|
|
Books > Computing & IT > Computer hardware & operating systems > General
Get to grips with building reliable, scalable, and maintainable
database solutions for enterprises and production databases Key
Features Implement PostgreSQL 13 features to perform end-to-end
modern database management Design, manage, and build enterprise
database solutions using a unique recipe-based approach Solve
common and not-so-common challenges faced while working to achieve
optimal database performance Book DescriptionPostgreSQL has become
the most advanced open source database on the market. This book
follows a step-by-step approach, guiding you effectively in
deploying PostgreSQL in production environments. The book starts
with an introduction to PostgreSQL and its architecture. You'll
cover common and not-so-common challenges faced while designing and
managing the database. Next, the book focuses on backup and
recovery strategies to ensure your database is steady and achieves
optimal performance. Throughout the book, you'll address key
challenges such as maintaining reliability, data integrity, a
fault-tolerant environment, a robust feature set, extensibility,
consistency, and authentication. Moving ahead, you'll learn how to
manage a PostgreSQL cluster and explore replication features for
high availability. Later chapters will assist you in building a
secure PostgreSQL server, along with covering recipes for
encrypting data in motion and data at rest. Finally, you'll not
only discover how to tune your database for optimal performance but
also understand ways to monitor and manage maintenance activities,
before learning how to perform PostgreSQL upgrades during downtime.
By the end of this book, you'll be well-versed with the essential
PostgreSQL 13 features to build enterprise relational databases.
What you will learn Understand logical and physical backups in
Postgres Demonstrate the different types of replication methods
possible with PostgreSQL today Set up a high availability cluster
that provides seamless automatic failover for applications Secure a
PostgreSQL encryption through authentication, authorization, and
auditing Analyze the live and historic activity of a PostgreSQL
server Understand how to monitor critical services in Postgres 13
Manage maintenance activities and performance tuning of a
PostgreSQL cluster Who this book is forThis PostgreSQL book is for
database architects, database developers and administrators, or
anyone who wants to become well-versed with PostgreSQL 13 features
to plan, manage, and design efficient database solutions. Prior
experience with the PostgreSQL database and SQL language is
expected.
Design a high-speed SoC while gaining a holistic view of the FPGA
design flow and overcoming its challenges. Purchase of the print or
kindle book includes a free eBook in the PDF format. Key Features
Use development tools to implement and verify an SoC, including ARM
CPUs and the FPGA logic Overcome the challenge of time to market by
using FPGA SoCs and avoid the prohibitive ASIC NRE cost Understand
the integration of custom logic accelerators and the SoC software
and build them Book DescriptionModern and complex SoCs can adapt to
many demanding system requirements by combining the processing
power of ARM processors and the feature-rich Xilinx FPGAs. You'll
need to understand many protocols, use a variety of internal and
external interfaces, pinpoint the bottlenecks, and define the
architecture of an SoC in an FPGA to produce a superior solution in
a timely and cost-efficient manner. This book adopts a practical
approach to helping you master both the hardware and software
design flows, understand key interconnects and interfaces, analyze
the system performance and enhance it using the acceleration
techniques, and finally build an RTOS-based software application
for an advanced SoC design. You'll start with an introduction to
the FPGA SoCs technology fundamentals and their associated
development design tools. Gradually, the book will guide you
through building the SoC hardware and software, starting from the
architecture definition to testing on a demo board or a virtual
platform. The level of complexity evolves as the book progresses
and covers advanced applications such as communications, security,
and coherent hardware acceleration. By the end of this book, you'll
have learned the concepts underlying FPGA SoCs' advanced features
and you'll have constructed a high-speed SoC targeting a high-end
FPGA from the ground up. What you will learn Understand SoC FPGAs'
main features, advanced buses and interface protocols Develop and
verify an SoC hardware platform targeting an FPGA-based SoC Explore
and use the main tools for building the SoC hardware and software
Build advanced SoCs using hardware acceleration with custom IPs
Implement an OS-based software application targeting an FPGA-based
SoC Understand the hardware and software integration techniques for
SoC FPGAs Use tools to co-debug the SoC software and hardware Gain
insights into communication and DSP principles in FPGA-based SoCs
Who this book is forThis book is for FPGA and ASIC hardware and
firmware developers, IoT engineers, SoC architects, and anyone
interested in understanding the process of developing a complex
SoC, including all aspects of the hardware design and the
associated firmware design. Prior knowledge of digital electronics,
and some experience of coding in VHDL or Verilog and C or a similar
language suitable for embedded systems will be required for using
this book. A general understanding of FPGA and CPU architecture
will also be helpful but not mandatory.
Get familiar with all the concepts related to Raspberry Pi and
MQTT, build innovative IoT projects, and discover how to scale
these projects to the next level Key Features Learn some of the
most popular tools used in IoT - Raspberry Pi, MQTT, ESP8266 and
more Build exciting projects such as an IoT weather station and a
smart switch board Discover the advantages of taking your MQTT
broker global Book DescriptionThe future of IoT has the potential
to be limitless. Wouldn't it be great if you could add it to your
own technological stacks? But where to start? With the basics, of
course. In this book, you will start by learning about the most
popular hardware and communication protocol, Raspberry Pi and MQTT.
You will see how to use them together by setting up your own MQTT
server on Raspberry Pi and understand how it works. This book
explores MQTT in detail, including the clients and devices that you
can connect to your server. You will discover two very popular IoT
development boards among project developers: the ESP8266 and ESP32
development boards. Then, you will learn how to build interactive
dashboards on your Pi and monitor your client devices. The book
also shows you how to build a dashboard using another popular
software - Node-RED. You will be able to put your skills to the
test by creating two full-scale projects. That's not all: you will
also learn how to host your own MQTT server on a virtual cloud
service. Finally, you will be guided on how to move forward from
here, what technologies to learn, and some project recommendations
to polish or test your knowledge. By the end of this book, you will
be able to build meaningful projects using Raspberry Pi and MQTT
and create dashboards for your projects on Node-RED. What you will
learn Configure and use a Raspberry Pi for IoT projects Implement
the MQTT communication protocol for projects Understand how to set
up the NodeMCU and ESP32 boards as MQTT clients Control a NodeMCU
board through a Node-RED dashboard hosted on Raspberry Pi Get LAMP
server, Home Assistant, and MariaDB on the Raspberry Pi Set up an
online MQTT broker on a cloud service or enterprise service
provider platform Build full-scale, end-to-end prototype projects
Who this book is forThis book is for students who are interested in
IoT and want to build projects using the available developer
hardware. Educators who want to introduce a course on IoT into
their curriculum, technology enthusiasts, and IoT developers who
are just getting started will also benefit from this book. No prior
knowledge about the two main topics that the book covers is
required - Raspberry Pi and MQTT. A basic understanding of what IoT
is will also be useful but not mandatory.
Learn to design and develop safe and reliable software for embedded
systems. Explore the internals of device drivers, RTOS, and TEE.
Key Features * Identify and overcome challenges in embedded
environments * Understand the steps required to increase the
security of IoT solutions * Build safety-critical and memory-safe
parallel and distributed embedded systems Book Description Embedded
systems are self-contained units that have a dedicated purpose
within a device. We come across a variety of applications of
embedded systems in navigation tools, telecom applications, and
networking equipment, to name just a few. Embedded Systems
Architecture begins with a bird's eye view of embedded development
and how it differs from the other systems that you may be familiar
with. You'll first be guided to set up a development environment
and then move on to the core system architectural concepts,
exploring pragmatic designs, boot-up mechanisms, and memory
management. Next, you'll look at the programming interface and
device drivers to establish communication via TCP/IP and take
measures to increase the security of IoT solutions. Lastly, you'll
be introduced to parallel multithreaded applications through the
development of a scheduler. By the end of the book, you will have
explored various aspects of embedded architecture such as memory
management, focusing on a memory-safe approach, multithreading, and
the RTOS approach. What you will learn * Participate in the design
and definition phase of an embedded product * Get to grips with
writing code for ARM Cortex-M microcontrollers * Build an embedded
development lab and optimize the workflow * Write memory-safe code
* Understand the architecture behind the communication interfaces *
Understand the design and development patterns for connected and
distributed devices in the IoT * Master multitask parallel
execution patterns and real-time operating systems * Learn about
Trusted Execution Environment Who This Book Is For If you're a
software developer or designer wanting to learn about embedded
programming, this is the book for you. You'll also find this book
useful if you're a less experienced or a beginner embedded
programmer willing to expand your knowledge on embedded systems.
This book is about the company culture that helped drive Arm
Limited's spectacular growth to become the world's leading
semiconductor Intellectual Property (IP) company. Its extremely
power-efficient processor technology has been licensed to hundreds
of semiconductor chip manufacturers and Original Equipment
Manufacturers (OEMs). Arm is still largely unknown to the broader
public, yet Arm's technology is nearly ubiquitous and has been a
foundational building block of the global rise of the smartphone.
Arm-based microprocessors power over 95% of the world's mobile
phones. However, this book is not about technology. It's about how
a company grew from being a small start-up in Cambridge, UK with 12
people and a GBP1.75m cash investment to a global organization with
over 5,000 employees in over 50 countries and more than $1.5bn
revenue in 2016 when SoftBank acquired it for $32bn. Arm Limited
was founded as Advanced RISC Machines in November 1990, a joint
venture between a British computer manufacturer, Acorn Computers
Limited and its much larger US competitor, Apple Computers Inc. The
purpose of the new venture was to develop and proliferate the
uniquely power-efficient and high-performance RISC-based
microprocessor technology that had been developed several years
earlier by Acorn. Using first-hand interviews with founders and the
author's knowledge, this book charts some of the key people
involved in the birth of the technology and the company Advanced
RISC Machines. It considers how their behaviors and decisions led
to the creation of the licensing business model and the strategy
that underpinned Arm's later success. This book reveals some of the
layers that help explain how the combination of culture, strategy
and execution built the world's leading semiconductor IP company.
It provides insight into ten essential ingredients of Arm's
success, including the company's unique proposition, how the early
business model and strategy were formed, the creation and evolution
of the winning culture, the ecosystem of shared success and how Arm
stayed unified throughout a period of extraordinary growth. The
purpose of the book is to help readers create a culture of
inclusiveness, collaboration and innovation within their own
organizations. The book provides examples from Arm's history which
should provide inspiration and guidance for making the necessary
changes to enable a winning culture. Additional details of interest
to history lovers include the stories behind the BBC Microcomputer
prototype, the Acorn RISC Machine microprocessor development,
Advanced RISC Machines' creation, the partnership-focused licensing
business model's development, the nearly lost design-win at Nokia
for their new GSM mobile, the 20+ billion selling Cortex (R)-M
product that almost didn't happen and the battle for smartphones
and tablets with Intel. www.culturewon.com
Get to grips with key IoT aspects along with modern trends,
architectures, and technologies that support IoT solutions, such as
cloud computing, modern app architecture paradigms, and data
analytics Key Features Understand the big picture of designing
production-grade IoT solutions from an industry expert Get up and
running with the development and designing aspects of the Internet
of Things Solve business problems specific to your domain using
different IoT platforms and technologies Book DescriptionWith the
rising demand for and recent enhancements in IoT, a developer with
sound knowledge of IoT is the need of the hour. This book will help
you design, build, and operate large-scale E2E IoT solutions to
transform your business and products, increase revenue, and reduce
operational costs. Starting with an overview of how IoT
technologies can help you solve your business problems, this book
will be a useful guide to helping you implement end-to-end IoT
solution architecture. You'll learn to select IoT devices;
real-time operating systems; IoT Edge covering Edge location,
software, and hardware; and the best IoT connectivity for your IoT
solution. As you progress, you'll work with IoT device management,
IoT data analytics, IoT platforms, and put these components to work
as part of your IoT solution. You'll also be able to build IoT
backend cloud from scratch by leveraging the modern app
architecture paradigms and cloud-native technologies such as
containers and microservices. Finally, you'll discover best
practices for different operational excellence pillars, including
high availability, resiliency, reliability, security, cost
optimization, and high performance, which should be applied for
large-scale production-grade IoT solutions. By the end of this IoT
book, you'll be confident in designing, building, and operating IoT
solutions. What you will learn Understand the detailed anatomy of
IoT solutions and explore their building blocks Explore IoT
connectivity options and protocols used in designing IoT solutions
Understand the value of IoT platforms in building IoT solutions
Explore real-time operating systems used in microcontrollers
Automate device administration tasks with IoT device management
Master different architecture paradigms and decisions in IoT
solutions Build and gain insights from IoT analytics solutions Get
an overview of IoT solution operational excellence pillars Who this
book is forThis book is for E2E solution architects, systems and
technical architects, and IoT developers looking to design, build,
and operate E2E IoT applications and solutions. Basic knowledge of
cloud computing, software engineering, and distributed system
design will help you get the most out of this book.
Mit der programmgesteuerten Rechenanlage (Ziffern-Rechenautomat)
ist vor etwa zwanzig Jahren ein Maschinentyp auf den Plan getreten,
der Leistungen zu voll bringen imstande ist, die bis dahin der
menschlichen Geistestatigkeit vorbehalten waren. Zu der
Kraft-Maschine, welche menschliche Muskelkraft ersetzt, kam die
Informations-Maschine *) hinzu, welche logisch erfaBbare
Tatigkeiten der mensch lichen Ratio ausfiihren und somit den
Menschen auf einer hoheren, der geistigen, Ebene entlasten kann. 1m
Zuge der Entwicklung hat sich die programmgesteuerte Rechenanlage,
der Prototyp der InformationsmaschiI'l'2, ein viel groBeres
Anwendungsfeld erschlossen, als es durch die Interessen der
Mathematiker gekennzeichnet ist. Andere Maschinentypen sind
hinzugekommen, auf welche die Bezeichnung Rechen Automat nurmehr
bedingt paBt, die aber andererseits Anspruch haben, ebenbiirtig an
deren Seite gestellt zu werden. Dabei denkt man zum Beispiel an die
tech nischen Modelle zur Beschreibung von Lernvorgangen, an
Spezialzweckanlagen zur Datenverarbeitung, Spracheniibersetzung,
logischen Beweisfiihrung, zur Aus fiihrung von Strategiespielen
usw. In Anbetracht der Vielfalt der Interessen er scheint es nicht
unbillig zu fragen, wo, an welcher Stelle im Gebaude der Natur und
technischen Wissenschaften wir uns iiberhaupt befinden, ob eine
einfache Interpretation des Sachverhalts iiberhaupt moglich ist,
die uns ein Zurechtfinden erlaubt."
The Igth century was distinguished by the construction of machines
with enormous power. During the last decade rapid progress has been
made in the development of a completely different type of machine.
These new machines, the electronic computers, are not built to
generate power or to do mechanical work, but to perform logical
operations and ca1culations. This new concept will have a profound
influence on engineering, science, ami economy. In fact, the first
effects of this development are already taking shape today. It is
the purpose 01 this book to give a survey of the basic principles
and applications of computers for the benefit of those who hitherto
did not work with them, but who might have use for them in the
future. The rapid progress of the engineering science has,
naturally, led to a situation in which the practicing scientist and
engineer cannot keep abreast of the progress in neighboring fields.
The chapters of this book were prepared by distinguished experts in
the field of computers for the non-expert who does not intend to
become an expert, but W}: l0 wants Jo acquire a general
understanding of the problems and solutions which he needs to
effectively perform the work in his proper field. We address this
book to the engineers and scientists who want to know the
performance of computers, as weH as to the managers who are rnainly
concerned with their econornic aspect.
Leverage the latest parallel and concurrency features in .NET 6
when building your next application and explore the benefits and
challenges of asynchrony, parallelism, and concurrency in .NET via
practical examples Key Features Learn to implement parallel
programming and handle concurrency in .NET efficiently Switch
threads while debugging and learn how to monitor specific threads
in Visual Studio Discover how to cancel tasks with callbacks, by
polling, or by using a task with wait handles Book Description.NET
has included managed threading capabilities since the beginning,
but early techniques had inherent risks: memory leaks, thread
synchronization issues, and deadlocks. This book will help you
avoid those pitfalls and leverage the modern constructs available
in .NET 6 and C# 10, while providing recommendations on patterns
and best practices for parallelism and concurrency. Parallel,
concurrent, and asynchronous programming are part of every .NET
application today, and it becomes imperative for modern developers
to understand how to effectively use these techniques. This book
will teach intermediate-level .NET developers how to make their
applications faster and more responsive with parallel programming
and concurrency in .NET and C# with practical examples. The book
starts with the essentials of multi-threaded .NET development and
explores how the language and framework constructs have evolved
along with .NET. You will later get to grips with the different
options available today in .NET 6, followed by insights into best
practices, debugging, and unit testing. By the end of this book,
you will have a deep understanding of why, when, and how to employ
parallelism and concurrency in any .NET application. What you will
learn Prevent deadlocks and race conditions with managed threading
Update Windows app UIs without causing exceptions Explore best
practices for introducing asynchronous constructs to existing code
Avoid pitfalls when introducing parallelism to your code Implement
the producer-consumer pattern with Dataflow blocks Enforce data
sorting when processing data in parallel and safely merge data from
multiple sources Use concurrent collections that help synchronize
data across threads Debug an everyday parallel app with the
Parallel Stacks and Parallel Tasks windows Who this book is forThis
book is for beginner to intermediate-level .NET developers who want
to employ the latest parallel and concurrency features in .NET when
building their applications. Readers should have a solid
understanding of the C# language and any version of the .NET
Framework or .NET Core.
Protect your cloud, virtual, and on-premises environments by
implementing Veeam's powerful backup and replication technology Key
Features Gain in-depth knowledge of CDP and hardened repositories
that you can use in your virtual environment Explore Veeam's
monitoring and reporting utility - Veeam ONE - along with Linux
proxy enhancements Work with the new Veeam Disaster Recovery
Orchestrator (Orchestrator) for testing failovers and backups Book
DescriptionVeeam is one of the leading modern data protection
solutions, making it a necessary skill for anyone responsible for
securing virtual environments. This revised second edition of
Mastering Veeam Backup & Replication is updated to cover Veeam
version 11. The book guides you through implementing modern data
protection solutions for your cloud and virtual infrastructure with
Veeam, all while helping you master advanced concepts such as
Continuous Data Protection (CDP), extended object storage support,
Veeam ONE enhancements, and Orchestrator. Starting with Veeam
essentials, including installation, best practices, and
optimizations for Veeam Backup & Replication, you'll get to
grips with the 3-2-1-1-0 rule to safeguard data. You'll understand
how to set up a backup server, proxies, repositories, and more and
then advance to cover a powerful feature of Veeam 11 - CDP. As you
progress, you'll learn about immutability (also known as hardened
repositories) and discover the best practices for creating them.
Finally, you'll explore the new proxy option available in Linux and
become well-versed with advanced topics such as extended object
storage support, Veeam ONE enhancements, and Orchestrator. By the
end of this Veeam book, you'll be able to implement Veeam Backup
& Replication for securing your environment and enabling
disaster recovery. What you will learn Discover the advanced
concepts of Veeam Backup & Replication 11 Master application
optimization based on Veeam best practices Get to grips with
configuring CDP and working with repositories and proxies Explore
ways to protect your backups with immutable hardened repositories
Understand the enhancements to backups, instant recovery, and Linux
proxies Explore Veeam ONE enhancements Become well-versed in using
Veeam Disaster Recovery Orchestrator Who this book is forThis Veeam
backup book is for IT professionals who have intermediate to
advanced-level knowledge of virtualization as well as backups and
backup applications. Anyone who needs a reference guide for
learning the advanced features of Veeam Backup & Replication
and how they are used, including best practices and optimizations,
will also find this book useful.
|
|