Rejoignez-nous pour un voyage dans le monde des livres!
Ajouter ce livre à l'électronique
Grey
Ecrivez un nouveau commentaire Default profile 50px
Grey
Abonnez-vous pour lire le livre complet ou lisez les premières pages gratuitement!
All characters reduced
Optimizing Microsoft Azure Workloads - Leverage the Well-Architected Framework to boost performance scalability and cost efficiency - cover

Optimizing Microsoft Azure Workloads - Leverage the Well-Architected Framework to boost performance scalability and cost efficiency

Rithin Skaria

Maison d'édition: Packt Publishing

  • 0
  • 0
  • 0

Synopsis

It’s easy to learn and deploy resources in Microsoft Azure, without worrying about resource optimization. However, for production or mission critical workloads, it’s crucial that you follow best practices for resource deployment to attain security, reliability, operational excellence and performance. Apart from these aspects, you need to account for cost considerations, as it’s the leading reason for almost every organization’s cloud transformation.

In this book, you’ll learn to leverage Microsoft Well-Architected Framework to optimize your workloads in Azure. This Framework is a set of recommended practices developed by Microsoft based on five aligned pillars; cost optimization, performance, reliability, operational excellence, and security. You’ll explore each of these pillars and discover how to perform an assessment to determine the quality of your existing workloads. Through the book, you’ll uncover different design patterns and procedures related to each of the Well-Architected Framework pillars.

By the end of this book, you’ll be well-equipped to collect and assess data from an Azure environment and perform the necessary upturn of your Azure workloads.
Disponible depuis: 11/08/2023.
Longueur d'impression: 240 pages.

D'autres livres qui pourraient vous intéresser

  • Cursed Objects - cover

    Cursed Objects

    Jason Christie

    • 0
    • 0
    • 0
    What happens to identity when we're obsessed with self-surveillance and devalued words? Now that we've sold ourselves to ourselves, shuffling letters and sounds around to hide the pain, how do we represent the uncanny valley in which we've set up shop? In Cursed Objects, Jason Christie recoils in horror at the thoroughness of his self, then begins to write toward a new understanding brokered between all the things that define him and who he thinks he should be and interrogates how we reduce people to words, especially online, turning them into objects.
    Voir livre
  • Kickstart Software Design Architecture - Transform Your Software Development Journey with Key Principles and Advanced Practices in Architecture Microservices and Cloud Computing - cover

    Kickstart Software Design...

    Dr. Edward Lavieri Jr.

    • 0
    • 1
    • 0
    Learn to design robust software systems using modern architecture principles and practical hands-on experience
    Book Description
    Explore the ever-evolving world of software architecture. Bridge the gap between emerging technologies and foundational principles, with a comprehensive guide tailored for newcomers to the field. The book highlights the significance of software architecture in building scalable, efficient, and robust applications. 
    The book is structured into engaging chapters, each focused on a specific aspect of software architecture. It starts with an introduction to the basics of software design patterns, gaining an understanding of their role in crafting flexible and reusable code. Next, microservices are covered, followed by chapters that focus on cloud computing, containerization, and more. Chapters contain real-world examples, hands-on exercises, and case studies, to help readers gain both foundational knowledge and hands-on experience. 
    By the end of the book, you should have a solid foundation in software architecture and be equipped with the knowledge and skills to confidently address complex software architectural challenges. 
    Table of Contents
    
    1. Introduction to Software Architecture
    2. Principles of Design Patterns
    3. Role of Programming Languages
    4. Introduction to Microservices
    5. Building Microservices with Spring Boot
    6. Containerization with Docker
    7. Fundamentals of Cloud Computing
    8. Deploying in the Cloud
    9. DevOps Practices
    10. Version Control with Git
    11. Designing for Scalability and Efficiency
    12. Future Trends in Software Architecture   
    Index
    Voir livre
  • Summary of Brian Christian’s The Alignment Problem - cover

    Summary of Brian Christian’s The...

    Falcon Press

    • 0
    • 0
    • 0
    Buy now to get the main key ideas from Brian Christian’s The Alignment Problem 
      
    As machine-learning systems grow not only more prevalent, but also more powerful, humans want to ensure that they understand us and do what we want, eliminating the possibility of catastrophic divergence. In the field of computer science, this question is known as the alignment problem. 
    In The Alignment Problem (2020), Brian Christian raises questions of safety and ethics in a world where humans are turning into machines and machines are turning into humans. He discusses tools that, through imitation, curiosity, inference, and shaping, exhibit human skills without being programmed to do so. The future of machine learning holds risks, but also great promise.
    Voir livre
  • Sisters of the Jungle - The Trailblazing Women Who Shaped the Study of Wild Primates - cover

    Sisters of the Jungle - The...

    Keriann McGoogan

    • 0
    • 0
    • 0
    Sisters of the Jungle explores the history of primatology, a rare scientific discipline led primarily by women, from pioneers like Jane Goodall and Dian Fossey to author Keriann McGoogan's own adventurous field studies. 
     
    Since the 1970s, the science of primatology has been dominated by women—a unique reversal, as men usually outnumber women in science, technology, engineering and math (STEM) fields. 
     
    Today, one of those women is primatologist Keriann McGoogan, who has traveled to the far corners of the earth in search of wild primates. In Sisters of the Jungle, McGoogan combines stories about her own studies of howler monkeys (the loudest living primate) and lemurs (the most endangered group of animals on the planet) with those of the women who paved the way: intrepid scientists like Jane Goodall, Dian Fossey, Biruté Galdikas, and Alison Jolly who broke boundaries, made astonishing discoveries and ultimately shaped the trajectory of an entire branch of science.
    Voir livre
  • The Cybersecurity Maturity Model Certification (CMMC) – A pocket guide - cover

    The Cybersecurity Maturity Model...

    William Gamble

    • 0
    • 0
    • 0
    The United States DoD (Department of Defense) is one of the largest employers in the world, with about 2.87 million employees. It spends more than a year among more than 350,000 contractors and subcontractors throughout its supply chain.
    Information in the DoD network is shared digitally across the contractor and subcontractor supply chain, offering an irresistible target for nation-states and cyber criminals.
    Protecting the DoD supply chain
    The CMMC was developed to step up measures for protecting the DoD supply chain. Its objectives are to standardize cybersecurity controls and ensure that effective measures are in place to protect CUI (Controlled Unclassified Information) on contractor systems and networks.
    All companies doing business with the DoD, including subcontractors, must become certified by an independent third-party commercial certification organization.
    Your essential guide to understanding the CMMC
    To help you get to grips with the CMMC, this essential pocket guide covers:
    
    - What the CMMC is and why it has been introduced
    - Who needs to comply with the CMMC
    - The implementation process
    - The road to certification
    - CMMC implications for firms doing business with the US government
    Suitable for senior management and the C-suite, general or legal counsel, IT executives, IT organizations, and IT and security students, this pocket guide will give you a solid introduction to the CMMC and its requirements.
    About the author
    William Gamble is an international cybersecurity and privacy compliance expert. He is one of the few lawyers to hold advanced cybersecurity professional qualifications, and has an in-depth understanding of the design, management, and deployment of technology within the ISO 27001 framework. 
    With more than 30 years' experience of international regulatory practice in the U.S., EU, China, and other countries, William has had hundreds of articles published globally, written three books, and appeared on numerous radio and television programs around the world.
    William is a member of the Florida Bar and several federal courts. His qualifications include Juris Doctor (JD), Master of Laws (LLM), CompTIA® A+, Network+, Security+, CASP (Advanced Security Practitioner), ISO 27001 Lead Auditor and Lead Implementer, and GDPR Practitioner (GDPR P).
    Voir livre
  • Gen AI LLM & Prompt Engineering - A Comprehensive Guide to Generative AI Large Language Models and Prompt - cover

    Gen AI LLM & Prompt Engineering...

    Et Tu Code

    • 0
    • 0
    • 0
    Gen AI, LLM & Prompt Engineering: A Comprehensive Guide 
    Unlock the potential of Generative AI, Large Language Models, and Prompt Engineering with this definitive guide. 
    This book delves into the fascinating world of generative AI, a powerful technology capable of creating new and original content, from text and images to music and code. 
    Part 1: Generative AI DemystifiedExplore the fundamentals of generative AI: Learn about its history, different types of models, training methods, and the underlying mathematics.Navigate the research landscape: Gain insights from key research papers shaping the field.Discover real-world applications: See generative AI in action across various industries, from drug discovery to product design. 
    Part 2: Mastering Large Language Models (LLMs)Demystify the inner workings of LLMs: Understand the basics of Natural Language Processing and delve into model architectures, training, and evaluation.Become an LLM developer: Learn to collect, preprocess data, design models, and fine-tune them for specific tasks.Explore popular LLMs: Discover prominent models like GPT-3 and learn how to integrate them into your applications. 
    Part 3: The Art of Prompt EngineeringUnleash the power of prompts: Understand the psychology behind effective prompts and how to craft them for optimal results.Fine-tune prompts for different models: Learn how prompts can be adapted to various AI models for specific tasks.Explore advanced techniques and future directions: Discover innovative prompt engineering methods and delve into the ethical considerations.
    Voir livre