![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Systems management
Going where no book on software measurement and metrics has previously gone, this critique thoroughly examines a number of bad measurement practices, hazardous metrics, and huge gaps and omissions in the software literature that neglect important topics in measurement. The book covers the major gaps and omissions that need to be filled if data about software development is to be useful for comparisons or estimating future projects. Among the more serious gaps are leaks in reporting about software development efforts that, if not corrected, can distort data and make benchmarks almost useless and possibly even harmful. One of the most common leaks is that of unpaid overtime. Software is a very labor-intensive occupation, and many practitioners work very long hours. However, few companies actually record unpaid overtime. This means that software effort is underreported by around 15%, which is too large a value to ignore. Other sources of leaks include the work of part-time specialists who come and go as needed. There are dozens of these specialists, and their combined effort can top 45% of total software effort on large projects. The book helps software project managers and developers uncover errors in measurements so they can develop meaningful benchmarks to estimate software development efforts. It examines variations in a number of areas that include: Programming languages Development methodology Software reuse Functional and nonfunctional requirements Industry type Team size and experience Filled with tables and charts, this book is a starting point for making measurements that reflect current software development practices and realities to arrive at meaningful benchmarks to guide successful software projects.
John Glaser has been an astute observer and recognized leader in the health care industry for over thirty years. He has written a regular column for Hospitals & Health Networks in which he comments on a wide range of topics, including improving organizational performance through health information technology (HIT), changes in HIT architecture, challenges in leveraging data, and the evolution of the role of IT leadership. Glaser on Health Care IT: Perspectives from the Decade that Defined Health Care Information Technology is a collection of some of the most widely read articles that have been published in H&HN Daily, H&HN Weekly, and Most Wired Online in the past decade (2005-2015). The columns are dated to show their original publication dates, and the material is organized into four broad themes: HIT Applications and Analytics Challenges Improving Organizational Performance through HIT IT Management Challenges HIT Industry Observations Each section offers readers an intimate look at the myriad issues associated with getting IT "right" and the organizational performance gains that can be achieved in doing so. Moreover, the book examines the power and potential of the technologies available to health care providers today, as well as the transformative nature of those we have yet to fully embrace. From seasoned CIOs and consultants to software developers and nurses, this book provides invaluable insights and guidance to all those seeking to make the delivery of care safer, more effective, and more efficient through the application of health care IT. Foreword by Russ Branzell, President and CEO, College of Healthcare Information Management Executives (CHIME) Co-published with Health Forum, Inc.
Durch die Weiterentwicklung der kommunikationstechnischen Infrastruktur ergeben sich neue Freiraume bei der Distribuierung von Informations- und Kommunikationssystemen (IKS). Das Buch stellt ein computergestutztes Entscheidungsmodell zur Bestimmung des optimalen Distribuierungsgrades von IKS vor und dokumentiert die Entwicklung eines Prototyps. Die Diskussion der Rahmenbedingungen baut auf einem kybernetischen Unternehmensmodell auf, das es ermoeglicht, die Lebensfahigkeit eines Systems in seiner Umwelt zu untersuchen. Die geforderte Eigenschaft der Rekursivitat des Modells fuhrt zu dem Schluss, dass auch das IKS in einem Unternehmen hinsichtlich seiner Lebensfahigkeit beschrieben werden kann. In der Folge wird die Organisation unter einem strukturellen Aspekt untersucht. Dabei wird die Dimension der Distribuierung und das Distribuierungskontinuum beschrieben. Der Prozess der strategischen Unternehmensplanung, die Ableitung von Informatikprojekten (Projektportfolio) und Informatikzielen und die darin begrundeten Einflusse auf eine Distribuierungsentscheidung bilden den Gegenstand weiterer Untersuchungen. Als dritte Rahmenbedingung wird dann die Bedeutung der Entwicklung von Normen und Standards diskutiert. Dabei steht weniger der technische Aspekt im Vordergrund. Vielmehr werden die Anforderungen untersucht, denen ein IKS genugen muss, wenn der Distributionsgrad nicht von den technischen Moeglichkeiten sondern von anderen Faktoren bestimmt wird. Der zweite Teil der Arbeit beinhaltet eine Beschreibung der logischen Struktur des Prototyps, der Entwicklungsumgebung, der zugrundeliegenden Datenstruktur und der Benutzerschnittstelle anhand einer Beispiel-Konsultation.
Analytics in Healthcare: An Introduction provides a clear, straightforward roadmap to achieving your goals within the domain of healthcare analytics. Whether you are a student looking for a career path or a staff member within a healthcare organization needing to apply the value that your institution's data can provide, this manual will give you direction. Building on chapters that describe the evolution of healthcare analytics, others then address current and upcoming challenges including productive data mining from electronic health records, data governance, and the DELTA analytics maturity model. An appendix with learning modules for healthcare providers on secondary use of data as well as a comprehensive glossary are unique features of the book. The authors' varied experiences and perspectives demonstrate the range of opportunities where healthcare analytics can be applied to make a difference in the current healthcare climate. As a quick and manageable read, this to-the-point resource serves as an invaluable tool to building your analytics program.
Advanced Fiber Access Networks takes a holistic view of broadband access networks-from architecture to network technologies and network economies. The book reviews pain points and challenges that broadband service providers face (such as network construction, fiber cable efficiency, transmission challenges, network scalability, etc.) and how these challenges are tackled by new fiber access transmission technologies, protocols and architecture innovations. Chapters cover fiber-to-the-home (FTTH) applications as well as fiber backhauls in other access networks such as 5G wireless and hybrid-fiber-coax (HFC) networks. In addition, it covers the network economy, challenges in fiber network construction and deployment, and more. Finally, the book examines scaling issues and bottlenecks in an end-to-end broadband network, from Internet backbones to inside customer homes, something rarely covered in books.
Dimensions of Uncertainty in Communication Engineering is a comprehensive and self-contained introduction to the problems of nonaleatory uncertainty and the mathematical tools needed to solve them. The book gathers together tools derived from statistics, information theory, moment theory, interval analysis and probability boxes, dependence bounds, nonadditive measures, and Dempster-Shafer theory. While the book is mainly devoted to communication engineering, the techniques described are also of interest to other application areas, and commonalities to these are often alluded to through a number of references to books and research papers. This is an ideal supplementary book for courses in wireless communications, providing techniques for addressing epistemic uncertainty, as well as an important resource for researchers and industry engineers. Students and researchers in other fields such as statistics, financial mathematics, and transport theory will gain an overview and understanding on these methods relevant to their field.
Quantum Communication, Quantum Networks, and Quantum Sensing represents a self-contained introduction to quantum communication, quantum error-correction, quantum networks, and quantum sensing. It starts with basic concepts from classical detection theory, information theory, and channel coding fundamentals before continuing with basic principles of quantum mechanics including state vectors, operators, density operators, measurements, and dynamics of a quantum system. It continues with fundamental principles of quantum information processing, basic quantum gates, no-cloning and theorem on indistinguishability of arbitrary quantum states. The book then focuses on quantum information theory, quantum detection and Gaussian quantum information theories, and quantum key distribution (QKD). The book then covers quantum error correction codes (QECCs) before introducing quantum networks. The book concludes with quantum sensing and quantum radars, quantum machine learning and fault-tolerant quantum error correction concepts.
Enterprise Information Systems (EIS) integrate and support business
processes across functional boundaries in a supply chain
environment, and have become increasingly popular over the last 15
years. In recent years, more and more enterprises world-wide have
adopted EIS such as Enterprise Resource Planning (ERP) for running
their businesses. Previously, information systems such as CAD, CAM,
MRPII and CRM were widely used for partial functional integration
within a business organization. With global operation, global
supply chain, and fierce competition in place, there is a need for
suitable EIS such as ERP, E-Business or E-Commerce systems to
integrate extended enterprises in a supply chain environment with
the objective of achieving efficiency, competency, and
competitiveness. As a result, there is a growing demand for
researching EIS to provide insights into challenges, issues, and
solutions related to the design, implementation and management of
EIS.
Inclusive Radio Communication Networks for 5G and Beyond is based on the COST IRACON project that consists of 500 researchers from academia and industry, with 120 institutions from Europe, US and the Far East involved. The book presents state-of-the-art design and analysis methods for 5G (and beyond) radio communication networks, along with key challenges and issues related to the development of 5G networks. This book is Open Access and was funded by: CNIT - Consorzio Nazionale Interuniversitario per le Telecomunicazioni European Association for Communications and Networking (EURACON), AISBL
A comprehensive guide to understanding network architecture, communication protocols, and network analysis to build secure applications compatible with the latest versions of C# 8 and .NET Core 3.0 Key Features Explore various network architectures that make distributed programming possible Learn how to make reliable software by writing secure interactions between clients and servers Use .NET Core for network device automation, DevOps, and software-defined networking Book DescriptionThe C# language and the .NET Core application framework provide the tools and patterns required to make the discipline of network programming as intuitive and enjoyable as any other aspect of C# programming. With the help of this book, you will discover how the C# language and the .NET Core framework make this possible. The book begins by introducing the core concepts of network programming, and what distinguishes this field of programming from other disciplines. After this, you will gain insights into concepts such as transport protocols, sockets and ports, and remote data streams, which will provide you with a holistic understanding of how network software fits into larger distributed systems. The book will also explore the intricacies of how network software is implemented in a more explicit context, by covering sockets, connection strategies such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), asynchronous processing, and threads. You will then be able to work through code examples for TCP servers, web APIs served over HTTP, and a Secure Shell (SSH) client. By the end of this book, you will have a good understanding of the Open Systems Interconnection (OSI) network stack, the various communication protocols for that stack, and the skills that are essential to implement those protocols using the C# programming language and the .NET Core framework. What you will learn Understand the breadth of C#'s network programming utility classes Utilize network-layer architecture and organizational strategies Implement various communication and transport protocols within C# Discover hands-on examples of distributed application development Gain hands-on experience with asynchronous socket programming and streams Learn how C# and the .NET Core runtime interact with a hosting network Understand a full suite of network programming tools and features Who this book is forIf you're a .NET developer or a system administrator with .NET experience and are looking to get started with network programming, then this book is for you. Basic knowledge of C# and .NET is assumed, in addition to a basic understanding of common web protocols and some high-level distributed system designs.
Computing in Communication Networks: From Theory to Practice provides comprehensive details and practical implementation tactics on the novel concepts and enabling technologies at the core of the paradigm shift from store and forward (dumb) to compute and forward (intelligent) in future communication networks and systems. The book explains how to create virtualized large scale testbeds using well-established open source software, such as Mininet and Docker. It shows how and where to place disruptive techniques, such as machine learning, compressed sensing, or network coding in a newly built testbed. In addition, it presents a comprehensive overview of current standardization activities. Specific chapters explore upcoming communication networks that support verticals in transportation, industry, construction, agriculture, health care and energy grids, underlying concepts, such as network slicing and mobile edge cloud, enabling technologies, such as SDN/NFV/ ICN, disruptive innovations, such as network coding, compressed sensing and machine learning, how to build a virtualized network infrastructure testbed on one's own computer, and more.
Enhance your skills in expert module development, deployment, security, DevOps, and cloud Key Features A step-by-step guide to get you started with PowerShell Core 6.0 Harness the capabilities of PowerShell Core 6.0 to perform simple to complex administration tasks Learn core administrative concepts such as scripting, pipelines, and DSC Book DescriptionBeginning with an overview of the different versions of PowerShell, Learn PowerShell Core 6.0 introduces you to VSCode and then dives into helping you understand the basic techniques in PowerShell scripting. You will cover advanced coding techniques, learn how to write reusable code as well as store and load data with PowerShell. This book will help you understand PowerShell security and Just Enough Administration, enabling you to create your own PowerShell repository. The last set of chapters will guide you in setting up, configuring, and working with Release Pipelines in VSCode and VSTS, and help you understand PowerShell DSC. In addition to this, you will learn how to use PowerShell with Windows, Azure, Microsoft Online Services, SCCM, and SQL Server. The final chapter will provide you with some use cases and pro tips. By the end of this book, you will be able to create professional reusable code using security insight and knowledge of working with PowerShell Core 6.0 and its most important capabilities. What you will learn Get to grips with Powershell Core 6.0 Explore basic and advanced PowerShell scripting techniques Get to grips with Windows PowerShell Security Work with centralization and DevOps with PowerShell Implement PowerShell in your organization through real-life examples Learn to create GUIs and use DSC in production Who this book is forIf you are a Windows administrator or a DevOps user who wants to leverage PowerShell to automate simple to complex tasks, then this book is for you. Whether you know nothing about PowerShell or just enough to get by, this guide will give you what you need to go to take your scripting to the next level. You'll also find this book useful if you're a PowerShell expert looking to expand your knowledge in areas such as PowerShell Security and DevOps.
Learn how to hack systems like black hat hackers and secure them like security experts Key Features Understand how computer systems work and their vulnerabilities Exploit weaknesses and hack into machines to test their security Learn how to secure systems from hackers Book DescriptionThis book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. You will explore network hacking, where you will see how to test the security of wired and wireless networks. You'll also learn how to crack the password for any Wi-Fi network (whether it uses WEP, WPA, or WPA2) and spy on the connected devices. Moving on, you will discover how to gain access to remote computer systems using client-side and server-side attacks. You will also get the hang of post-exploitation techniques, including remotely controlling and interacting with the systems that you compromised. Towards the end of the book, you will be able to pick up web application hacking techniques. You'll see how to discover, exploit, and prevent a number of website vulnerabilities, such as XSS and SQL injections. The attacks covered are practical techniques that work against real systems and are purely for educational purposes. At the end of each section, you will learn how to detect, prevent, and secure systems from these attacks. What you will learn Understand ethical hacking and the different fields and types of hackers Set up a penetration testing lab to practice safe and legal hacking Explore Linux basics, commands, and how to interact with the terminal Access password-protected networks and spy on connected clients Use server and client-side attacks to hack and control remote computers Control a hacked system remotely and use it to hack other systems Discover, exploit, and prevent a number of web application vulnerabilities such as XSS and SQL injections Who this book is forLearning Ethical Hacking from Scratch is for anyone interested in learning how to hack and test the security of systems like professional hackers and security experts.
Leverage the full potential of IoT with the combination of Raspberry Pi 3 and Python and architect a complete IoT system that is the best fit for your organization Key Features Build complex Python-based applications with IoT Explore different concepts, technologies, and tradeoffs in the IoT architectural stack Delve deep into each element of the IoT design-from sensors to the cloud Book DescriptionThe Internet of Things (IoT) is the fastest growing technology market. Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. We'll begin our journey with an introduction to Raspberry Pi and quickly jump right into Python programming. We'll learn all concepts through multiple projects, and then reinforce our learnings by creating an IoT robot car. We'll examine modern sensor systems and focus on what their power and functionality can bring to our system. We'll also gain insight into cloud and fog architectures, including the OpenFog standards. The Learning Path will conclude by discussing three forms of prevalent attacks and ways to improve the security of our IoT infrastructure. By the end of this Learning Path, we will have traversed the entire spectrum of technologies needed to build a successful IoT system, and will have the confidence to build, secure, and monitor our IoT infrastructure. This Learning Path includes content from the following Packt products: Internet of Things Programming Projects by Colin Dow Internet of Things for Architects by Perry Lea What you will learn Build a home security dashboard using an infrared motion detector Receive data and display it with an actuator connected to the Raspberry Pi Build an IoT robot car that is controlled via the Internet Use IP-based communication to easily and quickly scale your system Explore cloud protocols, such as Message Queue Telemetry Transport (MQTT) and CoAP Secure communication with encryption forms, such as symmetric key Who this book is forThis Learning Path is designed for developers, architects, and system designers who are interested in building exciting projects with Python by understanding the IoT ecosphere, various technologies, and tradeoffs. Technologists and technology managers who want to develop a broad view of IoT architecture, will also find this Learning Path useful. Prior programming knowledge of Python is a must.
In view of the growing presence and popularity of multicore and manycore processors, accelerators, and coprocessors, as well as clusters using such computing devices, the development of efficient parallel applications has become a key challenge to be able to exploit the performance of such systems. This book covers the scope of parallel programming for modern high performance computing systems. It first discusses selected and popular state-of-the-art computing devices and systems available today, These include multicore CPUs, manycore (co)processors, such as Intel Xeon Phi, accelerators, such as GPUs, and clusters, as well as programming models supported on these platforms. It next introduces parallelization through important programming paradigms, such as master-slave, geometric Single Program Multiple Data (SPMD) and divide-and-conquer. The practical and useful elements of the most popular and important APIs for programming parallel HPC systems are discussed, including MPI, OpenMP, Pthreads, CUDA, OpenCL, and OpenACC. It also demonstrates, through selected code listings, how selected APIs can be used to implement important programming paradigms. Furthermore, it shows how the codes can be compiled and executed in a Linux environment. The book also presents hybrid codes that integrate selected APIs for potentially multi-level parallelization and utilization of heterogeneous resources, and it shows how to use modern elements of these APIs. Selected optimization techniques are also included, such as overlapping communication and computations implemented using various APIs. Features: Discusses the popular and currently available computing devices and cluster systems Includes typical paradigms used in parallel programs Explores popular APIs for programming parallel applications Provides code templates that can be used for implementation of paradigms Provides hybrid code examples allowing multi-level parallelization Covers the optimization of parallel programs
In an increasingly networked world in which information is becoming increasingly actual, how can a system know with certainty just how fresh the information on a remote system is? Much work has been done on delay or latency in systems, but only recently has the concept of the freshness of information in or about a system become quantifiable. This is termed the Age of Information. Age of Information provides a whole new set of metrics and tools that can be used to characterize the freshness of information in communications, control and, indeed, information systems. In its early development, this monograph provides the reader with an easy-to-read tutorial-like introduction into this novel approach of dealing with information within systems. A critical summary of the work to date details the concept for the reader. A description of the fundamentals of the performance metrics is then presented before showing how the approach can be used as a tool in improving metrics in other contexts. The survey and tutorial nature of this monograph will save any researcher or student considerable time in understanding the basics of Age of Information, which is destined to become an important research topic in networked systems.
4 zettabytes (4 billion terabytes) of data generated in 2013, 44 zettabytes predicted for 2020 and 185 zettabytes for 2025. These figures are staggering and perfectly illustrate this new era of data deluge. Data has become a major economic and social challenge. The speed of processing of these data is the weakest link in a computer system: the storage system. It is therefore crucial to optimize this operation. During the last decade, storage systems have experienced a major revolution: the advent of flash memory. Flash Memory Integration: Performance and Energy Issues contributes to a better understanding of these revolutions. The authors offer us an insight into the integration of flash memory in computer systems, their behavior in performance and in power consumption compared to traditional storage systems. The book also presents, in their entirety, various methods for measuring the performance and energy consumption of storage systems for embedded as well as desktop/server computer systems. We are invited on a journey to the memories of the future.
This book gives a review of the principles, methods and techniques of important and emerging research topics and technologies in Channel Coding, including theory, algorithms, and applications. Edited by leading people in the field who, through their reputation, have been able to commission experts to write on a particular topic. With this reference source you will: Quickly grasp a new area of research Understand the underlying principles of a topic and its applications Ascertain how a topic relates to other areas and learn of the research issues yet to be resolved
Autonomic networking aims to solve the mounting problems created by increasingly complex networks, by enabling devices and service-providers to decide, preferably without human intervention, what to do at any given moment, and ultimately to create self-managing networks that can interface with each other, adapting their behavior to provide the best service to the end-user in all situations. This book gives both an understanding and an assessment of the principles, methods and architectures in autonomous network management, as well as lessons learned from, the ongoing initiatives in the field. It includes contributions from industry groups at Orange Labs, Motorola, Ericsson, the ANA EU Project and leading universities. These groups all provide chapters examining the international research projects to which they are contributing, such as the EU Autonomic Network Architecture Project and Ambient Networks EU Project, reviewing current developments and demonstrating how autonomic management principles are used to define new architectures, models, protocols, and mechanisms for future network equipment.
Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015 entitled "Meeting People Via Wi-Fi". The book will go over the hardware and software needed in order to do this tracking, how to use these particular tools in order to do attribution, and tips for protecting yourself from being attributed via those signals.
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.
Automation through Chef Opscode provides an in-depth understanding of Chef, which is written in Ruby and Erlang for configuration management, cloud infrastructure management, system administration, and network management. Targeted at administrators, consultants, and architect, the book guides them through the advanced features of the tool which are necessary for infrastructure automation, devops automation, and reporting. The book presumes knowledge of Ruby and Erlang which are used as reference languages for creating recipes and cookbooks and as a refresher on them to help the reader get on speed with the flow of book. The book provides step by step instructions on installation and configuration of Chef, usage scenarios of Chef, in infrastructure automation by providing common scenarios like virtual machine provisioning, OS configuration for Windows, Linux, and Unix, provisioning and configuration of web servers like Apache along with popular databases like MySQL. It further elaborates on the creation of recipes, and cookbooks, which help in deployment of servers and applications to any physical, virtual, or cloud location, no matter the size of the infrastructure. The books covers advanced features like LWRPs and Knife and also contains several illustrative sample cookbooks on MySQL, Apache, and CouchDB deployment using a step by step approach. |
![]() ![]() You may like...
From Trauma to Resiliency…
Shulamit Natan Ritblatt, Audrey Hokoda
Hardcover
R4,020
Discovery Miles 40 200
Relationship-based Learning - A…
Janet Packer, Nia MacQueen, …
Hardcover
R4,296
Discovery Miles 42 960
Building Positive Relationships in the…
Jamel Carly Campbell, Sonia Mainstone-Cotton
Paperback
R549
Discovery Miles 5 490
|