Blair Reeves discusses how the roles and responsibilities of a product manager vary from one company to the next.
How to implement a GraphQL API that queries Neo4j for a simple movie app.
A demonstration of basic reinforcement learning problems.
Assign text snippets to a corresponding collection of vectors.
Explore a highly effective deep learning approach to sentiment analysis using TensorFlow and LSTM networks.
How to build apps, prototypes, and websites that you can collaborate on with others.
Combining serverless architecture with a React frontend means you can spin up applications with minimal administrative overhead.
Learn about public and private properties and how to work with mutable data and nullable types in Kotlin classes.
Watch a demonstration that shows you how Microsoft Word 2016 lets you vary the footers and headers on different pages in your Word documents.
Learn about the math operations a Microsoft Word 2016 table is capable of without having to use Excel.
Watch how Microsoft Word 2016 pulls contact information from Excel and uses the data to print a set of mailing labels.
Learn to make images that display on a user's smartphone or tablet as your Amazon Alexa skills activate.
Learn how to add the sounds and music clips that can make your Amazon skill stand out in the already crowded Amazon skills marketplace.
Learn how Kotlin functions easily accept default and multiple parameters.
How can web professionals succeed in a world where the browser is declining in relevance? (Hint: Specialize.)
Learn the somewhat quirky process for integrating Logstash with the Amazon Elasticsearch Service.
Explore techniques that allow specific IP address/proxy server access to Kibana, protect your ES cluster, and block entry by unauthorized users.
Learn to configure the access policies crucial to working successfully with the Amazon Elasticsearch service.
How to facilitate meetings to create products and solve problems with the whiteboard.
Working with uncertainty in real-world data.
Techniques for securely improving page performance.
Learn how to manage Apache Spark configuration overrides for an AWS Elastic MapReduce cluster to save time and money.
Learn how to use steps in the EMR console to schedule and run Spark scripts stored in Amazon S3, on both new and existing clusters.
How do I package a Spark Scala script with SBT for use on an Amazon Elastic MapReduce (EMR) cluster?
Learn how to create, structure, and compile your Scala script to a JAR file, and use SBT to run on a distributed Spark cluster.
Build a neural network that learns to generate handwritten digits.
Learn how to use SSH to connect to the master node of your Elastic MapReduce (EMR) cluster.
How do I connect to the web user interfaces (UIs) on my Hadoop cluster using Amazon's Elastic MapReduce (EMR) service?
Learn how to set up an SSH tunnel and web proxy to use tools like Hue, Zeppelin, and ResourceManager.
Learn three different ways of running Hive queries on your EMR cluster: by script via terminal, the Hue web interface, or steps in the EMR console.
Learn how to improve the chances of having your game covered by major game outlets by capturing the attention of journalists and influencers.
Is there such a thing as pitching your video game to journalists too early or too late? A real-life video game and technology journalist answers these questions and more.
Learn where to draw the line when sending swag to the journalists and influencers that you want to cover your video game.
Explore how great companies make change happen with O’Reilly case studies, available only on Safari.
Learn how to use TensorFlow-Slim’s meta-operators to build deep learning models with a substantially reduced amount of code.
Learn how to create an automated training routine for any of your deep learning models.
How to communicate with stakeholders and deliver the best user experience.
Learn how to change the configuration register so that a router password can be recovered without losing any configurations.
Learn the configuration steps required to enable a Cisco router to accept Secure Shell (SSH) connections over the virtual terminal (VTY) lines.
Learn about what may be the single most important networking concept that helps different systems communicate—the OSI model.
How companies are providing native experiences in their mobile apps.
Expanding the blue team by building a security culture program.
Learn how to use different types of application programming interfaces (APIs).
Learn the basics of application programming interfaces (APIs), their purpose, and the key concepts underlying the technology.
Learn how to build both web and traditional application programming interfaces (APIs).
Elm’s static typing and compiler error messages lead to more productivity.
Learn how to use Gradle, a popular build tool for Java developers, to package your Java application as a Docker image and run as a Docker container.
Learn how to use Docker to distribute multi-container applications into a standardized unit for seamless software development.
Learn how to use Apache Maven, a project management and comprehension tool, to package your Java application as a Docker image and run as a Docker container.
This two-day live online training covers JPMS, a tool Paul Deitel calls “the most significant new Java software-engineering technology since the inception of Java.”
O’Reilly’s assessment tool puts the focus on the learner, not arbitrary scores.
User stories help track goals, user needs, and project timeframes to deliver valuable software quickly.
Learn how to become an information security specialist by obtaining a CompTIA Security+ certification.
Learn what knowledge areas are covered in the CompTIA Security+ exam objectives.
Learn about the possible career opportunities once you have become Security+ certified.
Architectural change is often connected to a desire for mastery, purpose, and autonomy.
Achieve high scalability and performance while reducing system complexity.
Learn how you can use Nmap to scan your network to find out which services and hosts are listening and may be vulnerable to compromise.
Learn how you can use OpenVAS to scan your network for hosts and fingerprint their listening services to obtain access.
Learn computer worm malware inside and out by building your own.
Building transparency and individual choice into IoT security.
Learn how to perform a security assessment on a MySQL database with InSpec.
Learn how to integrate InSpec and detect weaknesses in your Docker container.