Allgemein
Enterprise AI in the Cloud
EMBRACE EMERGING AI TRENDS AND INTEGRATE YOUR OPERATIONS WITH CUTTING-EDGE SOLUTIONSEnterprise AI in the Cloud: A Practical Guide to Deploying End-to-End Machine Learning and ChatGPT Solutions is an indispensable resource for professionals and companies who want to bring new AI technologies like generative AI, ChatGPT, and machine learning (ML) into their suite of cloud-based solutions. If you want to set up AI platforms in the cloud quickly and confidently and drive your business forward with the power of AI, this book is the ultimate go-to guide. The author shows you how to start an enterprise-wide AI transformation effort, taking you all the way through to implementation, with clearly defined processes, numerous examples, and hands-on exercises. You’ll also discover best practices on optimizing cloud infrastructure for scalability and automation.Enterprise AI in the Cloud helps you gain a solid understanding of:* AI-FIRST STRATEGY: Adopt a comprehensive approach to implementing corporate AI systems in the cloud and at scale, using an AI-First strategy to drive innovation* STATE-OF-THE-ART USE CASES: Learn from emerging AI/ML use cases, such as ChatGPT, VR/AR, blockchain, metaverse, hyper-automation, generative AI, transformer models, Keras, TensorFlow in the cloud, and quantum machine learning* PLATFORM SCALABILITY AND MLOPS (ML OPERATIONS): Select the ideal cloud platform and adopt best practices on optimizing cloud infrastructure for scalability and automation* AWS, AZURE, GOOGLE ML: Understand the machine learning lifecycle, from framing problems to deploying models and beyond, leveraging the full power of Azure, AWS, and Google Cloud platforms* AI-DRIVEN INNOVATION EXCELLENCE: Get practical advice on identifying potential use cases, developing a winning AI strategy and portfolio, and driving an innovation culture* ETHICAL AND TRUSTWORTHY AI MASTERY: Implement Responsible AI by avoiding common risks while maintaining transparency and ethics* SCALING AI ENTERPRISE-WIDE: Scale your AI implementation using Strategic Change Management, AI Maturity Models, AI Center of Excellence, and AI Operating ModelWhether you're a beginner or an experienced AI or MLOps engineer, business or technology leader, or an AI student or enthusiast, this comprehensive resource empowers you to confidently build and use AI models in production, bridging the gap between proof-of-concept projects and real-world AI deployments.With over 300 review questions, 50 hands-on exercises, templates, and hundreds of best practice tips to guide you through every step of the way, this book is a must-read for anyone seeking to accelerate AI transformation across their enterprise.RABI JAY is a recognized IT expert with over 15 years of experience working in roles such as VP of Architecture, Digital Platform Strategy Lead, and Global Alliance Manager at Deloitte Consulting, as well as at HCL America and SapientRazorfish. He has been instrumental in driving large-scale, enterprise-level Cloud and AI transformations across diverse industries like retail, telecom, finance, and tech. He holds sought-after certifications in AWS Machine Learning, AWS Solutions Architect, and Microsoft Azure. You can connect with Rabi through his authoritative LinkedIn newsletter, Enterprise AI Transformation. Introduction xviiPART I: INTRODUCTIONChapter 1: Enterprise Transformation with AI in the Cloud 3Chapter 2: Case Studies of Enterprise AI in the Cloud 19PART II: STRATEGIZING AND ASSESSING FOR AIChapter 3: Addressing the Challenges with Enterprise AI 31Chapter 4: Designing AI Systems Responsibly 41Chapter 5: Envisioning and Aligning Your AI Strategy 50Chapter 6: Developing An AI Strategy and Portfolio 57Chapter 7: Managing Strategic Change 66PART III: PLANNING AND LAUNCHING A PILOT PROJECTChapter 8: Identifying Use Cases for Your AI/ml Project 79Chapter 9: Evaluating AI/ml Platforms and Services 106Chapter 10: Launching Your Pilot Project 152PART IV: BUILDING AND GOVERNING YOUR TEAMChapter 11: Empowering Your People Through Org Change Management 163Chapter 12: Building Your Team 173PART V: SETTING UP INFRASTRUCTURE AND MANAGING OPERATIONSChapter 13: Setting Up An Enterprise AI Cloud Platform Infrastructure 187Chapter 14: Operating Your AI Platform with Mlops Best Practices 217PART VI: PROCESSING DATA AND MODELINGChapter 15: Process Data and Engineer Features in The Cloud 243Chapter 16: Choosing Your AI/ml Algorithms 268Chapter 17: Training, Tuning, and Evaluating Models 315PART VII: DEPLOYING AND MONITORING MODELSChapter 18: Deploying Your Models Into Production 345Chapter 19: Monitoring Models 361Chapter 20: Governing Models for Bias and Ethics 377PART VIII: SCALING AND TRANSFORMING AIChapter 21: Using the AI Maturity Framework to Transform Your Business 391Chapter 22: Setting Up Your AI Coe 407Chapter 23: Building Your AI Operating Model and Transformation Plan 416PART IX: EVOLVING AND MATURING AIChapter 24: Implementing Generative AI Use Cases With Chatgpt for the Enterprise 433Chapter 25: Planning for the Future of AI 465Chapter 26: Continuing Your AI Journey 479Index 485
Flame Game Development
Reimagine your development process and create, test, and deploy your mobile, web, desktop, and embedded apps from a single codebase. This book shows you how to leverage Flame, the modular Flutter game engine, to build cross-platform 2D games. With Flutter, you can create all kinds of apps by making subtle changes to projects at the code level. Guided by a practical project-based approach, you'll begin by downloading and installing the game engine. You'll then move on to creating widgets in Flutter and components within our game, such as player, enemy, background, consumables, etc. The book also shows you how to add sprites, render images, setup animation, and much more. Flame Game Development is perfect for the novice eager to gain hands-on knowledge of this exciting game engine's library to create a simple 2D game. What You'll Learn * Apply Flutter coding skills to game development * Developgames that can be played on all platforms * Create your first 2D game using Flame Who This Book Is For Beginners who want to learn how to develop games on Flame and create their first 2D game with Flutter. Chapter 1: Create a Project in Flutter and Add Flame.- Chapter 2: Flame Basics.- Chapter 3: Flame Fundamentals.- Chapter 4: Game One: Meteor Shower.- Chapter 5: Background in Color and Image.- Chapter 6: Tiled Background.- Chapter 7: Game Two, Jump Between Tiles.- Chapter 8: Game Two, Many Experiments.- Chapter 9: Game Three, Move XY.- Chapter 10: Game Three, Enemies.- Chapter 11: Game Four, Plants vs Zombies.- Chapter 12: Game Four, Many Experiments.- Chapter 13: Game Five, Parallax Backgrounds.-Chapter 14: Audio.
Enterprise AI in the Cloud
EMBRACE EMERGING AI TRENDS AND INTEGRATE YOUR OPERATIONS WITH CUTTING-EDGE SOLUTIONSEnterprise AI in the Cloud: A Practical Guide to Deploying End-to-End Machine Learning and ChatGPT Solutions is an indispensable resource for professionals and companies who want to bring new AI technologies like generative AI, ChatGPT, and machine learning (ML) into their suite of cloud-based solutions. If you want to set up AI platforms in the cloud quickly and confidently and drive your business forward with the power of AI, this book is the ultimate go-to guide. The author shows you how to start an enterprise-wide AI transformation effort, taking you all the way through to implementation, with clearly defined processes, numerous examples, and hands-on exercises. You'll also discover best practices on optimizing cloud infrastructure for scalability and automation.Enterprise AI in the Cloud helps you gain a solid understanding of:* AI-FIRST STRATEGY: Adopt a comprehensive approach to implementing corporate AI systems in the cloud and at scale, using an AI-First strategy to drive innovation* STATE-OF-THE-ART USE CASES: Learn from emerging AI/ML use cases, such as ChatGPT, VR/AR, blockchain, metaverse, hyper-automation, generative AI, transformer models, Keras, TensorFlow in the cloud, and quantum machine learning* PLATFORM SCALABILITY AND MLOPS (ML OPERATIONS): Select the ideal cloud platform and adopt best practices on optimizing cloud infrastructure for scalability and automation* AWS, AZURE, GOOGLE ML: Understand the machine learning lifecycle, from framing problems to deploying models and beyond, leveraging the full power of Azure, AWS, and Google Cloud platforms* AI-DRIVEN INNOVATION EXCELLENCE: Get practical advice on identifying potential use cases, developing a winning AI strategy and portfolio, and driving an innovation culture* ETHICAL AND TRUSTWORTHY AI MASTERY: Implement Responsible AI by avoiding common risks while maintaining transparency and ethics* SCALING AI ENTERPRISE-WIDE: Scale your AI implementation using Strategic Change Management, AI Maturity Models, AI Center of Excellence, and AI Operating ModelWhether you're a beginner or an experienced AI or MLOps engineer, business or technology leader, or an AI student or enthusiast, this comprehensive resource empowers you to confidently build and use AI models in production, bridging the gap between proof-of-concept projects and real-world AI deployments.With over 300 review questions, 50 hands-on exercises, templates, and hundreds of best practice tips to guide you through every step of the way, this book is a must-read for anyone seeking to accelerate AI transformation across their enterprise.RABI JAY is a recognized IT expert with over 15 years of experience working in roles such as VP of Architecture, Digital Platform Strategy Lead, and Global Alliance Manager at Deloitte Consulting, as well as at HCL America and SapientRazorfish. He has been instrumental in driving large-scale, enterprise-level Cloud and AI transformations across diverse industries like retail, telecom, finance, and tech. He holds sought-after certifications in AWS Machine Learning, AWS Solutions Architect, and Microsoft Azure. You can connect with Rabi through his authoritative LinkedIn newsletter, Enterprise AI Transformation. Introduction xviiPART I: INTRODUCTIONChapter 1: Enterprise Transformation with AI in the Cloud 3Chapter 2: Case Studies of Enterprise AI in the Cloud 19PART II: STRATEGIZING AND ASSESSING FOR AIChapter 3: Addressing the Challenges with Enterprise AI 31Chapter 4: Designing AI Systems Responsibly 41Chapter 5: Envisioning and Aligning Your AI Strategy 50Chapter 6: Developing An AI Strategy and Portfolio 57Chapter 7: Managing Strategic Change 66PART III: PLANNING AND LAUNCHING A PILOT PROJECTChapter 8: Identifying Use Cases for Your AI/ml Project 79Chapter 9: Evaluating AI/ml Platforms and Services 106Chapter 10: Launching Your Pilot Project 152PART IV: BUILDING AND GOVERNING YOUR TEAMChapter 11: Empowering Your People Through Org Change Management 163Chapter 12: Building Your Team 173PART V: SETTING UP INFRASTRUCTURE AND MANAGING OPERATIONSChapter 13: Setting Up An Enterprise AI Cloud Platform Infrastructure 187Chapter 14: Operating Your AI Platform with Mlops Best Practices 217PART VI: PROCESSING DATA AND MODELINGChapter 15: Process Data and Engineer Features in The Cloud 243Chapter 16: Choosing Your AI/ml Algorithms 268Chapter 17: Training, Tuning, and Evaluating Models 315PART VII: DEPLOYING AND MONITORING MODELSChapter 18: Deploying Your Models Into Production 345Chapter 19: Monitoring Models 361Chapter 20: Governing Models for Bias and Ethics 377PART VIII: SCALING AND TRANSFORMING AIChapter 21: Using the AI Maturity Framework to Transform Your Business 391Chapter 22: Setting Up Your AI Coe 407Chapter 23: Building Your AI Operating Model and Transformation Plan 416PART IX: EVOLVING AND MATURING AIChapter 24: Implementing Generative AI Use Cases With Chatgpt for the Enterprise 433Chapter 25: Planning for the Future of AI 465Chapter 26: Continuing Your AI Journey 479Index 485
API Management
APIs are the enablers for a thriving ecosystem that can drive revenue growth and ROIs for any organization. This book will cover all relevant topics and trends that enterprise architects need to know to build and govern APIs as a product.The second edition of the API Management builds on the foundation established in the first edition to cover recent advances in API development as well as the principles and best practices of building API as a product. It has been updated to cover the latest and emerging trends in API architecture, design, and implementation covering the use of gRPC, graphQL, microservices and service mesh to building and manage a scalable API platform. New chapters cover how to build an effective API strategy for digital transformation and implement an API-First architecture to build and deliver APIs as a Product.Any software architect or developer looking to adopt and build APIs for digital transformation and excellence within their organization will find this book to be an invaluable resource.WHAT YOU WILL LEARN* Understand API Management Architecture and Design best practices* How to build an effective API strategy and build APIs as product* How to design, build and test APIs using API-First approach* How to implement API Security* What are the latest API technology trends and adoption across industryWHO THIS BOOK IS FORCxOs, software architects, and developers who are looking to implement APIs within their organization for digital transformation initiatives.Brajesh is Sr. Director with Fresh Gravity, leading their API Management and Integration practice. He has more than 25 years of industry experience specializing in API Management and Cloud Integration space. He has led many large-scale Digital Transformation projects helping enterprises across industries in laying out API First strategy and executed some of them on multi-cloud platforms. . His innovations are patented and granted across four countries in areas like API Assessment and data veracity. He is a Google-certified Cloud Security architect and MIT-certified Application Security Architect. Before Fresh Gravity he worked with Accenture, Apigee, and Wipro as a Global API capability lead, Principal Architect, and Lead integration architect.Chapter 1: Introduction to APIsChapter Goal: This chapter introduces APIs and their importance in today’s digital economy for all digital transformation programs. We look at some of the associated and similar technologies like SOA, iPaas, and Microservices and understand their differences and relationship with API. The second edition will make updates to the examples for popular public APIs, types of APIs, introduction to iPaas platform for APIs, and some ofNo of pages 12 to 15 pagesChapter 2: Introduction to API ManagementChapter Goal: This chapter discusses the need for an API Management platform for an enterprise. It focuses on the capabilities required for an API management platform viz. API Gateway, Developer Portal, and API Analytics. The second edition of the book will highlight the recent advancements and trends in API Management and new capabilities added to API Management platform products.No of pages: 12 to 15 pagesSub - Topics1. API Gateway2. API Developer Portal3. API Analytics4. Service MeshChapter 3: Designing RESTful APIsChapter Goal: This chapter will cover the concepts and best practices for designing RESTful APIs that developer love. It will introduce the audience to the right use of HTTP verbs, HTTP status codes, versioning guidelines, and resource naming conventions for building restful APIs.No of pages : 18 to 20 pagesSub - Topics:1. REST API Design Principles2. API Naming conventions3. HTTP Verbs and Error codes4. API Design Best PracticesChapter 4: API DocumentationChapter Goal: This chapter will discuss the importance of documentation for APIs and the best practices for documenting APIs. It will discuss the various standards out there for documentation and the differences. Advances and differences in API documentation standards like OAS. RAML and Async APIs will be covered. The 2nd edition of the book will introduce the changes in the API document standardsNo of pages:12 to 15 pagesSub - Topics:1. Importance of good API documentation2. Open API Specifications3. RAML4. Async APIsChapter 5: API Architecture PatternsChapter Goal: This chapter focuses on the various patterns for developing and managing scalable APIs. It discusses the patterns for API Implementation, Traffic Management, API Security, API Deployments, and API Adoption. The 2nd edition will cover the new patterns for the development scalable APIsNo of pages: 20 to 25 pagesSub - Topics:1. API Traffic Management Patterns2. API Security Patterns3. API deployment patterns4. API Operations and adoption patternsChapter 6: API Version ManagementChapter Goal: This chapter will highlight the importance and approaches for versioning APIs for easier life cycle management.Chapter 7: API SecurityChapter Goal: This chapter will discuss the various approaches and technologies available for implementing robust end-to-end security for APIs. The 2nd edition will also focus on the latest advances in API security like WAAP and protection against BoT attacksNo of pages:25 to 30 pagesSub - Topics:1. API Authentication and Authorization2. OAuth3. Open Id Connect4. JwT tokens5. Preventing BoT attacks6. WAAP (Web Application and API Protection)Chapter 8: API MonetizationChapter Goal: This chapter will highlight the various API monetization models and the concepts around creating an API Monetization package. The chapter will also cover some of the pitfalls to avoid while selecting the monetization model. The 2nd edition will update this chapter to cover the pitfalls to avoid while monetizing APIsNo of pages: 8 to 10 pagesSub - Topics:1. API Monetization approach2. API Monetization Models3. Pitfalls to avoid while Monetizing APIsChapter 9: API Testing StrategyChapter Goal: This chapter will focus on the right approach to test APIs with interface testing, functional integration testing, security testing, and load and performance testing. The chapter will also look at some of the popular tools for API testing.No of pages: 12 to 15 pagesSub - Topics:1. API Testing approach2. Best practices for API testing3. API Testing toolsChapter 10: API AnalyticsChapter Goal: This chapter will focus on the various stakeholders and metrics/dashboards to look at for monitoring the performance of APIs.No of pages: 5 to 8 pagesSub - Topics:5. API Analytics6. App Analytics7. Developer AnalyticsChapter 11: API Developer PortalChapter Goal: This chapter will focus on the need for building a rich and user-friendly Developer Portal. It will highlight the necessary components and functionalities to be implemented in a Developer Portal. The 2nd edition of this chapter will introduce the best practices to follow and advanced capabilities that should be built to accelerate the adoption of APIs using the Developer PortalNo of pages: 12 to 15 pagesSub - Topics:1. API Publications2. Developer Onboarding3. API dashboards4. Forums and Blogs5. SupportChapter 12: API GovernanceChapter Goal: This chapter will look into the various personas and their roles in the API lifecycle. It will look at the scope and aim of API Governance. The various API governance models will be discussed in this chapter. The 2nd edition will highlight the best practices to follow for an effective API governanceNo of pages: 8 to 10 pagesSub - Topics:1. API Lifecycle2. Personals and Roles3. API Governance Models4. Best practices for effective API GovernanceChapter 13: Building an effective API StrategyChapter Goal: This new chapter in the 2nd edition will focus on the approach to building an effective API strategy for an organization. It will highlight the components that should be part of the enterprise API strategy.No of pages: 5 to 8 pagesSub - Topics:1. API Business Strategy2. API Technology Strategy3. API Ecosystem StrategyChapter 14: Building an API-First ArchitectureChapter Goal: This new chapter in the 2nd edition will focus on the principles and approaches for building an API-First architecture. It will cover the API principles for API exposure, and various patterns for building scalable and decoupled APIs like orchestration, choreography, event-driven approach, service mesh, service registryNo of pages: 20 to 25 pagesChapter 15: Modern API Architecture StylesChapter Goal: This new chapter in the 2nd edition will introduce the readers to some of the latest advancements in technology for building APIs like graphQL, and gRPC. It will look at the various criteria for making the right technology choices for architecting APIsNo of pages: 10 to 12 pagesSub - Topics:1. graphQL2. gRPCChapter 16: Build APIs as a ProductChapter Goal: This new chapter in the 2nd edition will focus on the principles for building APIs as a product that customers will love. It will also discuss the approaches and best practices to be followed for creating an API Product and launching it in the marketNo of pages: 10 to 12 pagesSub - Topics:1. Pillars of a product mindset2. Guide to API Product Management PrinciplesChapter 17: API Maturity ModelChapter Goal: This new chapter in the 2nd edition will talk about the maturity levels of an enterprise APIs program. It also provides a roadmap that organizations may adopt to evolve and mature their APIs to meet the growing business needsNo of pages: 8 to 10 pagesSub - Topics: 1. API Architecture maturity2. API Governance maturity3. API Developer Community Maturity4. API Development Process Maturity5. API Operations Maturity
Künstliche Intelligenz (KI) und Arbeit
Dies ist ein Handbuch für Unternehmen, Verbände und Beratungsgesellschaften, die die Potenziale von KI-Systemen in kleinen und mittleren Unternehmen erschließen wollen. Wie muss KI in Unternehmen eingeführt werden, um die Potenziale von KI gleichermaßen für Unternehmen und Beschäftigte zu nutzen? Im Buch geht es um die Frage, wie man KI-gestützte Arbeitssysteme so gestalten kann, dass sie den Anforderungen seitens der Technik, der Organisation und der Beschäftigten gerecht werden. Das Handbuch bietet praxisnahe Vorgehensweisen, die den aktuellen Stand der Wissenschaft mit Erfahrungen aus der betrieblichen Praxis verbinden. Der Leser erhält wertvolle Tipps und Strategien für die Zukunft der Arbeit. Ein Muss für alle, die die Chancen von KI nutzen wollen, ohne die Bedürfnisse der Beschäftigten zu vernachlässigen. Das IFAA – INSTITUT FÜR ANGEWANDTE ARBEITSWISSENSCHAFT E. V. in Düsseldorf ist das Forschungsinstitut der Metall- und Elektroindustrie zur Gestaltung der Arbeitswelt. Das ifaa verknüpft Kompetenz in Arbeitswissenschaft und Betriebsorganisation mit Erfahrungen aus der betrieblichen Praxis. Es beteiligt sich an praxisrelevanten Forschungs- und Verbundprojekten und bereitet die gewonnenen Erkenntnisse für den Transfer in die Praxis auf. Es vermittelt Erkenntnisse der Forschung und hilft den Partnern vor Ort, die Erkenntnisse, Methoden und Konzepte in den Betrieben umzusetzen. Das Themen- und Leistungsspektrum des ifaa umfasst u.a. Arbeits- und Leistungsfähigkeit, betriebliches Gesundheitsmanagement, Arbeitszeitgestaltung, Entgelt und Vergütung, Prozessoptimierung, Nachhaltigkeitsmanagement sowie Digitalisierung und künstliche Intelligenz. Bei seinen Arbeiten erforscht und gestaltet das ifaa Veränderungen der Arbeitswelt, die auf demografische, gesellschaftliche, ökonomische und technologische Ursachen zurückzuführen sind.TEIL 1 - ALLGEMEINE EINFÜHRUNG: Einführung.- Klassifizierung von Künstlicher Intelligenz.- Bedarfsdarstellung aus der Praxis.- Roadmap für den Weg zur eigenen KI-Lösung.- TEIL 2 - PRAXISTEIL / UMSETZUNG DER ROADMAP: Ermittlung des individuellen KI-Bedarfs.- Entwicklung und Pilotierung.- Anwendung und Pflege im Serienbetrieb.- Ausblick / Weiterentwicklungsperspektiven.
Practical Spring LDAP
This revised edition is your practical, hands-on guide to developing Java-based enterprise applications with big data or batches of data using the Spring LDAP and the Spring Data LDAP frameworks. The book covers these popular Spring project modules and explains the purpose and fundamental concepts of LDAP before giving a comprehensive tour of the latest version of Spring LDAP and Spring Data LDAP as found in Spring Framework 6.The book provides a detailed treatment of LDAP controls and the new features of Spring LDAP such as Object Directory Mapping and LDIF parsing. LDAP has become the de facto standard for storing and accessing information in enterprises. Despite its widespread adoption, developers often struggle when it comes to using this technology effectively. The traditional Java LDAP and JNDI approaches have proven to be painful and have resulted in complex, less modular applications. The Spring LDAP framework provides an ideal alternative.After reading and using this book, you'll come away with a level of comfort for working with large batches of data or big data in your enterprise Spring applications development.WHAT YOU'LL LEARN* Explore "What is Java LDAP?" and understand the Spring LDAP and Spring Data LDAP frameworks* Search LDAP resources* Sort and page your LDAP results* Dive into object directory mapping* Handle LDAP transactions and moreWHO THIS BOOK IS FORIntermediate to advanced Java and Spring software developers; programmers with at least some prior experience in Java, especially the Spring FrameworkBALAJI VARANASI is a software development manager and technology entrepreneur. He has over 13 years of experience architecting and developing Java/.NET applications and, more recently, iPhone apps. During this period, he has worked in the areas of security, web accessibility, search, and enterprise portals. He has a master's degree in computer science and serves as adjunct faculty, teaching programming and information system courses. When not programming, he enjoys spending time with his lovely wife in Salt Lake City, Utah.ANDRES SACCO has been working as a developer since 2007 in different languages, including Java, PHP, Node.js, Scala, and Kotlin. His background is mostly in Java and the libraries or frameworks associated with this language. At most of the companies he worked for, he researched new technologies to improve the performance, stability, and quality of the applications of each company. In 2017, he started to find new ways to optimize the transference of data between applications to reduce the cost of infrastructure. He suggested some actions, some applicable in all of the manual microservices and others in just a few. All of this work includes creating a series of theoric-practical projects (available on Manning.com). Recently, he co-authored an Apress book on Beginning Scala 3. He also, published a set of theoric-practical projects about uncommon ways of testing, such as architecture tests and chaos engineering.
Understanding Microsoft Teams Administration
This book provides solutions, best practices, tips, and workarounds to plan, design, customize, implement, and manage Microsoft Teams in any environment. This revised edition has been updated to reflect all the latest techniques and products, including migration from Skype for Business On-Prem to Microsoft Teams, along with Teams for Education, which includes a range of features and tools that enable teachers and students to collaborate, communicate, and learn in a virtual environment.The book begins with an overview of Microsoft Teams, including its architecture, teams/channels, audio/video meetings, and the phone system. The authors then take you deeper into deployment and management of teams, clients, guests and external access, and live events, followed by a walk-through of network assessment and bandwidth planning for Teams. Here, you will learn about deployment of quality of service and how to configure your phone systems using direct routing and calling plans. Moving forward, you will learn Microsoft Teams administration and policy management along with the migration process of Skype from Business On-Prem to Microsoft Teams. To wrap things up, the authors demonstrate some troubleshooting techniques for call quality issues in Teams, and walk you through various features of Teams for Education and how to utilize them.By the time you turn the last page of Understanding Microsoft Teams Administration, you'll be fully equipped to configure, customize, and control Teams with confidence. Don't just adapt to the future of collaboration—lead it.WHAT YOU WILL LEARN* Kickstart your journey: Get acquainted with the Teams architecture, from teams and channels to audio/video conferencing and beyond* Master the mechanics: Dive deep into deployment, including crucial aspects like guest access, such as events, and network assessment* Elevate call quality: Learn the nuts and bolts of Quality of Service (QoS) and phone systems, including direct routing and calling plans* Admin like a pro: Gain insights into robust policy management, and understand how to navigate the Teams admin portal with finesse* Get a grip on network assessment and bandwidth planning tailored specifically for Teams* Unlock secrets of quality of service, direct routing, and customized calling plans* Migration simplified: Seamlessly shift from Skype for Business On-Prem to Teams without missing a beat* Edu-tech unveiled: Explore Teams for Education and how its myriad features can enrich virtual learning experiences for teachers and students alike* What's new: A dedicated chapter exclusively covering Microsoft Teams for Education, focusing on empowering both educators and studentsWHO THIS BOOK IS FORAdministrators and technical consultants focused on Microsoft Teams. This book serves as an invaluable resource for those looking to optimize team collaboration and communication within their organizations.Balu Ilag is a luminary in the realm of unified communications and collaboration technologies. With an impressive career spanning over 17 years, Balu has carved a niche for himself in messaging, telecom, and modern workplace collaboration. He currently serves as an Office 365 and Collaboration Specialist at Juniper Networks, where he wears multiple hats—from product administration and development to strategic guidance for enterprise customers.Balu holds a plethora of distinguished certifications which reinforce his expertise in the field. He is a Microsoft Certified Trainer (MCT), Microsoft 365 Certified Teams Administrator Associate, and a Microsoft Certified Solutions Expert (MCSE) in communication and productivity. These credentials not only highlight his grasp over Microsoft technologies but also signify his commitment to continuous learning and excellence.An avid writer, Balu has authored an array of blog posts on his blog site www.bloguc.com that serve as a treasure trove of insights on unified communication and collaboration technologies. Whether you're looking for a comprehensive how-to guide or best practices for troubleshooting, chances are Balu has penned a blog post about it. His writings reflect his deep understanding of the complexities involved in modern workplace technologies, making them an invaluable resource for professionals and enthusiasts alike.VIJAY IREDDY is a highly skilled technology professional passionate about innovation and digital transformation. He has extensive experience and expertise with a range of Microsoft and UC Certifications, including being certified as a Teams Administrator Associate, Support Specialist, and Collaboration Communication System engineer.As a Modern Communications Architect at Cyclotron, Vijay works with organizations to evaluate their existing communication and collaboration platforms and helps them transition to the modern Microsoft Teams platform. He has a proven track record of implementing Microsoft Teams with industry-specific best practices while ensuring governance and security. He is dedicated to delivering effective solutions that meet each organization's unique needs and staying up-to-date with the latest technological advancements to help his clients achieve their business goals.Chapter 1: Microsoft Teams Overview.- Chapter 2: Managing and controlling Microsoft Teams.- Chapter 3: Organization Readiness for Microsoft Teams.- Chapter 4: Teams Audio Conferencing and Phone system management.- Chapter 5: Microsoft Teams Governance and lifecycle management.- Chapter 6: Migration from Skype for Business (Lync) on-prem and online to Microsoft Teams.- Chapter 7: Microsoft Teams troubleshooting approaches.- Chapter 8: Teams Reporting and Monitoring. – Chapter 9: Microsoft Teams for Education. - Chapter 10: Microsoft Teams Learning to the Next Level and Get Certified.
Building Real-Time Marvels with Laravel
Dive into the diverse facets of the Laravel ecosystem. This comprehensive guide will put you on the fast track to becoming an expert in Laravel development.Starting with the fundamentals, you’ll explore essential concepts, enabling you to grasp the framework's structure. Subsequent chapters cover intricate topics, such as advanced routing techniques, database management, and eloquent object relational mapping (ORM), allowing developers to build robust applications. The book offers comprehensive insights into building secure applications with authentication and authorization mechanisms, as well as constructing efficient APIs and employing caching techniques for enhanced performance.Chapters on real-time applications and queues offer practical knowledge to optimize application responsiveness. Advanced package development and performance monitoring provide valuable tools for developing high-quality Laravel packages and debugging. You’ll also gain expertise in internationalization, front-end development, and database optimization.Building Real-Time Marvels with Laravel doesn't shy away from the latest trends, featuring chapters on serverless computing, progressive web applications (PWAs), and UI/UX design patterns. It also emphasizes security, DevOps, and infrastructure automation. Bonus appendixes feature a handy Laravel cheat sheet, recommended resources, and a glossary of essential terms, making it a comprehensive reference for Laravel enthusiasts.WHAT YOU WILL LEARN* Gain a comprehensive understanding of advanced routing, database management with eloquent ORM, authentication, and API development.* Study caching, database query optimization, queuing, and scaling strategies for high-traffic applications* Explore advanced middleware, real-time applications, testing, and package development WHO THIS BOOK IS FORIntermediate to advanced developers.SIVA SELVARAJ work focuses on modern technologies and industry best practices. These topics include frontend development techniques using HTML5, CSS3, and JavaScript frameworks; implementing responsive web design and optimizing user experience across devices; building dynamic web applications with server-side languages such as PHP, WordPress, and Laravel; and Database management and integration using SQL and MySQL databases He loves to share his extensive knowledge and experience to empower readers to tackle complex challenges and create highly functional and visually appealing websites.Chapter 1: Understanding the Laravel Ecosystem.- Chapter 2: Advanced Routing Techniques.- Chapter 3: Database Management and Eloquent ORM.- Chapter 4: Authentication and Authorization.- Chapter 5: Building APIs with Laravel.- Chapter 6: Caching and Performance Optimization.- Chapter 7: Advanced Middleware Techniques.- Chapter 8: Real-Time Applications with Laravel.- Chapter 9: Testing and Test-Driven Development.- Chapter 10: Queues and Job Scheduling.- Chapter 11: Advanced Package Development.-Chapter 12: Performance Monitoring and Debugging.- Chapter 13: Scaling Laravel Applications.- Chapter 14: Security Best Practices.- Chapter 15: Advanced Performance Optimization.- Chapter 16: Continuous Integration and Deployment.- Chapter 17: Laravel and Microservices.- Chapter 18: Advanced Laravel Debugging and Troubleshooting.-Chapter 19: Building Internationalized Applications with Laravel.- Chapter 20: Advanced Frontend Development with Laravel.- Chapter 21: Advanced Error Handling and Exception Management.- Chapter 22: Advanced Database Techniques and Optimization.- Chapter 23: Laravel and Serverless Computing.- Chapter 24: Building Progressive Web Applications (PWAs) with Laravel.- Chapter 25: Advanced UI/UX Design Patterns for Laravel.- Chapter 26: Advanced Analytics and Reporting in Laravel.- Chapter 27: Building Microservices with Laravel and Docker.- Chapter 28: Advanced Third-Party Integrations.- Chapter 29: Securing Laravel Applications.- Chapter 30: Advanced DevOps and Infrastructure Automation Appendix A: Laravel Cheat Sheet .- Appendix B: Recommended Resources.- Appendix C: Glossary of Terms
Lean Game Development
Master Lean UX and Lean Startup techniques to improve your agile game development experience beyond Scrum. This updated version of the book focuses on applying lean and agile methodologies to the game development process and features improved examples, applied techniques, and a whole new section explaining how to test a game in Unity with CI.You'll see how to define a minimum viable product (MVP) for games with Lean Canvas, allowing customers to iterate over it and collect feedback for improvement at every cycle. All of these are achieved while still using standard Agile techniques. The first part of the book explains the ideation process of a game and how lean methodologies allow developers, especially small studios, to avoid scope creep. Next, it it provides guidance on creating MVPs and using player feedback to iterate and improve games. The book then discusses continual improvement (CI) methods. A crucial part of CI is generation of Lean Canvas.Lean Game Development, Second Edition shows you how to iterate until you develop a game that satisfies developers, gamers, and your studio's financial goals.WHAT YOU'LL LEARN* Study lean and agile methodologies to enhance the game development process * Find out how to improve the way game productions define value and iterate over it* Apply development strategies to enrich the game development processWHO THIS BOOK IS FORPeople from all sectors of the gaming industry will find the book useful in planning their project in a more iterative way, unloading the management burden on the development process and collecting feedback to improve the game content as early as possible.Julia Naomi Rosenfield Boeira has been a software engineer for over a decade, focusing on Game Development and Online Service. Currently, she works as a team lead at Ubisoft; previously she worked as an online engineer. She has also worked with premium agile consultancy companies such as Thoughtworks and is extremely active on GitHub with focus on Game Development and Rust.Chapter 1: IntroductionSub –Topics• Why lean game development, not agile game development?• How do lean and agile relate to the game world?• Games and software relate much more deeply.• What kind of game is software development?• Where did it go wrong?• SummaryChapter 2: First steps with LeanSub – Topics• Seven key principles of lean• Lean inception• Lean PMO• Lean DevOps• Kanban• How can you take advantage of Scrum• Continuous integration• Going from build-measure-learn to lean game• Looking deeper at the inception• Test driven development• Lean and Games• SummaryChapter 3: An Inception in practiceSub - Topics:• How and why, we did an Inception• How was our inception?• Prioritizing ideas• Persona development• Next Steps with lean• How does the game look like from the inception perspective• SummaryChapter 4: Do we really need a MVPSub - Topics:• MVP and MVG Defined• Building Prototypes• The Product Owner role in MVP/prototype• Getting more from less• Recognizing when a game is not viable• Thinking simpler first• From MVP Canvas to Lean Game Development• MVGs and prototypes of Super Jujuba Sisters• SummaryChapter 5: Examples of MVGsSub - Topics:• Guerrilla Games: From Killzone FPS to open world Horizon Zero Dawn- Conception- Thunderjaw (core mechanic example)- Open World- Vegetation System- Proof of Concept- Pre-production- Production• Archero: Casual Games as a Great Lean Process• Dead cells: Quick feedback loop- Dead cells Core Concept- Expanding to multiplayer- Pivoting Tower Defense- MVPChapter 6: Generating HypothesisSub - Topics:• When hypothesis are not created from the InceptionChapter 7: Test Driven DeveopmentSub - Topics:• TDD defined• Tests are good, but then why there is so much poorly tested code?• Applying TDD to games• Next steps to improve TDDChapter 8: Continuous IntegrationSub - Topics:• Why continuous integration• Using continuous integration• Code versioning• Automated build• SummaryChapter 9: The world between Design and BuildSub - Topics:• A little bit about Design• A little bit about Build• Pretty Beautiful, but how is it done?• SummaryChapter 10: Test, Code, TestSub - Topics:• Testing types• Test cases• Coding game art work• Coding the game software• Test automation• SummaryChapter 11: Measuring and AnalyzingSub - Topics:• Ways of measuring• Feedback• More on feedback• Other ways of measuring• Measuring through hypothesis• Analyzing• SummaryChapter 12: Creating ideas for iteratingSub - Topics:• Action Items• The features are OK, but the game is not fun• The Game is fun but very difficult to play• Rethink the limitations on Game Development• Tying things together• SummaryChapter 13: Consolidating Knowledge before ExpandingSub - Topics• Automated testing• Agile methodologies• Art and Iteration process• Avoiding Time Waste• Continuous Delivery• SummaryChapter 14: More about gamesChapter 15: Example game using Automated testing for game developmentSub - Topics• Setting up Unity for testing.• Creating testing scenes and objects• Setting up a CI for Unity• Testing Gameplay, how to test character controllers• More testing scenarios for games• How to test ECS with Bevy Engine• Summary
Productizing Quantum Computing
Leverage the benefits of quantum computing by identifying business use cases and understanding how to design and develop quantum products and services. This book will guide you to effectively productize quantum computing, including best practices, recommendations, and proven methods to help you navigate the challenges and risks of this emerging technology.The book starts with a thorough introduction to quantum computing, followed by its various algorithms and applications. You will then learn how to build a strong foundation in classical computing, seek practical experience, and stay up-to-date with the latest developments in the field. Moving forward, you will gain an understanding of how to conduct market research to identify business opportunities for quantum computing products and services. The authors then guide you through the process of developing a quantum roadmap and integrating quantum computing into an existing system. This is concluded by a demonstration of howto manage quantum computing projects and how to address their risks and challenges.After reading this book, you will understand quantum computing and how it can be applied to real-world business problems.WHAT YOU WILL LEARN* Identify business use cases for quantum computing and understand the potential benefits and risks of quantum applications* Design and develop quantum products and services by identifying quantum algorithms, programming in quantum languages, and leveraging quantum simulators and hardware* Integrate quantum computing into existing systems* Integrate quantum algorithms with classical algorithmsWHO THIS BOOK IS FORProduct managers, developers, and entrepreneurs who wish to use the potential of quantum computing for their businesses.DHAIRYYA AGARWAL is a product manager at Microsoft. He is based out of Mountain View, California where he is honing his product management skill set by solving problems in the email and collaboration security space. He received his master’s degree from Carnegie Mellon University in Software Management. He has delivered on many initiatives focused on improving retention, activation, and engagement. He has also worked across 0 to 1 products to enable businesses to enter a new markets.SHALINI D is a quantum AI researcher at Fractal QuantumAI Lab researching quantum algorithms at the intersection of quantum chemistry and quantum machine learning. Previously, she worked at Infosys as a systems engineer, where she worked as a core customization API developer. She has completed her naster's in quantum technology from CSIC-Universidad Internacional Menendez Pelayo, Spain. Her research areas include semiconductor spin qubits, quantum machine learning, and quantum chemistry. She has taught quantum computing, from basic to advanced levels, at many universities, including Vellore Institute of Technology, India. She has also delivered several talks at various universities. Her Udemy course on the Qiskit Developer Exam is the highest-rated and bestseller globally.SRINJOY GANGULY is a quantum AI research scientist at Fractal QuantumAI Lab and a clinical Professor of Practice for Quantum Technology at Woxsen University. He is also an Associate Supervisor (adjunct) at the University of Southern Queensland in Australia, supervising PhD students in Quantum Machine Learning. He is an IBM Qiskit Advocate and an IBM Quantum Educator with over 5+ years of experience in quantum technologies. He is the author of the book Quantum Computing with Silq Programming, and has published several research papers in quantum chemistry, quantum machine learning, and quantum NLP. He possesses a triple master's in Quantum Technologies, Quantum Computing Technology and Artificial Intelligence (AI) from CSIC-UIMP, Spain, Universidad Politecnica de Madrid and the University of Southampton, respectively. His research interests include superconducting quantum circuits, hybrid superconducting-semiconducting heterostructures (1D & 2D), topological quantum computing, spin qubits, quantum machine learning, quantum chemistry, quantum natural language processing and quantum AI. Chapter 1: Introduction to Quantum Computing.- Chapter 2: Quantum Algorithms and Applications.- Chapter 3: Continue Learning About Quantum Computing.- Chapter 4: Assessing the Market and Competitive Landscape.- Chapter 5: Designing Quantum Products and Services.- Chapter 6: Developing a Quantum Roadmap.- Chapter 7:Integrating Quantum Computing into an Existing System.- Chapter 8:Releasing Quantum Computing-based Products.- Chapter 9: Challenges and Risk in Productizing Quantum Computing.
CISSP Exam Certification Companion
This is a comprehensive guide for individuals preparing for the Certified Information Systems Security Professional (CISSP) exam. The book's main focus is to provide readers with a wealth of practice questions and expert tips to help them pass the CISSP exam.The demand for certified information security professionals continues to increase, and the CISSP exam is widely recognized as one of the most challenging and comprehensive information security certification exams. This book will provide readers with the practice and exam strategies they need to pass the CISSP exam and launch their careers in information security. It covers all of the topics tested on the exam, including security management practices, access control systems and methodology; laws, regulations, standards, and compliance; and telecommunications and network security.In addition to providing practice questions, this book also includes background information on the CISSP exam, including the exam format, content, and best ways to study for the exam. It is designed to be user friendly and easy to follow, with clear explanations and examples for all the practice questions.WHAT YOU WILL LEARN* Gain a comprehensive understanding of the CISSP Common Body of Knowledge (CBK)* Gain background information on the CISSP exam, including the exam format, content, and best ways to study for the exam* Develop the critical thinking skills that are essential for success on the CISSP exam* Master test-taking strategies for successfully passing the CISSP exam* Prepare through a realistic simulation of the actual CISSP examWHO THIS BOOK IS FOR:Individuals preparing for the Certified Information Systems Security Professional (CISSP) exam—someone who has a background in information technology or information security and is looking to pass the CISSP exam and become a CISSP-certified professional.Secondary audiences include information technology professionals looking to expand their knowledge and skills in the field of information security, individuals interested in pursuing a career in information security and considering the CISSP certification, and current or aspiring information security managers who want to advance their careers and take on more responsibilities in their organizations.MOHAMED ALY BOUKE, PhD, CISSP, is an acclaimed cybersecurity expert, educator, and IT certification specialist with over a decade of multifaceted experience. He currently holds dual roles: Cybersecurity Researcher at University of Putra Malaysia and Senior Instructor at Certangle, LLC. His scholarly contributions span Cyber Security, Machine Learning, and Network Security research. Renowned for his pedagogical prowess, Dr. Bouke has conducted numerous training sessions for IT certifications, including ISACA, (ISC)², CompTIA, and Microsoft. Many students have successfully passed their certification exams under his guidance, cementing his reputation as an IT certification expert.Aside from his rich academic background—which encompasses participating in many conferences and generating an extensive array of publications in cybersecurity and artificial intelligence— Dr. Bouke is also a respected reviewer for prestigious journals and publishers such as Packt Publishing, Elsevier, and IEEE.On the corporate front, he has utilized his training expertise with well-regarded companies such as KnowledgeHut. His comprehensive consulting experience encompasses collaborations with international organizations focused on strengthening their cybersecurity infrastructure.Holding multiple certifications, including CISSP, Dr. Bouke brings to this book not only a wealth of theoretical understanding but also practical, hands-on experience. Intended as a comprehensive guide, this book emerges as an indispensable resource for cybersecurity professionals at all stages of their careers. For additional learning resources and insightful tips, visit Dr. Bouke's website, bukacert.com.Chapter 1: Introduction.- Chapter 2: CISSP Exam Format and Content.- Chapter 3: Security and Risk Management.- Chapter 4: Asset Security.- Chapter5: Security Architecture and Engineering.- Chapter 6: Communications and Network Security.- Chapter 7: Identity and Access Management.- Chapter 8: Security Assessment and Testing.- Chapter 9: Security Operations.- Chapter 10: Software Development Security.- Chapter 11: Test-taking Strategies and Tips.- Chapter 12: Conclusion.
From PHP to Ruby on Rails
Are you a PHP developer looking to take your first steps into the world of Ruby development? From PHP to Ruby on Rails will help you leverage your existing knowledge to gain expertise in Ruby on Rails. With a focus on bridging the gap between PHP and Ruby, this guide will help you develop the Ruby mindset, set up your local environment, grasp the syntax, master scripting, explore popular Ruby frameworks, and find out about libraries and gems.This book offers a unique take on Ruby from the perspective of a seasoned PHP developer who initially refused to learn other technologies, but never looked back after taking the leap. As such, it teaches with a language-agnostic approach that will help you feel at home in any programming language without learning everything from scratch. This approach will help you avoid common mistakes such as writing Ruby as if it were PHP and increase your understanding of the programming ecosystem as a whole.By the end of this book, you'll have gained a solid understanding of Ruby, its ecosystem, and how it compares to PHP, enabling you to build robust and scalable applications using Ruby on Rails.
Das verflixte Selbst
Menschen schreiben sich ein Selbst zu. Die Wissenschaften haben Mühe zu sagen, was das ist und wie es zustande kommt. Sie sind sich aber sicher, dass wir es haben und brauchen. Für Forscher ist es jedoch kaum greifbar und deshalb ein verflixtes Problem. Daran wird die Entwicklung einer starken KI scheitern, Menschen bleiben etwas anderes.Einleitung.- Die Stunde Null.- Vorteile der Sterblichkeit.- Die Erfindung des Selbst.- Ohne Selbsttäuschung geht es nicht Nagelprobe.- Moral.- Warum der Liberalismus einen Neustart braucht.
Die digitale Transformation in der Filmindustrie
In einer sich ständig wandelnden Welt beleuchtet der Leitfaden die ökonomischen, kulturellen und organisatorischen Aspekte der digitalen Transformation in der Filmindustrie. Es wird untersucht, wie Streaming-Plattformen Geschäftsmodelle beeinflussen und welche Vorteile Produzenten daraus ziehen können. Mit Beiträgen von Alexander Thul und René Jamm, entwickelt im Dialog mit Branchenexperten, bietet das Buch Strategien und Kenntnisse, um in der digitalen Medienlandschaft erfolgreich zu navigieren und von der digitalen Transformation zu profitieren.
Mapping the Enterprise
One of the hardest tasks strategists and enterprise architects face is mapping an enterprise in a form that creates and supports making sense of the whole. This book introduces an alternate approach to create consistency at every level by modelling the enterprise as services with the Enterprise Canvas.This new model type that can be used to describe just about anything in any area and at any level of the enterprise, and that acts as a consistent frame for all the other models that we need in our architectures. It is also simple enough to scribble on the back of a napkin - and engage all of your stakeholders in the enterprise-scale conversations you need. There is also a simple notation for Enterprise Canvas that is suitable for use in service-design toolsets.The book teaches the use of architectural techniques to describe any aspect of the enterprise. It will help you identify the business reasons and business value for every activity, and you will also learn how to align strategy, tactics and operations to enterprise vision and values. By the end of this book, you will understand how an enterprise works as a web of services, and what needs to be done to make your enterprise work in the best possible way.WHAT YOU'LL LEARN* Gain insight into the concepts of service to enhance agility, adaptability and resilience.* Understand how to enhance efficiency and effectiveness throughout the enterprise.* Grasp how an enterprise is made up of services that each serve an overall set of needs WHO THIS BOOK IS FOREnterprise architects, Business architects, IT architects and process designers. TOM GRAVES has been an independent consultant for more than four decades, in systems development, business transformation, enterprise architecture and knowledge management. His clients in Europe, Australasia and the Americas cover a broad range of industries including small-business, banking, utilities, manufacturing, logistics, engineering, media, telecoms, research, defense and government. He has a special interest in whole-enterprise architectures for non-profit, social, government and commercial enterprises.Chapter 1: What is the Enterprise Canvas?.- Chapter 2: The Nature of Service.- Chapter 3: Service Context and Market.- Chapter 4: Service Vision and Values.- Chapter 5: Service Layers.- Chapter 6: Service Actors and Other Entities.- Chapter 7: Service Roles and Relationships.- Chapter 8: Service Structure.- Chapter 9: Service Flows.- Chapter 10: Service Guidance.- Chapter 11: Service investors and Beneficiaries.- Chapter 12: Service Decomposition.- Chapter 13: Service Content.- Chapter 14: Services as Systems.- Chapter 15: Example Patterns.- Chapter 16: Integration with Architectures.- Chapter 17: Rethinking Vision Bottom-up.- Appendix A: Enterprise Canvas – a Visual Summary.- Appendix B: Working with Business Model Canvas.- Appendix C: Enterprise Canvas Notation.- Appendix D: Sources and Resources.
Learning VMware Workstation for Windows
Master VMware Workstation to create and run virtual machines, containers, and Kubernetes clusters simultaneously on physical devices without having to reformat or dual boot the underlying device. This book provides a practical, step-by-step guide to creating and managing virtual machines using VMware Workstation, a software solution that provides a type-2 hypervisor, or desktop hypervisor, that runs on x64 Windows and Linux-based operating systems. This book focuses on the Windows version.You’ll start with an overview of hypervisors and desktop hypervisors. You'll then look at resources, such as CPU, memory, and networking, and how they are configured in a virtual environment. In the final chapters, you’ll learn how to configure Workstation Pro to run and manage virtual machines before going on to build example virtual machines, including how to build a nested vSphere environment. Once built you’ll see how to manage these virtual machines, before finally upgrading your VMware Workstation Pro environment.In the end, you’ll learn how to build and manage different virtual machines running on different operating systems and build an ESXi lab environment with VMware Workstation.WHAT YOU'LL LEARN* Examine hypervisors and desktop hypervisors* Understand how to install and configure VMware Workstation* Gain practical knowledge on building and managing virtual machines on different OSs* Support and troubleshoot VMware Workstation environments.WHO THIS BOOK IS FORDevelopers, IT professionals that remote, home, and BYODPeter von Oven is an experienced technical consultant working closely with customers, partners, and vendors in designing technology solutions, to meet business needs and deliver outcomes. During his career, Peter has presented at key IT events such as VMworld, IP EXPO, and various VMUGs and CCUG events across the UK. He has also worked in senior presales roles and presales management roles for Fujitsu, HP, Citrix, and VMware, and has been awarded VMware vExpert for the last nine years in a row and vExpert EUC for the last three consecutive years. In 2021, Peter added the vExpert Desktop Hypervisor award to his portfolio of awards. In 2016, Peter founded his own company specializing in application delivery. Today he works with partners and vendors helping drive and deliver innovative technology solutions. He is also an avid author, having now written 18 books and made videos about VMware end-user computing solutions. In his spare time, Peter volunteers as a STEM Ambassador, working with schools and colleges, helping the next generation develop the skills and confidence in building careers in technology. He is also a serving Royal Air Force Reservist working as an instructor with the Air Cadet organization.1. Introduction to hypervisors2. Introduction to VMware Workstation3. Configuring CPU resources4. Configuring Storage Resources5. Configuring Network Resources6. Virtual hardware7. Installing VMware Workstation8. A guided tour of the UI9. Creating a Windows VM10. Installing VMware vSphere11. Configuring VM options12. Managing and working with existing VMs13. Upgrading to a new version of Workstation
Unleashing The Power of ChatGPT
Explore the role ChatGPT can play in business, including operations, marketing, sales, and delivery. This concise book illustrates how ChatGPT is changing the way individuals interact with machines and how you can take advantage of its capabilities for business.The book starts with an overview of ChatGPT and its impact in the realm of of conversational AI. You will then dive into the technical aspects of ChatGPT and gain an understanding of how machine learning algorithms and natural language processing work in the background. Various business applications of ChatGPT are then discussed, followed by how it can get integrated into your business operations. To wrap things up, you will gain insight into the data and privacy elements that need to be considered while using ChatGPT, and how to maintain its integrity.After completing this book, you will understand the ChatGPT framework and how to integrate it into your own ventures.WHAT YOU WILL LEARN* Understand the various technologies and techniques utilized in ChatGPT* Gain insight into the future of human-machine interaction* Analyze the advantages and disadvantages of ChatGPT for your industry* Explore the ethical implications of using AI WHO THIS BOOK IS FORTech enthusiasts who are passionate about artificial intelligence (AI), machine learning, and human-machine interaction.CHARLES WAGHMARE has worked for a global energy leader since 2019 as a Business Analyst in the Microsoft 365 space. Before that, he worked at Capgemini for eight years in various roles, including Yammer Community Manager and manager of the Drupal-based Enterprise Knowledge Management system. He also developed a knowledge management platform for the Digital Customer Experience (DCX) organization using SharePoint Online to manage Client references and knowledge assets related to Artificial Intelligence and customer experience (CX), using Microsoft Azure Chatbots to automate processes, develop proactive conversations with users, and create new use cases.Charles also worked for ATOS (erstwhile SIEMENS Information Systems limited) for five years. During his tenure there, he was Community Manager of SAP-based communities, where he utilized Technoweb 2.0 – a Yammer-like platform and on-premises SharePoint. Also, Charles was global rollout manager for a structured document-management system built in on-premises SharePoint.Charles loves reading motivational books in his spare time, his favorite being The Monk who sold his Ferrari.Chapter 1: Introduction to ChatGPT.- Chapter 2: Understand ChatGPT’s Underlying Technology. - Chapter 3: Real World Applications for ChatGPT.-Chapter 4: Enhancing Business Communication with ChatGPT.- Chapter 5: Implementing AI Conversation in Business.- Chapter 6: Security and Ethical Considerations When Using ChatGPT.
Pro Spring Security
Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications.Pro Spring Security, Third Edition has been updated to incorporate the changes in Spring Framework 6 and Spring Boot 3. It is an advanced tutorial and reference that guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground up.This book also provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and JSON Web Token applications.WHAT YOU WILL LEARN* Explore the scope of security and how to use the Spring Security Framework* Master Spring security architecture and design * Secure the web tier in Spring * Work with alternative authentication providers* Take advantage of business objects and logic security* Extend Spring security with other frameworks and languages* Secure the service layer* Secure the application with JSON Web TokenWHO THIS BOOK IS FORExperienced Spring and Java developers with prior experience in building Spring Framework or Boot-based applicationsMASSIMO NARDONE has more than 27 years of experience in information and cybersecurity for IT/OT/IoT/IIoT, web/mobile development, cloud, and IT architecture. His true IT passions are security and Android. He has been programming and teaching how to program with Android, Perl, PHP, Java, VB, Python, C/C++, and MySQL for more than 27 years. He holds an M.Sc. degree in computing science from the University of Salerno, Italy. Throughout his working career, he has held various positions starting as programming developer, then security teacher, PCI QSA, Auditor, Assessor, Lead IT/OT/SCADA/SCADA/Cloud Architect, CISO, BISO, Executive, Program Director, OT/IoT/IIoT Security Competence Leader, etc.In his last working engagement, he worked as a seasoned Cyber and Information Security Executive, CISO and OT, IoT and IIoT Security competence Leader helping many clients to develop and implement Cyber, Information, OT, IoT Security activities.His technical skills include Security, OT/IoT/IIoT, Android, Cloud, Java, MySQL, Drupal, Cobol, Perl, web and mobile development, MongoDB, D3, Joomla!, Couchbase, C/C++, WebGL, Python, Pro Rails, Django CMS, Jekyll, and Scratch. He has served as a visiting lecturer and supervisor for exercises at the Networking Laboratory of the Helsinki University of Technology (Aalto University).He stays current to industry and security trends, attending events, being part of a board such as the ISACA Finland Chapter Board, ISF, Nordic CISO Forum, Android Global Forum, etc.He holds four international patents (PKI, SIP, SAML, and Proxy areas). He currently works as a Cyber Security Freelancer for IT/OT and IoT. He has reviewed more than 55 IT books for different publishers and has coauthored Pro JPA 2 in Java EE 8 (Apress, 2018), Beginning EJB in Java EE 8 (Apress, 2018), and Pro Android Games (Apress, 2015).CARLO SCARIONI is a passionate software developer, motivated by learning and applying innovative and interesting software development tools, techniques, and methodologies. He has worked for more than 18 years in the field and moved across multiple languages, paradigms, and subject areas. He also has many years of experience working with Java and its ecosystem. He has been in love with Spring since the beginning and he is fascinated by how Spring allows building complex applications out of discrete, focused modules and by the clever use of decorators to add cross-cutting functionalities. In the last few years he has been working mostly with data engineering solutions. He has been creating solutions around the use of modern data stack components in cloud environments, while at the same time developing software using technologies such as Spark, Python, and others.
Symmetric Cryptography, Volume 1
Symmetric cryptology is one of the two main branches of cryptology. Its applications are essential and vital in the Information Age, due to the efficiency of its constructions.The scope of this book in two volumes is two-fold. First, it presents the most important ideas that have been used in the design of symmetric primitives, their inner components and their most relevant constructions. Second, it describes and provides insights on the most popular cryptanalysis and proof techniques for analyzing the security of the above algorithms. A selected number of future directions, such as post-quantum security or design of ciphers for modern needs and particular applications, are also discussed.We believe that the two volumes of this work will be of interest to researchers, to master’s and PhD students studying or working in the field of cryptography, as well as to all professionals working in the field of cybersecurity.CHRISTINA BOURA is an associate professor at the University of Versailles, France, who works on symmetric cryptography. She is a well-recognized member of the cryptographic community, having served on many program committees and as editor-in-chief of the ToSC IACR journal.MARÍA NAYA-PLASENCIA is a research director at Inria, France, who also works on symmetric cryptography. She obtained an ERC grant in 2016 and the Young Researcher Prize from Inria-Académie des Sciences in 2019, and has given several invited keynote talks.Preface xiChristina BOURA and María NAYA-PLASENCIAPART 1 DESIGN OF SYMMETRIC-KEY ALGORITHMS 1CHAPTER 1 INTRODUCTION TO DESIGN IN SYMMETRIC CRYPTOGRAPHY 3Joan DAEMEN1.1 Introduction 31.2 Cryptographic building blocks 31.2.1 The block cipher and its variants 41.3 Differentially uniform functions 51.4 Arbitrary-length schemes 51.4.1 Modes and constructions 61.4.2 Dedicated schemes 71.4.3 Modes and constructions versus primitives 71.5 Iterated (tweakable) block ciphers and permutations 81.5.1 Cryptanalysis and safety margin 81.5.2 Designing the round function of primitives 91.6 A short history 101.6.1 The data encryption standard 101.6.2 The block cipher FEAL 111.6.3 Differential and linear cryptanalysis 111.6.4 The block cipher IDEA 121.6.5 The advanced encryption standard 121.6.6 Cache attacks 131.6.7 KECCAK 141.6.8 Lightweight cryptography 151.7 Acknowledgments 151.8 References 15CHAPTER 2 THE DESIGN OF STREAM CIPHERS 21Chaoyun LI and Bart PRENEEL2.1 Introduction 212.1.1 What is a synchronous additive stream cipher? 212.1.2 Generic construction 232.1.3 Generic attacks 242.1.4 Open competitions 252.1.5 Standards 262.2 Constructions based on FSRs 272.2.1 LFSR-based constructions 272.2.2 NFSR-based constructions 282.3 Table-based constructions 292.4 Block ciphers and permutations in stream cipher mode 292.4.1 Block cipher modes OFB and CTR 302.4.2 Permutations in stream cipher mode 302.5 Authenticated encryption (AE) 312.5.1 Block ciphers and permutations in stream cipher modes 322.6 Emerging low-complexity stream ciphers 332.7 References 34CHAPTER 3 BLOCK CIPHERS 39Orr DUNKELMAN3.1 General purpose block ciphers 413.1.1 Feistel block ciphers 423.1.2 Substitution permutation networks 433.2 Key schedule algorithms 443.3 Generic attacks 463.4 Tweakable block ciphers 483.5 Some positive results concerning security 493.6 The case of algebraic ciphers 513.7 References 53CHAPTER 4 HASH FUNCTIONS 55Gilles VAN ASSCHE4.1 Definitions and requirements 554.1.1 An ideal model: the random oracle 574.1.2 Expressing security claims 584.2 Design of hash functions 604.2.1 The Merkle-Damgård construction 604.2.2 Fixing the Merkle-Damgård construction 614.2.3 Building a compression function 624.2.4 Indifferentiability 644.2.5 The sponge construction 654.2.6 KECCAK, SHA-3 and beyond 674.3 Tree hashing 684.4 References 69CHAPTER 5 MODES OF OPERATION 73Gaëtan LEURENT5.1 Encryption schemes 735.1.1 Cipher block chaining 745.1.2 Counter mode 755.2 Message authentication codes 755.2.1 CBC-MAC 765.2.2 PMAC 775.2.3 Hash-based MACs 775.2.4 Wegman-Carter MACs and GMAC 785.3 Security of modes: generic attacks 785.3.1 The birthday bound 795.3.2 Generic attack against iterated MACs 795.3.3 Generic attack against Wegman-Carter MACs 805.3.4 Generic attack against CBC 805.3.5 Generic attack against CTR 805.3.6 Small block sizes 815.3.7 Misuse 815.3.8 Limitations of encryption 825.4 References 83CHAPTER 6 AUTHENTICATED ENCRYPTION SCHEMES 87Maria EICHLSEDER6.1 Introduction 876.2 Security notions 886.3 Design strategies for authenticated encryption 896.3.1 Generic composition 916.3.2 Dedicated primitive-based designs 926.3.3 Fully dedicated designs 946.3.4 Standards and competitions 956.4 References 96CHAPTER 7 MDS MATRICES 99Gaëtan LEURENT7.1 Definition 997.1.1 Differential and linear properties 1007.1.2 Near-MDS matrices 1017.2 Constructions 1017.3 Implementation cost 1027.3.1 Optimizing the implementation of a matrix 1037.3.2 Implementation of the inverse matrix 1047.4 Construction of lightweight MDS matrices 1047.4.1 Choice of the field or ring 1057.4.2 MDS matrices with the lowest XOR count 1057.4.3 Iterative MDS matrices 1067.4.4 Involutory MDS matrices 1077.5 References 108CHAPTER 8 S-BOXES 111Christina BOURA8.1 Important design criteria 1138.1.1 Differential properties 1138.1.2 Linear properties 1158.1.3 Algebraic properties 1168.1.4 Other properties 1178.2 Popular S-boxes for different dimensions 1178.2.1 S-boxes with an odd number of variables 1188.2.2 4-bit S-boxes 1188.2.3 8-bit S-boxes 1198.3 Further reading 1198.4 References 119CHAPTER 9 RATIONALE, BACKDOORS AND TRUST 123Léo PERRIN9.1 Lifecycle of a cryptographic primitive 1249.1.1 Design phase 1249.1.2 Public cryptanalysis 1259.1.3 Deployment? 1259.1.4 The limits of this process 1269.2 When a selection process fails 1269.2.1 Under-engineered algorithms 1279.2.2 Primitives with hidden properties 1289.3 Can we trust modern algorithms? 1319.3.1 Standardization and normalization 1319.3.2 Some rules of thumb 1329.4 References 133PART 2 SECURITY PROOFS FOR SYMMETRIC-KEY ALGORITHMS 135CHAPTER 10 MODELING SECURITY 137Bart MENNINK10.1 Different types of adversary models 13710.2 When is an attack considered successful? 13810.3 Random oracle 13810.4 Distinguishing advantage 13910.5 Understanding the distinguishing advantage 14110.5.1 Adversarial complexity 14110.5.2 Claiming security 14210.5.3 Breaking claims 14310.6 Adaptation to block ciphers 14310.6.1 Distinguishing advantage 14410.6.2 Security of AES 14510.7 Acknowledgments 14610.8 References 146CHAPTER 11 ENCRYPTION AND SECURITY OF COUNTER MODE 147Bart MENNINK11.1 Block encryption 14711.1.1 Padding 14811.1.2 Cipher block chaining 14911.2 Stream encryption 15011.2.1 Output feedback mode 15111.2.2 Counter mode 15211.3 Provable security of modes: the case of counter mode 15311.4 Acknowledgments 15611.5 References 156CHAPTER 12 MESSAGE AUTHENTICATION AND AUTHENTICATED ENCRYPTION 159Tetsu IWATA12.1 Message authentication 15912.1.1 WCS construction 16012.1.2 Provable security 16112.2 Authenticated encryption 16412.2.1 GCM, Galois/counter mode 16412.2.2 Provable security 16612.3 References 169CHAPTER 13 H-COEFFICIENTS TECHNIQUE 171Yannick SEURIN13.1 The H-Coefficients technique 17113.2 A worked out example: the three-round Feistel construction 17613.3 The Even-Mansour construction 17813.3.1 H-coefficients security proof 17913.3.2 Extension to multiple rounds 18113.4 References 182CHAPTER 14 CHI-SQUARE METHOD 183Mridul NANDI14.1 Introduction 18314.2 Preliminaries 18514.2.1 PRF-security definition 18514.2.2 Hypergeometric distribution 18614.3 Truncation of random permutation 18714.3.1 PRF-security of truncation 18814.4 XOR of random permutations 19014.5 Other applications of the chi-squared method 19214.6 Acknowledgments 19314.7 References 193PART 3 APPENDICES 195Appendix 1 Data Encryption Standard (DES) 197Christina BOURAAppendix 2 Advanced Encryption Standard (AES) 205Christina BOURA and Orr DUNKELMANAppendix 3 PRESENT 217Christina BOURAAppendix 4 KECCAK 223Christina BOURAList of Authors 231Index 233Summary of Volume 2 239
Hands-on Test-Driven Development
Learn to properly test Ruby and Ruby on Rails applications by first writing failing tests, and then by implementing application code to make the failing tests pass. This book will teach you how to employ test-driven development (TDD) using RSpec while building a blog from start to finish. By the end of the book, you will be ready to deploy their fully tested blog to their own production web server using the latest versions of Ruby 3 and Ruby on Rails 7.The biggest challenge with learning and becoming comfortable with test-driven development is that software engineers often cannot imagine what writing a failing test looks like in practice. They write their implementation code first, and only then think about writing tests around their implementation code. This leads to tests that pass by accident, or tests that do not actually test anything. This book will give you the confidence to write tests in the RSpec domain-specific language. You will see your tests fail "properly" before proceeding with writing any implementation code to get them to pass.This book covers the latest techniques for writing RSpec tests, including "system" specs, and the often overlooked "view" specs, and how to integrate RSpec with other tools like Capybara, headless Chrome, and the new web driver gem. It also covers FactoryBot for mock test data and offers experienced advice on how to avoid creating tests that fail randomly.WHAT YOU WILL LEARN* Build a blog application from start to finish using test driven development* Install and explore popular tools used in professional Ruby software engineering* Evaluate the benefits of effective testing in RSpec* Explore Capistrano for advanced user interface testingWHO IS THIS BOOK FORBeginner to intermediate Ruby software engineers who are interested in learning to use TDD with RSpec to test and build web applications using Ruby on Rails. Readers should have some basic experience with Ruby and Ruby on Rails and have read the "Getting Started with Rails" guide, or something similar. GREG DONALD has been a professional software engineer since 1996 and has worked with Ruby on Rails since 2006. Prior to that, he worked on many Perl and PHP projects, often finding the lack of tests made them hard to maintain and extend. After having seen the results of software written using different testing methods, he became a test driven development enthusiast and practitioner, determining no other method would ever be more successful in producing quality software than TDD. He decided to write this book to promote TDD and share his positive experiences using it.Chapter 1: Intro.- Chapter 2: What is Test-Driven Development?.- Chapter 3: Getting started with Ruby.- Chapter 4: Getting started with Ruby on Rails.- Chapter 5: Setting up RSpec and FactoryBot.- Chapter 6: Adding Initial Models.- Chapter 7: Creating Pages.- Chapter 8: Build Homepage Contents.- Chapter 9: Side Bar Contents.- Chapter 10: Page Tags.- Chapter 11: Images.- Chapter 12: User Authentication.- Chapter 13: Administration.- Chapter 14: Odds and Ends.- Chapter 15: Deploy to Production.
ISO 27001: 2022/2023
Ein qualifiziertes Management der Informationssicherheit ist heutzutage für jede Organisation unverzichtbar. Die Normenreihe ISO 27000 ist dabei ein anerkannter „Wegweiser“ zu diesem Ziel. Im internationalen Kontext ist ihre Erfüllung für viele Organisationen ein wichtiger Wettbewerbsfaktor. Auch in Deutschland hat diese Normenreihe Eingang in Vorgaben, Regelungen und Gesetze zum Thema Informationssicherheit gefunden.Das vorliegende Buch kommentiert vor diesem Hintergrund die aktuellen Normen ISO 27001 und ISO 27002 (Ausgabe 2022/2023): Nach einer Einführung in die Normenreihe und ihren Fachbegriffen werden die Anforderungen an das Managementsystem für Informationssicherheit (ISMS) detailliert erklärt und mit zahlreichen Hinweise zur Umsetzung versehen. Im Anhang der ISO 27001 sind die sog. Controls aufgeführt, die in der neuen Normfassung komplett umstrukturiert und an vielen Stellen geändert wurden. Das Buch behandelt ausführlich alle Controls und gibt viele Beispiele für ihre Anwendung.Mit dem Erscheinen der neuen Normfassungen müssen sich viele Organisationen entsprechend umstellen – nicht zuletzt auch im Zusammenhang mit Zertifizierungen. Das Buch bietet hier einen ausführlichen Fahrplan zur Migration auf die neuen Normen.DR. HEINRICH KERSTEN ist IT-Sicherheitsexperte, Auditor und Zertifizierer (u.a. beim BSI und bei der Telekom) sowie Seminarleiter und Fachbuchautor.KLAUS-WERNER SCHRÖDER ist freiberuflicher IT-Sicherheitsberater mit Erfahrungen als ISO-27001-Auditor und als Zertifizierer, Evaluator und Berater für Common Criteria.Die Anforderungen an ein Informationssicherheits-Managementsystem (ISMS).- Die Controls der neuen Normen und ihre Systematik.- Praxis: Übergang von den alten zu den neuen Normfassungen.- Audits zielorientiert vorbereiten und durchführen.
Machine Learning Applications
MACHINE LEARNING APPLICATIONSPRACTICAL RESOURCE ON THE IMPORTANCE OF MACHINE LEARNING AND DEEP LEARNING APPLICATIONS IN VARIOUS TECHNOLOGIES AND REAL-WORLD SITUATIONSMachine Learning Applications discusses methodological advancements of machine learning and deep learning, presents applications in image processing, including face and vehicle detection, image classification, object detection, image segmentation, and delivers real-world applications in healthcare to identify diseases and diagnosis, such as creating smart health records and medical imaging diagnosis, and provides real-world examples, case studies, use cases, and techniques to enable the reader’s active learning. Composed of 13 chapters, this book also introduces real-world applications of machine and deep learning in blockchain technology, cyber security, and climate change. An explanation of AI and robotic applications in mechanical design is also discussed, including robot-assisted surgeries, security, and space exploration. The book describes the importance of each subject area and detail why they are so important to us from a societal and human perspective. Edited by two highly qualified academics and contributed to by established thought leaders in their respective fields, Machine Learning Applications includes information on:* Content based medical image retrieval (CBMIR), covering face and vehicle detection, multi-resolution and multisource analysis, manifold and image processing, and morphological processing* Smart medicine, including machine learning and artificial intelligence in medicine, risk identification, tailored interventions, and association rules* AI and robotics application for transportation and infrastructure (e.g., autonomous cars and smart cities), along with global warming and climate change* Identifying diseases and diagnosis, drug discovery and manufacturing, medical imaging diagnosis, personalized medicine, and smart health recordsWith its practical approach to the subject, Machine Learning Applications is an ideal resource for professionals working with smart technologies such as machine and deep learning, AI, IoT, and other wireless communications; it is also highly suitable for professionals working in robotics, computer vision, cyber security and more. INDRANATH CHATTERJEE is a Professor in the Department of Computer Engineering, at Tongmyong University, South Korea. He received his PhD from University of Delhi, India and has authored several books and numerous, research papers. His areas of research are AI, computer vision, computation neuroscience and medical imaging. SHEETAL ZALTE is an Assistant Professor in the Department of Computer Science at Shivaji University, India. She earned her PhD from Shivaji University, India, and has published many research papers. Her research area is mobile adhoc networks.* Statistical similarity in machine learning* Development of machine learning-based methodologies for adaptive intelligent e-learning systems and time series analysis techniques* Time-series forecasting for stock market using convolutional neural networks.* Comparative study for applicability of color histograms for CBIR used for crop leaf disease detection.* Stock Index Forecasting Using RNN-Long Short Term Memory* Study and analysis of machine learning models for detection of phishing URLs* Real-world applications of blockchain technology in internet of things* Advanced persistent threat: Korean cyber security knack model impost and applicability* Integration of Blockchain Technology and Internet of Things: Challenges and its Solutions10. Machine learning techniques for swot analysis of online education system11. Crop yield and soil moisture prediction using machine learning algorithms.12. Multi-rate signal processing in WSN for channel capacity and energy efficiency using machine learning.13. Introduction to mechanical design of AI-based robotic system
Machine Learning Applications
MACHINE LEARNING APPLICATIONSPRACTICAL RESOURCE ON THE IMPORTANCE OF MACHINE LEARNING AND DEEP LEARNING APPLICATIONS IN VARIOUS TECHNOLOGIES AND REAL-WORLD SITUATIONSMachine Learning Applications discusses methodological advancements of machine learning and deep learning, presents applications in image processing, including face and vehicle detection, image classification, object detection, image segmentation, and delivers real-world applications in healthcare to identify diseases and diagnosis, such as creating smart health records and medical imaging diagnosis, and provides real-world examples, case studies, use cases, and techniques to enable the reader’s active learning. Composed of 13 chapters, this book also introduces real-world applications of machine and deep learning in blockchain technology, cyber security, and climate change. An explanation of AI and robotic applications in mechanical design is also discussed, including robot-assisted surgeries, security, and space exploration. The book describes the importance of each subject area and detail why they are so important to us from a societal and human perspective. Edited by two highly qualified academics and contributed to by established thought leaders in their respective fields, Machine Learning Applications includes information on:* Content based medical image retrieval (CBMIR), covering face and vehicle detection, multi-resolution and multisource analysis, manifold and image processing, and morphological processing* Smart medicine, including machine learning and artificial intelligence in medicine, risk identification, tailored interventions, and association rules* AI and robotics application for transportation and infrastructure (e.g., autonomous cars and smart cities), along with global warming and climate change* Identifying diseases and diagnosis, drug discovery and manufacturing, medical imaging diagnosis, personalized medicine, and smart health recordsWith its practical approach to the subject, Machine Learning Applications is an ideal resource for professionals working with smart technologies such as machine and deep learning, AI, IoT, and other wireless communications; it is also highly suitable for professionals working in robotics, computer vision, cyber security and more. INDRANATH CHATTERJEE is a Professor in the Department of Computer Engineering, at Tongmyong University, South Korea. He received his PhD from University of Delhi, India and has authored several books and numerous, research papers. His areas of research are AI, computer vision, computation neuroscience and medical imaging. SHEETAL ZALTE is an Assistant Professor in the Department of Computer Science at Shivaji University, India. She earned her PhD from Shivaji University, India, and has published many research papers. Her research area is mobile adhoc networks.* Statistical similarity in machine learning* Development of machine learning-based methodologies for adaptive intelligent e-learning systems and time series analysis techniques* Time-series forecasting for stock market using convolutional neural networks.* Comparative study for applicability of color histograms for CBIR used for crop leaf disease detection.* Stock Index Forecasting Using RNN-Long Short Term Memory* Study and analysis of machine learning models for detection of phishing URLs* Real-world applications of blockchain technology in internet of things* Advanced persistent threat: Korean cyber security knack model impost and applicability* Integration of Blockchain Technology and Internet of Things: Challenges and its Solutions10. Machine learning techniques for swot analysis of online education system11. Crop yield and soil moisture prediction using machine learning algorithms.12. Multi-rate signal processing in WSN for channel capacity and energy efficiency using machine learning.13. Introduction to mechanical design of AI-based robotic system
Deploy Container Applications Using Kubernetes
Navigate through the Kubernetes landscape to create and deploy container-based applications. This book will show you how to choose between the various available container-based operating systems, and how to design a better continuous integration pipeline for your container images, where to store them, and how to scan and secure them.In the first half of the book, you'll learn the practical tips on how to setup the system for visibility and troubleshooting, how to reduce the attack vector and reduce risks. The second half of the book focuses on Kubernetes, the popular container orchestration system. You'll see how to setup your Kubernetes for practical applications such as show/chargeback using tagging, efficient use of namespaces and pods, various isolation layers. It also shows you how to integrate with popular implementations of K8S such as AWS EKS (Elastic Container Service), GCP Google Kubernetes Engine (GKE) in touch points such as authentication and authorization, optimization, logging and troubleshooting tools, etc.By practicing the scenarios given in this book, you will be able to make better design choices that are appropriate for the constraints you are working with. Deploy Container Applications Using Kubernetes is your go-to resource for an optimal deployment of workloads using containers and Kubernetes in both public and private cloud settings.WHAT YOU'LL LEARN* Understand the various design choices, their pros and cons* Build a better CI/CD pipeline for your containers and Kubernetes* Deploy your first container application in a public cloud K8S engine* Improve your existing K8S deployment for efficiency and eleganceWHO THIS BOOK IS FORIT Platform Architects, System Engineers/, and System AdministratorsShiva Subramanian is a servant leader (lead by example) with focus on business software engineering gained though 20 plus years of progressive roles in Atari (PacMan Champ!), Basic/Pascal/Fortran, dBase/FoxPro, VisualBasic/VisualC++, Infrastructure (Windows NT/Linux), Software Development, Information Security, Architecture, Team leadership, Management, Business Partnerships, Contributing to P&L, Launching new business, Creating & Leading global SW Dev Teams to Containers, Docker, CGroups, Kubernetes (K8S), Jenkins, Cloud (AWS/GCP/Azure), Java, SpringBoot, Redis, MongoDB, JSON, Scala.He has 20 years experience in the BFSI sector in areas such as core banking solutions, payment networks, electronic billpay/bill presentment solutions, Anti-Money Laundering solutions, loan origination platforms, credit-union platforms, teller/customer/branch management systems, investment banking platforms (APL), mobile commerce (SMS banking) and bank intelligence platforms (BI/BW) just to name a few knowledge domains. Chapter 1. Running your first container applicationChapter 2.Introducing KubernetesChapter 3.A Closer Look at KubernetesChapter 4. Scaling the deployment.- Chapter 5.Node management and RBACChapter 6. Artifact Repository and Container Registry.- Chapter 7. AWS EKSChapter 8.Installing and configuring command line tools to work with AWS EKS service.-Chapter 9. Data-PersistenceChapter 10.Networking and IngressChapter 11. Kubernetes Tools