Browse Results

Showing 21,551 through 21,575 of 53,804 results

Gitolite Essentials

by Sitaram Chamarty

The book is written to suit an easy-reading style, using typical problems in access control to illustrate the need for each Gitolite feature explained. This book is for system administrators or development managers who need to keep a lid on Git-based development workflows. Basic knowledge of Git as well as of the Unix shell is helpful.

GitOps and Kubernetes: Continuous Deployment with Argo CD, Jenkins X, and Flux

by Billy Yuen Alex Matyushentsev Jesse Suen Todd Ekenstam

GitOps and Kubernetes teaches you how to use Git and the GitOps methodology to manage a Kubernetes cluster.Summary GitOps and Kubernetes introduces a radical idea—managing your infrastructure with the same Git pull requests you use to manage your codebase. In this in-depth tutorial, you&’ll learn to operate infrastructures based on powerful-but-complex technologies such as Kubernetes with the same Git version control tools most developers use daily. With these GitOps techniques and best practices, you&’ll accelerate application development without compromising on security, easily roll back infrastructure changes, and seamlessly introduce new team members to your automation process. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology With GitOps you use the Git version control system to organize and manage your infrastructure just like any other codebase. It&’s an excellent model for applications deployed as containers and pods on Kubernetes. About the book GitOps and Kubernetes teaches you how to use Git and the GitOps methodology to manage a Kubernetes cluster. The book interleaves theory with practice, presenting core Ops concepts alongside easy-to-implement techniques so you can put GitOps into action. Learn to develop pipelines that trace changes, roll back mistakes, and audit container deployment. What's inside Managing secrets the GitOps way Controlling access with Git, Kubernetes, and Pipeline Branching, namespaces, and configuration About the reader For developers and operations engineers familiar with continuous delivery, Git, and Kubernetes. About the author Billy Yuen, Alexander Matyushentsev, Todd Ekenstam, and Jesse Suen are principal engineers at Intuit. They are widely recognized for their work in GitOps for Kubernetes. Table of Contents PART 1 - BACKGROUND 1 Why GitOps? 2 Kubernetes & GitOps PART 2 - PATTERNS & PROCESSES 3 Environment Management 4 Pipelines 5 Deployment Strategies 6 Access Control & Security 7 Secrets 8 Observability PART 3 - TOOLS 9 Argo CD 10 Jenkins X 11 Flux

GitOps Cookbook

by Alex Soto Bueno Natale Vinto

Why are so many companies adopting GitOps for their DevOps and cloud native strategy? This reliable framework is quickly becoming the standard method for deploying apps to Kubernetes. With this practical, developer-oriented book, DevOps engineers, developers, IT architects, and SREs will learn the most useful recipes and examples for following GitOps practices.Through their years of experience in application modernization, CI/CD, and automation, authors Alex Soto Bueno and Natale Vinto from Red Hat walk you through all the steps necessary for successful hands-on application development and deployment with GitOps. Once you start using the recipes in this book, you'll have a head start in development cycles on Kubernetes following the GitOps approach.You'll learn how to:Develop and deploy applications on KubernetesUnderstand the basics of CI/CD and automation on Kubernetes, and apply GitOps practices to implement development cycles on the platformPrepare the app for deployment on multiple environments and/or multiple Kubernetes clustersDeploy apps for either multiple environments using GitOps and Argo CD, or for Kubernetes clustersCreate Kubernetes-native pipelines with TektonProvide and extend DevOps skills for the team working on KubernetesUse progressive delivery to put your applications into production

Giving Bodies Back to Data: Image Makers, Bricolage, and Reinvention in Magnetic Resonance Technology (Leonardo)

by Silvia Casini

An examination of the bodily, situated aspects of data-visualization work, looking at visualization practices around the development of MRI technology.Our bodies are scanned, probed, imaged, sampled, and transformed into data by clinicians and technologists. In this book, Silvia Casini reveals the affective relations and materiality that turn data into image--and in so doing, gives bodies back to data. Opening the black box of MRI technology, Casini examines the bodily, situated aspects of visualization practices around the development of this technology. Reframing existing narratives of biomedical innovation, she emphasizes the important but often overlooked roles played by aesthetics, affectivity, and craft practice in medical visualization. Combining history, theory, laboratory ethnography, archival research, and collaborative art-science, Casini retrieves the multiple presences and agencies of bodies in data visualization, mapping the traces of scientists' body work and embodied imagination. She presents an in-depth ethnographic study of MRI development at the University of Aberdeen's biomedical physics laboratory, from the construction of the first whole-body scanner for clinical purposes through the evolution of the FFC-MRI. Going beyond her original focus on MRI, she analyzes a selection of neuroscience- or biomedicine-inspired interventions by artists in media ranging from sculpture to virtual reality. Finally, she presents a methodology for designing and carrying out small-scale art-science projects, describing a collaboration that she herself arranged, highlighting the relational and aesthetic-laden character of data that are the product of craftsmanship and affective labor at the laboratory bench.

Gizmos or: How Digital Devices Have Transformed American Character And Culture

by Arthur Berger

Gizmos or: The Electronic Imperative offers a concise series of analyses on the transformative impact of digital devices on American society. With approaches ranging from semiotic theory to psychoanalytic theory, sociological theory to personal reflection, Berger taps the span of knowledge from his prolific career to help readers better understand the role digital devices play both in their technologic, economic, and common-use forms. Using accessible, conversational language and numerous illustrations, Berger deconstructs familiar objects and media for readers ranging from field specialists to everyday cultural consumers alike.

The Glare

by Margot Harrison

After living off the grid for more than a decade, a teenage girl must play a dangerous game -- and face the shadows of her past -- to save the world from a dangerous dark force. <P><P>After ten years of living on an isolated, tech-free ranch with her mother, sixteen-year-old Hedda is going back to the world of the Glare -- her word for cell phones, computers, and tablets. Hedda was taught to be afraid of technology, afraid that it would get inside her mind and hurt her. But now she's going to stay with her dad in California, where she was born, and she's finally ready to be normal. She's not going to go "off-kilter," like her mom says she did when she was just a little kid. <P><P>Once she arrives, Hedda finally feels like she's in control. She reunites with old friends and connects with her stepmom and half-brother. Never mind the terrifying nightmares and visions that start trickling back -- they're not real.Then Hedda rediscovers the Glare: the real Glare, a first-person shooter game from the dark web that scared her when she was younger. They say if you die thirteen times on level thirteen, you die in real life. But as Hedda starts playing the so-called "death game" -- and the game begins spreading among her friends -- she realizes the truth behind her nightmares is even more twisted than she could have imagined. And in order to stop the Glare, she'll have to first confront the darkness within herself.

Glaser on Health Care IT: Perspectives from the Decade that Defined Health Care Information Technology (HIMSS Book Series)

by John P. Glaser

John Glaser has been an astute observer and recognized leader in the health care industry for over thirty years. He has written a regular column for Hospitals & Health Networks in which he comments on a wide range of topics, including improving organizational performance through health information technology (HIT), changes in HIT architecture, challenges in leveraging data, and the evolution of the role of IT leadership. Glaser on Health Care IT: Perspectives from the Decade that Defined Health Care Information Technology is a collection of some of the most widely read articles that have been published in H&HN Daily, H&HN Weekly, and Most Wired Online in the past decade (2005–2015). The columns are dated to show their original publication dates, and the material is organized into four broad themes: HIT Applications and Analytics Challenges Improving Organizational Performance through HIT IT Management Challenges HIT Industry Observations Each section offers readers an intimate look at the myriad issues associated with getting IT "right" and the organizational performance gains that can be achieved in doing so. Moreover, the book examines the power and potential of the technologies available to health care providers today, as well as the transformative nature of those we have yet to fully embrace.From seasoned CIOs and consultants to software developers and nurses, this book provides invaluable insights and guidance to all those seeking to make the delivery of care safer, more effective, and more efficient through the application of health care IT.Foreword by Russ Branzell, President and CEO, College of Healthcare Information Management Executives (CHIME) Co-published with Health Forum, Inc.

Glass Houses

by Joel Brenner

A chilling and revelatory appraisal of the new faces of espionage and warfare on the digital battleground Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of National Intelligence. He saw at close range the battleground on which adversaries are attacking us: cyberspace. Like the rest of us, governments and corporations inhabit "glass houses,” all but transparent to a new generation of spies who operate remotely from such places as China, the Middle East, Russia, and even France. In this urgent wake-up call, Brenner draws on his extraordinary background to show what we can-and cannot-do to prevent cyber spies and hackers from compromising our security and stealing our latest technology. .

GlassFish Administration

by Xuekun Kou

This book provides an in-depth tutorial on administering the GlassFish application server. Every chapter starts with a clear discussion of the involved concepts, followed by step-by-step instructions on how to perform the administrative task. Clear illustrations and complete working code examples are used to help you visualize the relevant topics. If you are a Java EE application developer and architect who builds and deploys Java EE, Ruby on Rails, and other supported applications for the GlassFish Application Server, then this book is for you. This book is also very valuable if you are an administrator responsible for maintaining the GlassFish Server runtime. Basic knowledge of Java EE 5 is assumed but you need not have any previous knowledge of GlassFish. Those who already know the basics of GlassFish will still find this book useful as they will gain knowledge of administration tasks.

GlassFish Security

by Masoud Kalali

Security is driven by requirement and design and we implement security on the basis of the requirements provided by analysts. In this book, we take a programmatic approach to understand Java EE and GlassFish security. You will find plenty of code samples in this book. It is easy to secure your application when you have a demonstration of a complete and working application explained in the book, isn't it? Each chapter starts with the importance and relevance of the topic by introducing some Java EE applications requirement, which will encourage you to read it further. This book is for application designers, developers and administrators who work with GlassFish and are keen to understand Java EE and GlassFish security. To take full advantage of this book, you need to be familiar with Java EE and GlassFish application servers. You will love this book if you are looking for a book that covers Java EE security and using GlassFish features to create secure Java EE applications, or to secure the GlassFish installation and operating environment and using OpenSSO.

Glazed Panel Construction with Human-Robot Cooperation

by Seungyeol Lee

These days, construction companies are beginning to be concerned about a potential labor shortage by demographic changes and an aging construction work force. Also, an improvement in construction safety could not only reduce accidents but also decrease the cost of the construction, and is therefore one of the imperative goals of the construction industry. These challenges correspond to the potential for Automation and Robotics in Construction as one of solutions. Almost half of construction work is said to be material handling and materials used for construction are heavy and bulky for humans. To date, various types of robots have been developed for glazed panel construction. Through the case studies on construction, to which the robots were applied, however, we identified difficulties to be overcome. In this study, a human-robot cooperative system is deduced as one approach to surmount these difficulties; then, considerations on interactions among the operator, robot and environment are applied to design of the system controller. The human-robot cooperative system can cope with various and construction environments through real-time interaction with a human, robot and construction environment simultaneously. The physical power of a robot system helps a human to handle heavy construction materials with a relatively scaled-down load. Also, a human can feel and respond to the force reflected from robot end effecter acting with working environment. Through the experiments and mock-up tests with a prototype robot, we observe the characteristics of the power assist and the force reflection, the merits of the human-robot cooperation system. To apply human-robot cooperative system at real construction sites, Glazed Ceiling Panel Construction Robot is developed for the first time. This robot is distinguished from other glazed panel construction robots because of the methods of lifting the panel to high installation positions and installing the fragile and bulk panel with robot force control. After applying to real construction sites, evaluation on the productivity of the developed robot was done by comparing and analyzing with the existing installation methods.

Glencoe Introduction to Multimedia

by Ana Weston Solomon

This complete guide describes types of multimedia productions, how multimedia affects society, and the components and tools that are used to produce a multimedia product. Independent and collaborative exercises promote an interactive learning environment within a project-based framework.

Glencoe Introduction To Multimedia

by Ana Weston Solomon

Introduction to Multimedia is designed to help you become a skilled and creative user of current multimedia technology. The purpose of this course is to increase your understanding of multimedia concepts and techniques. You are the reason that this textbook was written. Multimedia is a vast and exciting domain.

Glencoe Keyboarding Connections: Projects and Applications

by Julie Jaehne Arlene Zimmerly

Students will learn keyboarding and complete numerous hands-on projects related to word processing, desktop publishing, presentation software, spreadsheets, and databases. The text was written for middle school students. All activities and projects are age-appropriate. Keyboarding Connections features a "fun" format complemented by a visually appealing game-like software interface. High-interest skill building exercises, applications, and games consistently hold students' attention. All new content includes extensive practice with e-mail, PowerPoint®, and Web page design. An Internet Connection feature provides search tips and relevant links. A user-friendly Web site features include State correlations, language arts activities, and additional teacher resources. Plus, everything is Windows 2000 and XP compatible!

Glencoe Keyboarding with Computer Applications

by McGraw-Hill

Microsoft Word 2007 is a powerful word processing program. Using this program, you can create documents that contain tables, artwork, and decorative fonts.

Glencoe Mechanical Drawing: Board and CAD Techniques

by Glencoe McGraw-Hill Staff

Project-based learning prepares students for professional certification with Glencoe Mechanical Drawing: Board and CAD Techniques! Endorsed by the American Design Drafting Association (ADDA), this text includes Prep for ADDA activities. Step-by-step applications, design problems, and drafting problems prepare students for professional excellence and certification. Project-based learning is supported with unit-based projects that integrate technical math and culminate in Build Your Portfolio activities. Help your students get ready for competitive events like the TSA and SkillsUSA with prep activities embedded throughout the content and end-of-chapter assessments. Rigorous academic content is supported, with a special emphasis on math, geometry, and science, with STEM activities. Point-of-use correlations ease possible academic credit application. Extra activities in the Student Edition and workbook help you meet Perkins mandates. The appendix features Math (including algebra and geometry), abbreviations and symbols, pipe symbols, and reference tables (ASME, ANSI, ISO).

Glide-Symmetric Z2 Magnetic Topological Crystalline Insulators (Springer Theses)

by Heejae Kim

This book presents a comprehensive theory on glide-symmetric topological crystalline insulators. Beginning with developing a theory of topological phase transitions between a topological and trivial phase, it derives a formula for topological invariance in a glide-symmetric topological phase when inversion symmetry is added into a system. It also shows that the addition of inversion symmetry drastically simplifies the formula, providing insights into this topological phase, and proposes potential implementations. Lastly, based on the above results, the author establishes a way to design topological photonic crystals. Allowing readers to gain a comprehensive understanding of the glide-symmetric topological crystalline insulators, the book offers a way to produce such a topological phase in various physical systems, such as electronic and photonic systems, in the future.

A Glimpse Beyond 5G in Wireless Networks (Signals and Communication Technology)

by Mohammad Abdul Matin

This book gathers the latest research findings on emerging trends in 5G and beyond wireless systems. The authors present and assess different enabling technologies, capabilities, and anticipated communications and computing solutions for 5G and beyond. Topics discussed include new frequency bands, new multiple antenna systems, massive D2D connectivity, new network deployment, and more. These discussions help the readers to understand more advanced research materials for developing new ideas to make a contribution in this field for themselves. This book aims to serve as a virtual and effective bridge between academic research in theory and engineering development in practice. Students, professional, and practitioners who seek to learn the latest development in wireless technologies should find interest in this book.

Glitch Art in Theory and Practice: Critical Failures and Post-Digital Aesthetics

by Michael Betancourt

Glitch Art in Theory and Practice: Critical Failures and Post-Digital Aesthetics explores the concept of "glitch" alongside contemporary digital political economy to develop a general theory of critical media using glitch as a case study and model, focusing specifically on examples of digital art and aesthetics. While prior literature on glitch practice in visual arts has been divided between historical discussions and social-political analyses, this work provides a rigorous, contemporary theoretical foundation and framework.

Glitch Kingdom

by Sheena Boekweg

The teenage daughter of an executioner and the traitorous prince she can’t kill must reluctantly join forces to dethrone a paranoid queen after discovering they are trapped in a video game in Sheena Boekweg's fast-paced YA debut, Glitch Kingdom...Ryo was the golden boy, the prankster prince, but with one stroke of a pen he has lost everything. Dagney and Grigfen were happy as minor members of the court, but when their father, the king's executioner, is branded a traitor, they each must deal in death in order to survive.. McKenna, queen of the enemy realm, has inherited a mission of conquest by assassination, but worries she's not up to the role. But behind the crowns and masks hides a secret… All of these teens are actually players in the newest, shiniest, most immersive virtual reality video game, competing against each other for a highly coveted internship with a prestigious game developer. But now this life-changing opportunity has suddenly become a deadly trap. A glitch in the software has locked the players inside the game, and they’ll need to escape before the fantasy world corrupts around them. The only way out is to win.

Global Aeronautical Distress and Safety Systems (GADSS): Theory and Applications

by Stojče Dimov Ilčev

This book presents the principal structure, networks and applications of the Global Aeronautical Distress and Safety System (GADSS) for enhanced airborne Communication, Navigation and Surveillance (CNS). It shows how their implementation works to ensure better security in flight and on the airports surface; improved aircraft tracking and determination in real space and time; and enhanced distress alerting, safety; and Search and Rescue (SAR) system for missing, hijacked and landed aircraft at sea or on the ground. Main topics of this book are as follows: an overview of radio and satellite systems with retrospective to aeronautical safety; security and distress systems; space segment with all aspects regarding satellite orbits and infrastructures; transmission segment of radio and satellite systems; ground segment of radio and earth ground stations; airborne radio and satellite antenna systems and propagation; aeronautical VHF and HF Radio CNS systems and networks; Inmarsat, Iridium and Cospas-Sasrast aeronautical satellite CNS systems and networks; Aeronautical Global Satellite Augmentation System (GSAS) and networks; Digital Video Broadcasting - Return Channel via Satellite (DVB-RCS) standards and Aeronautical Stratospheric Platform Systems (SPS) and networks.

Global Brand Management: A Guide to Developing, Building & Managing an International Brand

by Laurence Minsky Ilan Geva

In today's hyper-connected world, any brand with a website or digital presence is 'global' by its very definition; yet in practice it takes an enormous amount of strategic planning and adaptability to successfully manage an international brand. Global Brand Management explores the increasingly universal scope of brand management. In an era when many brand managers will find themselves working for large multinationals operating across varied territories, categories and consumer groups, developing an understanding of both the opportunities and risks of multinational brands is truly essential. Meticulously researched, Global Brand Management shows readers how to manage an existing global brand, while simultaneously equipping them with the skills to build one from scratch. The text uses fascinating case studies including Oreo, Harley Davidson and Xiaomi to demonstrate the challenges of maintaining a stable brand identity when operating across territories with different languages, cultural values and logistics. With helpful pedagogy throughout and built-in features to enhance classroom learning, Global Brand Management is the perfect springboard for students to appreciate, enjoy and embrace the nuances and complexities of brand management on an international scale.

The Global Classroom: How VIPKID Transformed Online Learning

by Lily Jones

Behind the Scenes of a Revolution in EducationIn 2013, Cindy Mi, a high school dropout turned English teacher, founded VIPKid with an innovative vision for education: facilitating personalized, one-on-one sessions with students and tutors from around the world. Six years later, her brainchild boasts a $3 billion valuation and connects approximately 500,000 students with 60,000 teachers worldwide. Thisis the story of a revolution in education.The Global Classroom takes readers inside the startup&’s history, educational innovation, and unprecedented success. With a foreword from Mi, the book takes a deep dive into a new educational model and investigates how the company&’s platform has diversified to serve the needs of students from countries across the globe. Readers will hear from VIPKid&’s executives, teachers, students, and parents as they discuss the company&’s values, its tangible success, and its impact on their lives.The Global Classroom is an inside look at the model for education in the 21st century and beyond.

Global COVID-19 Research and Modeling: A Historical Record (Data Analytics)

by Longbing Cao

This book provides answers to fundamental and challenging questions regarding the global response to COVID-19. It creates a historical record of COVID-19 research conducted over the four years of the pandemic, with a focus on how researchers have responded, quantified, and modeled COVID-19 problems. Since mid-2021, we have diligently monitored and analyzed global scientific efforts in tackling COVID-19. Our comprehensive global endeavor involves collecting, processing, analyzing, and discovering COVID-19 related scientific literature in English since January 2020. This provides insights into how scientists across disciplines and almost every country and regions have fought against COVID-19. Additionally, we explore the quantification of COVID-19 problems and impacts through mathematics, AI, machine learning, data science, epidemiology, and domain knowledge. The book reports findings on publication quantities, impacts, collaborations, and correlations with the economy and infectionsglobally, regionally, and country-wide. These results represent the first and only holistic and systematic studies aimed at scientifically understanding, quantifying, and containing the pandemic. We hope this comprehensive analysis will contribute to better preparedness, response, and management of future emergencies and inspire further research in infectious diseases. The book also serves as a valuable resource for research policy, funding management authorities, researchers, policy makers, and funding bodies involved in infectious disease management, public health, and emergency resilience.

The Global Cyber-Vulnerability Report

by B. Aditya Prakash Tudor Dumitras Michael Ovelgonne V. S. Subrahmanian

This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and professionals including government and military workers, policy-makers and law-makers working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference.

Refine Search

Showing 21,551 through 21,575 of 53,804 results