Elementy komputera
Jeremy Proffitt, Rod Anami L. Anami
Site reliability engineering is all about continuous improvement, finding the balance between business and product demands while working within technological limitations to drive higher revenue. But quantifying and understanding reliability, handling resources, and meeting developer requirements can sometimes be overwhelming. With a focus on reliability from an infrastructure and coding perspective, Becoming a Rockstar SRE brings forth the site reliability engineer (SRE) persona using real-world examples.This book will acquaint you the role of an SRE, followed by the why and how of site reliability engineering. It walks you through the jobs of an SRE, from the automation of CI/CD pipelines and reducing toil to reliability best practices. You’ll learn what creates bad code and how to circumvent it with reliable design and patterns. The book also guides you through interacting and negotiating with businesses and vendors on various technical matters and exploring observability, outages, and why and how to craft an excellent runbook. Finally, you’ll learn how to elevate your site reliability engineering career, including certifications and interview tips and questions.By the end of this book, you’ll be able to identify and measure reliability, reduce downtime, troubleshoot outages, and enhance productivity to become a true rockstar SRE!
Andrey Popov, Vyacheslav Fadyushin, Aaron Woody
Starting with the basics of wireless networking and its associated risks, we will guide you through the stages of creating a penetration testing lab with wireless access and preparing your wireless penetration testing machine.This book will guide you through configuring hardware and virtual network devices, filling the lab network with applications and security solutions, and making it look and work like a real enterprise network. The resulting lab protected with WPA-Enterprise will let you practice most of the attack techniques used in penetration testing projects. Along with a review of penetration testing frameworks, this book is also a detailed manual on preparing a platform for wireless penetration testing. By the end of this book, you will be at the point when you can practice, and research without worrying about your lab environment for every task.
Vasyl Zvarydchuk
Large language models can produce impressive demos, but turning them into reliable products takes more than better prompts. You need to understand model behavior, know when to use retrieval or fine-tuning, structure agents correctly, and evaluate systems before deployment.Building Agent-Powered Applications gives an end-to-end engineering perspective on creating production-ready generative AI solutions. Written by Microsoft Principal AI Engineer Vasyl Zvarydchuk, it helps software engineers, data scientists, and applied AI practitioners move from concept to implementation. You’ll begin with AI, NLP, embeddings, transformers, and LLM behavior, then progress to prompt engineering, summarization, classification, extraction, reasoning, RAG, and fine-tuning.The book shows how to design agentic workflows with tools, memory, planning, orchestration, and human-in-the-loop controls. You’ll learn to evaluate quality with offline and online testing, task-specific metrics, LLM-as-a-judge methods, and responsible AI checks. Rather than treating prompting, RAG, fine-tuning, and agents as separate topics, this book shows how they work together in practice. By the end, you’ll be able to make better architectural trade-offs, reduce failure modes, and build scalable, trustworthy AI applications.*Email sign-up and proof of purchase required
Salvatore Raieli, Gabriele Iuculano
This book addresses the challenge of building AI that not only generates text but also grounds its responses in real data and takes action. Authored by AI specialists with expertise in drug discovery and systems optimization, this guide empowers you to leverage retrieval-augmented generation (RAG), knowledge graphs, and agent-based architectures to engineer truly intelligent behavior. By combining large language models (LLMs) with up-to-date information retrieval and structured knowledge, you'll create AI agents capable of deeper reasoning and more reliable problem-solving.Inside, you'll find a practical roadmap from concept to implementation. You’ll discover how to connect language models with external data via RAG pipelines for increasing factual accuracy and incorporate knowledge graphs for context-rich reasoning. The chapters will help you build and orchestrate autonomous agents that combine planning, tool use, and knowledge retrieval to achieve complex goals. Concrete Python examples and real-world case studies reinforce each concept and show how the techniques fit together.By the end of this book, you’ll be able to build intelligent AI agents that reason, retrieve, and interact dynamically, empowering you to deploy powerful AI solutions across industries.*Email sign-up and proof of purchase required
Julien Bayle
Physical computing allows us to build interactive physical systems by using software & hardware in order to sense and respond to the real world. C Programming for Arduino will show you how to harness powerful capabilities like sensing, feedbacks, programming and even wiring and developing your own autonomous systems.C Programming for Arduino contains everything you need to directly start wiring and coding your own electronic project. You'll learn C and how to code several types of firmware for your Arduino, and then move on to design small typical systems to understand how handling buttons, leds, LCD, network modules and much more.After running through C/C++ for the Arduino, you'll learn how to control your software by using real buttons and distance sensors and even discover how you can use your Arduino with the Processing framework so that they work in unison. Advanced coverage includes using Wi-Fi networks and batteries to make your Arduino-based hardware more mobile and flexible without wires. If you want to learn how to build your own electronic devices with powerful open-source technology, then this book is for you.
Jonathan Linowes, Matt Schoen
Google Cardboard is a low-cost, entry-level media platform through which you can experience virtual reality and virtual 3D environments. Its applications are as broad and varied as mobile smartphone applications themselves. This book will educate you on the best practices and methodology needed to build effective, stable, and performant mobile VR applications.In this book, we begin by defining virtual reality (VR) and how Google Cardboard fits into the larger VR and Android ecosystem. We introduce the underlying scientific and technical principles behind VR, including geometry, optics, rendering, and mobile software architecture. We start with a simple example app that ensures your environment is properly set up to write, build, and run the app. Then we develop a reusable VR graphics engine that you can build upon. And from then on, each chapter is a self-contained project where you will build an example from a different genre of application, including a 360 degree photo viewer, an educational simulation of our solar system, a 3D model viewer, and a music visualizer.Given the recent updates that were rolled out at Google I/O 2016, the authors of Cardboard VR Projects for Android have collated some technical notes to help you execute the projects in this book with Google VR Cardboard Java SDK 0.8, released in May 2016. Refer to the article at https://www.packtpub.com/sites/default/files/downloads/GoogleVRUpdateGuideforCardbook.pdf which explains the updates to the source code of the projects.
Karan Singh
Ceph is a unified, distributed storage system designed for excellent performance, reliability, and scalability. This cutting-edge technology has been transforming the storage industry, and is evolving rapidly as a leader in software-defined storage space, extending full support to cloud platforms such as Openstack and Cloudstack, including virtualization platforms. It is the most popular storage backend for Openstack, public, and private clouds, so is the first choice for a storage solution. Ceph is backed by RedHat and is developed by a thriving open source community of individual developers as well as several companies across the globe.This book takes you from a basic knowledge of Ceph to an expert understanding of the most advanced features, walking you through building up a production-grade Ceph storage cluster and helping you develop all the skills you need to plan, deploy, and effectively manage your Ceph cluster. Beginning with the basics, you’ll create a Ceph cluster, followed by block, object, and file storage provisioning. Next, you’ll get a step-by-step tutorial on integrating it with OpenStack and building a Dropbox-like object storage solution. We’ll also take a look at federated architecture and CephFS, and you’ll dive into Calamari and VSM for monitoring the Ceph environment. You’ll develop expert knowledge on troubleshooting and benchmarking your Ceph storage cluster. Finally, you’ll get to grips with the best practices to operate Ceph in a production environment.
Janusz Wójcik
Chłodzenie procesorów PC bez tajemnic Komputery osobiste, stacje robocze i serwery zużywają w czasie pracy dużo energii elektrycznej, emitując przy tym sporo ciepła. Znaczna jego część jest wydzielana przez procesory, które są coraz szybciej taktowane i wyposażane w coraz większą liczbę rdzeni. Zbyt wysoka temperatura wewnątrz jednostek centralnych powoduje zmniejszenie stabilności pracy i szybsze zużycie podzespołów, a w konsekwencji pogorszenie wydajności i zwiększenie awaryjności. Dlatego tak istotne jest wprowadzanie technik efektywnego chłodzenia elementów elektronicznych i ciągłe poszukiwanie nowych rozwiązań w ramach badań w tym zakresie. Książka jest przeznaczona dla osób zainteresowanych zgłębieniem aktualnej wiedzy na temat dostępnych technik chłodzenia procesorów komputerowych. Autor przedstawia teoretyczne podstawy zjawisk związanych z wymianą ciepła w elementach elektronicznych - prezentuje stosowane w tym zakresie modele i metody, szczegółowo opisuje badania nad chłodzeniem wykorzystującym powietrze, wodę i nanopłyny, a także omawia możliwości zwiększenia wydajności wymiany ciepła przy użyciu innych technik. To obowiązkowa pozycja dla każdego, kto zawodowo zajmuje się tą tematyką. Modele i metody używane w badaniach nad chłodzeniem procesorów Badania nad chłodzeniem procesorów przy użyciu powietrza Badania nad chłodzeniem z wykorzystaniem cieczy, w tym nanopłynów Historia i nowe techniki chłodzenia procesorów komputerowych
Victor Wu
Cisco Unified Computing System (UCS) is a data center server platform that is used for computing, deploying, and storing resources in data center environments.This cookbook aims to teach you about various tasks you can implement to improve your existing method of configuring and deploying UCS. You will start by learning how to upgrade your firmware on Brocade and Cisco Fibre Channel Switch and will move on to enhance your knowledge of LAN connectivity. We will then discuss how to configure Windows 2008 and 2012 local boot in Cisco UCS. Next, you will learn how to install the operating system on Cisco UCS and use Cisco UCS Power Calculator to calculate the UCS consumption. Finally, we’ll take a look at backup solutions.By the end of the book, you will know several ways to build and compute in data center environment using Cisco UCS.
Ian Neil, Mark Birch
CompTIA A+ certification is a trusted credential that’s highly sought after by professionals looking to prove their mettle in today’s digital world. This book will provide you with exam-oriented practice material mirroring the A+ exam’s level of difficulty to prepare you for every challenge that the exam might throw at you.This book is a compilation of hundreds of carefully curated practice questions on each domain, including mobile devices, networking, hardware, virtualization and cloud computing, as well as hardware and network troubleshooting. The realistic tests are designed in a way to help you accelerate your preparation to achieve the industry-celebrated A+ certification.By the end of this practice book, you’ll be well-prepared to pass the CompTIA A+ Core 1 (220-1101) exam with confidence.
Mark Birch, Ian Neil
The CompTIA A+ Core 2 certification validates the knowledge you need to support common operating systems and software installations. This book tests the skills essential for you to secure computing environments and troubleshoot common computing issues, while adhering to operational procedures through practice questions.Using proven techniques to test a candidate's knowledge of Core 2 (220-1102) exam objectives, this book will ensure that you're well-prepared to pass the exam on your first attempt. The chapters in this book comprise multiple-choice questions at the same level of difficulty as those you’ll find in the official exam. All the questions are broken down into different chapters according to each exam domain, finishing with a 90-question mock exam to prepare you to confidently take the real exam. The chapters are designed in a way to not only test your knowledge, but also your ability to handle pressure during the exam.By the end of this practice test book, you’ll be well-prepared to pass the CompTIA A+ Core 2 exam with confidence.
Perry Lea
The migration of computing to the edge is the logical progression of where computing is performed on a global scale. Edge computing is not a new paradigm but a necessary technology to address issues such as latency, service charges, reliability, connectivity, and privacy. This book walks you through the definition and architecture of edge computing systems and why they are critical in today’s ecosystem of IoT devices and an “everything connected” world.You will start your journey with an introduction to different edge computing hardware platforms, which vary by use case. From there, you’ll explore operating systems and middleware packages that manage edge devices such as Azure IoT. Then, you will explore communication systems such as near-range Bluetooth and RFID as well as long-range systems such as 5G. Networking protocols will be covered, which are the heart of edge systems. Technologies such as MQTT, which make up the backbone of edge to cloud communication, are examined. Then, you will move on to edge applications such as edge predictive AI and federated computing. We wrap up by investigating the security and vulnerability envelope of edge systems.This book is intended to quickly familiarize you with edge systems technologies and use cases, without burdening you with complicated jargon and low-level details.
Mohammed Billoo
Embedded Linux now powers everything from IoT devices to industrial systems, making it essential for embedded software engineers to be skilled at customizing, deploying, and developing for these platforms. This hands-on guide walks you through the core concepts of Embedded Linux using practical, real-world examples on Raspberry Pi 4 and 5. For those without access to hardware, it also demonstrates how to simulate embedded Linux systems using QEMU.This book contains code samples that you can follow along and build three real-world projects: a Python web-based dashboard that retrieves and displays data from a temperature sensor and two GUI applications demonstrating how to use the Qt framework on Embedded Linux using two different development paradigms. You’ll also step into advanced territory with Linux kernel debugging techniques and discover how to harness eBPF, building the experience employers want and the confidence to tackle complex embedded challenges.By the end of this book, you'll have a solid grasp of Embedded Linux development and the skills to build and deploy production-ready, modern embedded applications.
Kevin Wilson
You'll begin this course with basic computer fundamentals, setting the foundation for critical hardware components that power every computing device. From motherboards to processors, you'll gain a solid understanding of how these elements work together to create a functioning computer.As you progress, you'll uncover the importance of peripheral devices, discovering how external components interact with the core hardware. The course also covers the diverse types of computers, ranging from personal desktops to powerful servers, and guides you in interpreting hardware specifications to make informed decisions when purchasing or upgrading equipment. The course continues with an introduction to computer software, focusing on the relationship between hardware & the programs that bring them to life.In the final stages, the course shifts its focus to computer networks and the internet, offering insights into how devices connect and communicate on a global scale. You'll explore the essential principles of internet security, learning how to protect your devices and data from online threats. By the end of this course, you'll have a well-rounded understanding of both the physical and digital aspects of computing, empowering you to navigate the technological landscape with confidence.
Kevin Wilson
This course takes you on a journey through the intricate world of computer hardware, beginning with a solid foundation in the fundamentals of computing. Starting with an overview of computers and microcomputers, you’ll explore the core components that make up these machines, including embedded systems, software, and peripherals. Each chapter is designed to build your understanding of how these elements work together to create the technology we rely on daily.As you progress, the course delves into more complex topics like computer networks, the Internet, and cloud computing. You’ll gain insights into how hardware interacts with software and the critical role of security in maintaining the integrity of systems. Additionally, the course covers binary numbers, Boolean logic, and other essential concepts that underpin modern computing, offering a comprehensive understanding of both theoretical and practical aspects.By the end of this course, you’ll have a thorough knowledge of not just the hardware components but also the data processes like encryption, compression, and storage that ensure efficient and secure computing. Whether you're a beginner or someone with some background in technology, this course provides the knowledge and skills necessary to navigate and understand the complex world of computer hardware.
Nanik Tolaram, Nick Glynn
Go is a modern programming language with capabilities to enable high-performance app development. With its growing web framework ecosystem, Go is a preferred choice for building complete web apps. This practical guide will enable you to take your Go skills to the next level building full stack apps.This book walks you through creating and developing a complete modern web service from auth, middleware, server-side rendering, databases, and modern frontend frameworks and Go-powered APIs. You’ll start by structuring the app and important aspects such as networking, before integrating all the different parts together to build a complete web product. Next, you’ll learn how to build and ship a complete product by starting with the fundamental building blocks of creating a Go backend. You’ll apply best practices for cookies, APIs, and security, and level up your skills with the fastest growing frontend framework, Vue. Once your full stack application is ready, you’ll understand how to push the app to production and be prepared to serve customers and share it with the world.By the end of this book, you’ll have learned how to build and ship secure, scalable, and complete products and how to combine Golang with existing products using best practices.