Incident management at the edge
Lessons learned at Fastly: How to build a robust system that identifies, mitigates, contains, and properly communicates incidents to prevent recurrence.
Practical resources for getting things done.
Lessons learned at Fastly: How to build a robust system that identifies, mitigates, contains, and properly communicates incidents to prevent recurrence.
Take deep learning mobile.
Word embedding in natural language processing.
Learn how Capital One implemented continuous delivery, streamlined and automated the release management process, and overcame common roadblocks.
This chapter from Lean UX, 2nd Edition discusses how blending Lean UX and Agile can create a more productive team and a more collaborative process.
Learn how to redirect from one page to another in JavaScript using the window.location object.
Learn three methods for managing multiple scripts within a JavaScript project.
Learn how to create a JavaScript function that will parse the query string into its constituent parts.
Learn how “use strict” can introduce more robust error reporting to your JavaScript code and cut down on logical errors.
A look at the tools and patterns for accessing and processing data in Hadoop.
Jake VanderPlas explains Python’s essential syntax and semantics, built-in data types and structures, function definitions, control flow statements, and more, using Python 3 syntax.
Max Shron and Sasha Laundy explore tactics for need-finding and problem scoping that make it possible to put investments in data to profitable use.
In this report, you’ll learn to address two main challenges: How to organize your own life as a telecommuter, and how to work as part of a larger team.
Learn the difference between == and ===, and understand which you should be using in your code.
Learn how to account for time discontinuities in Java and use the new Java Time API to calculate durations accurately.
How web design standards can help make the Internet more environmentally friendly.
Lukasz Langa uses asyncio source code to explain the event loop, blocking calls, coroutines, tasks, futures, thread pool executors, and process pool executors.
Learn how to build scalable, adaptive, complex systems that help your business adjust to rapidly changing competitive markets.
From spinning up containers to shipping software as a team.
Learn how security can be enforced at the browser level through a combination of optimization techniques and security enhancements.
Adventures in deep learning, cheap hardware, and object recognition.
Untangling common myths about modern information security.
Learn how to use the “git reset” command and reset the HEAD pointer to undo your last commit.
Learn how to view and delete branches on both local and remote repositories so you can keep your project tidy and manageable.
Should you be concerned about the difference a capital letter makes with “string” in C#?
Early methods to integrate machine learning using Naive Bayes and custom sinks.
Go’s new sync.ErrGroup package significantly improves developer productivity with goroutines.
Shared learning: It's what we do at O'Reilly, and it's what we’d like to share with you.
Become familiar with various ways to design technical methods that minimize the risk of having a class of users who must be trusted—of their own volition—to behave within a set of rules in order to safeguard privacy.
Use this instructional tutorial to interact with Keystone and invoke its core operational capabilities.
Learn the basics for setting up a continuous delivery pipeline in Jenkins, from modeling the pipeline to integrating the software.
Learn how to load text in a binary file to an InputStream and convert it to a string using ByteArrayOutputStream with a ByteBuffer.
Learn to iterate HashMaps using forEach and Java 8’s new lambda syntax.
Yakov Fain shows how to get started with the latest from the Angular 2 team.
Learn how your company can significantly improve procurement analytics to solve business questions quickly and effectively.
Gone are the days of lining up VLAN Root Bridges and Default Gateway ownership. Arista has an incredibly simple way to solve that design challenge.
Learn how the JavaScript engine loads function declarations and expressions differently, and how this affects your code.
Learn the logic behind closures with a practical demonstration and explanation of why they are important to maintaining privacy in your code.
Chris Baker discusses Internet cartography and its implications for risk and security. He focuses on building a mental model for how we know where on the network something is, what it is, and why that is important.
Learn the skills and tools you need to know from the world's experts through online courses and in-person workshops.
Jonas Rosland and Stephanie Carlson outline a few of the smart tools they use—for chats, emails, community metrics, project management, and more—to tackle this big task and discuss failures, successes, and lessons learned in managing large open source communities.
Ben Root offers a high-level overview of the SciPy ecosystem and highlights some of his favorite tools.
Learn how to limit your random number generation to a specific range while using java.util.Random, Math.random, and ThreadLocalRandom.
Learn how to use Python’s ternary operator to create powerful “one-liners” and enhance logical constructions of your arguments.
Learn to make variables globally available from within a function, as well as the associated risks and caveats.
Zack Tollman explores the key aspects of HTTPS to help developers to take control of their HTTPS-only sites.
Learn to locate files using the os.path.isfile() function in Python.
Learn how to work around the lack of comment support with tips for creating structure-specific comments that won’t be rejected by the compiler.
Learn how to erase JavaScript properties using the delete method, or convert the property to “undefined.”
Learn methods for array management such as length, pop, shift and slice and of course, delete.
Learn how to harness Python’s power by triggering external processes and programs, and capture or routing the resulting output.
Discover lesser-known Python libraries that are easy to install and use, cross-platform, and applicable to more than one domain.
How free tools can ease collaboration and improve outcomes in open source Go projects.
How New Relic increases system stability and manages growth without going off the rails.
This report examines how your organization can use behavioral science to design a workplace culture that supports creativity, collaboration, and innovation among your employees.
How to bring DevOps, security, and compliance teams together to forge a secure infrastructure for your company.
Building a fast, accurate image classifier on the cheap.
Principles of defensive configuration security.
Why big data isn’t easy, cheap, or quick.
Markus Eisele walks you through the creation of a complete reactive microservices-based system.
Learn techniques for programmatically acquiring data and how to extract that data.
In two online sessions October 18-19, 2016, Jesse Anderson will show you how to recognize opportunities, avoid problems, and get the most value from your data.
October 4-5, 2016, join Thomas Nield for a hands-on course for beginners on core database and SQL fundamentals.