The Crown of Thorns

Author:

Publisher:Little, Brown

ISBN:0316040347

Total Pages:320

Viewed:1069

GET BOOK

Books Description:

From the bestselling author of The Bomber Mafia, learn what sets high achievers apart—from Bill Gates to the Beatles—in this seminal work from "a singular talent" (New York Times Book Review). In this stunning book, Malcolm Gladwell takes us on an intellectual journey through the world of "outliers"—the best and the brightest, the most famous and the most successful. He asks the question: what makes high-achievers different? His answer is that we pay too much attention to what successful people are like, and too little attention to where they are from: that is, their culture, their family, their generation, and the idiosyncratic experiences of their upbringing. Along the way he explains the secrets of software billionaires, what it takes to be a great soccer player, why Asians are good at math, and what made the Beatles the greatest rock band. Brilliant and entertaining, Outliers is a landmark work that will simultaneously delight and illuminate.

Related Titles:

Data Science for Business

Author:Foster Provost,Tom Fawcett

Publisher:\"O\'Reilly Media, Inc.\"

ISBN:144937428X

Total Pages:414

Viewed:666

GET BOOK

Books Description:

Written by renowned data science experts Foster Provost and Tom Fawcett, Data Science for Business introduces the fundamental principles of data science, and walks you through the "data-analytic thinking" necessary for extracting useful knowledge and business value from the data you collect. This guide also helps you understand the many data-mining techniques in use today. Based on an MBA course Provost has taught at New York University over the past ten years, Data Science for Business provides examples of real-world business problems to illustrate these principles. You’ll not only learn how to improve communication between business stakeholders and data scientists, but also how participate intelligently in your company’s data science projects. You’ll also discover how to think data-analytically, and fully appreciate how data science methods can support business decision-making. Understand how data science fits in your organization—and how you can use it for competitive advantage Treat data as a business asset that requires careful investment if you’re to gain real value Approach business problems data-analytically, using the data-mining process to gather good data in the most appropriate way Learn general concepts for actually extracting knowledge from data Apply data science principles when interviewing data science job candidates

Accelerating Modernization with Agile Integration

Author:Adeline SE Chun,Aiden Gallagher,Amar A Shah,Callum Jackson,Claudio Tagliabue,Iliya Dimitrov,James Blackburn,Joel Gomez,Kim Clark,Lee Gavin,Maria Menendez,Martin Evans,Mohammed Alreedi,Murali Sitaraman,Nick Glowacki,Shishir Narain,Timothy Quigly,Tony Curcio,Ulas Cubuk,Vasfi Gucer,IBM Redbooks

Publisher:IBM Redbooks

ISBN:0738458368

Total Pages:650

Viewed:451

GET BOOK

Books Description:

The organization pursuing digital transformation must embrace new ways to use and deploy integration technologies, so they can move quickly in a manner appropriate to the goals of multicloud, decentralization, and microservices. The integration layer must transform to allow organizations to move boldly in building new customer experiences, rather than forcing models for architecture and development that pull away from maximizing the organization's productivity. Many organizations have started embracing agile application techniques, such as microservice architecture, and are now seeing the benefits of that shift. This approach complements and accelerates an enterprise's API strategy. Businesses should also seek to use this approach to modernize their existing integration and messaging infrastructure to achieve more effective ways to manage and operate their integration services in their private or public cloud. This IBM® Redbooks® publication explores the merits of what we refer to as agile integration; a container-based, decentralized, and microservice-aligned approach for integration solutions that meets the demands of agility, scalability, and resilience required by digital transformation. It also discusses how the IBM Cloud Pak for Integration marks a significant leap forward in integration technology by embracing both a cloud-native approach and container technology to achieve the goals of agile integration. The target audiences for this book are cloud integration architects, IT specialists, and application developers.

IBM FlashSystem 9100 Architecture, Performance, and Implementation

Author:Jon Tate,Andrew Greenfield,Jon Herd,Corne Lottering,Tony Pacheco,Jagadeesh Papaiah,Thomas Ploski,Stephen Solewin,Leandro Torolho,Alexander Watson,IBM Redbooks

Publisher:IBM Redbooks

ISBN:0738457485

Total Pages:368

Viewed:630

GET BOOK

Books Description:

IBM® FlashSystem 9100 combines the performance of flash and Non-Volatile Memory Express (NVMe) with the reliability and innovation of IBM FlashCore® technology and the rich features of IBM SpectrumTM Virtualize — all in a powerful 2U storage system. Providing intensive data driven multi-cloud storage capacity, FlashSystem 9100 is deeply integrated with the software-defined capabilities of IBM Spectrum StorageTM, which allows you to easily add the multi-cloud solutions that best support your business. In this IBM Redbooks® publication, we discuss the product's features and planning steps, architecture, installation, configuration, and hints and tips.

IBM Systems Director 6.3 Best Practices: Installation and Configuration

Author:David Watts,Olaf Menke,Donal O'Connell,Edward Banaag,IBM Redbooks

Publisher:IBM Redbooks

ISBN:0738450928

Total Pages:264

Viewed:352

GET BOOK

Books Description:

IBM® Systems Director is a platform management foundation that streamlines the way that physical and virtual systems are managed. Using industry standards, IBM Systems Director supports multiple operating systems and virtualization technologies. This paper provides guidance and preferred practices about how to install and configure IBM Systems Director Version 6.3. Also, installation guidance, fundamental topics, such as discovery and inventory, and more advanced topics, such as troubleshooting and automation, are covered. This paper is meant to be a partner to the comprehensive documentation in the IBM Systems Director Information Center. This paper is aimed at IT specialists who are planning to install and configure IBM Systems Director on Microsoft Windows, Linux, or IBM AIX®.

Software Engineering at Google

Author:Titus Winters,Tom Manshreck,Hyrum Wright

Publisher:\"O\'Reilly Media, Inc.\"

ISBN:1492082740

Total Pages:602

Viewed:594

GET BOOK

Books Description:

Today, software engineers need to know not only how to program effectively but also how to develop proper engineering practices to make their codebase sustainable and healthy. This book emphasizes this difference between programming and software engineering. How can software engineers manage a living codebase that evolves and responds to changing requirements and demands over the length of its life? Based on their experience at Google, software engineers Titus Winters and Hyrum Wright, along with technical writer Tom Manshreck, present a candid and insightful look at how some of the world’s leading practitioners construct and maintain software. This book covers Google’s unique engineering culture, processes, and tools and how these aspects contribute to the effectiveness of an engineering organization. You’ll explore three fundamental principles that software organizations should keep in mind when designing, architecting, writing, and maintaining code: How time affects the sustainability of software and how to make your code resilient over time How scale affects the viability of software practices within an engineering organization What trade-offs a typical engineer needs to make when evaluating design and development decisions

Kubernetes: Up and Running

Author:Brendan Burns,Joe Beda,Kelsey Hightower

Publisher:\"O\'Reilly Media, Inc.\"

ISBN:1492046485

Total Pages:278

Viewed:1240

GET BOOK

Books Description:

Kubernetes radically changes the way applications are built and deployed in the cloud. Since its introduction in 2014, this container orchestrator has become one of the largest and most popular open source projects in the world. The updated edition of this practical book shows developers and ops personnel how Kubernetes and container technology can help you achieve new levels of velocity, agility, reliability, and efficiency. Kelsey Hightower, Brendan Burns, and Joe Beda—who’ve worked on Kubernetes at Google and beyond—explain how this system fits into the lifecycle of a distributed application. You’ll learn how to use tools and APIs to automate scalable distributed systems, whether it’s for online services, machine learning applications, or a cluster of Raspberry Pi computers. Create a simple cluster to learn how Kubernetes works Dive into the details of deploying an application using Kubernetes Learn specialized objects in Kubernetes, such as DaemonSets, jobs, ConfigMaps, and secrets Explore deployments that tie together the lifecycle of a complete application Get practical examples of how to develop and deploy real-world applications in Kubernetes

Hands-On Network Forensics

Author:Nipun Jaswal

Publisher:Packt Publishing Ltd

ISBN:1789341051

Total Pages:358

Viewed:803

GET BOOK

Books Description:

Gain basic skills in network forensics and learn how to apply them effectively Key Features Investigate network threats with ease Practice forensics tasks such as intrusion detection, network analysis, and scanning Learn forensics investigation at the network level Book Description Network forensics is a subset of digital forensics that deals with network attacks and their investigation. In the era of network attacks and malware threat, it’s now more important than ever to have skills to investigate network attacks and vulnerabilities. Hands-On Network Forensics starts with the core concepts within network forensics, including coding, networking, forensics tools, and methodologies for forensic investigations. You’ll then explore the tools used for network forensics, followed by understanding how to apply those tools to a PCAP file and write the accompanying report. In addition to this, you will understand how statistical flow analysis, network enumeration, tunneling and encryption, and malware detection can be used to investigate your network. Towards the end of this book, you will discover how network correlation works and how to bring all the information from different types of network devices together. By the end of this book, you will have gained hands-on experience of performing forensics analysis tasks. What you will learn Discover and interpret encrypted traffic Learn about various protocols Understand the malware language over wire Gain insights into the most widely used malware Correlate data collected from attacks Develop tools and custom scripts for network forensics automation Who this book is for The book targets incident responders, network engineers, analysts, forensic engineers and network administrators who want to extend their knowledge from the surface to the deep levels of understanding the science behind network protocols, critical indicators in an incident and conducting a forensic search over the wire.

HTTP: The Definitive Guide

Author:David Gourley,Brian Totty,Marjorie Sayer,Anshu Aggarwal,Sailu Reddy

Publisher:\"O\'Reilly Media, Inc.\"

ISBN:1449379583

Total Pages:658

Viewed:1296

GET BOOK

Books Description:

Behind every web transaction lies the Hypertext Transfer Protocol (HTTP) --- the language of web browsers and servers, of portals and search engines, of e-commerce and web services. Understanding HTTP is essential for practically all web-based programming, design, analysis, and administration.While the basics of HTTP are elegantly simple, the protocol's advanced features are notoriously confusing, because they knit together complex technologies and terminology from many disciplines. This book clearly explains HTTP and these interrelated core technologies, in twenty-one logically organized chapters, backed up by hundreds of detailed illustrations and examples, and convenient reference appendices. HTTP: The Definitive Guide explains everything people need to use HTTP efficiently -- including the "black arts" and "tricks of the trade" -- in a concise and readable manner.In addition to explaining the basic HTTP features, syntax and guidelines, this book clarifies related, but often misunderstood topics, such as: TCP connection management, web proxy and cache architectures, web robots and robots.txt files, Basic and Digest authentication, secure HTTP transactions, entity body processing, internationalized content, and traffic redirection.Many technical professionals will benefit from this book. Internet architects and developers who need to design and develop software, IT professionals who need to understand Internet architectural components and interactions, multimedia designers who need to publish and host multimedia, performance engineers who need to optimize web performance, technical marketing professionals who need a clear picture of core web architectures and protocols, as well as untold numbers of students and hobbyists will all benefit from the knowledge packed in this volume.There are many books that explain how to use the Web, but this is the one that explains how the Web works. Written by experts with years of design and implementation experience, this book is the definitive technical bible that describes the "why" and the "how" of HTTP and web core technologies. HTTP: The Definitive Guide is an essential reference that no technically-inclined member of the Internet community should be without.

IBM FileNet Content Manager Implementation Best Practices and Recommendations

Author:Fay Chuck,Wei-Dong Zhu,Bert Bukvarevic,Bill Carpenter,Axel Dreher,Ruth Hildebrand-Lund,Elizabeth Koumpan,Sridhar Satuloori,Michael Seaman,Dimitris Tzouvelis,IBM Redbooks

Publisher:IBM Redbooks

ISBN:073843812X

Total Pages:496

Viewed:1351

GET BOOK

Books Description:

IBM® FileNet® Content Manager Version 5.2 provides full content lifecycle and extensive document management capabilities for digital content. IBM FileNet Content Manager is tightly integrated with the family of IBM FileNet products based on the IBM FileNet P8 technical platform. IBM FileNet Content Manager serves as the core content management, security management, and storage management engine for the products. This IBM Redbooks® publication covers the implementation best practices and recommendations for solutions that use IBM FileNet Content Manager. It introduces the functions and features of IBM FileNet Content Manager, common use cases of the product, and a design methodology that provides implementation guidance from requirements analysis through production use of the solution. We address administrative topics of an IBM FileNet Content Manager solution, including deployment, system administration and maintenance, and troubleshooting. Implementation topics include system architecture design with various options for scaling an IBM FileNet Content Manager system, capacity planning, and design of repository design logical structure, security practices, and application design. An important implementation topic is business continuity. We define business continuity, high availability, and disaster recovery concepts and describe options for those when implementing IBM FileNet Content Manager solutions. Many solutions are essentially a combination of information input (ingestion), storage, information processing, and presentation and delivery. We discuss some solution building blocks that designers can combine to build an IBM FileNet Content Manager solution. This book is intended to be used in conjunction with product manuals and online help to provide guidance to architects and designers about implementing IBM FileNet Content Manager solutions. Many of the features and practices described in the book also apply to previous versions of IBM FileNet Content Manager.

Getting Started with Demand-Driven Acquisitions for E-books: A LITA Guide

Author:Theresa S. Arndt

Publisher:American Library Association

ISBN:0838913148

Total Pages:120

Viewed:1772

GET BOOK

Books Description:

Thousands of e-books are published each year; and rather than holding steady, e-book prices are rising—some 3.5% this year alone. With so many titles out there, how do you know which ones will actually circulate? Demand-driven acquisition (DDA) may be the answer for your library, and getting started needn’t be daunting. This LITA Guide includes more than 200 criteria questions to help you develop a DDA e-book program that’s right for your library, offering perspective on Why DDA is worth considering, and how it increases instant access to more e-books for library users while holding down overall library book purchasing cost increasesPrioritizing goals to better negotiate with vendorsWorkflow with library services providers and e-book aggregatorsManaging trade-offs between staff time and direct costsFactors in policy decisions, such as single or multiple vendors, short term loans, and mediating purchasesUsing MARC records and discovery servicesVendor reporting, cost per use, processing costs, and other metrics for assessmentIncorporating DDA titles into your catalogFocusing on the unique requirements and processes of e-book acquisition, this guide will help ensure that your library’s e-book collection is both vibrant and cost-effective.

Building Secure and Reliable Systems

Author:Heather Adkins,Betsy Beyer,Paul Blankinship,Piotr Lewandowski,Ana Oprea,Adam Stubblefield

Publisher:\"O\'Reilly Media, Inc.\"

ISBN:1492083070

Total Pages:558

Viewed:1484

GET BOOK

Books Description:

Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best practices to help your organization design scalable and reliable systems that are fundamentally secure. Two previous O’Reilly books from Google—Site Reliability Engineering and The Site Reliability Workbook—demonstrated how and why a commitment to the entire service lifecycle enables organizations to successfully build, deploy, monitor, and maintain software systems. In this latest guide, the authors offer insights into system design, implementation, and maintenance from practitioners who specialize in security and reliability. They also discuss how building and adopting their recommended best practices requires a culture that’s supportive of such change. You’ll learn about secure and reliable systems through: Design strategies Recommendations for coding, testing, and debugging practices Strategies to prepare for, respond to, and recover from incidents Cultural best practices that help teams across your organization collaborate effectively

Kubernetes for Full-Stack Developers

Author:

Publisher:DigitalOcean

ISBN:0999773038

Total Pages:637

Viewed:339

GET BOOK

Books Description:

This book is designed to help newcomers and experienced users alike learn about Kubernetes. Its chapters are designed to introduce core Kubernetes concepts and to build on them to a level where running an application on a production cluster is a familiar, repeatable, and automated process. From there, more advanced topics are introduced, like how to manage a Kubernetes cluster itself.

High Performance Browser Networking

Author:Ilya Grigorik

Publisher:\"O\'Reilly Media, Inc.\"

ISBN:1449344720

Total Pages:400

Viewed:583

GET BOOK

Books Description:

How prepared are you to build fast and efficient web applications? This eloquent book provides what every web developer should know about the network, from fundamental limitations that affect performance to major innovations for building even more powerful browser applications—including HTTP 2.0 and XHR improvements, Server-Sent Events (SSE), WebSocket, and WebRTC. Author Ilya Grigorik, a web performance engineer at Google, demonstrates performance optimization best practices for TCP, UDP, and TLS protocols, and explains unique wireless and mobile network optimization requirements. You’ll then dive into performance characteristics of technologies such as HTTP 2.0, client-side network scripting with XHR, real-time streaming with SSE and WebSocket, and P2P communication with WebRTC. Deliver superlative TCP, UDP, and TLS performance Speed up network performance over 3G/4G mobile networks Develop fast and energy-efficient mobile applications Address bottlenecks in HTTP 1.x and other browser protocols Plan for and deliver the best HTTP 2.0 performance Enable efficient real-time streaming in the browser Create efficient peer-to-peer videoconferencing and low-latency applications with real-time WebRTC transports