This open access volume focuses on the development of a P5 eHealth, or better, a methodological resource for developing the health technologies of the future, based on patients' personal characteristics and needs as the fundamental guidelines for design. It provides practical guidelines and evidence based examples on how to design, implement, ...
This book examines key aspects of international cooperation to enhance nuclear safety, security, safeguards, and non-proliferation, thereby assisting in development and maintenance of the verification regime and fostering progress toward a nuclear weapon-free world. The book opens by addressing important political, institutional, and legal dimensio...
This book examines more than two centuries of societal development using novel historical and statistical approaches. It applies the well-being monitor developed by Statistics Netherlands that has been endorsed by a significant part of the international, statistical community. It features The Netherlands as a case study, which is an especially inte...
This book is an outcome of the collaboration between the Soil and Water Management & Crop Nutrition Section, Joint FAO/IAEA Division of Nuclear Techniques in Food and Agriculture, Department of Nuclear Sciences and Applications, International Atomic Energy Agency (IAEA), Vienna, Austria, and the International Center for Biosaline Agricultur...
This open access book comprises 10 high-level papers on research and innovation within the Flexitranstore Project that were presented at the FLEXITRANSTORE special session organized as part of the 21st International Symposium on High Voltage Engineering.FLEXITRANSTORE (An Integrated Platform for Increased FLEXIbility in smart TRANSmission grids wit...
Dynamic Management Views (DMVs) are a significant and valuable addition to the DBA's troubleshooting armory, laying bare previously unavailable information regarding the under-the-covers activity of your database sessions and transactions.
Why, then, aren't all DBAs using them? Why do many DBAs continue to ignore them in favour of &quo...
The next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. This concise guide provides in-depth information to help you plan for 802.11ac, with technical details on design, network operations, deployment, and monitoring.
Author Matthew Gast - an industry expert who led the development of ...
Linux systems are everywhere today, even in companies once considered "pure Windows." If you're a sysadmin, network administrator, or developer in a small Windows shop, you may have to jump in and fix a system problem when your site goes down. What if you have no Linux knowledge? This short guide provides tips to help you survive.
...
Take pictures and shoot video with your Raspberry Pi. Connecting a High Quality Camera or Camera Module turns your favourite credit-card-sized computer into a powerful digital camera. Learn how to set up and control the camera to capture stills and video footage. Discover the numerous modes and effects available, and use the camera in a variety of ...
This open book shows you how to set up a Raspberry Pi to play classic games, and a whole lot more. Build your own portable console, full-size arcade cabinet, and pinball machine with our step-by-step guides. And learn how to program your own games, using Python and Pygame Zero.
- Set up your Raspberry Pi for retro gaming
- Emulate classic computers...
Read the tips and tricks recommended by some of the smartest minds in the ASP.NET community.
25 tips from the ASP.NET community for boosting performance in your web applications; Learn the secrets of your fellow developers and read advice from MVPs and other experts; Covers async/await, Web API, ORMs, interactions between your code and your data...
This book features various studies on democratization, transformation, political and economic development, and security issues in the Organization for Security and Cooperation in Europe (OSCE) geographical region and beyond. Written by experts and academics in the fields of human rights, security, transformation and development, particularly in pos...
This book examines key aspects of international cooperation to enhance nuclear safety, security, safeguards, and nonproliferation, thereby assisting in development and maintenance of the verification regime and fostering progress toward a nuclear weapon-free world. Current challenges are discussed and attempts made to identify possible solutions an...
This book is primarily intended to serve as a research-based textbook on sustainable supply chains for graduate programs in Business, Management, Industrial Engineering, and Industrial Ecology, but it should also be of interest for researchers in the broader sustainable supply chain space, whether from the operations management and industrial engin...
This 3rd edition of the highly successful book, acclaimed for its comprehensiveness, accuracy, and excellent illustrations and photographs now comes with updated coverage plus numerous didactical improvements:The number of figures has notably increased, with about one third of them now presented in color. More photographs and schematics make it eas...
This book offers a completely new approach to learning and teaching the fundamentals of analytical chemistry. It summarizes 250 basic concepts of the field on the basis of slides. Each of the nine chapters offers the following features:
- Introduction: Summary. General scheme. Teaching objectives.
- Text containing the explanation of each slide.
- ...
This book covers the entire Business Process Management (BPM) lifecycle, from process identification to process monitoring, covering along the way process modelling, analysis, redesign and automation. Concepts, methods and tools from business management, computer science and industrial engineering are blended into one comprehensive and inter-discip...
This book is the first to present a rich selection of over 30 real-world cases of how leading organizations conduct Business Process Management (BPM). The cases stem from a diverse set of industry sectors and countries on different continents, reporting on best practices and lessons learned. The book showcases how BPM can contribute to both exploit...
This title meets a great demand for training in spatial analysis tools accessible to a wide audience. Landscape ecology continues to grow as an exciting discipline with much to offer for solving pressing and emerging problems in environmental science. Much of the strength of landscape ecology lies in its ability to address challenges over large are...
This book approaches the study of critical care with teaching in mind. In medicine "teachable moments" usually occur in clinical context, where the engagement in a real case exemplifies principles of diagnosis or therapy. In order to replicate the teaching method, selected cases are presented within each chapter offering the reader an opp...
This book considers all aspects of managing the complexity of Multimedia Big Data Computing (MMBD) for IoT applications and develops a comprehensive taxonomy. It also discusses a process model that addresses a number of research challenges associated with MMBD, such as scalability, accessibility, reliability, heterogeneity, and Quality of Service (...
This textbook is a step-by-step tutorial on the applications of Geographic Information Systems (GIS) in environmental and water resource issues. It provides information about GIS and its applications, specifically using the most advanced ESRI GIS technology and its extensions. Eighteen chapters cover GIS applications in the field of earth sciences ...
This book walks you through a patterns-based approach to building real-world cloud solutions. The patterns apply to the development process as well as to architecture and coding practices.
Developers who are curious about developing for the cloud, are considering a move to the cloud, or are new to cloud development will find here a concise overv...
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best prac...
In this book, we describe the components of a launch plan at Google and offer practical methods you might apply to reduce production launch risks for your own products. We include lessons we have learned about what works well for launching Google products, including large products, new features for existing products, and even small products. The le...
To realize the full benefits of SRE, organizations need well-thoughtout reliability targets known as service level objectives (SLOs) that are measured by service level indicators (SLIs), a quantitative measure of an aspect of the service. As detailed in the following section, the measurable goals set forth in an organization's SLOs eliminate t...
This book discusses how to train Site Reliability Engineers, or SREs. Before we go any further, we'd like to clarify the term "SRE."
"SRE" means a variety of things:
- Site Reliability Engineer or a Site Reliability Engineering team, based on the context (singular, SRE, or plural, SREs)
- Site Reliability Engineering concep...
Within an SRE organization, teams usually develop very different automation tools and processes for accomplishing similar tasks. Some of this can be explained by the software they support: different systems require different reliability solutions. But many SRE tasks are essentially the same across all software: compiling, building, deploying, canar...
Imagine a situation where your services report healthy and serving but you receive multiple user reports of poor availability. How are these users accessing your service? Most likely, they are using your service through a client application, such as a mobile application on their phone. SRE traditionally has only supported systems and services run i...
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great Firewall o...
The purpose of this book is to shed light on the performance and personal competencies of information technology (IT) project managers in South Africa. Predictive models are built to determine what project managers consider the crucial competencies they should possess to deliver an IT project successfully. This investigation takes place in the cont...
This book walks you through a patterns-based approach to building real-world cloud solutions. The patterns apply to the development process as well as to architecture and coding practices.
Developers who are curious about developing for the cloud, considering a move to the cloud, or are new to cloud development will find here a concise overview ...