- Table View
- List View
Prometheus: Infrastructure and Application Performance Monitoring
by Brian Brazil Julien PivottoGet up to speed with Prometheus, the metrics-based monitoring system used in production by tens of thousands of organizations. This updated second edition provides site reliability engineers, Kubernetes administrators, and software developers with a hands-on introduction to the most important aspects of Prometheus, including dashboarding and alerting, direct code instrumentation, and metric collection from third-party systems with exporters.Prometheus server maintainer Julien Pivotto and core developer Brian Brazil demonstrate how you can use Prometheus for application and infrastructure monitoring. This book guides you through Prometheus setup, the Node Exporter, and the Alertmanager, and then shows you how to use these tools for application and infrastructure monitoring. You'll understand why this open source system has continued to gain popularity in recent years.You will:Know where and how much instrumentation to apply to your application codeMonitor your infrastructure with Node Exporter and use new collectors for network system pressure metricsGet an introduction to Grafana, a popular tool for building dashboardsUse service discovery and the new HTTP SD monitoring system to provide different views of your machines and servicesUse Prometheus with Kubernetes and examine exporters you can use with containersDiscover Prom's new improvements and features, including trigonometry functionsLearn how Prometheus supports important security features including TLS and basic authentication
Prompt Engineering for Generative AI
by Mike Taylor James PhoenixLarge language models (LLMs) and diffusion models such as ChatGPT and Stable Diffusion have unprecedented potential. Because they have been trained on all the public text and images on the internet, they can make useful contributions to a wide variety of tasks. And with the barrier to entry greatly reduced today, practically any developer can harness LLMs and diffusion models to tackle problems previously unsuitable for automation.With this book, you'll gain a solid foundation in generative AI, including how to apply these models in practice. When first integrating LLMs and diffusion models into their workflows, most developers struggle to coax reliable enough results from them to use in automated systems. Authors James Phoenix and Mike Taylor show you how a set of principles called prompt engineering can enable you to work effectively with AI.Learn how to empower AI to work for you. This book explains:The structure of the interaction chain of your program's AI model and the fine-grained steps in betweenHow AI model requests arise from transforming the application problem into a document completion problem in the model training domainThe influence of LLM and diffusion model architecture—and how to best interact with itHow these principles apply in practice in the domains of natural language processing, text and image generation, and code
Prompt Engineering for LLMs: The Art and Science of Building Large Language Model–Based Applications
by John Berryman Albert ZieglerLarge language models (LLMs) are revolutionizing the world, promising to automate tasks and solve complex problems. A new generation of software applications are using these models as building blocks to unlock new potential in almost every domain, but reliably accessing these capabilities requires new skills. This book will teach you the art and science of prompt engineering-the key to unlocking the true potential of LLMs. Industry experts John Berryman and Albert Ziegler share how to communicate effectively with AI, transforming your ideas into a language model-friendly format. By learning both the philosophical foundation and practical techniques, you'll be equipped with the knowledge and confidence to build the next generation of LLM-powered applications.Understand LLM architecture and learn how to best interact with itDesign a complete prompt-crafting strategy for an applicationGather, triage, and present context elements to make an efficient promptMaster specific prompt-crafting techniques like few-shot learning, chain-of-thought prompting, and RAG
Prompt Engineering: Empowering Communication
by Anand Nayyar Ajantha Devi VairamaniPrompt engineering engages as a transformative approach to enhancing interaction, creativity, and innovation. From business and healthcare to education, law, and beyond, prompt engineering is a versatile toolkit for navigating complex challenges and driving meaningful change.This book delves into the intricacies of prompt engineering, providing insights, techniques, and practical examples for leveraging prompts effectively. It explores the evolution of prompt engineering, from its early antecedents to its contemporary applications with advanced language models like ChatGPT. Readers will discover how prompts can enhance communication, foster creativity, facilitate problem-solving, and empower professionals across diverse domains.This book is your gateway to unlocking the full potential of prompt engineering. Join the journey of discovery and innovation as the book harnesses the power of prompts to shape a brighter future.
Proof Technology in Mathematics Research and Teaching (Mathematics Education in the Digital Era #14)
by Gila Hanna Michael De Villiers David A. ReidThis book presents chapters exploring the most recent developments in the role of technology in proving. The full range of topics related to this theme are explored, including computer proving, digital collaboration among mathematicians, mathematics teaching in schools and universities, and the use of the internet as a site of proof learning. Proving is sometimes thought to be the aspect of mathematical activity most resistant to the influence of technological change. While computational methods are well known to have a huge importance in applied mathematics, there is a perception that mathematicians seeking to derive new mathematical results are unaffected by the digital era. The reality is quite different. Digital technologies have transformed how mathematicians work together, how proof is taught in schools and universities, and even the nature of proof itself. Checking billions of cases in extremely large but finite sets, impossible a few decades ago, has now become a standard method of proof. Distributed proving, by teams of mathematicians working independently on sections of a problem, has become very much easier as digital communication facilitates the sharing and comparison of results. Proof assistants and dynamic proof environments have influenced the verification or refutation of conjectures, and ultimately how and why proof is taught in schools. And techniques from computer science for checking the validity of programs are being used to verify mathematical proofs. Chapters in this book include not only research reports and case studies, but also theoretical essays, reviews of the state of the art in selected areas, and historical studies. The authors are experts in the field.
Proof of Work: Blockchain Provocations 20112021 (Urbanomic / Art Editions)
by Rhea MyersA beautifully produced anthology of crypto-artist, writer, and hacker Rhea Myers's pioneering blockchain art, along with a selection of her essays, reviews, and fictions.DAO? BTC? NFT? ETH? ART? WTF? HODL as OG crypto-artist, writer, and hacker Rhea Myers searches for faces in cryptographic hashes, follows a day in the life of a young shibe in the year 2032, and patiently explains why all art should be destructively uploaded to the blockchain. Now an acknowledged pioneer whose work has graced the auction room at Sotheby&’s, Myers embarked on her first art projects focusing on blockchain tech in 2011, making her one of the first artists to engage in creative, speculative, and conceptual engagements with "the new internet." Proof of Work brings together annotated presentations of Myers&’s blockchain artworks along with her essays, reviews, and fictions—a sustained critical encounter between the cultures and histories of the artworld and crypto-utopianism, technically accomplished but always generously demystifying and often mischievous. Her deep understanding of the technical history and debates around blockchain technology is complemented by a broader sense of the crypto movement and the artistic and political sensibilities that accompanied its ascendancy. Remodeling the tropes of conceptual art and net.art to explore what blockchain technology reveals about our concepts of value, culture, and currency, Myers&’s work has become required viewing for anyone interested in the future of art, consensus, law, and collectivity.
Proofs and Algorithms
by Gilles DowekLogic is a branch of philosophy, mathematics and computer science. It studies the required methods to determine whether a statement is true, such as reasoning and computation. Proofs and Algorithms: Introduction to Logic and Computability is an introduction to the fundamental concepts of contemporary logic - those of a proof, a computable function, a model and a set. It presents a series of results, both positive and negative, - Church's undecidability theorem, Gödel's incompleteness theorem, the theorem asserting the semi-decidability of provability - that have profoundly changed our vision of reasoning, computation, and finally truth itself. Designed for undergraduate students, this book presents all that philosophers, mathematicians and computer scientists should know about logic.
Propaganda: From Disinformation and Influence to Operations and Information Warfare
by Lukasz OlejnikThe book is a modern primer on propaganda—aspects like disinformation, trolls, bots, information influence, psychological operations, information operations, and information warfare. Propaganda: From Disinformation and Influence to Operations and Information Warfare offers a contemporary model for thinking about the subject.The first two decades of the 21st century have brought qualitative and quantitative technological and societal changes, and the subject of information influence needs to be re-ordered. Now is the time.The book explains the origins of the meaning and phenomenon of propaganda—where it came from and how it has changed over the centuries. The book also covers modern methods, including artificial intelligence (AI) and advertising technologies. Legal, political, diplomatic, and military considerations ensure that the material is covered in depth.The book is recommended for security and cybersecurity professionals (both technical and non-technical), government officials, politicians, corporate executives, academics, and students of technical and social sciences. Adepts with an interest in the subject will read it with interest.
Propagation Characterization and Channel Modeling for UAV Communications (Wireless Networks)
by Xiang Cheng Ziwei Huang Lu BaiThis book focuses on the propagation characterization and channel modeling of Unmanned Aerial Vehicle (UAV) communications. Currently, there are no books that cover this specific topic. The authors fill in this void by elaborating accurate yet easy-to-use UAV channel models. The authors also present such topics as propagation characteristics of UAV communications, a time stationary regular-shaped geometry-based stochastic model (RS-GBSM) for UAV narrowband channels. It also introduces a time non-stationary RS-GBSM for UAV narrowband channels, a time non-stationary RS-GBSM for UAV wideband channels, a time-space non-stationary irregular-shaped geometry-based stochastic model (IS-GBSM) for UAV wideband channels and more. Finally, this book closes up with some promising directions, hoping to promote future research outcomes in the field of UAV channel modeling. As the UAV technology matures rapidly, UAV communications are shifting from military development to civilian and commercial sectors. The UAV communication is widely considered as a significant and indispensable component of wireless communications. It is well known that an accurate yet easy-to-use UAV channel model is the foundation of designing a proper UAV communication system and evaluating its performance. This book also provides valuable suggestions for the design of UAV communication systems by adequately presenting the UAV propagation characterization and channel modeling. This book is mainly written for researchers and professionals working in wireless communications. Advanced-level students majoring in computer science or electrical engineering may also find the content useful as a secondary textbook.
Propagation Engineering in Radio Links Design
by Farshid Ghasemi Abdollah Ghasemi Ali AbediThis book addresses propagation phenomena in satellite, radar, broadcasting, short range , trans-horizon and several recent modes of communications in radio links. Also, it includes some topics on antennas , radio noises and improvement techniques. The book provides the necessary basic matters, as well as experimental results and calculation procedures for radio link design.
Propagation Engineering in Wireless Communications
by Farshid Ghasemi Abdollah Ghasemi Ali AbediPropagation Engineering in Wireless Communications covers the basic principles needed for understanding of radiowaves propagation for common frequency bands used in radio-communications. This book includes descriptions of new achievements and new developements in propagation models for wireless communication. The book is intended to bridge the gap between the theoretical calculations and approaches to the applied procedures needed for radio links design in a proper manner. The authors intention is to emphasize propagation engineering by giving sufficient fundamental information and then going on to explain the use of basic principles together with technical achievements in this field.
Propagation Phenomena in Real World Networks
by Dariusz Król Damien Fay Bogdan Gabryś"Propagation, which looks at spreading in complex networks, can be seen from many viewpoints; it is undesirable, or desirable, controllable, the mechanisms generating that propagation can be the topic of interest, but in the end all depends on the setting. This book covers leading research on a wide spectrum of propagation phenomenon and the techniques currently used in its modelling, prediction, analysis and control. Fourteen papers range over topics including epidemic models, models for trust inference, coverage strategies for networks, vehicle flow propagation, bio-inspired routing algorithms, P2P botnet attacks and defences, fault propagation in gene-cellular networks, malware propagation for mobile networks, information propagation in crisis situations, financial contagion in interbank networks, and finally how to maximize the spread of influence in social networks. The compendium will be of interest to researchers, those working in social networking, communications and finance and is aimed at providing a base point for further studies on current research. Above all, by bringing together research from such diverse fields, the book seeks to cross-pollinate ideas, and give the reader a glimpse of the breath of current research. "
Propeller Programming: Using Assembler, Spin, And C
by Sridhar AnandakrishnanLearn to program the Propeller in Spin and C and how to map the Propeller Assembler (PASM) language from other high-level languages you might know.The overall task you will pursue in the book is to implement a Delta Compression algorithm: first in Spin, then in PASM, then in C. Along the way, you'll review test driven development, a powerful technique for validating code, and conclude with a chapter on hardware manipulations. The book's main goal is to help you extend the capabilities of the Propeller processor by using the assembler language.What You’ll LearnUse a data compression/decompression application to introduce PASM to the readerIntegrate C and PASM codeReview hardware interactions (setting and reading pins)Who This Book Is ForThose who are familiar with Spin programming for the Parallax Propeller but have an interest in learning Propeller C and Propeller Assembler (PASM) programming. Some knowledge of C or Python is also helpful.
Proper Generalized Decompositions
by Elías Cueto David González Icíar AlfaroThis book is intended to help researchers overcome the entrance barrier to Proper Generalized Decomposition (PGD), by providing a valuable tool to begin the programming task. Detailed Matlab Codes are included for every chapter in the book, in which the theory previously described is translated into practice. Examples include parametric problems, non-linear model order reduction and real-time simulation, among others. Proper Generalized Decomposition (PGD) is a method for numerical simulation in many fields of applied science and engineering. As a generalization of ProperOrthogonal Decomposition or Principal Component Analysis to an arbitrary numberof dimensions, PGD is able to provide the analyst with very accurate solutionsfor problems defined in high dimensional spaces, parametric problems and evenreal-time simulation.
Property-Based Testing with PropEr, Erlang, and Elixir: Find Bugs Before Your Users Do
by Fred HebertProperty-based testing helps you create better, more solid tests with little code. By using the PropEr framework in both Erlang and Elixir, this book teaches you how to automatically generate test cases, test stateful programs, and change how you design your software for more principled and reliable approaches. You will be able to better explore the problem space, validate the assumptions you make when coming up with program behavior, and expose unexpected weaknesses in your design. PropEr will even show you how to reproduce the bugs it found. With this book, you will be writing efficient property-based tests in no time. Most tests only demonstrate that the code behaves how the developer expected it to behave, and therefore carry the same blind spots as their authors when special conditions or edge cases show up. Learn how to see things differently with property tests written in PropEr. Start with the basics of property tests, such as writing stateless properties, and using the default generators to generate test cases automatically. More importantly, learn how to think in properties. Improve your properties, write custom data generators, and discover what your code can or cannot do. Learn when to use property tests and when to stick with example tests with real-world sample projects. Explore various testing approaches to find the one that's best for your code. Shrink failing test cases to their simpler expression to highlight exactly what breaks in your code, and generate highly relevant data through targeted properties. Uncover the trickiest bugs you can think of with nearly no code at all with two special types of properties based on state transitions and finite state machines. Write Erlang and Elixir properties that generate the most effective tests you'll see, whether they are unit tests or complex integration and system tests. What You Need Basic knowledge of Erlang, optionally ElixirFor Erlang tests: Erlang/OTP >= 20.0, with Rebar >= 3.4.0For Elixir tests: Erlang/OTP >= 20.0, Elixir >= 1.5.0
Proportionate-type Normalized Least Mean Square Algorithms
by Milos Doroslovacki Kevin WagnerThe topic of this book is proportionate-type normalized least mean squares (PtNLMS) adaptive filtering algorithms, which attempt to estimate an unknown impulse response by adaptively giving gains proportionate to an estimate of the impulse response and the current measured error. These algorithms offer low computational complexity and fast convergence times for sparse impulse responses in network and acoustic echo cancellation applications. New PtNLMS algorithms are developed by choosing gains that optimize user-defined criteria, such as mean square error, at all times. PtNLMS algorithms are extended from real-valued signals to complex-valued signals. The computational complexity of the presented algorithms is examined. Contents 1. Introduction to PtNLMS Algorithms2. LMS Analysis Techniques3. PtNLMS Analysis Techniques4. Algorithms Designed Based on Minimization of User Defined Criteria5. Probability Density of WD for PtLMS Algorithms6. Adaptive Step-size PtNLMS Algorithms7. Complex PtNLMS Algorithms8. Computational Complexity for PtNLMS Algorithms About the Authors Kevin Wagner has been a physicist with the Radar Division of the Naval Research Laboratory, Washington, DC, USA since 2001. His research interests are in the area of adaptive signal processing and non-convex optimization.Milos Doroslovacki has been with the Department of Electrical and Computer Engineering at George Washington University, USA since 1995, where he is now an Associate Professor. His main research interests are in the fields of adaptive signal processing, communication signals and systems, discrete-time signal and system theory, and wavelets and their applications.
Propose, Prepare, Present: How to become a successful, effective, and popular speaker at industry conferences
by Alistair CrollEvery year, tens of thousands of companies—from industry giants to aspiring upstarts—apply to speak at conferences. They pump millions of dollars into these events, hoping to find new customers, strengthen their brand, and meet new partners. Sadly, for most of them, things don’t go that way. Submitted topics aren’t chosen; when they are, they come across as tone-deaf sales pitches.What does it take to be chosen to speak—and to rock the mic when given the chance? This book takes you behind-the-scenes of the conference process, showing you how to submit, plan, and deliver a talk that matters. Event organizer Alistair Croll provides many examples based on his experience with a wide range of conferences, including O’Reilly’s Strata, Velocity, Web2Expo, and TOC Conferences.Learn 11 items that help your submission stand out—and 11 items that will get it tossedExplore the hurdles your proposal has to clear before it’s acceptedTailor your talk to a conference’s topics and themesDiscover why images work better than words in your slide deckAchieve your business goals by engaging the audience before, during, and after your talk"We’ve been running successful events worldwide for over a decade, and the simple truth is that the people who get chosen, and give great presentations, follow the rules in this book."--Gina Blaber, VP Conferences, O’Reilly Media
Prospective Ergonomics
by André LiemThis book argues for a prospective turn in ergonomics to challenge the established fields of strategic design (SD) and management. Its multi-disciplinary outlook builds upon concepts derived from Management, Innovation and Design Science. Differences, similarities and relationships between strategic design and prospective ergonomics are reviewed using existing theories and frameworks from design, ergonomics, and strategic and innovation management. To complement the theory, 12 cases have been analyzed in greater depth according to 4 main dimensions of analysis. Outcomes have shown that innovating through the Prospective Ergonomics (PE) approach is about finding the right balance between, on the one hand, meeting primary objectives such as profit maximization or solving the design problem, and on the other, acknowledging that human activity is bounded by rationality. This means that humans have diverse motives.
Protecting Children Online?: Cyberbullying Policies of Social Media Companies (The Information Society Series)
by Tijana MilosevicA critical examination of efforts by social media companies—including Facebook, Twitter, Snapchat, and Instagram—to rein in cyberbullying by young users.High-profile cyberbullying cases often trigger exaggerated public concern about children's use of social media. Large companies like Facebook respond by pointing to their existing anti-bullying mechanisms or coordinate with nongovernmental organizations to organize anti-cyberbullying efforts. Do these attempts at self-regulation work? In this book, Tijana Milosevic examines the effectiveness of efforts by social media companies—including Facebook, Twitter, YouTube, Snapchat, and Instagram—to rein in cyberbullying by young users. Milosevic analyzes the anti-bullying policies of fourteen major social media companies, as recorded in companies' corporate documents, draws on interviews with company representatives and e-safety experts, and details the roles of nongovernmental organizations examining their ability to provide critical independent advice. She draws attention to lack of transparency in how companies handle bullying cases, emphasizing the need for a continuous independent evaluation of effectiveness of companies' mechanisms, especially from children's perspective. Milosevic argues that cyberbullying should be viewed in the context of children's rights and as part of the larger social problem of the culture of humiliation.Milosevic looks into five digital bullying cases related to suicides, examining the pressures on the social media companies involved, the nature of the public discussion, and subsequent government regulation that did not necessarily address the problem in a way that benefits children. She emphasizes the need not only for protection but also for participation and empowerment—for finding a way to protect the vulnerable while ensuring the child's right to participate in digital spaces.
Protecting Critical Infrastructures Against Cyber-Attack (Adelphi series)
by Stephen LukasikThe threat that is posed by "cyber-warriors" is illustrated by recent incidents such as the Year 2000 "Millennium Bug". Strategies to reduce the risk that cyber-attack poses, at both individual and national level, are described and compared with the actions being taken by a number of Western governments.
Protecting Data Privacy in Health Services Research
by Institute of MedicineThe need for quality improvement and for cost saving are driving both individual choices and health system dynamics. The health services research that we need to support informed choices depends on access to data, but at the same time, individual privacy and patient-health care provider confidentiality must be protected.
Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment
by National Research Council of the National AcademiesAll U.S. agencies with counterterrorism programs that collect or "mine" personal data -- such as phone records or Web sites visited -- should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.
Protecting Information Assets and IT Infrastructure in the Cloud
by Preston de Guise Ravi DasToday, many businesses and corporations are moving their on premises IT Infrastructure to the Cloud. There are numerous advantages to do doing so, including on-demand service, scalability, and fixed pricing. As a result, the Cloud has become a popular target of cyber-based attacks. Although an ISP is often charged with keeping virtual infrastructure secure, it is not safe to assume this. Back-up measures must be taken. This book explains how to guard against cyber-attacks by adding another layer of protection to the most valuable data in the Cloud: customer information and trade secrets.
Protecting Information Assets and IT Infrastructure in the Cloud
by Ravi DasThis book is a second edition. The last one reviewed the evolution of the Cloud, important Cloud concepts and terminology, and the threats that are posed on a daily basis to it. A deep dive into the components of Microsoft Azure were also provided, as well as risk mitigation strategies, and protecting data that resides in a Cloud environment. In this second edition, we extend this knowledge gained to discuss the concepts of Microsoft Azure. We also examine how Microsoft is playing a huge role in artificial intelligence and machine learning with its relationship with OpenAI. An overview into ChatGPT is also provided, along with a very serious discussion of the social implications for artificial intelligence.
Protecting Location Privacy in the Era of Big Data: A Technical Perspective
by Quan Z. Sheng Yan Yan Adnan MahmoodThis book examines the uses and potential risks of location-based services (LBS) in the context of big data, with a focus on location privacy protection methods.The growth of the mobile Internet and the popularity of smart devices have spurred the development of LBS and related mobile applications. However, the misuse of sensitive location data could compromise the physical and communication security of associated devices and nodes, potentially leading to privacy breaches. This book explores the potential risks to the location privacy of mobile users in the context of big data applications. It discusses the latest methods and implications of location privacy from different perspectives. The author offers case studies of three applications: statistical disclosure and privacy protection of location-based big data using a centralized differential privacy model; a user location perturbation mechanism based on a localized differential privacy model; and terminal location perturbation using a geo-indistinguishability model. Linking recent developments in three-dimensional positioning and artificial intelligence, the book also predicts future trends and provides insights into research issues in location privacy.This title will be a valuable resource for researchers, students, and professionals interested in location-based services, privacy computing and protection, wireless network security, and big data security.