Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
AI for Everyone?
We are entering a new era of technological determinism and solutionism in which governments and business actors are seeking data-driven change, assuming that Artificial Intelligence is now inevitable and ubiquitous. But we have not even started asking the right questions, let alone developed an understanding of the consequences. Urgently needed is ...
Evaluating Environment in International Development
This book provides novel and in-depth perspectives on evaluating environment and sustainability issues in developing countries. Evaluating Environment in International Development focuses on the approaches and experiences of leading international organizations, not-for-profits, and multilateral and bilateral aid agencies to illustrate how systemati...
Application Delivery and Load Balancing in Microsoft Azure
With more and more companies moving on-premises applications to the cloud, software and cloud solution architects alike are busy investigating ways to improve load balancing, performance, security, and high availability for workloads. This practical book describes Microsoft Azure's load balancing options and explains how NGINX can contribute t...
A Common Good Approach to Development
This edited collection proposes a common good approach to development theory and practice. Rather than focusing on the outcomes or conditions of development, the contributors concentrate on the quality of development processes, suggesting that a common good dynamic is key in order to trigger development. Resulting from more than three years of r...
New Global Cities in Latin America and Asia
New Global Cities in Latin America and Asia: Welcome to the Twenty-First Century proposes new visions of global cities and regions historically considered "secondary" in the international context. The arguments are not only based on material progress made by these metropolises, but also on the growing social difficulties experienced (e.g....
Shaping the Digital Dissertation
Digital dissertations have been a part of academic research for years now, yet there are still many questions surrounding their processes. Are interactive dissertations significantly different from their paper-based counterparts? What are the effects of digital projects on doctoral education? How does one choose and defend a digital dissertation? T...
Algorithms for Decision Making
A broad introduction to algorithms for decision making under uncertainty, introducing the underlying mathematical problem formulations and the algorithms for solving them. Automated decision-making systems or decision-support systems - used in applications that range from aircraft collision avoidance to breast cancer screening - must be designed...
Managing Kubernetes Traffic with F5 NGINX
Microservices architectures introduce several benefits to the application development and delivery process. Microservices-based apps are easier to build, test, maintain, and scale. They also reduce downtime through better fault isolation. While container-based microservices apps have profoundly changed the way DevOps teams deploy applications, t...
Container Networking
When you start building your first containerized application, you're excited about the capabilities and opportunities you encounter: it runs the same in dev and in prod, it's straightforward to put together a container image using Docker, and the distribution is taken care of by a container registry. So, you're satisfied with how ...
Public Policy
What is the most pressing problem facing the American public today? Is it immigration reform, health care costs, the student debt crisis, stagnating wages, or a budget deficit reaching into the trillions? How about climate change or the threat of plastic pollution in the ocean? What about gun violence and gun rights? The problems facing the U.S. ar...
Security as Code
DevOps engineers, developers, and security engineers have ever-changing roles to play in today's cloud native world. In order to build secure and resilient applications, you have to be equipped with security knowledge. Enter security as code. In this book, authors BK Sarthak Das and Virginia Chu demonstrate how to use this methodology to se...

1 ... 6 7 8