· 2021
A complete reference for designing and building scalable microservices platforms with NATS messaging technology for inter-service communication with security and observability Key FeaturesUnderstand the use of a messaging backbone for inter-service communication in microservices architectureDesign and build a real-world microservices platform with NATS as the messaging backbone using the Go programming languageExplore security, observability, and best practices for building a microservices platform with NATSBook Description Building a scalable microservices platform that caters to business demands is critical to the success of that platform. In a microservices architecture, inter-service communication becomes a bottleneck when the platform scales. This book provides a reference architecture along with a practical example of how to implement it for building microservices-based platforms with NATS as the messaging backbone for inter-service communication. In Designing Microservices Platforms with NATS, you'll learn how to build a scalable and manageable microservices platform with NATS. The book starts by introducing concepts relating to microservices architecture, inter-service communication, messaging backbones, and the basics of NATS messaging. You'll be introduced to a reference architecture that uses these concepts to build a scalable microservices platform and guided through its implementation. Later, the book touches on important aspects of platform securing and monitoring with the help of the reference implementation. Finally, the book concludes with a chapter on best practices to follow when integrating with existing platforms and the future direction of microservices architecture and NATS messaging as a whole. By the end of this microservices book, you'll have developed the skills to design and implement microservices platforms with NATS. What you will learnUnderstand the concepts of microservices architectureGet to grips with NATS messaging technologyHandle transactions and message delivery guarantees with microservicesImplement a reference architecture for microservices using NATSDiscover how to improve the platform's security and observabilityExplore how a NATS microservices platform integrates with an enterprise ecosystemWho this book is for This book is for enterprise software architects and developers who want to gain hands-on microservices experience for designing, implementing, and managing complex distributed systems with microservices architecture concepts. Intermediate-level experience in any programming language and software architecture is required to make the most of this book.
· 2009
Automation is undergoing a major transformation in scope and dimension and plays an increasingly important role in the global economy and in our daily lives. Engineers combine automated devices with mathematical and organizational tools to create complex systems for a rapidly expanding range of applications and human activities. This handbook incorporates these new developments and presents a widespread and well-structured conglomeration of new emerging application areas of automation. Besides manufacturing as a primary application of automation, the handbook contains new application areas such as medical systems and health, transportation, security and maintenance, service, construction and retail as well as production or logistics. This Springer Handbook is not only an ideal resource for automation experts but also for people new to this expanding field such as engineers, medical doctors, computer scientists, designers. It is edited by an internationally renowned and experienced expert.
· 1999
Providing an overview of all facets of UNIX backup and recovery, this text offers practical solutions for environments of all sizes and budgets, explaining everything from freely-available backup systems to large-scale commercial utilities.
An introduction to the study of information retrieval covering both effectiveness and run-time performance. The focus is on the algorithms and heuristics used to find documents relevant to the user request quickly, with the most common illustrated in examples. To facilitate understanding and applications, discussions of computational linguistics, natural language processing, probability theory, and library and computer science are provided. The basic strategies used by many commercial products are described. Techniques that can be used to find information on the Web as well as in other large information collections are included. Annotation copyrighted by Book News, Inc., Portland, OR
· 2012
From one of the pioneers in the field of leadership studies comes a provocative reassessment of how people lead in the digital age: in The End of Leadership, Barbara Kellerman reveals a new way of thinking about leadership—and followership—in the twenty-first century. Building off of the strengths and insights of her work as a scholar and a teacher, Kellerman critically reexamines our most strongly-held assumptions about the role of leadership in driving success. Revealing which of our beliefs have become dangerously out-of-date thanks to advances in social media culture, she also calls into question the value of the so-called “leadership industry” itself. Asking whether leadership can truly be taught, Kellerman forces us to think critically and expansively about how to thrive as leaders in a global information age.
Evernote is a product that helps you organise your data wherever you are, and it supports almost all devices.
· 2020
This book is intended for students, academics, designers, process engineers and CMM operators, and presents the ISO GPS and the ASME GD&T rules and concepts. The Geometric Product Specification (GPS) and Geometrical Dimensioning and Tolerancing (GD&T) languages are in fact the most powerful tools available to link the perfect geometrical world of models and drawings to the imperfect world of manufactured parts and assemblies. The topics include a complete description of all the ISO GPS terminology, datum systems, MMR and LMR requirements, inspection, and gauging principles. Moreover, the differences between ISO GPS and the American ASME Y14.5 standards are shown as a guide and reference to help in the interpretation of drawings of the most common dimensioning and tolerancing specifications.The book may be used for engineering courses and for professional grade programmes, and it has been designed to cover the fundamental geometric tolerancing applications as well as the more advanced ones. Academics and professionals alike will find it to be an excellent teaching and research tool, as well as an easy-to-use guide.
· 2024
Counterterrorism and cybersecurity are the top two priorities at the Federal Bureau of Investigation (FBI). Graduated from the FBI Citizens Academy in 2021, Prof. Newton Lee offers a broad survey of counterterrorism and cybersecurity history, strategies, and technologies in the 3rd edition of his riveting book that examines the role of the intelligence community, cures for terrorism, war and peace, cyber warfare, and quantum computing security. From September 11 attacks and Sony-pocalypse to Israel’s 9/11 and MOAB (Mother of All Breaches), the author shares insights from Hollywood such as 24, Homeland, The Americans, and The X-Files. In real life, the unsung heroes at the FBI have thwarted a myriad of terrorist attacks and cybercrimes. The FBI has worked diligently to improve its public image and build trust through community outreach and pop culture. Imagine Sherlock Holmes meets James Bond in crime fighting, FBI Director Christopher Wray says, “We’ve got technically trained personnel—with cutting-edge tools and skills you might never have imagined seeing outside of a James Bond movie—covering roughly 400 offices around the country.” This book is indispensable for anyone who is contemplating a career at the FBI, think tanks, or law enforcement agencies worldwide. It is also a must-read for every executive to safeguard their organization against cyberattacks that have caused more than $10 billion in damages. In the spirit of President John F. Kennedy, one may proclaim: “Ask not what counterterrorism and cybersecurity can do for you, ask what you can do for counterterrorism and cybersecurity.” Praise for the First Edition: “The book presents a crisp narrative on cyberattacks and how to protect against these attacks. ... The author views terrorism as a disease that may be cured through education and communication. ... The book is a relevant, useful, and genial mix of history, current times, practical advice, and policy goals.” - Brad Reid, ACM Computing Reviews “Very professional and well researched.” - Eleanor Clift, Newsweek and The Daily Beast
This book serves as a convenient entry point for researchers, practitioners, and students to understand the problems and challenges, learn state-of-the-art solutions for their specific needs, and quickly identify new research problems in their domains. The contributors to this volume describe the recent advancements in three related parts: (1) user engagements in the dissemination of information disorder; (2) techniques on detecting and mitigating disinformation; and (3) trending issues such as ethics, blockchain, clickbaits, etc. This edited volume will appeal to students, researchers, and professionals working on disinformation, misinformation and fake news in social media from a unique lens.
· 2011
Good backup and recovery strategies are key to the health of any organization. Medium- to very-large-scale systems administrators have to protect large amounts of critical data as well as design backup solutions that are scalable and optimized to meet changing conditions. Pro Data Backup and Recovery will cover some of the more common backup applications, such as Symantec NetBackup/BackupExec, EMC NetWorker, and CommVault, but the main discussion will focus on the implementation of 21st century architectures that allow the backup software to be a “commodity” item. The underlying architecture provides the framework for meeting the requirements of data protection for the organization. This book covers new developments in data protection as well as the impact of single-instance storage upon backup infrastructures. It discusses the impact of backup and data replication, the often misapplied B2D and D2D strategies, and “tapeless” backup environments. Continuous data protection and remote replication strategies are also addressed as they are integrated within backup strategies—a very important topic today. Learn backup solution design regardless of specific backup software Design realistic recovery solutions Take into account new data protection standards and the impact of data replication Whether you are using NetBackup, CommVault, or some other backup software, Pro Data Backup and Recovery will give you the information you need to keep your data safe and available.