Computer und IT
Record Weather Data with Arduino and Solar Power
Make a stand-alone weather data recorder to collect air pressure, air temperature, and humidity data using only an Arduino, SD-card, LCD display, and solar power. Start with that base data. Then easily extend your project to include more such as an XBee radio and sensors for air quality and radiation. Chunyin has years of experience as a researcher in meteorology and oceanography. The projects in this book are based on actual deployable weather data recorders used for collegiate and professional applications. These weather recorders were deployed over coastal water and lands including the Arctic. And you can deploy your own finished model in your backyard, school yard, roof top, or even in the field to collect data at programmed intervals.Don’t worry about powering all that tech. You’ll learn about solar controller, solar panels, and step-down DC transformers. You’ll also make a 30-60 W solor powered battery charger for a 12-VDC battery. Find out whathappens when you combine a simple Arduino with sensors one at a time toward a final model capable of multiple measurements and a longlife of use without recharging or requiring external power. Then add a GPS module so that you constantly have accurate time and position information to pair with your data.Everything you need to know to integrate component and house them in an enclosure is covered. Photos of actual working units are provided, showing you exactly what your data collection station can look like. You’ll even go a step beyond to understanding meteorology information and how to use the collected data, as well as some data analysis. Build a station capable of real meteorological research and then go beyond to add more sensors and capabilities for your own projects and experiments!WHAT YOU'LL LEARN* Measure air pressure, temperature, humidity and more!* Add an XBee radio and LCD display to a data recording project for interactivity and communication* Work with basic meteorological principles to understand how your data can be usedWHO THIS BOOK IS FORMeteorological hobbyists, Makers, and students interested in learning how to collect and analyze data with low-cost hardware.CHUNYAN LI is a professor teaching in oceanography and meteorology at Louisiana State University. He has made dozens of weather recorder units powered by battery or solar panels for research projects and student projects. He has published more than 120 scientific research papers, coauthored a book titled Meteorology for Coastal Scientists and authored another book titled Time Series Analysis for Oceanography. He is also the director of an offshore meteorology oceanography observation system for weather, wave, tide, currents, and storm surges. His research includes theories of coastal and estuarine dynamics under the influence of tide, river, and weather, as well as impacts of climate change to the Arctic coastal ocean.Chapter 1: Introduction.- Chapter 2: Working with Solar Power.- Chapter 3: Micro-Controller and Software.- Chapter 4: Working with GPS.- Chapter 5: Display Information Using LCD.- Chapter 6: Save the Data to a SD-Card.- Chapter 7: Adding Air Pressure and Humidity Sesnors.- Chapter 8: Integration.- Chapter 9: Optional Components.
CompTIA A+ Certification Companion
This book covers all topics and requirements of the CompTIA A+ certification exam. It will allow readers to easily understand the concepts, information, and skills needed to obtain the associated certification.CompTIA A+ certification is at its core an entry-level certification to the information technology world, including cybersecurity. It is comprised of a set of two exams (Exams 220-1101 & 220-1102) created by IT industry professionals that validate skills needed for entry-level IT jobs, including cybersecurity. This certification stands as baseline proof of knowledge of these topics and is largely sought by recruiters.Main exam topics include hardware, networking, mobile devices, security, Windows operating system, other IOS technologies, software troubleshooting and operations procedures. This book has been designed to follow the core requirements for the full scope of the CompTIA A+ certification, covering both examination test requirements. It has been formatted to follow a logical and easy to follow order to allow a foundational level of understanding prior to moving onto more advanced topics.The book will provide all readers with the appropriate knowledge and information to have a foundational level of many Information Technology components. It will primarily serve the newer entrants to the field but will also support more experienced individuals that are looking towards certifications.WHAT YOU WILL LEARN:* Effective communication with clients and colleagues and interpersonal skills for collaboration in team environments.* Understanding of motherboard components and architecture.* Knowledge of CPU types and socket compatibility.* Installation and configuration of operating systems.* Software troubleshooting techniques.* Installation and configuration of Windows, Linux, and macOS.* Management of system settings and user accounts.* Identification of laptop components and peripherals.* Maintenance procedures for laptops, including cleaning and battery management.* Configuration of mobile device settings and preferences.* Understanding of mobile operating systems and app installation procedures.* Troubleshooting common printer hardware and software issues.* Basic networking concepts, including IP addressing and subnetting.* Configuration of network devices such as routers and switches.* Configuration and management of wireless access points.* Implementation of wireless security protocols such as WPA2 and WPA3.* Understanding of cloud service models (IaaS, PaaS, SaaS).* Deployment and management of virtual machines in the cloud.* Recognition of common security threats and vulnerabilities.* Implementation of security best practices for data protection.WHO THIS BOOK IS FOR:Anyone that is looking to get into the information technology or cybersecurity fields. This would also include academics looking to pursue bachelor’s or master’s degrees, as often programs include the A+ certification. There is no necessary prior skill experience or knowledge needed.Kodi Cochran is highly invested in the field of cybersecurity, something he has followed as a hobbyist for the past decade and expanded to make it his field of study and work. He has a Bachelors and Masters in Cybersecurity and Information Assurance, in addition to working as an Information Systems Manager for the Networking and Infrastructure team of the Department of Human and Health Resources under the agency of the Office of Management of Information Services at the state of West Virginia.He’s responsible for networking administration, project management, system support, and site support for the state of West Virginia in all state-owned health care facilities, hospitals, and labs. In addition, Kodi holds the following certifications: CompTIA A+, Network+, Security+, Project+, CySA+, and Pentest+. He’s currently working on the CompTIA CASP+.Chapter 1: Introduction and Purpose.- Chapter 2: Laptops.- Chapter 3: Networking.- Chapter 4: Wi-Fi.- Chapter 5: Cloud Computing.- Chapter 6: Mobile Devices.- Chapter 7: Printers.- Chapter 8: Hardware.- Chapter 9: Operating Systems.- Chapter 10: Software and Software Support.- Chapter 11: Security.
OKR wirkungsvoll einführen und nutzen
OKR wirkungsvoll einführen und nutzenUnternehmen aller Größen und Branchen kämpfen mit der Umsetzung ihrer strategischen Pläne. Es fehlt an Koordination, Fokus und Entscheidungsfähigkeit. Prozesse und Tagesgeschäft dominieren, die Strategie bleibt ein Mythos. OKR (Objectives and Key Results) und das OKR-Framework ermöglichen strategiekonformes Handeln auf allen Unternehmensebenen.Dieses Buch gibt eine fundierte, praxisorientierte Einführung in die Grundlagen, die Bausteine der Methode und deren Zusammenspiel sowie in die Arbeit mit OKR. Dabei wird auf eine Vielzahl organisatorischer und kultureller Besonderheiten eingegangen und wie OKR diese unterstützen kann.Das Buch gliedert sich in drei Teile: − Im ersten Teil wird das Was und Warum von OKR erläutert, die wichtigsten Begriffe und Zusammenhänge erklärt und der grundsätzliche Ablauf eines OKR-Zyklus dargestellt.− Der zweite Teil beschreibt die Objectives und die Key Results – die beiden zentralen Bestandteile von OKR – im Detail und zeigt, wie Objectives entwickelt und Key Results dazu gestaltet werden.− Im dritten Teil schließlich geht es um die Einführung und Anwendung von OKR. Du wirst mitgenommen auf eine Reise von den ersten Schritten über den zweiten OKR-Zyklus bis hin zum Zyklusende. Das Buch richtet sich an Führungskräfte, Organisationsentwickler und Coaches, die ihre Organisation strategisch weiterentwickeln wollen, und bietet eine umfassende Hilfestellung, um mit OKR zu arbeiten und die Herausforderungen bei der Umsetzung im Kleinen wie im Großen zu meistern.
Das Spinnennetz
CYBER-RISIKEN stehen in Deutschland und weltweit mit Abstand an der Spitze sämtlicher Geschäftsrisiken.Die regulatorischen Vorschriften, wie die NIS-2, nehmen von Jahr zu Jahr zu. Auf dem Weg zu einer starken Cyber-Resilienz machen die Haltung und Handlungen des Top-Management den Unterschied. Wie Ihnen das gelingen kann, beschreibt Kevin Palinkas in einem fesselnden Krimi. DAS SPINNENNETZ VERPACKT ESSENZIELLES WISSEN IN DEN ERSTEN, SPANNENDEN BUSINESSROMAN ZUR CYBER-RESILIENZ UND DIGITALEN VERTEIDIGUNG.SIE SIND UNTERNEHMER, GESCHÄFTSFÜHRER, IT-VERANTWORTLICH ODER IT-SPEZIALIST IN EINEM KLEINEN ODER MITTLEREN UNTERNEHMEN?In diesem Businessroman finden Sie ganzheitliche Antworten auf die brennenden Fragen der Cyber-Resilienz und Strategien zur digitalen Verteidigung: vom Grundlagenwissen, über die persönliche Haltung, bis hin zu konkret umsetzbaren Schritten.»Ihr habt es in der Hand, ob sich ein Hacker bei euch wohlfühlt und bleibt. Oder ob er wieder umdreht und geht!«- Robin im BusinessromanLERNEN, WIE EIN HACKER ZU DENKEN:Der Krimi beginnt aus der Perspektive des Angreifers: Der Spinne. Sie ist verantwortlich für eine kriminelle, »mittelständische« Hacker-Organisation aus dem Osten. Aus deren Sicht lernen Sie wie ein Hacker zu denken und das Geschäftsmodell der organisierten, digitalen Kriminalität zu verstehen. Am Ende gelingt es der Spinne die Cyber-Infrastruktur der NovumSpace lahmzulegen.DER WIEDERAUFBAU:Jens ist IT-Manager bei der NovumSpace und steht nach dem Angriff vor der Aufgabe den Wiederaufbau der IT zu koordinieren. Bei dieser emotionalen Achter-bahnfahrt unterstützt ihn sein befreundeter IT-Manager Max. Dort kommen die Beiden mit Robin in Kontakt.RESILIENZ UND VERTEIDIGUNG:Max ist von dem Angriff bei der NovumSpace zutiefst beeindruckt. Max ist CIO bei der ME Light und erneuert zusammen mit Robin die Cyber-Resilienz der ME Light systematisch und proaktiv.Die Mission von Kevin Palinkas ist es mit innovativer Technik für Cyber-Resilienz zu sorgen und damit zum Gemeinwohl beizutragen. Mit palinkas.digital veredelt er langfristig den Reifegrad der Cyber-Resilienz des tech-orientierten Mittelstands. Kevin Palinkas ist seit 2008 beruflich in der IT zu Hause. Seit 2015 war er im IT-Management tätig. Zuletzt als CIO. Der Schwerpunkt Sicherheit schlägt die Brücke zu seiner ehrenamtlichen Tätigkeit: Dort ist er Gruppenführer der Freiwilligen Feuerwehr.
Evolve from Infrastructure to Innovation with SAP on AWS
The world of SAP is undergoing a major transformation, with many customers either planning or actively modernizing their SAP landscapes as part of the S/4HANA digital transformation. Given the extensive SAP transformation efforts adopted by nearly all SAP customers in recent years and the profound impact these digital changes have had on their business models and IT organizations, the authors decided to write this book. As customers embark on their SAP on AWS journey, they face three main challenges: deciding on the overall strategy, selecting the right business use cases and implementing them effectively. This book aims to address these challenges by guiding readers through the process of identifying and executing the appropriate use cases. It will highlight how customers can harness AWS services beyond merely hosting their SAP systems on AWS, demonstrating the potential of these services to drive innovation. This book covers the entire journey, from defining strategy and identifying business use cases to their implementation, providing practical tips, strategies, and insights. It serves as an essential guide for customers planning to migrate or those who have already migrated their SAP workloads to AWS, helping them explore beyond just the infrastructure aspects of their journey.YOU WILL :* Discover how to go beyond just hosting SAP systems on AWS, using the full range of AWS services to innovate and extend your SAP applications.* Learn how to identify the right business use cases and implement them effectively, with practical examples and real-world scenarios.* Develop the mindset and skills needed to architect modern, cloud-native, event-driven architectures, balancing trade-offs between simplicity, efficiency, and cost.THIS BOOK IS FOR: Business leaders, IT professionals, and SAP specialists who are looking to modernize their SAP landscapes by leveraging AWS servicesBIDWAN BARUAH brings 18 years of IT experience as a cloud architect and technology advisor. He has led various implementation, upgrade and migration projects of SAP solutions for customers across the globe. He has also been an SAP customer and, as the SAP architect, led the successful execution of a large-scale SAP digital transformation project for a leading organization. Currently serving as a Senior Solutions Architect at Amazon Web Services (AWS), Bidwan specializes in guiding enterprises through the complexities of cloud migration and digital transformation, particularly in integrating SAP environments with AWS services. In this role, he has assisted several Fortune 100 and other leading enterprises in North America with migrating and modernizing their SAP workloads on AWS, making him a sought-after advisor for leveraging cloud technologies to drive business innovation. Bidwan is passionate about educating and empowering professionals, sharing his insights through speaking engagements, technical blogs, and this comprehensive guide on modernizing SAP with AWS.KRISHNAKUMAR RAMADOSS is a distinguished IT professional and Senior SAP Innovation Solutions Architect at Amazon Web Services (AWS). With over two decades of experience in the technology sector, he has been pivotal in helping global enterprises transition to cloud environments, focusing on SAP migrations and building cloud-native solutions. His deep expertise in cloud infrastructure, data analytics, and enterprise software integration has made him a leader in driving technological innovation and operational excellence. Krishnakumar focuses on building innovative solutions through an “extend” strategy that enables customers to develop advanced capabilities on top of their SAP migrations. These capabilities span various domains, including data analytics, artificial intelligence/machine learning, applications and integration, and the Internet of Things (IoT). Through these cutting-edge solutions, he empowers organizations to unlock new levels of efficiency, scalability, and competitive advantage. Krishnakumar played a pivotal role in developing a critical low-code data integration service. It enabled enterprises across different verticals like manufacturing, automotive, biotech, aerospace, and retail to build scalable SAP data lakes on AWS and derive value from their mission-critical data. He also contributed to developing AWS Supply Chain, a cloud-based service that unifies data and provides ML-powered actionable insights. This application helps customers improve supply lead times, better forecast demand, and reduce their carbon footprint. Known for his strategic insights and practical approach, Krishnakumar is committed to mentoring IT leaders and sharing his expertise through industry conferences and webinars. In this authoritative book, he provides insights on leveraging AWS to modernize SAP systems, pushing the boundaries of what’s possible in cloud computing, and driving innovation in a rapidly evolving digital landscape.ABARAJITH VIVEKANANDHA is a seasoned cloud architect and IT strategist with extensive expertise in SAP on AWS solutions. As a Senior Solutions Architect at Amazon Web Services (AWS), he has been instrumental in guiding numerous organizations including Fortune 500 companies through their cloud migration journeys, optimizing their SAP landscapes for enhanced performance and agility. With a strong background in enterprise architecture, data management, and cloud-native technologies, Abarajith is passionate about driving digital transformation and innovation. He is a sought-after speaker at industry events and an advocate for best practices in cloud adoption, dedicated to empowering businesses to achieve their strategic objectives through cutting-edge technology solutions.Chapter 1: Introduction: Why evolve from Infrastructure to Innovation with SAP on AWS?.- Chapter 2: Fundamentals of Modern Architectures.- Chapter 3: Modern Data Strategy.- Chapter 4: Extending SAP Business Processes.- Chapter 5: Smart Factory.- Chapter 6: Business Transformation with AI/ML.- Chapter 7: DevOps and SysOps for SAP.- Chapter 8: How to get started?.
Fostering Open Source Culture
Open source accounts for approximately 90 percent of modern software development, yet the demand for such technology skills continues to grow. Consequently, companies are having a difficult time hiring the right talent. Based on author Arun Gupta’s experiences with leading companies such as Apple, Amazon, Sun Microsystems, and Intel this book highlights the importance of an open source culture and shares proven techniques by which one can be built and nurtured.Many open source code maintainers feel there is a need for an open source culture in their company so that business needs can be met more efficiently. This book explains why it is important to have a business alignment with open source and the purpose of an Open Source Program Office. It will explain the value of InnerSource, internal events and leveraging external open source communities in building an active workplace culture._Fostering Open Source Culture_ is packed with over 40 industry case studies and actionable steps organizations, both large and small, can take to have a fully functioning open source work culture.WHAT YOU WILL LEARN* Understand the key principles of open source and the benefits of FOSS software* Examine proven techniques that can be used to foster an open source culture within an enterprise and is directly tied to your business objectives* Review exclusive case studies from a wide range of enterprises on how they foster open source cultureWHO THIS BOOK IS FORSenior tech leaders and executives (CTOs, CIOs, CISOs), legal teams, HR personnel, marketing executives, and sales teams who want to know how open source can be used across the company to innovate faster and improve security of products.ARUN GUPTA is vice president and general manager of Open Ecosystem Initiatives at Intel. He has been an open source strategist, advocate, and practitioner for over two decades. He has taken companies such as Apple, Amazon, and Sun Microsystems through systemic changes to embrace open source principles, contribute and collaborate effectively in open source. As two-time elected chair of the Cloud Native Computing Foundation (CNCF) Governing Board, Arun works with CNCF leadership and member companies to grow the cloud native ecosystem.He is also the elected Governing Board Chair of the Open Source Security Foundation (OpenSSF) focused on securing the open source software ecosystem. He also participates on the Linux Foundation Governing Board. Arun has delivered technical talks in 50+ countries, authored multiple books published by McGraw Hill and O'Reilly, and is a Docker Captain, Java Champion, and Java User Group leader. He is a fitness and kindness enthusiast, practices mindfulness, and is passionate about promoting technology education among children.1:The Importance of Open Source.- 2: Business Alignment.- 3: The Open Source Program Office.- 4: Internal Events.- 5: Inner Source.- 6: External Communities.- 7. Employee Enablement.- Appendix A: What is Open Source Software?.- Appendix B: 10 Non-Code Ways to Contribute to Open Source.
Guidebook für Software Engineers
Guidebook für Software EngineersDas Guidebook für Software Engineers aller Karriere-Level, die einen guten Job machen und Erfolg haben wollenVom Autor von »The Pragmatic Engineer Newsletter«, dem meistgelesenen Technologie-Newsletter auf Substack.Beschreibt die typischen Karrierestufen vom Softwareentwickler über Positionen eines Senior oder Lead bis hin zum Staff, Principle oder Distinguished Level (Achtung: die Jobtitel variieren von Unternehmen zu Unternehmen).Deckt Softskill-Themen, technische Konzepte, aber auch Fragen zu Selbstmanagement und Produktivität ab.Interessante Branchen-Insights des Autors, der exzellent vernetzt ist und bei Uber, Skyscanner, Microsoft, Skype und JP Morgan gearbeitet hat.Software-Engineers sollten ihre berufliche Entwicklung unbedingt selbst in die Hand nehmen – eine Erkenntnis, die Gergely Orosz schon zu Beginn seiner Karriere gewonnen hat. In diesem Buch unterstützt er Software-Engineers bei ihrer Karriereplanung und teilt seine Erfahrungen und tiefgehenden Branchenkenntnisse. Das Guidebook orientiert sich dabei am »typischen« Karriereweg eines Software-Engineers: vom Junior-Entwickler über die Rolle des Senior-Engineers mit Vorbildfunktion bis hin zu Führungspositionen wie Staff-Engineer oder Principal-Engineer. Gergely Orosz beschreibt, welche Schlüsselkompetenzen unverzichtbar sind, und gibt zahlreiche Impulse und Anregungen.Das Buch erläutert u.a.:Grundlagen der EntwicklerkarriereTypische Karrierepfade, die eigene Karriere steuern, Leistungsbeurteilungen, Beförderungen, JobwechselDer kompetente SoftwareentwicklerDinge anpacken, die eigenen Programmierfähigkeiten vertiefen und hochwertigen Code schreiben, die Werkzeuge produktiver Entwickler*innenDer vielseitige Senior-EngineerAufgaben erfolgreich abschließen, durch Code-Reviews und Mentoring besser zusammenarbeiten, technische Schulden abbauen, eine hohe Testabdeckung sicherstellen, tragfähige Architekturentscheidungen treffenDer pragmatische Tech-LeadZiele, Phasen und Risiken beim Managen von Projekten, Software für den Produktivbetrieb bereitstellen, Stakeholder-Management betreiben, Fokus und Dynamik eines Teams verbessernStaff- und Principal-Engineers mit VorbildfunktionDurch KPIs und OKRs das Geschäft verstehen, hilfreiche Engineering-Prozesse etablieren, geschäftliche Ziele durch zukunftsfähige IT-Lösungen unterstützen
Migrating ASP.NET Microservices to ASP.NET Core 8
In this second edition, you will be guided through the journey of migrating an ASP.NET Framework application to ASP.NET Core microservices. You will know how to master the following steps: Conduct an inventory, prepare the application, plan the migration, execute the migration, improve the deployment pipeline.For the detailed hands-on migration, the book uses a streamlined business application, derived from a real-world application that underwent the migration process a few years ago. In this second edition, the application has evolved to include more features relevant to the latest advancements in ASP.NET Core, such as minimal web APIs, Razor Pages, REST documentation, and enhanced authentication. The book also delves into the nuances of upgrading between ASP.NET Core versions, managing breaking changes, and incorporating significant new features.New in This Edition* Enhanced sample application now showcases the application of gRPC, Minimal APIs, and OpenAI, reflecting the latest in ASP.NET Core technology* Dedicated section focuses on upgrading ASP.NET Core applications, addressing both the challenges posed by breaking changes and the introduction of new features* Deployment and CI/CD pipeline section has been expanded to include a minor section covering GitHub Actions, Docker containers, and other significant deployment improvements* Maintenance chapter has been updated with a section on the ASP.NET Core release and support cycles, as well as an enhanced resources section now featuring AI developer toolsWHAT YOU WILL LEARN* Effectively plan and execute a migration: Conduct an in-depth analysis, inventory and cleanup, decoupling logic, and break out new services, all while adhering to best practices such as the handler pattern, dependency injection, and more* Use key ASP.NET Core features such as minimal Web API, Razor Pages, gRPC, and built-in authentication improvements* Know other important features such as SignalR, EF Core, ASP.NET Core testing library for integration tests, Blazor and moreWHO THIS BOOK IS FORSoftware developers, IT professionals, and system architects who are looking to transition their applications to ASP.NET Core; serves as a fundamental resource for those keen on modernizing their development practices and staying current with ASP.NET CoreIRIS CLASSON is a force of nature. Her unique and engaging methods of teaching complex topics have garnered her considerable respect from the developer community and significant media attention—Channel 9, Hanselminutes, Computer Sweden, and Developer Magazine, to name a few. A Microsoft MVP with multiple certifications, Iris is currently an app developer at Plejd, a leading Nordic supplier of smart lighting solutions.Iris is also a prolific author, having written over a dozen books. She continues to inspire and educate through her popular blog, YouTube videos, and social media channels, including X (formerly known as Twitter) (@IrisClasson). A frequent speaker at conferences such as TechDays and NDC, Iris is deeply committed to sharing knowledge with the global developer community.Chapter 1: The Evolution of ASP.NET Core.- Chapter 2: Case In Study: Konstrukt SaaS System.- Chapter 3: Analysis and Inventory.- Chapter 4: Planning the Architecture.- Chapter 5: Migrating Part 1: In-place Migration.- Chapter 6: Migration Part 2: Incremental Migration.- Chapter 7: Migration Part 3: Cleaning Up.- Chapter 8: Upgrading the Deployment Pipeline.- Chapter 9: Navigating ASP.NET Core Upgrades.- Chapter 10: Staying Up to Date.
Microsoft Copilot for Power Apps
This book is a comprehensive guide that aims to revolutionize how developers approach app creation using Microsoft PowerApps, with a special emphasis on harnessing Copilot, an AI-powered coding assistant. The book is an essential resource for both novice and experienced developers, offering an in-depth exploration of integrating artificial intelligence in app development.The integration of AI in app development, particularly through tools such as Copilot, is more relevant now than ever before due to the rapid evolution of technology and the increasing demand for efficient, innovative, and user-friendly applications. Copilot for PowerApps represents a significant advance in this direction, offering developers a unique combination of AI-powered efficiency and the versatility of PowerApps.WHAT YOU WILL LEARN* Understand complex AI concepts and AI-assisted development* Know how to use Copilot effectively and create sophisticated and reliable apps faster* Stay abreast of the latest tools and techniques so you remain competitive and relevant in the ever-changing landscape of app development* Benefit from case studies and real-world examples that demonstrate the practical application and benefits of using Copilot in PowerAppsWHO THIS BOOK IS FORAnyone interested in the intersection of AI and app development. It will not only educate but also inspire and prepare readers for the future of this dynamic field.REZWANUR RAHMAN the CEO and Managing Director of Backend Emerging Business Limited (Backend EBL), stands at the forefront of the tech world as an expert Cloud Solution Architect. His accolades include being a Microsoft MVP in Microsoft Copilot & Microsoft 365 Development and a Microsoft Certified Trainer (MCT), reflecting his deep-seated passion for innovation and software development.Chapter 1: Unveiling Copilot: A New Era in PowerApps.- Chapter 2: Embarking on the Copilot Journey.- Chapter 3: Mastering the Core: Copilot's Engine Room.- Chapter 4: Crafting PowerApps with Copilot: The Essentials.- Chapter 5: Elevating Your Craft: Intermediate Copilot Strategies.- Chapter 6: The Pinnacle of Copilot: Advanced AI Builder Techniques.- Chapter 7: Navigating the Demo: A Comprehensive Project.- Chapter 8: Visions of the Future: Copilot's Evolving Landscape.- Chapter 9: Copilot Success Stories: Lessons from the Field.- Chapter 10: Comprehensive Resources.
Generative AI, Cybersecurity, and Ethics
“Generative AI, Cybersecurity, and Ethics’ is an essential guide for students, providing clear explanations and practical insights into the integration of generative AI in cybersecurity. This book is a valuable resource for anyone looking to build a strong foundation in these interconnected fields.”—DR. PETER SANDBORN, Professor, Department of Mechanical Engineering, University of Maryland, College Park “Unchecked cyber-warfare made exponentially more disruptive by Generative AI is nightmare fuel for this and future generations. Dr. Islam plumbs the depth of Generative AI and ethics through the lens of a technology practitioner and recognized AI academician, energized by the moral conscience of an ethical man and a caring humanitarian. This book is a timely primer and required reading for all those concerned about accountability and establishing guardrails for the rapidly developing field of AI.”—DAVID PERE, (Retired Colonel, United States Marine Corps) CEO & President, Blue Force Cyber Inc. EQUIPS READERS WITH THE SKILLS AND INSIGHTS NECESSARY TO SUCCEED IN THE RAPIDLY EVOLVING LANDSCAPE OF GENERATIVE AI AND CYBER THREATSGenerative AI (GenAI) is driving unprecedented advances in threat detection, risk analysis, and response strategies. However, GenAI technologies such as ChatGPT and advanced deepfake creation also pose unique challenges. As GenAI continues to evolve, governments and private organizations around the world need to implement ethical and regulatory policies tailored to AI and cybersecurity. Generative AI, Cybersecurity, and Ethics provides concise yet thorough insights into the dual role artificial intelligence plays in both enabling and safeguarding against cyber threats. Presented in an engaging and approachable style, this timely book explores critical aspects of the intersection of AI and cybersecurity while emphasizing responsible development and application. Reader-friendly chapters explain the principles, advancements, and challenges of specific domains within AI, such as machine learning (ML), deep learning (DL), generative AI, data privacy and protection, the need for ethical and responsible human oversight in AI systems, and more. Incorporating numerous real-world examples and case studies that connect theoretical concepts with practical applications, Generative AI, Cybersecurity, and Ethics:* Explains the various types of cybersecurity and describes how GenAI concepts are implemented to safeguard data and systems* Highlights the ethical challenges encountered in cybersecurity and the importance of human intervention and judgment in GenAI* Describes key aspects of human-centric AI design, including purpose limitation, impact assessment, societal and cultural sensitivity, and interdisciplinary research* Covers the financial, legal, and regulatory implications of maintaining robust security measures* Discusses the future trajectory of GenAI and emerging challenges such as data privacy, consent, and accountabilityBlending theoretical explanations, practical illustrations, and industry perspectives, Generative AI, Cybersecurity, and Ethics is a must-read guide for professionals and policymakers, advanced undergraduate and graduate students, and AI enthusiasts interested in the subject. DR. RAY ISLAM (MOHAMMAD RUBYET ISLAM) has served as a Lecturer in Cyber Security at ACES Honors College, University of Maryland, College Park, and as an Adjunct Professor in Natural Language Processing at George Mason University. He has held strategic and leadership roles in Generative AI and Cyber Security at esteemed firms like Deloitte, Lockheed Martin, Booz Allen, Raytheon, and the American Institutes for Research. He has published numerous journal articles and papers on Artificial Intelligence and Generative AI and has presented at prestigious conferences. He actively contributes to the academic community as a reviewer for the journal Reliability Engineering & System Safety and serves as Associate Editor for the Journal of Prognostics and Health Management.
Beginning ChatGPT for Python
Unlock the future of software development and empower yourself to elevate your Python applications by harnessing the power of AI as this field continues to grow and evolve. Perfect for beginner to intermediate Python programmers, this book breaks down the essentials of using ChatGPT and OpenAI APIs.You'll start with the basics, learning to authenticate, send prompts, generate responses, test in the Playground, and handle errors with ease. Each chapter includes hands-on exercises that bring concepts to life, demonstrating different API functionalities and practical applications. You'll master models like GPT-4o, GPT-4, GPT-3.5, Whisper, and DALL-E, enabling you to enhance your applications with cutting-edge AI.Discover how generative AI tools like ChatGPT can automate tedious tasks rather than replace jobs. Leverage ChatGPT’s powerful Natural Language Processing (NLP) capabilities to handle various formats of unstructured text within your Python apps. Quickly see how easy it is to use ChatGPT as your AI-pair programmer, boosting your productivity and speed.This step-by-step guide will have you creating intelligent chatbots that can automatically process messages from Slack or Discord. With _Beginning ChatGPT for Python_, you'll master the ChatGPT and OpenAI APIs, building intelligent applications that offer a personalized and engaging user experience.WHAT YOU’LL LEARN* Connect with the ChatGPT and OpenAI APIs and send effective prompts.* Harness parameters like temperature and top_p to create unique and engaging responses from ChatGPT.* Create an intelligent assistant bot for Slack that automates tasks and enhances productivity.* Develop a bot that can moderate conversations and manage communities on Discord.* Add context to your prompts to get more accurate and relevant responses.WHO THIS BOOK IS FORPython developers and enthusiasts who aspire to employ OpenAI and ChatGPT in the creation of intelligent applications to enhance productivity.LYDIA EVELYN is a proficient technical writer and a skilled Python developer with a professional background in ChatGPT. She has effectively utilized ChatGPT, coupled with prompt engineering, in multiple client projects within the realm of technical publishing. Lydia boasts extensive programming expertise in both Python and Java.BRUCE HOPKINS is an accomplished author and technical writer. Bruce’s focus has been on pioneering research in natural language processing (NLP) and artificial intelligence (AI), particularly in the domain of speech and chatbot applications. He holds the distinguished title of an Intel Innovator for AI and IoT.Chapter 1: Introducing ChatGPT for Python Developers.- Chapter 2: Using ChatGPT as Your Pair-Programmer.- Chapter 3: Creating a Basic ChatGPT Client in Python.- Chapter 4: Using AI in the Enterprise! Creating a Text Summarizer for Slack Messages.- Chapter 5: Multimodal AI: Creating a Podcast Visualizer with Whisper and DALL·E 3.- Chapter 6: Creating an Automated Community Manager Bot with Discord and Python.- Chapter 7: Adding Intelligence to our Discord Bots, Part 1: Using the Chat Model for Q&A.- Chapter 8: Adding Intelligence to our Discord Bots, Part 2: Using the Chat and Moderation Models for Moderation.
Die Gouvernementalität von Algorithmen
„Die digitale Transformation ist eine Einbahnstraße in ein kybernetisches Zeitalter. Intelligente Maschinen nehmen den Menschen dort als steuernde Kraft allmählich das Zepter aus der Hand.“ Der Einzug prädiktiver Learning Analytics-Systeme in Schulen und Hochschulen könnte das Bildungswesen verändern und zur Transformation hochkomplexer gesellschaftlicher wie organisationaler Kontrolldynamiken der (Selbst-)Führung beitragen, die im konturierten Gegenstandsbereich noch wenig erforscht sind. Christina Berns rekonstruiert anhand der gouvernementalen Dispositivanalyse die produktiven, regulativen wie repressiven Dimensionen ubiquitärer, multimedialer, interaktiver und hyperkonnektiver Predictive Learning Analytics in der digitalisierten Studienberatung im Spannungsfeld zwischen Heteronomie und Autonomie aus machtanalytischer Perspektive. Die Analyse identifiziert Subjektivierungspraktiken und gesellschaftlich-politische wie ökonomisch-technische Rationalitäten, die einen Aufschluss über aktuelle technisch-mediale Lösungsversuche von Problemstellungen im Bildungswesen geben.
KI für Anwälte und Juristinnen
KI für Anwälte und Juristinnen von Marco Candinas ist Ihr Ratgeber für den praktischen Einsatz von Künstlicher Intelligenz im juristischen Alltag. Anhand konkreter Beispiele und praktischer Anleitungen zeigt Candinas, wie Sie KI-Tools wie ChatGPT und Microsoft Copilot effizient einsetzen, um Ihre Produktivität zu steigern und Routineaufgaben zu automatisieren. Ob es um das Erstellen von Verträgen, das Verfassen von Mandantenkorrespondenz und Klageschriften oder um das Vorbereiten von Gerichtsverhandlungen geht, dieses Buch vermittelt Ihnen das Wissen und die Werkzeuge, um die Vorteile von KI voll auszuschöpfen und Ihre juristische Arbeit auf die nächste Stufe zu heben. Perfekt für alle, die ihre juristische Praxis zukunftssicher machen wollen.Marco Candinas:Marco Candinas hat Rechtswissenschaften studiert. Nach Praktika in einer Anwaltskanzlei und bei der Strafjustiz erwarb er im Juni 2022 das Anwaltspatent. Er arbeitet als Gerichtsschreiber am Kantonsgericht Luzern. Daneben unterrichtet er Lerntechniken und Strafrecht und bietet Coaching für Masterarbeiten an. Zudem gibt er Webinare zum Thema KI. Sein Erfolgsrezept: Er arbeitet nach den Prinzipien und Methoden von Nobelpreisträger Richard Feynman.
Generative AI for Web Development
Explore the world of Generative AI and understand why it matters. This book is divided into two parts, introducing tools such as ChatGPT, DALL-E, and will show you how to use them to build AI-powered web apps.The first part of the book describes Generative AI and covers the essential models and APIs from OpenAI. Legal, ethical, and security considerations are discussed to help you decide whether it is an appropriate tool for your projects. You’ll then review ChatGPT and see how to use it effectively for generating code. This is followed by a review of best practices, and tips and techniques for getting around the limitations of ChatGPT and other OpenAI APIs.The second part of the book provides practical guide to building a series of web apps with Next.js that showcase how to use the OpenAI APIs. For example, you’ll learn how to build a Story/Poetry generator, a language learning app, and a blog site with a custom Chatbot widget. The code for the web apps is generated using ChatGPT.When done with this book, you’ll have a clear understanding of Generative AI and be well on your way to building web applications powered by OpenAI APIs and Next.js.WHAT YOU WILL LEARN* Assess the legal, ethical, and security concerns with using Generative AI in web applications * Review the latest APIs provided by OpenAI for generating text and image* Use ChatGPT to generate code for web projects, as well as tips and tricks to working around the limitations.WHO THIS BOOK IS FORExperienced web developers and software engineers who know their way around HTML, CSS, and JavaScript, but have limited or no experience using Generative AI to build web applications.TOM AUGER is a senior software engineer with extensive experience in building web APIs and web applications for both startups and large enterprises. As an increasing number of breakthroughs were made in AI, Tom decided to take a sabbatical in 2020 and obtained a Master’s degree in Computer Science at Edinburgh University researching AI, machine learning and computer security in greater depth. Tom regularly teaches workshops and bootcamps on Generative AI. He currently leads the development of AI in education at the Tumo Center for Creative Technologies to build an AI powered learning coach.EMMA SAROYAN graduated with a BS in Computer Science from the American University of Armenia and is currently a developer advocate with a focus on developer products, platforms, and APIs. Before that, she worked at startups at the intersection of technology and education. Emma regularly speaks at international open-source conferences and is an active advocate for women in tech serving on the DISC Committee of NumFOCUS, an organization dedicated to supporting and advancing open-source scientific computing projects. She believes we are at one of the biggest inflection points in human history, given the disruption that Generative AI is creating.PART I- GENERATIVE AI.- Chapter 1: What is Generative AI.- Chapter 2: Legal, Ethical, and Security Considerations.- Chapter 3: Introduction to ChatGPT.- Chapter 4: ChatGPT for Web Development.- Chapter 5: Introduction to DALL-E.- Chapter 6: Overview of OpenAI APIs.- Chapter 7: Alternative Models.- PART II - BUILDING GENERATIVE AI POWERED WEB APPS.- Chapter 8: Building a Story/Poetry Generator.- Chapter 9: Building a Language Learning App.- Chapter 10: Building a Blog Site with a Custom Chatbot Widget.- Chapter 11: Conclusion and Further Reading.
Building Modern Active Directory
Break the vicious circle of designs perpetuating the errors of the past and “just click next and accept the defaults” implementations preventing a secure and reliable future. This book looks at the typical patterns and antipatterns in Active Directory (AD) design, deployment, and operations and provides an approach to building and operating AD that is based on engineering (analyzing and fulfilling requirements) rather than design (formulating requirements).The book starts with an historical overview of AD and its future 25 years later. You then learn about the challenges that organizations running AD are facing today followed by understanding how to avoid them while learning modern requirements for more efficient and effective AD performance. After that, you go through business requirements influencing the AD topology along with ways to engineer information lookup to protect high-value objects. The book looks at two main protocols and the many dialects that AD offers to engineer an authentication service that fulfills modern requirements while leaving insecure legacy configurations behind. Managing AD from both the security and usability perspectives is discussed next in the book. Building, operating, and transitioning to a modern AD is demonstrated in detail. The book guides you with the next steps of your journey to achieve a secure and reliable AD.After reading this book, you will be able to bridge the gap between the two approaches by analyzing real-world business requirements, explaining the decision-making process in both design and engineering, and ultimately providing concrete engineering guidelines for typical implementation scenarios.WHAT WILL YOU LEARN* Build a modern Active Directory (AD), leaving behind design antipatterns that are not valid anymore* Build a “secure by design” AD and accommodate legacy technology without compromising the overall security* Understand advanced AD functionality such as controlling object visibility and partitioning Kerberos authentication by Authentication Policies* Operate a modern AD, react to changing business requirements, and respond to ever-evolving security threatsWHO THIS BOOK IS FORActive Directory (AD) architects and consultants who need to provide design and engineering advice to customers; AD administrators tasked with modernizing and securing AD in their organizations; security architects wishing to learn the AD design patterns to watch out forEVGENIJ SMIRNOV has 30 years of experience in IT and IT security consulting. Besides directory services and groupware, he has been, and is still active in, the virtualization and platform management space. One of his greatest passions is PowerShell, where he is a regular community contributor and Microsoft Most Valuable Professional (MVP). After leaving consulting to assume a position with Semperis, again in the Active Directory space, he decided to share his AD-related experience, valued by so many customers over the years, and author this book. You can reach him via: @cj_berlin on Twitter and evgenijsmirnov on LinkedIn.Ch 1: Problems with AD.- Ch 2:. Modern AD.- Ch 3: Engineering Topology.- Ch 4: Engineering Lookup.- Ch 5. Engineering Authentication.- Ch 6: Engineering Authorization.- Ch 7: Engineering Configuration.- Ch 8: Engineering Administration.- Ch 9: Building a Modern AD.- Ch 10: Operating a Modern AD.- Ch 11: Transitioning to a Modern AD.- Ch 12: Conclusion.
Crafting Clean Code with JavaScript and React
Understand the guiding principles of “clean code” and how it applies to modern front-end development, accessibility (a11y), semantics, performance, and the Green Web. Highlighting key topics ranging from the foundations of JavaScript and HTML to popular frameworks like React, this book provides best practices to ensure code and applications are easier, more efficient and cost effective to run.Using a web-based application as an example, you’ll begin by cleaning and improving its code base by dividing the JavaScript into smaller, reusable and composable functions without side effects. Then, you’ll improve the HTML code base by applying "Disability Driven Design" patterns, focusing on semantics before moving on to improving the architecture with a functional style (immutable, modular and composable).Because the web today needs to be green with reduced loading time and energy consumption, you’ll apply some tips and tricks to improve code performance and see how to best monitor it in a continuous and scalable way.WHAT YOU’LL LEARN* See how the JavaScript engine works and memory management.* Explore in greater detail key focus areas of accessibility and green computing* Make applications easier and more cost-effective to run* Look closely at clean and sustainable development using JavaScript and ReactWHO THIS BOOK IS FORProgrammers, developers, engineers and product managers who are looking at cost-efficient ways to make their applications run more smoothly and efficiently.HÉLA BEN KHALFALLAH is a highly accomplished frontend expert with nearly 15 years of experience in the technology sector. Throughout her career, she has taken on diverse roles, including expert, architect, lead developer, software engineer developer, and manager. Her passion for software engineering and coding extends beyond specific languages, though she is particularly interested in JavaScript, functional programming, React, clean code, and performance optimization.An active contributor to the tech community, Héla frequently shares her knowledge on Medium and in publications like _Better Programming_ and _IT Next_. She is also a speaker, having given conferences in both 2023 and 2024. Additionally, she leads meetups where she shares her expertise and enthusiasm with others.Chapter 1. Getting Started: Presenting the Context.- Chapter 2. Functional Programming: Blueprint for Pure Code.- Chapter 3. SAGE(S) Driven Design: An Inclusive and Eco-Friendly Website.- Chapter 4. HOFA: The Path Towards Clean Architecture.- Chapter 5. MOME: Befriend User Execution Capabilities.- Chapter 6. CRISP: Clean Reliable Integrated Software Process.
Realizing the Metaverse
A GUIDE TO THE CHALLENGES IN MAKING VIRTUAL REALITY, REALITYThe Metaverse, a version of the internet in which online interactions take place in real time within fully realized virtual spaces, has been promised as the next frontier in wireless communication. It has drawn huge investment from Silicon Valley and widespread media attention. However, the technologies required to make the Metaverse a reality are still in their infancy, and significant barriers must be overcome if this massive step is to be taken. Realizing the Metaverse provides a systematic overview of these challenges and their likely solutions. Focusing on five key areas—infrastructure, access, intelligence, security, and future developments—it offers one of the first comprehensive, formalized treatments of the Metaverse as a nascent reality. It promises to be an integral contribution to the future development of Metaverse technologies. Realizing the Metaverse readers will also find:* An editorial team with extensive research experience in the field* Detailed discussion of topics such as augmented reality (AR) adaptation, haptic feedback, artificial intelligence, and more* Enlightening discussion of open questions and future prospects for researchRealizing the Metaverse is ideal for graduate and advanced undergraduate students in wireless technology, network communications, and related fields, as well as for researchers and industry professionals involved with the Metaverse or adjacent technologies. WEI YANG BRYAN LIM, PHD, is a Wallenberg-NTU Presidential Postdoctoral Fellow, Nanyang Technological University, Singapore. He has received Best Paper Awards from the IEEE Wireless Communications and Networking Conference and the IEEE SPCC Technical Committee, and regularly serves as a reviewer for leading journals. ZEHUI XIONG, PHD, is an Assistant Professor at Singapore University of Technology and Design. He has published extensively, won many prestigious career/paper awards, and served as the editor for many leading journals in the areas of Internet of Things, edge computing and intelligence. He serves as the Associate Director of Future Communications R&D Programme. He was featured on the list of Forbes Asia 30 under 30 in 2023. DUSIT NIYATO, PHD, is a Professor in the School of Computer and Engineering, Nanyang Technological University, Singapore. He is an IEEE Fellow and serves as editor of numerous prestigious journals, including as editor-in-chief of IEEE Communications Surveys and Tutorials. JUNSHAN ZHANG, PHD, is a Professor in the Electrical and Computer Engineering Department at the University of California, Davis, USA. He has researched and published extensively on information networks, data science, 5g, wireless communications, and related subjects, and currently serves as editor-in-chief for IEEE Transactions on Wireless Communication. XUEMIN (SHERMAN) SHEN, PHD, is a University Professor in the Department of Electrical and Computer Engineering, University of Waterloo, Canada. He has published extensively on network resource management, wireless network security, Internet of Things, 5G, and more. He is a Fellow of the Engineering Institute of Canada, the Canadian Academy of Engineering, and the Royal Society of Canada, among others.
Data Science Solutions on Azure
This revamped and updated book focuses on the latest in AI technology—Generative AI. It builds on the first edition by moving away from traditional data science into the area of applied AI using the latest breakthroughs in Generative AI.Based on real-world projects, this edition takes a deep look into new concepts and approaches such as Prompt Engineering, testing and grounding of Large Language Models, fine tuning, and implementing new solution architectures such as Retrieval Augmented Generation (RAG). You will learn about new embedded AI technologies in Search, such as Semantic and Vector Search.Written with a view on how to implement Generative AI in software, this book contains examples and sample code.In addition to traditional Data Science experimentation in Azure Machine Learning (AML) that was covered in the first edition, the authors cover new tools such as Azure AI Studio, specifically for testing and experimentation with Generative AI models.WHAT'S NEW IN THIS BOOK* Provides new concepts, tools, and technologies such as Large and Small Language Models, Semantic Kernel, and Automatic Function Calling* Takes a deeper dive into using Azure AI Studio for RAG and Prompt Engineering design* Includes new and updated case studies for Azure OpenAI* Teaches about Copilots, plugins, and agentsWHAT YOU'LL LEARN* Get up to date on the important technical aspects of Large Language Models, based on Azure OpenAI as the reference platform* Know about the different types of models: GPT3.5 Turbo, GPT4, GPT4o, Codex, DALL-E, and Small Language Models such as Phi-3* Develop new skills such as Prompt Engineering and fine tuning of Large/Small Language Models* Understand and implement new architectures such as RAG and Automatic Function Calling* Understand approaches for implementing Generative AI using LangChain and Semantic Kernel* See how real-world projects help you identify great candidates for Applied AI projects, including Large/Small Language ModelsWHO THIS BOOK IS FORSoftware engineers and architects looking to deploy end-to-end Generative AI solutions on Azure with the latest tools and techniques.JULIAN SOH is a software engineer and a cloud architect with Microsoft, focusing in the areas of artificial intelligence and advanced analytics for independent software vendors(ISVs) who develop software solutions based on the Microsoft technology stack. Prior to his current role, Julian worked extensively in major public cloud initiatives, such asSaaS (Microsoft 365), IaaS/PaaS (Microsoft Azure), and hybrid private-public cloud implementations.PRIYANSHI SINGH is a senior artificial intelligence and machine learning technical specialist at Microsoft, specializing in designing end-to-end cloud solutions that leverage generative AI models and AI implementation best practices. She holds a master’s degree in data science from New York University and has a robust background as a data scientist, focusing on machine learning techniques for predictive analytics, computer vision, and natural language processing. Priyanshi is dedicated to helping the publicsector and independent software vendors (ISVs) transform citizen services through artificial intelligence. She has been recognized as Microsoft's FY24 State and LocalGovernment Pinnacle Winner for her exceptional contributions to AI adoption and the growth of Azure business. Additionally, Priyanshi is a sports enthusiast, excelling inbadminton and enjoying golf and billiards.Chapter 1: Introduction and Update of AI in the Modern Enterprise.- Chapter 2: Generative AI and Large Language Models.- Chapter 3: Deploy and Explore Azure OpenAI.- Chapter 4: Designing a Generative AI Solution.- Chapter 5: Implementing a Generative AI Solution.- Chapter 6: Prompt Engineering Techniques, Small Language Models, and Fine Tuning.- Chapter 7: Semantic Kernel.- Chapter 8: Structured Data, Codex, Agents, and DBCopilot.- Chapter 9: Azure AI Services.
Optimizing Generative AI Workloads for Sustainability
This comprehensive guide provides practical strategies for optimizing Generative AI systems to be more sustainable and responsible. As advances in Generative AI such as large language models accelerate, optimizing these resource-intensive workloads for efficiency and alignment with human values grows increasingly urgent.The book starts with the concept of Generative AI and its wide-ranging applications, while also delving into the environmental impact of AI workloads and the growing importance of adopting sustainable AI practices. It then delves into the fundamentals of efficient AI workload management, providing insights into understanding AI workload characteristics, measuring performance, and identifying bottlenecks and inefficiencies. Hardware optimization strategies are explored in detail, covering the selection of energy-efficient hardware, leveraging specialized AI accelerators, and optimizing hardware utilization and scheduling for sustainable operations. You are also guided through software optimization techniques tailored for Generative AI, including efficient model architecture, compression, and quantization methods, and optimization of software libraries and frameworks. Data management and preprocessing strategies are also addressed, emphasizing efficient data storage, cleaning, preprocessing, and augmentation techniques to enhance sustainability throughout the data life cycle. The book further explores model training and inference optimization, cloud and edge computing strategies for Generative AI, energy-efficient deployment and scaling techniques, and sustainable AI life cycle management practices, and concludes with real-world case studies and best practicesBy the end of this book, you will take away a toolkit of impactful steps you can implement to minimize the environmental harms and ethical risks of Generative AI. For organizations deploying any type of generative model at scale, this essential guide provides a blueprint for developing responsible AI systems that benefit society.WHAT YOU WILL LEARN* Understand how Generative AI can be more energy-efficient through improvements such as model compression, efficient architecture, hardware optimization, and carbon footprint tracking* Know the techniques to minimize data usage, including evaluation, filtering, synthesis, few-shot learning, and monitoring data demands over time* Understand spanning efficiency, data minimization, and alignment for comprehensive responsibility* Know the methods for detecting, understanding, and mitigating algorithmic biases, ensuring diversity in data collection, and monitoring model fairnessWHO THIS BOOK IS FORProfessionals seeking to adopt responsible and sustainable practices in their Generative AI work; leaders and practitioners who need actionable strategies and recommendations that can be implemented directly in real-world systems and organizational workflows; ML engineers and data scientists building and deploying Generative AI systems in industry settings; and researchers developing new generative AI techniques, such as at technology companies or universitiesISHNEET KAUR DUA is an experienced solutions architect specializing in generative artificial intelligence, machine learning, environmental sustainability, and cloud computing. With years of hands-on experience, she excels in designing resource efficient, cost-effective, resilient systems on leading cloud platforms such as AWS, GCP, and Azure. Ishneet started her career at CDK Global where she worked as a DevOps engineer and focused on building highly available Kubernetes environments on AWS cloud and on-prem. Passionate about leveraging AI and ML for innovation, Ishneet has expertise in diverse areas, including low code no code ML, computer vision, NLP, recommendation engines, and predictive analytics. She advocates for ethical AI practices, ensuring fairness and transparency in AI systems while making them accessible through open-source initiatives.As a thought leader, Ishneet shares her insights at global tech conferences, focusing on AI/ML, cloud architecture, and sustainability. She actively mentors women in tech, aiming to inspire and empower the next generation of STEM professionals. Driven by a vision of harnessing technology for positive change, Ishneet is dedicated to building a future where AI creates opportunities for all and addresses complex real-world challenges.PARTH GIRISH PATEL is a seasoned architect with a wealth of experience spanning over 17 years, encompassing management consulting and cloud computing. Currently, at Amazon Web Services (AWS), he specializes in artificial intelligence/machine learning, generative AI, sustainability, application modernization, and cloud-native patterns to deliver resilient, high-performance solutions optimized for cost and operational efficiency.Starting his career as a software engineer, Parth transitioned into consulting at Deloitte, where he provided strategic guidance to Fortune companies on their cloud implementation and led intricate enterprise transformations. This diverse background equipped him with a unique blend of business acumen and technical expertise, enabling him to navigate complex digital transformations effectively. As an AWS solutions architect, Parth plays a pivotal role in guiding customers through their cloud journey and AI adoption, offering insights into scalable architectures and implementing end-to-end machine learning solutions. With specialization across leading cloud providers like AWS, Azure, and GCP, as well as proficiency in Machine Learning skills like Natural Language Processing, Computer Vision, and predictive analytics, Parth is well-equipped to tackle diverse technical challenges.Passionate about sustainable AI, Parth advocates for the responsible and ethical use of AI, emphasizing transparency and environmental consciousness. He leverages his leadership skills to mentor teams and individuals, fostering a collaborative and innovative environment aimed at driving a positive impact across organizations and society as a whole.Chapter 1: Introduction to Generative AI and Sustainability.- Chapter 2: Fundamentals of Efficient AI Workload Management.- Chapter 3: Hardware Optimization for Generative AI.- Chapter 4: Software Optimization for Generative AI.- Chapter 5: Data Management and Preprocessing.- Chapter 6: Model Training and Inference Optimization.- Chapter 7: Cloud and Edge Computing for Generative AI.- Chapter 8: Energy-efficient AI Deployment and Scaling.- Chapter 9: Sustainable AI Life Cycle Management.- Chapter 10: Case Studies and Best Practices.
Building Secure PHP Applications
Learn how to protect PHP applications from potential vulnerabilities and attacks. As cyberattacks and data breaches continue to rise, it's crucial for developers and organizations to prioritize security in their PHP applications. The book offers an all-encompassing guide to securing PHP applications, covering topics ranging from PHP core security to web security, framework security (with a focus on Laravel), security standards, and protocol security.After examining PHP core security and essential topics, such as input validation, output encoding, secure session management, and secure file handling, you’ll move on to common security risks in PHP applications and provides practical examples to demonstrate effective security measures. From there, you’ll delve into web security, addressing XSS, SQL injection, and CSRF, reviewing in-depth explanations and mitigation techniques.A significant portion of the book focuses on Laravel's built-in security features, guiding readers to avoid common pitfalls. Industry-standard security protocols like HTTP, OAuth, and JSON Web Tokens are explained with demonstrations for how to effectively use them to ensure integrity, confidentiality, and authenticity in web applications. Additionally, protocol security is discussed, including secure communication, file transfer protocols (SFTP), and email handling. Security in cloud and hybrid environments is also discussed.This book's comprehensive and inclusive approach spans a wide range of security topics related to PHP and ensures that no critical areas are overlooked. It goes beyond theoretical concepts by providing practical guidance and actionable steps. It includes code snippets, real-world examples, case studies, and hands-on exercises, enabling you to apply the knowledge gained in practical scenarios. _Building Secure PHP Applications_ provides a holistic approach to security, empowering you to build robust and resilient PHP applications.WHAT YOU WILL LEARN* Understand industry-recognized security standards and compliance requirements for data protection regulations.* Learn the intricacies of Laravel and how to leverage its security features.* Integrate security practices throughout the development lifecycle, conducting security testing and reviews and adopting secure deployment and DevOps practices.* Conduct forensic analysis and perform post-incident analysis for continuous improvement.* Look to the future and discover emerging security threats and techniques to anticipate and mitigate potential security risks.WHO THIS BOOK IS FORPrimarily written for developers, security professionals, and webmasters involved in PHP application development. Additionally, this book may be used as a reference for students studying web development, PHP programming or cybersecurityAs an experienced software developer, architect and security enthusiast with over a decade of industry experience, Satej Kumar Sahu has dedicated his career to building robust and secure applications. Throughout his journey, he has encountered numerous challenges and witnesses the evolving landscape of PHP application security. With a passion for sharing knowledge and empowering fellow developers, he has decided to write this book as a comprehensive guide to PHP application security. Drawing from practical experiences, industry best practices, and a deep understanding of PHP development, his goal is to equip readers with the skills and insights needed to build secure and resilient PHP applications in today's threat landscape. He is excited to contribute to the community and help developers create secure software that withstands the ever-present risks of the digital world.Chapter 1: Introduction to PHP Application Security.- Chapter 2: PHP Core Security.- Chapter 3: Web Security for PHP Applications.- Chapter 4: Framework Security. Chapter 5: Security Standards and Best Practices.- Chapter 6: Protocol Security.- Chapter 7: Incident Response and Security Monitoring.- Chapter 8: Future Trends in PHP Application.
Deep Dive into the Power Platform in the Age of Generative AI
Understand the full potential of Microsoft Power Platform with this comprehensive guide, designed to provide you with the knowledge and tools needed to create intelligent business applications, automate workflows, and drive data-driven insights for business growth. Whether you're a novice or an experienced professional, this book offers a step-by-step approach to mastering the Power Platform.This book comes with an extensive array of essential concepts, architectural patterns and techniques. It will also guide you with practical insights to navigate the Power Platform effortlessly while integrating on Azure. Starting with exploring Power Apps for building enterprise applications, the book delves into Dataverse, Copilot Studio, AI Builder, managing platforms and Application life cycle management. You will then demonstrate testing strategy followed by a detailed examination of Dataverse and intelligent AI-powered Applications. Additionally, you will cover Power pages for external websites and AI-infused solutions. Each section is meticulously structured, offering step-by-step guidance, hands-on exercises, and real-world scenarios to reinforce learning.After reading the book, you will be able to optimize your utilization of the Power Platform for creating effective business solutions.WHAT YOU WILL LEARN:* Understand the core components and capabilities of Power Platform* Explore how Power Platform integrates with Azure services* Understand the key features and benefits of using Power Platform for business applications* Discover best practices for governance to ensure compliance and efficient management* Explore techniques for optimizing the performance of data integration and export processes on AzureWHO THIS BOOK IS FOR:Application developers, Enterprise Architects and business decision-makers.Biswa Pujarini Mohapatra is a seasoned technology leader with over 18 years of IT experience. She is currently serving as the Principal Engineering Manager at Microsoft. She leads a global team in designing and implementing scalable solutions using the Power Platform and Azure. Her expertise spans in artificial intelligence, low code/power platform, cloud computing, leadership, management, and enterprise architecture. She has authored a book on Microservices using .NET core and has reviewed books across technology.Gaurav Kumar Arora is a Tech-enthusiast with over 27 years of industry experience, encompassing a wide range of technologies. He has achieved notable accomplishments throughout his career, including being a recipient of the Microsoft MVP award, a MuleSoft Mentor, and serving as a Mentor of Change with AIM NITI Aayog, Govt. of India. Gaurav is also a Business Coach with Business Blaster, Govt. of NCT of Delhi. He holds a lifetime membership with the Computer Society of India (CSI) and serves as an advisory member and Senior Mentor at India Mentor. He is certified as a Scrum trainer and Coach, ITIL-F certified, and holds PRINCE-F and PRINCE-P certifications. Additionally, he is a Certified Microsoft Azure Architect and has authored books on various technologies.Gaurav recently achieved the distinction of being recognized as a World Record Holder for his exceptional book writing in disciplined technologies. He holds 15 patents in disciplined technologies. Gaurav is passionate about sharing his knowledge and believes in the principle of "sharing is caring". He actively mentors underprivileged students and is associated with the NGO SHIKSHA एक पहल.Some of his most appreciated books with Apress are:* Hands-on Azure Cognitive Services: Applying AI and Machine Learning for Richer applications* Cloud Debugging and Profiling in Microsoft Azure: Application performance management in the CloudYash Agarwal is a Power Platform solution architect with experience working on Microsoft Power Apps, Power Automate and Power Virtual agents. He is a 5X Microsoft MVP and MCT for business applications. He has experience working in healthcare, banking and finance, education, automotive, etc. domains.Part I: Getting started, Security, Governance and Compliance- Chapter 1: Power Platform Overview.- Chapter 2: Power Platform Administration and Governance.- Chapter 3: Dataverse Capabilities in Power Platform.- Chapter 4: Data Integration, Data Export and Analytics in Dataverse.- Chapter 5: Dataverse Connectors & Gateway.- Part 2: Power Platform Components and Real-world User cases.- Chapter 6: Modern App Design with Power Apps.- Chapter 7: Microsoft Copilot Studio.- Chapter 8: Workflow Automation using Power Automate.- Chapter 9: Unleashing Intelligence with AI Builder.- Chapter 10: Solutions Overview and ALM Strategy.- Chapter 11: Power Pages for External Websites.- Chapter 12: Real World Use Cases and Success Stories.
Learn Data Science Using Python
Harness the capabilities of Python and gain the expertise need to master data science techniques. This step-by-step book guides you through using Python to achieve tasks related to data cleaning, statistics, and visualization.You’ll start by reviewing the foundational aspects of the data science process. This includes an extensive overview of research points and practical applications, such as the insightful analysis of presidential elections. The journey continues by navigating through installation procedures and providing valuable insights into Python, data types, typecasting, and essential libraries like Pandas and NumPy. You’ll then delve into the captivating world of data visualization. Concepts such as scatter plots, histograms, and bubble charts come alive through detailed discussions and practical code examples, unraveling the complexities of creating compelling visualizations for enhanced data understanding.Statistical analysis, linear models, and advanced data preprocessing techniques are also discussed before moving on to preparing data for analysis, including renaming variables, variable rearrangement, and conditional statements. Finally, you’ll be introduced to regression techniques, demystifying the intricacies of simple and multiple linear regression, as well as logistic regression.WHAT YOU’LL LEARN* Understand installation procedures and valuable insights into Python, data types, typecasting* Examine the fundamental statistical analysis required in most data science and analytics reports* Clean the most common data set problems* Use linear progression for data predictionWHO THIS BOOK IS FORData Analysts, data scientists, Python programmers, and software developers new to data science.Engy Fouda is an adjunct lecturer at SUNY New Paltz teaching Intro to Data Science using SAS Studio and Introduction to Machine Learning using Python. She is an Apress and Packt Publishing author. Currently, she teaches SAS Fundamentals, Intermediate SAS, Advanced SAS, SAS SQL, Introduction to Python, Python for Data Science, Docker Fundamentals, Docker Enterprise for Developers, Docker Enterprise for Operations, Kubernetes, and DCA and SAS exams test-prep courses tracks at several venues as a freelance instructor.She also works as a freelance writer for Geek Culture, Towards Data Science, and Medium Partner Program. She holds two master’s degrees: one in journalism from Harvard University, the Extension School, and the other in computer engineering from Cairo University. Moreover, she earned a Data Science Graduate Professional Certificate from Harvard University, the Extension School. She volunteers as the chair of Egypt Scholars board and is former executive manager and former Momken team leader (Engineering for the Blind). She is the author of the books _Learn Data Science Using SAS Studio _and _A Complete Guide to Docker for Operations and Development _published by Apress and a co-author of _The Docker Workshop_ published by Packt.Chapter 1: Data Science in Action.- Chapter 2: Getting Started.- Chapter 3: Data Visualization.- Chapter 4: Statistical Analysis and Linear Models.- Chapter 5: Advanced Data Pre-processing and Feature Engineering.- Chapter 6: Preparing Data for Analysis.- Chapter 7: Regression.
Das Standard-Datenschutzmodell (SDM) (2. Auflg.)
Das Standard-Datenschutzmodell (SDM) gilt spätestens seit 2020 deutschlandweit als etabliert, um normative Anforderungen der DSGVO in funktionale Anforderungen an die Praxis der Datenverarbeitungen zu transformieren.Wenn die Juristin zum Beispiel sagt: Diese Daten sind unverzüglich zu löschen! Dann ist aus juristischer Sicht alles Erforderliche gesagt. Für Praktiker*innen, die diese vermeintlich leichte Anforderung umzusetzen haben, können sich Unmengen an komplizierten Fragen stellen: Wie gesichert muss gelöscht werden? Kann man den installierten Löschprogrammen trauen? Wie muss das Löschen von Daten in welcher Auflösung dokumentiert und protokolliert werden? Wer ist eigentlich befugt, zu löschen, auch in den Backup-Dateien?Das SDM hilft, bei solchen Fragestellungen der Umsetzung zu begründeten Entscheidungen zu gelangen, um an ein vollständiges Set von aufeinander abgestimmten, wirksamen Schutzmaßnahmen zu gelangen. Dies ist von zentraler Bedeutung bei der Durchführung von Datenschutz-Prüfungen und -Beratungen, Datenschutz-Folgenabschätzungen und dem Betrieb eines Datenschutz-Managements.Die 2. Auflage wurde umfassend für das SDM in der Version 3.1 aktualisiert und erweitert. Neu hinzugekommen sind u.a. Kapitel über SDM-Tools und -Schulungen sowie über SDM-Konformität. Was meint „Datenschutz“? Überblick Verarbeitung Recht Gewährleistungsziele Datenschutzrisiken Technisch-organisatorische Maßnahmen SDM anwenden SDM im Kontext anderer Methoden und Standards Anstelle einer Zusammenfassung: SDM-Konformität Nachwort Anhang MARTIN ROST ist Mitarbeiter des Unabhängigen Landeszentrums für Datenschutz in Schleswig-Holstein und Leiter des „Unterarbeitskreis Standard-Datenschutzmodell“ des „Arbeitskreis Technik“ der Konferenz der Datenschutzbeauftragten des Bundes und der Länder.
Firebase Storage for Angular
Welcome to the book “Firebase Storage for Angular: A reliable file upload solution for your applications”. In this book, I explain how you can integrate Firebase Storage into your Angular application. One of the pain points in many applications is where to store the application files. Whether you want to upload the product images for your e-commerce store or allow users of your social media application to upload files, etc. You need a reliable file storage provider to manage your files. Fortunately, Firebase Storage comes to the rescue. By the end of this book, you will be able to manage files freely from your application and handle all kinds of scenarios. Let us get started. Hello, I am Abdelfattah Ragab, a professional software developer with more than 20 years of experience. I am an expert in Angular, CSS, graphic design and all web related technologies. I have published numerous books on modern CSS layouts and Angular as well as complete business solutions for e-commerce and the like. I hope you enjoy my books. With kind regards.