Improving ARM Template Syntax with Bicep Templates

From Azure Infrastructure as Code by Henry Been, Eduard Keilholz, and Erwin Staal

This is an excerpt from chapter 6, which starts with introducing the Bicep language, a new and improved IaC language for a Azure. This snippet is the next section of the chapter, which lists the benefits of Bicep over ARM Templates.

Let’s jump into using Bicep templates to improve ARM template syntax!

Testing Client-Side Load Balancing Strategies

From Istio in Action by Christian Posta

This article shows how to use Fortio for load testing.

Automating Privacy by Design, Part 5

From Privacy Engineering by Nishant Bhajaria

This article series explores incorporating privacy into your design from the beginning using automation.

On this day 09/07

manning.com On this day… iPod Nano Introduced September 7 2005 The iPod Nano was introduced today in 2005, replacing the highly popular iPod Mini. Rather than the hard drive used by the Mini, the iPod Nano utilized flash storage which… Continue Reading →

Building and Using Topologies

From PostGIS in Action, Third Edition by Leo S. Hsu and Regina O. Obe

In this article, you’ll learn what a topology is, how to build a topology from scratch, and how to use commonly available geometry data.

Managing Data Sources in Machine Learning

From Graph-Powered Machine Learning by Alessandro Negro

This article discusses managing data in graph-powered machine learning projects.

How Does Implicit Flow Work? Part 1

From OpenID Connect in Action by Prabath Siriwardena

In this article, you’ll learn how an OpenID provider transports an ID token to a client application using the implicit flow. The sequence of events or steps happens during this flow, as well as the messages being passed in each step is clearly defined in the OpenID Connect specification.

Getting to Know GPUs

From Parallel and High-Performance Computing by Robert Robey and Yuliana Zamora

This article takes a deep dive into GPUs.

Free eBook: Inherently Secure API Design

Inherently Secure is a free eBook with chapters selected by Arnaud Lauret.

Deploying Machine Learning Models, Part 5: deployment

In this series, we cover model deployment: the process of putting models to use. In particular, we’ll see how to package a model inside a web service, allowing other services to use it. We also show how to deploy the web service to a production-ready environment.

« Older posts

© 2021 Manning — Design Credits