Mostrando 421 - 440 Resultados de 531 Para Buscar '"throughput"', tiempo de consulta: 0.12s Limitar resultados
  1. 421
    Publicado 2023
    Tabla de Contenidos: “…6.1.3 Diatoms and Their Growth -- 6.1.4 Growth Data Analysis and Growth Parameter Estimation -- 6.2 Simulation Trials -- 6.2.1 Methodology for the Simulation Trials -- 6.2.2 Candidate Methods for Estimating the Specific Growth Rate -- 6.2.3 Simulation Trials Results -- 6.2.3.1 Results with Only the Noise Challenge -- 6.2.3.2 Results when Crashing Occurs -- 6.2.3.3 Results when Censoring Occurs -- 6.2.3.4 Overall Results and Ranking of the Methods -- 6.3 Empirical Example -- 6.4 Conclusions and Recommendations -- References -- Chapter 7 Integrating Metabolic Modeling and High-Throughput Data to Characterize Diatoms Metabolism -- 7.1 Introduction -- 7.2 Characterization of Diatom Genomes -- 7.2.1 Available Genomics Data -- 7.2.2 Computational Tools to Allocate Gene Functions by Subcellular Localization -- 7.3 Metabolic Modeling of Diatoms: Data and Outcomes -- 7.3.1 Using Genomic Information to Build Genome-Scale Metabolic Models -- 7.3.2 Comprehensive Diatom Omic Datasets Are Useful to Constrain Metabolic Models -- 7.3.3 Unraveling New Knowledge About Central Carbon Metabolism of Diatoms -- 7.3.4 Light-Driven Metabolism that Enables Acclimation to High Light Intensities -- 7.4 Modeling Applications to Study Bioproduction and Genome Changes in Diatoms -- 7.4.1 Predicting Diatom-Heterotroph Interactions and Horizontal Gene Transfer Using Community Metabolic Models -- 7.4.2 Optimization and Scale-Up of the Production of Valuable Metabolites -- 7.4.3 Potential for the Study of Proteome Allocation in Diatoms -- 7.5 Conclusions -- References -- Part III: Diatom Motility -- Chapter 8 Modeling the Synchronization of the Movement of Bacillaria paxillifer by a Kuramoto Model with Time Delay -- 8.1 Introduction -- 8.2 Materials and Methods -- 8.3 Time Dependence of the Relative Motion of Adjacent Diatoms…”
    Libro electrónico
  2. 422
    Publicado 2012
    Tabla de Contenidos: “…9.5 Radio Resource Management 124 -- 9.6 Coverage and Capacity 125 -- 9.6.1 Coverage Gain 126 -- 9.6.2 User Throughput Gains 128 -- 9.6.3 Cost Analysis 129 -- 9.7 Relay Enhancements 130 -- 9.8 Summary 132 -- References 132 -- 10 Self-Organizing Networks (SON) 135 /Cinzia Sartori and Harri Holma -- 10.1 Introduction 135 -- 10.2 SON Roadmap in 3GPP Releases 135 -- 10.3 Self-Optimization 137 -- 10.3.1 Mobility Robustness Optimization 137 -- 10.3.2 Mobility Load Balancing 142 -- 10.3.3 Minimization of Drive Tests 142 -- 10.3.4 MDT Management and Reporting 144 -- 10.3.5 Energy Savings 145 -- 10.3.6 eNodeB Overlay 146 -- 10.3.7 Capacity-Limited Network 147 -- 10.3.8 Capacity and Coverage Optimization 148 -- 10.4 Self-Healing 150 -- 10.4.1 Cell Outage Compensation 150 -- 10.5 SON Features in 3GPP Release 11 151 -- 10.6 Summary 151 -- References 152 -- 11 Performance Evaluation 153 /Harri Holma and Klaus Pedersen -- 11.1 Introduction 153 -- 11.2 LTE-Advanced Targets 154 -- 11.2.1 ITU Evaluation Environments 155 -- 11.3 LTE-Advanced Performance Evaluation 156 -- 11.3.1 Peak Data Rates 156 -- 11.3.2 UE Categories 157 -- 11.3.3 ITU Efficiency Evaluation 158 -- 11.3.4 3GPP Efficiency Evaluation 160 -- 11.4 Network Capacity and Coverage 163 -- 11.5 Summary 165 -- References 165 -- 12 Release 11 and Outlook Towards Release 12 166 /Timo Lunttila, Rapeepat Ratasuk, Jun Tan, Amitava Ghosh and Antti Toskala -- 12.1 Introduction 166 -- 12.2 Release 11 LTE-Advanced Content 166 -- 12.3 Advanced LTE UE Receiver 168 -- 12.3.1 Overview of MMSE-MRC and MMSE-IRC Methods 169 -- 12.3.2 Performance of UE Receiver using IRC and its Comparison -- to MRC Receiver for Various DL Transmit Modes 170 -- 12.4 Machine Type Communications 172 -- 12.5 Carrier Aggregation Enhancements 177 -- 12.6 Enhanced Downlink Control Channel 179 -- 12.7 Release 12 LTE-Advanced Outlook 181 -- 12.8 Conclusions 183 -- References 183 -- 13 Coordinated Multipoint Transmission and Reception 184 /Harri Holma, Kari Hooli, Pasi Kinnunen, Troels Kolding, PatrickMarsch and Xiaoyi Wang…”
    Libro electrónico
  3. 423
    Publicado 2012
    Tabla de Contenidos: “…4.1 MAC Layer and Multiple Access Techniques 83 -- 4.2 Queuing Theory 87 -- 4.2.1 Statistical Multiplexing of Packets 87 -- 4.2.2 Queuing Models 92 -- 4.3 Concluding Remarks 106 -- 4.3.1 How Congestion Happens in Tactical Wireless Networks 106 -- 4.3.2 Historical Perspective 107 -- 4.3.3 Remarks Regarding the First Part of the Book 108 -- Bibliography 110 -- Part II THE EVOLUTION OF TACTICAL RADIOS -- 5 Non-IP Tactical Radios and the Move toward IP 113 -- 5.1 Multistep Evolution to the Global Information Grid 113 -- 5.2 Link-16 Waveform 114 -- 5.2.1 Link-16 Messages 119 -- 5.2.2 Link Layer Operations of Link-16 120 -- 5.2.3 JTIDS/LINK-16 Modulation and Coding 120 -- 5.2.4 Enhancements to Link-16 126 -- 5.2.5 Concluding Remarks on Link-16 Waveform 129 -- 5.3 EPLRS Waveform 130 -- 5.4 SINCGARS Waveform 131 -- 5.5 Tactical Internet (TI) 131 -- 5.6 IP Gateways 136 -- 5.6.1 Throughput Efficiency 136 -- 5.6.2 End-to-End Packet Loss 137 -- 5.7 Concluding Remarks 137 -- 5.7.1 What Comes after the GIG? …”
    Libro electrónico
  4. 424
    Publicado 2024
    Tabla de Contenidos: “…2.7.3 Significance to Crystallization and Downstream Operations -- 2.8 Adsorption, Hygroscopicity, and Deliquesce -- 2.8.1 Phase Diagram -- 2.8.2 Measurement -- 2.8.3 Significance to Crystallization and Downstream Operations -- 2.9 Crystal Morphology -- 2.9.1 General Observations -- 2.9.2 Measurement and Prediction -- 2.9.3 Significance to Crystallization and Downstream Operations -- 2.10 Partical Size Distribution and Surface Area -- 2.10.1 Particle Distribution Definition -- 2.10.2 Measurement -- 2.10.3 Significance to Crystallization and Downstream Operations -- Chapter 3 Polymorphism -- 3.1 Phase Rule -- 3.2 Phase Transition -- 3.2.1 Enantiotropy and Monotropy -- 3.2.2 Metastable Equilibrium and Suspended Transformation -- 3.2.3 Measurement -- 3.3 Prediction of Crystal Structure and its Formation -- 3.3.1 Equilibrium Approach -- 3.3.2 Kinetic Approach -- 3.4 Selection and Screening of Crystal Forms -- 3.4.1 Selection Criteria -- 3.4.2 Candidates for Forming Salts and Co-crystals -- 3.4.3 High Throughput and Process-Based Screening -- 3.5 Examples -- EXAMPLE 3.1 -- EXAMPLE 3.2 -- EXAMPLE 3.3 -- EXAMPLE 3.4 -- EXAMPLE 3.5 -- EXAMPLE 3.6 -- EXAMPLE 3.7 -- EXAMPLE 3.8 -- EXAMPLE 3.9 -- Chapter 4 Kinetics -- 4.1 SUPERSATURATION AND RATE PROCESSES -- 4.2 Nucleation -- 4.2.1 Homogeneous Nucleation -- 4.2.2 Heterogeneous Nucleation -- 4.2.3 Secondary Nucleation -- 4.3 Crystal Growth and Agglomeration -- 4.3.1 Crystal Growth Mechanisms -- 4.3.2 Agglomeration Mechanism -- 4.3.3 Measurement of Crystal Growth Rate -- 4.3.4 Crystal Population Balance -- 4.4 Nucleate/Seed Aging and Ostwald Ripening -- 4.5 DELIVERED PRODUCT: PURITY, CYSTAL FORM, SIZE AND MORPHOLOGY, AND CHEMICAL and PHYSICAL STABILITY -- 4.6 Design of Experiment (DOE)-Model-Based Approach -- 4.7 Model-Free Feedback Control -- Chapter 5 Mixing and Crystallization -- 5.1 INTRODUCTION…”
    Libro electrónico
  5. 425
    Publicado 2018
    “…The second provides an overview of the wide variety of materials that can be used for laser transfer processing, while the final section comprehensively discusses a number of practical uses, including printing of electronic materials, printing of 3D structures as well as large-area, high-throughput applications. The book is rounded off by a look at the future for laser printed materials. …”
    Libro electrónico
  6. 426
    Publicado 2018
    Tabla de Contenidos: “…-- 7.1.2 Traf c and Performance Measures -- 7.1.3 Characterizing Traf c -- 7.1.4 Average Delay in a Single Link System -- 7.1.5 Nonstationarity of Traf c -- 7.2 Applications' View -- 7.2.1 TCP Throughput and Possible Bottlenecks -- 7.2.2 Bandwidth-Delay Product -- 7.2.3 Router Buffer Size -- 7.3 Traf c Engineering: An Architectural Framework -- 7.4 Traf c Engineering: A Four-Node Illustration -- 7.4.1 Network Flow Optimization -- 7.4.2 Shortest Path Routing and Network Flow -- 7.5 IGP Metric (Link Weight) Determination Problem for the Load Balancing Objective: Preliminary Discussion -- 7.6 Determining IGP Link Weights via duality of MCNF Problems -- 7.6.1 Illustration of Duality Through a Three-Node Network for Minimum Cost Routing -- 7.6.2 Minimum Cost Routing, Duality, and Link Weights -- 7.6.3 Illustration of Duality Through a Three-Node Network for the Load Balancing Objective -- 7.6.4 Load Balancing Problem, duality, and Link Weights -- 7.6.5 A Composite Objective Function, duality, and Link Weights -- 7.6.6 Minimization of Average Delay, duality, and Link Weights -- 7.7 Illustration of Link Weight Determination through Duality -- 7.7.1 Case Study: I -- 7.7.2 Case Study: II -- 7.8 Link Weight Determination: Large Networks -- 7.9 IP Traf c Engineering of PoP-to-DataCenter Networks -- 7.10 Summary -- Further Lookup -- Exercises -- 8 Multicast Routing -- 8.1 Multicast IP Addressing -- 8.2 Internet Group Management Protocol (IGMP) -- 8.3 Multicast Listener Discovery Protocol (MLD) -- 8.4 Reverse Path Forwarding (RPF) -- 8.5 Distance Vector Multicast Routing Protocol (DVMRP) -- 8.6 Multicast OSPF -- 8.7 Core Based Trees…”
    Libro electrónico
  7. 427
    Publicado 2019
    Tabla de Contenidos: “…1.4 Benefits of Using Linux -- 1.4.1 Free of Cost -- 1.4.2 Time to Market -- 1.4.3 No "Vendor Lock-in" -- 1.4.4 Highly Stable Operating System -- 1.4.5 Low Maintenance -- 1.4.5.1 Supporting Software Releases After Shipping the Product -- 1.4.5.2 Keeping Your Own Drivers up to Date With the Latest Kernel -- 1.5 Linux Architecture -- 1.5.1 Linux Kernel Components -- 1.5.1.1 Device Driver Framework -- 1.5.1.2 Schedulers -- 1.5.1.3 Interrupt -- 1.5.1.4 Memory Management -- 1.5.1.5 Communication Protocol Stack -- 1.5.1.6 User Interface (UI) -- 1.6 Build Environment -- 1.6.1 Kernel Compilation -- 1.6.2 Root Filesystem -- 1.6.2.1 Yocto -- 1.7 Customizing Linux -- 1.7.1 Low Memory Footprint -- 1.7.2 Boot Performance -- 1.7.3 High Throughput Performance -- 1.7.3.1 Core Affinity -- 1.7.3.2 Interrupt Coalescing -- 1.7.3.3 User Space Mapping of Buffers -- 1.7.3.4 User Space Drivers -- 1.7.4 Latencies -- 1.8 Linux Development and its Open-Source Ecosystem -- 1.8.1 Linux Versions -- 1.8.2 Long-Term Support (LTS) Linux Version -- 1.8.3 Related Open-Source Communities -- 1.8.3.1 Linux Foundation -- 1.8.3.2 Linaro -- 1.8.4 Linux-Based Distributions -- 1.8.4.1 Android -- 1.8.4.2 Ubuntu -- 1.9 Coding Guidelines -- 1.10 Code Review in the Upstream Community -- 1.11 License -- 2 U-Boot -- 2.1 U-Boot and its Applicability to Several Types of Devices -- 2.2 Major Features of U-Boot -- 2.2.1 Multiple Boot Source Support -- 2.2.2 Shell (User Interface) -- 2.2.3 Environment Variables -- 2.2.4 Scripts -- 2.2.5 Stand-Alone Applications -- 2.2.6 Operating System Boot Commands -- 2.2.7 Autoboot -- 2.2.8 Sandbox U-Boot -- 2.3 U-Boot Directory Organization -- 2.4 U-Boot Architecture and Memory Footprint -- 2.4.1 Single-Stage Boot Loader -- 2.4.2 Two-Stage Boot Loader -- 2.5 Fast Boot Approach -- 2.6 Secure Boot…”
    Libro electrónico
  8. 428
    Publicado 2018
    Tabla de Contenidos: “…8.7.7 Filtering using queries -- 8.7.8 Discarding data with projection -- 8.7.9 Sorting large data sets -- 8.8 Achieving better data throughput -- 8.8.1 Optimize your code -- 8.8.2 Optimize your algorithm -- 8.8.3 Processing data in parallel -- Summary -- Chapter 9: Practical data analysis -- 9.1 Expanding your toolkit -- 9.2 Analyzing the weather data -- 9.3 Getting the code and data -- 9.4 Basic data summarization -- 9.4.1 Sum -- 9.4.2 Average -- 9.4.3 Standard deviation -- 9.5 Group and summarize -- 9.6 The frequency distribution of temperatures -- 9.7 Time series -- 9.7.1 Yearly average temperature -- 9.7.2 Rolling average -- 9.7.3 Rolling standard deviation -- 9.7.4 Linear regression -- 9.7.5 Comparing time series -- 9.7.6 Stacking time series operations -- 9.8 Understanding relationships -- 9.8.1 Detecting correlation with a scatter plot -- 9.8.2 Types of correlation -- 9.8.3 Determining the strength of the correlation -- 9.8.4 Computing the correlation coefficient -- Summary -- Chapter 10: Browser-based visualization -- 10.1 Expanding your toolkit -- 10.2 Getting the code and data -- 10.3 Choosing a chart type -- 10.4 Line chart for New York City temperature -- 10.4.1 The most basic C3 line chart -- 10.4.2 Adding real data -- 10.4.3 Parsing the static CSV file -- 10.4.4 Adding years as the X axis -- 10.4.5 Creating a custom Node.js web server -- 10.4.6 Adding another series to the chart -- 10.4.7 Adding a second Y axis to the chart -- 10.4.8 Rendering a time series chart -- 10.5 Other chart types with C3 -- 10.5.1 Bar chart -- 10.5.2 Horizontal bar chart -- 10.5.3 Pie chart -- 10.5.4 Stacked bar chart -- 10.5.5 Scatter plot chart -- 10.6 Improving the look of our charts -- 10.7 Moving forward with your own projects -- Summary -- Chapter 11: Server-side visualization -- 11.1 Expanding your toolkit -- 11.2 Getting the code and data…”
    Libro electrónico
  9. 429
    Publicado 2022
    Tabla de Contenidos: “…3.3 Extended Defects in Homoepitaxial Layers -- 3.3.1 Classification of Extended Defects According to Glide Systems in 4H‐SiC -- 3.3.2 Dislocation Reactions During Epitaxial Growth -- 3.3.3 Characterization Methods for Extended Defects in 4H‐SiC Epilayers -- 3.4 Point Defects and Carrier Lifetime in Epilayers -- 3.4.1 Classification and General Properties of Point Defects in 4H‐SiC -- 3.4.2 Basics on Recombination Carrier Lifetime in 4H‐SiC -- 3.4.3 Carrier Lifetime‐Affecting Point Defects -- 3.4.4 Carrier Lifetime Measurement in Epiwafers and Devices -- 3.5 Conclusion -- Acknowledgments -- References -- Chapter 4 Industrial Perspective of SiC Epitaxy -- 4.1 Introduction -- 4.2 Background -- 4.3 The Basics of SiC Epitaxy -- 4.4 SiC Epi Historical Origins -- 4.5 Planetary Multi‐wafer Epitaxial Reactor Design Considerations -- 4.5.1 Rapidly Rotating Reactors -- 4.5.2 Horizontal Hot‐Wall Reactors -- 4.6 Latest High‐Throughput Epitaxial Reactor Status -- 4.7 Benefits and Challenges for Increasing Growth Rate in all Reactors -- 4.8 Increasing Wafer Diameters, Device Processing Considerations, and Projections -- 4.9 Summary -- Acknowledgment -- References -- Chapter 5 Status of 3C‐SiC Growth and Device Technology -- 5.1 Introduction, Motivation, Short Review on 3C‐SiC -- 5.2 Nucleation and Epitaxial Growth of 3C‐SC on Si -- 5.2.1 Growth Process -- 5.2.2 Defects -- 5.2.3 Stress -- 5.3 Bulk Growth of 3C‐SiC -- 5.3.1 Sublimation Growth of (111)‐oriented 3C‐SiC on Hexagonal SiC Substrates -- 5.3.2 Sublimation Growth of 3C‐SiC on 3C‐SiC CVD Seeding Layers -- 5.3.3 Continuous Fast CVD Growth of 3C‐SiC on 3C‐SiC CVD Seeding Layers -- 5.4 Processing and Testing of 3C‐SiC Based Power Electronic Devices -- 5.4.1 Prospects for 3C‐SiC Power Electronic Devices -- 5.4.2 3C‐SiC Device Processing -- 5.4.3 MOS Processing -- 5.4.4 3C‐SiC/SiO2 Interface Passivation…”
    Libro electrónico
  10. 430
    Publicado 2022
    Tabla de Contenidos: “…-- EXAMPLE 1 EXAMPLES -- EXAMPLES -- CONCLUSIONS EXERCISE 1 -- EXERCISES -- EXERCISE 2 EXERCISE 3 -- PROCESS PERFORMANCE -- BACKGROUND -- PROCESS PERFORMANCE BACKGROUND -- PROCESS PERFORMANCE -- PROCESS PERFORMANCE PROCESS PERFORMANCE -- INDICATORS PROCESS YIELD -- PROCESS PERFORMANCE PROCESS YIELD -- ROLLED THROUGHPUT YIELD (RTY)…”
    Libro electrónico
  11. 431
    Publicado 2018
    Tabla de Contenidos: “…-- Using Docker with .NET Core -- Running Docker images -- Summary -- Monitoring Application Performance Using Tools -- Application performance key metrics -- Average response time -- Apdex scores -- Percentage of errors -- Request rate -- Throughput/endpoints -- CPU and memory usage…”
    Libro electrónico
  12. 432
    Publicado 2015
    Tabla de Contenidos: “…Logical Segmentation -- Network Services -- Wireless Networks -- Remote Access -- Performance Considerations -- Latency and Jitter -- Bandwidth and Throughput -- Type of Service, Class of Service, and Quality of Service -- Network Hops -- Network Security Controls -- Safety Instrumented Systems -- Special Considerations -- Wide Area Connectivity -- Smart Grid Network Considerations…”
    Libro electrónico
  13. 433
    Publicado 2025
    Tabla de Contenidos: “…5.7 Implementing Time Synchronization in the CR-IoV -- 5.7.1 Mathematical Model -- 5.7.2 Simulation -- 5.7.3 Experimentation -- 5.7.4 Mathematical Analysis -- 5.8 Summary -- References -- 6 Data Science Applications, Approaches, and Challenges in Cognitive Radio-Based IoV Systems -- 6.1 Introduction -- 6.2 Data Science -- 6.3 Data Science Approaches and Applications in the CR-IoV -- 6.3.1 Data Science Approaches -- 6.3.2 Applications of the CR-IoV -- 6.4 Challenges and Issues -- 6.4.1 Understanding of Learning -- 6.4.2 Computing Systems for Data-Intensive Applications -- 6.4.3 Incomplete Data or Data Noise -- 6.4.4 Heterogeneous Data Sources -- 6.4.5 Privacy and Data Security -- 6.4.6 Precious Data -- 6.4.7 Causal Reasoning -- 6.4.8 Trustworthy AI -- 6.5 Conclusion -- References -- Section 5 Security and Quality of Service -- 7 Security Threats and Counter Measures in the Internet of Vehicles -- 7.1 Introduction -- 7.2 Security Threats in the IoV -- 7.2.1 Attacks on Confidentiality of IoV Communication -- 7.2.2 Attacks on Integrity of IoV Communication -- 7.2.3 Attacks on Availability of IoV Communication -- 7.3 Solutions to Security Threats in the IoV -- 7.3.1 Counter Measures for Confidentiality of Information -- 7.3.2 Counter Measures on Integrity of Information -- 7.3.3 Counter Measures on Availability Attacks -- 7.4 Conclusion -- References -- 8 QoS Provisioning in CR-Based IoV -- 8.1 QoS Requirements of IoV Applications -- 8.1.1 Vehicle Platooning -- 8.1.2 Sensor and State Map Sharing -- 8.1.3 Remote Driving -- 8.1.4 Advanced Driving -- 8.2 Priority-Wise Classification of Data -- 8.2.1 Latency, Throughput, and Data Type Considerations -- 8.2.2 Priority Classes -- 8.3 Transmission Scheduling Process -- 8.4 QoS-Aware Cognitive Communication -- 8.4.1 Concept of a Hybrid NB/WB Waveform -- 8.4.2 Hybrid Cognitive Module -- 8.5 Conclusion…”
    Libro electrónico
  14. 434
    Publicado 2022
    Tabla de Contenidos: “…6.1 Building blocks for modern concurrent applications -- 6.2 Atomic classes -- 6.3 Lock classes -- 6.3.1 Condition objects -- 6.4 CountDownLatch -- 6.5 ConcurrentHashMap -- 6.5.1 Understanding a simplified HashMap -- 6.5.2 Limitations of Dictionary -- 6.5.3 Approaches to a concurrent Dictionary -- 6.5.4 Using ConcurrentHashMap -- 6.6 CopyOnWriteArrayList -- 6.7 Blocking queues -- 6.7.1 Using BlockingQueue APIs -- 6.7.2 Using WorkUnit -- 6.8 Futures -- 6.8.1 CompletableFuture -- 6.9 Tasks and execution -- 6.9.1 Modeling tasks -- 6.9.2 Executors -- 6.9.3 Single-threaded executor -- 6.9.4 Fixed-thread pool -- 6.9.5 Cached thread pool -- 6.9.6 ScheduledThreadPoolExecutor -- Summary -- 7 Understanding Java performance -- 7.1 Performance terminology: Some basic definitions -- 7.1.1 Latency -- 7.1.2 Throughput -- 7.1.3 Utilization -- 7.1.4 Efficiency -- 7.1.5 Capacity -- 7.1.6 Scalability -- 7.1.7 Degradation -- 7.2 A pragmatic approach to performance analysis -- 7.2.1 Know what you're measuring -- 7.2.2 Know how to take measurements -- 7.2.3 Know what your performance goals are -- 7.2.4 Know when to stop -- 7.2.5 Know the cost of achieving higher performance -- 7.2.6 Know the dangers of premature optimization -- 7.3 What went wrong? …”
    Libro electrónico
  15. 435
    Publicado 2018
    Tabla de Contenidos: “…Chapter 4: Endpoint Security and Trustworthiness -- Defining an IIoT endpoint -- Motivation and risk-based endpoint protection -- Resource-constrained endpoint protection -- Brownfield scenario considerations -- Endpoint security enabling technologies -- IIoT endpoint vulnerabilities -- Case study - White hack exposes smart grid meter vulnerability -- Use case -- Developing the exploit -- Demonstration -- Establishing trust in hardware -- Hardware security components -- Root of trust - TPM, TEE, and UEFI -- Securing secrets, or sealing -- Endpoint identity and access control -- Initialization and boot process integrity -- Establishing endpoint trust during operations -- Secure updates -- A trustworthy execution ecosystem -- Endpoint data integrity -- Endpoint configuration and management -- Endpoint visibility and control -- Endpoint security using isolation techniques -- Process isolation -- Container isolation -- Virtual isolation -- Physical isolation -- Endpoint physical security -- Machine learning enabled endpoint security -- Endpoint security testing and certification -- Endpoint protection industry standards -- Summary -- Chapter 5: Securing Connectivity and Communications -- Definitions - networking, communications, and connectivity -- Distinguishing features of IIoT connectivity -- Deterministic behavior -- Interoperability - proprietary versus open standards -- Performance characteristics - latency, jitter, and throughput -- Legacy networks with disappearing air gaps -- Access to resource-constrained networks -- Massive transition by connecting the unconnected -- IIoT connectivity architectures -- Multi-tier IIoT-secured connectivity architecture -- Layered databus architecture -- Controls for IIoT connectivity protection -- Secure tunnels and VPNs -- Cryptography controls -- Network segmentation -- Industrial demilitarized zones…”
    Libro electrónico
  16. 436
    Publicado 2018
    Tabla de Contenidos: “…-- Example block data -- Example Ethereum block -- Bitcoin block -- Global state -- Block time and block size -- Blockchain miners -- Blockchain validators -- Smart contracts -- Blockchain speed -- How to calculate blockchain throughput -- Comparisons with traditional networks -- Summary -- Chapter 3: Decentralization Versus Distributed Systems -- Distributed systems -- Resiliency -- Fault tolerance and failure isolation -- Consensus and coordination -- Backups -- Consistency -- Peer-to-peer systems -- Decentralized systems -- Principles of decentralized systems -- Open access -- Non-hierarchical -- Ecosystem diversity -- Transparency -- Downsides -- Speed -- Censorship resistance -- Chaos and non-determinism -- Summary -- Chapter 4: Cryptography and Mechanics Behind Blockchain -- Principles of security -- Historical perspective - classical cryptography…”
    Libro electrónico
  17. 437
    Publicado 2023
    Tabla de Contenidos: “…Understanding how data warehouses are different from databases -- Significance of ETL in data warehouse -- Learning about BigQuery -- Features of BigQuery -- Setting up and configuring a fully managed data warehouse with BigQuery -- Enabling BigQuery from the console -- Creating a BigQuery dataset -- Using an existing public dataset -- Creating a table in the dataset -- Performing simple analytics -- Summary of operational aspects and design considerations -- Summary -- Part 3: Semi-Structured, Unstructured Data, and NoSQL Design -- 6 -- Designing for Semi-Structured Data -- Semi-structured data -- Pros and cons of semi-structured data -- Use cases of semi-structured data -- NoSQL for semi-structured data -- Data structures supported by NoSQL databases -- Firestore and its features -- Setting up Firestore -- Collection -- Document -- Subcollection -- Security -- Client libraries and APIs -- Indexing -- Single-field index -- Composite index -- Collection group query -- Data model considerations -- Hierarchical format -- Denormalized format -- Easy querying with RunQuery API -- API endpoint and method -- The parent parameter -- JSON body format -- StructuredQuery -- The from clause -- The where clause -- Putting the pieces together -- Implementing RunQuery API programmatically -- Summary -- 7 -- Unstructured Data Management -- Use cases -- Processing unstructured data -- Storage options in Google Cloud -- Cloud Storage, classes, and features -- Unstructured data storage with BigQuery -- External sources -- External connections -- Unstructured data analytics with BigQuery -- Summary -- Part 4: DevOps and Databases -- 8 -- DevOps and Databases -- Upgrades, updates, and patching -- Security, privacy, and encryption -- Replication and availability -- Scalability -- Performance and throughput -- SLA, SLI, and SLO -- Data federation…”
    Libro electrónico
  18. 438
    por Shore, James
    Publicado 2008
    Tabla de Contenidos: “…Outsourced Custom Development -- Vertical-Market Software -- Horizontal-Market Software -- Questions -- Results -- Contraindications -- Alternatives -- Ubiquitous Language -- The Domain Expertise Conundrum -- Two Languages -- How to Speak the Same Language -- Ubiquitous Language in Code -- Refining the Ubiquitous Language -- Questions -- Results -- Contraindications -- Alternatives -- Further Reading -- Stand-Up Meetings -- How to Hold a Daily Stand-Up Meeting -- Be Brief -- Questions -- Results -- Contraindications -- Alternatives -- Further Reading -- Coding Standards -- Beyond Formatting -- How to Create a Coding Standard -- Dealing with Disagreement -- Adhering to the Standard -- Questions -- Results -- Contraindications -- Alternatives -- Iteration Demo -- How to Conduct an Iteration Demo -- Two Key Questions -- Weekly Deployment Is Essential -- Questions -- Results -- Contraindications -- Alternatives -- Reporting -- Types of Reports -- Progress Reports to Provide -- Vision statement -- Weekly demo -- Release and iteration plans -- Burn-up chart -- Progress Reports to Consider -- Roadmap -- Status email -- Management Reports to Consider -- Productivity -- Throughput -- Defects -- Time usage -- Reports to Avoid -- Source lines of code (SLOC) and function points -- Number of stories -- Velocity -- Code quality -- Questions -- Results -- Contraindications -- Alternatives -- Further Reading -- Chapter 7. …”
    Libro electrónico
  19. 439
    Publicado 2018
    Tabla de Contenidos: “…-- Running threads extending Thread -- Implementing Runnable -- Runing threads implementing Runnable -- Extending Thread vs implementing Runnable -- How to execute the main(String[]) method -- Using IDE -- Command line with classes on classpath -- Command line with a .jar file on classpath -- Command line with an executable .jar file -- Garbage collection -- Responsiveness, throughput, and stop-the-world -- Object age and generations -- When stop-the-world is unavoidable -- Exercise - Monitoring JVM while running an application -- Answer -- Summary -- Chapter 12: Java Standard and External Libraries -- What are standard and external libraries? …”
    Libro electrónico
  20. 440
    Publicado 2024
    Tabla de Contenidos: “…-- Building serverless architecture -- Considerations for serverless architecture -- Building stateless and stateful architectural designs -- Stateful architecture -- Stateless architecture -- Creating a microservice architecture -- Saga pattern -- Fan-out/fan-in pattern -- Service mesh pattern -- Reactive architecture -- Building queue-based architecture -- Queuing chain pattern -- Job observer pattern -- Pipes-and-Filters Architecture -- Creating Event-Driven Architecture -- Publisher/subscriber model -- Event stream model -- Backend for Frontend pattern -- Cloud-native architecture anti-patterns -- Single point of failure -- Manual scaling -- Tightly coupled services -- Ignoring security best practices -- Not monitoring or logging -- Ignoring network latency -- Lack of testing -- Over-optimization -- Not considering costs -- Summary -- Chapter 6: Performance Considerations -- Design principles for high-performance architecture -- Reducing latency -- Improving throughput -- Handling concurrency -- Applying caching…”
    Libro electrónico