In this article by Fabrizio Romano , the author of the book Learning Python , we will discuss the main built-in functions ( map , filter , and zip ), comprehensions, and generators in Python.
In this article by Erik Rodriguez Pacheco author of the book Unsupervised Learning with R aims to explain and apply some techniques for exploratory data analysis: summarization, manipulation, correlation, and data visualization. An adequate knowledge of data by exploration is essential in order to apply unsupervised learning algorithms correctly. This asseveration is true not only for unsupervised learning but also for any efforts invested in data mining. Once we have finalized the business understanding phase, it implies that we are clear about the context of the problem and objectives pursued. It is then that we enter the second phase—the understanding of the data—and we will do this through exploratory analysis techniques. R is a versatile programming language as far as data management is concerned; in this article, we will explain some of the potential in relation to data exploration.
In this article by Nanda Nachimuthu , author of the book Spring Security Essentials , we will see that when talking about enterprise security; three major areas of security, authentication, authorization, and access control list ( ACL ) play a major role. Spring Framework 4.0.3 has a seven-layered architecture that includes core container, context, Aspect Oriented Programming ( AOP ), Data Access Object ( DAO ), Object-relational mapping ( ORM ), web and Model-View-Controller ( MVC ). In order to provide security features to all these layers, we have Spring Security 3.2.3 module that will provide security facilities such as user authentication, authorization, role-based authorization, database configuration, and password encryption.
In this article by Pradeep Pasupuleti and Beulah Salome Purra , authors of the book Data Lake Development with Big Data , we will see the set of formal processes that ensure that data within the enterprise meets the following expectations: Acquired from reliable sources and meets pre-defined quality standards. Is fit for use for further processing. Conforms to well-defined business rules. Defined and modified by the right person. Follows a well-documented change control process Aligned to the organizational strategy. Its trustworthiness intact while data flows through various transformation cycles. The primary motivating factors for organizations to have Data Governance in place is to minimize information risk and maximize the value of information by extracting insights. In the following sections let us explore the components of Data Governance in detail
In this article by Lee Zhi Eng , the author of the book, Building a Game with Unity and Blender , we will learn how to create basic game AI in Unity! In a nutshell, artificial intelligence is all about making decisions autonomously based on a set of conditions and requirements. If a given condition has been met, then the AI will try to move from its current state to the other state that fits the criteria. This is what we call the finite state machine .
In this article written by Suyog Sarda and Mayur Pandey , authors of the book LLVM Essentials , we understand that LLVM's Pass infrastructure is one of the many important features of the LLVM system. There are a number of analysis and optimization passes that can be run using this infrastructure. The starting point for LLVM passes is the Pass class, which is a superclass of all the passes. We need to inherit from some predefined subclasses taking into account what our pass is going to implement.
This article by Anshul Johri , the author of the book, Apache Solr for Indexing Data we will see how Solr provides us with a way to index data using the schema. This article will cover techniques that can be used to index data in Solr. There are many ways of sending data to Solr using API or by making a POST call to update handlers. We'll cover the following topics in this article: Inserting data into Solr using basic POST tools Using XML and JSON handlers
In this article by Yari D'areglia , author of the book Learning iOS UI Development , you'll learn how to build a totally custom-made control by designing its structure and user interface and by programming all the functionalities from the ground up in order to create something that answers your specific need.
In this article by Krzysztof Rakowski , the author of Learning Apache Thrift , you'll first create necessary project files. After brief configuration, you will be able to run the service and connect it with client by yourself. We willbe using server written in PHP and client in Python. The code is very simple, so you can adapt it to any other programming language if you wish. At the end of this article, we will discuss the code and what it exactly means. Don't worry if you don't understand everything at the beginning. The goal of this articleis to allow you to have running client and service that you could easily manipulate and change.
In this article by S.S. Niranga author of the book Mobile Web Performance Optimizatio n , we will discuss the following topics: Mobile-only website versus responsive websites HTTP request CSS Sprites Image size matters Resizing your images to the correct image resolution Image compression tools Unnecessary contents Clean design Duplicate content Importance of design and UX
In this article, by Saleem Ansari , the author of the book Building a Recommendation Engine with Scala , we will discuss content-based recommendation. The main idea in content-based recommendation system is to recommend items to a customer X similar to previous items rated highly by the same customer X. Notice in this definition that we find "similar" items, which means we need to have a measure of similarity between items. To measure similarity of two items, we decode item features and then apply a similarity function. What is a similarity function? A similarity function takes two items (or their feature representations) and returns a value that indicates degree of similarity of two items. Now, there are many different kinds of similarity functions because there are different ways we can represent an item.
In this article by Cody M. Sommer , the author of the book, Building Minecraft Server Modifications - Second Edition , we will be introduced to the Bukkit API and learn what it allows you to accomplish through programming plugins for a Spigot server. By the end of the article, you will most likely have numerous ideas for plugins that you will eventually be able to create yourself. This article will cover the following topics in detail: Understanding the purpose of an API Finding the documentation of the Bukkit API Navigating through JavaDocs to find specific information Reading and understanding the documentation Exploring and learning the aspects of the Bukkit API