Browse Results

Showing 19,851 through 19,875 of 53,912 results

Automating Microsoft Windows Server 2008 R2 with Windows PowerShell 2.0

by Matthew Hester Sarah Dutkiewicz

Learn to automate the top server operating system, Windows Server 2008 R2 Windows PowerShell 2. 0 allows you to automate nearly any task for managing Windows Server, going from dozens of clicks to a single command, and repeated tasks to automated tasks. Using screen shots and helpful exercises, this book walks you through the many benefits of automating Windows Server with PowerShell 2. 0, such as allowing for scalable, flexible, and rapid deployments and changes; increasing cost effectiveness; providing a timely return on IT investment; lowering labor headcount; creating secure computing environments; and establishing reliable enterprise infrastructures. In addition, real-world examples provide reinforced learning, aimed at ensuring that you work as efficiently and effectively as possible by automating both simple and complex administrative tasks with Powershell 2. 0. Explains how to automate both simple and complex tasks in Windows Server 2008 R2 with Powershell 2. 0 Addresses how Windows Server 2008 R2 comes with more than 550 cmdlets, allowing you to automate nearly anything Offers numerous real-world examples, end-of-chapter exercises, and helpful screen shots to reinforce your learning process The power is in your hands! Start working smarter, not harder, by automating Windows Server 2008 R2 tasks with Powershell 2. 0.

Microsoft Windows Server 2008 R2 Administration Instant Reference

by Matthew Hester Chris Henley

All your Windows Server 2008 R2 questions answered--on the spot Get up to speed on the new features of Windows Server 2008 R2 with this indispensableguide. Designed for busy IT professionals, it's the perfect go-to resource for quick answers and real-world solutions as you administer the new server OS. You'll find easy-to-read lists, quick-reference tables, helpful thumb tabs, and much more in a handy, compact format that puts the information you need at your fingertips. Topics include: Getting started and adding roles and functionalityAutomating tasksManaging users, groups, directories, and the centralized desktopHandling folder security, disk management, storage, backup, and recoveryMonitoring and maintaining web serversTroubleshooting IP and managing remote accessDoing performance tuning and maintaining virtual servers

Microsoft® Windows Server® 2012 Administration

by Matthew Hester Chris Henley

Fast, accurate answers for common Windows Server questions Serving as a perfect companion to all Windows Server books, this reference provides you with quick and easily searchable solutions to day-to-day challenges of Microsoft's newest version of Windows Server. Using helpful design features such as thumb tabs, tables of contents, and special heading treatments, this resource boasts a smooth and seamless approach to finding information. Plus, quick-reference tables and lists provide additional on-the-spot answers. Covers such key topics as server roles and functionality, user and group maintenance, directory management and replication, and backup and recovery Addresses automating administrative tasks and managing server remote access Helps you with disk management and storage, folder security, and performance tuning Walks you through common troubleshooting issues as well as maintaining and controlling the centralized desktop Microsoft Windows Server 2012 Administration Instant Reference is a must-have resource for finding quick answers quickly!

GitLab Repository Management

by Jonathan M. Hethey

A simple, easy to understand tutorial guide on how to build teams and efficiently use version control, using GitLab.If you are a system administrator in a company that writes software or are in charge of an infrastructure, this book will show you the most important features of GitLab, including how to speed up the overall process

Beginning Python: From Novice to Professional (Novice To Pro Ser.)

by Magnus Lie Hetland

Gain a fundamental understanding of Python's syntax and features with the second edition of Beginning Python, an up-to-date introduction and practical reference. Covering a wide array of Python-related programming topics, including addressing language internals, database integration, network programming, and web services, you'll be guided by sound development principles. Ten accompanying projects will ensure you can get your hands dirty in no time. Updated to reflect the latest in Python programming paradigms and several of the most crucial features found in Python 3. 0 (otherwise known as Python 3000), advanced topics, such as extending Python and packaging/distributing Python applications, are also covered. What you'll learn Become a proficient Python programmer by following along with a friendly, practical guide to the language's key features Write code faster by learning how to take advantage of advanced features such as magic methods, exceptions, and abstraction Gain insight into modern Python programming paradigms including testing, documentation, packaging, and distribution Learn by following along with ten interesting projects, including a P2P file-sharing application, chat client, video game, remote text editor, and more Complete, downloadable code is provided for each project! Who this book is for Programmers, novice and otherwise, seeking a comprehensive introduction to the Python programming language.

Python Algorithms

by Magnus Lie Hetland

Python Algorithms, Second Edition explains the Python approach to algorithm analysis and design. Written by Magnus Lie Hetland, author of Beginning Python, this book is sharply focused on classical algorithms, but it also gives a solid understanding of fundamental algorithmic problem-solving techniques. The book deals with some of the most important and challenging areas of programming and computer science in a highly readable manner. It covers both algorithmic theory and programming practice, demonstrating how theory is reflected in real Python programs. Well-known algorithms and data structures that are built into the Python language are explained, and the user is shown how to implement and evaluate others.

Teaching Literature with Digital Technology Assignments

by Tim Hetland

Teaching Literature with Digital Technology is a collection of digital assignments, each created by a contributor in the fields of literature and composition. Edited by Seattle-based scholar and teacher Tim Hetland and available as a print text or PDF e-book, this resource for instructors invites students to become knowledge-makers as it introduces creative uses of social media, digital tools, podcasts, multimodal assignments, and digital archives to learn about literature. Sample assignments can be viewed in the Professional Resources folder on the Macmillan English Community site. To order the print text, use ISBN: 978-1-4576-2948-8; to order a PDF e-book of the text, use ISBN: 978-1-3190-7643-6.

Agile Security Operations: Engineering for agility in cyber defense, detection, and response

by Hinne Hettema

Get to grips with security operations through incident response, the ATT&CK framework, active defense, and agile threat intelligenceKey FeaturesExplore robust and predictable security operations based on measurable service performanceLearn how to improve the security posture and work on security auditsDiscover ways to integrate agile security operations into development and operationsBook DescriptionAgile security operations allow organizations to survive cybersecurity incidents, deliver key insights into the security posture of an organization, and operate security as an integral part of development and operations. It is, deep down, how security has always operated at its best.Agile Security Operations will teach you how to implement and operate an agile security operations model in your organization. The book focuses on the culture, staffing, technology, strategy, and tactical aspects of security operations. You'll learn how to establish and build a team and transform your existing team into one that can execute agile security operations. As you progress through the chapters, you'll be able to improve your understanding of some of the key concepts of security, align operations with the rest of the business, streamline your operations, learn how to report to senior levels in the organization, and acquire funding.By the end of this Agile book, you'll be ready to start implementing agile security operations, using the book as a handy reference.What you will learnGet acquainted with the changing landscape of security operationsUnderstand how to sense an attacker's motives and capabilitiesGrasp key concepts of the kill chain, the ATT&CK framework, and the Cynefin frameworkGet to grips with designing and developing a defensible security architectureExplore detection and response engineeringOvercome challenges in measuring the security postureDerive and communicate business values through security operationsDiscover ways to implement security as part of development and business operationsWho this book is forThis book is for new and established CSOC managers as well as CISO, CDO, and CIO-level decision-makers. If you work as a cybersecurity engineer or analyst, you'll find this book useful. Intermediate-level knowledge of incident response, cybersecurity, and threat intelligence is necessary to get started with the book.

Microelectronic Systems

by Albert Heuberger Randolf Hanke Günter Elst Karlheinz Kirsch Janina Heppner

This book is dedicated to Prof. Dr. Heinz Gerhäuser on the occasion of his retirement both from the position of Executive Director of the Fraunhofer Institute for Integrated Circuits IIS and from the Endowed Chair of Information Technologies with a Focus on Communication Electronics (LIKE) at the Friedrich-Alexander-Universität Erlangen-Nürnberg. Heinz Gerhäuser's vision and entrepreneurial spirit have made the Fraunhofer IIS one of the most successful and renowned German research institutions. He has been Director of the Fraunhofer IIS since 1993, and under his leadership it has grown to become the largest of Germany's 60 Fraunhofer Institutes, a position it retains to this day, currently employing over 730 staff. Likely his most important scientific as well as application-related contribution was his pivotal role in the development of the mp3 format, which would later become a worldwide success. The contributions to this Festschrift were written by both Fraunhofer IIS staff and external project team members in appreciation of Prof. Dr. Gerhäuser's lifetime academic achievements and his inspiring leadership at the Fraunhofer IIS. The papers reflect the broad spectrum of the institute's research activities and are grouped into sections on circuits, information systems, visual computing, and audio and multimedia. They provide academic and industrial researchers in fields like signal processing, sensor networks, microelectronics, and integrated circuits with an up-to-date overview of research results that have a huge potential for cutting-edge industrial applications.

Digitalisierung in Bund, Ländern und Gemeinden

by Roland Heuermann Matthias Tomenendal Christian Bressem

Dieses Buch stellt erstmals die Gesamtsituation des IT-Managements der Digitalisierung im Öffentlichen Bereich Deutschlands vor. Aufgrund ihrer Schlüsselfunktion für die Verbesserungen in der Verwaltung selbst, aber auch der möglichen innovativen Impulse für unsere Gesellschaft – jeden IT-Nutzer und die Privatwirtschaft –, spielt sie eine sehr wichtige Rolle in Politik und Verwaltungsmanagement. Daher stehen hier vor allem folgende Fragen im Mittelpunkt: Wie managt der Öffentliche Bereich die Schlüsselkompetenz Informationswirtschaft? Wie stellt sich die Ausgangssituation in Bund, Ländern und Kommunen in Bezug auf die eigene Digitalisierung dar, welchen Stellenwert hat das IT-Management im eigenen Bereich des Öffentlichen Sektors? Welche Auswirkungen haben die Trends in der Digitaltechnologie auf Menschen, Wirtschaft, Gesellschaft, Politik, Verwaltung und Staat? Welche Empfehlungen lassen sich daraus ableiten? Das Buch soll dazu beitragen, mehr Aufmerksamkeit für das Thema zu erzeugen und liefert aus Sicht von IT-Verantwortlichen und externen Experten einen systematischen Überblick.

How to Reduce the Cost of Software Testing

by Matthew Heusser Govind Kulkarni

Plenty of software testing books tell you how to test well; this one tells you how to do it while decreasing your testing budget. A series of essays written by some of the leading minds in software testing, How to Reduce the Cost of Software Testing provides tips, tactics, and techniques to help readers accelerate the testing process, improve the performance of the test teams, and lower costs.The distinguished team of contributors—that includes corporate test leaders, best paper authors, and keynote speakers from leading software testing conferences—supply concrete suggestions on how to find cost savings without sacrificing outcome. Detailing strategies that testers can immediately put to use to reduce costs, the book explains how to make testing nimble, how to remove bottlenecks in the testing process, and how to locate and track defects efficiently and effectively.Written in language accessible to non-technical executives, as well as those doing the testing, the book considers the latest advances in test automation, ideology, and technology. Rather than present the perspective of one or two experts in software testing, it supplies the wide-ranging perspectives of a team of experts to help ensure your team can deliver a completed test cycle in less time, with more confidence, and reduced costs.

The Advanced Game Narrative Toolbox

by Tobias Heussner

The Advanced Game Narrative Toolbox continues where the Game Narrative Toolbox ended. While the later covered the basics of writing for games, the Advanced Game Narrative Toolbox will cover techniques for the intermediate and professional writer. The book will cover topics such as how to adapt a novel to a game, how to revive IPs and how to construct transmedia worlds. Each chapter will be written by a professional with exceptional experience in the field of the chapter. Key Features Learn from industry experts how to tackle today’s challenges in storytelling for games. A learn by example and exercise approach, which was praised in the Game Narrative Toolbox. An in depth view on advanced storytelling techniques and topics as they are currently discussed and used in the gaming industry. Expand your knowledge in game writing as you learn and try yourself to design quests, write romances and build worlds as you would as a writer in a game studio. Improve your own stories by learning and trying the techniques used by the professionals of game writing.

The Game Narrative Toolbox (Focal Press Game Design Workshops)

by Tobias Heussner Toiya Kristen Finley Jennifer Brandes Hepler Ann Lemay

Learn how to create compelling game storylines. Four experienced narrative designers from different genres of game development have banded together to create this all-inclusive guide on what it's like to work as a writer and narrative designer in the video game industry. From concept to final testing, The Game Narrative Toolbox walks readers through what role a narrative designer plays on a development team and what the requirements are at every stage of development. Drawing on real experiences, authors Tobias Heussner, Toiya Kristen Finley, PhD, Ann Lemay, and Jennifer Brandes Hepler provide invaluable advice for writing compelling player-centered stories and effective dialogue trees to help readers make the switch from writing prose or screenplay to interactive. Thoroughly revised, the Second Edition includes updated content reflecting the industry’s latest developments. In addition to revised and updated chapters, this new edition features two additional chapters covering more advanced topics that are applicable to the lessons learned from the original chapters. Accompanying every chapter are exercises that allow the reader to develop their own documentation, outlines, and game-dialogue samples for use in applying for industry jobs or developing independent projects.

The Game Narrative Toolbox (Focal Press Game Design Workshops)

by Tobias Heussner Jennifer Brandes Hepler Toiya Kristen Finley Ann Lemay

Learn how to create compelling game storylines. Four experienced narrative designers from different genres of game development have banded together to create this all-inclusive guide on what it's like to work as a writer and narrative designer in the videogame industry. From concept to final testing, The Game Narrative Toolbox walks readers through what role a narrative designer plays on a development team and what the requirements are at every stage of development. Drawing on real experiences, authors Tobias Heussner, Toiya Finley, Ann Lemay, and Jennifer Hepler provide invaluable advice for writing compelling player-centered stories and effective dialogue trees in order to help readers make the switch from prose- or screen- writing to interactive. Accompanying every chapter are exercises that allow the reader to develop their own documentation, outlines, and game-dialogue samples for use in applying for industry jobs or developing independent projects. This first installment of Focal Press's Game Design Workshops series is a must-have for individuals looking to create captivating storylines for games.

Design Research in Information Systems

by Alan Hevner Samir Chatterjee

The study of Information Systems (IS) design is an essential part of the education of IS students and professionals. The purpose of this book is to provide a thorough reference on Design Science Research (DSR), and it comes from two authors closely identified with DSR - Alan Hevner and Samir Chatterjee. As founders of the Design Science Research in Information Systems and Technology (DESRIST) annual conference, and as leading educators and researchers in the field, these authors, along with several invited contributors , are uniquely qualified to create this easy-to-read, easy-to-understand, and easy-to-apply text/reference. Suitable for graduate courses in IS, computer science, software engineering, engineering design and other design-oriented fields, it can be used as a core text or a reference for doctoral seminars in DSR. IS faculty and researchers will find much of value here as well. It requires no extensive background in design and can be appreciated by practitioners working in IS or technology design. Its 18 chapters are all individually referenced, and two appendices provide a reprint of the seminal 2004 MISQ paper by Hevner, March, Park, and Ram, as well as a list of exemplar papers in Design Science. The book provides a thorough introduction to DSR, a look at DSR in IS, examinations of DSR frameworks and design theory, and a look at the key principles of DSR in IS. Other chapters look at design for software-intensive systems, people and design, the past and present of software designs, evaluation methods, focus-group use, design creativity, and a design language for knowledge management systems. Later chapters explore integrating action research with design research, design science in management disciplines, a critical realist perspective of DSR in IS, a taxonomic look at design of emerging digital services, the dissemination of DSR, and, finally, a look at the future for DSR in IS.

The Transdisciplinary Reach of Design Science Research: 17th International Conference on Design Science Research in Information Systems and Technology, DESRIST 2022, St Petersburg, FL, USA, June 1–3, 2022, Proceedings (Lecture Notes in Computer Science #13229)

by Alan Hevner Aurona Gerber Andreas Drechsler

This book constitutes the thoroughly refereed proceedings of the 17th International Conference on Design Science Research in Information Systems and Technology, DESRIST 2022, held in Tampa, FL, USA, in June 2022. The 37 revised full research papers, included in the volume were carefully reviewed and selected from 103 submissions. They are organized in the following topical sections: ​Transdisciplinary Research & DSR (theme Track); Blockchain Information Systems; Intelligent Systems and Human Interaction; Healthcare Systems and Quality of Life; Innovation and Entrepreneurship; Sustainability and Responsible Design (Environmental Issues, Human Values and ethical Design); Human Safety and Cybersecurity; Emerging DSR Methods and Processes; Designers and Collaborative DSR; and Education and DSR.

Student Participation in Online Discussions

by Khe Foon Hew Wing Sum Cheung

The increasingly prevalent use of online- or blended-learning in schools universities has resulted in asynchronous online discussion forum becoming an increasingly common means to facilitate dialogue between instructors and students, as well as students and students beyond the boundaries of their physical classrooms. This proposed academic book contributes to the literature on asynchronous online discussions in the following three main ways: First, it reviews previous research studies in order to identify the factors leading to limited student contribution. Limited student contribution is defined as students making few or no postings, students exhibiting surface-level thinking or students demonstrating low-level knowledge construction in online discussions. It then identifies the various empirically-based guidelines to address the factors. Second, three potential guideline dilemmas that educators may encounter: (a) use of grades, (b) use of number of posting guideline, and (c) instructor-facilitation are introduced. These are guidelines where previous empirical research shows mixed results when they are implemented. Acknowledging the dilemmas is essential for educators and researchers to make informed decisions about the discussion guidelines they are considering implementing. Third, nine exploratory case studies related to student-facilitation and audio-based discussion are reported on and examined. Using students as facilitators may be an alternative solution to educators who wish to avoid the instructor-facilitation guideline dilemma. Using audio discussion would be useful for participants with poor typing skills or those who prefer talking to typing. The proposed book is distinctive in comparison to current competitor titles because all the findings and guidelines are empirically-based. Furthermore, the nine expanded case studies provided specifically address the issue of student/peer facilitation and audio-based discussion. Student/peer facilitation and audio discussion are two areas that hitherto received comparatively lesser attention compared to instructor facilitation and text-based discussion.

Using Blended Learning

by Khe Foon Hew Wing Sum Cheung

This book discusses evidence-based practices related to the use of blended learning in both K-12 and higher education settings. Specifically, this book features evidence-based practices in relation to the following five learning goals: (a) Fostering students' attitude change toward country, (b) Helping students' solve ill-structured design task problems, (c) Improving students' critical thinking in assessing sources of information, (d) Improving students' narrative and argumentative writing abilities and (e) Enhancing students' knowledge retention and understanding. To achieve this aim, the authors draw upon their own research studies as well as some other relevant studies to reveal the pedagogical approaches, the specific instructional/learning activities, the technologies utilized and the overall framework for developing blended learning experiences.

Data Protection in a Post-Pandemic Society: Laws, Regulations, Best Practices and Recent Solutions

by Chaminda Hewage Yogachandran Rahulamathavan Deepthi Ratnayake

This book offers the latest research results and predictions in data protection with a special focus on post-pandemic society. This book also includes various case studies and applications on data protection. It includes the Internet of Things (IoT), smart cities, federated learning, Metaverse, cryptography and cybersecurity. Data protection has burst onto the computer security scene due to the increased interest in securing personal data. Data protection is a key aspect of information security where personal and business data need to be protected from unauthorized access and modification. The stolen personal information has been used for many purposes such as ransom, bullying and identity theft. Due to the wider usage of the Internet and social media applications, people make themselves vulnerable by sharing personal data. This book discusses the challenges associated with personal data protection prior, during and post COVID-19 pandemic. Some of these challenges are caused by the technological advancements (e.g. Artificial Intelligence (AI)/Machine Learning (ML) and ChatGPT). In order to preserve the privacy of the data involved, there are novel techniques such as zero knowledge proof, fully homomorphic encryption, multi-party computations are being deployed. The tension between data privacy and data utility drive innovation in this area where numerous start-ups around the world have started receiving funding from government agencies and venture capitalists. This fuels the adoption of privacy-preserving data computation techniques in real application and the field is rapidly evolving. Researchers and students studying/working in data protection and related security fields will find this book useful as a reference.

Instant uTorrent

by Adrian Hewitt

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks.This book takes a practical, hands-on approach to installing and using uTorrent.This book is great for tech-savvy users who are familiar with network basics and who are looking for an easy-to-follow guide to the BitTorrent technology using uTorrent as the program of choice.

Cassandra: The Definitive Guide

by Eben Hewitt

What could you do with data if scalability wasn't a problem? With this hands-on guide, you'll learn how Apache Cassandra handles hundreds of terabytes of data while remaining highly available across multiple data centers -- capabilities that have attracted Facebook, Twitter, and other data-intensive companies. Cassandra: The Definitive Guide provides the technical details and practical examples you need to assess this database management system and put it to work in a production environment. Author Eben Hewitt demonstrates the advantages of Cassandra's nonrelational design, and pays special attention to data modeling. If you're a developer, DBA, application architect, or manager looking to solve a database scaling issue or future-proof your application, this guide shows you how to harness Cassandra's speed and flexibility. Understand the tenets of Cassandra's column-oriented structure Learn how to write, update, and read Cassandra data Discover how to add or remove nodes from the cluster as your application requires Examine a working application that translates from a relational model to Cassandra's data model Use examples for writing clients in Java, Python, and C# Use the JMX interface to monitor a cluster's usage, memory patterns, and more Tune memory settings, data storage, and caching for better performance

Java SOA Cookbook: SOA Implementation Recipes, Tips, and Techniques

by Eben Hewitt

Java SOA Cookbook offers practical solutions and advice to programmers charged with implementing a service-oriented architecture (SOA) in their organization. Instead of providing another conceptual, high-level view of SOA, this cookbook shows you how to make SOA work. It's full of Java and XML code you can insert directly into your applications and recipes you can apply right away. The book focuses primarily on the use of free and open source Java Web Services technologies -- including Java SE 6 and Java EE 5 tools -- but you'll find tips for using commercially available tools as well. Java SOA Cookbook will help you: Construct XML vocabularies and data models appropriate to SOA applications Build real-world web services using the latest Java standards, including JAX-WS 2.1 and JAX-RS 1.0 for RESTful web services Integrate applications from popular service providers using SOAP, POX, and Atom Create service orchestrations with complete coverage of the WS-BPEL (Business Process Execution Language) 2.0 standard Improve the reliability of SOAP-based services with specifications such as WS-Reliable Messaging Deal with governance, interoperability, and quality-of-service issues The recipes in Java SOA Cookbook will equip you with the knowledge you need to approach SOA as an integration challenge, not an obstacle.

Semantic Software Design: A New Theory and Practical Guide for Modern Architects

by Eben Hewitt

With this practical book, architects, CTOs, and CIOs will learn a set of patterns for the practice of architecture, including analysis, documentation, and communication. Author Eben Hewitt shows you how to create holistic and thoughtful technology plans, communicate them clearly, lead people toward the vision, and become a great architect or Chief Architect.This book covers each key aspect of architecture comprehensively, including how to incorporate business architecture, information architecture, data architecture, application (software) architecture together to have the best chance for the system’s success.Get a practical set of proven architecture practices focused on shipping great products using architectureLearn how architecture works effectively with development teams, management, and product management teams through the value chainFind updated special coverage on machine learning architectureGet usable templates to start incorporating into your teams immediatelyIncorporate business architecture, information architecture, data architecture, and application (software) architecture together

Technology Strategy Patterns: Architecture as Strategy

by Eben Hewitt

Technologists who want their ideas heard, understood, and funded are often told to speak the language of business—without really knowing what that is. This book’s toolkit provides architects, product managers, technology managers, and executives with a shared language—in the form of repeatable, practical patterns and templates—to produce great technology strategies.Author Eben Hewitt developed 39 patterns over the course of a decade in his work as CTO, CIO, and chief architect for several global tech companies. With these proven tools, you can define, create, elaborate, refine, and communicate your architecture goals, plans, and approach in a way that executives can readily understand, approve, and execute.This book covers:Architecture and strategy: Adopt a strategic architectural mindset to make a meaningful material impactCreating your strategy: Define the components of your technology strategy using proven patternsCommunicating the strategy: Convey your technology strategy in a compelling way to a variety of audiencesBringing it all together: Employ patterns individually or in clusters for specific problems; use the complete framework for a comprehensive strategy

Cassandra: The Definitive Guide

by Eben Hewitt Jeff Carpenter

Imagine what you could do if scalability wasn't a problem. With this hands-on guide, you'll learn how the Cassandra database management system handles hundreds of terabytes of data while remaining highly available across multiple data centers. This expanded second edition--updated for Cassandra 3.0--provides the technical details and practical examples you need to put this database to work in a production environment.Authors Jeff Carpenter and Eben Hewitt demonstrate the advantages of Cassandra's non-relational design, with special attention to data modeling. If you're a developer, DBA, or application architect looking to solve a database scaling issue or future-proof your application, this guide helps you harness Cassandra's speed and flexibility.Understand Cassandra's distributed and decentralized structureUse the Cassandra Query Language (CQL) and cqlsh--the CQL shellCreate a working data model and compare it with an equivalent relational modelDevelop sample applications using client drivers for languages including Java, Python, and Node.jsExplore cluster topology and learn how nodes exchange dataMaintain a high level of performance in your clusterDeploy Cassandra on site, in the Cloud, or with DockerIntegrate Cassandra with Spark, Hadoop, Elasticsearch, Solr, and Lucene

Refine Search

Showing 19,851 through 19,875 of 53,912 results