Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Fairness is an increasingly important topic as machine learning and AI more generally take over the world. While this is an active area of research, many realistic best practices are emerging at all steps along the data pipeline, from data selection and preprocessing to blackbox model audits. This book will guide you through the technical, legal, and ethical aspects of making your code fair and secure while highlighting cutting edge academic research and ongoing legal developments related to fairness and algorithms.There is mounting evidence that the widespread deployment of machine learning and artificial intelligence in business and government is reproducing the same biases we are trying to fight in the real world. For this reason, fairness is an increasingly important consideration for the data scientist. Yet discussions of what fairness means in terms of actual code are few and far between. This code will show you how to code fairly as well as cover basic concerns related to data security and privacy from a fairness perspective.
Software development today is embracing events and streaming data, which optimizes not only how technology interacts but also how businesses integrate with one another to meet customer needs. This phenomenon, called flow, consists of patterns and standards that determine which activity and related data is communicated between parties over the internet.This book explores critical implications of that evolution: What happens when events and data streams help you discover new activity sources to enhance existing businesses or drive new markets? What technologies and architectural patterns can position your company for opportunities enabled by flow? James Urquhart, global field CTO at VMware, guides enterprise architects, software developers, and product managers through the process.Learn the benefits of flow dynamics when businesses, governments, and other institutions integrate via events and data streamsUnderstand the value chain for flow integration through Wardley mapping visualization and promise theory modelingWalk through basic concepts behind today's event-driven systems marketplaceLearn how today's integration patterns will influence the real-time events flow in the futureExplore why companies should architect and build software today to take advantage of flow in coming years
While several market-leading companies have successfully transformed their business models by following data- and AI-driven paths, the vast majority have yet to reap the benefits. How can your business and analytics units gain a competitive advantage by capturing the full potential of this predictive revolution? This practical guide presents a battle-tested end-to-end method to help you translate business decisions into tractable prescriptive solutions using data and AI as fundamental inputs.Author Daniel Vaughan shows data scientists, analytics practitioners, and others interested in using AI to transform their businesses not only how to ask the right questions but also how to generate value using modern AI technologies and decision-making principles. Youll explore several use cases common to many enterprises, complete with examples you can apply when working to solve your own issues.Break business decisions into stages that can be tackled using different skills from the analytical toolboxIdentify and embrace uncertainty in decision making and protect against common human biasesCustomize optimal decisions to different customers using predictive and prescriptive methods and technologiesAsk business questions that create high value through AI- and data-driven technologies
Authors Alex Soto Bueno and Jason Porter from Red Hat provide detailed solutions for installing, interacting with, and using Quarkus in the development and production of microservices. The recipes in this book show midlevel to senior developers familiar with Java enterprise application development how to get started with Quarkus quickly.
Organizations today often struggle to balance business requirements with ever-increasing volumes of data. Additionally, the demand for leveraging large-scale, real-time data is growing rapidly among the most competitive digital industries. Conventional system architectures may not be up to the task. With this practical guide, youll learn how to leverage large-scale data usage across the business units in your organization using the principles of event-driven microservices.Author Adam Bellemare takes you through the process of building an event-driven microservice-powered organization. Youll reconsider how data is produced, accessed, and propagated across your organization. Learn powerful yet simple patterns for unlocking the value of this data. Incorporate event-driven design and architectural principles into your own systems. And completely rethink how your organization delivers value by unlocking near-real-time access to data at scale.Youll learn:How to leverage event-driven architectures to deliver exceptional business valueThe role of microservices in supporting event-driven designsArchitectural patterns to ensure success both within and between teams in your organizationApplication patterns for developing powerful event-driven microservicesComponents and tooling required to get your microservice ecosystem off the ground
Companies are spending billions on machine learning projects, but its money wasted if the models cant be deployed effectively. In this practical guide, Hannes Hapke and Catherine Nelson walk you through the steps of automating a machine learning pipeline using the TensorFlow ecosystem. Youll learn the techniques and tools that will cut deployment time from days to minutes, so that you can focus on developing new models rather than maintaining legacy systems.Data scientists, machine learning engineers, and DevOps engineers will discover how to go beyond model development to successfully productize their data science projects, while managers will better understand the role they play in helping to accelerate these projects.Understand the steps to build a machine learning pipelineBuild your pipeline using components from TensorFlow ExtendedOrchestrate your machine learning pipeline with Apache Beam, Apache Airflow, and Kubeflow PipelinesWork with data using TensorFlow Data Validation and TensorFlow TransformAnalyze a model in detail using TensorFlow Model AnalysisExamine fairness and bias in your model performanceDeploy models with TensorFlow Serving or TensorFlow Lite for mobile devicesLearn privacy-preserving machine learning techniques
Climate change is an urgent threat but if we makers act now, we can still make a difference at both micro and macro levels. Our cover story, the kickoff to a series that will run through 2020, gives a big-picture look at what steps we can take to arrest climate change. Hint: It starts by electrifying everything!Then, we look at some tasty tech with the story of a seriously impressive cheeseburger-making robot, recipes to cook delicious insects, and instructions to build a Raspberry Pi-powered cocktail dispenser for your next BBQ or robot-themed party.Plus, 21 projects to make, including:Hack the Sonos-Ikea Symfonisk to make high-quality, networked bookshelf speakers on a budgetBuild the world's newest, simplest siege weapon, the Walking Arm TrebuchetFold and fly the Guinness World Record paper airplaneMake a jig for quick, easy, and beautiful box jointsOur best-yet DIY coffee bean roasterAnd much more!
Every day, companies struggle to scale critical applications. As traffic volume and data demands increase, these applications become more complicated and brittle, exposing risks and compromising availability. With the popularity of software as a service, scaling has never been more important.Updated with an expanded focus on modern architecture paradigms such as microservices and cloud computing, this practical guide provides techniques for building systems that can handle huge quantities of traffic, data, and demandwithout affecting the quality your customers expect. Architects, managers, and directors in engineering and operations organizations will learn how to build applications at scale that run more smoothly and reliably to meet the needs of customers.Learn how scaling affects the availability of your services, why that matters, and how to improve itDive into a modern service-based application architecture that ensures high availability and reduces the effects of service failuresExplore the Single Team Owned Service Architecture paradigm (STOSA)a model for scaling your development organization in tandem with your applicationUnderstand, measure, and mitigate risk in your systemsUse the cloud to build highly scalable applications
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lackinguntil now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply.Andrew Hoffman, a senior security engineer at Salesforce, introduces three pillars of web application security: recon, offense, and defense. Youll learn methods for effectively researching and analyzing modern web applicationsincluding those you dont have direct access to. Youll also learn how to break into web applications using the latest hacking techniques. Finally, youll learn how to develop mitigations for use in your own web applications to protect against hackers.Explore common vulnerabilities plaguing today's web applicationsLearn essential hacking techniques attackers use to exploit applicationsMap and document web applications for which you dont have direct accessDevelop and deploy customized exploits that can bypass common defensesDevelop and deploy mitigations to protect your applications against hackersIntegrate secure coding best practices into your development lifecycleGet practical tips to help you improve the overall security of your web applications
Java continues to grow and evolve, and this cookbook continues to evolve in tandem. With this guide, youll get up to speed right away with hundreds of hands-on recipes across a broad range of Java topics. Youll learn useful techniques for everything from string handling and functional programming to network communication.Each recipe includes self-contained code solutions that you can freely use, along with a discussion of how and why they work. If youre familiar with Java basics, this cookbook will bolster your knowledge of the language and its many recent changes, including how to apply them in your day-to-day development. This updated edition covers changes through Java 12 and parts of 13 and 14.Recipes include:Methods for compiling, running, and debuggingPackaging Java classes and building applicationsManipulating, comparing, and rearranging textRegular expressions for string and pattern matchingHandling numbers, dates, and timesStructuring data with collections, arrays, and other typesObject-oriented and functional programming techniquesInput/output, directory, and filesystem operationsNetwork programming on both client and serverProcessing JSON for data interchangeMultithreading and concurrencyUsing Java in big data applicationsInterfacing Java with other languages
Threat modeling is one of the most essential--and most misunderstood--parts of the development lifecycle. Whether you're a security practitioner or a member of a development team, this book will help you gain a better understanding of how you can apply core threat modeling concepts to your practice to protect your systems against threats.Contrary to popular belief, threat modeling doesn't require advanced security knowledge to initiate or a Herculean effort to sustain. But it is critical for spotting and addressing potential concerns in a cost-effective way before the code's written--and before it's too late to find a solution. Authors Izar Tarandach and Matthew Coles walk you through various ways to approach and execute threat modeling in your organization.Explore fundamental properties and mechanisms for securing data and system functionalityUnderstand the relationship between security, privacy, and safetyIdentify key characteristics for assessing system securityGet an in-depth review of popular and specialized techniques for modeling and analyzing your systemsView the future of threat modeling and Agile development methodologies, including DevOps automationFind answers to frequently asked questions, including how to avoid common threat modeling pitfalls
Make: magazine is back in action and back to our original size! This issue's cover project is a maker's take on a Boston Dynamics-style quadrupedal walking robot that you can build yourself. Then, build an adorable unicorn shaped dispenser that spits soap on command. And to celebrate Make's return, why not build a custom dancing version of our Makey mascot.Plus, 28 projects including:Teeny-tiny personal motorboatStandup paddle boardBird-identifying computer-vision birdhouseBackyard bicycle pump trackAnd much more!
Building a culture is just like hacking your way to a successful product. This practical book provides building blocks, practical tips, and inspiring stories from some of the most successful companies in the world to highlight the power of connecting with your customers.
To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. But how do you know if the deployment is secure? This practical book examines key underlying technologies to help developers, operators, and security professionals assess security risks and determine appropriate solutions.Author Liz Rice, VP of open source engineering at Aqua Security, looks at how the building blocks commonly used in container-based systems are constructed in Linux. Youll understand whats happening when you deploy containers and learn how to assess potential security risks that could affect your deployments. If you run container applications with kubectl or docker and use Linux command-line tools such as ps and grep, youre ready to get started.Explore attack vectors that affect container deploymentsDive into the Linux constructs that underpin containersExamine measures for hardening containersUnderstand how misconfigurations can compromise container isolationLearn best practices for building container imagesIdentify container images that have known software vulnerabilitiesLeverage secure connections between containersUse security tooling to prevent attacks on your deployment
This practical, user-friendly reference book of common mechanical engineering concepts is geared (no pun intended) toward makers who don't have (or want) an engineering degree but need to know the essentials of basic mechanical elements to successfully accomplish their personal projects.
Coding and testing are generally considered separate areas of expertise. In this practical book, Java expert Scott Oaks takes the approach that anyone who works with Java should be adept at understanding how code behaves in the Java Virtual Machineincluding the tunings likely to help performance. This updated second edition helps you gain in-depth knowledge of Java application performance using both the JVM and the Java platform.Developers and performance engineers alike will learn a variety of features, tools, and processes for improving the way the Java 8 and 11 LTS releases perform. While the emphasis is on production-supported releases and features, this book also features previews of exciting new technologies such as ahead-of-time compilation and experimental garbage collections.Understand how various Java platforms and compilers affect performanceLearn how Java garbage collection worksApply four principles to obtain best results from performance testingUse the JDK and other tools to learn how a Java application is performingMinimize the garbage collectors impact through tuning and programming practicesTackle performance issues in Java APIsImprove Java-driven database application performance
Give users the real-time experience they expect, by using Elixir and Phoenix Channels to build applications that instantly react to changes and reflect the application's true state. Learn how Elixir and Phoenix make it easy and enjoyable to create real-time applications that scale to a large number of users.
Learn the skills necessary to design, build, and deploy applications powered by machine learning (ML). Through the course of this hands-on book, youll build an example ML-driven application from initial idea to deployed product. Data scientists, software engineers, and product managersincluding experienced practitioners and novices alikewill learn the tools, best practices, and challenges involved in building a real-world ML application step by step.Author Emmanuel Ameisen, an experienced data scientist who led an AI education program, demonstrates practical ML concepts using code snippets, illustrations, screenshots, and interviews with industry leaders. Part I teaches you how to plan an ML application and measure success. Part II explains how to build a working ML model. Part III demonstrates ways to improve the model until it fulfills your original vision. Part IV covers deployment and monitoring strategies.This book will help you:Define your product goal and set up a machine learning problemBuild your first end-to-end pipeline quickly and acquire an initial datasetTrain and evaluate your ML models and address performance bottlenecksDeploy and monitor your models in a production environment
There's never been a better time to be an amateur space explorer! From high school programs designed to send real student-led experiments to the International Space Station, to building a working VTVL (vertical take off, vertical landing) model rocket like the one from SpaceX, this issue is packed full of projects with actual space applications. And if a space aesthetic is more to your liking for your earthly abode, we've got a giant light-up full moon to hang on your wall and desktop orreries to simulate the movement of the planets around the sun.Plus 38 more great projects:Program a bot that points to the ISS when overheadLearn to laser-cut EVA foam to customize any cosplay creationBuild a light-up acrylic rainbow that changes colors to tell the weatherMake a cardboard camera that uses sun prints for filmAnd much more!
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best practices to help your organization design scalable and reliable systems that are fundamentally secure.Two previous OReilly books from GoogleSite Reliability Engineering and The Site Reliability Workbookdemonstrated how and why a commitment to the entire service lifecycle enables organizations to successfully build, deploy, monitor, and maintain software systems. In this latest guide, the authors offer insights into system design, implementation, and maintenance from practitioners who specialize in security and reliability. They also discuss how building and adopting their recommended best practices requires a culture thats supportive of such change.Youll learn about secure and reliable systems through:Design strategiesRecommendations for coding, testing, and debugging practicesStrategies to prepare for, respond to, and recover from incidentsCultural best practices that help teams across your organization collaborate effectively
Many companies move workloads to the cloud only to encounter issues with legacy processes and organizational structures. How do you design new operating models for this environment? This practical book shows IT managers, CIOs, and CTOs how to address the hardest part of any cloud transformation: the people and the processes.
Graph data closes the gap between the way humans and computers view the world. While computers rely on static rows and columns of data, people navigate and reason about life through relationships. This practical guide demonstrates how graph data brings these two approaches together.
In this issue of Make: we break down the latest trends in the world of microcontrollers and single board computers with the latest from Arduino, Google, Particle, and more. You'll also learn how FPGAs will change the way you prototype with our skill builder on using these ultra-configurable devices. And don't miss the 2019 edition of the "Make: Guide to Boards" special pullout -- compare specs for more than 70 boards to find the perfect one for any endeavor!Plus, 23 projects:Build a mesh-networked mob of R/C car swarmbotsAdd a full-sheet vertical Maslow CNC to even the tightest shopGet nonstop running water at the beach for boats, castles, and water fightsPersonalize a crafty glass block as a night light or custom giftAnd more!
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.