Computer und IT
Visual Analysis of Multilayer Networks
THIS IS AN OVERVIEW AND STRUCTURED ANALYSIS OF CONTEMPORARY MULTILAYER NETWORK VISUALIZATION. IT SURVEYS TECHNIQUES AS WELL AS TOOLS, TASKS, AND ANALYTICS FROM WITHIN APPLICATION DOMAINS. It also identifies research opportunities and examines outstanding challenges along with potential solutions and future research directions for addressing them.Visual Analysis of Multilayer Networks is not only for visualization researchers, but for those who need to visualize multilayer networks in the domain of complex systems, as well as anyone solving problems within application domains.The emergence of multilayer networks as a concept from the field of complex systems provides many new opportunities for the visualization of network complexity, and has also raised many new exciting challenges. The multilayer network model recognizes that the complexity of relationships between entities in real-world systems is better embraced as several interdependent subsystems (or layers) rather than a simple graph approach. Despite only recently being formalized and defined, this model can be applied to problems in the domains of life sciences, sociology, digital humanities, and more. Within the domain of network visualization there already are many existing systems, which visualize data sets having many characteristics of multilayer networks, and many techniques, which are applicable to their visualization.* Preface* Figure Credits* Introduction and Overview* Multilayer Networks Across Domains* The Layer as an Entity* Task Taxonomy for Multilayer Networks* Visualization of Nodes and Relationships Across Layers* Interacting with and Analyzing Multilayer Networks* Attribute Visualization and Multilayer Networks* Evaluation of Multilayer Network Visualization Systems and Techniques* Conclusions* Bibliography* Authors' Biographies* List of Figures
Interface for an App
This book is an account of how I addressed the need for a smartphone app that would allow someone with Type 1 diabetes to self-manage their condition.Its presentation highlights the major features of the app’s interface design. They include the selection of metaphors appropriate to a user’s need to form a mental model of the app; the importance of visible context; the benefits of consistency; and considerations of a user’s cognitive and perceptual abilities. The latter is a key feature of the book.But the book is also about the design process, and especially about the valuable contributions made by the many focus group meetings in which design ideas were first presented to people with Type 1 diabetes. Their critique, and sometimes their rejection, of interface ideas were crucial to the development of the app.I hope this book will prove useful for teaching and design guidance.* Terminology * Affordance * Mental Models and Metaphors * Dialogue * Exploration * Chapter Summaries * Introduction * The Requirements * Structure and Layout * Interface Metaphors * Dialogue * Data Entry * Explore * Favourites * Photographs * Exercise * Health * Advice * A Dialogue Check * Conclusions * Reflections on Affordance and Design * Colleagues * Appendix 1: Interaction Consistency Appendix 2: A Novel Usability Tool * References * Author Biography
Beginning Microsoft 365 Collaboration Apps
Start making the most of the latest collaboration tools in Microsoft 365—including Teams, SharePoint, Power Apps, Power BI, Power Automate, Microsoft Groups, Office ProPlus, Yammer, Planner, Stream, Forms, and OneDrive. Integrate these collaboration tools into your team’s projects to boost productivity, engagement, innovation, and enjoyment at work. This book walks you through all the latest features, teaching you how to choose the right tools and get the most out of them for your situation.While technologies for collaboration are more advanced than ever before, there also are more of them, making it all the more confusing. BEGINNING MICROSOFT 365 COLLABORATION APPS will help you make sense of what is available and provide prescriptive guidance to you and your team on how to be more productive.This fully updated and expanded new edition contains lots of new content, screenshots and samples, and all new chapters on Power BI and Power Apps.WHAT YOU WILL LEARN* Know the collaboration applications and features available across Microsoft 365, and how to choose the ones that are right for you and your colleagues in any given situation* Understand the software-as-a-service (SaaS) model and how it enables users to be more effective and productive in remote situations* Discover how multi-device usability and real-time cloud synchronization can help your team collaborate anytime, anywhere, across the apps* Find out how Planner can help you manage projects and tasks, even without a project manager* Explore Microsoft Power Automate and Power Apps to connect applications and services and create codeless applications and workflowsWHO THIS BOOK IS FORMicrosoft 365 business users with a limited technical background. You should be familiar with the Microsoft Office suite of products such as Word and Outlook, and work in a team environment. An active Microsoft 365 would be useful as well.RALPH MERCURIO is a Microsoft Certified Professional with 18 years of experience. He works for the City of Durham in North Carolina and focuses his efforts on providing collaborative solutions to its many departments. He has held various roles in the technology field, including as a SharePoint infrastructure architect consulting for various companies in the New York City metro area.Ralph also has experience architecting and deploying solutions that leverage the best features of SharePoint/Microsoft 365 and provide real business value while solving user experience issues. He has seen many technology changes throughout the years and he discovered a passion for helping users find ways to leverage what they need to know to learn a new technology. With Microsoft 365, he has made it his goal to help users realize the potential of this powerful platform in order to get the most out of these ever-changing applications.BRIAN MERRILL is a Microsoft Certified Educator (MCE) and a Microsoft Certified trainer (MCT). He is currently the Educational Technology Analyst for one of the largest school districts in Pennsylvania. In that role he serves as the global administrator of the district’s Microsoft 365 environment, managing Microsoft Teams and SharePoint, and training faculty and staff on new technologies and systems. Brian is also adjunct faculty at the University of Harrisburg of Science and Technology, where he teaches courses in the Learning Technology and Media Studies program. Teaching courses on Learning Technologies and Solutions as well as Microsoft tools. Brian is a Microsoft Innovative Educator Expert and a member of the Minecraft for Education Advisory Board.PART 1: GETTING STARTED* Chapter 1: Welcome to Microsoft 365PART 2: THE APPLICATIONS* Chapter 2: SharePoint Online* Chapter 3: OneDrive* Chapter 4: Microsoft 365 Groups* Chapter 5: Teams* Chapter 6: Yammer* Chapter 7: Office* Chapter 8: Planner* Chapter 9: Stream* Chapter 10: Forms* Chapter 11: Power Automate* Chapter 12: Power BI* Chapter 13: PowerApps* Chapter 14: Making sense of it all
Azure Data Factory by Example
Data engineers who need to hit the ground running will use this book to build skills in Azure Data Factory v2 (ADF). The tutorial-first approach to ADF taken in this book gets you working from the first chapter, explaining key ideas naturally as you encounter them. From creating your first data factory to building complex, metadata-driven nested pipelines, the book guides you through essential concepts in Microsoft’s cloud-based ETL/ELT platform. It introduces components indispensable for the movement and transformation of data in the cloud. Then it demonstrates the tools necessary to orchestrate, monitor, and manage those components.The hands-on introduction to ADF found in this book is equally well-suited to data engineers embracing their first ETL/ELT toolset as it is to seasoned veterans of Microsoft’s SQL Server Integration Services (SSIS). The example-driven approach leads you through ADF pipeline construction from the ground up, introducing important ideas and making learning natural and engaging. SSIS users will find concepts with familiar parallels, while ADF-first readers will quickly master those concepts through the book’s steady building up of knowledge in successive chapters. Summaries of key concepts at the end of each chapter provide a ready reference that you can return to again and again.WHAT YOU WILL LEARN* Create pipelines, activities, datasets, and linked services* Build reusable components using variables, parameters, and expressions* Move data into and around Azure services automatically* Transform data natively using ADF data flows and Power Query data wrangling* Master flow-of-control and triggers for tightly orchestrated pipeline execution* Publish and monitor pipelines easily and with confidenceWHO THIS BOOK IS FORData engineers and ETL developers taking their first steps in Azure Data Factory, SQL Server Integration Services users making the transition toward doing ETL in Microsoft’s Azure cloud, and SQL Server database administrators involved in data warehousing and ETL operationsRICHARD SWINBANK is a data engineer and Microsoft Data Platform MVP. He specializes in building and automating analytics platforms using Microsoft technologies from the SQL Server stack to the Azure cloud. He is a fervent advocate of DataOps, with a technical focus on bringing automation to both analytics development and operations. An active member of the data community and keen knowledge-sharer, Richard is a volunteer, organizer, speaker, blogger, open source contributor, and author. He holds a PhD in computer science from the University of Birmingham (UK).1. Creating an Azure Data Factory Instance2. Your First Pipeline3. The Copy Data Activity4. Expressions5. Parameters6. Controlling Flow7. Data Flows8. Integration Runtimes9. Power Query in ADF10. Publishing to ADF11. Triggers12. Monitoring
Pro Windows Subsystem for Linux (WSL)
This book covers everything a developer needs to know to hit the ground running and get the most out of Windows Subsystem for Linux (WSL).Since its release, Windows Subsystem for Linux (WSL) has been growing in popularity, moving from curious early adopters to wide-scale interest, including enterprise development teams using WSL in production. This authoritative guide to WSL covers the gamut, introducing developers to WSL architecture, installation and configuration, the WSL command line, all the way to advanced use cases and performance tunings. Practical examples are sprinkled throughout to reinforce understanding. This book is designed to efficiently and effectively get developers comfortable using this highly useful platform for open-source development on Windows. WSL is uniquely suited to cloud and cross-platform development, and system administrator workflows on Windows.Windows developers will begin with the basics of installation and then be introduced to the vast library of open source tools that they can integrate into their own workflows, using their existing development tools, such as Code, Visual Studio, and JetBrains IDEs. Readers will learn, hands on, about using WSL to develop cross-platform and cloud-native applications, work with containers, and deploy a local Kubernetes cluster on WSL.“Much of what WSL is, is what developers make of it” is expert Barnes’ guiding mantra, a theme that is reinforced throughout this valuable cross-platform learning journey. Developers will get excited about the many new opportunities at their fingertips and be astounded at what they can do and achieve with WSL.WHAT YOU WILL LEARN* Install and configure WSL, a unique and novel configuration process* Receive an unbiased overview of WSL, its architecture, installation, the command line, practical use cases, and advanced configuration* Create a development workstation using WSL* Compare and contrast the differences between WSL 1 and WSL 2* Explore, in depth, some of the more popular workflows in WSL, including Docker containers* Consider and plan key factors for a large scale enterprise deployment of WSLWHO THIS BOOK IS FORDevelopers who need to know WSL and how to build a development stack, integrating it with their preferred code editor or IDE if they so choose; existing Windows and Linux system administrators who want to learn how to install, deploy, and manage WSL; power users who are comfortable in a command line, but may be new to Linux or WSLHAYDEN BARNES is Engineering Manager for Ubuntu on Windows Subsystem for Linux (WSL) at Canonical, and a recognized Microsoft MVP. Hayden regularly presents on the topic of WSL at conferences such as Microsoft Build and is the founder of WSLConf. He has consulted for enterprises, academic institutions, and government agencies to help them deploy WSL. Before joining Canonical, Hayden founded Pengwin, the first company to create a custom Linux distribution built specifically for Windows. He is passionate about WSL because it opens up a myriad of opportunities for cross-platform development, open source development, and collaboration between Linux and other communities.Chapter 1: WSL ArchitectureChapter 2: Enabling WSLChapter 3: Managing WSL DistrosChapter 4: Linux Distro MaintenanceChapter 5: Configuring WSL DistrosChapter 6: Configuring WSL 2Chapter 7: Rolling Your Own Init SystemChapter 8: Going Further with WSL 2Chapter 9: Maximizing Windows InteroperabilityChapter 10: Using WSL for Enterprise DevelopmentChapter 11: Troubleshooting WSLChapter 12: Deploying WSL at Scale
Visual Studio Code Distilled
Use Visual Studio Code to write and debug code quickly and efficiently on any platform, for any device, using any programming language, and on the operating system of your choice.Visual Studio Code is an open source and cross-platform development tool that focuses on code editing across a variety of development scenarios, including web, mobile, and cloud development. This second edition of VISUAL STUDIO CODE DISTILLED has been updated and expanded with two new chapters on writing apps with Python and building apps for the cloud and deployment to Azure.The book teaches you how to be immediately productive with Visual Studio Code, from the basics to some of the more complex topics. You will learn how to work on individual code files, complete projects, and come away with an understanding of advanced code-editing features that will help you focus on productivity, and source code collaboration with Git.WHAT YOU WILL LEARN* Get started with practical guidance on Visual Studio Code, including expansive guidance on writing apps with C# and Python* Comprehend Visual Studio Code in a way that is not just theory or a list of features, but an approach driven by developer tasks and needs* Understand integrated support for team collaboration with Git for executing and debugging code, and the many ways you can extend and customize Visual Studio Code* Debug code on multiple platforms through real-world guidance, such as working under corporate networks* Expand your coding intelligence from web to mobile to the cloud* Acquire valuable tips, tricks, and suggestions from hard-earned, real-world experience to be more productiveWHO THIS BOOK IS FORAll developers (including JavaScript, Java, NodeJS), not just those with a Microsoft background, who will benefit from learning and using VS code as a cross-platform and cross-language toolALESSANDRO DEL SOLE is Senior Software Engineer for a healthcare company, building mobile apps for doctors and dialysis patients. He has been in the software industry for more than 20 years, focusing on Microsoft technologies such as .NET, C#, Visual Studio, and Xamarin. He has been a trainer, consultant, and a Microsoft MVP since 2008 and is the author of many technical books. He is a Xamarin Certified Mobile Developer, Microsoft Certified Professional, and a Microsoft Programming Specialist in C#.Chapter 1: Introducing Visual Studio CodeChapter 2: Getting to Know the EnvironmentChapter 3: Language Support and Code Editing FeaturesChapter 4: Working with Files and FoldersChapter 5: Customizing Visual Studio CodeChapter 6: Installing and Managing ExtensionsChapter 7: Source Control with GitChapter 8:Automating TasksChapter 9: Building and Debugging Applications: .NET 5 and Other PlatformsChapter 10: Building Applications with PythonChapter 11: Deploying Applications to Azure
Choose Your InfoSec Path
Cybersecurity is a pressing issue across industries, as well as increasingly important in people’s personal lives. Learning the basic fundamentals is essential in order for companies and individuals to thrive. Although much of the literature around this hot-button topic can seem impenetrable and convoluted to a new learner, Choose Your InfoSec Path is an informative, fun, interactive cybersecurity adventure that has been written specifically with beginners in mind.Step into the shoes of a Chief Information Security Officer (CISO) and find out what could possibly go wrong during a breach. Author Alexander J. Roxon weaves together essential InfoSec concepts with an exciting and fast-paced storyline to make the lessons relatable and easy to understand. Determine what steps your character takes next and affect the outcome of your path. Will you emerge from the breach unscathed? With over 50 different endings, you can explore the what-ifs and experience a new path each time. A supporting glossary makes this book a resource you can return to long after your story is completed.Crucially, the integrity of the cybersecurity concepts is maintained and all events are genuinely plausible from a technical perspective. The book includes commentary to examine key concepts and reflect on decisions. This book is for those who are interested in understanding what cybersecurity is about but without a high technical barrier of entry. Learn some of the basics of incident response, how to dampen the effects of a breach, and get the jump on the bad guys. Your journey starts now.WHAT YOU’LL LEARN* Understand some of the basic concepts of incident response.* Experience how a real-life incident can go from zero to chaos very rapidly.* Find out how being proactive can significantly improve how information security breaches play out.* Discover how to dampen the effects of a breach.WHO THIS BOOK IS FORThis book is for those who are interested in understanding what cybersecurity is about but without a high technical barrier of entry. People who like to laugh as well as learn.Alexander J. Roxon likes to take complicated subjects and problems, then make them simpler and less intimidating. Alex works for the Cyber Defense team within Accenture, helping companies implement appropriate cyber security solutions and strategies. In his spare time, he likes to contribute to the industry with things like phishing awareness blogs full of fish puns, or a deck of playing cards designed to teach people about cyber security (The Infosec Deck). Inspired by the Give Yourself Goosebumps series, he decided to write his own interactive story in an effort to make information security more accessible. He is a Systems Security Certified Professional (SSCP) and Factor Analysis Information Risk (FAIR) accredited.
Integrating D3.js with React
Integrate D3.js into a React TypeScript project and create a chart component working in harmony with React. This book will show you how utilize D3 with React to bring life to your charts.Seasoned author Elad Elrom will show you how to create simple charts such as line, bar, donut, scatter, histogram and others, and advanced charts such as a world map and force charts. You'll also learn to share the data across your components and charts using React Recoil state management. Then integrate third-party chart libraries that are built on D3 such as Rechart, Visx, Nivo, React-vi, and Victory and in the end deploy your chart as a server or serverless app on popular platforms.React and D3 are two of the most popular frameworks in their respective areas – learn to bring them together and take your storytelling to the next level.WHAT YOU'LL LEARN* Set up your project with React, TypeScript and D3.js* Create simple and advanced D3.js charts* Work with complex charts such as world and force charts* Integrate D3 data with React state management * Improve the performance of your D3 components* Deploy as a server or serverless app and debug testWHO THIS BOOK IS FORReaders that already have basic knowledge of React, HTML, CSS and JavaScript.ELAD ELROM is a technical coach. As a writer, he authored and co-authored several technical books. Elad consulted for a variety of clients, from large corporations such as AT&T, HBO, Viacom, NBC Universal, and Weight Watchers, to smaller startups. Aside from coding, Elad is also a PADI diving instructor and a pilot.INTEGRATING D3.JS WITH REACT1. Setting Our Technology Stack2. Graphics and Interactions3. Basic Charts: Part 14. Basic Charts: Part 25. Integrating State Management6. World Chart: Part 17. World Chart: Part 28. Force Charts: Part 19. Force Charts: Part 210. Integrating Popular Chart Libraries Built on D311. Performance Knick-Knacks12. Publishing Your React d3 App
Societal Responsibility of Artificial Intelligence
The digital world is characterized by its immediacy, its density of information and its omnipresence, in contrast to the concrete world. Significant changes will occur in our society as AI becomes integrated into many aspects of our lives.This book focuses on this vision of universalization by dealing with the development and framework of AI applicable to all. It develops a moral framework based on a neo-Darwinian approach - the concept of Ethics by Evolution - to accompany AI by observing a certain number of requirements, recommendations and rules at each stage of design, implementation and use. The societal responsibility of artificial intelligence is an essential step towards ethical, eco-responsible and trustworthy AI, aiming to protect and serve people and the common good in a beneficial way.JEROME BERANGER is a scientific expert on the ethical approach of the digital revolution and Ethics by Evolution. He is cofounder and CEO of ADELIAA and is also an associate researcher in the Inserm 1295 BIOETHICS team at the University of Toulouse III, France.
IAPP CIPP / US Certified Information Privacy Professional Study Guide
PREPARE FOR SUCCESS ON THE IAPP CIPP/US EXAM AND FURTHER YOUR CAREER IN PRIVACY WITH THIS EFFECTIVE STUDY GUIDE - NOW INCLUDES A DOWNLOADABLE SUPPLEMENT TO GET YOU UP TO DATE ON THE 2022 CIPP EXAM!Information privacy has become a critical and central concern for small and large businesses across the United States. At the same time, the demand for talented professionals able to navigate the increasingly complex web of legislation and regulation regarding privacy continues to increase.Written from the ground up to prepare you for the United States version of the Certified Information Privacy Professional (CIPP) exam, Sybex’s IAPP CIPP/US Certified Information Privacy Professional Study Guide also readies you for success in the rapidly growing privacy field.You’ll efficiently and effectively prepare for the exam with online practice tests and flashcards as well as a digital glossary. The concise and easy-to-follow instruction contained in the IAPP/CIPP Study Guide covers every aspect of the CIPP/US exam, including the legal environment, regulatory enforcement, information management, private sector data collection, law enforcement and national security, workplace privacy and state privacy law, and international privacy regulation.* Provides the information you need to gain a unique and sought-after certification that allows you to fully understand the privacy framework in the US* Fully updated to prepare you to advise organizations on the current legal limits of public and private sector data collection and use* Includes access to the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key termsPerfect for anyone considering a career in privacy or preparing to tackle the challenging IAPP CIPP exam as the next step to advance an existing privacy role, the IAPP CIPP/US Certified Information Privacy Professional Study Guide offers you an invaluable head start for success on the exam and in your career as an in-demand privacy professional.MIKE CHAPPLE, PHD, CIPP/US, is Teaching Professor of Information Technology, Analytics, and Operations at Notre Dame’s Mendoza College of Business. He is a bestselling author of over 25 books and serves as the Academic Director of the University’s Master of Science in Business Analytics program. He holds multiple additional certifications, including the CISSP, CySA+, CISM, PenTest+, and Security+.JOE SHELLEY, M.A., CIPP/US, is currently the Vice President for Libraries and Information Technology at Hamilton College in New York. Among other responsibilities he oversees information security and privacy programs, IT risk management, business intelligence and analytics, and data governance. He has also held certifications and certificates for ITIL, Project Management, and Scrum.Introduction xxiAssessment Test xxxCHAPTER 1 PRIVACY IN THE MODERN ERA 1Introduction to Privacy 2What Is Privacy? 3What Is Personal Information? 4What Isn’t Personal Information? 5Why Should We Care About Privacy? 7Generally Accepted Privacy Principles 8Management 9Notice 10Choice and Consent 10Collection 10Use, Retention, and Disposal 11Access 11Disclosure to Third Parties 12Security for Privacy 13Quality 14Monitoring and Enforcement 14Developing a Privacy Program 15Crafting Strategy, Goals, and Objectives 15Appointing a Privacy Official 17Privacy Roles 18Building Inventories 18Conducting a Privacy Assessment 19Implementing Privacy Controls 20Ongoing Operation and Monitoring 20Online Privacy 21Privacy Notices 21Privacy and Cybersecurity 22Cybersecurity Goals 23Relationship Between Privacy and Cybersecurity 24Privacy by Design 25Summary 26Exam Essentials 26Review Questions 27CHAPTER 2 LEGAL ENVIRONMENT 31Branches of Government 32Legislative Branch 32Executive Branch 33Judicial Branch 34Understanding Laws 36Sources of Law 36Analyzing a Law 41Legal Concepts 43Legal Liability 44Torts and Negligence 45Summary 46Exam Essentials 46Review Questions 48CHAPTER 3 REGULATORY ENFORCEMENT 53Federal Regulatory Authorities 54Federal Trade Commission 54Federal Communications Commission 60Department of Commerce 61Department of Health and Human Services 61Banking Regulators 62Department of Education 63State Regulatory Authorities 63Self-Regulatory Programs 64Payment Card Industry 64Advertising 65Trust Marks 66Safe Harbors 67Summary 67Exam Essentials 68Review Questions 69CHAPTER 4 INFORMATION MANAGEMENT 73Data Governance 74Building a Data Inventory 74Data Classification 75Data Flow Mapping 77Data Lifecycle Management 78Workforce Training 79Cybersecurity Threats 80Threat Actors 80Incident Response 85Phases of Incident Response 86Preparation 87Detection and Analysis 87Containment, Eradication, and Recovery 88Post-incident Activity 88Building an Incident Response Plan 90Data Breach Notification 92Vendor Management 93Summary 94Exam Essentials 94Review Questions 96CHAPTER 5 PRIVATE SECTOR DATA COLLECTION 101FTC Privacy Protection 103General FTC Privacy Protection 103The Children’s Online Privacy Protection Act (COPPA) 104Future of Federal Enforcement 107Medical Privacy 110The Health Insurance Portability and Accountability Act (hipaa) 110The Health Information Technology for Economic and Clinical Health Act 118The 21st Century Cures Act 120Confidentiality of Substance Use Disorder Patient Records Rule 120Financial Privacy 121Privacy in Credit Reporting 121Gramm–Leach–Bliley Act (GLBA) 125Red Flags Rule 128Consumer Financial Protection Bureau 129Educational Privacy 130Family Educational Rights and Privacy Act (FERPA) 130Telecommunications and Marketing Privacy 132Telephone Consumer Protection Act (TCPA) and Telemarketing Sales Rule (TSR) 132The Junk Fax Prevention Act (JFPA) 135Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act 135Telecommunications Act and Customer Proprietary Network Information 137Cable Communications Policy Act 138Video Privacy Protection Act (VPPA) of 1988 139Summary 140Exam Essentials 141Review Questions 143CHAPTER 6 GOVERNMENT AND COURT ACCESS TO PRIVATE SECTOR INFORMATION 147Law Enforcement and Privacy 148Access to Financial Data 149Access to Communications 153National Security and Privacy 157Foreign Intelligence Surveillance Act (FISA) of 1978 157USA-PATRIOT Act 159The USA Freedom Act of 2015 162The Cybersecurity Information Sharing Act of 2015 163Civil Litigation and Privacy 164Compelled Disclosure of Media Information 164Electronic Discovery 166Summary 168Exam Essentials 168Review Questions 170CHAPTER 7 WORKPLACE PRIVACY 175Introduction to Workplace Privacy 176Workplace Privacy Concepts 176U.S. Agencies Regulating Workplace Privacy Issues 177U.S. Antidiscrimination Laws 178Privacy Before, During, and After Employment 181Employee Background Screening 182Employee Monitoring 185Investigation of Employee Misconduct 189Termination of the Employment Relationship 191Summary 193Exam Essentials 193Review Questions 195CHAPTER 8 STATE PRIVACY LAWS 199Federal vs. State Authority 200Financial Data 200Credit History 201California Financial Information Privacy Act 201Data Security 202Recent Developments 204Data Breach Notification Laws 212Elements of State Data Breach Notification Laws 212Key Differences Among States Today 214Recent Developments 215Marketing Laws 216Summary 217Exam Essentials 218Review Questions 219CHAPTER 9 INTERNATIONAL PRIVACY REGULATION 223International Data Transfers 224European Union General Data Protection Regulation 225Adequacy Decisions 228U.S.- EU Safe Harbor and Privacy Shield 228Binding Corporate Rules 230Standard Contractual Clauses 230Other Approved Transfer Mechanisms 231APEC Privacy Framework 231Cross- Border Enforcement Issues 233Global Privacy Enforcement Network 233Resolving Multinational Compliance Conflicts 234Summary 234Exam Essentials 235Review Questions 236APPENDIX ANSWERS TO REVIEW QUESTIONS 241Chapter 1: Privacy in the Modern Era 242Chapter 2: Legal Environment 243Chapter 3: Regulatory Enforcement 245Chapter 4: Information Management 247Chapter 5: Private Sector Data Collection 249Chapter 6: Government and Court Access to Private Sector Information 251Chapter 7: Workplace Privacy 252Chapter 8: State Privacy Laws 254Chapter 9: International Privacy Regulation 256Index 259
Mastering Microsoft Teams
Do you need to learn how to use Microsoft Teams? Are you questioning how to drive user adoption, govern content, and manage access for your Teams deployment? Either way, the second edition of this bestseller is your one-stop-shop to learning everything you need to know to find success with Microsoft Teams.Microsoft’s popular chat-based collaboration software has many rich features that enable teams to be more efficient, and save valuable time and resources. However, as with all software, there is a learning curve and pitfalls that should be avoided.Begin by learning the core components and use cases for Teams. From there, the authors guide you through ideas to create governance and adoption plans that make sense for your organization or customer. Wrap up with an understanding of features and services in progress, and a roadmap to the future of the product.WHAT YOU WILL LEARN* Implement, use, and manage Microsoft Teams* Understand how Teams drives productivity and engagement by combining the functionality of Microsoft 365 Groups, SharePoint, OneDrive, Outlook, and other services in one location* Govern, explain, and use Teams in your organization* Use Teams in a structured way to reduce users’ time spent in meetings* Know the pitfalls to avoid that may create challenges in your usage of Teams* Become familiar with the functionality and components of Teams via walk-throughs, including opportunities for automating business processes in Teams* See how educators and students can use Teams to improve remote learning* Be aware of business productivity in a remote world with Microsoft VivaWHO THIS BOOK IS FORAnyone who wants to learn Microsoft Teams. To get the most out of the book, a basic understanding of Microsoft 365 and a subscription, including a Microsoft Teams license, is useful.MELISSA HUBBARD specializes in driving productivity, collaboration, and communication in the modern workplace. She is a former Microsoft MVP and early adopter of Microsoft Teams, with a background in project management and the implementation of collaboration and business process automation solutions. She is particularly passionate about the topic areas of user adoption, governance, and trainingMATTHEW J. BAILEY is a Microsoft MVP and Microsoft Certified Trainer (MCT) for Noteworthy Technology Training, specializing in SharePoint, Microsoft 365 (including Teams), Azure, and Power BI. He combines his business expertise and his technical knowledge to resolve corporate challenges. He is a highly regarded presenter, avid blogger, and author, most recently of The SharePoint Business Analyst Guide.D’ARCE HESS is a Microsoft MVP who specializes in the creation of custom portals and experiences in SharePoint, Microsoft Teams and Microsoft 365. As a UI/UX designer and developer, she uses industry and Microsoft best practices as a base for creating solutions that simplify processes, and drive user adoption and governance from the start. She has worked with Fortune 500 companies and has become a trusted partner to her clients in the industries of healthcare, pharmaceuticals, legal, travel and tourism, and entertainment. She loves to volunteer in the community and is the leader of the Rhode Island SharePoint & Microsoft 365 User Group.MÅRTEN HELLEBRO is an Office Apps and Services MVP focused on Microsoft Teams and an expert in enterprise voice. As an infrastructure, migration, and user adoption lead, Mårten has extensive experience managing numerous Teams and Skype for Business implementation projects. He regularly speaks at Microsoft conferences and organizes one of the largest Microsoft Teams conference in the Nordics “Teamsdagen”. He also runs the Microsoft Teams blog msteamsswe.se, and co-hosts the Teams podcast “Teamspodden“.Chapter 1: Introduction to Microsoft TeamsChapter 2: Working in TeamsChapter 3: Communicating in TeamsChapter 4: Meetings in TeamsChapter 5: User Adoption in TeamsChapter 6: GovernanceChapter 7: Automating Business Processes in TeamsChapter 8: Known Challenges and the FutureChapter 9: Teams for EducationChapter 10: Introduction to Microsoft Viva
Practical Arduino Engineering
Implement Arduino-based designs in your project, and build, debug, and extend it using a solid engineering approach. This second edition is expanded to provide a better understanding of the engineering process and what it means to be an end-to-end developer.You’ll start out by reviewing basic engineering procedures, from the fundamental requirements and preliminary design to prototyping and testing. You’ll then apply those principles to single devices like LCDs, potentiometers and GPS modules, and move on to the integration of several modules into a larger project, a sub-autonomous robot. This robot will include devices such as GPS, Bluetooth, an OLED screen, an accelerometer, humidity and temp sensor, motor drivers, and ultrasonic sensor.This version goes on to cover how to create 3D models with Fusion360, make your own PCBs using Eagle, and use and maintain a 3D printer. Each and every chapter exemplifies this process and demonstrates how you can profit from the implementation of solid engineering principles—regardless of whether you just play in your basement or you want to publicize and sell your devices. With Practical Adruino Engineering you’ll be able to review and improve this process, and even extend its scope.What You’ll Learn● Set up the Arduino software landscape and project for testing● Review the process of hardware engineering as applicable to Arduino projects● Create 3D models for 3D printing using Fusion360 in a robot chassis project● Make PCBs using Eagle and incorporate it into a sensor station shield project● Use and maintain a 3D printer with your own project● Create Arduino shields in Eagle● Debug Arduino projects of varying complexities via LabVIEW● Use a special Arduino board for Bluetooth to control domestic and mobile Arduino projectsWHO THIS BOOK IS FORPrimarily aimed at intermediate engineers or engineering students. However, this book is also great for beginners and any maker who wants to expand their abilities in a single book.SInce Harold Timmis was a small child, has fostered a curiosity for technology, taking apart everything in his parents’ house just to see how it all worked. This fueled his thirst for knowledge of computer science, programming, and its uses. He has worked with LabVIEW and Arduino for the past thirteen years. During that time, he has been involved in several professional projects using LabVIEW, as well as many hobbyist projects utilizing both Arduino and LabVIEW. Harold attended the Florida Institute of Technology, where he studied computer engineering and was introduced to LabVIEW and Arduino. Later, he worked at the Harris Corporation and General Electric, where he created several LabVIEW projects for trains and became very interested in the Arduino, data acquisition, and control theory.READER LEVEL: IntermediateChapter 1: The Process of Arduino Engineering• Gathering Your Hardware• Gathering Your Tools• Understanding the Engineering ProcessChapter 2: Understanding the Arduino Software• Getting started with setup() and loop()• Initializing Variables• Woorking with Loos• Communicating Digitally• Communicating with Analog Components• Serial Communication• Using Arduino Libraries• Putting Together the Arduino LanguageChapter 3: An Introduction to 3D Design• What is 3D Cad?• Installing Fusion360 and setting it up for Enthusiast or Startup• The basics of 3D Modeling• How to use Calipers• Making your first “Thing”Chapter 4: An Introduction to 3D Printing• What is 3D Printing?• Types of 3D Printers• 3D Printer Recommendations• Tools of the Trade• What is a Slicer? (Go over a few Slicers)• Printing your first “Thing”Chapter 5: An Introduction to Eagle• What is Eagle?• Installing Eagle and including Libraries from 3rd party vendors• Basics of Schematic layout• Basics of Board Layout• Making your first board• Board manufacturersChapter 6: Robotic Engineering Requirements: Controlling Motion• Creating a modular H-Bridge PCB in Eagle• 3D modeling your own Robot Chassis (Intro to Parametric Design)• Printing the Robot Chassis• Assembling the Robot Chassis and HardwareChapter 7: Adding Complexity to the Robot: Working with LCDs• Monochrome LCD projects will stay the same• Add a section on OLED technology• Make an OLED Shield for the Arduino using EagleChapter 8: Robot Integration Engineering a GPS Module with Arduino• Hardware Explained: microSD shield• Understanding NMEA Protocol• Libraries Explained: TinyGPS and SdFat Libraries• The Basics of GPS Communication with the Arduino• Requirements Gathering and Creating the Requirements DocumentChapter 9: Interlude: Home Engineering from Requirements to Implementation• Basic Fundamentals of this chapter will stay the same• Gather Requirements on a sensor station• Create a Sensor Station Shield in Eagle• Writing software for the Sensor Station Shield• Creating an enclosure for the Sensor Station Shield• 3D Printing the Sensor Station EnclosureChapter 10: Robot Perception: Object Detection with the Arduino• Secondary Projects stay the same, but Images, Schematics, and Flowcharts are updated• 3D modeling an Ultrasonic sensor holder for the Robot• 3D Printing the Ultrasonic Sensor holder• The rest of the primary project stays the same.Chapter 11: Mature Arduino Engineering: Making an Alarm System using the Arduino• Basic Security System• Requirements Gathering and Creating the Requirements DocumentChapter 12: Error Messages and Commands: Using GSM Technology with your Arduino• Talk on subjects like CDMA, 4G LTE, etc...• Use New Shield for 4G LTE instead of GSM Shield• Rest of chapter will stay the sameChapter 13: Control and Instrumentation: The XBOX controller and the LabVIEW Process• LabVIEW explanation stays the same• Creating a Sub-autonomous robotChapter 14: Controlling your Project: Bluetooth Arduino• Gathering Requirements and Creating the Requirements Document• Configuring the Hardware• Writing the Software• Uploading the Software and Attaching the Bluetooth Shield• Operating the Robot
ABAP in Eclipse
Master Advanced Business Application Programming (ABAP) Development Tools by installing, customizing, and using them in Eclipse.The book begins by describing the installation and customization of ABAP Development Tools in Eclipse and how to adjust the IDE to meet your requirements. You will discover the ABAP Development Tools functionality that helps you be more efficient in programming in the ABAP language, including refactoring, markers, quick fixes, unit testing, and much more. Moving on, you will cover the available Eclipse plugins that you can use with ABAP Development Tools to make Eclipse even more developer-friendly: ABAP Continuous Integration and ABAP Extensions. Finally, you will learn how to create your own Eclipse plugin that is integrated with ABAP Development Tools.This book is perfect for every ABAP developer who wants to get started with ABAP Development Tools in Eclipse, as well as experienced ADT users who would like to take advantage of hidden functions or external extensions for ADT and Eclipse.WHAT YOU WILL LEARN* Install and configure your ABAP in Eclipse to meet your personal requirements* Discover the functionalities of ABAP in Eclipse that will accelerate your development* Use additional extensions to make your work with Eclipse more enjoyable* Create your own plugin that works with ABAP in EclipseWHO THIS BOOK IS FORABAP developers that want or need to switch to Eclipse and current ABAP in Eclipse users who want to learn its possibilities and hidden features.Łukasz is IT manager for SAP applications at Hager Group. He has been active in the SAP community for more than ten years. He mostly shares his knowledge on his blog (Abap Blog). He is a creator of the following Eclipse plugins: ABAP Favorites, ABAP Extensions, and ABAP Quick Fix. He also shares his ABAP projects or frameworks on GitHub as fidley; these include: Fast ALV Grid, JSON2ABAPType, Customers, and ALV Grid in a Nutshell. He was a speaker at the last four #sitWROs and attended a few others around Europe. SAP Developer Hero 2016 and SAP Champion from 2019. He can also teach you how to brew a beer. Chapter 1: Installation, Basic ConfigurationCHAPTER GOAL: PROVIDE INFORMATION ABOUT HOW TO GET STARTED WITH ABAP IN ECLIPSESUB -TOPICS1. How to install Eclipse & ABAP Development Tools2. How to create ABAP Projects and structure of the project explorer3. Perspectives4. Standard Eclipse and ADT Views5. Eclipse PreferencesChapter 2: Eclipse and ADT PreferencesCHAPTER GOAL: EXPLAIN POSSIBILITIES OF CONFIGURATION OF YOUR ECLIPSE ENVIRONMENTSUB -TOPICS1. Update sites2. Debug preferences3. ABAP Development Preferences4. Syntax highlighting5. Eclipse PreferencesChapter 3: How to Use ABAP in Eclipse to Accelerate your WorkCHAPTER GOAL: DESCRIBE ALL KNOWN FUNCTIONALITIES OF ABAP IN ECLIPSE THAT WILL MAKE THE DEVELOPER LIFE EASIERSUB - TOPICS1. Refactoring2. Quick fixes3. Completion assistant4. Markers5. Formatting, Formatting of block6. Block Selection7. ATC8. Unit Test9. etc.. all functionalities of10. Shortcuts CheatSheetChapter 4: Eclipse Extensions that will make the differenceCHAPTER GOAL: DESCRIPTION OF ECLIPSE PLUGINS FOR ABAP AND GLOBAL, THAT CAN ENHANCE HUGELY THE WORK WITH ADTNO OF PAGES :SUB - TOPICS:1. ABAP CI plugin2. abapGit Plugin3. ABAP Favorites4. ABAP Extensions5. ABAP Quick Fixes6. ABAP Tags7. Darkest Dark8. Any Edit9. etc.Chapter 5: CHAPTER GOAL: EXPLAIN THE WAY OF CREATION OF ECLIPSE PLUGINSSUB - TOPICS:1. Basic information about creating an Eclipse plugin2. Creation of Eclipse plugin with TreeView or Table control and testing it3. Explanation of features and update sitesChapter 6: Extending ABAP Development ToolsCHAPTER GOAL: SHOW EXAMPLE OF SIMPLE ECLIPSE PLUGIN THAT WORKS WITH ABAP DEVELOPMENT TOOLS TO SUPPORT THE DEVELOPER & HOW TO CREATE YOUR OWN QUICK FIXES FOR ATC CHECKSSUB - TOPICS:1. Creation of Eclipse plugins calling ABAP backend2. Creating quick fix for ATC Checks
Mastering Voice Interfaces
Build great voice apps of any complexity for any domain by learning both the how's and why's of voice development. In this book you’ll see how we live in a golden age of voice technology and how advances in automatic speech recognition (ASR), natural language processing (NLP), and related technologies allow people to talk to machines and get reasonable responses. Today, anyone with computer access can build a working voice app. That democratization of the technology is great. But, while it’s fairly easy to build a voice app that runs, it's still remarkably difficult to build a great one, one that users trust, that understands their natural ways of speaking and fulfills their needs, and that makes them want to return for more.We start with an overview of how humans and machines produce and process conversational speech, explaining how they differ from each other and from other modalities. This is the background you need to understand the consequences of each design and implementation choice as we dive into the core principles of voice interface design. We walk you through many design and development techniques, including ones that some view as advanced, but that you can implement today. We use the Google development platform and Python, but our goal is to explain the reasons behind each technique such that you can take what you learn and implement it on any platform.Readers of Mastering Voice Interfaces will come away with a solid understanding of what makes voice interfaces special, learn the core voice design principles for building great voice apps, and how to actually implement those principles to create robust apps. We’ve learned during many years in the voice industry that the most successful solutions are created by those who understand both the human and the technology sides of speech, and that both sides affect design and development. Because we focus on developing task-oriented voice apps for real users in the real world, you’ll learn how to take your voice apps from idea through scoping, design, development, rollout, and post-deployment performance improvements, all illustrated with examples from our own voice industry experiences.WHAT YOU WILL LEARN* Create truly great voice apps that users will love and trust* See how voice differs from other input and output modalities, and why that matters* Discover best practices for designing conversational voice-first applications, and the consequences of design and implementation choices* Implement advanced voice designs, with real-world examples you can use immediately.* Verify that your app is performing well, and what to change if it doesn't Who This Book Is ForAnyone curious about the real how’s and why’s of voice interface design and development. In particular, it's aimed at teams of developers, designers, and product owners who need a shared understanding of how to create successful voice interfaces using today's technology. We expect readers to have had some exposure to voice apps, at least as users.Ann Thymé-Gobbel's career has focused on how people use speech and natural language to communicate with each other and with technology. After completing her PhD in cognitive science and linguistics from UC San Diego, she's held a broad set of voice-related UI/UX design roles in both large corporations and small start-ups, working with diverse teams in product development, client project engagements, and R&D. Her past work includes design, data analysis and establishing best practices at Nuance, voice design for mobile and in-home devices at Amazon Lab 126, and creating natural language conversations for multimodal healthcare apps at 22otters. Her research has covered automatic language detection, error correction, and discourse structure. She is currently Director of UI/UX Design at Loose Cannon Systems, the team bringing to market Milo, a handsfree wearable communicator. Ann never stops doing research: she collects and analyzes data at every opportunity and enjoys sharing her findings with others, having presented and taught at conferences internationally.Charles Jankowski has over 30 years’ experience in industry and academia developing applications and algorithms for real-world users incorporating advanced speech recognition, speaker verification, and natural language technologies. He has used state-of-the-art machine learning processes and techniques for data analysis, performance optimization, and algorithm development. Charles has highly in-depth technical experience with state-of-the-art technologies, effective management of cross-functional teams for all facets of application deployment, and outstanding relationships with clients. Currently, he is Director of NLP at Brain Technologies, creating the Natural iOS application with which you can “Say it and Get it.” Previously he was Director of NLP and Robotics at CloudMinds, Director of Speech and Natural Language at 22otters, Senior Speech Scientist at Performance Technology Partners, and Director of Professional Services at Nuance. He has also been an independent consultant. Charles holds S.B., S.M., and Ph.D. degrees from MIT, all in electrical engineering.PART 1 – Voice System FoundationsChapter 1: Say Hello to Voice SystemsChapter goal: Introduce the reader to voice-first technology, its core concepts, and typical phases of development through an explanatory background for the current state and challenges of voice.No of pages - 20Sub-topics1. Voice-first, voice-only, and conversational everything2. Introduction to voice technology components (Speech to text, Natural languageunderstanding, Dialog management, Natural language generation, Text to speech)3. The phases of voice development success (Plan, Design, Build, Test, Deploy &Assess, Iterate)4. Hope is not a strategy – but to plan & execute isChapter 2: Keeping Voice in MindChapter goal: Explain to the reader how humans and computers “talk” and “listen.”What’s easy and hard for the human user and the technology in a dialog, and why.No of pages - 15Sub-topics1. Why voice is different2. Hands-on: A pre-coding thought experiment3. Voice dialog and its participants• The Human: spoken natural language understanding• The Computer: voice system recognition and interpretation• Human-computer voice dialog - Successful voice-first development is all aboutcoordinating human abilities with the technology to allow conversations betweentwo very different dialog participants.Chapter 3: Running a Voice Implementation—and Noticing IssuesChapter goal: Allow the reader to put into practice their newly learned foundation byimplementing and running a simple voice application in the Google Assistant framework,and experiencing how quickly even a simple voice interaction needs improvement.No of pages - 15Sub-topics1. Hands-on: Preparing a restaurant finder2. Introducing voice platforms3. Hands-on: Implementing the restaurant finderBasic setup, Specifying a first intent, Doing something, What the user says,What the VUI says, Connecting Dialogflow to Actions on Google, Testingthe app, Saving the voice interaction4. Google’s voice development ecosystem, and why we're using it here5. The pros and cons of relying on tools6. Hands-on: Making changes - testing and iterating (Adding phrases to handle the same meaning, additional content, and more specific)PART 2 – Planning Voice System InteractionsChapter 4: Defining your Vision: Building What, How, and Why for WhomChapter goal: Introduce voice-focused requirement discovery, highlighting differencesfrom other modalities and devices and showingNo of pages - 25Sub-topics1. Functional requirements: What are you building? (General and detailed functionality)2. Non-functional business requirements: Why are you building it? (Purpose, underlyingservice and existing automation, branding and terminology, data needs, access andavailability, legal and business constraints)3. Non-functional user requirements: Who will use it and what do they want? (Userpopulation demographics and characteristics, engagement patterns, mental modelsand domain knowledge, environment and state of mind)4. Non-functional system requirements; How will you build it? (Available options forrecognizer, parser, and interpreter, external data sources, data storage and data access, other system concerns)Chapter 5: From Discovery to UX and UI Design: Tools of the Voice-First TradeChapter goal: Show how to turn discovery findings into high-level architectural designs,using flows diagrams, sample dialogs, and detailed dialog management specs.No of pages - 20Sub-topics1. Where to find early user data on any budget (online research, crowd sourcing, dialogparticipant observation, focus groups, interviews, and surveys)2. How discovery results feed into VUI design decisions (dialog manager graphs)3. Capturing and documenting VUI design (dialog flows, sample dialogs, detaileddesign specifications, VUI design documentation approaches)4. Prototyping and testing your assumptions (early voice UX and prototypingapproaches)PART 3 – Building Voice System InteractionsChapter 6: Applying Human 'Rules of Dialog' to Reach Conversation ResolutionChapter goal: Learn that voice-first dialogs have resolutions. Learn how to design andimplement fully specified requests in the 3 core dialog types: question-answer, actionrequests, and task completion requests.No of pages - 30Sub-topics1. Dialog acts, games and turns – and Grice2. Question answering3. Action requests4. Task completion requests5. Fully specified request (Single slot and Multi-slot requests)6. Determining dialog acts based on feature discovery7. Dialog completion (Responding to 'goodbye' and 'thanks')Chapter 7: Resolving Incomplete Requests Through DisambiguationChapter goal: Explain how to handle incomplete and ambiguous requests, includingcommon disambiguation methods (yes/no, A/B sets, lists and menus) and when to apply each.No of pages - 30Sub-topics1. Incomplete requests - how to reach completeness2. Ambiguous requests3. Disambiguation methods (Logic-based assumptions, Yes/No questions, A/B sets,Static lists, Dynamic lists, Open sets, Menus)4. Testing on the device to find and solve issues5. Toward code independence: using webhooks (fulfillment, contexts, contextparameters, and follow-up)Chapter 8: Conveying Reassurance with Confidence and ConfirmationChapter goal: Teach the importance of conveying reassurance and how to apply different confirmation strategies. Introduce discourse markers and backchannels.No of pages - 30Sub-topics1. Conveying reassurance and shared certainty - Setting expectations2. Webhooks, Take 2 (Dialogflow system architecture, webhook request and response,Implementing the webhook)3. Confirmation methods (Non-verbal confirmation, Generic acknowledgment, Implicitand Explicit confirmations)4. Confirmation placement – confirming slots versus intents5. Disconfirmation: dealing with “no”6. Additional reassurance techniques and pitfalls (System pronunciation, Backchannels,Discourse markers, VUI architecture)7. Choosing the right reassurance methodChapter 9: Helping Users Succeed Through ConsistencyChapter goal: Explore how to navigate an audio interaction that is by nature fleeting andsequential. Provide design and implementation that incorporates consistency throughcorrectly scoped global commands, landmarks, non-verbal audio.No of pages - 20Sub-topics1. Universals (Uses: clarification and additional information, allow a do-over, providean exit)2. Navigation (Landmarks, Non-verbal audio, Content playback navigation, Listnavigation)3. Consistency, variation and randomization (built-in global intents, consistency acrossVUIs and frameworksChapter 10: Creating Robust Coverage for Speech-to-Text ResolutionChapter goal: Teach the nuts and bolts of the computer-side of "listening," starting withthe mapping of sounds to words and how to create solid synonym coverage. Topicsinclude different approaches to recognition, including regular expressions and statisticalmodels, dictionaries, domain knowledge, normalizing, and bootstrapping.No of pages - 25Sub-topics1. Recognition is speech-to-text interpretation2. Recognition engines3. Grammar concepts (Coverage, Recognition space, Static or dynamic, End-pointing,Multiple hypotheses)4. Types of grammars (Rule-based grammars, Statistical models, Hot words, Wakewords and invocation names)5. Working with grammars (Writing rule-based regular expressions)6. How to succeed with grammars (Bootstrapping, Normalizing punctuation andspellings, Handling unusual pronunciations, Using domain knowledge, the strengthsand limitations of STT)7. A simple example (Sample phrases in Dialogflow, Regular expressions in thewebhook)8. Limitations on grammar creation and useChapter 11: Reaching Understanding Through Parsing and Intent ResolutionChapter goal: Explore the second part of computer "listening": interpreting the meaning.Topics cover intent resolution, parsing and multiple passes, the use of tagging guides and middle layers.No of pages - 20Sub-topics1. From words to meaning (NLP, NLU)2. Parsing3. Machine learning and NLU4. Ontologies, knowledge bases and content databases5. Intents (Intent tagging and tagging guides, Middle layers: semantic tags versus systemendpoints)6. Putting it all together (Matching wide or narrow, Multiple grammars, multiple passes)7. A simple example (The Stanford Parser revisited, Determining intent, Machinelearning and using knowledge)Chapter 12: Applying Accuracy Strategies to Avoid MisunderstandingsChapter goal: Explain how misunderstandings happen and how to avoid them throughtechniques that minimize errors and the need to start over. Topics include design andimplementation of a wide set of robustness techniques, including powerful advancedtechniques.No of pages - 25Sub-topics1. Accuracy robustness underlying concepts2. Accuracy robustness strategies (Examples, Providing help, Just-in-time information,Hidden options and "none of those", Recognize-and-reject, One-step-correction,Tutorials, Spelling, Narrowing recognition space)3. Advanced techniques (Multi-tiered behavior and confidence scores, N-best and skiplists, Probabilities, Contextual latency)Chapter 13: Choosing Strategies to Recover from MiscommunicationChapter goal: Explore how to recover when miscommunication happens. Show how torecover and get users back on track quickly, and when to stop trying. Topics includedesign and implementation of several recovery strategies.No of pages - 15Sub-topics1. Recovery from what?2. Recovery strategies (Meaningful contextual prompts, Escalating prompts, Taperedprompts, Rapid reprompt, Backoff strategies)3. When to stop trying (Max error counts, Transfers)4. Choosing recovery strategy (Recognition, intent, or fulfillment errors)Chapter 14: Using Context and Data to Create Smarter ConversationsChapter goal: Explain why context is king in spoken conversation. Show how to accessand update data from various sources, and how to use that data within and across dialogs to create smarter interactions. Topics focus on how to design and implement context aware dialogs using anaphora, proactive behaviors, proximity, geo-location, domain knowledge, and other powerful methods.No of pages - 25Sub-topics1. Why there’s no conversation without context2. Reading and writing data (External accounts and services)3. Persistence within and across conversations4. Context-aware and context-dependent dialogs (Discourse markers andacknowledgments, Anaphora resolution, Follow-up dialogs and linked requests,Proactive behaviors, Topic, domain and world knowledge, Geo location-basedbehavior, Proximity and relevance, Number and type of devices, Time and day, Useridentity, preferences and account types, User utterance wording, System conditions5. Tracking context in modular and multiturn dialogsChapter 15: Creating Secure Personalized ExperiencesChapter goal: Cover personalization and customization. Topics include identification,authentication, privacy and security concerns, system persona audio, and working withTTS versus recorded prompts.No of pages - 25Sub-topics1. The importance of knowing who’s talking2. Individualized targeted behaviors (Concepts in personalization and customization,Implementing individualized experiences3. Authorized secure access4. Approaches to identification and authentication (Implementing secure gated access)5. Privacy and security concerns6. System persona (Defining and implementing a system persona, How persona affectsdialogs7. System voice audio (TTS or voice talent, generated or recorded, Finding and workingwith voice talents, One or several voices, Prompt management)8. Emotion and style9. Voice for specific user groupsPART 4 – Verifying and Deploying Voice System InteractionsChapter 16: Testing and Measuring Performance in Voice SystemsChapter goal: Explain the do’s and don’ts of QA testing a voice system. Topics includeuser testing methods that work best for voice, the code needed to support them, and how to improve system performance based on findings.No of pages - 20Sub-topics1. Testing voice system performance (Recognition testing, Dialog traversal: functionalend-to-end testing, Wake word and speech detection testing, Additional systemintegration testing)2. Testing usability and task completion (Voice usability testing concepts, Wizard of Ozstudies)3. Tracking and measuring performance (Recognition performance metrics, Taskcompletion metrics, User satisfaction metrics)Chapter 17: Tuning and Deploying Voice SystemsChapter goal: Show how to improve, or tune, voice solutions before and after deploying a voice system. Teach what real user data says about the system performance, what to log and track, how to measure accuracy, and how to interpret the data.No of pages - 25Sub-topics1. Tuning: what is it and why do you do it? (Why recognition accuracy isn’t enough,Analyzing causes of poor system performance)2. Tuning types and approaches (Log-based versus transcription-based tuning, Coveragetuning, Recognition accuracy tuning, Finding and using recognition accuracy data,Task completion tuning, Dialog tuning, Prioritizing tuning efforts)3. Mapping observations to the right remedy (Reporting and using tuning results)4. How to maximize deployment success (Know when to tune, Understand tuningcomplexities to avoid pitfalls)
Database-Driven Web Development
Learn to operate at a professional level with HTML, CSS, DOM, JavaScript, PERL and the MySQL database. With plain language explanations and step-by-step examples, you will understand the key facets of web development that today’s employers are looking for. Encapsulating knowledge that is usually found in many books rather than one, this is your one-stop tutorial to becoming a web professional.You will learn how to use the PERL scripting language and the MySQL database to create powerful web applications. Each chapter will become progressively more challenging as you progress through experimentation and ultimately master database-driven web development via the web applications studied in the last chapters.Including practical tips and guidance gleaned from 20+ years of working as a web developer, Thomas Valentine provides you with all the information you need to prosper as a professional database-driven web professional.WHAT YOU'LL LEARN* Leverage standard web technologies to benefit a database-driven approach* Create an effective web development workstation with databases in mind* Use the PERL scripting language and the MySQL database effectively* Maximize the Apache Web Server WHO THIS BOOK IS FORThe primary audience for this book are those who know already know web development basics and web developers who want to master database driven web development. The skills required to understand the concepts put forth are a working knowledge of PERL and basic MySQL.THOMAS VALENTINE has 20 years of experience as both a professional web developer and writer. He is a LAMP, Perl, PHP and MySQL web developer, programmer and expert. He writes for various magazines and web sites and has been a technical consultant for large scale, database driven web sites such as FedEx.ca and Texas Instruments (ti.com).Chapter 1 (Formerly 6 and 7) - Database-Driven Web Development FundamentalsChapter 2 (Formerly 8 through 10) - Perl CGI and MySQL EssentialsChapter 3 (Formerly 11) - Essential MySQL SkillsChapter 4 (Formerly 13) - Nuts and BoltsChapter 5 (Originally 5, then 1) – Practical JavaScript Concepts and ProjectsChapter 6 - Images: Uploads and Scripted ManipulationChapter 7 (Formerly Chapter 15) – Installing and Using the PERL ServerChapter 8 (Formerly 16) – Installing and Using the MySQL Database ServerChapter 9 (Formerly 17) – Installing and Using the Apache Web ServerChapter 10 (Formerly 18) – A Database Driven Menu System
Extending Kubernetes
Rely on this comprehensive guide to understand the extension patterns and discover the extension plugins for Kubernetes.In this book, state-of-the-art extension patterns and extension points of Kubernetes are covered in depth with real-life use cases and examples. There are comprehensive discussions in the text on all possible aspects of Kubernetes, starting from end-user to the fully-automated controller development. The book focuses on creating applications that work on Kubernetes and also interact and operate Kubernetes itself.The book starts with a recap of Kubernetes, its rich configuration options, extension patterns, and points. The journey of extending Kubernetes starts with the CLI tool plugins. By the end of this section, you will be able to create and manage kubectl plugins. Then, the API access plugins with authentication and authorization webhooks are presented. In this section, you will learn how to extend and interfere with the API flow of Kubernetes. You then move on to learn how to extend Kubernetes API with new resources and controllers. You will make Kubernetes API work for you by creating a Kubernetes operator. Extensions for Kubernetes schedulers are covered to create a custom scheduler and run it side-by-side with the default scheduler. Finally, the last extension points will be discussed for the infrastructure, such as networking or storage. At the end of the text, you will learn the upcoming extension points. This book is designed to cover all the extension points of Kubernetes with state-of-the-art implementations.This book is intended for those who wish to understand Kubernetes in depth and go further by making Kubernetes work for their custom requirements. By the end of this book, readers with a cloud-native mindset will broaden their vision to create future-proof applications. Rather than focus on overwhelming theoretical information and YAML files for Kubernetes resources, readers are provided with the philosophy behind Kubernetes extensions. With real-life examples and hands-on development steps, you will be more confident in working with Kubernetes.WHAT YOU WILL LEARN* Know the Kubernetes extension patterns and available extension points * Be familiar with the philosophy behind Kubernetes extensions and how they should be integrated into the clusters* Design Kubernetes extensions and make Kubernetes work for you* Develop, deploy, and operate plugins for Kubernetes ranging from the CLI tool to custom resources, schedulers, infrastructure, and more * Study real-life use cases for extending Kubernetes with code examplesWHO THIS BOOK IS FORSoftware engineers, developers, DevOps engineers, cloud security analysts, architects, and managers who have Kubernetes in their short- and long-term plansONUR YILMAZ is a senior software engineer at a multinational enterprise software company. He is a Certified Kubernetes Administrator (CKA) and works on Kubernetes and cloud management systems. He is a keen supporter of cutting-edge technologies, including Docker, Kubernetes, and cloud-native applications. He is the author of multiple books on Kubernetes, Docker, serverless architectures, and cloud-native continuous integration and delivery. He has one master and two bachelor degrees in the engineering field.Chapter 1: IntroductionCHAPTER GOAL: Provide an introduction to Kubernetes, configuration options, extension patterns, and extension points with real-life use casesNO OF PAGES: 25-30SUB-TOPICS:1. Kubernetes Recap2. Configuring Kubernetes Cluster3. Kubernetes Extension Patterns4. Kubernetes Extension PointsChapter 2: kubectl pluginsCHAPTER GOAL: Understand how to extend Kubernetes CLI tool, kubectl, for the custom requirements. How to develop, install and release new plugins for kubectlNO OF PAGES: 30-35SUB-TOPICS:* kubectl Installation and Usage* kubectl Plugin Design* Create Your First kubectl Plugin* Plugin Repository and LifecycleCHAPTER 3: API FLOW EXTENSIONSCHAPTER GOAL: Understand the flow of Kubernetes API server to handle requests. Learn how to extend the flow with authentication, authorization, and admission controls.NO OF PAGES: 25-30SUB -TOPICS:* Authentication WebhooksAuthorization Webhooks * Dynamic Admission ControlCHAPTER 4: EXTENDING KUBERNETES APICHAPTER GOAL: Discuss how Kubernetes API can be extended with custom resources and the automation of the custom resources, namely operators.NO OF PAGES: 50-55SUB-TOPICS:* Kubernetes API Overview* Kubernetes Client Libraries* Custom Resources in Kubernetes* Operator Pattern in Kubernetes* kubebuilder Framework* Operators in ActionCHAPTER 5: SCHEDULER EXTENSIONSCHAPTER GOAL: Learn how Kubernetes scheduling mechanism works and how it could be extended. Write, deploy, and use a custom scheduler for Kubernetes cluster.NO OF PAGES: 35-40SUB-TOPICS:* Kubernetes Scheduler OverviewDevelop and Deploy a Custom Scheduler * Configure and Manage Multiple Schedulers CHAPTER 6: INFRASTRUCTURE EXTENSIONSCHAPTER GOAL: Discover how Kubernetes interacts with the infrastructure in terms of storage and networking. Learn how to extend Kubernetes clusters with new pod networking and volume drivers.NO OF PAGES: 25-30SUB-TOPICS:* Storage Plugins* Network Plugins (They are still in development, and in alpha stage, if they become stable, it is an excellent asset to have in the book) CHAPTER 7: UPCOMING EXTENSION POINTSCHAPTER GOAL: Summarize the extension points of Kubernetes and discuss the upcoming trends and libraries in the market.NO OF PAGES: 20-25
Demystifying the Azure Well-Architected Framework
Use the Azure well-architected framework to deploy your workloads in Azure and align them with Microsoft recommended best practices. This book takes a deep dive into the five architecture elements (cost optimization, performance efficiency, operational excellence, reliability, and security) and provides practical guidance on incorporating them into your architecture.The book starts with an introduction to the relevance of the well-architectured framework and why it should form the baseline of your design decisions when deploying applications in Azure. You will learn how customers can optimize the cost of deployment in Azure and understand all aspects of implementation. The book takes you through the practices and processes to be followed to run applications smoothly and you will understand the end-to-end process of design, deployment, and monitoring. You will go through paradigms for designing environments to meet different performance demands. The book covers how to build resilient and highly available applications in Azure with a sample configuration for monitoring. And you will learn how to enable security to ensure confidentiality and integrity of workloads in Azure.After reading this book, you will know the practical nuances of designing high-performing applications in the Microsoft cloud.WHAT YOU WILL LEARN* Understand the five pillars of the well-architected framework* Use tools and services to optimize cost* Design for performance efficiency* Deal with threat vectors in the cloudWHO THIS BOOK IS FORSolution architects and cloud teams in AzureSHIJIMOL AMBI KARTHIKEYAN has more than 15 years of experience in data center management, server administration, virtualization, and cloud technologies. She is currently working as Technical Delivery Manager focusing on Azure infrastructure, automation, DevOps, serverless, and related technologies. She is a tech enthusiast and loves writing about the latest developments in IT infrastructure and cloud computing on her blog (thetechnologychronicle).CHAPTER 1: AZURE WELL-ARCHITECTED FRAMEWORK: THE WHAT AND WHY?CHAPTER GOAL: This chapter will introduce readers to the relevance of well-architected framework and why it should form the baseline of all their design decisions while deploying applications in AzureNO OF PAGES : 10SUB -TOPICS1. Digital transformation through Azure2. Why do you need a framework for architecture excellence?3. What is Azure Well architected framework?4. The five pillars of Azure well architected framework5. Practical annotationsCHAPTER 2: COST OPTIMIZATION: RETURN ON YOUR CLOUD INVESTMENTChapter Goal: This chapter will focus on how customers can optimize cost of deployments in Azure, covering practical aspects of implementationNO OF PAGES: 30SUB - TOPICS1. How to design for optimal ROI2. Tools and services for optimizing cost3. Understand the tradeoffs4. Configure reports for visibilityCHAPTER 3: OPERATIONAL EXCELLENCE: KEEP THE LIGHTS ONCHAPTER GOAL: This chapter will focus on framework, practices and processes to be followed to ensure that applications run without disruption. It will cover end to end processes starting from the design, deployment and ongoing monitoringNO OF PAGES :30SUB - TOPICS:1. Start with the application design2. Adopt “Everything as code”3. Enable peak performance for deployment ecosystem4. Always “Shift Left” for testing5. Integrated monitoringCHAPTER 4: PERFORMANCE EFFICIENCY: MEET THE DEMAND SPIKESCHAPTER GOAL: This chapter will explore the paradigms for designing environments to meet varying performance demands. The practical considerations of scalability for the same will be explainedNO OF PAGES:30SUB - TOPICS:1. Design principles for performance efficiency2. Make best use of cloud scalability3. Identify bottlenecks through testing4. Monitoring metrics for performanceCHAPTER 5: RELIABILITY: BUILD RESILIENT APPLICATIONS IN THE CLOUDCHAPTER GOAL: This chapter will focus on considerations for building resilient and highly available applications in Azure, with sample configuration for monitoringNO OF PAGES:30SUB - TOPICS:1. Best practices for building resilient applications2. Popular adoption strategies3. How to meet the defined SLAs4. Testing and monitoringCHAPTER 6: SECURITY: PROTECT YOUR WORKLOADS IN THE CLOUDCHAPTER GOAL: This chapter will cover the practical aspects of enabling security to ensure confidentiality and integrity of workloads in AzureNO OF PAGES:30SUB - TOPICS:1. Understanding threat vectors in the cloud2. Adaptable security for new world threats3. Secure compute, storage , network and code4. Identity is the new security perimeter5. Azure Native security tools for your SOC team
UX-Design überzeugend vermitteln
Erfolgreich mit Kunden und Stakeholdern kommunizieren und die bestmögliche User Experience erzielen.Wie gut Ihr Design auch sein mag: Ohne die Unterstützung von Nicht-Designerkollegen, Stakeholdern und Kunden werden aus Ihren Entwürfen niemals Produkte. UX-Designer und -Designerinnen verbringen den größten Teil ihrer Arbeitszeit nicht mit dem Design selbst, sondern mit der Kommunikation und Diskussion von Designentscheidungen.Dieser praktische Leitfaden konzentriert sich auf Prinzipien, Taktiken und umsetzbare Methoden zur erfolgreichen Präsentation Ihrer Entwürfe. Ganz gleich, ob Sie Apps, Websites oder Produkte designen: Sie werden lernen, wie Sie sich die Unterstützung derjenigen Personen sichern, die wirklichen Einfluss auf ein Projekt haben – immer mit dem Ziel, die bestmögliche User Experience zu realisieren.Zum AutorTom Greever entwirft seit mehr als 20 Jahren Schnittstellen und leitet Designteams. Sein umfangreiches Wissen darüber, wie bessere Kommunikation zu großartigem Design führt, geht auf seine breite Erfahrung als UX Designer, Executive Design Leader und Consultant zurück. Er coacht und berät Teams zu Designpraktiken und Kommunikation sowohl in großen Unternehmen als auch in kleinen Start-ups rund um die Welt.
Pro PHP 8 MVC
Examine the building blocks that make any good MVC framework using PHP 8. This book exposes all the considerations that many developers take for granted when using a popular framework, and teaches you how to make this MVC framework your own.You'll quickly get started writing your first bit of framework code, then, you build a variety of examples using aspects of an MVC framework, including a router, a template engine, a database library, a persistence engine (ORM), and a testing framework. In the next section, you'll implement sessions, caches, file systems, queues, logging, and mail. You'll wrap up by building a larger scale sample web application: a sales website for a company that sells rockets.Along the way, this book lays bare all the secret parts of MVC to take with you to apply to your own PHP-based MVC projects.WHAT YOU WILL LEARN* Build PHP-based web applications using the model view controller (MVC) architecture * Write your first bit of framework code* Compare the code you write with how the popular frameworks do the same kinds of thingsCreate various aspects of applications, engines, and other frameworks * Wrap up with a sample case study applicationWHO THIS BOOK IS FORExperienced PHP and web developers. Some prior experience with PHP and web development at least recommended.Christopher Pitt is an experienced PHP and JavaScript/CSS web developer and writer, working at SilverStripe. He usually works on application architecture, though sometimes you’ll find him building compilers or robots. He is also the author of several web development books and is a contributor on various open source projects such as AdonisJs and Masonite.1: Ways to Use PHP2: Writing Our First Bit of Code3: Building a Router4: Building a Template Engine5: Building a Validator6: Building a Database Library7: Building an Object-Relational Mapper Library8: Building a Dependency Injection Container9: Testing Our Framework10: Config, Cache, Sessions, Filesystems11: Queues, Logging, Emails12: Publishing Your CodeAfterword: Wrapping Up
Implementing Machine Learning for Finance
Bring together machine learning (ML) and deep learning (DL) in financial trading, with an emphasis on investment management. This book explains systematic approaches to investment portfolio management, risk analysis, and performance analysis, including predictive analytics using data science procedures.The book introduces pattern recognition and future price forecasting that exerts effects on time series analysis models, such as the Autoregressive Integrated Moving Average (ARIMA) model, Seasonal ARIMA (SARIMA) model, and Additive model, and it covers the Least Squares model and the Long Short-Term Memory (LSTM) model. It presents hidden pattern recognition and market regime prediction applying the Gaussian Hidden Markov Model. The book covers the practical application of the K-Means model in stock clustering. It establishes the practical application of the Variance-Covariance method and Simulation method (using Monte Carlo Simulation) for value at risk estimation. It also includes market direction classification using both the Logistic classifier and the Multilayer Perceptron classifier. Finally, the book presents performance and risk analysis for investment portfolios.By the end of this book, you should be able to explain how algorithmic trading works and its practical application in the real world, and know how to apply supervised and unsupervised ML and DL models to bolster investment decision making and implement and optimize investment strategies and systems.WHAT YOU WILL LEARN* Understand the fundamentals of the financial market and algorithmic trading, as well as supervised and unsupervised learning models that are appropriate for systematic investment portfolio management* Know the concepts of feature engineering, data visualization, and hyperparameter optimization* Design, build, and test supervised and unsupervised ML and DL models* Discover seasonality, trends, and market regimes, simulating a change in the market and investment strategy problems and predicting market direction and prices* Structure and optimize an investment portfolio with preeminent asset classes and measure the underlying riskWHO THIS BOOK IS FORBeginning and intermediate data scientists, machine learning engineers, business executives, and finance professionals (such as investment analysts and traders)TSHEPO CHRIS NOKERI harnesses big data, advanced analytics, and artificial intelligence to foster innovation and optimize business performance. In his functional work, he has delivered complex solutions to companies in the mining, petroleum, and manufacturing industries. He initially completed a bachelor’s degree in information management. He then graduated with an honors degree in business science at the University of the Witwatersrand on a TATA Prestigious Scholarship and a Wits Postgraduate Merit Award. They unanimously awarded him the Oxford University Press Prize. He has authored the Apress book Data Science Revealed: With Feature Engineering, Data Visualization, Pipeline Development, and Hyperparameter Tuning.Chapter 1: Introduction to the Financial Markets and Algorithmic TradingForeign exchange market- Exchange rate- Exchange rates quotationThe Interbank marketThe retail marketBrokerage- Understanding leverage and margin- Contract for difference tradingThe share marketRaising capital- Public listing- Stock exchange- Share tradingSpeculative nature of foreign exchange marketTechniques for speculating market movementAlgorithmic trading- Supervised machine learningThe parametric method- The non-parametric methodBinary classificationMulticlass classification- The ensemble method- Unsupervised learning - Deep learning- Dimension reductionChapter 2: Forecasting Using ARIMA, SARIMA and Additive ModelTime series in actionSplit data into training and test dataTest for stationaryTest for white noiseAutocorrelation functionPartial autocorrelation functionThe moving averages smoothing techniqueThe exponential smoothing techniqueRate of returnThe ARIMA ModelARIMA Hyperparameter Optimization- Develop the ARIMA model- Forecast prices using the ARIMA modelThe SARIMA model- Develop SARIMA model- Forecast using the SARIMA modelAdditive model- Develop the additive model- Forecast prices the additive model- Seasonal decompositionConclusionChapter 3: Univariate Time Series using Recurrent Neural NetsWhat is deep learning?Activation functionLoss functionOptimize an artificial neural networkThe sequential data problemThe recurrent net modelThe recurrent net problemThe LSTM modelGatesUnfolded LSTM networkStacked LSTM networkLSTM in action- Split data into training, test and validation- Normalize data- Develop LSTM model- Forecasting using the LSTM- Model evaluation- Training and validation loss across epochs - Training and validation accuracy across epochsConclusionChapter 4: Discover Market RegimesHMMHMM application in finance- Develop GaussianHMMMean and varianceExpected returns and volumesConclusionsChapter 5: Stock ClusteringInvestment Portfolio DiversificationStock market volatilityK-Means clusteringK-Means in practiceConclusionsChapter 6: Future Price Prediction using Linear RegressionLinear Regression in PracticeDetect missing valuesPearson correlationCovariancePairwise scatter plotEigen matrixSplit data into training and test data.Normalize dataLeast squares model hyperparameter optimizationStep 1: Fit least squares model with default hyperparametersStep 2: Determine the mean and standard deviation of the cross-validation scoresStep 3: Determine Hyper-parameters that yield the best score.Develop least squares modelFind an interceptFind the estimated coefficientTest least squares model performance using SciKit-LearnPlotting actual values and predicted valuesConclusionChapter 7: Stock Market SimulationUnderstanding value at riskEstimate VAR using the Variance-Covariance MethodUnderstanding Monte CarloApplication of Monte Carlo simulation in finance- Run Monte Carlo simulation- Plot simulationsConclusionsChapter 8: Market Trend Classification using ML and DLClassification in practiceData preprocessingSplit Data into training and test dataLogistic regression- Finalize a logistic classifier- Evaluate a logistic classifier- Learning curveMultilayer layer perceptron- Architecture- Finalize model- Training and validation loss across epochs- Training and validation accuracy across epochsConclusionsChapter 9: Investment Portfolio and Risk AnalysisInvestmentInvestment AnalysisInvestment Risk ManagementInvestment Portfolio Management Pyfolio in actionPerformance statisticsDrawbackRate of returnsAnnual rate of returnRolling returns- Monthly rate of returnsConclusions
How to Make a Game
Get a head start on making your games efficiently by avoiding common design and development pitfalls. Video games combine art and programming; this unique position has opened up opportunities for many pitfalls. This book takes you through the fundamentals of game making and the usual mistakes and bad practices that can harm your games.We start with the common difficulties and challenges, ways to find the gaps, and game design. Next, we discuss game engines and other tools you need to choose while making a game, how you should choose them, and the design documents you need to make. We also cover simple but important tweaks in game mechanics as well as the look and feel of your game. We will also discuss conventions for naming, code structuring, project structuring, and coding.Your thought process will be guided in a way that you can look for the proper approach to make a successful game. The book sheds light upon how to improve the overall game experience and finalize the game for release. Along the journey, we will explore some interesting stories of games and mythology as well.By the end of the book, you will know about the basic life cycle of a game development process and how to not make a game.WHAT YOU WILL LEARN* Discover the fundamentals of game design * See some intermediate coding tricks to make your games better* Grasp the pitfalls to avoid while designing and programming games* Master the different conventions and practices for file naming and structuring your projects WHO THIS BOOK IS FORPeople who want to make games. Basic programming experience is assumed.MINHAZ-US-SALAKEEN FAHME is the co-founder and CEO of Battery Low Interactive Ltd—a company that makes wishes come true. It started as a game studio in 2015 and over the years, grew into a bunch of wings- each working dedicatedly on serious games; web and app development; business and marketing solutions using augmented reality and virtual reality; digital marketing; and small-scale indie games. With their outreach campaigns, Battery Low has reached half a million kids with the experience of immersive technology for the first time. Fahme also conducts sessions on AR, VR, MR, game design, entrepreneurship, career, and leadership for youth and entrepreneurs in educational institutions, national, and international events. He is a blogger and game designer/writer by passion while cats, travels, live concerts, epic fantasies keep him running.TANIMUL HAQUE KHAN is the head of the Unity department of Brain Station 23, a service-based company. He along with his team has been providing AR/VR enterprise solutions since 2018. He has been working with Unity technologies since 2015. He has played an uncountable number of games across multiple platforms mostly on PC and console. He is one of the most well-recognized Unity developers in Bangladesh. Aside from the tech industry he has also co-founded the very first cat cafe in Bangladesh known as Capawcino.Chapter 1: Don'tChapter Goal: In this chapter, you will get introduced to the core difficulties and challenges of the game making journey.Chapter 2: The Fault in Our StarsChapter Goal: This chapter will discuss the first encounters with games as well as the process of finding the gaps and lacking. We will also discuss game analysis in this chapter.Chapter 3: Don't Reinvent the WheelChapter Goal: We will discuss the game engine and the purpose they serve as powerful and necessary tools in game development.Chapter 4: Choose Your ArsenalChapter Goal: We will learn about game engines in greater detail including their pros n cons by building a RPG.Chapter 5: It's All in My Head/ Don't Keep It All in Your HeadChapter Goal: Learn to make Game Design Document, writing practices, and hurdles that may be stopping you from writing it.Chapter 6: A Stitch in Time Saves NineChapter Goal: This chapter teaches conventions of file naming, structuring, project structuring, coding (with some examples)Chapter 7: Git GoodChapter Goal: We will learn about version controlChapter 8: Get Smart!Chapter Goal: This chapter shows the ill effects of hard code. This would enable you to differentiate between good and bad approaches towards code and learn how to eliminate them.Chapter 9: Game Design - The Three musketeers!Chapter Goal: You will learn the overall journey of game design, understanding all the components, their role, and how to roll them properly.Chapter 10: Game Feel and EffectsChapter Goal: We will learn about camera effect, audio effect, particle effect in this chapter.Chapter 11: Input MattersChapter Goal: Learn about choosing input styles properly.Chapter 12: Help!Chapter Goal: This chapter will helping you transcend through reality (pseudo code), dynamic difficulty.Chapter 13: Platform Choosing (Pros n Cons)Chapter Goal: This chapter will help you choose the right platform to publish your game.Chapter 14: The Great Filter/Fermi ParadoxChapter Goal: In this chapter, you will learn how to test your game and how to approach publishing and assessing the success.Chapter 15: Gameover - The Myth of Sisyphus/Insanity Loop/Core LoopChapter Goal: In the final chapter, we will evaluate all we have learnt by studying this game, its success, and the future
Pro Power BI Theme Creation
Use JSON theme files to standardize the look of Power BI dashboards and reports. This book shows how you can create theme files using the Power BI Desktop application to define high-level formatting attributes for dashboards as well as how to tailor detailed formatting specifications for individual dashboard elements in JSON files. Standardize the look of your dashboards and apply formatting consistently over all your reports. The techniques in this book provide you with tight control over the presentation of all aspects of the Power BI dashboards and reports that you create.Power BI theme files use JSON (JavaScript Object Notation) as their structure, so the book includes a brief introduction to JSON as well as how it applies to Power BI themes. The book further includes a complete reference to all the current formatting definitions and JSON structures that are at your disposal for creating JSON theme files. Finally, the book includes dozens of theme files, from the simple to the most complex, that you can adopt and adapt to suit your own requirements.WHAT YOU WILL LEARN* Produce designer output without manually formatting every individual visual in a Power BI dashboard* Standardize presentation for families of dashboard types* Switch presentation styles in a couple of clicks* Save dozens, or hundreds, of hours laboriously formatting dashboards* Define enterprise-wide presentation standards* Retroactively apply standard styles to existing dashboardsWHO THIS BOOK IS FORPower BI users who want to save time by defining standardized formatting for their dashboards and reports, IT professionals who want to create corporate standards of dashboard presentation, and marketing and communication specialists who want to set organizational standards for dashboard deliveryADAM ASPIN is an independent business intelligence consultant based in the United Kingdom. He has worked with SQL Server for over 25 years, and now focuses on Power BI. During this time, he has developed several dozen BI and analytics systems based on the Microsoft BI product suite. Adam has been creating JSON theme files since the feature was first introduced in Power BI Desktop, and has delivered corporate Power BI themes for dozens of clients across Europe.Adam is a graduate of Oxford University. He has applied his skills for a range of clients in finance, banking, utilities, telecoms, construction, and retail. He is the author of Apress books: SQL Server Data Integration Recipes; Business Intelligence with SQL Server Reporting Services; High Impact Data Visualization in Excel with Power View, 3D Maps, Get and Transform and Power BI; Pro Power BI Desktop; and Data Mashup with Microsoft Excel Using Power Query and M. 1. Introduction to Power BI Themes2. Create and Customize a Theme In Power BI Desktop3. High-Level Theme Definition4. Default Visual Styles5. Object Visual Styles6. Card and Table Visual Styles7. Classic Chart Visual Styles8. Complex Chart Visual Styles9. Other Chart Visual Styles10. Maps11. Miscellaneous Visual Styles12. Dashboard Styling13. Cascading Styles
Encountering Technology
Technology has changed the world. Most of us love technology. It has evolved. It has become more complex. We now carry a combined computer, telephone and camera in the form of a smartphone. It’s hard to believe that a smartphone contains, in addition to other technology, billions of transistors.In this fascinating book the author, George Gerstman, shares his story of technology that he has seen evolve over his lifetime. Encountering Technology takes you from the 1940s to the present, with photographs showing much of the technology that Gerstman used and enjoyed. The book includes scores of examples of the technology, such as digital computers that Gerstman programmed during the 1950s which weighed tons and weren’t nearly as powerful as the computer in an iPhone, radios that he listened to before television became popular, the advent of video games, the evolution of the Internet, film cameras that he used before digital cameras were invented, and so much more. Gerstman describes how he personally encountered the digital revolution.Encountering Technology directs you through the most popular technology of the past 80 years. The book is a must-read for everyone with any interest in television, telephones, radios, computers, cameras, the Internet, watches, video, or other technology. Using photographs and clear narrative, Gerstman describes engrossing aspects of the technical devices. His background in electrical engineering and patent law, as well as being a consumer, has given him insights that are certain to inform and excite the reader.
Data Engineering 4.0
Digitale Systeme und Infrastrukturen werden in der Regel gemeinsam oder wie im öffentlichen Sprachgebrauch üblich, „geteilt“ genutzt.Das gilt sowohl für die Systeme und Infrastrukturen selbst, als auch für Daten, die häufig als das Öl der Digitalisierung bezeichnet werden.In industriellen Nutzungen sind Daten in den meisten Fällen eine geschäftskritische Ressource und können nicht, wie im privaten Nutzungsumfeld, bedingungslos und uneigennützig Dritten überlassen werden. Dennoch ist das Teilen von Daten für industrielle Anwendungen gewünscht und häufig auch zwingend notwendig, aber ebenso häufig unzulässig und gefährlich. Genauso zwingend wie das Teilen von Daten ist in industriellen Anwendungen das nutzungsgerechte und passgerechte Zusammenführen von Daten unterschiedlicher Bedeutung zu Daten-Konglomeraten.Um die digitale Souveränität gemeinsam berechtigter Nutzer von Daten gewährleisten zu können, muss zur Bewältigung dieser beiden Aufgaben ein systematisches Data Engineering bereitgestellt werden.HERBERT WEBEr war Universitätsprofessor im Fachbereich Informatik der Technischen Universität Berlin sowie Gründer und langjähriger Leiter des Fraunhofer-Instituts für Software und Systemtechnik. Informationen und Informationsmodelle.- Informationsmodellierung für industrielle Anwendungen.- Methoden der Informationsmodellierung.- Kompositionale konstruierte Informationsmodelle.- Extensionale Konstruktionen.- Intensionale Konstruktionen.- Das HERMES Komponentenmodell.- Zusammenfassung.