In this article by Kostiantyn Koval , author of the book, Swift High Performance , we will learn about Swift, its performance and optimization, and how to achieve high performance.
In this article by Tanay Pant , the author of the book, Learning Firefox OS Application Development , you will learn how to use WebIDE and its features. We will start by installing Firefox OS simulators in the WebIDE so that we can run and test Firefox OS applications in it. Then, we will study how to install and create new applications with WebIDE. Finally, we will cover topics such as using developer tools for applications that run in WebIDE, and uninstalling applications in Firefox OS. In brief, we will go through the following topics: Getting to know about WebIDE Installing Firefox OS simulator Installing and creating new apps with WebIDE Using developer tools inside WebIDE Uninstalling applications in Firefox OS
In this article by Tyson Cadenhead , author of Socket.IO Cookbook , we will explore several topics related to security in Socket.IO applications. These topics will cover the gambit, from authentication and validation to how to use the wss:// protocol for secure WebSockets. As the WebSocket protocol opens innumerable opportunities to communicate more directly between the client and the server, people often wonder if Socket.IO is actually as secure as something such as the HTTP protocol. The answer to this question is that it depends entirely on how you implement it. WebSockets can easily be locked down to prevent malicious or accidental security holes, but as with any API interface, your security is only as tight as your weakest link. In this article, we will cover the following topics: Locking down the HTTP referrer Using secure WebSockets
In this article by Andreas Niedermair , the author of the book Mastering ServiceStack , we will see the communication between asynchronous components. The recent release of .NET has added several new ways to further embrace asynchronous and parallel processing by introducing the Task Parallel Library ( TPL ) and async and await .
In this article by Cyrille Rossan t , coming from his book, Learning IPython for Interactive Computing and Data Visualization - Second Edition , we will see how to use IPython console, Jupyter Notebook, and we will go through the basics of Python.
This article is by Ganesh Naik , the author of the book Learning Linux Shell Scripting , published by Packt Publication (https://www.packtpub.com/networking-and-servers/learning-linux-shell-scripting). Whoever works with Linux will come across the Shell as first program to work with. The Graphical User Interface (GUI) usage has become very popular due to ease of use. Those who want to take advantage of the power of Linux will use the Shell program by default. Shell is a program, which gives the user direct interaction with the operating system. Let's understand the stages in the evolution of the Linux operating system. Linux was developed as a free and open source substitute for UNIX OS. The chronology can be as follows: The UNIX operating system was developed by Ken Thomson and Dennis Ritchie in 1969. It was released in 1970. They rewrote the UNIX using C language in 1972. In 1991, Linus Torvalds developed the Linux Kernel for the free operating system.
In this article by Cecil Costa , the author of Swift 2 Blueprints , we will cover the following: Project overview Setting it up The first scene Displaying cities information
The strange relationship between objects, functions, generators and coroutines by Dusty Phillips In this article, I’d like to investigate some relationships between functions, objects, generators and coroutines in Python. At a theoretical level, these are very different concepts, but because of Python’s dynamic nature, many of them can appear to be used interchangeably. I discuss useful applications of all of these in my book, Python 3 Object-oriented Programming - Second Edition . In this essay, we’ll examine their relationship in a more whimsical light; most of the code examples below are ridiculous and should not be attempted in a production setting!
In this article, by Timothy Washington , author of the book Clojure for Finance , we will cover the following topics: Modeling the stock price activity Function evaluation First-Class functions Lazy evaluation Basic Clojure functions and immutability Namespace modifications and creating our first function
In this article by Andrew Alloway , the author of VMware Horizon View High Availability , we will review strategies for providing High Availability for various types of VMware Horizon View desktop pools.
In this article by Joseph Howse , Quan Hua , Steven Puttemans , and Utkarsh Sinha , the authors of OpenCV Blueprints , we delve into the aspect of fingerprint detection using OpenCV.
In this article by Chandan Dutta Chowdhury and Sriram Subramanian , authors of the book OpenStack Networking Cookbook , we will explore various means to monitor the network resource utilization using Ceilometer. We will cover the following topics: Virtual Machine bandwidth monitoring L3 bandwidth monitoring