From Getting Started with Natural Language Processing by Ekaterina Kochmar
This article shows you how to extract the meaningful bits of information from raw text and how to identify their roles. Once you have roles identified, you can move on to syntactic parsing.
In this video, Hobson shows you how to move words from inflammatory to less inflammatory context with the help of word vectors (Word2vec).
In this tour de force live coding session, an expert Python coach Reuven Lerner shows you how functions work behind the scenes and how you can use them in different ways.
Haskell expert Vitaly Bragilevsky demonstrates Haskell features that make programming at the level of types possible.
A Chief Architect of cloud applications at Red Hat, Christian Posta, demonstrates why it’s important to have very fine-grained control over what traffic enters your service-mesh cluster and how to use the Istio Gateway to do this.
In this video, Scott Winkler shows you how to manage your secrets securely with Terraform.
This is an excerpt from a draft of chapter 10 of my book, Azure Data Engineering, which deals with compliance. In this article we’ll look at a few techniques to transform sensitive user data into less sensitive data. In the book, this includes code samples for implementation on Azure Data Explorer, which are omitted from this article. Let’s start with a couple of definitions.
In this article, I will teach you techniques to help you write better assertions. You will learn how to make them catch as many bugs as possible, without having to update tests too often, lessening your maintenance burden.
Security expert Prabath Siriwardena shows you how to secure Microservices with Istio Service Mesh.
Hefin I. Rhys teaches you how to train, tune, and cross-validate a Support Vector Machine model using RStudio and the awesome mlr machine learning package.