Team Topologies: Organizing Business and Technology Teams for Fast Flow


Matthew Skelton - 2019
    But how do you build the best team organization for your specific goals, culture, and needs? Team Topologies is a practical, step-by-step, adaptive model for organizational design and team interaction based on four fundamental team types and three team interaction patterns. It is a model that treats teams as the fundamental means of delivery, where team structures and communication pathways are able to evolve with technological and organizational maturity.In Team Topologies, IT consultants Matthew Skelton and Manuel Pais share secrets of successful team patterns and interactions to help readers choose and evolve the right team patterns for their organization, making sure to keep the software healthy and optimize value streams.Team Topologies is a major step forward in organizational design for software, presenting a well-defined way for teams to interact and interrelate that helps make the resulting software architecture clearer and more sustainable, turning inter-team problems into valuable signals for the self-steering organization.

Show and Tell: How Everybody Can Make Extraordinary Presentations


Dan Roam - 2014
    Let me show you how.” For the vast majority of us, giving a presentation is an extremely difficult and nerve-wracking process, whether we’re in a one-on-one meeting, a conference room with a dozen strangers, or a lecture hall in front of thousands. But according to Dan Roam, the visual communications expert and acclaimed author of The Back of the Napkin, it doesn’t have to be so hard. We struggle when we forget the basic steps we learned in kindergarten: show and tell. In this short but powerful book, Roam introduces a new set of tools for making extraordinary presentations in any setting. He also draws on ideas he’s been honing for more than two decades, as an award-winning presenter who has brought his whiteboard everywhere from Fortune 500 companies to tiny startups to the White House. Even if you’re already a good speaker, you’ll learn more about understanding your audience, organizing your content, building a clear storyline, creating effective visuals, and channeling your fear into fun. And you’ll master three fundamental rules: • When we tell the truth, we connect with our audience, we become passionate, and we find self-confidence. • When we tell a story, we make complex concepts clear, we make ideas unforgettable, and we include everyone. • When we use pictures, people see exactly what we mean, we captivate our audience’s mind, and we banish boredom. From nailing the opening to leaving a lasting impression, you’ll soon be able to give the performance of a lifetime . . . time after time.

A Textbook Of Automobile Engineering


R.K. Rajput - 2007
    (Section B), Diploma and Competitive examinations. It consists of Twelve chapters in all, covering the various topics systematically and exhaustively; and an "Additional Objective Type Questions' Bank" at the end. Salient Features: The presentation of the subject matter is very systematic and the language of the text is lucid, direct and easy to understand. Each chapter of the book is saturated with much needed text supported by neat and self-explanatory diagrams to make the subject self-speaking to a great extent. A large number of solved examples, properly graded, have been added in various chapters to enable the students to attempt different types of questions in the examination without any difficulty. At the end of each chapter Short Answer Questions, Highlights, Objective Type Questions. Theoretical Questions and Unsolved Examples have been added to make the book a complete unit in all respects. About The Author: Er. R.K. Rajput, born on 15 th September, 1944 (coincident with Engineering's Day) is a multi-disciplinary engineer. He obtained his Master's degree in Mechanical Engineering (with Hons.-Gold Medal) from Thapar Institute of Engineering and Technology, Patiala. He is also a Graduate Engineering in Electrical Engineering. Apart from this he holds memberships of various professional bodies like Member Institution of Engineers (MIE); Member Indian Society of Technical Education (MISTE) and Member solar Energy Society of India (MSESI). He is also a Chartered Engineer (India). He has served for several years as Principal of Punjab College of Information T

Bash Command Line Pro Tips


Jason Cannon - 2014
     As someone that has used the Bash shell almost daily for over 15 years, I've accumulated several command line "tricks" that have saved me time and frustration. Bash Command Line Pro Tips is a collection of 10 techniques that you can put to use right away to increase your efficiency at the command line. Here is what you will learn by reading Bash Command Line Pro Tips: Tip 1: Tab Completion Tip 2: Change to the Previous Directory Tip 3: Reuse the Last Item from the Previous Command Line Tip 4: Rerun a Command That Starts with a given String Tip 5: Command Substitution Tip 6: Use a for Loop at the Command Line Tip 7: Rerun the Previous Command with Root Privileges Tip 8: Rerun the Previous Command While Substituting a String Tip 9: Reuse a Word on the Same Command Line Tip 10: Fix Typos and Shorten Lengthy Commands with Aliases Scroll up, click the "Buy Now With 1-Click" button to start leaning these powerful Linux Command Line Tips.

Domain-Driven Design in PHP


Carlos Buenosvinos
    Explore applying the Hexagonal Architecture within your application, whether within an open source framework or your own bespoke system. Finally, look into integrating Bounded Contexts, using REST and Messaging approaches.

Exercises in Programming Style


Cristina Videira Lopes - 2014
    It is designed to be used in conjunction with code provided on an online repository. The book complements and explains the raw code in a way that is accessible to anyone who regularly practices the art of programming. The book can also be used in advanced programming courses in computer science and software engineering programs.The book contains 33 different styles for writing the term frequency task. The styles are grouped into nine categories: historical, basic, function composition, objects and object interactions, reflection and metaprogramming, adversity, data-centric, concurrency, and interactivity. The author verbalizes the constraints in each style and explains the example programs. Each chapter first presents the constraints of the style, next shows an example program, and then gives a detailed explanation of the code. Most chapters also have sections focusing on the use of the style in systems design as well as sections describing the historical context in which the programming style emerged.

Managing Risk and Information Security: Protect to Enable


Malcolm Harkins - 2012
    Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: “Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman.” Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel     “As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities.” Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) “The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come.” Dr. Jeremy Bergsman, Practice Manager, CEB     “The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be.

Universal Principles of Design: 100 Ways to Enhance Usability, Influence Perception, Increase Appeal, Make Better Design Decisions, and Teach Through Design


William Lidwell - 2003
    Because no one can be an expert on everything, designers have always had to scramble to find the information and know-how required to make a design work - until now. Universal Principles of Design is the first cross-disciplinary reference of design. Richly illustrated and easy to navigate, this book pairs clear explanations of the design concepts featured with visual examples of those concepts applied in practice. From the 80/20 rule to chunking, from baby-face bias to Ockham's razor, and from self-similarity to storytelling, 100 design concepts are defined and illustrated for readers to expand their knowledge.This landmark reference will become the standard for designers, engineers, architects, and students who seek to broaden and improve their design expertise.

A Topical Approach to Life-Span Development


John W. Santrock - 2001
    Drawing on a who's who list of expert consultants in all areas of developmental psychology, Santrock once again provides a trusted, comprehensive, readable, and engaging survey of the field. Rich applications and examples from a range of areas such as parenting, health care, and education ensure that students will remain engaged with the material. Significant revisions for the 5th edition include updated discussions of health and well-being as well as expanded coverage of diversity, culture, and gender.

TCP/IP Illustrated, Volume 1: The Protocols


Kevin R. Fall - 2009
    Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP best-seller has been thoroughly updated to reflect a new generation of TCP/IP-based networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: " Remote procedure call " Identity management (access control / authentication) " Network and transport layer security (authentication / privacy) " File access protocols, including NFS and SMB/CIFS " Host initialization and DHCP " NAT and firewalls " E-mail " Web and web services " Wireless and wireless security " New tools, including Ethereal, nmap and netcat

Beautiful Evidence


Edward R. Tufte - 2006
    Beautiful Evidence is about how seeing turns into showing, how data and evidence turn into explanation. The book identifies excellent and effective methods for showing nearly every kind of information, suggests many new designs (including sparklines), and provides analytical tools for assessing the credibility of evidence presentations (which are seen from both sides: how to produce and how to consume presentations). For alert consumers of presentations, there are chapters on diagnosing evidence corruption and PowerPoint pitches. Beautiful Evidence concludes with two chapters that leave the world of pixel and paper flatland representations - and move onto seeing and thinking in space land, the real-land of three-space and time.

What Would Google Do?


Jeff Jarvis - 2009
    By “reverse engineering the fastest growing company in the history of the world,” author Jeff Jarvis, proprietor of Buzzmachine.com, one of the Web’s most widely respected media blogs, offers indispensible strategies for solving the toughest new problems facing businesses today. With a new afterword from the author, What Would Google Do? is the business book that every leader or potential leader in every industry must read.

The Imperial Japanese Navy in the Pacific War (General Military)


Mark Stille - 2014
    The Imperial Japanese Navy in the Pacific War pulls from many of Osprey's bestselling books on the subject in addition to the most recent research on the subject, including many sources from Japan, and is the most recent and accurate book on this fascinating force.Even after its setback at midway, the IJN remained a powerful force and inflicted sever setbacks on the US Navy at Guadalcanal and elsewhere. The Imperial Japanese Navy focuses on the Japanese ships which fought the battles in the Pacific including design details, where and when they were engaged and their ultimate effectiveness. In addition, the construction, design and service history of each ship from destroyer size on up is included. A comprehensive survey of the submarine force is also included. Modifications of each ship are covered making this a valuable reference source for Pacific War enthusiasts and historians, as well as ship modelers.A short history of the IJN during the Pacific War places all warship design and history in proper context. Finally, a chapter discussing the strengths and weaknesses of the IJN is included ultimately asking the question of whether the IJN really was a modern Navy which was fully prepared for the rigors of combat in the Pacific.

Managing the Unmanageable: Rules, Tools, and Insights for Managing Software People and Teams


Mickey W. Mantle - 2012
    Their rules of thumb and coaching advice are great blueprints for new and experienced software engineering managers alike." --Tom Conrad, CTO, Pandora "I wish I'd had this material available years ago. I see lots and lots of 'meat' in here that I'll use over and over again as I try to become a better manager. The writing style is right on, and I love the personal anecdotes." --Steve Johnson, VP, Custom Solutions, DigitalFish All too often, software development is deemed unmanageable. The news is filled with stories of projects that have run catastrophically over schedule and budget. Although adding some formal discipline to the development process has improved the situation, it has by no means solved the problem. How can it be, with so much time and money spent to get software development under control, that it remains so unmanageable? In Managing the Unmanageable: Rules, Tools, and Insights for Managing Software People and Teams , Mickey W. Mantle and Ron Lichty answer that persistent question with a simple observation: You first must make programmers and software teams manageable. That is, you need to begin by understanding your people--how to hire them, motivate them, and lead them to develop and deliver great products. Drawing on their combined seventy years of software development and management experience, and highlighting the insights and wisdom of other successful managers, Mantle and Lichty provide the guidance you need to manage people and teams in order to deliver software successfully. Whether you are new to software management, or have already been working in that role, you will appreciate the real-world knowledge and practical tools packed into this guide.

Quality Is Free


Philip B. Crosby - 1979
    Whether you manage a large plant or run your own small business, applying this simple principle of quality control will boost your profits and your career. "Quality Is Free" sets forth easy-to-implement programs, using actual case histories to demonstrate just how well quality control works, and providing important tools for success.