products and obtained MCP, MCSA, MCDBA, and MCSE certifications. While working as a Microsoft Systems Engineer, Iwan developed additional skills and knowledge in computer networking. Networking became a passion in his life. This passion resulted in learning networking with Cisco products. One of Iwan's dreams was to work for Cisco. But before this could happen, he first needed to finish his bachelor's degree in ICT, which he completed in 2009. In early 2010, he started working for his dream company, Cisco. After finishing his master's degree (part-time) in computer science at the University of Amsterdam and becoming a CCIE (#13084) in six different technology areas, Iwan wanted to learn something new, and that was virtualization. Because networking was something that ran through his veins, network virtualization was the next logical step. So he decided to learn VMware NSX.Iwan got the opportunity to work for VMware in 2016 as Senior NSX PSO Consultant. In his time at VMware, he gained more knowledge on private and public clouds and the related products that VMware developed to build the Software-Defined Data Center (SDDC). As new technology is growing at a rapid pace (especially within VMware and the VMware cloud space), Iwan is trying to keep up.After working for four years as Senior NSX PSO Consultant (primarily with VMware NSX-v and NSX-T), Iwan was promoted to Staff SDDC Consultant, focusing on the full SDDC stack that includes Hyperscaler offerings on the main public clouds such as AWS (VMC on AWS), Microsoft (Azure VMware Solution), and Google (Google Cloud VMware Engine).Iwan is certified on multiple VMware products, including NSX, and he is actively working together with VMware certification to develop network-related exams for VMware. Next to his VMware certifications, Iwan is also AWS and TOGAF certified.Iwan is the author of the Apress book, Getting Started with NSX-T: Logical Routing and Switching.· CHAPTER 1o Title: NSX-T SECURITY | FIREWALLo Chapter Goal: The theory about the Basic Security Services offered by NSX-T followed by the deployment’s details and steps with proper verification.o Number of Pages: 20o Subtopics:§ Gateway Firewalls§ Distributed Firewall§ Security Profiles§ Time-Based Firewall Policy· CHAPTER 2o Title: NSX-T ADVANCED SECURITYo Chapter Goal: The theory about the Advanced Security Services/features offered by NSX-T.o Number of Pages: 20o Subtopics:§ Distributed IDS§ Layer-7 Context Profiles§ Identity based Firewall§ Bare Metal Server Security· CHAPTER 3o Title: NSX-T SERVICE INSERTIONo Chapter Goal: The theory about the Security Services/features offered by 3rd Party vendors from VMware’s perspective and how the integration works.o Number of Pages: 15o Subtopics:§ East/West Third-party service insertion§ North/South Third-party service insertion§ End-Point Protection§ Network Introspection Settings· CHAPTER 4o Title: NETWORK ADDRESS TRANSLATION (NAT), DNS AND DHCPo Chapter Goal: Know the difference between SNAT and DNAT and explanation on how to configure NAT, DNS and DHCP IP address Management using the internal NSX-T.o Number of Pages: 20o Subtopics:§ SNAT§ DNAT§ Configure NAT Services§ DNS Zone§ DNS Forwarding Zone§ DHCP Profile§ IP Address Pool§ IP Address Block· CHAPTER 5o Title: LOAD BALANCING (LB)o Chapter Goal: Discuss Load Balancing capabilities and configuration.o Number of Pages: 30o Subtopics:§ Load Balancing Concepts§ Distributed Load Balancer§ Setting up the Load Balancer Components· CHAPTER 6o Title: VIRTUAL PRIVATE NETWORK (VPN)o Chapter Goal: Know the differ types of VPN and how to configure and monitor them.o Number of Pages: 25o Subtopics:§ IPSEC (L3 VPN)§ L2 VPN§ Configuration of VPN· L3· L4§ Monitoring of VPN sessions· CHAPTER 7o Title: NSX-T MONITORINGo Chapter Goal: Tools to verify the Routing and Routing performance.o Number of Pages: 30o Subtopics:§ Network Monitoring§ Logging§ vRealize Network insight integration§ IPFIX§ Network Performance Testing using IPERF Tools§ Monitoring / Events and Alarms§ Logging§ vRealize Log insight integration§ vRealize Operations integration§ Other Operation Tools Integration· CHAPTER 8o Title: AUTHENTICATION AND AUTHORIZATIONo Chapter Goal: Information on how to integrate NSX-T with an external LDAP server and create user (groups) with different roles and rights (RBAC).o Number of Pages: 15o Subtopics:§ vIDM Integration & LDAP Integration§ LDAP only integration§ RBAC· CHAPTER 9o Title: MULTI-SITE AND FEDERATIONo Chapter Goal: Design Principles regarding Multi Site routingo Number of Pages: 40o Subtopics:§ Multi-Site Capabilities§ NSX-T Federation overview§ Networking with Federation§ Security with Federation§ Backup & Restore with Federation· CHAPTER 10o Title: PUBLIC CLOUD INTEGRATIONo Chapter Goal: NSX-T is also used in all major Public Clouds. This chapter gives you an overview on what is deployed there and how NSX-T can be consumed in these Public Clouds.o Number of Pages: 30o Subtopics:§ Forwarding Policies§ VMC on AWS§ Azure VMware Solution (AVS)§ Google Cloud VMware Engine· CHAPTER 11o Title:CLOUD MANAGEMENT PLATFORM INTEGRATION & AUTOMATIONo Chapter Goal: Get familiar on the out-of-the-box automation capabilities and vRO extensibility.o Number of Pages: 20o Subtopics:§ vCloud Director· Allowing Tenants to Create / Use NSX-T Related automated network and security Services§ vRealize Automation / vRealize Orchestration· Allowing Tenants to Create / Use NSX-T Related automated network and security Services§ NSX-T API Capabilities
Monitoring Cloud-Native Applications
Introduce yourself to the nuances of modern monitoring for cloud-native applications running on Kubernetes clusters. This book will help you get started with the concepts of monitoring, introduce you to popular open-source monitoring tools, and help with finding the correct set of use cases for their implementation. It covers the in-depth technical details of open-source software used in modern monitoring systems that are tailor made for environments running microservices.Monitoring Cloud-Native Applications is divided into two parts. Part 1 starts with an introduction to cloud-native applications and the foundational concepts of monitoring. It then walks you through the various aspects of monitoring containerized workloads using Kubernetes as the de-facto orchestration platform. You will dive deep into the architecture of a modern monitoring system and look at its individual components in detail.Part 2 introduces you to popular open-source tools which are used by enterprises and startups alike and are well established as the tools of choice for industry stalwarts. First off, you will look at Prometheus and understand its architecture and usage. You will also learn about InfluxDB, formerly called TICK Stack (Telegraf, InfluxDB, Chronograf, and Kapacitor). You will explore the technical details of its architecture and the use cases which it solves. In the next chapter, you will be introduced to Grafana, a multi-platform open source analytics and interactive visualization tool that can help you with visualization of data and dashboards.After reading this book, you will have a much better understanding of key terminologies and general concepts around monitoring and observability. You will also be able to select a suitable monitoring solution from the bouquet of open-source monitoring solutions available for applications, microservices, and containers. Armed with this knowledge, you will be better prepared to design and lead a successful agile operations team.What You Will LearnMonitor and observe of metrics, events, logs, and tracesCarry out infrastructure and application monitoring for microservices architectureAnalyze and visualize collected dataUse alerting, reporting, and automated actions for problem resolutionWho This Book Is ForDevOps administrators, cloud administrators, and site reliability engineers (SREs) who manage and monitor applications and cloud infrastructure on a day-to-day basis within their organizations.MAINAK CHAKRABORTY works as a senior solutions architect at a leading public cloud company, specializing in cloud management and automation tools. He has been instrumental in shaping the cloud journey of customers across industry segments whether they be established enterprises or born-in-the-cloud startups. Mainak is an open source enthusiast and regularly presents at industry technical events on his favorite topics of automation, cloud native applications, and cloud computing.AJIT PRATAP KUNDAN stands at the leading edge of the innovative technologies of todays’ information technology world. He’s worked with HPE, VMware, Novell, Redington, and PCS and helped their customers in transforming their datacenters through software-defined services. Ajit is a valued author on cloud technologies and has authored two books VMware Cross-Cloud Architecture and Intelligent Automation with VMware published by Packt and has reviewed one book Deep Learning with Pytorch.PART I: INTRODUCTION TO MONITORINGCHAPTER 1: BASIC CONCEPTS OF MONITORINGCHAPTER GOAL: This chapter is about the foundational concepts of monitoring and the associated terminology. It starts with explaining why monitoring is important and also discusses the parameters which can be monitored. We will take a look at the different ways in which monitoring can be done —some systems generate data continuously and others produce data when some event happens. It is most useful for identifying and investigating problems within your systems.No of pages: 20 PagesSub -Topics:1. Overview of Monitoring Concepts2. Proactive and Reactive Monitoring3. Importance of Observability4. What to Monitor – Infrastructure, Application and Services5. Advanced Monitoring of Business KPIs and User ExperienceCHAPTER 2: COLLECTION OF EVENTS, LOGS AND METRICSCHAPTER GOAL: This chapter will explain the difference between Events, Logs and Metrics. It also goes into the details of collection of telemetry from Work Metric and Resource Metric. We will take a look at which data to collect and how to collect that data.No of pages: 40 PagesSub - Topics1. Granularity and Resolution – observations at fixed time interval2. Types of Metrics – Histograms, Gauges, Counters and Timers3. Statistical functions – Count, Sum, Average etc.4. Work Metric – Throughput, Success, Error, Performance5. Resource Metric – Utilization, Saturation, Errors, Availability6. Introduction to Telegraf, collectd, statdCHAPTER 3: ARCHITECTURE OF A MODERN MONITORING SYSTEMCHAPTER GOAL: In this chapter we would take a look at the architecture of a modern monitoring system, its components and the integrations. We would look at how to configure a modern monitoring system, how to manage the collected data, run a query on the data, integrations with alerting tools and the reporting of the analysis.No of pages : 20 PagesSub - Topics:1. Architecture and Components2. Data management3. Query Engine4. Alerting Tools5. VisualizationPART 2- OPEN SOURCE MONITORING TOOLSCHAPTER 4: PROMETHEUSCHAPTER GOAL: This chapter will introduce Prometheus as an open-source monitoring and alerting tool. We will cover the basic concepts, installation and configuration and integration with other tools. We will also look at the use cases which can be delivered with Prometheus and its advantages when compared to Open Source tools like Graphite.No of pages: 50Sub - Topics:1. Introduction to Prometheus2. Architecture and Data Model3. Installation and Configuration4. Instrumenting Prometheus5. Integrations with other solutionsCHAPTER 5: TICK PLATFORMCHAPTER GOAL: We would take a look at Open Source TICK Stack collectively, Telegraf, InfluxDB, Chronograf and Kapacitor. The TICK Stack is a loosely coupled yet tightly integrated set of open source projects designed to handle massive amounts of time-stamped information to support the metrics analysis needs.No of pages: 50Sub - Topics:1. Architecture of TICK Stack2. Deep Dive into Telegraf3. Introduction to Influx DB4. Chronograf and Kapacitor5. Use cases delivered by Tick StackCHAPTER 6: ELASTIC STACK – ELASTIC SEARCHCHAPTER GOAL: In this chapter we will take a look at the open source Elastic Stack – formerly known as the ELK Stack, to understand the practical application of this tool. We would understand the primary areas where we can use it and how is it different from other tools available in the market today.No of pages: 50Sub - Topics:1. Introduction to Elastic Search, Log Stash and Kibana2. Architecture and Data Model3. Installation and Configuration4. Integrations with other solutionsPart 3- Visualization and DashboardsPART 3- VISUALIZATION AND DASHBOARDSCHAPTER 7: ANALYZE AND INVESTIGATECHAPTER GOAL: This chapter is focused on explaining the techniques around choosing the right set of graphs for visualizing your data, specifically time series data. It is important to know the different types, how they work and when to use them. We will also look at how to find a co-relation amongst millions of metrics and arrive at a resolution.No of pages: 20CHAPTER 8: TYPE OF TIME SERIES GRAPHSCHAPTER GOAL: This chapter is focused on explaining the techniques around choosing the right set of visualization for your data, specifically time series data. It is important to know the different types, how they work and when to use them.No of pages: 20Sub - Topics:1. Line Graphs2. Stacked Area Graphs3. Bar Graphs4. Heat MapsCHAPTER 9:TYPE OF SUMMARY GRAPHSCHAPTER GOAL: This chapter will cover summary graphs, which are visualizations that flatten a particular span of time to provide a summary window into your infrastructure. For each graph type, we’ll explain how it works and when to use it. But first, we’ll quickly discuss two concepts that are necessary to understand infrastructure summary graphs: aggregation across time (which you can think of as “time flattening” or “snapshotting”), and aggregation across space.NO OF PAGES: 20SUB - TOPICS:1. Single Value Summaries2. Toplists3. Change Graphs4. Host Maps5. DistributionsCHAPTER 10:GRAPHANACHAPTER GOAL: In this chapter will take a look at Open Source Grafana tool which allows users to query, visualize, alert on and understand metrics wherever they might be stored. It can integrate with Graphite, Influx DB, Prometheus, AWS CloudWatch etc. as a data source and can act as a single visualization option to help better understand your environment.NO OF PAGES: 50PART 4 - ACTING ON THE DATACHAPTER 11:ALERTING AND NOTIFICATIONSChapter Goal: The chapter is focused on how to start your journey to notifications – set up alerts with a simple click or perform complex anomaly detection based on machine learning algorithms. We will look at sending alerts to popular services like Slack, SMS and PagerDuty. We will also explain using automatic action on alerts through orchestration and how to create custom triggers to perform any action.NO OF PAGES: 20SUB - TOPICS:1. False Alarms2. Notifications3. Setup integration with alerting tools4. Setup integration with ITSM tools5. Automated actions
SAP S/4HANA Embedded Analytics
Imagine you are a business user, consultant, or developer about to enter an SAP S/4HANA implementation project. You are well-versed with SAP’s product portfolio and you know that the preferred reporting option in S/4HANA is embedded analytics. But what exactly is embedded analytics? And how can it be implemented? And who can do it: a business user, a functional consultant specialized in financial or logistics processes? Or does a business intelligence expert or a programmer need to be involved? Good questions!This book will answer these questions, one by one. It will also take you on the same journey that the implementation team needs to follow for every reporting requirement that pops up: start with assessing a more standard option and only move on to a less standard option if the requirement cannot be fulfilled. In consecutive chapters, analytical apps delivered by SAP, apps created using Smart Business Services, and Analytical Queries developed either using tiles or in a development environment are explained in detail with practical examples. The book also explains which option is preferred in which situation. The book covers topics such as in-memory computing, cloud, UX, OData, agile development, and more.Author Freek Keijzer writes from the perspective of an implementation consultant, focusing on functionality that has proven itself useful in the field. Practical examples are abundant, ranging from “codeless” to “hardcore coding.”WHAT YOU WILL LEARN* Know the difference between static reporting and interactive querying on real-time data* Understand which options are available for analytics in SAP S/4HANA* Understand which option to choose in which situation* Know how to implement these optionsWho This Book is ForSAP power users, functional consultants, developersFREEK KEIJZER has a background in science (physics), industry (manufacturing, process industry) and ICT (SAP system integration), holding various project management, people management, and specialist positions. He holds degrees in natural sciences (PhD) and information management (MIM). In 1996, he became involved in an SAP implementation, initially as an R/3 key user, later as internal project leader, interim manager of the support organization, and (international) information manager. Since 2001, he has focused on SAP BI consultancy, working for three consultancy firms and more than 50 clients. His responsibilities as a consultant include product development, team competence development, sales support, and resourcing. Freek's specialties (technical) include SAP Business Intelligence, Hana, NetWeaver, and ERP integration. His roles include project leader, lead consultant, business consultant, (interim) manager, and scrum master.Since 2015, Freek has been a brewer/owner of the Rubelijn craft beer brand.CHAPTER 1: BEFORE THE WORK STARTSCHAPTER GOAL: Miscellaneous intro topics.NO OF PAGES: 40SUB -TOPICS1. Business Intelligence: the art of enriching data2. HANA changing the OLTP versus OLAP game3. Cloud flavors: SaaS versus IaaS4. The latest thing: CDS-views5. Frontend: Fiori and UI56. SAP’s BI portfolio7. S/4HANA and Embedded AnalyticsCHAPTER 2: NO WORK: USE WHAT IS DELIVEREDCHAPTER GOAL: S/4HANA comes with rich analytical apps that can be used immediately. This chapter focuses on the content delivered by SAP.NO OF PAGES: 20SUB - TOPICS1. Discover analytical apps2. Activate them3. Use themCHAPTER 3: SOME WORK: SMART BUSINESS SERVICECHAPTER GOAL: S/4HANA has built-in functions for codeless creation of simple analytical apps. Target group of these functions are power users, but in practice functional (non-BI) consultants are most suitable to use this functionality.Functions are made available as a group of Fiori-tiles under the product name “Smart Business Service”.NO OF PAGES : 30SUB - TOPICS:1. Tiles “KPI Design”2. Tiles “Report Design”3. Tile “Analysis Path Framework Modeling”4. The end-result: again tilesCHAPTER 4: MORE WORK: BUILDING ANALYTICAL QUERIES USING TILESCHAPTER GOAL: S/4HANA comes with tiles to create so-called “Analytical Queries” starting from SAP-delivered CDS-views. Analytical Queries are not static reports, but versatile, interactive queries on real-time data.For the SaaS version of S/4HANA, this is the only option to create Analytical Queries.NO OF PAGES: 40SUB - TOPICS:1. Discovery of SAP-delivered CDS-views with tile “View Browser”2. Enriching CDS-views with tiles “Custom CDS Views”3. Building an Analytical Query with tile “Custom Analytical Query”4. Running the query with tile “Query Browser”5. How to navigate within an Analytical Query.6. Creating a dedicated tile for the queryCHAPTER 5: MOST WORK: BUILDING ANALYTICAL QUERIES IN A DEVELOPMENT ENVIRONMENTCHAPTER GOAL: Starting from real-life business requirements, often the conclusion is reached that SAP-delivered CDS-views won’t do the trick. For a SaaS version of S/4HANA, the process following this conclusion is called “managing expectations”. For an on-premise version, a development environment can be applied. And then … the sky is the limit! Development can start not only from SAP-delivered CDS-views but also from tables.NO OF PAGES: 60SUB - TOPICS:1. Layered approach towards the analytical query2. Data-integration3. “Cube-view”4. Analytical query5. Examples transaction data6. Examples master data7. Example: Replacing custom ABAP-report by analytical query8. Performance considerations; balance between performance and support-friendliness9. Access and data authorizationCHAPTER 6: EXTENSIBILITY, ODATA AND BEYONDCHAPTER GOAL: Miscellaneous outro topics related to Embedded AnalyticsNO OF PAGES: 20SUB - TOPICS:1. S/4HANA Extensibility2. OData and APIs3. Agile development and Devops4. Ideal skill-set for an Embedded Analytics expert
Xiaomi Redmi Note 10 - alle Modelle
Die verständliche Anleitung für Ihr Smartphone:- Alle Funktionen & Einstellungen auf einen Blick- Schritt für Schritt erklärt – mit praktischen TippsMit diesem smarten Praxisbuch gelingt Ihnen der schnelle und sichere Einstieg in Ihr Smartphone. Lernen Sie Ihr Handymodell von Grund auf kennen und beherrschen! Anschauliche Anleitungen, Beispiele und Bilder zeigen Ihnen gut nachvollziehbar, wie Sie Ihr mobiles Gerät optimal handhaben – von der Ersteinrichtung und Personalisierung über die große Funktionsvielfalt bis zu den wichtigsten Anwendungen. Nutzen Sie darüber hinaus die übersichtlichen Spicker-Darstellungen: Damit können Sie jene Bedienungsschritte, die man am häufigsten braucht, aber immer wieder vergisst, auf einen Blick finden und umsetzen. Freuen Sie sich auf viele hilfreiche Tipps und legen Sie ganz einfach los!Aus dem Inhalt:- Alle Bedienelemente des Smartphones auf einen Blick- Ersteinrichtung und Tipps zum Umzug- Google-Konto erstellen und verwalten- Die Benutzeroberfläche Ihres Smartphones personalisieren- Apps aus dem Play Store herunterladen- Kontakte anlegen und im Adressbuch verwalten- Anrufe tätigen und SMS austauschen - Nachrichten über Mail und WhatsApp versenden und empfangen- Uhr, Kalender, Maps und andere praktische Apps nutzen - Fotos sowie Videos aufnehmen, verwalten und teilen- Ins Internet gehen über WLAN und mobile Daten - Updates, Datenschutz und Sicherheit
Learn to Program with Kotlin
Teach yourself programming starting with the basics and progressing to a series of exciting projects using Kotlin, one of today's hottest programming languages. This book starts with the absolute basics and then introduces just enough syntax to get into some fascinating projects. These include text processing: a statistical analysis of Jane Austen's novels, solving anagrams, and working with palindromes; image processing: cropping and resizing images, and pixel transformation; and computer vision: finding digits, parsing images, and reading speed signs.The projects are developed in tiny steps and complete solutions are provided. Some of these projects include core data science concepts, giving you skills in one of the most important areas of modern programming. Along the way you’ll cover functional programming, object-oriented programming (OOP), refactoring, and writing unit tests.After reading Learn to Program with Kotlin, you'll come away with practical insights and code to get you started right away with programming using Kotlin for your own projects.WHAT YOU WILL LEARN* Gain the basics of Kotlin using the IntelliJ Java IDE* Implement OOP with Kotlin along with unit testing and code refactoring using a series of text-related projects* Harness functional programming with Kotlin by building an image-processing library* Write software to locate and read speed signs in photosWHO IS THIS BOOK FORAnyone who wants to learn how to program or code from scratch. Also great for experienced programmers who want to know more about Kotlin. Tim Lavers is a senior software engineer at KPMG with expertise in Java, Kotlin, and other programming languages employed for data engineering and enterprise software projects. He is also a mathematical hobbyist in his spare time.PART 1 - BASICSThe very basics of programming in Kotlin using the IntelliJ code editor.Chapter 1: Getting StartedChapter 2: Simple patternsChapter 3: Arrays and loopsChapter 4: Binary choicesChapter 5: IntegersChapter 6: Values and variablesChapter 7: StringsChapter 8: Data structuresChapter 9: The file systemPART II - TEXTObject-Oriented Programming, Unit Testing and code refactoring through a series of fascinating text-related projects.Chapter 10: Project AustenChapter 11: AnagramsChapter 12: PalindromesChapter 13: Word switchPART III - IMAGESThis part of the book introduces Functional Programming by building a basic image processing library.The culmination of this is a CGI (Computer Generated Imagery) project.Chapter 14: Colour picturesChapter 15: Pixel transformationsChapter 16: Cropping and resizing imagesChapter 17: Project DinoPART IV - VISIONWe cap it all of with a project in which we write software to locate and read speed signs in photos.Chapter 18: OverviewChapter 19: Finding digitsChapter 20: Parsing the imagesChapter 21: Reading speed signs
From Traditional Fault Tolerance to Blockchain
This book covers the most essential techniques for designing and building dependable distributed systems, from traditional fault tolerance to the blockchain technology. Topics include checkpointing and logging, recovery-orientated computing, replication, distributed consensus, Byzantine fault tolerance, as well as blockchain.This book intentionally includes traditional fault tolerance techniques so that readers can appreciate better the huge benefits brought by the blockchain technology and why it has been touted as a disruptive technology, some even regard it at the same level of the Internet. This book also expresses a grave concern on using traditional consensus algorithms in blockchain because with the limited scalability of such algorithms, the primary benefits of using blockchain in the first place, such as decentralization and immutability, could be easily lost under cyberattacks.DR. ZHAO received the PhD degree in Electrical and Computer Engineering from the University of California, Santa Barbara, in 2002. He is now a Full Professor in the Department of Electrical Engineering and Computer Science at Cleveland State University. He has more than 200 academic publications and three of his recent research papers in the dependable distributed computing area have won the best paper awards. Dr. Zhao also has two US utility patents and a patent application on blockchain under review.List of Figures xiiiList of Tables xixAcknowledgments xxiPreface xxiiiReferences xxix1 INTRODUCTION 11.1 Basic Concepts and Terminologies for Dependable Computing 21.1.1 System Models 21.1.2 Threat Models 31.1.3 Dependability Attributes and Evaluation Metrics 61.2 Means to Achieve Dependability 91.2.1 Fault Avoidance 91.2.2 Fault Detection and Diagnosis 91.2.3 Fault Removal 101.2.4 Fault Tolerance 111.3 System Security 13References 182 LOGGING AND CHECKPOINTING 212.1 System Model 222.1.1 Fault Model 232.1.2 Process State and Global State 232.1.3 Piecewise Deterministic Assumption 262.1.4 Output Commit 262.1.5 Stable Storage 272.2 Checkpoint-Based Protocols 272.2.1 Uncoordinated Checkpointing 272.2.2 Tamir and Sequin Global Checkpointing Protocol 292.2.3 Chandy and Lamport Distributed Snapshot Protocol 352.2.4 Discussion 382.3 Log Based Protocols 402.3.1 Pessimistic Logging 422.3.2 Sender-Based Message Logging 51References 603 RECOVERY-ORIENTED COMPUTING 633.1 System Model 653.2 Fault Detection and Localization 683.2.1 Component Interactions Modeling and Anomaly Detection 723.2.2 Path Shapes Modeling and Root Cause Analysis 763.2.3 Inference-Based Fault Diagnosis 803.3 Microreboot 893.3.1 Microrebootable System Design Guideline 903.3.2 Automatic Recovery with Microreboot 913.3.3 Implications of the Microrebooting Technique 923.4 Overcoming Operator Errors 933.4.1 The Operator Undo Model 943.4.2 The Operator Undo Framework 95References 994 DATA AND SERVICE REPLICATION 1034.1 Service Replication 1054.1.1 Replication Styles 1074.1.2 Implementation of Service Replication 1094.2 Data Replication 1114.3 Optimistic Replication 1164.3.1 System Models 1174.3.2 Establish Ordering among Operations 1194.3.3 State Transfer Systems 1224.3.4 Operation Transfer System 1264.3.5 Update Commitment 1314.4 CAP Theorem 1364.4.1 2 out 3 1394.4.2 Implications of Enabling Partition Tolerance 140References 1435 GROUP COMMUNICATION SYSTEMS 1475.1 System Model 1495.2 Sequencer Based Group Communication System 1525.2.1 Normal Operation 1535.2.2 Membership Change 1575.2.3 Proof of Correctness 1655.3 Sender Based Group Communication System 1665.3.1 Total Ordering Protocol 1675.3.2 Membership Change Protocol 1745.3.3 Recovery Protocol 1835.3.4 The Flow Control Mechanism 1905.4 Vector Clock Based Group Communication System 192References 1976 CONSENSUS AND THE PAXOS ALGORITHMS 1996.1 The Consensus Problem 2006.2 The Paxos Algorithm 2026.2.1 Algorithm for Choosing a Value 2026.2.2 Algorithm for Learning a Value 2046.2.3 Proof of Correctness 2046.2.4 Reasoning of the Paxos Algorithm 2066.3 Multi-Paxos 2126.3.1 Checkpointing and Garbage Collection 2136.3.2 Leader Election and View Change 2146.4 Dynamic Paxos 2166.4.1 Dynamic Paxos 2176.4.2 Cheap Paxos 2206.5 Fast Paxos 2276.5.1 The Basic Steps 2286.5.2 Collision Recovery, Quorum Requirement, and Value Selection Rule 2296.6 Implementations of the Paxos Family Algorithms 2356.6.1 Hard Drive Failures 2366.6.2 Multiple Coordinators 2366.6.3 Membership Changes 2376.6.4 Limited Disk Space for Logging 241References 2427 BYZANTINE FAULT TOLERANCE 2457.1 The Byzantine Generals Problem 2467.1.1 System Model 2477.1.2 The Oral Message Algorithms 2507.1.3 Proof of Correctness for the Oral Message Algorithms 2607.2 Practical Byzantine Fault Tolerance 2617.2.1 System Model 2627.2.2 Overview of the PBFT Algorithm 2637.2.3 Normal Operation of PBFT 2657.2.4 Garbage Collection 2677.2.5 View Change 2687.2.6 Proof of Correctness 2717.2.7 Optimizations 2737.3 Fast Byzantine Agreement 2777.4 Speculative Byzantine Fault Tolerance 2787.4.1 The Agreement Protocol 2797.4.2 The View Change Protocol 2837.4.3 The Checkpointing Protocol 2887.4.4 Proof of Correctness 288References 2908 CRYPTOCURRENCY AND BLOCKCHAIN 2958.1 History of Cryptocurrency 2958.2 Bitcoin 2988.2.1 Decentralized Network and Architecture 3018.2.2 Self-Contained Cryptography 3028.2.3 Decentralized Data Structure 3048.2.4 Decentralized Algorithms 3138.3 Ethereum 3178.3.1 Ethereum Computing Model 3188.3.2 Block and Consensus 3268.3.3 Tokenization 3408.4 Attacks on Blockchain 342References 3479 CONSENSUS ALGORITHMS FOR BLOCKCHAIN 3499.1 Model on Blockchain Consensus 3539.1.1 Requirements on Puzzle Design 3549.1.2 Zero-Knowledge Proof 3559.2 Proof of Work 3569.3 Proof of Resources 3579.3.1 Using Storage as Resource 3579.3.2 Using Computing as Resource 3599.4 Virtual Mining 3609.4.1 PeerCoin PoS 3609.4.2 Fixed-Epoch Time Based PoS Schemes 3689.4.3 Proof of Elapsed Time 371References 37510 BLOCKCHAIN APPLICATIONS 37710.1 The Value of Blockchain 37810.1.1 Non-Functional Benefits 37910.1.2 Functional Benefits 38210.2 Blockchain-Enabled Cyber-Physical Systems 38310.2.1 Cyber-Physical Systems 38310.2.2 Application Categories 38510.2.3 Blockchain-Enabled Operations in CPS 39010.3 On Blockchain Throughput 39810.3.1 On-Chain Approach 39910.3.2 Off-Chain Approach 40210.4 A Critical Look on Blockchain from Economy Perspective 40810.4.1 Blockchain Technology from the Economic View 40910.4.2 Economic Functions of Blockchain 41210.4.3 Blockchain as a Financial Infrastructure 416References 419Index 427
Roboter in der Bildung
Wie Robotik das Lernen im digitalen Zeitalter bereichern kann.Der Bildungsbereich verändert sich durch die Einführung digitaler Technologien. Roboter sind die Brücke zwischen der digitalen und der physischen Welt und daher ein wesentliches Thema in und für die Bildung. Dies hat einen direkten Einfluss darauf, wie und was wir den Lernenden beibringen.Dieses Buch bietet eine Einführung in die Verwendung und den Einsatz von Robotern in der Bildung und hilft Forschern geeignete Soft- und Hardware zu entwickeln. Lehrer und Trainer erfahren, wie sie Roboter in ihrer Arbeit mit Schülern und Studenten einsetzen können. Es bietet eine Einführung in die einschlägigen Lehr- und Lerntheorien im Zusammenhang mit dem veränderten Lernen sowie praktische Ratschläge zum Einsatz von Robotern als Teil eines Lehrplans.Leseprobe (PDF-Link)
JavaServer Faces und Jakarta Server Faces 2.3 (3.Auflg.)
Das Arbeitsbuch für Java-Webentwickler in aktualisierter 3. Auflage.JavaServerTM Faces und Jakarta Server Faces 2.3 sind ein Framework für die Entwicklung von Benutzerschnittstellen für bzw. als Teil einer Java-Web-Anwendung. Dieses Arbeitsbuch führt Sie Schritt für Schritt in die Programmierung mit JSF ein. Sie erfahren, wie Sie damit moderne Benutzerschnittstellen für die Praxis entwickeln.Und natürlich geht es auch darum, wie JSF in eine Java-Web-Anwendung zu integrieren sind. Behandelt werden auch Themen wie die Anbindung an eine Datenbank mit JPA, die Verwendung von CDI sowie Authentifizierung und Autorisierung.Verfolgen Sie Schritt für Schritt die Entwicklung einer betrieblichen Anwendung und lernen Sie so anhand realer Aufgabenstellungen alle wichtigen Aspekte von JSF 2.3 kennen. Mit Hilfe der Übungen, deren Lösungen sich von der Website zum Buch und von GitHub herunterladen lassen, können Sie das Gelernte selbst ausprobieren und umsetzen.Aus dem Inhalt:EinleitungJSF im DetailContext und Dependency InjectionWeiterführende ThemenClassic ModelsSpezialthemenVerwendete SystemeAusblick/Anhang: Die Tags der Standardbibliotheken
MCA Microsoft Office Specialist (Office 365 and Office 2019) Study Guide
MCA Microsoft Office Specialist Study Guide: PowerPoint Associate Exam MO-300is your roadmap to preparing for taking the MO-300 exam and earning the PowerPoint Associate (PowerPoint and PowerPoint 2019) certification. The following objectives are covered:* Manage presentations* Manage slides* Insert and format text, shapes, and images* Insert tables, charts, smartArt, 3D models, and media* Apply transitions and animationsMajor topics include creating, editing, and enhancing presentations and slideshows, including the ability to create and manage presentations, insert and format shapes and slides, create slide content, apply transitions and animations, and manage multiple presentations. This Study Guide also covers creating professional-grade sales presentations, employee training, instructional materials, and kiosk slideshows.Readers will also have access to Sybex's superior online test bank, includng hundreds of practice questions, flashcards, and a glossary of important terms.ERIC BUTOW is the author of 39 books on technology topics and has developed and taught networking, computing, and usability courses for Ed2Go, Virtual Training Company, California State University, Sacramento, and Udemy. He has been using PowerPoint professionally since 1994. He's served as a technical writer for companies like Intel, Wells Fargo, Cisco Systems, and Hewlett-Packard. He is the founder and owner of Butow Communications Group in Jackson, California.Introduction xiAssessment Test xvCHAPTER 1 CREATING PRESENTATIONS 1Modifying Slide Masters, Handout Masters, and Note Masters 3Changing the Slide Master Theme or Background 4Modifying Slide Master Content 9Creating Slide Layouts 10Modify Slide Layouts 15Modifying the Handout Master 19Modifying the Notes Master 26Changing Presentation Options and Views 32Changing the Slide Size 32Displaying Presentations in Different Views 34Setting Basic File Properties 36Configuring Print Settings for Presentations 37Printing All or Part of a Presentation 37Printing Notes Pages 39Printing Handouts 40Printing in Color, Grayscale, or Black and White 41Configuring and Presenting Slideshows 43Creating Custom Slideshows 43Configuring Slideshow Options 48Rehearsing Slideshow Timing 49Setting Up Slideshow Recording Options 53Presenting Slideshows by Using Presenter View 56Preparing Presentations for Collaboration 62Mark Presentations as Final 63Protecting Presentations by Using Passwords 64Inspecting Presentations for Issues 65Adding and Managing Comments 67Preserving Presentation Content 72Exporting Presentations to Other Formats 73Summary 82Key Terms 83Exam Essentials 83Review Questions 85CHAPTER 2 MANAGING SLIDES 87Inserting Slides 88Importing Word Document Outlines 88Inserting Slides from Another Presentation 91Inserting Slides and Selecting Slide Layouts 93Inserting Summary Zoom Slides 95Duplicating Slides 100Modifying Slides 101Hiding and Unhiding Slides 102Modifying Individual Slide Backgrounds 103Inserting Slide Headers, Footers, and Page Numbers 106Ordering and Grouping Slides 110Creating Sections 110Modifying the Slide Order 112Renaming Sections 114Summary 115Key Terms 116Exam Essentials 116Review Questions 117CHAPTER 3 INSERTING AND FORMATTING TEXT, SHAPES, AND IMAGES 119Formatting Text 121Applying Formatting and Styles to Text 121Formatting Text in Multiple Columns 127Creating Bulleted and Numbered Lists 128Inserting Links 130Inserting Hyperlinks 130Inserting Section Zoom Links and Slide Zoom Links 131Inserting and Formatting Images 135Resizing and Cropping Images 137Applying Built-In Styles and Effects to Images 139Inserting Screenshots and Screen Clippings 141Inserting and Formatting Graphic Elements 144Inserting and Changing Shapes 144Drawing by Using Digital Ink 146Adding Text to Shapes and Text Boxes 149Resizing Shapes and Text Boxes 151Formatting Shapes and Text Boxes 153Applying Built-In Styles to Shapes and Text Boxes 155Adding Alt Text to Graphic Elements for Accessibility 158Ordering and Grouping Objects on Slides 160Ordering Shapes, Images, and Text Boxes 160Aligning Shapes, Images, and Text Boxes 161Grouping Shapes and Images 163Displaying Alignment Tools 164Summary 165Key Terms 166Exam Essentials 166Review Questions 167CHAPTER 4 INSERTING TABLES, CHARTS, SMARTART, 3D MODELS, AND MEDIA 169Inserting and Formatting Tables 170Creating and Inserting Tables 170Inserting and Deleting Table Rows and Columns 171Applying Built-In Table Styles 174Inserting and Modifying Charts 177Creating and Inserting Charts 177Modifying Charts 180Inserting and Formatting SmartArt Graphics 186Inserting SmartArt Graphics 186Converting Lists to SmartArt Graphics 186Adding and Modifying SmartArt Graphic Content 189Inserting and Modifying 3D Models 191Inserting 3D Models 191Modifying 3D Models 193Inserting and Managing Media 194Inserting Audio and Video Clips 194Creating and Inserting Screen Recordings 202Configuring Media Playback Options 207Summary 210Key Terms 211Exam Essentials 211Review Questions 213CHAPTER 5 APPLYING TRANSITIONS AND ANIMATIONS 215Applying and Configuring Slide Transitions 216Applying Basic and 3D Slide Transitions 216Configuring Transition Effects 218Animating Slide Content 222Animating Text and Graphic Elements 222Animating 3D Models 232Configuring Animation Effects 235Configuring Animation Paths 238Reordering Animations on a Slide 243Setting Timing for Transitions 245Setting Transition Effect Duration 245Configuring Transition Start and Finish Options 246Summary 248Key Terms 248Exam Essentials 249Review Questions 250APPENDIX ANSWERS TO REVIEW QUESTIONS 253Chapter 1: Creating Presentations 254Chapter 2: Managing Slides 254Chapter 3: Inserting and Formatting Text, Shapes, and Images 255Chapter 4: Inserting Tables, Charts, SmartArt, 3D Models, and Media 256Chapter 5: Applying Transitions and Animations 256Index 259
Sozioinformatik
Ein neuer Blick auf Informatik und Gesellschaft. Einführung in die Modellierung und Analyse digitaler Technikfolgen.Welche Auswirkungen könnte es haben, wenn Technik in den Körper implantiert wird und sich Menschen zunehmend zu Cyborgs entwickeln? Wie kann es passieren, dass sich mazedonische Jugendliche in den Präsidentschaftswahlkampf der USA einmischen? Wann entstehen Filterblasen?In den letzten Jahren konnten viele gewollte und ungewollte Technikfolgen der digitalen Transformation beobachtet werden. Die in diesem Buch vorgestellte Sozioinformatik befasst sich mit der Modellierung und Analyse solcher Phänomene: Sie untersucht dafür die Folgen der informatischen Gestaltung unter interdisziplinären Aspekten, insbesondere denen der Verhaltensökonomie.Zentrales Hilfsmittel der Analyse ist der Aufbau eines visuellen Wirkungsgefüges, mit dem verschiedene Dynamiken und Technikfolgen in der digitalen Transformation abgeschätzt werden können. Damit wird erklärbar, wann man eine Filterblase erwarten kann, warum manche digitale Technik unsere Aufmerksamkeit so effektiv bindet, und warum Software dazu verführen kann, Einfluss auf Wahlen in einem anderen Land zu nehmen.Das Buch eignet sich als Grundlage für »Informatik und Gesellschaft« Vorlesungen in der Informatik, genauso als Grundlage für Seminare in den Gesellschaftswissenschaften oder zur Besprechung digitaler Phänomene in der Schule. Es bietet zudem eine neue Kommunikationsmethode, die im Journalismus, der Politik oder in der Beratung eingesetzt werden kann.Leseprobe (PDF-Link)
Getting Started with WidgetKit
Develop handy, UI/UX friendly and eye-pleasing widgets using the brand new WidgetKit. Apple’s brand new widgets allow iOS users to work with their favorite apps in the home screen of their iPhone or iPad without even opening the app!Join us in this exciting journey as we explore the APIs introduced in Apple’s WidgetKit framework. You'll dive into the human interface guidelines (HIG) for creating widgets and review the recommendations Apple gives to developers for developing widgets with intuitive, easy-to-learn, and consistent user interfaces. In addition, you’ll take a look at some SwiftUI views that are useful not only in creating widgets for iOS apps, but also for creating iOS apps themselves.You’ll put everything you learn into practical application by actually writing code and creating widgets. Get a clear view of how everything works so that you’re able to incorporate widgets into your real-world projects authentically and successfully.WHAT YOU'LL LEARN* Configure widgets and make them talk to APIs using URLSession* Work with timelines and event handling in widgets* Fetch content from a remote server and display the data in a widget* Make content dynamic both remotely and locallyWHO THIS BOOK IS FORiOS developers working in the Apple ecosystem with a basic understanding of SwiftUI.SAGUN RAJ LAGE started his professional career in software development as a Full Stack Web Developer and later moved into developing iOS applications. He has been a part of development teams on applications used in fields such as transportation, multimedia, shopping, finance, astrology, and management. He is actively involved in organizing developer events and in contributing as a mentor and tutor in programming bootcamps. Apart from software development and programming, he enjoys reading and writing blogs, music, graphic design, and video editing.PRAKSHAPAN SHRESTHA is an entrepreneurial app developer with 6 years of iOS development experience. He devoutly follows the latest tools and technologies that make a developer's life easier and actively helps out budding developers. Aside from software development, Prakshapan enjoys hiking and heading his recent venture, Pregasathi, which provides new families in need of baby products with help. Chapter 1: Getting Familiar with WidgetKit in a FlashChapter 2: SwiftUI, Human Interface Guidelines and Widget FamilyChapter 3: Writing Your First WidgetChapter 4: Making Widgets Configurable and InteractiveChapter 5: Fetching Configuration Options for Configurable Widgets
Digitale Transformation von Geschäftsmodellen
Dieses Buch zeigt, wie es Unternehmen gelingt, ihre Geschäftsmodelle auf die digitale Zukunft vorzubereiten und wie dadurch Wettbewerbsvorteile geschaffen und Kundenanforderungen besser erfüllt werden können. Die Autoren aus Praxis und Wissenschaft zeigen die digitale Transformation von Unternehmen über die gesamte Wertschöpfungskette hinweg. Die Beiträge behandeln Ansätze und Instrumente, Studienergebnisse und Best Practices unterschiedlicher Industrien im Kontext der digitalen Transformation. Die Inhalte berücksichtigen divergierende Anforderungen von Unternehmen und Industrien und können nach Bedarf kombiniert und erweitert werden, um sie an die spezifischen Rahmenbedingungen eines Unternehmens anzupassen. Die zweite aktualisierte Auflage wurde überarbeitet und enthält neue wissenschaftliche und praktische Beiträge zu den folgenden drei zentralen Themen: Ansätze und Instrumente, Studienergebnisse sowie Best Practices aus den Bereichen Mobilität, Gesundheit, Maschinenbau, Medien, Lebensmittel, Banken und Handel. Ansätze und Instrumente.- Studienergebnisse.- Best Practices aus den Bereichen Mobilität, Gesundheit, Maschinenbau, Medien, Lebensmittel, Banken und Handel.
Multimedial lehren und lernen
Für alle Lehrkräfte, die digitale Lehrinhalte schnell und einfach gestalten wollen. Lesen Sie, wie Sie mit H5P multimedial lehren und lernen können.Für die Nutzung ist außer einem modernen Webbrowser keine zusätzliche Software erforderlich, so dass H5P-Inhalte auf jedem PC und jedem Smartphone nutzbar sind.Die Inhalte können problemlos in die Lernplattform Moodle sowie in die Content-Management-Systeme WordPress und Drupal integriert werden.Das Werk stellt mehr als 40 H5P-Inhaltstypen und ihren Einsatz im Detail vor. Wer mehr über die Webtechnologien wissen und die Hintergründe verstehen möchte, findet in Workshops zum Webdesign einen Einstieg in die grundlegenden Technologien.H5P ist die kommende Technologie zur Gestaltung multimedialer und interaktiver Lehrmaterialien – auch als offene Inhalte im Interesse für ein breites Bildungsangebot. Die Inhalte eignen sich sowohl für rein digitales Lehren als auch unterstützend für den klassischen Präsenzunterricht.Aus dem Inhalt:Qualitätsverbesserung statt Rationalisierung in der LehreDas H5P-Projekt: Einladung zum MitgestaltenH5P in der Praxis einsetzenH5P-Inhaltstypen – Wissen vermitteln und reflektierenFotos und multimediale Inhalte für Distance-Learning gestalten/Rechtliche AspekteDie Technik im Hintergrund: Einführungen in HTML, CSS, JavaScript und PHPLeseprobe (PDF-Link)
Oracle Database Programming with Visual Basic.NET
ORACLE DATABASE PROGRAMMING WITH VISUAL BASIC.NETDISCOVER A DETAILED TREATMENT OF THE PRACTICAL CONSIDERATIONS AND APPLICATIONS OF ORACLE DATABASE PROGRAMMING WITH VISUAL BASIC 2019Oracle Database Programming with Visual Basic.NET: Concepts, Designs, and Implementations delivers a comprehensive exploration of the foundations of Oracle database programming using Visual Basic.NET. Using Visual Basic.NET 2019, Visual Studio.NET 2019, and Oracle 18c XE, the book introduces the Oracle database development system, Oracle SQL Developer and Modeler, and teaches readers how to implement a sample database solution. The distinguished author also demonstrates the use of dotConnect for Oracle to show readers how to create an effective connection to an Oracle 18c XE database. The current versions of the .NET framework, ASP.NET, and ASP.NET 4.7 are also explored and used to offer readers the most up to date web database programming techniques available today. The book provides practical example projects and detailed, line-by-line descriptions throughout to assist readers in the development of their database programming skill. Students will also benefit from the inclusion of:* A thorough introduction to databases, including definitions, examples, descriptions of keys and relationships, and some database components in popular databases, like Access, SQL, and Oracle* An exploration of ADO.NET, including its architecture and components, like the DataReader class, DataSet component, DataTable component, and the command and parameter classes* A discussion of Language Integrated Query (LINQ), including its architecture and components, its relationship to objects, DataSet, Oracle, and Entities* An explanation of how to access data in ASP.NET and ASP.NET Web Services with multiple real project examples.Perfect for college and university students taking courses related to database programming and applications, Oracle Database Programming with Visual Basic.NET will also earn a place in the libraries of programmers and software engineers seeking a comprehensive reference for database coding in Visual Basic.NET. YING BAI, PHD, is Professor in the Department of Computer Science and Engineering at Johnson C. Smith University. He is the author of Practical Microcontroller Engineering with ARM Technology, Practical Database Programming with Visual Basic.NET, 2nd Edition, Practical Database Programming with Java, and Practical Database Programming with Visual C#.NET.