Blockchain, Artificial Intelligence, and the Internet of Things : Possibilities and Opportunities |
Autore | Raj Pethuru |
Pubbl/distr/stampa | Cham : , : Springer International Publishing AG, , 2021 |
Descrizione fisica | 1 online resource (218 pages) |
Altri autori (Persone) |
DubeyAshutosh Kumar
KumarAbhishek RathorePramod Singh |
Collana | EAI/Springer Innovations in Communication and Computing Ser. |
Soggetto genere / forma | Electronic books. |
ISBN |
9783030776374
9783030776367 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910510565503321 |
Raj Pethuru | ||
Cham : , : Springer International Publishing AG, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cloud enterprise architecture / / Pethuru Raj |
Autore | Raj Pethuru |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2013 |
Descrizione fisica | 1 online resource (511 p.) |
Disciplina |
004.67/82
004.6782 |
Soggetto topico |
Cloud computing
Software architecture Computer software - Development |
Soggetto genere / forma | Electronic books. |
ISBN |
1-4665-8907-8
0-429-06717-8 1-4665-0233-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Contents; Foreword; Preface; Acknowledgments; Author; CEA Book Audience and Key Takeaways; Chapter 1 - Cloud-Enabled Smart Enterprises!; Chapter 2 - Cloud-Inspired Enterprise Transformations!; Chapter 3 - Cloud-Instigated IT Transformations!; Chapter 4 - Cloud EA: Frameworks and Platforms; Chapter 5 - Cloud Application Architecture; Chapter 6 - Cloud Data Architecture; Chapter 7 - Cloud Technology Architecture; Chapter 8 - Cloud Integration Architecture; Chapter 9 - Cloud Management Architecture; Chapter 10 - Cloud Security Architecture (CSA)
Chapter 11 - Cloud Governance ArchitectureChapter 12 - Cloud Onboarding Best Practices; Back Cover |
Record Nr. | UNINA-9910462548503321 |
Raj Pethuru | ||
Boca Raton, Fla. : , : CRC Press, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cloud enterprise architecture / / Pethuru Raj |
Autore | Raj Pethuru |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2013 |
Descrizione fisica | 1 online resource (511 p.) |
Disciplina |
004.67/82
004.6782 |
Soggetto topico |
Cloud computing
Software architecture Computer software - Development |
ISBN |
1-138-37465-2
1-4665-8907-8 0-429-06717-8 1-4665-0233-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Contents; Foreword; Preface; Acknowledgments; Author; CEA Book Audience and Key Takeaways; Chapter 1 - Cloud-Enabled Smart Enterprises!; Chapter 2 - Cloud-Inspired Enterprise Transformations!; Chapter 3 - Cloud-Instigated IT Transformations!; Chapter 4 - Cloud EA: Frameworks and Platforms; Chapter 5 - Cloud Application Architecture; Chapter 6 - Cloud Data Architecture; Chapter 7 - Cloud Technology Architecture; Chapter 8 - Cloud Integration Architecture; Chapter 9 - Cloud Management Architecture; Chapter 10 - Cloud Security Architecture (CSA)
Chapter 11 - Cloud Governance ArchitectureChapter 12 - Cloud Onboarding Best Practices; Back Cover |
Record Nr. | UNINA-9910785715603321 |
Raj Pethuru | ||
Boca Raton, Fla. : , : CRC Press, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cloud enterprise architecture / / Pethuru Raj |
Autore | Raj Pethuru |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2013 |
Descrizione fisica | 1 online resource (511 p.) |
Disciplina |
004.67/82
004.6782 |
Soggetto topico |
Cloud computing
Software architecture Computer software - Development |
ISBN |
1-138-37465-2
1-4665-8907-8 0-429-06717-8 1-4665-0233-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Contents; Foreword; Preface; Acknowledgments; Author; CEA Book Audience and Key Takeaways; Chapter 1 - Cloud-Enabled Smart Enterprises!; Chapter 2 - Cloud-Inspired Enterprise Transformations!; Chapter 3 - Cloud-Instigated IT Transformations!; Chapter 4 - Cloud EA: Frameworks and Platforms; Chapter 5 - Cloud Application Architecture; Chapter 6 - Cloud Data Architecture; Chapter 7 - Cloud Technology Architecture; Chapter 8 - Cloud Integration Architecture; Chapter 9 - Cloud Management Architecture; Chapter 10 - Cloud Security Architecture (CSA)
Chapter 11 - Cloud Governance ArchitectureChapter 12 - Cloud Onboarding Best Practices; Back Cover |
Record Nr. | UNINA-9910800034703321 |
Raj Pethuru | ||
Boca Raton, Fla. : , : CRC Press, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cloud enterprise architecture / / Pethuru Raj |
Autore | Raj Pethuru |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton, Fla., : CRC Press, 2013 |
Descrizione fisica | 1 online resource (511 p.) |
Disciplina |
004.67/82
004.6782 |
Soggetto topico |
Cloud computing
Software architecture Computer software - Development |
ISBN |
1-138-37465-2
1-4665-8907-8 0-429-06717-8 1-4665-0233-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Contents; Foreword; Preface; Acknowledgments; Author; CEA Book Audience and Key Takeaways; Chapter 1 - Cloud-Enabled Smart Enterprises!; Chapter 2 - Cloud-Inspired Enterprise Transformations!; Chapter 3 - Cloud-Instigated IT Transformations!; Chapter 4 - Cloud EA: Frameworks and Platforms; Chapter 5 - Cloud Application Architecture; Chapter 6 - Cloud Data Architecture; Chapter 7 - Cloud Technology Architecture; Chapter 8 - Cloud Integration Architecture; Chapter 9 - Cloud Management Architecture; Chapter 10 - Cloud Security Architecture (CSA)
Chapter 11 - Cloud Governance ArchitectureChapter 12 - Cloud Onboarding Best Practices; Back Cover |
Record Nr. | UNINA-9910820255603321 |
Raj Pethuru | ||
Boca Raton, Fla., : CRC Press, 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cloud-native computing : how to design, develop, and secure microservices and event-driven applications / / Pethuru Raj, Skylab Vanga and Akshita Chaudhary |
Autore | Raj Pethuru |
Pubbl/distr/stampa | Piscataway, New Jersey ; ; Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2023] |
Descrizione fisica | 1 online resource (354 pages) |
Disciplina | 005.3 |
Soggetto topico |
Application software - Development
Cloud computing Application software |
ISBN |
1-119-81479-0
1-119-81477-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Title Page -- Copyright Page -- Contents -- About the Authors -- Preface -- Acknowledgments -- Chapter 1 The Dawning of the Digital Era -- Demystifying the Digitization Paradigm -- Delineating the Digitalization Technologies -- Trendsetting Technologies for the Digital Era -- Why Digitization Is Indispensable -- The Connectivity and Integration Options -- The Promising Digital Intelligence Methods -- The Technological Approaches Toward Smarter Environments -- Briefing the Brewing Idea of Digital Twin -- Envisioning the Digital Universe -- Cloud-Native Applications (CNAs) -- Conclusion -- References -- Chapter 2 The Cloud-Native Computing Paradigm for the Digital Era -- Introduction -- The Onset of the Digital Era -- The Maturity of Software-defined Cloud Environments -- The Hybrid Model of Microservices Architecture (MSA) and Event-driven Architecture (EDA) -- The Aspect of Containerization -- The Emergence of Container Lifecycle Management Platforms -- Tending Toward Cloud-Native Computing -- Demystifying the Cloud-Native Architecture Style -- Distinguishing Cloud-Native Infrastructure -- Cloud-Native Security -- Cloud-Native Computing Advantages -- Conclusion -- References -- Chapter 3 Kubernetes Architecture, Best Practices, and Patterns -- Introduction -- The Emergence of Containerized Applications for IT Portability -- Microservices Architecture (MSA) Applications for IT Agility and Adaptivity -- The Onset of Containerized Cloud Environments -- The Need for Container Orchestration Platform Solutions -- The Significance of Kubernetes for Cloud-Native Systems -- Kubernetes for Edge Cloud Environments -- Kubernetes for Multi-Cloud Implementations -- Delineating the Kubernetes' Master-Slave Architecture -- The Special Features of the Kubernetes Platform -- Best Practices for Efficient and Effective Kubernetes -- Kubernetes Patterns.
Conclusion -- References -- Chapter 4 The Observability, Chaos Engineering, and Remediation for Cloud-Native Reliability -- Introduction -- The Emergence of Cloud-Native Observability -- The Key Motivations for Cloud-Native Applications -- Cloud-Native Applications: The Realization Technologies -- DevOps for Cloud-Native Applications (CNAs) -- Container Orchestration Platforms -- The Cloud-Native Application Challenges [1, 2] -- Cloud-Native Resiliency -- Cloud-Native Chaos Engineering -- Cloud-Native Observability [3-5] -- Cloud-Native Observability: The Benefits -- Cloud-Native Observability for Chaos Engineering -- AIOps-Enabled Cloud-Native Observability -- Building System Resilience Through AIOps -- Cloud-Native Remediation -- Conclusion -- References -- Chapter 5 Creating Kubernetes Clusters on Private Cloud (VMware vSphere) -- Introduction -- Purpose -- Scope -- Deployment Pre-requirements -- Prerequisites -- vCenter Requirements -- Cluster Resources -- Required IP Addresses -- DNS Records -- Create Local Linux Installer VM on VMware vSphere -- Generating an SSH Private Key and Adding it to the Agent -- Create DHCP Server -- Download OpenShift Installation for vSphere -- Procedure -- Adding vCenter Root CA Certificates to your Installer VM -- Deploying the OCP Cluster on VMware vSphere -- Installing the CLI on Linux -- Uninstall OpenShift Cluster -- Considerations When you Delete OpenShift for VMware (https://cloud.ibm.com/docs/vmwaresolutions) -- Conclusion -- Further Reading -- Chapter 6 Creating Kubernetes Clusters on Public Cloud (Microsoft Azure) -- Introduction -- Prerequisites -- Configuring a Public DNS Zone in Azure -- DNS Creation -- Prerequisites -- Create a DNS Zone -- Required Azure Roles -- Creating a Service Principal -- Azure CLI Setup -- Manually Create IAM -- Start Installation of OCP -- Uninstall Cluster -- Conclusion. Further Reading -- Chapter 7 Design, Development, and Deployment of Event-Driven Microservices Practically -- Introduction -- Technology Stack to Build Microservices -- Express Framework -- Steps to Set Up Your Project -- Blog Post Microservice -- Comments Microservice -- Implementation of Event-Driven Model -- Event Bus -- Deployment Strategies -- Conclusion -- Chapter 8 Serverless Computing for the Cloud-Native Era -- Introduction -- The Key Motivations for Serverless Computing [1, 2] -- Briefing Serverless Computing -- The Serverless Implications -- The Evolution of Serverless Computing [3, 4] -- Serverless Application Patterns -- Containers as the Function Runtime -- Serverless Computing Components [5, 6] -- Advantages of Using a Serverless Database -- Disadvantages of Using Serverless Databases -- Top Benefits of Serverless Computing -- Overcoming Serverless Obstacles -- The Future of Serverless Computing -- Conclusion -- Appendix -- Knative for Serverless Computing -- References -- Chapter 9 Instaling Knative on a Kubernetes Cluster -- Introduction -- Knative Serving Resources -- Further Reading -- Chapter 10 Delineating Cloud-Native Edge Computing -- Introduction -- Briefing Cloud-Native Computing -- Technical and Business Cases for Cloud-Native Computing [3, 4] -- The Emergence of Edge Computing -- Cloud-Native Technologies for Edge Computing -- Benefits of Bringing the Cloud-Native Principles to the Edge -- The Deployment Scenarios at the Edge -- Kubernetes Deployment Options for Edge Computing -- Cloud-Native at the Edge: The Use Cases -- Navigating Heterogeneous Environments at the Edge -- Monitoring Kubernetes-Enabled Edge Environments -- Edge Analytics for Real-Time Video Surveillance -- Describing Edge AI -- Conclusion -- References -- Chapter 11 Setting up a Kubernetes Cluster using Azure Kubernetes Service -- Introduction. Benefits of Azure Kubernetes Service -- Purpose -- Scope -- An Introduction to Azure Kubernetes Service -- Features of Azure Kubernetes Services -- Azure Kubernetes Service Use Cases -- Common Uses for Azure Kubernetes Service -- High-Level Architecture -- Architecture Design -- Deployment Pre-Requisites -- Conclusion -- Further Reading -- Chapter 12 Reliable Cloud-Native Applications through Service Mesh -- Introduction -- Delineating the Containerization Paradigm -- Demystifying Microservices Architecture -- Decoding the Growing Role of Kubernetes for the Container Era -- Describing the Service Mesh Concept [1-3] -- Demystifying Service Mesh -- The Service Mesh Contributions -- The Leading Service Mesh Solutions -- Why Service Mesh is Paramount? -- Service Mesh Architectures -- Monitoring the Service Mesh -- Service Mesh Deployment Models -- Conclusion -- Appendix -- Deploying the Red Hat OpenShift Service Mesh Control Plane -- References -- Chapter 13 Cloud-Native Computing: The Security Challenges and the Solution Approaches -- Introduction to Cloud Capabilities -- Delineating the Cloud-Native Paradigm -- Why Cloud-Native Computing -- About Cloud-Native Applications -- Beginning of Cloud-Native Application Security -- Cloud-Native Security Challenges -- Capabilities of Cloud-Native Security Solutions -- Cloud-Native Application Security Procedures -- Securing Cloud-Native Applications -- Pillars of Cloud-Native Security -- Cloud-Native Security: Best Practices -- Kubernetes Security Best Practices -- Container Security Best Practices -- Cloud-Native Security Best Practices -- The Emergence of Cloud-Native Security Products and Platforms -- Key Properties of Cloud-Native Security Platforms -- Cloud Workload Protection Platforms -- Kubernetes Security Products -- AIOps for Cloud-Native Security -- Conclusion -- Reference. Chapter 14 Microservices Security: The Concerns and the Solution Approaches -- Microservice Security Challenges and Concerns -- Best Practices to Secure Microservices -- How to Implement Fundamental Authentication and Authorization Strategies -- Dive Deeper into API Gateway -- APACHE APISIX -- Configuring APISIX -- Conclusion -- Further Reading -- Chapter 15 Setting Up Apache Kafka Clusters in a Cloud Environment and Secure Monitoring -- Introduction -- Introspecting Kafka -- Kafka Component Overview -- Guide to Set Up a Kafka Cluster -- Prerequisites -- Steps to Install -- Step 1: Setup virtual machines for Kafka -- Step 2: Configure Zookeeper and Kafka on both the machines -- zookeeper.service -- kafka.service -- Step 3: Test Zookeeper and Kafka installation -- Kafka Command Line Features -- Set Up Your Monitoring Tools for Your Cluster: Prometheus and Grafana -- Fetch Metrics Using Prometheus -- Install JMX Exporter Agent on Kafka broker -- Create Prometheus as a service on the Admin machine -- Visualize using Grafana -- Secure your cluster -- Encryption -- Authentication -- Authorization -- Conclusion -- Further Reading -- Chapter 16 Installing Knative Serving On EKS -- Prerequisites -- EKS Installation Procedure -- Installing Knative Serving Using YAML Files -- Prerequisites -- System Requirements -- Install the Serving component -- Verify the Installation -- Configure DNS -- Install kn Using a Binary -- Install kn Using Go -- Sample Application -- Creating Your Deployment with the Knative CLI -- Interacting with Your App -- Index -- EULA. |
Record Nr. | UNINA-9910830945803321 |
Raj Pethuru | ||
Piscataway, New Jersey ; ; Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cloud-Native Computing : How to Design, Develop, and Secure Microservices and Event-Driven Applications |
Autore | Raj Pethuru |
Pubbl/distr/stampa | Newark : , : John Wiley & Sons, Incorporated, , 2022 |
Descrizione fisica | 1 online resource (354 pages) |
Altri autori (Persone) |
VangaSkylab
ChaudharyAkshita |
ISBN |
1-119-81479-0
1-119-81477-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Title Page -- Copyright Page -- Contents -- About the Authors -- Preface -- Acknowledgments -- Chapter 1 The Dawning of the Digital Era -- Demystifying the Digitization Paradigm -- Delineating the Digitalization Technologies -- Trendsetting Technologies for the Digital Era -- Why Digitization Is Indispensable -- The Connectivity and Integration Options -- The Promising Digital Intelligence Methods -- The Technological Approaches Toward Smarter Environments -- Briefing the Brewing Idea of Digital Twin -- Envisioning the Digital Universe -- Cloud-Native Applications (CNAs) -- Conclusion -- References -- Chapter 2 The Cloud-Native Computing Paradigm for the Digital Era -- Introduction -- The Onset of the Digital Era -- The Maturity of Software-defined Cloud Environments -- The Hybrid Model of Microservices Architecture (MSA) and Event-driven Architecture (EDA) -- The Aspect of Containerization -- The Emergence of Container Lifecycle Management Platforms -- Tending Toward Cloud-Native Computing -- Demystifying the Cloud-Native Architecture Style -- Distinguishing Cloud-Native Infrastructure -- Cloud-Native Security -- Cloud-Native Computing Advantages -- Conclusion -- References -- Chapter 3 Kubernetes Architecture, Best Practices, and Patterns -- Introduction -- The Emergence of Containerized Applications for IT Portability -- Microservices Architecture (MSA) Applications for IT Agility and Adaptivity -- The Onset of Containerized Cloud Environments -- The Need for Container Orchestration Platform Solutions -- The Significance of Kubernetes for Cloud-Native Systems -- Kubernetes for Edge Cloud Environments -- Kubernetes for Multi-Cloud Implementations -- Delineating the Kubernetes' Master-Slave Architecture -- The Special Features of the Kubernetes Platform -- Best Practices for Efficient and Effective Kubernetes -- Kubernetes Patterns.
Conclusion -- References -- Chapter 4 The Observability, Chaos Engineering, and Remediation for Cloud-Native Reliability -- Introduction -- The Emergence of Cloud-Native Observability -- The Key Motivations for Cloud-Native Applications -- Cloud-Native Applications: The Realization Technologies -- DevOps for Cloud-Native Applications (CNAs) -- Container Orchestration Platforms -- The Cloud-Native Application Challenges [1, 2] -- Cloud-Native Resiliency -- Cloud-Native Chaos Engineering -- Cloud-Native Observability [3-5] -- Cloud-Native Observability: The Benefits -- Cloud-Native Observability for Chaos Engineering -- AIOps-Enabled Cloud-Native Observability -- Building System Resilience Through AIOps -- Cloud-Native Remediation -- Conclusion -- References -- Chapter 5 Creating Kubernetes Clusters on Private Cloud (VMware vSphere) -- Introduction -- Purpose -- Scope -- Deployment Pre-requirements -- Prerequisites -- vCenter Requirements -- Cluster Resources -- Required IP Addresses -- DNS Records -- Create Local Linux Installer VM on VMware vSphere -- Generating an SSH Private Key and Adding it to the Agent -- Create DHCP Server -- Download OpenShift Installation for vSphere -- Procedure -- Adding vCenter Root CA Certificates to your Installer VM -- Deploying the OCP Cluster on VMware vSphere -- Installing the CLI on Linux -- Uninstall OpenShift Cluster -- Considerations When you Delete OpenShift for VMware (https://cloud.ibm.com/docs/vmwaresolutions) -- Conclusion -- Further Reading -- Chapter 6 Creating Kubernetes Clusters on Public Cloud (Microsoft Azure) -- Introduction -- Prerequisites -- Configuring a Public DNS Zone in Azure -- DNS Creation -- Prerequisites -- Create a DNS Zone -- Required Azure Roles -- Creating a Service Principal -- Azure CLI Setup -- Manually Create IAM -- Start Installation of OCP -- Uninstall Cluster -- Conclusion. Further Reading -- Chapter 7 Design, Development, and Deployment of Event-Driven Microservices Practically -- Introduction -- Technology Stack to Build Microservices -- Express Framework -- Steps to Set Up Your Project -- Blog Post Microservice -- Comments Microservice -- Implementation of Event-Driven Model -- Event Bus -- Deployment Strategies -- Conclusion -- Chapter 8 Serverless Computing for the Cloud-Native Era -- Introduction -- The Key Motivations for Serverless Computing [1, 2] -- Briefing Serverless Computing -- The Serverless Implications -- The Evolution of Serverless Computing [3, 4] -- Serverless Application Patterns -- Containers as the Function Runtime -- Serverless Computing Components [5, 6] -- Advantages of Using a Serverless Database -- Disadvantages of Using Serverless Databases -- Top Benefits of Serverless Computing -- Overcoming Serverless Obstacles -- The Future of Serverless Computing -- Conclusion -- Appendix -- Knative for Serverless Computing -- References -- Chapter 9 Instaling Knative on a Kubernetes Cluster -- Introduction -- Knative Serving Resources -- Further Reading -- Chapter 10 Delineating Cloud-Native Edge Computing -- Introduction -- Briefing Cloud-Native Computing -- Technical and Business Cases for Cloud-Native Computing [3, 4] -- The Emergence of Edge Computing -- Cloud-Native Technologies for Edge Computing -- Benefits of Bringing the Cloud-Native Principles to the Edge -- The Deployment Scenarios at the Edge -- Kubernetes Deployment Options for Edge Computing -- Cloud-Native at the Edge: The Use Cases -- Navigating Heterogeneous Environments at the Edge -- Monitoring Kubernetes-Enabled Edge Environments -- Edge Analytics for Real-Time Video Surveillance -- Describing Edge AI -- Conclusion -- References -- Chapter 11 Setting up a Kubernetes Cluster using Azure Kubernetes Service -- Introduction. Benefits of Azure Kubernetes Service -- Purpose -- Scope -- An Introduction to Azure Kubernetes Service -- Features of Azure Kubernetes Services -- Azure Kubernetes Service Use Cases -- Common Uses for Azure Kubernetes Service -- High-Level Architecture -- Architecture Design -- Deployment Pre-Requisites -- Conclusion -- Further Reading -- Chapter 12 Reliable Cloud-Native Applications through Service Mesh -- Introduction -- Delineating the Containerization Paradigm -- Demystifying Microservices Architecture -- Decoding the Growing Role of Kubernetes for the Container Era -- Describing the Service Mesh Concept [1-3] -- Demystifying Service Mesh -- The Service Mesh Contributions -- The Leading Service Mesh Solutions -- Why Service Mesh is Paramount? -- Service Mesh Architectures -- Monitoring the Service Mesh -- Service Mesh Deployment Models -- Conclusion -- Appendix -- Deploying the Red Hat OpenShift Service Mesh Control Plane -- References -- Chapter 13 Cloud-Native Computing: The Security Challenges and the Solution Approaches -- Introduction to Cloud Capabilities -- Delineating the Cloud-Native Paradigm -- Why Cloud-Native Computing -- About Cloud-Native Applications -- Beginning of Cloud-Native Application Security -- Cloud-Native Security Challenges -- Capabilities of Cloud-Native Security Solutions -- Cloud-Native Application Security Procedures -- Securing Cloud-Native Applications -- Pillars of Cloud-Native Security -- Cloud-Native Security: Best Practices -- Kubernetes Security Best Practices -- Container Security Best Practices -- Cloud-Native Security Best Practices -- The Emergence of Cloud-Native Security Products and Platforms -- Key Properties of Cloud-Native Security Platforms -- Cloud Workload Protection Platforms -- Kubernetes Security Products -- AIOps for Cloud-Native Security -- Conclusion -- Reference. Chapter 14 Microservices Security: The Concerns and the Solution Approaches -- Microservice Security Challenges and Concerns -- Best Practices to Secure Microservices -- How to Implement Fundamental Authentication and Authorization Strategies -- Dive Deeper into API Gateway -- APACHE APISIX -- Configuring APISIX -- Conclusion -- Further Reading -- Chapter 15 Setting Up Apache Kafka Clusters in a Cloud Environment and Secure Monitoring -- Introduction -- Introspecting Kafka -- Kafka Component Overview -- Guide to Set Up a Kafka Cluster -- Prerequisites -- Steps to Install -- Step 1: Setup virtual machines for Kafka -- Step 2: Configure Zookeeper and Kafka on both the machines -- zookeeper.service -- kafka.service -- Step 3: Test Zookeeper and Kafka installation -- Kafka Command Line Features -- Set Up Your Monitoring Tools for Your Cluster: Prometheus and Grafana -- Fetch Metrics Using Prometheus -- Install JMX Exporter Agent on Kafka broker -- Create Prometheus as a service on the Admin machine -- Visualize using Grafana -- Secure your cluster -- Encryption -- Authentication -- Authorization -- Conclusion -- Further Reading -- Chapter 16 Installing Knative Serving On EKS -- Prerequisites -- EKS Installation Procedure -- Installing Knative Serving Using YAML Files -- Prerequisites -- System Requirements -- Install the Serving component -- Verify the Installation -- Configure DNS -- Install kn Using a Binary -- Install kn Using Go -- Sample Application -- Creating Your Deployment with the Knative CLI -- Interacting with Your App -- Index -- EULA. |
Record Nr. | UNINA-9910623986603321 |
Raj Pethuru | ||
Newark : , : John Wiley & Sons, Incorporated, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
High-Performance Big-Data Analytics : Computing Systems and Approaches / / by Pethuru Raj, Anupama Raman, Dhivya Nagaraj, Siddhartha Duggirala |
Autore | Raj Pethuru |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (443 p.) |
Disciplina | 005.74023 |
Collana | Computer Communications and Networks |
Soggetto topico |
Computer communication systems
Application software Microprocessors Computer Communication Networks Information Systems Applications (incl. Internet) Computer Appl. in Administrative Data Processing Processor Architectures |
ISBN | 3-319-20744-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Emerging Trends and Transformations in the IT Landscape -- High Performance Technologies for Big- and Fast-Data Analytics -- Big- and Fast-Data Analytics for High-Performance Computing -- Network Infrastructure for High-Performance Big-Data Analytics -- Storage Infrastructure for High-Performance Big-Data Analytics -- Real-Time Analytics using High-Performance Computing -- High-Performance Computing Paradigms -- In-Database Processing and In-Memory Analytics -- High-Performance Integrated Systems, Databases and Warehouses for Big- and Fast-Data Analytics -- Cluster and Grid Computing Paradigms -- High-Performance Peer-to-Peer Systems -- Visualization Dimensions for High-Performance Big-Data Analytics -- Social Media Analytics for Organization Empowerment -- Big-Data Analytics for Healthcare. |
Record Nr. | UNINA-9910299222303321 |
Raj Pethuru | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Illustrating Digital Innovations Towards Intelligent Fashion : Leveraging Information System Engineering and Digital Twins for Efficient Design of Next-Generation Fashion |
Autore | Raj Pethuru |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (615 pages) |
Altri autori (Persone) |
RochaAlvaro
DuttaPushan Kumar FioriniMichele PrakashC |
Collana | Information Systems Engineering and Management Series |
ISBN |
9783031710520
9783031710513 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910908365803321 |
Raj Pethuru | ||
Cham : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The Power of Artificial Intelligence for the Next-Generation Oil and Gas Industry : Envisaging AI-Inspired Intelligent Energy Systems and Environments / / Pethuru Raj Chelliah [and four others] |
Autore | Raj Pethuru |
Edizione | [First edition.] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2024] |
Descrizione fisica | 1 online resource (513 pages) |
Disciplina | 060 |
Collana | IEEE Press Series on Power and Energy Systems Series |
Soggetto topico |
Artificial intelligence - Industrial applications
Oil fields - Data processing Petroleum engineering - Data processing |
ISBN |
1-119-98559-5
1-119-98561-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Title Page -- Copyright Page -- Contents -- About the Authors -- Foreword -- Preface -- Chapter 1 A Perspective of the Oil and Gas Industry -- 1.1 Exploration and Production -- 1.1.1 Onshore -- 1.1.2 Offshore -- 1.1.3 Hydraulic Fracturing -- 1.2 Midstream Transportation -- 1.3 Downstream - Refining and Marketing -- 1.3.1 Hydrotreating -- 1.4 Meaning of Different Terms of Products Produced by the Oil and Gas Industry -- 1.4.1 Natural Gas -- 1.4.2 Extraction -- 1.4.3 Advantages and Disadvantages -- 1.4.4 Types -- 1.4.5 Types of Natural Gas Deposits -- 1.4.6 Conventional Natural Gas Deposits -- 1.4.7 Coal Bed Methane -- 1.4.8 Shale Gas -- 1.4.9 Tight Gas -- 1.4.10 Environmental Impacts of Natural Gas -- 1.4.11 The Future of Natural Gas -- 1.4.12 CNG vs. Liquid Fuels -- 1.4.13 Unconventional Oil and Gas -- 1.5 Oil and Gas Pricing -- 1.6 A Note on Renewable Energy Sources -- 1.6.1 Biomass -- 1.6.2 Hydropower -- 1.6.3 Geothermal -- 1.6.4 Wind -- 1.6.5 A Note About Hydrogen -- 1.6.6 How is Hydrogen Produced -- 1.6.7 Production of Hydrogen -- 1.6.8 Electrolysis -- 1.6.9 Biological Processes -- 1.6.10 Converting Hydrogen to Hydrogen-Based Fuels -- 1.7 Environmental Impact -- 1.8 Uses of Hydrogen -- 1.8.1 Challenges in Using Hydrogen as a Fuel -- Bibliography -- Chapter 2 Artificial Intelligence (AI) for the Future of the Oil and Gas (O& -- G) Industry -- 2.1 Introduction -- 2.2 The Emergence of Digitization Technologies and Tools -- 2.3 Demystifying Digitalization Technologies and Tools -- 2.4 Briefing the Potentials of Artificial Intelligence (AI) -- 2.5 AI for the Oil and Gas (O& -- G) Industry -- 2.5.1 Automate and Optimize Inspection -- 2.5.2 Defect Detection and Enhance Quality Assurance -- 2.5.3 Monitoring -- 2.5.4 Reduce Production and Maintenance Costs -- 2.5.5 Accurate Decision-Making.
2.5.6 Improve Supply Chain and Logistics Efficiency -- 2.5.7 Geoscience Data Analytics -- 2.5.8 Predictive Models for Oil Field Development -- 2.5.9 Predictive Analytics for Reservoir Engineering -- 2.5.10 AI for Oil and Gas Production -- 2.5.11 AI in Midstream -- 2.5.12 AI in Downstream -- 2.6 Computer Vision (CV)-Enabled Use Cases -- 2.7 Natural Language Processing (NLP) Use Cases -- 2.8 Robots in the Oil and Gas Industry -- 2.9 Drones in the Oil and Gas Industry -- 2.9.1 Drones in Upstream Activities -- 2.9.2 Drones in Midstream Activities -- 2.9.3 Drones in Downstream Activities -- 2.10 AI Applications for the Oil and Gas (O& -- G) Industry -- 2.10.1 Optimizing Production and Scheduling -- 2.10.2 Asset Tracking and Maintenance Through AI-enabled Digital Twins (DT) -- 2.10.3 AI-led Cybersecurity -- 2.11 Better Decision-Making Using AI -- 2.11.1 Predictive Maintenance -- 2.11.2 Identifying Optimal Operating Condition -- 2.11.3 Well Logging -- 2.11.4 Detecting Contaminant Concentrations -- 2.11.5 Ensuring the People and Property Safety -- 2.11.6 Energy Efficiency -- 2.11.7 Equipment Inspection -- 2.12 Cloud AI vs. Edge AI for the Oil and Gas Industry -- 2.13 AI Model Optimization Techniques -- 2.14 Conclusion -- Bibliography -- Chapter 3 Artificial Intelligence for Sophisticated Applications in the Oil and Gas Industry -- 3.1 Introduction -- 3.2 Oil and Gas Industry -- 3.2.1 Upstream: Production and Exploration -- 3.2.2 Midstream: Transportation -- 3.2.3 Downstream: Refining and Marketing -- 3.3 Artificial Intelligence -- 3.4 Lifecycle of Oil and Gas Industry -- 3.4.1 Exploration -- 3.4.2 Appraisal -- 3.4.3 Development -- 3.4.4 Production -- 3.4.5 Decommissioning -- 3.5 Applications of AI in Oil and Gas industry -- 3.6 Chatbots -- 3.7 Optimized Procurement -- 3.8 Drilling, Production, and Reservoir Management -- 3.9 Inventory Management. 3.10 Well Monitoring -- 3.11 Process Excellence and Automation -- 3.12 Asset Tracking and Maintenance/Digital Twins -- 3.13 Optimizing Production and Scheduling -- 3.14 Emission Tracking -- 3.15 Logistics Network Optimizations -- 3.16 Conclusion -- References -- Chapter 4 Demystifying the Oil and Gas Exploration and Extraction Process -- 4.1 Process of Crude Oil Formation -- 4.2 Composition of Crude Oil -- 4.3 Crude Oil Classification -- 4.3.1 Other Types of Crude Oil -- 4.4 Crude Oil Production Process -- 4.5 Oil Exploration -- 4.6 Oil Extraction -- 4.6.1 Bringing Extracted Crude Oil to the Surface -- 4.6.2 Enhanced Oil Recovery -- 4.7 Processing of Crude Oil -- 4.7.1 Oil and Natural Gas Storage -- 4.7.2 Oil and Gas Transportation -- 4.7.3 Tanker Ships -- 4.7.4 Railcars -- 4.7.5 Tank Trucks -- 4.8 Overview of Refining -- 4.8.1 Separation/Distillation -- 4.8.2 Conversion -- 4.8.3 Enhancement -- 4.8.4 Blending/Finishing -- 4.8.5 Types of Refineries -- 4.9 Marketing and Distribution of Oil and Gas -- 4.10 End of Production -- 4.11 Factors Influencing the Timing of Oil and Gas Exploration and Production -- 4.11.1 Physical and Technical Factors -- 4.11.2 Social and Political Factors -- 4.11.3 Business Coordination Factors -- 4.12 Non-revenue Benefits of the Oil and Gas Industry -- 4.13 Conclusion -- References -- Chapter 5 Explaining the Midstream Activities in the Oil and Gas Domain -- 5.1 Introduction -- 5.2 Role of Midstream Sector in Oil and Gas Industry -- 5.3 Midstream Oil and Gas Operations -- 5.3.1 Field Processing -- 5.3.2 Storage -- 5.3.3 Transportation -- 5.4 Technological Advancements in Midstream Sector -- 5.4.1 Cloud Computing -- 5.4.2 Internet of Things -- 5.4.3 Robotics and Automation -- 5.4.4 3D Technology -- 5.4.5 Manufacturing and Execution Systems -- 5.5 Midstream Sector Challenges -- 5.5.1 Cyber-Attacks. 5.5.2 Environmental Considerations -- 5.5.3 Social Concerns -- 5.5.4 Regulations -- 5.6 Conclusion -- References -- Chapter 6 The Significance of the Industrial Internet of Things (IIoT) for the Oil and Gas Space -- 6.1 Overview of IIoT -- 6.1.1 Functioning of Internet of Things -- 6.1.2 IIOT Viewpoints -- 6.1.3 Benefits of IIoT -- 6.1.4 Security in IIoT -- 6.2 Technical Innovators of Industrial Internet -- 6.2.1 Industrial Control Systems (ICS) -- 6.2.2 Supervisory Control and Data Acquisition (SCADA) -- 6.3 IoT for Oil and Gas Sector -- 6.3.1 Utilizing IIoT in Oil and Gas -- 6.3.2 Excellence in Operations -- 6.3.3 Device Management -- 6.3.4 Device Connectivity -- 6.3.5 Transformation and Storage -- 6.3.6 Presentation and Action -- 6.3.7 Microsoft Azure -- 6.4 Rebellion of IoT in the Oil and Gas Sector -- 6.4.1 Improved Operational Efficiency -- 6.4.2 Optimize Inventory Levels Based on Actual Usage -- 6.4.3 Improve Stockroom Management -- 6.4.4 Return on Investment (ROI)/Revenue -- 6.4.5 Real-Time Monitoring -- 6.4.6 Removing Manual Measuring Processes -- 6.4.7 Reduction of Safety Risk -- 6.4.8 Hurdles in the Oil and Gas Sector -- 6.5 Oil and Gas Remote Monitoring Systems -- 6.5.1 Sensors -- 6.5.2 Smart Algorithms -- 6.5.3 Prognostic and Preemptive Maintenance -- 6.5.4 Robots and Drones -- 6.5.5 Smart Accessories -- 6.5.6 Wearable Watches -- 6.5.7 Wearable Glasses -- 6.5.8 Drones -- 6.5.9 Monitoring Critical Systems 24/7 -- 6.5.10 PLC Emergency Alert Notification Systems -- 6.5.11 Independent Verification -- 6.5.12 Oil and Gas Survey and Manufacturing Process -- 6.6 Advantages of IIOT for the Oil and Gas Industry -- 6.6.1 Monitoring Pipelines -- 6.6.2 Risk Mitigation -- 6.6.3 Environmental Impact -- 6.6.4 Managing Emergency Conditions -- 6.6.5 Establishing Workers Healthy and Safety -- 6.6.6 Supply Chain Management -- 6.7 Conclusion -- Bibliography. Chapter 7 The Power of Edge AI Technologies for Real-Time Use Cases in the Oil and Gas Domain -- 7.1 Introduction -- 7.2 Demystifying the Paradigm of Artificial Intelligence (AI) -- 7.3 Describing the Phenomenon of Edge Computing -- 7.4 Delineating Edge Computing Advantages -- 7.4.1 The Formation of Edge Device Clouds -- 7.4.2 Real-Time Computing -- 7.4.3 Real-Time Analytics -- 7.4.4 Scalable Computing -- 7.4.5 Secured Computing -- 7.4.6 Automated Analytics and Action -- 7.4.7 Reduced Costs -- 7.5 Demarcating the Move Toward Edge AI -- 7.5.1 How Edge AI Helps to Generate Better Business -- 7.6 Why Edge AI Gains Momentum? -- 7.6.1 The Growing Device Ecosystem -- 7.6.2 Federated Learning -- 7.6.3 Optimization Techniques to Run AI Models in Edge Devices -- 7.6.4 Neural Network (NN) Pruning -- 7.6.5 L2 and L1 Regularization -- 7.7 The Enablers of Edge AI -- 7.8 5G-Advanced Communication -- 7.8.1 Industrial 5G -- 7.8.2 Edge Computing -- 7.8.3 Massive Amounts of Edge Devices Data -- 7.8.4 The Emergence of Accelerators and Specialized Engines -- 7.8.5 Cyber Physical Systems (CPS) -- 7.8.6 Digital Twins (DT) -- 7.9 Why Edge AI is Being Pursued with Alacrity? -- 7.9.1 The Need for Customer Delight -- 7.9.2 Unearthing Fresh Use Cases for Edge AI Across Industrial Verticals -- 7.10 Edge AI Frameworks and Accelerators -- 7.11 Conclusion -- Bibliography -- Chapter 8 AI-Enabled Robots for Automating Oil and Gas Operations -- 8.1 Briefing the Impending Digital Era -- 8.2 Depicting the Digital Power -- 8.2.1 The Emergence of Advanced Drones -- 8.2.2 The Grandiose Arrival of the State-of-the-Art Robots -- 8.3 Robotics: The Use Cases -- 8.3.1 Upstream Oil and Gas -- 8.3.2 Midstream Oil and Gas -- 8.3.3 Downstream Oil and Gas -- 8.4 Real-Life Examples of Robotic Solutions in the Oil and Gas Industry -- 8.5 The Advantages of Robotic Solutions. 8.6 The Dawn of the Internet of Robotic Things. |
Record Nr. | UNINA-9910830287903321 |
Raj Pethuru | ||
Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2024] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|