Filter Your Search

Filter Your Search
Web Development
Application Development
Big Data & Business Intelligence
Networking & Servers
Hardware & Creative
Game Development
Virtualization & Cloud
All Products
1   2   3   4   5  
View:   12   24   48  
Sort By:  
Creating Fabric Policies

 In this article by  Stuart Fordham , the author of the book Cisco ACI Cookbook , helps us to understand ACI and the APIC and also explains us how to create fabric policies.

Convolutional Neural Networks with Reinforcement Learning

In this article by Antonio Gulli , Sujit Pal , the authors of the book  Deep Learning with Keras , we will learn about reinforcement learning, or more specifically deep reinforcement learning, that is, the application of deep neural networks to reinforcement learning. We will also see how convolutional neural networks leverage spatial information and they are therefore very well suited for classifying images.

Synchronization – An Approach to Delivering Successful Machine Learning Projects

 “In the midst of chaos, there is also opportunity”                                                                                                                - Sun Tzu In this article, by Cory Lesmeister , the author of the book Mastering Machine Learning with R - Second Edition , Cory provides insights on ensuring the success and value of your machine learning endeavors.

Deploying First Container

In this article by  Srikant Machiraju , author of the book  Learning Windows Server Containers , we will get acquainted with containers and containerization.  Containerization  helps you build software in layers,containersinspiredistributed development, packaging, and publishing in the form of containers. Developers or IT administrators just have to choose a BaseOS Image, create customized layers as per their requirements, and distribute using Public or Private Repositories.Microsoft and Docker together haveprovided an amazing toolset that helps you build and deploy containers within no time. It is very easy to setup a dev/test environment as well. Microsoft Windows Server Operating System or Windows 10 Desktop OS comes with plug and play features for running Windows Server containers or Hyper-V Containers.Docker Hub,a public repository for images,serves as a huge catalogue of customized images built by community or docker enthusiasts. The images on DockerHub are freely available for anyone to download, customize,and distribute images. In this article, we will learn how to create and configure container development environments. The following are a few more concepts that you will learn in this article: Preparing Windows Server Containers Environment Pulling images from Docker Hub Installing Base OS Images

Getting Started with Metasploitable2 and Kali Linux

In this article, by  Michael Hixon , the author of the book,  Kali Linux Network Scanning Cookbook - Second Edition , we will be covering: Installing Metasploitable2 Installing Kali Linux Managing Kali services

Supervised Learning: Classification and Regression

In this article by Alexey Grigorev , author of the book Mastering Java for Data Science , we will look at how to do pre-processing of data in Java and how to do Exploratory Data Analysis inside and outside Java. Now, when we covered the foundation, we are ready to start creating Machine Learning models. First, we start with Supervised Learning. In the supervised settings we have some information attached to each observation – called labels – and we want to learn from it, and predict it for observations without labels. There are two types of labels: the first are discrete and finite, such as True/False or Buy/Sell, and second are continuous, such as salary or temperature. These types correspond to two types of Supervised Learning: Classification and Regression. We will talk about them in this article. This article covers: Classification problems Regression Problems Evaluation metrics for each type Overview of available implementations in Java

System Architecture and Design of Ansible

In this article by  Jesse Keating , the author of the book  Mastering Ansible - Second Edition , we will cover the following topics in order to lay the foundation for mastering Ansible: Ansible version and configuration Inventory parsing and data sources Variable types and locations Variable precedence

Hands on with Service Fabric

In this article by Rahul Rai and Namit Tanasseri , authors of the book Microservices with Azure , explains that Service Fabric as a platform supports multiple programming models. Each of which is best suited for specific scenarios. Each programming model offers different levels of integration with the underlying management framework. Better integration leads to more automation and lesser overheads. Picking the right programming model for your application or services is the key to efficiently utilize the capabilities of Service Fabric as a hosting platform. Let's take a deeper look into these programming models.

Integrating with Messages App

In this article by  Hossam Ghareeb , the author of the book,  iOS Programming Cookbook , we will cover the recipe  Integrating iMessage app with iMessage app .

Systems and Logics

In this article by  Priya Kuber ,  Rishi Gaurav Bhatnagar , and  Vijay Varada,  authors of the book  Arduino for Kids  explains structure and various components of a code: How does a code work What is code What is a System How to download, save and access a file in the Arduino IDE

Learning Cassandra

In this article by Sandeep Yarabarla , the author of the book Learning Apache Cassandra - Second Edition , we will built products using relational databases like MySQL and PostgreSQL, and perhaps experimented with NoSQL databases including a document store like MongoDB or a key-value store like Redis. While each of these tools has its strengths, you will now consider whether a distributed database like Cassandra might be the best choice for the task at hand. In this article, we'll begin with the need for NoSQL databases to satisfy the conundrum of ever growing data. We will see why NoSQL databases are becoming the de facto choice for big data and real-time web applications. We will also talk about the major reasons to choose Cassandra from among the many database options available to you. Having established that Cassandra is a great choice, we'll go through the nuts and bolts of getting a local Cassandra installation up and running

Introduction to Network Security

In this article by Warun Levesque , Michael McLafferty , and Arthur Salmon , the authors of the book Applied Network Security , we will be covering the following topics, which will give an introduction to network security: Murphy's law The definition of a hacker and the types The hacking process Recent events and statistics of network attacks Security for individual versus company Mitigation against threats Building an assessment This world is changing rapidly with advancing network technologies. Unfortunately, sometimes the convenience of technology can outpace its security and safety. Technologies like the Internet of things is ushering in a new era of network communication. We also want to change the mindset of being in the field of network security. Most current cyber security professionals practice defensive and passive security. They mostly focus on mitigation and forensic tactics to analyze the aftermath of an attack. We want to change this mindset to one of Offensive security. This article will give insight on how a hacker thinks and what methods they use. Having knowledge of a hacker's tactics, will give the reader a great advantage in protecting any network from attack.

1   2   3   4   5  
View:   12   24   48  
Sort By: