Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,400
- Application software 1,242
- History 1,188
- Historia 743
- Management 741
- Artificial intelligence 628
- Python (Computer program language) 606
- Computer programs 597
- Data processing 580
- Cloud computing 535
- Social aspects 530
- Machine learning 514
- Computer networks 493
- Engineering & Applied Sciences 476
- Security measures 403
- Design 393
- Computer programming 364
- Computer security 360
- Computer software 360
- Programming 358
- Operating systems (Computers) 354
- Philosophy 347
- Web site development 341
- Computer Science 337
- Information technology 331
- History and criticism 327
- Education 325
- Filosofía 324
- Technological innovations 313
- Data mining 312
-
18741Publicado 2016“…This video compilation captures every session, tutorial, and keynote delivered at this conference, which explored hypothesis-driven development, microservices, reactive architectures, continuous delivery, and how the role of architect has broadened in recent years, encompassing disciplines like DevOps and security. …”
-
18742Publicado 2016“…Understand basic metaprogramming concepts: programs whose input and output are programs themselves Learn how metaprogramming principles can help make your code more compact, generic, elegant, and less error-prone Explore how features in C++11 and C++14 make the design of metaprograms easier Improve performance, reduce maintenance, and test less often…”
Libro electrónico -
18743Publicado 2018“…Configure and manage flagship Office 365 applications, such as Exchange Online, SharePoint Online, and Yammer. Explore newer Office 365 apps, such as Stream and Power BI. …”
-
18744Publicado 2018“…This course teaches you how to use Origami, a prototyping tool created by designers at Facebook that makes it easy to create prototypes for smart apps and websites. You'll explore Origami's interface, learn the principles of prototyping, and gain experience assembling and disseminating a basic prototype. …”
-
18745Publicado 2016“…Gain experience combining SQL and R for data analytics and visualization purposes Learn to write SQL queries that can retrieve and summarize data stored in databases Explore the statistical analysis and visualization capabilities of R See how R uses SQL to interact with databases Discover how to create graphics using R, based on data in databases Learn to use features of RStudio to streamline the analysis process Casimir Saternos has worked in IT since 1999 as a software architect, software engineer, systems engineer, developer, and database administrator. …”
-
18746Publicado 2016“…Gain hands-on experience building a complete narrative game with Unity software Explore ways to create challenging interactive worlds and expressive characters Learn how to create the conversations between characters that push the story forward Discover how to source dazzling art and music for your game for free (or a very low cost) Understand how to add audio, and use Yarn based branching dialog tools Acquire experience in creating the clever gameplay that keeps gamers interested Jon Manning is a co-founder of Secret Lab, where he makes games and does research. …”
-
18747Publicado 2021“…In addition to this, you’ll understand how to analyze data for useful patterns, before finally exploring how to apply math concepts in network routing, web searching, and data science. …”
Libro electrónico -
18748Publicado 2017“…Master the ability to identify overloaded resources on a Linux system Learn about the Utilization Saturation and Errors (USE) methodology for performance investigation Explore Linux performance information sources such as kprobes and uprobes Understand how to improve CPU utilization by doing careful profiling and identifying bottlenecks Gain the ability to visualize stack reports using flame graphs Learn about tracing I/O, scheduling, and other system events using ftrace and perf tools Discover methods for analyzing CPU performance at the process, module, and function level Understand how to trace slow disk accesses and file system operations Sasha Goldshtein is the CTO of Sela Group, a Microsoft C# MVP, an expert on Azure, and a frequent speaker at O'Reilly Media's Velocity and Fluent conferences. …”
-
18749Publicado 2017“…An exploration of the best practices for disaster recovery (e.g., where to store the documentation on recovering the documentation server) by Google SRE Tanya Reilly; detailed instruction on using BPF to diagnose seemingly impossible issues in production environments by Sela Group CTO Sasha Goldshtein; a revelation of why you need sponsors as much as mentors to boost your career by Kickstarter VP Lara Hogan. …”
-
18750Publicado 2022“…Immerse yourself in an end-to-end full-stack development experience, as we explore user interface design, business logic and hosting activities. …”
Video -
18751Publicado 2017“…Understand the core concepts of deep learning and the types of problems it solves Master the distinctions between machine learning, deep learning, and artificial intelligence See how successful businesses practically apply deep learning across a variety of industries Explore deep learning business models, approaches, and revenue streams Participate in exercises that identify how deep learning applies to your business Matt Coatney is a data scientist, TEDx speaker, entrepreneur, business advisor, and author who has championed the fields of machine learning and AI for more than 20 years. …”
-
18752Publicado 2020“…From the fundamentals to Kubernetes best practices, the book covers essential aspects of configuring applications. You’ll even explore real-world techniques for running clusters in production, tips for setting up observability for cluster resources, and valuable troubleshooting techniques. …”
Libro electrónico -
18753Publicado 2016“…Learn to perform basic network and system security scans using Metasploit Understand Metasploit's command line, graphical, and web interfaces Survey reconnaissance techniques like Nmap scanning, SYN scanning, and service scanning Explore vulnerability identification practices like SMB and VNC open service scanning Learn to use the exploits in Metasploit to attack systems and identify system vulnerability See how to develop custom security functions using Ruby scripts Explore phishing attacks, site cloning, and more Ric Messier (GCIH, GSEC, CEH, CISSP) directs the Cybersecurity & Digital Forensic Programs at Champlain College in Burlington, Vermont. …”
-
18754Publicado 2016“…Master the quick ways to boost the visual impact of your web sites using visual design hacks Explore some key factors - legibility and contrast, CTA presence, etc. – that denote visual success Understand when to make your visuals in-house and when to outsource them Learn the five most important things you should include in a request for an outsourced visual Laura Busche, director of content strategy at Creative Market and co-founder of the interactive agency Ozone Labs, has been working in content marketing, branding, social media, and on-line marketing since 2008. …”
-
18755Publicado 2017“…Learn what deep learning neural networks are, what they're used for, and why they're powerful Discover the particular structure of neural networks and why it matters Explore the basic concepts used in building and training neural networks Develop a solid platform for learning more about deep learning and neural networks Laura Graesser is assisting with NVIDIA's autonomous driving project. …”
-
18756Publicado 2017“…Prerequisites include a basic understanding of the ways network systems and operating systems work, basic familiarity with Linux, the ability to run virtual machines (VMWare, etc.) so you can set up attack systems and target systems, and a computer that's ready to run Kali Linux and Metasploit software. Explore the concepts of security testing and the knowledge required to perform it Understand reconnaissance and the publicly available tools used to gather information on potential targets Discover the scanning techniques used to identify network systems' open ports Learn to identify network system vulnerabilities and confirm their exploitability Explore techniques for identifying web application vulnerabilities and attacks Learn about client-side attacks and client-side attack tools Gain hands-on experience using Metasploit penetration testing software Ric Messier (GCIH, GSEC, CEH, CISSP) is the Director for Cyber Academic Programs at Circadence. …”
-
18757Publicado 2011“…Using the “Puzzler” format, Bill demonstrates these misconceptions using small code samples; he then explores different ways for you to modify the code until its behavior is correct. …”
-
18758Publicado 2010“…This easy to follow, comprehensive video based training on OS X Server 10.6 Snow Leopard will start by walking you through the basics of installing and exploring 10.6 Server, and continues through managing and configuring your Server installation, including services such as SMB, NFS, FTP, iCal, iChat, Address Book and much much more. …”
-
18759Publicado 2012“…You will start with an introduction to VBA and the VBA editor, how to navigate and use the tools available to you to write VBA code. You will explore variables and constants, functions, sub routines, arrays and other VBA constructs. …”
-
18760Publicado 2011“…The professional programmer's Deitel® guide to C# 2010 and the powerful Microsoft® .NET 4 Framework For programmers with a background in C++, Java or other high-level, object-oriented languages, this LiveLesson applies the Deitel signature live-code approach to teaching programming and explores Microsoft's C# 2010 language and .NET 4 in depth. …”