Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design
Ever-changing business needs have prompted large companies to
rethink their enterprise IT. Today, businesses must allow
interaction with their customers, partners, and employees at more
touch points and at a depth never thought previously. At the same
time, rapid advances in information technologies, like business
digitization, cloud computing, and Web 2.0, demand fundamental
changes in the enterprises management practices. These changes have
a drastic effect not only on IT and business, but also on policies,
processes, and people. Many companies therefore embark on
enterprise-wide transformation initiatives. The role of Enterprise
Architecture (EA) is to architect and supervise this
transformational journey. Unfortunately, today s EA is often a
ponderous and detached exercise, with most of the EA initiatives
failing to create visible impact. The enterprises need an EA that
is agile and responsive to business dynamics. "Collaborative
Enterprise Architecture" provides the innovative solutions today s
enterprises require, informed by real-world experiences and experts
insights. This book, in its first part, provides a systematic
compendium of the current best practices in EA, analyzes current
ways of doing EA, and identifies its constraints and shortcomings.
In the second part, it leaves the beaten tracks of EA by
introducing Lean, Agile, and Enterprise 2.0 concepts to the
traditional EA methods. This blended approach to EA focuses on
practical aspects, with recommendations derived from real-world
experiences. A truly thought provoking and pragmatic guide to
manage EA, "Collaborative Enterprise Architecture" effectively
merges the long-term oriented top-down approach with pragmatic
bottom-up thinking, and that way offers real solutions to
businesses undergoing enterprise-wide change.
Programming is now parallel programming. Much as structured
programming revolutionized traditional serial programming decades
ago, a new kind of structured programming, based on patterns, is
relevant to parallel programming today. Parallel computing experts
and industry insiders Michael McCool, Arch Robison, and James
Reinders describe how to design and implement maintainable and
efficient parallel algorithms using a pattern-based approach. They
present both theory and practice, and give detailed concrete
examples using multiple programming models. Examples are primarily
given using two of the most popular and cutting edge programming
models for parallel programming: Threading Building Blocks, and
Cilk Plus. These architecture-independent models enable easy
integration into existing applications, preserve investments in
existing code, and speed the development of parallel applications.
Examples from realistic contexts illustrate patterns and themes in
parallel algorithm design that are widely applicable regardless of
implementation technology.
In recent years, most applications deal with constraint decision-making systems as problems are based on imprecise information and parameters. It is difficult to understand the nature of data based on applications and it requires a specific model for understanding the nature of the system. Further research on constraint decision-making systems in engineering is required. Constraint Decision-Making Systems in Engineering derives and explores several types of constraint decisions in engineering and focuses on new and innovative conclusions based on problems, robust and efficient systems, and linear and non-linear applications. Covering topics such as fault detection, data mining techniques, and knowledge-based management, this premier reference source is an essential resource for engineers, managers, computer scientists, students and educators of higher education, librarians, researchers, and academicians.
This book describes a wide variety of System-on-Chip (SoC) security threats and vulnerabilities, as well as their sources, in each stage of a design life cycle. The authors discuss a wide variety of state-of-the-art security verification and validation approaches such as formal methods and side-channel analysis, as well as simulation-based security and trust validation approaches. This book provides a comprehensive reference for system on chip designers and verification and validation engineers interested in verifying security and trust of heterogeneous SoCs.
This book constitutes the refereed post-conference proceedings of the 6th International Workshop on Accelerator Programming Using Directives, WACCPD 2019, held in Denver, CO, USA, in November 2019.The 7 full papers presented have been carefully reviewed and selected from 13 submissions. The papers share knowledge and experiences to program emerging complex parallel computing systems. They are organized in the following three sections: porting scientific applications to heterogeneous architectures using directives; directive-based programming for math libraries; and performance portability for heterogeneous architectures.
Monitor, log, and trace your cloud applications using the power of AWS' myriad observability tools to ensure the systems you build are resilient Key Features * Implement observability in your cloud applications and systems with the power of AWS * Ensure your customers' satisfaction by identifying and fixing bottlenecks quickly * Learn from the experts to get the best possible insight into AWS' observability solutions Book Description Cloud observability is complex if you're new to the cloud and even if you're an experienced cloud practitioner. Thankfully, the world's most popular cloud provider, AWS, provides multiple tools for identifying performance bottlenecks in modern distributed applications. An Insider's Guide to Observability on AWS will help you use these tools to provide the logging, monitoring, and tracing that your systems need to be as efficient as possible. This comprehensive guide to observability on AWS covers all the bases, taking you from basic observability with CloudWatch, through automated observability, to machine-learning-powered tools such as AWS DevOps Guru, and everything in between. You'll learn how to implement observability in containers, in serverless applications, and for user experience monitoring. This is truly an all-encompassing guide that leaves no stone unturned in its quest to give you the knowledge, skills, and practice to implement observability in your applications from end to end and visualize the results using the wide range of tools provided by AWS. You'll also see some of the guidelines and best practices, such as how the Well-Architected Framework relates to observability. By the end of the book, you will find it easy to implement observability in your applications using AWS' native and managed open source tools. What you will learn * Take metrics from an EC2 instance and visualize them in a dashboard * Conduct distributed tracing using AWS X-Ray * Derive operational metrics using CloudWatch Logs * Achieve observability of containerized applications in ECS and EKS * Use CloudWatch and Lambda Insights to monitor serverless applications * Visualize your insights with Amazon Managed Grafana * Harness the power of the ELK stack with OpenSearch * Scale the observability of applications in complex organizations Who This Book Is For This book is intended for SREs, cloud developers and DevOps engineers using AWS native services and tools as well as open source managed services on AWS to achieve the required observability targets. It will also provide guidance to Solution Architects on achieving operational excellence in adopting cloud observability solutions for the workloads. Readers need to have a basic understanding of AWS cloud fundamentals and different services available on AWS cloud to run their applications like EC2, storage solutions like S3, container solutions like ECS, EKS, etc.
Razor Pages lets you build, configure, and deploy amazing dynamic ASP.NET websites with ease. In ASP.NET Core Razor Pages in Action you will learn: Building, configuring, and publishing a data-driven website Creating a complete web application step-by-step Forms for collecting and processing user data Connecting to databases from a Razor Page Protecting areas of a Razor Page from unauthorized access with ASP.NET Identity Using Object Relational Mapping tools to work with data in Razor Pages applications Generating CRUD pages using scaffolding gestures Generating and sending email from your web application ASP.NET Core Razor Pages in Action teaches you to develop dynamic websites using the powerful Razor Pages framework, .NET 6, and ASP.NET. Razor Pages generates HTML on the server, and is the perfect choice for eCommerce sites, intranet services, content management systems, and other apps that require reliability. In this book, you'll use Razor Pages to build a complete application for booking city breaks, learning to iterate amazing new features chapter-by-chapter. about the technology Razor Pages sits on top of .NET 6 as a key part of ASP.NET Core, and has become the recommended tool for any developer building websites with Microsoft technologies. The page-focused framework is great for building dynamic websites that change frequently, and simplifies the process of building complex applications. about the book ASP.NET Core Razor Pages in Action shows you how to use Razor Pages to create dynamic websites that are easy to test and scale. You'll go hands-on to build a complete vacation-booking application, incorporating new framework features and adding complexities as they're introduced. As the application unfolds, you'll see how Razor Pages simplifies all the essential tasks of web development, from form creation and data processing, to easy publication and deployment. You'll also learn to enhance your web applications with the huge ecosystem of C# libraries, and how to locate the perfect tool for your task using centralized repositories.
Managing the Web of Things: Linking the Real World to the Web presents a consolidated and holistic coverage of engineering, management, and analytics of the Internet of Things. The web has gone through many transformations, from traditional linking and sharing of computers and documents (i.e., Web of Data), to the current connection of people (i.e., Web of People), and to the emerging connection of billions of physical objects (i.e., Web of Things). With increasing numbers of electronic devices and systems providing different services to people, Web of Things applications present numerous challenges to research institutions, companies, governments, international organizations, and others. This book compiles the newest developments and advances in the area of the Web of Things, ranging from modeling, searching, and data analytics, to software building, applications, and social impact. Its coverage will enable effective exploration, understanding, assessment, comparison, and the selection of WoT models, languages, techniques, platforms, and tools. Readers will gain an up-to-date understanding of the Web of Things systems that accelerates their research.
Revolutionize the way your organization approaches data with a data mesh! This new decentralized architecture outpaces monolithic lakes and warehouses and can work for a company of any size. Data Mesh in Action reveals how this ground breaking architecture looks for both small start-ups and large enterprises. You'll see a datamesh in action as you explore both an extended case study andmultiple real-world examples. As you go, you'll be expertly guidedthrough discussions around Socio-Technical Architecture and Domain-Driven Design with the goal of building a sleek data-as-a-productsystem.
Intelligent Vehicular Network and Communications: Fundamentals, Architectures and Solutions begins with discussions on how the transportation system has transformed into today's Intelligent Transportation System (ITS). It explores the design goals, challenges, and frameworks for modeling an ITS network, discussing vehicular network model technologies, mobility management architectures, and routing mechanisms and protocols. It looks at the Internet of Vehicles, the vehicular cloud, and vehicular network security and privacy issues. The book investigates cooperative vehicular systems, a promising solution for addressing current and future traffic safety needs, also exploring cooperative cognitive intelligence, with special attention to spectral efficiency, spectral scarcity, and high mobility. In addition, users will find a thorough examination of experimental work in such areas as Controller Area Network protocol and working function of On Board Unit, as well as working principles of roadside unit and other infrastructural nodes. Finally, the book examines big data in vehicular networks, exploring various business models, application scenarios, and real-time analytics, concluding with a look at autonomous vehicles.
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation. This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.
Navigation Design and SEO for Content-Intensive Websites: A Guide for an Efficient Digital Communication presents the characteristics and principal guidelines for the analysis and design of efficient navigation and information access systems on content-intensive websites, such as magazines and other media publications. Furthermore, the book aims to present the tools of information processing, including information architecture (IA) and content categorization systems, so that such designs can ensure a good navigation experience based on the semantic relations between content items. The book also presents best practices in the design of information access systems with regard to their main structures, including search query forms and search result pages. Finally, the book describes the foundations of search engine optimization (SEO), emphasizing SEO oriented to publications focused on communication and the coverage of current affairs, including images and videos.
Go beyond the basics of Kubernetes and explore more advanced concepts, including Kubernetes in production, governance, serverless computing, and service meshes Key Features * Master Kubernetes architecture and design to build, deploy, and secure large-scale distributed systems * Learn advanced concepts like autoscaling, multi-cluster management, serverless computing, and service meshes * Explore Kubernetes 1.25 and its rich ecosystem of tools like Kubectl, Krew, K9s, Lens, and Helm Book Description Kubernetes - Basics and Beyond, the 4th edition of the bestseller Mastering Kubernetes, includes the most recent tools and code to enable you to learn the latest features of Kubernetes 1.25. This book contains a thorough exploration of complex concepts and best practices to help you master the skills of designing and deploying large-scale distributed systems on Kubernetes clusters. You'll learn how to run complex stateless and stateful microservices on Kubernetes, including advanced features such as horizontal pod autoscaling, rolling updates, resource quotas, and persistent storage backends. In addition, you'll understand how to utilize serverless computing and service meshes. Further, 2 new chapters have been added. "Governing Kubernetes" covers the problem of policy management, how admission control addresses it, and how policy engines provide a powerful governance solution. "Running Kubernetes in Production" shows you what it takes to run Kubernetes at scale across multiple cloud providers, multiple geographical regions, and multiple clusters, and it also explains how to handle topics such as upgrades, capacity planning, dealing with cloud provider limits/quotas, and cost management. By the end of this Kubernetes book, you'll gain a strong understanding of, and hands-on experience with, a wide range of Kubernetes capabilities. What you will learn * Learn about the challenges of governing Kubernetes and how policy engines provide a powerful governance solution * Learn what it takes to run Kubernetes in production and at scale * Build and run stateful applications and complex microservices on Kubernetes * Master Kubernetes networking with services, Ingress objects, load balancers, and service meshes * Achieve high availability for your Kubernetes clusters * Improve Kubernetes observability with tools like Prometheus, Grafana, and Jaeger * Extend Kubernetes working with Kubernetes API, plugins, and webhooks Who This Book Is For If you're a system administrator or cloud developer who wants to become comfortable with Kubernetes and would like to master its advanced features, then this book is for you. Software and DevOps engineers with a working knowledge of Kubernetes, as well as technical managers of Kubernetes-based systems, will also find this book useful. Those deciding on whether to migrate to Kubernetes and are curious about its inner workings will find plenty of answers here as well. Basic familiarity with networking concepts will prove beneficial.
In recent years, most applications deal with constraint decision-making systems as problems are based on imprecise information and parameters. It is difficult to understand the nature of data based on applications and it requires a specific model for understanding the nature of the system. Further research on constraint decision-making systems in engineering is required. Constraint Decision-Making Systems in Engineering derives and explores several types of constraint decisions in engineering and focuses on new and innovative conclusions based on problems, robust and efficient systems, and linear and non-linear applications. Covering topics such as fault detection, data mining techniques, and knowledge-based management, this premier reference source is an essential resource for engineers, managers, computer scientists, students and educators of higher education, librarians, researchers, and academicians.
In today s digital environment, distributed systems are increasingly present in a wide variety of environments, ranging from public software applications to critical systems. Distributed Systems introduces the underlying concepts, the associated design techniques and the related security issues. Distributed Systems: Design and Algorithms, is dedicated to engineers, students, and anyone familiar with algorithms and programming, who want to know more about distributed systems. These systems are characterized by: several components with one or more threads, possibly running on different processors; asynchronous communications with possible additional assumptions (reliability, order preserving, etc.); local views for every component and no shared data between components. This title presents distributed systems from a point of view dedicated to their design and their main principles: the main algorithms are described and placed in their application context, i.e. consistency management and the way they are used in distributed file-systems.
The best-practices solution guide for rescuing broken software systems Incremental Software Architecture is a solutions manual for companies with underperforming software systems. With complete guidance and plenty of hands-on instruction, this practical guide shows you how to identify and analyze the root cause of software malfunction, then identify and implement the most powerful remedies to save the system. You'll learn how to avoid developing software systems that are destined to fail, and the methods and practices that help you avoid business losses caused by poorly designed software. Designed to answer the most common questions that arise when software systems negatively impact business performance, this guide details architecture and design best practices for enterprise architecture efforts, and helps you foster the reuse and consolidation of software assets. Relying on the wrong software system puts your company at risk of failing. It's a question of when, not if, something goes catastrophically wrong. This guide shows you how to proactively root out and repair the most likely cause of potential issues, and how to rescue a system that has already begun to go bad. * Mitigate risks of software development projects * Increase ROI and accelerate time-to-market * Accurately assess technological achievability and viability * Identify actual software construction value propositions Fierce competition and volatile commerce markets drive companies to invest heavily in the construction of software systems, which strains IT and business budgets and puts immense strain on existing network infrastructure. As technology evolves, these ever-more-complex computing landscapes become more and more expensive and difficult to maintain. Incremental Software Architecture shows you how to revamp the architecture to effectively reduce strain, cost, and the chance of failure.
Solve the complexity of running a business in a multi-cloud environment with practical guidelines backed by industry experience Key Features * Explore the benefits of the major cloud providers to make better informed decisions * Accelerate digital transformation with multi-cloud adoption, including the use of PaaS and SaaS concepts * Get the best out of multi-cloud by exploring relevant use cases for data platforms and IoT Book Description Most enterprises adopt multi-cloud with the intention of accelerating digital transformation, but moving data and applications to public clouds and implementing Platform as a Service (PaaS) and Software as a Service (SaaS) solutions are challenging. One of the biggest challenges is deciding what parts of which services are the most useful to help the company thrive. Through this book, you'll learn how to choose the most apt cloud service and how to manage operations, cost, and security, all while learning how to overcome the complexities associated with multi-cloud adoption via use cases (IoT, data mining, Web3, financial management, and more). This new edition is focused on helping you stay in control of your cloud environments by using the concepts of BaseOps, FinOps, and DevSecOps. You'll learn how to develop, release, and manage products and services in the major public clouds Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP), whilst optimizing costs and maximizing security using the various tools and services that these cloud providers offer. By the end of this book, you will have become familiar with the complexities associated with running a business in a multi-cloud environment and identified ways to solve these complexities in the domains of operations, financial management, and security. What you will learn * Learn how to choose the right cloud platform via various use cases * Understand the concepts associated with multi-cloud, including IaC, SaaS, PaaS, and CaC * Use the techniques and tools offered by Azure, AWS, and GCP to integrate security * Learn about enterprise architecture, value streams, and well-architected frameworks of Azure, AWS, and GCP * Use FinOps to define cost models and create transparency in cloud costs with showback and chargeback * Improve security with the DevSecOps maturity model * Explore the concepts of AIOps and GreenOps Who This Book Is For Cloud architects, solutions architects, enterprise architects, and cloud consultants will find this book valuable. Basic knowledge of any one of the major public clouds (Azure, AWS, or GCP) will be helpful.
How can you take advantage of the HipHop Virtual Machine (HHVM) and the Hack programming language, two new technologies that Facebook developed to run their web servers? With this practical guide, Owen Yamauchi-a member of Facebook's core Hack and HHVM teams-shows you how to get started with these battle-tested open-source tools. You'll explore static typechecking and several other features that separate Hack from its PHP origins, and learn how to set up, configure, deploy, and monitor HHVM. Ideal for developers with basic PHP knowledge or experience with other languages, this book also demonstrates how these tools can be used with existing PHP codebases and new projects alike. Learn how Hack provides static typechecking while retaining PHP's flexible, rapid development capability Write typesafe code with Hack's generics feature Explore HHVM, a just-in-time compilation runtime engine with full PHP compatibility Dive into Hack collections, asynchronous functions, and the XHP extension for PHP Understand Hack's design rationale, including why it omits some PHP features Use Hack for multitasking, and for generating HTML securely Learn tools for working with Hack code, including PHP-to-Hack migration
This book contains the papers presented at the Parallel
Computational Fluid Dynamics 1998 Conference.
"CUDA Fortran for Scientists and Engineers" shows how high-performance application developers can leverage the power of GPUs using Fortran, the familiar language of scientific computing and supercomputer performance benchmarking. The authors presume no prior parallel computing experience, and cover the basics along with best practices for efficient GPU computing using CUDA Fortran. To help you add CUDA Fortran to existing Fortran codes, the book
explains how to understand the target GPU architecture, identify
computationally intensive parts of the code, and modify the code to
manage the data and parallelism and optimize performance. All of
this is done in Fortran, without having to rewrite in another
language. Each concept is illustrated with actual examples so you
can immediately evaluate the performance of your code in
comparison.
Computer Architecture: A Quantitative Approach, Sixth Edition has been considered essential reading by instructors, students and practitioners of computer design for over 20 years. The sixth edition of this classic textbook from Hennessy and Patterson, winners of the 2017 ACM A.M. Turing Award recognizing contributions of lasting and major technical importance to the computing field, is fully revised with the latest developments in processor and system architecture. The text now features examples from the RISC-V (RISC Five) instruction set architecture, a modern RISC instruction set developed and designed to be a free and openly adoptable standard. It also includes a new chapter on domain-specific architectures and an updated chapter on warehouse-scale computing that features the first public information on Google's newest WSC. True to its original mission of demystifying computer architecture, this edition continues the longstanding tradition of focusing on areas where the most exciting computing innovation is happening, while always keeping an emphasis on good engineering design.
|
You may like...
Artificial Intelligence for Capital…
Syed Hasan Jafar, Hemachandran K, …
Hardcover
R2,997
Discovery Miles 29 970
The Adventurous and Practical Journey to…
FANAP Studies & Research Center
Hardcover
R3,029
Discovery Miles 30 290
Artificial Intelligence Perspective for…
Sezer Bozkus Kahyaoglu, Vahap Tecim
Hardcover
R3,049
Discovery Miles 30 490
|