Immutability: Recipe for Cloud Migration Success


Book Description

Cloud Migration is More Than Infrastructure Migration and Crucial to Business Economy KEY FEATURES ● Factors for a successful transition from on-premises to cloud infrastructure, as experienced by various businesses. ● Several strategies to build secure, immutable infrastructure using Infrastructure as Code (IaC). ● Important aspects of pipeline security, multi-tier application migration, disaster recovery, and much more. DESCRIPTION When migrating to the cloud, how can you minimize the time and effort spent on technical fixes? Creating a fault-tolerant, secure, automated, and scalable cloud on-demand infrastructure is a costly and time-consuming organizational operation. This book teaches you how to migrate infrastructure to the cloud utilizing programmable infrastructure. This book explains various ways to implement immutable infrastructure for scalable and secure infrastructure. To begin with, the book educates you on how to spot problems in today's infrastructure. The book explores how to use programmable infrastructure to provide immutability at each tier level of a multitier application. It also explains how to use the Unified Modeling Language (UML) to create high-level design architecture artifacts since it is the most straightforward tool for depicting the layout of a sophisticated program. Finally, the book discusses a detailed CI/CD workflow for 3-tier custom-developed application infrastructure. The reader will complete reading this book with a firm grasp of the fundamentals necessary to execute DevSecOps across a whole infrastructure. The book explains how to put into practice the cutting-edge cloud methodology of infrastructure provisioning using CI/CD pipelines in detail. In addition, the book gives a complete understanding of how to set up immutable multitier infrastructure utilizing programmable infrastructure/infrastructure as Code. WHAT YOU WILL LEARN ● Dos and Don'ts while implementing immutable infrastructure. ● Locating security flaws and incorrect settings across all cloud service providers. ● Applying organization-specific security policies and validation during coding. ● Handling Database Upgrades and Operating System Patches. ● Learning the impact assessment on the infrastructure CI/CD pipeline. ● Learning the ins and outs of public cloud systems like Amazon Web Services. ● Commencing the process of continuous IaC delivery and IaC deployment. WHO THIS BOOK IS FOR Professionals in Cloud, DevOps, DevSecOps, and Software development will find several career-enhancing surprises in this book. In addition, reading about the cultural and process-specific challenges will benefit the leadership team, including the CTO, CIO, Enterprise Architect, and Infrastructure Head. TABLE OF CONTENTS 1. What is Culture Formation? 2. What Past Taught Us? 3. What is Infrastructure Immutability? 4. How to Address Past Concerns? 5. How to Implement Web Application Components? 6. What are the Prerequisites for Decision-making? 7. How to Build Foundation Golden Machine Image? 8. How to do Database Handling in Immutable Infrastructure? 9. How to Construct the Entire Pipeline? 10. How to Handle Patching and OS releases? 11. How to Plan Disaster Recovery? 12. Inbuilt Infrastructure Security and Standard Enforcement 13. What is Application Incompatibility? 14. How to Build an Immutable Infrastructure for COTS/MOTS Products?




Immutability


Book Description

This book teaches you how to migrate infrastructure to the cloud utilizing programmable infrastructure. This book explains various ways to implement immutable infrastructure for scalable and secure infrastructure. --




Engineering DevOps


Book Description

This book is an engineering reference manual that explains "How to do DevOps?". It is targeted to people and organizations that are "doing DevOps" but not satisfied with the results that they are getting. There are plenty of books that describe different aspects of DevOps and customer user stories, but up until now there has not been a book that frames DevOps as an engineering problem with a step-by-step engineering solution and a clear list of recommended engineering practices to guide implementors. The step-by-step engineering prescriptions can be followed by leaders and practitioners to understand, assess, define, implement, operationalize, and evolve DevOps for their organization. The book provides a unique collection of engineering practices and solutions for DevOps. By confining the scope of the content of the book to the level of engineering practices, the content is applicable to the widest possible range of implementations. This book was born out of the author's desire to help others do DevOps, combined with a burning personal frustration. The frustration comes from hearing leaders and practitioners say, "We think we are doing DevOps, but we are not getting the business results we had expected." Engineering DevOps describes a strategic approach, applies engineering implementation discipline, and focuses operational expertise to define and accomplish specific goals for each leg of an organization's unique DevOps journey. This book guides the reader through a journey from defining an engineering strategy for DevOps to implementing The Three Ways of DevOps maturity using engineering practices: The First Way (called "Continuous Flow") to The Second Way (called "Continuous Feedback") and finally The Third Way (called "Continuous Improvement"). This book is intended to be a guide that will continue to be relevant over time as your specific DevOps and DevOps more generally evolves.




Mastering Microservices with Java 9


Book Description

Master the art of implementing scalable microservices in your production environment with ease About This Book Use domain-driven design to build microservices Use Spring Cloud to use Service Discovery and Registeration Use Kafka, Avro and Spring Streams for implementing event based microservices Who This Book Is For This book is for Java developers who are familiar with the microservices architecture and now wants to take a deeper dive into effectively implementing microservices at an enterprise level. A reasonable knowledge level and understanding of core microservice elements and applications is expected. What You Will Learn Use domain-driven design to design and implement microservices Secure microservices using Spring Security Learn to develop REST service development Deploy and test microservices Troubleshoot and debug the issues faced during development Learning best practices and common principals about microservices In Detail Microservices are the next big thing in designing scalable, easy-to-maintain applications. It not only makes app development easier, but also offers great flexibility to utilize various resources optimally. If you want to build an enterprise-ready implementation of the microservices architecture, then this is the book for you! Starting off by understanding the core concepts and framework, you will then focus on the high-level design of large software projects. You will gradually move on to setting up the development environment and configuring it before implementing continuous integration to deploy your microservice architecture. Using Spring security, you will secure microservices and test them effectively using REST Java clients and other tools like RxJava 2.0. We'll show you the best patterns, practices and common principals of microservice design and you'll learn to troubleshoot and debug the issues faced during development. We'll show you how to design and implement reactive microservices. Finally, we'll show you how to migrate a monolithic application to microservices based application. By the end of the book, you will know how to build smaller, lighter, and faster services that can be implemented easily in a production environment. Style and approach This book starts from the basics, including environment setup and provides easy-to-follow steps to implement the sample project using microservices.




Spark: The Definitive Guide


Book Description

Learn how to use, deploy, and maintain Apache Spark with this comprehensive guide, written by the creators of the open-source cluster-computing framework. With an emphasis on improvements and new features in Spark 2.0, authors Bill Chambers and Matei Zaharia break down Spark topics into distinct sections, each with unique goals. Youâ??ll explore the basic operations and common functions of Sparkâ??s structured APIs, as well as Structured Streaming, a new high-level API for building end-to-end streaming applications. Developers and system administrators will learn the fundamentals of monitoring, tuning, and debugging Spark, and explore machine learning techniques and scenarios for employing MLlib, Sparkâ??s scalable machine-learning library. Get a gentle overview of big data and Spark Learn about DataFrames, SQL, and Datasetsâ??Sparkâ??s core APIsâ??through worked examples Dive into Sparkâ??s low-level APIs, RDDs, and execution of SQL and DataFrames Understand how Spark runs on a cluster Debug, monitor, and tune Spark clusters and applications Learn the power of Structured Streaming, Sparkâ??s stream-processing engine Learn how you can apply MLlib to a variety of problems, including classification or recommendation




The Future of Finance


Book Description

This book, written jointly by an engineer and artificial intelligence expert along with a lawyer and banker, is a glimpse on what the future of the financial services will look like and the impact it will have on society. The first half of the book provides a detailed yet easy to understand educational and technical overview of FinTech, artificial intelligence and cryptocurrencies including the existing industry pain points and the new technological enablers. The second half provides a practical, concise and engaging overview of their latest trends and their impact on the future of the financial services industry including numerous use cases and practical examples. The book is a must read for any professional currently working in finance, any student studying the topic or anyone curious on how the future of finance will look like.




Internet of Things From Hype to Reality


Book Description

This book comprehensively describes an end-to-end Internet of Things (IoT) architecture that is comprised of devices, network, compute, storage, platform, applications along with management and security components. It is organized into five main parts, comprising of a total of 11 chapters. Part I presents a generic IoT reference model to establish a common vocabulary for IoT solutions. This includes a detailed description of the Internet protocol layers and the Things (sensors and actuators) as well as the key business drivers to realize the IoT vision. Part II focuses on the IoT requirements that impact networking protocols and provides a layer-by-layer walkthrough of the protocol stack with emphasis on industry progress and key gaps. Part III introduces the concept of Fog computing and describes the drivers for the technology, its constituent elements, and how it relates and differs from Cloud computing. Part IV discusses the IoT services platform, the cornerstone of the solution followed by the Security functions and requirements. Finally, Part V provides a treatment of the topic of connected ecosystems in IoT along with practical applications. It then surveys the latest IoT standards and discusses the pivotal role of open source in IoT. “Faculty will find well-crafted questions and answers at the end of each chapter, suitable for review and in classroom discussion topics. In addition, the material in the book can be used by engineers and technical leaders looking to gain a deep technical understanding of IoT, as well as by managers and business leaders looking to gain a competitive edge and understand innovation opportunities for the future.” Dr. Jim Spohrer, IBM “This text provides a very compelling study of the IoT space and achieves a very good balance between engineering/technology focus and business context. As such, it is highly-recommended for anyone interested in this rapidly-expanding field and will have broad appeal to a wide cross-section of readers, i.e., including engineering professionals, business analysts, university students, and professors.” Professor Nasir Ghani, University of South Florida




High Performance Python


Book Description

Your Python code may run correctly, but you need it to run faster. Updated for Python 3, this expanded edition shows you how to locate performance bottlenecks and significantly speed up your code in high-data-volume programs. By exploring the fundamental theory behind design choices, High Performance Python helps you gain a deeper understanding of Python’s implementation. How do you take advantage of multicore architectures or clusters? Or build a system that scales up and down without losing reliability? Experienced Python programmers will learn concrete solutions to many issues, along with war stories from companies that use high-performance Python for social media analytics, productionized machine learning, and more. Get a better grasp of NumPy, Cython, and profilers Learn how Python abstracts the underlying computer architecture Use profiling to find bottlenecks in CPU time and memory usage Write efficient programs by choosing appropriate data structures Speed up matrix and vector computations Use tools to compile Python down to machine code Manage multiple I/O and computational operations concurrently Convert multiprocessing code to run on local or remote clusters Deploy code faster using tools like Docker




Learning to Think Spatially


Book Description

Learning to Think Spatially examines how spatial thinking might be incorporated into existing standards-based instruction across the school curriculum. Spatial thinking must be recognized as a fundamental part of Kâ€"12 education and as an integrator and a facilitator for problem solving across the curriculum. With advances in computing technologies and the increasing availability of geospatial data, spatial thinking will play a significant role in the information-based economy of the twenty-first century. Using appropriately designed support systems tailored to the Kâ€"12 context, spatial thinking can be taught formally to all students. A geographic information system (GIS) offers one example of a high-technology support system that can enable students and teachers to practice and apply spatial thinking in many areas of the curriculum.




Data Protection


Book Description

This is the fundamental truth about data protection: backup is dead. Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it's been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization. So what is data protection? This book takes a holistic, business-based approach to data protection. It explains how data protection is a mix of proactive and reactive planning, technology and activities that allow for data continuity. It shows how truly effective data protection comes from a holistic approach considering the entire data lifecycle and all required SLAs. Data protection is neither RAID nor is it continuous availability, replication, snapshots or backups--it is all of them, combined in a considered and measured approach to suit the criticality of the data and meet all the requirements of the business. The book also discusses how businesses seeking to creatively leverage their IT investments and to drive through cost optimization are increasingly looking at data protection as a mechanism to achieve those goals. In addition to being a type of insurance policy, data protection is becoming an enabler for new processes around data movement and data processing. This book arms readers with information critical for making decisions on how data can be protected against loss in the cloud, on-premises, or in a mix of the two. It explains the changing face of recovery in a highly virtualized data center and techniques for dealing with big data. Moreover, it presents a model for where data recovery processes can be integrated with IT governance and management in order to achieve the right focus on recoverability across the business.