Security
VMware Certified Professional Data Center Virtualization on vSphere 6.7 Study Guide
Includes online interactive learning environment with: * 2 custom practice exams * More than 60 electronic flashcards * Searchable key term glossary Everything You Need to Prepare for Exam 2V0-21.19, Updated for vSphere 6.7 The VCP6-DCV VMware Certified Professional Data Center Virtualization on vSphere 6.7 Study Guide is an indispensable resource for anyone preparing to take exam 2V0-21.19. Sybex's proven learning approach and valuable tools ensure you'll feel thoroughly confident when the day of the exam arrives. Readers can also leverage additional resources and training materials provided through the Sybex online learning environment. Most importantly, this guide teaches you practical skills that you'll apply as a VMware professional. It doesn't merely prepare you for exam 2V0-21.19. It prepares you for your career. Coverage of 100% of all exam objectives in this Study Guide means you'll be ready for: * Configuring and Administering vSphere Security, Networking, and Storage * Upgrading a vSphere Deployment * Administering and Managing vSphere Resources * Backing up and Recovering a vSphere Deployment * Troubleshooting a vSphere Deployment * Deploying and Customizing ESXi Hosts * Configuring and Administering vSphere and vCenter Availability Solutions * Administering and Managing vSphere Virtual Machines ABOUT THE VCP-DCV PROGRAM The VMware Certified Professional-Datacenter Virtualization 2020 (VCP-DCV 2020) program prepares VCP candidates to configure, manage, and troubleshoot a VSphere 6.7 infrastructure. Because candidates must complete VMware's authorized training course, as well as the exam, it's important to prepare with the best tools and resources available. Interactive learning environment Take your exam prep to the next level with Sybex's superior interactive online study tools. To access our learning environment, visit www.wiley.com/go/sybextestprep, register to receive your unique PIN, and instantly gain access to: Interactive test bank with 2 practice exams. Practice exams help you identify areas where further review is needed. Get more than 90% of the answers correct, and you're ready to take the certification exam. More than 300 online questions total. More than 60 electronic flashcards to reinforce learning and last-minute prep before the exam Comprehensive glossary in PDF format gives you instant access to the key terms so you are fully prepared Master vSphere 6 virtualization with hands-on practice and bonus preview exams VCP6-DCV: VMware Certified Professional-Data Center Virtualization on vSphere 6 Study Guide is your ultimate guide to preparing for exam 2VO-621. This Study Guide provides 100% coverage of all exam objectives and offers a unique set of study tools including assessment tests, objective map, real-world scenarios, hands-on exercises, and much more so you can be confident come exam day. You will also receive access to the superior Sybex interactive online learning environment that provides additional study tools including electronic flashcards and bonus practice exams. More than just a study guide, this book bridges the gap between exam prep and real-world on the job skills by focusing on the key information VMware professionals need to do the job. You'll master the vCenter Server and ESXi from planning and installation through upgrade and security, and develop an in-depth understanding of vSphere networking and storage, vApp deployment, service level establishment, troubleshooting, monitoring implementation, and so much more. * Study 100% of exam 2V0-621 objectives * Practice your skills with hands-on exercises * Gain professional insight from real-world scenarios * Test your understanding with review questions, practice tests, and more Virtualization is the number-one IT priority for organizations across public and private sectors, and VMware is the dominant force in the virtualization space. The VCP6-DCV certification gives you a highly marketable credential in terms of employment, but first you must pass this challenging exam. VCP6-DCV gives you the power of Sybex exam prep and the skills you need to excel at the job. ABOUT THE AUTHORS Jon Hall is a Certification Development, Technical Training, and Education Services Management Professional with over a decade of experience working for VMware Education Services. He assisted in the development of numerous VMware certifications, and currently holds 13 VMware certifications, along with certifications from HP, Cisco, and others. Joshua Andrews is a VMware expert, blogger, and certification enthusiast. He currently holds numerous VMware certifications, including VCP6-DCV, VCAP6-DCV, VCIX-DCV, and VCIX-NV. He has also received the VMware vExpert designation every year since 2012. Introduction xxi Assessment Test xxxi Chapter 1 What’s New in vSphere 6.7 1 Accessing vSphere 2 VMware vSphere Client 2 Application Programming Interface 8 Topology and UI Updates for VCSA 8 External Platform Services Controller 8 Update Manager 10 Storage Updates 18 Persistent Memory 19 Remote Direct Memory Access 19 vSAN 20 Security Updates 22 Virtual Machines 24 Content Library 24 Per-VM EVC 40 Summary 41 Exam Essentials 42 Review Questions 43 Chapter 2 Configuring and Administering Security in a vSphere Datacenter 47 Configuring and Administering Role-Based Access Controls 49 What Is a Privilege? 49 What Is a Task? 49 What Is a Role? 50 Assigning Permissions 54 Viewing and Exporting Group and User Permissions 70 Securing ESXi Hosts and the vCenter Server 72 Hardening ESXi Hosts 72 Hardening vCenter Server 87 Configuring and Enabling SSO and Identity Sources 88 vCenter Single Sign-On 89 Platform Services Controller 91 Configuring vCenter Single Sign-On 93 Securing Virtual Machines 96 Secure Boot 96 Virtual Machine Encryption 96 Virtual Machine Hardening 106 vSphere Network Security 117 Summary 118 Exam Essentials 118 Review Questions 119 Chapter 3 Networking in vSphere 123 Understanding vSphere Networking 124 Standard Switches 125 Virtual Distributed Switches 127 Using dvPort Groups 138 Working with Virtual Adapters 144 Custom TCP/IP Stacks 147 Long-Distance vMotion 151 Migrating Virtual Machines to or from a vDS 151 Performance and Reliability 151 Link Aggregation 152 Load Balancing and Failover Policies 153 Traffic Shaping 154 TCP Segmentation Offload 155 Jumbo Frames 155 Network Isolation 158 Automatic Rollback 159 Monitoring and Mirroring 163 Using NetFlow 164 Understanding Network I/O Control 165 Configuring NIOC Reservations, Shares, and Limits 166 Summary 170 Exam Essentials 171 Review Questions 172 Chapter 4 Storage in vSphere 177 Managing vSphere Integration with Physical Storage 178 Adding an NFS Datastore 179 Using Block Storage 186 Configuring the Software iSCSI Initiator 187 Binding VMkernels to the Software iSCSI Initiator 189 Scanning for Changes 192 Storage Filters 193 Thin Provisioning 194 Storage Multipathing and Failover 196 Configuring and Upgrading VMFS and NFS 203 Configuring VMFS Datastores 207 Raw Device Mapping and Bus Sharing 214 Configuring Software-Defined Storage 217 Virtual Storage Area Network 217 Virtual Volumes 225 Storage Policy–Based Management 229 Enabling and Configuring Storage I/O Control 230 Summary 233 Exam Essentials 234 Review Questions 235 Chapter 5 Upgrading a vSphere Deployment 239 Upgrading from vSphere 5.5 240 Upgrading a vCenter Server on Windows 244 Verify Basic Compatibility and Download the Installer 245 Prepare the Database for Upgrade 245 Prepare for Upgrading the Content Library 247 Verify Network Prerequisites, Load Balancer, and ESXI Hosts 247 Starting the vCenter on Windows Upgrade 247 Migrating to the vCenter Server Appliance 252 Upgrading Using the Command Line 252 Upgrading Using the Graphical Interface 253 Upgrading ESXi Hosts and Virtual Machines 264 Using the Update Manager Download Service 264 Using vSphere Update Manager 265 Summary 284 Exam Essentials 285 Review Questions 286 Chapter 6 Allocating Resources in a vSphere Datacenter 291 Administering and Managing vSphere 6.x Resources 293 Configuring Multilevel Resource Pools 295 Reservations, Limits, and Shares 296 Resource Pool Administration Exercises 303 Using Tags and Custom Attributes 308 Configuring vSphere DRS and Storage DRS Clusters 315 Distributed Resource Scheduler 316 Predictive DRS 318 Network-Aware DRS 320 Storage DRS 322 Establishing Affinity and Anti-Affinity 322 DRS Cluster Administration Exercises 324 Summary 342 Exam Essentials 343 Review Questions 344 Chapter 7 Backing Up and Recovering a vSphere Deployment 349 VCSA Backup and Restore 350 Backing Up Virtual Machines by Using VDP 357 Installing VDP 358 Creating Backup Jobs 361 Restoring from Backup 365 Deploying Proxy Servers 368 Replicating Virtual Machines 376 Deploying a Replication Appliance 376 Configuring Replication 378 Recovering Replicated VMs 382 Summary 387 Exam Essentials 387 Review Questions 388 Chapter 8 Troubleshooting a vSphere Deployment 393 Troubleshooting vCenter and ESXi 394 vCenter Connectivity and Services 394 vCenter Certificates 399 vCenter Log Files 399 ESXi Troubleshooting 403 ESXi Monitoring 407 Troubleshooting Storage and Networking 413 Storage Issues 413 Storage Performance 416 Storage DRS and I/O Control 417 Network Issues 418 Troubleshooting Upgrades 421 Troubleshooting Virtual Machines 421 Troubleshooting HA and DRS 425 Summary 426 Exam Essentials 427 Review Questions 428 Chapter 9 Deploying and Customizing ESXi Hosts 433 Configuring Auto Deploy 434 Enabling PXE Boot 435 Configuring DHCP 435 Configuring TFTP 436 Enabling Auto Deploy 437 Adding Deploy Rules 440 Adding a Custom Image and Profile 442 Stateless Caching and Stateful Installs 442 Employing Host Profiles 452 Creating and Using Host Profiles 453 Importing and Exporting Host Profiles 457 Advanced Profile Modifications 458 Using Answer Files 461 Summary 468 Exam Essentials 468 Review Questions 469 Chapter 10 Ensuring High Availability for vSphere Clusters and the VCSA 475 Configuring vSphere Cluster High Availability 476 HA Failures and Responses 477 Host Isolation 478 Heartbeat Datastores 479 Advanced Options 480 Configuring VMCP 482 Monitoring Virtual Machines 483 Admission Control 486 vCenter Server Appliance High Availability 499 Summary 511 Exam Essentials 512 Review Questions 514 Chapter 11 Administering and Managing vSphere Virtual Machines 519 Virtual Machine Advanced Settings 520 Virtual Machine Configuration File 522 Advanced Virtual Machine Options 528 Content Library 537 VMware Converter 546 Summary 558 Exam Essentials 558 Review Questions 559 Appendix Answers to Review Questions 565 Chapter 1: What’s New in vSphere 6.7 566 Chapter 2: Configuring and Administering Security in a vSphere Datacenter 567 Chapter 3: Networking in vSphere 569 Chapter 4: Storage in vSphere 570 Chapter 5: Upgrading a vSphere Deployment 571 Chapter 6: Allocating Resources in a vSphere Datacenter 573 Chapter 7: Backing Up and Recovering a vSphere Deployment 575 Chapter 8: Troubleshooting a vSphere Deployment 577 Chapter 9: Deploying and Customizing ESXi Hosts 578 Chapter 10: Ensuring High Availability for vSphere Clusters and the VCSA 579 Chapter 11: Administering and Managing vSphere Virtual Machines 581 Index 583
Hacking und Bug Hunting
Bugs in Websites aufspüren, Gutes tun, Spaß dabei haben ... und Geld verdienen Ein praktischer Leitfaden für die Suche nach Softwarefehlern Ein Blick hinter die Kulissen: Sie sehen, wie professionelle Bughunter vorgehen Eine Anleitung, wie man mit Bughunting Geld verdient Lernen Sie, wie Hacker Websites knacken und wie auch Sie das tun können. Dieses Buch ist ein praktischer Leitfaden für die Suche nach Software-Bugs. Egal ob Sie in die Cybersicherheit einsteigen, um das Internet zu einem sichereren Ort zu machen, oder ob Sie als erfahrener Entwickler sichereren Code schreiben wollen – Peter Yaworski, ein überzeugter "Ethical Hacker", zeigt Ihnen, wie es geht. Sie lernen die gängigsten Arten von Bugs kennen, wie Cross-Site-Scripting, unsichere Objekt-Referenzen oder Server-Side Request-Forgery. Echte Fallbeispiele aufgedeckter und entlohnter Schwachstellen in Anwendungen von Twitter, Facebook, Google und Uber zeigen erstaunliche Hacks, und sie erfahren, wie Hacker bei Überweisungen Race Conditions nutzen, URL-Parameter verwenden, um unbeabsichtigt Tweets zu liken, und vieles mehr. Sie lernen: - wie Angreifer Websites kompromittieren - wo Sie mit der Suche nach Bugs anfangen - welche Funktionalitäten üblicherweise mit Schwachstellen assoziiert werden - wie Sie Bug-Bounty-Programme finden - wie Sie effektive Schwachstellen-Reports verfassen "Hacking und Bug-Hunting" ist eine faszinierende und umfassende Einführung in die Sicherheit von Webanwendungen, mit Geschichten von der vordersten Schwachstellenfront und praktischen Erkenntnissen. Mit Ihrem neu gewonnenen Wissen um die Websicherheit und Schwachstellen können Sie das Web zu einem sichereren Ort machen—und dabei noch Geld verdienen.
Hands-on Azure Pipelines
Build, package, and deploy software projects, developed with any language targeting any platform, using Azure pipelines.The book starts with an overview of CI/CD and the need for software delivery automation. It further delves into the basic concepts of Azure pipelines followed by a hands-on guide to setting up agents on all platforms enabling software development in any language. Moving forward, you will learn to set up a pipeline using the classic Visual Editor using PowerShell scripts, a REST API, building edit history, retention, and much more. You’ll work with artifact feeds to store deployment packages and consume them in a build. As part of the discussion you’ll see the implementation and usage of YAML (Yet Another Markup Language) build pipelines. You will then create Azure release pipelines in DevOps and develop extensions for Azure pipelines. Finally, you will learn various strategies and patterns for developing pipelines and go through some sample lessons on building and deploying pipelines.After reading Hands-on Azure Pipelines, you will be able to combine CI and CD to constantly and consistently test and build your code and ship it to any target.WHAT YOU WILL LEARN* Work with Azure build-and-release pipelines * Extend the capabilities and features of Azure pipelines* Understand build, package, and deployment strategies, and versioning and patterns with Azure pipelines* Create infrastructure and deployment that targets commonly used Azure platform services* Build and deploy mobile applications * Use quick-start Azure DevOps projectsWHO THIS BOOK IS FORSoftware developers and test automation engineers who are involved in the software delivery process.CHAMINDA CHANDRASEKARA is a Microsoft Most Valuable Professional (MVP) for Visual Studio ALM and Scrum Alliance Certified ScrumMaster®, and focuses on and believes in continuous improvement of the software development lifecycle. He works as a Senior Engineer - DevOps at Xameriners, Singapore. Chaminda is an active Microsoft Community Contributor (MCC) who is well recognized for his contributions in Microsoft forums, TechNet galleries, wikis, and Stack Overflow and he contributes extensions to Azure DevOps Server and Services (former VSTS/TFS) in the Microsoft Visual Studio Marketplace. He also contributes to other open source projects in GitHub. Chaminda has published five books with Apress.PUSHPA HERATH is a DevOps engineer at Xamariners. She has many years of experience in Azure DevOps Server and Services (formerly VSTS/TFS), Azure cloud platform and QA Automation. She is an expert in DevOps currently leading the DevOps community in Sri Lanka, and she has shown in depth knowledge in Azure cloud platform tools in her community activities. She has published three books with Apress and spoken in community evets as well as in the you tube channel of her Sri Lanka DevOps community.CHAPTER 1: UNDERSTANDING THE IMPORTANCE OF SOFTWARE DELIVERY AUTOMATIONCHAPTER GOAL: Give conceptual overview on CI CD while elaborating on the need of software delivery automation.NO OF PAGES: 10SUB -TOPICS1. Introducing Concepts (CI/CD)2. Why we need SW Delivery Automation?CHAPTER 2: OVERVIEW OF AZURE PIPELINESCHAPTER GOAL: Introduction to components in Azure Pipelines enabling you to follow the lessons from chapter 3.NO OF PAGES: 30Sub - Topics1. Introducing Pools and Agents (Explain purpose and usage (no need to go into setup details), +Security)2. Deployment Groups (Explain purpose and usage (no need to go into setup details), +Security)3. Build Pipelines (Explain purpose and usage (no need to go into setup details), +Security)4. Release Pipelines (Explain purpose and usage (no need to go into setup details), +Security)5. Task Groups (Explain purpose and usage (no need to go into setup details), +Security)6. Library (Variables) (Explain purpose and usage (no need to go into setup details), +Security)7. Parallel Pipelines and BillingCHAPTER 3: SETTING UP POOLS, DEPLOYMENT GROUPS AND AGENTSCHAPTER GOAL: Lessons to provide hand-on guidance on setting up agents on all platforms enabling building software developed with any language.NO OF PAGES : 40SUB - TOPICS:1. Setting up pools and permissions (scopes, Capabilities)2. Adding agents to pools (three pools Linux, mac and windows – add each type)3. Enable .NET core builds in Linux Agents4. Setting up Deployment Groups and permissions (scopes)5. Adding agent to Deployment groups (roles)CHAPTER 4: CREATING BUILD PIPELINES – CLASSIC – PART1CHAPTER GOAL: Step by step guidance to setting up a build pipeline using Classic Visual Editor.NO OF PAGES: 50SUB - TOPICS:1. Using Source Control Providers (show integration with each type and explain all options for each type such as tag sources and other options)2. Using a Template (Explain few commonly used templates)3. Using Multiple jobs – Adding Build jobs, Selecting Pools, setting up Demands, timeouts, mention parallelism, conditions are later lesson, Dependency settings with sample4. Using Tasks (Explain adding Tasks, find tasks in marketplace (install marketplace task in next lesson))5. Installing tasks from marketplace (Explain how to when you have rights, explain how to request to install task admin approve and install as well as decline)6. Build phase and Task Control Conditions – Explain using condition types, custom conditions in detail using a sample7. Parallelism - multi configuration and multi agents – show with samplesCHAPTER 5: CREATING BUILD PIPELINES – CLASSIC – PART2CHAPTER GOAL: Step by step guidance to setting up a build pipeline using Classic Visual Editor.NO OF PAGES: 40SUB - TOPICS:1. Using Variables – System, pipeline and group, scoping variables, queue time variable value change2. Setting up triggers and path filters for a build – show how it works CI, PR etc, path filters, scheduled builds3. Format Build number and apply custom formats with PowerShell4. Enable, paused and disabled builds -explain in detail with sample5. Link work items and Create work items on failures6. Using build status badge7. Build job scope, timeouts and demands8. Build edit history, compare and restore9. RetentionCHAPTER 6: CREATING BUILD PIPELINES – CLASSIC – PART 3CHAPTER GOAL: Step by step guidance to setting up a build pipeline using Classic Visual Editor.NO OF PAGES: 30SUB - TOPICS:1. Queuing builds and enable debugging mode for more diagnostic information2. Setting variable values in PowerShell scripts3. Accessing secret variable values in PowerShell4. Using OAuth tokens in builds (show example of REST API call , mention REST API details are later chapter)5. Creating and using task groups (include export and import as well)6. Using agentless phases – provide few usable task examples7. Publishing Artifacts – as server, as shared path (mention package as nuget later)8. Exporting and importing build definitionsCHAPTER 7: USING ARTIFACTSCHAPTER GOAL: Usage of artifact feeds to store deployment packages and usage of artifact feeds to keep packages related to development and consuming them in builds.NO OF PAGES: 40SUB - TOPICS:1. Creating and publishing build artifacts as nuget2. Using nuget packages from azure artifacts in VS, and in VS Code3. Using nuget packages in Azure Artifact feed in builds4. Creating and Consuming npm packages5. Creating and Consuming maven packages6. Creating and consuming gradle packages7. Creating and Consuming python packages8. Azure CLI to use feeds9. New Public feedsCHAPTER 8: CREATING AND USING YAML BUILD PIPELINESCHAPTER GOAL: Hands on lessons on implementing YAML based build pipelines giving all essential information on implementing configurations and pilines as code.No of pages: 40SUB - TOPICS:Will be defined laterCHAPTER 9: CREATING AZURE RELEASE PIPELINES – PART1Chapter Goal: Step by step guidance to setting up release pipelines with Azure DevOps.NO OF PAGES: 40SUB - TOPICS:1. Service Connections – Explain different types2. Using Templates to Create Pipelines (explain few common templates)3. Adding Artifacts for Release Pipeline (explain each artifact type)4. Setting up Artifact Triggers (continuous deployment triggers, artifact filters)5. Adding Stage (templated or empty, add vs clone, after release, manual triggers, after stage trigger (show parallel and different stage sequence setup options for pipelines), (partial succeeded) and artifact filters)6. Scheduled deployments for a stage (how it works samples)7. Pull request triggers in artifacts and Pull request deployment in stages8. Deployment queue settings (how it works sample should be shown)CHAPTER 10: CREATING AZURE RELEASE PIPELINES – PART2CHAPTER GOAL: Step by step guidance to setting up release pipelines with Azure DevOps.NO OF PAGES: 50SUB - TOPICS:1. Defining Gates (show examples for each gate type)2. Post deployment Options (approval and auto redeploy, gates just mention)3. Agent Job (Pools and specifications, demands samples, execution plan (multi config, multi agent as well) samples, timeouts, Artifact downloads, Oauth, Run job conditions)4. Deployment group job (Deployment group, how it works for required tags samples, targets to deploy multiple, one at a time samples, maximum parallel settings how it works samples, timeouts, artifacts, Oauth, run job conditions)5. Agentless Jobs – Explain usage of possible tasks – manual, delay, invoke azure function, quires, alerts, publishing to service bus – show samples for each6. Using variables – Scoping and using group variables as well7. Release Options – Release number, all integration options explain with sample for each8. History, compare, restore9. Export, import pipelinesCHAPTER 11: USING REST API AND DEVELOPING EXTENSIONS FOR AZURE PIPELINESCHAPTER GOAL: How to extend the capabilities and features of Azure Pipelines using the REST APIs and the extension development is discussed in this chapter.NO OF PAGES: 30SUB - TOPICS:1. Build and Release Management REST APIs - introduce get, post, put etc. with PS and typescript2. Developing extensions for Azure Pipelines – Develop a simple pipeline extension3. Deploying and distributing Azure Pipeline extensions – sharing privately and enable to use publiclyCHAPTER 12: USEFUL PIPELINE STRATEGIES AND PATTERNSCHAPTER GOAL: Guidance in pipeline development strategies and patterns with Azure build and release pipelines.NO OF PAGES: 25SUB - TOPICS:Will define later.CHAPTER 13: COMMONLY USED BUILD AND DEPLOYMENT PIPELINES – SAMPLES AND INTEGRATIONSCHAPTER GOAL: Few useful samples lessons on building and release commonly used applications to Azure platform.NO OF PAGES: 50SUB - TOPICS:1. Deploying infrastructure with Azure Pipelines – Creating Azure resources such as, resource groups, app service plans, storage accounts, web apps, function apps, APIM, Cosmos, SQL, ACR, AKS (provide open source code samples developed by us integrated with pipelines)2. Using Terraform with Azure Pipelines3. Deploying function apps and web apps – including configuration management options4. Deploying mobile apps5. Deploying Azure Databases – SQL, Cosmos6. Deploying Containerized Applications (web apps, AKS)7. Using SonarQube and Azure Build Pipelines for Code Analysis8. Integrating with Jenkins9. Integrating with Octopus deploy10. Generating quick start projects with Azure DevOps Projects (specially focus on java, python, node etc. and targeting Azure platforms)11. Generating release notes12. Visualizing Pipelines status with Dashboards in Azure DevOps
Beginning Data Science, IoT, and AI on Single Board Computers
Learn to use technology to undertake data science and to leverage the Internet of Things (IoT) in your experimentation. Designed to take you on a fascinating journey, this book introduces the core concepts of modern data science. You'll start with simple applications that you can undertake on a BBC micro:bit and move to more complex experiments with additional hardware. The skills and narrative are as generic as possible and can be implemented with a range of hardware options.One of the most exciting and fastest growing topics in education is data science. Understanding how data works, and how to work with data, is a key life skill in the 21st century. In a world driven by information it is essential that students are equipped with the tools they need to make sense of it all. For instance, consider how data science was the key factor that identified the dangers of climate change -- and continues to help us identify and react to the threats it presents. This book explores the power of data and how you can apply it using hardware you have at hand.You'll learn the core concepts of data science, how to apply them in the real world and how to utilize the vast potential of IoT. By the end, you'll be able to execute sophisticated and meaningful data science experiments - why not become a citizen scientist and make a real contribution to the fight against climate change.There is something of a digital revolution going these days, especially in the classroom. With increasing access to microprocessors, classrooms are are incorporating them more and more into lessons. Close to 5 million BBC micro:bits will be in the hands of young learners by the end of the year and millions of other devices are also being used by educators to teach a range of topics and subjects. This presents an opportunity: microprocessors such as micro:bit provide the perfect tool to use to build 21st century data science skills. Beginning Data Science and IoT on the BBC micro:bit provides you with a solid foundation in applied data science.What You'll Learn· Use sensors with a microprocessor to gather or "create" data· Extract, tabulate, and utilize data it from the microprocessor· Connect a microprocessor to an IoT platform to share and then use the data we collect· Analyze and convert data into informationWho This Book Is ForEducators, citizen scientists, and tinkerers interested in an introduction to the concepts of IoT and data on a broad scale.PRADEEKA SENEVIRATNE, a graduate from the Sri Lanka Institute of Information Technology (SLIIT), has almost two decades of experience working on large and complex IT projects related to the industrial world in a variety of fields, in a variety of roles (programmer, analyst, architect, and team leader) with different technologies and software. Pradeeka has also authored several books related to the maker category including Beginning BBC micro:bit (Apress), Beginning LoRa Radio Networks with Arduino (Apress) and Building Arduino PLCs (Apress).PHILIP MEITINER has a background in applied mathematics, psychology, market research, and ed-tech. Philip was was on the original founding members of the Micro:bit Education Foundation where he helped establish the Foundation and is responsible for creating and nurturing the ecosystem, building the reseller and peripheral network and managing the sponsorship scheme (which saw more than 30,000 micro:bits donated to disadvantaged schools in 55 counties). Philip continues to work in the ed-tech sector as a consultant providing services to companies involved with micro:bit. This eclectic mix of careers and experience has instilled in Philip a deep understanding of what it is like to embark on a new learning journey. In addition, his experiences in teaching, market research and IT have given him the perfect mix of skills and knowledge necessary to craft this book.Chapter 1: Introduction to Data Science in the ClassroomChapter Goal: After reading this chapter, readers will understand the importance of measurement - they will able to measure air temperature using a thermometer and they will understand how it works. We will introduce a number of core data science concepts and how to apply them to build an experiment. We’ll cover some basic how-to skills for gathering and tabulating data, and we will undertake some analysis on our results. The reader will get an overview of a complete and meaningful example of applied data science, and they will be ready to explore more deeply.* Data is everywhere: Why do we measure things and what does ‘measuring things’ even mean? How is this related to data science?* Using Temperature: How is temperature used in the world? * Measuring temperature: What does a thermometer do and how does it work?* Designing an experiment: We will begin to design an experiment using our thermometers to measure the temperature at different locations. We will look at factors that might have a negative impact on our experiment and we’ll look at controlling them. We we will see the importance of validity and reliability.* Data capturing: Before our experiment commences, we will introduce the reader to the concept of data capturing - recording (tabulating) data.* Experimenting with temperature: Here we will outline the classroom activity (experiment) to collect and analyse data. We will introduce the concept of experimental design and see how it can help address issues of reliability and validity.* Analysing our results: We will introduce the concept of ‘interrogating’ the data by listing a series of questions that the data set might provide insights into. In a later chapter we will look at more sophisticated analysis, for now we show how to extract some meaning / insights from the data we just collected. * Summary: Brings together all the new concepts introduced in this chapter and sets the stage for the next chapter.Chapter 2: Data Science Goes DigitalChapter Goal: After reading this chapter, readers will understand why there is a tendency to ‘go digital’ and what it means to read data digitally. We will introduce technology and coding to replicate our experiment and we will begin to explore ways that the digital approach can expand our capabilities and potential as data scientists. We’ll use a BBC micro:bit (or any similar device) to measure temperature, all the while looking at our experimental design and how to improve it. By the end of the chapter we will have identified the sort of hardware we need in our data science toolkit.* Making it digital: Why is everything digital? What are the types of thermometers? Explain about digital thermometers and show how they are different to analogue. How can introducing digital improve our temperature experiment from Chapter 1* Using a microprocessor to measure temperature digitally: We will use micro:bit - brief intro to microbit, including sensors that can be used for measure things causing GW (only the ambient temperature sensor).* Using the BBC micro:bit as a thermometer: Programming the micro:bit for reading the air temperature of the classroom. Use MakeCode (or MicroPython) for programming. * Analogue and digital thermometers: Reading temperature simultaneously from a micro:bit and a thermometer. Discuss differences between methods. In particular the difficulties of manual reading, need to read two things same time (thermometer or micro:bit and the clock) * Limitations of micro:bit as a standalone tool: We’ve seen some limitations with microbit. By itself it provides us with too few tools. What are -ons and how are add-ons used with microprocessors, and what about micro:bit? Discuss variety of options available to educators. * Identifying the digital tools we need for data science: We have identified weaknesses in micro:bit. We also review what we need to be accomplished data scientists.* Selecting our tool kit: Introduce the configuration (microbit + XinaBox) that we will use for main thread of examples. Explain why. Offer tips to adapt for other platforms throughout.* Chapter summaryChapter 3: Building a Weather StationChapter Goal: After this chapter the reader will be able to build a digital weather station in the backyard, or classroom! We’ll show the reader how to build one using a micro:bit and the XinaBox SW01 &, BM01 and we’ll explain how other kit could be used. The reader will record temperature, humidity, and pressure by programming the micro:bit to display the sensor readings on the led screen. The reader will be reminded of the limitations of the micro:bit LED screen and an alternative screen to display all the sensor data will be introduced. We’ll show the reader how to connect the OD01 OLED display to show the output, and we’ll explain other options. The reader finishes the chapter with a working weather station, and the realisation that writing values down all the time is a real limiting factor.What we need for the circuit - brain, power, weather sensor and visual display unit. We show what we are using - micro:bit, xChip SW01, BM01 & xBUS connectors and show how to connect. We make it clear other components can be used - show some examples (e.g. Adafruit, Monk Makes, RPi).* Programming the micro:bit (MakeCode Weatherbit package/MicroPython) to read sensor values (temperature, humidity, and pressure) and display them on the LED screen.* Test the program - the display is just not adequate. We need to introduce a more suitable display. So, we add the OD01 OLED display and program it. NB - readers do not need the OLED at all - they can continue to chapter with the 5x5.* Now we measure the weather over a period of time. Classes may have some with OLED and some with 5x5. Write down the sensor data in a table by looking at the display (OLED or 5x5). Making a few copies of the data capturing sheet (we will provide the format of the sheet). Distributing them among some students in different locations and ask them to write down the sensor values at the same time (maybe every 1 minute at 10 minute intervals). The exercise is likely to be flawed in many ways - recording error will occur. Discuss causes of errors by recording the sensor values manually, with either display. * Data Analysis. We introduce charts and talk about time - how each set of points is implicitly time-stamped. Talk about correlations. Nothing too heavy yet - no statistical significance. We are encouraging the curious mind to ask questions, like in earlier chapters.* Discuss how alternate data could be substituted in. Talk about sensors in general, how other sensors could be used in place of weather. Weather station code here can be adapted for all sorts of uses. We introduce a few examples we’ll use in our GW experiments later.* Discussing the limits of the experiment - use the example of taking readings over a 24 hour period. How can that be accomplished with our circuit? How do we take the human out of the equation?Chapter 4: Storing and retrieving dataChapter Goal: In this chapter We will build further on our experiment and enhance our data science tool set introducing the use of computer memory for data capturing - the reader will be able store and retrieve data digitally for further analysis. The reader will be able to use the micro:bit's tiny persistent file system to store the data captured by the weather station then move that data onto their laptop and perform analysis. The reader will understand the limitations of the micro:bit storage by running an overnight test and counting the data points.Introduction to file storage on the micro:bit storage: We recap on why we want to save files and provide a non-technical overview of persistent memory on the micro:bit!* Save Hello World to file: Briefly demonstrate the most simple code to write to and save a file. Include a brief and simple overview of how to extract the file after. * Working with files: Explain key elements of the process - storing data (writing) on the micro:bit file system - creating, writing, closing files. Ensure every line of code in (2) is explained.* Incorporating files into our experimental design: What impact does access to computer memory have on our experimental design? How do we amend the design to accommodate our new capabilities.* Measuring memory size: how many data points we can record until the memory gets full? What is the maximum file size? Write some code to test this quickly. How many readings can we take in a 24 hour period?* Replicating the weather station experiment with file storage: Now we set up an overnight experiment with the weather station to record data at the interval we have calculated. We will analyse the data in detail, in the next chapter.* Addressing memory limitations: micro:bit provides us with some file storage, but not much. We introduce options to address that - ways to expand the available memory. We offer suggestions for why this would be useful* SummaryChapter 5: The basics of analysing the dataChapter Goal: The reader now has the capacity to generate files containing data tables. In previous chapters we have undertaken analysis using our eyes and logic; here we look at developing some basic skills using common software (Excel, libra, GSheet). The reader will be able to import their table into a multi column spreadsheet and ensure it is formatted OK. We will find values such as max and min, as well as averages (mean, median, mode). We will discuss trends, data significance and we’ll look more formally at the concept of confidence. By the end of this chapter we will have provided the reader with all the analysis tools we will use in this book - later chapters will look at how to apply these.* The workflow of data science: We review the process we have been learning about - gathering, Importing, analysing. Summarise what we know so far and introduce the goal of this chapter. * The workflow of analysis: Break down the analysis process into constituents. Show the steps needed to undertake analysis and describe the tools we use at each step.* Data rigour: Checking the data and ensuring it is formatted OK. Encourage data discipline - spot checks, logic checks. We remind readers that the human eye remains the most powerful too.* Using spreadsheets: Introduce aggregation measures, explain them and show how to find them using a spreadsheet- * Charts and visualisations: Show how to generate charts in a few software platforms. Show lots of examples to demonstrate how patterns can be seen in charts that are hard to see in tables. Use real work GW examples and a broad variety of chart types.* Visualising acceleration: Write a program with just the micro:bit that saves 200 or so values of accelerometer to file. Run the program, wave the micro:bit round, extract that data and then chart it. Repeat and wave differently to get a different data profile - discuss.* Summary - Guidelines for analysis: Draw together all the advise / info we have provided so far into a checklist people can use when undertaking analysis. Chapter 6: Wireless CommunicationChapter Goal: In this chapter we will introduce the reader to a variety of wireless communication options. They will understand the differences between Bluetooth, Wi-fi and LoRa (maybe Sigfox too) and they will have any idea of their strengths and weaknesses. The reader will be able to make an informed decision about which method to use in which context.* Communicating data wirelessly has a lot of advantages, such as real time updates, less human hassly / error.* Introduction to wireless communications. Explain the generic model of wireless communications showing the key components (e.g. base, ota waves, receiver) that are common to all.* Show how Bluetooth implements the generic model* Show how Wi-Fi implements the generic model* Show how LoRa implements the generic model* Table showing strengths and weaknesses of all 3 methods, with guidelines on when each is appropriate.Chapter 7: Sending data via BluetoothChapter Goal: At the end of this chapter, the reader will able to send the sensor data to a mobile app through the Bluetooth, and understand how Bluetooth can be used to send data over a short distance.* Programming the micro:bit to send data over Bluetooth UART (MakeCode is easy).* Installing Bitty app.* Pairing micro:bit with the Bitty app.* Receiving data (only for visualize).* Bitty - Show weather station sharing data with bitty.Chapter 8: Sending data through WiFi using MQTTChapter Goal: After reading this chapter, the reader will be able to send the sensor data to the Ubidots dashboard through WiFi using MQTT, a lightweight messaging protocol. The reader will learn how to program the CW01 with MakeCode/MicroPython, Setting up the Ubidots dashboard to visualize data, triggering events with the Ubidots, and analyzing the relationship with temperature and humidity with a simple graph.* What is WiFi?* Explain difference with WiFi and Bluetooth on micro:bit - strengths and weaknesses of both.* Explaining MQTT in simple terms* Connecting micro:bit, BM11, IP01, and CW01 together using uBus connectors (can use the same setup used in the previous chapter).* Preparing MakeCode with required packages that support CW01. * Setting up Ubidots (creating an account, configuring the dashboard, etc.)* Setting up HiveMQ, creating topics, etc.* Programming and flashing micro:bit.* Programming and flashing CW01* Visualizing data with Ubidots * Plotting temp with humidity (Can you see a relationship?).* Triggering (sending an e-mail if the temperature is too high)Chapter 9: Sending Data via LoRaChapter Goal: After completing this chapter, the reader will be able to build a simple LoRa network and use it to send the data collected by the weather station to the Ubidots IoT platform, visualizing, and analyzing data.* Overview of XinaBox hardware for LoRa / may be others* Connecting the micro:bit, RL0x, and BM01 together.* Setting up the LoRa gateway* Connecting the LoRa gateway with a WiFi/Cellular/LAN* Programming with MakeCode / MicroPython, using any provides libraries* Setting up Ubidots and creating a dashboard to visualizing data (if not, use The Things Network - TTN with any supported app to visualize the data.)Chapter 10: Now we are ready to be data scientistsChapter Goal: We’ve spent a lot of time developing skills that are key to a data scientist, and this chapter will highlight those skills and give ideas about how they can / are used in everyday life. We’ll also list the tools we’ve learned above and begin to talk about how they can be applied to useful projects that will address global warming.* List out the skills that we have learned, measuring data, recording it, tabulating, charting and analysing.* List out the tools we now have at our disposal - we know how to use sensors, how to store data and how to get it off the device into a tool we can use to tabulate, chart and perform actions on.* We talk about limits of micro:bit - that it won’t be able to handle a lot of stuff at once. That will be a constraint we’ll have to work with.* Identify real world examples of where similar tech to ours is used, break each down into the simple components we know: Weather forecasting, automatic street lamps, credit card transactions, GPS positioning, etc.Chapter 11: Measuring the power consumption of a light bulbChapter Goal: The consumption of electricity is strongly related to GW. By following this chapter, the reader will be able to build a tool to measure the kilowatt-hours (power consumption) used by a light bulb. The reader will use micro:bit and SL01 to detect the presence of the light. The reader will write the code to calculate and display the kilowatts used by the light bulb with the wattage of the lamp and the elapsed time for lighting.* Basics of power consumption/watts/ watt-hour, etc.* Building the unit with micro:bit and SL01* Creating the code with MakeCode (using running time block to calculate the elapsed time)* Displaying the usage of kilowatt-hours on the OLED display or sending data to a cloud (will consider later)* We can go deep by analyzing the peak time of the power consumption.Chapter 12: Monitor Air Pollution LevelsChapter Goal: By following this chapter, the reader will be able to build a digital instrument to monitor the air quality which includes eCO2 (equivalent calculated carbon-dioxide), and TVOC (Total Volatile Organic Compound), alcohols, aldehydes, ketones, organic acids, amines, aliphatic and aromatic hydrocarbons. Then the reader will be able to identify the level of pollution in the air based on the air quality index (good, moderate, unhealthy for sensitive groups, unhealthy, very unhealthy, hazardous).No of pages: 20Sub - Topics:* Introducing the air quality index.* Building the project with XinaBox SG33 - VOC & eCO2 (CCS811).* Programming the core* Displaying useful information on the OLED display* Optional (add buzzer or vibrator to indicate unhealthy or hazardous environments)Chapter 13: Geotagging your Weather StationChapter Goal: Sensor data by itself is bland stuff. Associating it with a time and place gives more life to it, and your sensor data could become more socialized. By following this chapter, the reader will be able to add the geotagging feature to the weather station (Prerequisite: The weather station should have the ability to connect to the Internet with WiFi or through LoRa) using SN01 or similar GPS module. Then the reader will be able to send sensor data along with the time and location (lat/lon), and other useful GPS data to an IoT dashboard like Ubidots. Finally, the reader will view and analyze some interesting patterns of weather data with the locations.* Introduction to the geotagging and explaining how important it is/trends, etc.* Adding SN01 to an existing weather station project (in chapter 8 or 9).* Programming the cores for getting GPS data too.* Sending data to an IoT dashboard* Viewing and analyzing data/ asking questions, etc.Chapter 14: Measuring Noise Pollution on Your WayChapter Goal: Measuring the sound level is an exciting topic today. Sounds above 85 dB are harmful, depending on how long and how often you are exposed to them. By following this chapter, the reader will be able to measure the sound level in different locations. The reader will be able to collect data, analyze, and identify the areas with a harmful level of sound pollution.* Identifying the harmful areas * Introduction to sound pollution and different sound levels* Building the circuit with the SparkFun sound detector or similar thing: https://www.sparkfun.com/products/14262* Programming the cores* Gathering data* AnalyzingChapter 15: Beyond the micro:bitChapter Goal: By following this chapter, the reader will be able to rebuild the weather station by replacing the micro:bit with other microcontrollers that commonly available.* Building the weather station with CC01 / maker.makecode, programming, sending data to an IoT dashboard.* Building the weather station with CC01 / Arduino, programming, sending data to an IoT dashboard.* Building the weather station with CC01 / Zerynth, programming, sending data to an IoT dashboard. Note - we’d want to use CW02 for this as it has a license on board.* Building the weather station with Raspberry Pi, programming, sending data to an IoT dashboard.Appendix AWe will also include following if we have enough time to complete this book on time.* Sending micro:bit weather station into high altitude / low earth orbit.* Sending a weather station to high altitude using a helium balloon.* Sending a weather station to low earth orbit.* Choosing a long-range communication technology (say LoRa)* Setting up the ground station.* Receiving, visualizing, comparing, analyzing sensor dataUsing the Blynk to replace the UART terminal app (requires Arduino IDE and nRF5 support package for Arduino).* Using a PIR sensor with micro:bit to turn on/off lights by detecting the presence of a human. Also when natural light is bright enough. Show how it can be used for a table lamp and consider completely novel applications (turn off music, lock a door).* A project for monitoring water pollution.
Cloud Computing For Dummies
* Adopt a hybrid and multicloud strategy * Rethink DevOps with containers and microservices * Incorporate security into your cloud environment Plan your cloud computing strategy Are you ready to execute a cloud computing plan? You need a strategy to prepare for the future, and this book comes to the rescue. Authors Daniel Kirsch and. Judith Hurwitz share insights by honing in on topics like multicloud architecture, microservices, hybrid infrastructure, DevOps, and Software as a Service. This book is ideal for anyone who needs to understand the emerging approaches to cloud computing. Inside... * Understanding cloud architecture * Using a hybrid computing approach * Explaining the economics of cloud computing * Planning your cloud strategy * Developing a security strategy * Understanding containers and microservices Get your head—and your business—into the Cloud Cloud computing is no longer just a clever new toy in the world of IT infrastructure. Despite the nebulous name, it’s become a real and important part of our information architecture—and tech professionals who ignore it or try to skim their way through risk falling behind rapidly. The new edition of Cloud Computing For Dummies gets you up to speed fast, clarifying your Cloud options, showing you where can save you time and money, giving you ways to frame your decisions, and helping you avoid weeks of research. In a friendly, easy-to-follow style, Cloud Computing For Dummies, 2nd Edition demystifies the Cloud’s virtual landscape, breaking up a complex and multi-layered topic into simple explanations that will make the various benefits clear and ultimately guide you toward making the most appropriate choices for your organization. * Know the business case for the Cloud * Understand hybrid and multi-cloud options * Develop your Cloud strategy * Get tips on best practices The Cloud is everywhere, and it can deliver amazing benefits to our lives and businesses. Get a much clearer vision of exactly how with Cloud Computing For Dummies—and you’ll begin to see that the sky really is the limit! Introduction 1 Part 1: Understanding Cloud Concepts 5 Chapter 1: Understanding the Cloud 7 Chapter 2: Embracing the Business Imperative 21 Part 2: Examining Architectural Considerations 31 Chapter 3: Architectural Considerations for the Cloud Environment 33 Chapter 4: Managing a Hybrid and Multicloud Environment 43 Chapter 5: Standards in a Multicloud World 59 Chapter 6: A Closer Look at Cloud Services 73 Part 3: Understanding Cloud Models 87 Chapter 7: Introducing All Types of Clouds 89 Chapter 8: Using Infrastructure as a Service 107 Chapter 9: Using Software as a Service 121 Chapter 10: Standing on Platform as a Service 135 Part 4: Managing in a Multicloud World 147 Chapter 11: Planning for DevOps in the Cloud 149 Chapter 12: Managing Multicloud Workloads 165 Chapter 13: Managing Data Storage in the Cloud 177 Part 5: Developing Your Cloud Strategy 189 Chapter 14: Managing and Integrating Data in the Cloud 191 Chapter 15: Promoting Cloud Security and Governance 207 Chapter 16: Breaking Down Cloud Economics 225 Chapter 17: Planning Your Cloud Strategy 241 Part 6: The Part of Tens 253 Chapter 18: Ten Cloud Resources 255 Chapter 19: Ten Cloud Do’s and Don’ts 261 Glossary 267 Index 281 Daniel Kirsch, Managing Director of Hurwitz & Associates, is a thought leader, researcher, author, and consultant in cloud, AI, and security. Judith Hurwitz, President of Hurwitz & Associates, is a consultant, thought leader, and coauthor of 10 books including Augmented Intelligence, Cognitive Computing and Big Data Analytics, and Hybrid Cloud for Dummies
Networking For Dummies
SET UP A SECURE NETWORK AT HOME OR THE OFFICEFully revised to cover Windows 10 and Windows Server 2019, this new edition of the trusted Networking For Dummies helps both beginning network administrators and home users to set up and maintain a network. Updated coverage of broadband and wireless technologies, as well as storage and back-up procedures, ensures that you’ll learn how to build a wired or wireless network, secure and optimize it, troubleshoot problems, and much more.From connecting to the Internet and setting up a wireless network to solving networking problems and backing up your data—this #1 bestselling guide covers it all.* Build a wired or wireless network* Secure and optimize your network* Set up a server and manage Windows user accounts* Use the cloud—safely Written by a seasoned technology author—and jam-packed with tons of helpful step-by-step instructions—this is the book network administrators and everyday computer users will turn to again and again.DOUG LOWE is the bestselling author of Networking For Dummies and Networking All-in-One Desk Reference For Dummies. His 50+ books include more than 30 in the For Dummies series. He has demystified everything from Microsoft Office and memory management to client/server computing and creating web pages. INTRODUCTION 1About This Book 1Foolish Assumptions 2Icons Used in This Book 3Beyond the Book 3Where to Go from Here 4PART 1: GETTING STARTED WITH NETWORKING 5CHAPTER 1: LET’S NETWORK! 7Defining a Network 8Why Bother with a Network? 11Sharing files 11Sharing resources 11Sharing programs 12Sharing messages 12Servers and Clients 13Dedicated Servers and Peers 13What Makes a Network Tick? 15It’s Not a Personal Computer Anymore! 16The Network Administrator 17What Have They Got That You Don’t Got? 18CHAPTER 2: CONFIGURING WINDOWS AND MAC CLIENTS 21Configuring Windows Network Connections 22Joining a Windows Computer to a Domain 27Configuring Mac Network Settings 29Joining a Mac Computer to a Domain 33CHAPTER 3: LIFE ON THE NETWORK 37Distinguishing between Local Resources and Network Resources 38What’s in a Name? 38Logging on to the Network 40Understanding Shared Folders 42Four Good Uses for a Shared Folder 43Store files that everybody needs 43Store your own files 44Make a temporary resting place for files on their way to other users 44Back up your local hard drive 45Oh, the Network Places You’ll Go 45Mapping Network Drives 47Using a Network Printer 50Adding a network printer 51Printing to a network printer 52Playing with the print queue 53Logging off the Network 55CHAPTER 4: MORE WAYS TO USE YOUR NETWORK 57Sharing Your Stuff 57Enabling File and Printer Sharing 58Sharing a Folder 59Using the Public Folder 61Sharing a Printer 62Using Microsoft Office on a Network 64Accessing network files 64Using workgroup templates 65Networking an Access database 67Working with Offline Files 68PART 2: DESIGNING YOUR NETWORK 73CHAPTER 5: PLANNING A NETWORK 75Making a Network Plan 75Being Purposeful 76Taking Stock 77What you need to know 77Programs that gather information for you 79To Dedicate or Not to Dedicate: That Is the Question 80File servers 81Print servers 81Web servers 82Mail servers 82Database servers 83Application servers 83License servers 83Choosing a Server Operating System 83Planning the Infrastructure 84Drawing Diagrams 84CHAPTER 6: DEALING WITH TCP/IP 87Understanding Binary 88Counting by ones 88Doing the logic thing 89Introducing IP Addresses 90Networks and hosts 90The dotted-decimal dance 91Classifying IP Addresses 91Class A addresses 92Class B addresses 93Class C addresses 93Subnetting 94Subnets 95Subnet masks 96The great subnet roundup 97Private and public addresses 98Understanding Network Address Translation 98Configuring Your Network for DHCP 99Understanding DHCP 100DHCP servers 100Understanding scopes 101Feeling excluded? 102Reservations suggested 103How long to lease? 104Managing a Windows Server 2019 DHCP Server 104Configuring a Windows DHCP Client 105Using DNS 106Domains and domain names 106Fully qualified domain names 108Working with the Windows DNS Server 109Configuring a Windows DNS Client 110CHAPTER 7: OH, WHAT A TANGLED WEB WE WEAVE: CABLES AND SWITCHES 111What Is Ethernet? 112All about Cable 114Cable categories 116What’s with the pairs? 117To shield or not to shield 117When to use plenum cable 118Sometimes solid, sometimes stranded 118Installation guidelines 119The tools you need 120Pinouts for twisted-pair cables 121RJ-45 connectors 122Crossover cables 124Wall jacks and patch panels 124Understanding Switches 126Comparing managed and unmanaged switches 126Daisy-chaining switches 128Stacking switches 128Looking at distribution switches and access switches 129Powering Up with Power over Ethernet 130Looking at Three Types of Network Rooms 131CHAPTER 8: SETTING UP A WIRELESS NETWORK 133Diving into Wireless Networking 134A Little High School Electronics 135Waves and frequencies 135Wavelength and antennas 137Spectrums and the FCC 137Eight-Oh-Two-Dot-Eleventy Something: Understanding Wireless Standards 139Home on the Range 140Using Wireless Network Adapters 141Setting Wireless Access Points 142Infrastructure mode 142Multifunction WAPs 143Roaming Capabilities 144Wireless bridging 144Ad-hoc networks 145Configuring a Wireless Access Point 145Basic configuration options 146DHCP configuration 146Connecting to a Wireless Network 147Paying Attention to Wireless Network Security 149CHAPTER 9: CONNECTING TO THE INTERNET 155Connecting to the Internet 155Connecting with cable or DSL 156Connecting with high-speed private lines 157Sharing an Internet connection 158Securing Your Connection with a Firewall 159Using a firewall 159Comparing residential gateways to firewall routers 161Looking at the built-in Windows firewall 161Providing a Backup Internet Connection 163PART 3: WORKING WITH SERVERS 165CHAPTER 10: VIRTUALIZING YOUR NETWORK 167Understanding Virtualization 167Understanding Hypervisors 169Understanding Virtual Disks 171Understanding Network Virtualization 173Looking at the Benefits of Virtualization 174Choosing Virtualization Hosts 176Understanding Windows Server 2019 Licensing 176Introducing Hyper-V 178Understanding the Hyper-V hypervisor 178Understanding virtual disks 179Enabling Hyper-V 180Getting Familiar with Hyper-V 181Creating a Virtual Switch 182Creating a Virtual Disk 184Creating a Virtual Machine 188Installing an Operating System 192CHAPTER 11: SETTING UP A WINDOWS SERVER 195Planning a Windows Server Installation 196Checking system requirements 196Reading the release notes 196Considering your licensing options 196Deciding your TCP/IP configuration 197Choosing workgroups or domains 197Running Setup 198Adding Server Roles and Features 203Creating a New Domain 208CHAPTER 12: MANAGING WINDOWS USER ACCOUNTS 213Understanding How Active Directory Is Organized 214Objects 214Domains 215Organizational units 215Trees 216Forests 216Understanding Windows User Accounts 216Local accounts versus domain accounts 216User account properties 217Creating a New User 217Setting User Properties 220Changing the user’s contact information 220Setting account options 221Specifying logon hours 223Restricting access to certain computers 223Setting the user’s profile information 224Resetting User Passwords 225Disabling and Enabling User Accounts 226Deleting a User 226Working with Groups 227Creating a group 227Adding a member to a group 228Creating a Logon Script 230CHAPTER 13: MANAGING NETWORK STORAGE 231Understanding Disk Storage 231Hard disk drives 231Solid state drives to the rescue! 234It’s a RAID! 234Three ways to attach disks to your servers 236Focusing on File Servers 237Understanding permissions 237Understanding shares 239Managing Your File Server 240Using the New Share Wizard 241Sharing a folder without the wizard 245Granting permissions 247PART 4: MANAGING YOUR NETWORK 251CHAPTER 14: WELCOME TO NETWORK MANAGEMENT 253What a Network Administrator Does 254Choosing the Part-Time Administrator 255The Three “Ups” of Network Management 256Managing Network Users 257Acquiring Software Tools for Network Administrators 258Building a Library 259Pursuing Certification 260Helpful Bluffs and Excuses 261CHAPTER 15: SUPPORTING YOUR USERS 263Establishing the Help Desk’s Charter 264Tracking Support Tickets 265Deciding How to Communicate with Users 267Using Remote Assistance 268Enabling Remote Assistance 269Inviting someone to help you via a Remote Assistance session 270Responding to a Remote Assistance invitation 273Creating a Knowledge Base 275Creating a Self-Service Help Portal 275Using Satisfaction Surveys 276Tracking Help Desk Performance 278Using Help Desk Management Software 279CHAPTER 16: USING GROUP POLICY 281Understanding Group Policy 281Enabling Group Policy Management on Windows Server 2019 282Creating Group Policy Objects 283Filtering Group Policy Objects 289Forcing Group Policy Updates 292CHAPTER 17: MANAGING SOFTWARE DEPLOYMENT 293Understanding Software Licenses 294Using a License Server 297Deploying Network Software 298Deploying software manually 298Running Setup from a network share 299Installing silently 300Creating an administrative installation image 301Pushing out software with Group Policy 302Keeping Software Up to Date 302CHAPTER 18: MANAGING MOBILE DEVICES 305The Many Types of Mobile Devices 306Considering Security for Mobile Devices 307Managing iOS Devices 308Understanding the iPhone 308Understanding the iPad 309Integrating iOS devices with Exchange 309Configuring an iOS device for Exchange email 311Managing Android Devices 314Looking at the Android OS 314Perusing Android’s core applications 315Integrating Android with Exchange 316PART 5: SECURING YOUR NETWORK 317CHAPTER 19: WELCOME TO CYBERSECURITY NETWORK 319Do You Need Security? 320The Three Pillars of Cybersecurity 321Two Approaches to Security 322Physical Security: Locking Your Doors 323Securing User Accounts 324Obfuscating your usernames 324Using passwords wisely 325Generating passwords For Dummies 326Secure the Administrator account 328Managing User Security 328User accounts 329Built-in accounts 330User rights 331Permissions (who gets what) 331Group therapy 332User profiles 333Logon scripts 334Securing the Human Firewall 334CHAPTER 20: HARDENING YOUR NETWORK 337Firewalls 337The Many Types of Firewalls 339Packet filtering 339Stateful packet inspection (SPI) 341Circuit-level gateway 342Application gateway 342Next-generation firewall 343Virus Protection 343What is a virus? 343Antivirus programs 345Safe computing 346Patching Things Up 346CHAPTER 21: SECURING YOUR EMAIL 349Defining Spam 350Sampling the Many Flavors of Spam 351Using Antispam Software 352Understanding Spam Filters 353Looking at Three Types of Antispam Software 356On-premises antispam 356Antispam appliances 357Cloud-based antispam services 358Minimizing Spam 359CHAPTER 22: BACKING UP YOUR DATA 3613-2-1: The Golden Rule of Backups 361How Often Should You Back Up Your Data? 363Choosing Where to Back Up Your Data 364Establishing Two Key Backup Objectives 365Backing Up to Tape 366Understanding Backup Software 367Examining File-Based Backups 368Full backups 369Copy backups 370Incremental backups 370Differential backups 371Backup and Virtualization 371Verifying Tape Reliability 373Keeping Backup Equipment Clean and Reliable 374Setting Backup Security 375CHAPTER 23: PLANNING FOR DISASTER 377Assessing Different Types of Disasters 378Environmental disasters 379Deliberate disasters 379Disruption of services 380Equipment failure 380Other disasters 381Analyzing the Impact of a Disaster 381Developing a Business Continuity Plan 382Holding a Fire Drill 383PART 6: MORE WAYS TO NETWORK 385CHAPTER 24: ACCOMMODATING REMOTE USERS 387Using Outlook Web App 388Using a Virtual Private Network 389Looking at VPN security 390Understanding VPN servers and clients 391Connecting with Remote Desktop Connection 393Enabling Remote Desktop Connection 394Connecting remotely 395Using keyboard shortcuts for Remote Desktop 397CHAPTER 25: LIFE IN CLOUD CITY 399Introducing Cloud Computing 400Looking at the Benefits of Cloud Computing 401Detailing the Drawbacks of Cloud Computing 402Examining Three Basic Kinds of Cloud Services 403Applications 404Platforms 404Infrastructure 405Public Clouds versus Private Clouds 405Introducing Some of the Major Cloud Providers 406Amazon 406Google 407Microsoft 407Getting into the Cloud 408CHAPTER 26: GOING HYBRID 409What Is a Hybrid Cloud? 409What Are the Benefits of Hybrid Cloud? 411Elasticity 411Flexibility 412Agility 412Innovation 412Operational efficiency 412Integrating Identity 413Azure Active Directory 413Single sign-on 414Looking at Hybrid Cloud Virtualization Platforms 416PART 7: THE PART OF TENS 419CHAPTER 27: TEN NETWORKING COMMANDMENTS 421I Thou Shalt Back Up Thy Data Religiously 421II Thou Shalt Protect Thy Network from Infidels 422III Thou Shalt Train Up Thy Users in the Ways of Safe Computing 422IV Thou Shalt Keepeth Thy Network Drive Pure and Cleanse It of Old Files 423V Thou Shalt Not Tinker with Thine Network Configuration unless Thou Knowest What Thou Art Doing 423VI Thou Shalt Not Covet Thy Neighbor’s Network 423VII Thou Shalt Not Take Down Thy Network without Proper Notification 424VIII Thou Shalt Keep an Adequate Supply of Spare Parts 424IX Thou Shalt Not Steal Thy Neighbor’s Program without a License 424X Thou Shalt Write Down Thy Network Configuration upon Tablets of Stone 425CHAPTER 28: TEN BIG NETWORK MISTAKES 427Skimping on Hardware 427Turning Off or Restarting a Server Computer While Users Are Logged On 428Deleting Important Files on the Server 429Copying a File from the Server, Changing It, and Then Copying It Back 429Sending Something to the Printer Again Just Because It Didn’t Print the First Time 430Assuming That the Server Is Safely Backed Up 430Connecting to the Internet without Considering Security Issues 430Plugging in a Wireless Access Point without Asking 431Thinking You Can’t Work Just Because the Network Is Down 431Running Out of Space on a Server 432Always Blaming the Network 433CHAPTER 29: TEN THINGS YOU SHOULD KEEP IN YOUR CLOSET 435Duct Tape 435Tools 436Patch Cables 436Cable Ties and Velcro 436Twinkies 437Replacement Parts 437Cheap Network Switches 438The Complete Documentation of the Network on Tablets of Stone 438The Network Manuals and Disks 438Ten Copies of This Book 439Index 441
Understanding Microsoft Teams Administration
Explore solutions, best practices, tips, and workarounds to plan, design, customize, implement, and manage Microsoft Teams in any environment.The book starts with an overview of Microsoft Teams where you will go through the teams architecture, teams/channels, audio/video meetings, and the phone system. It further dives into deployment and management of teams, clients, guests and external access, and live events, followed by network assessment and bandwidth planning for Teams. Here, you will learn about deployment of quality of service and how to configure your phone systems using direct routing and calling plans. Moving forward, you will learn Microsoft Teams administration and policy management along with the migration process of Skype for Business on-prem to Microsoft Teams. Towards the end, you will learn troubleshooting techniques in Teams for call quality issues and connectivity challenges.After reading Understanding Microsoft Teams Administration, you will be able to effectively configure, customize, and manage the Teams experience using the Teams admin portal and other tools and techniques.WHAT YOU WILL LEARN* Understand the Microsoft Teams architecture including the different components involved* Enable and manage external and guest access for Teams users* Manage Teams and channels with a private channel* Implement quality of service for audio/video calls and meetings* Establish Office 365 data classifications, loss prevention plans, and governance* Manage resource types, licensing, service health reporting, and support* Work with Microsoft Teams room and live event management* Implement and manage messaging, calling policies, and settingsWHO THIS BOOK IS FORAdministrators and technical consultants working on Teams.BALU ILAG is a Microsoft Certified Trainer (MCT), Microsoft 365 Certified Teams Administrator Associate, and Microsoft Certified Solutions Expert (MCSE) for communication and productivity. He has written several blog posts on unified communication and collaboration technologies including subjects ranging from a how-to guide to best practices and troubleshooting.He is currently working as an Office 365 and collaboration specialist at Juniper networks. Balu has over 13 years' experience in messaging, telecom and unified communications and collaboration and is focused on Microsoft Teams and Microsoft Office 365 collaboration. His role is a combination of product administration, product development, and strategic guidance for enterprise customers.CHAPTER 1: MICROSOFT TEAMS OVERVIEWa. What is Microsoft Teams?b. Teams Architecturec. Teams Team and channelsd. Meeting, Tab, Files and Wikie. Teams Audio/video call and meetingf. Teams phone system overviewCHAPTER 2: TEAMS CLIENT DEPLOYMENT AND USER PROVISIONINGa. Deploy and Manage Teams clientb. Manage Teams storagec. Manage External and Guest accessCHAPTER 3: ORGANIZATION READINESS FOR MICROSOFT TEAMSa. Network assessment and bandwidth planning for Teamsb. Deploy Quality of Servicec. Configure phone systema. Configure Teams Direct Routingb. Configure Microsoft Calling pland. Customizes and manage Live eventCHAPTER 4: MICROSOFT TEAMS ADMINISTRATION AND POLICY MANAGEMENTa. Enable and users for Microsoft Teamsb. Organization wide setting for Microsoft Teamsc. Meeting, Live event and messaging policyd. Manage Phone number and Voice routing policyCHAPTER 5: MIGRATION FROM SKYPE FOR BUSINESS (LYNC) ON-PREM AND ONLINE TO MICROSOFT TEAMSa. Get ready for Microsoft Teamsb. Plan user migration wiselyc. Migrate user from Skype for Business Online to Microsoft Teamsd. Migrate user from Skype for Business On-prem to Microsoft Teamse. Maintain momentum after migrationCHAPTER 6: MICROSOFT TEAMS TROUBLESHOOTING APPROACHES1. Solve Teams sign-in issues2. Analyze call quality and Troubleshoot call quality issues3. Troubleshoot Live event issues4. Solve connectivity challenges
Learn Java for Android Development
Gain the essential Java language skills necessary for using the Android SDK platform to build Java-based Android apps. This book includes the latest Java SE releases that Android supports, and is geared towards the Android SDK version 10. It includes new content including JSON documents, functional programming, and lambdas as well as other language features important for migrating Java skills to Android development.Android is still the world's most popular mobile platform and because this technology is still mostly based on Java, you should first obtain a solid grasp of the Java language and its APIs in order to improve your chances of succeeding as an effective Android apps developer. Learn Java for Android Development, 4th Editionhelps you do that.Each of the book’s chapters provides an exercise section that gives you the opportunity to reinforce your understanding of the chapter’s material. Answers to the book’s more than 500 exercises are provided in an appendix. Once you finish, you will be ready to begin your Android app development journey using Java.WHAT YOU WILL LEARN* Discover the latest Java programming language features relevant to Android SDK development* Apply inheritance, polymorphism, and interfaces to Android development* Use Java collections, concurrency, I/O, networks, persistence, functional programming, and data access in Android apps* Parse, create, and transform XML and JSON documents* Migrate your Java skills for mobile development using the Android platformWHO THIS BOOK IS FORProgrammers with at least some prior Java programming experience looking to get into mobile Java development with the Android platform.PETER SPÄTH consults, trains/teaches, and writes books on various subjects, with a primary focus on software development. With a wealth of experience in Java-related languages, the release of Kotlin for building Android apps made him enthusiastic about writing books for Kotlin development in the Android environment. He also graduated in 2002 as a physicist and soon afterward became an IT consultant, mainly for Java-related projects.JEFF FRIESEN is a freelance tutor and software developer with an emphasis on Java (and now Android). In addition to authoring Learn Java for Android Development and co-authoring Android Recipes, Jeff has written numerous articles on Java and other technologies for JavaWorld, informIT, Java.net, and DevSource.1: Getting Started with JavaTalking about ART and licensing here2: Learning Language Fundamentals3: Discovering Classes and Objects4: Discovering Inheritance, Polymorphism, and Interfaces5: Mastering Advanced Language Features, Part 16: Mastering Advanced Language Features, Part 27: Exploring the Basic APIs, Part18: Exploring the Basic APIs, Part29: Functional Programming and Lambdas10: Exploring the Collections Framework11: Exploring the Concurrency Utilities12: Performing Classic I/O13: Accessing Networks14: Migrating to New I/O15: Accessing Databases16: Parsing, Creating, and Transforming XML Documents17: Working With JSON DocumentsA. Solutions to Exercises
Visual Studio Extensibility Development
Learn the extensibility model of Visual Studio to enhance the Visual Studio integrated development environment (IDE). This book will cover every aspect, starting from developing an extension to publishing it and making it available to the end user.The book begins with an introduction to the basic concepts of Visual Studio including data structures and design patterns and moves forward with the fundamentals of the VS extensibility model. Here you will learn how to work on Roslyn - the .NET compiler platform - and load extensions in VS. Next, you will go through the extensibility model and see how various extensions, such as menus, commands, and tool windows, can be plugged into VS. Moving forward, you’ll cover developing VS extensions and configuring them, along with demonstrations on customizing extension by developing option pages. Further, you will learn to create custom code snippets and use a debugger visualizer. Next, you will go through creation of project and item templates including deployment of VS extensions using continuous integration (CI). Finally, you will learn tips and tricks for Visual Studio and its extensibility and integration with Azure DevOps.After reading Visual Studio Extensibility Development you will be able to develop, deploy, and customize extensions in Visual Studio IDE.WHAT YOU WILL LEARN* Discover the Visual Studio extensibility and automation model* Code Visual Studio extensions from scratch* Customize extensions by developing a tools option page for them* Create project templates, item templates, and code snippets.* Work with code generation using T4 templates* Code analysis and refactoring using Roslyn analyzers* Create and deploy a private extension gallery and upload the extensions* Upload a VS extension using CI* Ship your extension to Visual Studio MarketplaceWHO THIS BOOK IS FORDevelopers in Visual Studio IDE covering C#, Visual Basic (VB), JavaScript, and CSS.RISHABH VERMA is a Microsoft certified professional and works at Microsoft as a senior development consultant, helping the customers to design, develop, and deploy enterprise-level applications. An electronic engineer by education, he has 12+ years of hardcore development experience on the .NET technology stack. He is passionate about creating tools, Visual Studio extensions, and utilities to increase developer productivity. His interests are .NET Compiler Platform (Roslyn), Visual Studio extensibility, code generation and .NET Core. He is a member of .NET foundation (https://www.dotnetfoundation.org). He occasionally blogs at https://rishabhverma.net/. He has authored books on .NET Core 2.0 and .NET Core 3.1 prior to this title.His twitter id is @VermaRishabh and his linkedIn page is https://www.linkedin.com/in/rishabhverma/CHAPTER 1: BASICS PRIMERCHAPTER GOAL: The objective of this chapter is to introduce the basic concepts to the reader that would be required through-out this book, so that he gets comfortable in this learning journey.NO OF PAGES :50-60SUB -TOPICS1. What is a compiler?2. What is an SDK (Software Development Kit)?3. Recap of Tree Data structure1. Tree traversal,2. Abstract Syntax trees4. MEF (Managed Extensibility Framework) Basics.5. Visual Studio & its history6. XML & JSON7. Serialization & Deserialization.8. Revisiting Visitor, Abstract Factory and Factory design patterns.9. MSBuild basics10. Async-await.CHAPTER 2: GETTING STARTEDCHAPTER GOAL: With the fundamentals strongly in place, we are now good to get started with Visual Studio (VS) Extensibility model. We will do our setup in this chapter. This chapter would introduce the VS Extensibility, Roslyn to the reader. The reader would also learn to write and debug a VS extension.NO OF PAGES: 40SUB - TOPICS1. Prerequisites and installation of VS2. Anatomy of a VSIX3. How Visual Studio discovers and loads extensions.4. VSPackage5. Async Loading6. Writing your first simple templatized Visual Studio Extension.7. Roslyn - .NET Compiler platform fundamentalsCHAPTER 3: EXTENDING VISUAL STUDIOCHAPTER GOAL: This chapter would introduce the extensibility model and how various extensions can be plugged in VSas menus, commands, tool window, code window, solution explorer etcNO OF PAGES: 40-50SUB - TOPICS:1. The Visual Studio Extensibility model2. Tool Window extension3. Menus & commands,4. Code Window extension5. Solution explorer item extensionCHAPTER 4: DEVELOPING REAL WORLD EXTENSIONS - ICHAPTER GOAL: This chapter dives into developing useful real-world VS Extensions and shows how they can be made configurable by customizing UI and options page.We would also learn how to write to output window and manipulate documents and projects in this chapter.NO OF PAGES: 40-50SUB - TOPICS:1. VS Extension to search on MSDN/Bing/Google.2. VS Extension to generate HTTP Client proxy class for HTTP Web API using T4 templates.3. VS Extension to generate test data.4. Customizing extension by developing Tools option page.5. Customizing UI of extension.CHAPTER 5: DEVELOPING REAL WORLD EXTENSIONS - IICHAPTER GOAL: This chapter is the continuation of last chapter and continues the development of useful real-world VS extensions but this time using the .NET Compiler platform – Roslyn.NO OF PAGES: 40-50SUB - TOPICS:1. Rewrite VS Extension to generate HTTP Client proxy class for HTTP Web API using Roslyn.2. Developing a custom code analysis Visual Studio Extension.3. Developing a light bulb style code refactoring.4. Developing Roslyn based extension to generate unit tests using T4 template.CHAPTER 6: DO MORE WITH VS SDKCHAPTER GOAL: This chapter introduces the reader with famous Visual Studio Isolated and integrated Shell to develop applications that looks like Visual Studio and also develops handy productivity boosters like custom code snippets, debugger visualizers, modifying intellisense, debugging experience for developersNO OF PAGES: 40-50SUB - TOPICS:1. VS Isolated and Integrated Shell2. Developing applications that look like Visual Studio.3. Extending the debugger.4. Create custom code snippets.5. Create Debugger Visualizer for view data while debugging.6. Modifying intellisense.CHAPTER 7: TEMPLATES, DEBUGGING VS EXTENSIONSCHAPTER GOAL: This chapter explains how to create project and item templates. The chapter also shows a sample code lens extension then dives into debugging the extensionNO OF PAGES: 40-50SUB - TOPICS:6. Code lens sample extension.7. Creating Project and Item template.8. Debugging VS Extensions.CHAPTER 8: DEPLOYING VS EXTENSIONSCHAPTER GOAL: This chapter explains how to deploy VS extensions using continuous integration (CI). The chapter also explains how the extension can be made available to the world by uploading in marketplace. We also discuss how to make a private extension gallery and host your extension there.NO OF PAGES: 40-50SUB - TOPICS:9. Deploying a VS Extension using CI.10. Creating a private extension gallery/ Atom feed11. Hosting extension in private gallery.12. Sharing extension with the world using marketplace.CHAPTER 9: TIPS, TRICKS, EXTENSIONS AND WORDSCHAPTER GOAL: This chapter discusses few of the coolest tips and tricks for Visual Studio and its extensibility and shares few highly useful extensions. The chapter and book conclude with closing remarks on extensibility of Visual Studio Code and integration with Visual Studio Team Services (VSTS) or Azure DevOps.NO OF PAGES: 30-40SUB - TOPICS:1. Cool Tips and tricks2. Useful Extensions for C#, VB, JS, TS and CSS developers.3. A word on Visual Studio Code Extensibility4. Integration with VSTS or Azure DevOpsUseful Resources – 1 pageMore Reading – 1 pageCode Samples – Link to code samples from GitHub.
Algorithmen in Python
Inhalt Algorithmen gehören zum Rüstzeug guter Entwickler und Programmierer. Dieses Buch stellt Ihnen eine Vielzahl an problemlösenden Techniken für den Programmieralltag vor und zeigt, wie Sie diese Techniken in Ihre Anwendungen implementieren. Dabei lernen Sie 32 Klassiker der Informatik kennen, vom einfachen Such-Algorithmus bis zu genetischen Algorithmen und neuronalen Netzen in der KI. Randvoll mit Codebeispielen in Python sowie Profitipps für Programmierer. Selbst wenn Ihnen einiges bekannt vorkommen wird, es warten zahlreiche Aha-Erlebnisse auf Sie. Ideal für alle, die ihre ersten Schritte in der Programmierung hinter sich haben und jetzt voll durchstarten wollen! - Programmieren trainieren mit bekannten und modernen Klassikern - Von der Suche bis zu k-Means, vom Dreizeiler bis zur dynamischen Programmierung und KI - Für Studium, Coding-Katas, Workouts oder in Eigeninitiative - Titel der amerikanischen Originalausgabe: "Classic Computer Science Problems in Python"
Configuration of a Simple Samba File Server, Quota and Schedule Backup
This work is a step-by-step how to guide for configuring Samba file server, Quota andscheduled backup of important files. The paper provides an installation guide for,1. Samba server.2. Quota.3. Scheduled backup of important files.I am Dr. Hidaia Mahmoud Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator. I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering. I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http:// www.anticorruption.000space.comMy personal website: www.hidaia-alassouli.000space.comEmail: hidaia_alassouli@hotmail.com
Beginning Unity Android Game Development
Master the art of programming games for Android using the Unity3D game engine. This book will help you understand basic concepts of game development in Unity. By the end of Beginning Unity Android Game Development, you will have the knowledge to confidently build an Android game.The book starts by explaining simple programming concepts to make beginners comfortable with the jargon. You will then learn to navigate around the Unity interface and use basic tools (hand, move, rotate, scale, and rect). You will also be acquainted with the creation of basic 3D objects in the game while understanding the purpose of several of Unity’s windows.In the last chapters, you will learn to create a simple game for Android using the concepts studied in the previous chapters. Scripts will be written to handle the behaviors of the player and enemies as well as to handle other aspects of the game. The author shares tips along the way to help improve in-game performance, such as switching to the universal rendering pipeline when targeting mobile platforms.At the end of the book, you will have a solid knowledge in making basic Android games that can be upgraded later to make more complex games.WHAT YOU WILL LEARN* Explore basic Unity and C# programming concepts and scripting for Android games* Navigate around the Unity interface and use its basic tools* Make the most of popular components and features of Unity* Write an Android game with optimizationsWHO THIS BOOK IS FORAbsolute beginners learning to program games for the Android platform using Unity3D. Basic knowledge of programming would be beneficial for the reader but is not required.Kishan started out by learning programming at a young age with Python. Finding a bigger interest in game development, he has been developing games using the Unity game engine for over four years now. He is also a Linux lover and has worked on his own distribution. Currently, he resides in his home country, Mauritius, where he often participates in major technical events and hackathons with Cyberstorm.mu while developing quality games and improving his portfolio with new skills.CHAPTER 1: PROGRAMMING CONCEPTSChapter Goal: This chapter is intended to make the reader feel comfortable with basic programming concepts and operations. It will make further topics about game dev scripting more accessible to those with no past programming experience.Sub -Topics:1. Fundamentals of programming2. Variables, constants, and types3. Arithmetic operations4. Boolean expressions5. Selection6. Iteration7. FunctionsCHAPTER 2: INTRODUCTION TO UNITYChapter Goal: This chapter provides an introduction to the Unity game engine and IDE. It shows how to navigate around, create basic objects and using transform tools to move, scale and rotate. The purpose of the Scene, Game, Hierarchy, Inspector, Project and Asset Store windows are also discussed.Sub -Topics:1. Creating a Unity account2. Downloading Unity and required add-ons3. Scene view4. Game view5. Hierarchy window6. Inspector window7. Using the transform tools8. Project window9. Asset store windowCHAPTER 3: GAMEOBJECTS, PREFABS, MATERIALS, AND COMPONENTSChapter Goal: We learn more about GameObjects, the benefits of making prefabs, and the use of several components. A small overview of the need to use materials is also provided.Sub -Topics:1. What are GameObjects and Prefabs2. Transform component3. Camera component4. Lighting component5. Renderer component6. Collider component7. Rigidbody component8. Audio source component9. Particle emitter component10. Trail renderer component11. MaterialsCHAPTER 4: USER INTERFACEChapter Goal: The Canvas component is introduced and the reader will learn about making a game more interactive using touch input.Sub -Topics:1. The Canvas component2. Text3. Image/RawImage4. Slider5. Input field6. Button7. Introduction to input axesCHAPTER 5: BUILDING OUR FIRST ANDROID GAME - SPHERE SHOOTERChapter Goal: After creating a new project, we learn about switching to a more lightweight rendering pipeline. The reader will learn how to create the game environment, first enemy, player tank and bullets. Scripts will also need to be written to handle player movement, shooting, enemy instantiation and behavior.Sub -Topics:1. The lightweight rendering pipeline2. Creating game terrain and adjusting lighting3. Making prefabs for the player, first enemy, and bullets4. Player movement5. Player shooting6. Spawning enemies7. Enemy movement8. Enemy destruction9. Game overCHAPTER 6: IMPROVING THE GAME - SPHERE SHOOTERChapter Goal: We will learn how to make the game more interesting by creating simple but elegant canvas elements, introduce concepts such as health and score, make two more types of enemies, introduce pickups, add more sound effects to the game along with particle systems, implement mobile controls and exporting a build ready to be played.Sub -Topics1. Fancy Menu when starting the game and dying2. Adding the concept of score3. Adding the concept of health4. Implementing particle systems5. Making a new faster enemy6. Making a new bigger enemy7. Creating a health pickup8. Adding sound effects9. Mobile joysticks10. Editing player settings and exporting11. What next?
IoT mit SAP
Wie können Sie das Internet der Dinge (IoT) gewinnbringend nutzen? Dieser praktische Leitfaden führt Sie durch das Angebot der SAP-IoT-Plattform – immer orientiert an typischen Anwendungsfällen in Industrie und Wirtschaft. Sie erfahren, welche IoT-Services Ihnen auf der SAP Cloud Platform und mit SAP Leonardo zur Verfügung stehen und wie Sie diese einsetzen, um Ihre eigene Architektur aufzusetzen. Darüber hinaus lernen Sie SAP-Standardlösungen für Asset Management und Real-Time Track and Trace kennen, die Sie direkt implementieren können. Aus dem Inhalt: ReferenzarchitekturDigitaler ZwillingEdge ComputingSAP Cloud PlatformSAP Leonardo IoTDigital Supply ChainSAP Asset Intelligence Network (AIN)SAP Predictive Maintenance and ServiceSicherheit und Backend-AnbindungImplementierungsbeispiele für kundeneigene IoT-LösungenUse Cases und Projektmethoden Vorwort ... 15 Einleitung ... 17 1. Was ist das Internet der Dinge? ... 25 1.1 ... Das Internet der Dinge in Alltag und Industrie ... 25 1.2 ... Internet der Dinge: Begriffsabgrenzungen ... 33 1.3 ... Historische Entwicklung des Internets der Dinge ... 37 1.4 ... Weiterentwicklung und Potenzial des Internets der Dinge ... 43 2. Technische Grundlagen und Komponenten ... 47 2.1 ... Eigenschaften von IoT-Systemen ... 48 2.2 ... Architektur von IoT-Systemen ... 63 2.3 ... Funktionale Anforderungen an IoT-Systeme ... 81 2.4 ... Computing-Konzepte im Umfeld von IoT-Systemen ... 93 Die SAP-IoT-Plattform ... 99 3. IoT im Kontext von SAP ... 101 3.1 ... IoT in der SAP-Strategie ... 101 3.2 ... Einführung in die SAP-IoT-Plattform ... 116 3.3 ... Marktpositionierung der SAP-IoT-Plattform ... 130 4. SAP Cloud Platform ... 137 4.1 ... Erste Schritte mit der SAP Cloud Platform ... 137 4.2 ... Integrationsservices ... 144 4.3 ... Services für Datenspeicherung und -verwaltung ... 172 4.4 ... Services für Benutzeroberflächen und Sicherheit ... 176 4.5 ... Services für Entwicklung und Betrieb ... 184 5. IoT-Services der SAP Cloud Platform ... 195 5.1 ... SAP Cloud Platform IoT ... 196 5.2 ... SAP Leonardo IoT ... 206 6. SAP Edge Services ... 229 6.1 ... Komponenten und Funktionen der SAP Edge Services ... 230 6.2 ... SAP Edge Services installieren und testen ... 237 SAP-IoT-Standardlösungen für die digitale Supply Chain ... 249 7. Asset Management: digitaler Service, Wartung und Instandhaltung ... 251 7.1 ... Industrietrends und Kernkonzepte ... 252 7.2 ... Digitale Prozesse und neue Geschäftsmodelle ... 259 7.3 ... SAP Intelligent Asset Management Suite ... 265 7.4 ... Integration mit den Backend-Systemen ... 288 7.5 ... Kundenbeispiele ... 292 8. Realtime Track and Trace in der Logistik ... 295 8.1 ... Industrietrends und Anforderungen ... 296 8.2 ... Echtzeit-Logistikmanagement mit SAP ... 305 8.3 ... Relevante IoT-Technologien ... 313 8.4 ... Partner- und Kundenbeispiele ... 319 Individuelle IoT-Lösungen mit SAP ... 327 9. Füllstand von Behältern überwachen und Nachschub anstoßen ... 329 9.1 ... Softwarearchitektur und Integration ... 330 9.2 ... Nutzen und betriebswirtschaftliche Relevanz des Szenarios ... 351 10. Pay per Use und Abonnement-Modelle ... 353 10.1 ... Softwarearchitektur und Integration ... 354 10.2 ... Nutzen und betriebswirtschaftliche Relevanz des Szenarios ... 378 11. Edge Computing bei speziell zu schützenden Geräten ... 379 11.1 ... Softwarearchitektur und Integration ... 380 11.2 ... Nutzen und betriebswirtschaftliche Relevanz des Szenarios ... 399 12. IoT-Szenarien mit Objekterkennung ... 401 12.1 ... Objekterkennung, neuronale Netze und künstliche Intelligenz ... 402 12.2 ... Softwarearchitektur und Integration ... 405 12.3 ... Nutzen und betriebswirtschaftliche Relevanz ... 419 IoT-Projekte mit SAP-Software umsetzen ... 421 13. Vorbereitung eines IoT-Projekts ... 423 13.1 ... Den passenden Use Case finden ... 424 13.2 ... Den passenden IoT-Hardwarehersteller auswählen ... 444 13.3 ... Bestehende Hardware integrieren ... 448 13.4 ... Strategische Partnerschaften schließen ... 452 14. Methoden zur Durchführung eines IoT-Projekts ... 465 14.1 ... Design Thinking ... 466 14.2 ... Agil zum Projekterfolg ... 476 14.3 ... Aufbau eines digitalen Geschäftsmodells ... 485 14.4 ... Sicherheit von IoT-Systemen ... 490 A. Literatur und Quellenverzeichnis ... 495 B. Das Autorenteam ... 509 Index ... 511
Quick Configuration of Openldap and Kerberos In Linux and Authenicating Linux to Active Directory
This paper is a step-by-step how to guide for configuring of Openldap server, Kerberos server and shows the procedure for authentication of Linux Machine to Active Directory. The paper provides an installation guide for,1.OpenLDAP server and client.2.Kerberos server and client.3.Procedure for authenticating Linux Machine to Active Directory.I am Dr. Hidaia Mahmoud Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator. I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering. I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http:// www.anticorruption.000space.comMy personal website: www.hidaia-alassouli.000space.comEmail: hidaia_alassouli@hotmail.com
IoT Development for ESP32 and ESP8266 with JavaScript
This book introduces a new approach to embedded development, grounded in modern, industry-standard JavaScript. Using the same language that powers web browsers and Node.js, the Moddable SDK empowers IoT developers to apply many of the same tools and techniques used to build sophisticated websites and mobile apps.The Moddable SDK enables you to unlock the full potential of inexpensive microcontrollers like the ESP32 and ESP8266. Coding for these microcontrollers in C or C++ with the ESP-IDF and Arduino SDKs works for building basic products but doesn't scale to handle the increasingly complex IoT products that customers expect. The Moddable SDK adds the lightweight XS JavaScript engine to those traditional environments, accelerating development with JavaScript while keeping the performance benefits of a native SDK.Building user interfaces and communicating over the network are two areas where JavaScript really shines. _IoT Development for ESP32 and ESP8266 with JavaScript_ shows you how to build responsive touch screen user interfaces using the Piu framework. You'll learn how easy it is to securely send and receive JSON data over Wi-Fi with elegant JavaScript APIs for common IoT protocols, including HTTP/HTTPS, WebSocket, MQTT, and mDNS. You'll also learn how to integrate common sensors and actuators, Bluetooth Low Energy (BLE), file systems, and more into your projects, and you'll see firsthand how JavaScript makes it easier to combine these diverse technologies.If you're an embedded C or C++ developer who has never worked in JavaScript, don't worry. This book includes an introduction to the JavaScript language just for embedded developers experienced with C or C++.WHAT YOU'LL LEARN* Building, installing, and debugging JavaScript projects on the ESP32 and ESP8266* Using modern JavaScript for all aspects of embedded development with the Moddable SDK* Developing IoT products with animated user interfaces, touch input, networking, BLE, sensors, actuators, and moreWHO THIS BOOK IS FOR* Professional embedded developers who want the speed, flexibility, and power of web development in their embedded software work* Makers who want a faster, easier way to build their hobby projects* Web developers working in JavaScript who want to extend their skills to hardware productsPETER HODDIE is an engineer and entrepreneur focused on client software. He is recognized for crafting compact and efficient code that pushes the boundaries of user experience on consumer hardware. The software he and his teams have built has powered mass-market consumer products from companies including Apple, Palm, Sling, HP, and Sony. Peter recognizes that the first users of any product are the developers creating it, and that those developers cannot build compelling consumer products on a foundation that’s unstable, complex, or confusing. He therefore champions investments in great tools and a simple runtime architecture.Peter has founded several companies, including Kinoma, which merged into Marvell Semiconductor. He led QuickTime development at Apple during the 1990s as a Distinguished Engineer. He contributed to the development of the QuickTime file format and its adoption by ISO into the MPEG-4 standard. He is currently a member of the JavaScript language standards committee (ECMA TC39) and chair of ECMA TC53 for "Smart wearable systems and sensor-based devices". Peter is particularly proud of his work putting both the KinomaJS framework and Darwin Streaming Server into open source. He continues to come to terms with the 10 patents that bear his name.LIZZIE PRADER is an engineer whose educational background is in theoretical computer science, but is currently better described as an engineer focused on developers’ needs. She recognizes the importance of customer support during all stages of a project, and enjoys working with developers to smooth the on-ramp to embedded development. Working with users of all skill levels—from professional engineers to makers and hobbyists to absolute programming beginners—has made her an advocate of well-organized documentation and readable code.Prior to Moddable, Lizzie worked as a developer relations engineer at Kinoma. Her main goal was to help customers get the most out of Kinoma’s software and hardware prototyping products, both through direct contact with developers and by creating a variety of resources including sample code, tutorials, and blog postsChapter 1: Getting StartedThe goal of this section is to get the reader set-up with the hardware, development environment, and their basic JavaScript skills. This equips them to run the examples in the remaining chapters.Chapter 2: NetworkingThe goal of this section is to teach the reader how to use Wi-Fi to communicate with cloud services and other devices. It provides guidance on when it is appropriate to use the various network services. It also explains how to use standard JSON to communicate with network services.Chapter 3: Bluetooth Low Energy (BLE)This is the only chapter which only applies to the ESP32, as the ESP8266 does not have BLE hardwareChapter 4: Files and DataThis section explains how to access and store data. In addition to introducing the file system, it explains why a file system isn’t always the best choice for an IoT product and introduces alternativesChapter 5: Working with hardware (Sensors and actuators)This section introduces the hardware protocols supported by the Moddable SDK and gets the reader started with a few sensors and actuators. In addition to demonstrating how to use a few specific sensors, it provides guidance on how to build JavaScript modules for other off-the-shelf sensors. This chapter introduces Timers, a common tool for working with hardware used to delay operations and perform periodic actions.Chapter 6: Graphics for IoTThis chapter explains why graphical user interfaces are a valuable addition to IoT products. It introduces the fundamentals of working with graphics on MCUs that were not designed to support graphics. The reader will learn about key performance bottlenecks so that they will have the knowledge needed to build modern graphical displays for their IoT projects using the ESP8266 and ESP32. The chapter also describes the relationship between the Commodetto Graphics Library and the Piu User Interface framework so the reader can choose the tool that is best for their project.Chapter 7: Commodetto Graphics LibraryThis section introduces use of the Commodetto graphics library to build user displays. It contains examples of using each graphic operation provided by the Poco rendering engine.Chapter 8: Piu User Interface FrameworkThis section provides an overview of the Piu user interface framework and examples of the most commonly used objects from the Piu APIChapter 9: Adding native codeThis section describes how to increase the performance and features of the reader’s IoT projects through the strategic use of native C code. It teaches how to integrate C code into a JavaScript application. It provides guidance on when it is appropriate to use C code, by explaining the benefits and risks of using native code.Chapter 10: SecurityChapter 11: What’s Next?This section covers a few advanced topics and provides links to additional developer resources. The goal is to provide readers with the information necessary to move on to developing more complex and customizable applications.
Securing Critical Infrastructures
This book explains the modern techniques required to protect a cyber security critical infrastructure. Three fundamental techniques are presented, namely: network access control, physical access control, encryption and decryption techniques.Dr. Kamara had won two awards for community building in higher education and is an author of two other books:The Implications of Internet Usage, 2013The Impacts of Cognitive Theory on Human and Computer Science Development, 2016
Preisfindung und Konditionstechnik mit SAP
Geht nicht gibt’s nicht! In diesem Buch lernen Sie, wie Sie die Preisfindung in Ihrem Unternehmen einrichten und optimieren, um sowohl alltägliche als auch fortgeschrittene Anforderungen zu erfüllen. Das Autorenteam führt Sie von den Grundlagen der Konditionstechnik über das Standard-Customizing bis tief in die kundenindividuellen Anpassungen, die Ihnen das SAP-System ermöglicht. Sie erfahren, wie Sie mit Konditionssätzen, Kalkulationsschemata und Co. arbeiten. Nutzen Sie die detaillierten Informationen zu Formeln und Bedingungen, und setzen Sie auch die kniffligsten Wünsche der Vertriebskollegen in SD um. Aus dem Inhalt: Einsatzgebiete und Elemente der KonditionstechnikKonditionsstammdaten der PreisfindungAuswertungen und ArbeitsvorräteCustomizing der PreisfindungArbeiten mit KonditionssätzenPreisfindung im VertriebsbelegKalkulationsschemata und KonditionsartenWichtige Programme der PreisfindungTypische Praxisanforderungen an die PreisfindungBonusabwicklungKonditionssteckbriefe Einleitung ... 21 Teil I. Konditionstechnik ... 27 1. Einsatzgebiete und Elemente der Konditionstechnik ... 29 1.1 ... Eigenschaften von Konditionen ... 30 1.2 ... Einsatzgebiete der Konditionstechnik (Konditionsverwendung) ... 31 1.3 ... Ausgewählte Einsatzgebiete (Verwendungen) ... 33 1.4 ... Anwendungsbereiche der Konditionstechnik (Konditionsapplikation) ... 37 1.5 ... Elemente der Konditionstechnik im Überblick ... 40 1.6 ... Feldkatalog und Kommunikationsstrukturen ... 42 1.7 ... Konditionstabellen ... 43 1.8 ... Zugriffsfolgen ... 45 1.9 ... Konditionsarten ... 56 1.10 ... Konditionsstammdaten ... 57 1.11 ... Kalkulationsschemata ... 62 1.12 ... Findungsanalyse ... 63 1.13 ... Bedingungen ... 64 1.14 ... Gesamtablauf im Überblick ... 66 1.15 ... Fazit ... 67 2. Konditionsstammdaten der Preisfindung ... 69 2.1 ... Konditionspflege über die Konditionsart ... 69 2.2 ... Konditionspflege über Bereichsmenüs ... 74 2.3 ... Konditionspflege über den Index ... 78 2.4 ... Absprachen ... 79 2.5 ... Preisvereinbarungen ... 83 2.6 ... Fazit ... 84 3. Auswertungen und Arbeitsvorräte ... 85 3.1 ... Konditionslisten ... 85 3.2 ... Arbeitsvorräte in der Rolle »Vertriebsmitarbeiter im Innendienst« ... 92 3.3 ... Konditionsinfo ... 98 3.4 ... Nettopreisliste ... 99 3.5 ... Performanceoptimierte Preisliste ... 101 3.6 ... Fazit ... 129 Teil II. Preisfindung ... 131 4. Customizing der Preisfindung ... 133 4.1 ... Umsetzung eines ersten kundenindividuellen Preisfindungsszenarios ... 133 4.2 ... Elemente der Preisfindung im Detail ... 149 4.3 ... Kundenindividuelle Anpassungen und Kundennamensräume ... 168 4.4 ... Beispiel für die Umsetzung komplexerer Anforderungen ... 172 4.5 ... Konfigurierbare Formeln und Parameter ... 175 4.6 ... Anbindung an die Ergebnis- und Marktsegmentrechnung (COPA) ... 199 4.7 ... Fazit ... 200 5. Arbeiten mit Konditionssätzen ... 203 5.1 ... Freigabestatus ... 203 5.2 ... Massenänderungen/Anlegen mit Bezug ... 208 5.3 ... Kopieren von Konditionen ... 212 5.4 ... Konditionspflege mit Bereichsmenüs ... 216 5.5 ... Weitere Funktionen innerhalb der Konditionspflege ... 218 5.6 ... Fazit ... 223 6. Preisfindung im Vertriebsbeleg ... 225 6.1 ... Positionskonditionsbild ... 225 6.2 ... Kopfkonditionsbild ... 234 6.3 ... Vordefinierte Preiselemente in der Positionsübersicht ... 237 6.4 ... Preisvereinbarungen ... 238 6.5 ... Preisfindung beim Anlegen von Belegen mit Referenz ... 242 6.6 ... Preisfindung bei Miet- und Wartungsverträgen (periodischer Fakturierungsplan) ... 243 6.7 ... Preisfindung bei Festbetragverträgen (Meilensteinfakturierungsplan) ... 247 6.8 ... Preisfindung bei der Aufwandsabrechnung ... 252 6.9 ... Fazit ... 253 7. Spezielle Funktionen der Preisfindung ... 255 7.1 ... Gruppenkonditionen ... 255 7.2 ... Konditionsausschluss ... 258 7.3 ... Konditionsupdate ... 263 7.4 ... Steuerermittlung im Vertrieb ... 266 7.5 ... Naturalrabatt im Vertrieb ... 272 7.6 ... Kosten des Verkaufsvorgangs ... 275 7.7 ... Währungsumrechnungen im Vertrieb ... 279 7.8 ... Druckaufbereitung des Preisfindungsergebnisses ... 287 7.9 ... Fazit ... 292 Teil III. Weiterführende technische Grundlagen, Tipps und Tricks ... 293 8. Ausgewählte Kalkulationsschemata und Konditionsarten ... 295 8.1 ... Ausgewählte Kalkulationsschemata ... 297 8.2 ... Ausgewählte Konditionsarten des Standardschemas ... 313 8.3 ... Fazit ... 317 9. Besonderheiten der Konditionstechnik in der Preisfindung ... 319 9.1 ... Schnittstellen, Tabellen und Zusammenhänge ... 320 9.2 ... Datenermittlung über Konditionen ... 325 9.3 ... Felder mit Mehrfachbelegung ... 345 9.4 ... Fazit ... 349 10. Wichtige Programme der Preisfindung ... 351 10.1 ... Funktionsbaustein PRICING ... 352 10.2 ... Funktionsbaustein PRICING_COMPLETE ... 364 10.3 ... Funktionsbaustein PRICING_COPY ... 374 10.4 ... Datenablage des Preisfindungsergebnisses ... 375 10.5 ... Funktionsbaustein PRICING_REFRESH ... 376 10.6 ... Dialoganbindung/weitere Funktionsbausteine ... 377 10.7 ... Zusammenhang der Komponenten der Preisfindung ... 378 10.8 ... Fazit ... 379 11. Systemanpassungen mit Bedingungen, Formeln und User-Exits ... 381 11.1 ... Preisfindungsarten ... 383 11.2 ... Bedingungen ... 384 11.3 ... Ein Beispiel für den Einsatz der Formeln ... 388 11.4 ... Konditionsformeln ... 393 11.5 ... Sonderlogik der Preisfindungsart F in der Routine »xkomv_bewerten« ... 403 11.6 ... Preisfindungsergebnis in KOMP ... 405 11.7 ... Steuerungskennzeichen »xkomv-ksteu« ... 411 11.8 ... User-Exits ... 413 11.9 ... Erweiterungen der Tabelle KONV ... 420 11.10 ... Performanceaspekte ... 421 11.11 ... Fehlermeldungen/Fehlerbehandlung ... 422 11.12 ... Fazit ... 424 12. Typische Praxisanforderungen an die Preisfindung und ihre Lösung ... 425 12.1 ... Budgetierungsanforderungen ... 426 12.2 ... Konditionen wurden nicht gefunden -- woran liegt das? ... 436 12.3 ... Rundung ... 438 12.4 ... Preise mit mehr als zwei Nachkommastellen ... 439 12.5 ... Behandlung von Frachtzuschlägen ... 440 12.6 ... Berechtigungsabhängigkeit des Konditionsbildes ... 444 12.7 ... Aufnahme neuer Zwischensummenfelder ... 444 12.8 ... Stammdatenfelder datumsabhängig pflegen ... 444 12.9 ... Kopierte Konditionen und anschließende Mengenänderung ... 449 12.10 ... Gesteigerte Preise in Retouren und Gutschriften ... 455 12.11 ... Kennzahlen für Reporting und Analyse ... 457 12.12 ... Konditionssatzspezifische Bedingungen ... 473 12.13 ... Fazit ... 485 13. Preisfindung in ausgewählten Applikationen ... 487 13.1 ... Preisfindung im Kundenauftrag ... 488 13.2 ... Preisfindung in der Faktura ... 494 13.3 ... Preisfindung in der Bestellung ... 495 13.4 ... Preisfindung im Rechnungswesen ... 499 13.5 ... Steuerberechnung in der Finanzbuchhaltung ... 500 13.6 ... Preisfindung in der Transportabwicklung (Frachtkalkulation) ... 506 13.7 ... Fazit ... 507 14. Performance und Test ... 509 14.1 ... SAP-Tabellenpuffer ... 510 14.2 ... Konditions-Prestep und Zugriffsoptimierung ... 511 14.3 ... Reihenfolge der Felder in den Konditionstabellen ... 513 14.4 ... Einsatz von Bedingungen ... 514 14.5 ... Gruppenkonditionen und Formeln ... 514 14.6 ... Besonderheiten in Kundenauftrag und Faktura ... 515 14.7 ... Analyse-Tools ... 522 14.8 ... Testen ... 523 14.9 ... Fazit ... 526 15. Preisfindung in SAP S/4HANA ... 527 15.1 ... Überblick über SAP S/4HANA ... 527 15.2 ... Unterschiede und Gemeinsamkeiten von SAP ERP und SAP S/4HANA ... 530 15.3 ... Migration nach SAP S/4HANA ... 541 15.4 ... Preisfindung in SAP S/4HANA Cloud ... 545 15.5 ... Fazit ... 554 Teil IV. Bonusabwicklung im Vertrieb ... 555 16. Bonusabwicklung im Vertrieb ... 557 16.1 ... Übersicht über die Bonusabwicklung ... 557 16.2 ... Elemente der Bonusabwicklung im Detail ... 579 16.3 ... Erweiterte Bonusverarbeitung ... 599 16.4 ... Systemanpassungen im Bonusumfeld ... 610 16.5 ... Typische Praxisanforderungen ... 616 16.6 ... Fazit ... 619 Anhang ... 621 A. Konditionssteckbriefe ... 622 B. SAP-CRM-Anbindung ... 670 C. Die Autoren ... 674 Index ... 676
SAP Integrated Business Planning
Mit diesem Buch steuern Sie Ihre Supply Chain schnell und lückenlos. Zunächst lernen Sie die verschiedenen Prozesse, Bestandteile sowie die Konfiguration von SAP Integrated Business Planning for Supply Chain im Detail kennen. Anschließend zeigen Ihnen die Autoren, wie Sie das Tool für die bereichsübergreifende Echtzeitplanung und -analyse Ihrer gesamten Lieferkette einsetzen. Best Practices unterstützen Sie bei Ihrem Implementierungsprojekt. Aus dem Inhalt: User Interfaces von SAP IBPVerwendung von Stamm- und BewegungsdatenExcel-Konfiguration Sales and Operations PlanningDemand PlanningInventory PlanningSupply and Response PlanningSupply Chain Control Tower AnalyticsSAP JamZeit- und auftragsbasierte SchnittstellenBest Practices: Rapid Deployment Solutions Einleitung ... 15 1. Betriebswirtschaftliche Einordnung ... 19 1.1 ... Prozesse der Supply-Chain-Planung ... 19 1.2 ... Überblick über SAP IBP ... 27 1.3 ... Integrierte Beispiele (Best Practice) ... 38 2. Benutzeroberflächen ... 45 2.1 ... Browserbasierte Benutzeroberflächen (Web UIs) ... 45 2.2 ... Microsoft Excel ... 61 3. Grundlagen der übergreifenden Konfiguration ... 101 3.1 ... Attribute ... 101 3.2 ... Stammdatentypen ... 106 3.3 ... Zeitprofile ... 116 3.4 ... Planungsbereiche ... 131 3.5 ... Planungsebenen ... 156 3.6 ... Kennzahlen ... 161 3.7 ... Versionen ... 168 3.8 ... Planungsoperatoren ... 170 3.9 ... Globale Konfiguration ... 176 3.10 ... Aktivierung von Planungsmodellen ... 178 4. Sales and Operations Planning mit SAP IBP ... 185 4.1 ... Überblick und Ziele ... 185 4.2 ... Funktionen von SAP IBP für Sales and Operations ... 189 4.3 ... Der S&OP-Prozess mit SAP IBP ... 205 4.4 ... Konfiguration und Einstellungen in SAP IBP für Sales and Operations ... 224 5. Absatzplanung mit SAP IBP für Demand ... 251 5.1 ... Überblick und Ziele ... 251 5.2 ... Klassische Absatzplanung mit SAP IBP für Demand ... 254 5.3 ... Demand Sensing mit SAP IBP für Demand ... 271 5.4 ... Konfiguration von SAP IBP für Demand ... 277 6. Bestandsplanung mit SAP IBP für Inventory ... 313 6.1 ... Einführung in die Bestandsplanung ... 313 6.2 ... Konfiguration von SAP IBP für Inventory ... 317 7. Demand-Driven Materials Requirement Planning ... 379 7.1 ... Überblick und Ziele ... 379 7.2 ... Der DDMRP-Prozess mit SAP IBP ... 381 7.3 ... SAP IBP für Demand-Driven Replenishment konfigurieren ... 384 8. Bestätigungs- und Beschaffungsplanung mit SAP IBP für Response and Supply ... 405 8.1 ... Basiseinstellungen ... 407 8.2 ... Priorisierung der Bedarfe ... 424 8.3 ... Beschaffungs- und Kontingentierungsplanung ... 427 8.4 ... Bestätigungsplanung ... 439 8.5 ... Deployment ... 443 8.6 ... Simulations- und Szenarioplanung ... 444 8.7 ... Konfiguration der Response-and-Supply-Planung ... 446 9. SAP Supply Chain Control Tower ... 511 9.1 ... SAP Supply Chain Control Tower -- Ziele und Funktionen ... 511 9.2 ... Konfiguration des SAP Supply Chain Control Towers ... 521 10. SAP Jam ... 539 10.1 ... Integration von SAP Jam in SAP IBP ... 540 10.2 ... Funktionen von SAP Jam ... 549 11. Datenintegration in SAP IBP ... 561 11.1 ... Zeitreihenbasierte Integration ... 562 11.2 ... Auftragsbasierte Integration ... 590 11.3 ... Integration mit SAP Ariba ... 615 Das Autorenteam ... 619 Index ... 621
Controlling in SAP S/4HANA
Mit diesem Buch meistern Sie die tägliche Arbeit im Controlling mit SAP S/4HANA! Anhand anschaulicher Beispiele leitet es Sie durch den Wertefluss im SAP-System: Sie lernen, wie Sie eine aussagekräftige Kostenstellenrechnung aufbauen sowie Ihre Produkte und Dienstleistungen kalkulieren. Außerdem erfahren Sie, was das Zusammenwachsen von FI und CO für Sie bedeutet und welche neuen Planungs-, Analyse- und Reportingmöglichkeiten Ihnen zur Verfügung stehen. Viele praktische Beispiele und Tipps unterstützen Sie dabei, die Möglichkeiten des Systems voll auszuschöpfen. Aus dem Inhalt: Stammdaten und OrganisationsstrukturenUniversal JournalGemeinkostencontrollingKostenstellenrechnungInnenauftragsrechnungProduktkostenplanungKostenträgerrechnungErgebniscontrollingDeckungsbeitragsrechnung Vorwort ... 13 Einleitung ... 15 1. Integration von Controlling und Finanzbuchhaltung ... 21 1.1 ... Verschmelzung des Controllings mit der Finanzbuchhaltung im Universal Journal ... 22 1.2 ... Verknüpfung von Stammdaten der Finanzbuchhaltung und des Controllings ... 24 1.3 ... Zusammenfassung ... 27 2. Organisationsstruktur in Controlling und Finanzbuchhaltung ... 29 2.1 ... Organisationsstrukturen in der Finanzbuchhaltung ... 30 2.2 ... Organisationsstrukturen im Controlling ... 38 2.3 ... Zusammenfassung ... 47 3. Werteflüsse in das Controlling ... 49 3.1 ... Schnittstellen zur Finanzbuchhaltung ... 49 3.2 ... Schnittstellen zur Materialwirtschaft ... 60 3.3 ... Schnittstellen zur Produktion ... 75 3.4 ... Schnittstellen zum Vertrieb ... 82 3.5 ... Zusammenfassung ... 91 4. Stammdaten anlegen und pflegen ... 93 4.1 ... Kostenarten ... 94 4.2 ... Bilanz-/GuV-Strukturen, Gruppen und Hierarchien für Kostenarten anlegen und pflegen ... 109 4.3 ... Kostenstellen gruppieren ... 113 4.4 ... Kostenstellen anlegen und pflegen ... 117 4.5 ... Leistungsarten anlegen und pflegen ... 129 4.6 ... Statistische Kennzahlen anlegen und pflegen ... 134 4.7 ... Innenaufträge anlegen und pflegen ... 137 4.8 ... Projekte anlegen und pflegen ... 150 4.9 ... Zusammenfassung ... 161 5. Gemeinkosten-Controlling ... 163 5.1 ... Kostenstellenrechnung ... 163 5.2 ... Innenaufträge ... 203 5.3 ... Zusammenfassung ... 270 6. Produktkosten-Controlling ... 271 6.1 ... Produktkostenkalkulation ... 272 6.2 ... Kostenträgerrechnung ... 349 6.3 ... Reporting im Produktkosten-Controlling ... 382 6.4 ... Zusammenfassung ... 404 7. Ergebnisrechnung ... 405 7.1 ... Einführung in die Ergebnisrechnung ... 406 7.2 ... Grundeinstellungen ... 413 7.3 ... Istwertefluss ... 450 7.4 ... Reporting ... 516 7.5 ... Predictive Accounting in SAP S/4HANA ... 524 7.6 ... Zusammenfassung ... 533 Anhang ... 535 A ... Glossar ... 537 B ... Transaktionen und SAP-Fiori-Apps ... 547 C ... Weiterführende Informationsquellen ... 553 D ... Die Autorinnen ... 559 Index ... 561
User Experience mit SAP
Benutzerfreundliche, anforderungsorientierte SAP-Oberflächen? Nichts leichter als das! In diesem Buch lernen Sie Methoden und Best Practices kennen, mit denen der Fokus der Entwicklung von Anfang an auf den Erwartungen der Anwender liegt. Die Autoren zeigen Ihnen, wie Sie mit SAP-Fiori-Design und modernen SAP-Technologien Anwendungen erstellen, die der digitalen Transformation in Ihrem Unternehmen den Weg bereiten. Aus dem Inhalt: User Experience, Usability und DesignUX-Fehlgriffe und was man daraus lernen kannKonzepte von SAP Fiori 3.0Methoden und TechnikenDesigngetriebene EntwicklungPrototyping, Umsetzung und EvaluationSAP Screen PersonasSAP Fiori ElementsSAP Mobile Cards und Mobile Development Kit (MDK)SAP Cloud Platform SDK for iOSSAP CoPilot und SAP Conversational AIAugmented Reality und weitere UI-Trends Vorwort ... 15 Einleitung ... 17 TEIL I Einführung ... 23 1. Was ist eigentlich User Experience? ... 25 1.1 ... User Experience, Usability und UI-Design ... 26 1.2 ... User Experience in Zeiten von Marken, Innovationen und Social Media ... 34 1.3 ... Zusammenfassung ... 36 2. Dos and Don'ts: Faktoren für gute User Experience ... 37 2.1 ... Drei Beispiele für User Experience und was man daraus lernen kann ... 38 2.2 ... Einflussfaktoren für User Experience ... 50 2.3 ... Gute User Experience ist kein Zufall ... 53 2.4 ... Zusammenfassung ... 58 3. SAPs Weg zur neuen User Experience ... 61 3.1 ... Rückblick: die Zeit vor SAP Fiori ... 61 3.2 ... SAP Fiori - SAP entdeckt User Experience ... 69 3.3 ... SAP Fiori 2.0 - die SAP S/4HANA User Experience ... 81 3.4 ... SAP Fiori 3 - konsistent, intelligent und integriert ... 88 3.5 ... Zusammenfassung ... 95 TEIL II UX-Strategie, -Methoden und -Techniken ... 97 4. Mit Experience Management zum intelligenten Unternehmen ... 99 4.1 ... SAP S/4HANA als Mittelpunkt der Intelligent Suite ... 100 4.2 ... Neuer Kurs für Ihre UX-Strategie ... 111 4.3 ... Zusammenfassung ... 119 5. Die passende UX-Strategie ... 121 5.1 ... Blaupause für den UX-Designprozess ... 122 5.2 ... Die Rolle des UX-Designers ... 131 5.3 ... Design Thinking und ein nutzerorientierter Designprozess ... 135 5.4 ... UX-Methoden ... 137 5.5 ... Stolpersteine umgehen ... 156 5.6 ... Zusammenfassung ... 159 6. Ein Blick in den SAP-Baukasten ... 161 6.1 ... SAP-UI-Technologien und UX-Werkzeuge im Überblick ... 162 6.2 ... SAP Cloud Platform ... 168 6.3 ... Wichtige UI-Technologien ... 172 6.4 ... Werkzeuge ... 180 6.5 ... Einstiegspunkte und Clients ... 184 6.6 ... Auswahl der richtigen UX-Technologie ... 188 6.7 ... Zusammenfassung ... 189 TEIL III User Experience gestalten ... 191 7. Klassische Transaktionen mit SAP Screen Personas transformieren ... 193 7.1 ... Einsatzszenarien und Zielgruppe von SAP Screen Personas ... 194 7.2 ... Mit SAP Screen Personas arbeiten ... 208 7.3 ... Praxisbeispiel: Redesign einer SAP-Transaktion für Instandhaltungsprozesse ... 222 7.4 ... Zusammenfassung ... 235 8. Vorgefertigte User Experience: SAP Fiori Elements und SAP Build ... 237 8.1 ... Einführung in SAP Fiori Elements ... 238 8.2 ... Entwicklung von Apps mit SAP Fiori Elements ... 255 8.3 ... Praxisbeispiel: Entwicklung einer Raumplanungs-App ... 271 8.4 ... Zusammenfassung ... 291 9. Eigene SAP-Fiori-Apps entwickeln ... 293 9.1 ... Standard oder Eigenentwicklung? Einsatzmöglichkeiten für SAP-Fiori-Design und SAPUI5 ... 294 9.2 ... Praxisbeispiel 1: High-Fidelity-Prototyping mit Axure RP und SAP Fiori Design Stencils ... 308 9.3 ... Praxisbeispiel 2: Design von SAP-Fiori-Apps für das Smart-Carrier-Projekt ... 316 9.4 ... Zusammenfassung ... 329 10. SAP aus der Brieftasche: SAP Mobile Cards und Mobile Development Kit ... 331 10.1 ... Einführung in die SAP Cloud Platform Mobile Services ... 332 10.2 ... Eine OData-Service-Applikation zur Datenanbindung anlegen ... 335 10.3 ... Mobile Cards entwickeln ... 340 10.4 ... Cross-Plattform-Apps mit dem Mobile Development Kit entwickeln ... 352 10.5 ... Praxisbeispiel: Gestaltung eines innovativen Prozesses zur effizienten Raumnutzung ... 362 10.6 ... Zusammenfassung ... 370 11. Eine mobile iOS-App: SAP Cloud Platform SDK for iOS ... 373 11.1 ... Besonderheiten der mobilen Entwicklung ... 374 11.2 ... Einführung in das SAP Cloud Platform SDK for iOS ... 384 11.3 ... Praxisbeispiel: Design einer Produktkatalog-App für iOS ... 409 11.4 ... Zusammenfassung ... 431 TEIL IV Design- und Technologietrends für die User Experience der Zukunft ... 433 12. Smarte Assistenten im Geschäftsumfeld: SAP Conversational AI ... 435 12.1 ... Conversational User Experience ... 436 12.2 ... SAP Conversational AI ... 439 12.3 ... Praxisbeispiel: Entwicklung eines Chatbots mit SAP Conversational AI ... 443 12.4 ... Von SAP CoPilot zu SAP Conversational AI ... 450 12.5 ... Best Practices für die Designphase von Conversational-UX-Anwendungen ... 452 12.6 ... Zusammenfassung ... 456 13. User Experience für Geschäftsanwendungen der Zukunft ... 459 13.1 ... Interaktion per Stift ... 460 13.2 ... Interaktion mit virtuellen Objekten ... 465 13.3 ... Zusammenfassung ... 486 A. Weiterführende Literatur und Quellen ... 489 B. Die Autoren ... 497 Index ... 499
Developing Inclusive Mobile Apps
By failing to consider those with needs different to ourselves, we are telling these people they are not welcome in our app, and therefore that technology as a whole, is not for them. This is not hyperbole—23% of people in the US with a registered disability aren't online at all, that's three times more likely than the general population. When asked why they're not online, disabled respondents say their disability prevents them or that using the internet is too hard.To help your apps combat the issue of digital exclusion, this book covers considerations and tools mobile developers, or anyone creating mobile experiences, can use to make mobile work better for those with disabilities—mental or physical—and how to create a better experience for everyone.Software is not made up of cold, unthinking algorithms. Software is a craft in the truest sense of the word, and one of the greatest tools you can have as a craftsperson is empathy for the people who will be using your app. Each one of whom is an individual with different abilities, experiences, knowledge, and circumstances.WHAT YOU'LL LEARN* Create mobile experiences that work for as many people as possible* Incorporate a worldview of accessibility and customer service into your design* Work with accessibility tools and techniques commonly available for developersWHO THIS BOOK IS FORMobile developers working solo or as part of a team. UX designers, quality engineers, product owners, and anybody working in mobile.ROB WHITAKER is an iOS software development engineer at Capital One UK with a passion for improving digital experiences for everyone. He actively observes how people use technology, and considers how we can all make those interactions better. Currently he’s working on a project to make the Capital One UK app the first mobile app certified by the RNIB (Royal National Institute for Blind People).Chapter 1: What is Accessibility?• Intro to accessibility - great accessibility is a great experience for everyone• Intro to disability - ie, its not all visual• Why mobile is the best for accessible innovationChapter 2: What is Digital Inclusion?• Brief history of accessible thinking• Inclusive design & the persona spectrum• EmpathyChapter 3: Accessibility Tools on Android• Brief overview of the accessibility features & tools built into Android. What these mean for users, and how to leverage them as developers• Including code snippetsChapter 4: Accessibility Tools for iOS• Brief overview of the accessibility features & tools built into iOS. What these mean for users, and how to leverage them as developers• Including code snippetsChapter 5: Ensuring good accessibility• User research• Testing with accessibility toolsChapter 6: Visual Impairments• Practical tips for improving the experience for people with visual impairments• Including code snippetsChapter 7: Motor issues• Practical tips for improving the experience for people with motor issues• Including code snippetsChapter 8: Deaf & Hard of Hearing• Practical tips for improving the experience for people with auditory impairments• Including code snippetsChapter 9: Anxiety & Mental Health• Practical tips for improving the experience for people with visual mental health issues• Including code snippetsChapter 10: Dyslexia, Autism and Learning Difficulties• Practical tips for improving the experience for people with learning difficulties• Including code snippetsChapter 11: Poor Digital Skills• Good accessibility is not just about disability, but ability too• What skills are essential for digital life, and how do we measure up• Practical tips for improving the experience for people with poor digital skillsChapter 12: Life Circumstances• Good accessibility is not just about disability, but people's circumstances too• How circumstances such as low income, poor education etc can affect your digital interactions• Practical tips for improving the experience for people with with difficult life circumstancesChapter 13: Age, Gender & Sexuality• Theres a huge gap in digital use between 18 year olds, and those aged 60+.• How do we make sure we're not prejudicing based on age or experience, gender or sexuality when creating softwareChapter 14: Internationalization
Cloud Debugging and Profiling in Microsoft Azure
Use this collection of best practices and tips for assessing the health of a solution. This book provides detailed techniques and instructions to quickly diagnose aspects of your Azure cloud solutions.The initial chapters of this book introduce you to the many facets of Microsoft Azure, explain why and how building for the cloud differs from on-premise development, and outline the need for a comprehensive strategy to debugging and profiling in Azure. You learn the major types of blades (FaaS, SaaS, PaaS, IaaS), how different views can be created for different scenarios, and you will become familiar with the Favorites section, Cost Management & Billing blade, support, and Cloud Shell. You also will know how to leverage Application Insights for application performance management, in order to achieve a seamless cloud development experience. Application Insights, Log Analytics, and database storage topics are covered. The authors further guide you on identity security with Azure AD and continuous delivery with CI and CD covered in detail along with the capabilities of Azure DevOps. And you are exposed to external tooling and trouble shooting in a production environment.After reading this book, you will be able to apply methods to key Azure services, including App Service (Web Apps, Function Apps,and Logic Apps), Cloud Services, Azure Container Service, Azure Active Directory, Azure Storage, Azure SQL Database, Cosmos DB, Log Analytics, and many more.WHAT YOU WILL LEARN* Debug and manage the performance of your applications* Leverage Application Insights for application performance management* Extend and automate CI/CD with the help of various build tools, including Azure DevOps, TeamCity, and Cake bootstrapperWHO THIS BOOK IS FORApplication developers, designers, and DevOps personnel who want to find a one-stop shop in best practices for managing their application’s performance in the cloud and for debugging the issues accordinglyJEFFREY CHILBERTO is a software consultant specializing in the Microsoft technical stack, including Azure, BizTalk, MVC, WCF, and SQL Server. He has enterprise development experience in a wide range of industries, including banking, telecommunications, and healthcare in the USA, Europe, Australia, and New Zealand.SJOUKJE ZAAL is a managing consultant, Microsoft Cloud architect, and Microsoft Azure MVP with over 15 years of experience providing architecture, development, consultancy, and design expertise. She works at Capgemini, a global leader in consulting, technology services, and digital transformation.GAURAV ARORAA is a serial entrepreneur and startup mentor. He has a MPhil in computer science, and is a Microsoft MVP award recipient. He is a lifetime member of the Computer Society of India (CSI), an advisory member and senior mentor of IndiaMentor, certified as a Scrum trainer/coach, ITIL-F certified, and PRINCE-F and PRINCE-P certified. He is an open source developer, and a contributor to the Microsoft TechNet community. Recently, he was awarded the Icon of the Year for Excellence in Mentoring Technology Startups for the 2018-19 by Radio City, which is a Jagran Initiative, for his extraordinary work during his career of 22 years in the industry and the field of technology mentoring.ED PRICE is Senior Program Manager in Engineering at Microsoft, with an MBA in technology management. He ran Microsoft customer feedback programs for Azure Development and Visual Studio. He also was a technical writer at Microsoft for six years, helped lead TechNet Wiki, and now leads efforts to publish key guidance from AzureCAT (Customer Advisory Team).CHAPTER 1: Building Solutions in the Azure CloudCHAPTER GOAL: The first chapter will introduce the reader to the many facets of Microsoft Azure, why and how building for the cloud differs from on-prem development, and the need for a comprehensive strategy to debugging and profiling in Azure.We will cover the major types of blades (FaaS, SaaS, PaaS, IaaS).NO OF PAGES: 20SUB -TOPICS1. Microsoft Azure overview2. FaaS (Functions as a Service/Code as a Service) – a tour of Azure Functions and Logic Apps3. SaaS (Software as a Service) – Web Apps, Office3654. PaaS (Platform as a Service) – Cloud Services5. IaaS (Infrastructure as a Service) – Virtual Machines, SQL ServerChapter 2: The Azure PortalCHAPTER GOAL: The different Azure blades have many common features. This chapter will explore the Azure portal and some of the common features. The dashboard will be explained and how different views can be created for different scenarios. The Favorites section, the Cost Management & Billing blade, support, and Cloud Shell will all be introduced. The goal of the chapter is to get the reader comfortable with navigating the portal and feeling less overwhelmed, especially if this is the first time they’ve used the portal.NO OF PAGES: 35SUB - TOPICS1. Azure portal – what is a blade?2. Dashboard3. Navigation – favorites, subscription filtering, and searching4. You’re not alone – help and support5. Cost management6. Cloud shellChapter 3: Services in the CloudCHAPTER GOAL: Using examples in Azure Functions and Logic Apps, this chapter will provide an example of building an Azure Function and calling it from a Logic App. The logging and debugging capabilities will be explored in the appropriate blades.NO OF PAGES: 25SUB - TOPICS1. What is serverless?2. Azure Functions* Logic Apps* Using tags for billing Chapter 4: Application Insights and Log AnalyticsCHAPTER GOAL: Using the example built in Chapter 2, we will apply Application Insights and use it to monitor the solution.NO OF PAGES: 20SUB - TOPICS:1. Application Insights overview2. Adding to Azure Functions3. Adding Log Analytics to a Logic AppChapter 5: Databases and StorageCHAPTER GOAL: Building upon chapters 1 and 2, persistent storage will be incorporated into the example. Different implementations will be explored, including Azure SQL Database, Azure Cosmos DB, and Azure Storage Tables.NO OF PAGES: 25SUB - TOPICS:1. Azure SQL Database2. Azure Cosmos DB3. Azure Storage TablesCHAPTER 6: Azure Web AppCHAPTER GOAL: An Azure Web App will now be added to the example, and we’ll expand on the Application Insights capabilities, including custom events.NO OF PAGES: 20SUB – TOPICS:1. Overview of the Web App (functional)2. App Service blade overview – default and adding new graphs3. Diagnose and solve problemsChapter 7: Identity Security with Azure ADCHAPTER GOAL: Azure AD security will be added to the solution. OpenID will be used to secure the Azure Web App. The Logic App and Azure Function will be secured to only be accessible from the Web App (not directly to the user).NO OF PAGES: 20SUB – TOPICS:1. Overview of Azure AD2. Tracking user activity3. AD Connect Health4. AD reportingChapter 8: Continuous DeliveryCHAPTER GOAL: CI, CD will be covered. Capabilities of VSTS (covering Git, TFVC) will be shown, with the help of Build and Deployment. The chapter will focus on getting a better understanding of the state of a solution under change. What is currently deployed and where is it? How does VSTS and the Azure portal relate, and how can you get a complete view of the solution?NO OF PAGES: 25SUB – TOPICS:1. Introduction to VSTS2. Projects and dashboards3. Code – TFVC4. Code – Git5. Work, Wiki, Test – How these can be used to better understand the development process6. Build7. ReleaseChapter 9: External ToolingCHAPTER GOAL: Extend and automate CI, CD with the help of various build tools, viz. VSTS, TeamCity, and Cake bootstrapper.NO OF PAGES: 15SUB – TOPICS:1. Azure portal dashboard – widgets2. VSTS – pluginsChapter 10: Visualizing the Health of a SolutionCHAPTER GOAL: We cover troubleshooting in a production environment.NO OF PAGES: 18SUB – TOPICS:1. Remote combining reports for a complete picture2. Combining reports for a complete picture3. Disaster recovery and versioning of applications in a solution4. Enterprise reporting
Das Internet der Dinge und Künstliche Intelligenz als Game Changer
Das Internet der Dinge (IoT) und Künstliche Intelligenz (KI) bieten im Zuge der Digitalisierung große Chancen für innovative Geschäftsmodelle und Produktivitätssteigerungen von Unternehmen. Diese Chancen nutzen gegenwärtig vor allem die großen Digital-Champions und Startups. Umfassend und aktuell greifen die Autoren diese Herausforderung für etablierte Unternehmen auf. Zentrale These des Buches ist, dass diese digitalen Technologien die Spielregeln des Wettbewerbs grundlegend verändern und zu Game Changern werden. Die Autoren belegen dies in vier Blöcken: Im ersten Teil erläutern sie wichtige Begriffe. Im zweiten Teil beschreiben Timothy Kaufmann und Hans-Gerd Servatius die Entwicklung zum neuen Management 4.0-Paradigma und dessen Bausteine. Der dritte Teil beschäftigt sich mit dem Wandel der Informations- und Kommunikationstechnik hin zu einer durch IoT- und KI-Technologien geprägten digitalen Architektur. Der abschließende vierte Teil skizziert die Bausteine einer Innovationspolitik 4.0 für den digitalen Wandel, die den Rahmen für Management- und Architektur-Innovationen liefert.Dank klarer Gliederung, anschaulicher Erläuterung der neuen Konzepte und zahlreicher Beispiele aus der Praxis ist das Buch eine wichtige Orientierungshilfe für alle, die nach erfolgreichen Wegen zu einem Management 4.0 und einer digitalen Architektur suchen.TIMOTHY KAUFMANN arbeitet bei SAP als Business Development Director für neue Technologien. Er ist Mitinitiator der Open Industry 4.0 Alliance.PROF. DR. HANS-GERD SERVATIUS ist geschäftsführender Gesellschafter des Innovationsspezialisten Competivation. Daneben lehrt er an der Universität Stuttgart und der RWTH Aachen. Er ist Autor mehrerer Bücher und zahlreicher Fachartikel.Digitale Technologien verändern den Wettbewerb.- Das neue Management 4.0-Paradigma.- Digitale Geschäftsmodelle gemeinsam mit IoT- und KI-Plattformpartnern.- Integration der Objectives and Key Results (OKR-) Methode in agile Strategie- und Innovationsprozesse.- Digitaler Wandel in einer evolutionären Organisation.- Produktivitätssteigerung mit Künstlicher Intelligenz.- Eine IT-Architektur 4.0 unterstützt IoT und KI.- IoT- und KI-Architekturen.- Datengetriebene Services und die Architektur 4.0.- Geschäftsprozesse und die Architektur 4.0.- Das Wertversprechen und die Architektur 4.0.- IoT- und KI-Innovationsökosysteme und die Architektur 4.0.- Auf dem Weg zu einer Innovationspolitik 4.0.
Mastering VMware NSX for vSphere
A CLEAR, COMPREHENSIVE GUIDE TO VMWARE’S LATEST VIRTUALIZATION SOLUTIONMastering VMware NSX for vSphere is the ultimate guide to VMware’s network security virtualization platform. Written by a rock star in the VMware community, this book offers invaluable guidance and crucial reference for every facet of NSX, with clear explanations that go far beyond the public documentation. Coverage includes NSX architecture, controllers, and edges; preparation and deployment; logical switches; VLANS and VXLANS; logical routers; virtualization; edge network services; firewall security; and much more to help you take full advantage of the platform’s many features.More and more organizations are recognizing both the need for stronger network security and the powerful solution that is NSX; usage has doubled in the past year alone, and that trend is projected to grow—and these organizations need qualified professionals who know how to work effectively with the NSX platform. This book covers everything you need to know to exploit the platform’s full functionality so you can:* Step up security at the application level* Automate security and networking services* Streamline infrastructure for better continuity* Improve compliance by isolating systems that handle sensitive dataVMware’s NSX provides advanced security tools at a lower cost than traditional networking. As server virtualization has already become a de facto standard in many circles, network virtualization will follow quickly—and NSX positions VMware in the lead the way vSphere won the servers. NSX allows you to boost security at a granular level, streamline compliance, and build a more robust defense against the sort of problems that make headlines. Mastering VMware NSX for vSphere helps you get up to speed quickly and put this powerful platform to work for your organization.ELVER SENA SOSA is a data center solutions architect with 20 years' networking experience. He is the author of two VMWare Press VCP certification books, holds VCDX-NV and VCI certifications from VMWare, and he is a frequent speaker and blogger well known in the VMware community. Introduction xviiCHAPTER 1 ABSTRACTING NETWORK AND SECURITY 1Networks: 1990s 1Colocation 2Workload-to-Server Ratio 3Inefficient Resource Allocation 3The Long Road to Provisioning 3Data Centers Come of Age 4Data Center Workloads 4Workloads Won’t Stay Put 5VMWARE 6Virtualization 6What is Happening in There? 6Portability 8Virtualize Away 8Extending Virtualization to Storage 9Virtual Networking and Security 9NSX to the Rescue 10The Bottom Line 13CHAPTER 2 NSX ARCHITECTURE AND REQUIREMENTS 15NSX Network Virtualization 16Planes of Operation 16NSX Manager Role and Function 18ESXi Hosts 19vCenter Server 20vSphere Distributed Switch 21NSX VIBs 23Competitive Advantage: IOChain 24IOChain Security Features 24NSX Controllers 25NSX Controller Clustering 26NSX Controller Roles 26NSX Edge 28ESG Sizing 30NSX Role-Based Access Control 30Overlay and Underlay Networks 32Replication Modes for Traffic Going to Multiple Destinations 34The Bottom Line 36CHAPTER 3 PREPARING NSX 39NSX Manager Prerequisites 39Open Ports and Name Resolution 40Minimum Resource Requirements for NSX Data Center Appliances 40vSphere HA and DRS 41IP Addressing and Port Groups 43Installing the Client Integration Plug-in 44Installing NSX Manager 44Associating NSX Manager to vCenter 46Adding AD/LDAP to NSX 47Linking Multiple NSX Managers Together (Cross- vCenter NSX) 51Multi-site Consistency with Universal Components 51Primary and Secondary NSX Managers 53Preparing ESXi Clusters for NSX 54Creating a Universal Transport Zone on the Primary NSX Manager 56vSphere Distributed Switches Membership 57Adding Secondary NSX Managers 58The Bottom Line 59CHAPTER 4 DISTRIBUTED LOGICAL SWITCH 61vSphere Standard Switch (vSS) 62Traffic Shaping 63Understanding Port Groups 64NIC Teaming 65Ensuring Security 66Virtual Distributed Switch (vDS) 67Virtual eXtensible LANs (VXLANs) 68Employing Logical Switches 71Three Tables That Store VNI Information 73Collecting VNI Information 74Centralized MAC Table 75VTEP Table 76We Might as Well Talk about ARP Now 79Filling In the L2 and L3 Headers 79Switch Security Module 81Understanding Broadcast, Unknown Unicast, and Multicast 83Layer 2 Flooding 83Replication Modes 83Deploying Logical Switches 84Creating a Logical Switch 85The Bottom Line 85CHAPTER 5 MARRYING VLANS AND VXLANS 87Shotgun Wedding: Layer 2 Bridge 87Architecture 88Challenges 89Deployment 90Under the Hood 102Layer 2 VPN 102NSX Native L2 Bridging 103Hardware Switches to the Rescue 103Hardware VTEPs 103Deployment 104Under the Hood 104The Bottom Line 105CHAPTER 6 DISTRIBUTED LOGICAL ROUTER 107Distributed Logical Router (DLR) 107Control Plane Smarts 108Logical Router Control Virtual Machine 108Understanding DLR Efficiency 111Another Concept to Consider 115Let’s Get Smart about Routing 117OSPF 119Border Gateway Protocol (BGP) 120Oh Yeah, Statics Too 123Deploying Distributed Logical Routers 125The Bottom Line 134CHAPTER 7 NFV: ROUTING WITH NSX EDGES 137Network Function Virtualization: NSX Has It Too 137This is Nice: Edge HA A 138Adding HA 139Let’s Do Routing Like We Always Do 140Deploying the Edge Services Gateway 144Configuring BGP 151Configuring OSPF 154Configuring Static Routes 155Routing with the DLR and ESG 156Using CLI Commands 156Default Behaviors to Be Aware Of 157Equal Cost Multi-Path Routing157The Bottom Line 160CHAPTER 8 MORE NVF: NSX EDGE SERVICES GATEWAY 163ESG Network Placement 163Network Address Translation 164Configuring Source NAT 166Configuring Destination NAT 166Configuring SNAT on the ESG 167Configuring DNAT on the ESG 169ESG Load Balancer 171Configuring an ESG Load Balancer 173Layer 2 VPN (If You Must) 178Secure Sockets Layer Virtual Private Network 179Split Tunneling 180Configuring SSL VPN 180Internet Protocol Security VPN 187Understanding NAT Traversal 188Configuring IPsec Site-to-Site VPN with the ESG 188Round Up of Other Services 190DHCP Service 191Configuring the ESG as a DHCP Server 192DHCP Relay 194Configuring the DLR for DHCP Relay 196DNS Relay 198Configuring DNS Relay on the ESG 199The Bottom Line 200CHAPTER 9 NSX SECURITY, THE MONEY MAKER 203Traditional Router ACL Firewall 203I Told You about the IOChain 204Slot 2: Distributed Firewall 206Under the Hood 207Adding DFW Rules 210Segregating Firewall Rules 214IP Discovery 215Gratuitous ARP Used in ARP Poisoning Attacks 216Why is My Traffic Getting Blocked? 218Great, Now It’s Being Allowed 219Identity Firewall: Rules Based on Who Logs In 220Distributing Firewall Rules to Each ESXi Host: What’s Happening? 220The Bottom Line 222CHAPTER 10 SERVICE COMPOSER AND THIRD-PARTY APPLIANCES 223Security Groups 224Dynamic Inclusion 225Static Inclusion 226Static Exclusion 226Defining a Security Group through Static Inclusion 227Defining a Security Group through Dynamic Inclusion 229Customizing a Security Group with Static Exclusion 231Defining a Security Group Using Security Tags 231Adding to DFW Rules 233Service Insertion 236IOChain, the Gift that Keeps on Giving 236Layer 7 Stuff: Network Introspection 236Guest Introspection 237Service Insertion Providers 238Security Policies 239Creating Policies 239Enforcing Policies 243The Bottom Line 245CHAPTER 11 VREALIZE AUTOMATION AND REST APIS 247vRealize Automation Features 247vRA Editions 249Integrating vRA and NSX 250vRealize Automation Endpoints 250Associating NSX Manager with vRealize Automation 252Network Profiles 253vRA External, Routed, and NAT Network Profiles 255Reservations 258vRealize Orchestrator Workflows 261Creating a Blueprint for One Machine261Adding NSX Workflow to a Blueprint 264Creating a Request Service in the vRA Catalog 265Configuring an Entitlement 268Deploying a Blueprint that Consumes NSX Services 271REST APIs 273NSX REST API GET Request 275NSX REST API POST Request 275NSX REST API DELETE Request 276The Bottom Line 277APPENDIX THE BOTTOM LINE 279Chapter 1: Abstracting Network and Security 279Chapter 2: NSX Architecture and Requirements 280Chapter 3: Preparing NSX 280Chapter 4: Distributed Logical Switch 281Chapter 5: Marrying VLANs and VXLANs 283Chapter 6: Distributed Logical Router 284Chapter 7: NFV: Routing with NSX Edges 286Chapter 8: More NVF: NSX Edge Services Gateway 287Chapter 9: NSX Security, the Money Maker 289Chapter 10: Service Composer and Third-Party Appliances 290Chapter 11: vRealize Automation and REST APIs 291Index 293