Allgemein
Der Computer erscheint im Holozän
Die sieben Weltwunder wurden bereits in der Antike beschrieben, etwa zur selben Zeit wie die mechanische Rechenhilfe Abacus, ein Zählrahmen mit Holz- oder Glasperlen. Dieses Buch beschreibt und diskutiert die sieben Weltwunder der IT, ohne die unsere digitale Wirtschaft und Gesellschaft kaum überlebensfähig scheint: Computermaus, Datenbanken, Kryptografie, Graphgrammatiken, Internet, Blockchain und Soft Computing.Jedes Weltwunder der IT wird kurz charakterisiert, bevor Anwendungsoptionen für Wirtschaft und Gesellschaft exemplarisch aufgezeigt und gewürdigt werden.Das Werk richtet sich an alle, die sich mit der digitalen Transformation auseinandersetzen. Es soll helfen, digitale Entwicklungen im eigenen Unternehmen, in der Verwaltung oder im öffentlichen wie im privaten Leben zu positionieren und zu reflektieren.ANDREAS MEIER hat Musik an der Musikakademie in Wien und Mathematik an der ETH in Zürich studiert, wo er doktorierte und habilitierte. Er arbeitete in internationalen Forschungsinstitutionen und Organisationen und war an der Universität Fribourg, Schweiz für eBusiness und eCommerce verantwortlich. Er gründete und leitete das Forschungszentrum Fuzzy Management Methods (FMsquare.org).FABRICE TSCHUDI hat Kommunikationswissenschaften an der Universität Fribourg und Wirtschaftsinformatik an der Universität Bern studiert. Er setzt sich für eine Vision von digitalen Systemen ein, die zu einer lebensdienlichen Wirtschaft und Gesellschaft im Sinne von nachhaltigem Wohlergehen beitragen. Er begleitet Organisationen auf dem Weg zu „wertvoller Digitalisierung“ und ist überzeugt, dass partizipative Lern- und Arbeitsformate hierfür ein zentraler Erfolgsfaktor sind.De septem mundi miraculis - Vom Abacus zur digitalen Rechenmaschine - Die 7 Weltwunder der IT - Wo führt die Reise hin? - Literatur
Microsoft Conversational AI Platform for Developers
Build a chatbot using the Microsoft Conversational AI platform. This book will teach you, step by step, how to save time and money by including chatbots in your enterprise's strategy. You will learn how to be proficient at every phase of development, from collaboration on a chatbot in an end-to-end scenario, to the first mock-up phase, and on through to the deployment and evaluation phases.Microsoft built a cloud service ecosystem for running artificial intelligence workloads in public cloud scenarios and a robust AI platform that offers a broad range of services targeting conversational artificial intelligence solutions such as chatbots.Building a chatbot requires not just developer coding skills but special considerations, including input from business stakeholders such as domain matter experts and power users. You will learn by example how to use a great set of tools and services to bridge the gap between business and engineering.You will learn how to successfully morph business requirements into actionable IT and engineering requirements. You will learn about Bot Framework Composer, which allows power users to initiate the building of a chatbot that can then be handed over to the development team to add capabilities through code. Coverage is given to the process of sharing implementation tasks and workloads between power users, who are using a low-code or no-code approach, and developers, who are building out the enhanced features for the chatbot.WHAT YOU WILL LEARN* Understand Microsoft’s comprehensive AI ecosystem and its services and solutions* Recognize which solutions and services should be applied in each business scenario* Discover no-code/low-code approaches for building chatbots* Develop chatbots using the conversational AI stack* Align business and development for improved chatbot outcomes and reduced time-to-marketWHO THIS BOOK IS FORDevelopers and power users who want to build chatbots. An understanding of the core principles of writing code (.NET or JavaScript) for modern web applications is expected.STEPHAN BISSER is a technical lead at Solvion and a Microsoft MVP for artificial intelligence based in Austria. In his current role, he focuses on conversational AI, Microsoft 365, and Azure. He is passionate about the conversational AI platform and the entire Microsoft Bot Framework and Azure Cognitive Services ecosystem. Stephan and several other MVPs founded the Bot Builder Community, which is a community initiative helping Bot Framework developers with code samples and extensions. Together with Thomy Gölles, Rick Van Rousselt, and Albert-Jan Schot, Stephan is hosting SelectedTech, where they publish webinars and videos on social media around SharePoint, Office365 and the Microsoft AI ecosystem. In addition, he blogs regularly and is a contributing author to Microsoft AI MVP Book.Chapter 1: Introduction to the Microsoft Conversational AI PlatformChapter 2: Introduction to the Microsoft Bot FrameworkChapter 3: Introduction to Azure Cognitive ServicesChapter 4: Design Principles of a ChatbotChapter 5: Building a ChatbotChapter 6: Testing a ChatbotChapter 7: Publishing a ChatbotChapter 8: Connecting a Chatbot with Channels
Trends im Cloud Computing. Wie sich mit Competitive Intelligence Prognosen zur Zukunft der Cloud stellen lassen
Der Aufstieg von Cloud Computing hat zu einem fundamentalen Wandel innerhalb der Informations- und Kommunikationsbranche geführt und stellt ein neues Paradigma für die Verwaltung und Bereitstellung von Services über das Internet dar. Aufgrund seines hohen Potenzials ist der Cloud-Computing-Markt von einem enormen Wettbewerb geprägt. Um in einem solchen Markt wettbewerbsfähig zu bleiben, ist es wichtig, die Wettbewerber und die eigene Organisation zu analysieren. Man nennt diesen Prozess der Wissensgenerierung auch Competitive Intelligence.Welche Ziele verfolgt Competitive Intelligence und wie läuft der Prozess ab? Welche Servicemodelle gibt es im Bereich des Cloud Computing? Wie entwickeln sich der Markt und die Kundenanforderungen?Matteo Sihorsch untersucht die Trends des Cloud-Computing-Marktes und die Vorlieben der Cloud-Nutzer. Mit Hilfe von Competitive Intelligence leitet er daraus Handlungsempfehlungen für IT-Anbieter hinsichtlich weiterer Produktentwicklungen ab.Aus dem Inhalt:- Cloud Services;- Digitalisierung;- Software-as-a-Service;- Private Cloud;- Public Cloud;- Hybrid Cloud
CWNA Certified Wireless Network Administrator Study Guide
THE #1 SELLING WI-FI NETWORKING REFERENCE GUIDE IN THE WORLDThe CWNA: Certified Wireless Network Administrator Study Guide is the ultimate preparation resource for the CWNA exam. Fully updated to align with the latest version of the exam, this book features expert coverage of all exam objectives to help you pass the exam. But passing the exam is just a first step. For over 16 years, the CWNA Study Guide has helped individuals jump-start their wireless networking careers. Wireless networking professionals across the globe use this book as their workplace reference guide for enterprise Wi-Fi technology.Owning this book provides you with a foundation of knowledge for important Wi-Fi networking topics, including:* Radio frequency (RF) fundamentals* 802.11 MAC and medium access* Wireless LAN topologies and architecture* WLAN design, troubleshooting and validation* Wi-Fi networking security The book authors have over 40 years of combined Wi-Fi networking expertise and provide real-world insights that you can leverage in your wireless networking career. Each of the book’s 20 chapters breaks down complex topics into easy to understand nuggets of useful information. Each chapter has review questions that help you gauge your progress along the way. Additionally, hands-on exercises allow you to practice applying CWNA concepts to real-world scenarios. You also get a year of free access to the Sybex online interactive learning environment, which features additional resources and study aids, including bonus practice exam questions.The CWNA certification is a de facto standard for anyone working with wireless technology. It shows employers that you have demonstrated competence in critical areas, and have the knowledge and skills to perform essential duties that keep their wireless networks functioning and safe. The CWNA: Certified Wireless Network Administrator Study Guide gives you everything you need to pass the exam with flying colors.DAVID D. COLEMAN, CWNE #4, David D. Coleman, CWNE #4, is a technology evangelist and public speaker who specializes in Wi-Fi and cloud technologies. David is also Director of Product Marketing for Extreme Networks. He is the author of numerous books, white papers and videos about Wi-Fi technology. DAVID A. WESTCOTT, CWNE #7, is an independent consultant and WLAN technical trainer of thirty years. He provides vendor and custom wireless training to government agencies, corporations and universities around the world.Foreword xxxvIntroduction xxxviiAssessment Test lviCHAPTER 1 OVERVIEW OF WIRELESS STANDARDS, ORGANIZATIONS, AND FUNDAMENTALS 1History of Wireless Local Area Networks 3Standards Organizations 5Federal Communications Commission 5International Telecommunication Union Radiocommunication Sector 6Institute of Electrical and Electronics Engineers 8Internet Engineering Task Force 9Wi-Fi Alliance 11International Organization for Standardization 21Core, Distribution, and Access 22Communications Fundamentals 24Communication Terminology 24Understanding Carrier Signals 25Understanding Keying Methods 27Summary 33Exam Essentials 33Review Questions 34CHAPTER 2 IEEE 802.11 STANDARD AND AMENDMENTS 39Original IEEE 802.11 Standard 42IEEE 802.11-2020 Ratified Amendments 44802.11a-1999 45802.11b-1999 46802.11d-2001 47802.11e-2005 47802.11g-2003 48802.11h-2003 50802.11i-2004 52802.11j-2004 53802.11k-2008 53802.11n-2009 54802.11p-2010 55802.11r-2008 55802.11s-2011 56802.11u-2011 57802.11v-2011 58802.11w-2009 58802.11y-2008 59802.11z-2010 59802.11aa-2012 59802.11ac-2013 59802.11ad-2012 60802.11ae-2012 61802.11af-2014 61802.11ah-2016 62802.11ai-2016 63802.11aj-2018 63802.11ak-2018 63802.11aq-2018 63IEEE 802.11 Draft Amendments 63802.11ax (High Efficiency) 64802.11ay (Next-Generation 60 GHz) 65802.11az (Next-Generation Positioning) 65802.11ba (Wake-Up Radio) 65802.11bb (Light Communications) 65802.11bc (Enhanced Broadcast Service) 65802.11bd (Enhancements for Next-Generation V2X) 65802.11be (Extremely High Throughput) 66Defunct Amendments 66802.11F 66802.11T 67IEEE Task Group m 68Summary 69Exam Essentials 69Review Questions 70CHAPTER 3 RADIO FREQUENCY FUNDAMENTALS 75What is a Radio Frequency Signal? 77Radio Frequency Characteristics 78Wavelength 78Frequency 83Amplitude 85Phase 86Radio Frequency Behaviors 87Wave Propagation 87Absorption 88Reflection 89Scattering 91Refraction 91Diffraction 92Loss (Attenuation) 94Free Space Path Loss 96Multipath 98Gain (Amplification) 101RF Analysis Tools 102Summary 103Exam Essentials 103Review Questions 104CHAPTER 4 RADIO FREQUENCY COMPONENTS, MEASUREMENTS, AND MATHEMATICS 109Components of RF Communications 112Transmitter 112Antenna 113Receiver 114Intentional Radiator 114Equivalent Isotropically Radiated Power 114Units of Power and Comparison 115Watt 116Milliwatt 117Decibel 117Decibels Relative to an Isotropic Radiator (dBi) 120Decibels Relative to a Half-Wave Dipole Antenna (dBd) 120Decibels Relative to 1 Milliwatt (dBm) 121Inverse Square Law 122RF Mathematics 123Rule of 10s and 3s 124RF Math Summary 129Noise Floor 130Signal-to-Noise Ratio 130Signal-to-Interference-Plus-Noise Ratio 131Received Signal Strength Indicator 131Link Budget 135Fade Margin/System Operating Margin 138Summary 140Exam Essentials 142Review Questions 143CHAPTER 5 RADIO FREQUENCY SIGNAL AND ANTENNA CONCEPTS 147Azimuth and Elevation Charts (Antenna Radiation Envelopes) 150Interpreting Polar Charts 152Beamwidth 155Antenna Types 157Omnidirectional Antennas 158Downtilt Omnidirectional Antennas 161Semidirectional Antennas 162Highly Directional Antennas 164Sector Antennas 166Antenna Arrays 167Visual Line of Sight 169RF Line of Sight 169Fresnel Zone 170Earth Bulge 174Antenna Polarization 175Antenna Diversity 176Multiple-Input, Multiple-Output 177MIMO Antennas 178Antenna Connection and Installation 179Voltage Standing Wave Ratio 179Signal Loss 181Antenna Mounting 181Antenna Accessories 187Cables 188Connectors 188Splitters 189Amplifiers 189Attenuators 190Lightning Arrestors 191Grounding Rods and Wires 192Regulatory Compliance 192Summary 194Exam Essentials 194Review Questions 195CHAPTER 6 WIRELESS NETWORKS AND SPREAD SPECTRUM TECHNOLOGIES 199Throughput vs. Bandwidth 201Narrowband and Spread Spectrum 202Multipath Interference 204Frequency-Hopping Spread Spectrum 205Hopping Sequence 206Dwell Time 207Hop Time 207Modulation 207Direct-Sequence Spread Spectrum 208DSSS Data Encoding 208Modulation 209Transmit Spectrum Mask 210Orthogonal Frequency-Division Multiplexing 211Convolutional Coding 212Modulation 213Transmit Spectrum Mask 215Orthogonal Frequency-Division Multiple Access 217Industrial, Scientific, and Medical Bands 218900 MHz ISM Band 2182.4 GHz ISM Band 2195.8 GHz ISM Band 2195 GHz Unlicensed National Information Infrastructure Bands 220U-NII-1 220U-NII-2A 221U-NII-2C 221U-NII-3 222U-NII-4 22260 GHz for Wi-Fi 223Below 1 GHz 2242.4 GHz Channels 2245 GHz Channels 227Long-Term Evolution in 5 GHz 2316 GHz Channels 2326 GHz Incumbents 235Automated Frequency Coordination 2366 GHz Worldwide 2376 GHz Wi-Fi Considerations 238Summary 239Exam Essentials 239Review Questions 240CHAPTER 7 WIRELESS LAN TOPOLOGIES 245Wireless Networking Topologies 247Wireless Wide Area Network 248Wireless Metropolitan Area Network 248Wireless Personal Area Network 249Wireless Local Area Network 250802.11 Stations 251Client Station 252Access Point Station 252Integration Service 252Distribution System 253Wireless Distribution System 254802.11 Service Sets 255Service Set Identifier 256Basic Service Set 256Basic Service Area 257Basic Service Set Identifier 258Multiple Basic Service Set Identifiers 259Extended Service Set 261Independent Basic Service Set 262Personal Basic Service Set 264Mesh Basic Service Set 264QoS Basic Service Set 266802.11 Configuration Modes 267Access Point Modes 267Client Station Modes 268Summary 269Exam Essentials 269Review Questions 271CHAPTER 8 802.11 MEDIUM ACCESS 275CSMA/CA vs. CSMA/CD 276Collision Detection 277Distributed Coordination Function 278Physical Carrier Sense 279Virtual Carrier Sense 280Pseudo-Random Backoff Timer 283Interframe Space 285Hybrid Coordination Function 286Enhanced Distributed Channel Access 287HCF Controlled Channel Access 288Wi-Fi Multimedia 288Airtime Fairness 290Summary 292Exam Essentials 292Review Questions 293CHAPTER 9 802.11 MAC 297Packets, Frames, and Bits 299Data-Link Layer 300MAC Service Data Unit 300MAC Protocol Data Unit 300Physical Layer 301PLCP Service Data Unit 301PLCP Protocol Data Unit 302802.11 and 802.3 Interoperability 302802.11 MAC Header 303Frame Control Field 304Duration/ID Field 306MAC Layer Addressing 307Sequence Control Field 314QoS Control Field 315HT Control Field 315802.11 Frame Body 315802.11 Trailer 316802.11 State Machine 317Management Frames 318Beacon 318Authentication 325Association 326Reassociation 329Disassociation 331Deauthentication 331Action Frame 331Control Frames 333ACK Frame 333Block Acknowledgment 335PS-Poll 336RTS/CTS 336CTS-to-Self 338Protection Mechanisms 338Data Frames 341QoS and Non-QoS Data Frames 342Non-Data Carrying Frames 343Power Management 344Legacy Power Management 345WMM-Power Save and U-APSD 347MIMO Power Management 349802.11ax Power Management 349Summary 350Exam Essentials 350Review Questions 352CHAPTER 10 MIMO TECHNOLOGY: HT AND VHT 357MIMO 360Radio Chains 362Spatial Multiplexing 363MIMO versus SISO diversity 366Maximal Ratio Combining 366Space-Time Block Coding 367Cyclic Shift Diversity 368Transmit Beamforming 368Explicit Beamforming 370Multi-User MIMO 371Multi-User Beamforming 373Channels 37620 MHz Channels 37640 MHz Channels 377Forty MHz Intolerant 37980 MHz and 160 MHz Channels 380Guard Interval 382256-QAM Modulation 384802.11n/ac PPDUs 388Non-HT 388HT Mixed 388VHT 389802.11n/ac MAC 390A-MSDU 390A-MPDU 391Block Acknowledgment 392Power Management 392Modulation and Coding Scheme 394802.11ac Data Rates 397HT/VHT Protection Mechanisms 399HT Protection Modes (0–3) 399Wi-Fi Alliance Certification 400Summary 403Exam Essentials 403Review Questions 405CHAPTER 11 WLAN ARCHITECTURE 409WLAN Client Devices 411802.11 Radio Form Factors 412802.11 Radio Chipsets 418Client Utilities 418Management, Control, and Data Planes 421Management Plane 422Control Plane 422Data Plane 423WLAN Architecture 423Autonomous WLAN Architecture 423Centralized Network Management Systems 425Centralized WLAN Architecture 427Distributed WLAN Architecture 434Hybrid WLAN Architecture 436Specialty WLAN Infrastructure 437Enterprise WLAN Branch Routers 437WLAN Mesh Access Points 438WLAN Bridges 439Real-Time Location Systems 441VoWiFi 443Cloud Networking 445Application Programming Interface 448Transport and Data Formats 449WLAN APIs 450Common Applications 450Infrastructure Management 451Protocols for Management 452Summary 456Exam Essentials 457Review Questions 458CHAPTER 12 POWER OVER ETHERNET (POE) 463History of PoE 464Nonstandard PoE 465IEEE 802.3af 465IEEE Std 802.3-2005, Clause 33 465IEEE 802.3at-2009 465IEEE Std 802.3-2018, Clause 33 466IEEE 802.3bt-2018 466PoE Devices 467Powered Device 467Power-Sourcing Equipment 469Endpoint PSE 470Midspan PSE 476Planning and Deploying PoE 484Power Planning 484Redundancy 487Downgrade PoE Capabilities 488802.3bt Power Considerations 488Summary 490Exam Essentials 491Review Questions 492CHAPTER 13 WLAN DESIGN CONCEPTS 497WLAN Coverage Design 499Received Signal 500Signal-to-Noise Ratio 501Dynamic Rate Switching 503Transmit Power 504Roaming Design 505Primary and Secondary Coverage 508Fast Secure Roaming 509Layer 3 Roaming 510Channel Design 512Adjacent Channel Interference 5122.4 GHz Channel Reuse 513Co-Channel Interference 5165 GHz Channel Reuse 519DFS Channels 52140 MHz Channel Design 527Static Channels and Transmit Power vs. Adaptive RF 529Single-Channel Architecture 531Capacity Design 534High-Density 535Band Steering 539Load Balancing 542Airtime Consumption 543Voice vs. Data 546Dual 5 GHz and Software-Defined Radios 5486 GHz WLAN Design 551Client Considerations 552Coverage Considerations 5536 GHz Channel Reuse 5536 GHz AP Discovery 5546 GHz Wi-Fi Security 556Physical Environment 557Antennas 558Outdoor Design 562Summary 563Exam Essentials 564Review Questions 565CHAPTER 14 SITE SURVEY AND VALIDATION 569WLAN Site Survey and Design Interview 572Customer Briefing 572Business Requirements 573Capacity and Coverage Requirements 574Existing Wireless Network 576Upgrading an Existing WLAN 577Infrastructure Connectivity 578Security Expectations 580Guest Access 581Aesthetics 581Outdoor Surveys 582Vertical Market Considerations 582Government 583Education 583Healthcare 583Retail 584Warehouses and Manufacturing 584Multi-Tenant Buildings 585Legacy AP-on-a-Stick Survey 585Spectrum Analysis 586Coverage Analysis 590Hybrid Survey 595Initial Site Visit 595Predictive Design 597Validation Survey 599Capacity and Throughput 601Roaming 602Delay and Jitter 603Connectivity 603Aesthetics 603Site Survey Tools 604Indoor Site Survey Tools 604Outdoor Site Survey Tools 607Documents and Reports 609Forms and Customer Documentation 610Deliverables 612Additional Reports 613Summary 614Exam Essentials 615Review Questions 616CHAPTER 15 WLAN TROUBLESHOOTING 621Five Tenets of WLAN Troubleshooting 623Troubleshooting Best Practices 623Troubleshoot the OSI Model 625Most Wi-Fi Problems Are Client Issues 627Proper WLAN Design Reduces Problems 628WLAN Always Gets the Blame 629Layer 1 Troubleshooting 629WLAN Design 629Transmit Power 630RF Interference 630Drivers 634PoE 635Firmware Bugs 635Layer 2 Troubleshooting 636Layer 2 Retransmissions 636RF Interference 639Low SNR 639Adjacent Channel Interference 640Hidden Node 641Mismatched Power 646Multipath 648Security Troubleshooting 648PSK Troubleshooting 649802.1X/EAP Troubleshooting 651VPN Troubleshooting 659Roaming Troubleshooting 661Channel Utilization 665Layers 3–7 Troubleshooting 667WLAN Troubleshooting Tools 671WLAN Discovery Applications 671Spectrum Analyzers 672Protocol Analyzers 673Throughput Test Tools 675Standard IP Network Test Commands 677Secure Shell 678Summary 679Exam Essentials 679Review Questions 680CHAPTER 16 WIRELESS ATTACKS, INTRUSION MONITORING, AND POLICY 687Wireless Attacks 688Rogue Wireless Devices 689Peer-to-Peer Attacks 692Eavesdropping 693Encryption Cracking 697KRACK Attack 698Kr00k Vulnerability 698Authentication Attacks 699MAC Spoofing 701Management Interface Exploits 701Wireless Hijacking 702Denial-of-Service Attacks 703Vendor-Specific Attacks 705Social Engineering 706Intrusion Monitoring 706Wireless Intrusion Prevention System 706Rogue Detection and Mitigation 709Spectrum Analyzers 712Wireless Security Policies 712General Security Policies 713Functional Security Policies 713Legislative Compliance 714802.11 Wireless Policy Recommendations 715Summary 716Exam Essentials 717Review Questions 718CHAPTER 17 802.11 NETWORK SECURITY ARCHITECTURE 723802.11 Security Basics 725Data Privacy and Integrity 726Authentication, Authorization, and Accounting 728Segmentation 728Monitoring and Policy 729Legacy 802.11 Security 729Legacy Authentication 730Static WEP Encryption 731MAC Filters 735SSID Cloaking 735Robust Security 736Robust Security Network 737Authentication and Authorization 738PSK Authentication 738Proprietary PSK Authentication 741Simultaneous Authentication of Equals 743802.1X/EAP Framework 746EAP Types 749Dynamic Encryption-Key Generation 7514-Way Handshake 752WLAN Encryption 754TKIP Encryption 755CCMP Encryption 756GCMP Encryption 756Management Frame Protection 757WPA2 757WPA3 758WPA3-Personal 758WPA3-Enterprise 759Enhanced Open 7616 GHz Wi-Fi Security 762Traffic Segmentation 763VLANs 763RBAC 765VPN Wireless Security 766VPN 101 767Layer 3 VPNs 768SSL VPNs 768VPN Deployment 768Summary 770Exam Essentials 770Review Questions 772CHAPTER 18 BRING YOUR OWN DEVICE (BYOD) AND GUEST ACCESS 777Mobile Device Management 780Company-Issued Devices vs. Personal Devices 781MDM Architecture 782MDM Enrollment 784MDM Profiles 788MDM Agent Software 790Over-the-Air Management 791Application Management 793Self-Service Device Onboarding for Employees 795Dual-SSID Onboarding 796Single-SSID Onboarding 796MDM vs. Self-Service Onboarding 797Guest WLAN Access 798Guest SSID 798Guest VLAN 799Guest Firewall Policy 800Captive Web Portals 801Client Isolation, Rate Limiting, and Web Content Filtering 804Guest Management 805Guest Self-Registration 806Employee Sponsorship 808Social Login 809Encrypted Guest Access 810Hotspot 2.0 and Passpoint 811Access Network Query Protocol 811Hotspot 2.0 Architecture 813802.1X/EAP and Hotspot 2.0 814Online Sign-Up 815Roaming Agreements 816Network Access Control 816Posture 817OS Fingerprinting 818AAA 820RADIUS Change of Authorization 821Single Sign-On 822Summary 824Exam Essentials 825Review Questions 826CHAPTER 19 802.11AX: HIGH EFFICIENCY (HE) 831802.11ax = Wi-Fi 6 833Wi-Fi Traffic Congestion 834HE Overview 836Multi-User 837OFDMA 838Subcarriers 839Resource Units 840Trigger Frames 844Downlink OFDMA 847Uplink OFDMA 848Buffer Status Reports 849Operating Mode Indication 850MU-MIMO 851BSS Color and Spatial Reuse 855OBSS 855BSS Color 857Spatial Reuse Operation 858Target Wake Time 861Additional 802.11ax PHY and MAC Capabilities 8621024-QAM 862Long Symbol Time and Guard Intervals 863802.11ax PHY headers 86420 MHz-Only 865Multi-TID AMPDU 867Wi-Fi 6 Key Questions 867Clients 867Multi-Gig Ethernet 868Power over Ethernet 8704×4:4 vs. 8×8:8 87180 MHz and 160 MHz Channels 872Wi-Fi CERTIFIED 6 873Summary 874Review Questions 875CHAPTER 20 WLAN DEPLOYMENT AND VERTICAL MARKETS 879Deployment Considerations for Commonly Supported WLAN Applications and Devices 881Data 881Voice 882Video 882Real-Time Location Services 883iBeacon Proximity 883Mobile Devices 885Corporate Data Access and End-User Mobility 885Network Extension to Remote Areas 886Bridging: Building-to-Building Connectivity 887Wireless ISP: Last-Mile Data Delivery 888Small Office/Home Office 888Temporary Office Networking 889Branch Offices 890Teleworker Wi-Fi 890Educational/Classroom Use 891Industrial: Warehousing and Manufacturing 892Retail 892Healthcare 894Municipal Networks 895Hotspots: Public Network Access 895Stadium Networks 897Transportation Networks 897Law Enforcement Networks 898First-Responder Networks 899Managed Service Providers 900Fixed Mobile Convergence 900WLAN and Health 901Internet of Things 901WLAN Vendors 902Summary 904Exam Essentials 904Review Questions 905APPENDIX A ANSWERS TO REVIEW QUESTIONS 909Chapter 1: Overview of Wireless Standards, Organizations, and Fundamentals 910Chapter 2: IEEE 802.11 Standard and Amendments 911Chapter 3: Radio Frequency Fundamentals 914Chapter 4: Radio Frequency Components, Measurements, and Mathematics 915Chapter 5: Radio Frequency Signal and Antenna Concepts 918Chapter 6: Wireless Networks and Spread Spectrum Technologies 919Chapter 7: Wireless LAN Topologies 922Chapter 8: 802.11 Medium Access 924Chapter 9: 802.11 MAC 926Chapter 10: MIMO Technology: HT and VHT 929Chapter 11: WLAN Architecture 932Chapter 12: Power over Ethernet (PoE) 934Chapter 13: WLAN Design Concepts 937Chapter 14: Site Survey and Validation 940Chapter 15: WLAN Troubleshooting 943Chapter 16: Wireless Attacks, Intrusion Monitoring, and Policy 946Chapter 17: 802.11 Network Security Architecture 948Chapter 18: Bring Your Own Device (BYOD) and Guest Access 951Chapter 19: 802.11ax: High Efficiency (HE) 954Chapter 20: WLAN Deployment and Vertical Markets 957APPENDIX B ABBREVIATIONS AND ACRONYMS 961Certifications 962Organizations and Regulations 962Measurements 963Technical Terms 964Index 981
Computer Vision Using Deep Learning
Organizations spend huge resources in developing software that can perform the way a human does. Image classification, object detection and tracking, pose estimation, facial recognition, and sentiment estimation all play a major role in solving computer vision problems.This book will bring into focus these and other deep learning architectures and techniques to help you create solutions using Keras and the TensorFlow library. You'll also review mutliple neural network architectures, including LeNet, AlexNet, VGG, Inception, R-CNN, Fast R-CNN, Faster R-CNN, Mask R-CNN, YOLO, and SqueezeNet and see how they work alongside Python code via best practices, tips, tricks, shortcuts, and pitfalls. All code snippets will be broken down and discussed thoroughly so you can implement the same principles in your respective environments.Computer Vision Using Deep Learning offers a comprehensive yet succinct guide that stitches DL and CV together to automate operations, reduce human intervention, increase capability, and cut the costs.WHAT YOU'LL LEARN* Examine deep learning code and concepts to apply guiding principals to your own projects* Classify and evaluate various architectures to better understand your options in various use cases* Go behind the scenes of basic deep learning functions to find out how they workWHO THIS BOOK IS FORProfessional practitioners working in the fields of software engineering and data science. A working knowledge of Python is strongly recommended. Students and innovators working on advanced degrees in areas related to computer vision and Deep Learning.VAIBHAV VERDHAN is a seasoned data science professional with rich experience spanning across geographies and retail, telecom, manufacturing, health-care and utilities domain. He is a hands-on technical expert and has led multiple engagements in Machine Learning and Artificial Intelligence. He is a leading industry expert, is a regular speaker at conferences and meet-ups and mentors students and professionals. Currently he resides in Ireland and is working as a Principal Data Scientist.Chapter 1 Introduction to Computer Vision and Deep Learning.- Chapter 2 Nuts and Bolts of Deep Learning for Computer Vision.- Chapter 3 Image Classification using LeNet.- Chapter 4 VGGNet and AlexNext Networks.- Chapter 5 Object Detection Using Deep Learning.- Chapter 6 Facial Recognition and Gesture Recognition.- Chapter 7 Video Analytics Using Deep Learning.- Chapter 8 End-to-end Model Development.- Appendix.
Künstliche Intelligenz
Künstliche Intelligenz (KI) ist heute schon in unserem Alltag präsent und wird uns zukünftig in nahezu allen Lebensbereichen begegnen – von der bildgestützten Diagnose in der Medizin über das autonome Fahren und die intelligente Maschinenwartung in der Industrie bis hin zur Sprachsteuerung im smarten Zuhause. Die Potenziale der KI sind enorm, gleichzeitig kursieren viele Mythen, Ungewissheiten und Herausforderungen, die es zu meistern gilt.Dieses Buch adressiert daher die breite Öffentlichkeit – von interessierten Bürgerinnen und Bürgern bis hin zur Leitungsebene in Unternehmen, die ein besseres und tieferes technisches Verständnis von KI-Technologien aufbauen und deren Folgen abschätzen möchten.In verständlicher Sprache werden mathematische Grundlagen, Begriffe und Methoden erläutert. Eine abschließende Diskussion der Chancen und Herausforderungen hilft den Leserinnen und Lesern, die Entwicklungen zu bewerten, sie zu entmystifizieren und ihre Relevanz für die Zukunft zu erkennen.DR. GERHARD PAAẞ ist Diplom-Mathematiker mit Promotion in Makroökonomie an der Uni Bonn. Seine Forschungsschwerpunkte liegen im Bereich der neuronalen Netze, des Textmining und der Statistik. Als Wissenschaftler in der Gesellschaft für Mathematik und Datenverarbeitung und Gruppenleiter im Fraunhofer-Institut für Intelligente Analyse- und Informationssysteme IAIS war er an zahlreichen Forschungs- und Industrieprojekten zum Maschinellen Lernen beteiligt. In den letzten Jahren ist er v. a. als Dozent in Schulungen für KI und Tiefe Neuronale Netzwerke tätig.DR. DIRK HECKER ist stellvertretender Institutsleiter des Fraunhofer IAIS. Er studierte und promovierte im Bereich Geo-Informatik an den Universitäten Köln und Bonn. Seit vielen Jahren beschäftigt sich Dirk Hecker mit Aspekten der Digitalisierung und deren Einfluss auf Wirtschaft und Gesellschaft. Er ist in zahlreichen Direktorien sowie Leitungskreisen diverser bundesweiter KI-Initiativen tätig.Was ist intelligent an Künstlicher Intelligenz und was kann sie? - Grundbegriffe und Methoden des Maschinellen Lernens - Wie Tiefe Neuronale Netze Zusammenhänge erfassen und Strategien lernen - Wie KI Bilder erkennt, Texte analysiert und gesprochene Sprache versteht - Kann KI kreativ sein und Emotionen lernen? - Chancen, Herausforderungen und Risiken für Wirtschaft und Gesellschaft
Security by Design
Der Softwareingenieur von heute muss die grundlegende Disziplin der Entwicklung sicherer informationstechnischer Systeme verstehen. Nicht, weil es eine ein „gute Idee“ ist, sondern weil unsere Arbeits- und Lebenswelten zunehmend auf die Funktionsfähigkeit und die Sicherheit hochkomplexer und dynamischer informationstechnischer Infrastrukturen angewiesen sind. Die Vorstellung, dass die Sicherheit informationstechnischer Systeme etwas Besonderes ist, ist ein Trugschluss. Tatsächlich ist Sicherheit nur ein Aspekt der Zuverlässigkeit. Wir können keine zuverlässigen Anwendungen und Systeme haben, wenn diese nicht sicher sind.Vor diesem Hintergrund gehen die Autoren der Frage nach, ob und in welchem Ausmaß die mit dem Einsatz der Artefakte der digitalen Revolution einhergehenden Risiken beherrschbar bleiben, und welche Möglichkeiten wir bereits heute haben, die Eindämmung von Risiken und Gefahren schon beim Entwurf informationstechnischer Systeme zu berücksichtigen. Die Antwort ist ein systematischer praxis- und modellbasierter Ansatz für das Security-Engineering von Informationssystemen.DR. ARMIN LUNKEIT ist Informatiker und widmet sich seit mehr als 20 Jahren der Entwicklung und dem Einsatz sicherheitskritischer Anwendungen und Systeme. Er hat sich in diesem Zeitraum intensiv mit der Integration des Security Engineerings in die Systementwicklung auseinandergesetzt und dazu mehrere Artikel veröffentlicht.DR. WOLF ZIMMER ist Physiker und war mehr als 25 Jahre in der Softwareentwicklung und Strategieberatung eines weltweit agierenden IT-Unternehmens tätig. Er hat in diesem Umfeld bereits mehrere Bücher und Artikel veröffentlicht.Was ist das Problem? - Der IT-Sicherheitsstack - Systems Engineering ist Security Engineering - Modell-basiertes Design - Die SmartFit AG - Fragile Kryptografie - The Proof of the Pudding is in the eating - Die Vermessung der (Un-)Sicherheit - Ausblick
How to get Instant Overview
Often, Excel is used to evaluate given data. Which values are critical? Can I see at a glance what the development was like? Can I highlight a whole row if one column has important content? Or ask for the content of two cells, simultaneously? How do I get overview in a thick workbook? How do I get a clear and telling chart? Can I ask Excel in natural language without any formula? All these questions are answered here.Ina Koys is an experienced instructor for Microsoft Office. Many questions are frequently asked in trainings, but seldom covered in books. Now she answers some of them in her originally German "short & spicy" series. A little accent will add to the fun :-)
OCP Oracle Certified Professional Java SE 11 Developer Practice Tests
NOTE: The OCP Java SE 11 Programmer I Exam 1Z0-815 and Programmer II Exam 1Z0-816 have been retired (as of October 1, 2020), and Oracle has released a new Developer Exam 1Z0-819 to replace the previous exams. The Upgrade Exam 1Z0-817 remains the same.IMPROVE YOUR PREPARATION FOR THE OCP JAVA SE 11 DEVELOPER EXAM WITH THESE COMPREHENSIVE PRACTICE TESTSOCP Oracle Certified Professional Java SE 11 Developer Practice Tests: Exam 1Z0-819 and Upgrade Exam 1Z0-817 offers readers over 1000 practice questions to help them hone their skills for the challenging 1Z0-819 exam as well as the 1Z0-817 upgrade exam.Covering all the objective domains that help readers master the crucial subject areas covered by the exam, OCP Oracle Certified Professional Java SE 11 Developer Practice Tests provides domain-by-domain questions as well as additional bonus practice exams to further solidify the reader’s mastery of its subjects. This book covers topics like:* Understanding Java Technology and Environment * Working with Java Operators, Primitives, and Strings * Creating Methods and Lambda Expressions * Designing Classes, Interfaces, Enums, and Annotations * Writing Functional Interfaces and Streams * Building Modules and Migrating Applications to Modules * Applying I/O, NIO.2, JDBC, Threads, and Concurrency * Secure Coding in Java SE Application * And much more Perfect for anyone studying for the OCP Java SE 11 Developer and Upgrade exams, as well as all those who wish to brush up on their Java programming skills, OCP Oracle Certified Professional Java SE 11 Developer Practice Tests: Exam 1Z0-819 and Upgade Exam 1Z0-817 is an indispensable resource that has a place on the bookshelf of every Java enthusiast, professional, and student.ABOUT THE AUTHORSSCOTT SELIKOFF, OCA/OCP 8 AND OCP 11, has been a professional Java Enterprise architect for over 20 years. He is founder of Selikoff Solutions, LLC, specializing in building custom mobile and server solutions for businesses in the tri-state New York City area. JEANNE BOYARSKY, OCA/OCP 8 AND OCP 11, is a Java Champion and has worked as a Java developer for a major bank for more than 18 years. She is a senior moderator at CodeRanch, and trains and mentors students of all levels, including the programming division of a FIRST robotics team. Introduction xvChapter 1 Working with Java Data Types 1Chapter 2 Controlling Program Flow 13Chapter 3 Java Object-Oriented Approach 27Chapter 4 Exception Handling 125Chapter 5 Working with Arrays and Collections 157Chapter 6 Working with Streams and Lambda Expressions 187Chapter 7 Java Platform Module System 243Chapter 8 Concurrency 271Chapter 9 Java I/O API 289Chapter 10 Secure Coding in Java SE Application 309Chapter 11 Database Applications with JDBC 329Chapter 12 Localization 341Chapter 13 Annotations 353Chapter 14 Practice Exam 1 365Chapter 15 Practice Exam 2 391Chapter 16 Practice Exam 3 415Appendix Answers and Explanations 441Index 565
How Open Source Ate Software
Learn how free software became open source and how you can sell open source software. This book provides a historical context of how open source has thoroughly transformed how we write software, how we cooperate, how we communicate, how we organize, and, ultimately, how we think about business values.This fully updated second edition includes an entire chapter on legal considerations such as trademarks and the latest happenings in open source licensing. It also expands on open hardware trends such as RISC-V, open governance, and the difference between community projects and commercial products, especially as seen through the lens of security.You’ll look at project and community examples including Linux, BSD, Apache, and Kubernetes, understand the open source development model, and how open source has influenced approaches more broadly, even within proprietary software, such as open betas. You'll also examine the flipside, the "Second Machine Age," and the challenges of open source-based business models.Today, open source serves as shorthand for much broader trends and behaviors. It’s not just about a free (in all senses of the word) alternative to commercial software. It increasingly is the new commercial software. How Open Source Ate Software, second edition reveals how open source has much in common, and is often closely allied, with many other trends in business and society. You'll see how it enables projects that go beyond any individual company. That makes open source not just a story about software, but a story about almost everything.WHAT YOU'LL LEARN* The opportunities that open source creates and the challenges that come with them* The ways in which companies can create business models to successfully sell "free" software* How the open source development model works from creating communities to selling commercial products* The important issues associated with open source project and product governance and licensing* How open source principles can apply more broadly to DevOps and other organizational practicesWHO THIS BOOK IS FORAnyone who is contemplating building a community and a business around open source software.GORDON HAFF is Red Hat technology evangelist, is a frequent and highly acclaimed speaker at customer and industry events, and helps develop strategy across Red Hat’s full portfolio of cloud solutions. He is the co-author of Pots and Vats to Computers and Apps: How Software Learned to Package Itself in addition to numerous other publications. Prior to Red Hat, Gordon wrote hundreds of research notes, was frequently quoted in publications like The New York Times on a wide range of IT topics, and advised clients on product and marketing strategies. Earlier in his career, he was responsible for bringing a wide range of computer systems, from minicomputers to large UNIX servers, to market while at Data General. Gordon has engineering degrees from MIT and Dartmouth and an MBA from Cornell’s Johnson School. Follow him on Twitter @ghaff.1. The Beginnings of Free and Open Source Software2. From "Free" to "Open Source" to Products3. The Open Source Development Model4. What's the Law?5. Open Source’s Connection to the Past6. Business Models and Accelerated Development7. The Challenges Facing Open Source Today8. Open Source Opportunities and Challenges
Getting Started with NSX-T: Logical Routing and Switching
This primer on NSX-T helps you understand the capabilities and features of NSX-T, how to configure and manage NSX-T, and integrate NSX-T with other software. The book is the first in a series that will teach you the basics of NSX-T, which is an update of VMware's original software-defined networking (SDN) architecture aimed at making networks agile and flexible.You will become familiar with VMware's software-defined data center (SDDC) ecosystem and how NSX-T fits in. You will understand NSX-T components such as NSX-T Manager, NSX-T Edge Transport Nodes, and NSX-T Host Transport Nodes. And you will learn how to install and configure network services such as East/West and North/South routing capabilities, layer two switching, VRF, EVPN, multicast, and layer two bridging.The book provides best practices on how to configure routing and switching features, and teaches you how to get the required visibility of not only your NSX-T platform but also your NSX-T-enabled network infrastructure.The book explains security, advanced network features, and multi-site capabilities and demonstrates how network and security services can be offered across multiple on-premise locations with a single pane of glass for networking and security policy management. The interface with public cloud services is discussed and the book explains NSX-T operation in an on-premise private cloud and positioning and integrating NSX-T on a public cloud (off premises).WHAT YOU WILL LEARN* Understand how NSX-T fits in the VMware SDDC ecosystem* Know what NSX-T is, its components, and the terminology used* Install NSX-T* Configure NSX-T network services* Manage the NSX-T networkWHO THIS BOOK IS FORVirtualization administrators, system integrators, and network administratorsIWAN HOOGENDOORN started his IT career in 1999 as a help desk agent. He began learning Microsoft products and obtained MCP, MCSA, MCDBA, and MCSE certifications.While working as a Microsoft Systems Engineer, he developed additional skills and knowledge in computer networking with Cisco products. He dreamed of working for Cisco but first needed to finish his bachelor's degree in ICT, which he completed in 2009.In 2010, Iwan began working for his dream company, Cisco. After finishing his master's degree in computer science at the University of Amsterdam and becoming a CCIE (#13084) in six different technology areas, he wanted to learn something new and network virtualization was the next logical step.Iwan decided to learn VMware NSX and got the opportunity to work for VMware in 2016 as a Senior NSX PSO Consultant. In his time at VMware, he gained more knowledge on private and public clouds and the related products that VMware developed to build the Software-Defined Data Center (SDDC).After working for four years as a Senior NSX PSO Consultant (primarily with VMware NSX-v and NSX-T), Iwan was promoted to Staff SDDC Consultant focusing on the full SDDC stack, including Hyperscaler offerings on public clouds such as AWS (VMC on AWS), Microsoft (Azure VMware Solution), and Google (Google Cloud VMware Engine).Iwan is certified on multiple VMware products, including NSX, and is actively working with VMware certification to develop network-related exams for VMware. He is also AWS and TOGAF certified.· CHAPTER 1o Title: NSX-T AND THE VMWARE SDDC ECOSYSTEMo Chapter Goal: Provide information on the SDDC and what the position is of NSX-T.o Number of Pages: 5o Subtopics:§ The VMware’s SDDC ecosystem§ Compute§ Storage§ Software Defined Networking· CHAPTER 2o Title: AN INTRODUCTION TO NSX-To Chapter Goal: Provide information on the product, the problem that can be solved and use-cases that can be satisfied.o Number of Pages: 10o Subtopics:§ NSX-T Components§ NSX-T Use Cases· CHAPTER 3o Title: THE NSX-T INSTALLATION ON A VSPHERE ENVIRONMENTo Chapter Goal: Explain the components of NSX-T and how these are deployed including the prerequisites.o Number of Pages: 20o Subtopics:§ NSX-T Installation Planning & Prerequisites§ NSX-T Manager Installation§ Edge Transport Installation (VM)§ Edge Transport Installation (BM)§ Host Transport Node Installation (ESXi)· CHAPTER 4o Title: TIER-0 GATEWAYSo Chapter Goal: Configure North/South Routing using the T0 Gateway with different kind of features.o Number of Pages: 20o Subtopics:§ Deploy a T0 Gateway§ Configure Routing§ Configure Multicast§ IPv6 Routing§ T0 High Availability§ VRF Deployment§ EVPN Deployment· CHAPTER 5o Title: TIER-1 GATEWAYSo Chapter Goal: Create and Configure T1 Gateways.o Number of Pages: 5o Subtopics:§ Deploy a T0 Gateway§ Configure Routing· CHAPTER 6o Title: SEGMENTSo Chapter Goal: Create and Configure L2 Segments with various service capabilities.o Number of Pages: 10o Subtopics:§ Attach segments§ DHCP & DHCP Static Binds§ L2 Bridging§ Add a Metadata Proxy Server· CHAPTER 7o Title: HOST SWITCHESo Chapter Goal: Explanation on the interrogability with the vSphere Distributed Switch and the defense between the N-VDS.o Number of Pages: 5o Subtopics:§ NSX-T with the vSphere Distributed Switch§ NSX-T N-VDS§ Enhanced Networking StackCHAPTER 8o Title: VIRTUAL PRIVATE NETWORK (VPN)o Chapter Goal: Know the differ types of VPN and how to configure and monitor them.o Number of Pages: 10o Subtopics:§ IPSEC (L3 VPN)§ L2 VPN§ Configuration of VPN· L3· L4§ Monitoring of VPN sessions· CHAPTER 9o Title: NETWORK ADDRESS TRANSLATION (NAT)o Chapter Goal: Know the difference between SNAT and DNAT and explanation on how to configure NAT.o Number of Pages: 5o Subtopics:§ SNAT§ DNAT§ Configure NAT Services· CHAPTER 10o Title: LOAD BALANCING (LB)o Chapter Goal: Discuss Load Balancing capabilities and configuration.o Number of Pages: 10o Subtopics:§ Load Balancing Concepts§ Distributed Load Balancer§ Setting up the Load Balancer Components· CHAPTER 11o Title: IP ADDRESS MANAGEMENT (IPAM)o Chapter Goal: DNS and DHCP IP address Management using the internal NSX-T Tools.o Number of Pages: 5o Subtopics:§ DNS Zone§ DNS Forwarding Zone§ DHCP Profile§ IP Address Pool§ IP Address Block· CHAPTER 12o Title: NETWORK SETTINGSo Chapter Goal: Getting to know the Network setting that can be configured to finetune your network services.o Number of Pages: 10o Subtopics:§ Multicast§ VNI Pools§ Gateway Settings§ Gateway QoS Profile§ BFD Profile§ IP Discovery Profiles§ MAC Discovery Profiles· CHAPTER 13o Title: SECURITYo Chapter Goal: The theory about the Security Services offered by NSX-T followed by the deployment’s details and steps with proper verification.o Number of Pages: 35o Subtopics:§ Identity based Firewall§ Layer-7 Context Profiles§ Gateway Firewalls§ Distributed Firewall§ Distributed IDS§ East/West Third-party service insertion§ North/South Third-party service insertion§ Security Profiles§ Time-Based Firewall Policy§ Network Introspection Settings§ End-Point Protection§ Bare Metal Server Security· CHAPTER 14o Title: MULTI-SITEo Chapter Goal: Design Principles regarding Multi Site routingo Number of Pages: 30o Subtopics:§ Multi-Site Capabilities§ NSX-T Federation overview§ Networking with Federation§ Security with Federation§ Backup & Restore with Federation· CHAPTER 15o Title: SYSTEM OPERATIONSo Chapter Goal: Monitoring of the NSX-T Fabric using different VMware related tools.o Number of Pages: 15o Subtopics:§ Monitoring / Events and Alarms§ Logging§ vRealize Log insight integration§ vRealize Operations integration§ Other Operation Tools Integration· CHAPTER 16o Title: NETWORK OPERATIONSo Chapter Goal: Tools to verify the Routing and Routing performance.o Number of Pages: 10o Subtopics:§ Network Monitoring§ Logging§ vRealize Network insight integration§ IPFIX§ Network Performance Testing using IPERF Tools· CHAPTER 17o Title: AUTHENTICATION AND AUTHORIZATIONo Chapter Goal: Information on how to integrate NSX-T with an external LDAP server and create user (groups) with different roles and rights (RBAC).o Number of Pages: 5o Subtopics:§ vIDM Integration & LDAP Integration§ LDAP only integration§ RBAC· CHAPTER 18o Title: PUBLIC CLOUD INTEGRATIONo Chapter Goal: NSX-T is also used in all major Public Clouds. This chapter gives you an overview on what is deployed there and how NSX-T can be consumed in these Public Clouds.o Number of Pages: 10o Subtopics:§ Forwarding Policies§ VMC on AWS§ Azure VMware Solution (AVS)§ Google Cloud VMware Engine· CHAPTER 19o Title: AUTOMATIONo Chapter Goal: Get familiar on the out-of-the-box automation capabilities and vRO extensibility.o Number of Pages: 20o Subtopics:§ vCloud Director· Allowing Tenants to Create / Use NSX-T Related automated network and security Services§ vRealize Automation / vRealize Orchestration· Allowing Tenants to Create / Use NSX-T Related automated network and security Services§ NSX-T API Capabilities
Modern Front-end Architecture
Learn how to build front-end applications that can help you ship applications faster with fewer defects. Many software projects fail because they are not planned well, or lack organization. Applying strategies from other industries can help you create better software. This book explores the “mise en place” technique from cooking and reveals how you can apply it to the art of creating software.In many professional kitchens, the work of preparing a meal is divided and performed in workstations to help create the whole. You'll review the philosophy behind this and see how to leverage this approach in your code. You'll also learn to visualize your applications as a series of components and build parts of your application in isolation - just like a professional chef crafting each part of the meal.The book describes to how to structure your code base for reuse, and how to communicate the code’s intent to other developers. You’ll develop your components in isolation and test these building blocks for quality at a granular level. Then compose these components as building blocks in increasingly complicated features. Finally, you’ll apply some strategies not directly related to code to ensure maximum quality and efficiency.With Modern Front-end Architecture, developers of all levels will learn strategies that they and their teams can leverage to be more productive.WHAT YOU'LL LEARN* Structure an application as a series of components* Build a component library that others in an organization can leverage* Ensure quality and accessibility at a component level rather than a page or app level* Test code in a way that gives the maximum amount of confidence while providing an excellent developer experience* Automate repeatable tasksWHO THIS BOOK IS FORFront end developers looking to maximize their code for reuse, quality, and shipping features quickly. Experienced developers will pick up new techniques that they can apply to their code base. Less experienced developers will be able to start applications off on the right foot.RYAN LANCIAUX is an independent software developer based out of Ann Arbor, Michigan. Concentrating on front-end development, Ryan helps organizations build scalable applications with a focus on efficiency and reusability. He regularly speaks at conferences and meet-ups and writes articles on the web. You can find him on Twitter @ryanlanciaux.1. The Mise en Place Philosophy2. Configuring Our Workspace3. Our First Storybook Stories4. Creating Reusable Components5. Styling6. Ensuring the Quality of Our Components7. Interacting with API Data8. Building Our Application9. Automating Repetitive Tasks10. Communicating Our Components
Basiswissen ITIL 4
Das umfassende Lern- und Nachschlagewerk zu ITIL 4 in deutscher Sprache* Alle wichtigen Grundlagen zum IT Service Management, ITIL und ITIL 4* Vorstellung der neuen Modelle und Prinzipien von ITIL 4 entsprechend dem offiziellen Lehrplan* Mehr als 40 Seiten Übungsfragen für die ITIL-4-Foundation-ZertifizierungsprüfungDieses Lern- und Nachschlagewerk bietet Ihnen einen umfassenden Einstieg in die aktuelle Version von ITIL und vermittelt das notwendige Wissen für die ITIL-4-Basis-Zertifizierung. Es wendet sich damit an drei Zielgruppen:- Einsteiger ins IT Service Management mit ITIL finden hier Grundlagenwissen und Beispiele. Sie werden mit den Neuerungen von ITIL 4 vertraut gemacht.- Leser mit ITIL-Erfahrung können das Buch zum Vertiefen von Details und als Nachschlagewerk bei der täglichen Arbeit nutzen.- Praktiker, die die ITIL-4-Foundation-Zertifizierung ablegen wollen, bereiten sich mithilfe von Übungsfragen auf die Prüfung vor. Zudem liefert das Buch Hintergrundinformationen zu zahlreichen Aspekten, die die neue ITIL-Version aufgegriffen hat.Im Mittelpunkt stehen sowohl Grundlagenkenntnisse zum IT Service Management als auch konkretes Wissen rund um die ITIL-4-Konzepte, die vier Dimensionen im IT Service Management und das Service-Wertsystem (Service Value System). Schritt für Schritt erläutert ITIL-Exeprtin Nadin Ebel die Bestandteile der Modelle im ITIL-Framework und beschreibt anschaulich die Grundprinzipien, die Service Value Chain, die Practices und die weiteren Bestandteile sowie deren Zusammenspiel.Außerdem geht die Autorin darauf ein, in welchem Zusammenhang ITIL 4 zu aktuellen Begriffen und Ansätzen wie Agilität, Cloud, Design Thinking, DevOps oder Lean Management steht.Zahlreiche Fragen mit Antworten und Erläuterungen zu allen Aspekten des ITIL-4-Frameworks ermöglichen Ihnen eine effektive Lernkontrolle sowie eine praxisnahe Vorbereitung auf die ITIL-4-Foundation-Prüfung. Die Inhalte und Vorbereitungsfragen decken den offiziellen ITIL-4-Lehrplan ab. Darüber hinaus helfen die umfangreichen Erläuterungen auch bei der Vorbereitung auf die weitergehenden ITIL-Zertifizierungen.Nadin Ebel arbeitet als IT-Projektleiterin, Beraterin für IT Service Management und akkreditierte ITIL-Trainerin bei der Materna Information & Communications SE im Bereich IT Factory. Sie verfügt über langjährige Erfahrungen, u.a. zu den Themen ITIL, ISO-20000-Zertifizierung, Rollout-Management, IT-Infrastruktur, Managed Services und Security. Dazu zählen Betrieb, Beratung und Projektleitung im In- und Ausland.
MATLAB Recipes
Learn from state-of-the-art examples in robotics, motors, detection filters, chemical processes, aircraft, and spacecraft. With this book you will review contemporary MATLAB coding including the latest MATLAB language features and use MATLAB as a software development environment including code organization, GUI development, and algorithm design and testing.Features now covered include the new graph and digraph classes for charts and networks; interactive documents that combine text, code, and output; a new development environment for building apps; locally defined functions in scripts; automatic expansion of dimensions; tall arrays for big data; the new string type; new functions to encode/decode JSON; handling non-English languages; the new class architecture; the Mocking framework; an engine API for Java; the cloud-based MATLAB desktop; the memoize function; and heatmap charts._MATLAB Recipes: A Problem-Solution Approach, Second Edition__ _provides practical, hands-on code snippets and guidance for using MATLAB to build a body of code you can turn to time and again for solving technical problems in your work. Develop algorithms, test them, visualize the results, and pass the code along to others to create a functional code base for your firm.WHAT YOU WILL LEARN* Get up to date with the latest MATLAB up to and including MATLAB 2020b* Code in MATLAB* Write applications in MATLAB* Build your own toolbox of MATLAB code to increase your efficiency and effectivenessWHO THIS BOOK IS FOREngineers, data scientists, and students wanting a book rich in examples using MATLAB.MICHAEL PALUSZEK is the co-author of MATLAB Recipes published by Apress. He is President of Princeton Satellite Systems, Inc. (PSS) in Plainsboro, New Jersey. Mr. Paluszek founded PSS in 1992 to provide aerospace consulting services. He used MATLAB to develop the control system and simulation for the Indostar-1 geosynschronous communications satellite, resulting in the launch of PSS's first commercial MATLAB toolbox, the Spacecraft Control Toolbox, in 1995. Since then he has developed toolboxes and software packages for aircraft, submarines, robotics, and fusion propulsion, resulting in PSS's current extensive product line. He is currently leading a US Army research contract for precision attitude control of small satellites and working with the Princeton Plasma Physics Laboratory on a compact nuclear fusion reactor for energy generation and propulsion.Prior to founding PSS, Mr. Paluszek was an engineer at GE Astro Space in East Windsor, NJ. At GE he designed the Global Geospace Science Polar despun platform control system and led the design of the GPS IIR attitude control system, the Inmarsat-3 attitude control systems and the Mars Observer delta-V control system, leveraging MATLAB for control design. Mr. Paluszek also worked on the attitude determination system for the DMSP meteorological satellites. Mr. Paluszek flew communication satellites on over twelve satellite launches, including the GSTAR III recovery, the first transfer of a satellite to an operational orbit using electric thrusters. At Draper Laboratory Mr. Paluszek worked on the Space Shuttle, space station and submarine navigation. His space station work included designing of control moment gyro based control systems for attitude control. Mr. Paluszek received his bachelors in electrical engineering, and master's and engineer’s degrees in aeronautics and astronautics from the Massachusetts Institute of Technology. He is author of numerous papers and has over a dozen US patents.STEPHANIE THOMAS is the co-author of MATLAB Recipes, published by Apress. She received her bachelor's and master's degrees in aeronautics and astronautics from the Massachusetts Institute of Technology in 1999 and 2001. Ms. Thomas was introduced to PSS's Spacecraft Control Toolbox for MATLAB during a summer internship in 1996 and has been using MATLAB for aerospace analysis ever since. She built a simulation of a lunar transfer vehicle in C++, LunarPilot, during the same internship. In her nearly 20 years of MATLAB experience, she has developed many software tools including the Solar Sail Module for the Spacecraft Control Toolbox; a proximity satellite operations toolbox for the US Air Force; collision monitoring Simulink blocks for the Prisma satellite mission; and launch vehicle analysis tools in MATLAB and Java, to name a few. She has developed novel methods for space situation assessment such as a numeric approach to assessing the general rendezvous problem between any two satellites implemented in both MATLAB and C++. Ms. Thomas has contributed to PSS's Attitude and Orbit Control textbook, featuring examples using the Spacecraft Control Toolbox, and written many software user guides. She has conducted SCT training for engineers from diverse locales such as Australia, Canada, Brazil, and Thailand and has performed MATLAB consulting for NASA, the US Air Force, and the European Space Agency.PART I CODING IN MATLAB1 CODING HANDBOOK2 MATLAB STYLE3 VISUALIZATION4 INTERACTIVE GRAPHICS5 TESTING AND DEBUGGING6 CLASSESPART II APPLICATIONS7 THE DOUBLE INTEGRATOR8 ROBOTICS9 ELECTRIC MOTORS10 FAULT DETECTION11 CHEMICAL PROCESSES12 AIRCRAFT13 SPACECRAFT14 AUTOMOBILES
Künstliche Intelligenz in der Anwendung
Das Buch zeigt Anwendungspotenziale von Künstlicher Intelligenz in verschiedenen Branchen und stellt Einsatzszenarien vor, wie eine praktische Umsetzung erfolgen kann. Ausgangsbasis ist die Beschreibung rechtlicher Aspekte, die eine europäische Regelung für Künstliche Intelligenz umfasst und die Frage nach der Zulässigkeit automatisierter Entscheidungen zum Gegenstand hat.Die Beschreibung verschiedener meist branchenbezogener Anwendungspotenziale und die Vorstellung einiger Einsatzszenarien bilden den Schwerpunkt des Themenbandes.Das Buch basiert auf der Fragestellung, wie Künstliche Intelligenz in der unternehmerischen Praxis eingesetzt werden kann. Es bietet wichtige Informationen, die für Praktiker ebenso relevant sind wie für Studierende und Lehrende.PROF. DR. THOMAS BARTON ist Professor an der Hochschule Worms. Seine Schwerpunkte liegen in den Bereichen Entwicklung betrieblicher Anwendungen, E-Business, Cloud Computing und Data Science.PROF. DR. CHRISTIAN MÜLLER ist Professor an der Technischen Hochschule Wildau. Seine Schwerpunkte liegen in den Bereichen Operations Research, Simulation von Geschäftsprozessen und Internet-Technologien.Künstliche Intelligenz - rechtliche Aspekte - Anwendungspotenziale - Branchen - Einsatzszenarien
Azure Arc-Enabled Data Services Revealed
Get introduced to Azure Arc-enabled data services and the powerful capabilities they provide to deploy and manage local, on-premises, and hybrid cloud data resources using the same centralized management and tooling you get from the Azure cloud. This book shows how you can deploy and manage databases running on SQL Server and Posgres in your corporate data center as if they were part of the Azure platform. You will learn how to benefit from the centralized management that Azure provides, the automated rollout of patches and updates, and more.This book is the perfect choice for anyone looking for a hybrid or multi-vendor cloud strategy for their data estate. The authors walk you through the possibilities and requirements to get services such as Azure SQL Managed Instance and PostgresSQL Hyperscale, deployed outside of Azure, so the services are accessible to companies that cannot move to the cloud or do not want to use the Microsoft cloud exclusively. The technology described in this book will be especially useful to those required to keep sensitive services, such as medical databases, away from the public cloud, but who still want to benefit from the Azure cloud and the centralized management and tooling that it supports.WHAT YOU WILL LEARN* Understand the core concepts of Kubernetes* Understand the fundamentals and architecture of Azure Arc-enabled data services* Build a multi-cloud strategy based on Azure data services* Deploy Azure Arc-enabled data services on premises or in any cloud* Deploy Azure Arc-enabled SQL Managed Instance on premises or in any cloud* Deploy Azure Arc-enabled PostgreSQL Hyperscale on premises or in any cloud* Manage Azure-enabled data services running outside of Azure* Monitor Azure-enabled data services running outside of Azure through the Azure PortalWHO THIS BOOK IS FORDatabase administrators and architects who want to manage on-premises or hybrid cloud data resources from the Microsoft Azure cloud. Especially for those wishing to take advantage of cloud technologies while keeping sensitive data on premises and under physical control.BEN WEISSMAN is the owner and founder of Solisyon, a consulting firm based in Germany and focused on business intelligence, business analytics, and data warehousing. He is a Microsoft Data Platform MVP, the first German BimlHero, and has been working with SQL Server since SQL Server 6.5. Ben is also an MCSE, Charter Member of the Microsoft Professional Program for Big Data, Artificial Intelligence, and Data Science, and he is a Certified Data Vault Data Modeler. If he is not currently working with data, he is probably travelling to explore the world.ANTHONY E. NOCENTINO is the Founder and President of Centino Systems as well as a Pluralsight author, a Microsoft Data Platform MVP, and an industry recognized Kubernetes, SQL Server, and Linux expert. In his consulting practice, Anthony designs solutions, deploys the technology, and provides expertise on system performance, architecture, and security. He has bachelor's and master's degrees in computer science, with research publications in machine virtualization, high performance/low latency data access algorithms, and spatial database systems. 1. A Kubernetes Primer2. Azure Arc-Enabled Data Services3. Getting Ready for Deployment4. Deploying a Data Controller5. Deploying an Azure Arc-Enabled SQL Managed Instance6. Deploying Azure Arc-Enabled PostgreSQL Hyperscale7. Monitoring
Einführung in SQL
Grundlagen und Schlüsseltechniken verstehen und mit vielen Beispielen vertiefen Konzepte und typische Arbeitsschritte verständlich und kompakt erklärt Die SQL-Beispiele laufen ohne Änderungen auf MySQL und (ggf. mit geringfügigen Änderungen) auf neueren Versionen von Oracle Database, DB2 und SQL Server Mit SQL Daten von diversen Plattformen und nicht-relationalen Datenbanken verarbeiten SQL-Kenntnisse sind nach wie vor unverzichtbar, um das Beste auf Ihren Daten herauszuholen. In seinem Handbuch vermittelt Alan Beaulieu die nötigen SQL-Grundlagen, um Datenbankanwendungen zu schreiben, administrative Aufgaben durchzuführen und Berichte zu erstellen. Sie finden neue Kapitel zu analytischen Funktionen, zu Strategien für die Arbeit mit großen Datenbanken sowie zu SQL und großen Datenmengen. Jedes Kapitel präsentiert eine in sich geschlossene Lektion zu einem Schlüsselkonzept oder einer Schlüsseltechnik von SQL und nutzt hierfür zahlreiche Abbildungen und kommentierte Beispiele. Durch Übungen vertiefen Sie die erlernten Fähigkeiten.
Beginning Mathematica and Wolfram for Data Science
Enhance your data science programming and analysis with the Wolfram programming language and Mathematica, an applied mathematical tools suite. The book will introduce you to the Wolfram programming language and its syntax, as well as the structure of Mathematica and its advantages and disadvantages.You’ll see how to use the Wolfram language for data science from a theoretical and practical perspective. Learning this language makes your data science code better because it is very intuitive and comes with pre-existing functions that can provide a welcoming experience for those who use other programming languages.You’ll cover how to use Mathematica where data management and mathematical computations are needed. Along the way you’ll appreciate how Mathematica provides a complete integrated platform: it has a mixed syntax as a result of its symbolic and numerical calculations allowing it to carry out various processes without superfluous lines of code. You’ll learn to use its notebooks as a standard format, which also serves to create detailed reports of the processes carried out.WHAT YOU WILL LEARN* Use Mathematica to explore data and describe the concepts using Wolfram language commands* Create datasets, work with data frames, and create tables* Import, export, analyze, and visualize data* Work with the Wolfram data repository * Build reports on the analysis* Use Mathematica for machine learning, with different algorithms, including linear, multiple, and logistic regression; decision trees; and data clusteringWHO THIS BOOK IS FORData scientists new to using Wolfram and Mathematica as a language/tool to program in. Programmers should have some prior programming experience, but can be new to the Wolfram language.JALIL VILLALOBOS ALVA is a Wolfram language programmer and Mathematica user. He graduated with a degree in engineering physics from the Universidad Iberoamericana in Mexico City. His research background comprises quantum physics, bionformatics, proteomics, and protein design. His academic interests cover the topics of quantum technology, bioinformatics, machine learning, stochastic processes, and space engineering. During his idle hours he likes to play soccer, swim, and listen to music.1. Introductiona. What is Data science?b. Data science and Statisticsc. Data scientist2. Introduction to Mathematicaa. Why Mathematica?b. Wolfram Languagec. Structure of Mathematicad. Notebookse. How Mathematica worksf. Input Form3. Data Manipulationa. Listsb. Lists of objectsc. Manipulating listsd. Operations with listse. Indexed Tablesf. Working with data framesg. Datasets4. Data Analysisa. Data Import and exportb. Wolfram data repositoryc. Statistical Analysisd. Visualizing datae. Making reports5. Machine learning with Wolfram Languagea. Linear Regressionb. Multiple Regressionc. Logistic Regressiond. Decision Tresse. Data Clustering6. Neural networks with Wolfram Languagea. Network Data and structureb. Network Layersc. Perceptron Modeld. Multi-layer Neural Networke. Using preconstructed nets from Wolfram Neural net repositoryf. LeNet Neural net for text recognition
Modern C for Absolute Beginners
Learn the C programming language easily and in a straightforward way. This book teaches the basics of C, the C Standard Library, and modern C standards. No previous programming experience is required.C is a language that is as popular today as it was decades ago. C covers a wide variety of domains. It can be used to program a microcontroller, or to develop an entire operating system. This book is an effort to introduce the reader to the C programming language in a concise and easy to follow manner.The author takes you through the C programming language, the Standard Library, and the C standards basics. Each chapter is the right balance of theory and code examples.After reading and using this book, you'll have the essentials to start programming in modern C.WHAT YOU WILL LEARN* The C programming language fundamentals* The C Standard Library fundamentals* New C Standards features* The basics of types, operators, statements, arrays, functions, and structs* The basics of pointers, memory allocation, and memory manipulation* Take advantage of best practices in CWHO THIS BOOK IS FORBeginner or novice programmers who wish to learn the C programming language. No prior programming experience is required.SLOBODAN DMITROVIĆ is a software consultant, trainer, and entrepreneur. He is the CEO and founder of “Clear Programming Paradigm”, an LLC that provides outsourcing and training services. Slobodan’s ability to summarize complex topics and provide insightful training made him a sought after consultant for the automotive, fintech, and other industries. Slobodan has a strong interest in C, C++, software architecture, training, and R&D.Part I: The C Programming LanguageChapter 1: IntroductionChapter 2: Our First ProgramChapter 3: Types and DeclarationsChapter 4: ExercisesChapter 5: OperatorsChapter 6: ExpressionsChapter 7: StatementsChapter 8: ExercisesChapter 9: ArraysChapter 10: PointersChapter 11: Command-line ArgumentsChapter 12: ExercisesChapter 13: FunctionsChapter 14: ExercisesChapter 15: StructuresChapter 16: UnionsChapter 17: Conditional ExpressionChapter 18: TypedefChapter 19: Const QualifierChapter 20: EnumerationsChapter 21: Function PointersChapter 22: ExercisesChapter 23: PreprocessorChapter 24: ExerciesChapter 25: Dynamic Memory AllocationChapter 26: Storage and ScopeChapter 27: ExercisesChapter 28: Standard Input and OutputChapter 29: File Input and OutputChapter 30: ExercisesChapter 31: Header and Source FilesPart II: The C Standard LibraryChapter 32: Introduction to C Standard LibraryPart III: Modern C StandardsChapter 33: Introduction to C 11 StandardsChapter 34: The C 17 StandardChapter 35: The Upcoming C2X StandardPart IV: Dos and Don'tsChapter 36: Do Not Use the gets FunctionChapter 37: Initialize Variables Before Using ThemChapter 38: Do Not Read Out of BoundsChapter 39: Do Not Free the Allocated Memory TwiceChapter 40: Do Not Cast the Result of mallocChapter 41: Do Not Overflow a Signed IntegerChapter 42: Cast a Pointer to void* When Printing Through printfChapter 43: Do Not Divide by ZeroChapter 44: Where to Use Pointers?Chapter 45: Prefer Functions to Function-like MacrosChapter 46: Static Global NamesChapter 47: What to Put in Header Files?Part V: AppendicesAppendix A: LinkageAppendix B: Time and DateAppendix C: Bitwise OperatorsAppendix D: Numeric LimitsAppendix E: Summary and Advice
Basiswissen Testautomatisierung (3. Auflg.)
Konzepte, Methoden und Techniken für die Testautomatisierung. 3. aktualisierte und überarbeitete Auflage.Dieses Buch vermittelt die Grundlagen und gibt einen fundierten Überblick, wie Testautomatisierung mit Fokus auf den funktionalen Systemtest konzipiert und in bestehende Projekte und die Organisation eingegliedert wird. Dabei werden sowohl fachliche als auch technische Konzepte vorgestellt.Ziele und Erfolgsfaktoren der TestautomatisierungVorbereitungen für die TestautomatisierungEinführung in die generische TestautomatisierungsarchitekturRisiken und Eventualitäten bei der SoftwareverteilungBerichte und MetrikenÜberführung des manuellen Testens in eine automatisierte UmgebungVerifizierung der TestautomatisierungslösungFortlaufende OptimierungIm Anhang finden sich ein Überblick über die Softwarequalitätsmerkmale nach ISO 25010, eine Einführung in Last- und Performanztests sowie beispielhaft ein Kriterienkatalog zur Testwerkzeugauswahl.Die 3. Auflage wurde vollständig überarbeitet und ist konform zum ISTQB®-Lehrplan Advanced Level Specialist – Certified Test Automation Engineer. Das Buch eignet sich mit vielen erläuternden Beispielen gleichermaßen zur Vorbereitung auf die Zertifizierung wie als kompaktes Basiswerk zum Thema in der Praxis und an Hochschulen.Über die Autoren:Manfred Baumgartner, Vice President Quality Assurance bei Nagarro GmbH, Wien, ist seit über 30 Jahren im Bereich Softwaretest und Qualitätssicherung als Berater, Coach und Manager tätig. Seine umfangreichen Erfahrungen bringt er in viele Präsentationen auf Konferenzen im gesamten deutschsprachigen Raum sowie in Artikeln und Büchern zum Thema Softwaretest ein.Stefan Gwihs ist begeisterter Softwareentwickler, Softwaretester und Testautomatisierer für die Nagarro GmbH, Wien. Aktuell beschäftigt er sich vor allem mit Themen im Bereich mobiler Testautomatisierung und agiler Softwareentwicklung.Richard Seidl ist Berater und Coach für agile Methoden und Softwaretest. Er hat in seiner beruflichen Laufbahn schon viel Software gesehen und getestet: gute und schlechte, große und kleine, alte und neue, Schokolade und Grütze. Mit seiner Erfahrung unterstützt er Unternehmen dabei, ihre Entwicklungs- und Testprozesse zu verbessern und so zu gestalten, dass Software effektiver realisiert wird, höhere Qualität hat und die Teams Spaß an der Entwicklung haben.Thomas Steirer ist als Automatisierungsexperte, Berater und Trainer für die Nagarro GmbH, Wien, tätig und leitet die globale Practice für Test Automation. Er ist Autor von Fachartikeln, Speaker auf Konferenzen und Architekt von A2A, dem Nagarro „Advanced Automation Approach".Marc-Florian Wendland ist seit über 10 Jahren Senior Researcher am Fraunhofer Institut FOKUS in Berlin im Bereich Qualitätssicherung softwareintensiver Systeme. Seine Expertise liegt vor allem in der Testautomatisierung und stützt sich auf die Erfahrungen aus zahlreichen nationalen und internationalen Forschungs- und Industrieprojekten. Darüber hinaus ist er in verschiedene Standardisierungsaktivitäten im Bereich des Softwaretests involviert.
Software Engineering for Absolute Beginners
Start programming from scratch, no experience required. This beginners’ guide to software engineering starts with a discussion of the different editors used to create software and covers setting up a Docker environment. Next, you will learn about repositories and version control along with its uses. Now that you are ready to program, you’ll go through the basics of Python, the ideal language to learn as a novice software engineer. Many modern applications need to talk to a database of some kind, so you will explore how to create and connect to a database and how to design one for your app. Additionally you will discover how to use Python’s Flask microframework and how to efficiently test your code. Finally, the book explains best practices in coding, design, deployment, and security.Software Engineering for Absolute Beginners answers the question of what topics you should know when you start out to learn software engineering. This book covers a lot of topics, and aims to clarify the hidden, but very important, portions of the software development toolkit.After reading this book, you, a complete beginner, will be able to identify best practices and efficient approaches to software development. You will be able to go into a work environment and recognize the technology and approaches used, and set up a professional environment to create your own software applications.WHAT YOU WILL LEARN* Explore the concepts that you will encounter in the majority of companies doing software development* Create readable code that is neat as well as well-designed* Build code that is source controlled, containerized, and deployable* Secure your codebase* Optimize your workspaceWHO THIS BOOK IS FORA reader with a keen interest in creating software. It is also helpful for students.Nico Loubser has been working in the software development environment for more than 16 years, and holds a post-graduate degree in software engineering from the University of South Africa. He has spent quite a bit of his career as a team lead, and advising on architecture, which prompted him to amalgamate his knowledge and experience into one book. He currently lives in London, where he seeks exposure to an even greater variety of ideas and methods in today’s software development industry.Chapter 1 : Editors.- Chapter 2 : Setting up the Development Environment using Docker.- Chapter 3 : Repositories and Git.- Chapter 4 : Basic Programming using Python.- Chapter 5 : Coding Styles, Refactoring and Code Calisthenics.- Chapter 6 : Database and Database Design.- Chapter 7 RESTful APIS using flask.- Chapter 8 Testing and Code Quality.- Chapter 9 Planning and designing your code.- Chapter 10 Security.- Chapter 11 CI/CD.
Der Zufall in Physik, Informatik und Philosophie
Zufall als Fundament der Welt, aus der Buchreihe "Die blaue Stunde der Informatik".Der Zufall ist uns unheimlich. Wir dachten, es gäbe ihn nicht, hinter allem stehe Gott oder eine vernünftige Erklärung. Aber wir wissen heute: Es gibt ihn. Wir wissen, dass vieles dessen, was uns umgibt und das wir nicht durchschauen, trotzdem kausal abläuft. Anders als zu Zeiten der Aufklärung gedacht, ist der Zufall um uns eher die Regel als die gesetzmäßige Ordnung. Die Wolken sind Fraktale, die Wellen auf dem Meer sind eine reine Zufallsmaschinerie. Der Philosoph Charles Peirce hat genau in diesem Sinn noch vor Quanten- und Chaostheorie die fundamentale Bedeutung des Zufalls erkannt und der Lehre ihren Namen gegeben: Tychismus.Ohne Zufall gäbe es nichts Neues, kein Leben, keine Kreativität, keine Geschichte.Dieses Buch betrachtet den Zufall aus Sicht der Physik, der Informatik und der Philosophie. Es spannt den Bogen von der Antike zur Quantenphysik und zeigt, dass der Zufall fest in die Welt eingebaut ist und es sie ohne Zufall nicht gäbe.Dr. Walter Hehl ist vielseitiger Physiker und Autor recht verschiedener Bücher zu IT, Management, Religion, Philosophie und zur Geschichte der Wissenschaft. Sein Buch über Galilei erhielt 2019 den Preis der Woitschach-Stiftung für das beste kritische, aber faire Wissenschaftsbuch.
PHP 8 Revealed
Discover the new and updated features of PHP 8, such as the JIT compiler, union types, and attributes, with code examples of each. For each feature, the author includes real-life cases for its use and explains its benefits.WHAT YOU WILL LEARN* Utilize the new features of PHP 8 and modern development technologies* Work with the JIT compiler in PHP 8* Discover PHP 8 using real-life cases* Increase your available resources to become more valuable in your development teamWHO THIS BOOK IS FORExperienced PHP programmers new to PHP 8.GUNNARD ENGEBRETH began coding at the age of 11 through a “Learning BASIC” book given to him by his father. Technology was changing fast and Gunnard rode the wave from 1200 to 56k baud modems. Logging in to BBSs, Prodigy, Compuserve, Delphi and IRC he could see the world changing and he wanted to be a part of it. He soon got involved in the ansi/demo scene, making several application generators for many groups in the 90’s. Visual Basic was the next language of choice allowing him to develop “tools” for online systems such as AOL. This introduced many aspects of development, security and UI while they were still in their infancy. Once the WWW arrived via Mindspring in Atlanta, Ga. Gunnard quickly joined in the race for the web. Learning HTML, PERL and Linux (Slackware at the time) he began to build his skill-set which lead to a full-time Sysadmin position at the age of 20 (2000) at Activegrams/Silverpop. Gunnard has moved around the IT industry from SAN/NAS storage at IBM to custom Wordpress sites for marketing companies, but one thing has stayed the same, a passion for learning and problem solving. Gunnard also DJ’s Drum and Bass as Section31, Playing drums and baking bread (doughcode.com).1. Getting Started2. Setting up your development environment3. Devilbox4. Vagrant5. PHP 8 The Basics6. Whats newJIT compilerunion typesattributesThe nullsafe operatorNamed argumentsAttributesMatch expressionConstructor property promotionNew static return typeNew mixed typeThrow expressionInheritance with private methodsWeak mapsAllowing ::class on objectsNon-capturing catchesTrailing comma in parameter listsCreate DateTime objects from interfaceNew Stringable interfaceNew str_contains() function New str_starts_with() and str_ends_with() functionsNew fdiv() functionNew get_debug_type() functionNew get_resource_id() functionAbstract methods in traits improvementsObject implementation of token_get_all()Variable syntax tweaksType annotations for internal functionsext-json always available7. Breaking ChangesConsistent type errorsReclassified engine warningsThe @ operator no longer silences fatal errorsDefault error reporting levelDefault PDO error modeConcatenation precedenceStricter type checks for arithmetic and bitwise operators Reflection method signature changesStable sortingFatal error for incompatible method signatures8. FrameworksLaravelSlimPHPComposerSymphony9. The AdvancedMaintaining codeGithubGitlab Git workflowsCode StylePSR7phpDoc10. Refactoring and optimizationA. Giving Back
Echtzeit 2020
Mit seiner Tagung 2020 zum Thema „Kommunikationssicherheit im IoT“ greift der GI/GMA/ITG-Fachausschuss Echtzeitsysteme ein immer wichtiger werdendes Thema in einer mehr und mehr vernetzten Welt auf. Die präsentierten Lösungen reichen dabei von Hardware über Systementwurf bis hin zu einzelnen Applikationen. Ein historischer Rückblick sowie ein erstmals in einem Buch präsentiertes, kompaktes Tutorial der Programmiersprache OPENPearl, die u. a. mit der Zielsetzung, funktionale Sicherheit in Steuerungssystemen zu gewährleisten, im Fachausschuss entworfen wurde, runden die Darstellungen ab.Prof. Dr. Herwig Unger, FernUniversität in Hagen, Lehrstuhl für Kommunikationsnetze