top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Blockchain, Artificial Intelligence, and the Internet of Things : Possibilities and Opportunities
Blockchain, Artificial Intelligence, and the Internet of Things : Possibilities and Opportunities
Autore Raj Pethuru
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2021
Descrizione fisica 1 online resource (218 pages)
Altri autori (Persone) DubeyAshutosh Kumar
KumarAbhishek
RathorePramod Singh
Collana EAI/Springer Innovations in Communication and Computing Ser.
Soggetto genere / forma Electronic books.
ISBN 9783030776374
9783030776367
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910510565503321
Raj Pethuru  
Cham : , : Springer International Publishing AG, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cloud enterprise architecture / / Pethuru Raj
Cloud enterprise architecture / / Pethuru Raj
Autore Raj Pethuru
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton, Fla. : , : CRC Press, , 2013
Descrizione fisica 1 online resource (511 p.)
Disciplina 004.67/82
004.6782
Soggetto topico Cloud computing
Software architecture
Computer software - Development
Soggetto genere / forma Electronic books.
ISBN 1-4665-8907-8
0-429-06717-8
1-4665-0233-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Foreword; Preface; Acknowledgments; Author; CEA Book Audience and Key Takeaways; Chapter 1 - Cloud-Enabled Smart Enterprises!; Chapter 2 - Cloud-Inspired Enterprise Transformations!; Chapter 3 - Cloud-Instigated IT Transformations!; Chapter 4 - Cloud EA: Frameworks and Platforms; Chapter 5 - Cloud Application Architecture; Chapter 6 - Cloud Data Architecture; Chapter 7 - Cloud Technology Architecture; Chapter 8 - Cloud Integration Architecture; Chapter 9 - Cloud Management Architecture; Chapter 10 - Cloud Security Architecture (CSA)
Chapter 11 - Cloud Governance ArchitectureChapter 12 - Cloud Onboarding Best Practices; Back Cover
Record Nr. UNINA-9910462548503321
Raj Pethuru  
Boca Raton, Fla. : , : CRC Press, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cloud enterprise architecture / / Pethuru Raj
Cloud enterprise architecture / / Pethuru Raj
Autore Raj Pethuru
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton, Fla. : , : CRC Press, , 2013
Descrizione fisica 1 online resource (511 p.)
Disciplina 004.67/82
004.6782
Soggetto topico Cloud computing
Software architecture
Computer software - Development
ISBN 1-138-37465-2
1-4665-8907-8
0-429-06717-8
1-4665-0233-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Foreword; Preface; Acknowledgments; Author; CEA Book Audience and Key Takeaways; Chapter 1 - Cloud-Enabled Smart Enterprises!; Chapter 2 - Cloud-Inspired Enterprise Transformations!; Chapter 3 - Cloud-Instigated IT Transformations!; Chapter 4 - Cloud EA: Frameworks and Platforms; Chapter 5 - Cloud Application Architecture; Chapter 6 - Cloud Data Architecture; Chapter 7 - Cloud Technology Architecture; Chapter 8 - Cloud Integration Architecture; Chapter 9 - Cloud Management Architecture; Chapter 10 - Cloud Security Architecture (CSA)
Chapter 11 - Cloud Governance ArchitectureChapter 12 - Cloud Onboarding Best Practices; Back Cover
Record Nr. UNINA-9910785715603321
Raj Pethuru  
Boca Raton, Fla. : , : CRC Press, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cloud enterprise architecture / / Pethuru Raj
Cloud enterprise architecture / / Pethuru Raj
Autore Raj Pethuru
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton, Fla. : , : CRC Press, , 2013
Descrizione fisica 1 online resource (511 p.)
Disciplina 004.67/82
004.6782
Soggetto topico Cloud computing
Software architecture
Computer software - Development
ISBN 1-138-37465-2
1-4665-8907-8
0-429-06717-8
1-4665-0233-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Foreword; Preface; Acknowledgments; Author; CEA Book Audience and Key Takeaways; Chapter 1 - Cloud-Enabled Smart Enterprises!; Chapter 2 - Cloud-Inspired Enterprise Transformations!; Chapter 3 - Cloud-Instigated IT Transformations!; Chapter 4 - Cloud EA: Frameworks and Platforms; Chapter 5 - Cloud Application Architecture; Chapter 6 - Cloud Data Architecture; Chapter 7 - Cloud Technology Architecture; Chapter 8 - Cloud Integration Architecture; Chapter 9 - Cloud Management Architecture; Chapter 10 - Cloud Security Architecture (CSA)
Chapter 11 - Cloud Governance ArchitectureChapter 12 - Cloud Onboarding Best Practices; Back Cover
Record Nr. UNINA-9910800034703321
Raj Pethuru  
Boca Raton, Fla. : , : CRC Press, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cloud enterprise architecture / / Pethuru Raj
Cloud enterprise architecture / / Pethuru Raj
Autore Raj Pethuru
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton, Fla. : , : CRC Press, , 2013
Descrizione fisica 1 online resource (511 p.)
Disciplina 004.67/82
004.6782
Soggetto topico Cloud computing
Software architecture
Computer software - Development
ISBN 1-138-37465-2
1-4665-8907-8
0-429-06717-8
1-4665-0233-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Foreword; Preface; Acknowledgments; Author; CEA Book Audience and Key Takeaways; Chapter 1 - Cloud-Enabled Smart Enterprises!; Chapter 2 - Cloud-Inspired Enterprise Transformations!; Chapter 3 - Cloud-Instigated IT Transformations!; Chapter 4 - Cloud EA: Frameworks and Platforms; Chapter 5 - Cloud Application Architecture; Chapter 6 - Cloud Data Architecture; Chapter 7 - Cloud Technology Architecture; Chapter 8 - Cloud Integration Architecture; Chapter 9 - Cloud Management Architecture; Chapter 10 - Cloud Security Architecture (CSA)
Chapter 11 - Cloud Governance ArchitectureChapter 12 - Cloud Onboarding Best Practices; Back Cover
Record Nr. UNINA-9910820255603321
Raj Pethuru  
Boca Raton, Fla. : , : CRC Press, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cloud-native computing : how to design, develop, and secure microservices and event-driven applications / / Pethuru Raj, Skylab Vanga and Akshita Chaudhary
Cloud-native computing : how to design, develop, and secure microservices and event-driven applications / / Pethuru Raj, Skylab Vanga and Akshita Chaudhary
Autore Raj Pethuru
Pubbl/distr/stampa Piscataway, New Jersey ; ; Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2023]
Descrizione fisica 1 online resource (354 pages)
Disciplina 005.3
Soggetto topico Application software - Development
Cloud computing
Application software
ISBN 1-119-81479-0
1-119-81477-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Copyright Page -- Contents -- About the Authors -- Preface -- Acknowledgments -- Chapter 1 The Dawning of the Digital Era -- Demystifying the Digitization Paradigm -- Delineating the Digitalization Technologies -- Trendsetting Technologies for the Digital Era -- Why Digitization Is Indispensable -- The Connectivity and Integration Options -- The Promising Digital Intelligence Methods -- The Technological Approaches Toward Smarter Environments -- Briefing the Brewing Idea of Digital Twin -- Envisioning the Digital Universe -- Cloud-Native Applications (CNAs) -- Conclusion -- References -- Chapter 2 The Cloud-Native Computing Paradigm for the Digital Era -- Introduction -- The Onset of the Digital Era -- The Maturity of Software-defined Cloud Environments -- The Hybrid Model of Microservices Architecture (MSA) and Event-driven Architecture (EDA) -- The Aspect of Containerization -- The Emergence of Container Lifecycle Management Platforms -- Tending Toward Cloud-Native Computing -- Demystifying the Cloud-Native Architecture Style -- Distinguishing Cloud-Native Infrastructure -- Cloud-Native Security -- Cloud-Native Computing Advantages -- Conclusion -- References -- Chapter 3 Kubernetes Architecture, Best Practices, and Patterns -- Introduction -- The Emergence of Containerized Applications for IT Portability -- Microservices Architecture (MSA) Applications for IT Agility and Adaptivity -- The Onset of Containerized Cloud Environments -- The Need for Container Orchestration Platform Solutions -- The Significance of Kubernetes for Cloud-Native Systems -- Kubernetes for Edge Cloud Environments -- Kubernetes for Multi-Cloud Implementations -- Delineating the Kubernetes' Master-Slave Architecture -- The Special Features of the Kubernetes Platform -- Best Practices for Efficient and Effective Kubernetes -- Kubernetes Patterns.
Conclusion -- References -- Chapter 4 The Observability, Chaos Engineering, and Remediation for Cloud-Native Reliability -- Introduction -- The Emergence of Cloud-Native Observability -- The Key Motivations for Cloud-Native Applications -- Cloud-Native Applications: The Realization Technologies -- DevOps for Cloud-Native Applications (CNAs) -- Container Orchestration Platforms -- The Cloud-Native Application Challenges [1, 2] -- Cloud-Native Resiliency -- Cloud-Native Chaos Engineering -- Cloud-Native Observability [3-5] -- Cloud-Native Observability: The Benefits -- Cloud-Native Observability for Chaos Engineering -- AIOps-Enabled Cloud-Native Observability -- Building System Resilience Through AIOps -- Cloud-Native Remediation -- Conclusion -- References -- Chapter 5 Creating Kubernetes Clusters on Private Cloud (VMware vSphere) -- Introduction -- Purpose -- Scope -- Deployment Pre-requirements -- Prerequisites -- vCenter Requirements -- Cluster Resources -- Required IP Addresses -- DNS Records -- Create Local Linux Installer VM on VMware vSphere -- Generating an SSH Private Key and Adding it to the Agent -- Create DHCP Server -- Download OpenShift Installation for vSphere -- Procedure -- Adding vCenter Root CA Certificates to your Installer VM -- Deploying the OCP Cluster on VMware vSphere -- Installing the CLI on Linux -- Uninstall OpenShift Cluster -- Considerations When you Delete OpenShift for VMware (https://cloud.ibm.com/docs/vmwaresolutions) -- Conclusion -- Further Reading -- Chapter 6 Creating Kubernetes Clusters on Public Cloud (Microsoft Azure) -- Introduction -- Prerequisites -- Configuring a Public DNS Zone in Azure -- DNS Creation -- Prerequisites -- Create a DNS Zone -- Required Azure Roles -- Creating a Service Principal -- Azure CLI Setup -- Manually Create IAM -- Start Installation of OCP -- Uninstall Cluster -- Conclusion.
Further Reading -- Chapter 7 Design, Development, and Deployment of Event-Driven Microservices Practically -- Introduction -- Technology Stack to Build Microservices -- Express Framework -- Steps to Set Up Your Project -- Blog Post Microservice -- Comments Microservice -- Implementation of Event-Driven Model -- Event Bus -- Deployment Strategies -- Conclusion -- Chapter 8 Serverless Computing for the Cloud-Native Era -- Introduction -- The Key Motivations for Serverless Computing [1, 2] -- Briefing Serverless Computing -- The Serverless Implications -- The Evolution of Serverless Computing [3, 4] -- Serverless Application Patterns -- Containers as the Function Runtime -- Serverless Computing Components [5, 6] -- Advantages of Using a Serverless Database -- Disadvantages of Using Serverless Databases -- Top Benefits of Serverless Computing -- Overcoming Serverless Obstacles -- The Future of Serverless Computing -- Conclusion -- Appendix -- Knative for Serverless Computing -- References -- Chapter 9 Instaling Knative on a Kubernetes Cluster -- Introduction -- Knative Serving Resources -- Further Reading -- Chapter 10 Delineating Cloud-Native Edge Computing -- Introduction -- Briefing Cloud-Native Computing -- Technical and Business Cases for Cloud-Native Computing [3, 4] -- The Emergence of Edge Computing -- Cloud-Native Technologies for Edge Computing -- Benefits of Bringing the Cloud-Native Principles to the Edge -- The Deployment Scenarios at the Edge -- Kubernetes Deployment Options for Edge Computing -- Cloud-Native at the Edge: The Use Cases -- Navigating Heterogeneous Environments at the Edge -- Monitoring Kubernetes-Enabled Edge Environments -- Edge Analytics for Real-Time Video Surveillance -- Describing Edge AI -- Conclusion -- References -- Chapter 11 Setting up a Kubernetes Cluster using Azure Kubernetes Service -- Introduction.
Benefits of Azure Kubernetes Service -- Purpose -- Scope -- An Introduction to Azure Kubernetes Service -- Features of Azure Kubernetes Services -- Azure Kubernetes Service Use Cases -- Common Uses for Azure Kubernetes Service -- High-Level Architecture -- Architecture Design -- Deployment Pre-Requisites -- Conclusion -- Further Reading -- Chapter 12 Reliable Cloud-Native Applications through Service Mesh -- Introduction -- Delineating the Containerization Paradigm -- Demystifying Microservices Architecture -- Decoding the Growing Role of Kubernetes for the Container Era -- Describing the Service Mesh Concept [1-3] -- Demystifying Service Mesh -- The Service Mesh Contributions -- The Leading Service Mesh Solutions -- Why Service Mesh is Paramount? -- Service Mesh Architectures -- Monitoring the Service Mesh -- Service Mesh Deployment Models -- Conclusion -- Appendix -- Deploying the Red Hat OpenShift Service Mesh Control Plane -- References -- Chapter 13 Cloud-Native Computing: The Security Challenges and the Solution Approaches -- Introduction to Cloud Capabilities -- Delineating the Cloud-Native Paradigm -- Why Cloud-Native Computing -- About Cloud-Native Applications -- Beginning of Cloud-Native Application Security -- Cloud-Native Security Challenges -- Capabilities of Cloud-Native Security Solutions -- Cloud-Native Application Security Procedures -- Securing Cloud-Native Applications -- Pillars of Cloud-Native Security -- Cloud-Native Security: Best Practices -- Kubernetes Security Best Practices -- Container Security Best Practices -- Cloud-Native Security Best Practices -- The Emergence of Cloud-Native Security Products and Platforms -- Key Properties of Cloud-Native Security Platforms -- Cloud Workload Protection Platforms -- Kubernetes Security Products -- AIOps for Cloud-Native Security -- Conclusion -- Reference.
Chapter 14 Microservices Security: The Concerns and the Solution Approaches -- Microservice Security Challenges and Concerns -- Best Practices to Secure Microservices -- How to Implement Fundamental Authentication and Authorization Strategies -- Dive Deeper into API Gateway -- APACHE APISIX -- Configuring APISIX -- Conclusion -- Further Reading -- Chapter 15 Setting Up Apache Kafka Clusters in a Cloud Environment and Secure Monitoring -- Introduction -- Introspecting Kafka -- Kafka Component Overview -- Guide to Set Up a Kafka Cluster -- Prerequisites -- Steps to Install -- Step 1: Setup virtual machines for Kafka -- Step 2: Configure Zookeeper and Kafka on both the machines -- zookeeper.service -- kafka.service -- Step 3: Test Zookeeper and Kafka installation -- Kafka Command Line Features -- Set Up Your Monitoring Tools for Your Cluster: Prometheus and Grafana -- Fetch Metrics Using Prometheus -- Install JMX Exporter Agent on Kafka broker -- Create Prometheus as a service on the Admin machine -- Visualize using Grafana -- Secure your cluster -- Encryption -- Authentication -- Authorization -- Conclusion -- Further Reading -- Chapter 16 Installing Knative Serving On EKS -- Prerequisites -- EKS Installation Procedure -- Installing Knative Serving Using YAML Files -- Prerequisites -- System Requirements -- Install the Serving component -- Verify the Installation -- Configure DNS -- Install kn Using a Binary -- Install kn Using Go -- Sample Application -- Creating Your Deployment with the Knative CLI -- Interacting with Your App -- Index -- EULA.
Record Nr. UNINA-9910830945803321
Raj Pethuru  
Piscataway, New Jersey ; ; Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cloud-Native Computing : How to Design, Develop, and Secure Microservices and Event-Driven Applications
Cloud-Native Computing : How to Design, Develop, and Secure Microservices and Event-Driven Applications
Autore Raj Pethuru
Pubbl/distr/stampa Newark : , : John Wiley & Sons, Incorporated, , 2022
Descrizione fisica 1 online resource (354 pages)
Altri autori (Persone) VangaSkylab
ChaudharyAkshita
ISBN 1-119-81479-0
1-119-81477-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Copyright Page -- Contents -- About the Authors -- Preface -- Acknowledgments -- Chapter 1 The Dawning of the Digital Era -- Demystifying the Digitization Paradigm -- Delineating the Digitalization Technologies -- Trendsetting Technologies for the Digital Era -- Why Digitization Is Indispensable -- The Connectivity and Integration Options -- The Promising Digital Intelligence Methods -- The Technological Approaches Toward Smarter Environments -- Briefing the Brewing Idea of Digital Twin -- Envisioning the Digital Universe -- Cloud-Native Applications (CNAs) -- Conclusion -- References -- Chapter 2 The Cloud-Native Computing Paradigm for the Digital Era -- Introduction -- The Onset of the Digital Era -- The Maturity of Software-defined Cloud Environments -- The Hybrid Model of Microservices Architecture (MSA) and Event-driven Architecture (EDA) -- The Aspect of Containerization -- The Emergence of Container Lifecycle Management Platforms -- Tending Toward Cloud-Native Computing -- Demystifying the Cloud-Native Architecture Style -- Distinguishing Cloud-Native Infrastructure -- Cloud-Native Security -- Cloud-Native Computing Advantages -- Conclusion -- References -- Chapter 3 Kubernetes Architecture, Best Practices, and Patterns -- Introduction -- The Emergence of Containerized Applications for IT Portability -- Microservices Architecture (MSA) Applications for IT Agility and Adaptivity -- The Onset of Containerized Cloud Environments -- The Need for Container Orchestration Platform Solutions -- The Significance of Kubernetes for Cloud-Native Systems -- Kubernetes for Edge Cloud Environments -- Kubernetes for Multi-Cloud Implementations -- Delineating the Kubernetes' Master-Slave Architecture -- The Special Features of the Kubernetes Platform -- Best Practices for Efficient and Effective Kubernetes -- Kubernetes Patterns.
Conclusion -- References -- Chapter 4 The Observability, Chaos Engineering, and Remediation for Cloud-Native Reliability -- Introduction -- The Emergence of Cloud-Native Observability -- The Key Motivations for Cloud-Native Applications -- Cloud-Native Applications: The Realization Technologies -- DevOps for Cloud-Native Applications (CNAs) -- Container Orchestration Platforms -- The Cloud-Native Application Challenges [1, 2] -- Cloud-Native Resiliency -- Cloud-Native Chaos Engineering -- Cloud-Native Observability [3-5] -- Cloud-Native Observability: The Benefits -- Cloud-Native Observability for Chaos Engineering -- AIOps-Enabled Cloud-Native Observability -- Building System Resilience Through AIOps -- Cloud-Native Remediation -- Conclusion -- References -- Chapter 5 Creating Kubernetes Clusters on Private Cloud (VMware vSphere) -- Introduction -- Purpose -- Scope -- Deployment Pre-requirements -- Prerequisites -- vCenter Requirements -- Cluster Resources -- Required IP Addresses -- DNS Records -- Create Local Linux Installer VM on VMware vSphere -- Generating an SSH Private Key and Adding it to the Agent -- Create DHCP Server -- Download OpenShift Installation for vSphere -- Procedure -- Adding vCenter Root CA Certificates to your Installer VM -- Deploying the OCP Cluster on VMware vSphere -- Installing the CLI on Linux -- Uninstall OpenShift Cluster -- Considerations When you Delete OpenShift for VMware (https://cloud.ibm.com/docs/vmwaresolutions) -- Conclusion -- Further Reading -- Chapter 6 Creating Kubernetes Clusters on Public Cloud (Microsoft Azure) -- Introduction -- Prerequisites -- Configuring a Public DNS Zone in Azure -- DNS Creation -- Prerequisites -- Create a DNS Zone -- Required Azure Roles -- Creating a Service Principal -- Azure CLI Setup -- Manually Create IAM -- Start Installation of OCP -- Uninstall Cluster -- Conclusion.
Further Reading -- Chapter 7 Design, Development, and Deployment of Event-Driven Microservices Practically -- Introduction -- Technology Stack to Build Microservices -- Express Framework -- Steps to Set Up Your Project -- Blog Post Microservice -- Comments Microservice -- Implementation of Event-Driven Model -- Event Bus -- Deployment Strategies -- Conclusion -- Chapter 8 Serverless Computing for the Cloud-Native Era -- Introduction -- The Key Motivations for Serverless Computing [1, 2] -- Briefing Serverless Computing -- The Serverless Implications -- The Evolution of Serverless Computing [3, 4] -- Serverless Application Patterns -- Containers as the Function Runtime -- Serverless Computing Components [5, 6] -- Advantages of Using a Serverless Database -- Disadvantages of Using Serverless Databases -- Top Benefits of Serverless Computing -- Overcoming Serverless Obstacles -- The Future of Serverless Computing -- Conclusion -- Appendix -- Knative for Serverless Computing -- References -- Chapter 9 Instaling Knative on a Kubernetes Cluster -- Introduction -- Knative Serving Resources -- Further Reading -- Chapter 10 Delineating Cloud-Native Edge Computing -- Introduction -- Briefing Cloud-Native Computing -- Technical and Business Cases for Cloud-Native Computing [3, 4] -- The Emergence of Edge Computing -- Cloud-Native Technologies for Edge Computing -- Benefits of Bringing the Cloud-Native Principles to the Edge -- The Deployment Scenarios at the Edge -- Kubernetes Deployment Options for Edge Computing -- Cloud-Native at the Edge: The Use Cases -- Navigating Heterogeneous Environments at the Edge -- Monitoring Kubernetes-Enabled Edge Environments -- Edge Analytics for Real-Time Video Surveillance -- Describing Edge AI -- Conclusion -- References -- Chapter 11 Setting up a Kubernetes Cluster using Azure Kubernetes Service -- Introduction.
Benefits of Azure Kubernetes Service -- Purpose -- Scope -- An Introduction to Azure Kubernetes Service -- Features of Azure Kubernetes Services -- Azure Kubernetes Service Use Cases -- Common Uses for Azure Kubernetes Service -- High-Level Architecture -- Architecture Design -- Deployment Pre-Requisites -- Conclusion -- Further Reading -- Chapter 12 Reliable Cloud-Native Applications through Service Mesh -- Introduction -- Delineating the Containerization Paradigm -- Demystifying Microservices Architecture -- Decoding the Growing Role of Kubernetes for the Container Era -- Describing the Service Mesh Concept [1-3] -- Demystifying Service Mesh -- The Service Mesh Contributions -- The Leading Service Mesh Solutions -- Why Service Mesh is Paramount? -- Service Mesh Architectures -- Monitoring the Service Mesh -- Service Mesh Deployment Models -- Conclusion -- Appendix -- Deploying the Red Hat OpenShift Service Mesh Control Plane -- References -- Chapter 13 Cloud-Native Computing: The Security Challenges and the Solution Approaches -- Introduction to Cloud Capabilities -- Delineating the Cloud-Native Paradigm -- Why Cloud-Native Computing -- About Cloud-Native Applications -- Beginning of Cloud-Native Application Security -- Cloud-Native Security Challenges -- Capabilities of Cloud-Native Security Solutions -- Cloud-Native Application Security Procedures -- Securing Cloud-Native Applications -- Pillars of Cloud-Native Security -- Cloud-Native Security: Best Practices -- Kubernetes Security Best Practices -- Container Security Best Practices -- Cloud-Native Security Best Practices -- The Emergence of Cloud-Native Security Products and Platforms -- Key Properties of Cloud-Native Security Platforms -- Cloud Workload Protection Platforms -- Kubernetes Security Products -- AIOps for Cloud-Native Security -- Conclusion -- Reference.
Chapter 14 Microservices Security: The Concerns and the Solution Approaches -- Microservice Security Challenges and Concerns -- Best Practices to Secure Microservices -- How to Implement Fundamental Authentication and Authorization Strategies -- Dive Deeper into API Gateway -- APACHE APISIX -- Configuring APISIX -- Conclusion -- Further Reading -- Chapter 15 Setting Up Apache Kafka Clusters in a Cloud Environment and Secure Monitoring -- Introduction -- Introspecting Kafka -- Kafka Component Overview -- Guide to Set Up a Kafka Cluster -- Prerequisites -- Steps to Install -- Step 1: Setup virtual machines for Kafka -- Step 2: Configure Zookeeper and Kafka on both the machines -- zookeeper.service -- kafka.service -- Step 3: Test Zookeeper and Kafka installation -- Kafka Command Line Features -- Set Up Your Monitoring Tools for Your Cluster: Prometheus and Grafana -- Fetch Metrics Using Prometheus -- Install JMX Exporter Agent on Kafka broker -- Create Prometheus as a service on the Admin machine -- Visualize using Grafana -- Secure your cluster -- Encryption -- Authentication -- Authorization -- Conclusion -- Further Reading -- Chapter 16 Installing Knative Serving On EKS -- Prerequisites -- EKS Installation Procedure -- Installing Knative Serving Using YAML Files -- Prerequisites -- System Requirements -- Install the Serving component -- Verify the Installation -- Configure DNS -- Install kn Using a Binary -- Install kn Using Go -- Sample Application -- Creating Your Deployment with the Knative CLI -- Interacting with Your App -- Index -- EULA.
Record Nr. UNINA-9910623986603321
Raj Pethuru  
Newark : , : John Wiley & Sons, Incorporated, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
High-Performance Big-Data Analytics [[electronic resource] ] : Computing Systems and Approaches / / by Pethuru Raj, Anupama Raman, Dhivya Nagaraj, Siddhartha Duggirala
High-Performance Big-Data Analytics [[electronic resource] ] : Computing Systems and Approaches / / by Pethuru Raj, Anupama Raman, Dhivya Nagaraj, Siddhartha Duggirala
Autore Raj Pethuru
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (443 p.)
Disciplina 005.74023
Collana Computer Communications and Networks
Soggetto topico Computer communication systems
Application software
Microprocessors
Computer Communication Networks
Information Systems Applications (incl. Internet)
Computer Appl. in Administrative Data Processing
Processor Architectures
ISBN 3-319-20744-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Emerging Trends and Transformations in the IT Landscape -- High Performance Technologies for Big- and Fast-Data Analytics -- Big- and Fast-Data Analytics for High-Performance Computing -- Network Infrastructure for High-Performance Big-Data Analytics -- Storage Infrastructure for High-Performance Big-Data Analytics -- Real-Time Analytics using High-Performance Computing -- High-Performance Computing Paradigms -- In-Database Processing and In-Memory Analytics -- High-Performance Integrated Systems, Databases and Warehouses for Big- and Fast-Data Analytics -- Cluster and Grid Computing Paradigms -- High-Performance Peer-to-Peer Systems -- Visualization Dimensions for High-Performance Big-Data Analytics -- Social Media Analytics for Organization Empowerment -- Big-Data Analytics for Healthcare.
Record Nr. UNINA-9910299222303321
Raj Pethuru  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Power of Artificial Intelligence for the Next-Generation Oil and Gas Industry : Envisaging AI-Inspired Intelligent Energy Systems and Environments / / Pethuru Raj Chelliah [and four others]
The Power of Artificial Intelligence for the Next-Generation Oil and Gas Industry : Envisaging AI-Inspired Intelligent Energy Systems and Environments / / Pethuru Raj Chelliah [and four others]
Autore Raj Pethuru
Edizione [First edition.]
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2024]
Descrizione fisica 1 online resource (513 pages)
Disciplina 060
Collana IEEE Press Series on Power and Energy Systems Series
Soggetto topico Artificial intelligence - Industrial applications
Oil fields - Data processing
Petroleum engineering - Data processing
ISBN 1-119-98559-5
1-119-98561-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Copyright Page -- Contents -- About the Authors -- Foreword -- Preface -- Chapter 1 A Perspective of the Oil and Gas Industry -- 1.1 Exploration and Production -- 1.1.1 Onshore -- 1.1.2 Offshore -- 1.1.3 Hydraulic Fracturing -- 1.2 Midstream Transportation -- 1.3 Downstream - Refining and Marketing -- 1.3.1 Hydrotreating -- 1.4 Meaning of Different Terms of Products Produced by the Oil and Gas Industry -- 1.4.1 Natural Gas -- 1.4.2 Extraction -- 1.4.3 Advantages and Disadvantages -- 1.4.4 Types -- 1.4.5 Types of Natural Gas Deposits -- 1.4.6 Conventional Natural Gas Deposits -- 1.4.7 Coal Bed Methane -- 1.4.8 Shale Gas -- 1.4.9 Tight Gas -- 1.4.10 Environmental Impacts of Natural Gas -- 1.4.11 The Future of Natural Gas -- 1.4.12 CNG vs. Liquid Fuels -- 1.4.13 Unconventional Oil and Gas -- 1.5 Oil and Gas Pricing -- 1.6 A Note on Renewable Energy Sources -- 1.6.1 Biomass -- 1.6.2 Hydropower -- 1.6.3 Geothermal -- 1.6.4 Wind -- 1.6.5 A Note About Hydrogen -- 1.6.6 How is Hydrogen Produced -- 1.6.7 Production of Hydrogen -- 1.6.8 Electrolysis -- 1.6.9 Biological Processes -- 1.6.10 Converting Hydrogen to Hydrogen-Based Fuels -- 1.7 Environmental Impact -- 1.8 Uses of Hydrogen -- 1.8.1 Challenges in Using Hydrogen as a Fuel -- Bibliography -- Chapter 2 Artificial Intelligence (AI) for the Future of the Oil and Gas (O& -- G) Industry -- 2.1 Introduction -- 2.2 The Emergence of Digitization Technologies and Tools -- 2.3 Demystifying Digitalization Technologies and Tools -- 2.4 Briefing the Potentials of Artificial Intelligence (AI) -- 2.5 AI for the Oil and Gas (O& -- G) Industry -- 2.5.1 Automate and Optimize Inspection -- 2.5.2 Defect Detection and Enhance Quality Assurance -- 2.5.3 Monitoring -- 2.5.4 Reduce Production and Maintenance Costs -- 2.5.5 Accurate Decision-Making.
2.5.6 Improve Supply Chain and Logistics Efficiency -- 2.5.7 Geoscience Data Analytics -- 2.5.8 Predictive Models for Oil Field Development -- 2.5.9 Predictive Analytics for Reservoir Engineering -- 2.5.10 AI for Oil and Gas Production -- 2.5.11 AI in Midstream -- 2.5.12 AI in Downstream -- 2.6 Computer Vision (CV)-Enabled Use Cases -- 2.7 Natural Language Processing (NLP) Use Cases -- 2.8 Robots in the Oil and Gas Industry -- 2.9 Drones in the Oil and Gas Industry -- 2.9.1 Drones in Upstream Activities -- 2.9.2 Drones in Midstream Activities -- 2.9.3 Drones in Downstream Activities -- 2.10 AI Applications for the Oil and Gas (O& -- G) Industry -- 2.10.1 Optimizing Production and Scheduling -- 2.10.2 Asset Tracking and Maintenance Through AI-enabled Digital Twins (DT) -- 2.10.3 AI-led Cybersecurity -- 2.11 Better Decision-Making Using AI -- 2.11.1 Predictive Maintenance -- 2.11.2 Identifying Optimal Operating Condition -- 2.11.3 Well Logging -- 2.11.4 Detecting Contaminant Concentrations -- 2.11.5 Ensuring the People and Property Safety -- 2.11.6 Energy Efficiency -- 2.11.7 Equipment Inspection -- 2.12 Cloud AI vs. Edge AI for the Oil and Gas Industry -- 2.13 AI Model Optimization Techniques -- 2.14 Conclusion -- Bibliography -- Chapter 3 Artificial Intelligence for Sophisticated Applications in the Oil and Gas Industry -- 3.1 Introduction -- 3.2 Oil and Gas Industry -- 3.2.1 Upstream: Production and Exploration -- 3.2.2 Midstream: Transportation -- 3.2.3 Downstream: Refining and Marketing -- 3.3 Artificial Intelligence -- 3.4 Lifecycle of Oil and Gas Industry -- 3.4.1 Exploration -- 3.4.2 Appraisal -- 3.4.3 Development -- 3.4.4 Production -- 3.4.5 Decommissioning -- 3.5 Applications of AI in Oil and Gas industry -- 3.6 Chatbots -- 3.7 Optimized Procurement -- 3.8 Drilling, Production, and Reservoir Management -- 3.9 Inventory Management.
3.10 Well Monitoring -- 3.11 Process Excellence and Automation -- 3.12 Asset Tracking and Maintenance/Digital Twins -- 3.13 Optimizing Production and Scheduling -- 3.14 Emission Tracking -- 3.15 Logistics Network Optimizations -- 3.16 Conclusion -- References -- Chapter 4 Demystifying the Oil and Gas Exploration and Extraction Process -- 4.1 Process of Crude Oil Formation -- 4.2 Composition of Crude Oil -- 4.3 Crude Oil Classification -- 4.3.1 Other Types of Crude Oil -- 4.4 Crude Oil Production Process -- 4.5 Oil Exploration -- 4.6 Oil Extraction -- 4.6.1 Bringing Extracted Crude Oil to the Surface -- 4.6.2 Enhanced Oil Recovery -- 4.7 Processing of Crude Oil -- 4.7.1 Oil and Natural Gas Storage -- 4.7.2 Oil and Gas Transportation -- 4.7.3 Tanker Ships -- 4.7.4 Railcars -- 4.7.5 Tank Trucks -- 4.8 Overview of Refining -- 4.8.1 Separation/Distillation -- 4.8.2 Conversion -- 4.8.3 Enhancement -- 4.8.4 Blending/Finishing -- 4.8.5 Types of Refineries -- 4.9 Marketing and Distribution of Oil and Gas -- 4.10 End of Production -- 4.11 Factors Influencing the Timing of Oil and Gas Exploration and Production -- 4.11.1 Physical and Technical Factors -- 4.11.2 Social and Political Factors -- 4.11.3 Business Coordination Factors -- 4.12 Non-revenue Benefits of the Oil and Gas Industry -- 4.13 Conclusion -- References -- Chapter 5 Explaining the Midstream Activities in the Oil and Gas Domain -- 5.1 Introduction -- 5.2 Role of Midstream Sector in Oil and Gas Industry -- 5.3 Midstream Oil and Gas Operations -- 5.3.1 Field Processing -- 5.3.2 Storage -- 5.3.3 Transportation -- 5.4 Technological Advancements in Midstream Sector -- 5.4.1 Cloud Computing -- 5.4.2 Internet of Things -- 5.4.3 Robotics and Automation -- 5.4.4 3D Technology -- 5.4.5 Manufacturing and Execution Systems -- 5.5 Midstream Sector Challenges -- 5.5.1 Cyber-Attacks.
5.5.2 Environmental Considerations -- 5.5.3 Social Concerns -- 5.5.4 Regulations -- 5.6 Conclusion -- References -- Chapter 6 The Significance of the Industrial Internet of Things (IIoT) for the Oil and Gas Space -- 6.1 Overview of IIoT -- 6.1.1 Functioning of Internet of Things -- 6.1.2 IIOT Viewpoints -- 6.1.3 Benefits of IIoT -- 6.1.4 Security in IIoT -- 6.2 Technical Innovators of Industrial Internet -- 6.2.1 Industrial Control Systems (ICS) -- 6.2.2 Supervisory Control and Data Acquisition (SCADA) -- 6.3 IoT for Oil and Gas Sector -- 6.3.1 Utilizing IIoT in Oil and Gas -- 6.3.2 Excellence in Operations -- 6.3.3 Device Management -- 6.3.4 Device Connectivity -- 6.3.5 Transformation and Storage -- 6.3.6 Presentation and Action -- 6.3.7 Microsoft Azure -- 6.4 Rebellion of IoT in the Oil and Gas Sector -- 6.4.1 Improved Operational Efficiency -- 6.4.2 Optimize Inventory Levels Based on Actual Usage -- 6.4.3 Improve Stockroom Management -- 6.4.4 Return on Investment (ROI)/Revenue -- 6.4.5 Real-Time Monitoring -- 6.4.6 Removing Manual Measuring Processes -- 6.4.7 Reduction of Safety Risk -- 6.4.8 Hurdles in the Oil and Gas Sector -- 6.5 Oil and Gas Remote Monitoring Systems -- 6.5.1 Sensors -- 6.5.2 Smart Algorithms -- 6.5.3 Prognostic and Preemptive Maintenance -- 6.5.4 Robots and Drones -- 6.5.5 Smart Accessories -- 6.5.6 Wearable Watches -- 6.5.7 Wearable Glasses -- 6.5.8 Drones -- 6.5.9 Monitoring Critical Systems 24/7 -- 6.5.10 PLC Emergency Alert Notification Systems -- 6.5.11 Independent Verification -- 6.5.12 Oil and Gas Survey and Manufacturing Process -- 6.6 Advantages of IIOT for the Oil and Gas Industry -- 6.6.1 Monitoring Pipelines -- 6.6.2 Risk Mitigation -- 6.6.3 Environmental Impact -- 6.6.4 Managing Emergency Conditions -- 6.6.5 Establishing Workers Healthy and Safety -- 6.6.6 Supply Chain Management -- 6.7 Conclusion -- Bibliography.
Chapter 7 The Power of Edge AI Technologies for Real-Time Use Cases in the Oil and Gas Domain -- 7.1 Introduction -- 7.2 Demystifying the Paradigm of Artificial Intelligence (AI) -- 7.3 Describing the Phenomenon of Edge Computing -- 7.4 Delineating Edge Computing Advantages -- 7.4.1 The Formation of Edge Device Clouds -- 7.4.2 Real-Time Computing -- 7.4.3 Real-Time Analytics -- 7.4.4 Scalable Computing -- 7.4.5 Secured Computing -- 7.4.6 Automated Analytics and Action -- 7.4.7 Reduced Costs -- 7.5 Demarcating the Move Toward Edge AI -- 7.5.1 How Edge AI Helps to Generate Better Business -- 7.6 Why Edge AI Gains Momentum? -- 7.6.1 The Growing Device Ecosystem -- 7.6.2 Federated Learning -- 7.6.3 Optimization Techniques to Run AI Models in Edge Devices -- 7.6.4 Neural Network (NN) Pruning -- 7.6.5 L2 and L1 Regularization -- 7.7 The Enablers of Edge AI -- 7.8 5G-Advanced Communication -- 7.8.1 Industrial 5G -- 7.8.2 Edge Computing -- 7.8.3 Massive Amounts of Edge Devices Data -- 7.8.4 The Emergence of Accelerators and Specialized Engines -- 7.8.5 Cyber Physical Systems (CPS) -- 7.8.6 Digital Twins (DT) -- 7.9 Why Edge AI is Being Pursued with Alacrity? -- 7.9.1 The Need for Customer Delight -- 7.9.2 Unearthing Fresh Use Cases for Edge AI Across Industrial Verticals -- 7.10 Edge AI Frameworks and Accelerators -- 7.11 Conclusion -- Bibliography -- Chapter 8 AI-Enabled Robots for Automating Oil and Gas Operations -- 8.1 Briefing the Impending Digital Era -- 8.2 Depicting the Digital Power -- 8.2.1 The Emergence of Advanced Drones -- 8.2.2 The Grandiose Arrival of the State-of-the-Art Robots -- 8.3 Robotics: The Use Cases -- 8.3.1 Upstream Oil and Gas -- 8.3.2 Midstream Oil and Gas -- 8.3.3 Downstream Oil and Gas -- 8.4 Real-Life Examples of Robotic Solutions in the Oil and Gas Industry -- 8.5 The Advantages of Robotic Solutions.
8.6 The Dawn of the Internet of Robotic Things.
Record Nr. UNINA-9910830287903321
Raj Pethuru  
Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2024]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Software-Defined Cloud Centers [[electronic resource] ] : Operational and Management Technologies and Tools / / by Pethuru Raj, Anupama Raman
Software-Defined Cloud Centers [[electronic resource] ] : Operational and Management Technologies and Tools / / by Pethuru Raj, Anupama Raman
Autore Raj Pethuru
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (257 pages)
Disciplina 004
Collana Computer Communications and Networks
Soggetto topico Computer communication systems
Input-output equipment (Computers)
Software engineering
Database management
Industrial organization
Computer Communication Networks
Input/Output and Data Communications
Software Engineering
Database Management
Industrial Organization
ISBN 3-319-78637-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Distinct Trends and Transitions in the Information Technology (IT) Space -- Demystifying Software-Defined Cloud Environments -- Software-Defined Storage (SDS) for Storage Virtualization -- Software-Defined Networking (SDN) for Network Virtualization -- The Hybrid Cloud: The Journey towards Hybrid IT -- Security Management of a Software Defined Data Center -- Cloud Service Management -- Multi-Cloud Brokerage Solutions and Services -- Automated Multi-Cloud Operations and Container Orchestration -- Multi-Cloud Management: Technologies, Tools and Techniques.
Record Nr. UNINA-9910299261403321
Raj Pethuru  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui