CakePHP 4 is a web development framework running on PHP 8.1 (min. PHP 7.2). Read CakePHP at a Glance to get an introduction to the fundamentals of CakePHP. The CakePHP cookbook is an openly developed and community editable documentation project....
The Symfony Framework is well-known for being really flexible and is used to build micro-sites, enterprise applications that handle billions of connections and even as the basis for other frameworks. Since its release in July 2011, the community has learned a lot about what's possible and how to do things best.
These community resources - l...
In this eBook, we tell you how to take an existing NGINX Open Source or F5 NGINX Plus configuration and extend it to manage API traffic as well. When you use NGINX for API management, you tap into the high performance, reliability, robust community support, and expert professional support (for NGINX Plus customers) that NGINX is famous for.
With...
Linux crash analysis - this is a subject that has lots of unanswered mail threads and plain text documents scattered all over the place, inaccessible to almost everyone, save the tiny percentage of super geeks.
My personal and professional interest in the last three years has taken me down the path of Linux kernel secrets, all the way into assem...
Learn how to leverage the BlackBerry 10 Cascades framework to create rich native applications. Learn BlackBerry 10 App Development gives you a solid foundation for creating BlackBerry 10 apps efficiently. Along the way, you will learn how to use QML and JavaScript for designing your app's UI, and C++/Qt for the application logic. No prior know...
'Transgovernance: Advancing Sustainability Governance' analyses what implications recent and ongoing changes in the relations between politics, science and media – together characterized as the emergence of a knowledge democracy – may have for governance for sustainable development, on global and other levels of societal decision mak...
This book contains a structured collection of complete solutions of all significant axially symmetric contact problems. It provides solutions for classical profiles such as the sphere, cone or flat cylindrical punch as well as a multitude of other technically relevant shapes, e.g. the truncated cone, the worn sphere, rough profiles, hollow cylinder...
The 3rd edition of this indispensable book in radio interferometry provides extensive updates to the 2nd edition, including results and technical advances from the past decade; discussion of arrays that now span the full range of the radio part of the electromagnetic spectrum observable from the ground, 10 MHz to 1 THz; an analysis of factors that ...
This book provides a unique study of the complexities and consequences of irregular legal status of Senegalese migrants in Europe. It employs sophisticated quantitative methods to analyze unique life-history data to produce policy-relevant conclusions. Using the MAFE dataset as empirical evidence, the book focuses on the legal paths of Senegalese ...
The Internet of Things (IoT) is an emerging network superstructure that will connect physical resources and actual users. It will support an ecosystem of smart applications and services bringing hyper-connectivity to our society by using augmented and rich interfaces. Whereas in the beginning IoT referred to the advent of barcodes and Radio Freque...
This edited volume examines how economic processes have worked upon social lives and social realities in Latin America during the past decades. Through tracing the effects of the neoliberal epoch into the era of the so-called pink tide, the book seeks to understand to what extent the turn to the left at the start of the millennium managed to challe...
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out.
Simply put, this book is designed to empower and excite the programming community to go out and do co...
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
This book summarizes work being undertaken within the collaborative MODAClouds research project, which aims to facilitate interoperability between heterogeneous Cloud platforms and remove the constraints of deployment, portability, and reversibility for end users of Cloud services. Experts involved in the project provide a clear overview of the MOD...
This book presents results relevant in the manufacturing research field, that are mainly aimed at closing the gap between the academic investigation and the industrial application, in collaboration with manufacturing companies. Several hardware and software prototypes represent the key outcome of the scientific contributions that can be grouped int...
This book presents the first comprehensive overview of general methods in Automated Machine Learning (AutoML), collects descriptions of existing systems based on these methods, and discusses the first series of international challenges of AutoML systems. The recent success of commercial ML applications and the rapid growth of the field has created ...
Embedded Firmware Solutions is the perfect introduction and daily-use field guide - for the thousands of firmware designers, hardware engineers, architects, managers, and developers--to Intel's new firmware direction (including Quark coverage), showing how to integrate Intel® Architecture designs into their plans.
Featuring hands-on exampl...
Energy Efficient Servers: Blueprints for Data Center Optimization introduces engineers and IT professionals to the power management technologies and techniques used in energy efficient servers. The book includes a deep examination of different features used in processors, memory, interconnects, I/O devices, and other platform components. It outline...
Software development has reached a point where no single developer can understand, see, or control all the component parts, whether it's technical or organizational. The Web is now the computer and it's forced even the simplest applications to become distributed.
Through five thought provoking essays, you'll discover the whys and ...
This Open Access Brief analyzes the dynamics in which children's selves emerge through their everyday activities of meaning construction, both in their relationships with family and within school education. It begins with a discussion of new psychological inquiries into children's selves and builds upon the innovative theoretical notion o...
In this book, you'll discover how to perform each of these backup and restore operations using SQL Server Management Studio (SSMS), basic T-SQL scripts and Redgate's SQL Backup tool. Capturing backups using SSMS or simple scripts is perfectly fine for one-off backup operations, but any backups that form part of the recovery strategy for a...
Linux systems are everywhere today, even in companies once considered "pure Windows." If you're a sysadmin, network administrator, or developer in a small Windows shop, you may have to jump in and fix a system problem when your site goes down. What if you have no Linux knowledge? This short guide provides tips to help you survive.
...
Microsoft Azure is Microsoft's cloud computing platform, providing a wide variety of services you can use without purchasing and provisioning your own hardware. Azure enables the rapid development of solutions and provides the resources to accomplish tasks that may not be feasible in an on-premises environment. Azure's compute, storage, n...
Microsoft SharePoint hybrid consists of a growing list of advanced hybrid solutions that empowers organizations to consume benefits of the cloud and maintain their on-premises investments. This book is the second in a series of SharePoint hybrid books in which we show you how to configure, troubleshoot, and manage a SharePoint hybrid environment.
...
With the introduction of container support in Windows Server 2016, we open a world of opportunities that takes traditional monolithic applications on a journey to modernize them for better agility. Containers are a stepping stone that can help IT organizations understand what key items in modern IT environments, such as DevOps, Agile, Scrum, Infras...
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best prac...
Network Virtualization "provides virtual networks to virtual machines similar to how server virtualization provides virtual machines to the operating system. Network Virtualization decouples virtual networks from the physical network infrastructure and removes the constraints and limitations of VLANs and hierarchical IP address assignment from...
If you are responsible for architecting and designing the backup strategy for your organization, especially if you're looking for ways to incorporate cloud backup into your business continuity scenarios, this book is for you. With the increasing trends in virtualization as well as the move to the pubic cloud, IT organizations are headed toward...
Windows Server has powered a generation of organizations, from small businesses to large enterprises. No matter what your role in IT, you can be guaranteed you that have touched Windows Server at some point in your career or at very least you have seen it from afar! This book introduces you to Windows Server 2016, which is the next version of Windo...
Within an SRE organization, teams usually develop very different automation tools and processes for accomplishing similar tasks. Some of this can be explained by the software they support: different systems require different reliability solutions. But many SRE tasks are essentially the same across all software: compiling, building, deploying, canar...
Imagine a situation where your services report healthy and serving but you receive multiple user reports of poor availability. How are these users accessing your service? Most likely, they are using your service through a client application, such as a mobile application on their phone. SRE traditionally has only supported systems and services run i...
Istio is one of the most popular solutions for service meshes in cloud-native infrastructures, and it is most often deployed on Kubernetes clusters. In Istio Succinctly, authors Rahul Rai and Tarun Pabbi provide a practical guide to getting started with Istio, from setting up a Kubernetes cluster, to managing its traffic management, security, obser...