You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The use of cloud applications is becoming increasingly popular due to their scalability and cost advantages. However, companies need help in adopting cloud applications due to their internal policies and compliance requirements. Trust and security are crucial factors that influence the adoption of cloud applications. This book proposes a cloud architecture that addresses this challenge by shifting the trust for compliance-driven configurations of cloud applications from the cloud application provider to the blockchain. The architecture was developed using design science research and evaluated using mixed-method semi-structured guided interviews. The results show that the proposed architecture can significantly reduce adoption risk due to compliance-driven cloud application configurations, shifting trust from the cloud provider to the blockchain. This book presents an innovative approach to address the challenge of adopting cloud applications, and enhancing trust and security for businesses.
The Mindful International Manager tackles the management situations that international managers have to handle every day. Written to be accessible to non-native English speakers, it quotes the experiences and insights of practicing international managers and describes differences and difficulties as well as the skills and competences. Equipping readers with the techniques and knowledge to motivate and manage their teams, this book shows how to clarify local vs. international roles, support and develop a team, organize and coordinate boundaries of time and distance, and win commitment toward common goals. It contains exercises, best practice advice, quotes from practicing managers from around the world, and a glossary of difficult terms. Visit the website at http://www.themindfulinternationalmanager.com/.
How are human computation systems developed in the field of citizen science to achieve what neither humans nor computers can do alone? Through multiple perspectives and methods, Libuse Hannah Veprek examines the imagination of these assemblages, their creation, and everyday negotiation in the interplay of various actors and play/science entanglements at the edge of AI. Focusing on their human-technology relations, this ethnographic study shows how these formations are marked by intraversions, as they change with technological advancements and the actors' goals, motivations, and practices. This work contributes to the constructive and critical ethnographic engagement with human-AI assemblages in the making.
This Open Access book gives a comprehensive account of both the history and current achievements of molecular beam research. In 1919, Otto Stern launched the revolutionary molecular beam technique. This technique made it possible to send atoms and molecules with well-defined momentum through vacuum and to measure with high accuracy the deflections they underwent when acted upon by transversal forces. These measurements revealed unforeseen quantum properties of nuclei, atoms, and molecules that became the basis for our current understanding of quantum matter. This volume shows that many key areas of modern physics and chemistry owe their beginnings to the seminal molecular beam work of Otto Stern and his school. Written by internationally recognized experts, the contributions in this volume will help experienced researchers and incoming graduate students alike to keep abreast of current developments in molecular beam research as well as to appreciate the history and evolution of this powerful method and the knowledge it reveals.
This book teaches you how to build and maintain effective data pipelines. Youll explore the most common usage patterns, including aggregating multiple data sources, connecting to and from data lakes, and cloud deployment. --
Running your systems in the cloud doesn’t automatically make them secure. Learn the tools and new management approaches you need to create secure apps and infrastructure on AWS. In AWS Security you’ll learn how to: Securely grant access to AWS resources to coworkers and customers Develop policies for ensuring proper access controls Lock-down network controls using VPCs Record audit logs and use them to identify attacks Track and assess the security of an AWS account Counter common attacks and vulnerabilities Written by security engineer Dylan Shields, AWS Security provides comprehensive coverage on the key tools and concepts you can use to defend AWS-based systems. You’ll learn how to ...
Summary Serious developers know that code can always be improved. With each iteration, you make optimizations—small and large—that can have a huge impact on your application’s speed, size, resilience, and maintainability. In Seriously Good Software: Code that Works, Survives, and Wins, author, teacher, and Java expert Marco Faella teaches you techniques for writing better code. You’ll start with a simple application and follow it through seven careful refactorings, each designed to explore another dimension of quality. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology Great code blends the skill of a prog...
Distributed applications demand reliable, high-performance messaging. The Apache Pulsar server-to-server messaging system provides a secure, stable platform without the need for a stream processing engine like Spark. Contributed by Yahoo to the Apache Foundation, Pulsar is mature and battle-tested, handling millions of messages per second for over three years at Yahoo. Apache Pulsar in Action is a comprehensive and practical guide to building high-traffic applications with Pulsar, delivering extreme levels of speed and durability. about the technology Pulsar is a streaming messaging system designed for high performance server-to-server messaging. Built and tested under intense conditions at ...
2.1 E-Government: e-Governance and e-Democracy The term Electronic Government (e-Government), as an expression, was coined after the example of Electronic Commerce. In spite of being a relatively recent expression, e-Government designates a field of activity that has been with us for several decades and which has attained a high level of penetration in many countries2. What has been observed over the recent years is a shift on the broadness of the e-Government concept. The ideas inside e-Governance and e- Democracy are to some extent promising big changes in public administration. The demand now is not only simply delivering a service - line. It is to deliver complex and new services, which are all citizen-centric. Another important demand is related to the improvement of citizen's participation in governmental processes and decisions so that the governments' transparency and legitimacy are enforced. In order to fulfill these new demands, a lot of research has been done over the recent years (see Section 3) but many challenges are still to be faced, not only in the technological field, but also in the political and social aspects.