Computer

Internet of Things with Intel Galileo

This book starts by teaching you the essentials of the Intel Galileo board, its components, how to wire it, and how to use it safely. The book will teach you how to use and combine simple sensors to build more complex connected objects with the help of an Internet connection. You'll also learn how to control and read from your sensors by building a number of interesting projects. Finally, the book will familiarize you with the art of controlling your objects using mobile devices.

FreeSWITCH 1.6 Cookbook

FreeSWITCH is an open source carrier-grade telephony platform designed to facilitate the creation of voice, chat, and video applications, via phones and web browsers. It is scalable, carrier-ready, and easy-to-program for converged communication and VoIP. The technology serves SIP, WebRTC, PSTN, FAX, PBX, VERTO, and all the relevant channels essential to stay connected in today's world. In the FreeSWITCH 1.6 Cookbook, members of the FreeSWITCH development team share some of their hard-earned knowledge with you. Use this knowledge to improve and expand your FreeSWITCH installations.

Swift OS X Programming for Absolute Beginners

Swift OS X Programming for Absolute Beginners is your step-by-step guide to learning how to code using Swift, Apple's hottest new programming language. This book will not only teach complete programming novices how to write OS X programs, but it can also help experienced programmers moving to the Macintosh for the first time. You will learn to understand the principles of programming, how to use Swift and Xcode, and how to combine your knowledge into writing OS X programs.

Effective DevOps

This practical guide addresses technical, cultural, and managerial challenges of implementing and maintaining a DevOps culture by describing failures and successes. Authors Katherine Daniels and Jennifer Davis provide with actionable strategies you can use to engineer sustainable changes in your environment regardless of your level within your organization.

Monitoring with Graphite

Why is Graphite one of the most popular tools for monitoring and graphing the performance of computer systems? This practical book helps you use this open source tool to track the operational data you need to monitor your systems and track application-level metrics for profiling your services. You'll learn how to correlate all of that data with business intelligence to help you make informed decisions about your IT strategies. This book is ideal for system administrators and engineers who have familiarity with managing servers or development environments from the command line.

Designing for Scalability with Erlang / OTP

Design and build complex, scalable commercial-grade systems with the Open Telecom Platform (OTP), the open source system developed by Ericsson and written in Erlang. With this hands-on book, you'll learn how to apply OTP libraries and techniques to develop concurrent, fault-tolerant systems with no single point of failure.

Articulating Design Decisions

Every designer has had to justify designs to non-designers, yet most lack the ability to explain themselves in a way that is compelling and fosters agreement. The ability to effectively articulate design decisions is critical to the success of a project, because the most articulate person often wins. This practical book provides principles, tactics, and actionable methods for talking about designs with executives, managers, developers, marketers, and other stakeholders who have influence over the project with the goal of winning them over and creating the best user experience.

Infrastructure as Code

This book explains how to take advantage of technologies like cloud, virtualization, and configuration automation to manage IT infrastructure using tools and practices from software development. These technologies have decoupled infrastructure from the underlying hardware, turning it into data and code. "Infrastructure as Code" has emerged alongside the DevOps movement as a label for approaches that merge concepts like source control systems, Test Driven Development (TDD) and Continuous Integration (CI) with infrastructure management.

Mapping Experiences

If you want to create products and services that provide real value, you should first identify touchpoints areas where business and customer needs intersect. This practical book shows you how. Using various mapping techniques from UX design, you'll learn how to turn customer observations into actionable insight for product design. Author Jim Kalbach, Principal UX Designer with Citrix, introduces you to the principles behind alignment diagrams a class of deliverable also known as experience mapping using several examples. You'll learn how to visually map your existing customer experience, based on user research, and demonstrate how and where customer perspectives intersect with business goals.

Thinking in Promises

Imagine a set of simple principles that could help you to understand how parts combine to become a whole, and how each part sees the whole from its own perspective. If such principles were any good, it shouldn't matter whether we're talking about humans on a team, birds in a flock, computers in a datacenter, or cogs in a Swiss watch. A theory of cooperation ought to be pretty universal, so we should be able to apply it both to technology and to the workplace.

Prototype to Product

Product development is the magic that turns circuitry, software, and materials into a product, but moving efficiently from concept to manufactured product is a complex process with many potential pitfalls. This practical guide pulls back the curtain to reveal what happens - or should happen - when you take a product from prototype to production.

Abusing the Internet of Things

A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars. If you're part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You'll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker's tactics.

 

1 2 3 4 5 Last