Filter
(found 2904 products)
Book cover image
A definitive guide to mastering and implementing concurrency patterns in your applications Key Features Build scalable apps with patterns in multithreading, synchronization, and functional programming Explore the parallel programming and multithreading techniques to make the code run faster Efficiently use the techniques outlined to build reliable applications Book DescriptionSelecting the ...
Concurrent Patterns and Best Practices: Build scalable apps with patterns in multithreading, synchronization, and functional programming
A definitive guide to mastering and implementing concurrency patterns in your applications Key Features Build scalable apps with patterns in multithreading, synchronization, and functional programming Explore the parallel programming and multithreading techniques to make the code run faster Efficiently use the techniques outlined to build reliable applications Book DescriptionSelecting the correct concurrency architecture has a significant impact on the design and performance of your applications. This book explains how to leverage the different characteristics of parallel architecture to make your code faster and more efficient. To start with, you'll understand the basic concurrency concepts and explore patterns around explicit locking, lock free programming, futures & actors. Then, you'll get insights into different concurrency models and parallel algorithms and put them to practice in different scenarios to realize your application's true potential. We'll take you through multithreading design patterns, such as master, slave, leader, follower, map-reduce, and monitor, also helping you to learn hands-on coding using these patterns. Once you've grasped all of this, you'll move on to solving problems using synchronizer patterns. You'll discover the rationale for these patterns in distributed & parallel applications, followed by studying how future composition, immutability and the monadic flow help create more robust code. Toward the end of the book, you'll learn about the actor paradigm and actor patterns - the message passing concurrency paradigm. What you will learn Explore parallel architecture Get acquainted with concurrency models Internalize design themes by implementing multithreading patterns Get insights into concurrent design patterns Discover design principles behind many java threading abstractions Work with functional concurrency patterns Who this book is forThis is a must-have guide for developers who want to learn patterns to build scalable and high-performing apps. It's assumed that you already have a decent level of programming knowledge.
https://magrudy-assets.storage.googleapis.com/9781788627900.jpg
41.990000 USD

Concurrent Patterns and Best Practices: Build scalable apps with patterns in multithreading, synchronization, and functional programming

by Atul S. Khot
Paperback / softback
Book cover image
If you maintain or plan to build Puppet infrastructure, this practical guide will take you a critical step further with best practices for managing the task successfully. Authors Chris Barbour and Jo Rhett present best-in-class design patterns for deploying Puppet environments and discuss the impact of each. The conceptual designs ...
Puppet Best Practices
If you maintain or plan to build Puppet infrastructure, this practical guide will take you a critical step further with best practices for managing the task successfully. Authors Chris Barbour and Jo Rhett present best-in-class design patterns for deploying Puppet environments and discuss the impact of each. The conceptual designs and implementation patterns in this book will help you create solutions that are easy to extend, maintain, and support. Essential for companies upgrading their Puppet deployments, this book teaches you powerful new features and implementation models that weren't available in the older versions. DevOps engineers will learn how best to deploy Puppet with long-term maintenance and future growth in mind. Explore Puppet's design philosophy and data structures Get best practices for using Puppet's declarative language Examine Puppet resources in depth-the building blocks of state management Learn to model and describe business and site-specific logic in Puppet See best-in-class models for multitiered data management with Hiera Explore available options and community experience for node classification Utilize r10k to simplify and accelerate Puppet change management Review the cost benefits of creating your own extensions to Puppet Get detailed advice for extending Puppet in a maintainable manner
https://magrudy-assets.storage.googleapis.com/9781491923009.jpg
68.24 USD

Puppet Best Practices

by Jo Rhett, Chris Barbour
Paperback / softback
Book cover image
This book describes the bottleneck faced soon by designers of traditional CMOS devices, due to device scaling, power and energy consumption, and variability limitations. This book aims at bridging the gap between device technology and architecture/system design. Readers will learn about challenges and opportunities presented by beyond-CMOS devices and gain ...
Beyond-CMOS Technologies for Next Generation Computer Design
This book describes the bottleneck faced soon by designers of traditional CMOS devices, due to device scaling, power and energy consumption, and variability limitations. This book aims at bridging the gap between device technology and architecture/system design. Readers will learn about challenges and opportunities presented by beyond-CMOS devices and gain insight into how these might be leveraged to build energy-efficient electronic systems.
https://magrudy-assets.storage.googleapis.com/9783319903842.jpg
157.490000 USD

Beyond-CMOS Technologies for Next Generation Computer Design

Hardback
Book cover image
This book constitutes the proceedings of the 14th International Workshop on Open MP, IWOMP 2018, held in Barcelona, Spain, in September 2018.The 16 full papers presented in this volume were carefully reviewed and selected for inclusion in this book. The papers are organized in topical sections named: best paper; loops ...
Evolving OpenMP for Evolving Architectures: 14th International Workshop on OpenMP, IWOMP 2018, Barcelona, Spain, September 26-28, 2018, Proceedings
This book constitutes the proceedings of the 14th International Workshop on Open MP, IWOMP 2018, held in Barcelona, Spain, in September 2018.The 16 full papers presented in this volume were carefully reviewed and selected for inclusion in this book. The papers are organized in topical sections named: best paper; loops and OpenMP; OpenMP in heterogeneous systems; OpenMP improvements and innovations; OpenMP user experiences: applications and tools; and tasking evaluations.
https://magrudy-assets.storage.googleapis.com/9783319985206.jpg
73.490000 USD

Evolving OpenMP for Evolving Architectures: 14th International Workshop on OpenMP, IWOMP 2018, Barcelona, Spain, September 26-28, 2018, Proceedings

Paperback / softback
Book cover image
Learn to build, secure, deploy, and manage your serverless application in Golang with AWS Lambda Key Features Implement AWS lambda to build scalable and cost-efficient applications in Go Design and set the data flow between cloud services and custom business logic Learn to design Lambda functions using real-world examples and ...
Hands-On Serverless Applications with Go: Build real-world, production-ready applications with AWS Lambda
Learn to build, secure, deploy, and manage your serverless application in Golang with AWS Lambda Key Features Implement AWS lambda to build scalable and cost-efficient applications in Go Design and set the data flow between cloud services and custom business logic Learn to design Lambda functions using real-world examples and implementation scenarios Book DescriptionServerless architecture is popular in the tech community due to AWS Lambda. Go is simple to learn, straightforward to work with, and easy to read for other developers; and now it's been heralded as a supported language for AWS Lambda. This book is your optimal guide to designing a Go serverless application and deploying it to Lambda. This book starts with a quick introduction to the world of serverless architecture and its benefits, and then delves into AWS Lambda using practical examples. You'll then learn how to design and build a production-ready application in Go using AWS serverless services with zero upfront infrastructure investment. The book will help you learn how to scale up serverless applications and handle distributed serverless systems in production. You will also learn how to log and test your application. Along the way, you'll also discover how to set up a CI/CD pipeline to automate the deployment process of your Lambda functions. Moreover, you'll learn how to troubleshoot and monitor your apps in near real-time with services such as AWS CloudWatch and X-ray. This book will also teach you how to secure the access with AWS Cognito. By the end of this book, you will have mastered designing, building, and deploying a Go serverless application. What you will learn Understand how AWS Lambda works and use it to create an application Understand how to scaleup serverless applications Design a cost-effective serverless application in AWS Build a highly scalable and fault-tolerant CI/CD pipeline Understand how to troubleshoot and monitor serverless apps in AWS Discover the working of APIs and single page applications Build a production-ready serverless application in Go Who this book is forThis book is for Go developers who would like to learn about serverless architecture. Go programming knowledge is assumed. DevOps and Solution Architects who are interested in building serverless applications in Go can also choose this book.
https://magrudy-assets.storage.googleapis.com/9781789134612.jpg
47.240000 USD

Hands-On Serverless Applications with Go: Build real-world, production-ready applications with AWS Lambda

by Mohamed Labouardy
Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 12th International Conference on Parallel Computational Technologies, PCT 2018, held in Rostov-on-Don, Russia, in April 2018.The 24 revised full papers presented were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on high performance architectures, tools and ...
Parallel Computational Technologies: 12th International Conference, PCT 2018, Rostov-on-Don, Russia, April 2-6, 2018, Revised Selected Papers
This book constitutes the refereed proceedings of the 12th International Conference on Parallel Computational Technologies, PCT 2018, held in Rostov-on-Don, Russia, in April 2018.The 24 revised full papers presented were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on high performance architectures, tools and technologies; parallel numerical algorithms; supercomputer simulation.
https://magrudy-assets.storage.googleapis.com/9783319996721.jpg
104.990000 USD

Parallel Computational Technologies: 12th International Conference, PCT 2018, Rostov-on-Don, Russia, April 2-6, 2018, Revised Selected Papers

Paperback / softback
Book cover image
With platforms designed for rapid adaptation and failure recovery such as Amazon Web Services, cloud computing is more like programming than traditional system administration. Tools for automatic scaling and instance replacement allow even small DevOps teams to manage massively scalable application infrastructures-if team members drop their old views of development ...
AWS System Administration: Best Practices for Sysadmins in the Amazon Cloud
With platforms designed for rapid adaptation and failure recovery such as Amazon Web Services, cloud computing is more like programming than traditional system administration. Tools for automatic scaling and instance replacement allow even small DevOps teams to manage massively scalable application infrastructures-if team members drop their old views of development and operations and start mastering automation. This comprehensive guide shows developers and system administrators how to configure and manage AWS services including EC2, CloudFormation, Elastic Load Balancing, S3, and Route 53. Sysadms will learn will learn to automate their favorite tools and processes; developers will pick up enough ops knowledge to build a robust and resilient AWS application infrastructure. Launch instances with EC2 or CloudFormation Securely deploy and manage your applications with AWS tools Learn to automate AWS configuration management with Python and Puppet Deploy applications with Auto Scaling and Elastic Load Balancing Explore approaches for deploying application and infrastructure updates Save time on development and operations with reusable components Learn strategies for managing log files in AWS environments Configure a cloud-aware DNS service with Route 53 Use AWS CloudWatch to monitor your infrastructure and applications
https://magrudy-assets.storage.googleapis.com/9781449342579.jpg
41.990000 USD

AWS System Administration: Best Practices for Sysadmins in the Amazon Cloud

by Federico Lucifredi, Mike Ryan
Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 37th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2018, held in Vasteras, Sweden, in September 2018. The 19 revised full papers and 1 short paper presented together with three abstracts of keynotes were carefully reviewed and selected from 63 submissions. ...
Computer Safety, Reliability, and Security: 37th International Conference, SAFECOMP 2018, Vasteras, Sweden, September 19-21, 2018, Proceedings
This book constitutes the refereed proceedings of the 37th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2018, held in Vasteras, Sweden, in September 2018. The 19 revised full papers and 1 short paper presented together with three abstracts of keynotes were carefully reviewed and selected from 63 submissions. The papers are organized in topical sections on Automotive Safety Standards and Cross-domain Reuse Potential; Autonomous Driving and Safety Analysis; Verification; Multi-concern Assurance; Fault Tolerance; and Safety and Security Risk.
https://magrudy-assets.storage.googleapis.com/9783319991290.jpg
73.490000 USD

Computer Safety, Reliability, and Security: 37th International Conference, SAFECOMP 2018, Vasteras, Sweden, September 19-21, 2018, Proceedings

Paperback / softback
Book cover image
Get the deep insights you need to master efficient architectural design considerations and solve common design problems in your enterprise applications. Key Features The benefits and applicability of using different design patterns in JAVA EE Learn best practices to solve common design and architectural challenges Choose the right patterns to ...
Java EE 8 Design Patterns and Best Practices: Build enterprise-ready scalable applications with architectural design patterns
Get the deep insights you need to master efficient architectural design considerations and solve common design problems in your enterprise applications. Key Features The benefits and applicability of using different design patterns in JAVA EE Learn best practices to solve common design and architectural challenges Choose the right patterns to improve the efficiency of your programs Book DescriptionPatterns are essential design tools for Java developers. Java EE Design Patterns and Best Practices helps developers attain better code quality and progress to higher levels of architectural creativity by examining the purpose of each available pattern and demonstrating its implementation with various code examples. This book will take you through a number of patterns and their Java EE-specific implementations. In the beginning, you will learn the foundation for, and importance of, design patterns in Java EE, and then will move on to implement various patterns on the presentation tier, business tier, and integration tier. Further, you will explore the patterns involved in Aspect-Oriented Programming (AOP) and take a closer look at reactive patterns. Moving on, you will be introduced to modern architectural patterns involved in composing microservices and cloud-native applications. You will get acquainted with security patterns and operational patterns involved in scaling and monitoring, along with some patterns involved in deployment. By the end of the book, you will be able to efficiently address common problems faced when developing applications and will be comfortable working on scalable and maintainable projects of any size. What you will learn Implement presentation layers, such as the front controller pattern Understand the business tier and implement the business delegate pattern Master the implementation of AOP Get involved with asynchronous EJB methods and REST services Involve key patterns in the adoption of microservices architecture Manage performance and scalability for enterprise-level applications Who this book is forJava developers who are comfortable with programming in Java and now want to learn how to implement design patterns to create robust, reusable and easily maintainable apps.
https://magrudy-assets.storage.googleapis.com/9781788830621.jpg
47.240000 USD

Java EE 8 Design Patterns and Best Practices: Build enterprise-ready scalable applications with architectural design patterns

by Joao Purificacao, Rhuan Rocha
Paperback / softback
Book cover image
In Synthetic Vision: Using Volume Learning and Visual DNA, a holistic model of the human visual system is developed into a working model in C++, informed by the latest neuroscience, DNN, and computer vision research. The author's synthetic visual pathway model includes the eye, LGN, visual cortex, and the high ...
Synthetic Vision: Using Volume Learning and Visual DNA
In Synthetic Vision: Using Volume Learning and Visual DNA, a holistic model of the human visual system is developed into a working model in C++, informed by the latest neuroscience, DNN, and computer vision research. The author's synthetic visual pathway model includes the eye, LGN, visual cortex, and the high level PFC learning centers. The corresponding visual genome model (VGM), begun in 2014, is introduced herein as the basis for a visual genome project analogous to the Human Genome Project funded by the US government. The VGM introduces volume learning principles and Visual DNA (VDNA) taking a multivariate approach beyond deep neural networks. Volume learning is modeled as programmable learning and reasoning agents, providing rich methods for structured agent classification networks. Volume learning incorporates a massive volume of multivariate features in various data space projections, collected into strands of Visual DNA, analogous to human DNA genes. VGM lays a foundation for a visual genome project to sequence VDNA as visual genomes in a public database, using collaborative research to move synthetic vision science forward and enable new applications. Bibliographical references are provided to key neuroscience, computer vision, and deep learning research, which form the basis for the biologically plausible VGM model and the synthetic visual pathway. The book also includes graphical illustrations and C++ API reference materials to enable VGM application programming. Open source code licenses are available for engineers and scientists. Scott Krig founded Krig Research to provide some of the world's first vision and imaging systems worldwide for military, industry, government, and academic use. Krig has worked for major corporations and startups in the areas of machine learning, computer vision, imaging, graphics, robotics and automation, computer security and cryptography. He has authored international patents in the areas of computer architecture, communications, computer security, digital imaging, and computer vision, and studied at Stanford. Scott Krig is the author of the English/Chinese Springer book Computer Vision Metrics, Survey, Taxonomy and Analysis of Computer Vision, Visual Neuroscience, and Deep Learning, Textbook Edition, as well as other books, articles, and papers.
https://magrudy-assets.storage.googleapis.com/9781501515170.jpg
133.94 USD

Synthetic Vision: Using Volume Learning and Visual DNA

by Scott Krig
Paperback / softback
Book cover image
Streaming data is a big deal in big data these days. As more and more businesses seek to tame the massive unbounded data sets that pervade our world, streaming systems have finally reached a level of maturity sufficient for mainstream adoption. With this practical guide, data engineers, data scientists, and ...
Streaming Systems
Streaming data is a big deal in big data these days. As more and more businesses seek to tame the massive unbounded data sets that pervade our world, streaming systems have finally reached a level of maturity sufficient for mainstream adoption. With this practical guide, data engineers, data scientists, and developers will learn how to work with streaming data in a conceptual and platform-agnostic way. Expanded from Tyler Akidau's popular blog posts Streaming 101 and Streaming 102 , this book takes you from an introductory level to a nuanced understanding of the what, where, when, and how of processing real-time data streams. You'll also dive deep into watermarks and exactly-once processing with co-authors Slava Chernyak and Reuven Lax. You'll explore: How streaming and batch data processing patterns compare The core principles and concepts behind robust out-of-order data processing How watermarks track progress and completeness in infinite datasets How exactly-once data processing techniques ensure correctness How the concepts of streams and tables form the foundations of both batch and streaming data processing The practical motivations behind a powerful persistent state mechanism, driven by a real-world example How time-varying relations provide a link between stream processing and the world of SQL and relational algebra
https://magrudy-assets.storage.googleapis.com/9781491983874.jpg
95.54 USD

Streaming Systems

by Reuven Lax, Slava Chernyak, Tyler Akidau
Paperback / softback
Book cover image
Get up to speed with Apache Kudu, the column-oriented data store for Hadoop that not only provides an architectural simplification of several existing use cases, but also allows use cases not possible before. With this practical guide, enterprise architects working on big data implemetations will learn how Kudu's architecture and ...
Getting Started with Kudu
Get up to speed with Apache Kudu, the column-oriented data store for Hadoop that not only provides an architectural simplification of several existing use cases, but also allows use cases not possible before. With this practical guide, enterprise architects working on big data implemetations will learn how Kudu's architecture and features solve a unique problem in the Hadoop ecosystem. For example, Kudu makes Hadoop viable for real-time IoT use cases in addition to making a transition from a massively parallel processing (MPP) SQL database engine plausible. If you're familiar with other storage layer projects such HDFS, HBase, Spanner, and Cassandra, you'll quickly learn-and appreciate-the unique contribution Kudu makes to this ecosystem. Explore how Kudu is compatible with data processing frameworks in the Hadoop environment Understand Kudu's architecture, internals, installation, and deployment Learn how to fully administer a Kudu cluster Become acquainted with low-level client APIs, how to integrate with SQL engines like Impala, and frameworks for integration Learn about table and schema design Get use cases, examples, best practices, and sample code
https://magrudy-assets.storage.googleapis.com/9781491980255.jpg
68.24 USD

Getting Started with Kudu

by Ryan Bossheart, Brock Noland, Mladen Kovacevic, Jean-Marc Spaggiari
Paperback / softback
Book cover image
This book presents the state-of-the art of one of the main concerns with microprocessors today, a phenomenon known as dark silicon . Readers will learn how power constraints (both leakage and dynamic power) limit the extent to which large portions of a chip can be powered up at a given ...
The Dark Side of Silicon: Energy Efficient Computing in the Dark Silicon Era
This book presents the state-of-the art of one of the main concerns with microprocessors today, a phenomenon known as dark silicon . Readers will learn how power constraints (both leakage and dynamic power) limit the extent to which large portions of a chip can be powered up at a given time, i.e. how much actual performance and functionality the microprocessor can provide. The authors describe their research toward the future of microprocessor development in the dark silicon era, covering a variety of important aspects of dark silicon-aware architectures including design, management, reliability, and test. Readers will benefit from specific recommendations for mitigating the dark silicon phenomenon, including energy-efficient, dedicated solutions and technologies to maximize the utilization and reliability of microprocessors.
https://magrudy-assets.storage.googleapis.com/9783319810744.jpg
167.990000 USD

The Dark Side of Silicon: Energy Efficient Computing in the Dark Silicon Era

Paperback / softback
Book cover image
Use Java features such as JAX-RS, EJBs, and JPAs to build powerful middleware for newer architectures such as the cloud Key Features Explore EJBs to build middleware solutions for enterprise and distributed applications Understand middleware designs such as event-based and message-driven web services Learn to design and maintain large-scale systems ...
Developing Middleware in Java EE 8: Build robust middleware solutions using the latest technologies and trends
Use Java features such as JAX-RS, EJBs, and JPAs to build powerful middleware for newer architectures such as the cloud Key Features Explore EJBs to build middleware solutions for enterprise and distributed applications Understand middleware designs such as event-based and message-driven web services Learn to design and maintain large-scale systems and vendor disputes Book DescriptionMiddleware is the infrastructure in software based applications that enables businesses to solve problems, operate more efficiently, and make money. As the use of middleware extends beyond a single application, the importance of having it written by experts increases substantially. This book will help you become an expert in developing middleware for a variety of applications. The book starts off by exploring the latest Java EE 8 APIs with newer features and managing dependencies with CDI 2.0. You will learn to implement object-to-relational mapping using JPA 2.1 and validate data using bean validation. You will also work with different types of EJB to develop business logic, and with design RESTful APIs by utilizing different HTTP methods and activating JAX-RS features in enterprise applications. You will learn to secure your middleware with Java Security 1.0 and implement various authentication techniques, such as OAuth authentication. In the concluding chapters, you will use various test technologies, such as JUnit and Mockito, to test applications, and Docker to deploy your enterprise applications. By the end of the book, you will be proficient in developing robust, effective, and distributed middleware for your business. What you will learn Implement the latest Java EE 8 APIs and manage dependencies with CDI 2.0 Perform CRUD operations and access databases with JPA 2.1 Use bean validation API 2.0 to validate data Develop business logic with EJB 3.2 Incorporate the REST architecture and RESTful API design patterns Perform serialization and deserialization on JSON documents using JSON-B Utilize JMS for messaging and queuing models and securing applications Test applications using JUnit and Mockito and deploy them using Docker Who this book is forEnterprise architects, designers, developers, and programmers who are interested in learning how to build robust middleware solutions for enterprise software will find this book useful. Prior knowledge of Java EE is essential
https://magrudy-assets.storage.googleapis.com/9781788391078.jpg
47.240000 USD

Developing Middleware in Java EE 8: Build robust middleware solutions using the latest technologies and trends

by Abdalla Mahmoud
Paperback / softback
Book cover image
Understand malware analysis and its practical implementation Key Features Explore the key concepts of malware analysis and memory forensics using real-world examples Learn the art of detecting, analyzing, and investigating malware threats Understand adversary tactics and techniques Book DescriptionMalware analysis and memory forensics are powerful analysis and investigation techniques used ...
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Understand malware analysis and its practical implementation Key Features Explore the key concepts of malware analysis and memory forensics using real-world examples Learn the art of detecting, analyzing, and investigating malware threats Understand adversary tactics and techniques Book DescriptionMalware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, responding to, and investigating such intrusions is critical to information security professionals. Malware analysis and memory forensics have become must-have skills to fight advanced malware, targeted attacks, and security breaches. This book teaches you the concepts, techniques, and tools to understand the behavior and characteristics of malware through malware analysis. It also teaches you techniques to investigate and hunt malware using memory forensics. This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, infected memory images, and visual diagrams to help you gain a better understanding of the subject and to equip you with the skills required to analyze, investigate, and respond to malware-related incidents. What you will learn Create a safe and isolated lab environment for malware analysis Extract the metadata associated with malware Determine malware's interaction with the system Perform code analysis using IDA Pro and x64dbg Reverse-engineer various malware functionalities Reverse engineer and decode common encoding/encryption algorithms Reverse-engineer malware code injection and hooking techniques Investigate and hunt malware using memory forensics Who this book is forThis book is for incident responders, cyber-security investigators, system administrators, malware analyst, forensic practitioners, student, or curious security professionals interested in learning malware analysis and memory forensics. Knowledge of programming languages such as C and Python is helpful but is not mandatory. If you have written few lines of code and have a basic understanding of programming concepts, you'll be able to get most out of this book.
https://magrudy-assets.storage.googleapis.com/9781788392501.jpg
52.490000 USD

Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

by Monnappa K A
Paperback / softback
Book cover image
This book precisely formulates and simplifies the presentation of Instruction Level Parallelism (ILP) compilation techniques. It uniquely offers consistent and uniform descriptions of the code transformations involved. Due to the ubiquitous nature of ILP in virtually every processor built today, from general purpose CPUs to application-specific and embedded processors, this ...
Instruction Level Parallelism
This book precisely formulates and simplifies the presentation of Instruction Level Parallelism (ILP) compilation techniques. It uniquely offers consistent and uniform descriptions of the code transformations involved. Due to the ubiquitous nature of ILP in virtually every processor built today, from general purpose CPUs to application-specific and embedded processors, this book is useful to the student, the practitioner and also the researcher of advanced compilation techniques. With an emphasis on fine-grain instruction level parallelism, this book will also prove interesting to researchers and students of parallelism at large, in as much as the techniques described yield insights that go beyond superscalar and VLIW (Very Long Instruction Word) machines compilation and are more widely applicable to optimizing compilers in general. ILP techniques have found wide and crucial application in Design Automation, where they have been used extensively in the optimization of performance as well as area and power minimization of computer designs.
https://magrudy-assets.storage.googleapis.com/9781493979592.jpg
89.240000 USD

Instruction Level Parallelism

by Alexandru Nicolau, Arun Kejariwal, Utpal Banerjee, Alex Aiken
Paperback / softback
Book cover image
IT service management automation at your fingertips Key Features Learn to leverage ServiceNow's capabilities for improved IT automation by following step-by-step, practical instructions Build core administration, development, and maintenance skills with IT service management in ServiceNow Improve your workflow efficiency by designing and creating responsive and automated workflows, business logic, ...
Learning ServiceNow: Administration and development on the Now platform, for powerful IT automation, 2nd Edition
IT service management automation at your fingertips Key Features Learn to leverage ServiceNow's capabilities for improved IT automation by following step-by-step, practical instructions Build core administration, development, and maintenance skills with IT service management in ServiceNow Improve your workflow efficiency by designing and creating responsive and automated workflows, business logic, and front-end automation Book DescriptionThis book is an updated version of Learning ServiceNow, that will cover the new and updated features of the ServiceNow platform. It will show you how to put important ServiceNow features to work in the real world, while introducing key concepts via examples of managing and automating IT services. It'll help you build a solid foundation of knowledge, and will demonstrate how to effectively implement and configure modules within ServiceNow. We'll show you how to configure and administer your instance, and then move on to building strong user interfaces and creating powerful workflows. We also cover other key elements of ServiceNow, such as notifications, security, reporting, and custom development. You will learn how to improve and automate your business' workflow and processes. By the end of this book, you will be able to successfully configure and manage ServiceNow like a pro. What you will learn Read and write clear, effective code for the ServiceNow platform Identify and avoid common pitfalls and missteps that could seriously impact future progress and upgradeability Use debugging tools to troubleshoot when things go wrong Discover tips and tricks from top ServiceNow developers, architects, and administrators. Find out what the pros wish they knew when they were starting out Who this book is forThis book is for IT professionals and administrators who are planning to or are already trying to implement ServiceNow in their organization for Enterprise IT service management tasks. Some familiarity with web technologies (JavaScript) would be helpful. Prior ServiceNow experience is not necessary.
https://magrudy-assets.storage.googleapis.com/9781788837040.jpg
52.490000 USD

Learning ServiceNow: Administration and development on the Now platform, for powerful IT automation, 2nd Edition

by Tim Woodruff
Paperback / softback
Book cover image
This thesis introduces a successfully designed and commissioned intelligent health monitoring system, specifically for use on any industrial robot, which is able to predict the onset of faults in the joints of the geared transmissions. However the developed embedded wireless condition monitoring system leads itself very well for applications on ...
Design of an Intelligent Embedded System for Condition Monitoring of an Industrial Robot
This thesis introduces a successfully designed and commissioned intelligent health monitoring system, specifically for use on any industrial robot, which is able to predict the onset of faults in the joints of the geared transmissions. However the developed embedded wireless condition monitoring system leads itself very well for applications on any power transmission equipment in which the loads and speeds are not constant, and access is restricted. As such this provides significant scope for future development. Three significant achievements are presented in this thesis. First, the development of a condition monitoring algorithm based on vibration analysis of an industrial robot for fault detection and diagnosis. The combined use of a statistical control chart with time-domain signal analysis for detecting a fault via an arm-mounted wireless processor system represents the first stage of fault detection. Second, the design and development of a sophisticated embedded microprocessor base station for online implementation of the intelligent condition monitoring algorithm, and third, the implementation of a discrete wavelet transform, using an artificial neural network, with statistical feature extraction for robot fault diagnosis in which the vibration signals are first decomposed into eight levels of wavelet coefficients.
https://magrudy-assets.storage.googleapis.com/9783319831664.jpg
178.490000 USD

Design of an Intelligent Embedded System for Condition Monitoring of an Industrial Robot

by Alaa Abdulhady Jaber
Paperback / softback
Book cover image
The control-flow issues presented in this textbook are extremely relevant in modern computer languages and programming styles. In addition to the basic control-flow mechanisms, virtually all new computer languages provide some form of exceptional control flow to support robust programming introduced in this textbook. Also, concurrency capabilities are appearing with ...
Understanding Control Flow: Concurrent Programming Using C++
The control-flow issues presented in this textbook are extremely relevant in modern computer languages and programming styles. In addition to the basic control-flow mechanisms, virtually all new computer languages provide some form of exceptional control flow to support robust programming introduced in this textbook. Also, concurrency capabilities are appearing with increasing frequency in both new and old programming languages, and are covered in this book. Understanding Control Flow: With Concurrent Programming Using C++ starts with looping, and works through each of the basic control-flow concepts, examining why each is fundamental and where it is useful. Time is spent on each concept according to its level of difficulty. Examples and exercises are also provided in this textbook. New programming methodologies are requiring new forms of control flow, and new programming languages are supporting these methodologies with new control structures, such as the concurrency constructs discussed in this textbook. Most computers now contain multi-threading and multi-cores, while multiple processors and distributed systems are ubiquitous - all of which require advanced programming methodologies to take full advantage of the available parallelism summarized in this textbook. Advance forms of control flow are becoming basic programming skills needed by all programmers, not just graduate students working in the operating systems or database disciplines. This textbook is designed for advanced-level students studying computer science and engineering. Professionals and researchers working in this field, specifically programming and software engineering, will find this book useful as a reference.
https://magrudy-assets.storage.googleapis.com/9783319798301.jpg
104.990000 USD

Understanding Control Flow: Concurrent Programming Using C++

by Peter A. Buhr
Paperback / softback
Book cover image
This book introduces readers to a variety of tools for automatic analog integrated circuit (IC) sizing and optimization. The authors provide a historical perspective on the early methods proposed to tackle automatic analog circuit sizing, with emphasis on the methodologies to size and optimize the circuit, and on the methodologies ...
Automatic Analog IC Sizing and Optimization Constrained with PVT Corners and Layout Effects
This book introduces readers to a variety of tools for automatic analog integrated circuit (IC) sizing and optimization. The authors provide a historical perspective on the early methods proposed to tackle automatic analog circuit sizing, with emphasis on the methodologies to size and optimize the circuit, and on the methodologies to estimate the circuit's performance. The discussion also includes robust circuit design and optimization and the most recent advances in layout-aware analog sizing approaches. The authors describe a methodology for an automatic flow for analog IC design, including details of the inputs and interfaces, multi-objective optimization techniques, and the enhancements made in the base implementation by using machine leaning techniques. The Gradient model is discussed in detail, along with the methods to include layout effects in the circuit sizing. The concepts and algorithms of all the modules are thoroughly described, enabling readers to reproduce the methodologies, improve the quality of their designs, or use them as starting point for a new tool. An extensive set of application examples is included to demonstrate the capabilities and features of the methodologies described.
https://magrudy-assets.storage.googleapis.com/9783319824857.jpg
157.490000 USD

Automatic Analog IC Sizing and Optimization Constrained with PVT Corners and Layout Effects

by Nuno Horta, Ricardo Martins, Nuno Lourenco
Paperback / softback
Book cover image
This book introduces new logic primitives for electronic design automation tools. The author approaches fundamental EDA problems from a different, unconventional perspective, in order to demonstrate the key role of rethinking EDA solutions in overcoming technological limitations of present and future technologies. The author discusses techniques that improve the efficiency ...
New Data Structures and Algorithms for Logic Synthesis and Verification
This book introduces new logic primitives for electronic design automation tools. The author approaches fundamental EDA problems from a different, unconventional perspective, in order to demonstrate the key role of rethinking EDA solutions in overcoming technological limitations of present and future technologies. The author discusses techniques that improve the efficiency of logic representation, manipulation and optimization tasks by taking advantage of majority and biconditional logic primitives. Readers will be enabled to accelerate formal methods by studying core properties of logic circuits and developing new frameworks for logic reasoning engines.
https://magrudy-assets.storage.googleapis.com/9783319827537.jpg
103.950000 USD

New Data Structures and Algorithms for Logic Synthesis and Verification

by Luca Gaetano Amaru
Paperback / softback
Book cover image
This book covers the two broad areas of the electronics and electrical aspects of control applications, highlighting the many different types of control systems of relevance to real-life control system design. The control techniques presented are state-of-the-art. In the electronics section, readers will find essential information on microprocessor, microcontroller, mechatronics ...
Real Time Control Engineering: Systems And Automation
This book covers the two broad areas of the electronics and electrical aspects of control applications, highlighting the many different types of control systems of relevance to real-life control system design. The control techniques presented are state-of-the-art. In the electronics section, readers will find essential information on microprocessor, microcontroller, mechatronics and electronics control. The low-level assembly programming language performs basic input/output control techniques as well as controlling the stepper motor and PWM dc motor. In the electrical section, the book addresses the complete elevator PLC system design, neural network plant control, load flow analysis, and process control, as well as machine vision topics. Illustrative diagrams, circuits and programming examples and algorithms help to explain the details of the system function design. Readers will find a wealth of computer control and industrial automation practices and applications for modern industries, as well as the educational sector.
https://magrudy-assets.storage.googleapis.com/9789811093715.jpg
125.990000 USD

Real Time Control Engineering: Systems And Automation

by Tian Seng Ng
Paperback / softback
Book cover image
This book introduces new massively parallel computer (MPSoC) architectures called invasive tightly coupled processor arrays. It proposes strategies, architecture designs, and programming interfaces for invasive TCPAs that allow invading and subsequently executing loop programs with strict requirements or guarantees of non-functional execution qualities such as performance, power consumption, and reliability. ...
Invasive Tightly Coupled Processor Arrays
This book introduces new massively parallel computer (MPSoC) architectures called invasive tightly coupled processor arrays. It proposes strategies, architecture designs, and programming interfaces for invasive TCPAs that allow invading and subsequently executing loop programs with strict requirements or guarantees of non-functional execution qualities such as performance, power consumption, and reliability. For the first time, such a configurable processor array architecture consisting of locally interconnected VLIW processing elements can be claimed by programs, either in full or in part, using the principle of invasive computing. Invasive TCPAs provide unprecedented energy efficiency for the parallel execution of nested loop programs by avoiding any global memory access such as GPUs and may even support loops with complex dependencies such as loop-carried dependencies that are not amenable to parallel execution on GPUs. For this purpose, the book proposes different invasion strategies for claiming a desired number of processing elements (PEs) or region within a TCPA exclusively for an application according to performance requirements. It not only presents models for implementing invasion strategies in hardware, but also proposes two distinct design flavors for dedicated hardware components to support invasion control on TCPAs.
https://magrudy-assets.storage.googleapis.com/9789811093173.jpg
157.490000 USD

Invasive Tightly Coupled Processor Arrays

by VAHID LARI
Paperback / softback
Book cover image
This textbook describes in detail the fundamental information about the 8051 microcontroller and it carefully teaches readers how to use the microcontroller to make both electronics hardware and software. In addition to discussion of the 8051 internals, this text includes numerous, solved examples, end-of-chapter exercises, laboratory and practical projects.
8051 Microcontrollers: Fundamental Concepts, Hardware, Software and Applications in Electronics
This textbook describes in detail the fundamental information about the 8051 microcontroller and it carefully teaches readers how to use the microcontroller to make both electronics hardware and software. In addition to discussion of the 8051 internals, this text includes numerous, solved examples, end-of-chapter exercises, laboratory and practical projects.
https://magrudy-assets.storage.googleapis.com/9783319764382.jpg
110.89 USD

8051 Microcontrollers: Fundamental Concepts, Hardware, Software and Applications in Electronics

by Salvador Pinillos Gimenez
Hardback
Book cover image
Cat Notebook Large Size 8.5 X 11 Ruled 150 Pages Softcover for Home School Offic: Notebook Large Size 8.5 X 11 Ruled 150 Pages Softcover for Home School Office Personal Use Composition Book School Exercise Book College
https://magrudy-assets.storage.googleapis.com/9781726057868.jpg
7.340000 USD

Cat Notebook Large Size 8.5 X 11 Ruled 150 Pages Softcover for Home School Offic: Notebook Large Size 8.5 X 11 Ruled 150 Pages Softcover for Home School Office Personal Use Composition Book School Exercise Book College

by Wild Pages Press
Paperback / softback
Book cover image
Coffee Notebook Large Size 8.5 X 11 Ruled 150 Pages Softcover for Home School of: Notebook Large Size 8.5 X 11 Ruled 150 Pages Softcover for Home School Office Personal Use Composition Book School Exercise Book College
https://magrudy-assets.storage.googleapis.com/9781726058773.jpg
7.340000 USD

Coffee Notebook Large Size 8.5 X 11 Ruled 150 Pages Softcover for Home School of: Notebook Large Size 8.5 X 11 Ruled 150 Pages Softcover for Home School Office Personal Use Composition Book School Exercise Book College

by Wild Pages Press
Paperback / softback
Book cover image
This proven textbook guides readers to a thorough understanding of the theory and design of operational amplifiers (OpAmps). The core of the book presents systematically the design of operational amplifiers, classifying them into a periodic system of nine main overall configurations, ranging from one gain stage up to four or ...
Operational Amplifiers: Theory and Design
This proven textbook guides readers to a thorough understanding of the theory and design of operational amplifiers (OpAmps). The core of the book presents systematically the design of operational amplifiers, classifying them into a periodic system of nine main overall configurations, ranging from one gain stage up to four or more stages. This division enables circuit designers to recognize quickly, understand, and choose optimal configurations. Characterization of operational amplifiers is given by macro models and error matrices, together with measurement techniques for their parameters. Definitions are given for four types of operational amplifiers depending on the grounding of their input and output ports. Many famous designs are evaluated in depth, using a carefully structured approach enhanced by numerous figures. In order to reinforce the concepts introduced and facilitate self-evaluation of design skills, the author includes problems with detailed solutions, as well as simulation exercises.
https://magrudy-assets.storage.googleapis.com/9783319802770.jpg
115.490000 USD

Operational Amplifiers: Theory and Design

by Johan Huijsing
Paperback / softback
Book cover image
Computers and computer networks are one of the most incredible inventions of the 20th century, having an ever-expanding role in our daily lives by enabling complex human activities in areas such as entertainment, education, and commerce. One of the most challenging problems in computer science for the 21st century is ...
Distributed Computing Pearls
Computers and computer networks are one of the most incredible inventions of the 20th century, having an ever-expanding role in our daily lives by enabling complex human activities in areas such as entertainment, education, and commerce. One of the most challenging problems in computer science for the 21st century is to improve the design of distributed systems where computing devices have to work together as a team to achieve common goals. In this book, I have tried to gently introduce the general reader to some of the most fundamental issues and classical results of computer science underlying the design of algorithms for distributed systems, so that the reader can get a feel of the nature of this exciting and fascinating field called distributed computing. The book will appeal to the educated layperson and requires no computer-related background. I strongly suspect that also most computer knowledgeable readers will be able to learn something new.
https://magrudy-assets.storage.googleapis.com/9781681733487.jpg
57.700000 USD

Distributed Computing Pearls

by Gadi Taubenfeld
Paperback / softback
Book cover image
This book offers readers a clear guide to implementing engineering applications with FPGAs, from the mathematical description to the hardware synthesis, including discussion of VHDL programming and co-simulation issues. Coverage includes FPGA realizations such as: chaos generators that are described from their mathematical models; artificial neural networks (ANNs) to predict ...
Engineering Applications of FPGAs: Chaotic Systems, Artificial Neural Networks, Random Number Generators, and Secure Communication Systems
This book offers readers a clear guide to implementing engineering applications with FPGAs, from the mathematical description to the hardware synthesis, including discussion of VHDL programming and co-simulation issues. Coverage includes FPGA realizations such as: chaos generators that are described from their mathematical models; artificial neural networks (ANNs) to predict chaotic time series, for which a discussion of different ANN topologies is included, with different learning techniques and activation functions; random number generators (RNGs) that are realized using different chaos generators, and discussions of their maximum Lyapunov exponent values and entropies. Finally, optimized chaotic oscillators are synchronized and realized to implement a secure communication system that processes black and white and grey-scale images. In each application, readers will find VHDL programming guidelines and computer arithmetic issues, along with co-simulation examples with Active-HDL and Simulink.The whole book provides a practical guide to implementing a variety of engineering applications from VHDL programming and co-simulation issues, to FPGA realizations of chaos generators, ANNs for chaotic time-series prediction, RNGs and chaotic secure communications for image transmission.
https://magrudy-assets.storage.googleapis.com/9783319816791.jpg
157.490000 USD

Engineering Applications of FPGAs: Chaotic Systems, Artificial Neural Networks, Random Number Generators, and Secure Communication Systems

by Luis Gerardo de la Fraga, Jose de Jesus Rangel-Magdaleno, Esteban Tlelo-Cuautle
Paperback / softback
Book cover image
Originally developed to support video games, graphics processor units (GPUs) are now increasingly used for general-purpose (non-graphics) applications ranging from machine learning to mining of cryptographic currencies. GPUs can achieve improved performance and efficiency versus central processing units (CPUs) by dedicating a larger fraction of hardware resources to computation. In ...
General-Purpose Graphics Processor Architecture
Originally developed to support video games, graphics processor units (GPUs) are now increasingly used for general-purpose (non-graphics) applications ranging from machine learning to mining of cryptographic currencies. GPUs can achieve improved performance and efficiency versus central processing units (CPUs) by dedicating a larger fraction of hardware resources to computation. In addition, their general-purpose programmability makes contemporary GPUs appealing to software developers in comparison to domain-specific accelerators. This book provides an introduction to those interested in studying the architecture of GPUs that support general-purpose computing. It collects together information currently only found among a wide range of disparate sources. The authors led development of the GPGPU-Sim simulator widely used in academic research on GPU architectures. The first chapter of this book describes the basic hardware structure of GPUs and provides a brief overview of their history. Chapter 2 provides a summary of GPU programming models relevant to the rest of the book. Chapter 3 explores the architecture of GPU compute cores. Chapter 4 explores the architecture of the GPU memory system. After describing the architecture of existing systems, Chapters \ref{ch03} and \ref{ch04} provide an overview of related research. Chapter 5 summarizes cross-cutting research impacting both the compute core and memory system. This book should provide a valuable resource for those wishing to understand the architecture of graphics processor units (GPUs) used for acceleration of general-purpose applications and to those who want to obtain an introduction to the rapidly growing body of research exploring how to improve the architecture of these GPUs.
https://magrudy-assets.storage.googleapis.com/9781627059237.jpg
62.950000 USD

General-Purpose Graphics Processor Architecture

by Timothy G. Rogers, Wilson Wai Lun Fung, Tor M. Aamodt
Paperback / softback
Page 1 of 40