Jump to content

Jessica Brown

Administrators
  • Joined

  • Last visited

Posts posted by Jessica Brown

  1. Posted

    function check_updates() {
        local server="$1"
        local environment="$2"
    
        # Define environment-to-tag mapping
        declare -A env_tags=(
            [prod]="AMPROD EMPROD MONPA MONPE MONPO OCPROD OGGPA OGGPE OGGPO ORMsPA ORMsPE ORMsPO"
            [dev]="AMDEV EMDEV MONDA MONDE MONDO OCDEV OGGDA OGGDE OGGDO ORMsDA ORMsDE ORMsDO"
            [uat]="AMUAT EMUAT MONUA MONUE MONUO OCUAT OGGUA OGGUE OGGUO ORMsUA ORMsUE ORMsUO"
        )
    
        # Define environment-to-tag mapping
        declare -A env_tags=(
            [prod]="AMPROD OCPROD EMPROD OGGPA MONAP MONEP MONOP"
            [dev]="OCDEV AMDEV EMDEV"
            [uat]="AMUAT OCUAT EMUAT MONOCU MONAMU MONEMU"
        )
    
        case "$environment" in
            prod|PROD|Prod|production|Production) env="prod" ;;
            dev|DEV|Dev|development|Development) env="dev" ;;
            uat|UAT|Uat|test|Test) env="uat" ;;
            *) env="" ;;
        esac
    
        # Get the tags for the specified environment
        local tags="${env_tags[$env]}"
        if [ -z "$tags" ]; then
            echo -e "${light_red}Error:${default} Invalid or unspecified environment."
            return 1
        fi
    
        # Fetch the server tag
        local server_tag=$(getJPTags "$server" "$env")
        # Get the tags for the specified environment
        local tags="${env_tags[$env]}"
        if [ -z "$tags" ]; then
            echo -e "${light_red}Error:${default} Invalid or unspecified environment."
            return 1
        fi
    
        # Fetch the server tag
        local server_tag=$(getJPTags "$server" "$env")
    
        echo -en "${light_cyan}Checking ${white}$server (${dark_gray}${server_tag}${white})...${default} "
    
        # Get OS type
        OS_TYPE=$(ssh -o BatchMode=yes -o ConnectTimeout=${SSH_TIMEOUT} "$server" "awk -F= '/^ID=/{print \$2}' /etc/os-release" 2>/dev/null | tr -d '\"' | tr -d '[:space:]')
    
        SSH_EXIT_CODE=$?
        if [[ -z "$OS_TYPE" ]] || [[ $SSH_EXIT_CODE -ne 0 ]]; then
            note_color=${light_red}
            count_color=${light_red}
            COUNT="Error"
            OPERATING_SYS="Error: Unknown"
            count_note="Connection failed (or unexpected output) on ${white}$server${note_color}"
            log_note="Connection failed (or unexpected output)"
            echo -en "${count_color}Patches Needed: ${COUNT}${default} "
            echo -e "${light_yellow}[${default}NOTE${light_yellow}] ${light_blue}OS: ${light_cyan}${OPERATING_SYS} ${note_color}${count_note}${default}"
            echo "${SYS_DATE_TIME},${server},${OPERATING_SYS},${COUNT},${log_note}" >> "$LOGFILE"
            return
        fi
        
        case "$OS_TYPE" in
            rhel) OPERATING_SYS="RedHat Linux" ;;
            centos) OPERATING_SYS="CentOS Linux" ;;
            almalinux) OPERATING_SYS="Alma Linux" ;;
            rocky) OPERATING_SYS="Rocky Linux" ;;
            amazon) OPERATING_SYS="Amazon Linux" ;;
            oracle) OPERATING_SYS="Oracle Linux" ;;
            fedora) OPERATING_SYS="Fedora Linux" ;;
            ubuntu) OPERATING_SYS="Ubuntu" ;;
            kali) OPERATING_SYS="Kali Linux" ;;
            debian) OPERATING_SYS="Debian Linux" ;;
            arch) OPERATING_SYS="Arch Linux" ;;
            manjaro) OPERATING_SYS="Manjaro Linux" ;;
            opensuse) OPERATING_SYS="openSUSE Linux" ;;
            suse) OPERATING_SYS="SUSE Linux" ;;
            gentoo) OPERATING_SYS="Gentoo Linux" ;;
            slackware) OPERATING_SYS="Slackware" ;;
            alpine) OPERATING_SYS="Alpine Linux" ;;
            *) OPERATING_SYS="Unknown ${OS_TYPE} Linux Distro" ;;
        esac
    
        if [[ "$OS_TYPE" == "rhel" || "$OS_TYPE" == "centos" || "$OS_TYPE" == "fedora" || "$OS_TYPE" == "rocky" || "$OS_TYPE" == "almalinux" || "$OS_TYPE" == "oracle" ]]; then
            CMD_UPDATE_INFO="sudo yum -q --security updateinfo list | grep -v '^Update ID' | awk '{print \$1}' | sort -u | wc -l"
            CMD_UPDATE_SIZE="yes N | sudo yum update | awk -F\": \" '/^Total download size/{print $2}'"
            CMD_DISK_CHECK="df --output=avail /var | tail -n1 | awk '{print int(\$1/1024)}'"
            CMD_DISK_ROOT_CHECK="df --output=avail / | tail -n1 | awk '{print int(\$1/1024)}'"
            CLEAN_CMD="sudo yum clean all && sudo rm -rf /var/cache/dnf/*"
        elif [[ "$OS_TYPE" == "ubuntu" || "$OS_TYPE" == "debian" || "$OS_TYPE" == "kali" ]]; then
            CMD_UPDATE_INFO="sudo apt list --upgradable 2>/dev/null | grep -c 'security'"
            CMD_UPDATE_SIZE="sudo apt list --upgradeable 2>/dev/null | awk -F'[][]' '/security/ {sum+=$2} END {print int(sum/1024)}'"
            CMD_DISK_CHECK="df --output=avail /var | tail -n1 | awk '{print int(\$1/1024)}'"
            CMD_DISK_ROOT_CHECK="df --output=avail / | tail -n1 | awk '{print int(\$1/1024)}'"
            CLEAN_CMD="sudo apt clean"
        else
            return
        fi
    
        # Fetch update count
        COUNT=$(ssh -o LogLevel=Error -o BatchMode=yes -o ConnectTimeout=${SSH_TIMEOUT} "$server" "$CMD_UPDATE_INFO" 2>/dev/null | grep -E '^[0-9]+$' | head -n1)
    
        # Estimate update size
        UPDATE_SIZE_MB=$(ssh -o LogLevel=Error -o BatchMode=yes -o ConnectTimeout=${SSH_TIMEOUT} "$server" "$CMD_UPDATE_SIZE" 2>/dev/null | grep -E '^[0-9]+$' | head -n1)
        [[ -z "$UPDATE_SIZE_MB" ]] && UPDATE_SIZE_MB=1000  # Default to 1GB if unable to estimate
    
        # Check available disk space
        AVAILABLE_MB=$(ssh -o LogLevel=Error -o BatchMode=yes -o ConnectTimeout=${SSH_TIMEOUT} "$server" "$CMD_DISK_CHECK" 2>/dev/null | grep -E '^[0-9]+$' | head -n1)
        AVAILABLE_ROOT_MB=$(ssh -o LogLevel=Error -o BatchMode=yes -o ConnectTimeout=${SSH_TIMEOUT} "$server" "$CMD_DISK_ROOT_CHECK" 2>/dev/null | grep -E '^[0-9]+$' | head -n1)
    
        # Set required space (update size + safety buffer)
        REQUIRED_SPACE_MB=$((UPDATE_SIZE_MB + SAFETY_BUFFER_MB))
    
        # Determine compliance
        SSH_EXIT_CODE=$?
        if [[ -z "$COUNT" ]] || [[ $SSH_EXIT_CODE -ne 0 ]]; then
            note_color=${light_red}
            count_color=${light_red}
            COUNT="Error"
            count_note="Connection failed (or unexpected output) on ${white}$server${note_color}"
            log_note="Connection failed (or unexpected output)"
            echo
            return
        elif [[ "$COUNT" -gt 5 ]]; then
            note_color=${light_red}
            count_color=${light_red}
            count_note="${white}$server${note_color} is out of Compliance"
            log_note="$server is out of Compliance"
    
            NON_COMPLIANT_SERVERS+=("$server")
        elif [[ "$COUNT" -gt 0 ]]; then
            note_color=${green}
            count_color=${light_yellow}
            count_note="${white}$server${note_color} is within Standard Compliance"
            log_note="$server is within Standard Compliance"
        elif [[ "$COUNT" -eq 0 ]]; then
            note_color=${light_green}
            count_color=${light_green}
            count_note="${white}$server${note_color} is Compliant"
            log_note="$server is Compliant"
        fi
    
        if [[ "$AVAILABLE_ROOT_MB" -lt "$REQUIRED_SPACE_MB" ]]; then
                note_color=${light_red}
                count="Error"
                count_note="Root folder did not meet space requirements, there is insufficient disk space on ${white}$server${note_color}. Space needed ${white}$(( REQUIRED_SPACE_MB - AVAILABLE_ROOT_MB ))${dark_gray}mb"
                log_note="Root folder  did not meet space requirements: there is insufficient disk space on $server. Space needed $(( REQUIRED_SPACE_MB - AVAILABLE_ROOT_MB ))mb"
        else
            if [[ "$AVAILABLE_MB" -lt "$REQUIRED_SPACE_MB" ]]; then
                CLEAN_ATTEMPT=$(ssh -o LogLevel=Error -o BatchMode=yes -o ConnectTimeout=${SSH_TIMEOUT} "$server" "$CLEAN_CMD" 2>/dev/null)
                AVAILABLE_MB=$(ssh -o LogLevel=Error -o BatchMode=yes -o ConnectTimeout=${SSH_TIMEOUT} "$server" "$CMD_DISK_CHECK" 2>/dev/null | grep -E '^[0-9]+$' | head -n1)
    
                if [[ "$AVAILABLE_MB" -lt "$REQUIRED_SPACE_MB" ]]; then
                    note_color=${light_red}
                    count="Error"
                    count_note="Clean up attempts did not meet space requirements, there is insufficient disk space on ${white}$server${note_color}. Space needed ${white}$(( REQUIRED_SPACE_MB - AVAILABLE_MB ))${dark_gray}mb"
                    log_note="Clean up attempts did not meet space requirements: there is insufficient disk space on $server. Space needed $(( REQUIRED_SPACE_MB - AVAILABLE_MB ))mb"
                else
                    note_color=${light_green}
                    count_note="After clean up attempt, disk space was recovered on ${white}$server${note_color}. Space available $(( AVAILABLE_MB - REQUIRED_SPACE_MB + 1000 ))${dark_gray}mb"
                    log_note="After clean up attempt: disk space was recovered on $server. Space available $(( AVAILABLE_MB - REQUIRED_SPACE_MB + 1000 ))mb"
                fi
            fi
        fi
    
        # Get system Date and Time:
        SYS_DATE_TIME="$(date +"%b %d %Y %I:%M%p")"
    
        echo -en "${count_color}Patches Needed: ${COUNT}${default} "
        echo -e "${light_yellow}[${default}NOTE${light_yellow}] ${light_blue}OS: ${light_cyan}${OPERATING_SYS} ${note_color}${count_note}${default}"
        echo "${SYS_DATE_TIME},${server},${server_tag},${OPERATING_SYS},${COUNT},${log_note},${AVAILABLE_ROOT_MB},${AVAILABLE_MB},${REQUIRED_SPACE_MB}" >> "$LOGFILE"
    }
  2. Posted

    The Two Faces of Tomorrow

    The Two Faces of Tomorrow

    by James Patrick Hogan

    Publisher Baen Books
    Published Date 1997
    Page Count 464
    Categories Fiction / Science Fiction / General, Fiction / Science Fiction / Hard Science Fiction
    Language EN
    Average Rating 2.5 (based on 2 ratings)
    Maturity Rating No Mature Content Detected
    ISBN 0671878484
    Book Cover By the mid-21st Century, technology had become much too complicated for humans to handle -- and the computer network that had grown up to keep civilization from tripping over its own shoelaces was also beginning to be overwhelmed. Something Had To Be Done.As a solution, Raymond Dyer's project developed the first genuinely self-aware artificial intelligence -- code name: Spartacus. But could Spartacus be trusted to obey its makers? And if it went rogue, could it be shut down? As an acid test, Spartacus was put in charge of a space station and programmed with a survival instinct. Dyer and his team had the job of seeing how far the computer would go to defend itself when they tried to pull the plug. Dyer didn't expect any serious problems to arise in the experiment.Unfortunately, he had built more initiative into Spartacus than he realized....And a superintelligent computer with a high dose of initiative makes a dangerous guinea pig.
    More Information
  3. Posted

    Aws

    Aws

    The Ultimate Guide From Beginners To Advanced For The Amazon Web Services (2020 Edition)

    by Theo H. King

    Publisher Independently Published
    Published Date 2019-12-21
    Page Count 197
    Categories Computers / Internet / Web Services & APIs
    Language EN
    Average Rating N/A (based on N/A ratings)
    Maturity Rating No Mature Content Detected
    ISBN 1675528276
    Book Cover Become an Expert at Amazon Web Services and Transform Your Business!

    If cloud computing is one of the leading trends in the IT industry (and it most certainly is), then Amazon Web Services Platform (AWS) is the champion of that trend. If you want to be a part of the competitive markets, you need to jump on this ascending wagon and get familiar with the AWS.

    There's a reason successful businesses like Netflix and Pinterest use this platform. The math is simple: higher performance, security, and reliability at a lower cost.

    This book offers a guide to AWS, for both beginner and advanced users. If you want to reduce your companies operating costs, and control the safety of your data, use this step-by-step guide for computing and networking in the AWS cloud.

    What you'll be able to do after reading this guide:
    • Use developing tools of AWS to your company's advantage

    • Manage cloud architecture through AWS services

    • Upgrade your outsourcing

    • Create a private network in the cloud

    • Implement AWS technology in your projects

    • Create cloud storage and virtual desktop environment

    • Use Amazon Workspaces and Amazon S3 service

    • And so much more!

    The best part about AWS is that it works on any scale. You can be the owner of both big and small businesses in order to implement AWS in your operations. Even if you're familiar with the AWS cloud, this guide will help you expand your knowledge on the topic. You'll find out everything there is on AWS strategies, cloud selection, and how to make money with a smart AWS implementation in your company.

    You don't need to be an IT expert to use AWS. You simply need this comprehensive and easy to understand guide.

    Join millions of customers around the world and skyrocket your profits!

    Scroll up, click on 'Buy Now with 1-Click' and Get Your Copy!
    More Information
  4. Posted

    Numerical Methods for Engineers and Scientists Using MATLAB

    Numerical Methods for Engineers and Scientists Using MATLAB

    by Ramin S. Esfandiari

    Publisher CRC Press
    Published Date 2017
    Page Count 471
    Categories Computers / General, Mathematics / General, Mathematics / Applied, Mathematics / Number Systems, Mathematics / Numerical Analysis, Technology & Engineering / Engineering (General), Technology & Engineering / Civil / General, Technology & Engineering / Mechanical
    Language EN
    Average Rating N/A (based on N/A ratings)
    Maturity Rating No Mature Content Detected
    ISBN 1498777422
    Book Cover

    This book provides a pragmatic, methodical and easy-to-follow presentation of numerical methods and their effective implementation using MATLAB, which is introduced at the outset. The author introduces techniques for solving equations of a single variable and systems of equations, followed by curve fitting and interpolation of data. The book also provides detailed coverage of numerical differentiation and integration, as well as numerical solutions of initial-value and boundary-value problems. The author then presents the numerical solution of the matrix eigenvalue problem, which entails approximation of a few or all eigenvalues of a matrix. The last chapter is devoted to numerical solutions of partial differential equations that arise in engineering and science. Each method is accompanied by at least one fully worked-out example showing essential details involved in preliminary hand calculations, as well as computations in MATLAB. This thoroughly-researched resource:

    More Information
  5. Posted

    Ecological Statistics

    Ecological Statistics

    Contemporary Theory and Application

    by Gordon A. Fox, Simoneta Negrete-Yankelevich, Vinicio J. Sosa

    Publisher Oxford University Press
    Published Date 2015
    Page Count 389
    Categories Computers / Mathematical & Statistical Software, Mathematics / Probability & Statistics / General, Nature / General, Science / Life Sciences / Botany, Science / Life Sciences / Ecology, Science / Life Sciences / Zoology / General
    Language EN
    Average Rating N/A (based on N/A ratings)
    Maturity Rating No Mature Content Detected
    ISBN 0199672555
    Book Cover The application and interpretation of statistics are central to ecological study and practice. Ecologists are now asking more sophisticated questions than in the past. These new questions, together with the continued growth of computing power and the availability of new software, have created a new generation of statistical techniques. These have resulted in major recent developments in both our understanding and practice of ecological statistics. This novel book synthesizes a number of these changes, addressing key approaches and issues that tend to be overlooked in other books such as missing/censored data, correlation structure of data, heterogeneous data, and complex causal relationships. These issues characterize a large proportion of ecological data, but most ecologists' training in traditional statistics simply does not provide them with adequate preparation to handle the associated challenges. Uniquely, Ecological Statistics highlights the underlying links among many statistical approaches that attempt to tackle these issues. In particular, it gives readers an introduction to approaches to inference, likelihoods, generalized linear (mixed) models, spatially or phylogenetically-structured data, and data synthesis, with a strong emphasis on conceptual understanding and subsequent application to data analysis. Written by a team of practicing ecologists, mathematical explanations have been kept to the minimum necessary. This user-friendly textbook will be suitable for graduate students, researchers, and practitioners in the fields of ecology, evolution, environmental studies, and computational biology who are interested in updating their statistical tool kits. A companion web site provides example data sets and commented code in the R language.
    More Information
  6. Posted

    Design Patterns

    Design Patterns

    Elements of Reusable Object-oriented Software

    by Erich Gamma, Richard Helm (Computer scientist), Ralph E. Johnson, John Vlissides

    Publisher Addison-Wesley
    Published Date 1995
    Page Count 395
    Categories Computers / Programming / Object Oriented
    Language EN
    Average Rating N/A (based on N/A ratings)
    Maturity Rating No Mature Content Detected
    ISBN 9332555400
    Book Cover Four software designers present a catalog of simple and succinct solutions to commonly occurring design problems, using Smalltalk and C++ in example code. These 23 patterns allow designers to create more flexible, elegant, and ultimately reusable designs without having to rediscover the design solutions themselves. The authors begin by describing what patterns are and how they can help you design object-oriented software. They go on to systematically name, explain, evaluate, and catalog recurring designs in object-oriented systems.--From publisher description.
    More Information
  7. Posted

    The Model Thinker

    The Model Thinker

    What You Need to Know to Make Data Work for You

    by Scott E. Page

    Publisher Basic Books
    Published Date 2018-11-27
    Page Count 448
    Categories Computers / Data Science / Data Modeling & Design, Mathematics / Probability & Statistics / General, Social Science / Statistics, Business & Economics / Economics / Theory, Computers / Data Science / General
    Language EN
    Average Rating N/A (based on N/A ratings)
    Maturity Rating No Mature Content Detected
    ISBN 0465094635
    Book Cover Work with data like a pro using this guide that breaks down how to organize, apply, and most importantly, understand what you are analyzing in order to become a true data ninja.

    From the stock market to genomics laboratories, census figures to marketing email blasts, we are awash with data. But as anyone who has ever opened up a spreadsheet packed with seemingly infinite lines of data knows, numbers aren't enough: we need to know how to make those numbers talk. In The Model Thinker, social scientist Scott E. Page shows us the mathematical, statistical, and computational models—from linear regression to random walks and far beyond—that can turn anyone into a genius. At the core of the book is Page's "many-model paradigm," which shows the reader how to apply multiple models to organize the data, leading to wiser choices, more accurate predictions, and more robust designs. The Model Thinker provides a toolkit for business people, students, scientists, pollsters, and bloggers to make them better, clearer thinkers, able to leverage data and information to their advantage.
    More Information
  8. Posted

    Foundations of Applied Mathematics, Volume 2

    Foundations of Applied Mathematics, Volume 2

    Algorithms, Approximation, Optimization

    by Jeffrey Humpherys, Tyler J. Jarvis

    Publisher SIAM
    Published Date 2020-03-10
    Page Count 806
    Categories Mathematics / Numerical Analysis, Mathematics / Optimization, Mathematics / Probability & Statistics / General, Computers / Computer Science, Computers / Programming / Algorithms
    Language EN
    Average Rating N/A (based on N/A ratings)
    Maturity Rating No Mature Content Detected
    ISBN 1611976065
    Book Cover

    In this second book of what will be a four-volume series, the authors present, in a mathematically rigorous way, the essential foundations of both the theory and practice of algorithms, approximation, and optimization—essential topics in modern applied and computational mathematics. This material is the introductory framework upon which algorithm analysis, optimization, probability, statistics, machine learning, and control theory are built.


    This text gives a unified treatment of several topics that do not usually appear together: the theory and analysis of algorithms for mathematicians and data science students; probability and its applications; the theory and applications of approximation, including Fourier series, wavelets, and polynomial approximation; and the theory and practice of optimization, including dynamic optimization.


    When used in concert with the free supplemental lab materials, Foundations of Applied Mathematics, Volume 2: Algorithms, Approximation, Optimization teaches not only the theory but also the computational practice of modern mathematical methods. Exercises and examples build upon each other in a way that continually reinforces previous ideas, allowing students to retain learned concepts while achieving a greater depth. The mathematically rigorous lab content guides students to technical proficiency and answers the age-old question “When am I going to use this?”


    This textbook is geared toward advanced undergraduate and beginning graduate students in mathematics, data science, and machine learning.

    More Information
  9. Posted

    How Google Tests Software

    How Google Tests Software

    by James A. Whittaker, Jason Arbon, Jeff Carollo

    Publisher Addison-Wesley Professional
    Published Date 2012
    Page Count 281
    Categories Computers / General, Computers / Software Development & Engineering / Quality Assurance & Testing, Computers / Internet / Search Engines
    Language EN
    Average Rating 5 (based on 1 ratings)
    Maturity Rating No Mature Content Detected
    ISBN 0321803027
    Book Cover

    2012 Jolt Award finalist!

    Pioneering the Future of Software Test

    Do you need to get it right, too? Then, learn from Google. Legendary testing expert James Whittaker, until recently a Google testing leader, and two top Google experts reveal exactly how Google tests software, offering brand-new best practices you can use even if you're not quite Google's size...yet!

    Breakthrough Techniques You Can Actually Use

    Discover 100% practical, amazingly scalable techniques for analyzing risk and planning tests...thinking like real users...implementing exploratory, black box, white box, and acceptance testing...getting usable feedback...tracking issues...choosing and creating tools...testing "Docs & Mocks," interfaces, classes, modules, libraries, binaries, services, and infrastructure...reviewing code and refactoring...using test hooks, presubmit scripts, queues, continuous builds, and more. With these techniques, you can transform testing from a bottleneck into an accelerator-and make your whole organization more productive!

    More Information
  10. Posted

    Snowflake Data Engineering

    Snowflake Data Engineering

    by Maja Ferle

    Publisher Simon and Schuster
    Published Date 2025-01-28
    Page Count 368
    Categories Computers / Data Science / General, Computers / Data Science / Data Analytics, Computers / Artificial Intelligence / Expert Systems
    Language EN
    Average Rating N/A (based on N/A ratings)
    Maturity Rating No Mature Content Detected
    ISBN 1633436853
    Book Cover A practical introduction to data engineering on the powerful Snowflake cloud data platform.

    Data engineers create the pipelines that ingest raw data, transform it, and funnel it to the analysts and professionals who need it. The Snowflake cloud data platform provides a suite of productivity-focused tools and features that simplify building and maintaining data pipelines. In Snowflake Data Engineering, Snowflake Data Superhero Maja Ferle shows you how to get started.

    In Snowflake Data Engineering you will learn how to:

    • Ingest data into Snowflake from both cloud and local file systems
    • Transform data using functions, stored procedures, and SQL
    • Orchestrate data pipelines with streams and tasks, and monitor their execution
    • Use Snowpark to run Python code in your pipelines
    • Deploy Snowflake objects and code using continuous integration principles
    • Optimize performance and costs when ingesting data into Snowflake

    Snowflake Data Engineering reveals how Snowflake makes it easy to work with unstructured data, set up continuous ingestion with Snowpipe, and keep your data safe and secure with best-in-class data governance features. Along the way, you’ll practice the most important data engineering tasks as you work through relevant hands-on examples. Throughout, author Maja Ferle shares design tips drawn from her years of experience to ensure your pipeline follows the best practices of software engineering, security, and data governance.

    Foreword by Joe Reis.

    Purchase of the print book includes a free eBook in PDF and ePub formats from Manning Publications.

    About the technology

    Pipelines that ingest and transform raw data are the lifeblood of business analytics, and data engineers rely on Snowflake to help them deliver those pipelines efficiently. Snowflake is a full-service cloud-based platform that handles everything from near-infinite storage, fast elastic compute services, inbuilt AI/ML capabilities like vector search, text-to-SQL, code generation, and more. This book gives you what you need to create effective data pipelines on the Snowflake platform.

    About the book

    Snowflake Data Engineering guides you skill-by-skill through accomplishing on-the-job data engineering tasks using Snowflake. You’ll start by building your first simple pipeline and then expand it by adding increasingly powerful features, including data governance and security, adding CI/CD into your pipelines, and even augmenting data with generative AI. You’ll be amazed how far you can go in just a few short chapters!

    What's inside

    • Ingest data from the cloud, APIs, or Snowflake Marketplace
    • Orchestrate data pipelines with streams and tasks
    • Optimize performance and cost

    About the reader

    For software developers and data analysts. Readers should know the basics of SQL and the Cloud.

    About the author

    Maja Ferle is a Snowflake Subject Matter Expert and a Snowflake Data Superhero who holds the SnowPro Advanced Data Engineer and the SnowPro Advanced Data Analyst certifications.

    Table of Contents

    Part 1
    1 Data engineering with Snowflake
    2 Creating your first data pipeline
    Part 2
    3 Best practices for data staging
    4 Transforming data
    5 Continuous data ingestion
    6 Executing code natively with Snowpark
    7 Augmenting data with outputs from large language models
    8 Optimizing query performance
    9 Controlling costs
    10 Data governance and access control
    Part 3
    11 Designing data pipelines
    12 Ingesting data incrementally
    13 Orchestrating data pipelines
    14 Testing for data integrity and completeness
    15 Data pipeline continuous integration
    More Information
  11. Posted

    Guide to UNIX Using Linux

    Guide to UNIX Using Linux

    by Michael J. Palmer

    Publisher W. Ross MacDonald School Resource Services Library
    Published Date 2011
    Page Count N/A
    Categories Linux
    Language EN
    Average Rating N/A (based on N/A ratings)
    Maturity Rating No Mature Content Detected
    ISBN N/A
    No description available.
    More Information
  12. Posted

    Netnography

    Netnography

    Doing Ethnographic Research Online

    by Robert V Kozinets

    Publisher SAGE Publications
    Published Date 2010
    Page Count 221
    Categories Social Science / Research, Social Science / Anthropology / Cultural, Computers / Internet / General, Social Science / Methodology
    Language EN
    Average Rating N/A (based on N/A ratings)
    Maturity Rating No Mature Content Detected
    ISBN 1848606451
    Book Cover

    This exciting new text is the first to explore the discipline of ‘Netnography’ – the conduct of ethnography over the internet – a method specifically designed to study cultures and communities online. For the first time, full procedural guidelines for the accurate and ethical conduct of ethnographic research online are set out, with detailed, step-by-step guidance to thoroughly introduce, explain, and illustrate the method to students and researchers. The author also surveys the latest research on online cultures and communities, focusing on the methods used to study them, with examples focusing on the new elements and contingencies of the blogosphere (blogging), microblogging, videocasting, podcasting, social networking sites, virtual worlds, and more.


    More Information
  13. Posted

    Programming Pearls

    Programming Pearls

    by Jon Louis Bentley

    Publisher Addison-Wesley
    Published Date 1986
    Page Count 195
    Categories Computers / Programming / General
    Language EN
    Average Rating N/A (based on N/A ratings)
    Maturity Rating No Mature Content Detected
    ISBN 0201103311
    Book Cover The essays in this book present programs that go beyond solid engineering techniques to be creative and clever solutions to computer problems. The programs are fun and teach important programming tecniques and fundamental design principles.
    More Information
  14. Posted

    Go.AI (Geopolitics of Artificial Intelligence)

    Go.AI (Geopolitics of Artificial Intelligence)

    by Abishur Prakash

    Publisher Abishur Prakash
    Published Date 2018-10
    Page Count 320
    Categories Political Science / Geopolitics
    Language EN
    Average Rating N/A (based on N/A ratings)
    Maturity Rating No Mature Content Detected
    ISBN 099583394X
    Book Cover In July, 2018, one of the biggest developments since World War II took place: China revealed that it was developing artificial intelligence (AI) to create foreign policy. Think about that for a second. In the future, if the world wants to understand what China will do on the world stage, it will have to understand how China's AI thinks. What China is doing is one part of a much bigger picture. All over the world, countries are deploying AI in powerful ways. In Russia, AI is detecting social unrest. In Japan, AI is helping police predict crime. In the United Arab Emirates, AI is deciding who can enter the country. As countries deploy AI, it could change how the world operates. As AI enters the picture, the balance of power around the world could change. AI could lead to the next alliances or the next conflicts. From the mind of Abishur Prakash, the world's leading geopolitical futurist and author of Next Geopolitics: Volume One and Two, comes the first book to examine how AI could transform geopolitics. Building on more than 6 months of research, this book paints 12 groundbreaking scenarios of how AI could take geopolitics in a new direction. By looking at areas like ethics, trade and bias, this book goes where no other professor, pundit or publication has gone before. This book will guide leaders, visionaries, investors and policy makers through a world of geopolitics that has no precedent, where for the first time, countries will compete and clash over a technology that everyone wants but nobody fully understands.
    More Information
  15. Posted

    Encyclopedia of Computer Science and Technology

    Encyclopedia of Computer Science and Technology

    by Unknown Author

    Publisher M. Dekker
    Published Date 1975
    Page Count 386
    Categories Computer science
    Language EN
    Average Rating N/A (based on N/A ratings)
    Maturity Rating No Mature Content Detected
    ISBN 082472268X
    Book Cover No description available.
    More Information
  16. Posted

    Gargantua and Pantagruel

    Gargantua and Pantagruel

    by François Rabelais

    Publisher BoD - Books on Demand
    Published Date 2024-04-25
    Page Count 132
    Categories Poetry / General, Computers / Hardware / General
    Language EN
    Average Rating N/A (based on N/A ratings)
    Maturity Rating No Mature Content Detected
    ISBN 9791041999682
    Book Cover "Gargantua and Pantagruel" by François Rabelais is a sprawling and irreverent series of novels that satirize the social, political, and religious norms of Renaissance France. The work follows the adventures of the giant Gargantua and his son Pantagruel as they embark on a series of fantastical and absurd escapades. Through its exaggerated characters and ribald humor, "Gargantua and Pantagruel" offers biting commentary on the hypocrisies and follies of Rabelais' contemporary society. The novels explore themes of education, humanism, and the nature of power, while also incorporating elements of philosophy, theology, and folklore.
    More Information
  17. Posted

    High-Rise Security and Fire Life Safety

    High-Rise Security and Fire Life Safety

    by Geoff Craighead

    Publisher Butterworth-Heinemann
    Published Date 2009-06-15
    Page Count 696
    Categories Science / General
    Language EN
    Average Rating 1 (based on 1 ratings)
    Maturity Rating No Mature Content Detected
    ISBN 0080877850
    Book Cover High-Rise Security and Fire Life Safety, 3e, is a comprehensive reference for managing security and fire life safety operations within high-rise buildings. It spells out the unique characteristics of skyscrapers from a security and fire life safety perspective, details the type of security and life safety systems commonly found in them, outlines how to conduct risk assessments, and explains security policies and procedures designed to protect life and property. Craighead also provides guidelines for managing security and life safety functions, including the development of response plans for building emergencies. This latest edition clearly separates out the different types of skyscrapers, from office buildings to hotels to condominiums to mixed-use buildings, and explains how different patterns of use and types of tenancy impact building security and life safety. - Differentiates security and fire life safety issues specific to: Office towers; Hotels; Residential and apartment buildings; Mixed-use buildings - Updated fire and life safety standards and guidelines - Includes a CD-ROM with electronic versions of sample survey checklists, a sample building emergency management plan, and other security and fire life safety resources
    More Information
  18. Posted

    Blockchain-Enabled Fog and Edge Computing

    Blockchain-Enabled Fog and Edge Computing

    Concepts, Architectures and Applications

    by Muhammad Maaz Rehan, Mubashir Husain Rehmani

    Publisher CRC Press
    Published Date 2022-04
    Page Count 302
    Categories Computers / General, Computers / Computer Architecture, Computers / Programming / Games, Computers / System Administration / Storage & Retrieval, Computers / Information Technology, Computers / Networking / General, Computers / Software Development & Engineering / General, Computers / Computer Engineering, Computers / Internet / Web Browsers, Computers / Distributed Systems / Cloud Computing, Mathematics / General, Technology & Engineering / Electrical, Technology & Engineering / Environmental / General, Technology & Engineering / Mobile & Wireless Communications
    Language EN
    Average Rating N/A (based on N/A ratings)
    Maturity Rating No Mature Content Detected
    ISBN 0367507447
    Book Cover

    This comprehensive book unveils the working relationship of blockchain and the fog/edge computing. The contents of the book have been designed in such a way that the reader will not only understand blockchain and fog/edge computing but will also understand their co-existence and their collaborative power to solve a range of versatile problems.

    The first part of the book covers fundamental concepts and the applications of blockchain-enabled fog and edge computing. These include: Internet of Things, Tactile Internet, Smart City; and E-challan in the Internet of Vehicles. The second part of the book covers security and privacy related issues of blockchain-enabled fog and edge computing. These include, hardware primitive based Physical Unclonable Functions; Secure Management Systems; security of Edge and Cloud in the presence of blockchain; secure storage in fog using blockchain; and using differential privacy for edge-based Smart Grid over blockchain.

    This book is written for students, computer scientists, researchers and developers, who wish to work in the domain of blockchain and fog/edge computing. One of the unique features of this book is highlighting the issues, challenges, and future research directions associated with Blockchain-enabled fog and edge computing paradigm. We hope the readers will consider this book a valuable addition in the domain of Blockchain and fog/edge computing.

    More Information
  19. Posted

    Architecting for Scale

    Architecting for Scale

    High Availability for Your Growing Applications

    by Lee Atchison

    Publisher "O'Reilly Media, Inc."
    Published Date 2016-07-11
    Page Count 230
    Categories Computers / Computer Architecture, Computers / System Administration / Backup & Recovery, Computers / Distributed Systems / General, Computers / Internet / Web Programming, Computers / System Administration / General
    Language EN
    Average Rating N/A (based on N/A ratings)
    Maturity Rating No Mature Content Detected
    ISBN 1491943424
    Book Cover

    Every day, companies struggle to scale critical applications. As traffic volume and data demands increase, these applications become more complicated and brittle, exposing risks and compromising availability. This practical guide shows IT, devops, and system reliability managers how to prevent an application from becoming slow, inconsistent, or downright unavailable as it grows.

    Scaling isn’t just about handling more users; it’s also about managing risk and ensuring availability. Author Lee Atchison provides basic techniques for building applications that can handle huge quantities of traffic, data, and demand without affecting the quality your customers expect.

    In five parts, this book explores:

    • Availability: learn techniques for building highly available applications, and for tracking and improving availability going forward
    • Risk management: identify, mitigate, and manage risks in your application, test your recovery/disaster plans, and build out systems that contain fewer risks
    • Services and microservices: understand the value of services for building complicated applications that need to operate at higher scale
    • Scaling applications: assign services to specific teams, label the criticalness of each service, and devise failure scenarios and recovery plans
    • Cloud services: understand the structure of cloud-based services, resource allocation, and service distribution

    More Information
  20. Posted

    Securing the Cloud

    Securing the Cloud

    Security Strategies for the Ubiquitous Data Center

    by Curtis Franklin Jr., Curtis Franklin Jr, Brian Chee

    Publisher Auerbach Publishers, Incorporated
    Published Date 2023-01-21
    Page Count 254
    Categories Business & Economics / Production & Operations Management, Computers / Computer Literacy, Computers / Computer Science, Computers / Data Science / General, Computers / Information Technology, Computers / Machine Theory, Computers / Networking / General, Computers / Security / General, Computers / Internet / General, Law / Computer & Internet, Technology & Engineering / Engineering (General)
    Language EN
    Average Rating N/A (based on N/A ratings)
    Maturity Rating No Mature Content Detected
    ISBN 1032475714
    Book Cover

    This book provides solutions for securing important data stored in something as nebulous sounding as a cloud. A primer on the concepts behind security and the cloud, it explains where and how to store data and what should be avoided at all costs. It presents the views and insight of the leading experts on the state of cloud computing security and its future. It also provides no-nonsense info on cloud security technologies and models.

    Securing the Cloud: Security Strategies for the Ubiquitous Data Center takes the position that cloud security is an extension of recognized, established security principles into cloud-based deployments. It explores how those principles can be put into practice to protect cloud-based infrastructure and data, traditional infrastructure, and hybrid architectures combining cloud and on-premises infrastructure.

    Cloud computing is evolving so rapidly that regulations and technology have not necessarily been able to keep pace. IT professionals are frequently left to force fit pre-existing solutions onto new infrastructure and architectures for which they may be very poor fits. This book looks at how those "square peg/round hole" solutions are implemented and explains ways in which the pegs, the holes, or both may be adjusted for a more perfect fit.

    More Information
  21. Posted

    Cloud Security And Privacy

    Cloud Security And Privacy

    by Tim Mather

    Publisher Shroff Publishers & Distributors
    Published Date 2009
    Page Count N/A
    Categories Cloud computing
    Language EN
    Average Rating N/A (based on N/A ratings)
    Maturity Rating No Mature Content Detected
    ISBN 8184048157
    You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure.
    More Information
  22. Posted

    Aws

    Aws

    The Complete Beginner to Advanced Guide for Amazon Web Service - The Ultimate Tutorial

    by Richard Connor

    Publisher Independently Published
    Published Date 2019-12-03
    Page Count 136
    Categories Computers / Database Administration & Management, Computers / Internet / Web Services & APIs, Computers / Distributed Systems / Cloud Computing
    Language EN
    Average Rating N/A (based on N/A ratings)
    Maturity Rating No Mature Content Detected
    ISBN 1671143914
    Book Cover Unleash the full potential of your applications and services and take your business to the next level with this definitive guide to AWS, the world's number one cloud platform!

    Do you own a business and want to focus on your products and services without relying on an IT team or built our tech infrastructure systems? Do you want to learn how you can harness the power of cloud computing in your apps, but don't know where to begin?

    If you answered yes to any of these questions, then keep reading.

    Cloud computing has completely changed the way software is developed and delivered to end-users, and Amazon Web Services is at the forefront of this transformation.

    In this guide, you're going to be taken by the hand and shown everything you need to know about AWS and cloud computing. You'll discover everything you need to build and manage massively scalable, fault-tolerant applications with AWS range of powerful, cloud-based tools without having to deal with the headache of owning and managing tech infrastructures.

    In AWS: The Complete Beginner to Advanced Guide for Amazon Web Services, you're going to discover:

    • All you need to know about cloud computing and how it really works
    • The 4 types of cloud servers available to developers and business services
    • How to securely deploy and effectively manage your applications and services with AWS tools
    • Setting up your servers and launching instances with Amazon EC2
    • Effectively managing clusters of data in Amazon S3 and the concept of data "buckets"
    • Balancing traffic to your servers and preventing overload on any server with Elastic Load Balancing (ELB)
    • Providing content and services at high speed and low costs using Amazon CloudFront service
    • Setting up a cloud-aware DNS service with Amazon Route 53
    • Monitoring your applications and infrastructure with AWS CloudWatch
    • ...and much, much more!

    Whether you're completely new to the world of cloud computing and are looking to get started on the AWS cloud platform, or a seasoned IT professional or system administrator that wants to stay relevant in the tech industry, this book provides a way to quickly get up to speed with AWS.

    Scroll to the top of the page and click the "Buy Now" button to get started today!

    More Information
  23. Posted

    VCA-DCV Official Cert Guide

    VCA-DCV Official Cert Guide

    by Matthew Vandenbeld, Jonathan McDonald

    Publisher Pearson Education
    Published Date 2014
    Page Count 176
    Categories Cloud computing
    Language EN
    Average Rating N/A (based on N/A ratings)
    Maturity Rating No Mature Content Detected
    ISBN 0133854493
    Book Cover Trust the Official Cert Guide series from VMware Press to help you learn, prepare, and practice for exam success. They are the only VMware-authorized self-study books and are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam. Master VMware certification exam topics Assess your knowledge with chapter-opening quizzes Review key concepts with exam preparation tasks Reinforce your learning with web-based practice exams An excellent "fundamentals" book on vSphere The Official VCA-DCV Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. The Official VCA-DCV Certification Guide focuses specifically on the objectives for the VCA-DCV, the VMware Certified Associate on Data Center Virtualization exam (VCAD510). Experts Matt Vandenbeld and Jonathan MacDonald share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. Well regarded for its level of detail, assessment features, comprehensive design scenarios, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time. The official study guide helps you master all the topics on the VCA-DCV exam, including the following: Datacenter virtualization: What is it and what are the components? Business challenges solved by virtualization Core components of vSphere: the virtual machine, ESXI, high availability vSphere storage, including physical versus virtual, storage types, thin provisioning, and more vSphere networking fundamentals, physical versus virtual switches, components, policies, I/O Mapping business challenges to vSphere solutions The Official VCA-DCV Certification Guide is part of a recommended learning path from VMware that includes simulation and hands-on training from authorized VMware instructors and self-study products from VMware Press. To find out more about ...
    More Information
  24. Posted

    Emerging Internet-Based Technologies

    Emerging Internet-Based Technologies

    by Matthew N. O. Sadiku

    Publisher CRC Press
    Published Date 2019
    Page Count 129
    Categories Computers / General, Computers / Database Administration & Management, Computers / Networking / General, Computers / Internet / General, Education / Teaching / General, Education / Computers & Technology, Technology & Engineering / Electrical, Technology & Engineering / Telecommunications
    Language EN
    Average Rating N/A (based on N/A ratings)
    Maturity Rating No Mature Content Detected
    ISBN 0367030292
    Book Cover

    The author of this book has identified the seven key emerging Internet-related technologies: Internet of things, smart everything, big data, cloud computing, cybersecurity, software-defined networking, and online education. Together these technologies are transformational and disruptive. This book provides researchers, students, and professionals a comprehensive introduction, applications, benefits, and challenges for each technology. It presents the impact of these cutting-edge technologies on our global economy and its future. The word "technology" refers to "collection of techniques, skills, methods, and processes used in the production of goods or services."

    More Information
  25. Posted

    Automating Microsoft Azure Infrastructure Services

    Automating Microsoft Azure Infrastructure Services

    From the Data Center to the Cloud with PowerShell

    by Michael Washam

    Publisher "O'Reilly Media, Inc."
    Published Date 2014-10-21
    Page Count 178
    Categories Computers / Operating Systems / Windows Desktop, Computers / Operating Systems / Windows Server, Computers / Programming / Microsoft, Computers / Internet / General, Computers / Distributed Systems / Cloud Computing
    Language EN
    Average Rating N/A (based on N/A ratings)
    Maturity Rating No Mature Content Detected
    ISBN 1491944870
    Book Cover

    Get valuable tips and techniques for automating your cloud deployments with Azure PowerShell cmdlets, and learn how to provision Azure services on the fly. In this hands-on guide, Microsoft cloud technology expert Michael Washam shows you how to automate various management tasks and deploy solutions that are both complex and at scale.

    By combining the native automation capabilities of PowerShell with Azure Infrastructure Services, these powerful cmdlets enable you to create and configure virtual machines with ease. You’ll learn how to take advantage of these technologies to build complete virtual networks. If you have experience with PowerShell and Azure, you’re ready to get started.

    • Install and authenticate cmdlets to set up your environment
    • Create and update virtual machines with Azure platform images
    • Manage network endpoints, access control lists, and IP addresses
    • Use cmdlets to manage and configure virtual machine storage
    • Automate Azure virtual networks with hybrid technologies such as site-to-site, point-to-site, and ExpressRoute
    • Dive into advanced virtual machine provisioning capabilities and management techniques
    • Learn tips and tricks for deleting or moving virtual machines within (or out of) your subscription
    More Information

Important Information

Terms of Use Privacy Policy Guidelines We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.