How Clouds Hold IT Together


Book Description

Gain the practical knowledge you need to plan, design, deploy, and manage mixed cloud and on-premises IT management systems. Drawing on his experience as senior principal software architect at CA Technologies, Marvin Waschke lays out the nuts and bolts of the IT Infrastructure Library (ITIL)—the 5-volume bible of standard IT service management practices that is the single most important tool for aligning IT services with business needs. Many enterprise IT management applications, and the ways they are integrated, come directly from ITIL service management requirements. Types of integration include integrated reporting and dashboards, event-driven integration, device integration, and application data integration. Enterprise integration depends critically on high performance, scalability, and flexibility. Failure to integrate applications to service management requirements results in such wryly anticipated spectacles as the annual crash of the websites of Super Bowl advertisers such as Coca-Cola and Acura. Waschke weighs in on the debate between those who advocate integrating "best-of-breed" applications and those who favor a pre-integrated set of applications from a single vendor. He also rates the strengths and weaknesses of the major architectural patterns—central relational databases, service-oriented architecture (SOA), and enterprise data buses—for IT integration of service management applications. He examines the modifications to traditional service management that are required by virtualized systems of datacenter management and application design. Clouds present special problems for integration. How Clouds Hold IT Together details solutions for integration problems in private, community, and public clouds—especially problems with multi-tenant SaaS applications. Most enterprises are migrating to the cloud gradually rather than at one go. The transitional phase of mixed cloud and on-premises applications presents thorny problems for IT management. Waschke shows the reader how to normalize the performance and capacity measurements of concurrent traditional and cloud resources.




Color and Light in Nature


Book Description

We live in a world of optical marvels - from the commonplace but beautiful rainbow, to the rare and eerie superior mirage. But how many of us really understand how a rainbow is formed, why the setting sun is red and flattened, or even why the sky at night is not absolutely black? This beautiful and informative guide provides clear explanations to all naturally occurring optical phenomena seen with the naked eye, including shadows, halos, water optics, mirages and a host of other spectacles. Separating myth from reality, it outlines the basic principles involved, and supports them with many figures and references. A wealth of rare and spectacular photographs, many in full color, illustrate the phenomena throughout. In this new edition of the highly-acclaimed guide to seeing, photographing and understanding nature's optical delights, the authors have added over 50 new images and provided new material on experiments you can try yourself.




Science in the Beginning


Book Description

Science in the context of the seven days of creation presented in the Bible. This textbook uses activities to reinforce scientific principles presented.




The Cloudspotter's Guide


Book Description

Now in paperback: the runaway British bestseller that has cloudspotters everywhere looking up. Where do clouds come from? Why do they look the way they do? And why have they captured the imagination of timeless artists, Romantic poets, and every kid who's ever held a crayon? Veteran journalist and lifelong sky watcher Gavin Pretor-Pinney reveals everything there is to know about clouds, from history and science to art and pop culture. Cumulus, nimbostratus, and the dramatic and surfable Morning Glory cloud are just a few of the varieties explored in this smart, witty, and eclectic tour through the skies. Illustrated with striking photographs (including a new section in full-color) and line drawings featuring everything from classical paintings to lava lamps, The Cloudspotter's Guide will have enthusiasts, weather watchers, and the just plain curious floating on cloud nine.




Ahead in the Cloud


Book Description

Cloud computing is the most significant technology development of our lifetimes. It has made countless new businesses possible and presents a massive opportunity for large enterprises to innovate like startups and retire decades of technical debt. But making the most of the cloud requires much more from enterprises than just a technology change. Stephen Orban led Dow Jones's journey toward digital agility as their CIO and now leads AWS's Enterprise Strategy function, where he helps leaders from the largest companies in the world transform their businesses. As he demonstrates in this book, enterprises must re-train their people, evolve their processes, and transform their cultures as they move to the cloud. By bringing together his experiences and those of a number of business leaders, Orban shines a light on what works, what doesn't, and how enterprises can transform themselves using the cloud.




Personal Cybersecurity


Book Description

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual users at risk are increasing in step with accelerating mutation rates of malware and cybercriminal delivery systems. Traditional anti-virus software and personal firewalls no longer suffice to guarantee personal security. Users who neglect to learn and adopt the new ways of protecting themselves in their work and private environments put themselves, their associates, and their companies at risk of inconvenience, violation, reputational damage, data corruption, data theft, system degradation, system destruction, financial harm, and criminal disaster. This book shows what actions to take to limit the harm and recover from the damage. Instead of laying down a code of "thou shalt not" rules that admit of too many exceptions and contingencies to be of much practical use, cloud expert Marvin Waschke equips you with the battlefield intelligence, strategic understanding, survival training, and proven tools you need to intelligently assess the security threats in your environment and most effectively secure yourself from attacks. Through instructive examples and scenarios, the author shows you how to adapt and apply best practices to your own particular circumstances, how to automate and routinize your personal cybersecurity, how to recognize security breaches and act swiftly to seal them, and how to recover losses and restore functionality when attacks succeed. What You'll Learn Discover how computer security works and what it can protect us from See how a typical hacker attack works Evaluate computer security threats to the individual user and corporate systems Identify the critical vulnerabilities of a computer connected to the Internet Manage your computer to reduce vulnerabilities to yourself and your employer Discover how the adoption of newer forms of biometric authentication affects you Stop your router and other online devices from being co-opted into disruptive denial of service attacks Who This Book Is For Proficient and technically knowledgeable computer users who are anxious about cybercrime and want to understand the technology behind both attack and defense but do not want to go so far as to become security experts. Some of this audience will be purely home users, but many will be executives, technical managers, developers, and members of IT departments who need to adopt personal practices for their own safety and the protection of corporate systems. Many will want to impart good cybersecurity practices to their colleagues. IT departments tasked with indoctrinating their users with good safety practices may use the book as training material.




Teaching Children Dance


Book Description

Thirty-two new dance learning experiences for K-12 students of all ability levels. Wide variety of dance styles. Instructional videos and online resources to make teaching effective and smooth. Strategies in developing learning experiences and planning lessons and units.




Teaching Children Dance


Book Description

Teaching Children Dance, Third Edition, presents 31 ready-to-use lessons that bring fun and challenging dance experiences to elementary-aged children of all ability levels. The updated third edition includes 13 new learning experiences and two new chapters on teaching children with disabilities and making interdisciplinary connections.




SCADA Security - What's broken and how to fix it


Book Description

Modern attacks routinely breach SCADA networks that are defended to IT standards. This is unacceptable. Defense in depth has failed us. In ""SCADA Security"" Ginter describes this failure and describes an alternative. Strong SCADA security is possible, practical, and cheaper than failed, IT-centric, defense-in-depth. While nothing can be completely secure, we decide how high to set the bar for our attackers. For important SCADA systems, effective attacks should always be ruinously expensive and difficult. We can and should defend our SCADA systems so thoroughly that even our most resourceful enemies tear their hair out and curse the names of our SCADA systems' designers.




Cloud Standards


Book Description

Cloud computing is often described as providing computing resources the way electric utilities provide energy. In theory, anyone with an adequate connection to the Internet should be able to tap into a cloud provider and get exactly the computing resources they want when they want it, just like plugging into the electricity grid and getting exactly the energy you want when you want it. But to get that electricity, there are many standards: voltage, frequency, phase, motors constructed in standard ways—there is a long list; there is an equally long list for cloud computing. Many of the standards are already in place. Others are being developed; some in contention. Cloud Standards is a broad discussion of important existing and future standards. For existing standards, the discussion focuses on how they are used, providing practical advice to engineers constructing clouds and services to be deployed on clouds. For future standards, the discussion is on why a standard is needed, what the benefits will be, and what is being done now to fill the gap. No current book provides this information in the depth and detail necessary for an engineer in his work, an architect in designing cloud systems, a product manager collecting and evaluating products, or an executive evaluating the feasibility of a project. A second benefit from this book is that it provides insight into cloud implementations. Cloud implementations can be seen as the culmination of many trends in software and hardware engineering. Much of the foundation for these developments have been crystallized in the form of standards like TCP/IP (Transmission Control Protocol/Internet Protocol) and HTTP (Hypertext Transmission Protocol). The book leads readers to understand how these contribute to and affect cloud implementations. Unfortunately, emerging standards are often messy. Cloud implementers may need to choose between competing proposed standards. Sometimes it is better to reject the standard entirely and "roll your own." This book provides background for intelligent decisions. Keeping a cloud, or an application implemented on a cloud, running well requires careful tuning of the implementation. Tuning often involves adjusting controls that are in the standard or applying the standard in less well-known ways. This book is an aid in tuning cloud systems for maximum benefits.