Author: Thomas Erl
Publisher: Pearson Education
ISBN: 0133387526
Category : Business & Economics
Languages : en
Pages : 533
Book Description
This book describes cloud computing as a service that is "highly scalable" and operates in "a resilient environment". The authors emphasize architectural layers and models - but also business and security factors.
Cloud Computing
Author: Thomas Erl
Publisher: Pearson Education
ISBN: 0133387526
Category : Business & Economics
Languages : en
Pages : 533
Book Description
This book describes cloud computing as a service that is "highly scalable" and operates in "a resilient environment". The authors emphasize architectural layers and models - but also business and security factors.
Publisher: Pearson Education
ISBN: 0133387526
Category : Business & Economics
Languages : en
Pages : 533
Book Description
This book describes cloud computing as a service that is "highly scalable" and operates in "a resilient environment". The authors emphasize architectural layers and models - but also business and security factors.
Building Cognitive Applications with IBM Watson Services: Volume 1 Getting Started
Author: Dr. Alfio Gliozzo
Publisher: IBM Redbooks
ISBN: 073844264X
Category : Computers
Languages : en
Pages : 130
Book Description
The Building Cognitive Applications with IBM Watson Services series is a seven-volume collection that introduces IBM® WatsonTM cognitive computing services. The series includes an overview of specific IBM Watson® services with their associated architectures and simple code examples. Each volume describes how you can use and implement these services in your applications through practical use cases. The series includes the following volumes: Volume 1 Getting Started, SG24-8387 Volume 2 Conversation, SG24-8394 Volume 3 Visual Recognition, SG24-8393 Volume 4 Natural Language Classifier, SG24-8391 Volume 5 Language Translator, SG24-8392 Volume 6 Speech to Text and Text to Speech, SG24-8388 Volume 7 Natural Language Understanding, SG24-8398 Whether you are a beginner or an experienced developer, this collection provides the information you need to start your research on Watson services. If your goal is to become more familiar with Watson in relation to your current environment, or if you are evaluating cognitive computing, this collection can serve as a powerful learning tool. This IBM Redbooks® publication, Volume 1, introduces cognitive computing, its motivating factors, history, and basic concepts. This volume describes the industry landscape for cognitive computing and introduces Watson, the cognitive computing offering from IBM. It also describes the nature of the question-answering (QA) challenge that is represented by the Jeopardy! quiz game and it provides a high-level overview of the QA system architecture (DeepQA), developed for Watson to play the game. This volume charts the evolution of the Watson Developer Cloud, from the initial DeepQA implementation. This book also introduces the concept of domain adaptation and the processes that must be followed to adapt the various Watson services to specific domains.
Publisher: IBM Redbooks
ISBN: 073844264X
Category : Computers
Languages : en
Pages : 130
Book Description
The Building Cognitive Applications with IBM Watson Services series is a seven-volume collection that introduces IBM® WatsonTM cognitive computing services. The series includes an overview of specific IBM Watson® services with their associated architectures and simple code examples. Each volume describes how you can use and implement these services in your applications through practical use cases. The series includes the following volumes: Volume 1 Getting Started, SG24-8387 Volume 2 Conversation, SG24-8394 Volume 3 Visual Recognition, SG24-8393 Volume 4 Natural Language Classifier, SG24-8391 Volume 5 Language Translator, SG24-8392 Volume 6 Speech to Text and Text to Speech, SG24-8388 Volume 7 Natural Language Understanding, SG24-8398 Whether you are a beginner or an experienced developer, this collection provides the information you need to start your research on Watson services. If your goal is to become more familiar with Watson in relation to your current environment, or if you are evaluating cognitive computing, this collection can serve as a powerful learning tool. This IBM Redbooks® publication, Volume 1, introduces cognitive computing, its motivating factors, history, and basic concepts. This volume describes the industry landscape for cognitive computing and introduces Watson, the cognitive computing offering from IBM. It also describes the nature of the question-answering (QA) challenge that is represented by the Jeopardy! quiz game and it provides a high-level overview of the QA system architecture (DeepQA), developed for Watson to play the game. This volume charts the evolution of the Watson Developer Cloud, from the initial DeepQA implementation. This book also introduces the concept of domain adaptation and the processes that must be followed to adapt the various Watson services to specific domains.
IBM Z Integration Guide for Hybrid Cloud
Author: Nigel Williams
Publisher: IBM Redbooks
ISBN: 0738458627
Category : Computers
Languages : en
Pages : 100
Book Description
Today, organizations are responding to market demands and regulatory requirements faster than ever by extending their applications and data to new digital applications. This drive to deliver new functions at speed has paved the way for a huge growth in cloud-native applications, hosted in both public and private cloud infrastructures. Leading organizations are now exploiting the best of both worlds by combining their traditional enterprise IT with cloud. This hybrid cloud approach places new requirements on the integration architectures needed to bring these two worlds together. One of the largest providers of application logic and data services in enterprises today is IBM Z, making it a critical service provider in a hybrid cloud architecture. The primary goal of this IBM Redpaper publication is to help IT architects choose between the different application integration architectures that can be used for hybrid integration with IBM Z, including REST APIs, messaging, and event streams.
Publisher: IBM Redbooks
ISBN: 0738458627
Category : Computers
Languages : en
Pages : 100
Book Description
Today, organizations are responding to market demands and regulatory requirements faster than ever by extending their applications and data to new digital applications. This drive to deliver new functions at speed has paved the way for a huge growth in cloud-native applications, hosted in both public and private cloud infrastructures. Leading organizations are now exploiting the best of both worlds by combining their traditional enterprise IT with cloud. This hybrid cloud approach places new requirements on the integration architectures needed to bring these two worlds together. One of the largest providers of application logic and data services in enterprises today is IBM Z, making it a critical service provider in a hybrid cloud architecture. The primary goal of this IBM Redpaper publication is to help IT architects choose between the different application integration architectures that can be used for hybrid integration with IBM Z, including REST APIs, messaging, and event streams.
Practical Cloud Security
Author: Chris Dotson
Publisher: O'Reilly Media
ISBN: 1492037486
Category : Computers
Languages : en
Pages : 195
Book Description
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. This hands-on book guides you through security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up. Developers, IT architects, and security professionals will learn cloud-specific techniques for securing popular cloud platforms such as Amazon Web Services, Microsoft Azure, and IBM Cloud. Chris Dotson—an IBM senior technical staff member—shows you how to establish data asset management, identity and access management, vulnerability management, network security, and incident response in your cloud environment.
Publisher: O'Reilly Media
ISBN: 1492037486
Category : Computers
Languages : en
Pages : 195
Book Description
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. This hands-on book guides you through security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up. Developers, IT architects, and security professionals will learn cloud-specific techniques for securing popular cloud platforms such as Amazon Web Services, Microsoft Azure, and IBM Cloud. Chris Dotson—an IBM senior technical staff member—shows you how to establish data asset management, identity and access management, vulnerability management, network security, and incident response in your cloud environment.
Collection Management in the Cloud
Author: Kayla Kipps
Publisher: Rowman & Littlefield
ISBN: 1538151901
Category : Language Arts & Disciplines
Languages : en
Pages : 181
Book Description
As remote work has become routine, cloud-based technology tools have become increasingly necessary to communicate with other library staff and with faculty and staff to continue providing seamless and uninterrupted access to library resources and collections for our campus community. Cloud-based technology tools such as Google Forms and Google Sheets are used to gather faculty requests for collection development, tools such as Tableau are used to illustrate material budget balances, and platforms such as Trello have been adopted to track subscription renewal cycles and manage other projects. This guide discusses the benefits of using these powerful cloud-based and little to no additional cost technology tools through the lens of a particular area in librarianship such as documentation, data and project management, communication, data storage, and data visualization. While the real-world examples provided throughout focus on technical services staff operations, specifically acquisitions and electronic collection management, each tool’s features and use cases are transferable among all areas of librarianship. This guide provides insights into how collaborative, dynamic, and accessible these cloud-based solutions are for a technologically shifting workplace as well as considers the challenges to adopting cloud-based solutions such as administrative buy-in, aversion to change, and steeper learning curves as well. Readers will gain practical experiential examples that have been instrumental in creating efficiencies in collection management workflows for technical services staff. The use cases illustrated exemplify enhancements that librarians can incorporate into their own collection management practices to further engage with their colleagues, their patrons, and their larger communities more effectively and efficiently.
Publisher: Rowman & Littlefield
ISBN: 1538151901
Category : Language Arts & Disciplines
Languages : en
Pages : 181
Book Description
As remote work has become routine, cloud-based technology tools have become increasingly necessary to communicate with other library staff and with faculty and staff to continue providing seamless and uninterrupted access to library resources and collections for our campus community. Cloud-based technology tools such as Google Forms and Google Sheets are used to gather faculty requests for collection development, tools such as Tableau are used to illustrate material budget balances, and platforms such as Trello have been adopted to track subscription renewal cycles and manage other projects. This guide discusses the benefits of using these powerful cloud-based and little to no additional cost technology tools through the lens of a particular area in librarianship such as documentation, data and project management, communication, data storage, and data visualization. While the real-world examples provided throughout focus on technical services staff operations, specifically acquisitions and electronic collection management, each tool’s features and use cases are transferable among all areas of librarianship. This guide provides insights into how collaborative, dynamic, and accessible these cloud-based solutions are for a technologically shifting workplace as well as considers the challenges to adopting cloud-based solutions such as administrative buy-in, aversion to change, and steeper learning curves as well. Readers will gain practical experiential examples that have been instrumental in creating efficiencies in collection management workflows for technical services staff. The use cases illustrated exemplify enhancements that librarians can incorporate into their own collection management practices to further engage with their colleagues, their patrons, and their larger communities more effectively and efficiently.
The Cloud Adoption Playbook
Author: Moe Abdula
Publisher: John Wiley & Sons
ISBN: 1119491851
Category : Computers
Languages : en
Pages : 222
Book Description
The essential roadmaps for enterprise cloud adoption As cloud technologies continue to challenge the fundamental understanding of how businesses work, smart companies are moving quickly to adapt to a changing set of rules. Adopting the cloud requires a clear roadmap backed by use cases, grounded in practical real-world experience, to show the routes to successful adoption. The Cloud Adoption Playbook helps business and technology leaders in enterprise organizations sort through the options and make the best choices for accelerating cloud adoption and digital transformation. Written by a team of IBM technical executives with a wealth of real-world client experience, this book cuts through the hype, answers your questions, and helps you tailor your cloud adoption and digital transformation journey to the needs of your organization. This book will help you: Discover how the cloud can fulfill major business needs Adopt a standardized Cloud Adoption Framework and understand the key dimensions of cloud adoption and digital transformation Learn how cloud adoption impacts culture, architecture, security, and more Understand the roles of governance, methodology, and how the cloud impacts key players in your organization. Providing a collection of winning plays, championship advice, and real-world examples of successful adoption, this playbook is your ultimate resource for making the cloud work. There has never been a better time to adopt the cloud. Cloud solutions are more numerous and accessible than ever before, and evolving technology is making the cloud more reliable, more secure, and more necessary than ever before. Don’t let your organization be left behind! The Cloud Adoption Playbook gives you the essential guidance you need to make the smart choices that reduce your organizational risk and accelerate your cloud adoption and digital transformation.
Publisher: John Wiley & Sons
ISBN: 1119491851
Category : Computers
Languages : en
Pages : 222
Book Description
The essential roadmaps for enterprise cloud adoption As cloud technologies continue to challenge the fundamental understanding of how businesses work, smart companies are moving quickly to adapt to a changing set of rules. Adopting the cloud requires a clear roadmap backed by use cases, grounded in practical real-world experience, to show the routes to successful adoption. The Cloud Adoption Playbook helps business and technology leaders in enterprise organizations sort through the options and make the best choices for accelerating cloud adoption and digital transformation. Written by a team of IBM technical executives with a wealth of real-world client experience, this book cuts through the hype, answers your questions, and helps you tailor your cloud adoption and digital transformation journey to the needs of your organization. This book will help you: Discover how the cloud can fulfill major business needs Adopt a standardized Cloud Adoption Framework and understand the key dimensions of cloud adoption and digital transformation Learn how cloud adoption impacts culture, architecture, security, and more Understand the roles of governance, methodology, and how the cloud impacts key players in your organization. Providing a collection of winning plays, championship advice, and real-world examples of successful adoption, this playbook is your ultimate resource for making the cloud work. There has never been a better time to adopt the cloud. Cloud solutions are more numerous and accessible than ever before, and evolving technology is making the cloud more reliable, more secure, and more necessary than ever before. Don’t let your organization be left behind! The Cloud Adoption Playbook gives you the essential guidance you need to make the smart choices that reduce your organizational risk and accelerate your cloud adoption and digital transformation.
Temenos on IBM LinuxONE Best Practices Guide
Author: Deana Coble
Publisher: IBM Redbooks
ISBN: 0738458457
Category : Computers
Languages : en
Pages : 130
Book Description
The world's most successful banks run on IBM®, and increasingly IBM LinuxONE. Temenos, the global leader in banking software, has worked alongside IBM for many years on banking deployments of all sizes. This book marks an important milestone in that partnership. Temenos on IBM LinuxONE Best Practices Guide shows financial organizations how they can combine the power and flexibility of the Temenos solution with the IBM platform that is purpose built for the digital revolution.
Publisher: IBM Redbooks
ISBN: 0738458457
Category : Computers
Languages : en
Pages : 130
Book Description
The world's most successful banks run on IBM®, and increasingly IBM LinuxONE. Temenos, the global leader in banking software, has worked alongside IBM for many years on banking deployments of all sizes. This book marks an important milestone in that partnership. Temenos on IBM LinuxONE Best Practices Guide shows financial organizations how they can combine the power and flexibility of the Temenos solution with the IBM platform that is purpose built for the digital revolution.
Cloud Computing Bible
Author: Barrie Sosinsky
Publisher: John Wiley & Sons
ISBN: 1118023994
Category : Computers
Languages : en
Pages : 532
Book Description
The complete reference guide to the hot technology of cloud computing Its potential for lowering IT costs makes cloud computing a major force for both IT vendors and users; it is expected to gain momentum rapidly with the launch of Office Web Apps later this year. Because cloud computing involves various technologies, protocols, platforms, and infrastructure elements, this comprehensive reference is just what you need if you?ll be using or implementing cloud computing. Cloud computing offers significant cost savings by eliminating upfront expenses for hardware and software; its growing popularity is expected to skyrocket when Microsoft introduces Office Web Apps This comprehensive guide helps define what cloud computing is and thoroughly explores the technologies, protocols, platforms and infrastructure that make it so desirable Covers mobile cloud computing, a significant area due to ever-increasing cell phone and smartphone use Focuses on the platforms and technologies essential to cloud computing Anyone involved with planning, implementing, using, or maintaining a cloud computing project will rely on the information in Cloud Computing Bible.
Publisher: John Wiley & Sons
ISBN: 1118023994
Category : Computers
Languages : en
Pages : 532
Book Description
The complete reference guide to the hot technology of cloud computing Its potential for lowering IT costs makes cloud computing a major force for both IT vendors and users; it is expected to gain momentum rapidly with the launch of Office Web Apps later this year. Because cloud computing involves various technologies, protocols, platforms, and infrastructure elements, this comprehensive reference is just what you need if you?ll be using or implementing cloud computing. Cloud computing offers significant cost savings by eliminating upfront expenses for hardware and software; its growing popularity is expected to skyrocket when Microsoft introduces Office Web Apps This comprehensive guide helps define what cloud computing is and thoroughly explores the technologies, protocols, platforms and infrastructure that make it so desirable Covers mobile cloud computing, a significant area due to ever-increasing cell phone and smartphone use Focuses on the platforms and technologies essential to cloud computing Anyone involved with planning, implementing, using, or maintaining a cloud computing project will rely on the information in Cloud Computing Bible.
Mastering Cloud Computing
Author: Rajkumar Buyya
Publisher: Newnes
ISBN: 0124095399
Category : Computers
Languages : en
Pages : 469
Book Description
Mastering Cloud Computing is designed for undergraduate students learning to develop cloud computing applications. Tomorrow's applications won't live on a single computer but will be deployed from and reside on a virtual server, accessible anywhere, any time. Tomorrow's application developers need to understand the requirements of building apps for these virtual systems, including concurrent programming, high-performance computing, and data-intensive systems. The book introduces the principles of distributed and parallel computing underlying cloud architectures and specifically focuses on virtualization, thread programming, task programming, and map-reduce programming. There are examples demonstrating all of these and more, with exercises and labs throughout. - Explains how to make design choices and tradeoffs to consider when building applications to run in a virtual cloud environment - Real-world case studies include scientific, business, and energy-efficiency considerations
Publisher: Newnes
ISBN: 0124095399
Category : Computers
Languages : en
Pages : 469
Book Description
Mastering Cloud Computing is designed for undergraduate students learning to develop cloud computing applications. Tomorrow's applications won't live on a single computer but will be deployed from and reside on a virtual server, accessible anywhere, any time. Tomorrow's application developers need to understand the requirements of building apps for these virtual systems, including concurrent programming, high-performance computing, and data-intensive systems. The book introduces the principles of distributed and parallel computing underlying cloud architectures and specifically focuses on virtualization, thread programming, task programming, and map-reduce programming. There are examples demonstrating all of these and more, with exercises and labs throughout. - Explains how to make design choices and tradeoffs to consider when building applications to run in a virtual cloud environment - Real-world case studies include scientific, business, and energy-efficiency considerations
Information Security Planning
Author: Susan Lincke
Publisher: Springer Nature
ISBN: 3031431189
Category : Computers
Languages : en
Pages : 446
Book Description
This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the technology that can best protect organizational security. It provides step-by-step guidance on how to analyze business processes from a security perspective, while also introducing security concepts and techniques to develop the requirements and design for security technologies. This interdisciplinary book is intended for business and technology audiences, at student or experienced levels. Organizations must first understand the particular threats that an organization may be prone to, including different types of security attacks, social engineering, and fraud incidents, as well as addressing applicable regulation and security standards. This international edition covers Payment Card Industry Data Security Standard (PCI DSS), American security regulation, and European GDPR. Developing a risk profile helps to estimate the potential costs that an organization may be prone to, including how much should be spent on security controls. Security planning then includes designing information security, as well as network and physical security, incident response and metrics. Business continuity considers how a business may respond to the loss of IT service. Optional areas that may be applicable include data privacy, cloud security, zero trust, secure software requirements and lifecycle, governance, introductory forensics, and ethics. This book targets professionals in business, IT, security, software development or risk. This text enables computer science, information technology, or business students to implement a case study for an industry of their choosing. .
Publisher: Springer Nature
ISBN: 3031431189
Category : Computers
Languages : en
Pages : 446
Book Description
This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the technology that can best protect organizational security. It provides step-by-step guidance on how to analyze business processes from a security perspective, while also introducing security concepts and techniques to develop the requirements and design for security technologies. This interdisciplinary book is intended for business and technology audiences, at student or experienced levels. Organizations must first understand the particular threats that an organization may be prone to, including different types of security attacks, social engineering, and fraud incidents, as well as addressing applicable regulation and security standards. This international edition covers Payment Card Industry Data Security Standard (PCI DSS), American security regulation, and European GDPR. Developing a risk profile helps to estimate the potential costs that an organization may be prone to, including how much should be spent on security controls. Security planning then includes designing information security, as well as network and physical security, incident response and metrics. Business continuity considers how a business may respond to the loss of IT service. Optional areas that may be applicable include data privacy, cloud security, zero trust, secure software requirements and lifecycle, governance, introductory forensics, and ethics. This book targets professionals in business, IT, security, software development or risk. This text enables computer science, information technology, or business students to implement a case study for an industry of their choosing. .