Computer und IT
Robotic Process Automation
Sie planen Robotic Process Automation (RPA) im Unternehmen einzuführen und ihre administrativen Prozesse ins digitale Zeitalter zu überführen? Dieser pragmatische Ratgeber, bietet Ihnen praxisgerecht, komprimiert und auf den Punkt zusammengefasst Erfahrungen aus deutschen Unternehmen. Neben der Erläuterung der Vorteile und notwendigen Schritte zur Einführung der innovativen RPA Technologie, werden mögliche Anwendungsfelder näher beleuchtet.Worauf muss man bei der Implementierung und dem Betrieb achten, welche Stolpersteine gilt es zu umgehen, wie setze ich den ersten Software-Robot um und was ist notwendig für einen flächendeckenden, störungsfreien Einsatz? Wie bringt man die eigene Mitarbeiterbelegschaft und die Gremien hinter sein Vorhaben? Welchen Compliance- und Sicherheitsanforderungen muss RPA genügen? All diese Fragestellung werden in diesem Buch mit Beispielen, Checklisten und Illustrationen praxisnah beantwortet.CHRISTINA KOCH hat in ihrer Rolle als Projektleiterin bei einem DAX-Konzern in über 10 Jahren vielzählige Großprojekte eigenverantwortlich geleitet und erfolgreich umgesetzt – zuletzt die konzernweite Einführung von RPA. Hierbei profitierte sievom Austausch mit RPA-Experten diverser deutschen Industriegrößen und greift somit auf einen breiten Erfahrungsschatz aus erster Hand zurück. Christina Koch als die Autorin dieses Buches hat, basierend auf ihrer mehrjährigen praktischen RPA-Erfahrung in der deutschen Industrie, den Text und die Grafiken erarbeitet.DR. STEPHEN FEDTKE ist CTO des auf IT-Sicherheit und -Compliance spezialisierten Lösungsanbieters Enterprise-IT-security.com. Er hat das Manuskript unter Einsatz seiner fundierten IT-Expertise qualitätsgesichert.Roboter gehören in die Fertigungshallen, nicht ins Büro! Oder doch nicht?.- Der Leuchtturm-Robot – welche Schritte sind notwendig zur Einführung des ersten Robots?.- Der Rollout – wie führe ich RPA flächendeckend im Unternehmen ein?.- Wo kann die Reise hingehen und wann werden die Zukunftsvisionen im Bereich Business Process Automation real?.
Bauen, erleben, begreifen: fischertechnik®-Roboter mit Arduino
Arduino-Modellroboter zum Nachbauen und Selbermachen!* Baue mit fischertechnik und Arduino erstaunliche Modell-Roboter* Konstruiere ein Fernsteuer-Auto mit GPS-Navigation, einen schnellen Roboter-Arm und einen 2-D-Drucker* Entwickle deine eigen RoboterDer Arduino eröffnet für kleines Geld auch Programmier-Einsteigern die Welt der Robotik: Er ist ein universeller Steuerungs-Controller, an den sich unzählige Sensoren, Motoren und andere Aktoren anschließen lassen. Kombiniert mit dem Baukastensystem fischertechnik lassen sich so Modellroboter mit erstaunlicher Leistungsfähigkeit entwickeln.Das Buch zeigt an drei Grundmodellen die schier unbegrenzten Möglichkeiten solcher Arduino-gesteuerter fischertechnik-Roboter:- der "Plotter": ein hoch präziser und schneller 2D-Drucker, der HP-GL-Dateien einlesen und plotten kann,- der "Delta": ein Roboter-Arm, der Objekte mit hoher Geschwindigkeit greifen, sortieren und gegen den man Tic-Tac-Toe spielen kann,- der "Flitzer": ein Auto, das sich fernsteuern lässt oder auch selbständig einer Fahrbahn folgen, eine Parklücke finden, einparken sowie eine vorgegebene GPS-Position anfahren kann.Das Buch möchte zum Weiterbauen und Experimentieren anregen und enthält, neben einer Einführung in die verwendeten Arduino Shields und Sensoren, zahlreiche Ideen und Vorschläge, welche weiteren Modelle und Steuerungen sich aus diesen drei Grundmodellen konstruieren lassen.Dirk Fox ist Informatiker, Gründer und Geschäftsführer eines Beratungsunternehmens für IT-Sicherheit, Herausgeber einer Fachzeitschrift für Datenschutz und Datensicherheit, Vorstand eines großen IT-Netzwerks – und begeisterter "fischertechniker". Er gibt die fischertechnik-Zeitschrift "ft:pedia" heraus und setzt sich für den Ausbau des Technikunterrichts an deutschen Schulen ein – mit fischertechnik. Thomas Püttmann ist außerplanmäßiger Professor für Mathematik an der Ruhr-Universität Bochum. Zur Vermittlung von Themen aus den Bereichen Mathematik, Technik und Naturwissenschaften entwickelt er gezielt lehrreiche Modelle, wenn möglich aus fischertechnik. Als echter Mathematiker optimiert er seine Konstruktionen so lange, bis man keinen Stein mehr weglassen oder verschieben kann. Regelmäßig schreibt er Beiträge für die "ft:pedia".
Kubernetes in Action
Mit Kubernetes große Container-Infrastrukturen ausfallsicher verwaltenNach einer Einführung in die typischen Problemstellungen, mit denen Softwareentwickler und Administratoren konfrontiert sind, und wie diese mit Kubernetes gelöst werden können, lernen Sie in einem ersten Beispielprojekt die praktische Umsetzung. Es wird gezeigt, wie eine einfache in einem Container laufende Web-Applikation über ein Kubernetes-Cluster verwaltet werden kann. Im zweiten Teil des Buches lernen Sie die zu Grunde liegenden Konzepte kennen, deren Verständnis unbedingt notwendig ist, um große Container-Cluster mit Kubernetes zu betreiben. Im letzten Teil wird die Funktionsweise von Kubernetes beschrieben und auf weiterführende Aspekte eingegangen. Hier wird außerdem das erworbene Wissen aus den ersten beiden Teilen zusammengeführt, damit Sie den vollen Nutzen aus der Kubernetes-Plattform ziehen können. Marko Lukša ist Software Engineer bei Red Hat im Cloud Enablement Team. Das Team sorgt dafür, dass Red Hat's Enterprise Middleware-Produkte auf OpenShift funktionieren – eine PaaS-Plattform, die auf Kubernetes läuft. Durch seine 15-jährige Erfahrung als Trainer gelingt es ihm besonders gut schwierige Inhalte einfach und verständlich zu vermitteln.
Wie Business Intelligence das IT-Controlling vereinfacht. Einsatzpotentiale und Möglichkeiten der Automatisierung in IT-Unternehmen
In IT-Unternehmen ist das Controlling dafür zuständig, die Verwendung von IT-Ressourcen zu planen und somit die Entscheidung des Managements vorzubereiten. Business Intelligence stellt eine Möglichkeit dar, diese Entscheidungsfindung zu unterstützen: relevante Daten werden erhoben, zusammengefasst, ausgewertet und anschließend werden die Ergebnisse veranschaulicht. Welche Aufgaben hat das IT-Controlling konkret? Welchen Zweck verfolgt Business Intelligence? Und welche Prozesse im IT-Controlling können durch Business Intelligence automatisiert werden? Nur Üzümcü untersucht die Möglichkeiten von Business Intelligence im IT-Controlling. Dazu klärt sie wichtige Grundlagen zum Thema Business Intelligence und stellt Organisationskonzepte des IT-Controllings vor. Üzümcü geht in ihrer Publikation auf die Potentiale ein, die eine Automatisierung mit Hilfe der Business Intelligence mit sich bringt. Gleichzeitig benennt sie aber auch Herausforderungen, die eine Implementierung erschweren können. Aus dem Inhalt: - Digitalisierung; - Informationstechnologie; - Organisation; - Strategische Managemententscheidungen; - Datenintegration; - Kostenplanung
PCI DSS
Gain a broad understanding of how PCI DSS is structured and obtain a high-level view of the contents and context of each of the 12 top-level requirements. The guidance provided in this book will help you effectively apply PCI DSS in your business environments, enhance your payment card defensive posture, and reduce the opportunities for criminals to compromise your network or steal sensitive data assets.Businesses are seeing an increased volume of data breaches, where an opportunist attacker from outside the business or a disaffected employee successfully exploits poor company practices. Rather than being a regurgitation of the PCI DSS controls, this book aims to help you balance the needs of running your business with the value of implementing PCI DSS for the protection of consumer payment card data.Applying lessons learned from history, military experiences (including multiple deployments into hostile areas), numerous PCI QSA assignments, and corporate cybersecurity and InfoSec roles, author Jim Seaman helps you understand the complexities of the payment card industry data security standard as you protect cardholder data. You will learn how to align the standard with your business IT systems or operations that store, process, and/or transmit sensitive data. This book will help you develop a business cybersecurity and InfoSec strategy through the correct interpretation, implementation, and maintenance of PCI DSS.WHAT YOU WILL LEARN* Be aware of recent data privacy regulatory changes and the release of PCI DSS v4.0* Improve the defense of consumer payment card data to safeguard the reputation of your business and make it more difficult for criminals to breach security* Be familiar with the goals and requirements related to the structure and interdependencies of PCI DSS* Know the potential avenues of attack associated with business payment operations* Make PCI DSS an integral component of your business operations* Understand the benefits of enhancing your security culture* See how the implementation of PCI DSS causes a positive ripple effect across your businessWHO THIS BOOK IS FORBusiness leaders, information security (InfoSec) practitioners, chief information security managers, cybersecurity practitioners, risk managers, IT operations managers, business owners, military enthusiasts, and IT auditorsJAMES (JIM) SEAMAN has been dedicated to the pursuit of security for his entire adult life. He served 22 years in the RAF Police, covering a number of specialist areas including physical security, aviation security, information security management, IT security management, cybersecurity management, security investigations, intelligence operations, and incident response and disaster recovery. He has successfully transitioned his skills to the corporate environment and now works in areas such as financial services, banking, retail, manufacturing, e-commerce, and marketing. He helps businesses enhance their cybersecurity and InfoSec defensive measures and work with various industry security standards.CHAPTER 1: AN EVOLVING REGULATORY PERSPECTIVEOverview of the changes that have occurred in regard to personal data regulatory compliance and the implication for PCI DSS.· Data Privacy and PCI DSSCHAPTER 2: DATA THE ‘LIFE BLOOD’ OF BUSINESSUnderstand the true value of data to modern digital businessCHAPTER 3: AN INTEGRATED CYBER/INFOSEC STRATEGYDemonstrates the links between various Cyber/InfoSec terms· Synchronized Defenses:o Information Systems & Connected Technologieso Security Culture§ Roles§ Responsibilities· Complimentary Defense Nodeso Data Securityo Cyber Securityo Information Securityo Physical Securityo Resilience· Knowing you enemieso Tactics, Techniques and Protocols (TTPs)o External Threato Internal ThreatCHAPTER 4: THE IMPORTANCE OF RISK MANAGEMENTExplains the integral importance of risk management for an effective Cyber/InfoSec Strategy· Risk Management1. Vulnerability Management2. Threat Management3. Business Impact ManagementCHAPTER 5: COMPLIANCE VERSUS RISK—THE DIFFERENTIATORCHAPTER 6: THE EVOLUTION OF PCI DSSProvides an overview of the PCI DSS evolutionCHAPTER 7: PCI DSS APPLICABILITYExplains the purpose and benefits of PCI DSS· PCI DSS Overview1. Structure2. ScopingCHAPTER 8: AN INTRODUCTION TO PCI DSS CONTROLS FRAMEWORKDescribes the structure and interdependencies of PCI DSS· Six Goals1. Fortress Design2. Secure Silos3. Secure Maintenance4. Gate Keeping5. Routine Assurance6. People & Process· 12 RequirementsRequirement 12: People ManagementRequirement 1: Layering The NetworkRequirement 2: Secure By Design/DefaultRequirement 3: The VaultRequirement 4: Secure In MotionRequirement 5: Entry SearchRequirement 6: Build & MaintainRequirement 7: Role Based RestrictionsRequirement 8: Logical Entry ControlRequirement 9: Physical Entry ControlRequirement 10: DetectionRequirement 11: Assurance TestingCHAPTER 9: PAYMENT CHANNEL ATTACK VECTORSProvides an understanding of the potential avenues of attack, associated to a business’ payment operations· Online· Face To Face· Telephone-Based· 3rd PartiesCHAPTER 10: COMPLIANCE—A TEAM EFFORTRecommendations for making PCI DSS an integral component of business operations· In house· Outsourced· SharedCHAPTER 11: PIE FARM—A PROJECT MANAGED APPROACHProvides insight into a project managed approach to simplify Cyber/InfoSec strategiesCHAPTER 12: PROACTIVE DEFENSEProvides insight into the five pillars for Proactive DefenseCHAPTER 13: PEOPLE, PEOPLE, PEOPLEDescribes the benefits of enhancing the security culture.CHAPTER 14: THE RIPPLE EFFECTProvides a description on why the implementation of PCI DSS causes a positive ‘Ripple Effect’ across business.CHAPTER 15: QUICK FIRE ROUND—YOUR STARTER FOR 10The author’s response to commonly asked questionsAPPENDICES· Useful Resources
Programming with 64-Bit ARM Assembly Language
Mastering ARM hardware architecture opens a world of programming for nearly all phones and tablets including the iPhone/iPad and most Android phones. It’s also the heart of many single board computers like the Raspberry Pi. Gain the skills required to dive into the fundamentals of the ARM hardware architecture with this book and start your own projects while you develop a working knowledge of assembly language for the ARM 64-bit processor.You'll review assembly language programming for the ARM Processor in 64-bit mode and write programs for a number of single board computers, including the Nvidia Jetson Nano and the Raspberry Pi (running 64-bit Linux). The book also discusses how to target assembly language programs for Apple iPhones and iPads along with 64-Bit ARM based Android phones and tablets. It covers all the tools you require, the basics of the ARM hardware architecture, all the groups of ARM 64-Bit Assembly instructions, and how data is stored in the computer’s memory. In addition, interface apps to hardware such as the Raspberry Pi’s GPIO ports. The book covers code optimization, as well as how to inter-operate with C and Python code. Readers will develop enough background to use the official ARM reference documentation for their own projects.With Programming with 64-Bit ARM Assembly Language as your guide you’ll study how to read, reverse engineer and hack machine code, then be able to apply these new skills to study code examples and take control of both your ARM devices’ hardware and software.WHAT YOU'LL LEARN* Make operating system calls from assembly language and include other software libraries in your projects* Interface apps to hardware devices such as the Raspberry Pi GPIO ports* Reverse engineer and hack code* Use the official ARM reference documentation for your own projectsWHO THIS BOOK IS FORSoftware developers who have already learned to program in a higher-level language like Python, Java, C#, or even C and now wish to learn Assembly programming.STEPHEN SMITH is a retired Software Architect, located in Gibsons, BC, Canada. He's been developing software since high-school, or way too many years to record. Since retiring he has pursued Artificial Intelligence programming, earned his Advanced HAM Radio License and enjoys mountain biking, hiking, and nature photography. He continues to write his popular technology blog at smist08.wordpress.com. IntroductionGeneral preface information in most computer books.Chapter 1: Getting StartedProvide a bit of background and history of the ARM Processor leading up to the modern 64-bit processors that this book is about. Covers what you need to write programs like those in this book. GNU GCC compiler, GDB, a text editor, etc. Covers hardware you require to run the programs in this book including how to run a Raspberry Pi in 64-bit mode or using another SBC like the NVidia Jetson Nano.Talk about how programs are represented in memory and then how you use an Assembler to generate them. Cover the linking process and give a very small example. The chapter concludes with a simple “Hello World” program written in ARM 64-bit Assembler.About the ARM ProcessorWhat You Will LearnWhy Use AssemblyTools You NeedComputers & NumbersARM Assembly InstructionsCPU RegistersARM Instruction FormatMemoryAbout the GCC AssemblerHello WorldAbout the Starting CommentWhere to StartAssembly InstructionsDataCalling LinuxReverse Engineering Our ProgramThe goal is to always have working sample programs, this is the first, to just ensure the reader can enter, assemble and link.Chapter 2: Loading, Adding & SubtractingNegative NumbersAbout Two’s ComplementAbout Gnome Programmer’s CalculatorAbout One’s ComplementBig vs. Little EndianAbout Bi-endianPros of Little EndianShifting & RotatingAbout Carry FlagAbout the Barrel ShifterBasics of shifting and rotatingLogical Shift LeftLogical Shift RightArithmetic Shift RightRotate RightRotate Right ExtendMOV/MVNAbout MOVTThe Dreaded Flexible Operand2Register & ShiftSmall Number & RotationMVNMOV ExamplesADD/ADCAdd With CarrySUBChapter 3: Tooling UpNow that we can start to write some longer code, we need to get into debugging. We also introduce makefiles. Cover the basics and typical workflows for writing/debugging programs.GNU MakeRebuilding a fileA Rule for Building .s filesDefining VariablesCross CompilingBuilding for ARM on IntelBuilding for AndroidBuilding for iOSGDBPreparing to DebugBeginning GDBSource Control and Build ServersGitJenkinsChapter 4: Controlling Program FlowIntroduce how to do if/else statements and loops. Introduce design patterns. Talk more about making your programs readable and maintainable.Unconditional BranchAbout the CPSRBranch on ConditionAbout the CMP InstructionLoopsFOR LoopsWhile LoopsIf/Then/ElseLogical OperatorsANDEORORRBICDesign PatternsConverting Integers to AsciiUsing Expressions in Immediate ConstantsStoring a Register to MemoryWhy Not Print in Decimal?Performance of Branch InstructionsMore Comparison InstructionsSummaryChapter 5: Thanks for the MemoriesCovers loading from and storing to the Pi’s memory. Indexed memory operation, etc.Defining Memory ContentsLoading a RegisterPC Relative AddressingLoading from MemoryIndexing Through MemoryWrite BackPost-Indexed AddressingConverting to Upper-caseStoring a RegisterDouble RegistersSummaryChapter 6: Functions & the StackStacks on LinuxBranch with LinkNesting Function CallsFunction Parameters & Return ValuesManaging the RegistersSummary of the Function Call AlgorithmUpper-Case RevisitedStack FramesStack Frame ExampleDefining SymbolsOne More OptimizationMacrosInclude DirectiveMacro DefinitionLabelsWhy Macros?SummaryChapter 7: Linux Operating System ServicesCover how Linux system calls work from Assembler. Cover how to do basic file I/O and other useful tasks like timing code.So Many ServicesCalling ConventionStructuresWrappersConverting a File to Upper CaseOpening a FileError CheckingLoopingSummaryChapter 8: Programming GPIO PinsCreate a simple Assembler program to flash some LEDs attached via a breadboard to the GPIO pins.GPIO OverviewIn Linux, Everything is a FileFlashing LEDsMoving Closer to the MetalAbout Raspberry Pi 4 RAMIn Devices, Everything is MemoryRegisters in BitsGPIO Function Select RegistersGPIO Output Set and Clear RegistersMore Flashing LEDsRoot AccessTable DrivenSetting Pin DirectionSetting & Clearing PinsSummaryChapter 9: Interacting with C & PythonUsually people use minimal Assembly code to supplement their programming in other languages. Cover the most common use cases and provide examples of each.Calling C RoutinesPrinting Debug InformationPreserving StateCalling PrintfPassing a StringAdding with Carry RevisitedCalling Assembly Routines from CPackaging our CodeStatic LibraryShared LibraryEmbedding Assembly Code inside C CodeCalling Assembly from PythonSummaryChapter 10: Multiply, Divide & AccumulateMultiplicationExamplesDivisionExampleMultiply & AccumulateVectors & MatricesAccumulate InstructionsDual Multiply with AccumulateExample 1Accessing Matrix ElementsMultiply with AccumulateRegister UsageExample 2SummaryChapter 11: Floating Point OperationsShow how to write Assembler to perform floating point calculations. Show how to do division. Cover the data formats supported here.About Floating Point NumbersNormalization & NaNsRounding ErrorsDefining Floating Point NumbersFPU RegistersFunction Call ProtocolAbout BuildingLoading & Saving FPU RegistersBasic ArithmeticDistance Between PointsFloating Point ConversionsFloating Point ComparisonExampleSummaryChapter 12: Neon CoprocessorExplain Single Instruction Multiple Data (SIMD) programming. Examples from AI and graphics. Give examples and demonstrate how this can speed up your program.The Neon RegistersStay in Your LaneArithmetic Operations4D Vector Distance3x3 Matrix MultiplicationSummaryChapter 13: Reading, Understanding and Hacking CodeHow to use GCC to generate an Assembler listing from higher level language source code, how to use GDB to view Assembly code in memory and how to use Ghidra to reverse engineer a compiled program. Then look at an example of injecting executable code using a buffer overrun.Linux & GCCDivision RevisitedCode Created by GCCReverse Engineering & GhidraOverflowing the BufferSummaryAppendix A: ARM 64-Bit Instruction SetAppendix B: Linux Operating System ServicesAppendix C: Binary FormatsAppendix D: Assembler DirectivesAppendix E: ASCII Character SetReferences
The Project Managers Guide to Microsoft Project 2019
Learn Microsoft Project 2019 from the perspective of the project manager.This guide is an all-in-one training resource and reference that covers all versions found in the Microsoft Project 2019 suite. It is not a “how-to” manual covering the features and functions of the software, but is designed to explain and demonstrate why those features and functions are important to you as a project manager, allowing you to maximize the value of Microsoft Project 2019.Each aspect of project-manager-specific coverage was selectively compiled by author and Microsoft Project expert Cicala over more than two decades of consulting, project management training, and managing real-world projects using Microsoft Project. Readers will appreciate the robust index and intuitively organized and learning-oriented chapters, and sub-sections for quick reference and problem solving. “Try it” exercises at the close of every chapter help ensure understanding of the content.WHAT YOU WILL LEARN* Understand key components to the Microsoft Project 2019 solution* Reinforce learning via hands-on exercises with step-by-step illustrations * Build a plan and work breakdown structure, and manage resources and assignments* Utilize enterprise project management for creating a project, monitoring, controlling, and tracking* Export and communicate project information to an external audienceWHO THIS BOOK IS FORProject managers with limited time and resources who need to maximize their efficiency with Microsoft ProjectAnswer keys and supporting PowerPoint slides are available for academic instructors upon request.GUS CICALA is the founder and CEO of Project Assistants, an Inc. 500 company founded in 1996. Project Assistants focuses on best practices, proven technology, and highly trained consultants who help companies optimize their business strategy. Gus and his team deliver process, technology, and people-based solutions across many industry verticals in the US and Western Europe and have been awarded Silver Competency in project and portfolio management by Microsoft. Gus specializes in Microsoft Project Server and online deployment, training, application development, and portfolio management consulting. He is a certified Microsoft Cloud and Office 365 partner.PART I: INTRODUCTION TO PROJECT MANAGEMENTChapter 1: IntroductionChapter 2: Understanding Project Management ConceptsChapter 3: Introduction to Microsoft Project 2019PART II: PROJECT DEFINITIONChapter 4: Understanding Project DefinitionChapter 5: Defining Your Project Using Microsoft Project 2019PART III: PROJECT TASK PLANNINGChapter 6: Developing a Work Breakdown StructureChapter 7: Building a Work Breakdown Structure with Microsoft Project 2019Chapter 8: Managing Project Resources and AssignmentsChapter 9: Using Microsoft Project 2019 to Optimize the PlanPART IV: ENTERPRISE PROJECT MANAGEMENTChapter 10: Creating Enterprise ProjectsChapter 11: Monitoring and Controlling – The Project Manager’s FunctionsChapter 12: Using Project Web Application for TrackingChapter 13: Other Features in Project Web ApplicationChapter 14: Variance Analysis, Plan Revision, and Project CommunicationChapter 15: Presenting Project Information with Microsoft Project 2019
Nutzerverhalten verstehen - Softwarenutzen optimieren
Software muss nicht nur technische Definitionen, Standards und Normen erfüllen, sondern von ihren Benutzern auch entsprechend wahrgenommen werden. Nutzer und Käufer erwarten eine bestimmte Leistung, die zu den eigenen Zielen passen muss und es ist Aufgabe der Softwareentwickler, diese Leistung zu liefern.Da es hierbei nie eine vollständige Passung geben kann, entsteht ein Kommunikationsproblem – ein Kommunikationsproblem zwischen Menschen, das noch zu selten ernstgenommen wird.Über bekannte Ansätze hinausgehend zeigt das Buch anhand vieler praxisnaher Beispiele ein Verfahren, mit dem Sie Kommunikationsprobleme während der Entwicklung von Software aufdecken und bearbeiten und mit dem Sie auch nach der Veröffentlichung Ihrer Software Möglichkeiten der Optimierung identifizieren können.Zusätzliche Fragen per App: Laden Sie die Springer Nature Flashcards-App kostenlos herunter und nutzen Sie exklusives Zusatzmaterial, um an weiteren Beispielen zu üben und Ihr Wissen zu prüfen.DR. MARIO DONICK ist Kommunikationswissenschaftler. Er studierte Germanistik und Geschichte an der Universität Rostock und war dort bis 2013 wissenschaftlicher Mitarbeiter am Institut für Informatik. 2016 erschien seine Dissertation zu Unsicherheit und Ordnung der Computernutzung. Seitdem arbeitet er im und zum technischen Kundenservice und ist Autor und Entwickler. Zuletzt erschien sein Sachbuch „Die Unschuld der Maschinen“.Einleitung: Was Software-Qualität mit menschlicher Kommunikation zu tun hat - Kommunikation bei der Software-Entwicklung - Über die Beziehung von Nutzer*in, Software und Nutzungssituation - Softwarenutzung strukturiert beobachten - Strukturelle Analyse der Beobachtungsdaten - Analyseergebnisse interpretieren: Software als Medium und Schnittstelle, Quality of Interaction und Gestaltungsnormen
Textverarbeitung für Studium und Ausbildung
Längere Schriftstücke bereiten oft einiges Kopfzerbrechen. Nicht nur beim fachlichen Inhalt, sondern auch bei Layout und Bearbeitungsfreundlichkeit. Denn das Schreiben kann selbst ganz einfach und glatt funktionieren und dabei noch super aussehen, wenn man nur richtig anfängt. Hier sehen wir uns alle Teile an, die für fachliche und wissenschaftliche Dokumente gebraucht werden: Formatvorlagen, Abbildungen, Inhaltsverzeichnisse, Deckblätter und Inhalte mit Überbreite, die im Text eingefügt werden müssen. Das alles in einer kompakten Form, von der ausgehend weitere Details bearbeitet werden können. Dazu dann noch Möglichkeiten, ein Dokument gemeinsam zu verfassen und dabei den Überblick zu behalten. Damit sich jeder Autor voll auf den Inhalt der Texte konzentrieren kann und sich nicht in Kleinkram verzettelt!Ina Koys ist langjährige Trainerin für MS-Office-Produkte. Viele Fragen werden in den Kursen immer wieder gestellt, aber selten in Fachbüchern behandelt. Einige davon beantwortet sie jetzt in der Reihe "kurz & knackig".
Commercial and Industrial Internet of Things Applications with the Raspberry Pi
Use the Raspberry Pi and modern computing techniques to build industrial Internet of Things systems. Principles and theoretical aspects of IoT technologies combine with hands-on projects leading to detailed descriptions of several industrial IoT applications.This book presents real-life IoT applications based on the Raspberry Pi, beyond the relatively simplistic demos built for educational purposes or hobbyists. You'll make the transition from tinkering with a couple of sensors and simple devices to building fully developed products for commercial use and industrial systems. You'll also work with sensors and actuators, web technologies used for communications in IoT networks, and the large-scale deployment of IoT software solutions. And see how to design these systems as well as maintain them long term.See the Raspberry Pi in a new light that highlights the true industrial potential of the device. Move beyond connecting an LED to the Raspberry Pi and making it blink to actually managing a network of IoT devices.WHAT YOU'LL LEARN* Design industrial and large scale professional Internet of Things systems* Extend your basic IoT knowledge by building advanced products* Learn how large scale IoT systems are deployed and maintainedWHO THIS BOOK IS FORAdvanced hobbyists who want to stretch their abilities into the professional sector. Also professional industrial engineers looking for low-cost solutions to basic IoT needs.IOANA CULIC is a PhD candidate in the field of Internet of Things and the co-founder of Wyliodrin, a company that offers educational and industrial IoT solutions. Wyliodrin’s target is to offer educational platforms for IoT. They have developed a large set of written and video educational materials to complement their solutions. Much of this material was coordinated and contributed to by Ioana.ALEXANDRU RADOVICIis the CTO of Wyliodrin and earned a PhD in mobile technologies from University Politehnica of Bucharest, where he now works as an associate professor. He has taught and prepared materials for advanced IT classes. He has contributed to several books and articles on how to build Internet of Things applications.CRISTIAN RUSU isin charge of research and development within Wyliodrin and holds a PhD in signal processing from the University Politehnica of Bucharest. He has held research and teaching positions at the University Politehnica of Bucharest, the IMT Institute for Advanced Studies in Lucca, Italy and the University of Vigo, Spain.INDUSTRIAL INTERNET OF THINGS APPLICATIONS WITH THE RASPBERRY PIChapter 1: Architecture of Industrial IoT SystemsChapter 2: Large-scale deployment and maintainanceChapter 3: Smart digital signage systemChapter 4: Smart soda dispenser systemChapter 5: Smart ads systemChapter 6: Energy consumption monitoringChapter 7: Solar power plant control systemChapter 8: Smart parking
Arduino Software Internals
It’s not enough to just build your Arduino projects; it’s time to actually learn how things work! This book will take you through not only how to use the Arduino software and hardware, but more importantly show you how it all works and how the software relates to the hardware.Arduino Software Internals takes a detailed dive into the Arduino environment. We’ll cover the Arduino language, hardware features, and how makers can finally ease themselves away from the hand holding of the Arduino environment and move towards coding in plain AVR C++ and talk to the microcontroller in its native language.What You’ll Learn:* How the Arduino Language interfaces with the hardware, as well as how it actually works in C++;* How the compilation system works, and how kit can be altered to suit personal requirements;* A small amount of AVR Assembly Language;* Exactly how to set up and use the various hardware features of the AVR without needing to try and decode the data sheets – which are often bug ridden and unclear;* Alternatives to the Arduino IDE which might give them a better workflow;* How to build their own Arduino clone from scratch.Who This Book Is For:No expertise is required for this book! All you need is an interest in learning about what you’re making with Arduinos and how they work. This book is also useful for those looking to understand the AVR microcontroller used in the Arduino boards. In other words, all Makers are welcome! Norman Dunbar is an Oracle Database Administrator. Norman has had a long running relationship with Electronics since childhood and computers since the late 1970s, and the Arduino was a perfect marriage of the two interests. With a love of learning new things, examining and explaining the Arduino Language and the hardware became a bit of a hobby, and as piles of notes expanded, Norman has now decided to publish his work.1. Introduction1.1. Arduino Installation Paths1.2. Coding Style1.3. The Arduino Language1.4. Coming UpPart 1 - Arduino Compilation2. Preferences.txt2.1. Using an ICSP For All Uploads2.2. Change the Action of Home and End Keys2.3. Setting Tab Stops3. Globally Defined Paths4. Boards.Txt4.1. Arduino Uno Example5. Platform.txt5.1. Build Recipes5.2. Pre and Post Build Hooks6. Programmers.txt7. Compiling a Sketch7.1. Arduino Sketch (*.ino) Preprocessing7.2. Arduino Sketch (*.ino) Build8. The Arduino main() Function9. Header File Arduino.h9.1. Header File avr\pgmspace.h9.2. Header File avr\io.h9.3. Header File avr\interrupt.h9.4. Header File binary.h9.5. Header File WCharacter.h9.6. Header File WString.h9.7. Header File HardwareSerial.h9.8. Header File USBAPI.h9.9. Header File pins_arduino.h10. The init() Function10.1. Enabling the Global Interrupt Flag10.2. Enabling Timer 010.3. Timer 0 Overflow Interrupt10.4. Enabling Timer 1 and Timer 210.5. Initialising the Analogue to Digital Converter10.6. Disabling the USARTPart 2 - Arduino Language Reference11. Digital Input/Output11.1. Function pinMode()11.2. Function digitalRead()11.3. Function digitalWrite()12. Analogue Input/Output12.1. Function analogReference()12.2. Function analogRead()12.3. Function analogWrite()13. Advanced Input/Output13.1. Function tone()13.2. Function noTone()13.3. Function pulseIn()13.4. Function pulseInLong()13.5. Function shiftIn()13.6. Function shiftOut()14. Time14.1. Function delay()14.2. Function delayMicroseconds()14.3. Function micros()14.4. Function millis()15. Interrupts15.1. Function interrupts()15.2. Function noInterrupts()15.3. Function attachInterrupt()15.4. Function detachInterrupt()16. Bits and Bobs16.1. Function bit()16.2. Function bitClear()16.3. Function bitRead()16.4. Function bitSet()16.5. Function bitWrite()16.6. Function highByte()16.7. Function lowByte()16.8. Function sbi()16.9. Function cbi()17. Arduino Classes17.1. The Print Class17.2. The Printable Class17.3. The Stream Class17.4. The HardwareSerial Class17.5. The String ClassPart 3 - Converting to the AVR Language18. Introduction19. Numbering Systems.19.1. Decimal Numbering19.2. Binary Numbering19.3. Hexadecimal Numbering20. Binary Logical Operations20.1. NOT20.2. AND20.3. OR20.4. XOR21. Using the Arduino IDE21.1. Replacing pinMode()21.2. Replacing digitalWrite()21.3. Replacing digitalRead()Part 4 - Alternatives to the Arduino IDE22. PlatformIO22.1. Installing PlatformIO Core22.2. Testing PlatformIO Core22.3. PlatformIO in an IDE22.4. PlatformIO Home23. Arduino Command Line23.1. Obtaining the Arduino-CLI23.2. Installing23.3. Installing Platforms23.4. Configuring the CLI23.5. Creating Sketches23.6. Selecting a Board23.7. Compiling Sketches23.8. Uploading Sketches23.9. Getting Help23.10. Serial Usage23.11. FinallyPart 5 - About the ATMega328P24. ATmega328P Fuses24.1. Low Fuse Bits24.2. Low Fuse Factory Default24.3. Arduino Low Fuse Settings24.4. High Fuse Bits24.5. High Fuse Factory Default24.6. Arduino High Fuse Settings24.7. Extended Fuse Bits24.8. Extended Fuse Factory Default24.9. Arduino Extended Fuse Settings25. Brown Out Detection26. The Watchdog Timer26.1. WDT Modes of Operation26.2. Amended Sketch setup() function26.3. WDT Reset26.4. The WDT Control Register26.5. Enabling the WDT26.6. Setting the WDT Timeout Period26.7. Disabling the WDT27. The Analogue Comparator27.1. Reference Voltage27.2. Sampled Voltage27.3. Digital Input27.4. Enable the Analogue Comparator27.5. Select Reference Voltage Source27.6. Select Sampled Voltage Source Pin27.7. Sampled Voltage Summary27.8. Comparator Outputs27.9. Comparator Example28. Timer/Counters28.1. Timer/Counter 0 (8 bits)28.2. Timer/Counter 1 (8, 9, 10 and/or 16 bits)28.3. Timer/Counter 2 (8 bits)28.4. Timer/Counter Clock Sources28.5. Timer/Counter Operating Modes28.6. PWM Modes - Duty Cycle28.7. Too Much to Remember? Try AVRAssist29. Counting29.1. Setting External Counting29.2. Example Sketch30. Timer 1 Input Capture Unit31. Putting the AVR to Sleep31.1. Sleep Modes 23931.2. Analogue Comparator 24632. Power Reduction32.1. Power Consumption32.2. Power Reduction Register32.3. Saving Arduino Power32.4. The Power Functions33. Analogue to Digital Converter (ADC)33.1. ADC Setup and Initiation33.2. Noise Reduction33.3. Temperature Measurement33.4. ADC Example34. USART34.1. Baud Rates34.2. What is a Frame?34.3. Parity34.4. Interrupts34.5. Initialising the USART34.6. USART Checks34.7. USART ExampleAppendices
Developing Inclusive Mobile Apps
By failing to consider those with needs different to ourselves, we are telling these people they are not welcome in our app, and therefore that technology as a whole, is not for them. This is not hyperbole—23% of people in the US with a registered disability aren't online at all, that's three times more likely than the general population. When asked why they're not online, disabled respondents say their disability prevents them or that using the internet is too hard.To help your apps combat the issue of digital exclusion, this book covers considerations and tools mobile developers, or anyone creating mobile experiences, can use to make mobile work better for those with disabilities—mental or physical—and how to create a better experience for everyone.Software is not made up of cold, unthinking algorithms. Software is a craft in the truest sense of the word, and one of the greatest tools you can have as a craftsperson is empathy for the people who will be using your app. Each one of whom is an individual with different abilities, experiences, knowledge, and circumstances.WHAT YOU'LL LEARN* Create mobile experiences that work for as many people as possible* Incorporate a worldview of accessibility and customer service into your design* Work with accessibility tools and techniques commonly available for developersWHO THIS BOOK IS FORMobile developers working solo or as part of a team. UX designers, quality engineers, product owners, and anybody working in mobile.ROB WHITAKER is an iOS software development engineer at Capital One UK with a passion for improving digital experiences for everyone. He actively observes how people use technology, and considers how we can all make those interactions better. Currently he’s working on a project to make the Capital One UK app the first mobile app certified by the RNIB (Royal National Institute for Blind People).Chapter 1: What is Accessibility?• Intro to accessibility - great accessibility is a great experience for everyone• Intro to disability - ie, its not all visual• Why mobile is the best for accessible innovationChapter 2: What is Digital Inclusion?• Brief history of accessible thinking• Inclusive design & the persona spectrum• EmpathyChapter 3: Accessibility Tools on Android• Brief overview of the accessibility features & tools built into Android. What these mean for users, and how to leverage them as developers• Including code snippetsChapter 4: Accessibility Tools for iOS• Brief overview of the accessibility features & tools built into iOS. What these mean for users, and how to leverage them as developers• Including code snippetsChapter 5: Ensuring good accessibility• User research• Testing with accessibility toolsChapter 6: Visual Impairments• Practical tips for improving the experience for people with visual impairments• Including code snippetsChapter 7: Motor issues• Practical tips for improving the experience for people with motor issues• Including code snippetsChapter 8: Deaf & Hard of Hearing• Practical tips for improving the experience for people with auditory impairments• Including code snippetsChapter 9: Anxiety & Mental Health• Practical tips for improving the experience for people with visual mental health issues• Including code snippetsChapter 10: Dyslexia, Autism and Learning Difficulties• Practical tips for improving the experience for people with learning difficulties• Including code snippetsChapter 11: Poor Digital Skills• Good accessibility is not just about disability, but ability too• What skills are essential for digital life, and how do we measure up• Practical tips for improving the experience for people with poor digital skillsChapter 12: Life Circumstances• Good accessibility is not just about disability, but people's circumstances too• How circumstances such as low income, poor education etc can affect your digital interactions• Practical tips for improving the experience for people with with difficult life circumstancesChapter 13: Age, Gender & Sexuality• Theres a huge gap in digital use between 18 year olds, and those aged 60+.• How do we make sure we're not prejudicing based on age or experience, gender or sexuality when creating softwareChapter 14: Internationalization
C++20 Recipes
Discover the newest major features of C++20, including modules, concepts, spaceship operators, and smart pointers. This book is a handy code cookbook reference guide that covers the C++ core language standard as well as some of the code templates available in standard template library (STL).In C++20 Recipes: A Problem-Solution Approach, you'll find numbers, strings, dates, times, classes, exceptions, streams, flows, pointers, and more. Also, you'll see various code samples, templates for C++ algorithms, parallel processing, multithreading, and numerical processes. It also includes 3D graphics programming code. A wealth of STL templates on function objects, adapters, allocators, and extensions are also available.This is a must-have, contemporary reference for your technical library to help with just about any project that involves the C++ programming language.WHAT YOU WILL LEARN* See what's new in C++20Write modules * Work with text, numbers, and classes* Use the containers and algorithms available in the standard library* Work with templates, memory, concurrency, networking, scripting, and more* Code for 3D graphicsWHO THIS BOOK IS FORProgrammers with at least some prior experience with C++.DR. J. BURTON BROWNING earned his doctorate from North Carolina State University. He has conducted research in areas including: distance learning, programming, and instructional technology. As a life-long learner and someone who has interests in topics such as: programming, photography, robotics, car restoration, wood working, hunting, reading, fishing, and archery, he is never at a loss for something to do. The art and joy of serving as a professor suits his inquisitive nature. Dr. Browning’s previous publications include works on cross-functional learning teams (CFLT), The Utopian School (teacher-led school model), computer programming (several languages), open-source software, healthcare statistics and data mining, CNC plasma cutter operation, educational technology, biography, mobile learning, online teaching, and more.BRUCE SUTHERLAND is a video game programmer hailing from Dundee, Scotland. He graduated with a Bsc (Hons) Computer Games Technology from the University of Abertay, Dundee in Scotland, graduating in 2005. After graduating he began his first job in the games industry at 4J Studios where he worked on Star Trek: Encounters (PS2), The Elder Scrolls IV: Oblivion (PS3), Star Trek: Conquest (PS2, Wii), Ducati Moto (NDS) and AMF Pinbusters! (NDS). In July 2008 he moved from Dundee to Melbourne Australia where he joined Visceral Studios and was a software engineer on Dead Space (Xbox 360, PS3, PC), The Godfather II (Xbox 360, PS3, PC) and Dead Space 3 (Xbox 360, PS3, PC). He developed an interest in developing for Android in his spare time and writes tutorials on his blog.1. Beginning C++2. Modern C++3. Working with Text4. Working with Numbers5. Classes6. Inheritance7. The STL Containers8. The STL Algorithms9. Templates10. Memory11. Concurrency12. Networking13. Scripting14. 3D Graphics Programming
Affinity Publisher 1.8 (2. Auflg.)
Praxiswissen für Einsteiger in 2. AuflageDie Layout- und Desktop-Publishing-Software Affinity Publisher besticht durch einen professionellen Funktionsumfang - und dies ohne Abo- und Cloud-Zwang zu einem günstigen Preis. Trotzdem erhalten Sie ein sehr leistungsfähiges Werkzeug, mit dem Sie hochwertige Publikationen für Druck, Web und andere Medien erstellen können. Der Schwerpunkt des Buches liegt auf der Gestaltung von Druckpublikationen, wie sie bei vielen kleinen und mittleren Unternehmen, Vereinen, Behörden oder auch Privatleuten, die ihre Werke professionell gestalten möchten, anfallen.Winfried Seimert gibt Ihnen zunächst eine Übersicht über das Programm und seine Arbeitsweise, so dass Sie sich schnell zurechtfinden. Neben dem Erstellen von und dem Umgang mit Satzdateien erfahren Sie, was es mit den Master-Seiten auf sich hat. Der Autor zeigt Ihnen außerdem, wie genial StudioLink die beiden Schwesterprogramme Affinity Photo und Affinity Designer in den Workflow einbindet. Schritt für Schritt lernen Sie, mit Typografie und Grundlinienrastern umzugehen, komplexe Layouts für Flyer oder Zeitschriften anzulegen, Grafikelemente einzusetzen und die Farben gezielt zu steuern. Schließlich können Sie Ihre Layout-Entwürfe als PDF ausgeben, diese optimal für den Druck vorbereiten und dabei die notwendigen Einstellungen beachten.Abgerundet wird das Buch durch einen Praxisteil, in dem Sie das Erlernte gleich umsetzen und so Layouts für Visitenkarten, eindrucksvolle Fotobücher, Flyer und Broschüren erhalten.Aus dem Inhalt:Erste Schritte mit dem PublisherArbeit mit SatzdateienTexterfassung: Rahmentext, Grafiktext, Pfadtext und TabellenTexte mit Publisher gestalten und Objekte selbst erstellen und arrangierenBilder und Grafiken platzierenHilfreiche Techniken und Einstellungen z. B. zu Farbprofilen, Werkzeugen und AssetsAnsprechende Gestaltung von Visitenkarten, Fotobüchern, Flyern und BroschürenÜber den Autor:Winfried Seimert ist IT-Dozent, Consultant und Autor zahlreicher Fachbücher insbesondere zu den Themen Software und Betriebssysteme. Dabei hat er immer den Komfort des Anwenders im Blick und erklärt entsprechend praxisnah. So erfreuen sich seine Bücher aufgrund ihrer durchdachten Strukturierung bereits seit Mitte der neunziger Jahre großer Beliebtheit.
CCNP Enterprise Certification Study Guide: Implementing and Operating Cisco Enterprise Network Core Technologies
THE PRACTICAL AND CONCEPTUAL KNOWLEDGE YOU NEED TO ATTAIN CCNP ENTERPRISE CERTIFICATIONFrom one of the most trusted study guide publishers comes CCNP Enterprise Certification Study Guide: Exam 350-401. This guide helps you develop practical knowledge and best practices for critical aspects of enterprise infrastructure so you can gain your CCNP Enterprise certification. If you’re hoping to attain a broader range of skills and a solid understanding of Cisco technology, this guide will also provide fundamental concepts for learning how to implement and operate Cisco enterprise network core technologies.By focusing on real-world skills, each chapter prepares you with the knowledge you need to excel in your current role and beyond. It covers emerging and industry-specific topics, such as SD-WAN, network design, wireless, and automation. This practical guide also includes lessons on:● Automation● Network assurance● Security● Enterprise infrastructure● Dual-stack architecture● VirtualizationIn addition to helping you gain enterprise knowledge, this study guidecan lead you toward your Cisco specialist certification.When you purchase this guide, you get access to the information you need to prepare yourself for advances in technology and new applications, as well as online study tools such as:● Bonus practice exams● Pre-made flashcards● Glossary of key terms● Specific focus areasExpand your skillset and take your career to the next level with CCNP Enterprise Certification Study Guide.ABOUT THE AUTHORBEN PIPER is an IT consultant who has created more than 20 training courses, covering Cisco routing and switching, Amazon Web Services, Puppet configuration management, and Windows Server Administration. He is the co-author of AWS Certified Cloud Practitioner Study Guide: Foundational (CLF-C01) Exam, AWS Certified Solutions Architect Study Guide: Associate (SAA-C01) Exam, AWS Certified SysOps Administrator Practice Tests: Associate (SOA-C01) Exam, and Learn Cisco Network Administration in a Month of Lunches.Introduction xxiAssessment Test xxviiiCHAPTER 1 NETWORKING FUNDAMENTALS 1The OSI Model 2The Upper Layers: Application, Presentation, and Session 4Making Sense of Layers 4The Lower Layers: Physical, Data Link, Network, and Transport 6Layer 1: The Physical Layer 7Layer 2: The Data Link Layer 8A Brief History of Ethernet 8The MAC Address Table 10Maximum Transmission Unit 12Subnet Limits 12Layer 3: The Network Layer 13Forwarding within a Subnet 14Forwarding between Subnets 14Address Resolution Protocol 16Fragmentation 17Routing vs. Forwarding 18Layer 4: The Transport Layer 18Transmission Control Protocol 19Encapsulation and Decapsulation 21Summary 22Exam Essentials 22Review Questions 24CHAPTER 2 SPANNING TREE PROTOCOLS 29The Need for Spanning Tree 31VLANs and Trunking 32Dynamic Trunking 34Unconditional Trunking 35Active and Allowed VLANs 36Rapid Per-VLAN Spanning Tree 38Electing the Root Bridge 38Calculating the Root Ports 41Calculating the Root Ports of Indirectly Connected Switches 44Modifying Port Cost 46Modifying Port Priority 47Calculating Blocked Ports 48Port States 49Port Roles 49Link Types 49Multiple Spanning Tree 50Root Bridges and Port Priority 52Internal Spanning Tree 53Native VLAN 54Topology Change Detection 55Spanning Tree Extensions 55Root Guard 55BPDU Guard and BPDU Filter 57Unidirectional Link Detection 58Loop Guard 58Summary 58Exam Essentials 59Exercises 60Review Questions 62CHAPTER 3 ENTERPRISE NETWORK DESIGN 67Physical Network Architectures 68Comparing Campus and Data Center Networks 69The Three-Tier Architecture 70The Two-Tier Collapsed Core: A Cheaper Alternative 73Layer 2 Design 74Switched and Routed Interfaces 75Switched Topologies 76Routed Access Topology 81EtherChannels 82Load-Balancing Methods 83Static EtherChannels 84Port Aggregation Control Protocol 88Link Aggregation Control Protocol 90First-Hop Redundancy Protocols 91Hot Standby Router Protocol 92Virtual Router Redundancy Protocol 94Gateway Load-Balancing Protocol 95Summary 97Exam Essentials 98Review Questions 100CHAPTER 4 WIRELESS LAN (WLAN) 105Radio Frequency Fundamentals 106Frequency and Amplitude 107Carrier Frequency 109Power Levels 110WLAN 802.11 Standards 115The Physical Layer: Frequencies and Channels 115Layer 2: 802.11 Media Access Control (MAC) 119Access Point Modes 124Autonomous 124Lightweight 124Wireless LAN Controller Selection Process 125Roaming and Location Services 126Roaming 126Location Services 128Summary 128Exam Essentials 129Review Questions 130CHAPTER 5 OPEN SHORTEST PATH FIRST (OSPF) 135Link-State Advertisements 136OSPF Areas 137LSA Types 137Neighbor Operations 141Configuring OSPF 142Configuring Area 0 on a Broadcast Network 142Viewing Neighbor Adjacencies 143Rigging the Designated Router Election 144Viewing and Understanding LSAs 146Authentication 154Passive Interfaces 158Injecting a Default Route 159Inter-Area Summarization 161Route Filtering 162Distribute Lists 162Summary 163Exam Essentials 164Exercises 164Review Questions 166CHAPTER 6 ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL (EIGRP) 171EIGRP Fundamentals 172EIGRP Packet Types 172The Diffusing Update Algorithm (DUAL) 173Weighted Metrics 176Configuring EIGRP 178Equal Cost Multipathing 181Modifying Metrics 182Switching Types 186Unequal Cost Multipathing 187Summary 190Exam Essentials 190Exercises 191Review Questions 192CHAPTER 7 THE BORDER GATEWAY PROTOCOL (BGP) 197BGP Fundamentals 198BGP AS Numbers 199BGP Session States 201Configuring BGP 202Advertising Prefixes 204Path Selection 205Route Redistribution among BGP, OSPF, and EIGRP 210Testing IP Reachability Using Tcl Scripts 214Troubleshooting 215Modifying Weight 218Advertising Summary Routes Using Route Aggregation 220Route Filtering Using Route Maps and Prefix Lists 222Summary 225Exam Essentials 226Exercises 226Review Questions 228CHAPTER 8 NETWORK ADDRESS TRANSLATION AND MULTICAST 233Network Address Translation 234Address Types 234Static NAT 236Dynamic NAT 241NAT Overload with Port Address Translation 247Outside Static NAT 250Removing NAT Configurations 251Multicast 252IP Multicast 253LAN Multicast 253Multicast Routing 257Configuring PIM 258Configuring a Multicast Receiver 262IP Multicast and Ethernet 264Summary 265Exam Essentials 267Exercises 268Review Questions 270CHAPTER 9 QUALITY OF SERVICE 275Understanding Quality of Service 276Classification and Marking 277Differentiated Services 277Layer 2 Marking 280Class Maps and Policy Maps 280Wireless QoS 281Policing 284Single-Rate, Two-Color Policing 284Single-Rate, Three-Color Policing 285Two-Rate Policing 287Queuing 288Class-Based Weighted Fair Queuing 288Low-Latency Queuing 293Explicit Congestion Notification 295Shaping 295Summary 297Exam Essentials 297Exercises 298Review Questions 299CHAPTER 10 NETWORK VIRTUALIZATION 303Virtual Machines, Hypervisors, and Network Virtualization 304Virtual Machines and Server Virtualization 305Network Virtualization 307Generic Routing Encapsulation Tunnels 312Configuring a GRE Tunnel to Tunnel IPv4 and IPv6 over IPv4 312Recursive Routing 318IP Security 319Internet Key Exchange 320Encapsulating Security Payload 320Configuring IPsec in Transport Mode with a GRE Tunnel 321Configuring IPsec in Tunnel Mode 324Location/ID Separation Protocol 326LISP Terminology 328Configuring LISP 328Simulating IP Mobility 332Is LISP a Routing Protocol? 334Virtual Extensible Local Area Network 334MAC Address Learning 335Forwarding 335Configuring VXLAN 336VXLAN Control Planes 336Configuring the Underlay 337Configuring the Overlay 338Configuring R1 and R2 339Virtual Routing and Forwarding 340Configuring a VRF 340Configuring Multi-VRF EIGRP 342Summary 345Exam Essentials 345Exercises 346Review Questions 347CHAPTER 11 SOFTWARE-DEFINED NETWORKING AND NETWORK PROGRAMMABILITY 353What Is Software-Defined Networking? 355Software-Defined Access 356SD-Access Layers 357Physical Layer 357Network Underlay 358Fabric Overlay 359Controller Layer 363Management Layer 364Software-Defined WAN 369vManage Network Management System 370vSmart Controller 370vBond Orchestrator 371vEdge Routers 371Network Programmability and Automation 372The Cisco DNA Center Intent API 372vManage REST API 379NETCONF 383Embedded Event Manager 386Configuration Management Platforms 388Summary 391Exam Essentials 391Exercises 392Review Questions 393CHAPTER 12 NETWORK SECURITY AND MONITORING 397Infrastructure Security 398Device Access 399Authentication, Authorization, and Accounting 402Access Control Lists 407Control Plane Policing 412Cisco Security Products 414AnyConnect Secure Mobility Client 414Umbrella 414Advanced Malware Protection ThreatGrid 414Advanced Malware Protection for Endpoints 415Firepower Next-Generation Firewall 415TrustSec 416MAC Security 418Wireless Security 418WebAuth 418Configuring WPA2 with 802.1X 422Configuring 802.1X on the Client 422Configure Preshared Keys 424Monitoring 425Conditional Debugs 425Simple Network Management Protocol (SNMP) 425Syslog 426Network Time Protocol 428NetFlow and Flexible NetFlow 429Switched Port Analyzer 432IP Service Level Agreement 434Summary 436Exam Essentials 437Exercises 438Review Questions 439Appendix Answers to Review Questions 443Chapter 1: Networking Fundamentals 444Chapter 2: Spanning Tree Protocols 445Chapter 3: Enterprise Network Design 447Chapter 4: Wireless LAN (WLAN) 448Chapter 5: Open Shortest Path First (OSPF) 450Chapter 6: Enhanced Interior Gateway Routing Protocol (EIGRP) 451Chapter 7: The Border Gateway Protocol (BGP) 453Chapter 8: Network Address Translation and Multicast 454Chapter 9: Quality of Service 456Chapter 10: Network Virtualization 457Chapter 11: Software-Defined Networking and Network Programmability 459Chapter 12: Network Security and Monitoring 460Index 463
Smarter Data Science
ORGANIZATIONS CAN MAKE DATA SCIENCE A REPEATABLE, PREDICTABLE TOOL, WHICH BUSINESS PROFESSIONALS USE TO GET MORE VALUE FROM THEIR DATAEnterprise data and AI projects are often scattershot, underbaked, siloed, and not adaptable to predictable business changes. As a result, the vast majority fail. These expensive quagmires can be avoided, and this book explains precisely how.Data science is emerging as a hands-on tool for not just data scientists, but business professionals as well. Managers, directors, IT leaders, and analysts must expand their use of data science capabilities for the organization to stay competitive. Smarter Data Science helps them achieve their enterprise-grade data projects and AI goals. It serves as a guide to building a robust and comprehensive information architecture program that enables sustainable and scalable AI deployments.When an organization manages its data effectively, its data science program becomes a fully scalable function that’s both prescriptive and repeatable. With an understanding of data science principles, practitioners are also empowered to lead their organizations in establishing and deploying viable AI. They employ the tools of machine learning, deep learning, and AI to extract greater value from data for the benefit of the enterprise.By following a ladder framework that promotes prescriptive capabilities, organizations can make data science accessible to a range of team members, democratizing data science throughout the organization. Companies that collect, organize, and analyze data can move forward to additional data science achievements:* Improving time-to-value with infused AI models for common use cases* Optimizing knowledge work and business processes* Utilizing AI-based business intelligence and data visualization* Establishing a data topology to support general or highly specialized needs* Successfully completing AI projects in a predictable manner* Coordinating the use of AI from any compute node. From inner edges to outer edges: cloud, fog, and mist computingWhen they climb the ladder presented in this book, businesspeople and data scientists alike will be able to improve and foster repeatable capabilities. They will have the knowledge to maximize their AI and data assets for the benefit of their organizations.NEAL FISHMAN is a Distinguished Engineer and CTO of Data-Based Pathology at IBM. He is an IBM-certified Senior IT Architect and Open Group Distinguished Chief Architect. COLE STRYKER is a journalist based in Los Angeles. He is the author of Epic Win for Anonymous and Hacking the Future. Foreword for Smarter Data Science xixEpigraph xxiPreamble xxiiiCHAPTER 1 CLIMBING THE AI LADDER 1Readying Data for AI 2Technology Focus Areas 3Taking the Ladder Rung by Rung 4Constantly Adapt to Retain Organizational Relevance 8Data-Based Reasoning is Part and Parcel in the Modern Business 10Toward the AI-Centric Organization 14Summary 16CHAPTER 2 FRAMING PART I: CONSIDERATIONS FOR ORGANIZATIONS USING AI 17Data-Driven Decision-Making 18Using Interrogatives to Gain Insight 19The Trust Matrix 20The Importance of Metrics and Human Insight 22Democratizing Data and Data Science 23Aye, a Prerequisite: Organizing Data Must Be a Forethought 26Preventing Design Pitfalls 27Facilitating the Winds of Change: How Organized Data Facilitates Reaction Time 29Quae Quaestio (Question Everything) 30Summary 32CHAPTER 3 FRAMING PART II: CONSIDERATIONS FOR WORKING WITH DATA AND AI 35Personalizing the Data Experience for Every User 36Context Counts: Choosing the Right Way to Display Data 38Ethnography: Improving Understanding Through Specialized Data 42Data Governance and Data Quality 43The Value of Decomposing Data 43Providing Structure Through Data Governance 43Curating Data for Training 45Additional Considerations for Creating Value 45Ontologies: A Means for Encapsulating Knowledge 46Fairness, Trust, and Transparency in AI Outcomes 49Accessible, Accurate, Curated, and Organized 52Summary 54CHAPTER 4 A LOOK BACK ON ANALYTICS: MORE THAN ONE HAMMER 57Been Here Before: Reviewing the Enterprise Data Warehouse 57Drawbacks of the Traditional Data Warehouse 64Paradigm Shift 68Modern Analytical Environments: The Data Lake 69By Contrast 71Indigenous Data 72Attributes of Difference 73Elements of the Data Lake 75The New Normal: Big Data is Now Normal Data 77Liberation from the Rigidity of a Single Data Model 78Streaming Data 78Suitable Tools for the Task 78Easier Accessibility 79Reducing Costs 79Scalability 79Data Management and Data Governance for AI 80Schema-on-Read vs. Schema-on-Write 81Summary 84CHAPTER 5 A LOOK FORWARD ON ANALYTICS: NOT EVERYTHING CAN BE A NAIL 87A Need for Organization 87The Staging Zone 90The Raw Zone 91The Discovery and Exploration Zone 92The Aligned Zone 93The Harmonized Zone 98The Curated Zone 100Data Topologies 100Zone Map 103Data Pipelines 104Data Topography 105Expanding, Adding, Moving, and Removing Zones 107Enabling the Zones 108Ingestion 108Data Governance 111Data Storage and Retention 112Data Processing 114Data Access 116Management and Monitoring 117Metadata 118Summary 119CHAPTER 6 ADDRESSING OPERATIONAL DISCIPLINES ON THE AI LADDER 121A Passage of Time 122Create 128Stability 128Barriers 129Complexity 129Execute 130Ingestion 131Visibility 132Compliance 132Operate 133Quality 134Reliance 135Reusability 135The xOps Trifecta: DevOps/MLOps, DataOps, and AIOps 136DevOps/MLOps 137DataOps 139AIOps 142Summary 144CHAPTER 7 MAXIMIZING THE USE OF YOUR DATA: BEING VALUE DRIVEN 147Toward a Value Chain 148Chaining Through Correlation 152Enabling Action 154Expanding the Means to Act 155Curation 156Data Governance 159Integrated Data Management 162Onboarding 163Organizing 164Cataloging 166Metadata 167Preparing 168Provisioning 169Multi-Tenancy 170Summary 173CHAPTER 8 VALUING DATA WITH STATISTICAL ANALYSIS AND ENABLING MEANINGFUL ACCESS 175Deriving Value: Managing Data as an Asset 175An Inexact Science 180Accessibility to Data: Not All Users are Equal 183Providing Self-Service to Data 184Access: The Importance of Adding Controls 186Ranking Datasets Using a Bottom-Up Approach for Data Governance 187How Various Industries Use Data and AI 188Benefi ting from Statistics 189Summary 198CHAPTER 9 CONSTRUCTING FOR THE LONG-TERM 199The Need to Change Habits: Avoiding Hard-Coding 200Overloading 201Locked In 202Ownership and Decomposition 204Design to Avoid Change 204Extending the Value of Data Through AI 206Polyglot Persistence 208Benefi ting from Data Literacy 213Understanding a Topic 215Skillsets 216It’s All Metadata 218The Right Data, in the Right Context, with the Right Interface 219Summary 221CHAPTER 10 A JOURNEY’S END: AN IA FOR AI 223Development Efforts for AI 224Essential Elements: Cloud-Based Computing, Data, and Analytics 228Intersections: Compute Capacity and Storage Capacity 234Analytic Intensity 237Interoperability Across the Elements 238Data Pipeline Flight Paths: Preflight, Inflight, Postflight 242Data Management for the Data Puddle, Data Pond, and Data Lake 243Driving Action: Context, Content, and Decision-Makers 245Keep It Simple 248The Silo is Dead; Long Live the Silo 250Taxonomy: Organizing Data Zones 252Capabilities for an Open Platform 256Summary 260Appendix Glossary of Terms 263Index 269
Emerging Extended Reality Technologies for Industry 4.0
In the fast-developing world of Industry 4.0, which combines Extended Reality (XR) technologies, such as Virtual Reality (VR) and Augmented Reality (AR), creating location aware applications to interact with smart objects and smart processes via Cloud Computing strategies enabled with Artificial Intelligence (AI) and the Internet of Things (IoT), factories and processes can be automated and machines can be enabled with self-monitoring capabilities. Smart objects are given the ability to analyze and communicate with each other and their human co-workers, delivering the opportunity for much smoother processes, and freeing up workers for other tasks. Industry 4.0 enabled smart objects can be monitored, designed, tested and controlled via their digital twins, and these processes and controls are visualized in VR/AR. The Industry 4.0 technologies provide powerful, largely unexplored application areas that will revolutionize the way we work, collaborate and live our lives. It is important to understand the opportunities and impact of the new technologies and the effects from a production, safety and societal point of view.JOLANDA G. TROMP is a Human-Computer Interaction expert for User-Centered design and evaluation of new technologies (VR/AR/AI/IoT), with 20 years' experience as principal Usability investigator. She has a PhD in Systematic Usability Design and Evaluation for Collaborative Virtual Environments, 2001, University of Nottingham, United Kingdom, a BSc in Psychology (with honors) University of Amsterdam, Holland (1995). She is a research consultant for the Center of Visualization and Simulation at Duy Tan University, Vietnam; for the Mixed Reality Task Group of the State University of New York; and for the global Simulations Working Group. DAC-NHUONG LE is PhD Deputy-Head of Faculty of Information Technology, Haiphong University, Vietnam. His areas of research include: evolutionary computation, specialized with evolutionary multiobjective optimization, approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, image processing in biomedical. His core work in evolutionary multi-objective optimization, network security, wireless, mobile computing and virtual reality. He has edited several books for the Wiley-Scrivener imprint. CHUNG VAN LE is Vice-Director Center of Visualization and Simulation. He has a MSc in Computer Science from Duy Tan University, 2011, Vietnam and a BSc in Computer Science at Da Nang University, 2004, Vietnam. He is currently pursuing a PhD at Duy Tan University, Vietnam. He researches medical image processing, e-Health, virtual simulation in medicine. He is Duy Tan University Lead Software Developer for 3D virtual body system for teaching anatomy and virtual endoscopic techniques for medical students. List of Figures xiList of Tables xvForeword xviiIntroduction xixPreface xxiiiAcknowledgments xxvAcronyms xxviiPART I EXTENDED REALITY EDUCATION1 MIXED REALITY USE IN HIGHER EDUCATION: RESULTS FROM AN INTERNATIONAL SURVEY 3J. Riman, N. Winters, J. Zelenak, I. Yucel, J. G. Tromp1.1 Introduction 41.2 Organizational Framework 41.3 Online Survey About MR Usage 51.4 Results 61.4.1 Use in Classrooms 81.4.2 Challenges 91.4.3 Examples of Research in Action 101.4.4 Hardware and Software for Use in Classrooms and Research 101.4.5 Challenges Described by Researcher Respondents 121.4.6 Anecdotal Responses about Challenges 121.5 Conclusion 13References 152 APPLYING 3D VR TECHNOLOGY FOR HUMAN BODY SIMULATION TO TEACHING, LEARNING AND STUDYING 17Le Van Chung, Gia Nhu Nguyen, Tung Sanh Nguyen, Tri Huu Nguyen, Dac-Nhuong Le2.1 Introduction 182.2 Related Works 182.3 3D Human Body Simulation System 192.3.1 The Simulated Human Anatomy Systems 192.3.2 Simulated Activities and Movements 202.3.3 Evaluation of the System 232.4 Discussion of Future Work 252.5 Conclusion 26References 26PART II INTERNET OF THINGS3 A SAFETY TRACKING AND SENSOR SYSTEM FOR SCHOOL BUSES IN SAUDI ARABIA 31Samah Abbas, Hajar Mohammed, Laila Almalki Maryam Hassan, Maram Meccawy3.1 Introduction 323.2 Related Work 323.3 Data Gathering Phase 333.3.1 Questionnaire 343.3.2 Driver Interviews 353.4 The Proposed Safety Tracking and Sensor School Bus System 363.4.1 System Analysis and Design 373.4.2 User Interface Design 383.5 Testing and Results 413.6 Discussion and Limitation 423.7 Conclusions and Future Work 42References 424 A LIGHTWEIGHT ENCRYPTION ALGORITHM APPLIED TO A QUANTIZED SPEECH IMAGE FOR SECURE IOT 45Mourad Talbi4.1 Introduction 464.2 Applications of IoT 464.3 Security Challenges in IoT 474.4 Cryptographic Algorithms for IoT 474.5 The Proposed Algorithm 484.6 Experimental Setup 504.7 Results and Discussion 524.8 Conclusion 57References 58PART III MOBILE TECHNOLOGY5 THE IMPACT OF SOCIAL MEDIA ADOPTION ON ENTREPRENEURIAL ECOSYSTEM 63Bodor Almotairy, Manal Abdullah, Rabeeh Abbasi5.1 Introduction 645.2 Background 655.2.1 Small and Medium-Sized Enterprises (SMEs) 655.2.2 Social Media 655.2.3 Social Networks and Entrepreneurial Activities 665.3 Analysis Methodology 665.4 Understanding the Entrepreneurial Ecosystem 675.5 Social Media and Entrepreneurial Ecosystem 695.5.1 Social Media Platforms and Entrepreneurship 715.5.2 The Drivers of Social Media Adoption 715.5.3 The Motivations and Benefits for Entrepreneurs to Use Social Media 715.5.4 Entrepreneurship Activities Analysis Techniques in Social Media Networks 715.6 Research Gap and Recommended Solution 735.6.1 Research Gap 735.6.2 Recommended Solution 745.7 Conclusion 74References 756 HUMAN FACTORS FOR E-HEALTH TRAINING SYSTEM: UX TESTING FOR XR ANATOMY TRAINING APP 81Zhushun Timothy Cai, Oliver Medonza, Kristen Ray, Chung Van Le, Damian Schofield, Jolanda Tromp6.1 Introduction 826.2 Mobile Learning Applications 826.3 Ease of Use and Usability 826.3.1 Effectiveness 836.3.2 Efficiency 836.3.3 Satisfaction 836.4 Methods and Materials 866.5 Results 896.5.1 Task Completion Rate (TCR) 896.5.2 Time-on-Task (TOT) 906.5.3 After-Scenario Questionnaire (ASQ) 916.5.4 Post-Study System Usability Questionnaire (PSSUQ) 936.6 Conclusion 93References 94PART IV TOWARDS DIGITAL TWINS AND ROBOTICS7 AUGMENTED REALITY AT HERITAGE SITES: TECHNOLOGICAL ADVANCES AND EMBODIED SPATIALLY MINDED INTERACTIONS 101Lesley Johnston, Romy Galloway, Jordan John Trench, Matthieu Poyade, Jolanda Tromp, Hoang Thi My7.1 Introduction 1027.2 Augmented Reality Devices 1037.3 Detection and Tracking 1057.4 Environmental Variation 1067.5 Experiential and Embodied Interactions 1097.6 User Experience and Presence in AR 1147.7 Conclusion 115References 1168 TELECI ARCHITECTURE FOR MACHINE LEARNING ALGORITHMS INTEGRATION IN AN EXISTING LMS 121V. Zagorskis, A. Gorbunovs, A. Kapenieks8.1 Introduction 1228.2 TELECI Architecture 1238.2.1 TELECI Interface to a Real LMS 1238.2.2 First RS Steps in the TELECI System 1248.2.3 Real Student Data for VS Model 1258.2.4 TELECI Interface to VS Subsystem 1268.2.5 TELECI Interface to AI Component 1288.3 Implementing ML Technique 1288.3.1 Organizational Activities 1288.3.2 Data Processing 1298.3.3 Computing and Networking Resources 1308.3.4 Introduction to Algorithm 1308.3.5 Calibration Experiment 1328.4 Learners’ Activity Issues 1338.5 Conclusion 136References 137PART V BIG DATA ANALYTICS9 ENTERPRISE INNOVATION MANAGEMENT IN INDUSTRY 4.0: MODELING ASPECTS 141V. Babenko9.1 Introduction 1429.2 Conceptual Model of Enterprise Innovation Process Management 1449.3 Formation of Restrictions for Enterprise Innovation Management Processes 1479.4 Formation of Quality Criteria for Assessing Implementation of Enterprise Innovation Management Processes 1489.5 Statement of Optimization Task of Implementation of Enterprise Innovation Management Processes 1489.6 Structural and Functional Model for Solving the Task of Dynamic 1509.7 Formulation of the Task of Minimax Program Management of Innovation Processes at Enterprises 1529.8 General Scheme for Solving the Task of Minimax Program Management of Innovation Processes at the Enterprises 1549.9 Model of Multicriteria Optimization of Program Management of Innovation Processes 1569.10 Conclusion 161References 16210 USING SIMULATION FOR DEVELOPMENT OF AUTOMOBILE GAS DIESEL ENGINE SYSTEMS AND THEIR OPERATIONAL CONTROL 165Mikhail G. Shatrov, Vladimir V. Sinyavski, Andrey Yu. Dunin, Ivan G. Shishlov, Sergei D. Skorodelov, Andrey L. Yakovenko10.1 Introduction 16610.2 Computer Modeling 16710.3 Gas Diesel Engine Systems Developed 16810.3.1 Electronic Engine Control System 16810.3.2 Modular Gas Feed System 16910.3.3 Common Rail Fuel System for Supply of the Ignition Portion of Diesel Fuel 16910.4 Results and Discussion 17210.4.1 Results of Diesel Fuel Supply System Simulation 17210.4.2 Results of Engine Bed Tests 18110.5 Conclusion 183References 184PART VI TOWARDS COGNITIVE COMPUTING11 CLASSIFICATION OF CONCEPT DRIFT IN EVOLVING DATA STREAM 189Mashail Althabiti and Manal Abdullah11.1 Introduction 19011.2 Data Mining 19011.3 Data Stream Mining 19111.3.1 Data Stream Challenges 19111.3.2 Features of Data Stream Methods 19311.4 Data Stream Sources 19311.5 Data Stream Mining Components 19311.5.1 Input 19411.5.2 Estimators 19411.6 Data Stream Classification and Concept Drift 19411.6.1 Data Stream Classification 19411.6.2 Concept Drift 19411.6.3 Data Stream Classification Algorithms with Concept Drift 19611.6.4 Single Classifier 19611.6.5 Ensemble Classifiers 19711.6.6 Output 20011.7 Datasets 20011.8 Evaluation Measures 20011.9 Data Stream Mining Tools 20111.10 Data Stream Mining Applications 20211.11 Conclusion 202References 20212 DYNAMICAL MASS TRANSFER SYSTEMS IN BUSLAEV CONTOUR NETWORKS WITH CONFLICTS 207Marina Yashina, Alexander Tatashev, Ivan Kuteynikov12.1 Introduction 20812.2 Construction of Buslaev Contour Networks 21012.3 Concept of Spectrum 21112.4 One-Dimensional Contour Network Binary Chain of Contours 21212.5 Two-Dimensional Contour Network-Chainmail 21412.6 Random Process with Restrictions on the Contour with the Possibility of Particle Movement in Both Directions 21812.7 Conclusion 218References 21913 PARALLEL SIMULATION AND VISUALIZATION OF TRAFFIC FLOWS USING CELLULAR AUTOMATA THEORY AND QUASIGASDYNAMIC APPROACH 223Antonina Chechina, Natalia Churbanova, Pavel Sokolov, Marina Trapeznikova, Mikhail German, Alexey Ermakov, Obidzhon Bozorov13.1 Introduction 22413.2 The Original CA Model 22413.3 The Slow-to-Start Version of the CA Model 22513.4 Numerical Realization 22513.5 Test Predictions for the CA Model 22913.6 The QGD Approach to Traffic Flow Modeling 23013.7 Parallel Implementation of the QGD Traffic Model 23213.8 Test Predictions for the QGD Traffic Model 23213.9 Conclusion 235References 236
Cloud Debugging and Profiling in Microsoft Azure
Use this collection of best practices and tips for assessing the health of a solution. This book provides detailed techniques and instructions to quickly diagnose aspects of your Azure cloud solutions.The initial chapters of this book introduce you to the many facets of Microsoft Azure, explain why and how building for the cloud differs from on-premise development, and outline the need for a comprehensive strategy to debugging and profiling in Azure. You learn the major types of blades (FaaS, SaaS, PaaS, IaaS), how different views can be created for different scenarios, and you will become familiar with the Favorites section, Cost Management & Billing blade, support, and Cloud Shell. You also will know how to leverage Application Insights for application performance management, in order to achieve a seamless cloud development experience. Application Insights, Log Analytics, and database storage topics are covered. The authors further guide you on identity security with Azure AD and continuous delivery with CI and CD covered in detail along with the capabilities of Azure DevOps. And you are exposed to external tooling and trouble shooting in a production environment.After reading this book, you will be able to apply methods to key Azure services, including App Service (Web Apps, Function Apps,and Logic Apps), Cloud Services, Azure Container Service, Azure Active Directory, Azure Storage, Azure SQL Database, Cosmos DB, Log Analytics, and many more.WHAT YOU WILL LEARN* Debug and manage the performance of your applications* Leverage Application Insights for application performance management* Extend and automate CI/CD with the help of various build tools, including Azure DevOps, TeamCity, and Cake bootstrapperWHO THIS BOOK IS FORApplication developers, designers, and DevOps personnel who want to find a one-stop shop in best practices for managing their application’s performance in the cloud and for debugging the issues accordinglyJEFFREY CHILBERTO is a software consultant specializing in the Microsoft technical stack, including Azure, BizTalk, MVC, WCF, and SQL Server. He has enterprise development experience in a wide range of industries, including banking, telecommunications, and healthcare in the USA, Europe, Australia, and New Zealand.SJOUKJE ZAAL is a managing consultant, Microsoft Cloud architect, and Microsoft Azure MVP with over 15 years of experience providing architecture, development, consultancy, and design expertise. She works at Capgemini, a global leader in consulting, technology services, and digital transformation.GAURAV ARORAA is a serial entrepreneur and startup mentor. He has a MPhil in computer science, and is a Microsoft MVP award recipient. He is a lifetime member of the Computer Society of India (CSI), an advisory member and senior mentor of IndiaMentor, certified as a Scrum trainer/coach, ITIL-F certified, and PRINCE-F and PRINCE-P certified. He is an open source developer, and a contributor to the Microsoft TechNet community. Recently, he was awarded the Icon of the Year for Excellence in Mentoring Technology Startups for the 2018-19 by Radio City, which is a Jagran Initiative, for his extraordinary work during his career of 22 years in the industry and the field of technology mentoring.ED PRICE is Senior Program Manager in Engineering at Microsoft, with an MBA in technology management. He ran Microsoft customer feedback programs for Azure Development and Visual Studio. He also was a technical writer at Microsoft for six years, helped lead TechNet Wiki, and now leads efforts to publish key guidance from AzureCAT (Customer Advisory Team).CHAPTER 1: Building Solutions in the Azure CloudCHAPTER GOAL: The first chapter will introduce the reader to the many facets of Microsoft Azure, why and how building for the cloud differs from on-prem development, and the need for a comprehensive strategy to debugging and profiling in Azure.We will cover the major types of blades (FaaS, SaaS, PaaS, IaaS).NO OF PAGES: 20SUB -TOPICS1. Microsoft Azure overview2. FaaS (Functions as a Service/Code as a Service) – a tour of Azure Functions and Logic Apps3. SaaS (Software as a Service) – Web Apps, Office3654. PaaS (Platform as a Service) – Cloud Services5. IaaS (Infrastructure as a Service) – Virtual Machines, SQL ServerChapter 2: The Azure PortalCHAPTER GOAL: The different Azure blades have many common features. This chapter will explore the Azure portal and some of the common features. The dashboard will be explained and how different views can be created for different scenarios. The Favorites section, the Cost Management & Billing blade, support, and Cloud Shell will all be introduced. The goal of the chapter is to get the reader comfortable with navigating the portal and feeling less overwhelmed, especially if this is the first time they’ve used the portal.NO OF PAGES: 35SUB - TOPICS1. Azure portal – what is a blade?2. Dashboard3. Navigation – favorites, subscription filtering, and searching4. You’re not alone – help and support5. Cost management6. Cloud shellChapter 3: Services in the CloudCHAPTER GOAL: Using examples in Azure Functions and Logic Apps, this chapter will provide an example of building an Azure Function and calling it from a Logic App. The logging and debugging capabilities will be explored in the appropriate blades.NO OF PAGES: 25SUB - TOPICS1. What is serverless?2. Azure Functions* Logic Apps* Using tags for billing Chapter 4: Application Insights and Log AnalyticsCHAPTER GOAL: Using the example built in Chapter 2, we will apply Application Insights and use it to monitor the solution.NO OF PAGES: 20SUB - TOPICS:1. Application Insights overview2. Adding to Azure Functions3. Adding Log Analytics to a Logic AppChapter 5: Databases and StorageCHAPTER GOAL: Building upon chapters 1 and 2, persistent storage will be incorporated into the example. Different implementations will be explored, including Azure SQL Database, Azure Cosmos DB, and Azure Storage Tables.NO OF PAGES: 25SUB - TOPICS:1. Azure SQL Database2. Azure Cosmos DB3. Azure Storage TablesCHAPTER 6: Azure Web AppCHAPTER GOAL: An Azure Web App will now be added to the example, and we’ll expand on the Application Insights capabilities, including custom events.NO OF PAGES: 20SUB – TOPICS:1. Overview of the Web App (functional)2. App Service blade overview – default and adding new graphs3. Diagnose and solve problemsChapter 7: Identity Security with Azure ADCHAPTER GOAL: Azure AD security will be added to the solution. OpenID will be used to secure the Azure Web App. The Logic App and Azure Function will be secured to only be accessible from the Web App (not directly to the user).NO OF PAGES: 20SUB – TOPICS:1. Overview of Azure AD2. Tracking user activity3. AD Connect Health4. AD reportingChapter 8: Continuous DeliveryCHAPTER GOAL: CI, CD will be covered. Capabilities of VSTS (covering Git, TFVC) will be shown, with the help of Build and Deployment. The chapter will focus on getting a better understanding of the state of a solution under change. What is currently deployed and where is it? How does VSTS and the Azure portal relate, and how can you get a complete view of the solution?NO OF PAGES: 25SUB – TOPICS:1. Introduction to VSTS2. Projects and dashboards3. Code – TFVC4. Code – Git5. Work, Wiki, Test – How these can be used to better understand the development process6. Build7. ReleaseChapter 9: External ToolingCHAPTER GOAL: Extend and automate CI, CD with the help of various build tools, viz. VSTS, TeamCity, and Cake bootstrapper.NO OF PAGES: 15SUB – TOPICS:1. Azure portal dashboard – widgets2. VSTS – pluginsChapter 10: Visualizing the Health of a SolutionCHAPTER GOAL: We cover troubleshooting in a production environment.NO OF PAGES: 18SUB – TOPICS:1. Remote combining reports for a complete picture2. Combining reports for a complete picture3. Disaster recovery and versioning of applications in a solution4. Enterprise reporting
Cybersecurity and Decision Makers
Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization. Marie de Freminville is a non-executive director and founding partner of Starboard Advisory. She is also a member of the IFA (French Institute of non-executive Directors), HEC Governance and Swiss Association of Women Directors. In addition, de Freminville is an expert in governance, financial performance, risk mapping and data protection.Foreword xiPreface xiiiIntroduction xviiCHAPTER 1. AN INCREASINGLY VULNERABLE WORLD 11.1. The context 11.1.1. Technological disruptions and globalization 11.1.2. Data at the heart of industrial productivity 31.1.3. Cyberspace, an area without boundaries 31.1.4. IT resources 41.2. Cybercrime 41.2.1. The concept of cybercrime 41.2.2. Five types of threats 61.2.3. Five types of attackers 91.3. The cybersecurity market 151.3.1. The size of the market and its evolution 151.3.2. The market by sector of activity 151.3.3. Types of purchases and investments 161.3.4. Geographical distribution 171.4. Cyber incidents 171.4.1. The facts 171.4.2. Testimonials versus silence 241.4.3. Trends 251.4.4. Examples 271.5. Examples of particularly exposed sectors of activity 301.5.1. Cinema 301.5.2. Banks 311.5.3. Health 341.5.4. Tourism and business hotels 351.5.5. Critical national infrastructure 361.6. Responsibilities of officers and directors 37CHAPTER 2. CORPORATE GOVERNANCE AND DIGITAL RESPONSIBILITY 392.1. Corporate governance and stakeholders 392.2. The shareholders 402.2.1. Valuation of the company 412.2.2. Cyber rating agencies 422.2.3. Insider trading 432.2.4. Activist shareholders 442.2.5. The stock exchange authorities 452.2.6. The annual report 452.3. The board of directors472.3.1. The facts 472.3.2. The four missions of the board of directors. 472.3.3. Civil and criminal liability 492.3.4. The board of directors and cybersecurity 502.3.5. The board of directors and data protection 532.3.6. The statutory auditors 542.3.7. The numerical responsibility of the board of directors 552.4. Customers and suppliers 562.5. Operational management 582.5.1. The impacts of digital transformation 582.5.2. The digital strategy 592.5.3. The consequences of poor digital performance 622.5.4. Cybersecurity 632.5.5. Merger and acquisition transactions 652.5.6. Governance and data protection, cybersecurity 66CHAPTER 3. RISK MAPPING 693.1. Cyber-risks 693.2. The context 713.3. Vulnerabilities 723.3.1. Fraud against the president 733.3.2. Supplier fraud 733.3.3. Other economic impacts 743.4. Legal risks 763.4.1. Class actions 763.4.2. Sanctions by the CNIL and the ICO 773.5. The objectives of risk mapping 783.6. The different methods of risk analysis 793.7. Risk assessment (identify) 813.7.1. The main actors 813.7.2. The steps 823.8. Protecting 833.9. Detecting 833.10. Reacting 843.11. Restoring 853.12. Decentralized mapping 853.12.1. The internal threat 853.12.2. Industrial risks 873.12.3. Suppliers, subcontractors and service providers 883.12.4. Connected objects 893.13. Insurance 943.14. Non-compliance risks and ethics 96CHAPTER 4. REGULATIONS 994.1. The context 994.1.1. Complaints filed with the CNIL 1004.1.2. Vectaury 1014.1.3. Optical Center 1024.1.4. Dailymotion 1034.2. The different international regulations (data protection) 1034.2.1. The United States 1044.2.2. China 1044.2.3. Asia 1054.2.4. Europe 1054.3. Cybersecurity regulations, the NIS Directive 1054.4. Sectoral regulations 1064.4.1. The banking industry 1064.4.2. Health 1084.5. The General Data Protection Regulation (GDPR) 1094.5.1. The foundations 1104.5.2. Definition of personal data 1104.5.3. The so-called “sensitive” data 1114.5.4. The principles of the GDPR 1124.5.5. The five actions to be in compliance with the GDPR 1134.5.6. The processing register 1134.5.7. The five actions to be carried out 1134.5.8. Cookies 1164.6. Consequences for the company and the board of directors 117CHAPTER 5. BEST PRACTICES OF THE BOARD OF DIRECTORS 1195.1. Digital skills 1205.2. Situational awareness 1215.2.1. The main issues 1215.2.2. Insurance 1255.3. Internal governance 1265.3.1. The CISO 1265.3.2. The CISO and the company 1275.3.3. Clarifying responsibilities 1315.3.4. Streamlining the supplier portfolio 1335.3.5. Security policies and procedures 1345.3.6. The human being 1375.4. Data protection 1385.4.1. Emails 1395.4.2. The tools 1415.4.3. Double authentication: better, but not 100% reliable 1425.5. Choosing your service providers 1425.6. The budget 1435.7. Cyberculture 1445.8. The dashboard for officers and directors 145CHAPTER 6. RESILIENCE AND CRISIS MANAGEMENT 1476.1. How to ensure resilience? 1476.2. Definition of a CERT 1496.3. Definition of a SOC 1496.4. The role of ENISA 1506.5. The business continuity plan 1506.6. Crisis management 1516.6.1. The preparation 1516.6.2. Exiting the state of sideration 1526.6.3. Ensuring business continuity 1536.6.4. Story of the TV5 Monde attack 1546.6.5. Management of the first few hours 1596.7. Crisis simulation 163Conclusion. The Digital Committee 165APPENDICES 167Appendix 1. Cybersecurity Dashboard 169Appendix 2. Ensuring Cybersecurity in Practice and on a Daily Basis 173Appendix 3. Tools to Identify, Protect, Detect, Train, React and Restore 175Glossary 179References 183Index 187
Das Internet der Dinge und Künstliche Intelligenz als Game Changer
Das Internet der Dinge (IoT) und Künstliche Intelligenz (KI) bieten im Zuge der Digitalisierung große Chancen für innovative Geschäftsmodelle und Produktivitätssteigerungen von Unternehmen. Diese Chancen nutzen gegenwärtig vor allem die großen Digital-Champions und Startups. Umfassend und aktuell greifen die Autoren diese Herausforderung für etablierte Unternehmen auf. Zentrale These des Buches ist, dass diese digitalen Technologien die Spielregeln des Wettbewerbs grundlegend verändern und zu Game Changern werden. Die Autoren belegen dies in vier Blöcken: Im ersten Teil erläutern sie wichtige Begriffe. Im zweiten Teil beschreiben Timothy Kaufmann und Hans-Gerd Servatius die Entwicklung zum neuen Management 4.0-Paradigma und dessen Bausteine. Der dritte Teil beschäftigt sich mit dem Wandel der Informations- und Kommunikationstechnik hin zu einer durch IoT- und KI-Technologien geprägten digitalen Architektur. Der abschließende vierte Teil skizziert die Bausteine einer Innovationspolitik 4.0 für den digitalen Wandel, die den Rahmen für Management- und Architektur-Innovationen liefert.Dank klarer Gliederung, anschaulicher Erläuterung der neuen Konzepte und zahlreicher Beispiele aus der Praxis ist das Buch eine wichtige Orientierungshilfe für alle, die nach erfolgreichen Wegen zu einem Management 4.0 und einer digitalen Architektur suchen.TIMOTHY KAUFMANN arbeitet bei SAP als Business Development Director für neue Technologien. Er ist Mitinitiator der Open Industry 4.0 Alliance.PROF. DR. HANS-GERD SERVATIUS ist geschäftsführender Gesellschafter des Innovationsspezialisten Competivation. Daneben lehrt er an der Universität Stuttgart und der RWTH Aachen. Er ist Autor mehrerer Bücher und zahlreicher Fachartikel.Digitale Technologien verändern den Wettbewerb.- Das neue Management 4.0-Paradigma.- Digitale Geschäftsmodelle gemeinsam mit IoT- und KI-Plattformpartnern.- Integration der Objectives and Key Results (OKR-) Methode in agile Strategie- und Innovationsprozesse.- Digitaler Wandel in einer evolutionären Organisation.- Produktivitätssteigerung mit Künstlicher Intelligenz.- Eine IT-Architektur 4.0 unterstützt IoT und KI.- IoT- und KI-Architekturen.- Datengetriebene Services und die Architektur 4.0.- Geschäftsprozesse und die Architektur 4.0.- Das Wertversprechen und die Architektur 4.0.- IoT- und KI-Innovationsökosysteme und die Architektur 4.0.- Auf dem Weg zu einer Innovationspolitik 4.0.
Mobile Security
Das Buch bietet eine fundierte Einführung in die Chronologie bekannter Angriffe und Verwundbarkeiten auf mobile Systeme und dessen konzeptionelle Einordnung der letzten zwei Dekaden. So erhält der Leser einen einmaligen Überblick über die Vielfältigkeit nachweisbar ausgenutzter Angriffsvektoren auf verschiedenste Komponenten mobiler drahtloser Geräte sowie den teilweise inhärent sicherheitskritischen Aktivitäten moderner mobiler OS. Eine für Laien wie Sicherheitsarchitekten gleichermaßen fesselnde Lektüre, die das Vertrauen in sichere mobile Systeme stark einschränken dürfte.DIRK WESTHOFF kann auf nunmehr 25 Jahre Erfahrung im Bereich der IT-Sicherheit verweisen. Sowohl als Chief-Researcher innerhalb der Europäischen Forschungseinrichtung eines weltweit agierenden Elektronikkonzerns, als auch als Professor für Informationssicherheit an verschiedenen Hochschulen. Er ist Mitautor einer Reihe von Patenten sowie von ca. 90 Veröffentlichungen auf dem Gebiet der IT-Sicherheit.Verwundbarkeit von 802.15.4: PiP-Injektion.- Verwundbarkeit von WLAN: KRACK-Angriff auf WPA2.- Verwundbarkeit von Bluetooth: Blueborne und Co..-Verwundbarkeiten von NFC und durch NFC.- Angriffe über das Baseband.- Android Sicherheitsarchitektur.- Horizontale Rechteausweitung.-Techniken zu Obfuskierung und De-Obfuskierung von Apps.- Apps mit erhöhten Sicherheitsbedarf: Banking App.- Positionsbestimmung durch Swarm-Mapping.- Seitenkanäle zur Überwindung des ‚Air-gap‘.- Ausblick: 5G Sicherheitsarchitektur.- .
Introducing the HTML5 Web Speech API
Leverage the power of HTML5 Web Speech API to quickly add voice capabilities to your websites. This project-oriented book simplifies the process of setting up and manipulating the API in the browser using little more than a text editor or free software.You'll be presented with a starting toolset that you can use to develop future projects, incorporate into your existing workflow and allow you to take your websites to the next level, reducing the reliance on entering choices through a keyboard and making the overall experience easier for customers.This excellent resource is perfect for getting acquainted with creating and manipulating browser-based APIs. You don’t have to convert your whole work process immediately; you can incorporate as little or as much as you want of the API, and build on this as your skills develop. We live in an age where speed and simplicity are of the essence – this book provides a perfect way to add speech capabilities to our websites, directly in the browser and with the minimum of fuss.Introducing the HTML5 Web Speech API is the right choice for developers who want to focus on simplicity to produce properly optimized content in modern browsers using tools already in their possession.WHAT YOU'LL LEARN* Implement the Web Speech API in a project* Explore some of the options for personalizing them for a project* Gain an appreciation of pointers around user experience and how this affects the API* Understand how to manage issues and security when using the API* Work through some example projects, from standalone demos to implementing with other tools or librariesWHO THIS BOOK IS FORWebsite developers who are already familiar with JavaScript, and are keen to learn how to leverage the Web Speech API to quickly add voice-enabled capabilities to a website, using little more than a text editor. It’s ideal for those in agile development teams, where time is of the essence, and the pressure is on to deliver results quickly.ALEX LIBBY is a front end engineer and seasoned computer book author, who hails from England. His passion for all things Open Source dates back to the days of his degree studies, where he first came across web development, and has been hooked ever since. His daily work involves extensive use of JavaScript, HTML and CSS to manipulate existing website content; Alex enjoys tinkering with different open source libraries to see how they work. He has spent a stint maintaining the jQuery Tools library, and enjoys writing about Open Source technologies, principally for front end UI development.1. Getting Started2. Exploring the APIs in More Detail3. Supporting Mobile Devices4. Combining the APIs- Building a ChatBot5. Project- Leaving Review Feedback6. Project- Building Alexa7. Project- Finding a Restaurant8. Project- Finding and Playing Music9. Project- Automating the Purchase ProcessAppendix: API Reference
Der PC als Medienzentrale
Dieses Buch ist ein Kompendium für die Nutzung eines PCs als Medienzentrale. Für verschiedene Betriebssysteme werden Schritt-für-Schritt-Anleitungen zur Verfügung gestellt, die dem Leser zeigen, wie eine Medienzentrale aufgebaut werden kann. Dies beinhaltet u.a. die Themen Multimedia und Fernsehen, produktive Tools, Server, Datenbanken und Spiele.RÜDIGER FOLLMANN studierte Elektrotechnik an der RWTH Aachen. 1995 begann er seine Arbeit als wissenschaftlicher Mitarbeiter im Bereich Messtechnik bei der IMST GmbH - einem Design- und Entwicklungshaus für elektronische Komponenten. Nach seiner Promotion leitete er hier zunächst das Team MMIC-Design, welches sich mit der Entwicklung von GaAs-und SiGe-Schaltungen beschäftigt. Anschließend war er als Teamleiter 'HF-Komponenten' für den Ausbau des Schaltungs-Design-Bereichs verantwortlich.Heute ist Follmann in seiner Funktion als 'Vice President' für die Akquisition von Großprojekten, technische Beratung sowie die Durchführung internationaler Seminare zuständig.Auswahl eines PCs und Zusammenstellen der Komponenten nach Bedarf.-Installation von MacOS (Hackintosh) und Praxistest (iMovie, Fortnite).-Installation und Konfiguration von Ubuntu (Triple Boot mit MacOS und Windows, …).-Netzwerke und Funktionen (SAMBA, Drucken, …).-Spiele und Emulatoren (Wii U, Switch, N64, …).-LINUX nutzen (Programme, Quelltexte, Grundlagen, …).-Fernsehen und Videos (VDR, Kodi, Amazon Prime, Ambilight, …).-Server und Datenbanken (Webseiten, CMS, Philips Hue, DLNA, …).-Textverarbeitung im Vergleich (Office Tools, LaTeX, Microsoft-Programme unter LINUX, …).
eLearning und Mobile Learning - Konzept und Drehbuch
In dem Praxishandbuch beschreibt die Autorin, wie ein Drehbuch nach lernpsychologischen und didaktischen Kriterien erstellt werden kann. Sie stellt Werkzeuge für das Konzipieren und Schreiben vor und evaluiert sie. Das Buch und die begleitende Website bieten zahlreiche Hilfsmittel: u. a. eine Checkliste zur Prüfung des fertigen Drehbuchs und eine Qualitätssicherungsmaßnahme, die Zeit und Kosten spart. Die Neuauflage wurde durchgehend aktualisiert. Für Projektleiter in Multimediaagenturen, Fachleute in Unternehmen sowie (zukünftige) Drehbuchautoren.DANIELA MODLINGER M.A. ist seit 1990 in der Verlags- und Multimedia-Branche tätig. Seit dem Jahr 2000 arbeitet sie als Medienautorin und Beraterin für eLearning-Anwendungen im institutionellen und betrieblichen Bildungswesen und bietet außerdem Inhouse-Schulungen zum Thema „Konzeption und Drehbuchschreiben für eLearning und Mobile Learning“ an. Ihre reiche Praxiserfahrung aus zahlreichen Projekten und ihrer weiterhin aktiven Unterrichtstätigkeit ist in dieses Buch eingeflossen.Wie kommt das Drehbuch vom Film zum eLearning - Wer bezieht Stellung bei der Produktion von eLearning - Briefing – welche Inhalte sollen ins Drehbuch? - Konzeption – wie kommt Struktur in die Inhalte? - Was macht ein gutes eLearning-Drehbuch aus? - Mobile Learning – Konzept und Drehbuch - Wie organisiere ich die Arbeit am Drehbuch? - Woran erkenne ich einen guten Medienautor? - Weiterführende Informationen - Checklisten - Glossar