In this article by Jeffrey T. Potts and Snehal K Shah , authors of Alfresco Developer Guide, Second Edition , we will discuss the Alfresco architecture.
In this article written by Prasanna Kumar Sathyanarayanan and Suraj Atreya (the authors of this book, Reactive Programming with Scala and Akka ), we will see what the Akka framework is all about in detail. Akka is a framework to write distributed, asynchronous, concurrent, and scalable applications. Akka actors react to the messages that are sent to them. Actors can be viewed as a passive component unless an external message is triggered. They are a higher level abstraction and provide a neat way to handle concurrency instead of a traditional multithreaded application.
In this article by Silvio Moreto Pererira , author of the book, Bootstrap By Example , we will focus on mobile design and how to change the page layout for different viewports, change the content, and more. In this article, you will learn the following: Mobile first development Debugging for any device The Bootstrap grid system for different resolutions
In this article by Alberto Boschetti and Luca Massaron authors of book Regression Analysis with Python , we will learn about gradient descent, its feature scaling and a simple implementation.
In this article by Sreenivas Makam , author of the book Mastering CoreOS explains how microservices has increased the need to have lots of containers and also connectivity between containers across hosts. It is necessary to have a robust Container networking scheme to achieve this goal. This article will cover the basics of Container networking with a focus on how CoreOS does Container networking with Flannel.
In this article by Robert Craig Layton , author of Learning Data Mining with Python , we will look at predicting the winner of games of the National Basketball Association ( NBA ) using a different type of classification algorithm—decision trees.
In this article by John Hoffman , the author of Protocol Oriented Programming with Swift , you will study the types of protocols that can be extended. Protocol extensions can be used to provide common functionality to all the types that conform to a particular protocol. This gives us the ability to add functionality to any type that conforms to a protocol, rather than adding the functionality to each individual type or though a global function. Protocol extensions, like regular extensions, also give us the ability to add functionality to types that we do not have the source code for.
In this article by Rick Boyer and Kyle Merrifield Mew , the author of Android Application Development Cookbook , we'll take a look at the following recipes: Making a Flashlight with a Heads-up notification Scaling down large images to avoid out-of-memory exceptions How to get the last location Push notification using Google Cloud Messaging
In this article by Vijay Velu , the author of Mobile Application Penetration Testing , we will discuss the current state of mobile application security and the approach to testing for vulnerabilities in mobile devices. We will see the major players in the smartphone OS market and how attackers target users through apps. We will deep-dive into the architecture of Android and iOS to understand the platforms and its current security state, focusing specifically on the various vulnerabilities that affect apps. We will have a look at the Open Web Application Security Project ( OWASP ) standard to classify these vulnerabilities. The readers will also get an opportunity to practice the security testing of these vulnerabilities via the means of readily available vulnerable mobile applications. The article will have a look at the step-by-step setup of the environment that's required to carry out security testing of mobile applications for Android and iOS. We will also explore the threats that may arise due to potential vulnerabilities and learn how to classify them according to their risks.
In this article by Biswanath Banerjee , the author of the book Microsoft Exchange Server PowerShell Essentials , we are going to discuss about the new features in Exchange 2013 and 2016 release that will help organizations meet their compliance and E-discovery requirements. Let's learn about the Auditing and E-discovery features available in Exchange 2013 and online.
In this article by Albert Szmigielski , author of the book Bitcoin Essentials , we will take a look at mining with Field-Programmable Gate Arrays , or FPGAs. These are microprocessors that can be programmed for a specific purpose. In the case of bitcoin mining, they are configured to perform the SHA-256 hash function, which is used to mine bitcoins. FPGAs have a slight advantage over GPUs for mining. The period of FPGA mining of bitcoins was rather short (just under a year), as faster machines became available. The advent of ASIC technology for bitcoin mining compelled a lot of miners to make the move from FPGAs to ASICs. Nevertheless, FPGA mining is worth learning about. We will look at the following: Pros and cons of FPGA mining FPGA versus other hardware mining Best practices when mining with FPGAs Discussion of profitability