How companies are providing native experiences in their mobile apps.
Learn how to build both web and traditional application programming interfaces (APIs).
Learn how to use different types of application programming interfaces (APIs).
Elm’s static typing and compiler error messages lead to more productivity.
Learn how to use Gradle, a popular build tool for Java developers, to package your Java application as a Docker image and run as a Docker container.
Learn how to use Docker to distribute multi-container applications into a standardized unit for seamless software development.
Learn how to use Apache Maven, a project management and comprehension tool, to package your Java application as a Docker image and run as a Docker container.
This two-day live online training covers JPMS, a tool Paul Deitel calls “the most significant new Java software-engineering technology since the inception of Java.”
O’Reilly’s assessment tool puts the focus on the learner, not arbitrary scores.
User stories help track goals, user needs, and project timeframes to deliver valuable software quickly.
Learn what knowledge areas are covered in the CompTIA Security+ exam objectives.
Learn how to become an information security specialist by obtaining a CompTIA Security+ certification.
Learn about the possible career opportunities once you have become Security+ certified.
Architectural change is often connected to a desire for mastery, purpose, and autonomy.
Achieve high scalability and performance while reducing system complexity.
Learn how you can use Nmap to scan your network to find out which services and hosts are listening and may be vulnerable to compromise.
Learn computer worm malware inside and out by building your own.
Learn how you can use OpenVAS to scan your network for hosts and fingerprint their listening services to obtain access.
Building transparency and individual choice into IoT security.
Learn how to perform a security assessment on a MySQL database with InSpec.
Learn how to perform security assessments with InSpec over SSH.
Learn how to integrate InSpec and detect weaknesses in your Docker container.
Allen Downey takes on elementary school band camp in this fun application of Digital Signal Processing.
Learn what Terraform does, and how it compares to Chef, Puppet, Ansible, CloudFormation, and other tools.
Learn how to access a server from any web browser using Windows 2016 Server Management Tools.
Learn how to perform hot-add/remove in Windows Server 2016 Hyper-V and how it can help you achieve more granular control over memory.
Learn how to deploy Storage Spaces Direct to enable local storage as clustered storage.
Learn how to tokenize, breaking a sentence down into its words and punctuation, using NLTK and spaCy.
Learn how to use the gensim Python library to determine the similarity between two or more documents.
Learn how to use spaCy to parse a sentence to return the parts of speech (noun, verb, etc.) and dependencies.
Learn how uncoupling development from security using AWS Identity and Access Management can enhance security.
Learn how to call one Lambda from another AWS Lambda function in the AWS management console.
Learn how integrating Mulumba can help you complete development and testing tasks locally in the AWS Lambda environment.
Learn how hash partitioning affects performance and stability in Kudu.
Learn how to use Impala’s SQL analytics layer to create a Kudu table.
Learn how to pair two top-tier open source technologies to create scalable data engineering pipelines.
Exploring the economics of cybersecurity.
Embrace plurality over single systems of record.
Learn how to unlock the full potential of your JSON data using the JSON_TABLE function in Oracle SQL.
Learn how the JSON EXISTS function can help you verify the existence of an element or value with Oracle SQL.
Learn how to use the JSON_QUERY function to look for specific JSON elements using Oracle SQL.
Learn the difference between explicit and implicit JOINs and understand which you should use in your MySQL project.
Learn how the JOIN technique can help you present information from two or more tables.
Learn how to join tables with non-matching data using inner or outer join in MySQL
How to build and train an image caption generator using a TensorFlow notebook.
Learn how to prevent potential enterprise data leakages from your cloud computing accounts.
Learn how multi-factor authentication can better protect your data, and why it should be a primary consideration when choosing a cloud service provider.
Learn how cloud computing can help reduce business costs by using an array of cloud services.
If you're familiar with Java or the JVM but want more power from your APIs and want to see what functional programming can do with your data, Scala is a good bet.
Learn how to access, decipher, and implement commands with the correct syntax using the man pages in Linux.
Learn to effectively manage your program processes in Linux.
Learn the directory structure and where common files are located in Linux.
What you need to consider when your microservices architecture is tightly coupled.
Learn how to use the Linux du command to discover what directories are consuming the most space in your file system.
Learn how to identify duplicate copies of files in your Linux system allowing you to be more organized and save disk space.
Learn how to deal with the shortcomings of the Linux spell command; such as unsorted output, duplicates, and false positives.
Learn how you can open up non-text content to search with deep learning.
Learn how deep learning has accelerated the realization of driverless vehicles and what that means for the future.
Learn how Facebook and other trailblazers use AI technologies to recognize human features.
Poor load times hurt your UX and your bottom line.
How load balancers help you manage the complexity of distributed systems.