Browse Results

Showing 14,426 through 14,450 of 63,011 results

Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program

by John Jackson

An insider’s guide showing companies how to spot and remedy vulnerabilities in their security programs A bug bounty program is offered by organizations for people to receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. Corporate Cybersecurity gives cyber and application security engineers (who may have little or no experience with a bounty program) a hands-on guide for creating or managing an effective bug bounty program. Written by a cyber security expert, the book is filled with the information, guidelines, and tools that engineers can adopt to sharpen their skills and become knowledgeable in researching, configuring, and managing bug bounty programs. This book addresses the technical aspect of tooling and managing a bug bounty program and discusses common issues that engineers may run into on a daily basis. The author includes information on the often-overlooked communication and follow-through approaches of effective management. Corporate Cybersecurity provides a much-needed resource on how companies identify and solve weaknesses in their security program. This important book: Contains a much-needed guide aimed at cyber and application security engineers Presents a unique defensive guide for understanding and resolving security vulnerabilities Encourages research, configuring, and managing programs from the corporate perspective Topics covered include bug bounty overview; program set-up; vulnerability reports and disclosure; development and application Security Collaboration; understanding safe harbor and SLA Written for professionals working in the application and cyber security arena, Corporate Cybersecurity offers a comprehensive resource for building and maintaining an effective bug bounty program.

Corporate Data Quality: Voraussetzung erfolgreicher Geschäftsmodelle

by Boris Otto Hubert Österle

Daten sind die strategische Ressource des 21. Jahrhunderts. Es findet kein Gesch#65533;ftsprozess, keine Kommunikation zwischen Gesch#65533;ftspartnern, keine Wertsch#65533;pfung statt, ohne dass die involvierten Personen, Maschinen und IT-Systeme Daten nutzen, erzeugen oder ver#65533;ndern. Trends wie die Digitalisierung, Industrie 4. 0 und Social Media tragen ebenfalls dazu bei, dass Datenmanagement zu einer Kernkompetenz f#65533;r erfolgreiche Unternehmen dieser Zeit geworden ist. Damit Daten ihren ganzen Wert entfalten k#65533;nnen, m#65533;ssen sie stets in angemessener Qualit#65533;t zur Verf#65533;gung stehen. Dies gilt besonders f#65533;r Stammdaten, die zentralen Gesch#65533;ftsobjekte eines Unternehmens. Dieses Buch zeigt einen ganzheitlichen Ansatz zum qualit#65533;tsbewussten Management von Stammdaten auf und richtet sich damit sowohl an Praktiker als auch an die Wissenschaft. Das ,,Framework f#65533;r Stammdatenqualit#65533;tsmanagement" wurde im Rahmen des ,,Competence Center Corporate Data Quality" der Universit#65533;t St. Gallen seit dem Jahr 2006 gemeinsam mit Unternehmen aus unterschiedlichen Industrien in zahlreichen praktischen Anwendungen entwickelt und verbessert. Neben den theoretischen Grundlagen r#65533;umt das Buch der praktischen Sicht mit 10 Fallstudien gro#65533;en Raum ein, die erfolgreich durchgef#65533;hrte Datenqualit#65533;tsprojekte praxisnah aufbereiten. Schlie#65533;lich f#65533;hrt das Buch noch Methoden und Werkzeuge f#65533;r das Datenqualit#65533;tsmanagement auf, die (Stamm-)datenmanager bei Projekten im eigenen betrieblichen Umfeld unterst#65533;tzen k#65533;nnen.

Corporate Defense and the Value Preservation Imperative: Bulletproof Your Corporate Defense Program (Security, Audit and Leadership Series #8)

by Sean Lyons

This is the first book to finally address the umbrella term corporate defense, and to explain how an integrated corporate defense program can help an organization address both value creation and preservation. The book explores the value preservation imperative, which represents an organization’s obligation to implement a comprehensive corporate defense program in order to deliver long-term sustainable value to its stakeholders. For the first time the reader is provided with a complete picture of how corporate defense operates all the way from the boardroom to the front-lines, and vice versa. It provides comprehensive guidance on how to implement a robust corporate defense program by addressing this challenge from strategic, tactical, and operational perspectives. This arrangement provides readers with a holistic view of corporate defense and incorporates the management of the eight critical corporate defense components. It includes how an organization needs to integrate its governance, risk, compliance, intelligence, security, resilience, controls and assurance activities within its corporate defense program. The book addresses the corporate defense requirement from various perspectives and helps readers to understand the critical interconnections and inter-dependencies which exist at strategic, tactical, and operational levels. It facilitates the reader in comprehending the importance of appropriately prioritizing corporate defense at a strategic level, while also educating the reader in the importance of managing corporate defense at a tactical level, and executing corporate defense activities at an operational level. Finally the book looks at the business case for implementing a robust corporate defense program and the value proposition of introducing a truly world class approach to addressing the value preservation imperative. Cut and paste this link (https://m.youtube.com/watch?v=u5R_eOPNHbI) to learn more about a corporate defense program and how the book will help you implement one in your organization.

Corporate Digital Responsibility im digitalen Marketing: Herausforderungen, Strategien und Best Practices für Digital Marketer (essentials)

by Benjamin Desche

Das Zauberwort für alle digitalen Marketingpraktiken heißt Effizienz! Effizienzsteigerung bedeutet immer die Vermeidung und Reduzierung des genutzten Datenvolumens und hat damit eine Senkung des Energieverbrauchs in Rechenzentren und auf Endgeräten zur Folge. Die Ansätze zur Optimierung sind vielfältig und reichen von der Planung über die Umsetzung bis hin zur Evaluation. Nachhaltiges Handeln ist nicht nur ein Gebot ökologischer und sozialer Verantwortung, sondern bietet auch Vorteile im Hinblick auf Regulierungskonformität, Kosteneffizienz und Marktposition – gerade im digitalen Umfeld, in dem der Ressourcenverbrauch im Fokus steht. Verantwortungsvoll digital werben heißt: durchdacht, präzise und klimabewusst handeln.

Corporate Diversity Communication Strategy: An Insight into American MNCs’ Online Communities and Social Media Engagement

by Roxana D. Maiorescu-Murphy

This book analyzes the brand communities of major American multinationals across three industries: finance, tech, and consumer goods. It assesses how companies communicate their diversity approaches on social media (Twitter) and studies the ensuing perceptions of online users. By comparing more innovative sectors (tech and consumer goods) with a less innovative industry (finance), the author examines differences in the way brands approach and communicate about diversity in online settings. The results of the study lead to the development of a theoretical framework with practical applications for business communication academics and professionals alike.

Corporate Politics for IT Managers: How to get Streetwise (Computer Weekly Professional Ser.)

by Robina Chatham Keith Patching

'Corporate Politics for IT Managers: How to get Streetwise' addresses some of the most persistent problems faced by IT managers which undermine their power and influence in their organisations and which prevents them obtaining seat on the board of directors.It deals directly with the IT stereotype and offers advice on how to survive and then thrive despite the odds being stacked against the IT manager. Divided into four parts, 'How the IT Manager Gets Streetwise' begins by placing the IT stereotype in context, and proceeds to challenge the IT persons' habitual behaviours of the past, and present ways of rethinking IT services, before concluding with how managers can become "streetwise" in today's organisations.There are many books on the market telling IT managers how to construct IT and IS strategies, and even more on how to 'run' an IT department or function. However, few deal with the politics in organisations.'Corporate Politics for IT Managers: How to get Streetwise' equips IT managers with the necessary skills to cope successfully in the political arenas of the boardrooms in today's businesses.

Corporate Risk Management: A Case Study on Risk Evaluation (Springer Texts in Business and Economics)

by Joachim Häcker Dietmar Ernst

In times of crisis, risk management is more important than ever. In addition, companies are obliged to identify, quantify and aggregate risks as part of a risk management system. Legal and auditing standards have set the framework for doing so. This book uses a case study to show ‘step by step’ how risks can be analyzed and quantified with the help of Microsoft Excel. The book begins with the graphical representation of risks and the calculation of risk parameters such as the value at risk. It subsequently aggregates different risks into an overall risk using Monte Carlo simulation. Hedging risks is also explained, and how non-hedgeable risks can be integrated into a business plan. The assessment of extreme risks is also addressed, as is the modeling of volatilities. The book is aimed at students of business administration with a focus on finance.

Corporate Security in the Asia-Pacific Region: Crisis, Crime, Fraud, and Misconduct

by Christopher J. Cubbage CPP David J. Brooks PhD

As corporations and governments become more litigious and risk averse, international risk management becomes more complex. Corporate Security in the Asia-Pacific Region: Crisis, Crime, Fraud, and Misconduct examines real cases of corporate crisis, crime, fraud, and other misconduct that corporate security professionals need to be aware of to effect

Corporate Semantic Web: Wie semantische Anwendungen in Unternehmen Nutzen stiften (X.media.press)

by Börteçin Ege Bernhard Humm Anatol Reibold

Corporate Semantic Web - hierbei geht es um semantische Anwendungen, deren Einsatz für Kunden und Mitarbeiter von Unternehmen konkret Nutzen stiftet. Die Autoren, namhafte Experten aus Industrie und Wissenschaft, berichten über ihre Erfahrungen bei der Entwicklung solcher Anwendungen. Sie gehen auf Software-Architektur, Methodik, Linked Open Data Sets, Lizenzfragen und Technologieauswahl ein und präsentieren auch eine Marktstudie. Vorgestellt werden Anwendungen für die Branchen Telekommunikation, Logistik, verarbeitende Industrie, Energie, Medizin, Tourismus, Bibliotheks- und Verlagswesen sowie Kultur. Der Leser erhält so einen umfassenden Überblick über die Einsatzbereiche des Semantic Web sowie konkrete Umsetzungshinweise für eigene Vorhaben.

Corporate-Influencer-Programme: So gewinnen Unternehmen Mitarbeitende als digitale Markenbotschafter für LinkedIn (essentials)

by Carolin Durst Julian Steigerwald

Dieses essential bietet eine fundierte Analyse und praktische Hinweise zur erfolgreichen Implementierung von Corporate-Influencer-Programmen auf LinkedIn. Es beleuchtet die entscheidenden Einflussfaktoren, die Mitarbeitende motivieren, als digitale Markenbotschafter für ihr Unternehmen zu agieren und zeigt auf, wie Unternehmen diese Potenziale optimal nutzen können. In einer detaillierten Conjoint-Analyse werden die Rahmenbedingungen für erfolgreiche Programme untersucht – von besonderer Bedeutung ist dabei eine moderne und gelebte Unternehmenskultur. Für alle Verantwortlichen in der Unternehmenskommunikation, HR und Marketing, die ihre Strategien im Bereich Corporate Influencing optimieren und langfristig eine positive Arbeitgebermarke aufbauen wollen.

Corpus Linguistics in Chinese Contexts (New Language Learning and Teaching Environments)

by Simon Smith Bin Zou Michael Hoey

Rapid advances in computing have enabled the integration of corpora into language teaching and learning, yet in China corpus methods have not yet been widely adopted. Corpus Linguistics in Chinese Contexts aims to advance the state of the art in the use of corpora in applied linguistics and contribute to the expertise in corpus use in China.

Correct Software in Web Applications and Web Services (Texts & Monographs in Symbolic Computation)

by Klaus-Dieter Schewe Bernhard Thalheim Andreas Prinz Bruno Buchberger

The papers in this volume aim at obtaining a common understanding of the challenging research questions in web applications comprising web information systems, web services, and web interoperability; obtaining a common understanding of verification needs in web applications; achieving a common understanding of the available rigorous approaches to system development, and the cases in which they have succeeded; identifying how rigorous software engineering methods can be exploited to develop suitable web applications; and at developing a European-scale research agenda combining theory, methods and tools that would lead to suitable web applications with the potential to implement systems for computation in the public domain.

Correct-by-Construction System on Chip Design

by Parthasarathi Roop Samik Basu Roopak Sinha

This book describes an approach for designing Systems-on-Chip such that the system meets precise mathematical requirements. The methodologies presented enable embedded systems designers to reuse intellectual property (IP) blocks from existing designs in an efficient, reliable manner, automatically generating correct SoCs from multiple, possibly mismatching, components.

Correction Formulae for the Stress Distribution in Round Tensile Specimens at Neck Presence (SpringerBriefs in Applied Sciences and Technology)

by Andreas Öchsner Magdalena Gromada Gennady Mishuris

The monograph deals with methods to determine mechanical properties and evaluate the flow curve of ductile materials from the tensile test. It presents classical hypotheses concerning the onset of neck creation as well as the state of the art in determining the mechanical properties from the tensile test, with emphasis on the consequences of the neck formation. It revises derivations of formulae for the stress distribution in the minimal cross-section of the axisymmetrical specimen in the classical approaches proposed by Bridgman, Davidenkov / Spiridonova and Siebel as well as in the less famous formulae derived by Szczepinski and Malinin / Petrosjan. The revision is completed with solutions evaluated by the authors. In the monograph, the simplifying assumptions utilised in the classical approaches were carefully verified by numerical simulations accompanied by theoretical analysis. Errors imposed in the evaluation of the average axial stress acting on the minimal cross-section as a result of every particular simplification are estimated. The accuracy of all formulae to evaluate the flow curve is discussed. The significance of a high accurate determination can be seen in the context of numerical simulation (e.g. finite element computations), where the total error and accuracy is partly based on the accuracy of the material input.

Correlation in Engineering and the Applied Sciences: Applications in R (Synthesis Lectures on Mathematics & Statistics)

by Rajan Chattamvelli

This book focuses on correlation coefficients and its applications in applied science fields. The book begins by describing the historical development and various types of correlations. Rank correlation methods including Pearson’s, Spearman’s, and Kendall’s correlation are discussed at length. The book also discusses sampling distribution of correlation coefficients and applications of correlations in various fields. The book presents novel topics such as (i) a quick analytical method to approximate Pearson's correlation, (ii) single-variable correlation, (iii) fractional co-skewness and co-kurtosis, and (iv) the fallacy on correlation between the sample mean and sample variance. This book is ideal for courses on mathematical statistics, engineering statistics, and exploratory data analysis and is primarily aimed at upper-undergraduate and graduate level students. The book is also useful for researchers and professionals in various fields who are interested in data analysis.

Correlation of Modelled Atmospheric Deposition of Cadmium, Mercury and Lead with the Measured Enrichment of these Elements in Moss

by Winfried Schröder Stefan Nickel Ilia Ilyin Oleg Travnikov

The book provides a unique analysis of current air pollution in Germany by correlating results from chemical transport modelling and accumulation monitoring by moss.Results of most recent modelling of atmospheric concentration and deposition of the metal elements Cd, Hg and Pb are compared with the results of technical measurements and bioindication with mosses. These modelling results with status 2020 have a higher spatial resolution of 0.1° x 0.1° than the modelling results valid up to then (50 km x 50 km). This leads to partly slightly higher correlations between the findings of the modelling and those of the moss monitoring. In this study, descriptive and correlation-statistical parameters are calculated, results and recommendations drawn described. A statistically adequately deepened analysis and evaluation of the highresolution modelling results requires additional methodological tools, which are outlined in summary. It is particularly important to link the exposure data from modelling, technical measurements and the findings from moss monitoring with information on the receptors, the ecosystem types. This is the only way to ensure that the results of the present project contribute to a more differentiated assessment of the impacts on ecosystems from atmospheric heavy metal deposition than has been the case to date, thus enabling a targeted further development of risk assessments for German

Corruption Networks: Concepts and Applications (Understanding Complex Systems)

by Oscar M. Granados José R. Nicolás-Carlock

This book aims to gather the insight of leading experts on corruption and anti-corruption studies working at the scientific frontier of this phenomenon using the multidisciplinary tools of data and network science, in order to present current theoretical, empirical, and operational efforts being performed in order to curb this problem. The research results strengthen the importance of evidence-based approaches in the fight against corruption in all its forms, and foster the discussion about the best ways to convert the obtained knowledge into public policy.The contributed chapters provide comprehensive and multidisciplinary approaches to handle the non-trivial structural and dynamical aspects that characterize the modern social, economic, political and technological systems where corruption takes place.This book will serve a broad multi-disciplinary audience from natural to social scientists, applied mathematicians, including law and policymakers.

Corruption, Fraud, Organized Crime, and the Shadow Economy (Advances in Police Theory and Practice)

by Peter C. Kratcoski Maximilian Edelbacher Bojan Dobovšek

Fueled by corruption, fraud, and organized crime, the shadow economy also known as the informal, black market, illegal, or underground economy is currently on the rise worldwide. Corruption, Fraud, Organized Crime, and the Shadow Economy addresses shadow economies and the players involved by examining various aspects of criminal law and prosecution

Coseismic Landslides: Intelligent Prediction and Recognition

by Lizhe Wang Xuewen Wang Xianmin Wang Haixiang Guo Qiyuan Yang Aomei Zhang

Focusing on Habitable Earth for sustainability, this book develops novel and sophisticated deep learning algorithms and explores their successful application in intelligent prediction and recognition of coseismic landslides. These algorithms have originality and unique advantages in relatively high accuracy, low false alarms, strong generalization, and good interpretability. They were successfully applied in a series of violent earthquakes occurring worldwide from 2008 to 2022. This book provides significant techniques to support the 72-hour &“golden window&” for survivors in emergency rescue and to instruct postseismic rational reconstruction and development in society and economy. With cutting-edge algorithms and international urgent disaster-mitigating demands, this book caters to geoscientists, environmentalists, engineering geologists, and hazard geologists. It also appeals graduate students in the above fields.

Cosine-/Sine-Modulated Filter Banks: General Properties, Fast Algorithms and Integer Approximations

by K. R. Rao Vladimir Britanak

This book covers various algorithmic developments in the perfect reconstruction cosine/sine-modulated filter banks (TDAC-MDCT/MDST or MLT, MCLT, low delay MDCT, complex exponential/cosine/sine-modulated QMF filter banks), and near-perfect reconstruction QMF banks (pseudo-QMF banks) in detail, including their general mathematical properties, matrix representations, fast algorithms and various methods to integer approximations being recently a new transform technology for lossless audio coding. Each chapter will contain a number of examples and will conclude with problems and exercises. The book reflects the research efforts/activities and achieved results of the authors in the time period over the last 20 years.

Cosmetics Marketing Strategy in the Era of the Digital Ecosystem: Revolutionizing Beauty in the New Market Frontier

by Young Won Park Paul Hong

This book explores how cosmetics firms have made the transition to technology-enabled beauty companies to meet changing customer demands. For this purpose, the contexts of cosmetics industry growth and digital marketing strategy in the post-pandemic world are presented here. The digital marketing strategies of Japanese and Korean firms are shown, along with new business models and future prospects in cosmetics industries. In the post-pandemic world, the growing middle class will set priorities for beauty–hygienic goals, nutritional choices, and healthcare development needs. The growth rates of Asian economies were slowed during the COVID-19 pandemic, yet their growth opportunities were not constrained. Diverse industries—the cosmetics industry in particular—have addressed the needs of these growing segments in Asia. In keeping up with the leading business trends, cosmetics firms also have leveraged big data and built their brand partnerships across industries, applying the Internet of Things (IoT) and artificial intelligence for their product and process development. The vast amounts of big data gathered through IoT devices are now being used to improve entire value chain operations, creating a digital thread through the global value chain. These data are increasingly used to create new services and develop a business model for global firms. As of 2021, four of the top ten global cosmetics firms are from the USA (Estée Lauder, Proctor & Gamble, Coty, and Johnson & Johnson), three are from Europe (L’Oréal, Unilever, and Beiersdorf), two from Japan (Shiseido and Kao), and one from Korea (Amore Pacific). The USA and European firms still maintain their competitive advantage in the cosmetics industry. Global cosmetics market share by region shows that North Asia is the largest (35%), followed by North America (26%) and Latin America (7%), Europe (22%), and Africa and other regions (10%). With the rapid increase of the middle class in the Asia region, more sales are expected there than anywhere else. In this dynamic market environment, a real challenge for the cosmetics industry is how to develop and put into practice its own unique business model.

Cosmic Rays: Multimessenger Astrophysics and Revolutionary Astronomy (Astronomers' Universe)

by Alessandro De Angelis

In recent years, cosmic rays have become the protagonists of a new scientific revolution. We are able today to film the Universe with telescopes of completely novel conception, recording information from many different messengers and accessing previously unknown cosmic regions.Written by a recognized authority in physics, this book takes readers on a captivating journey through the world of cosmic rays, their role in the revolutionary field of multi-messenger astronomy, their production from powerful accelerators close to the surfaces of black holes and compact objects, reaching the highest levels of energy observed in nature, and the implications this has for our understanding of the Universe. Through the stories of pioneering scientists, explorations of cutting-edge technologies, and simple explanations related to particle physics, quantum mechanics, and astrophysics, the book provides an illuminating state-of-the-art introduction to the current state of high-energy astrophysics. The book was written in straightforward yet rigorous language, so as to be accessible to the greater public. For those curious about the cosmos and cosmic gamma rays, nuclei, neutrinos, and gravitational waves, from casual observers to professional astronomers and physicists, the book is a must-read, offering a thrilling adventure into the future of astronomy and particle physics.

Cosmopolitan Commons

by Nil Disco Eda Kranakis

With the advent of modernity, the sharing of resources and infrastructures rapidly expanded beyond local communities into regional, national, and even transnational space -- nowhere as visibly as in Europe, with its small-scale political divisions. This volume views these shared resource spaces as the seedbeds of a new generation of technology-rich bureaucratic and transnational commons. Drawing on the theory of cosmopolitanism, which seeks to model the dynamics of an increasingly interdependent world, and on the tradition of commons scholarship inspired by the late Elinor Ostrom, the book develops a new theory of "cosmopolitan commons" that provides a framework for merging the study of technology with such issues as risk, moral order, and sustainability at levels beyond the nation-state. After laying out the theoretical framework, the book presents case studies that explore the empirical nuances: airspace as transport commons, radio broadcasting, hydropower, weather forecasting and genetic diversity as information commons, transboundary air pollution, and two "capstone" studies of interlinked, temporally layered commons: one on overlapping commons within the North Sea for freight, fishing, and fossil fuels; and one on commons for transport, salmon fishing, and clean water in the Rhine. Contributors: Hakon With Andersen, Nil Disco, Paul N. Edwards, Arne Kaijser, Eda Kranakis, Kristiina Korjonen-Kuusipuro, Tiago Saraiva, Nina WormbsThe hardcover edition does not include a dust jacket.

Cosmopolitan Commons: Sharing Resources and Risks across Borders (Infrastructures)

by Nil Disco Eda Kranakis

A new approach in commons theory to understand the interactions of technology, society, and nature, supported by case studies of new transnational European commons.With the advent of modernity, the sharing of resources and infrastructures rapidly expanded beyond local communities into regional, national, and even transnational space—nowhere as visibly as in Europe, with its small-scale political divisions. This volume views these shared resource spaces as the seedbeds of a new generation of technology-rich bureaucratic and transnational commons. Drawing on the theory of cosmopolitanism, which seeks to model the dynamics of an increasingly interdependent world, and on the tradition of commons scholarship inspired by the late Elinor Ostrom, the book develops a new theory of “cosmopolitan commons” that provides a framework for merging the study of technology with such issues as risk, moral order, and sustainability at levels beyond the nation-state. After laying out the theoretical framework, the book presents case studies that explore the empirical nuances: airspace as transport commons, radio broadcasting, hydropower, weather forecasting and genetic diversity as information commons, transboundary air pollution, and two “capstone” studies of interlinked, temporally layered commons: one on overlapping commons within the North Sea for freight, fishing, and fossil fuels; and one on commons for transport, salmon fishing, and clean water in the Rhine.ContributorsHåkon With Andersen, Nil Disco, Paul N. Edwards, Arne Kaijser, Eda Kranakis, Kristiina Korjonen-Kuusipuro, Tiago Saraiva, Nina Wormbs

Cosmos DB for MongoDB Developers: Migrating to Azure Cosmos DB and Using the MongoDB API

by Manish Sharma

Learn Azure Cosmos DB and its MongoDB API with hands-on samples and advanced features such as the multi-homing API, geo-replication, custom indexing, TTL, request units (RU), consistency levels, partitioning, and much more. Each chapter explains Azure Cosmos DB’s features and functionalities by comparing it to MongoDB with coding samples. Cosmos DB for MongoDB Developers starts with an overview of NoSQL and Azure Cosmos DB and moves on to demonstrate the difference between geo-replication of Azure Cosmos DB compared to MongoDB. Along the way you’ll cover subjects including indexing, partitioning, consistency, and sizing, all of which will help you understand the concepts of read units and how this calculation is derived from an existing MongoDB’s usage. The next part of the book shows you the process and strategies for migrating to Azure Cosmos DB. You will learn the day-to-day scenarios of using Azure Cosmos DB, its sizing strategies, and optimizing techniques for the MongoDB API. This information will help you when planning to migrate from MongoDB or if you would like to compare MongoDB to the Azure Cosmos DB MongoDB API before considering the switch.What You Will LearnMigrate to MongoDB and understand its strategiesDevelop a sample application using MongoDB’s client driverMake use of sizing best practices and performance optimization scenariosOptimize MongoDB’s partition mechanism and indexingWho This Book Is ForMongoDB developers who wish to learn Azure Cosmos DB. It specifically caters to a technical audience, working on MongoDB.

Refine Search

Showing 14,426 through 14,450 of 63,011 results