Network and System Administration usually refers only to the traditional skills and recipes for keeping computers and networks running properly. But, in truth, this view omits the most important part of the system: humans. The skill needed to comprehend and tame systems comprising both humans and machines is that of managing complexity. In this boo...
The Lightning Network (LN) is a rapidly growing second-layer payment protocol that works on top of Bitcoin to provide near-instantaneous transactions between two parties. With this practical guide, authors Andreas M. Antonopoulos, Olaoluwa Osuntokun, and Rene Pickhardt explain how this advancement will enable the next level of scale for Bitcoin, in...
The Internet of Things is playground for makers. From practical projects such as pet feeders and automatic blind, to silly things like a texting pot plant, there are as many ways of connecting ordinary object to the internet as you can imagine. Let's explore!
- Meet the mom behind Geek Mom Projects
- Build a flatpack rocket
- Turn 3D prin...
Microservices architectures introduce several benefits to the application development and delivery process. Microservices-based apps are easier to build, test, maintain, and scale. They also reduce downtime through better fault isolation.
While container-based microservices apps have profoundly changed the way DevOps teams deploy applications, t...
Many forces affect software today: larger datasets, geographical disparities, complex company structures, and the growing need to be fast and nimble in the face of change. Proven approaches such as service-oriented and event-driven architectures are joined by newer techniques such as microservices, reactive architectures, DevOps, and stream process...
Is Kubernetes ready for stateful workloads? This open source system has become the primary platform for deploying and managing cloud native applications. But because it was originally designed for stateless workloads, working with data on Kubernetes has been challenging. If you want to avoid the inefficiencies and duplicative costs of having separa...
Principles of Finance is targeted at the core finance course for undergraduate business majors. The book is designed for conceptual accessibility to students who are relatively early in their business curriculum, yet it is also suitable for more advanced students. Due to the wide range of audiences and course approaches, the book is designed to be ...
Why do enterprises feel daunted when undertaking a large-scale cloud transformation? A move to the cloud usually offers substantial rewards. Once companies make this transition, they unlock new business opportunities that fundamentally change the way they work. With this report, members of the Google team will show you how to navigate the cultural ...
In this book we discuss several numerical methods for solving ordinary differential equations. We emphasize the aspects that play an important role in practical problems. We confine ourselves to ordinary differential equations with the exception of the last chapter in which we discuss the heat equation, a parabolic partial differential equation. T...
Discover the true potential of Raspberry Pi with the new, official Handbook 2023. With over 200 pages of amazing projects, fun tutorials, practical guides, and clear reviews, it has everything you need to master Raspberry Pi!
Inside The Official Raspberry Pi Handbook 2023
- QuickStart guide to setting up your Raspberry Pi computer
- Make stuff...
In ASP.NET Core 6 Succinctly, author Dirk Strauss guides web developers through some of the significant performance and feature improvements newly available in ASP.NET Core 6. Learn about the unmissable practicality of Hot Reload, explore super-helpful C# 10 features, pick up the essentials of how to build a minimal API, and discover how and why de...
DevOps engineers, developers, and security engineers have ever-changing roles to play in today's cloud native world. In order to build secure and resilient applications, you have to be equipped with security knowledge. Enter security as code.
In this book, authors BK Sarthak Das and Virginia Chu demonstrate how to use this methodology to se...