Jump to content

Jessica Brown

Administrators
  • Joined

  • Last visited

Everything posted by Jessica Brown

  1. In today’s digital landscape, the role of a System Administrator (SysAdmin) extends far beyond server uptime and software updates. With cyber threats evolving daily, understanding key information security standards like ISO/IEC 27001:2022 is no longer optional, it’s essential. This international standard provides a robust framework for establishing, implementing, maintaining, and continuously improving an Information Security Management System (ISMS). For SysAdmins, mastering ISO/IEC 27001 isn’t just about compliance; it’s about safeguarding critical infrastructure, protecting sensitive data, and enhancing organizational resilience. What is ISO/IEC 27001:2022?ISO/IEC 27001:2022 is the latest revision of the globally recognized standard for information security management systems. It outlines best practices for managing information security risks, ensuring the confidentiality, integrity, and availability of data. This version revises: ISO/IEC 27001:2013 ISO/IEC 27001:2013/Cor1:2014 ISO/IEC 27001:2013/Cor2:2015 While the core principles remain, the 2022 update refines requirements to address the evolving cybersecurity landscape, making it even more relevant for today’s IT environments. Why Should SysAdmins Care?Proactive Risk Management ISO/IEC 27001 equips SysAdmins with a structured approach to identifying, assessing, and mitigating risks. Instead of reacting to security incidents, you’ll have a proactive framework to prevent them. Enhanced Security Posture Implementing ISO/IEC 27001 controls helps strengthen the organization’s overall security, from server configurations to user access management. Compliance and Legal Requirements Many industries, especially those handling sensitive data (e.g., healthcare, finance), require compliance with ISO/IEC 27001. Understanding the standard ensures your systems meet these legal and regulatory demands. Career Advancement Knowledge of ISO/IEC 27001 is highly valued in the IT industry. It demonstrates a commitment to best practices and can open doors to higher-level roles in security and compliance. How Does ISO/IEC 27001 Integrate with Other Standards?ISO/IEC 27001 isn’t a standalone standard. It’s part of a broader ecosystem of ISO standards that address various aspects of information security, risk management, and quality control. Here are some key packages where ISO/IEC 27001 is bundled with other complementary standards: Information Technology - Security Techniques Package ISO 27799 / ISO/IEC 27001 / ISO/IEC 27002 - Protected Health Information Security Management Package ISO 31000 / ISO/IEC 27001 / ISO/IEC 27002 - Information Technology Risk Management Package ISO 9001 / ISO 14001 / ISO/IEC 27001 / ISO 31000 / ISO 55001 / ISO 22301 - ISO Requirements Collection ISO/IEC 20000-1 / ISO/IEC 27001 / ISO 9001 - Information Technology Quality Management Package ISO/IEC 27000 Information Technology Security Techniques Collection ISO/IEC 27001 / 27002 / 27005 / 27006 - IT Security Techniques Package ISO/IEC 27001 / ISO 9001 - Information Technology Quality Management Set ISO/IEC 27001 / ISO/IEC 27002 / ISO/IEC 27005 - Information and Cybersecurity Package ISO/IEC 27001 / ISO/IEC 27002 / ISO/IEC 27017 - IT Security Control Code of Practice Package ISO/IEC 27001 / ISO/IEC 27005 - Information Security Management and Risk Set ISO/IEC 27001 / ISO/IEC 27018 / BS 10012 - General Data Protection Regulation Package ISO/IEC 27001 and 27002 IT Security Techniques Package ISO/IEC 27007 / ISO/IEC 27009 / ISO/IEC 27014 / ISO/IEC 27001 - Cybersecurity And Privacy Protection Package ISO/IEC 27018 / ISO/IEC 29100 / ISO/IEC 27001 - Public Clouds Privacy Framework Package ISO/IEC 27701 / ISO/IEC 27001 / ISO/IEC 27002 - IT Security Techniques Privacy Information Package ISO/IEC 27701 / ISO/IEC 27001 / ISO/IEC 27002 / ISO/IEC 29100 - IT Privacy Information System Package ISO/IEC 30100 / ISO/IEC 27001 - IT Home Network Security Management Package IT Identity Theft Security Techniques Package Understanding these related standards provides a more comprehensive view of information security and IT management, allowing SysAdmins to implement more holistic security strategies. Real-World Applications for SysAdminsAccess Control Management ISO/IEC 27001 outlines best practices for managing user access, ensuring that only authorized personnel have access to sensitive information. Incident Response Planning The standard emphasizes the importance of having a structured incident response plan, which is critical for minimizing the impact of security breaches. Data Encryption and Protection It provides guidelines on data encryption, secure data storage, and transmission, all of which are crucial responsibilities for SysAdmins. Continuous Monitoring and Improvement ISO/IEC 27001 promotes a cycle of continuous monitoring, auditing, and improvement, essential for maintaining robust security over time. Where to Get ISO/IEC 27001:2022For those interested in diving deeper into ISO/IEC 27001:2022, the official standard is available for purchase. Get the standard here to start enhancing your organization’s security posture today. Join the DiscussionHow has your organization implemented ISO/IEC 27001? What challenges have you faced in aligning with this standard? Share your experiences and join the conversation on our forum. By understanding and applying ISO/IEC 27001:2022, SysAdmins can play a pivotal role in strengthening their organization’s information security framework, ensuring both compliance and resilience in an increasingly complex digital world.
  2. 📌 Project Name: Ventoy 🔗 URL: https://github.com/ventoy/Ventoy 📝 Description: A new bootable USB solution. ⭐ Stars: 64513 🛠 Language: C Ventoy is an open source tool to create bootable USB drive for ISO/WIM/IMG/VHD(x)/EFI files. With ventoy, you don't need to format the disk over and over, you just need to copy the image files to the USB drive and boot it. You can copy many image files at a time and ventoy will give you a boot menu to select them. You can also browse ISO/WIM/IMG/VHD(x)/EFI files in local disk and boot them. x86 Legacy BIOS, IA32 UEFI, x86_64 UEFI, ARM64 UEFI and MIPS64EL UEFI are supported in the same way. Both MBR and GPT partition style are supported in the same way. Most type of OS supported(Windows/WinPE/Linux/Unix/ChromeOS/Vmware/Xen...) 1200+ ISO files are tested (List). 90%+ distros in distrowatch.com supported (Details). Official Website: https://www.ventoy.net
  3. Recently, in a forum I frequent, there was a discussion where developers were considering adding CDNs to their software. This idea immediately raised red flags for me, and as I dug deeper into the topic, it reinforced my opposition to using CDNs in production environments. The inherent risk of allowing a production website to send data out over port 80 (HTTP) or port 443 (HTTPS) goes beyond just external dependencies. The most important thing to remember is: Every external connection is a potential vulnerability. While CDNs are often marketed as a way to improve speed and reduce latency, they introduce a third-party dependency that can compromise the security, reliability, and compliance of your application. The main reasons this is inheritably important are Supply Chain Attacks: If the CDN you're relying on is ever compromised, malicious code could be injected into your site without your knowledge. You’re essentially placing trust in an external provider to secure part of your application. Data Leakage Risks: Outbound connections can unintentionally leak metadata or sensitive information, even if the content seems harmless (e.g., user agent data, headers, etc.). Compliance Issues: For businesses bound by PCI-DSS, ISO 27001, or similar standards, minimizing unnecessary external connections is not just a recommendation—it’s often a requirement. Service Reliability: Even the most trusted platforms like Amazon, Microsoft, and Cloudflare have experienced outages. Depending on a CDN for critical assets introduces a single point of failure outside of your control. Full Control & Consistency: Hosting assets locally ensures you have full control over versions, performance, and updates, reducing risks associated with external changes. If you’re unsure whether your production server is sending outbound traffic (potentially to a CDN), here’s a simple way to verify this using tcpdump: sudo tcpdump -i $(ip a | awk '/state UP/ {print $2}' | sed 's/://') 'tcp and (dst port 80 or dst port 443) and outbound' A breakdown of this command to understand what it does: sudo tcpdump Captures network packets. -i $(ip a | awk '/state UP/ {print $2}' | sed 's/://') Automatically selects the active network interface. 'tcp and (dst port 80 or dst port 443) and outbound' Filters the capture to show only outbound HTTP/HTTPS traffic. If you see any results from this command, it means your server is actively trying to reach out to external sources on ports 80 or 443. While CDNs might offer convenience for development or staging environments, production servers should be treated with zero-trust principles. The safest, most reliable practice is to host all critical assets locally and restrict outbound traffic unless absolutely necessary. I’d love to hear how others in the community approach this, especially if you manage environments where security and compliance are top priorities.
  4. 📌 Project Name: tensorflow 🔗 URL: https://github.com/tensorflow/tensorflow 📝 Description: An Open Source Machine Learning Framework for Everyone ⭐ Stars: 187749 🛠 Language: C++ 🤖 AI Summary: TensorFlow is an open-source machine learning framework that aims to provide developers, researchers, and businesses with an accessible platform capable of building and deploying machine learning models. Created by the Google Brain team, TensorFlow supports various types of complex computations and has a flexible architecture, allowing users to deploy computation on one or more CPUs or GPUs across multiple platforms, such as mobile devices, workstations, and servers. The main purpose of TensorFlow is to simplify the process of implementing machine learning algorithms, making it efficient and easier to use for everyone, from students to large scale enterprises. It has comprehensive potential, enabling the creation of sophisticated deep learning models as well as standard classic machine learning algorithms. One of the significant features of TensorFlow is its high-level APIs like Keras, which facilitate the development of machine learning models for both researchers and developers. TensorFlow also supports multiplicity in languages; it has APIs for Python, JavaScript, C++, Java, Swift and more. Moreover, TensorFlow has also been instrumental in progressing research in machine learning, thanks to its scalability and adaptability. It plays a significant role in the development of artificial intelligence technologies and is widely used globally both in academia and industry.
  5. Artificial Cognitive Systems /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Artificial Cognitive Systems A Primer by David Vernon Publisher MIT Press Published Date 2014-10-17 Page Count 288 Categories Science / Cognitive Science, Computers / Artificial Intelligence / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0262028387 A concise introduction to a complex field, bringing together recent work in cognitive science and cognitive robotics to offer a solid grounding on key issues.This book offers a concise and accessible introduction to the emerging field of artificial cognitive systems. Cognition, both natural and artificial, is about anticipating the need for action and developing the capacity to predict the outcome of those actions. Drawing on artificial intelligence, developmental psychology, and cognitive neuroscience, the field of artificial cognitive systems has as its ultimate goal the creation of computer-based systems that can interact with humans and serve society in a variety of ways. This primer brings together recent work in cognitive science and cognitive robotics to offer readers a solid grounding on key issues. The book first develops a working definition of cognitive systems—broad enough to encompass multiple views of the subject and deep enough to help in the formulation of theories and models. It surveys the cognitivist, emergent, and hybrid paradigms of cognitive science and discusses cognitive architectures derived from them. It then turns to the key issues, with chapters devoted to autonomy, embodiment, learning and development, memory and prospection, knowledge and representation, and social cognition. Ideas are introduced in an intuitive, natural order, with an emphasis on the relationships among ideas and building to an overview of the field. The main text is straightforward and succinct; sidenotes drill deeper on specific topics and provide contextual links to further reading. More Information
  6. Location-Based Mobile GamesDesign Perspectivesby Davide Spallazzo, Ilaria Mariani Publisher Springer Published Date 2018-02-21 Page Count 98 Categories Computers / Programming / Games, Computers / User Interfaces, Technology & Engineering / Engineering (General), Computers / Interactive & Multimedia, Computers / Information Technology, Computers / Artificial Intelligence / General, Computers / Design, Graphics & Media / Graphics Tools Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 3319752561 This book approaches Location Based Mobile Games from a design perspective, investigating the peculiar traits that make them compelling contemporary practices and challenging fields of investigation. Relying on an interdisciplinary theoretical background and empirical studies, it delves into LBMGs’ intertwining theoretical assumptions and describes their translation into practice. The authors examine these games from different perspectives, exploring how they can impact the way we look at our surroundings, their influence on our social dimension, their ability to translate a wide range of information into a game experience, and the negotiations they activate by intertwining two realities. Each issue is addressed from a twofold perspective: that of the designers who craft the games, and that of the users who interpret the designers’ choices and take part in the game experience. In so doing, the book covers the relationship between processes of designing and playing, investigating games that communicate through meaningful interactions, share perspectives as forms of narratives, and integrate physicality and surroundings in the play activity. The reasoning advanced throughout the chapters will benefit researchers, designers and entrepreneurs in the field, as it provides a novel perspective on LBMGs, seeks to increase designers’ awareness of often-neglected issues, and suggests interpretations and practices that can impact how commercial games are designed. More Information
  7. Rebel Code /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Rebel Code Linux and the Open Source Revolution by Glyn Moody Publisher Allen Lane Published Date 2001 Page Count 334 Categories Business & Economics / General, Computers / Operating Systems / General, Computers / Operating Systems / Windows Desktop, Computers / Operating Systems / Linux Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0713995203 In this age of new technology start-ups, LINUX is impressive, but it might seem like just another business success story. What makes this story strange - and deeply troubling for the business world - is that LINUX is free. Not only is it free, but anyone can adapt it in any way they wish, as long as they pass it on to new users on the same terms. And far from being an isolated case, it is one of dozens of software projects round the world that have ignored or postponed commercial concerns to concentrate on writing the perfect code and have dedicated themselves to the principles of free and open development. For years they have been dismissed as irrelevant idealists. Yet already, more than any government or corporation, these fluidly organized and highly efficient teams of "amateurs" have defended and entrenched the open standards on which the Internet depends. More Information
  8. BPF Performance Tools /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } BPF Performance Tools Linux System and Application Observability by Brendan Gregg Publisher Addison-Wesley Published Date 2020 Page Count 880 Categories Computers / Operating Systems / Linux, Technology & Engineering / Chemical & Biochemical Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0136554822 BPF and related observability tools give software professionals and students alike unprecedented visibility into software, helping them analyze operating system and application performance, troubleshoot code, and strengthen security. BPF Performance Tools: Linux System and Application Observability is the industry's most comprehensive guide to using these tools for observability. Brendan Gregg, author of the industry's definitive guide to system performance, introduces powerful new methods and tools for doing analysis that leads to more robust, reliable, and safer code. This authoritative guide: Explores a wide spectrum of software and hardware targets Thoroughly covers open source BPF tools from the Linux Foundation iovisor project's bcc and bpftrace repositories Summarizes performance engineering and kernel internals you need to understand Provides and discusses 150+ bpftrace tools, including 80 written specifically for this book: tools you can run as-is, without programming - or customize and develop further, using diverse interfaces and the bpftrace front-end Students will learn how to use BPF (eBPF) tracing tools to analyze CPUs, memory, disks, file systems, networking, languages, applications, containers, hypervisors, security, and the Linux kernel. Students will move from basic to advanced tools and techniques, producing new metrics, stack traces, custom latency histograms, and more. It's like having a superpower: with Gregg's guidance and tools, students can analyze virtually everything that impacts system performance, so they can improve virtually any Linux operating system or application. Deeper, more in-depth coverage than any other eBPF resource Quickly analyze everything that impacts Linux system performance: ask questions and get fast answers in production environments Learn by example, with tools you can use to find performance wins and then customize for even more power Covers invaluable, in-demand technology: eBPF was the subject of over two dozen talks at the recent Linux Plumbers developer's conference Downloadable source code includes 80+ new BPF analysis tools created for this book Use BPF/eBPF tracing and observability tools to improve system performance, reduce costs, resolve software issues, and gain unprecedented visibility into running systems Deeper, more in-depth coverage than any other eBPF resource Quickly analyze everything that impacts Linux system performance: ask questions and get fast answers in production environments Learn by example, with tools you can use to find performance wins and then customize for even more power Covers invaluable, in-demand technology: eBPF was the subject of over two dozen talks at the recent Linux Plumbers developer's conference Downloadable source code includes 80+ new BPF analysis tools created for this book More Information
  9. Modern Principles, Practices, and Algorithms for Cloud Security /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Modern Principles, Practices, and Algorithms for Cloud Security by Brij Gupta Publisher IGI Global Published Date 2019 Page Count 368 Categories Computers / General, Computers / Networking / General, Computers / Security / General, Computers / Internet / General, Computers / Distributed Systems / Cloud Computing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1799810836 In today's modern age of information, new technologies are quickly emerging and being deployed into the field of information technology. Cloud computing is a tool that has proven to be a versatile piece of software within IT. Unfortunately, the high usage of Cloud has raised many concerns related to privacy, security, and data protection that have prevented cloud computing solutions from becoming the prevalent alternative for mission critical systems. Up-to-date research and current techniques are needed to help solve these vulnerabilities in cloud computing. Modern Principles, Practices, and Algorithms for Cloud Security is a pivotal reference source that provides vital research on the application of privacy and security in cloud computing. While highlighting topics such as chaos theory, soft computing, and cloud forensics, this publication explores present techniques and methodologies, as well as current trends in cloud protection. This book is ideally designed for IT specialists, scientists, software developers, security analysts, computer engineers, academicians, researchers, and students seeking current research on the defense of cloud services. More Information
  10. 📌 Project Name: the-book-of-secret-knowledge 🔗 URL: https://github.com/trimstray/the-book-of-secret-knowledge 📝 Description: A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more. ⭐ Stars: 157011 🛠 Language: Unknown 🤖 AI Summary: The project "the-book-of-secret-knowledge" is a comprehensive compendium of helpful resources for individuals particularly interested in technology and programming. The purpose of this project is to provide an easily accessible, centralized source of information that includes lists, manuals, cheatsheets, blogs, hacks, one-liners, and various cli/web tools. Its significance lies in its ability to provide a wealth of information to users, ranging from amateurs to seasoned professionals. This project allows users to enhance their knowledge, improve their skills, and get inspired by unique and efficient solutions. Whether you're debugging an issue, learning a new programming language, or looking for some technological inspiration, "the-book-of-secret-knowledge" serves as a one-stop resource to supplement technical competence and stimulate creativity.
  11. 📌 Project Name: the-art-of-command-line 🔗 URL: https://github.com/jlevy/the-art-of-command-line 📝 Description: Master the command line, in one page ⭐ Stars: 154524 🛠 Language: Unknown 🤖 AI Summary: The-art-of-command-line is a comprehensive open-source project aimed at assisting its users to master using the command line, essentially a direct way to interact with a computer system. The project provides a wide range of tips, techniques, and best practices in a concise one-page format, making it ideal for beginners seeking to learn and professionals looking to brush up their command line skills. The significance of this project lies in the fact that understanding and effectively using the command line is crucial for software development, system administration and data management tasks. Its significance is heightened due to its open-source nature, allowing users from around the globe to contribute and hence improve the value it's providing, making it a continually evolving and efficient learning tool.
  12. Artificial intelligence - When do machines take over? /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Artificial intelligence - When do machines take over? by Klaus Mainzer Publisher Springer Nature Published Date 2019-10-14 Page Count 279 Categories Technology & Engineering / General, Technology & Engineering / Engineering (General), Computers / Artificial Intelligence / General, Science / General, Technology & Engineering / Reference Language EN Average Rating 5 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 3662597179 Everybody knows them. Smartphones that talk to us, wristwatches that record our health data, workflows that organize themselves automatically, cars, airplanes and drones that control themselves, traffic and energy systems with autonomous logistics or robots that explore distant planets are technical examples of a networked world of intelligent systems. Machine learning is dramatically changing our civilization. We rely more and more on efficient algorithms, because otherwise we will not be able to cope with the complexity of our civilizing infrastructure. But how secure are AI algorithms? This challenge is taken up in the 2nd edition: Complex neural networks are fed and trained with huge amounts of data (big data). The number of necessary parameters explodes exponentially. Nobody knows exactly what is going on in these "black boxes". In machine learning we need more explainability and accountability of causes and effects in order to be able to decide ethical and legal questions of responsibility (e.g. in autonomous driving or medicine)! Besides causal learning, we also analyze procedures of tests and verification to get certified AI-programs. Since its inception, AI research has been associated with great visions of the future of mankind. It is already a key technology that will decide the global competition of social systems. "Artificial Intelligence and Responsibility" is another central supplement to the 2nd edition: How should we secure our individual liberty rights in the AI world? This book is a plea for technology design: AI must prove itself as a service in society. More Information
  13. Terminator 3: Terminator Dreams /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Terminator 3: Terminator Dreams by Aaron Allston Publisher Macmillan Published Date 2003-12-19 Page Count 352 Categories Fiction / Media Tie-In, Fiction / Science Fiction / General, Fiction / Science Fiction / Apocalyptic & Post-Apocalyptic Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0765308525 Despite the heroic efforts of John Connor and Kate Webster, and the ultimate sacrifice of a T-850 terminator, Skynet became operational and mobilized its machine forces in all-out war against its prime enemy: mankind. More than twenty years later the war continues, fought by human resistance forces led by John and Kate, and by people in secret enclaves around the world. Raiding machine facilities, using small guerrilla forces to sabotage and destroy Skynet forces, the resistance is holding its own . . . but it's not enough. The self-aware AI that controls the robot terminators, the hunter-killers, and the rest of what used to be America's arsenal is too smart, too quick, too flexible to be defeated. Or perhaps the answer to human victory lies shrouded behind the mists of time. Before Judgment Day, Danny Avila was a programmer on the project that became Skynet. In the months leading up to Judgment Day he began to have nightmares involving Terminators rampaging and destroying the world. Then, two days before the holocaust, he disappeared. Found years later by John and Kate, completely amnesiac about events of his life prior to Judgment Day, he became a useful member of the resistance, with an uncanny ability to predict Skynet tactics. Now he is having Terminator dreams again, dreams of the days when he was on the Terminator design team . . . of the days when the world was on the path to destruction. Could there be some kind of psychic link between the Danny of today and the Danny of nearly thirty years ago---a mental "wire" through which thoughts and images are transmitted forward and backward in time? Might this one desperately stressed man living in two eras be the time machine the resistance needs to undo the devastation of Judgment Day? A daring and dangerous experiment may prove the salvation of mankind's future . . . More Information
  14. Artificial Beings /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Artificial Beings The Conscience of a Conscious Machine by Jacques Pitrat Publisher Wiley Published Date 2009-06-15 Page Count 276 Categories Computers / Artificial Intelligence / General, Technology & Engineering / Electrical, Technology & Engineering / Electronics / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1848211015 It is almost universally agreed that consciousness and possession of a conscience are essential characteristics of human intelligence. While some believe it to be impossible to create artificial beings possessing these traits, and conclude that ultimate major goal of Artificial Intelligence is hopeless, this book demonstrates that not only is it possible to create entities with capabilities in both areas, but that they demonstrate them in ways different from our own, thereby showing a new kind of consciousness. This latter characteristic affords such entities performance beyond the reach of humans, not for lack of intelligence, but because human intelligence depends on networks of neurons which impose processing restrictions which do not apply to computers. At the beginning of the investigation of the creation of an artificial being, the main goal was not to study the possibility of whether a conscious machine would possess a conscience. However, experimental data indicate that many characteristics implemented to improve efficiency in such systems are linked to these capacities. This implies that when they are present it is because they are essential to the desired performance improvement. Moreover, since the goal is not to imitate human behavior, some of these structural characteristics are different from those displayed by the neurons of the human brain - suggesting that we are at the threshold of a new scientific field, artificial cognition, which formalizes methods for giving cognitive capabilities to artificial entities through the full use of the computational power of machines. More Information
  15. The Girl Who Lived Twice /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Girl Who Lived Twice A Lisbeth Salander Novel, Continuing Stieg Larsson's Millennium Series by David Lagercrantz Publisher Penguin Canada Published Date 2019-08-27 Page Count 368 Categories Fiction / Mystery & Detective / General, Fiction / Mystery & Detective / Women Sleuths, Fiction / Mystery & Detective / International Crime & Mystery, Fiction / Thrillers / Suspense, Fiction / Thrillers / General, Fiction / Thrillers / Crime, Fiction / Crime, Fiction / City Life Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0735233012 New York Times Bestseller National Bestseller The sixth DRAGON TATTOO story--more than 90 million copies sold worldwide--the crime-fiction phenomenon featuring Lisbeth Salander. Book four in the series, The Girl in the Spider's Web, is now a major film from Sony Pictures starring Claire Foy--out in November 2018. Rest easy, Lisbeth Salander fans--our punk hacker heroine is in good hands. --Patrick Ryan, USA Today Salander and Blomkvist are just as compelling as ever. --Michiko Kakutani, The New York Times Not only do the matter-of-fact style and intricate plotting and sexy, chilling atmosphere feel very true to the original novels, but Lagercrantz transcends the source material. --Benjamin Percy, Esquire Elegantly paced, slickly executed, and properly thrilling. --Alison Flood, The Observer More Information
  16. The Moon Is a Harsh Mistress /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Moon Is a Harsh Mistress by Robert A. Heinlein Publisher Macmillan Published Date 1997-06-15 Page Count 382 Categories Fiction / Science Fiction / General, Fiction / Science Fiction / Action & Adventure Language EN Average Rating 4 (based on 8 ratings) Maturity Rating No Mature Content Detected ISBN 0312863551 Robert A. Heinlein was the most influential science fiction writer of his era, an influence so large that, as Samuel R. Delany notes, "modern critics attempting to wrestle with that influence find themselves dealing with an object rather like the sky or an ocean." He won the Hugo Award for best novel four times, a record that still stands. The Moon is a Harsh Mistress was the last of these Hugo-winning novels, and it is widely considered his finest work. It is a tale of revolution, of the rebellion of the former Lunar penal colony against the Lunar Authority that controls it from Earth. It is the tale of the disparate people--a computer technician, a vigorous young female agitator, and an elderly academic--who become the rebel movement's leaders. And it is the story of Mike, the supercomputer whose sentience is known only to this inner circle, and who for reasons of his own is committed to the revolution's ultimate success. The Moon is a Harsh Mistress is one of the high points of modern science fiction, a novel bursting with politics, humanity, passion, innovative technical speculation, and a firm belief in the pursuit of human freedom. The Moon is a Harsh Mistress is the winner of the 1967 Hugo Award for Best Novel. More Information
  17. Deep Learning in Natural Language Processing /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Deep Learning in Natural Language Processing by Li Deng, Yang Liu Publisher Springer Published Date 2018-05-23 Page Count 329 Categories Computers / Artificial Intelligence / General, Computers / Speech & Audio Processing, Computers / Mathematical & Statistical Software, Computers / Information Technology, Computers / Artificial Intelligence / Natural Language Processing, Mathematics / Discrete Mathematics Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 9811052093 In recent years, deep learning has fundamentally changed the landscapes of a number of areas in artificial intelligence, including speech, vision, natural language, robotics, and game playing. In particular, the striking success of deep learning in a wide variety of natural language processing (NLP) applications has served as a benchmark for the advances in one of the most important tasks in artificial intelligence. This book reviews the state of the art of deep learning research and its successful applications to major NLP tasks, including speech recognition and understanding, dialogue systems, lexical analysis, parsing, knowledge graphs, machine translation, question answering, sentiment analysis, social computing, and natural language generation from images. Outlining and analyzing various research frontiers of NLP in the deep learning era, it features self-contained, comprehensive chapters written by leading researchers in the field. A glossary of technical terms and commonly used acronyms in the intersection of deep learning and NLP is also provided. The book appeals to advanced undergraduate and graduate students, post-doctoral researchers, lecturers and industrial researchers, as well as anyone interested in deep learning and natural language processing. More Information
  18. Almost Human /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Almost Human Making Robots Think by Lee Gutkind Publisher W. W. Norton & Company Published Date 2006 Page Count 284 Categories Computers / Artificial Intelligence / General, Science / General, Technology & Engineering / General, Technology & Engineering / Electronics / General, Technology & Engineering / Robotics Language EN Average Rating 3 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 0393058670 A remarkable, intense portrait of the robotic subculture and the challenging quest for robot autonomy. The high bay at the Robotics Institute at Carnegie Mellon University is alive and hyper night and day with the likes of Hyperion, which traversed the Antarctic, and Zoe, the world’s first robot scientist, now back home. Robot Segways learn to play soccer, while other robots go on treasure hunts or are destined for hospitals and museums. Dozens of cavorting mechanical creatures, along with tangles of wire, tools, and computer innards are scattered haphazardly. All of these zipping and zooming gizmos are controlled by disheveled young men sitting on the floor, folding chairs, or tool cases, or huddled over laptops squinting into displays with manic intensity. Award-winning author Lee Gutkind immersed himself in this frenzied subculture, following these young roboticists and their bold conceptual machines from Pittsburgh to NASA and to the most barren and arid desert on earth. He makes intelligible their discoveries and stumbling points in this lively behind-the-scenes work. More Information
  19. Artificial Intelligence /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Artificial Intelligence A New Synthesis by Nils J. Nilsson Publisher Morgan Kaufmann Published Date 1998 Page Count 513 Categories Computers / Artificial Intelligence / General, Computers / Artificial Intelligence / Expert Systems Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1558605355 Intelligent agents are employed as the central characters in this introductory text. Beginning with elementary reactive agents, Nilsson gradually increases their cognitive horsepower to illustrate the most important and lasting ideas in AI. Neural networks, genetic programming, computer vision, heuristic search, knowledge representation and reasoning, Bayes networks, planning, and language understanding are each revealed through the growing capabilities of these agents. A distinguishing feature of this text is in its evolutionary approach to the study of AI. This book provides a refreshing and motivating synthesis of the field by one of AI's master expositors and leading researches. More Information
  20. Mechanical Bodies, Computational Minds /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Mechanical Bodies, Computational Minds Artificial Intelligence from Automata to Cyborgs by Stefano Franchi, Güven Güzeldere Publisher MIT Press Published Date 2005 Page Count 538 Categories Computers / Artificial Intelligence / General, Computers / Computer Science, Philosophy / Mind & Body, Psychology / Cognitive Psychology & Cognition Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0262562065 Believing that the enterprise of constructing "artificial intelligence" transcends the bounds of any one discipline, the editors of Mechanical Bodies, Computational Minds have brought together researchers in AI and scholars in the humanities to reexamine the fundamental assumptions of both areas. The AI community, for example, could benefit from explorations of human intelligence and creativity by philosophers, psychologists, anthropologists, literary critics, and others, while analysis of AI's theoretical struggles and technical advances could yield insights into such traditional humanist concerns as the nature of rationality and the mind-body dichotomy.The contributions include a continuation of the famous Hubert Dreyfus-Daniel Dennett debate over Kasparov's defeat by IBM's Deep Blue; Philip Agre's tracing of difficulties in AI research to the inherited tensions of Cartesian dualism; Evelyn Fox Keller's examination of the development of computer technology in relation to biology; Douglas Hofstadter's argument that thinking is more than the theorem-solving activities of AI; and Alison Adam's discussion of the implicitly male universal subject used in AI. More Information
  21. Autonomous Robots and Agents /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Autonomous Robots and Agents by Gourab Sen Gupta Publisher Springer Published Date 2007-08-14 Page Count 267 Categories Technology & Engineering / Robotics, Technology & Engineering / Engineering (General), Computers / Artificial Intelligence / General, Technology & Engineering / Manufacturing, Mathematics / Applied Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 3540734244 Robots and autonomous agents have permeated every aspect of human life. They are not only omnipresent on the shop floors; they have pervaded our homes and are around us everywhere. Design methodologies and implementation techniques of intelligent machines are making progress in leaps and bounds. Smart interaction, cooperation, and pro-activeness are the hallmarks of modern intelligent machines. This book deals with the theoretical and methodological aspects of incorporating intelligence in "Autonomous Robots and Agents". Challenges faced in the real world to accomplish complex tasks, which require collaborative efforts, and methods to overcome them, are detailed. Several informative articles deal with navigation, localization and mapping of mobile robots, a problem that engineers and researchers are grappling with all the time. This edited volume is targeted to present the latest state-of-the-art methodologies in Robotics. It is a compilation of the extended versions of the very best papers selected from the many that were presented at the 3rd International Conference on Autonomous Robots and Agents (ICARA 2006) which was held at Palmerston North, New Zealand from 11-14 December, 2006. Scientists and engineers who work with mobile robots will find this book very useful and stimulating. More Information
  22. Tell Me a Story /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Tell Me a Story Narrative and Intelligence by Roger C. Schank Publisher Northwestern University Press Published Date 1995 Page Count 253 Categories Computers / Artificial Intelligence / General, Literary Criticism / Semiotics & Theory, Psychology / Cognitive Psychology & Cognition Language EN Average Rating 4 (based on 2 ratings) Maturity Rating No Mature Content Detected ISBN 0810113139 How are our memories, our narratives, and our intelligence interrelated? What can artificial intelligence and narratology say to each other? In this pathbreaking study by an expert on learning and computers, Roger C. Schank argues that artificial intelligence must be based on real human intelligence, which consists largely of applying old situations - and our narratives of them - to new situations in less than obvious ways. To design smart machines, Schank therefore investigated how people use narratives and stories, the nature and function of those narratives, and the connection of intelligence to both telling and listening. As Schank explains, "We need to tell someone else a story that describes our experiences because the process of creating the story also creates the memory structure that will contain the gist of the story for the rest of our lives. Talking is remembering". This first paperback edition includes an illuminating foreword by Gary Saul Morson. More Information
  23. Flex & Bison /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Flex & Bison Text Processing Tools by John Levine Publisher "O'Reilly Media, Inc." Published Date 2009-08-05 Page Count 292 Categories Computers / General, Computers / Programming / Compilers, Computers / Operating Systems / General, Computers / Operating Systems / UNIX, Computers / Operating Systems / Linux, Computers / Programming / General, Computers / Languages / JavaScript, Computers / Business & Productivity Software / Word Processing Language EN Average Rating 5 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 1449391974 If you need to parse or process text data in Linux or Unix, this useful book explains how to use flex and bison to solve your problems quickly. flex & bison is the long-awaited sequel to the classic O'Reilly book, lex & yacc. In the nearly two decades since the original book was published, the flex and bison utilities have proven to be more reliable and more powerful than the original Unix tools. flex & bison covers the same core functionality vital to Linux and Unix program development, along with several important new topics. You'll find revised tutorials for novices and references for advanced users, as well as an explanation of each utility's basic usage and simple, standalone applications you can create with them. With flex & bison, you'll discover the wide range of uses these flexible tools offer. Address syntax crunching that regular expressions tools can't handleBuild compilers and interpreters, and handle a wide range of text processing functionsInterpret code, configuration files, or any other structured formatLearn key programming techniques, including abstract syntax trees and symbol tablesImplement a full SQL grammar-with complete sample codeUse new features such as pure (reentrant) lexers and parsers, powerful GLR parsers, and interfaces to C++ More Information
  24. Jessica Brown posted a post in a topic in Linux
    Managing RAID on Linux /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Managing RAID on Linux by Derek Vadala Publisher "O'Reilly Media, Inc." Published Date 2003 Page Count 245 Categories Computers / General, Computers / Computer Science, Computers / Operating Systems / UNIX, Computers / Operating Systems / Windows Desktop, Computers / Operating Systems / Linux, Computers / Operating Systems / Mainframe & Midrange Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1565927303 Redundant Array of Independent Disks (RAID) technology is becoming a standard feature of computer systems that support mission-critical services like file sharing, mail exchange, or Web servers. RAID offers two benefits to these essential systems: improved I/O performance and fail-safe data storage. Although bandwidth problems on networks are well documented, the internal data transfer bottleneck that exists at the hardware level in each system can also leave you with perplexing performance issues. RAID is a cost-effective and easy-to-manage way to alleviate this bandwidth problem by distributing the I/O load seamlessly across multiple disks and controllers. RAID also provides uninterrupted data access through disk mirroring and parity algorithms. That means systems can remain online even during a disk or controller failure. RAID is scalable, making it robust enough for large, high-traffic sites and small, critical systems. By using RAID, system administrators can combine single disks into terabytes worth of data storage. Managing RAID on Linux covers everything system administrators need to know to put together a system that can support RAID. You will learn about the different types of RAID, along with associated technologies and issues, and how to choose the best RAID system for your needs. With a step-by-step, hands-on approach, the author guides you through the installation of either Linux software RAID or a hardware RAID card. The book shows how to build an array and optionally install a high-performance file system. Contents include: An introduction to RAID and Linux Planning and architecture of your RAID system Building a software RAID Software RAID tools and references Building a hardware RAID Performance and tuning of your RAID system RAID has become the low-cost solution of choice to deal with the ever-increasing demand for data storage space. Written for system administrators, power users, tech managers, and anyone who wants to learn about RAID technology, Managing RAID on Linux sidesteps the often-confusing vendor-specific approach you'll find elsewhere to give you the straight story on RAID. Even non-Linux users will find this book full of valuable material. More Information
  25. Learning Red Hat Enterprise Linux and Fedora /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Learning Red Hat Enterprise Linux and Fedora by Bill McCarty Publisher "O'Reilly Media, Inc." Published Date 2004 Page Count 326 Categories Computers / General, Computers / Computer Science, Computers / Information Technology, Computers / Operating Systems / General, Computers / Operating Systems / Linux, Computers / Programming / General, Computers / Languages / General, Computers / Software Development & Engineering / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 059600589X The GNU/Linux(R) success story is well known. Firmly established as a high-performance operating system, its worldwide installations are increasing at phenomenal rates. Much of this success has been on the server side, but more and more PC users are turning to Linux on the desktop, as well. For those grounded in Microsoft Windows(R) or Apple Macintosh(R) graphical interfaces, the first look at a powerful Unix-style operating system can be daunting. This book provides a clear, no-nonsense introduction to the popular Red Hat(R) distribution of Linux. It takes you through installation and shows you the key parts of the system, always with an eye toward what can go wrong and what you need to know to get over the humps. Linux is known as a secure environment and a good platform to run a web server. These topics are among the many covered in this book. But did you know you can also burn CDs, sync a PalmPilot(TM), and edit slideshow presentations with powerful tools on Linux? Those topics are covered here, too. Red Hat currently provides two distributions, both documented in this book. The first is their commercial, subscription-based product, called Red Hat Enterprise Linux and also available through retail channels as Red Hat Professional Workstation. The second is the freely distributed Fedora distribution. The Publisher's Edition of Fedora is included in this book on two disks. New in this edition are installation instructions for Red Hat Enterprise Linux and Fedora, package updating for Red Hat Enterprise Linux and Fedora, information on the GRUB bootloader, and the CUPS printer system. Learning Red Hat Enterprise Linux and Fedora tells you how to: Prepare your system for installing Linux Install and configure Linux and the two popular desktop environments, GNOME and KDE. Run the most popular productivity tools on Linux: mailers, web browsers, OpenOffice, and Evolution. Obtain and set up software through the Red Hat Package Manager (RPM) Set up a Linux system for networking, either on your local area network (LAN), or via a dialup connection to the Internet. Use the system-administration tools included with Red Hat, GNOME, and KDE, including such valuable utilities as Samba file-sharing and the Apache web server. Understand and write shell scripts so you can peek under the hood and extend the power of Linux. More Information

Important Information

Terms of Use Privacy Policy Guidelines We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.