Learn how to use the YAML format to configure a Spring project.
Understand the variety of annotations available to you when using service registry with Spring Cloud.
Learn Spring’s three dependency injection methods and understand when to use them.
Explore essential components, principles, and key metrics.
Learn the theory behind actors, how actor parent-child relationships behave, and fault tolerance in Akka.
Learn how to create an actor, send and receive messages, and configure a login with HOCON in Akka.
Learn how to use actorOf to create actors and how to pass a URL to actorSelection to obtain the actor reference and send a message with Akka.
Define and maintain a state machine within an object-oriented software system.
Learn how to visualize tables and data using SQL Server Management Studio’s graphical query tool.
Locate data quickly and easily with the SQL Server Management Studio diagram tool.
Learn the formatting possibilities for Transact-SQL queries and develop your own code structure.
Learn how to pass data to a command without violating the command pattern in C#.
Learn how to create thread-safe instances with the singleton pattern in C#.
Learn how to correctly implement the repository pattern in C#.
Use Python's magic methods to amplify your code.
Alex Rice on the importance of inviting hackers to find vulnerabilities in your system, and how to measure the results of incorporating their feedback.
Learn how to allow for parallelization using the reduce algorithm, new in C++17.
Learn how to extract data from a structure correctly and efficiently using Python's slice notation.
Learn how to set up your configuration file to indicate the types of packages you want to install by using the “yum” command.
Learn how to create and make changes to a Kickstart configuration file using the anaconda-ks.cfg.
How to use the wordcount example as a starting point (and you thought you’d escape the wordcount example).
Learn to use Kickstart to get the same look on multiple Red Hat Enterprise Linux system installations.
Learn how to write shorter, better performing, and easier to read code using standard algorithms with object methods in C++.
The adventures in deep learning and cheap hardware continue!
Elixir’s key organizational concept, the process, is an independent component built from functions that sends and receives messages.
Introducing the solar correlation map, and how to easily create your own.
Build regulatory compliance into development and operations, and write compliance and checks and auditing into continuous delivery, so it becomes an integral part of how your DevOps team works.
Learn how to colorize black and white photos with layers and blending modes in Photoshop.
Learn how to make detailed selections on complex images using Photoshop’s updated mask and refine feature.
Learn how to manipulate color by applying a curves adjustment layer to a scanned image in Photoshop.
If you're familiar with financial trading and know Python, you can get started with basic algorithmic trading in no time.
This ebook explains how teams in your organization can co-create these diagrams in only a couple of weeks.
Learn how to use the git-rm command to remove accidental additions to your Git repository.
Learn how to create local copies of remote branches so that you can make local changes in Git.
Learn how to overwrite changes to your local repository with the reset command in Git.
Learn how to view the history of a branch using the “git log” command and perform a checkout in Git.
Learn how to resolve a conflict, mark the change as resolved, and commit the branch to the repository with Git.
We need to take a firm look at whether we’re actually benefiting from technology and why we’re using that technology.
Mike Barlow examines the growth of sophisticated cloud-based AI and machine learning services for a growing market of developers and users in business and academia.
Learn how to use Kubernetes and Prometheus together to reimagine infrastructure and measure "the right things."
Learn this new security fuzz testing technique that leverages browser capabilities to detect cross-site scripting vulnerabilities before production deployment.
Learn how to rename a branch using the -m flag in Git.
Wayne Carter and Ali LeClerc show you how to build a mobile app that has a consistent user experience, both online and offline.
Learn how to analyze operations data in the presence of “holes” in the time series, how missing data impacts analysis, and a gamut of techniques that can be used to address the missing data issue.
This ebook explores guidelines that can help you make crucial "right item, right time" decisions and assist in the integration of new technology into existing business processes.
In this webcast video, Pavliscak explores the ways technology engages emotion and outlines a framework that supports designing for emotion.
High-level programming languages may win most popularity contests, but the venerable C language isn't going away.
While most security professionals argue against paying the ransom, there are some cases where paying is the right choice for an organization. Learn what to consider, and how to decide.
Understand the latest ransomware delivery methods, use the latest network indicators, and detect the latest behavioral indicators.
This report surveys 30 Python web frameworks that have more than 1,000 monthly downloads and provides a deeper look into six of the most widely used.
An informative, visual, and interactive MNIST tutorial.
Go beyond basic concepts and frameworks to get started with Docker the right way.
Find three signs that you should be aware of for maintainable CSS. Catch them early and plan accordingly.
Why bother with quality control when building a website?
Machine learning to generate attack data and improve security analytics.
A deep dive into the technical aspects of reactive.
Binu Ramakrishnan highlights current security risks and CI/CD threat modeling and presents security patterns-based techniques to mitigate these risks, including a novel idea called auth events to delegate user privileges to CI/CD workflow jobs.
This report examines the best ways to delegate work so you not only end up with successfully completed tasks, but also a team of cheerful people—including a cheerful you.
Learn how to ship, parse, store, and analyze logs.
Sasha Goldshtein reviews the modern tracing landscape—ftrace, perf_events, kprobes, uprobes, eBPF—uncovering what insight into system activity these tools can offer.