List books in category Computers & Technology / Expert Systems

  • Microsoft Dynamics AX 2012 R3 Financial Management

    Microsoft Dynamics AX 2012 R3 Financial Management
    Mohamed Aamer

    This book is intended for application consultants, controllers, CFOs, and other professionals who are engaged in a Microsoft Dynamics AX implementation project. Basic knowledge of financial terms, concepts, and Microsoft Dynamics AX terminologies is required.

  • SFML Blueprints

    SFML Blueprints
    Maxime Barbier

    This book is for developers who have knowledge of the basics of the SFML library and its capabilities in 2D game development. Minimal experience with C++ is required.

  • SQL Server: Tips and Tricks I

    SQL Server: Tips and Tricks I
    Priyanka Agarwal

    SQL Server – Tips and Tricks I book has solutions of some real time SQL Server problems that a developer face in most of the real time projects. Find out how to migrate databases, work with constraints, create stored procedures, triggers, functions, views and cursors and configure effective queries. Security, monitoring, and tuning techniques are also covered in this volume.All solutions are written with best practices and comes with complete to-the-point description and source code. You know the basics of the SQL query language, yet you feel you aren't taking full advantage of SQL's expressive power. You'd like to learn how to do more work with SQL inside the database before pushing data across the network to your applications. Let's face it, SQL is a deceptively simple language to learn, and many database developers never go far beyond the simple statement: SELECT columns FROM table WHERE conditions. But there is so much more you can do with the language. In the SQL Server – Tips and Tricks, experienced SQL developer Priyanka Agarwal shares her favorite SQL techniques and tricks to take your SQL skills to the next level. As you develop these skills, you will use either Microsoft SQL server to execute SQL statements. Everyone reading this book can jump right in with writing SQL statements in MS SQL Server with great ease. It's easy to find basic SQL syntax and keyword information online. What's hard to find is challenging, well-designed, real-world problems—the type of problems that come up all the time when you're dealing with data. Learning how to solve these problems will give you the skill and confidence to step up in your career. With SQL Server – Tips and Tricks, you can get that level of experience by solving sets of targeted problems. These aren't just problems designed to give an example of specific syntax. These are the most common problems you encounter when you deal with data. You will get real world practice, with real world data. I'll teach you how to "think" in SQL, how to analyze data problems, figure out the fundamentals, and work towards a solution that you can be proud of. It contains challenging problems, which develop your ability to write high quality SQL code. It has data analysis and reporting oriented challenges that are designed to step you through introductory, intermediate and advanced SQL Select statements, with a learn-by-doing technique. Most textbooks and courses have some practice problems. But most often, they're used just to illustrate a particular syntax. There's no filtering on what's most useful, and what the most common issues are. What you'll get with SQL Practice Problems is the problems that illustrate some the most common challenges you'll run into with data, and the best, most useful techniques to solve them.Published by: MeetCoogle

  • Automotive Software Architectures: An Introduction

    Automotive Software Architectures: An Introduction
    Miroslaw Staron

    This book introduces the concept of software architecture as one of the cornerstones of software in modern cars. Following a historical overview of the evolution of software in modern cars and a discussion of the main challenges driving that evolution, Chapter 2 describes the main architectural styles of automotive software and their use in cars’ software. In Chapter 3, readers will find a description of the software development processes used to develop software on the car manufacturers’ side. Chapter 4 then introduces AUTOSAR – an important standard in automotive software. Chapter 5 goes beyond simple architecture and describes the detailed design process for automotive software using Simulink, helping readers to understand how detailed design links to high-level design. Next, Chapter 6 presents a method for assessing the quality of the architecture – ATAM (Architecture Trade-off Analysis Method) – and provides a sample assessment, while Chapter 7 presents an alternative way of assessing the architecture, namely by using quantitative measures and indicators. Subsequently Chapter 8 dives deeper into one of the specific properties discussed in Chapter 6 – safety – and details an important standard in that area, the ISO/IEC 262 norm. Lastly, Chapter 9 presents a set of future trends that are currently emerging and have the potential to shape automotive software engineering in the coming years.This book explores the concept of software architecture for modern cars and is intended for both beginning and advanced software designers. It mainly aims at two different groups of audience – professionals working with automotive software who need to understand concepts related to automotive architectures, and students of software engineering or related fields who need to understand the specifics of automotive software to be able to construct cars or their components. Accordingly, the book also contains a wealth of real-world examples illustrating the concepts discussed and requires no prior background in the automotive domain.

  • Blockchain Basics: A Non-Technical Introduction in 25 Steps

    Blockchain Basics: A Non-Technical Introduction in 25 Steps
    Daniel Drescher

    In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors.This book bridges the gap that exists between purely technical books about the blockchain and purely business-focused books. It does so by explaining both the technical concepts that make up the blockchain and their role in business-relevant applications.What You'll LearnWhat the blockchain isWhy it is needed and what problem it solvesWhy there is so much excitement about the blockchain and its potentialMajor components and their purposeHow various components of the blockchain work and interactLimitations, why they exist, and what has been done to overcome themMajor application scenariosWho This Book Is For Everyone who wants to get a general idea of what blockchain technology is, how it works, and how it will potentially change the financial system as we know it

  • Microsoft Dynamics CRM 2013 Marketing Automation

    Microsoft Dynamics CRM 2013 Marketing Automation
    Alok Singh

    An easy-to-follow guide with step-by-step examples on implementing your marketing plan using Dynamics CRM 2013 and other marketplace solutions such as Click Dimensions and Core Motives. If you are a marketing manager, business analyst, or a CRM functional expert who wants to leverage Microsoft Dynamics CRM 2013 to create effective marketing strategies and run efficient campaigns, this book is for you. The book provides several step-by-step, hands-on examples for beginners to learn marketing concepts, and exercises to create advanced marketing strategies for experts. There are no specific prerequisites but an awareness of basic marketing and CRM concepts will be useful.

  • Stabilization, Safety, and Security of Distributed Systems: 12th International Symposium, SSS 2010, New York, NY, USA, September 20-22, 2010, Proceedings

    Stabilization, Safety, and Security of Distributed Systems: 12th International Symposium, SSS 2010, New York, NY, USA, September 20-22, 2010, Proceedings
    Shlomi Dolev

    The papers in this volume were presented at the 12th International Sym- sium on Stabilization, Safety, and Security of Distributed Systems (SSS), held September 20–22, 2010 at Columbia University, NYC, USA. The SSS symposium is an international forum for researchersand practiti- ers in the design and development of distributed systems with self-* properties: (theclassical)self-stabilizing,self-con?guring,self-organizing,self-managing,se- repairing,self-healing,self-optimizing,self-adaptive,andself-protecting. Research in distributed systems is now at a crucial point in its evolution, marked by the importance of dynamic systems such as peer-to-peer networks, large-scale wi- lesssensornetworks,mobileadhocnetworks,cloudcomputing,roboticnetworks, etc. Moreover, new applications such as grid and web services, banking and- commerce, e-health and robotics, aerospaceand avionics, automotive, industrial process control, etc. , have joined the traditional applications of distributed s- tems. SSS started as the Workshop on Self-Stabilizing Systems (WSS), the ?rst two of which were held in Austin in 1989 and in Las Vegas in 1995. Starting in 1995, the workshop began to be held biennially; it was held in Santa Barbara (1997), Austin (1999), and Lisbon (2001). As interest grew and the community expanded, the title of the forum was changed in 2003 to the Symposium on Self- Stabilizing Systems (SSS). SSS was organized in San Francisco in 2003 and in Barcelona in 2005. As SSS broadened its scope and attracted researchers from other communities, a couple of changes were made in 2006. It became an – nual event, and the name of the conference was changed to the International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS).

  • Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE

    Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
    Prabath Siriwardena

    Advanced API Security is a complete reference to the next wave of challenges in enterprise security–securing public and private APIs. API adoption in both consumer and enterprises has gone beyond predictions. It has become the ‘coolest’ way of exposing business functionalities to the outside world. Both your public and private APIs, need to be protected, monitored and managed. Security is not an afterthought, but API security has evolved a lot in last five years. The growth of standards, out there, has been exponential. That's where AdvancedAPI Security comes in–to wade through the weeds and help you keep the bad guys away while realizing the internal and external benefits of developing APIs for your services. Our expert author guides you through the maze of options and shares industry leading best practices in designing APIs for rock-solid security. The book will explain, in depth, securing APIs from quite traditional HTTP Basic Authentication to OAuth 2.0 and the standards built around it. Build APIs with rock-solid security today with Advanced API Security.Takes you through the best practices in designing APIs for rock-solid security.Provides an in depth tutorial of most widely adopted security standards for API security.Teaches you how to compare and contrast different security standards/protocols to find out what suits your business needs the best.

  • Embedded Robotics: Mobile Robot Design and Applications with Embedded Systems

    Embedded Robotics: Mobile Robot Design and Applications with Embedded Systems
    Thomas Bräunl

    t all started with a new robot lab course I had developed to accompany my I robotics lectures. We already had three large, heavy, and expensive mobile robots for research projects, but nothing simple and safe, which we could give to students to practice on for an introductory course. We selected a mobile robot kit based on an 8-bit controller, and used it for the first couple of years of this course. This gave students not only the enjoy ment of working with real robots but, more importantly, hands-on experience with control systems, real-time systems, concurrency, fault tolerance, sensor and motor technology, etc. It was a very successful lab and was greatly enjoyed by the students. Typical tasks were, for example, driving straight, finding a light source, or following a leading vehicle. Since the robots were rather inexpensive, it was possible to furnish a whole lab with them and to con duct multi-robot experiments as well. Simplicity, however, had its drawbacks. The robot mechanics was unreli able, the sensors were quite poor, and extendability and processing power were very limited. What we wanted to use was a similar robot at an advanced level.

  • Adaptive Cloud Enterprise Architecture

    Adaptive Cloud Enterprise Architecture
    Gill Asif Qumar

    This book presents a comprehensive and novel adaptive enterprise service systems approach to adapting, defining, operating, managing and supporting (ADOMS) the adaptive cloud enterprise architecture. The adaptive cloud enterprise architecture provides a platform for creating the service-centric agile enterprise. This book is intended for enterprise strategists, enterprise architects, domain architects, solution architects, researchers, and anyone who has an interest in the enterprise architecture and cloud computing disciplines.

  • Biometrics: Advanced Identity Verification: The Complete Guide

    Biometrics: Advanced Identity Verification: The Complete Guide
    Julian Ashbourn

    Biometric identity verification (BIV) offers a radical alternative to passports, PIN numbers, ID cards and driving licences. It uses physiological or behavioural characteristics such as fingerprints, hand geometry, and retinas to check a person's identity. It is therefore much less open to fraudulent use, which makes it ideal for use in voting systems, financial transactions, benefit payment administration, border control, and prison access.This is the first book to provide business readers with an easy-to-read, non-technical introduction to BIV systems. It explains the background and then tells the reader how to get their system up and running quickly. It will be an invaluable read for practitioners, managers and IT personnel – in fact for anyone considering, or involved in, implementing a BIV system.Julian Ashbourn was one of the pioneers in integrating biometric technology and has provided input into many prototype BIV systems around the world.

  • Beginning Application Lifecycle Management

    Beginning Application Lifecycle Management
    Joachim Rossberg

    Beginning Application Lifecycle Management is a guide to an area of rapidly growing interest within the development community: managing the entire cycle of building software. ALM is an area that spans everything from requirements specifications to retirement of an IT-system or application. Because its techniques allow you to deal with the process of developing applications across many areas of responsibility and across many different disciplines, the benefits and effects of ALM techniques used on your project can be wide-ranging and pronounced.In this book, author Joachim Rossberg will show you what ALM is and why it matters. He will also show you how you can assess your current situation and how you can use this assessment to create the road ahead for improving or implementing your own ALM process across all of your team's development efforts.Beginning Application Lifecycle Management can be implemented on any platform. This book will use Microsoft Team Foundation Server as a foundation in many examples, but the key elements are platform independent and you'll find the book written in a platform agnostic way.In this book, you'll learn: What application lifecycle management is and why it matters.The steps necessary for implementing an ALM process.Tips and techniques you can use to gain control of your development efforts.How to implement an agile framework into your ALM processHow to achieve traceability and visibility in your projectsHow to automate your ALM process

  • Guide to FPGA Implementation of Arithmetic Functions

    Guide to FPGA Implementation of Arithmetic Functions
    Jean-Pierre Deschamps

    This book is designed both for FPGA users interested in developing new, specific components – generally for reducing execution times –and IP core designers interested in extending their catalog of specific components. The main focus is circuit synthesis and the discussion shows, for example, how a given algorithm executing some complex function can be translated to a synthesizable circuit description, as well as which are the best choices the designer can make to reduce the circuit cost, latency, or power consumption. This is not a book on algorithms. It is a book that shows how to translate efficiently an algorithm to a circuit, using techniques such as parallelism, pipeline, loop unrolling, and others. Numerous examples of FPGA implementation are described throughout this book and the circuits are modeled in VHDL. Complete and synthesizable source files are available for download.

  • Infusionsoft Cookbook

    Infusionsoft Cookbook
    Paul Sokol

    Over 88 recipes for effective use of Infusionsoft to mitigate your CRM needs, marketing automation, conducting online business optimallyAbout This BookMaximize client engagement by automating lead capture and follow-upCollect information and set up lead scoring in Infusionsoft to enhance your marketing interactions to build more clientsSet up online shopping carts, manage your online store, and enhance user experienceWho This Book Is ForIf you want to excel in the use of Infusionsoft to develop a set of common applications or project types and solutions effectively, this book is perfect for you. This book will empower you to provide better results for your clients, faster! It is assumed that you are familiar with and use Infusionsoft.What You Will LearnSet up and configure features that will enhance new user creation using InfusionsoftAttract leads and build your list efficientlyUnderstand the different strategies to sell and get paidCreate amazing customer experiences by following up and automating messagesMaster techniques to use Infusionsoft for internal administrative functionsMake better business decisions by mastering the reporting functionalitySave time and simplifying day-to-day usage using InfusionsoftGet to know the Ninja hacks while working with Infusionsoft efficiently.In DetailInfusionsoft is an all-in-one software-as-a-service (SaaS) for small business sales and marketing. It empowers businesses with the same level of automation and personalization that were previously only available to large corporate enterprises with deep pockets. You can easily manage customer relationships, target communications in an automated manner, and sell their products/services online effectively.Starting with recipes on the general setup and core competencies related to Infusionsoft, you will then learn about tools to enhance user experience. Further on, you'll dive deep into different strategies to attract, sell, and wow your customers.You'll also explore different ways to manage administrative tasks and reporting, which are crucial to perform better workflow management. Later, you will become proficient in lead generation and lead management, referral management, report generation, and working with the campaign builder.Finally, the book closes with unsupported ninja hacks to take your business strategies into the stratosphere!Style and approachA recipe-based guide that covers real-life scenarios on optimising marketing automation, lifecycle management, lead generation, inventory management, and adding ecommerce functionality

  • Automating Open Source Intelligence: Algorithms for OSINT

    Automating Open Source Intelligence: Algorithms for OSINT
    Robert Layton

    Algorithms for Automating Open Source Intelligence (OSINT) presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As OSINT has applications in crime fighting, state-based intelligence, and social research, this book provides recent advances in text mining, web crawling, and other algorithms that have led to advances in methods that can largely automate this process. The book is beneficial to both practitioners and academic researchers, with discussions of the latest advances in applications, a coherent set of methods and processes for automating OSINT, and interdisciplinary perspectives on the key problems identified within each discipline. Drawing upon years of practical experience and using numerous examples, editors Robert Layton, Paul Watters, and a distinguished list of contributors discuss Evidence Accumulation Strategies for OSINT, Named Entity Resolution in Social Media, Analyzing Social Media Campaigns for Group Size Estimation, Surveys and qualitative techniques in OSINT, and Geospatial reasoning of open data. Presents a coherent set of methods and processes for automating OSINTFocuses on algorithms and applications allowing the practitioner to get up and running quicklyIncludes fully developed case studies on the digital underground and predicting crime through OSINTDiscusses the ethical considerations when using publicly available online data

  • Hands-On Internet of Things with Blynk: Build on the power of Blynk to configure smart devices and build exciting IoT projects

    Hands-On Internet of Things with Blynk: Build on the power of Blynk to configure smart devices and build exciting IoT projects
    Pradeeka Seneviratne

    Connect things to create amazing IoT applications in minutesKey FeaturesUse Blynk cloud and Blynk server to connect devicesBuild IoT applications on Android and iOS platforms A practical guide that will show how to connect devices using Blynk and Raspberry Pi 3 Book DescriptionBlynk, known as the most user-friendly IoT platform, provides a way to build mobile applications in minutes. With the Blynk drag-n-drop mobile app builder, anyone can build amazing IoT applications with minimal resources and effort, on hardware ranging from prototyping platforms such as Arduino and Raspberry Pi 3 to industrial-grade ESP8266, Intel, Sierra Wireless, Particle, Texas Instruments, and a few others.This book uses Raspberry Pi as the main hardware platform and C/C++ to write sketches to build projects. The first part of this book shows how to set up a development environment with various hardware combinations and required software. Then you will build your first IoT application with Blynk using various hardware combinations and connectivity types such as Ethernet and Wi-Fi. Then you'll use and configure various widgets (control, display, notification, interface, time input, and some advanced widgets) with Blynk App Builder to build applications. Towards the end, you will learn how to connect with and use built-in sensors on Android and iOS mobile devices. Finally you will learn how to build a robot that can be controlled with a Blynk app through the Blynk cloud and personal server.By the end of this book, you will have hands-on experience building IoT applications using Blynk.What you will learnBuild devices using Raspberry Pi and various sensors and actuatorsUse Blynk cloud to connect and control devices through the Blynk app builderConnect devices to Blynk cloud and server through Ethernet and Wi-FiMake applications using Blynk app builder on Android and iOS platforms Run Blynk personal server on the Windows, MAC, and Raspberry Pi platforms Who this book is forThis book is targeted at any stakeholder working in the IoT sector who wants to understand how Blynk works and build exciting IoT projects. Prior understanding of Raspberry Pi, C/C++, and electronics is a must.

  • Procedural Content Generation for Unity Game Development

    Procedural Content Generation for Unity Game Development
    Ryan Watkins

    Harness the power of procedural content generation to design unique games with UnityAbout This BookLearn the basics of PCG developmentDevelop a 2D game from start to finishExplore all the different ways PCG can be applied in gamesWho This Book Is ForThis book is for Unity game developers, especially those who work on indie games. You should be familiar with Unity and C# scripting but you'll be able to jump in and start learning PCG straightaway.What You Will LearnUnderstand the theory of Procedural Content GenerationLearn the uses of Pseudo Random NumbersCreate reusable algorithm designs for PCGEvaluate the data structures for PCGDevelop smaller games with larger amounts of contentGenerate content instead of spending time designing every minute detailLearn when and how to add PCG to your gameLearn the fundamental techniques of PCGIn DetailProcedural Content Generation is a process by which game content is developed using computer algorithms, rather than through the manual efforts of game developers. This book teaches readers how to develop algorithms for procedural generation that they can use in their own games. These concepts are put into practice using C# and Unity is used as the game development engine.This book provides the fundamentals of learning and continued learning using PCG. You'll discover the theory of PCG and the mighty Pseudo Random Number Generator. Random numbers such as die rolls and card drafting provide the chance factor that makes games fun and supplies spontaneity. This book also takes you through the full development of a 2D game.Starting with level generation, you'll learn how PCG can make the game environment for you. You'll move into item generation and learn the different techniques to procedurally create game items. Thereafter, you'll be guided through the more abstract PCG areas such as scaling difficulty to the player and even generating music! The book helps you set up systems within your games where algorithms create computationally generated levels, art assets, quests, stories, characters, and weapons; these can substantially reduce the burden of manually creating every aspect of the game.Finally, you'll get to try out your new PCG skills on 3D terrain generation.Style and approachAn easy-to-follow, project-based guide that will let you build a complete game by the end of the book using PCG.

  • Hands-On Cybersecurity for Architects: Plan and design robust security architectures

    Hands-On Cybersecurity for Architects: Plan and design robust security architectures
    Neil Rerup

    Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organizationKey FeaturesArchitect complex security structures using standard practices and use casesIntegrate security with any architecture solutionImplement cybersecurity architecture in various enterprisesBook DescriptionSolutions in the IT domain have been undergoing massive changes. There was a time when bringing your own devices to work was like committing a crime. However, with an evolving IT industry comes emerging security approaches.Hands-On Cybersecurity for Architects will help you to successfully design, integrate, and implement complex security structures in any solution whilst ensuring that the solution functions as expected. To start with, you will get to grips with the fundamentals of recent cybersecurity practices, followed by acquiring and understanding your organization's requirements. You will then move on to learning how to plan and design robust security architectures, along with practical approaches to performing various security assessments. Once you have grasped all this, you will learn to design and develop key requirements, such as firewalls, virtual private networks (VPNs), wide area networks (WANs), and digital certifications. In addition to this, you will discover how to integrate upcoming security changes on Bring your own device (BYOD), cloud platforms, and the Internet of Things (IoT), among others. Finally, you will explore how to design frequent updates and upgrades for your systems as per your enterprise's needs.By the end of this book, you will be able to architect solutions with robust security components for your infrastructure.What you will learnUnderstand different security architecture layers and their integration with all solutionsStudy SWOT analysis and dig into your organization’s requirements to drive the strategyDesign and implement a secure email service approachMonitor the age and capacity of security tools and architectureExplore growth projections and architecture strategyIdentify trends, as well as what a security architect should take into considerationWho this book is forHands-On Cybersecurity for Architects is for you if you are a security, network, or system administrator interested in taking on more complex responsibilities such as designing and implementing complex security structures. Basic understanding of network and computer security implementation will be helpful. This book is also ideal for non-security architects who want to understand how to integrate security into their solutions.

  • High Availability and Disaster Recovery: Concepts, Design, Implementation

    High Availability and Disaster Recovery: Concepts, Design, Implementation
    Klaus Schmidt

    Companies and other organizations depend more than ever on the availability of their Information Technology, and most mission critical business processes are IT-based processes. Business continuity is the ability to do business under any circumstances and is an essential requirement modern companies are facing. High availability and disaster recovery are contributions of the IT to fulfill this requirement. And companies will be confronted with such demands to an even greater extent in the future, since their credit ratings will be lower without such precautions. Both, high availability and disaster recovery, are realized by redundant systems. Redundancy can and should be implemented on different abstraction levels: from the hardware, the operating system and middleware components up to the backup computing center in case of a disaster. This book presents requirements, concepts, and realizations of redundant systems on all abstraction levels, and all given examples refer to UNIX and Linux systems.

  • Amazon Echo Manual Guide : Top 30 Hacks And Secrets To Master Amazon Echo & Alexa For Beginners

    Amazon Echo Manual Guide : Top 30 Hacks And Secrets To Master Amazon Echo & Alexa For Beginners
    Scott Green

    Your Perfect Guide to Amazon Echo! This book is a complete and handy companion that will enable you to set up and use your Amazon Echo device quickly and efficiently for beginners. By reading this book you will understand and be able to receive all the benefits that this wonderful device has to offer, allowing you to keep up with your busy schedule.You will learn: Hacking The RemoteControl Fake WEMO DevicesControl Lights And TemperatureKnow The Best CommandsAnd a whole lot more! Download NOW and Start Reading!

  • Learning MS Dynamics AX 2012 Programming

    Learning MS Dynamics AX 2012 Programming
    Mohammed Rasheed

    If you are a .NET or Java developer who wants to develop and customize Dynamics AX 2012 R3, this book is for you. Some experience with object-oriented development technologies is expected, but no experience in development with AX is required.

  • Microsoft Dynamics CRM Customization Essentials

    Microsoft Dynamics CRM Customization Essentials
    Nicolae Tarla

    If you are new to Dynamics CRM or a seasoned user looking to enhance your knowledge of the platform, then this book is for you. It is also for skilled developers who are looking to move to the Microsoft stack to build business solution software.

  • Mastering Unity Scripting

    Mastering Unity Scripting
    Alan Thorn

    Mastering Unity Scripting is an advanced book intended for students, educators, and professionals familiar with the Unity basics as well as the basics of scripting. Whether you've been using Unity for a short time or are an experienced user, this book has something important and valuable to offer to help you improve your game development workflow.

  • Embedded Robotics: Mobile Robot Design and Applications with Embedded Systems, Edition 3

    Embedded Robotics: Mobile Robot Design and Applications with Embedded Systems, Edition 3
    Thomas Bräunl

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . he EyeBot controller and mobile robots have evolved over more than a decade. This book gives an in-depth introduction to embedded systems and autonomous mobile robots, using the EyeBot controller (EyeCon) and the EyeBot mobile robot family as application examples. This book combines teaching and research material and can be used for courses in Embedded Systems as well as in Robotics and Automation. We see labs as an essential teaching and learning method in this area and encourage everybody to reprogram and rediscover the algorithms and systems presented in this book. Although we like simulations for many applications and treat them in quite some depth in several places in this book, we do believe that students should also be exposed to real hardware in both areas, embedded systems and rob- ics. This will deepen the understanding of the subject area and of course create a lot more fun, especially when experimenting with small mobile robots. The original goal for the EyeBot project has been to interface an embedded system to a digital camera sensor (EyeCam), process its images locally in re- time for robot navigation, and display results on a graphics LCD. All of this started at a time before digital cameras came to the market – in fact the EyeBot controller was one of the first “embedded vision systems”.

  • Learning YARN

    Learning YARN
    Akhil Arora

    Moving beyond MapReduce – learn resource management and big data processing using YARNAbout This BookDeep dive into YARN components, schedulers, life cycle management and security architectureCreate your own Hadoop-YARN applications and integrate big data technologies with YARNStep-by-step guide to provision, manage, and monitor Hadoop-YARN clusters with easeWho This Book Is ForThis book is intended for those who want to understand what YARN is and how to efficiently use it for the resource management of large clusters. For cluster administrators, this book gives a detailed explanation of provisioning and managing YARN clusters. If you are a Java developer or an open source contributor, this book will help you to drill down the YARN architecture, write your own YARN applications and understand the application execution phases. This book will also help big data engineers explore YARN integration with real-time analytics technologies such as Spark and Storm.What You Will LearnExplore YARN features and offeringsManage big data clusters efficiently using the YARN frameworkCreate single as well as multi-node Hadoop-YARN clusters on Linux machinesUnderstand YARN components and their administrationGain insights into application execution flow over a YARN clusterWrite your own distributed application and execute it over YARN clusterWork with schedulers and queues for efficient scheduling of applicationsIntegrate big data projects like Spark and Storm with YARNIn DetailToday enterprises generate huge volumes of data. In order to provide effective services and to make smarter and more intelligent decisions from these huge volumes of data, enterprises use big-data analytics. In recent years, Hadoop has been used for massive data storage and efficient distributed processing of data. The Yet Another Resource Negotiator (YARN) framework solves the design problems related to resource management faced by the Hadoop 1.x framework by providing a more scalable, efficient, flexible, and highly available resource management framework for distributed data processing.This book starts with an overview of the YARN features and explains how YARN provides a business solution for growing big data needs. You will learn to provision and manage single, as well as multi-node, Hadoop-YARN clusters in the easiest way. You will walk through the YARN administration, life cycle management, application execution, REST APIs, schedulers, security framework and so on. You will gain insights about the YARN components and features such as ResourceManager, NodeManager, ApplicationMaster, Container, Timeline Server, High Availability, Resource Localisation and so on.The book explains Hadoop-YARN commands and the configurations of components and explores topics such as High Availability, Resource Localization and Log aggregation. You will then be ready to develop your own ApplicationMaster and execute it over a Hadoop-YARN cluster.Towards the end of the book, you will learn about the security architecture and integration of YARN with big data technologies like Spark and Storm. This book promises conceptual as well as practical knowledge of resource management using YARN.Style and approachStarting with the basics and covering the core concepts with the practical usage, this tutorial is a complete guide to learn and explore YARN offerings.

  • Interactions with Search Systems

    Interactions with Search Systems
    Ryen W. White

    Information seeking is a fundamental human activity. In the modern world, it is frequently conducted through interactions with search systems. The retrieval and comprehension of information returned by these systems is a key part of decision making and action in a broad range of settings. Advances in data availability coupled with new interaction paradigms, and mobile and cloud computing capabilities, have created a broad range of new opportunities for information access and use. In this comprehensive book for professionals, researchers, and students involved in search system design and evaluation, search expert Ryen White discusses how search systems can capitalize on new capabilities and how next-generation systems must support higher order search activities such as task completion, learning, and decision making. He outlines the implications of these changes for the evolution of search evaluation, as well as challenges that extend beyond search systems in areas such as privacy and societal benefit.

  • Learning Objective-C by Developing iPhone Games

    Learning Objective-C by Developing iPhone Games
    Amy M. Booker

    Written as a practical and engaging tutorial, this book guides you through the development of your own exciting, fully featured, games. If you are a beginner and an enthusiast who dreams about creating games and is in need of some additional inspiration and knowledge, then this book is for you. No programming experience is expected.

  • All New Kindle Fire HD Complete Guide for Seniors: How to Get The Most Out Of Your Kindle Devices with Simple Step-by Step Instructions in 30 Minutes.

    All New Kindle Fire HD Complete Guide for Seniors: How to Get The Most Out Of Your Kindle Devices with Simple Step-by Step Instructions in 30 Minutes.
    Daryl P. Roper

    This is manual for the latest generation of Kindle E-Readers and Fire Tablets, Kindle Voyage, Kindle Paperwhite, Fire HD 6, Fire HD 8, Fire HD 10, and Fire HDX 8.9 for easy usability and maximum functionality. In this book, you’re going to learn the essential features of Fire Tablet HD series and some untapped information you never know you can achieve with your Amazon Fire HD! As you read further in this book, you will learn; how to start up your Amazon Fire HD, register it or de-register it, buy books and Apps from your device, sideload a digital publication purchased from Amazon website, transferring files, music, videos, and even get content downloaded to your Fire HD, create a household access and share content. You’re going to learn how to personalize your device and how to use your FIRE HD and lot more. It’s straight to solution guide without additional over-long boring details. By the time you finish reading this book, you’re going to know all you need to make use of your FIRE HD like a PRO and make it serve you better.