Buy gisd.eu ?

Products related to Scalability:


  • Web Scalability for Startup Engineers
    Web Scalability for Startup Engineers

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Design and build scalable web applications quicklyThis is an invaluable roadmap for meeting the rapid demand to deliver scalable applications in a startup environment.With a focus on core concepts and best practices rather than on individual languages, platforms, or technologies, Web Scalability for Startup Engineers describes how infrastructure and software architecture work together to support a scalable environment.You’ll learn, step by step, how scalable systems work and how to solve common challenges.Helpful diagrams are included throughout, and real-world examples illustrate the concepts presented.Even if you have limited time and resources, you can successfully develop and deliver robust, scalable web applications with help from this practical guide.Learn the key principles of good software design required for scalable systemsBuild the front-end layer to sustain the highest levels of concurrency and request ratesDesign and develop web services, including REST-ful APIsEnable a horizontally scalable data layerImplement caching best practicesLeverage asynchronous processing, messaging, and event-driven architectureStructure, index, and store data for optimized search Explore other aspects of scalability, such as automation, project management, and agile teams

    Price: 54.99 £ | Shipping*: 0.00 £
  • Programming Scala : Scalability = Functional Programming + Objects
    Programming Scala : Scalability = Functional Programming + Objects

    Get up to speed on Scala--the JVM, JavaScript, and natively compiled language that offers all the benefits of functional programming, a modern object model, and an advanced type system.Packed with code examples, this comprehensive book shows you how to be productive with the language and ecosystem right away.You'll learn why Scala is ideal for building today's highly scalable, data-centric applications, while maximizing developer productivity. While Java remains popular and Kotlin has become popular, Scala hasn't been sitting still.This third edition covers the new features in Scala 3.0 with updates throughout the book.Programming Scala is ideal for beginning to advanced developers who want a complete understanding of Scala's design philosophy and features with a thoroughly practical focus. Program faster with Scala's succinct and flexible syntaxDive into basic and advanced functional programming techniquesBuild killer big data and distributed apps using Scala's functional combinators and tools like Spark and AkkaCreate concise solutions to challenging design problems with the sophisticated type system, mixin composition with traits, pattern matching, and more

    Price: 63.99 £ | Shipping*: 0.00 £
  • Apache Iceberg: The Definitive Guide : Data Lakehouse Functionality, Performance, and Scalability on the Data Lake
    Apache Iceberg: The Definitive Guide : Data Lakehouse Functionality, Performance, and Scalability on the Data Lake

    Traditional data architecture patterns are severely limited.To use these patterns, you have to ETL data into each tool-a cost-prohibitive process for making warehouse features available to all of your data.This lack of flexibility forces you to adjust your workflow to the tool your data is locked in, which creates data silos and data drift.This book shows you a better way. Apache Iceberg provides the capabilities, performance, scalability, and savings that fulfill the promise of an open data lakehouse.By following the lessons in this book, you'll be able to achieve interactive, batch, machine learning, and streaming analytics with this lakehouse.Authors Tomer Shiran, Jason Hughes, Alex Merced, and Dipankar Mazumdar from Dremio guide you through the process. With this book, you'll learn:The architecture of Apache Iceberg tablesWhat happens under the hood when you perform operations on Iceberg tablesHow to further optimize Apache Iceberg tables for maximum performanceHow to use Apache Iceberg with popular data engines such as Apache Spark, Apache Flink, and Dremio SonarHow Apache Iceberg can be used in streaming and batch ingestionDiscover why Apache Iceberg is a foundational technology for implementing an open data lakehouse.

    Price: 55.99 £ | Shipping*: 0.00 £
  • Scalability, Density, and Decision Making in Cognitive Wireless Networks
    Scalability, Density, and Decision Making in Cognitive Wireless Networks

    This cohesive treatment of cognitive radio and networking technology integrates information and decision theory to provide insight into relationships throughout all layers of networks and across all wireless applications.It encompasses conventional considerations of spectrum and waveform selection and covers topology determination, routing policies, content positioning and future hybrid architectures that fully integrate wireless and wired services.Emerging flexibility in spectrum regulation and the imminent adoption of spectrum-sharing policies make this topic of immediate relevance both to the research community and to the commercial wireless community. • Features specific examples of decision-making structures and criteria required to extend network density and scaling to unprecedented levels • Integrates sensing, control plane and content operations into a single cohesive structure • Provides simpler and more powerful models of network operation • Presents a unique approach to decision-making and to mechanisms for adjusting control plane activity to ensure network scaling • Generalises the concepts of shared and adaptive spectrum policies • Addresses network transport operations and dynamic management of cognitive wireless networks' own information seeking behaviour

    Price: 118.00 £ | Shipping*: 0.00 £
  • Pro .NET Memory Management : For Better Code, Performance, and Scalability
    Pro .NET Memory Management : For Better Code, Performance, and Scalability

    Understand .NET memory management internal workings, pitfalls, and techniques in order to effectively avoid a wide range of performance and scalability problems in your software.Despite automatic memory management in .NET, there are many advantages to be found in understanding how .NET memory works and how you can best write software that interacts with it efficiently and effectively.Pro .NET Memory Management is your comprehensive guide to writing better software by understanding and working with memory management in .NET. Thoroughly vetted by the .NET Team at Microsoft, this book contains 25 valuable troubleshooting scenarios designed to help diagnose challenging memory problems.Readers will also benefit from a multitude of .NET memory management “rules” to live by that introduce methods for writing memory-aware code and the means for avoiding common, destructive pitfalls. What You'll LearnUnderstand the theoretical underpinnings of automatic memory managementTake a deep dive into every aspect of .NET memory management, including detailed coverage of garbage collection (GC) implementation, that would otherwise take years of experience to acquireGet practical advice on how this knowledge can be applied in real-world software developmentUse practical knowledge of tools related to .NET memory management to diagnose various memory-related issuesExplore various aspects of advanced memory management, including use of Span and Memory typesWho This Book Is For.NET developers, solution architects, and performance engineers

    Price: 89.99 £ | Shipping*: 0.00 £
  • Global Project Management : Communication, Collaboration and Management Across Borders
    Global Project Management : Communication, Collaboration and Management Across Borders

    Global Project Management describes how to adapt your organisation and your projects to thrive in business environments which require distributed skills, around-the-clock operations and virtual team environments. The book goes beyond simple recommendations on collaborative tools, to suggest the development of best practices on cross-cultural team management and global communication, recommend organisational changes and project structures, and propose alternatives for the implementation of the new practices and methods.Filled with real-life examples and techniques, the book illustrates how to apply the recommendations as part of the successful management of any global project.

    Price: 35.99 £ | Shipping*: 0.00 £
  • Designing for Scalability with Erlang/OTP : Implementing Robust, Fault-Tolerant Systems
    Designing for Scalability with Erlang/OTP : Implementing Robust, Fault-Tolerant Systems

    If you need to build a scalable, fault tolerant system with requirements for high availability, discover why the Erlang/OTP platform stands out for the breadth, depth, and consistency of its features.This hands-on guide demonstrates how to use the Erlang programming language and its OTP framework of reusable libraries, tools, and design principles to develop complex commercial-grade systems that simply cannot fail.In the first part of the book, you'll learn how to design and implement process behaviors and supervision trees with Erlang/OTP, and bundle them into standalone nodes.The second part addresses reliability, scalability, and high availability in your overall system design.If you're familiar with Erlang, this book will help you understand the design choices and trade-offs necessary to keep your system running.Explore OTP's building blocks: the Erlang language, tools and libraries collection, and its abstract principles and design rules Dive into the fundamentals of OTP reusable frameworks: the Erlang process structures OTP uses for behaviors Understand how OTP behaviors support client-server structures, finite state machine patterns, event handling, and runtime/code integration Write your own behaviors and special processes Use OTP's tools, techniques, and architectures to handle deployment, monitoring, and operations

    Price: 39.99 £ | Shipping*: 0.00 £
  • Serious Python : Black-Belt Advice on Deployment, Scalability, Testing, and More
    Serious Python : Black-Belt Advice on Deployment, Scalability, Testing, and More

    The Hacker's Guide to Python will teach you how to fine tune your Python code and give you a deeper understanding of how the language works under the hood.This essential guide distils years of Python experience into a handy collection of general advice and specific tips that will help you pick the right libraries, distribute your code correctly, build future-proof programs, and optimise your programs down to the bytecode.

    Price: 32.99 £ | Shipping*: 0.00 £

Similar search terms for Scalability:


  • What is sensor technology and communication?

    Sensor technology refers to the use of sensors to detect and measure physical properties such as temperature, pressure, light, and motion. These sensors can then communicate this information to other devices or systems through various communication methods such as wired connections, wireless signals, or the internet. This allows for real-time monitoring and control of physical environments, enabling applications in areas such as smart homes, industrial automation, healthcare, and environmental monitoring. Overall, sensor technology and communication play a crucial role in enabling the collection and transmission of data for various applications, ultimately leading to improved efficiency, safety, and convenience.

  • What is an example of communication technology?

    One example of communication technology is email. Email allows individuals to send messages, documents, and media to others instantly over the internet. It is a widely used form of communication in both personal and professional settings, enabling quick and efficient exchange of information. Email also allows for the organization of messages into folders, the attachment of files, and the ability to communicate with multiple recipients simultaneously.

  • What are possible solutions for the skilled worker in metal technology in machining technology?

    Possible solutions for skilled workers in metal technology in machining technology include continuous training and upskilling to stay updated with the latest technologies and techniques in the industry. They can also seek certifications or advanced degrees to enhance their knowledge and expertise. Networking with industry professionals and joining professional organizations can provide opportunities for career growth and development. Additionally, considering specialization in a specific area of machining technology can help skilled workers stand out in the field.

  • What are possible solutions for the skilled worker in metal technology specializing in machining technology?

    Possible solutions for a skilled worker in metal technology specializing in machining technology include furthering their education and training to stay up-to-date with the latest technologies and techniques in the field. They could also seek out certifications or credentials to demonstrate their expertise and enhance their career prospects. Additionally, networking with industry professionals and joining professional organizations can help them stay connected and informed about job opportunities and advancements in the field. Finally, considering career advancement opportunities within their current company or exploring job opportunities with other companies can also be beneficial for their career growth.

  • What are examples of data security?

    Examples of data security measures include encryption, which involves converting data into a code that can only be accessed with the correct key; access controls, which limit who can view or modify data; firewalls, which protect networks from unauthorized access; and regular data backups to ensure that information can be restored in the event of a security breach or data loss. Additionally, strong password policies, multi-factor authentication, and security training for employees are also important components of data security.

  • What is data protection and security?

    Data protection and security refer to the measures and practices put in place to safeguard data from unauthorized access, use, or disclosure. This includes protecting data from cyber threats such as hacking, malware, and phishing attacks, as well as ensuring compliance with privacy regulations and laws. Data protection and security also involve implementing encryption, access controls, and regular data backups to prevent data loss and maintain the integrity of sensitive information. Overall, data protection and security are essential for maintaining the confidentiality, integrity, and availability of data.

  • What are end-to-end software and cloud technology solutions?

    End-to-end software and cloud technology solutions refer to comprehensive and integrated systems that cover the entire process or lifecycle of a particular software or technology need. This means that these solutions encompass everything from initial design and development to deployment, maintenance, and ongoing support. End-to-end solutions are designed to streamline and simplify the entire process, providing a seamless and cohesive experience for users. This can include cloud-based services that offer a complete package of tools and resources to meet a specific business or technological need.

  • How does the security barrier in the store with alarm and security technology work?

    The security barrier in a store with alarm and security technology typically consists of sensors placed at entry and exit points. These sensors detect when an item with a security tag passes through them without being deactivated at the checkout. When this happens, the sensors trigger an alarm to alert store staff of a potential theft. Additionally, the security tags on items are usually deactivated at the checkout counter using a special device, allowing customers to leave the store without setting off the alarm.

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.