Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Information Technology 1,261
- Computer Science (Hardware & Networks) 1,254
- Engineering & Applied Sciences 420
- Computer Science 293
- Operating systems (Computers) 292
- Computer networks 279
- Programming 214
- Application software 182
- Development 173
- Computer security 168
- Security measures 163
- Examinations 162
- Linux 160
- Certification 153
- Computer input-output equipment 142
- Database management 137
- Electronic data processing personnel 124
- Management 120
- Computers 115
- Electrical & Computer Engineering 114
- Electronic data processing 112
- Embedded computer systems 111
- Microcomputers 111
- Microsoft Windows (Computer file) 111
- Data processing 110
- Hardware and Maker 107
- Artificial intelligence 104
- Design and construction 102
- Cloud computing 100
- Client/server computing 98
-
5081por Rodriguez, Juan R.Tabla de Contenidos: “…Portlet development platform sample installation -- 3.1 Prerequisites -- 3.1.1 Hardware requirements -- 3.1.2 Software requirements -- 3.2 Rational Application Developer and Portal Tools -- 3.3 WebSphere Portal V5.1 Test Environment -- 3.4 Configuration of the Test Environment -- 3.5 WebSphere Test Environment V5.1 (optional) -- Chapter 4. …”
Publicado 2005
Libro electrónico -
5082Publicado 2005Tabla de Contenidos: “…Getting started -- 4.1 Product packaging -- 4.2 Rational Web Developer -- 4.3 Installing WebSphere Application Server - Express -- 4.3.1 Hardware requirements -- 4.3.2 Installing using the launchpad -- 4.3.3 Install WebSphere Application Server - Express -- 4.3.4 Using the first steps console -- 4.4 Administration basics -- 4.4.1 Starting and stopping the server -- 4.4.2 Starting the WebSphere Administrative Console -- 4.5 Installing Rational Web Developer -- 4.5.1 Express Application Server and Rational Web Developer -- 4.6 Installing DB2 -- 4.7 Deploying the sample application -- 4.7.1 Running the sample database script -- 4.7.2 Creating the JDBC resources -- 4.7.3 Configuring JMS -- 4.7.4 Configuring LOG4J -- 4.7.5 Installing the Sal404 application EAR -- 4.8 Testing the Sal404 sample application -- 4.9 Installing Sal404 code in Rational Web Developer -- 4.9.1 Importing project interchange files -- 4.9.2 Test Sal404 with Rational Software Development Platform -- Chapter 5. …”
Libro electrónico -
5083Publicado 2001Tabla de Contenidos: “…Deployment architecture -- 3.1 Overview -- 3.2 Fibre Channel standards -- 3.2.1 Interoperability -- 3.2.2 Standards -- 3.3 Hardware overview -- 3.3.1 Host Bus Adapter -- 3.3.2 Cabling -- 3.4 Topologies -- 3.4.1 Point-to-point -- 3.4.2 Arbitrated loop -- 3.4.3 Switched fabrics -- 3.5 IBM Tivoli SAN Manager components -- 3.5.1 DB2 -- 3.5.2 IBM Tivoli SAN Manager Console (NetView) -- 3.5.3 Tivoli SAN Manager Agents -- 3.5.4 Tivoli SAN Manager Server -- 3.5.5 SAN physical view -- 3.6 Management -- 3.6.1 Inband management -- 3.6.2 Outband management -- 3.7 Deployment considerations -- 3.7.1 Tivoli SAN Manager Server -- 3.7.2 iSCSI management -- 3.7.3 Other considerations -- 3.7.4 Tivoli SAN Manager Agent (Managed Host) -- 3.8 Deployment scenarios -- 3.8.1 Example 1: Outband only -- 3.8.2 Example 2: Inband only -- 3.8.3 Example 3: Inband and outband -- 3.8.4 Additional considerations -- 3.9 High Availability for Tivoli SAN Manager -- 3.9.1 Standalone server failover -- 3.9.2 Summary -- Part 3 Installation and basic operations -- Chapter 4. …”
Libro electrónico -
5084Publicado 2018Tabla de Contenidos: “…-- The process -- Using virtual private cloud infrastructure -- Bootkube -- Summary -- Chapter 3: Monitoring, Logging, and Troubleshooting -- Monitoring Kubernetes with Heapster -- cAdvisor -- Installing Heapster -- InfluxDB backend -- The storage schema -- CPU -- Filesystem -- Memory -- Network -- Uptime -- Grafana visualization -- Performance analysis with the dashboard -- Top-level view -- Cluster -- Workloads -- Discovery and load balancing -- Adding central logging -- Planning central logging -- Fluentd -- Elasticsearch -- Kibana -- Detecting node problems -- Node problem detector -- DaemonSet -- Problem daemons -- Troubleshooting scenarios -- Designing robust systems -- Hardware failure -- Quotas, shares, and limits -- Bad configuration -- Cost versus performance -- Managing cost on the cloud -- Managing cost on bare metal -- Managing cost on hybrid clusters -- Using Prometheus -- What are operators? …”
Libro electrónico -
5085Publicado 2018Tabla de Contenidos: “…Starting Nexpose -- Start a scan -- Exploitation -- Post-exploitation -- Infrastructure analysis -- Pillaging -- High-profile targets -- Data exfiltration -- Persistence -- Further penetration into infrastructure -- Cleanup -- Reporting -- Executive summary -- Technical report -- Penetration testing limitations and challenges -- Pentesting maturity and scoring model -- Realism -- Methodology -- Reporting -- Summary -- Chapter 2: Advanced Linux Exploitation -- Linux basics -- Linux commands -- Streams -- Redirection -- Linux directory structure -- Users and groups -- Permissions -- The chmod command -- The chown command -- The chroot command -- The power of the find command -- Jobs, cron, and crontab -- Security models -- Security controls -- Access control models -- Linux attack vectors -- Linux enumeration with LinEnum -- OS detection with Nmap -- Privilege escalation -- Linux privilege checker -- Linux kernel exploitation -- UserLand versus kernel land -- System calls -- Linux kernel subsystems -- Process -- Threads -- Security-Enhanced Linux -- Memory models and the address spaces -- Linux kernel vulnerabilities -- NULL pointer dereference -- Arbitrary kernel read/write -- Case study CVE-2016-2443 Qualcomm MSM debug fs kernel arbitrary write -- Memory corruption vulnerabilities -- Kernel stack vulnerabilities -- Kernel heap vulnerabilities -- Race conditions -- Logical and hardware-related bugs -- Case study CVE-2016-4484 - Cryptsetup Initrd root Shell -- Linux Exploit Suggester -- Buffer overflow prevention techniques -- Address space layout randomization -- Stack canaries -- Non-executable stack -- Linux return oriented programming -- Linux hardening -- Summary -- Chapter 3: Corporate Network and Database Exploitation -- Networking fundamentals -- Network topologies -- Bus topology -- Star topology -- Ring topology -- Tree topology…”
Libro electrónico -
5086Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Penetration Testing and Web Applications -- Proactive security testing -- Different testing methodologies -- Ethical hacking -- Penetration testing -- Vulnerability assessment -- Security audits -- Considerations when performing penetration testing -- Rules of Engagement -- The type and scope of testing -- Client contact details -- Client IT team notifications -- Sensitive data handling -- Status meeting and reports -- The limitations of penetration testing -- The need for testing web applications -- Reasons to guard against attacks on web applications -- Kali Linux -- A web application overview for penetration testers -- HTTP protocol -- Knowing an HTTP request and response -- The request header -- The response header -- HTTP methods -- The GET method -- The POST method -- The HEAD method -- The TRACE method -- The PUT and DELETE methods -- The OPTIONS method -- Keeping sessions in HTTP -- Cookies -- Cookie flow between server and client -- Persistent and nonpersistent cookies -- Cookie parameters -- HTML data in HTTP response -- The server-side code -- Multilayer web application -- Three-layer web application design -- Web services -- Introducing SOAP and REST web services -- HTTP methods in web services -- XML and JSON -- AJAX -- Building blocks of AJAX -- The AJAX workflow -- HTML5 -- WebSockets -- Summary -- Chapter 2: Setting Up Your Lab with Kali Linux -- Kali Linux -- Latest improvements in Kali Linux -- Installing Kali Linux -- Virtualizing Kali Linux versus installing it on physical hardware -- Installing on VirtualBox -- Creating the virtual machine -- Installing the system -- Important tools in Kali Linux -- CMS & -- Framework Identification -- WPScan -- JoomScan -- CMSmap…”
Libro electrónico -
5087por Vanderburg, Eric A.Tabla de Contenidos: “…Enterprise -- Virtualization Host -- Hardware-Assisted Virtualization -- Single Root Input/Output Virtualization -- BIOS -- UEFI -- Firmware Configurations…”
Publicado 2021
Libro electrónico -
5088Publicado 2022Tabla de Contenidos: “…Soft Phones and Mobile Phones -- Email, Chat, and Channels -- Email -- Chats -- Channels -- Voice Chat -- Videoconferencing -- Internal Meetings -- External Meetings -- Google Meet -- Cisco Webex -- Microsoft Teams -- Zoom -- Remo -- Team Collaboration Tools -- Trello -- Basecamp -- Asana -- Teamwork and Teamwork Desk -- Slack -- Microsoft Teams -- Google Workspace -- File Sharing and Cloud Storage -- Cloud Backup -- Cloud Sync -- Cloud Storage -- Data Protection -- Cybersecurity -- Wi-Fi -- Securing Devices -- Two-Factor Authentication -- Remote Wipes -- Virtual Private Networks -- Business Tech Advantages -- Chapter 4 Choosing Technology: Getting the Right Digital Tools for You -- Scale to Meet Your Needs -- Reliability -- The Five Nines -- Performance -- Locally Hosted -- Local or Cloud -- Focus on the Need -- Integrations and Working Well with Other Tech -- Look at Your Future -- Look for Reviews -- Compliance -- First-Time Setup -- Configuration -- Customization -- Administration Levels -- Data Migration -- Data Selection -- Data Formatting -- Data Deduplication -- Mapping and Templates -- Migrating -- Outside Implementation Companies -- After the Sale -- Customer Service -- Customer Support -- Response Time -- Total Cost of Ownership -- Focus on Your Pains -- Upfront Costs -- Software -- Hardware -- Implementation, Migration, and Customization -- User Licenses -- Training -- Operating Costs -- Software Support and Maintenance -- Additional Licenses and Training -- End User and Admin Tech Support -- Network and Data Center -- Backup and Disaster Recovery -- Scaling Up or Retirement -- Choosing Wisely -- Chapter 5 Time Management: The Result Is What Matters Most -- Being Productive -- Measuring Productivity -- Objectives Focused -- Check-ins and Target Adjusting -- Deadlines and Prioritizing -- Team Deadlines -- Deadlines for Yourself…”
Libro electrónico -
5089Publicado 2015Tabla de Contenidos: “…. -- Feedback zu Cortana geben -- Mehr Platz auf dem Bildschirm dank virtueller Desktops -- Neuen virtuellen Desktop anlegen -- Desktop entfernen -- Fenster auf anderen Desktop verschieben -- Profi-Tipp: Schneller zwischen Desktops wechseln -- Produktivität neu erfunden - praktische Helfer am Desktop -- Zwischen Fenstern umschalten -- Fenster schnell anordnen -- Profi-Tipp: Papierkorb an Taskleiste anheften -- Aero Peek reaktivieren -- 4 Windows überall und jederzeit nutzen -- Continuum: nahtloser Wechsel vom Desktop- zum Tabletmodus und umgekehrt -- Tabletmodus einschalten -- Unterschiede im Tabletmodus -- Tabletmodus per Hardware starten -- Einstellungen für den Tabletmodus anpassen -- Bessere Vernetzung über Gerätegrenzen hinweg -- Festlegen, welche Einstellungen synchronisiert werden -- Profi-Tipp: BitLocker-Schlüssel synchronisieren -- Gesten an Touchpad und Monitor meistern -- 5 Universelle Apps aus dem Windows Store laden -- Ein zentraler Store: Desktop-Programme treffen auf Modern Apps -- Android- und iOS-Apps in Windows nutzen -- Saubere Sache: Apps installieren und entfernen -- Apps installieren -- Apps wieder entfernen -- Store-Konto verwalten…”
Libro electrónico -
5090Publicado 2019Tabla de Contenidos: “…Dealing with complex relations -- Switching to Probabilities -- Specifying a binary response -- Transforming numeric estimates into probabilities -- Guessing the Right Features -- Defining the outcome of incompatible features -- Solving overfitting using selection and regularization -- Learning One Example at a Time -- Using gradient descent -- Understanding how SGD is different -- Chapter 7 Introducing Neural Networks -- Discovering the Incredible Perceptron -- Understanding perceptron functionality -- Touching the nonseparability limit -- Hitting Complexity with Neural Networks -- Considering the neuron -- Pushing data with feed-forward -- Going even deeper into the rabbit hole -- Using backpropagation to adjust learning -- Struggling with Overfitting -- Understanding the problem -- Opening the black box -- Chapter 8 Building a Basic Neural Network -- Understanding Neural Networks -- Defining the basic architecture -- Documenting the essential modules -- Solving a simple problem -- Looking Under the Hood of Neural Networks -- Choosing the right activation function -- Relying on a smart optimizer -- Setting a working learning rate -- Chapter 9 Moving to Deep Learning -- Seeing Data Everywhere -- Considering the effects of structure -- Understanding Moore's implications -- Considering what Moore's Law changes -- Discovering the Benefits of Additional Data -- Defining the ramifications of data -- Considering data timeliness and quality -- Improving Processing Speed -- Leveraging powerful hardware -- Making other investments -- Explaining Deep Learning Differences from Other Forms of AI -- Adding more layers -- Changing the activations -- Adding regularization by dropout -- Finding Even Smarter Solutions -- Using online learning -- Transferring learning -- Learning end to end -- Chapter 10 Explaining Convolutional Neural Networks…”
Libro electrónico -
5091Publicado 2025Tabla de Contenidos: “…Offline -- Chapter 30 Database Structures: Objective 5.3: Compare and contrast various database structures -- Structuring Data -- Relational Databases -- Database Keys -- Nonrelational Databases -- Chapter 31 Backups: Objective 5.4: Explain basic data backup concepts -- Data Backups -- Backup Media -- Testing and Restoring Backups -- Part VI Domain 6.0: Security -- Chapter 32 Confidentiality, Integrity, and Availability: Objective 6.1: Explain fundamental security concepts and frameworks -- The CIA Triad -- Confidentiality -- Snooping -- Dumpster Diving -- Eavesdropping -- Wiretapping -- Social Engineering -- Integrity -- Unauthorized Information Alteration -- Impersonation -- On-path Attacks -- Replay Attacks -- Availability -- Denial-of-Service Attacks -- Power Outages -- Hardware Failures -- Destruction -- Service Outages -- Chapter 33 Privacy: Objective 6.1 Explain fundamental security concepts and frameworks: Objective 6.2 Explain methods to secure devices and security best practices -- Privacy -- Types of Private Information -- Expectation of Privacy -- Privacy Regulations -- Chapter 34 Authentication, Authorization, Accounting, and Nonrepudiation: Objective 6.1: Explain fundamental security concepts and frameworks -- Access Control -- Identification -- Authentication -- Authorization…”
Libro electrónico -
5092por Wesselius, JaapTabla de Contenidos: “…Intro -- Table of Contents -- About the Authors -- About the Technical Reviewer -- Introduction -- Part I: Infrastructure and Exchange Server -- Chapter 1: Exchange 2019 Introduction -- Exchange Server 2019 Editions -- What's New in Exchange Server 2019 -- What Has Been Discontinued or Deprecated in Exchange Server 2019 -- Exchange 2019 and Active Directory -- Integration with Active Directory -- Active Directory Partitions -- Active Directory Permissions -- Active Directory Sites -- Exchange Online and Azure Active Directory -- Exchange Server 2019 Architecture -- Exchange 2019 Services -- Exchange 2019 Client Access Services -- Exchange 2019 Mailbox Services -- Exchange Server 2019 Management -- Exchange Admin Center -- Exchange Admin Center in Exchange Online -- Exchange Management Shell -- PowerShell -- Additional Modules -- Remote PowerShell -- PowerShell ISE -- Exchange Online PowerShell -- Virtualization -- Summary -- Chapter 2: Exchange Infrastructure -- Designing Your Exchange 2019 Environment -- Exchange 2019 Server Role Requirements Calculator -- Installation of Exchange 2019 -- Hardware Requirements -- Software Requirements -- Installing Exchange 2019 -- Disk Configuration -- Installing Prerequisite Software -- Exchange 2019 Unattended Setup -- Prepare the Schema Partition -- Prepare the Configuration Partition -- Prepare the Domain Partition -- Exchange 2019 Unattended Setup -- Exchange 2019 Graphical Setup -- Configuring the Exchange 2019 Server -- Configuring Exchange 2019 -- Virtual Directories -- Configure an SSL Certificate -- Request an SSL Certificate Using EMS -- Exporting an Existing SSL Certificate -- Importing an Existing SSL Certificate -- Create a Send Connector -- Receive Connectors -- Accepted Domains -- Create an Email Address Policy -- Relocate the Initial Mailbox Database (GUI Setup Only)…”
Publicado 2023
Libro electrónico -
5093Publicado 2005Tabla de Contenidos: “…TCP/IP PROTOCOL SUITE AND ARCHITECTURE -- TCP/IP Overview and History -- TCP/IP History and Development -- Important Factors in the Success of TCP/IP -- TCP/IP Services -- The TCP/IP Client/Server Structural Model -- Hardware and Software Roles -- Transactional Roles -- TCP/IP Architecture and the TCP/IP Model -- Network Interface Layer -- Internet Layer -- Host-to-Host Transport Layer -- Application Layer -- TCP/IP Protocols -- II-1. …”
Libro electrónico -
5094Publicado 2010Tabla de Contenidos: “…-- The Single Variable -- Locking -- Causes of Concurrency -- Knowing What to Protect -- Deadlocks -- Contention and Scalability -- Conclusion -- 10 Kernel Synchronization Methods -- Atomic Operations -- Atomic Integer Operations -- 64-Bit Atomic Operations -- Atomic Bitwise Operations -- Spin Locks -- Spin Lock Methods -- Other Spin Lock Methods -- Spin Locks and Bottom Halves -- Reader-Writer Spin Locks -- Semaphores -- Counting and Binary Semaphores -- Creating and Initializing Semaphores -- Using Semaphores -- Reader-Writer Semaphores -- Mutexes -- Semaphores Versus Mutexes -- Spin Locks Versus Mutexes -- Completion Variables -- BKL: The Big Kernel Lock -- Sequential Locks -- Preemption Disabling -- Ordering and Barriers -- Conclusion -- 11 Timers and Time Management -- Kernel Notion of Time -- The Tick Rate: HZ -- The Ideal HZ Value -- Advantages with a Larger HZ -- Disadvantages with a Larger HZ -- Jiffies -- Internal Representation of Jiffies -- Jiffies Wraparound -- User-Space and HZ -- Hardware Clocks and Timers -- Real-Time Clock -- System Timer -- The Timer Interrupt Handler -- The Time of Day -- Timers -- Using Timers -- Timer Race Conditions -- Timer Implementation -- Delaying Execution -- Busy Looping -- Small Delays…”
Libro electrónico -
5095por Bryant, RussellTabla de Contenidos: “…Asterisk Architecture -- Modules -- Applications -- Bridging Modules -- Call Detail Recording Modules -- Channel Event Logging Modules -- Channel Drivers -- Codec Translators -- Format Interpreters -- Dialplan Functions -- PBX Modules -- Resource Modules -- Add-on Modules -- Test Modules -- File Structure -- Configuration Files -- Modules -- The Resource Library -- The Spool -- Logging -- The Dialplan -- Hardware -- Asterisk Versioning -- Previous Release Methodologies -- The Current Release Methodology -- Simplifying the Version Numbers -- Conclusion -- Chapter 3. …”
Publicado 2013
Libro electrónico -
5096Publicado 2018Tabla de Contenidos: “…Cover -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: A Guided Tour of Moodle -- Moodle's philosophy of learning -- A plan to create your learning site -- Step-by-step instructions to use Moodle -- Step 1 - Learning about the Moodle experience -- Step 2 - Installing Moodle -- Step 3 - Configuring your site -- Step 4 - Creating the framework for your learning site -- Step 5 - Making decisions about common settings -- Step 6 - Adding basic course material -- Step 7 - Making your courses interactive -- Step 8 - Evaluating your students -- Step 9 - Making your course social -- Step 10 - Adding collaborative activities -- Step 11 - Managing and extending your courses -- Step 12 - Taking the pulse of your course -- Applying the Moodle philosophy -- Adding static content -- Interactive and social course material -- Creating activities -- The Moodle experience -- The Moodle front page -- Arriving at the site -- Using moodlecloud.com -- The main menu -- Blocks -- The site description -- Available courses -- Inside a course -- The navigation bar -- Blocks -- The navigation block -- Sections -- Joining a discussion -- Completing a lesson -- Editing mode -- Normal mode versus editing mode -- The Edit icon -- The Delete icon -- The Hidden/Shown icons -- The Group icons -- Resources and activities -- Adding resources and activities -- The administration menu -- The Moodle architecture -- The Moodle application directory -- The Moodle data directory -- The Moodle database -- Summary -- Chapter 2: Installing Moodle -- Installation step 1 - Requirements -- Hardware -- Disk space -- Bandwidth and data transfer limits -- Memory -- Ensuring minimum prerequisites -- Installation step 2 - Subdomain or subdirectory? …”
Libro electrónico -
5097Publicado 2017Tabla de Contenidos: “…Elasticsearch DSL query -- Visualize -- Kibana aggregations -- Bucket aggregations -- Metric -- Creating a visualization -- Visualization types -- Line, area, and bar charts -- Data table -- MarkDown widget -- Metric -- Goal -- Gauge -- Pie charts -- Co-ordinate maps -- Region maps -- Tag cloud -- Visualizations in action -- Response codes over time -- Top 10 URLs requested -- Bandwidth usage of top five countries over time -- Web traffic originating from different countries -- Most used user agent -- Dashboards -- Creating a dashboard -- Saving the dashboard -- Cloning the dashboard -- Sharing the dashboard -- Timelion -- Timelion UI -- Timelion expressions -- Using plugins -- Installing plugins -- Removing plugins -- Summary -- Chapter 8: Elastic X-Pack -- Installing X-Pack -- Installing X-Pack on Elasticsearch -- Installing X-Pack on Kibana -- Uninstalling X-Pack -- Configuring X-Pack -- Security -- User authentication -- User authorization -- Security in action -- New user creation -- Deleting a user -- Changing the password -- New role creation -- How to Delete/Edit a role -- Document-level security or field-level security -- X-Pack security APIs -- User management APIs -- Role management APIs -- Monitoring Elasticsearch -- Monitoring UI -- Elasticsearch metrics -- Overview tab -- Nodes tab -- The Indices tab -- Alerting -- Anatomy of a watch -- Alerting in action -- Create a new alert -- Threshold Alert -- Advanced Watch -- How to Delete/Deactivate/Edit a Watch -- Summary -- Chapter 9: Running Elastic Stack in Production -- Hosting Elastic Stack on a managed cloud -- Getting up and running on Elastic Cloud -- Using Kibana -- Overriding configuration -- Recovering from a snapshot -- Hosting Elastic Stack on your own -- Selecting hardware -- Selecting an operating system -- Configuring Elasticsearch nodes -- JVM heap size -- Disable swapping…”
Libro electrónico -
5098Publicado 2012Tabla de Contenidos: “…-- Planning the Installation -- Hardware and Software Requirements -- Security Documentation -- Online Release Notes -- Setup Documentation -- System Configuration Checker -- Installing SQL Server -- Summary -- Chapter 3: SQL Server Management Studio -- Introduction to SQL Server Management Studio -- Connecting to a Server -- Registered Servers -- Object Explorer -- Organizing and Navigating SQL Server Management Studio's Panes -- Using SQL Server Management Studio with the Database Engine…”
Libro electrónico -
5099Publicado 2003Tabla de Contenidos: “…Implementation planning -- 3.1 Physical design -- 3.1.1 ITLM Administration Server considerations -- 3.1.2 ITLM Runtime Server considerations -- 3.1.3 Scalability limits -- 3.1.4 Network considerations -- 3.1.5 Security considerations -- 3.1.6 Hardware considerations -- 3.1.7 File systems considerations -- 3.1.8 Physical design example -- 3.2 Logical design -- 3.2.1 Naming convention -- 3.2.2 Customer considerations -- 3.2.3 Division considerations -- 3.2.4 Monitored Nodes considerations -- 3.2.5 Administrator considerations -- 3.2.6 Logical design example -- 3.3 Disaster and recovery -- 3.3.1 Backup and restore -- 3.3.2 Failover considerations -- 3.4 Planning for IBM Tivoli License Manager -- 3.4.1 Planning overview -- 3.4.2 Planning for IBM DB2 Universal Database Enterprise Edition -- 3.4.3 Planning for HTTP Server…”
Libro electrónico -
5100Publicado 2024Tabla de Contenidos: “…Enterprise ML architecture pattern overview -- Model training environment -- Model training engine using SageMaker -- Automation support -- Model training life cycle management -- Model hosting environment -- Inference engines -- Authentication and security control -- Monitoring and logging -- Adopting MLOps for ML workflows -- Components of the MLOps architecture -- Monitoring and logging -- Model training monitoring -- Model endpoint monitoring -- ML pipeline monitoring -- Service provisioning management -- Best practices in building and operating an ML platform -- ML platform project execution best practices -- ML platform design and implementation best practices -- Platform use and operations best practices -- Summary -- Chapter 10: Advanced ML Engineering -- Technical requirements -- Training large-scale models with distributed training -- Distributed model training using data parallelism -- Parameter server overview -- AllReduce overview -- Distributed model training using model parallelism -- Naïve model parallelism overview -- Tensor parallelism/tensor slicing overview -- Implementing model-parallel training -- Achieving low-latency model inference -- How model inference works and opportunities for optimization -- Hardware acceleration -- Central processing units (CPUs) -- Graphics processing units (GPUs) -- Application-specific integrated circuit -- Model optimization -- Quantization -- Pruning (also known as sparsity) -- Graph and operator optimization -- Graph optimization -- Operator optimization -- Model compilers -- TensorFlow XLA -- PyTorch Glow -- Apache TVM -- Amazon SageMaker Neo -- Inference engine optimization -- Inference batching -- Enabling parallel serving sessions -- Picking a communication protocol -- Inference in large language models -- Text Generation Inference (TGI) -- DeepSpeed-Inference -- FastTransformer…”
Libro electrónico