Subject

Articles

Free eBook: From Data to Deliverables with R

freeebook_Carroll_FDtDwR

Chapters selected by Jonathan Carroll

Forecasting Churn Risk with Machine Learning, Part 2

From Fighting Churn with Data by Carl Gold

This article discusses using machine learning algorithms to forecast churn risks.

Forecasting Churn Risk with Machine Learning, Part 1

From Fighting Churn with Data by Carl Gold

This article discusses using machine learning algorithms to forecast churn risks.

Writing and Managing Application Logs with Docker

From Learn Docker in a Month of Lunches by Elton Stoneman

Logging is usually the most boring part of learning a new technology, but it’s not the case with Docker. The basic principle is simple: you need to make sure your application logs are written to the standard output stream, because this is where Docker looks for them. This can be achieved in a couple of ways, which we’ll cover in this article, and then the fun begins.

Discovering Patching Vulnerabilities

From The Art of Network Penetration Testing by Royce Davis

This article delves into how attackers discover and exploit patching vulnerabilities.

Batch queries with Azure Data Lake Analytics

From Azure Data Engineering by Richard Nuckolls

This article discusses using Azure Data Lake Analytics (ADLA) for batch queries.

Introducing the OpenAPI Specification

From Designing APIs with Swagger and OpenAPI by Josh Poenlat

This article covers:

  Informal vs Formal descriptions

  Learning about the OpenAPI specification

  Learning about YAML ( as a easier-to-write JSON )

  Describing our first GET operation

Capability-Based Security and Macaroons

From API Security in Action by Neil Madden

In this article, you’ll implement capability-based access control techniques that enable secure sharing by taking the principle of least authority (POLA) to its logical conclusion and allowing fine-grained control over access to individual resources. Along the way, you’ll see how capabilities prevent a general category of attacks against APIs known as confused deputy attacks.

Getting to Know Knative

From Knative in Action by Jacques Chester

This article introduces Knative and explores its function(s) and best use.

Gathering Data at Scale for Real-World AI

From AI as a Service by Peter Elger and Eóin Shanaghy

This article discusses gathering data for real-world AI projects and platforms.

© 2020 Manning — Design Credits