Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (399)
  • München UB
  • FID-SKA-Lizenzen
  • Online Resource  (399)
  • 2020-2024  (399)
  • 2015-2019
  • 2020  (399)
  • Safari, an O’Reilly Media Company.  (391)
  • Safari, an O'Reilly Media Company  (8)
  • Electronic videos ; local  (399)
Datasource
  • MPI Ethno. Forsch.  (399)
  • München UB
  • FID-SKA-Lizenzen
Material
  • Online Resource  (399)
Language
Years
  • 2020-2024  (399)
  • 2015-2019
Year
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484256718
    Language: English
    Pages: 1 online resource (1 video file, approximately 41 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Are you interested in Arduino and electronics, but aren't sure how to get started? Beginning with no assumed knowledge, we will cover the basic set up for the Arduino and the Arduino IDE, as well as a few components and how to use them. This video will equip you with enough base knowledge to empower you to start exploring on your own. The goal of this video is for those with no electronics knowledge or experience to have a fun introduction to Ardunio and see the magic in getting that first LED blinking. This video avoids getting bogged down in technical terms and is perfect for those who don't want to decipher intense documentation to jump start their electronics journey. What You Will Learn Gain the core concepts of microcontrollers and Arduinos Set up your user environment space Work with code basics such as important commands, running your first program, and understanding sample code Use a breadboard, Arduino pins, LEDs, servos, and buttons Apply what you've learned to future projects Who This Video Is For Assuming no prior knowledge, this video is aimed at anyone interested in Arduino and electronics, but isn't sure how to get started.
    Note: Online resource; Title from title screen (viewed January 8, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9781484257616
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 8 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Learn what you need to know to manage a command-line interface with a powerful new twist using Bash on Ubuntu on Windows. This video shows you that Windows Subsystem for Linux is an exciting new technology that allows Windows users to run Linux applications right on their Windows desktop without virtual machines or complicated setup. Exploring the Linux command line or testing exciting web technologies becomes a breeze. You will learn basic operating system concepts, how Windows and Linux are different, how to install Windows Subsystem for Linux and Ubuntu on Windows using the Windows Store, and how to navigate the command line and install and maintain Linux software in a secure manner. You will be able to use the Linux command line; recognize various error messages; use Windows to execute instructions found in books and web forums; and develop documentation to set up and work with web frameworks that assume the user is running Linux. Text software interfaces can be intimidating when first encountered by novice users, and expert users may be more familiar with DOS-style text commands. This video clearly and calmly explains what is happening when the screen fills up with text or when no response is given, helping to take the confusion out of the text experience. What You Will Learn Install Windows Subsystem for Linux Understand how Windows and Linux can fit together Use command-line basics Manage software Work with Files Who This Video Is For Those who want to use Linux on their Windows desktop to work with Linux software.
    Note: Online resource; Title from title screen (viewed January 10, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484259238
    Language: English
    Pages: 1 online resource (1 video file, approximately 56 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: This video will teach you Blazor, a new web development framework from Microsoft now available with the release of .NET Core 3.0. You will learn how to build web applications without having to learn JavaScript. You will apply the most fundamental components of the Blazor framework, writing both client- and server-side components of your web applications using .NET languages. No knowledge of JavaScript is necessary; although Blazor code can easily inter-operate with JavaScript. You will discover the two hosting models for Blazor; Blazor WebAssembly and Blazor Server. The first, Blazor WebAssembly, runs compiled .NET code directly in a browser via WebAssembly. The second, Blazor Server, creates client-side components for you, while running all the logic on the server. Client-side components communicate with server-side components asynchronously in real time. Choose either, as the code syntax is the same, allowing you to easily move your code to Blazor WebAssembly or Blazor Server. What You Will Learn Get introduced to Blazor and find out why you should learn it Understand the differences between the Blazor Server and Blazor WebAssembly hosting models Discover the fundamental components of Blazor and Razor components Make Blazor applications modular Run Blazor on both server and browser Make your .NET code inter-operate with in-browser JavaScript Who This Video is For Developers who are already familiar with ASP.NET Core.
    Note: Online resource; Title from title screen (viewed April 7, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 22 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Bad actors are constantly hunting for your personal and proprietary information to use against you for their profit. Attacks are becoming more and more sophisticated, so you must learn to recognize their methods and start defending your cyberspace today. This course teaches you to recognize the most common and most devastating attacks. Relevant, timely information is your best weapon against attackers; learn and understand the latest strategies that will be used against you. Armed with the knowledge to recognize the attacks, you will be prepared to defend against them. You will transform yourself and your personnel from your greatest vulnerability to your greatest asset in defending your cyberspace.
    Note: Online resource; Title from title screen (viewed August 20, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 2 hr., 25 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Passwords have become the top authentication factor in today’s world. You use it in combination with an email or username to sign into almost any service. Big Corporations like Google, Microsoft, Amazon, and Facebook still widely use passwords as an authentication mechanism today. But how secure are passwords? This course focuses on the practical attacks that malicious users use to crack passwords, how you can use this attack in a penetration test, and how you can prevent them. We will very briefly cover the basics of cryptography, hashing and entropy and then immediately go on to crack different types of passwords using different methodologies.
    Note: Online resource; Title from title screen (viewed October 23, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 2 hr., 47 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Expand your knowledge of Burp Suite beyond just capturing the request and responses. Burp Suite is a freely available and one of the most widely accepted penetration testing tools to discover vulnerabilities and attacks. Burp Suite as an integrated platform has an advanced set of tools and interfaces to perform security testing. Its various tools work seamlessly together to support the entire security testing process, from initial mapping and analysis of an application’s attack surface to finding and exploiting security vulnerabilities. In this course, you will learn hands-on techniques for attacking web applications and web services using Burp Suite. Firstly, you will learn about scoping and mapping your target application properly. Next, you will spend some time analyzing the application attack surface and scanning to trigger potential security vulnerabilities in your target, then digging deep into the results to validate your findings. Finally, you will wrap up by learning how to properly customize and report your results to your audience. By the end of this course, you will have a working knowledge of Burp Suite and be able to perform all these techniques at a comfortable and efficient level to better perform your job as a pentester.
    Note: Online resource; Title from title screen (viewed December 30, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 4 hr., 19 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Penetration testing is becoming one of the most important roles in information security with the increased need and importance for companies and organizations to secure their digital infrastructure. Windows plays an integral role in the digital infrastructure of a company. As a result, it is one of the most targeted operating systems by attackers. This has led to an increased demand for skilled penetration testers experienced in testing and exploiting the Windows operating system. In this course, you will learn the essentials of Windows penetration testing from performing information gathering and service enumeration to exploitation and privilege escalation. You will learn how to identify vulnerabilities in Windows-specific services and how to exploit powerful vulnerabilities like EternalBlue. By the end of this course, you will learn how to effectively perform penetration tests and identify & exploit vulnerabilities on Windows systems.
    Note: Online resource; Title from title screen (viewed September 30, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 4 hr., 39 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Do you want to become a pro with the tools that Kali Linux offers? Perform advanced penetration testing? Learn and practice ways to exploit the vulnerable systems and patch them! Get ready to make the best use of one of the most popular pen testing tools fancied by hackers around the globe. This course will start from scratch and will provide you with essential knowledge of the most happening and widely used tools available in Kali Linux by performing real-world practicals. You will learn sniffing and spoofing attacks. You will also learn wireless hacking along with exploitation and post-exploitation techniques. This will train you to exploit various systems to carry out several powerful attacks and enable you to write reports post penetration testing. After completion of this course, you will be a pro in using major tools in Kali Linux and perform penetration testing.
    Note: Online resource; Title from title screen (viewed August 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 18 hr., 30 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: The “Implementing and Administering Cisco Solutions: CCNA 200-301” video course is targeted towards both beginners and seasoned professionals. One of the major issues within the industry is there are persons who want to start a career in network engineering but doesn’t have training materials that are mapped directly to the certification standard and there are professionals who have the experience wants to become certified. This course is designed to take you from beginner to advanced using a student-centric approach while covering all the CCNA 200-301 exam objectives. This course focuses on establishing the core knowledge of Networking, Security and Automation that is required by professionals within the field. Understanding how to use Cisco technologies to create a resilient and scalable enterprise network for your organization. Gain a thorough understanding of network architectures.
    Note: Online resource; Title from title screen (viewed November 30, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Manning Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 15 hr., 33 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: With this publication, we finally have a definitive treatise on PyTorch. It covers the basics and abstractions in great detail. From the Foreword by Soumith Chintala, Cocreator of PyTorch Every other day we hear about new ways to put deep learning to good use: improved medical imaging, accurate credit card fraud detection, long range weather forecasting, and more. PyTorch puts these superpowers in your hands, providing a comfortable Python experience that gets you started quickly and then grows with you as you—and your deep learning skills—become more sophisticated. Deep Learning with PyTorch will make that journey engaging and fun. about the technology Although many deep learning tools use Python, the PyTorch library is truly Pythonic. Instantly familiar to anyone who knows PyData tools like NumPy and scikit-learn, PyTorch simplifies deep learning without sacrificing advanced features. It's excellent for building quick models, and it scales smoothly from laptop to enterprise. Because companies like Apple, Facebook, and JPMorgan Chase rely on PyTorch, it's a great skill to have as you expand your career options. It's easy to get started with PyTorch. It minimizes cognitive overhead without sacrificing the access to advanced features, meaning you can focus on what matters the most - building and training the latest and greatest deep learning models and contribute to making a dent in the world. PyTorch is also a snap to scale and extend, and it partners well with other Python tooling. PyTorch has been adopted by hundreds of deep learning practitioners and several first-class players like FAIR, OpenAI, FastAI and Purdue. about the book Deep Learning with PyTorch teaches you to create neural networks and deep learning systems with PyTorch. This practical book quickly gets you to work building a real-world example from scratch: a tumor image classifier. Along the way, it covers best practices for the entire DL pipeline, including the PyTorch Tensor API, loading data in Python, monitoring training, and visualizing results. After covering the basics, the book will take you on a journey through larger projects. The centerpiece of the book is a neural network designed for cancer detection. You'll discover ways for training networks with limited inputs and start processing data to get some results. You'll sift through the unreliable initial results and focus on how to diagnose and fix the problems in your neural network. Finally, you'll look at way...
    Note: Online resource; Title from title screen (viewed July 1, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 12 hr., 57 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Metasploit is the most common command and control (C2) framework used by penetration testers and red team operators around the globe. It is a framework that is a “must-know” and will give you the confidence to successfully operate on a target network. This course is very hands-on. Presentations will be minimal because we believe the best way for you to learn is to have your hands on the keyboard. If you have the interest, passion, or desire to learn, We will guide you through this course step by step. You should be able to follow along with video instructions and please take notes! We will not only teach you how to use Metasploit, but we will teach it as if you were using it for a real penetration test!
    Note: Online resource; Title from title screen (viewed August 26, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 55 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: To help and support a team with continuous integration and delivery pipeline that helps to test and deliver software/infrastructure in a quick span of time with the fully integrated build and release pipelines with proper testing. This the course has been tailor-made for the audience who have no or little prior experience in any DevOps tools will start with the basic what and how Azure DevOps works, fundamental and workflow and then get started with hands-on wherein we will create a repo and push code from local and then create build definition and configure continuous integration, a post that we will configure our release pipelines and deploy our first application or infrastructure leveraging Azure DevOps tasks and pipelines. In the end, we will touch base on one of the most important aspects and that would be the security of Azure DevOps how permissions and identities are maintained. We hope after completing the course you will have a working knowledge of how azure DevOps works and you will be able to implement CI-CD for your organization as well.
    Note: Online resource; Title from title screen (viewed July 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 31 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Unless you try to exploit a vulnerability yourself, no reading will give you the required know-how to fully understand the impact and avoid such weaknesses in your applications. To become a better professional, you should have a great understanding of the most critical web application security risks. This is mandatory for IT students, job seekers, software developers, testers, and application managers. The OWASP Top 10 “is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.” This course follows a hands-on approach: you’ll exploit at least 10 vulnerabilities in a deliberately vulnerable web application. In each session, we will review and briefly discuss a single OWASP Top 10 risk and then you’ll be guided to search and exploit that weakness in the target application. Since you’ll have access to the web application source code, you’ll be able to spot the vulnerable source code and fix it. After completing this course, you’ll be comfortable answering security-related questions in your next job interview or bring security into your organization and into the Software Development Life Cycle (SDLC).
    Note: Online resource; Title from title screen (viewed August 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 8 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: The more that we become connected the more we need to be conscious of mobile security. Contacts, emails, passwords, location data, confidential documents, photos, etc. are all contained on our phones and thus are a prime target for malicious hackers and leaked data. It is critical to understand how to secure our mobile devices and learn best practices. In this course, we will be taking a look at both iOS (Apple) and Android devices in order to learn best practices with our devices. How people can track us by the photos that we take, steps that we can take in securing our phone numbers, using secure communication to keep our conversations private, how to find our device(s) and lock them if they are lost or stolen, and much more. By the end of this course, you will build a better understanding of the attack and defence side in terms of mobile security
    Note: Online resource; Title from title screen (viewed December 30, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 2 hr., 48 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Anyone who is looking forward to developing and hosting solutions/applications in Azure — this course is dedicated to them. Covering the fundamentals of Azure Web app services to build administrator applications at scale. Get to know what’s inside the Azure App Services, what holds inside the service. In this course, we will learn about how to leverage the Azure app service to deploy the application. We will get started with basic fundamentals, benefits, and the model of an app service. By the end of the course, you will be able to deploy, administer, and monitor applications.
    Note: Online resource; Title from title screen (viewed December 30, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 4 hr., 47 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Secure coding with C is a top concern. Although the C programming language, which is commonly used in numerous applications and operating systems is popular, flexible, and versatile, it is inherently vulnerable to exploitation. Writing a secure code is crucial. Because there is no direct method to handle the exception (no in-built try and catch such as in another high-level language like C#) in the C language, it becomes the responsibility of the C developer to become extra vigilant while writing code. This course begins with a detailed explanation of the overall security of any C application. Further, it provides insights on how to write better C code, particularly a secure code that prevents pitfalls commonly encountered in the C language. This course shows you how to avoid vulnerabilities and security flaws resulting from the incorrect use of dynamic memory management functions. You will understand how to eliminate integer-related problems resulting from signed integer overflows, unsigned integer wrapping, and truncation errors.
    Note: Online resource; Title from title screen (viewed October 29, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Manning Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 7 hr., 29 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local ; Electronic videos
    Abstract: From start to finish, the best book to help you learn AI algorithms and recall why and how you use them. Linda Ristevski, York Region District School Board Grokking Artificial Intelligence Algorithms is a fully-illustrated and interactive tutorial guide to the different approaches and algorithms that underpin AI. Written in simple language and with lots of visual references and hands-on examples, you'll learn the concepts, terminology, and theory you need to effectively incorporate AI algorithms into your applications. And to make sure you truly grok as you go, you'll use each algorithm in practice with creative coding exercises—including building a maze puzzle game, performing diamond data analysis, and even exploring drone material optimization. about the technology Artificial intelligence touches every part of our lives. It powers our shopping and TV recommendations; it informs our medical diagnoses. Embracing this new world means mastering the core algorithms at the heart of AI. about the book Grokking Artificial Intelligence Algorithms uses illustrations, exercises, and jargon-free explanations to teach fundamental AI concepts. All you need is the algebra you remember from high school math class. Explore coding challenges like detect­ing bank fraud, creating artistic masterpieces, and setting a self-driving car in motion. what's inside Use cases for different AI algorithms Intelligent search for decision making Biologically inspired algorithms Machine learning and neural networks Reinforcement learning to build a better robot about the audience For software developers with high school–level algebra and calculus skills. about the author Rishal Hurbans is a technologist, founder, and international speaker. This book takes an impossibly broad area of computer science and communicates what working developers need to understand in a clear and thorough way. David Jacobs, Product Advance Local The most comprehensive content I have seen on AI algorithms. Karan Nih, Classic Software Solutions This book removes the fear of stepping into the mechanics of AI. Kyle Peterson, University of Iowa Athletics NARRATED BY JEROMY LLOYD AND JULIE BRIERLEY
    Note: Online resource; Title from title screen (viewed July 20, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 4 hr., 25 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: The internet is mostly web applications and most web applications are connected to a database. These databases store everything from usernames and passwords to credit card numbers, social security numbers, and tons of other sensitive or useful information. In many cases, the ability to compromise a database will soon lead to a much greater system or organization compromise. This class is going to cover the basics of how databases work, identifying databases, hacking SQL database, and more modern NoSQL databases. We are going to cover what to do once you hack a database. Additionally, we will be discussing ways to protect your own applications from these attacks as we progress through the course.
    Note: Online resource; Title from title screen (viewed October 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 24 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: We have been seeing increasing news stories about breaches, hacks, and various cyberattacks, but what does it mean in the real world? How does it impact me? This course aims to look at modern malware families and techniques, as well as how they are being used in the “real world.” By the end of this course, you will learn some basic activities that you can perform at home to reduce your risk.
    Note: Online resource; Title from title screen (viewed July 30, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Manning Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 17 hr., 52 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: A gentle introduction to some of the most useful mathematical concepts that should be in your developer toolbox. Christopher Haupt, New Relic To score a job in data science, machine learning, computer graphics, and cryptography, you need to bring strong math skills to the party. Math for Programmers teaches the math you need for these hot careers, concentrating on what you need to know as a developer. Filled with lots of helpful graphics and more than 200 exercises and mini-projects, this book unlocks the door to interesting–and lucrative!–careers in some of today’s hottest programming fields. about the technology Skip the mathematical jargon: This one-of-a-kind book uses Python to teach the math you need to build games, simulations, 3D graphics, and machine learning algorithms. Discover how algebra and calculus come alive when you see them in code! about the book In Math for Programmers you’ll explore important mathematical concepts through hands-on coding. Filled with graphics and more than 200 exercises and mini-projects, this book unlocks the door to interesting–and lucrative!–careers in some of today’s hottest fields. As you tackle the basics of linear algebra, calculus, and machine learning, you’ll master the key Python libraries used to turn them into real-world software applications. what's inside Vector geometry for computer graphics Matrices and linear transformations Core concepts from calculus Simulation and optimization Image and audio processing Machine learning algorithms for regression and classification about the audience For programmers with basic skills in algebra. about the author Paul Orland is a programmer, software entrepreneur, and math enthusiast. He is co-founder of Tachyus, a start-up building predictive analytics software for the energy industry. You can find him online at www.paulor.land A rigorous yet approachable overview of the mathematics that underpin a number of modern programming domains. Dan Sheikh, BCG Digital Ventures Engaging, practical, recommend for all levels. Vincent Zhu, rethinkxsocial.com It provides a bridge for programmers who need to brush up on their math skills, and does a nice job of making the math less mysterious and more approachable. Robert Walsh, Excalibur Solutions NARRATED BY DEREK LETTMAN
    Note: Online resource; Title from title screen (viewed November 30, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 4 hr., 8 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Looking to jump into the world of serverless computing on AWS but don’t know where to start? This is the course you need! Serverless computing is high in demand but it’s hard to find a way to get started with technologies like Lambda, API Gateway, S3, or DynamoDB. The search is over, this course will give you everything you need to get started on developing your own serverless applications on Day 1! While giving you the fundamentals of each technology that we will cover, we’ll also get hands-on to develop our own serverless ride-hailing application! By the end of the course, you’ll have the starting point for your next project as well!
    Note: Online resource; Title from title screen (viewed November 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 5 hr., 57 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Secure design is essential to building and deploying secure Java programs. But, even the best of designs can result in insecure programs if developers are not aware of the numerous potential security pitfalls in Java programming. This course begins with a detailed explanation of common programming errors encountered in Java. Further, it takes you through security issues intrinsic to Java programming languages and associated libraries. Later, you will gather insights on poor programming practices that lead to vulnerable code and how to code securely and maintain secure development practices throughout the software development life cycle. In this course, you will gain knowledge on input validation defences that can be used to protect against common application vulnerabilities, as well as learn to conduct application security testing for web applications to assess vulnerabilities. In addition, you will learn how to secure Java applications by using the Spring Security framework, a powerful and highly customizable authentication and access-control framework. By the end of this course, you will be able to drive the development of a holistic application security program in Java.
    Note: Online resource; Title from title screen (viewed December 30, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 5 hr., 25 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Do you want to learn the tools that Kali Linux offers to perform vulnerability assessment and penetration testing? Then this course is for you! The course will start from scratch and will provide you with essential knowledge of the most happening and widely used tools available in Kali Linux by performing real-world practicals. You will learn information gathering and scanning, perform vulnerability analysis, and learn database attacks and password attacks. After completion of this course, you will be able to use Kali Linux tools for vulnerability analysis.
    Note: Online resource; Title from title screen (viewed October 30, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 2 hr., 11 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: This course will start off by understanding the bare bones of the Session, how it can be broken to gain access to accounts. As an ethical hacker, it is imperative to understand how to identify the design flaws that are being exploited and to be addressed to secure the system and/or application. With having multiple, users/systems interconnected the attack surface is huge and high-risk impact, it’s important to secure the sessions to prevent unauthorized access. Students will receive hands-on training on each attack scenario and how to identify the flaws and address them with preventive mechanisms. They will learn and look at the scenarios in a haxor way and understand the most widely used attack patterns. This course is useful for all Security Professionals, as it gives a POV(Point of View) from both attack and defence standpoint.
    Note: Online resource; Title from title screen (viewed December 30, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 4 hr., 21 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Cybercrime is on the rise, with a total of 1.2 billion dollars lost to phishing attacks in 2018 alone (IC3) with 7.3 billion dollars lost to ransomware attacks in 2019 (Emsisoft). The threat landscape has grown significantly over the years targeting large businesses, health care, school, home users, and small businesses. How do we tackle this growing problem? This course is designed to give you the knowledge and skills to identify, mitigate, and prevent cybersecurity-related issues. The course is highly practical and designed to follow along at home. By the end of this course, you will have a solid understanding of a wide variety of cybersecurity-related areas for home and work.
    Note: Online resource; Title from title screen (viewed July 30, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Manning Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 13 hr., 33 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Very practical approach to patterns and practices for DevOps! Foster Haines, J2 Interactive Operations Anti-Patterns, DevOps Solutions shows how to implement DevOps techniques in the kind of imperfect environments most developers work in. Part technology tutorial, part reference manual, and part psychology handbook, this practical guide shows you realistic ways to bring DevOps to your team when you don't have the flexibility to make sweeping changes in organizational structure. about the technology To some extent, all organizations—even yours—suffer from poor development practices, garbled communications, and outdated legacy systems. The good news is DevOps can help you improve your processes. First, however, you'll need to recognize the core issues holding you back. This book empowers you to deliver DevOps with limited resources while navigating the office politics and entrenched mindsets that are all too common in actual workplaces. about the book Operations Anti-Patterns, DevOps Solutions offers clear steps for transforming development and communication. Using jargon-free language, this book describes incremental techniques that pay off immediately. Streamline your workflow, manage unplanned time, and build operational metrics. Whatever your issues, this book holds the keys to organizational success. what's inside Turn failure into opportunity Drive change through culture Break down knowledge silos Settle middle management turf wars about the audience For team leaders and managers. about the author Jeffery D. Smith has been in the technology industry for over 15 years. He has managed DevOps transformations at the ad-tech firm Centro and the online ordering platform Grubhub. A pragmatic guide to adopting DevOps practices progressively in every organization. Zhuo Hong Wei, Indeed A comprehensive guide to getting started with DevOps and integrating this culture in your company in the right manner. Roman Levchenko, Microsoft Azure MVP A truly inspiring book with real-world use cases and solutions. Really helpful for managers and technical leaders who want to drive change in their company. Michele Adduci, OpenLimit SignCubes GmbH NARRATED BY JULIE BRIERLEY
    Note: Online resource; Title from title screen (viewed October 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Manning Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 10 hr., 37 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: This book took me from someone interested in Docker to someone using it effectively in several projects. Mark Elston, Advantest America Go from zero to production readiness with Docker in 22 bite-sized lessons! Learn Docker in a Month of Lunches is an accessible task-focused guide to Docker on Linux, Windows, or Mac systems. In it, you’ll learn practical Docker skills to help you tackle the challenges of modern IT, from cloud migration and microservices to handling legacy systems. There’s no excessive theory or niche-use cases—just a quick-and-easy guide to the essentials of Docker you’ll use every day. about the technology The idea behind Docker is simple: package applica­tions in lightweight virtual containers that can be easily installed. The results of this simple idea are huge! Docker makes it possible to manage applications without creating custom infrastructures. Free, open source, and battle-tested, Docker has quickly become must-know technology for developers and administrators. about the book Learn Docker in a Month of Lunches introduces Docker concepts through a series of brief hands-on lessons. Following a learning path perfected by author Elton Stoneman, you’ll run containers by chapter 2 and package applications by chapter 3. Each lesson teaches a practical skill you can practice on Windows, macOS, and Linux systems. By the end of the month you’ll know how to containerize and run any kind of application with Docker. what's inside Package applications to run in containers Put containers into production Build optimized Docker images Run containerized apps at scale about the audience For IT professionals. No previous Docker experience required. about the author Elton Stoneman is a consultant, a former architect at Docker, a Microsoft MVP, and a Pluralsight author. A well-written and cogent approach to learning and implementing containerized applications with Docker. Philip Taffet, SOHOsoft This is a must-have resource for anyone wanting to come to grips with Docker—from novice to expert, there’s something for everyone. Kevin Orr, Sumus Solutions I recommend anyone serious about learning Docker begin with this book. Marcus Brown, Tradewind Energy NARRATED BY JULIE BRIERLEY
    Note: Online resource; Title from title screen (viewed June 13, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 6 hr., 2 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Attacks on enterprise networks and home networks are a growing problem with daily targeted attacks that can result in crippling results. These attacks have become more aggressive, sophisticated, and more dangerous over the years. This course is designed to give you the knowledge and skills to identify, mitigate, and prevent these attacks and help you secure your network. The course is a practical course and designed to follow along at home or at work. By the end of this course, you will have a solid understanding of a wide variety of cybersecurity-related areas for home and work.
    Note: Online resource; Title from title screen (viewed September 30, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 4 hr., 38 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: If you have ever wondered how somebody is able to find that much information or data about you or your organization, then this is the course for you. Since Open-Source Intelligence is one of the most crucial phases in any cyberattack, you will find out what the bad guys can learn about you or your company. Information and data have never been more accessible in human history than today. As good as this sounds, it is also a rabbit hole in which you can easily fall into. Here is where Open-Source Intelligence or OSINT comes to play. OSINT means many different things to many different people, because of its versatile framework. For most people, it merely means publicly available data from the internet, but it is much more. In this course, we will go over Open-Source Intelligence from the basics to intermediate things with which you can easily transition yourself into more advanced investigations and upgrade your cybersecurity career. You will understand what Open-Source Intelligence is and how you can use it to your advantage and protection in a virtual Linux environment. Also, you will learn about exciting tools like theHarvester and Spiderfoot, where to find breach information, what is the structure of the internet, and much more. More often, all that will give you a scare of how much information is exposed on the internet.
    Note: Online resource; Title from title screen (viewed September 30, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 5 hr., 48 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: OOP is the programming paradigm that follows the ‘classes and objects’ approach. This makes code more compact and accurate. Rather than defining each and everything individually, in OOP, we create objects and recall them whenever needed. This also makes a code compact and easily accessible. This course will teach you about OOP and how to write codes using OOP. We will learn this with Java Enterprise Edition. This course starts your journey by refreshing your knowledge of basic OOP concepts and how to implement them in real Java code. Once you understand the concepts and how to implement them, we’ll look at more advanced OOP topics that will help you write professional code that is easy to test and easy to extend. You also get to learn many concepts of how a program operates complex concepts in OOP. What’s more? You will also get to know about JavaBeans and Spring. By the end of this course, you will have mastered OOP and will be able to write the codes like a pro. You will also have gathered a good knowledge of Java EE, spring, JavaBeans and so much more!
    Note: Online resource; Title from title screen (viewed August 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : EC-Council | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 7 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: In our hyper-connected world, where instant communication between people, data, and machines occurs over global, open networks, cybercrime has become an inescapable part of our daily lives. More and more people are increasingly reliant on online spaces to live, study, and work, as well as for entertainment and leisure. However, without the requisite cybersecurity infrastructure and knowledge as we learn and work from home, we are now more vulnerable to various types of cybercrimes. While organizations and governments work to find better ways to protect us, the best way to slow down cybercriminals is to know more about how they operate and take steps to keep ourselves safer online. This non-technical course is designed to help you understand the kinds of cybercrimes that you, your loved ones, and colleagues are vulnerable to. You will also learn some simple cyber-hygiene tips and strategies to safeguard yourselves online. You will learn about the damaging effects of fake news and misinformation, and how we can do our bit by reducing its circulation. Further, the course will take you through some of the main actors and issues with regards to law enforcement and explains why catching the bad guys is so hard. By better understanding the cybercrime landscape and the techniques that cybercriminals use to trap us, you will be in a better position to protect yourself, your loved ones, and your organization from cybercrime and cybersecurity breaches.
    Note: Online resource; Title from title screen (viewed September 30, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Manning Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 14 hr., 54 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Full of useful advice, real-case scenarios, and contributions from professionals in the industry. Sebastián Palma Mardones, ArchDaily You are going to need more than technical knowledge to succeed as a data scientist. Build a Career in Data Science teaches you what school leaves out, from how to land your first job to the lifecycle of a data science project, and even how to become a manager. about the technology What are the keys to a data scientist’s long-term success? Blending your technical know-how with the right “soft skills” turns out to be a central ingredient of a rewarding career. about the book Build a Career in Data Science is your guide to landing your first data science job and developing into a valued senior employee. By following clear and simple instructions, you’ll learn to craft an amazing resume and ace your interviews. In this demanding, rapidly changing field, it can be challenging to keep projects on track, adapt to company needs, and manage tricky stakeholders. You’ll love the insights on how to handle expectations, deal with failures, and plan your career path in the stories from seasoned data scientists included in the book. what's inside Creating a portfolio of data science projects Assessing and negotiating an offer Leaving gracefully and moving up the ladder Interviews with professional data scientists about the audience For learners who want to begin or advance a data science career. about the authors Emily Robinson is a data scientist at Warby Parker. Jacqueline Nolis is a data science consultant and mentor. The perfect companion for someone who wants to be a successful data scientist! Gustavo Gomes, Brightcove Insightful overview of all aspects of a data science career. Krzysztof Jędrzejewski, Pearson Highly recommended. Hagai Luger, Clarizen NARRATED BY JEROMY LLOYD
    Note: Online resource; Title from title screen (viewed March 6, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Manning Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 10 hr., 59 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Whether you’re a Python novice or, like me, have been away from the language for a while, this book is a great way to build strength with Python. Mark Elston, Advantest America The only way to master a skill is to practice. In Python Workout , author Reuven M. Lerner guides you through 50 carefully selected exercises that invite you to flex your programming muscles. As you take on each new challenge, you'll build programming skill and confidence. The thorough explanations help you lock in what you've learned and apply it to your own projects. Along the way, Python Workout provides over four hours of screencasts walking you through the solutions to each exercise and dozens of additional exercises for you to try on your own. about the technology To become a champion Python programmer you need to work out, building mental muscle with your hands on the keyboard. Each carefully selected exercise in this unique book adds to your Python prowess—one important skill at a time. about the book Python Workout presents 50 exercises that focus on key Python 3 features. In it, expert Python coach Reuven M. Lerner guides you through a series of small projects, practicing the skills you need to tackle everyday tasks. You'll appreciate the clear explanations of each technique, and you can watch Reuven solve each exercise in the screencasts. what's inside 50 hands-on exercises and solutions Coverage of all Python data types Dozens more bonus exercises for extra practice about the audience Requires basic Python knowledge. about the author Reuven M. Lerner teaches Python and data science to companies around the world. A practical introduction to the Python programming language, built around fun and well-chosen exercises. Jens Christian Bredahl Madsen, Systematic The practical course you need to become fluent in Pythonic programming! Jean-François Morin, Laval University This book pulls back the layers and allows you to master Python. Jeff Smith, Agilify Automation NARRATED BY MARK THOMAS
    Note: Online resource; Title from title screen (viewed July 2, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Manning Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 21 hr., 8 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: A complete guide to the challenges and solutions in securing microservices architectures. Massimo Siani, FinDynamic Unlike traditional enterprise applications, Microservices applications are collections of independent components that function as a system. Securing the messages, queues, and API endpoints requires new approaches to security both in the infrastructure and the code. Microservices Security in Action teaches you how to address microservices-specific security challenges throughout the system. This practical guide includes plentiful hands-on exercises using industry-leading open-source tools and examples using Java and Spring Boot. about the technology Integrating independent services into a single system presents special security challenges in a microservices deployment. With proper planning, however, you can build in security from the start. Learn to create secure services and protect application data throughout development and deployment. As microservices continue to change enterprise application systems, developers and architects must learn to integrate security into their design and implementation. Because microservices are created as a system of independent components, each a possible point of failure, they can multiply the security risk. With proper planning, design, and implementation, you can reap the benefits of microservices while keeping your application data—and your company's reputation—safe! about the book Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications. Detailed code samples, exercises, and real-world use cases help you put what you've learned into production. Along the way, authors and software security experts Prabath Siriwardena and Nuwan Dias shine a light on important concepts like throttling, analytics gathering, access control at the API gateway, and microservice-to-microservice communication. You'll also discover how to securely deploy microservices using state-of-the-art technologies including Kubernetes, Docker, and the Istio service mesh. Lots of hands-on exercises secure your learning as you go, and this straightforward guide wraps up with a security process review and best practices. When you're finished reading, you'll be planning, designing, and implementing microservices applications with the priceless confidence that comes with knowing they're secure! what's inside Mi...
    Note: Online resource; Title from title screen (viewed July 11, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Manning Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 9 hr., 13 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: You can base your Micro Frontends directly off the examples in the book! Barnaby Norman, Frontend Developer Browser-based software can quickly become complex and difficult to maintain, especially when it's implemented as a large single-page application. By adopting the micro frontends approach and designing your web apps as systems of features, you can deliver faster feature development, easier upgrades, and pick and choose the technology you use in your stack. Micro Frontends in Action is your guide to simplifying unwieldy frontends by composing them from small, well-defined units. about the technology Micro frontends deliver the same flexibility and maintainability to browser-based applications that microservices provide for backend systems. You design your project as a set of standalone components that include their own interfaces, logic, and storage. Then you develop these mini-applications independently and compose them in the browser. about the book Micro Frontends in Action teaches you to apply the microservices approach to the frontend. You’ll start with the core micro frontend design ideas. Then, you'll build an e-commerce application, working through practical issues like server-side and client-side composition, routing, and maintaining a consistent look and feel. Finally, you'll explore team workflow patterns that maximize the benefit of developing application components independently. what's inside Create a unified frontend from independent applications Combine JavaScript code from multiple frameworks Browser and server-side composition and routing Implement effective dev teams and project workflow about the audience For web developers, software architects, and team leaders. about the author Michael Geers is a software developer specializing in building user interfaces. An excellent starting point to understand how to introduce micro frontends in your projects. Potito Coluccelli Expert practical advice for robust frontend development. The final piece of the micro puzzle! Adail Retamal, Cubic Transportation Systems A very concise and logically structured introduction to implementing a micro frontends team infrastructure. Tanya Wilke, Sanlam A definitive guide for applying micro frontends architecture to any existing UI technology. Karthikeyarajan Rajendran, Johnson Controls India NARRATED BY SARAH DAWE
    Note: Online resource; Title from title screen (viewed August 25, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Manning Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 7 hr., 21 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: This book is an indispensable resource. Greg Wright, Kainos Software Ltd. Unit Testing Principles, Patterns and Practices shows you how to refine your existing unit tests by implementing modern best practices. You’ll learn to spot which tests are performing, which need refactoring, and which need to be deleted entirely! Upgrade your testing suite with new testing styles, good patterns, and reliable automated testing. about the technology Great testing practices will help maximize your project quality and delivery speed. Wrong tests will break your code, multiply bugs, and increase time and costs. You owe it to yourself—and your projects—to learn how to do excellent unit testing to increase your productivity and the end-to-end quality of your software. about the book Unit Testing Principles, Patterns and Practices teaches you to design and write tests that target the domain model and other key areas of your code base. In this clearly written guide, you learn to develop professional-quality test suites, safely automate your testing process, and integrate testing throughout the application life cycle. As you adopt a testing mindset, you’ll be amazed at how better tests cause you to write better code. what's inside Universal guidelines to assess any unit test Testing to identify and avoid anti-patterns Refactoring tests along with the production code Using integration tests to verify the whole system about the audience For developers who know the basics of unit testing. The C# examples apply to any language. about the author Vladimir Khorikov is an author, blogger, and Microsoft MVP. He has mentored numerous teams on the ins and outs of unit testing. Serves as a valuable and humbling encouragement to double down and test well, something we need no matter how experienced we may be. Mark Nenadov, BorderConnect I wish I had this book twenty years ago when I was starting my career in software development. Conor Redmond, Incomm Product Control This is the kind of book on unit testing I have been waiting on for a long time. Jeremy Lange, G2 NARRATED BY NATE COLITTO
    Note: Online resource; Title from title screen (viewed June 1, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781801070676
    Language: English
    Pages: 1 online resource (1 video file, approximately 25 hr., 3 min.)
    Edition: 1st edition
    Keywords: Streaming video ; Internet videos ; Electronic videos ; local ; Vidéo en continu ; Vidéos sur Internet ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: A compendium of SwiftUI code for any scenario from the blockbuster bestseller "SwiftUI for Masterminds" by J.D. Gauchat About This Video Delve into the framework and tools of SwiftUI Learn how to build applications for iOS and macOS with less code Get to grips with the techniques of declarative programming In Detail Do you want to learn the SwiftUI framework to build modern, stylish, and robust applications for Apple devices? This course will help you do that. The course starts with an introduction to the Swift language and gives you an overview of application development using Swift. Next, you will learn all about the fundamental concepts of Swift, such as operators, variables, functions, methods, strings, arrays, memory management, error handling, and a lot more. Moving along, you will get a solid understanding of the SwiftUI framework and the Xcode interface and learn how to use a declarative user interface. Next, you will learn to work with control views, navigation views, and lists. Moving ahead, you will learn to implement graphics, animations, gestures, and notifications in your applications. Next, you will understand how to manipulate data in your applications and in the cloud. Towards the end, you will learn to integrate the UIKit framework with SwiftUI and learn the steps to publish your application to the App Store. By the end of this course, you will be well versed with the SwiftUI framework and be able to implement it while developing applications for macOS and iOS.
    Note: Online resource; Title from title screen (viewed December 29, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484266946
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 15 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Learn to create stunning animated and interactive charts using Highcharts and Angular. Along the way you will develop smooth dashboards that will work in all modern browsers. You will see how to use Highcharts to call backend services for data and easily construct real-time data dashboards. This video course provides the best solutions for real-time challenges and covers a wide range of charts including line, area, deviation, Gauge, stacked bar, scatter plot, and 3D charts. Highcharts is one of the most useful products for developing charting on the web and Angular is well known for speed. Using Highcharts with Angular, you can build fast, interactive dashboards. Get up to speed using this video course today. What You Will Learn Develop interactive, animated dashboards Implement Highcharts using Angular Use and export different chart types Create interactive styling themes and colors for a dashboard Who This Video Is For Developers who are already familiar with HTML, CSS, and JavaScript.
    Note: Online resource; Title from title screen (viewed December 1, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484265918
    Language: English
    Pages: 1 online resource (1 video file, approximately 53 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: This video will guide you on the principles and practice of designing a smart, AI-based intrusion detection system (IDS) to defend a network from cybersecurity threats. The course begins by explaining the theory and state of the art of the field, and then proceeds to guide you on the step-by-step implementation of an ML-based IDS. The first part of the course will explain how an intrusion detection system is used to stop cybersecurity threats such as hackers from infiltrating your network. Next, it will explain why traditional intrusion detection systems are not able to keep up with the rapid evolution of black hat adversaries, and how machine learning offers a self-learning solution that is able to keep up with, and even outsmart them. Further, you will learn the high-level architecture of an ML-based IDS; how to carry out data collection, model selection, and objective selection (such as accuracy or false positive rate); and how all these come together to form a next-generation IDS. Moving forward, you'll see how to implement the ML-based IDS. What You Will Learn Discover how an IDS works See how machine learning-based IDSs are able to solve the problems that traditional IDSs have faced Architect a machine learning-based IDS Train the ML components of a next-generation IDS Choose the correct metric function for your next-generation IDS in order to satisfy the most commonly encountered business objectives Who This Video Is For Cybersecurity professionals, data scientists, and students of these disciplines.
    Note: Online resource; Title from title screen (viewed September 29, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484267004
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 7 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Create new apps and update legacy apps that support older iOS versions to allow users to take advantage of widgets. Apple introduced a new way to allow users to update and modernize their iPhone home screens. They can use widgets on their home screen to keep their favorite information at their fingertips. Keep your apps new and relevant by adding widget capabilities. We will be creating a demo app to incorporate a static widget that will update the widget on the home screen whenever information in the app changes. What You Will Learn Add and configure a static widget Update legacy apps to use widgets Design widgets with user friendly UI functions Who This Video Is For iOS developers with experience using the Swift programming language. Some experience with SwiftUI would be beneficial, but not essential.
    Note: Online resource; Title from title screen (viewed November 5, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484266991
    Language: English
    Pages: 1 online resource (1 video file, approximately 39 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Implement machine learning to realize the power of AI algorithms. Developers and companies often struggle to deploy machine learning models efficiently. One of the main reasons for this is a lack of proper process set up and execution. After getting feedback and comments from his YouTube subscribers, Vikraman has created a system of step-by-step instructions for the process. Using TensorFlow.js, you'll walk through the process of deploying machine learning models in web applications. You'll learn to deploy these models at scale and to work with users' existing hardware such as web cams to accomplish common machine learning tasks. What You Will Learn Deploy machine learning models at scale Save, export, and restore machine learning models Use Flask to work with TensorFlow and Keras models Who This Video Is For Engineers, coders, and researchers who wish to deploy machine learning models in web applications. A basic understanding of TensorFlow, Python, HTML and general machine learning and deep learning algorithms is helpful.
    Note: Online resource; Title from title screen (viewed November 18, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484266113
    Language: English
    Pages: 1 online resource (1 video file, approximately 49 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Use your custom data to create and train models with the help of .NET and Azure. Machine learning is here and with it comes a multitude of opportunities for developers to apply it and use it in a variety of applications. This video will teach you how you can use Model Builder inside Visual Studio to create a model. You can then easily integrate the model you build into all kinds of applications including chatbots. You will discover that the custom model created with ML.NET will ensure the most accurate response for your type of data. The video begins with a general overview of bots and the tools you need to create them. You'll then learn how to create a bot using Azure. And finally you will dive into the specifics of ML.NET and Model Builder to learn how you can integrate your custom model with the Azure Web App Bot. What You Will Learn Understand what a bot is Work with Microsoft Bot Framework on Azure Create a bot on Azure Build a simple natural language understanding model for a bot Implement data normalization Use the ML.NET capabilities Understand how ML.NET Model Builder works Who This Video Is For Developers and engineers who are familiar with C# and .NET and interested in learning about bots, machine learning, custom ML models, and ML.NET.
    Note: Online resource; Title from title screen (viewed October 29, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 34 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: The Trill data engine is the power behind many of Microsoft’s offerings, from products like Azure Stream Analytics to billion-dollar services like Bing Ads. It has now been open-sourced and is available to everyone. But it has been a long path to get there. James Terwilliger, Badrish Chandramouli, and Jonathan Goldstein explore the history of decades of streaming data processing at Microsoft: a beginning in research, a first product in StreamInsight, the transition to the cloud, and all the pain points along the way. A key result of that lineage and learning has been the Trill engine, which has three key properties a single standalone data processing engine for all temporal data, no matter if the data is streamed or stored; a simple API that integrates seamlessly with the programming language; and performance without ego, a willingness to use every lesson learned to improve throughput in every way possible. They dive deep into why each of those properties is important through examples. A simple application to demonstrate the basics of Trill: joins, aggregation, windowing; a more complicated application to demonstrate the power of Trill’s API: progressive windowing, regular expressions and pattern detection, data-dependent windows; and an overview of the kind of query used by Bing Ads, a query to run a multi-billion-dollar business. You’ll see a performance showcase: running the previous examples to demonstrate how Trill got its name—processing a trillion events per day on a single node. Prerequisite knowledge A working knowledge of streaming data systems (useful but not required) What you'll learn Learn about temporal data versus temporal queries and data-dependent and custom temporal windowing This session is from the 2019 O'Reilly Strata Conference in New York, NY.
    Note: Online resource; Title from title screen (viewed February 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 42 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: ML development often focuses on metrics, delaying work on deployment and scaling issues. ML development designed for production deployments typically follows a pipeline model with scaling and maintainability as inherent parts of the design. Robert Crowe and Charles Chen (Google) takes a deep dive into TensorFlow Extended (TFX), the open source version of the ML infrastructure platform that Google has developed for its own production ML pipelines. Prerequisite knowledge Experience with ML development and software development What you'll learn Discover issues and best practices for putting machine learning models and applications into production
    Note: Online resource; Title from title screen (viewed February 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 39 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Swift for TensorFlow is a next-generation machine learning platform that leverages innovations like first-class differentiable programming to seamlessly integrate deep neural networks with traditional AI algorithms and general purpose software development. Paige Bailey and Brennan Saeta (Google) demonstrate how Swift for TensorFlow can make advanced machine learning research easier and faster. Prerequisite knowledge Experience with ML development General knowledge of Swift (useful but not required) What you'll learn See how Swift for TensorFlow can change the way you think about ML
    Note: Online resource; Title from title screen (viewed February 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 60 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: The common algorithmic challenge for the current crop of marketplace companies is efficient matching between two sides of the marketplace. For DoorDash, which focuses on food delivery, this problem is even more difficult because of its three-sided marketplace, where the company must identify the optimal Dasher to fulfill a delivery from a restaurant and bring it to a consumer. At its core, this marketplace logistics problem is a core operations research problem called the vehicle routing problem. But DoorDash faces additional challenges: delivery requests come in in real time; most orders need to be delivered immediately; Dashers are in constant movement; and the effects of variance in restaurant operations and real-world events (traffic, weather, etc.) have pronounced effects on the solutions. Thus, finding global optimality in real time becomes intractable. To address these challenges, DoorDash leverages various AI techniques to intelligently model the decision space and achieve near-optimal solutions in seconds. In this Spotlight on Data , DoorDash’s Gary Ren explains how his team defined the problem of modeling the marketplace and then implemented machine learning techniques to solve the marketplace matching problem. Recorded on December 11, 2019. See the original event page for resources for further learning or watch recordings of other past events . O’Reilly Spotlight explores emerging business and technology topics and ideas through a series of one-hour interactive events. In live conversations, participants share their questions and ideas while hearing the experts’ unique perspectives, insights, fears, and predictions for the future. In every edition of Spotlight on Data , you’ll learn about, discuss, and debate the tools, techniques, questions, and quandaries in the world of data. You’ll discover how successful companies leverage data effectively and how you can follow their lead to transform your organization and prepare for the Next Economy.
    Note: Online resource; Title from title screen (viewed February 21, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 38 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: For ecommerce applications, matching users with the items they want is the name of the game. If they can’t find what they want, then how can they buy anything? Typically, this functionality is provided through the search and browse experience. Search allows users to type in text and match against the text of the items in the inventory. Browse allows users to select filters and slice and dice the inventory down to the subset they’re interested in. But with the shift toward mobile devices, no one wants to type anymore—thus browse is becoming dominant in the ecommerce experience. But there’s a problem if your inventory isn’t categorized. Perhaps your inventory is user generated or generated by external providers who don’t tag and categorize the inventory. No categories and no tags means no browse experience and missed sales. You could hire an army of taxonomists and curators to tag items, but training and curation will be expensive. You can demand that your providers tag their items and adhere to your taxonomy—but providers will buck this new requirement unless they see obvious and immediate benefit. Worse, providers might use tags to game the system—artificially placing themselves in the wrong category to drive more sales. Worst of all, creating the right taxonomy is hard. You have to structure a taxonomy to realistically represent how your customers think about the inventory. Eventbrite is investigating a tantalizing alternative: using a combination of customer interactions and machine learning to automatically tag and categorize its inventory. As customers interact with the platform—as they search for events and click on and purchase events that interest them—Eventbrite implicitly gathers information about how its users think about its inventory. Search text effectively acts like a tag, and a click on an event card is a vote that the clicked event is representative of that tag. Eventbrite uses this stream of information as training data for a machine learning classification model, and as Eventbrite receives new inventory, it can automatically tag it with the text that customers will likely use when searching for it. This makes it possible to better understand the inventory, supply and demand, and most importantly this allows Eventbrite to build the browse experience that customers demand. John Berryman takes a deep dive into the problem space and Eventbrite’s approach. He explores how the company gathered training data from its search and clic...
    Note: Online resource; Title from title screen (viewed February 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 39 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Feature engineering is generally the section that gets left out of machine learning books, but it’s also the most important part of successful models, even in today’s world of deep learning. While academic courses on machine learning focus on gradients and the latest flavor of recurrent network, Ted Dunning (MapR) explores the techniques that practitioners in the real world are seeking out better features and figuring out how to extract value using a variety of time-honored (and occasionally exceptionally clever) heuristics. In a sense, feature engineering is the Rodney Dangerfield of machine learning, never getting any respect. It is, however, the task that will get you the most value for time spent in terms of model performance. This work is not just the work of the data scientist. Good features encode business realities as well and are the cross-product of good business sense and good data engineering. Prerequisite knowledge A basic understanding of how machine learning is used to teach models What you'll learn Learn some surprising techniques that can help you solve some really hard problems This session is from the 2019 O'Reilly Strata Conference in New York, NY.
    Note: Online resource; Title from title screen (viewed February 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 40 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: When Spotify launched in 2008, the lucky first launch countries rejoiced at the prospect of an almost infinite jukebox at their fingertips. In the 10+ years that followed, the product evolved quite a bit from something that required you to know exactly what you wanted to listen to before you listened to the product today that offers countless recommendations and a personalized experience. It’s no surprise that ML has had a prominent role in that evolution. Josh Baer and Keshi Dai explain how Spotify applied ML to personalize its product and discuss the historical challenges of bringing ML products to market. You’ll learn how Spotify uses TensorFlow and, especially, the TFX family of products as a “paved” workflow and how this has improved the ability for product teams to leverage ML in their work. You’ll also examine the current state of the ML platform at Spotify and the open challenges the company faces. Prerequisite knowledge A basic understanding of the ML workflow and the challenges that engineers face in productionizing ML in the industry What you'll learn Understand the usage of Tensorflow Extended (tf.Transform, TF Data Validation, TF Model Analysis, tf.Examples, etc.) in the enterprise and how ML works at Spotify
    Note: Online resource; Title from title screen (viewed February 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781838980122
    Language: English
    Pages: 1 online resource (1 video file, approximately 4 hr., 5 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Develop useful plugins for the Atlassian marketplace About This Video A complete guide for users/developers, managers, and administrators to effectively managing projects and artifacts in JIRA Familiarize yourself with the development platform while building on the foundations provided by the Atlassian JIRA server architecture Create, develop, and deploy JIRA plugins and gadgets In Detail Jira is an issue and project-tracking application, and one of the most popular software development tools utilized by Agile teams. Jira 8 comes with performance improvements to meet the demands of ever-growing enterprise teams. This one-stop resource will get you started creating (and working with) Jira plugins and customizations. We will be using Jira 8 throughout this tutorial. You'll begin your journey by learning to develop and deploy plugins and then modify them to suit your needs. You will learn to customize the look and feel of your Jira UI, and then perform a detailed configuration of Jira Issues for administrators. Then you'll learn to create and manage custom fields in JIRA efficiently, and operate with workflows by learning to manipulate them programmatically. Finally, we cover how to build useful gadgets and prepare reports. By the end, you will have built a solid foundation in Jira and will be equipped to use it efficiently to improve your team's productivity.
    Note: Online resource; Title from title screen (viewed February 25, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 47 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Recently, several deep learning approaches have attempted to detect malware binaries using convolutional neural networks and stacked deep autoencoders. Although they’ve shown respectable performance on a large corpus of datasets, practical defense systems require precise detection during the malware outbreaks where only a handful of samples are available. Sean Park (Trend Micro) demonstrates the effectiveness of the latent representations obtained through the adversarial autoencoder for malware outbreak detection. Using instruction sequence distribution mapped to a semantic latent vector, the model provides a highly effective neural signature that helps detecting variants of a previously identified malware within a campaign mutated with minor functional upgrade, function shuffling, or slightly modified obfuscations. Sean explains the effectiveness of generative adversarial autoencoders for static malware detection under outbreak situations where a single sample of a kind is available to detect similar in-the-wild samples. The model performance is evaluated over real-world macOS and Windows malware samples against traditional machine learning models. Prerequisite knowledge A basic understanding of TensorFlow and malware What you'll learn Discover the flexibility TensorFlow offers critical tools for cybersecurity against real-life malware threats Understand how deep neural networks can generate next-generation neural signatures effective against dynamically morphing malware Learn how neural signature changes the paradigm of cybersecurity
    Note: Online resource; Title from title screen (viewed February 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 39 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Successful businesses today are turning to ML as a new approach to solve business challenges. However, transforming your business with ML can be hard from a cultural, competitive, and technology position. Carlos Escapa takes a deep dive into how to identify use cases for ML, acquire cutting-edge best practices to frame problems in a way that key stakeholders and senior management can understand and support, and set the stage for delivering successful ML-based solutions for your business. What you'll learn Discover how to transform your business with ML This session is from the 2019 O'Reilly Artificial Intelligence Conference in San Jose, CA. and is sponsored by Amazon Web Services.
    Note: Online resource; Title from title screen (viewed February 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 48 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Despite a meteoric rise in data volumes within modern enterprises, enabling nontechnical users to put this data to work in diagnostic and predictive tasks remains a fundamental challenge. Peter Bailis (Sisu Stanford University) details the lessons learned in building new systems and interfaces to help users quickly and easily leverage the data at their disposal with production experience from Facebook, Microsoft, and the Stanford DAWN project. Drawing on his research and startup experience, Peter examines why deep networks aren’t a panacea for most organizations’ data; how usability and speed are the best path to better models; why Facebook, Apple, Amazon, Netflix, and Google (FAANG) likely won’t (and can’t) dominate every vertical; and why automating feature selection is more practical than AutoML. Prerequisite knowledge General knowledge of how machine learning models are built, trained, and deployed What you'll learn Learn practical principles informed by recent theory and actual production deployments Understand how to use the existing body of structured enterprise data as a source of training data, focus on augmentation and not automation of common workflows, and deploy models quickly and rapidly iterate This session is from the 2019 O'Reilly Artificial Intelligence Conference in San Jose, CA.
    Note: Online resource; Title from title screen (viewed February 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 39 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: There’s an evolution in product management correlated with the shift from the digital revolution to the AI revolution. AI product managers are rising. As AI and ML eat software, more and more PMs and execs need to level up their skills to manage these products and provide requirements and specifications that add value to the data engineering and data science teams. This leads to actually solving customer pain points and not just building a cool technology solution. Imagine a new recommendation feature. Traditionally, a PM would work with a designer and come up with the UI/UX specification around the layout, when and where to show the recommendations, the behavior on interacting with the recommendations, etc. However, product specifications around UX, layout, or interactions are of no value to a machine learning engineer or a data scientist who would need to operationalize a machine learning system to power such recommendations. Mayukh Bhaowal (Salesforce) details the top areas an AI product manager needs to focus on above and beyond a traditional PM, including mapping of business problems to machine learning problems, understanding data and labelled data nuances, defining crisp model evaluation criteria, model explainability, ethics and bias, and the distinction between research and production when it comes to AI-powered products and features. Prerequisite knowledge A working knowledge of AI product space What you'll learn Understand that the role of product management has changed fundamentally and that AI product managers and execs need unique skill sets above and beyond traditional PMs to be successful in the real world building AI/ML products Learn how AI product managers and execs need to think differently about customers, use cases, and how to translate them into tangible requirements for data engineers and data scientists This session is from the 2019 O'Reilly Artificial Intelligence Conference in San Jose, CA.
    Note: Online resource; Title from title screen (viewed February 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 43 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Data catalogs are not new; in fact they’ve been around for decades. But in the age of data lakes, self-service analytics, and data protection regulation, they’ve taken on new capabilities and renewed importance. There are a number of products in the market now, and they differ greatly, with a number of subcategories in the space. Some data catalogs focus on data discoverability, others on governance and security. Some are oriented toward relational databases and data warehouses, while others are tied to more modern data sources. Many of the products use AI and machine learning to help automate the catalog build out, but almost all of them do so differently. And, while there are several startups in the field, public cloud providers have entries here, as do incumbent software megavendors. Andrew Brust (Blue Badge Insights ZDNet) guides you through the importance of data catalogs, covers the range of data catalog capabilities, and explores the key players and their platforms. Andrew also provides an analysis of where the space is headed and what it will need to provide to address customer needs and pain points. You’ll get up to speed on the subject quickly, and no prior data catalog knowledge is required. Prerequisite knowledge A basic understanding of databases, data files, and data types General knowledge of data warehouses and data lakes (useful but not required) What you'll learn Discover concepts of data catalogs including schema, metadata, data classification, business glossaries, tagging, data set endorsement, personally identifiable information (PII), sensitive data protection, regulatory compliance, data marketplaces, and more Explore the role of machine learning and AI in catalog automation and relationship discovery This session is from the 2019 O'Reilly Strata Conference in New York, NY.
    Note: Online resource; Title from title screen (viewed February 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 39 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Uber Eats has become synonymous with online food ordering. With an increasing selection of restaurants and dishes in the app, personalization is quite crucial to drive growth. One aspect of personalization is a better recommendation of restaurants and dishes so users can get the right food at the right time. Ankit Jain and Piero Molino (Uber AI Labs) detail how to augment the ranking models with better representations of users, dishes, and restaurants. Specifically, they leverage the graph structure of Uber Eats data to learn node embeddings of various entities using state-of-the-art graph convolutional networks implemented in TensorFlow and how these methods perform better than standard matrix factorization approaches for this use case. Prerequisite knowledge General knowledge of deep learning with TensorFlow What you'll learn Learn how to build deep learning models on graph data using graph convolutional networks to obtain better entity representations to use for recommendation Discover strategies to scale a model to very big datasets
    Note: Online resource; Title from title screen (viewed February 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 42 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Uber relies heavily on making data-driven decisions in every product area and needs to store and process an ever-increasing amount of data. But building a reliable big data platform is extremely challenging when it has to store and serve hundreds of petabytes of data in real time. The company redesigned traditional big data platform solutions to provide faster, more reliable, and more performant access by adding a few critical technologies that overcome their limitations. Reza Shiftehfar reflects on the challenges faced and proposes architectural solutions to scale a big data platform to ingest, store, and serve 100+ PB of data with minute-level latency while efficiently utilizing the hardware and meeting security needs. You’ll get a behind-the-scenes look at the current big data technology landscape, including various existing open source technologies (e.g., Hadoop, Spark, Hive, Presto, Kafka, and Avro) as well as what Uber’s tools such as Hudi and Marmaray. Hudi is an open source analytical storage system created at Uber to manage petabytes of data on HDFS-like distributed storage. Hudi provides near-real-time ingestion and provides different views of the data: a read-optimized view for batch analytics, a real-time view for driving dashboards, and an incremental view for powering data pipelines. Hudi also effectively manages files on underlying storage to maximize operational health and reliability. Reza details how Hudi lowers data latency across the board while simultaneously achieving orders of magnitude of efficiency over traditional batch ingestion. He then makes the case for near-real-time dashboards built on top of Hudi datasets, which can be cheaper than pure streaming architectures. Marmaray is an open source plug-in based pipeline platform connecting any arbitrary data source to any data sink. It allows unified and efficient ingestion of raw data from a variety of sources to Hadoop as well as the dispersal of the derived analysis result out of Hadoop to any online data store. Reza explains how Uber built and designed a common set of abstractions to handle both the ingestion and dispersal use cases, along with the challenges and lessons learned from developing the core library and setting up an on-demand self-service workflow. Along the way, you’ll see how Uber scaled the platform to move around billions of records per day. You’ll also dive into the technical aspects of how to rearchitect the ingestion platform to bring in 10+ trill...
    Note: Online resource; Title from title screen (viewed February 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781839216909
    Language: English
    Pages: 1 online resource (1 video file, approximately 2 hr., 19 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local ; Electronic videos
    Abstract: Get up to date with what's new in C++ About This Video Write robust and efficient code using the latest version of C++ Port your C++ code to the latest version and save time and effort Discover new coroutines that simplify writing code that executes in parallel In Detail C++ is popular for its incredible performance and suitability for operating systems, games, embedded software, and more. This course gets you up-to-date with the very latest components in C++20/C++2a so you can harness its new enhancements and get ahead of the game by leveraging its features! We cover what C++20/C++2a is and the current standardization status. We also discover some new syntactic sugars that enable you to write shorter but more powerful code. You'll learn about the new and improved ranges and iterators, explore key examples of filter stacking, and learn how ranges simplify iterator-heavy code. Crucially, you'll master how to migrate to C++20/C++2a in the easiest possible way, and why you should! C++20/C++2a brings new features to the synchronization library, including atomic smart pointers, latchers, and barriers. We review its all-new coroutines (a major concept found in other leading programming languages that simplifies writing code for parallel execution). By the end of the course, you'll use up-to-date insights into the full features of C++20/C++2a to facilitate efficient and fast coding within your own projects.
    Note: Online resource; Title from title screen (viewed February 21, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 22 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Nearly 4 Hours of Video Instruction Cloud adoption is greater than ever. However, there is a shortage of skilled practitioners who not only can use the cloud, but can optimize it. DevOps is a catchall word for a series of behaviors that can dramatically increase the operational efficiency of the cloud. DevOps best practices include continuous integration, continuous delivery, Microservices, teamwork and collaboration, and monitoring. This course covers the essentials of DevOps Professional on AWS and prepares a candidate to sit for the DevOps Professional Certification exam. Description The AWS Certified Developer Complete Video Course focuses on the AWS Certified DevOps Engineer - Professional Exam. The leader in cloud computing by market share, Amazon and their DevOps Professional certification allows you to demonstrate that you have mastered the essential skills of operationalizing a cloud. Seven main categories are covered: AWS Certified DevOps Engineer Overview; SDLC Automation; Configuration Management and Infrastructure as Code; Monitoring and Logging; Policies and Standards Automation; Incident and Event Response; and High Availability, Fault Tolerance, and Disaster Recovery. The material focuses on teaching the concepts necessary to pass the exam and be competent as a DevOps practitioner on AWS. About the Instructor Noah Gift is a lecturer at UC Davis Graduate School of Management MSBA program, the Graduate Data Science program, MSDS, at Northwestern, the Data Science program at UC Berkeley, and the USF Health Informatics program. He is teaching and designing graduate Machine Learning, AI, Data Science courses, and consulting on Machine Learning and Cloud Architecture for students and faculty. These responsibilities include leading a multi-cloud certification initiative for students. Noah has published nearly 100 technical publications, including books on subjects ranging from Cloud Machine Learning to DevOps. He has published more than100 technical publications, including three books on subjects ranging from Cloud Machine Learning to DevOps. Gift received an MBA from UC Davis, a M.S. in Computer Information Systems from Cal State Los Angeles, and a B.S. in Nutritional Science from Cal Poly San Luis Obispo. Currently, he consults startups and other companies on Machine Learning, Cloud Architecture and CTO-level consulting as the founder of Pragmatic AI Labs. His most recent book is Pragmatic AI: An Introduction to Cloud-Base...
    Note: Online resource; Title from title screen (viewed March 10, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 41 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: The TensorFlow ecosystem contains many valuable assets. One of which is the highly acclaimed TensorFlow high-level API. It’s critical for a fast and lightweight approach to reducing lead time in deep learning model development and hypothesis testing. It’s now possible to quickly and easily develop a novel deep learning solution to meet an important need in practice: data bias and augmentation in NLP. Solving this problem would have a far-reaching impact in model bias, offensive-language detection, language personalization, and classification. KC Tung (Microsoft) details his work to satisfy a need of an enterprise customer (one of the largest airlines in the world) for a model that can accurately review, classify, and store texts from aircraft maintenance logs to comply with FAA regulations on aviation safety. The customer’s data is imbalanced and biased toward certain categories. Training machine learning models with imbalanced data inevitably leads to model bias, and text generation is a novel and important approach for data augmentation. In NLP, many current approaches to augmenting minority data are unsupervised and are limited to synonym swap, insertion, deletion, or oversampling. These generalized approaches often lead to a trade-off between precision and recall. They also don’t work well in practice, as enterprise data is almost always domain specific. There needs to be a better framework to generate new corpus by learning from any domain-specific underrepresented text. KC presents a novel deep learning framework built with TensorFlow to quickly achieve this goal. A benchmark model is trained on the balanced dataset. From this dataset a class is undersampled as the underrepresented, minority class text. Then a gated recurrent unit (GRU) model learns to generate more underrepresented text, which helps training a long short-term memory (LSTM) model that classifies text. The result on holdout data shows that the model trained with generated text is surprisingly effective. Classification accuracy, precision, and recall at each class are all on par with the benchmark model without compromising precision or recall. In short, this demonstrates the success of TensorFlow adoption for the enterprise customer in quickly leveraging and applying the TensorFlow high-level API in building a novel production-grade solution for deployment, demonstrating the effectiveness of a novel data-augmentation framework, identifying a “killer app” or a new core val...
    Note: Online resource; Title from title screen (viewed February 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 37 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: With the hype around artificial intelligence and machine learning sky high and the perceived talent shortage, it’s still extremely hard for organizations to build their machine learning efforts. Madhura Dudhgaonkar (Workday) breaks down the lessons learned into an an actionable framework to bootstrap and scale a machine learning product function. You’ll see the framework in action through an actual 0 to 1 product journey, involving deep learning where value was delivered in record speed in spite of not having a dataset. You’ll hear counterintuitive tips that Madhura has been using to productize ML services over the last 5+ years (using a diverse range of technologies—vision, language, graph, anomaly detection, search relevance, and personalization). Prerequisite knowledge A basic understanding of the machine learning discipline What you'll learn See an actionable framework to begin and scale your ML product journey Discover tips on all sides of the equation for bootstrapping and scaling ML functions This session is from the 2019 O'Reilly Artificial Intelligence Conference in San Jose, CA.
    Note: Online resource; Title from title screen (viewed February 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484258484
    Language: English
    Pages: 1 online resource (1 video file, approximately 24 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Implement a public-facing Apache web server on the Raspberry Pi 3. Start by installing a headless Raspbian operating system and use SSH and FTP clients to interact with it on a Pi. Following the installation of Raspbian, you'll set up Apache on the Pi and configure it to host a basic experimental website. Finally, you'll configure Apache and a router to make your website public facing so that anyone outside your local network can access the site via an IP address. The last segment of the video will go over an alternative to Apache built into Python and already installed on Raspbian. Python SimpleHTTPServer can be used to set up a basic server on a Pi with only a few commands. It’s not robust enough to be used with larger scale projects, but if you just need a light server that can be set up in a few minutes then Python SimpleHTTPServer is the tool for you. After watching this video, you’ll have all the tools you need to set up your Raspberry Pi as a fully functional server. What You Will Learn Install and use a headless operating system on the Raspberry Pi 3 Set up SSH and FTP on the Pi Configure Apache to host a basic website Make the server publicly accessible with port forwarding Implement a server using Python SimpleHTTPServer Who This Video Is For Beginning developers, computer science enthusiasts, and website creators interested in working with the simple Raspberry Pi hardware and available open source software.
    Note: Online resource; Title from title screen (viewed March 24, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781800204027
    Language: English
    Pages: 1 online resource (1 video file, approximately 12 hr., 46 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Develop the most in-demand skills for DevOps and cloud professionals About This Video Learn the Linux command line from scratch Browse the Linux filesystem efficiently Create your own commands to save time In Detail Most businesses are now migrating to Cloud and other cloud-related technologies, making Linux command line expertise a must-have skill for DevOps and cloud engineers. This course will teach you the fundamentals of the Linux command line through an enjoyable learning experience. It includes some interesting videos that will guide you in setting up your own Linux VM and a Linux EC2 instance in the AWS cloud. This hands-on course will help you master the Linux command line with bite-sized videos that guide you at every step. You'll learn to work with files and folders, understand the Linux filesystem layout, and navigate through the filesystem efficiently. You'll get to grips with topics such as Linux permissions, hard and soft links, and text processing commands. As you advance, you'll cover standard I/O and redirection and learn to compress and uncompress files and folders. The course will also take you through sudo, Vi editor, scheduling jobs using cron, customizing a bash environment, and much more!
    Note: Online resource; Title from title screen (viewed March 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781800202320
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 47 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Succeed in your next JavaScript coding interview by working through practice questions and learning important JavaScript skills and concepts About This Video Learn the concepts and techniques that interviewers usually test candidates on in JavaScript programming interviews Gain insights into the actual format of programming interviews In Detail This course is designed to help you prepare effectively for any JavaScript programming interview. Since programming interviews require intense preparation, with practice being the key to succeeding, this course will ensure you are well-equipped to make an impression. In this course, you will complete more than 30 JavaScript interview questions that come from actual JavaScript interviews. You will understand how to approach problems, solve each one, and use the best solution to each problem in a step-by-step manner. You'll also delve into the skills, concepts, and techniques that are required to solve each problem. All along, the course helps you strengthen your JavaScript programming skills and knowledge of fundamental concepts through a hands-on style. The course covers a mix of ES5 and ES6 code to ensure that you grasp the fundamental concepts effectively. By the end of this course, you will be well-versed with more than 30 interview questions, and have the skills and techniques you need to know to succeed in interviews.
    Note: Online resource; Title from title screen (viewed February 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781838984243
    Language: English
    Pages: 1 online resource (1 video file, approximately 4 hr., 49 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local ; Electronic videos
    Abstract: Unleash the power of Swift 5 in your applications About This Video Learn the most common tasks and techniques an iOS developer needs in his/her everyday life Build a beautiful burger-recipe app ready for the App Store Master the latest Apple technologies such as SwiftUI, Dark Mode, CloudKit, and more In Detail The iOS 13 SDK arrives as a major milestone in the evolution of the Swift language with new and interesting features for developers such as Dark Mode, Apple Sign-in, CloudKit, SwiftUI, UIKit, and more. If you're looking to get started with iOS 13 programming, unravel the potential of Swift 5, and publish your apps on the iPhone and iPad, then this is the right course for you. This course will be a perfect guide on your iOS journey; it will take you through the capabilities of iOS 13 and show you how to put its principles into action. It equips you to handle the most common tasks an iOS developer will deal with daily. We begin by creating a burger-recipe application and gradually add features to it as we move on. You will also learn how to build simple apps using SwiftUI and master iPadOS, which is specifically created for tablets. You will learn about the differences between UIKit and SwiftUI, and explore how SwiftUI handles the look-and-feel of different platforms such as iOS, iPadOS, and MacOS. By the end of the course, you will have built an appetizing burger-recipe applicaiton.
    Note: Online resource; Title from title screen (viewed March 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 13 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: This curated collection of keynote highlights from the O'Reilly Software Architecture Conference in Berlin '19 is full of useful insights and helpful guidance. For more content from this event, be sure to check out the full conference video compilation .
    Note: Online resource; Title from title screen (viewed March 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 22 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: This curated collection of keynote highlights from the O'Reilly Open Source Software Conference in Portland '19 is full of useful insights and helpful guidance. For more content from this event, be sure to check out the full conference video compilation .
    Note: Online resource; Title from title screen (viewed March 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 23 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: This curated collection of keynote highlights from the O'Reilly Strata Data Conference New York '19 is full of useful insights and helpful guidance. For more content from this event, be sure to check out the full conference video compilation .
    Note: Online resource; Title from title screen (viewed March 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781838986728
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 39 min.)
    Edition: 2nd edition
    Keywords: Electronic videos ; local
    Abstract: Leverage C# 8, .NET Core 3.1 and Visual Studio 2019 to build fast, enterprise-ready scalable web apps About This Video Dive deep into advanced C# concepts like events and attributes while also learning the fresh new stuff Build blazingly fast, database-driven web APIs using the long-term .NET Core version Quickly build new Razor Pages and fast client apps with Blazor In Detail C# is a multi-paradigm programming language providing support for software engineering principles such as strong type checking, array bound checking, automatic garbage collection, and more. C# 8 comes with a host of new features to build powerful cross-platform applications. Also, ASP.NET Core is the web application framework through which you can develop enterprise-grade web apps. In this course, you will learn quick and easy ways to develop apps using the latest features of C# 8 and .NET Core 3.1. Kitted out with those skills in your toolset, this course will then help you to make the most of the next sections focusing on advanced C# use cases that are particularly suited to real-world application development. Moving further, you will get in-depth knowledge of ASP.NET Core 3.1 Web API framework along with authentication methods and Entity Framework Core, the de facto ORM for C# and .NET Core. Finally, you will work with the latest technologies in the .NET Ecosystem, primarily Razor Pages for quickly bootstrapping smart pages and Blazor for building C# apps for the browser. Finally, you will build a desktop application with WPF and .NET Core. Please note that prior knowledge of C# and some experience with ASP.NET is assumed for taking this course.
    Note: Online resource; Title from title screen (viewed March 27, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781800202016
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 33 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local ; Electronic videos
    Abstract: Implement OTA programming, FreeRTOS and deep sleep in the ESP32 About This Video Discover the features of the ESP32 board Gain confidence in writing code in C for any embedded boards Implement Over The Air Programming to your projects In Detail This course will provide you deeper insights into the features of the ESP32 board, that you didn't even imagine. You will be able to make your products or projects user-friendly by implementing OTA Programming and WiFi Manager. You'll gain an in-depth understanding of RTOS and its applications. Understand FreeRTOS and be able to implement it to optimize your projects or products. Finally, you will learn to drastically reduce the power consumption of the ESP32 board, by implementing deep sleep and leveraging the ULP Coprocessor of the ESP32 in your products or projects.
    Note: Online resource; Title from title screen (viewed February 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781800561700
    Language: English
    Pages: 1 online resource (1 video file, approximately 5 hr., 17 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Get to grips with speech recognition, one of the most advanced and promising branches in artificial intelligence and machine learning About This Video Understand what speech processing is and explore the different types of speech recognition Explore the complexities of speech recognition Understand the difference between acoustic phonetics and articulatory phonetics In Detail Are you intrigued by how speech recognition is driving the growth of the AI market? This course is a reliable guide if you’re looking to pursue a career as a speech recognition professional and understand industry best practices. You’ll learn the science of applying machine learning algorithms to process large amounts of speech data. As you progress, the course will get you up to speed with automated speech recognition. Later, you’ll delve into speech translation, understanding how to work through speech-to-speech translation. Toward the concluding sections, you’ll focus on voice conversion, exploring everything from Phonetic SID System to speaker identification. Throughout the course, you’ll encounter practice questions to help you reinforce your knowledge. By the end of this course, you’ll be well-versed with speech recognition and be able to apply what you’ve learned in the real world.
    Note: Online resource; Title from title screen (viewed August 27, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781800569317
    Language: English
    Pages: 1 online resource (1 video file, approximately 5 hr., 22 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Discover how to use the Elementor plugin to build engaging pages and implement attractive designs for your WordPress website About This Video Find out how to create a Webmail account Navigate the SiteGround control panel Discover how to create a temporary domain and install WordPress In Detail This course teaches you how to use Elementor, one of the most popular plugins for building pages in WordPress, with over a million downloads already. It is fast and comes with a wide variety of widgets and elements that help you to build web pages effortlessly without using any code. The course is divided into two main sections. The first section will take you through the free version of Elementor and teach you how to build an entire one-page website for a fictional company that we will call the White Hat Hackers. You will learn about various building techniques such as working with widgets, building an image carousel, adding a Google map to your web page, creating and inserting a contact form, and working with page templates. The second section uses the paid version of Elementor to show you how to enhance the functionality and design of the website. In addition to learning about the extra features that come with Elementor pro, you will learn how to add a countdown timer, create an animated headline, add a contact form, and use flip boxes to improve the design and style of your web page. This course will be updated continually to cover the latest Elementor features. By the end of this course, you’ll have learned how to use the Elementor plugin and will be able to build any type of web page you want.
    Note: Online resource; Title from title screen (viewed August 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781800568884
    Language: English
    Pages: 1 online resource (1 video file, approximately 2 hr., 57 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Learn actionable steps to launch a successful career as a freelance web developer with the help of an experienced professional About This Video Look for your very first clients Learn the right way to manage and charge clients Understand the common mistakes to avoid when dealing with your clients In Detail Are you interested in becoming a web developer but don't know where to start? Are you looking for ways to make your web development business boom? Look no further! This course will help you learn from an expert web developer what it takes to become successful at building websites for a living. A career in web development can be incredibly rewarding but also very challenging and, at times, frustrating. This course will provide you with practical, actionable steps and advice to help you navigate your way through these challenges.
    Note: Online resource; Title from title screen (viewed July 29, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 37 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: This three-part series of half-day online events gives attendees an overarching perspective of software development from which to make decisions that strengthen and grow companies and industries, a deep knowledge of key open source technologies to make it happen, and a community in which both they and their companies can thrive. In part 2, we wanted to explore infrastructure, containers, continuous delivery, monitoring, chaos engineering, and SRE. Infrastructure today is wildly more complicated—and the wall between software development and deployment is dust. We’ll shed light on new paradigms and a slew of tooling options for observability, testing, and reactive programming. This event is sponsored by IBM and features spotlights on the Caribbean Girls Hack
    Note: Online resource; Title from title screen (viewed August 20, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484255933
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 31 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Master the first, but critical, step in establishing a hybrid Active Directory; an Azure Active Directory scenario and deploying and managing Azure AD Connect. You will learn how to deploy Azure AD Connect in the correct way, out of the gate, to avoid a multitude of issues that magically appear later on. You will discover the difference between an express and custom install, and when and where it makes sense to use one over the other. Once you have Azure AD Connect up-and-running, you will go through several troubleshooting steps to fix wrongly configured identities, ensuring a smooth sync to Azure AD. By the end of the video, you’ll have seen that the baseline for establishing a successful hybrid identity solution with Azure Active Directory and on-premises Active Directory is having a healthy synchronization of identity objects in place, a core feature of Azure AD Connect. What You Will Learn Set up synchronization of identity objects Integrate your on-premises Active Directory with Azure Active Directory Cover the different topologies available for a hybrid Azure Active Directory model Focus on the deployment, monitoring, and troubleshooting of the AD Connect synchronization tool Who This Video Is For Those who want a better understanding of how to integrate their on-premises Active Directory with Azure Active Directory.
    Note: Online resource; Title from title screen (viewed September 11, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Data Science Salon | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 23 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Presented by Boryana Manz – Manager, Data Science at Capital One Model monitoring can make or break how models empower and deliver business value. This talk will highlight the key components for the proactive design of integrated and flexible model monitoring. It will include best practices for making the process seamless, flexible and actionable.
    Note: Online resource; Title from title screen (viewed March 24, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Data Science Salon | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 21 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Seemit Sheth – Head of Data Science at Capital One Micah Price – Principal Associate Data Scientist at Capital One Capital One is one of the pioneers of ‘Information based strategy’ which is essentially what we call today as data science. The world of data science in banking has evolved over time and now data science powers strategies in many diverse areas of a bank, aided by cutting-edge technologies. In this talk, we will go over a glimpse of its past, present and how it is changing banking for good as we move toward the future. In particular, we will also explore how cutting-edge algorithms and technologies are improving customer experiences.
    Note: Online resource; Title from title screen (viewed March 24, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Data Science Salon | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 31 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Presented by Priscilla Boyd – Senior Manager, Data Analytics at Siemens Mobility This presentation discusses how AI, machine learning and data publicly available is playing a role in smart cities, walking through applications developed using ML to solve practical transportation for smart cities globally.
    Note: Online resource; Title from title screen (viewed March 24, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484264232
    Language: English
    Pages: 1 online resource (1 video file, approximately 8 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Relays are key to using your Arduino to directly control devices that work on alternating current. This trick enables you to use a far greater variety of components in your projects, and in this case, it's one of my favorites: electroluminescent wires. In this video, you'll use this eye catching and fun device to showcase the powerful relay technique. What You Will Learn Discover the different types of relays available and how they work Use relays with Arduino Switch on and off a strip of electroluminescent wire (a device not normally compatible with Arduino) Who This Video Is For Beginning-intermediate Arduino users – people who have built a few projects and are looking for ways to incorporate a greater variety of components into them.
    Note: Online resource; Title from title screen (viewed August 27, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781800567221
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 51 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Build Python deep learning-based face detection, recognition, emotion, gender and age classification systems About This Video Use Python to detect and recognize faces from images and real-time webcam video Become well-versed with emotion detection Get up to speed with predicting age and gender from images and real-time webcam video In Detail Face detection and face recognition are the most popular aspects in computer vision. They are widely used by governments and organizations for surveillance and policing. Moreover, they also have applications in our day-to-day life such as face unlocking mobile phones. This course will help you delve into face recognition using Python without having to deal with all the complexities and mathematics associated with the deep learning process. You will start with an introduction to face detection and face recognition technology. After this, you’ll get the system ready for Python coding by downloading and installing the Anaconda package and other dependencies and libraries that are required such as dlib and OpenCV. You’ll then write Python code to detect faces from a given image and extract the faces as separate images. Next, you’ll focus on face detection by streaming a real-time video from the webcam. The course will also guide you on how to customize the face detection program to blur the detected faces dynamically from the webcam video stream. Moving ahead, you’ll go on to learn facial expression recognition and age and gender prediction using a pre-trained deep learning model. Later, you’ll progress to writing Python code for face recognition, which will help identify the faces that are already detected. You’ll use static images as well as live streaming video from the computer’s webcam to recognize the detected faces with their names. The course then explores the concept of face distance, teaching you how to convert the face distance value to face matching percentage using simple mathematics. Finally, you’ll be able to tweak the face landmark points used for face detection. You’ll draw a line joining the face landmark points to visualize the points in the face which the computer used for evaluation. Taking the landmark points customization to the next level, you’ll create custom face make-up for the face image. By the end of this course, you’ll be well-versed with face recognition and detection and be able to apply your skills in the real world.
    Note: Online resource; Title from title screen (viewed July 30, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781800569027
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 0 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Explore how JavaScript objects and JSON are used for coding in JavaScript About This Video Get to grips with JSON and its data structure Discover how to use JSON data in your frontend applications Learn how to use JSON data within web pages In Detail JSON is a text-based, easy-to-read data interchange format, and plays a crucial role in the frontend and backend of web development. This video course will help you to get a brief overview of JSON data and show you how to use it within web pages. Starting with an introduction to JSON, this fast-paced course will help you understand how JavaScript objects are related to JSON data. You’ll then learn how to validate JSON data structure and delve into data types, objects, and arrays. This course will also teach you how to iterate through JSON data, connect to a JSON file, parse JSON data, and convert JavaScript objects into strings using the stringify method. By the end of this course, you’ll have gained a fundamental understanding of JSON data and knowledge of how it is used within web pages.
    Note: Online resource; Title from title screen (viewed August 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Data Science Salon | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 31 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Presented by Stanislaw Schmal Combining IoT and sensor analytics opens a new world of operations and maintenance efficiency. A real-world demonstrator of audio analytics and customized IoT device will be shown and its business application to condition based maintenance will be discussed in this session.
    Note: Online resource; Title from title screen (viewed March 24, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Data Science Salon | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 27 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Presented by Raktim Saha – Director, Digital Insights, CGI The focus of this talk is to showcase how Machine learning and AI is leveraged to radically outperform traditional loan-underwriting acceptance process for one of the largest lenders in US by utilizing a broader set of market, demographic, and various events data. Implementing an automated data-driven process in a large Enterprise and especially in a highly regulated industry has its own challenge spanning from data collection to accuracy of insights, and finally streamline the overall process. The speaker will cover the business, data, and technical aspects of this implementation.
    Note: Online resource; Title from title screen (viewed March 24, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484265055
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 0 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: This video takes you through everything you need to understand SQL injection and how to prepare for attacks as well as how to prevent them. It covers vulnerable website links, basic injection attacks, database and table name discovery, and data extraction. It's everything an ethical hacker needs to know about a SQL injection attack. Web penetration/hacking is a critical issue affecting organizations of all sizes and a SQL injection attack is widely used to perform this attack. SQL injection is a serious web security risk for many organizations used to gather sensitive information from websites. Attackers can easily compromise vulnerable systems. SQL injection is the number one risk in the market. It's easily discoverable to hackers and the impact of this type of attack is severe. It deserves the number one spot. What You Will Learn Use the Sqlsus tool—an open source MySQL injection and takeover tool Analyze time-based SQL injection attacks Understand different SQL injection types Review error-based SQL injection attacks Apply various methods to retrieve table names, column names, and data Who This Video Is For Network security experts, web security specialists, application security experts, penetration testers, and ethical hackers.
    Note: Online resource; Title from title screen (viewed September 15, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 13 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: About the Infrastructure & Ops Superstream Series : This four-part series of half-day online events covers the most challenging and promising topics facing those working in infrastructure and operations today: site reliability engineering, security, Kubernetes, and microservices. Security is everyone’s responsibility. These sessions will get you up to speed with key techniques and best practices for securing your applications, systems, and organization. Discover how to better assess threats and develop a security-aware mindset. Learn how to detect and prevent risks and find application vulnerabilities. And explore pragmatic approaches for adding security to your delivery pipeline. What you'll learn-and how you can apply it Explore the fundamentals of security, including how to improve security within your organization Learn how to assess potential security risks that could affect your deployments with containers Understand how security should work with DevOps Discover how to evaluate your cloud environment for misconfiguration vulnerabilities and address them without slowing down innovation or removing the power that cloud computing delivers This Superstream is for you because... You’re a developer new to or looking to enter a security role. You want to learn about DevSecOps. You want to get started with bug hunting. You want to become well-versed in the foundations and best practices of security. Prerequisites: Come with your questions Have a pen and paper handy to capture notes, insights, and inspiration Recommended follow-up: Read Container Security (book) Read Web Application Security (book) Read Practical Cloud Security (book) Take Windows Network Security Fundamentals (live online training course with Glenn Weadock)
    Note: Online resource; Title from title screen (viewed October 5, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 37 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Challenges are what make life interesting. WebOS OSE is what makes development meaningful. Joseph Park, Steve Lemke, and Lokesh Kumar Goel offer an overview of webOS Open Source Edition and explain how to use webOS OSE to create and use apps and services with Enact and Luna. Join in to see how you can get started contributing to the project.
    Note: Online resource; Title from title screen (viewed July 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 58 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Your team will change whether you like it or not. People will come and go. Your company might double in size or even be acquired. The good news: successfully managing this change can lead to better productivity and more innovation. Join us for this edition of Meet the Expert with Heidi Helfand to learn techniques for reteaming effectively. Engineering leaders will discover how to catalyze team change to reduce the risk of attrition, learning and career stagnation, and the development of knowledge silos. Heidi shares patterns based on research into several well-known software companies that will help you effectively integrate new hires into an existing team, manage a team that’s lost members, and deal with unexpected change. You’ll learn when to split a team, how to isolate teams for focused innovation, how to rotate team members for knowledge sharing, how to break through organizational apathy, and much more. O'Reilly Meet the Expert explores emerging business and technology topics and ideas through a series of one-hour interactive events. You’ll engage in a live conversation with experts, sharing your questions and ideas while hearing their unique perspectives, insights, fears, and predictions.
    Note: Online resource; Title from title screen (viewed September 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484265840
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 30 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: This video dives into Microsoft SQL Server's PolyBase feature for virtualizing data from Apache Hadoop and Azure Blob Storage into SQL Server. From this video you will learn how to configure SQL Server and PolyBase to connect to Azure Blob Storage, including how to make connections to public and secured blob containers. You’ll also learn how to make connections to Hadoop clusters and query data that is stored in Hadoop. The video begins by showing how to read from and insert data into Azure Blob Storage. From there, you will learn how to connect PolyBase to a Hadoop cluster, whether in Cloudera’s distribution of Hadoop or the Hortonworks Data Platform. Once connected, you will learn how to query data in Hadoop using two methods: streaming and predicate pushdown. Finally, the video provides key tips on troubleshooting Hadoop integrations, including tips on where to look for log data as well as common configuration and data issues. What You Will Learn Connect to Azure Blob Storage and Hadoop clusters from SQL Server Uncover configuration options needed to connect to a Hadoop cluster Use predicate pushdown to create MapReduce jobs which offload work to a Hadoop cluster Write data to Hadoop and Azure Blob Storage using T-SQL from SQL Server Troubleshoot common errors when connecting to Hadoop or Azure Blob Storage Who This Video Is For Data platform specialists who need to work on multiple data platforms but want to use one unifying language to tie them together. Viewers should be familiar with SQL Server and the T-SQL language, and should be familiar with the content from the prior video in the series, PolyBase Concepts and Configuration.
    Note: Online resource; Title from title screen (viewed September 22, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 2 hr., 49 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. The associated code for this LiveLesson can be found at https://github.com/shaunwa/jquery-examples .
    Note: Online resource; Title from title screen (viewed October 6, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 38 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Today, your product's success depends on the creation of experiences in a steadily rising number of channels, leading to increasing demands for your content management system. Stefan Judis explains how Contentful’s content infrastructure helps developers on the frontline fetch the data they need, ship modern websites faster, and automate content distribution while using their favorite tools.
    Note: Online resource; Title from title screen (viewed July 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 43 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Andrea Pasqua investigates the merits of using deep learning and other machine learning approaches in the area of forecasting and describes some of the machine learning approaches Uber uses to forecast time series of business relevance.
    Note: Online resource; Title from title screen (viewed July 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 31 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Spotify recently completed the migration of all services from running on bare-metal hardware to hosts in the cloud on GCP. Spotify is now in the exciting process of journeying from merely cloud hosted to cloud native via migrating the running of services to Kubernetes. James Wen discusses the work involved, lessons learned, and pitfalls encountered in moving services onto Kubernetes.
    Note: Online resource; Title from title screen (viewed July 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 36 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: The last few years have been a period of tremendous growth for Reddit. Process, tooling, and culture have all had to adapt to an organization that has tripled in size and ambition. Greg Taylor discusses Reddit's evolution and explains how one of the world’s busiest sites develops, deploys, and operates services at significant scale.
    Note: Online resource; Title from title screen (viewed July 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 25 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Our platform hit huge scaling issues as our business grew. This is talk about the ups and downs of coping with a rapidly scaling product. How the system got into that state and distress, what we could of done earlier to stop that and how we fixed it by adapting a continuous improvement mindset, using distributed architecture, docker and amazon webservices.
    Note: Online resource; Title from title screen (viewed July 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 38 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Netlify recently moved a production system to Kubernetes, but the story isn't so simple. David Calavera shares the lessons Netlify learned during the migration that made the company roll the migration back and explains how they rolled it again—all without affecting production availability.
    Note: Online resource; Title from title screen (viewed July 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 40 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Labhesh Patel explains how deep learning is informing Jumio's computer vision through smarter data extraction, fraud detection, and risk scoring and how Jumio is leveraging massive datasets and human review to dramatically improve the accuracy of its machine learning algorithms to detect bogus IDs and streamline the verification process of legitimate documents.
    Note: Online resource; Title from title screen (viewed July 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 36 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Hui Ding explains how open source software has helped lead to Instagram's success—particularly Django, the open source Python-based framework. Hui discusses Instagram's evolution from a mere follower falling behind the community to a leading contributor and shares perspectives on aligning Instagram's engineering team and working with the Python community.
    Note: Online resource; Title from title screen (viewed July 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 39 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Naoman Abbas offers an overview of tools Pinterest built to process trace data and the use cases they’ve enabled and shares some real-world examples. Join in to learn how to apply these techniques to your own challenges.
    Note: Online resource; Title from title screen (viewed July 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 43 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Christian Saide explains how NS1 was able to reduce infrastructure, maintenance, and operational costs while simultaneously increasing throughput and visibility of key metrics by leveraging Elasticsearch as a time series database.
    Note: Online resource; Title from title screen (viewed July 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 35 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: We share our lessons learned in removing and adding technologies, including stories from our Etsy experiences. Expect to come away with a better idea of the technical and political problems involved in these changes.
    Note: Online resource; Title from title screen (viewed July 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...