Filter Your Search

Filter Your Search
Web Development
Application Development
Big Data & Business Intelligence
Networking & Servers
Hardware & Creative
Game Development
Virtualization & Cloud
All Products
1   2   3   4   5  
View:   12   24   48  
Sort By:  
Clustering Model with Spark

 In this article by Manpreet Singh Ghotra and Rajdeep Dua , coauthors of the book Machine Learning with Spark, Second Edition , we will analyze the case where we do not have labeled data available. Supervised learning methods are those where the training data is labeled with the true outcome that we would like to predict (for example, a rating for recommendations and class assignment for classification or a real target variable in the case of regression).

Building Scalable Microservices

 In this article by Vikram Murugesan , the author of the book Microservices Deployment Cookbook , we will see a brief introduction to concept of the microservices.

Installing and running LXC

 In this article by Konstantin Ivanov , the author of the book Containerization with LXC , we will see how to install and run LXC. LXC takes advantage of the kernel namespaces and cgroups to create process isolation we often refer to as containers. As such LXC is not a separate software component in the Linux kernel, but rather a set of userspace tools, the liblxc library and various language bindings. In this article, we are going to cover the following topics: Installing LXC on Ubuntu Building and starting containers using the provided templates and configuration files Showcase the various LXC operations

Normal maps

 In this article by Raimondas Pupius , the author of the book Mastering SFML Game Development  we will learn about normal maps and specular maps.

Chef Language and Style

 In this article by Matthias Marschall , author of the book, Chef Cookbook, Third Edition , we will cover the following section: Using community Chef style Using attributes to dynamically configure recipes Using templates Mixing plain Ruby with Chef DSL

Basic Operations of Elasticsearch

 In this article by Alberto Maria Angelo Paro , the author of the book ElasticSearch 5.0 Cookbook - Third Edition , you will learn the following recipes: Creating an index Deleting an index Opening/closing an index Putting a mapping in an index Getting a mapping

Flink Complex Event Processing

In this article by Tanmay Deshpande , the author of the book Mastering Apache Flink , we will learn the Table API provided by Apache Flink and how we can use it to process relational data structures. We will start learning more about the libraries provided by Apache Flink and how we can use them for specific use cases. To start with, let's try to understand a library called complex event processing ( CEP ). CEP is a very interesting but complex topic which has its value in various industries. Wherever there is a stream of events expected, naturally people want to perform complex event processing in all such use cases. Let's try to understand what CEP is all about.  

Tabular Models

In this article by Derek Wilson , the author of the book Tabular Modeling with SQL Server 2016 Analysis Services Cookbook , you will learn the following recipes: Opening an existing model Importing data Modifying model relationships Modifying model measures Modifying model columns Modifying model hierarchies Creating a calculated table Creating key performance indicators (KPIs) Modifying key performance indicators (KPIs) Deploying a modified model

Multithreading with Qt

Qt has its own cross-platform implementation of threading. In this article by Guillaume Lazar and  Robin Penea , authors of the book  Mastering Qt 5 , we will study how to use Qt and the available tools provided by the Qt folks.

Finishing the Attack: Report and Withdraw

In this article by Michael McPhee and Jason Beltrame , the author of the book Penetration Testing with Raspberry Pi - Second Edition we will look at the final stage of the Penetration Testing Kill Chain, which is Reporting and Withdrawing. Some may argue the validity and importance of this step, since much of the hard-hitting effort and impact. But, without properly cleaning up and covering our tracks, we can leave little breadcrumbs with can notify others to where we have been and also what we have done. This article covers the following topics: Covering our tracks Masking our network footprint

Setting up Microsoft Bot Framework Dev Environment

 In this article by Kishore Gaddam , author of the book Building Bots with Microsoft Bot Framework , we introduced what is Microsoft Bot Framework and how it helps in the development of bots.

Asynchronous Programming with Futures and Promises

 This article by Aleksandar Prokopec , author of the book Learning Concurrent Programming in Scala - Second Edition , explains the concepts of asynchronous programming in Scala . Asynchronous programming helps you eliminate blocking; instead of suspending the thread whenever a resource is not available, a separate computation is scheduled to proceed once the resource becomes available. In a way, many of the concurrency patterns seen so far support asynchronous programming; thread creation and scheduling execution context tasks can be used to start executing a computation concurrent to the main program flow. Still, it is not straightforward to use these facilities directly when avoiding blocking or composing asynchronous computations. In this article, we will focus on two abstractions in Scala that are specifically tailored for this task—futures and promises. More specifically, we will study the following topics: Starting asynchronous computations and using Future objects Using Promise objects to interface Blocking threads inside asynchronous computations Alternative future frameworks

1   2   3   4   5  
View:   12   24   48  
Sort By: