Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 32
- Application software 28
- Cloud computing 26
- Computer networks 24
- Database management 23
- Research & information: general 23
- Engineering & Applied Sciences 22
- Management 17
- Computer Science 15
- Electronic data processing 14
- Java (Computer program language) 14
- Wireless communication systems 14
- Biology, life sciences 13
- Client/server computing 13
- Design and construction 12
- Medicine 12
- Computer software 11
- Technology: general issues 11
- machine learning 11
- Information technology 10
- Software engineering 10
- Web services 10
- high-throughput sequencing 10
- Artificial intelligence 9
- Computer programming 9
- Data processing 9
- Telecommunication 9
- Computer architecture 8
- Database Management 8
- Electrical & Computer Engineering 8
-
421Publicado 2023Tabla de Contenidos: “…6.1.3 Diatoms and Their Growth -- 6.1.4 Growth Data Analysis and Growth Parameter Estimation -- 6.2 Simulation Trials -- 6.2.1 Methodology for the Simulation Trials -- 6.2.2 Candidate Methods for Estimating the Specific Growth Rate -- 6.2.3 Simulation Trials Results -- 6.2.3.1 Results with Only the Noise Challenge -- 6.2.3.2 Results when Crashing Occurs -- 6.2.3.3 Results when Censoring Occurs -- 6.2.3.4 Overall Results and Ranking of the Methods -- 6.3 Empirical Example -- 6.4 Conclusions and Recommendations -- References -- Chapter 7 Integrating Metabolic Modeling and High-Throughput Data to Characterize Diatoms Metabolism -- 7.1 Introduction -- 7.2 Characterization of Diatom Genomes -- 7.2.1 Available Genomics Data -- 7.2.2 Computational Tools to Allocate Gene Functions by Subcellular Localization -- 7.3 Metabolic Modeling of Diatoms: Data and Outcomes -- 7.3.1 Using Genomic Information to Build Genome-Scale Metabolic Models -- 7.3.2 Comprehensive Diatom Omic Datasets Are Useful to Constrain Metabolic Models -- 7.3.3 Unraveling New Knowledge About Central Carbon Metabolism of Diatoms -- 7.3.4 Light-Driven Metabolism that Enables Acclimation to High Light Intensities -- 7.4 Modeling Applications to Study Bioproduction and Genome Changes in Diatoms -- 7.4.1 Predicting Diatom-Heterotroph Interactions and Horizontal Gene Transfer Using Community Metabolic Models -- 7.4.2 Optimization and Scale-Up of the Production of Valuable Metabolites -- 7.4.3 Potential for the Study of Proteome Allocation in Diatoms -- 7.5 Conclusions -- References -- Part III: Diatom Motility -- Chapter 8 Modeling the Synchronization of the Movement of Bacillaria paxillifer by a Kuramoto Model with Time Delay -- 8.1 Introduction -- 8.2 Materials and Methods -- 8.3 Time Dependence of the Relative Motion of Adjacent Diatoms…”
Libro electrónico -
422Publicado 2012Tabla de Contenidos: “…9.5 Radio Resource Management 124 -- 9.6 Coverage and Capacity 125 -- 9.6.1 Coverage Gain 126 -- 9.6.2 User Throughput Gains 128 -- 9.6.3 Cost Analysis 129 -- 9.7 Relay Enhancements 130 -- 9.8 Summary 132 -- References 132 -- 10 Self-Organizing Networks (SON) 135 /Cinzia Sartori and Harri Holma -- 10.1 Introduction 135 -- 10.2 SON Roadmap in 3GPP Releases 135 -- 10.3 Self-Optimization 137 -- 10.3.1 Mobility Robustness Optimization 137 -- 10.3.2 Mobility Load Balancing 142 -- 10.3.3 Minimization of Drive Tests 142 -- 10.3.4 MDT Management and Reporting 144 -- 10.3.5 Energy Savings 145 -- 10.3.6 eNodeB Overlay 146 -- 10.3.7 Capacity-Limited Network 147 -- 10.3.8 Capacity and Coverage Optimization 148 -- 10.4 Self-Healing 150 -- 10.4.1 Cell Outage Compensation 150 -- 10.5 SON Features in 3GPP Release 11 151 -- 10.6 Summary 151 -- References 152 -- 11 Performance Evaluation 153 /Harri Holma and Klaus Pedersen -- 11.1 Introduction 153 -- 11.2 LTE-Advanced Targets 154 -- 11.2.1 ITU Evaluation Environments 155 -- 11.3 LTE-Advanced Performance Evaluation 156 -- 11.3.1 Peak Data Rates 156 -- 11.3.2 UE Categories 157 -- 11.3.3 ITU Efficiency Evaluation 158 -- 11.3.4 3GPP Efficiency Evaluation 160 -- 11.4 Network Capacity and Coverage 163 -- 11.5 Summary 165 -- References 165 -- 12 Release 11 and Outlook Towards Release 12 166 /Timo Lunttila, Rapeepat Ratasuk, Jun Tan, Amitava Ghosh and Antti Toskala -- 12.1 Introduction 166 -- 12.2 Release 11 LTE-Advanced Content 166 -- 12.3 Advanced LTE UE Receiver 168 -- 12.3.1 Overview of MMSE-MRC and MMSE-IRC Methods 169 -- 12.3.2 Performance of UE Receiver using IRC and its Comparison -- to MRC Receiver for Various DL Transmit Modes 170 -- 12.4 Machine Type Communications 172 -- 12.5 Carrier Aggregation Enhancements 177 -- 12.6 Enhanced Downlink Control Channel 179 -- 12.7 Release 12 LTE-Advanced Outlook 181 -- 12.8 Conclusions 183 -- References 183 -- 13 Coordinated Multipoint Transmission and Reception 184 /Harri Holma, Kari Hooli, Pasi Kinnunen, Troels Kolding, PatrickMarsch and Xiaoyi Wang…”
Libro electrónico -
423Publicado 2012Tabla de Contenidos: “…4.1 MAC Layer and Multiple Access Techniques 83 -- 4.2 Queuing Theory 87 -- 4.2.1 Statistical Multiplexing of Packets 87 -- 4.2.2 Queuing Models 92 -- 4.3 Concluding Remarks 106 -- 4.3.1 How Congestion Happens in Tactical Wireless Networks 106 -- 4.3.2 Historical Perspective 107 -- 4.3.3 Remarks Regarding the First Part of the Book 108 -- Bibliography 110 -- Part II THE EVOLUTION OF TACTICAL RADIOS -- 5 Non-IP Tactical Radios and the Move toward IP 113 -- 5.1 Multistep Evolution to the Global Information Grid 113 -- 5.2 Link-16 Waveform 114 -- 5.2.1 Link-16 Messages 119 -- 5.2.2 Link Layer Operations of Link-16 120 -- 5.2.3 JTIDS/LINK-16 Modulation and Coding 120 -- 5.2.4 Enhancements to Link-16 126 -- 5.2.5 Concluding Remarks on Link-16 Waveform 129 -- 5.3 EPLRS Waveform 130 -- 5.4 SINCGARS Waveform 131 -- 5.5 Tactical Internet (TI) 131 -- 5.6 IP Gateways 136 -- 5.6.1 Throughput Efficiency 136 -- 5.6.2 End-to-End Packet Loss 137 -- 5.7 Concluding Remarks 137 -- 5.7.1 What Comes after the GIG? …”
Libro electrónico -
424Publicado 2024Tabla de Contenidos: “…2.7.3 Significance to Crystallization and Downstream Operations -- 2.8 Adsorption, Hygroscopicity, and Deliquesce -- 2.8.1 Phase Diagram -- 2.8.2 Measurement -- 2.8.3 Significance to Crystallization and Downstream Operations -- 2.9 Crystal Morphology -- 2.9.1 General Observations -- 2.9.2 Measurement and Prediction -- 2.9.3 Significance to Crystallization and Downstream Operations -- 2.10 Partical Size Distribution and Surface Area -- 2.10.1 Particle Distribution Definition -- 2.10.2 Measurement -- 2.10.3 Significance to Crystallization and Downstream Operations -- Chapter 3 Polymorphism -- 3.1 Phase Rule -- 3.2 Phase Transition -- 3.2.1 Enantiotropy and Monotropy -- 3.2.2 Metastable Equilibrium and Suspended Transformation -- 3.2.3 Measurement -- 3.3 Prediction of Crystal Structure and its Formation -- 3.3.1 Equilibrium Approach -- 3.3.2 Kinetic Approach -- 3.4 Selection and Screening of Crystal Forms -- 3.4.1 Selection Criteria -- 3.4.2 Candidates for Forming Salts and Co-crystals -- 3.4.3 High Throughput and Process-Based Screening -- 3.5 Examples -- EXAMPLE 3.1 -- EXAMPLE 3.2 -- EXAMPLE 3.3 -- EXAMPLE 3.4 -- EXAMPLE 3.5 -- EXAMPLE 3.6 -- EXAMPLE 3.7 -- EXAMPLE 3.8 -- EXAMPLE 3.9 -- Chapter 4 Kinetics -- 4.1 SUPERSATURATION AND RATE PROCESSES -- 4.2 Nucleation -- 4.2.1 Homogeneous Nucleation -- 4.2.2 Heterogeneous Nucleation -- 4.2.3 Secondary Nucleation -- 4.3 Crystal Growth and Agglomeration -- 4.3.1 Crystal Growth Mechanisms -- 4.3.2 Agglomeration Mechanism -- 4.3.3 Measurement of Crystal Growth Rate -- 4.3.4 Crystal Population Balance -- 4.4 Nucleate/Seed Aging and Ostwald Ripening -- 4.5 DELIVERED PRODUCT: PURITY, CYSTAL FORM, SIZE AND MORPHOLOGY, AND CHEMICAL and PHYSICAL STABILITY -- 4.6 Design of Experiment (DOE)-Model-Based Approach -- 4.7 Model-Free Feedback Control -- Chapter 5 Mixing and Crystallization -- 5.1 INTRODUCTION…”
Libro electrónico -
425Publicado 2018“…The second provides an overview of the wide variety of materials that can be used for laser transfer processing, while the final section comprehensively discusses a number of practical uses, including printing of electronic materials, printing of 3D structures as well as large-area, high-throughput applications. The book is rounded off by a look at the future for laser printed materials. …”
Libro electrónico -
426Publicado 2018Tabla de Contenidos: “…-- 7.1.2 Traf c and Performance Measures -- 7.1.3 Characterizing Traf c -- 7.1.4 Average Delay in a Single Link System -- 7.1.5 Nonstationarity of Traf c -- 7.2 Applications' View -- 7.2.1 TCP Throughput and Possible Bottlenecks -- 7.2.2 Bandwidth-Delay Product -- 7.2.3 Router Buffer Size -- 7.3 Traf c Engineering: An Architectural Framework -- 7.4 Traf c Engineering: A Four-Node Illustration -- 7.4.1 Network Flow Optimization -- 7.4.2 Shortest Path Routing and Network Flow -- 7.5 IGP Metric (Link Weight) Determination Problem for the Load Balancing Objective: Preliminary Discussion -- 7.6 Determining IGP Link Weights via duality of MCNF Problems -- 7.6.1 Illustration of Duality Through a Three-Node Network for Minimum Cost Routing -- 7.6.2 Minimum Cost Routing, Duality, and Link Weights -- 7.6.3 Illustration of Duality Through a Three-Node Network for the Load Balancing Objective -- 7.6.4 Load Balancing Problem, duality, and Link Weights -- 7.6.5 A Composite Objective Function, duality, and Link Weights -- 7.6.6 Minimization of Average Delay, duality, and Link Weights -- 7.7 Illustration of Link Weight Determination through Duality -- 7.7.1 Case Study: I -- 7.7.2 Case Study: II -- 7.8 Link Weight Determination: Large Networks -- 7.9 IP Traf c Engineering of PoP-to-DataCenter Networks -- 7.10 Summary -- Further Lookup -- Exercises -- 8 Multicast Routing -- 8.1 Multicast IP Addressing -- 8.2 Internet Group Management Protocol (IGMP) -- 8.3 Multicast Listener Discovery Protocol (MLD) -- 8.4 Reverse Path Forwarding (RPF) -- 8.5 Distance Vector Multicast Routing Protocol (DVMRP) -- 8.6 Multicast OSPF -- 8.7 Core Based Trees…”
Libro electrónico -
427Publicado 2019Tabla de Contenidos: “…1.4 Benefits of Using Linux -- 1.4.1 Free of Cost -- 1.4.2 Time to Market -- 1.4.3 No "Vendor Lock-in" -- 1.4.4 Highly Stable Operating System -- 1.4.5 Low Maintenance -- 1.4.5.1 Supporting Software Releases After Shipping the Product -- 1.4.5.2 Keeping Your Own Drivers up to Date With the Latest Kernel -- 1.5 Linux Architecture -- 1.5.1 Linux Kernel Components -- 1.5.1.1 Device Driver Framework -- 1.5.1.2 Schedulers -- 1.5.1.3 Interrupt -- 1.5.1.4 Memory Management -- 1.5.1.5 Communication Protocol Stack -- 1.5.1.6 User Interface (UI) -- 1.6 Build Environment -- 1.6.1 Kernel Compilation -- 1.6.2 Root Filesystem -- 1.6.2.1 Yocto -- 1.7 Customizing Linux -- 1.7.1 Low Memory Footprint -- 1.7.2 Boot Performance -- 1.7.3 High Throughput Performance -- 1.7.3.1 Core Affinity -- 1.7.3.2 Interrupt Coalescing -- 1.7.3.3 User Space Mapping of Buffers -- 1.7.3.4 User Space Drivers -- 1.7.4 Latencies -- 1.8 Linux Development and its Open-Source Ecosystem -- 1.8.1 Linux Versions -- 1.8.2 Long-Term Support (LTS) Linux Version -- 1.8.3 Related Open-Source Communities -- 1.8.3.1 Linux Foundation -- 1.8.3.2 Linaro -- 1.8.4 Linux-Based Distributions -- 1.8.4.1 Android -- 1.8.4.2 Ubuntu -- 1.9 Coding Guidelines -- 1.10 Code Review in the Upstream Community -- 1.11 License -- 2 U-Boot -- 2.1 U-Boot and its Applicability to Several Types of Devices -- 2.2 Major Features of U-Boot -- 2.2.1 Multiple Boot Source Support -- 2.2.2 Shell (User Interface) -- 2.2.3 Environment Variables -- 2.2.4 Scripts -- 2.2.5 Stand-Alone Applications -- 2.2.6 Operating System Boot Commands -- 2.2.7 Autoboot -- 2.2.8 Sandbox U-Boot -- 2.3 U-Boot Directory Organization -- 2.4 U-Boot Architecture and Memory Footprint -- 2.4.1 Single-Stage Boot Loader -- 2.4.2 Two-Stage Boot Loader -- 2.5 Fast Boot Approach -- 2.6 Secure Boot…”
Libro electrónico -
428Publicado 2018Tabla de Contenidos: “…8.7.7 Filtering using queries -- 8.7.8 Discarding data with projection -- 8.7.9 Sorting large data sets -- 8.8 Achieving better data throughput -- 8.8.1 Optimize your code -- 8.8.2 Optimize your algorithm -- 8.8.3 Processing data in parallel -- Summary -- Chapter 9: Practical data analysis -- 9.1 Expanding your toolkit -- 9.2 Analyzing the weather data -- 9.3 Getting the code and data -- 9.4 Basic data summarization -- 9.4.1 Sum -- 9.4.2 Average -- 9.4.3 Standard deviation -- 9.5 Group and summarize -- 9.6 The frequency distribution of temperatures -- 9.7 Time series -- 9.7.1 Yearly average temperature -- 9.7.2 Rolling average -- 9.7.3 Rolling standard deviation -- 9.7.4 Linear regression -- 9.7.5 Comparing time series -- 9.7.6 Stacking time series operations -- 9.8 Understanding relationships -- 9.8.1 Detecting correlation with a scatter plot -- 9.8.2 Types of correlation -- 9.8.3 Determining the strength of the correlation -- 9.8.4 Computing the correlation coefficient -- Summary -- Chapter 10: Browser-based visualization -- 10.1 Expanding your toolkit -- 10.2 Getting the code and data -- 10.3 Choosing a chart type -- 10.4 Line chart for New York City temperature -- 10.4.1 The most basic C3 line chart -- 10.4.2 Adding real data -- 10.4.3 Parsing the static CSV file -- 10.4.4 Adding years as the X axis -- 10.4.5 Creating a custom Node.js web server -- 10.4.6 Adding another series to the chart -- 10.4.7 Adding a second Y axis to the chart -- 10.4.8 Rendering a time series chart -- 10.5 Other chart types with C3 -- 10.5.1 Bar chart -- 10.5.2 Horizontal bar chart -- 10.5.3 Pie chart -- 10.5.4 Stacked bar chart -- 10.5.5 Scatter plot chart -- 10.6 Improving the look of our charts -- 10.7 Moving forward with your own projects -- Summary -- Chapter 11: Server-side visualization -- 11.1 Expanding your toolkit -- 11.2 Getting the code and data…”
Libro electrónico -
429Publicado 2022Tabla de Contenidos: “…3.3 Extended Defects in Homoepitaxial Layers -- 3.3.1 Classification of Extended Defects According to Glide Systems in 4H‐SiC -- 3.3.2 Dislocation Reactions During Epitaxial Growth -- 3.3.3 Characterization Methods for Extended Defects in 4H‐SiC Epilayers -- 3.4 Point Defects and Carrier Lifetime in Epilayers -- 3.4.1 Classification and General Properties of Point Defects in 4H‐SiC -- 3.4.2 Basics on Recombination Carrier Lifetime in 4H‐SiC -- 3.4.3 Carrier Lifetime‐Affecting Point Defects -- 3.4.4 Carrier Lifetime Measurement in Epiwafers and Devices -- 3.5 Conclusion -- Acknowledgments -- References -- Chapter 4 Industrial Perspective of SiC Epitaxy -- 4.1 Introduction -- 4.2 Background -- 4.3 The Basics of SiC Epitaxy -- 4.4 SiC Epi Historical Origins -- 4.5 Planetary Multi‐wafer Epitaxial Reactor Design Considerations -- 4.5.1 Rapidly Rotating Reactors -- 4.5.2 Horizontal Hot‐Wall Reactors -- 4.6 Latest High‐Throughput Epitaxial Reactor Status -- 4.7 Benefits and Challenges for Increasing Growth Rate in all Reactors -- 4.8 Increasing Wafer Diameters, Device Processing Considerations, and Projections -- 4.9 Summary -- Acknowledgment -- References -- Chapter 5 Status of 3C‐SiC Growth and Device Technology -- 5.1 Introduction, Motivation, Short Review on 3C‐SiC -- 5.2 Nucleation and Epitaxial Growth of 3C‐SC on Si -- 5.2.1 Growth Process -- 5.2.2 Defects -- 5.2.3 Stress -- 5.3 Bulk Growth of 3C‐SiC -- 5.3.1 Sublimation Growth of (111)‐oriented 3C‐SiC on Hexagonal SiC Substrates -- 5.3.2 Sublimation Growth of 3C‐SiC on 3C‐SiC CVD Seeding Layers -- 5.3.3 Continuous Fast CVD Growth of 3C‐SiC on 3C‐SiC CVD Seeding Layers -- 5.4 Processing and Testing of 3C‐SiC Based Power Electronic Devices -- 5.4.1 Prospects for 3C‐SiC Power Electronic Devices -- 5.4.2 3C‐SiC Device Processing -- 5.4.3 MOS Processing -- 5.4.4 3C‐SiC/SiO2 Interface Passivation…”
Libro electrónico -
430Publicado 2022Tabla de Contenidos: “…-- EXAMPLE 1 EXAMPLES -- EXAMPLES -- CONCLUSIONS EXERCISE 1 -- EXERCISES -- EXERCISE 2 EXERCISE 3 -- PROCESS PERFORMANCE -- BACKGROUND -- PROCESS PERFORMANCE BACKGROUND -- PROCESS PERFORMANCE -- PROCESS PERFORMANCE PROCESS PERFORMANCE -- INDICATORS PROCESS YIELD -- PROCESS PERFORMANCE PROCESS YIELD -- ROLLED THROUGHPUT YIELD (RTY)…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
431Publicado 2018Tabla de Contenidos: “…-- Using Docker with .NET Core -- Running Docker images -- Summary -- Monitoring Application Performance Using Tools -- Application performance key metrics -- Average response time -- Apdex scores -- Percentage of errors -- Request rate -- Throughput/endpoints -- CPU and memory usage…”
Libro electrónico -
432Publicado 2015Tabla de Contenidos: “…Logical Segmentation -- Network Services -- Wireless Networks -- Remote Access -- Performance Considerations -- Latency and Jitter -- Bandwidth and Throughput -- Type of Service, Class of Service, and Quality of Service -- Network Hops -- Network Security Controls -- Safety Instrumented Systems -- Special Considerations -- Wide Area Connectivity -- Smart Grid Network Considerations…”
Libro electrónico -
433Publicado 2025Tabla de Contenidos: “…5.7 Implementing Time Synchronization in the CR-IoV -- 5.7.1 Mathematical Model -- 5.7.2 Simulation -- 5.7.3 Experimentation -- 5.7.4 Mathematical Analysis -- 5.8 Summary -- References -- 6 Data Science Applications, Approaches, and Challenges in Cognitive Radio-Based IoV Systems -- 6.1 Introduction -- 6.2 Data Science -- 6.3 Data Science Approaches and Applications in the CR-IoV -- 6.3.1 Data Science Approaches -- 6.3.2 Applications of the CR-IoV -- 6.4 Challenges and Issues -- 6.4.1 Understanding of Learning -- 6.4.2 Computing Systems for Data-Intensive Applications -- 6.4.3 Incomplete Data or Data Noise -- 6.4.4 Heterogeneous Data Sources -- 6.4.5 Privacy and Data Security -- 6.4.6 Precious Data -- 6.4.7 Causal Reasoning -- 6.4.8 Trustworthy AI -- 6.5 Conclusion -- References -- Section 5 Security and Quality of Service -- 7 Security Threats and Counter Measures in the Internet of Vehicles -- 7.1 Introduction -- 7.2 Security Threats in the IoV -- 7.2.1 Attacks on Confidentiality of IoV Communication -- 7.2.2 Attacks on Integrity of IoV Communication -- 7.2.3 Attacks on Availability of IoV Communication -- 7.3 Solutions to Security Threats in the IoV -- 7.3.1 Counter Measures for Confidentiality of Information -- 7.3.2 Counter Measures on Integrity of Information -- 7.3.3 Counter Measures on Availability Attacks -- 7.4 Conclusion -- References -- 8 QoS Provisioning in CR-Based IoV -- 8.1 QoS Requirements of IoV Applications -- 8.1.1 Vehicle Platooning -- 8.1.2 Sensor and State Map Sharing -- 8.1.3 Remote Driving -- 8.1.4 Advanced Driving -- 8.2 Priority-Wise Classification of Data -- 8.2.1 Latency, Throughput, and Data Type Considerations -- 8.2.2 Priority Classes -- 8.3 Transmission Scheduling Process -- 8.4 QoS-Aware Cognitive Communication -- 8.4.1 Concept of a Hybrid NB/WB Waveform -- 8.4.2 Hybrid Cognitive Module -- 8.5 Conclusion…”
Libro electrónico -
434Publicado 2022Tabla de Contenidos: “…6.1 Building blocks for modern concurrent applications -- 6.2 Atomic classes -- 6.3 Lock classes -- 6.3.1 Condition objects -- 6.4 CountDownLatch -- 6.5 ConcurrentHashMap -- 6.5.1 Understanding a simplified HashMap -- 6.5.2 Limitations of Dictionary -- 6.5.3 Approaches to a concurrent Dictionary -- 6.5.4 Using ConcurrentHashMap -- 6.6 CopyOnWriteArrayList -- 6.7 Blocking queues -- 6.7.1 Using BlockingQueue APIs -- 6.7.2 Using WorkUnit -- 6.8 Futures -- 6.8.1 CompletableFuture -- 6.9 Tasks and execution -- 6.9.1 Modeling tasks -- 6.9.2 Executors -- 6.9.3 Single-threaded executor -- 6.9.4 Fixed-thread pool -- 6.9.5 Cached thread pool -- 6.9.6 ScheduledThreadPoolExecutor -- Summary -- 7 Understanding Java performance -- 7.1 Performance terminology: Some basic definitions -- 7.1.1 Latency -- 7.1.2 Throughput -- 7.1.3 Utilization -- 7.1.4 Efficiency -- 7.1.5 Capacity -- 7.1.6 Scalability -- 7.1.7 Degradation -- 7.2 A pragmatic approach to performance analysis -- 7.2.1 Know what you're measuring -- 7.2.2 Know how to take measurements -- 7.2.3 Know what your performance goals are -- 7.2.4 Know when to stop -- 7.2.5 Know the cost of achieving higher performance -- 7.2.6 Know the dangers of premature optimization -- 7.3 What went wrong? …”
Libro electrónico -
435Publicado 2018Tabla de Contenidos: “…Chapter 4: Endpoint Security and Trustworthiness -- Defining an IIoT endpoint -- Motivation and risk-based endpoint protection -- Resource-constrained endpoint protection -- Brownfield scenario considerations -- Endpoint security enabling technologies -- IIoT endpoint vulnerabilities -- Case study - White hack exposes smart grid meter vulnerability -- Use case -- Developing the exploit -- Demonstration -- Establishing trust in hardware -- Hardware security components -- Root of trust - TPM, TEE, and UEFI -- Securing secrets, or sealing -- Endpoint identity and access control -- Initialization and boot process integrity -- Establishing endpoint trust during operations -- Secure updates -- A trustworthy execution ecosystem -- Endpoint data integrity -- Endpoint configuration and management -- Endpoint visibility and control -- Endpoint security using isolation techniques -- Process isolation -- Container isolation -- Virtual isolation -- Physical isolation -- Endpoint physical security -- Machine learning enabled endpoint security -- Endpoint security testing and certification -- Endpoint protection industry standards -- Summary -- Chapter 5: Securing Connectivity and Communications -- Definitions - networking, communications, and connectivity -- Distinguishing features of IIoT connectivity -- Deterministic behavior -- Interoperability - proprietary versus open standards -- Performance characteristics - latency, jitter, and throughput -- Legacy networks with disappearing air gaps -- Access to resource-constrained networks -- Massive transition by connecting the unconnected -- IIoT connectivity architectures -- Multi-tier IIoT-secured connectivity architecture -- Layered databus architecture -- Controls for IIoT connectivity protection -- Secure tunnels and VPNs -- Cryptography controls -- Network segmentation -- Industrial demilitarized zones…”
Libro electrónico -
436Publicado 2018Tabla de Contenidos: “…-- Example block data -- Example Ethereum block -- Bitcoin block -- Global state -- Block time and block size -- Blockchain miners -- Blockchain validators -- Smart contracts -- Blockchain speed -- How to calculate blockchain throughput -- Comparisons with traditional networks -- Summary -- Chapter 3: Decentralization Versus Distributed Systems -- Distributed systems -- Resiliency -- Fault tolerance and failure isolation -- Consensus and coordination -- Backups -- Consistency -- Peer-to-peer systems -- Decentralized systems -- Principles of decentralized systems -- Open access -- Non-hierarchical -- Ecosystem diversity -- Transparency -- Downsides -- Speed -- Censorship resistance -- Chaos and non-determinism -- Summary -- Chapter 4: Cryptography and Mechanics Behind Blockchain -- Principles of security -- Historical perspective - classical cryptography…”
Libro electrónico -
437Publicado 2023Tabla de Contenidos: “…Understanding how data warehouses are different from databases -- Significance of ETL in data warehouse -- Learning about BigQuery -- Features of BigQuery -- Setting up and configuring a fully managed data warehouse with BigQuery -- Enabling BigQuery from the console -- Creating a BigQuery dataset -- Using an existing public dataset -- Creating a table in the dataset -- Performing simple analytics -- Summary of operational aspects and design considerations -- Summary -- Part 3: Semi-Structured, Unstructured Data, and NoSQL Design -- 6 -- Designing for Semi-Structured Data -- Semi-structured data -- Pros and cons of semi-structured data -- Use cases of semi-structured data -- NoSQL for semi-structured data -- Data structures supported by NoSQL databases -- Firestore and its features -- Setting up Firestore -- Collection -- Document -- Subcollection -- Security -- Client libraries and APIs -- Indexing -- Single-field index -- Composite index -- Collection group query -- Data model considerations -- Hierarchical format -- Denormalized format -- Easy querying with RunQuery API -- API endpoint and method -- The parent parameter -- JSON body format -- StructuredQuery -- The from clause -- The where clause -- Putting the pieces together -- Implementing RunQuery API programmatically -- Summary -- 7 -- Unstructured Data Management -- Use cases -- Processing unstructured data -- Storage options in Google Cloud -- Cloud Storage, classes, and features -- Unstructured data storage with BigQuery -- External sources -- External connections -- Unstructured data analytics with BigQuery -- Summary -- Part 4: DevOps and Databases -- 8 -- DevOps and Databases -- Upgrades, updates, and patching -- Security, privacy, and encryption -- Replication and availability -- Scalability -- Performance and throughput -- SLA, SLI, and SLO -- Data federation…”
Libro electrónico -
438por Shore, JamesTabla de Contenidos: “…Outsourced Custom Development -- Vertical-Market Software -- Horizontal-Market Software -- Questions -- Results -- Contraindications -- Alternatives -- Ubiquitous Language -- The Domain Expertise Conundrum -- Two Languages -- How to Speak the Same Language -- Ubiquitous Language in Code -- Refining the Ubiquitous Language -- Questions -- Results -- Contraindications -- Alternatives -- Further Reading -- Stand-Up Meetings -- How to Hold a Daily Stand-Up Meeting -- Be Brief -- Questions -- Results -- Contraindications -- Alternatives -- Further Reading -- Coding Standards -- Beyond Formatting -- How to Create a Coding Standard -- Dealing with Disagreement -- Adhering to the Standard -- Questions -- Results -- Contraindications -- Alternatives -- Iteration Demo -- How to Conduct an Iteration Demo -- Two Key Questions -- Weekly Deployment Is Essential -- Questions -- Results -- Contraindications -- Alternatives -- Reporting -- Types of Reports -- Progress Reports to Provide -- Vision statement -- Weekly demo -- Release and iteration plans -- Burn-up chart -- Progress Reports to Consider -- Roadmap -- Status email -- Management Reports to Consider -- Productivity -- Throughput -- Defects -- Time usage -- Reports to Avoid -- Source lines of code (SLOC) and function points -- Number of stories -- Velocity -- Code quality -- Questions -- Results -- Contraindications -- Alternatives -- Further Reading -- Chapter 7. …”
Publicado 2008
Libro electrónico -
439Publicado 2018Tabla de Contenidos: “…-- Running threads extending Thread -- Implementing Runnable -- Runing threads implementing Runnable -- Extending Thread vs implementing Runnable -- How to execute the main(String[]) method -- Using IDE -- Command line with classes on classpath -- Command line with a .jar file on classpath -- Command line with an executable .jar file -- Garbage collection -- Responsiveness, throughput, and stop-the-world -- Object age and generations -- When stop-the-world is unavoidable -- Exercise - Monitoring JVM while running an application -- Answer -- Summary -- Chapter 12: Java Standard and External Libraries -- What are standard and external libraries? …”
Libro electrónico -
440Publicado 2024Tabla de Contenidos: “…-- Building serverless architecture -- Considerations for serverless architecture -- Building stateless and stateful architectural designs -- Stateful architecture -- Stateless architecture -- Creating a microservice architecture -- Saga pattern -- Fan-out/fan-in pattern -- Service mesh pattern -- Reactive architecture -- Building queue-based architecture -- Queuing chain pattern -- Job observer pattern -- Pipes-and-Filters Architecture -- Creating Event-Driven Architecture -- Publisher/subscriber model -- Event stream model -- Backend for Frontend pattern -- Cloud-native architecture anti-patterns -- Single point of failure -- Manual scaling -- Tightly coupled services -- Ignoring security best practices -- Not monitoring or logging -- Ignoring network latency -- Lack of testing -- Over-optimization -- Not considering costs -- Summary -- Chapter 6: Performance Considerations -- Design principles for high-performance architecture -- Reducing latency -- Improving throughput -- Handling concurrency -- Applying caching…”
Libro electrónico