Scalability Rules: 50 Principles for Scaling Web Sites


Martin L. Abbott - 2011
    It's an essential read for anyone dealing with scaling an online business."--Chris Lalonde, VP, Technical Operations and Infrastructure Architecture, Bullhorn "Abbott and Fisher again tackle the difficult problem of scalability in their unique and practical manner. Distilling the challenges of operating a fast-growing presence on the Internet into 50 easy-to understand rules, the authors provide a modern cookbook of scalability recipes that guide the reader through the difficulties of fast growth."--Geoffrey Weber, Vice President, Internet Operations, Shutterfly "Abbott and Fisher have distilled years of wisdom into a set of cogent principles to avoid many nonobvious mistakes."--Jonathan Heiliger, VP, Technical Operations, Facebook "In "The Art of Scalability," the AKF team taught us that scale is not just a technology challenge. Scale is obtained only through a combination of people, process, "and "technology. With "Scalability Rules," Martin Abbott and Michael Fisher fill our scalability toolbox with easily implemented and time-tested rules that once applied will enable massive scale."--Jerome Labat, VP, Product Development IT, Intuit "When I joined Etsy, I partnered with Mike and Marty to hit the ground running in my new role, and it was one of the best investments of time I have made in my career. The indispensable advice from my experience working with Mike and Marty is fully captured here in this book. Whether you're taking on a role as a technology leader in a new company or you simply want to make great technology decisions, "Scalability Rules "will be the go-to resource on your bookshelf."--Chad Dickerson, CTO, Etsy ""Scalability Rules "provides an essential set of practical tools and concepts anyone can use when designing, upgrading, or inheriting a technology platform. It's very easy to focus on an immediate problem and overlook issues that will appear in the future. This book ensures strategic design principles are applied to everyday challenges."--Robert Guild, Director and Senior Architect, Financial Services "An insightful, practical guide to designing and building scalable systems. A must-read for both product-building and operations teams, this book offers concise and crisp insights gained from years of practical experience of AKF principals. With the complexity of modern systems, scalability considerations should be an integral part of the architecture and implementation process. Scaling systems for hypergrowth requires an agile, iterative approach that is closely aligned with product features; this book shows you how."--Nanda Kishore, Chief Technology Officer, ShareThis "For organizations looking to scale technology, people, and processes rapidly or effectively, the twin pairing of "Scalability Rules "and "The Art of Scalability "are unbeatable. The rules-driven approach in "Scalability Rules "makes this not only an easy reference companion, but also allows organizations to tailor the Abbott and Fisher approach to their specific needs both immediately and in the future!"--Jeremy Wright, CEO, BNOTIONS.ca and Founder, b5media 50 Powerful, Easy-to-Use Rules for Supporting Hypergrowth in Any Environment "Scalability Rules" is the easy-to-use scalability primer and reference for every architect, developer, web professional, and manager. Authors Martin L. Abbott and Michael T. Fisher have helped scale more than 200 hypergrowth Internet sites through their consulting practice. Now, drawing on their unsurpassed experience, they present 50 clear, proven scalability rules-and practical guidance for applying them. Abbott and Fisher transform scalability from a "black art" to a set of realistic, technology-agnostic best practices for supporting hypergrowth in nearly any environment, including both frontend and backend systems. For architects, they offer powerful new insights for creating and evaluating designs. For developers, they share specific techniques for handling everything from databases to state. For managers, they provide invaluable help in goal-setting, decision-making, and interacting with technical teams. Whatever your role, you'll find practical risk/benefit guidance for setting priorities-and getting maximum "bang for the buck." - Simplifying architectures and avoiding "over-engineering"- Scaling via cloning, replication, separating functionality, and splitting data sets- Scaling out, not up- Getting more out of databases without compromising scalability- Avoiding unnecessary redirects and redundant double-checking- Using caches and content delivery networks more aggressively, without introducing unacceptable complexity- Designing for fault tolerance, graceful failure, and easy rollback- Striving for statelessness when you can; efficiently handling state when you must- Effectively utilizing asynchronous communication- Learning quickly from mistakes, and much more

The New Hacker's Dictionary


Eric S. Raymond - 1991
    Historically and etymologically richer than its predecessor, it supplies additional background on existing entries and clarifies the murky origins of several important jargon terms (overturning a few long-standing folk etymologies) while still retaining its high giggle value.Sample definitionhacker n. [originally, someone who makes furniture with an axe] 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. 2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming. 3. A person capable of appreciating {hack value}. 4. A person who is good at programming quickly. 5. An expert at a particular program, or one who frequently does work using it or on it; as in `a UNIX hacker'. (Definitions 1 through 5 are correlated, and people who fit them congregate.) 6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example. 7. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations. 8. [deprecated] A malicious meddler who tries to discover sensitive information by poking around. Hence `password hacker', `network hacker'. The correct term is {cracker}.The term 'hacker' also tends to connote membership in the global community defined by the net (see {network, the} and {Internet address}). It also implies that the person described is seen to subscribe to some version of the hacker ethic (see {hacker ethic, the}).It is better to be described as a hacker by others than to describe oneself that way. Hackers consider themselves something of an elite (a meritocracy based on ability), though one to which new members are gladly welcome. There is thus a certain ego satisfaction to be had in identifying yourself as a hacker (but if you claim to be one and are not, you'll quickly be labeled {bogus}). See also {wannabee}.

Docker in Action


Jeff Nickoloff - 2015
    Create a tiny virtual environment, called a container, for your application that includes only its particular set of dependencies. The Docker engine accounts for, manages, and builds these containers through functionality provided by the host operating system. Software running inside containers share the Linux OS and other resources, such as libraries, making their footprints radically smaller, and the containerized applications are easy to install, manage, and remove. Developers can package their applications without worrying about environment-specific deployment concerns, and the operations team gets cleaner, more efficient systems across the board. Better still, Docker is free and open source.Docker in Action teaches readers how to create, deploy, and manage applications hosted in Docker containers. The book starts with a clear explanation of the Docker model of virtualization, comparing this approach to the traditional hypervisor model. Developers will learn how to package applications in containers, including specific techniques for testing and distributing applications via Docker Hub and other registries. Readers will learn how to take advantage of the Linux OS features that Docker uses to run programs securely, and how to manage shared resources. Using carefully-designed examples, the book teaches you how to orchestrate containers and applications from installation to removal. Along the way, you'll learn techniques for using Docker on systems ranging from your personal dev-and-test machine to full-scale cloud deployments.

Professional Android 2 Application Development


Reto Meier - 2010
    This update to the bestselling first edition dives in to cover the exciting new features of the latest release of the Android mobile platform.Providing in-depth coverage of how to build mobile applications using the next major release of the Android SDK, this invaluable resource takes a hands-on approach to discussing Android with a series of projects, each of which introduces a new feature and highlights techniques and best practices to get the most out of Android.The Android SDK is a powerful, flexible, open source platform for mobile devices Shares helpful techniques and best practices to maximize the capabilities of Android Explains the possibilities of Android through the use of a series of detailed projects Demonstrates how to create real-world mobile applications for Android phones Includes coverage of the latest version of Android Providing concise and compelling examples, Professional Android Application Development is an updated guide aimed at helping you create mobile applications for mobile devices running the latest version of Android.

Machine Learning: Fundamental Algorithms for Supervised and Unsupervised Learning With Real-World Applications


Joshua Chapmann - 2017
    Right?! Machine Learning is a branch of computer science that wants to stop programming computers using a detailed list of commands to follow blindly. Instead, their aim is to implement high-level routines that teach computers how to approach new and unknown problems – these are called algorithms. In practice, they want to give computers the ability to Learn and to Adapt. We can use these algorithms to obtain insights, recognize patterns and make predictions from data, images, sounds or videos we have never seen before – or even knew existed. Unfortunately, the true power and applications of today’s Machine Learning Algorithms remain deeply misunderstood by most people. Through this book I want fix this confusion, I want to shed light on the most relevant Machine Learning Algorithms used in the industry. I will show you exactly how each algorithm works, why it works and when you should use it. Supervised Learning Algorithms K-Nearest Neighbour Naïve Bayes Regressions Unsupervised Learning Algorithms: Support Vector Machines Neural Networks Decision Trees

Athelon - War of the Three Planets


Justin Bell - 2019
    A young girl submerged into a galactic conflict. A single chance to help win the war. The daughter of a royal family, Brie Northstar believes she knows what to expect from life. She's wrong. During a routine shuttle trip to one of the outer planets, Brie's transport is destroyed and she finds herself thrust into a centuries old conflict between three warring planets, a conflict she is suddenly in the middle of. Yet somehow this young teenager from Athelon has skills and abilities she shouldn't have - she can't have. Now separated from her family with only her wits - and her newfound abilities - to help she travels from planet to planet, risking her life to prevent galactic destruction and unite a rebellion to save the galaxy. For the first time ever - the complete nine book War of the Three Planets series is available in a single omnibus for a ridiculously low price. If you love Ender's Game you will love War of the Three Planets.

Bourbon Street Shorts


Deanna Chase - 2020
    The tree is decorated, the mistletoe is in place, and the crab puffs are to die for. Nothing can spoil this celebration…except for some wayward magic and a pesky ghost who crashes the party.SPIRITS OF BOURBON STREETIt’s Halloween on Bourbon Street, and white witch Jade Calhoun is ready to party. But when a sexy spirit traps everyone in the past, she’s forced to forgo the cocktails in order to save those she loves...again.A MIRACLE ON BOURBON STREETIt’s Christmas Eve and Jade Calhoun’s ready for a quiet, magical night with her husband Kane. But when Santa demons and energy-stealing elves start wreaking havoc, it’s going to take a miracle on Bourbon Street to save Christmas.A BOURBON STREET VALENTINEIt’s Valentine’s Day and magic’s in the air. Only Kat Hart never expected her handmade jewelry to be at the center of everything. So when her night out at Cupid’s Ball turns into a competition to be a handsome stranger’s wife, it’s up to her to break the spell…or she might get more than she bargained for.SPIRITS, HURRICANES, AND THE KREWE OF GHOULIt’s Halloween and Pyper Rayne’s all vamped up, ready to play the vampire bride. And so is Ida May, her resident ghost. But when the “vampires” they're partying with start to appear to be real, there’s more at stake than just a little bite.KISSED BY TEMPTATIONThe last place sex-witch Mati Ballintine wants to be is at a holiday sorority party. But when the high angel from the council orders her to protect a new angel recruit, she has no choice but to go and grit her teeth through the frat boys’ advances.
The night turns from bad to worse when a demon appears and is hell-bent on taking the angel to Hell. Mati and her incubus boyfriend Vaughn will need to combine forces to not only save the angel, but everyone else the demon leaves in his wake.

Terry Goodkind


Jesse Russell - 2012
    Before his success as an author Goodkind worked primarily as a painter, as well as doing carpentry and woodworking. Goodkind is a proponent of Ayn Rand's philosophical approach of Objectivism, with references to Rand's ideas and novels referenced in his works.The Sword of Truth series sold twenty-five million copies worldwide and was translated into more than twenty languages. It was adapted into a television series called Legend of the Seeker, premiering November 1, 2008 but canceled after two seasons in May, 2010.

SSH, The Secure Shell: The Definitive Guide


Daniel J. Barrett - 2001
    It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.SSH: The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:SSH1, SSH2, OpenSSH, and F-Secure SSH for Unix, plus Windows and Macintosh products: the basics, the internals, and complex applications.Configuring SSH servers and clients, both system-wide and per user, with recommended settings to maximize security.Advanced key management using agents, agent forwarding, and forced commands.Forwarding (tunneling) of TCP and X11 applications in depth, even in the presence of firewalls and network address translation (NAT).Undocumented behaviors of popular SSH implementations.Installing and maintaining SSH systems.Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.

Black Hat Python: Python Programming for Hackers and Pentesters


Justin Seitz - 2014
    But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:Create a trojan command-and-control using GitHubDetect sandboxing and automate common malware tasks, like keylogging and screenshottingEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machineExtend the popular Burp Suite web-hacking toolAbuse Windows COM automation to perform a man-in-the-browser attackExfiltrate data from a network most sneakilyInsider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python."

Paperwhite Users Manual: The Ultimate Kindle Paperwhite Guide to Getting Started, Advanced Tips and Tricks, and Finding Unlimited Free Books


Steve Weber - 2014
    a quick, easy reference to using your Kindle Paperwhite — to the max! Amazon’s Paperwhite is the handiest, best value e-reader, and is your portal to an infinite universe of education and entertainment — and this handy book helps you get the maximum bang for your Kindle bucks. You’ll see how to quickly set up your Paperwhite, navigate the touch-screen and buy, borrow, and browse the world’s largest library of digital books. This reference guide from Amazon guru Steve Weber demystifies the Paperwhite and explains in plain English how to master the Kindle basics, and covers much more, including secret tips, tricks and shortcuts you won’t find elsewhere. Each section includes clearly written step-by-step instructions, illustrated with screenshots and menus just like you’ll see on your own Kindle’s screen. You’ll see how to: > Change your Paperwhite’s setting just the way you want. > Charge your Kindle’s battery properly and prolong its life. > Enjoy an infinite supply of the best books. > Use personal and office documents, including PDFs. Chuck your laptop, and do all your reading on the Kindle! > The easy way to harvest your own content and get it onto your Paperwhite, including gems you didn’t buy at Amazon. > How to download, organize and read your favorite books, magazines and newspapers on the Kindle Fire. > How to get current and archived editions of the world’s most popular newspapers, magazines and websites streamed to your Kindle—updated constantly, with no fees whatsoever! > Use Amazon’s free “Cloud” service for unlimited storage of your digital content. > Find the best free content in the world, downloadable to your Kindle. (You might never have to pay for books, movies or music again—ever!) About the author: Steve Weber has been writing about Amazon for nearly a decade. He is the founding publisher of KindleBuffet.com, a daily website featuring outstanding Kindle books offered free that day.

Fatal Edge


Diane Capri - 2017
    Along with her new P.I. boyfriend, Mandy heads up to the ski resort in Wyoming where the woman was last seen and lands in the path of a killer. Can Jess get there before Mandy becomes the next victim?

Freaky Doubts


Amanda M. Lee - 2020
    That’s what happens when you spend your life hunting monsters, though. This go-around everybody’s favorite over-the-top circus performers travel to Hemlock Cove, where they meet a group of witches they didn’t see coming, before heading to the Detroit area and visiting Poet Parker’s old stomping grounds. There, they come across with a family of snarky reapers who challenge their world view … and a group of at-risk street kids who are in danger of being swallowed whole by a dark enemy. Finally, they stop at Mammoth Caves, where vampires (and something a little more sinister) seem to be taking over a small town and leaving nothing but devastation in their wake. It’s going to be a bumpy ride, but Mystic Caravan is up for the challenge. This three-book omnibus includes: Freaky Witches, Freaky Reapers and Freaky Fangs.

Perseus Gate Season 1 - Episodes 4-6: The Trail Through the Stars


M.D. Cooper - 2017
    Going around will take years, but there is rumor of a path through. A path known only to those who live at Star CityBut Star City is interdicted, its outer reaches patrolled by Orion ships. Though Misha knows of a hidden FTL route that can get a ship close enough to the city, using it assumes the city’s inhabitants are friendly.Jessica and Trevor risk the pathway, travelling to Star City where they find something far more amazing than they ever expected—only to learn they must make a sacrifice unlike any they had ever dreamed.The Toll Road Between the StarsNo one ever said that travelling ten thousand light years would be easy...Sabrina and her crew are nearly through the Stillwater Nebula. But before they pass through into the open space beyond, they have to get through the Perry Strait. A stretch of space where no FTL is possible, with the Perry System at its center.There they learn that an old enemy has leapfrogged them and laid a trap. A trap they're going to have to spring if they want to get through to the other side.The Final Stroll on Perseus's ArmAn old foe from Finaeus's past reveals a secret that will save the crew.It has been eight long years since the crew of Sabrina passed beyond the Stillwater Nebula. They are now deep within the Orion Freedom Alliance, taking a short respite on the planet Ferra, roughly five-hundred light years from the inner edge of Orion space--only a year from the relative safety of the Inner Stars.But when Cheeky is abducted, everything is turned on its head once more, and the crew learns of secrets the Orion government had tried to keep under wraps for millennia.Now they're in a race to save Cheeky, and take advantage of an opportunity they thought never to see again.

Task Force 7 (Doom Star, #7)


Vaughn Heppner - 2014
    But the machine men have a long-term plan to regain everything they’ve lost. They will slip away into the wider galaxy from their secret base on Tyche in the Oort cloud. They will go to a nearby star system to rebuild and return stronger than ever.The Sunbeam can’t reach into the Oort cloud. A spaceship will take three years to reach the cyborg base. Despite the distance, Marten Kluge orders Task Force 7 to make the lonely trek.In the Oort cloud, the cyborgs spring a trap. Now, in the darkness far from home, the last Space Marines enter their insertion pods for the methane-icy surface. They plan to sell their lives if they must in order to end the cyborg menace forever.Previously published in the anthology Planetary Assault.