Remove Case Study Remove Programming Remove Security Remove Systems Administration
article thumbnail

Chances to Speak at O’Reilly Media’s Upcoming Conferences

CTOvision

We’re looking for compelling case studies, technical sessions, tear-downs of both successful and failed AI projects, technical and organizational best practices, and more. Hear case studies, develop new skills, and share emerging best practices around cutting-edge science and new business fundamentals. link] cpc/66169.

article thumbnail

New live online training courses

O'Reilly Media - Ideas

Programming with Data: Advanced Python and Pandas , July 9. Python Data Science Full Throttle with Paul Deitel: Introductory AI, Big Data and Cloud Case Studies , September 24. Programming. Pythonic Object-Oriented Programming , June 26. Secure JavaScript with Node.js , July 10. Data science and data tools.

Course 68
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GSAS 2023: The Third Edition

Apiumhub

They believe that productive partnerships, collaboration, fast feedback, and small iterations are the best way to deliver successful software projects, using Agile methodologies and Extreme Programming practices, like Test-Driven Development, Simple Design, Pair-Programming, and Continuous Integration, in all our projects.

article thumbnail

219+ live online training courses opened for June and July

O'Reilly Media - Ideas

Programming with Data: Advanced Python and Pandas , July 9. Python Data Science Full Throttle with Paul Deitel: Introductory AI, Big Data and Cloud Case Studies , September 24. Programming. Pythonic Object-Oriented Programming , June 26. Secure JavaScript with Node.js , July 10. Data science and data tools.

Course 50
article thumbnail

Cyber Canon Book Review: Security Engineering

Palo Alto Networks

We modeled the Cybersecurity Canon after the Baseball Hall of Fame and the Rock & Roll Hall of Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number. Security Engineering accomplishes multiple goals.