Articles

Filter Your Search

Filter Your Search
Category
Web Development
Application Development
Big Data & Business Intelligence
Networking & Servers
Hardware & Creative
Game Development
Virtualization & Cloud
Business
All Products
Series
Learning
Essentials
Cookbook
Blueprints
Mastering
Level
Starting
Progressing
1   2   3   4   5  
View:   12   24   48  
Sort By:  
Understanding Microservices

This article by  Tarek Ziadé , author of the book  Python Microservices Development  explains the benefits and implementation of microservices with Python. While the microservices architecture looks more complicated than its monolithic counterpart, its advantages are multiple. It offers the following benefits.

String Encryption and Decryption

In this article by Brenton J.W Blawat , author of the book Enterprise PowerShell Scripting Bootcamp , we will learn about string encryption and decryption. Large enterprises often have very strict security standards that are required by industry-specific regulations. When you are creating your Windows server scanning script, you will need to approach the script carefully with certain security concepts in mind. One of the most common situations you may encounter is the need to leverage sensitive data, such as credentials,in your script. While you could prompt for sensitive data during runtime, most enterprises want to automate the full script using zero-touch automation.

Getting Started with Metasploit

In this article by Nipun Jaswal, the author of the book  Metasploit Bootcamp , we will be covering the following topics: Fundamentals of Metasploit Benefits of using Metasploit

Inbuilt Data Types in Python

This article by  Benjamin Baka , author of the book  Python Data Structures and Algorithm , explains the inbuilt data types in Python. Python data types can be divided into 3 categories, numeric, sequence and mapping. There is also the None object that represents a Null, or absence of a value. It should not be forgotten either that other objects such as classes, files and exceptions can also properly be considered types, however they will not be considered here.

Setting up Intel Edison

In this article by  Avirup Basu , the author of the book  Intel Edison Projects , we will be covering the following topics: Setting up the Intel Edison Setting up the developer environment

What are Microservices?

In this article written by  Gaurav Kumar Aroraa ,  Lalit Kale ,  Kanwar Manish , authors of the book  Building Microservices with .NET Core , we will start with a brief introduction. Then, we will define its predecessors: monolithic architecture and  service-oriented architecture  ( SOA ). After this, we will see how microservices fare against both SOA and the monolithic architecture. We will then compare the advantages and disadvantages of each one of these architectural styles. This will enable us to identify the right scenario for these styles. We will understand the problems that arise from having a layered monolithic architecture. We will discuss the solutions available to these problems in the monolithic world. At the end, we will be able to break down a monolithic application into a microservice architecture. We will cover the following topics in this article: Origin of microservices Discussing microservices

Introduction to NFRs

In this article by  Sameer Paradkar , the author of the book  Mastering Non-Functional Requirements , we will learn the non-functional requirements are those aspects of the IT system that, while not directly affect the business functionality of the application but have a profound impact on the efficiency and effectiveness of business systems for end users as well as the people responsible for supporting the program. The definition of these requirements is an essential factor in developing a total customer solution that delivers business goals. Non-functional requirements are used primarily to drive the operational aspects of the architecture, in other words, to address major operational and technical areas of the system to ensure the robustness and ruggedness of the application. Benchmark or Proof-of-Concept can be used to verify if the implementation meets these requirements or indicate if a corrective action is necessary. Ideally, a series of tests should be planned that maps to the development schedule and grows in complexity. The topics that are covered in this article are as follows: Definition of NFRs NFR KPIs and metrics

Monitoring, Logging, and Troubleshooting

In this article by  Gigi Sayfan , the author of the book  Mastering Kubernetes , we will learn how to do the monitoring Kubernetes with Heapster.

Understanding the Basics of RxJava

In this article, by  Tadas Subonis  author of the book  Reactive Android Programming , will go through the core basics of RxJava so that we can fully understand what it is, what are the core elements, and how they work. Before that, let's take a step back and briefly discuss how RxJava is different from other approaches. RxJava is about reacting to results. It might be an item that originated from some source. It can also be an error. RxJava provides a framework to handle these items in a reactive way and to create complicated manipulation and handling schemes in a very easy-to-use interface. Things like waiting for an arrival of an item before transforming it become very easy with RxJava. To achieve all this, RxJava provides some basic primitives: Observables: A source of data Subscriptions: An activated handle to the Observable that receives data Schedulers: A means to define where (on which Thread) the data is processed

Scraping a Web Page

In this article by  Katharine Jarmul  author of the book  Python Web Scraping - Second Edition  we can look at some example as suppose I have a shop selling shoes and want to keep track of my competitor's prices. I could go to my competitor's website each day and compare each shoe's price with my own, however this will take a lot of time and will not scale well if I sell thousands of shoes or need to check price changes frequently. Or maybe I just want to buy a shoe when it's on sale. I could come back and check the shoe website each day until I get lucky, but the shoe I want might not be on sale for months. These repetitive manual processes could instead be replaced with an automated solution using the web scraping techniques covered in this book. In an ideal world, web scraping wouldn't be necessary and each website would provide an API to share the data in a structured format. Indeed, some websites do provide APIs, but they typically restrict the data that is available and how frequently it can be accessed. Additionally, a website developer might change, remove or restrict the backend API. In short, we cannot rely on APIs to access the online data we may want and therefore, we need to learn about web scraping techniques.

CORS in Node.js

In this article by  Randall Goya , and  Rajesh Gunasundaram  the author of the book  CORS Essentials , Node.js is a cross-platform JavaScript runtime environment that executes JavaScript code at server side. This enables to have a unified language across the web application development. JavaScript becomes the unified language that runs both on client side and server side.

Analyzing Social Networks with Facebook

In this article by  Raghav Bali ,  Dipanjan Sarkar  and  Tushar Sharma , the authors of the book  Learning Social Media Analytics with R , we got a good flavor of the various aspects related to the most popular social micro-blogging platform, Twitter. In this article, we will look more closely at the most popular social networking platform, Facebook. With more than 1.8 billion monthly active users, over 18 billion dollars annual revenue and record breaking acquisitions for popular products including Oculus, WhatsApp and Instagram have truly made Facebook the core of the social media network today.

1   2   3   4   5  
View:   12   24   48  
Sort By: