Mostrando 14,561 - 14,580 Resultados de 14,761 Para Buscar 'Honiton~', tiempo de consulta: 1.21s Limitar resultados
  1. 14561
    Publicado 2019
    “…Kubernetes sessions, including Jonathan Johnson's (Dijure LLC) intro to Kubernetes tutorial; Jose Nino’s (Lyft) look at deploying hybrid topologies with Kubernetes and Envoy; and Bastian Hofmann’s (SysEleven) talk on using Kubernetes to deploy an application across multiple clusters in different regions. Monitoring, Observability, and Performance sessions, such as Liz Fong-Jones (Honeycomb) on how microservice-based systems do distributed tracing using OpenTelemetry; Lorenzo Fontana (Sysdig) on eBPF-powered distributed Kubernetes performance analysis; and Nathanael Jean-Francois (NS1) on using BGP edge optimizations to measure internet performance and make routing decisions. …”
    Video
  2. 14562
    Publicado 2018
    “…Shannon takes you through the key facets of AWS best practices and services in the areas of shared security and compliance; identity and access management; infrastructure security; data protection; and logging and monitoring to ensure that your AWS environment remains secure. …”
    Video
  3. 14563
    Publicado 2012
    “…Coverage includes Understanding how vCO fits into your environment and identifying your best opportunities to use it Choosing the right installation scenario and efficiently managing the vCO installation process Configuring vCO: services, passwords, networking, LDAP, databases, SSL, licensing, plug-ins, backup, and more Interacting with vCO through actions, packages, plug-ins, web views, resources, and workflows Automating manual tasks with vCO’s extensive workflow library Creating sophisticated workflows with drag-and-drop components and JavaScript Using plug-ins to control infrastructure within and around your vSphere environment Bringing consistency to VM provisioning, overcoming “VM sprawl” and resource contention, and simplifying support Optimizing VM lifecycle management, all the way through decommissioning Automating all snapshot monitoring processes and components Exporting logs, finding/deleting orphaned files, and performing other day-to-day tasks Efficiently conducting mass VM migrations Quickly adding vCenter hosts and clusters, configuring shared storage, and adding hosts to new clusters Using vCO and third-party plug-ins to gain “private cloud” benefits and flexibility Networking/Virtualization vmware.com/go/vmwarepress…”
    Libro electrónico
  4. 14564
    Publicado 2013
    “…Whether you are a relative newcomer to iPhone and iPad or iOS development or an old hand looking to expand your horizons, there’s something for everyone in More iOS 6 Development. …”
    Libro electrónico
  5. 14565
    Publicado 2013
    “…You’ll find new or improved coverage of Ubuntu’s Unity interface, various types of servers, software repositories, database options, virtualization and cloud services, development tools, monitoring, troubleshooting, Ubuntu’s push into mobile and other touch screen devices, and much more. …”
    Libro electrónico
  6. 14566
    Publicado 2011
    “…Using this book’s detailed working configurations and examples, you can minimize configuration errors, reduce downtime, strengthen monitoring, and drive maximum value from any CVP-based unified call center solution. …”
    Libro electrónico
  7. 14567
    Publicado 2013
    “…Review the new security challenges associated with borderless networks, ubiquitous mobility, and consumerized IT Understand the building blocks of an Identity Services Engine (ISE) solution Design an ISE-Enabled network, plan/distribute ISE functions, and prepare for rollout Build context-aware security policies Configure device profiling, endpoint posture assessments, and guest services Implement secure guest lifecycle management, from WebAuth to sponsored guest access Configure ISE, network access devices, and supplicants, step-by-step Walk through a phased deployment that ensures zero downtime Apply best practices to avoid the pitfalls of BYOD secure access Simplify administration with self-service onboarding and registration Deploy Security Group Access, Cisco’s tagging enforcement solution Add Layer 2 encryption to secure traffic flows Use Network Edge Access Topology to extend secure access beyond the wiring closet Monitor, maintain, and troubleshoot ISE and your entire Secure Unified Access system…”
    Libro electrónico
  8. 14568
    por Ralph, Tom
    Publicado 2014
    “…The official study guide¿ helps you master many of the topics on the VCP-Cloud exam, including Installing vCloud Director and vShield Manager Learning the differences between roles and privileges and the principles of role-based access controls Coverage of the vCenter Chargeback Manager product, introducing the concept of chargeback and why it is needed in a cloud environment Understanding and troubleshooting vCloud Connector, including identification and functionality of the different components Constructing different types of vCloud networks and network pools and the requirements for each Creating and modifying vCloud Director organizations Allocating and managing vCloud resources Monitoring a vCloud implementation…”
    Libro electrónico
  9. 14569
    por Benjamin, Emad
    Publicado 2014
    “…Throughout, Benjamin offers real performance studies, specific advice, and “from-the-trenches” insights into monitoring and troubleshooting. Coverage includes --Performance issues associated with large-scale Java platforms, including consolidation, elasticity, and flexibility --Technical considerations arising from theoretical and practical limits of Java platforms --Building horizontal in-memory databases with VMware vFabric SQLFire to improve scalability and response times --Tuning large-scale Java using throughput/parallel GC and Concurrent Mark and Sweep (CMS) techniques --Designing and sizing a new virtualized Java environment --Designing and sizing new large-scale Java platforms when migrating from physical to virtualized deployments --Designing and sizing large-scale Java platforms for latency-sensitive in-memory databases --Real-world performance studies: SQLFire vs. …”
    Libro electrónico
  10. 14570
    por Blaschke, Olaf
    Publicado 2019
    “…Partie de l’œil du cyclone, le Saint-Empire, l’analyse s’est étendue à la France et aux marges orientales de l’Europe. Son horizon est resté constamment celui d’établir des ponts entre France, Suisse et outre-Rhin, entre historiographies, entre générations d’historiens, entre confessions aussi…”
    Electrónico
  11. 14571
    Publicado 2022
    “…What you will learn Discover the optimal approach for loading and managing data Work with notebooks for various tasks, including ML Run real-time analytics using Azure Synapse Link for Cosmos DB Perform exploratory data analytics using Apache Spark Read and write DataFrames into Parquet files using PySpark Create reports on various metrics for monitoring key KPIs Combine Power BI and Serverless for distributed analysis Enhance your Synapse analysis with data visualizations Who this book is for This book is for data architects, data engineers, and developers who want to learn and understand the main concepts of Azure Synapse analytics and implement them in real-world scenarios…”
    Libro electrónico
  12. 14572
    Publicado 2024
    “…Attendees can opt-out of running these labs and instead watch the instructor demos. Two monitors/systems recommended: One for the virtual machine, and one to watch the instructor demos…”
    Video
  13. 14573
    Publicado 2016
    “…Coverage includes Network Fundamentals: Subnetting, VLSM, route summarization, cables/connections, CLI LAN Switching: Switch configuration, VLANs, VLAN trunking protocol, inter-VLAN communication, STP, EtherChannel Routing (IPv4/IPv6): Router configuration, static routing, RIPng, EIGRP/EIGRPv6, OSPFv2/OSPFv3 WAN: Point-to-point protocols, eBGP, GRE tunnels, QoS Infrastructure Services: DHCP, FHRP, HSRP, NAT Infrastructure Security: Switch port security, ACL traffic management, device hardening Infrastructure Management: Backup/restore, password recovery, CDP, LLDP, IOS tools, device monitoring, IOS licensing, troubleshooting Quick, offline access to all CCNA Routing and Switching commands for research and solutions --Logical how-to topic groupings for a one-stop resource --Great for review before CCNA Routing and Switching certification exams --Compact size makes it easy to carry with you wherever you go --“Create Your Own Journal” section with blank, lined pages enables you to personalize the book for your needs --“What Do You Want to Do?” …”
    Libro electrónico
  14. 14574
    Publicado 2015
    “…--Understand modern network topologies, protocols, and infrastructure --Implement networks based on specific requirements --Install and configure DNS and DHCP --Monitor and analyze network traffic --Understand IPv6 and IPv4 addressing, routing, and switching --Perform basic router/switch installation and configuration --Explain network device functions in cloud environments --Efficiently implement and troubleshoot WANs --Install, configure, secure, and troubleshoot wireless networks --Apply patches/updates, and support change/configuration management --Describe unified communication technologies --Segment and optimize networks --Identify risks/threats, enforce policies and physical security, configure firewalls, and control access --Understand essential network forensics concepts --Troubleshoot routers, switches, wiring, connectivity, and security Companion CD The companion CD contains a digital edition of the Cram Sheet and the powerful Pearson IT Certification Practice Test engine, complete with hundreds of exam-realistic questions and two complete practice exams. …”
    Libro electrónico
  15. 14575
    Publicado 2023
    “…You'll also learn how to control logging for troubleshooting errors in complex builds and explore monitoring options for multiple logs at once. As you advance, you'll build on your initial manifest for a local application that'll easily migrate to another builder or cloud. …”
    Libro electrónico
  16. 14576
    Publicado 2023
    “…What you will learn Understand the tactics, techniques, and procedures of reconnaissance Grasp the importance of attack surface management for organizations Find out how to conceal your identity online as an ethical hacker Explore advanced open source intelligence (OSINT) techniques Perform active reconnaissance to discover live hosts and exposed ports Use automated tools to perform vulnerability assessments on systems Discover how to efficiently perform reconnaissance on web applications Implement open source threat detection and monitoring tools Who this book is for If you are an ethical hacker, a penetration tester, red teamer, or any cybersecurity professional looking to understand the impact of reconnaissance-based attacks, how they take place, and what organizations can do to protect against them, then this book is for you. …”
    Libro electrónico
  17. 14577
    Publicado 2022
    “…Moving on, you'll discover how to monitor and detect security incidents, implement incident response, and use automation to proactively support ongoing security operations. …”
    Libro electrónico
  18. 14578
    Publicado 2024
    “…This book guides you through its user-friendly interface, interactive visualizations, and robust features, including real-time data monitoring and advanced analytics, showing you how Kibana revolutionizes your approach to navigating and analyzing complex datasets. …”
    Libro electrónico
  19. 14579
    Publicado 2023
    “…., n-of-1 trial design, adaptive trial design, and probability monitoring procedure for sample size) for rare disease drug development.Provides insight regarding current regulatory clinical initiatives (e.g., precision/personalized medicine, biomarker-driven target clinical trials, model informed drug development, big data analytics, and real world data/evidence).This book provides key statistical concepts, innovative designs, and analysis methods that are useful in regulatory science. …”
    Libro electrónico
  20. 14580
    Publicado 2024
    “…Other recipes cover topics such as using and integrating Boot with Spring's enterprise services, Spring Integration, testing, monitoring and more. At the end of the book, you'll have the code packages to deploy your Spring Boot-created microservices or applications on a cloud platform like Amazon using the popular Kubernetes container. …”
    Libro electrónico