Although many large corporations are reluctant to release the software they use in-house publicly as open source, those companies can still use principles and processes of open source for developing their in-house software - a practice popularly known as InnerSource. But adopting open source practices without understanding the cultural context behind them often fails. That's where this r
Jeremy Keith begins by noting that the title Resilient Web Design might suggest a handbook for building robust websites, but clarifies that it is not a handbook - it is more like a history book. The text observes that in the world of web design, attention is mostly focused on the present. When designers look beyond the moment, it is usually to imagine future devices and interfaces, leavi
This book originated from lecture notes developed by the lead author for a course in applied numerical methods, initially designed for Civil Engineering majors, and later expanded to include Mechanical Engineering. The primary objectives of the text are to introduce the fundamental concepts of numerical methods and to provide a thorough, integrated guide to using MATLAB within an enginee
Cloud deployments have not only changed the way companies run mission critical databases; they've also transformed the roles of many people in production. With this practical report, database and system administrators, IT managers, and DevOps engineers will learn the ins and outs of running databases in the cloud. You'll explore the types of databases available, the difference between st
In just the past few years, the extended Berkeley Packet Filter (eBPF) has gone from relative obscurity to one of the hottest technology areas in modern infrastructure computing. With this report, Liz Rice dives into eBPF and explains how this framework enables networking, security, and observability tooling for modern compute environments. SREs, ops engineers, and engineering team leads
The data-driven revolution is finally hitting the media and entertainment industry. For decades, broadcast television and print media relied on traditional delivery channels for solvency and growth, but those channels fragmented as cable, streaming, and digital devices stole the show. In this ebook, you'll learn about the trends, challenges, and opportunities facing players in this indus
The Internet of Things (IoT) is creating a new world - a quantifiable and measurable world - in which people can better manage their lives, cities can better manage their infrastructure, and companies can better manage their businesses. This new smart connected world will offer fundamental changes to consumers and to society, and it will profoundly transform entire industries. The rise o
The implementation of 5G and wireless applications is accelerating worldwide, along with the drive to deliver high data rates and high data capacity. This creates new challenges for wireless technology in many radio frequency (RF) device applications, because these trends increase the probability of interference. To mitigate that interference, RF filter technology is a must. Bulk acousti
Information theory deals with mathematical laws that govern the flow, representation and transmission of information, just as the field of physics concerns laws that govern the behavior of the physical universe. The foundation was made in the context of communication while characterizing the fundamental limits of communication and offering codes (sometimes called algorithms) to achieve t
Firewalls have traditionally focused on network traffic, but with the advent of cloud computing and DevOps, security and operations professionals need a more sophisticated solution to track session state and application layer activity. In this ebook, cyber security consultant Chad Russell covers the current application threat landscape for modern deployment architectures, and explains th