Understand how distributed systems work and how to use them.
Learn how to use the kubectl command line to create objects and interact with the Kubernetes API.
Learn the difference between mutable and immutable variables and how to cut down on boilerplate code.
Simulate new business models and practices with open source code.
Manage resources and fixtures with Spock's lifecycle hooks.
Blair Reeves discusses how the roles and responsibilities of a product manager vary from one company to the next.
A look at the successes and failures of a company using experimental SEO practices.
Using neural networks to explore natural language.
How to implement a GraphQL API that queries Neo4j for a simple movie app.
A demonstration of basic reinforcement learning problems.
Assign text snippets to a corresponding collection of vectors.
Explore a highly effective deep learning approach to sentiment analysis using TensorFlow and LSTM networks.
How to build apps, prototypes, and websites that you can collaborate on with others.
Combining serverless architecture with a React frontend means you can spin up applications with minimal administrative overhead.
Learn about public and private properties and how to work with mutable data and nullable types in Kotlin classes.
Watch a demonstration that shows you how Microsoft Word 2016 lets you vary the footers and headers on different pages in your Word documents.
Watch how Microsoft Word 2016 pulls contact information from Excel and uses the data to print a set of mailing labels.
Learn about the math operations a Microsoft Word 2016 table is capable of without having to use Excel.
Learn how to add the sounds and music clips that can make your Amazon skill stand out in the already crowded Amazon skills marketplace.
Learn to make images that display on a user's smartphone or tablet as your Amazon Alexa skills activate.
Learn how Kotlin functions easily accept default and multiple parameters.
How can web professionals succeed in a world where the browser is declining in relevance? (Hint: Specialize.)
Explore techniques that allow specific IP address/proxy server access to Kibana, protect your ES cluster, and block entry by unauthorized users.
Learn to configure the access policies crucial to working successfully with the Amazon Elasticsearch service.
Learn the somewhat quirky process for integrating Logstash with the Amazon Elasticsearch Service.
How to facilitate meetings to create products and solve problems with the whiteboard.
Working with uncertainty in real-world data.
Techniques for securely improving page performance.
How do I package a Spark Scala script with SBT for use on an Amazon Elastic MapReduce (EMR) cluster?
Learn how to create, structure, and compile your Scala script to a JAR file, and use SBT to run on a distributed Spark cluster.
Learn how to use steps in the EMR console to schedule and run Spark scripts stored in Amazon S3, on both new and existing clusters.
Learn how to manage Apache Spark configuration overrides for an AWS Elastic MapReduce cluster to save time and money.
Learn how to use SSH to connect to the master node of your Elastic MapReduce (EMR) cluster.
How do I connect to the web user interfaces (UIs) on my Hadoop cluster using Amazon's Elastic MapReduce (EMR) service?
Learn how to set up an SSH tunnel and web proxy to use tools like Hue, Zeppelin, and ResourceManager.
Learn three different ways of running Hive queries on your EMR cluster: by script via terminal, the Hue web interface, or steps in the EMR console.
Build a neural network that learns to generate handwritten digits.
Learn where to draw the line when sending swag to the journalists and influencers that you want to cover your video game.
Is there such a thing as pitching your video game to journalists too early or too late? A real-life video game and technology journalist answers these questions and more.
Learn how to improve the chances of having your game covered by major game outlets by capturing the attention of journalists and influencers.
Explore how great companies make change happen with O’Reilly case studies, available only on Safari.
Learn how to use TensorFlow-Slim’s meta-operators to build deep learning models with a substantially reduced amount of code.
Learn how to create an automated training routine for any of your deep learning models.
How to communicate with stakeholders and deliver the best user experience.
Learn the configuration steps required to enable a Cisco router to accept Secure Shell (SSH) connections over the virtual terminal (VTY) lines.
Learn about what may be the single most important networking concept that helps different systems communicate—the OSI model.
Learn how to change the configuration register so that a router password can be recovered without losing any configurations.
How companies are providing native experiences in their mobile apps.
Expanding the blue team by building a security culture program.
Learn how to build both web and traditional application programming interfaces (APIs).
Learn the basics of application programming interfaces (APIs), their purpose, and the key concepts underlying the technology.
Learn how to use different types of application programming interfaces (APIs).
Elm’s static typing and compiler error messages lead to more productivity.
Learn how to use Gradle, a popular build tool for Java developers, to package your Java application as a Docker image and run as a Docker container.
Learn how to use Apache Maven, a project management and comprehension tool, to package your Java application as a Docker image and run as a Docker container.
Learn how to use Docker to distribute multi-container applications into a standardized unit for seamless software development.
This two-day live online training covers JPMS, a tool Paul Deitel calls “the most significant new Java software-engineering technology since the inception of Java.”
User stories help track goals, user needs, and project timeframes to deliver valuable software quickly.
O’Reilly’s assessment tool puts the focus on the learner, not arbitrary scores.
Learn how to become an information security specialist by obtaining a CompTIA Security+ certification.
Learn what knowledge areas are covered in the CompTIA Security+ exam objectives.
Learn about the possible career opportunities once you have become Security+ certified.
Architectural change is often connected to a desire for mastery, purpose, and autonomy.
Achieve high scalability and performance while reducing system complexity.
Learn computer worm malware inside and out by building your own.