Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 267
- Application software 238
- Java (Computer program language) 185
- Big data 162
- Cloud computing 155
- Streaming video 152
- Engineering & Applied Sciences 129
- Management 128
- Data mining 126
- Electronic data processing 117
- Computer networks 111
- Database management 98
- Data processing 90
- Computer Science 86
- Machine learning 83
- Computer programming 82
- Computer programs 82
- Python (Computer program language) 75
- Computer software 70
- Examinations 68
- Artificial intelligence 67
- Distributed processing 64
- Security measures 61
- Computer security 58
- Information technology 58
- Operating systems (Computers) 57
- Programming 56
- Microsoft .NET Framework 55
- Design 54
- Software engineering 53
-
2161Publicado 2018Tabla de Contenidos: “…-- FP techniques -- Composition -- Partial application -- Currying -- Pipes -- Pointfree style -- Recursion -- Category theory -- Functor -- Applicative -- Maybe -- Either -- Monad -- Real-world FP -- Immutable.js -- Ramda -- React and MobX -- Summary -- Chapter 8: Working with Decorators -- Prerequisites -- Annotations versus decorators -- The class decorators -- The method decorators -- The property decorators -- The parameter decorators -- Decorators with arguments -- The reflect metadata API -- The decorator factory -- Summary -- Chapter 9: Automating Your Development Workflow -- A modern development workflow -- Prerequisites -- Node.js -- Visual Studio Code -- Git and GitHub -- Companion source code -- Source control tools -- Package management tools -- The TypeScript compiler -- Linting tools -- Working with npm scripts -- Gulp -- Controlling the gulp task execution order -- Passing in a callback to the task definition function -- Returning a promise -- Returning a stream -- Webpack -- Webpack development server -- Unit testing and test coverage -- Visual Studio Code -- Quick fixes -- Debugging utilities -- Source control utilities -- ts-node -- Continuous integration (CI) tools -- Scaffolding tools -- Why does the command line win? …”
Libro electrónico -
2162Publicado 2018Tabla de Contenidos: “…Working with the OpenSSL command line -- Introduction -- Mathematics -- Set -- Group -- Field -- A finite field -- Order -- An abelian group -- Prime fields -- Ring -- A cyclic group -- Modular arithmetic -- Cryptography -- Confidentiality -- Integrity -- Authentication -- Entity authentication -- Data origin authentication -- Non-repudiation -- Accountability -- Cryptographic primitives -- Symmetric cryptography -- Stream ciphers -- Block ciphers -- Block encryption mode -- Electronic Code Book -- Cipher Block Chaining -- Counter mode -- Keystream generation mode -- Message authentication mode -- Cryptographic hash mode -- Data Encryption Standard -- Advanced Encryption Standard -- How AES works -- Summary -- Chapter 4: Public Key Cryptography -- Asymmetric cryptography -- Integer factorization -- Discrete logarithm -- Elliptic curves -- Public and private keys -- RSA -- Encryption and decryption using RSA -- Elliptic Curve Cryptography -- Mathematics behind ECC -- Point addition -- Point doubling -- Discrete logarithm problem in ECC -- RSA using OpenSSL -- RSA public and private key pair -- Private key -- Public key -- Exploring the public key -- Encryption and decryption -- Encryption -- Decryption -- ECC using OpenSSL -- ECC private and public key pair -- Private key -- Private key generation -- Hash functions -- Compression of arbitrary messages into fixed-length digest -- Easy to compute -- Preimage resistance -- Second preimage resistance -- Collision resistance -- Message Digest -- Secure Hash Algorithms -- Design of Secure Hash Algorithms -- Design of SHA-256 -- Design of SHA-3 (Keccak) -- OpenSSL example of hash functions -- Message Authentication Codes -- MACs using block ciphers -- Hash-based MACs -- Merkle trees -- Patricia trees -- Distributed Hash Tables -- Digital signatures -- RSA digital signature algorithm -- Sign then encrypt…”
Libro electrónico -
2163Publicado 2018Tabla de Contenidos: “…. -- See also -- Ensuring stream closing with the use function -- Getting ready -- How to do it... -- How it works... -- Reading the contents of a file line by line -- Getting ready -- How to do it... -- How it works... -- See also -- Writing the contents to a file -- How to do it... -- How it works... -- See also -- Appending a file -- How to do it... -- How it works... -- Easy file copying -- Getting ready -- How to do it... -- How it works... -- Traversing files in a directory…”
Libro electrónico -
2164Publicado 2022Tabla de Contenidos: “…Chapter 5 Cryptography -- Cryptography in Practice -- Fundamental Methods -- Comparative Strengths and Performance of Algorithms -- Key Length -- Cryptographic Objectives -- Diffusion -- Confusion -- Obfuscation -- Perfect Forward Secrecy -- Security Through Obscurity -- Historical Perspectives -- Algorithms -- Substitution Ciphers -- One-Time Pads -- Key Management -- Random Numbers -- Salting -- Hashing Functions -- Message Digest -- SHA -- RIPEMD -- Hashing Summary -- Symmetric Encryption -- DES -- 3DES -- AES -- CAST -- RC -- Blowfish -- Twofish -- IDEA -- ChaCha20 -- Cipher Modes -- Authenticated Encryption with Associated Data (AEAD) -- Block vs. Stream -- Symmetric Encryption Summary -- Asymmetric Encryption -- Diffie-Hellman -- RSA Algorithm -- ElGamal -- ECC -- Asymmetric Encryption Summary -- Symmetric vs. …”
Libro electrónico -
2165por MarksTabla de Contenidos: “…-- Alignment of Interests -- Recruit the Right Advisors Early -- Allocate Enough Resources -- Every Interaction Is a Negotiation13 -- If It Can Go Wrong, It Will Go Wrong -- Chapter 9 Buy-Side Representation -- Buyer Clients -- Strategy -- The Filter -- Financing -- Quality of Earnings -- Coordination -- Integration -- Chapter 10 Technology in the M& -- A Process -- Virtual Data Room -- Market Insight and Data -- Deal Sourcing and Exchanges -- Due Diligence Software -- Project Management Software -- Comprehensive M& -- A Software -- Supporting Tools -- Artificial Intelligence and Technology Trends -- Technology Providers -- Chapter 11 Professional Standards and Ethics -- Holistic Advice -- Ethical and Professional Standards -- Competence and Professionalism (Reputation) -- Best Practices (Activities) -- Ethics (Behavioral Boundaries) -- The Middle Market Standard -- Part 4 M& -- A Technical Discussions -- Chapter 12 Financial Analysis -- Financial Reporting Motivation -- EBITDA -- Balance Sheet Analysis -- Working Capital -- Normalization -- Chapter 13 Market Valuation -- Reasons for Appraisal -- Determine the Value Subworld -- Calculate the Benefit Stream -- Synergies -- Determine Private Return Expectation -- Specific Investor Return -- General Acquisition Selling Multiples -- Derive Value -- Chapter 14 Deal Structure -- Structural Priorities -- Business and Economic Terms -- Tax Structure -- Legal Structure -- Mergers…”
Publicado 2022
Libro electrónico -
2166por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…Current Situation and Trends -- Freshwater resources -- Water quality -- Figure 2.1 Water resources -- Figure 2.2 Water use, late 1990s -- Pressures on water resources -- Pressures on water quantities -- Pressures on water quality -- Table 2.1 Main sources of pollution of rivers and streams, 1997 -- 2. Responses -- Legal and institutional framework -- Figure 2.3 Agricultural inputs, 1997 -- Figure 2.4 Livestock a density, 1999 -- Objectives -- Regulatory instruments -- Discharge permits -- Strategic and management plans -- Monitoring -- Economic instruments -- Table 2.2 Water prices, 1998 -- Funding and expenditure -- 3. …”
Publicado 2000
Libro electrónico -
2167Publicado 2017Tabla de Contenidos: “…Summary -- Chapter 8: Event-Driven Architectural Patterns -- Service-oriented architecture and event-driven architecture (SOA versus EDA) -- Key characteristics of event-driven patterns -- Components of an EDA pattern -- Event flow layers -- Event generators -- Event channel -- Event processing -- Downstream event-driven activity -- Design considerations for event-driven patterns -- Implementation variants of EDA patterns -- Simple event processing patterns -- Event stream processing patterns -- Complex event processing (CEP) patterns -- Types of event-driven patterns -- Event mediator topology pattern -- Event broker topology pattern -- Hub and spoke pattern -- Broadcast pattern -- Polling pattern -- EDA pattern implementation in systems/processes -- Event log -- Event collectors -- Reply queue -- Improving the performance of EDA-based processes/systems -- IBM WebSphere MQ -- Emerging trends in EDA -- Event-driven microservices -- Complex event processing -- Internet of Things (IoT) and EDA -- References -- Summary -- Chapter 9: Microservices Architecture Patterns -- Microservices patterns -- Decomposition patterns -- Decomposition by use case pattern -- Decomposition by resources pattern -- Decomposition by business capability pattern -- Decomposition by subdomain pattern -- Microservices deployment pattern -- Multiple service instances per host pattern -- Single service instance per host pattern -- Service instance per VM pattern -- Service instance per container pattern -- Serverless deployment pattern -- Service deployment platform pattern -- Microservices design patterns -- Aggregator microservice design pattern -- Proxy microservice design pattern -- Chained microservice design pattern -- Microservice chassis pattern -- Externalized configuration pattern -- Microservices database patterns -- Database per service pattern…”
Libro electrónico -
2168Publicado 2015Tabla de Contenidos: “…-- Rule 59 If you are going to get financial advice, pay for it -- Rule 60 Don't fiddle -- Rule 61 Think long term -- Rule 62 Have a set time of day to work on your wealth strategy -- Rule 63 Pay attention to detail -- Rule 64 Create new income streams -- Rule 65 Learn to play 'What if?' -- Rule 66 Control spending impulses…”
Libro electrónico -
2169Publicado 2018Tabla de Contenidos: “…Uploading existing files -- Uploading files as a stream -- Uploading from data in memory -- Managing file upload -- Monitoring file upload -- Beyond monitoring and managing -- Downloading files -- Creating a reference -- Downloading into memory -- Downloading into a local file -- Downloading data through a URL -- Downloading images using FirebaseUI -- Beyond downloading files -- File metadata -- Retrieving File Metadata -- Update the metadata of the file -- Deleting files -- Handling common errors -- Security and rules -- The general syntax for storage security rules -- Securing user files -- Request and Resource Evaluation -- Storage and functions -- Firebase Storage in practice -- Summary -- Chapter 6: Not Just a Keeper, Firebase Hosting -- Firebase Hosting -- Deploying a website -- Connecting to custom domain -- Connecting Firebase cloud functions -- Customizing hosting behavior -- Custom 404/Not Found page -- Redirects -- Rewrites -- Headers -- Hosting priorities -- Reserved URLs -- Summary -- Chapter 7: Inspection and Evaluation - Firebase Test Lab -- Firebase Test Lab -- Test Lab for Android -- Choosing the testing method -- Robo testing -- Choosing device type and reviewing test results -- Test Lab with Firebase Console -- Test Lab with gcloud CLI -- Google Cloud SDK environment -- Choosing test configurations -- Scripting gcloud commands with Test Lab -- Test Lab with CI systems -- Creating a Jenkins project -- Test Lab with Android Studio -- Firebase Test Lab results -- Available devices in Test Lab -- Firebase Test Lab Game Loop testing -- Test Loop Manager -- Game loop in Test Lab -- Prelaunch reports -- Summary -- Chapter 8: A Smart Watchdog - Firebase Performance Monitoring -- Firebase Performance Monitoring -- Performance Monitoring for Android -- Automatic traces -- Custom trace and counters…”
Libro electrónico -
2170Publicado 2017Tabla de Contenidos: “…Unnecessary operations -- Misplaced or missing indexes -- Using CTE when not mandatory -- Using the PL/pgSQL procedural language consideration -- Cross column correlation -- Table partitioning -- Constraint exclusion limitations -- Query rewriting -- Summary -- Chapter 14: Testing -- Unit testing -- Specificity of unit testing in databases -- Unit test frameworks -- Schema difference -- Database abstraction interfaces -- Data difference -- Performance testing -- Summary -- Chapter 15: Using PostgreSQL in Python Applications -- Python DB API 2.0 -- Low-level database access with psycopg2 -- Connecting to a database -- Connection pooling -- Executing SQL commands -- Reading data from a database -- The COPY command -- Asynchronous access -- Alternative drivers for PostgreSQL -- pg8000 -- asyncpg -- Object relational mapping with SQLAlchemy -- Main components of SQLAlchemy -- Connecting to a database and retrieving data with SQL Expression Language -- ORM -- Summary -- Chapter 16: Scalability -- The problem of scalability and the CAP theorem -- Data replication in PostgreSQL -- Transaction log -- Physical replication -- Log shipping replication -- Streaming replication -- Synchronous replication -- Logical replication -- Using replication to scale PostgreSQL -- Scaling for heavy querying -- Data sharding -- Scaling for big number of connections -- Summary -- Index…”
Libro electrónico -
2171Publicado 2023Tabla de Contenidos: “…Virtualization -- Serverless -- High-Performance Computing (HPC) and Grid Computing -- Peer-to-Peer -- Thin Clients -- Diskless Workstations -- Thin Client Applications -- Embedded Systems and The Internet of Things (IoT) -- Distributed Systems and Edge Computing Systems -- Industrial Control Systems (ICS) -- System Vulnerabilities, Threats, and Countermeasures -- Emanations -- Covert Channels -- Covert Storage Channels -- Covert Timing Channels -- Backdoors -- Malicious Code (Malware) -- Computer Viruses -- Worms -- Trojans -- Rootkits -- Packers -- Logic Bombs -- Antivirus Software -- Server-Side Attacks -- Client-Side Attacks -- Web Architecture and Attacks -- Applets -- Java -- ActiveX -- OWASP -- XML -- Service Oriented Architecture (SOA) -- Database Security -- Polyinstantiation -- Inference and Aggregation -- Inference and Aggregation Controls -- Data Mining -- Data Analytics -- Countermeasures -- Mobile Device Attacks -- Mobile Device Defenses -- Cornerstone Cryptographic Concepts -- Key Terms -- Confidentiality, Integrity, Authentication, and Non-repudiation -- Confusion, Diffusion, Substitution, and Permutation -- Cryptographic Strength -- Monoalphabetic and Polyalphabetic Ciphers -- Modular Math -- Exclusive Or (XOR) -- Data at Rest and Data in Motion -- Protocol Governance -- Types of Cryptography -- Symmetric Encryption -- Stream and Block Ciphers -- Initialization Vectors and Chaining -- DES -- Modes of DES -- Electronic Code Book (ECB) -- Cipher Block Chaining (CBC) -- Cipher Feedback (CFB) -- Output Feedback (OFB) -- Counter Mode (CTR) -- Single DES -- Triple DES -- International Data Encryption Algorithm (IDEA) -- Advanced Encryption Standard (AES) -- Choosing AES…”
Libro electrónico -
2172Publicado 2024Tabla de Contenidos: “…-- Designing the architecture of the RAG feature pipeline -- Batch pipelines -- Batch versus streaming pipelines -- Core steps -- Change data capture: syncing the data warehouse and feature store -- Why is the data stored in two snapshots? …”
Libro electrónico -
2173Publicado 2018Tabla de Contenidos: “…Chapter 16: Pricing Considerations -- Compute Engine -- BigTable -- BigQuery -- Datastore -- Cloud SQL -- Google Kubernetes Engine -- Pub/Sub -- Cloud ML Engine -- Stackdriver -- Video Intelligence API -- Key Management Service - KMS -- Vision API -- Summary -- Chapter 17: Effective Use of the GCP -- Eat the Kubernetes frog -- Careful that you don't get nickel-and-dimed -- Pay for what you allocate not what you use -- Make friends with the gsuite admins -- Try to find reasons to use network peering -- Understand how sustained use discounts work -- Read the fine print on GCS pricing -- Use BigQuery unless you have a specific reason not to -- Use pre-emptible instances in your Dataproc clusters -- Keep your Dataproc clusters stateless -- Understand the unified architecture for batch and stream -- Understand the main choices for ML applications -- Understand the differences between snapshots and images -- Don't be Milton! …”
Libro electrónico -
2174Publicado 2018Tabla de Contenidos: “…-- Use cases -- Web apps -- IOT and mobile backends -- Extract, Transform, Load (ETL) -- Data processing -- Real-time processing -- Execution environment -- Environment variables -- Execution context -- AWS Lambda Function-Hello World -- Function code - configuration -- Publishing and testing your changes -- Configuring options for AWS Lambda -- Memory configuration -- Execution time configuration -- Network configuration -- Function versioning and aliases -- Traffic Shifting using aliases -- Environment variables -- Securing AWS Lambda using IAM -- Authenticating -- Access control -- Identity-based policies (IAM policies) -- Resource-based policies (Lambda function policies) -- AWS Lambda permissions model -- Summary -- Chapter 4: Triggers and Events for AWS Lambda -- Triggers for AWS Lambda -- API Gateway Trigger -- AWS IoT Trigger -- IoT Button -- IoT rule -- Alexa trigger -- CloudFront trigger -- CloudWatch trigger -- CloudWatch Events -- CloudWatch Logs -- CodeCommit Trigger -- Cognito Trigger -- Scheduled Events Trigger -- AWS Config Trigger -- DynamoDB Trigger -- Kinesis Trigger -- Amazon Kinesis Data Streams -- Amazon Kinesis Data Firehose -- S3 Trigger…”
Libro electrónico -
2175Publicado 2017Tabla de Contenidos: “…Simplification of current paradigms -- Faster dealings -- Cost saving -- Challenges and limitations of blockchain technology -- Summary -- Chapter 2: Decentralization -- Decentralization using blockchain -- Methods of decentralization -- Disintermediation -- Through competition -- Routes to decentralization -- How to decentralize -- Examples -- Blockchain and full ecosystem decentralization -- Storage -- Communication -- Computation -- Smart contract -- Decentralized organizations -- Decentralized autonomous organizations -- Decentralized autonomous corporations -- Decentralized autonomous societies -- Decentralized applications -- Requirements of a decentralized application -- Operations of a DAPP -- Examples -- KYC-Chain -- OpenBazaar -- Lazooz -- Platforms for decentralization -- Ethereum -- Maidsafe -- Lisk -- Summary -- Chapter 3: Cryptography and Technical Foundations -- Introduction -- Mathematics -- Set -- Group -- Field -- A finite field -- Order -- Prime fields -- Ring -- A cyclic group -- An abelian group -- Modular arithmetic -- Cryptography -- Confidentiality -- Integrity -- Authentication -- Entity authentication -- Data origin authentication -- Non-repudiation -- Accountability -- Cryptographic primitives -- Symmetric cryptography -- Stream ciphers -- Block ciphers -- Block encryption mode -- Keystream generation modes -- Message authentication modes -- Cryptographic hashes -- Electronic code book -- Cipher block chaining -- Counter mode -- Data Encryption Standard (DES) -- Advanced Encryption Standard (AES) -- AES steps -- An OpenSSL example of how to encrypt and decrypt using AES -- Asymmetric cryptography -- Integer factorization -- Discrete logarithm -- Elliptic curves -- Public and private keys -- RSA -- Encryption and decryption using RSA -- Elliptic curve cryptography (ECC) -- Mathematics behind ECC -- Point addition…”
Libro electrónico -
2176Publicado 2017Tabla de Contenidos: “…Acknowledgments -- References -- 5 Recycled synthetic polymer fibers in composites -- Summary points -- 5.1 Introduction -- 5.2 Polymer sourcing, separation, and purification -- 5.2.1 Poly(ethylene terephthalate) -- 5.2.2 High-density polyethylene -- 5.2.3 Polypropylene -- 5.3 Fiber production -- 5.3.1 Poly(ethylene terephthalate) fibers -- 5.3.2 Polypropylene fibers -- 5.3.3 Cellulose fiber separation and purification -- 5.4 Composite formation -- 5.4.1 Polypropylene-cellulose fiber composites -- 5.4.2 Single-polymer fiber-matrix composites -- 5.5 Applications -- 5.6 Future trends -- 5.7 Conclusion -- References -- 6 Clean production -- 6.1 Introduction -- 6.1.1 Environmental quality -- 6.1.2 Social equity -- 6.1.3 Economic prosperity -- 6.2 Energy saving in the manufacture and production of composites -- 6.2.1 Energy tariffs -- 6.2.2 Materials -- 6.2.3 Production processes -- 6.2.3.1 Hydraulics versus electrics in injection molding -- 6.3 Limiting the environmental impact of processing -- 6.3.1 Contact molding -- 6.3.2 Resin infusion under flexible tooling -- 6.3.3 RIFT summary -- 6.3.4 Prepregging (autoclaving) -- 6.3.5 Prepregging/autoclave summary -- 6.3.6 Double RIFT diaphragm forming -- 6.3.7 DRDF summary -- 6.3.8 RTM/RIM -- 6.3.9 Resin transfer molding -- 6.3.10 RTM summary -- 6.3.11 Structural reaction injection molding -- 6.3.12 RRIM/SRIM summary -- 6.4 The use of additives -- 6.4.1 Shrinkage control additives -- 6.4.2 Plasticizers and lubricants -- 6.4.3 Colorants -- 6.4.4 Flame retardants -- 6.4.5 Fillers -- 6.4.6 Biocides and antimicrobials -- 6.5 End-of-life disposal strategies -- 6.5.1 Automotive waste streams -- 6.6 Summary -- 6.7 Future trends -- 6.7.1 Materials -- 6.7.1.1 Fibers -- 6.7.1.2 Matrices -- 6.7.1.3 Methods -- 6.7.1.4 Other factors -- References -- 7 Green composites for the built environment…”
Libro electrónico -
2177Publicado 2017Tabla de Contenidos: “…. -- Chapter 11: Reactive Programming and Data Streams -- Introduction -- Goflow for dataflow programming -- Getting ready -- How to do it... -- How it works... -- Reactive programming with RxGo -- Getting ready -- How to do it... -- How it works... -- Using Kafka with Sarama -- Getting ready -- How to do it... -- How it works... -- Using async producers with Kafka -- Getting ready -- How to do it... -- How it works... -- Connecting Kafka to Goflow -- Getting ready…”
Libro electrónico -
2178por Frenzel, Louis E., JrTabla de Contenidos: “…-- Synchronous Optical Network -- Optical Transport Network -- HOW THE INTERNET WORKS -- WIRELESS NETWORKS -- Wi-Fi -- Bluetooth -- ZigBee -- ISM-Band Radios -- Radio Frequency Identification and Near-Field Communications -- BROADBAND TECHNOLOGY -- Cable TV Connectivity -- Digital Subscriber Lines -- Wireless Broadband -- THE INTERNET OF THINGS -- How Internet of Things Works -- Wireless Technologies of Internet of Things and Machine 2 Machine -- The Issues of Internet of Things -- 10 - Audio Electronics: Digital Voice and Music Dominate -- INTRODUCTION -- THE NATURE OF SOUND -- Microphones -- Speakers -- DIGITAL AUDIO -- Past Recording Media -- Digitizing Sound -- Digital Compression -- How an MP3 Player Works -- The Compact Disc -- AUDIO-VIDEO RECEIVER -- Radio Choices -- Surround Sound -- SPECIAL SOUND APPLICATIONS -- Wireless Speakers and Headphones -- Downloading and Streaming Audio -- Musical Instruments -- Noise-Canceling Earphones -- Sonar -- Hearing Aids -- 11 - Video Technology: TV and Video Is All Digital Now -- INTRODUCTION -- VIDEO FUNDAMENTALS FOR THE IMPATIENT -- Scanning Fundamentals -- Aspect Ratio -- Persistence of Vision -- Analog TV -- Digital TV -- Color Video Principles -- Video Compression -- TV Transmission -- TV Screen Technology -- Summary of Screen Technologies -- 3D TV -- CABLE TELEVISION -- SATELLITE TV -- OVER-THE-TOP TV -- CELL PHONE TV -- CLOSED-CIRCUIT TV -- DIGITAL VIDEO DISCS -- How a DVD Player Works…”
Publicado 2018
Libro electrónico -
2179Publicado 2023Tabla de Contenidos: “…Cover -- Copyright -- Table of Contents -- Preface -- Chapter 1: Introduction to Microservices -- Technical requirements -- My way into microservices -- Benefits of autonomous software components -- Challenges with autonomous software components -- Enter microservices -- A sample microservice landscape -- Defining a microservice -- Challenges with microservices -- Design patterns for microservices -- Service discovery -- Problem -- Solution -- Solution requirements -- Edge server -- Problem -- Solution -- Solution requirements -- Reactive microservices -- Problem -- Solution -- Solution requirements -- Central configuration -- Problem -- Solution -- Solution requirements -- Centralized log analysis -- Problem -- Solution -- Solution requirements -- Distributed tracing -- Problem -- Solution -- Solution requirements -- Circuit breaker -- Problem -- Solution -- Solution requirements -- Control loop -- Problem -- Solution -- Solution requirements -- Centralized monitoring and alarms -- Problem -- Solution -- Solution requirements -- Software enablers -- Other important considerations -- Summary -- Chapter 2: Introduction to Spring Boot -- Technical requirements -- Spring Boot -- Convention over configuration and fat JAR files -- Code examples for setting up a Spring Boot application -- The magic @SpringBootApplication annotation -- Component scanning -- Java-based configuration -- What's new in Spring Boot 3.0 -- Migrating a Spring Boot 2 application -- Spring WebFlux -- Code examples of setting up a REST service -- Starter dependencies -- Property files -- Sample RestController -- springdoc-openapi -- Spring Data -- Entity -- Repositories -- Spring Cloud Stream -- Code examples for sending and receiving messages -- Docker -- Summary -- Questions -- Chapter 3: Creating a Set of Cooperating Microservices -- Technical requirements…”
Libro electrónico -
2180Publicado 2024Tabla de Contenidos: “…The concurrency toolkit - java.util.concurrent -- Threads and executors -- Synchronization and coordination -- Concurrent collections and atomic variables -- Hands-on exercise - implementing a concurrent application using java.util.concurrent tools -- Synchronization and locking mechanisms -- The power of synchronization - protecting critical sections for thread-safe operations -- Beyond the gatekeeper - exploring advanced locking techniques -- Understanding and preventing deadlocks in multi-threaded applications -- Hands-on activity - deadlock detection and resolution -- Employing Future and Callable for result-bearing task execution -- Safe data sharing between concurrent tasks -- Immutable data -- Thread local storage -- Leveraging thread-safe collections to mitigate concurrency issues -- Choosing between concurrent collections and atomic variables -- Concurrent best practices for robust applications -- Summary -- Questions -- Chapter 3: Mastering Parallelism in Java -- Technical requirements -- Unleashing the parallel powerhouse - the Fork/Join framework -- Demystifying Fork/Join - a culinary adventure in parallel programming -- Beyond recursion - conquering complexities with dependencies -- ForkJoinPool.invokeAll() - the maestro of intertwined tasks -- Managing dependencies in the kitchen symphony - a recipe for efficiency -- Fine-tuning the symphony of parallelism - a journey in performance optimization -- The art of granularity control -- Tuning parallelism levels -- Best practices for a smooth performance -- Streamlining parallelism in Java with parallel streams -- Choosing your weapon - a parallel processing showdown in Java -- Unlocking the power of big data with a custom Spliterator -- Benefits and pitfalls of parallelism -- Challenges and solutions in parallel processing…”
Libro electrónico