Browse Results

Showing 32,776 through 32,800 of 62,964 results

Kernel Methods for Machine Learning with Math and R: 100 Exercises for Building Logic

by Joe Suzuki

The most crucial ability for machine learning and data science is mathematical logic for grasping their essence rather than relying on knowledge or experience. This textbook addresses the fundamentals of kernel methods for machine learning by considering relevant math problems and building R programs. The book’s main features are as follows:The content is written in an easy-to-follow and self-contained style.The book includes 100 exercises, which have been carefully selected and refined. As their solutions are provided in the main text, readers can solve all of the exercises by reading the book.The mathematical premises of kernels are proven and the correct conclusions are provided, helping readers to understand the nature of kernels.Source programs and running examples are presented to help readers acquire a deeper understanding of the mathematics used.Once readers have a basic understanding of the functional analysis topics covered in Chapter 2, the applications are discussed in the subsequent chapters. Here, no prior knowledge of mathematics is assumed.This book considers both the kernel for reproducing kernel Hilbert space (RKHS) and the kernel for the Gaussian process; a clear distinction is made between the two.

Kernel Methods for Pattern Analysis

by John Shawe-Taylor Nello Cristianini

Kernel methods provide a powerful and unified framework for pattern discovery, motivating algorithms that can act on general types of data (e. g. strings, vectors or text) and look for general types of relations (e. g. rankings, classifications, regressions, clusters). The application areas range from neural networks and pattern recognition to machine learning and data mining. This book, developed from lectures and tutorials, fulfils two major roles: firstly it provides practitioners with a large toolkit of algorithms, kernels and solutions ready to use for standard pattern discovery problems in fields such as bioinformatics, text analysis, image analysis. Secondly it provides an easy introduction for students and researchers to the growing field of kernel-based pattern analysis, demonstrating with examples how to handcraft an algorithm or a kernel for a new specific application, and covering all the necessary conceptual and mathematical tools to do so.

Kernel Ridge Regression in Clinical Research

by Aeilko H. Zwinderman Ton J. Cleophas

IBM (international business machines) has published in its SPSS statistical software 2022 update a very important novel regression method entitled Kernel Ridge Regression (KRR). It is an extension of the currently available regression methods, and is suitable for pattern recognition in high dimensional data, particularly, when alternative methods fail. Its theoretical advantages are plenty and include thekernel trick for reduced arithmetic complexity,estimation of uncertainty by Gaussians unlike histograms,corrected data-overfit by ridge regularization,availability of 8 alternative kernel density models for datafit.A very exciting and wide array of preliminary KRR research has already been published by major disciplines (like studies in quantum mechanics and nuclear physics, studies of molecular affinity / dynamics, atomisation energy studies, but also forecasting economics studies, IoT (internet of things) studies for e-networks, plant stress response studies, big data streaming studies, etc). In contrast, it is virtually unused in clinical research. This edition is the first textbook and tutorial of kernel ridge regressions for medical and healthcare students as well as recollection / update bench, and help desk for professionals. Each chapter can be studied as a standalone, and, using, real as well as hypothesized data, it tests the performance of the novel methodology against traditional regression analyses. Step by step analyses of over 20 data files stored at Supplementary Files at Springer Interlink are included for self-assessment. We should add that the authors are well qualified in their field. Professor Zwinderman is past-president of the International Society of Biostatistics (2012-2015) and Professor Cleophas is past-president of the American College of Angiology (2000-2002). From their expertise they should be able to make adequate selections of modern KRR methods for the benefit of physicians, students, and investigators. The authors have been working and publishing together for 24 years and their research can be characterized as a continued effort to demonstrate that clinical data analysis is not mathematics but rather a discipline at the interface of biology and mathematics.

Kernelization: Theory of Parameterized Preprocessing

by Fedor V. Fomin Daniel Lokshtanov Saket Saurabh Meirav Zehavi

Preprocessing, or data reduction, is a standard technique for simplifying and speeding up computation. Written by a team of experts in the field, this book introduces a rapidly developing area of preprocessing analysis known as kernelization. The authors provide an overview of basic methods and important results, with accessible explanations of the most recent advances in the area, such as meta-kernelization, representative sets, polynomial lower bounds, and lossy kernelization. The text is divided into four parts, which cover the different theoretical aspects of the area: upper bounds, meta-theorems, lower bounds, and beyond kernelization. The methods are demonstrated through extensive examples using a single data set. Written to be self-contained, the book only requires a basic background in algorithmics and will be of use to professionals, researchers and graduate students in theoretical computer science, optimization, combinatorics, and related fields.

Key 5G Physical Layer Technologies: Enabling Mobile and Fixed Wireless Access

by Douglas H. Morais

This book covers the key technologies associated with the physical transmission of data on fifth generation (5G) mobile systems. Following an overview of these technologies, a high-level description of 3GPP’s mobile communications standard (5G NR) is given and it is shown how the key technologies presented earlier facilitate the transmission of control data and very high-speed user data. In the final chapter, an overview and the physical layer aspects of 5G NR enabled Fixed Wireless Access (FWA) networks is presented. This book is intended for those practicing engineers and graduate and upper undergraduate engineering students who have an interest in 3GPP’s 5G enabled mobile and or FWA networks and want to acquire, where missing, the necessary technology background in order to understand 3GPP’s physical layer specifications and operation.Provides a comprehensive covering of key 3GPP 5G NR physical layer technologies, presented in a clear, tractable fashion, with sufficient mathematics to make it technically coherent;Addresses all key 5G NR technologies, including digital modulation, LDPC and Polar coding, multicarrier based multiple access techniques, and multiple antenna techniques including MIMO and beamforming;Presents an overview of 5G NR Radio Access Network (RAN) architecture and a detailed understanding of how user and control data is transported in the physical layer by the application of the technologies presented;Provides an overview and addresses physical layer aspects of 5G NR enabled Fixed Wireless Access networks.

Key 5G Physical Layer Technologies: Enabling Mobile and Fixed Wireless Access

by Douglas H. Morais

​ This updated book, reconfigured as a textbook, covers the key technologies associated with the physical transmission of data on 5G mobile systems. Following an updated overview of these technologies, the author provides a high-level description of 3GPP’s mobile communications standard (5G NR) and shows how the key technologies presented earlier facilitate the transmission of very high-speed user data and control data and can provide very low latency for use cases where this is important. In the final chapter, an overview and the physical layer aspects of 5G NR enabled Fixed Wireless Access (FWA) networks is presented. Material in the first edition addressed mainly the key physical layer technologies and features associated with 3GPP release 15, the first release to support 5G. This edition adds descriptions of some of the technological advancements supported in release 16, including integrated access and backhaul (IAB), sidelink communication, NR positioning, operation in unlicensed bands, and multiple transmission points transmission. This textbook is intended for graduate and upper undergraduate engineering students and practicing engineers who have an interest in 3GPP’s 5G enabled mobile and or FWA networks and want to acquire, where missing, the necessary technology background in order to understand 3GPP’s physical layer specifications and operation. The author provides working problems and helpful examples throughout the text.

Key 5G/5G-Advanced Physical Layer Technologies: Enabling Mobile and Fixed Wireless Access

by Douglas H. Morais

This third edition of this text covers the key technologies associated with the physical transmission of data on 5G mobile systems. Following an updated overview of these technologies, the author provides a high-level description of 3GPP’s mobile communications standard (5G/5G-Advanced) and shows how the key technologies presented earlier facilitate the transmission of very high-speed user data and control data and can provide very low latency for use cases where this is important. In the final chapter, an updated overview and the physical layer aspects of 5G NR enabled Fixed Wireless Access (FWA) networks is presented. Material in the second edition addressed mainly the key physical layer technologies and features associated with 3GPP Release 15, the first release to support 5G, and Release 16. This edition adds descriptions of some of the technological advancements supported in Releases 17 and 18, the latter being designated by 3GPP as 5G-Advanced. In addition to numerous enhancements of existing features, these releases include new features such as support for 1024-QAM in the downlink in the FR1 band, Reduced Capability (RedCAP) devices, Network Controlled repeaters, operation in the 6 GHz band and above 52.6 GHz, support for broadcast/multicast services, and Non-terrestrial Networks (NTNs). Additionally, a look ahead at some of the planned features and enhancements of Release 19 is provided. This textbook is intended for graduate and upper undergraduate engineering students and practicing engineers and technicians who have an interest in 3GPP’s 5G enabled mobile and or FWA networks and want to acquire, where missing, the necessary technology background in order to understand 3GPP’s physical layer specifications and operation. Provided are working problems and helpful examples throughout the text.

Key Digital Trends Shaping the Future of Information and Management Science: Proceedings of 5th International Conference on Information Systems and Management Science (ISMS) 2022 (Lecture Notes in Networks and Systems #671)

by Sanjay Misra Deepak Singh Lalit Garg Nishtha Kesswani Joseph G. Vella Imene Brigui Dilip Singh Sisodia

This book (proceedings of ISMS 2022) is intended to be used as a reference by students and researchers who collect scientific and technical contributions with respect to models, tools, technologies and applications in the field of information systems and management science. This textbook shows how to exploit information systems in a technology-rich management field. The book introduces concepts, principles, methods, and procedures that will be valuable to students and scholars in thinking about existing organization systems, proposing new systems, and working with management professionals in implementing new information systems.

Key Digital Trends in Artificial Intelligence and Robotics: Proceedings of 4th International Conference on Deep Learning, Artificial Intelligence and Robotics, (ICDLAIR) 2022 - Progress in Algorithms and Applications of Deep Learning (Lecture Notes in Networks and Systems #670)

by Alfredo Vaccaro Luigi Troiano Nishtha Kesswani Irene Díaz Rodriguez Imene Brigui David Pastor-Escuredo

The book (proceedings of the 4th International Conference on Deep Learning, Artificial Intelligence and Robotics (ICDLAIR) 2022) introduces key topics from artificial intelligence algorithms and programming organisations and explains how they contribute to health care, manufacturing, law, finance, retail, real estate, accountancy, digital marketing, and various other fields. Although artificial intelligence (AI) has generated a lot of hype over the past ten years, these consequences on how we live, work, and play are still in their infancy and will likely have a significant impact in the future. The supremacy of AI in areas like speech and picture recognition, navigational apps, personal assistants for smartphones, ride-sharing apps, and many other areas is already well established. The book is primarily meant for academics, researchers, and engineers who want to employ AI applications to address real-world issues. The authors hope that businesses and technology creators will also find it appealing to utilise in industry.

Key Technologies for On-Demand 6G Network Services (Wireless Networks)

by Jing Wang Qi Qi Jianxin Liao Bo He Jingyu Wang

This book delves into the confluence of AI and the transformative potential it holds for the future of 6G network services. It uncovers how the integration of AI technologies as well as redefines the landscape of network management and control. This book also offers a new paradigm for delivering on-demand services that are immersive, personalized and of ultimate performance. A detailed exploration of AI-driven network management systems is presenting in this book, discussing the development of knowledge-defined networking, the construction of all-scenario on-demand service systems and the critical role of network management and control in achieving 6G’s vision. This book begins by examining the historical evolution of communication networks and the pivotal shift towards technology-driven demands in the 6G era. It outlines the book’s coverage of the foundational theories, wireless technologies as well as network architectures that will underpin the next generation of mobile services. Further, this book provides a comprehensive analysis of the key technologies required to support 6G on-demand services, such as trusted and autonomous access control, intelligent resource allocation and service capability coordination. It discusses the challenges and opportunities in developing a network that is not only high-performing but also adaptable to a wide range of applications, from personal use to industrial and agricultural production, and public services. This book targets advanced-level students and researchers working in this field serving as both a technical guide and a visionary outlook on the role of AI in shaping 6G networks. It also offers insights into the research, development, and potential applications of AI in network services, making it an invaluable resource for professionals, who understand or contribute to the advancement of 6G technologies.

Key Technologies of High Frequency Wireless Communications

by Kai Yang Neng Ye Jianguo Li Jianxiong Pan Yujie Lin

This book provides solutions to some of the issues present in the physical layer of current high-frequency wireless communication systems. It reviews the development history of high-frequency wireless communication systems, pinpoints certain existing problems in contemporary high-frequency communication systems, and proposes solutions. The 6th Generation Mobile Networks (6G) is based on terrestrial cellular networks and integrates satellite communication, drone communication, and marine communication to form an integrated air-ground-sea network, providing comprehensive coverage, high speed, high security, and multifunctional communication solutions. High-frequency wireless communication, represented by millimeter-wave and terahertz communications, offers a wide available spectrum and high transmission rates, making it a highly promising broadband wireless access technology in 6G. To achieve higher transmission rates (Tbps level), lower transmission latency (millisecond level), higher security performance (physical layer security), and stronger hardware integration (communication-sensing integration), high-frequency wireless transmission faces many challenges due to characteristics such as short wavelengths, high path loss, and weak components. These challenges include: Large link attenuation and poor coverage in high-frequency wireless communication systems, resulting in low spectrum efficiency for edge users.Low output power, poor linearity, and low efficiency of high-frequency power amplifiers, making it difficult to achieve long-distance transmission of wideband signals.High sidelobe energy in high-frequency multi-user secure transmission, leading to unfocused spatial regions and low transmission efficiency.Independent design functions and high information processing delay in high-frequency communication and sensing, causing wastage of spectrum resources and hardware resources.To address these challenges, the author has conducted innovative work aimed at improving the spectrum efficiency, power amplifier efficiency, transmission efficiency, and processing efficiency of high-frequency wireless transmission. The research findings have been published in high-impact journals such as IEEE Transactions on Vehicular Technology, Microwave Theory and Techniques, Broadcasting, IEEE Sensors Journal, and IEEE Wireless Communications Letters. Based on these foundations, this book is dedicated to discussing efficient transmission technology for high-frequency wireless communications with a focus on 6G. The book addresses fields such as signal processing, spectrum management, and high-efficiency sustainable communications. It is highly recommended for academic researchers, students, and engineers in wireless communication, terahertz communication, and electronic information fields.

Key Technologies of Intelligentized Welding Manufacturing: The Spectral Diagnosis Technology for Pulsed Gas Tungsten Arc Welding of Aluminum Alloys (Transactions on Intelligent Welding Manufacturing)

by Shanben Chen Yiming Huang

This book presents the recent research results of the application of arc spectrum in the welding process. It sheds light on the fundamentals of monitoring welding quality using arc spectral information. By analyzing the topic both from a global and local perspective, it establishes a knowledge base of features characterizing welding statuses. Researchers, scientists and engineers in the field of intelligent welding can benefit from the book. As such, this book provides valuable knowledge, useful methods, and practical algorithms that are applicable in real-time detection of welding defects.

Key Technologies of Intelligentized Welding Manufacturing: Visual Sensing of Weld Pool Dynamic Characters and Defect Prediction of GTAW Process

by Jian Chen Zhili Feng Zongyao Chen

This book describes the application of vision-sensing technologies in welding processes, one of the key technologies in intelligent welding manufacturing. Gas tungsten arc welding (GTAW) is one of the main welding techniques and has a wide range of applications in the manufacturing industry. As such, the book also explores the application of AI technologies, such as vision sensing and machine learning, in GTAW process sensing and feature extraction and monitoring, and presents the state-of-the-art in computer vision, image processing and machine learning to detect welding defects using non-destructive methods in order to improve welding productivity. Featuring the latest research from ORNL (Oak Ridge National Laboratory) using digital image correlation technology, this book will appeal to researchers, scientists and engineers in the field of advanced manufacturing.

Keyboarding with Computer Applications: Lessons 1-150

by Jack E. Johnson Delores Sykes Cotton Carole Glosup Stanley Judith Chiri-Mulkey

This book will appeal to every student. All elements, including the courseware, textbook, and student software manuals are fully integrated to provide students with the total learning experience.

Keyboarding and Information Processing (Book One) (Sixth Edition)

by Jack P. Hoggatt Jon A. Shank Jerry W. Robinson Amanda Robinson Lee R. Beaumont T. James Crawford

In today's world of people doing business anytime, anywhere from PC's and laptops, proper keyboarding skills are essential. While solid keyboarding skills never change, the applications and software do. That's why Century 21 Keyboarding not only teaches users the fundamentals, it also keeps them current with new technology-a reputation it's held for more than 75 years.

Keyboarding and Word Processing Essentials: Microsoft Word 2010 (18th Edition)

by Susie H. Vanhuss Connie M. Forde Donna L. Woo

The Eighteenth Edition of KEYBOARDING AND WORD PROCESSING ESSENTIALS, LESSONS 1-55 uses proven techniques to help readers master the keyboarding and formatting skills they need for career success-from initial new-key learning to expertise in formatting business documents with Microsoft Word 2010. South-Western College Keyboarding offers a proven, time-tested approach that helps readers develop a strong foundation in basic keyboarding, steadily improve their skills, and rapidly become proficient in document formatting and business communication. Each lesson is clearly focused, well structured, and designed to provide step-by-step training and reinforcement to help readers quickly acquire and apply new skills. This one-book solution includes 55 lessons, documents, and software instructions within a space-saving easel-back format.

Keyboarding with Computer Applications

by Jack E. Johnson Delores Sykes Cotton Judith Chiri-Mulkey Carole G. Stanley

Keyboarding, Word Processing, Spreadsheets, Desktop Publishing, Databases.

Keyboarding, Word Processing, & Communication: Using Microsoft® Office Word and Outlook 2007

by Pearson Education

NIMAC-sourced textbook

Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 protocols to secure applications

by Stian Thorgersen Pedro Igor Silva

Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applicationsKey FeaturesGet up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examplesConfigure, manage, and extend Keycloak for optimized securityLeverage Keycloak features to secure different application typesBook DescriptionImplementing authentication and authorization for applications can be a daunting experience, often leaving them exposed to security vulnerabilities. Keycloak is an open-source solution for identity management and access management for modern applications. Keycloak - Identity and Access Management for Modern Applications is a comprehensive introduction to Keycloak, helping you get started with using it and securing your applications. Complete with hands-on tutorials, best practices, and self-assessment questions, this easy-to-follow guide will show you how to secure a sample application and then move on to securing different application types. As you progress, you will understand how to configure and manage Keycloak as well as how to leverage some of its more advanced capabilities. Finally, you'll gain insights into securely using Keycloak in production. By the end of this book, you will have learned how to install and manage Keycloak as well as how to secure new and existing applications.What you will learnUnderstand how to install, configure, and manage KeycloakSecure your new and existing applications with KeycloakGain a basic understanding of OAuth 2.0 and OpenID ConnectUnderstand how to configure Keycloak to make it ready for production useDiscover how to leverage additional features and how to customize Keycloak to fit your needsGet to grips with securing Keycloak servers and protecting applicationsWho this book is forDevelopers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security will find this book useful. Beginner-level knowledge of app development and authentication and authorization is expected.

Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications

by Stian Thorgersen Pedro Igor Silva

Gain a practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak. Purchase of the print or Kindle book includes a free PDF eBookKey FeaturesA beginners’ guide to Keycloak focussed on understanding Identity and Access ManagementImplement authentication and authorization in applications using Keycloak 22Utilize Keycloak in securing applications developed by you and the existing applications in your enterpriseBook DescriptionThe second edition of Keycloak - Identity and Access Management for Modern Applications is an updated, comprehensive introduction to Keycloak and its updates. In this new edition, you will learn how to use the latest distribution of Keycloak. The recent versions of Keycloak are now based on Quarkus, which brings a new and improved user experience and a new admin console with a higher focus on usability. You will see how to leverage Spring Security, instead of the Keycloak Spring adapter while using Keycloak 22. As you progress, you’ll understand the new Keycloak distribution and explore best practices in using OAuth. Finally, you'll cover general best practices and other information on how to protect your applications. By the end of this new edition, you’ll have learned how to install and manage the latest version of Keycloak to secure new and existing applications using the latest features.What you will learnUnderstand how to install, configure, and manage the latest version of KeycloakDiscover how to obtain access tokens through OAuth 2.0Utilize a reverse proxy to secure an application implemented in any programming language or frameworkSafely manage Keycloak in a production environmentSecure different types of applications, including web, mobile, and native applicationsDiscover the frameworks and third-party libraries that can expand KeycloakWho this book is forThis book is for developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security. Basic knowledge of app development, authentication, and authorization is expected.

Keyshot 3D Rendering

by Jei Lee Jo

The book includes a series of step-by-step illustrated tutorials supported by a detailed explanation for each aspect of the 3D rendering procedure. Some of the procedures or steps may be omitted if they have been previously explained in an exercise or chapter. "Keyshot 3D Rendering" is ideal for beginners and professionals who are involved with product development, entertainment, and industrial design. It is recommended for readers who already have some level of experience with 3D modelling, texturing, and rendering applications.

Keyword-Design in der Suchmaschinenwerbung: Konzeptionelle Grundlagen und empirische Untersuchungen im Online-Handel (Marketing und Marktorientierte Unternehmensführung)

by Nadine Ampler

Dieses Werk analysiert anhand von Realdaten eines deutschen Online-Händlers die Gestaltung von Keywords in der Suchmaschinenwerbung . Durch umfassende empirische Untersuchungen werden sowohl absolute als auch relative Zielgrößen betrachtet, wobei der Einfluss von inhaltlichen, formalen und wettbewerbsbezogenen Gestaltungskriterien untersucht wird. Neben der Untersuchung der verschiedenen Gestaltungskriterien wird das Suchvolumen der im Keyword beworbenen Produktarten als differenzierende Variable berücksichtigt. Die Ergebnisse bieten Werbetreibenden wertvolle Erkenntnisse und Handlungsempfehlungen, um ihre Keywordgestaltung gezielt auf das Suchvolumen der beworbenen Produktarten auszurichten.

Keywords In and Out of Context (Synthesis Lectures on Information Concepts, Retrieval, and Services)

by Betsy Van Martens

This book explores the rich history of the keyword from its earliest manifestations (long before it appeared anywhere in Google Trends or library cataloging textbooks) in order to illustrate its implicit and explicit mediation of human cognition and communication processes. The author covers the concept of the keyword from its deictic origins in primate and proto-speech communities, through its development within oral traditions, to its initial appearances in numerous graphical forms and its workings over time within a variety of indexing traditions and technologies. The book follows the history all the way to its role in search engine optimization and social media strategies and its potential as an element in the slowly emerging semantic web, as well as in multiple voice search applications. The author synthesizes different perspectives on the significance of this often-invisible intermediary, both in and out of the library and information science context, helping readers to understand how it has come to be so embedded in our daily life.This book: Provides a thorough history of the keyword, from primate and proto-speech communities to current timesExplains how the concept of the keyword relates to human cognition and communication processesHighlights the applications of the keyword, both in and out of the library and information science context

Khnum-Ptah To Computer: The African Initialization of Computer Science

by African Creation Energy

Khnum-Ptah to Computer presents a comparative analysis between a variety of concepts, customs, cosmologies, and practices found in African Cultures to topics related to the field of Computer Science. The African origin of Binary Code, Logic, Computers, Programming, Robotics, Cyborgs, Androids, Virtual Reality, Artificial Intelligence, and Transhumanism are examined using Sound Right Reason to show a relationship between two dichotomies that have more in common than what meets the eye.

Kibana 7 Quick Start Guide: Visualize your Elasticsearch data with ease

by Anurag Srivastava

A quick start guide to visualize your Elasticsearch data Key Features Your hands-on guide to visualizing the Elasticsearch data as well as navigating the Elastic stack Work with different Kibana plugins and create effective machine learning jobs using Kibana Build effective dashboards and reports without any hassle Book Description The Elastic Stack is growing rapidly and, day by day, additional tools are being added to make it more effective. This book endeavors to explain all the important aspects of Kibana, which is essential for utilizing its full potential. This book covers the core concepts of Kibana, with chapters set out in a coherent manner so that readers can advance their learning in a step-by-step manner. The focus is on a practical approach, thereby enabling the reader to apply those examples in real time for a better understanding of the concepts and to provide them with the correct skills in relation to the tool. With its succinct explanations, it is quite easy for a reader to use this book as a reference guide for learning basic to advanced implementations of Kibana. The practical examples, such as the creation of Kibana dashboards from CSV data, application RDBMS data, system metrics data, log file data, APM agents, and search results, can provide readers with a number of different drop-off points from where they can fetch any type of data into Kibana for the purpose of analysis or dashboarding. What you will learn Explore how Logstash is configured to fetch CSV data Understand how to create index patterns in Kibana Become familiar with how to apply filters on data Discover how to create ML jobs Explore how to analyze APM data from APM agents Get to grips with how to save, share, inspect, and edit visualizations Understand how to find an anomaly in data Who this book is for Kibana 7 Quick Start Guide is for developers new to Kibana who want to learn the fundamentals of using the tool for visualization, as well as existing Elastic developers.

Refine Search

Showing 32,776 through 32,800 of 62,964 results