Browse Results

Showing 49,701 through 49,725 of 59,729 results

Runescape Gold Strategy Guide

by Lesley A. Harrison

A practical and concise tutorial leading the player to understand how to get the most out of their in game time. Packt Gold Strategy Guides are a workout, not a walkthrough! Newcomers or experienced players of the Runescape online game. Both free and pay-for members will benefit from the book.

Running a Successful Live Service Game: Live Outside of Game Updates

by null Sergei Vasiuk

This book unveils the secrets of extraordinarily successful games and hands you a smarter way to create exceptional engagement and convert it into revenue. It teaches you detailed LiveOps techniques that show you how to keep your game appealing through engaging events, personalized experiences, and smart monetization.You’ll discover the "3 LAPs of Operations" framework—a dynamic, question-driven process that you can implement to systematically boost retention and achieve your game's financial goals. The book delves into the intricate business of live service games, explaining how to enhance your operational efficiency with precise toolset implementations and analytics.While some studio leaders merely talk about "riding the trend", this approach is far too passive. Embrace the shift towards people-driven game development, where your players evolve from mere consumers into active co-creators. This transformation allows you to construct your own trend, known as People's LiveOps, where you engage your most devoted fans and offer them opportunities to earn a living through their creations.Essential for professionals in live service games, this book is also invaluable for aspiring talents and seasoned experts aiming to enter or excel in the gaming industry.

Running ESXi on a Raspberry Pi: Installing VMware ESXi on Raspberry Pi 4 to run Linux virtual machines

by Thomas Fenton Patrick Kennedy

Gain foundational knowledge of ESXi technology and understand why it is such a dominant force in the datacenter. This book also looks beyond ESXi to other vSphere technologies, such as virtual machines (VMs), vMotion, and vCenter Server. Knowing how these technologies complement ESXi running on a Raspberry Pi will help you get the most out of ESXi on Arm technologies. This marks a significant change for ESXi, and has created new learning opportunities and use cases for both seasoned ESXi users and users completely new to the virtualization space. For those already familiar with ESXi but new to the Raspberry Pi, you’ll develop an in-depth understanding of this device and why it has become such a popular platform for technologists. Once you’ve learned the fundamentals, you’ll be introduced to enterprise, edge, and personal use-cases for this technology. Then, you’ll be walked through the process of installing ESXi on a Pi, as well as managing and monitoring it. You will also come to recognize its strengths and limitations and become familiar with the storage and networking options that are currently available. Lastly, given the fact that the sole purpose of running ESXi on a Pi is to run VMs on it, you’ll receive detailed step-by-step instructions for installing popular OSes including Ubuntu, CentOS, and Raspberry Pi OS. What You'll LearnBuild a fully functional ESXi server on a Raspberry PiSelect the correct hardware for particular use casesCreate and optimize virtual machines running on a PiRun Kubernetes on a Pi running ESXi Who This Book Is ForThose new to the datacenter who want a low-cost way to work with one of the most powerful datacenter technologies to experienced datacenter professionals who need to use ESXi on Arm to complement their enterprise’s long-term strategic goals.

Running Lean: Iterate from Plan A to a Plan That Works

by Ash Maurya

<div><p>We live in an age of unparalleled opportunity for innovation. We&#8217;re building more products than ever before, but most of them fail&#8212;not because we can&#8217;t complete what we set out to build, but because we waste time, money, and effort building the wrong product. What we need is a systematic process for quickly vetting product ideas and raising our odds of success. \n</p><p>\n\nIn this inspiring book, Ash Maurya takes you through an exacting strategy for achieving a "product/market fit" for your fledgling venture, based on his own experience in building a wide array of products from high-tech to no-tech. Throughout, he builds on the ideas and concepts of several innovative methodologies, including the Lean Startup, Customer Development, and bootstrapping.</p></div>

Running Lean: Iterate from Plan A to a Plan That Works

by Ash Maurya

We're building more products today than ever before, but most of them fail--not because we can't complete what we want to build but because we waste time, money, and effort building the wrong product. What we need is a systematic process for quickly vetting product ideas and raising our odds of success. That's the promise of Running Lean.In this inspiring book, Ash Maurya takes you through an exacting strategy for achieving product/market fit for your fledgling venture. You'll learn ideas and concepts from several innovative methodologies, including the Lean Startup, business model design, design thinking, and Jobs-to-be-Done. This new edition introduces the continuous innovation framework and follows one entrepreneur's journey from initial vision to a business model that works.Deconstruct your idea using a one-page Lean CanvasStress-test your idea for desirability, viability, and feasibilityDefine key milestones charted on a traction roadmapMaximize your team's efforts for speed, learning, and focusPrioritize the right actions at the right timeLearn how to conduct effective customer interviewsEngage your customers throughout the development cycleContinually test your product with smaller, faster iterationsFind a repeatable and scalable business model

Running Linux: A Distribution-Neutral Guide for Servers and Desktops

by Matthias Kalle Dalheimer Matt Welsh

You may be contemplating your first Linux installation. Or you may have been using Linux for years and need to know more about adding a network printer or setting up an FTP server. Running Linux, now in its fifth edition, is the book you'll want on hand in either case. Widely recognized in the Linux community as the ultimate getting-started and problem-solving book, it answers the questions and tackles the configuration issues that frequently plague users, but are seldom addressed in other books.This fifth edition of Running Linux is greatly expanded, reflecting the maturity of the operating system and the teeming wealth of software available for it. Hot consumer topics suchas audio and video playback applications, groupware functionality, and spam filtering are covered, along with the basics in configuration and management that always have made the book popular.Running Linux covers basic communications such as mail, web surfing, and instant messaging, but also delves into the subtleties of network configuration--including dial-up, ADSL, and cable modems--in case you need to set up your network manually. The book canmake you proficient on office suites and personal productivity applications--and also tells you what programming tools are available if you're interested in contributing to these applications.Other new topics in the fifth edition include encrypted email and filesystems, advanced shell techniques, and remote login applications. Classic discussions on booting, package management, kernel recompilation, and X configuration have also been updated.The authors of Running Linux have anticipated problem areas, selected stable and popular solutions, and provided clear instructions to ensure that you'll have a satisfying experience using Linux. The discussion is direct and complete enough to guide novice users, while still providing the additional information experienced users will need to progress in their mastery of Linux.Whether you're using Linux on a home workstation or maintaining a network server, Running Linux will provide expert advice just when you need it.

Running Linux, 4th Edition

by Matthias Kalle Dalheimer Terry Dawson Lar Kaufman Matt Welsh

The fourth edition of Running Linuxdelves deeper into installation, configuring the windowing system, system administration, and networking. A solid foundation text for any Linux user, the book also includes additional resources for dealing with special requirements imposed by hardware, advanced applications, and emerging technologies. Whether you are using Linux on a home workstation or maintaining a network server, Running Linuxwill provide expert advice just when you need it.

Running Linux, 5th Edition

by Matthias Kalle Dalheimer Matt Welsh

The fifth edition of Running Linux is greatly expanded, reflecting the maturity of the operating system and the teeming wealth of software available for it. Hot consumer topics such as audio and video playback applications, groupware functionality, and spam filtering are covered, along with the basics in configuration and management that always made the book popular.

Running Linux, 5th Edition

by Matthias Kalle Dalheimer Matt Welsh

The fifth edition of Running Linux is greatly expanded, reflecting the maturity of the operating system and the teeming wealth of software available for it. Hot consumer topics such as audio and video playback applications, groupware functionality, and spam filtering are covered, along with the basics in configuration and management that always made the book popular.

Running Mac OS X Panther

by James N. Davidson

Apple® has shown no mercy to the Macintosh® power user---that dedicated individual who knows their Mac® inside and out: what makes it tick, and what makes it tick better. In the rapid evolution of Mac OS® X, there have been three major releases, and each new release challenges the power user to once more stay ahead of the learning curve. Mac OS X Panther is no exception to that rule. With more than 100 new features, including a new Finder, Expos , FileVault, and an improved BSD Unix core, there's plenty here to master. Fortunately, power users have a secret weapon in Running Mac OS X Panther . This book takes readers deep inside Mac OS X's core, revealing the inner workings of Panther for those who want to get the most out of their system. Running Mac OS X Panther is the ultimate Swiss Army Knife⠢ for power users who want to customize, tweak, and generally rev up their Mac. The easy-to-follow format is organized into three primary parts: Getting Started introduces you to Mac OS X--where it came from, how it's put together, and how it works Administration Essentials gives you the tools you need to examine how your system is running and adjust all the knobs behind its operation Networking and Network Services covers all the ways Mac OS X interfaces with the world around it, including wireless and spontaneous networking Developer Tools, including Xcode, for Mac OS X are discussed throughout the book where needed to accomplish the task at hand. The appendices that follow include handy quick reference materials for things such as Open Firmware. Written for readers who are inquisitive and confident enough to dig into their Macintosh system, Running Mac OS X Panther doesn't waste time talking about silly Finder tips or glossing over the messier details. This book dives right in and explains how your Mac works. You may not be a Mac guru when you start this book, but once you've read it, you'll be well on your way.

Running Mac OS X Tiger

by Jason Deraleau James N. Davidson

Running Mac OS X Tiger is the ideal resource for power users and system administrators like you who want to tweak Tiger, the new release of Mac OS X, to run faster, better, or just differently. If you areready to dig deep into your Mac, this book expertly guides you to the core of Mac OS X. It helps you understand the inner workings of the operating system so you can know how to get the most out of it. And it gives you countless ideas--and step-by-step instruction--for customizing and revving up Tiger to your specific needs and your liking. Completely revised and updated for Mac OS X Tiger, Running Mac OS X Tiger covers all the new features and functionality of Tiger. You can count on authors Jason Deraleau and James Duncan Davidson to give what you need--and not bother with what you don't. They don't spend time on Finder tips and keyboard shortcuts; they focus on showing you what makes a Mac tick and, more importantly, how you can make it tick just the way you want it to. Easy to follow and intuitively organized, Running Mac OS X Tiger is divided into three parts: "Getting Started" introduces Mac OS X and explains how it's put together and why it works; "Administration Essentials" gives you the tools you need to examine how your system is running and adjust all the knobs behind its operation; and "Networking and Network Services" covers the ways Mac OS X interfaces with the world around it, including wireless and spontaneous networking. Developer Tools for Mac OS X, including Xcode, are discussed throughout the book as appropriate. For the growing number of intermediate to advanced users who are ready and eager to customize Mac OS X, Running Mac OS X Tiger delivers everything you need to become master of your Mac.

Running Microsoft Workloads on AWS: Active Directory, Databases, Development, and More

by Ryan Pothecary

Did you know that Amazon Web Services runs nearly double the amount of Microsoft Workloads in the cloud than any other provider?Running Microsoft Workloads in AWS is your single-source solution for learning the best practice skills and guidance that AWS consultants offer their customers in the field. Over 70% of enterprise workloads are based on Microsoft technologies and AWS has been running these technologies in the AWS Cloud for more than 12 years—far longer than Microsoft’s own Azure cloud platform. This book introduces AWS foundations and compares them to traditional Microsoft architectures, showing you how to design your AWS Cloud platform to run your current Microsoft solutions. It covers the crucial area of identity and access control, showing how to implement Active Directory inside the AWS platform and the most secure ways of enabling Single Sign On from your own data centers and from Microsoft AzureAD. The book goes in-depth and shows how developers across the globe are using their existing .NET skills to develop directly on top of AWS, using current AWS development services such as AWS Code Pipeline, AWS Code Build, and AWS Code Deploy to create the next generation of cloud-native applications using the most popular cloud serverless service—AWS Lambda. What You Will LearnBe familiar with the basic building blocks of AWS and how the terminology differs from your own data center and Microsoft AzureUnderstand Amazon Machine Images (AMI) strategies and solutions to best manage the trade-off between speed and manageabilityRun one of the most popular Microsoft products: SQL Server on AWSBe aware of the different database architecture designs for using Amazon RDS and Amazon EC2Read an overview of Serverless Development in the AWS cloud from a Microsoft .NET perspectiveKnow migration strategies for moving your Microsoft Workloads to the AWS Cloud Who This Book Is For Covers high-level concepts and solutions for CTOs and CCTOs; provides a solution for architects; and dives deep into the topic for administrators and DevOps engineers

Running Weblogs with Slash

by Brian Aker David Krieger

Slash is the open-source software system that drives the hugely popular Slashdot web site and many others. Slash implements the kind of web site that has come to be called a "weblog": a moderated list, in reverse-chronological order, of timely items, with links to further discussion on-site, or to further information off-site. Anyone who wants to get a weblog site up and running will want to read Running Weblogs with Slash.

Running Windows Containers on AWS: A complete guide to successfully running Windows containers on Amazon ECS, EKS, and AWS Fargate

by Marcio Morales

Scale up your Windows containers seamlessly on AWS powered by field-proven expertise and best practices on Amazon ECS, EKS, and FargatePurchase of the print or Kindle book includes a free PDF eBookKey FeaturesLeverage the most recent best practices to run and manage Windows containers on AWSLearn about AWS tools to containerize and run Windows containers on AWSDeeper understanding on how Amazon ECS, EKS, and Fargate supports Windows containersBook DescriptionWindows applications are everywhere, from basic intranet applications to high-traffic public APIs. Their prevalence underscores the importance of combining the same tools and experience for managing a modern containerized application with existing critical Windows applications to reduce costs, achieve outstanding operational excellence, and modernize quickly. This comprehensive guide to running and managing Windows containers on AWS looks at the best practices from years of customer interactions to help you stay ahead of the curve.Starting with Windows containers basics, you'll learn about the architecture design that powers Amazon ECS, EKS, and AWS Fargate for Windows containers. With the help of examples and best practices, you'll explore in depth how to successfully run and manage Amazon ECS, EKS, and AWS Fargate clusters with Windows containers support. Next, the book covers day 2 operations in detail, from logging and monitoring to using ancillary AWS tools that fully containerize existing legacy .NET Framework applications into containers without any code changes. The book also covers the most common Windows container operations, such as image lifecycle and working with ephemeral hosts.By the end of this book, you'll have mastered how to run Windows containers on AWS and be ready to start your modernization journey confidently.What you will learnGet acquainted with Windows container basicsRun and manage Windows containers on Amazon ECS, EKS, and AWS FargateEffectively monitor and centralize logs from Windows containersProperly maintain Windows hosts and keep container images up to dateManage ephemeral Windows hosts to reduce operational overheadWork with the container image cache to speed up the container's boot timeWho this book is forThis book is targeted towards DevOps engineer, SREs, solution architects, or a Windows sysadmin who wants to learn more about running Windows containers on AWS. In order to learn from this book, you should have a basic understanding of containers, Docker, and Kubernetes. The book is also beneficial for Windows application developers who want to explore how to achieve better application scalability using containers as a compute layer.

Running with Robots: The American High School's Third Century

by Greg Toppo Jim Tracy

How the technological changes that are reshaping the future of work will transform the American high school as well.What will high school education look like in twenty years? High school students are educated today to take their places in a knowledge economy. But the knowledge economy, based on the assumption that information is a scarce and precious commodity, is giving way to an economy in which information is ubiquitous, digital, and machine-generated. In Running with Robots, Greg Toppo and Jim Tracy show how the technological advances that are already changing the world of work will transform the American high school as well.Toppo and Tracy--a journalist and an education leader, respectively--look at developments in artificial intelligence and other fields that promise to bring us not only driverless cars but doctorless patients, lawyerless clients, and possibly even teacherless students. They visit schools from New York City to Iowa that have begun preparing for this new world. Toppo and Tracy intersperse these reports from the present with bulletins from the future, telling the story of a high school principal who, Rip Van Winkle-style, sleeps for twenty years and, upon awakening in 2040, can hardly believe his eyes: the principal's amazingly efficient assistant is a robot, calculation is outsourced to computers, and students, grouped by competence and not grade level, focus on the conceptual. The lesson to be learned from both the present and the book's thought-experiment future: human and robotic skillsets are complementary, not in competition. We can run with robots, not against them.

Runtime Reconfiguration in Networked Embedded Systems

by Zoltan Papp George Exarchakos

Thisbook focuses on the design and testing of large-scale, distributed signalprocessing systems, with a special emphasis on systems architecture, toolingand best practices. Architecture modeling, model checking, model-basedevaluation and model-based design optimization occupy central roles. Targetsystems with resource constraints on processing, communication or energy supplyrequire non-trivial methodologies to model their non-functional requirements,such as timeliness, robustness, lifetime and "evolution" capacity. Besides thetheoretical foundations of the methodology, an engineering process andtoolchain are described. Real-world cases illustrate the theory and practicetested by the authors in the course of the Europeanproject ARTEMIS DEMANES. The book can be used as a "cookbook" for designers andpractitioners working with complex embedded systems like sensor networks for thestructural integrity monitoring of steel bridges, and distributed micro-climatecontrol systems for greenhouses and smart homes.

Runtime Verification: 24th International Conference, RV 2024, Istanbul, Turkey, October 15–17, 2024, Proceedings (Lecture Notes in Computer Science #15191)

by Erika Ábrahám Houssam Abbas

This book constitutes the refereed proceedings of the 24th International Conference on Runtime Verification, RV 2024, held in Istanbul, Turkey, during October 15-17, 2024. The 11 full papers, 5 short papers and 2 tool papers included in this book were carefully reviewed and selected from 31 submissions. They were organized in topical sections as follows: Invited Paper; Cyber-physical Systems; Temporal Logics; Speci cation and Visualization; Deep Neural Networks; and Distributed Systems.

Runtime Verification: 18th International Conference, RV 2018, Limassol, Cyprus, November 10–13, 2018, Proceedings (Lecture Notes in Computer Science #11237)

by Christian Colombo Martin Leucker

This book constitutes the refereed proceedings of the 18th International Conference on Runtime Verification, RV 2018, held in Limassol, Cyprus, in November 2018. The 21 full papers presented together with 3 short papers and 3 tool papers were carefully reviewed and selected from 49 submissions. The RV conference is concerned with all aspects of monitoring and analysis of hardware, software and more general system executions. Runtime verification techniques are lightweight techniques to assess correctness, reliability, and robustness; these techniques are significantly more powerful and versatile than conventional testing, and more practical than exhaustive formal verification.Chapter “Hardware-based Runtime Verification with Embedded Tracing Units and Stream Processing” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Runtime Verification: 22nd International Conference, RV 2022, Tbilisi, Georgia, September 28–30, 2022, Proceedings (Lecture Notes in Computer Science #13498)

by Thao Dang Volker Stolz

This book constitutes the refereed proceedings of the 22nd International Conference on Runtime Verification, RV 2022, held in Tbilisi, Georgia, during September 28-30, 2022. The 12 regular papers and 10 short papers presented in this book were carefully reviewed and selected from 40 submissions. The RV conference is concerned with all aspects of monitoring and analysis of hardware, software and more general system executions. Runtime verification techniques are crucial for system correctness, reliability, and robustness; they provide an additional level of rigor and effectiveness compared to conventional testing, and are generally more practical than exhaustive formal verification.

Runtime Verification: 20th International Conference, RV 2020, Los Angeles, CA, USA, October 6–9, 2020, Proceedings (Lecture Notes in Computer Science #12399)

by Jyotirmoy Deshmukh Dejan Ničković

This book constitutes the refereed proceedings of the 20th International Conference on Runtime Verification, RV 2020, held in Los Angeles, CA, USA, in October 2020. The conference was held virtually due to the COVID-19 pandemic. The 14 regular papers and 2 short papers presented in this book were carefully reviewed and selected from 43 submissions. Also included are an invited paper, 5 tutorial papers, 6 tool papers, and a benchmark paper. The RV conference is concerned with all aspects of monitoring and analysis of hardware, software and more general system executions. The papers are organized in the following topical sections: runtime verification for autonomy; runtime verification for software; runtime verification with temporal logic specifications; stream-based monitoring; and runtime verification for cyber-physical systems.

Runtime Verification

by Yliès Falcone César Sánchez

This book constitutes the refereed proceedings of the 16th International Conference on Runtime Verification, RV 2016, held in Madrid, Spain, in September 2016. The 18 revised full papers presented together with 4 short papers, 3 tool papers, 2 tool demonstration papers, and 5 tutorials, were carefully reviewed and selected from 72 submissions. The RV conference is concerned with all aspects of monitoring and analysis of hardware, software and more general system executions. Runtime verification techniques are lightweight techniques to assess correctness, reliability, and robustness; these techniques are significantly more powerful and versatile than conventional testing, and more practical than exhaustive formal verification.

Runtime Verification: 21st International Conference, RV 2021, Virtual Event, October 11–14, 2021, Proceedings (Lecture Notes in Computer Science #12974)

by Lu Feng Dana Fisman

This book constitutes the refereed proceedings of the 21st International Conference on Runtime Verification, RV 2021, held virtually during October 11-14, 2021.The 11 regular papers and 7 short/tool/benchmark papers presented in this book were carefully reviewed and selected from 40 submissions. Also included is one tutorial paper. The RV conference is concerned with all aspects of monitoring and analysis of hardware, software and more general system executions.

Runtime Verification: 19th International Conference, RV 2019, Porto, Portugal, October 8–11, 2019, Proceedings (Lecture Notes in Computer Science #11757)

by Bernd Finkbeiner Leonardo Mariani

This book constitutes the refereed proceedings of the 19th International Conference on Runtime Verification, RV 2019, held in Porto, Portugal, in October 2019.The 25 regular papers presented in this book were carefully reviewed and selected from 38 submissions.The RV conference is concerned with all aspects of monitoring and analysis of hardware, software and more general system executions. Runtime verification techniques are lightweight techniques to assess system correctness, reliability, and robustness; these techniques are significantly more powerful and versatile than conventional testing, and more practical than exhaustive formal verification.Chapter “Assumption-Based Runtime Verification with Partial Observability and Resets” and chapter “NuRV: a nuXmv Extension for Runtime Verification“ are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Runtime Verification: 23rd International Conference, RV 2023, Thessaloniki, Greece, October 3–6, 2023, Proceedings (Lecture Notes in Computer Science #14245)

by Panagiotis Katsaros Laura Nenzi

This book constitutes the refereed proceedings of the 23rd International Conference on Runtime Verification, RV 2023, held in Thessaloniki, Greece, during October 3–6, 2023. The 13 full papers and 7 short papers presented in this book together with 4 tutorial papers and 2 invited papers were carefully reviewed and selected from 39 submissions. The RV conference is concerned with all aspects of novel lightweight formal methods to monitor, analyze, and guide the runtime behavior of software and hardware systems. Runtime verification techniques are crucial for system correctness, reliability, and robustness; they provide an additional level of rigor and effectiveness compared to conventional testing and are generally more practical than exhaustive formal verification.

Runtime Verification

by Rupak Majumdar Ezio Bartocci

This book constitutes the refereed proceedings of the 6th International Conference on Runtime Verification, RV 2015, held in Vienna, Austria, in September 2015. The 15 revised full papers presented together with 4 short papers, 2 tool papers, 4 tutorials, 3 invited talks, and 2 software competition papers were carefully reviewed and selected from 45 submissions. The discussion of the conference centers around two main aspects. The first is to understand wether the runtime verification techniques can practically complement the traditional methods proving programs correct before their execution, such as model checking and theorem proving. The second concerns with formal methods and how their application can improve traditional ad-hoc monitoring techniques used in performance monitoring, hardware design emulation and simulation, etc.

Refine Search

Showing 49,701 through 49,725 of 59,729 results