See examples of the many traps you can fall into if you use off-the-shelf anomaly detection techniques.
Learn about some of the common issues you will encounter when developing algorithms for a modern anomaly detection system.
Learn the difference between live and streaming anomaly detection systems and how to address the challenges different data velocities pose.
Learn about Figma's layers area – where you control individual objects, images, and text – and avoid making overly complex Figma documents.
Learn about the four major image and object formats accepted by Figma - and three ways to import them.
Learn about Figma's Frame tool — then use it to define the correct workspace for the prototype of your website, tablet app, or smart phone app.
Learn to install Ant software - and get it ready to integrate with Jenkins - by using the Jenkins automatic installation feature.
Learn how to set up an external job within Jenkins and manage its execution using the Jenkins command line interface.
Learn how to automate Jenkins continuous integration projects with Apache Ant, a popular build tool for developing software.
Learn how to use IBM Watson's APIs and natural language understanding to extract information about people and companies from news articles.
Learn how to use IBM Watson's APIs and natural language understanding to analyze the tone of social media posts like tweets.
Watch how Microsoft Word 2016 pulls contact information from Excel and uses the data to print a set of mailing labels.
Watch a demonstration that shows you how Microsoft Word 2016 lets you vary the footers and headers on different pages in your Word documents.
Learn about the math operations a Microsoft Word 2016 table is capable of without having to use Excel.
Learn how to add the sounds and music clips that can make your Amazon skill stand out in the already crowded Amazon skills marketplace.
Learn to make images that display on a user's smartphone or tablet as your Amazon Alexa skills activate.
Learn to configure the access policies crucial to working successfully with the Amazon Elasticsearch service.
Explore techniques that allow specific IP address/proxy server access to Kibana, protect your ES cluster, and block entry by unauthorized users.
Learn the somewhat quirky process for integrating Logstash with the Amazon Elasticsearch Service.
Learn how to manage Apache Spark configuration overrides for an AWS Elastic MapReduce cluster to save time and money.