This book identifies where modern Jeremiahs place the sources of national decline and their purposed solutions and its analysis also reveals the central problem faced by this form of writing: the need to balance condemnation of certain practices within the democratic polity with calls for repentance. For these writers and political actors, the tensions created by these demands prove impossible to resolve, as the modern jeremiad further divides an already divided nation.
The basic rules of REST APIs - "many nouns, few verbs, stick with HTTP" - seem easy, but that simplicity and power require discipline to work smoothly. This brief guide provides next steps for implementing complex projects on simple and extensible foundations.
For repairing performance loss or maximizing current potential, this guide aims to provide the information and conceptual framework that will enable readers to be performance experts. Includes information on processor performance, application profiling and hardware considerations.
Portable, powerful, and a breeze to use, Python is the popular open source object-oriented programming language used for both standalone programs and scripting applications. Python is considered easy to learn, but there's no quicker way to mastery of the language than learning from an expert teacher. This edition of Learning Python puts you in the hands of two expert teachers, Mark Lutz and David Ascher, whose friendly, well-structured prose has guided many a programmer to proficiency with the language. Learning Python, Second Edition, offers programmers a comprehensive learning tool for Python and object-oriented programming. Thoroughly updated for the numerous language and class presentation changes that have taken place since the release of the first edition in 1999, this guide introduces the basic elements of the latest release of Python 2.3 and covers new features, such as list comprehensions, nested scopes, and iterators/generators. Beyond language features, this edition of Learning Python also includes new context for less-experienced programmers, including fresh overviews of object-oriented programming and dynamic typing, new discussions of program launch and configuration options, new coverage of documentation sources, and more. There are also new use cases throughout to make the application of language features more concrete. The first part of Learning Python gives programmers all the information they'll need to understand and construct programs in the Python language, including types, operators, statements, classes, functions, modules and exceptions. The authors then present more advanced material, showing how Python performs common tasks by offering real applications and the libraries available for those applications. Each chapter ends with a series of exercises that will test your Python skills and measure your understanding. Learning Python, Second Edition is a self-paced book that allows readers to focus on the core Python language in depth. As you work through the book, you'll gain a deep and complete understanding of the Python language that will help you to understand the larger application-level examples that you'll encounter on your own. If you're interested in learning Python--and want to do so quickly and efficiently--then Learning Python, Second Edition is your best choice.
One of the few resources available for the tens of thousands of SharePoint site managers, this book focuses on core issues this audience is faced with and gives tried and true solutions.
Despite the best efforts of the English government, Elizabethan Ireland remained resolutely Catholic. Hutchinson examines this ‘failure’ of the Protestant Reformation. He argues that the emerging political concept of the absolutist state forms a crucial link between English policy in Ireland and the aims of the Calvinist reformers.
The robots are coming! MAKE Volume 27 shows you how to build robots that walk, fly, swim, play music, dance, and even extinguish fires. Some of the buildable bots you’ll meet include: Yellow Drum Machine, which roves around looking for things to drum on, then drums, records, and accompanies itself playing catchy rhythms Roomba Recon, Roomba robotic vacuum with a wireless router and webcam on its back, programmed so you can drive it around your house and see what it sees from a browser window anywhere Hamster-Powered Strandbeest, which walks around on eight legs, powered by a hamster inside its hamster globe “head” The winning project from MAKE’s Most Entertaining Robot contest Tiny Robots made from common electronics components. The special Robots section will also include a roundup of hobby robotics highlights, and a Primer on using the EZ-Robot controller board to turn any animatronic toy into a fully controllable robot that recognizes faces and responds to voice commands.
Discover how graph algorithms can help you leverage the relationships within your data to develop more intelligent solutions and enhance your machine learning models. You’ll learn how graph analytics are uniquely suited to unfold complex structures and reveal difficult-to-find patterns lurking in your data. Whether you are trying to build dynamic network models or forecast real-world behavior, this book illustrates how graph algorithms deliver value—from finding vulnerabilities and bottlenecks to detecting communities and improving machine learning predictions. This practical book walks you through hands-on examples of how to use graph algorithms in Apache Spark and Neo4j—two of the most common choices for graph analytics. Also included: sample code and tips for over 20 practical graph algorithms that cover optimal pathfinding, importance through centrality, and community detection. Learn how graph analytics vary from conventional statistical analysis Understand how classic graph algorithms work, and how they are applied Get guidance on which algorithms to use for different types of questions Explore algorithm examples with working code and sample datasets from Spark and Neo4j See how connected feature extraction can increase machine learning accuracy and precision Walk through creating an ML workflow for link prediction combining Neo4j and Spark
More than half of the analytics and machine learning (ML) models created by organizations today never make it into production. Some of the challenges and barriers to operationalization are technical, but others are organizational. Either way, the bottom line is that models not in production can't provide business impact. This book introduces the key concepts of MLOps to help data scientists and application engineers not only operationalize ML models to drive real business change but also maintain and improve those models over time. Through lessons based on numerous MLOps applications around the world, nine experts in machine learning provide insights into the five steps of the model life cycle--Build, Preproduction, Deployment, Monitoring, and Governance--uncovering how robust MLOps processes can be infused throughout. This book helps you: Fulfill data science value by reducing friction throughout ML pipelines and workflows Refine ML models through retraining, periodic tuning, and complete remodeling to ensure long-term accuracy Design the MLOps life cycle to minimize organizational risks with models that are unbiased, fair, and explainable Operationalize ML models for pipeline deployment and for external business systems that are more complex and less standardized
Salary surveys worldwide regularly place software architect in the top 10 best jobs, yet no real guide exists to help developers become architects. Until now. This book provides the first comprehensive overview of software architecture’s many aspects. Aspiring and existing architects alike will examine architectural characteristics, architectural patterns, component determination, diagramming and presenting architecture, evolutionary architecture, and many other topics. Mark Richards and Neal Ford—hands-on practitioners who have taught software architecture classes professionally for years—focus on architecture principles that apply across all technology stacks. You’ll explore software architecture in a modern light, taking into account all the innovations of the past decade. This book examines: Architecture patterns: The technical basis for many architectural decisions Components: Identification, coupling, cohesion, partitioning, and granularity Soft skills: Effective team management, meetings, negotiation, presentations, and more Modernity: Engineering practices and operational approaches that have changed radically in the past few years Architecture as an engineering discipline: Repeatable results, metrics, and concrete valuations that add rigor to software architecture
A raid on a Pakistan Al-Qaeda cell recovers two laptops. When the computers' booby-traps are defused and the computers decrypted and translated, they indicate that Al-Qaeda has planned a series of simultaneous attacks in five U.S. cities involving potential dirty bombs, biological weapons and maybe even a nuclear weapon-on Election Day. Derek Stillwater, troubleshooter for the Department of Homeland Security, is assigned to a multi-jurisdictional Special Terrorism Activity Response Team (START) to locate the weapon and terrorists in Los Angeles and prevent the attack. They have two days. But as they close in on their targets, Derek begins to think that the intelligence they gathered is a sideshow to distract them from the real target-one of the two candidates for President of the United States.
Discusses how activists in Boston upheld their anti-slavery tradition and promoted an equal rights agenda during the years between 1890 and 1920, a period in which African-Americans throughout the country were being deprived of civil and political justice.
Historians have long viewed Louisiana as an anomaly in the American judicial system-an eccentric appendage at the mouth of the Mississippi River. The diverse Creole culture and civilian heritage of the state's legal system have led many scholars to conclude that it is an anachronism in American law unworthy of serious attention. Others embrace this tradition and revel in the minutiae of the Pelican State's unique civil law legacy. In From Chaos to Continuity, Mark F. Fernandez challenges both perspectives. Using the innovative methods of the New Louisiana Legal History, he offers the first comprehensive analysis of the role of the courts in the development of Louisiana's legal system and convincingly argues that the state is actually a representative model of American law and justice. Tracing the rise of Louisiana's system from its earliest colonial origins to its closure during Federal occupation in 1862, Fernandez describes the introduction of common law after American takeover of the colony; the chaotic combination of French, Spanish, and Anglo legal traditions; the evolution of that jurisdiction; the role of the courts-especially the state supreme court-in maintaining the mixture; and the judge's proper function in administering justice. According to Fernandez, the challenge of integrating two very different systems of law was not unique to Louisiana. Indeed, most antebellum southern states had legal systems that incorporated important traditional aspects of their colonial legal orders to varying degrees. From Chaos to Continuity liberates Louisiana's legal history from the quirky restraints of the past and allows scholars and students alike to see the state as an integral part of American legal history.
Machine politics is a tough business, filled with people who put far more value on power and money than on honor, friendship, or the lives of those who challenge them. Atop this maelstrom sits Chairman Eamon DeValera Collins, formerly the undisputed boss of the Irish-Catholic Fifteenth Ward and now the man who controls the entire city. In this position, he finds himself surrounded by opportunists, amateurs, criminals, thieves, and cold-blooded killers. Those he can trust are few and far between, and they are far outnumbered those who would attempt to use their connection to him to eliminate their enemies and line their own pockets. While only one former ally is sufficiently toughor crazyenough to directly challenge his leadership, the Chairman will stop at nothing to put down any challenger. In The Chairmans Challenge, the sequel to The Chairman, A Novel of Big City Politics, award-winning writer Mark M. Quinn takes the reader on a sometimes dark, but always thought-provoking, tour of the ins and outs of a political machine. Its a brutal examination of the minds of men and women who will sacrifice anything or anyone for a chance at power.
Phyllis Ursula James. Nora O’Mara. Róisín Ní Mheara. Like her name, the life of Rosaleen James changed many times as she followed a convoluted path from abandoned child, to foster daughter of an aristocratic British family, to traitor during World War II, to her emergence as a full Irish woman afterward. In Masquerade, authors Mark M. Hull and Vera Moynes tell James’s story as it unfolds against the backdrop of the most important events of the twentieth century. James’s life—both real and imagined—makes for an incredible but true story. By altering her identity to suit the situation, James manipulated almost everyone she encountered: the German intelligence service, the Nazi propaganda broadcasting service, British intelligence, and various Irish cultural groups. She was in a liaison with Irish writer Francis Stuart and, with him, provided a voice for Nazi radio programs aimed at neutral Ireland, served as the pseudo-Irish expert for German espionage missions, and participated in the failed, almost comical effort to recruit Irish prisoners of war to join the Nazis against Great Britain—quite a series of performances, considering her only contact with Ireland had been a weeklong visit in 1937. Immediately after the war, James was wanted by British intelligence as a “renegade” (traitor), but her case was quickly squelched by the British government. Drawing on an assumed wartime persona, she became fluent in Irish Gaelic and organized a number of conferences for which she won grants from the Irish government. James garnered wider attention in 1992 with her autobiography, published in Gaelic, in which she claimed that the Holocaust was a myth—a belief she maintained until her death in 2013. In documenting James’s life of deception, Hull and Moynes masterfully analyze how an intellectually gifted child turned traitor to her country and convincingly rebranded herself as an Irish patriot and intellectual, while denying historical reality. The story of Rosaleen James reminds us that reality may be much less—or more—than what meets the eye and ear.
Blockchain technology continues to disrupt a wide variety of organizations, from small businesses to the Fortune 500. Today hundreds of blockchain networks are in production, including many built with Hyperledger Fabric. This practical guide shows developers how the latest version of this blockchain infrastructure provides an ideal foundation for developing enterprise blockchain applications or solutions. Authors Matt Zand, Xun Wu, and Mark Anthony Morris demonstrate how the versatile design of Hyperledger Fabric 2.0 satisfies a broad range of industry use cases. Developers with or without previous Hyperledger experience will discover why no other distributed ledger technology framework enjoys such wide adoption by cloud service providers such as Amazon, Alibaba, IBM, Google, and Oracle. Walk through the architecture and components of Hyperledger Fabric 2.0 Migrate your current Hyperledger Fabric projects to version 2.0 Develop blockchain applications on the Hyperledger platform with Node.js Deploy and integrate Hyperledger on Amazon Managed Blockchain, IBM Cloud, and Oracle Cloud Develop blockchain applications with Hyperledger Aries, Avalon, Besu, and Grid Build end-to-end blockchain supply chain applications with Hyperledger
Java Message Service, Second Edition, is a thorough introduction to the standard API that supports "messaging" -- the software-to-software exchange of crucial data among network computers. You'll learn how JMS can help you solve many architectural challenges, such as integrating dissimilar systems and applications, increasing scalability, eliminating system bottlenecks, supporting concurrent processing, and promoting flexibility and agility. Updated for JMS 1.1, this second edition also explains how this vendor-agnostic specification will help you write messaging-based applications using IBM's MQ, Progress Software's SonicMQ, ActiveMQ, and many other proprietary messaging services. With Java Message Service, you will: Build applications using point-to-point and publish-and-subscribe messaging models Use features such as transactions and durable subscriptions to make an application reliable Implement messaging within Enterprise JavaBeans (EJB) using message-driven beans Use JMS with RESTful applications and with the Spring application framework Messaging is a powerful paradigm that makes it easier to uncouple different parts of an enterprise application. Java Message Service, Second Edition, will quickly teach you how to use the key technology that lies behind it.
Judicial Review, Third Edition covers the grounds for review, defences to an application, the remedies and procedures involved and covers the Rules of the Superior Courts 2011, SI 691/2011. It includes cases such as article 40 inquiries (habeas corpus applications) and references to the European Court of Justice under article 234 TEC. It is the definitive text on judicial review available in Ireland and also of important reference in the United Kingdom. The law in relation to the reasonableness and proportionality of an administrative decision has been re-examined in the light of the Supreme Court decision in Meadows v Minister for Justice. Also re-examined is the law in relation to a decision-maker's obligation to give reasons for his decision in the light of the Supreme Court's decision in Mallak. As well as these, the book features a detailed account of the meaning and effect of a 'proportionality analysis' of a public act, indeed proportionality features prominently throughout the book in conjunction with the discussions on Meadows. There is also a detailed discussion of a court's approach to 'deference' in respect of a public act. In this new edition, the procedure chapters have been rewritten to take account of changes brought about by SI 691/2011 and SI 345/2015. Along with this a new chapter has been added on the philosophy of judicial review.
Open Sources 2.0 is a collection of insightful and thought-provoking essays from today's technology leaders that continues painting the evolutionary picture that developed in the 1999 book Open Sources: Voices from the Revolution . These essays explore open source's impact on the software industry and reveal how open source concepts are infiltrating other areas of commerce and society. The essays appeal to a broad audience: the software developer will find thoughtful reflections on practices and methodology from leading open source developers like Jeremy Allison and Ben Laurie, while the business executive will find analyses of business strategies from the likes of Sleepycat co-founder and CEO Michael Olson and Open Source Business Conference founder Matt Asay. From China, Europe, India, and Brazil we get essays that describe the developing world's efforts to join the technology forefront and use open source to take control of its high tech destiny. For anyone with a strong interest in technology trends, these essays are a must-read. The enduring significance of open source goes well beyond high technology, however. At the heart of the new paradigm is network-enabled distributed collaboration: the growing impact of this model on all forms of online collaboration is fundamentally challenging our modern notion of community. What does the future hold? Veteran open source commentators Tim O'Reilly and Doc Searls offer their perspectives, as do leading open source scholars Steven Weber and Sonali Shah. Andrew Hessel traces the migration of open source ideas from computer technology to biotechnology, and Wikipedia co-founder Larry Sanger and Slashdot co-founder Jeff Bates provide frontline views of functioning, flourishing online collaborative communities. The power of collaboration, enabled by the internet and open source software, is changing the world in ways we can only begin to imagine.Open Sources 2.0 further develops the evolutionary picture that emerged in the original Open Sources and expounds on the transformative open source philosophy. "This is a wonderful collection of thoughts and examples bygreat minds from the free software movement, and is a must have foranyone who follows free software development and project histories." --Robin Monks, Free Software Magazine The list of contributors include Alolita Sharma Andrew Hessel Ben Laurie Boon-Lock Yeo Bruno Souza Chris DiBona Danese Cooper Doc Searls Eugene Kim Gregorio Robles Ian Murdock Jeff Bates Jeremy Allison Jesus M. Gonzalez-Barahona Kim Polese Larry Sanger Louisa Liu Mark Stone Mark Stone Matthew N. Asay Michael Olson Mitchell Baker Pamela Jones Robert Adkins Russ Nelson Sonali K. Shah Stephen R. Walli Steven Weber Sunil Saxena Tim O'Reilly Wendy Seltzer
One skill that’s essential for any professional JavaScript developer is the ability to write testable code. This book shows you what writing and maintaining testable JavaScript for the client- or server-side actually entails, whether you’re creating a new application or rewriting legacy code. From methods to reduce code complexity to unit testing, code coverage, debugging, and automation, you’ll learn a holistic approach for writing JavaScript code that you and your colleagues can easily fix and maintain going forward. Testing JavaScript code is complicated. This book helps experienced JavaScript developers simply the process considerably. Get an overview of Agile, test-driven development, and behavior-driven development Use patterns from static languages and standards-based JavaScript to reduce code complexity Learn the advantages of event-based architectures, including modularity, loose coupling, and reusability Explore tools for writing and running unit tests at the functional and application level Generate code coverage to measure the scope and effectiveness of your tests Conduct integration, performance, and load testing, using Selenium or CasperJS Use tools for in-browser, Node.js, mobile, and production debugging Understand what, when, and how to automate your development processes
Updated for both Python 3.4 and 2.7, this guide provides concise information on Python types and statements, special method names, built-in functions and exceptions, commonly used standard library modules, and other prominent Python tools.--From back cover.
You can choose several data access frameworks when building Java enterprise applications that work with relational databases. But what about big data? This hands-on introduction shows you how Spring Data makes it relatively easy to build applications across a wide range of new data access technologies such as NoSQL and Hadoop. Through several sample projects, you’ll learn how Spring Data provides a consistent programming model that retains NoSQL-specific features and capabilities, and helps you develop Hadoop applications across a wide range of use-cases such as data analysis, event stream processing, and workflow. You’ll also discover the features Spring Data adds to Spring’s existing JPA and JDBC support for writing RDBMS-based data access layers. Learn about Spring’s template helper classes to simplify the use ofdatabase-specific functionality Explore Spring Data’s repository abstraction and advanced query functionality Use Spring Data with Redis (key/value store), HBase(column-family), MongoDB (document database), and Neo4j (graph database) Discover the GemFire distributed data grid solution Export Spring Data JPA-managed entities to the Web as RESTful web services Simplify the development of HBase applications, using a lightweight object-mapping framework Build example big-data pipelines with Spring Batch and Spring Integration
What will you learn from this book? If you're a software developer looking for a quick on-ramp to software architecture, this handy guide is a great place to start. From the authors of Fundamentals of Software Architecture, Head First Software Architecture teaches you how to think architecturally and explores the unique challenges of software architecture. You'll learn the distinction between architecture and design and the relationship between code, components, and architectural styles. You'll also learn how to work with some common architectural styles through vivid, fun examples. Quick, easy, and entertaining, this book is a valuable introduction to the world of software architecture. Why does this book look so different? Based on the latest research in cognitive science and learning theory, Head First Software Architecture uses a visually rich format to engage your mind, rather than a text-heavy approach that puts you to sleep. Why waste your time struggling with new concepts? This multisensory learning experience is designed for the way your brain really works.
This is the only book completely devoted to the popular BLAST (Basic Local Alignment Search Tool), and one that every biologist with an interest in sequence analysis should learn from.
How can you take advantage of the Django framework to integrate complex client-side interactions and real-time features into your web applications? Through a series of rapid application development projects, this hands-on book shows experienced Django developers how to include REST APIs, WebSockets, and client-side MVC frameworks such as Backbone.js into new or existing projects. Learn how to make the most of Django’s decoupled design by choosing the components you need to build the lightweight applications you want. Once you finish this book, you’ll know how to build single-page applications that respond to interactions in real time. If you’re familiar with Python and JavaScript, you’re good to go. Learn a lightweight approach for starting a new Django project Break reusable applications into smaller services that communicate with one another Create a static, rapid prototyping site as a scaffold for websites and applications Build a REST API with django-rest-framework Learn how to use Django with the Backbone.js MVC framework Create a single-page web application on top of your REST API Integrate real-time features with WebSockets and the Tornado networking library Use the book’s code-driven examples in your own projects
As the transformation to hybrid multicloud accelerates, businesses require a structured approach to securing their workloads. Adopting zero trust principles demands a systematic set of practices to deliver secure solutions. Regulated businesses, in particular, demand rigor in the architectural process to ensure the effectiveness of security controls and continued protection. This book provides the first comprehensive method for hybrid multicloud security, integrating proven architectural techniques to deliver a comprehensive end-to-end security method with compliance, threat modeling, and zero trust practices. This method ensures repeatability and consistency in the development of secure solution architectures. Architects will learn how to effectively identify threats and implement countermeasures through a combination of techniques, work products, and a demonstrative case study to reinforce learning. You'll examine: The importance of developing a solution architecture that integrates security for clear communication Roles that security architects perform and how the techniques relate to nonsecurity subject matter experts How security solution architecture is related to design thinking, enterprise security architecture, and engineering How architects can integrate security into a solution architecture for applications and infrastructure using a consistent end-to-end set of practices How to apply architectural thinking to the development of new security solutions About the authors Mark Buckwell is a cloud security architect at IBM with 30 years of information security experience. Carsten Horst with more than 20 years of experience in Cybersecurity is a certified security architect and Associate Partner at IBM. Stefaan Van daele has 25 years experience in Cybersecurity and is a Level 3 certified security architect at IBM.
Gain deep insight into real-time analytics, including the features of these systems and the problems they solve. With this practical book, data engineers at organizations that use event-processing systems such as Kafka, Google Pub/Sub, and AWS Kinesis will learn how to analyze data streams in real time. The faster you derive insights, the quicker you can spot changes in your business and act accordingly. Author Mark Needham from StarTree provides an overview of the real-time analytics space and an understanding of what goes into building real-time applications. The book's second part offers a series of hands-on tutorials that show you how to combine multiple software products to build real-time analytics applications for an imaginary pizza delivery service. You will: Learn common architectures for real-time analytics Discover how event processing differs from real-time analytics Ingest event data from Apache Kafka into Apache Pinot Combine event streams with OLTP data using Debezium and Kafka Streams Write real-time queries against event data stored in Apache Pinot Build a real-time dashboard and order tracking app Learn how Uber, Stripe, and Just Eat use real-time analytics
With over 75 million downloads per month, Spring Boot is the most widely used Java framework available. Its ease and power have revolutionized application development from monoliths to microservices. Yet Spring Boot's simplicity can also be confounding. How do developers learn enough to be productive immediately? This practical book shows you how to use this framework to write successful mission-critical applications. Mark Heckler from VMware, the company behind Spring, guides you through Spring Boot's architecture and approach, covering topics such as debugging, testing, and deployment. If you want to develop cloud native Java or Kotlin applications with Spring Boot rapidly and effectively--using reactive programming, building APIs, and creating database access of all kinds--this book is for you. Learn how Spring Boot simplifies cloud native application development and deployment Build reactive applications and extend communication across the network boundary to create distributed systems Understand how Spring Boot's architecture and approach increase developer productivity and application portability Deploy Spring Boot applications for production workloads rapidly and reliably Monitor application and system health for optimal performance and reliability Debug, test, and secure cloud-based applications painlessly
Why is Google Analytics 4 the most modern data model available for digital marketing analytics? Because rather than simply report what has happened, GA4's new cloud integrations enable more data activation—linking online and offline data across all your streams to provide end-to-end marketing data. This practical book prepares you for the future of digital marketing by demonstrating how GA4 supports these additional cloud integrations. Author Mark Edmondson, Google Developer Expert for Google Analytics and Google Cloud, provides a concise yet comprehensive overview of GA4 and its cloud integrations. Data, business, and marketing analysts will learn major facets of GA4's powerful new analytics model, with topics including data architecture and strategy, and data ingestion, storage, and modeling. You'll explore common data activation use cases and get guidance on how to implement them. You'll learn: How Google Cloud integrates with GA4 The potential use cases that GA4 integrations can enable Skills and resources needed to create GA4 integrations How much GA4 data capture is necessary to enable use cases The process of designing dataflows from strategy though data storage, modeling, and activation
If you’re a web developer or designer ready to learn Ruby on Rails, this hands-on guide is the ideal way to get started. Rather than toss you into the middle of the framework’s Model-View-Controller architecture, as many books do, Learning Rails 5 begins with the foundations of the Web you already know. You’ll learn how to create something visible with Rails’ view layer before diving into the more difficult inner layers: the database models and controller code. All you need to begin your Rails journey is HTML experience. Each chapter includes exercises and review questions to test your understanding as you go. Present content by building an application with a basic view and a simple controller Build forms and process their results, progressing from simple to more complex Use Rails scaffolding and REST to build effective applications quickly Connect forms to models and create code that maps directly to database structures Build applications that combine data from multiple tables Use migrations to track changes to your database over time Add common elements such as sessions, cookies, and authentication
If you don't know about the new features available in HTML5, now's the time to find out. This book provides practical information about how and why the latest version of this markup language will significantly change the way you develop for the Web. HTML5 is still evolving, yet browsers such as Safari, Mozilla, Opera, and Chrome already support many of its features -- and mobile browsers are even farther ahead. HTML5: Up & Running carefully guides you though the important changes in this version with lots of hands-on examples, including markup, graphics, and screenshots. You'll learn how to use HTML5 markup to add video, offline capabilities, and more -- and you’ll be able to put that functionality to work right away. Learn new semantic elements, such as , , and Meet Canvas, a 2D drawing surface you can program with JavaScript Embed video in your web pages without third-party plugins Use Geolocation to let web application visitors share their physical location Take advantage of local storage capacity that goes way beyond cookies Build offline web applications that work after network access is disconnected Learn about several new input types for web forms Create your own custom vocabularies in HTML5 with microdata
In the year 2020, racial tensions are on the rise throughout the United States. Protests and violence escalate throughout the country, and terrorists take advantage of the situation to launch a biological attack. Millions diebut even worse, the deadly disease known as canine flu afflicts the worlds dogs, turning peoples pets into horrifying zombie dogs. In a small North Georgia town, those who survive the initial attack set out on a dangerous trip to Savannah, hoping to make contact with friends and family who have started a survivors community. The US military and government struggle to regain control of the country from the USS Ronald Reagan, an aircraft carrier, stationed off the coast of South Carolina; from the Looking Glass Plane, a specially equipped Boeing 707 carrying vital military personnel; and US Strategic Command, or STRATCOM, in Omaha. Meanwhile, American society is in collapse; the power grid no longer functions, and nightly attacks from the zombie dogs mean all survivors are in constant danger. Even worse, the Looking Glass Plane goes down in Pennsylvania, leaving only a few people alive trying to rescue the nation from chaos. Only time will tell if they will succeed. In this novel, a terrorist attack brings about an apocalyptic landscape in which zombie dogs roam the night, changing survivors lives forever.
Greasemonkey Hacks is an invaluable compendium 100 ingenious hacks for power users who want to master Greasemonkey, the hot new Firefox extension that allows you to write scripts that alter the web pages you visit. With Greasemonkey, you can create scripts that make a web site more usable, fix rendering bugs that site owners can't be bothered to fix themselves, or add items to a web site's menu bar. You can alter pages so they work better with technologies that speak a web page out loud or convert it to Braille. Greasemonkey gurus can even import, combine, and alter data from different web sites to meet their own specific needs. Greasemonkey has achieved a cult-like following in its short lifespan, but its uses are just beginning to be explored. Let's say you're shopping on an e-commerce site. You can create a script that will automatically display competitive prices for that particular product from other web sites. The possibilities are limited only by your imagination and your Greasemonkey expertise. Greasemonkey Hacks can't help you with the imagination part, but it can provide the expert hacks-complete with the sample code-you need to turn your brainstorms into reality. More than just an essential collection of made-to-order Greasemonkey solutions, Greasemonkey Hacks is crammed with sample code, a Greasemonkey API reference, and a comprehensive list of resources, to ensure that every resource you need is available between its covers. Some people are content to receive information from websites passively; some people want to control it. If you are one of the latter, Greasemonkey Hacks provides all the clever customizations and cutting-edge tips and tools you need to take command of any web page you view.
Agile, Lean, and DevOps approaches are radical game changers, providing a fundamentally different way to think about how IT fits into the enterprise, how IT leaders lead, and how IT can harness technology to accomplish the objectives of the enterprise. But honest and open conversations are not taking place between management and Agile delivery teams. In A Seat at the Table, CIO Mark Schwartz explores the role of IT leadership as it is now and opens the door to reveal IT leadership as it should be—an integral part of the value creation engine. With an easy style, Schwartz reveals that the only way to become an Agile IT leader is to be courageous—to throw off the attitude and assumptions that have kept CIOs from taking their rightful seat at the table. CIOs, step on up, your seat at the table is waiting for you.
A collection of award-winning and finely detailed profiles of today's most fascinating political, sports, and pop-culture figures. Mark Leibovich returns to puncture the inflated personas of the powerful and reveal the lives, stories, and peculiarities behind their public masks. On subjects including Hillary Clinton, Glenn Beck, John Kerry, Paul Ryan, Chris Christie, and John McCain, Leibovich maintains a refreshing conviviality even as he renders incisive and unflinching assessments. Confirming his reputation as a master of the political profile (Washington Post), Citizens of the Green Room will delight fans of This Town and the legions of political junkies who avidly read Leibovich's work in The New York Times Magazine.
In a world of spiritual options, people constantly tell us what to believe. Yet, while we hear these pleas, we're already functioning with existing beliefs—even if they are beliefs by default. So how do we choose what to believe—especially in the area of faith? Do we need to choose? In Choosing Your Faith, Mark Mittelberg encourages us, as Socrates does, not to lead an unexamined life. He invites us to examine why we believe what we believe. This examination will resonate with Christians and seekers alike.
This definitive work on the perils and promise of the social- media revolution collects writings by today's best thinkers and cultural commentators, with an all-new introduction by Bauerlein. Twitter, Facebook, e-publishing, blogs, distance-learning and other social media raise some of the most divisive cultural questions of our time. Some see the technological breakthroughs we live with as hopeful and democratic new steps in education, information gathering, and human progress. But others are deeply concerned by the eroding of civility online, declining reading habits, withering attention spans, and the treacherous effects of 24/7 peer pressure on our young. With The Dumbest Generation, Mark Bauerlein emerged as the foremost voice against the development of an overwhelming digital social culture. But The Digital Divide doesn't take sides. Framing the discussion so that leading voices from across the spectrum, supporters and detractors alike, have the opportunity to weigh in on the profound issues raised by the new media-from questions of reading skills and attention span, to cyber-bullying and the digital playground- Bauerlein's new book takes the debate to a higher ground. The book includes essays by Steven Johnson, Nicholas Carr, Don Tapscott, Douglas Rushkoff, Maggie Jackson, Clay Shirky, Todd Gitlin, and many more. Though these pieces have been previously published, the organization of The Digital Divide gives them freshness and new relevancy, making them part of a single document readers can use to truly get a handle on online privacy, the perils of a plugged-in childhood, and other technology-related hot topics. Rather than dividing the book into "pro" and "con" sections, the essays are arranged by subject-"The Brain, the Senses," "Learning in and out of the Classroom," "Social and Personal Life," "The Millennials," "The Fate of Culture," and "The Human (and Political) Impact." Bauerlein incorporates a short headnote and a capsule bio about each contributor, as well as relevant contextual information about the source of the selection. Bauerlein also provides a new introduction that traces the development of the debate, from the initial Digital Age zeal, to a wave of skepticism, and to a third stage of reflection that wavers between criticism and endorsement. Enthusiasms for the Digital Age has cooled with the passage of time and the piling up of real-life examples that prove the risks of an online-focused culture. However, there is still much debate, comprising thousands of commentaries and hundreds of books, about how these technologies are rewriting our futures. Now, with this timely and definitive volume, readers can finally cut through the clamor, read the the very best writings from each side of The Digital Divide, and make more informed decisions about the presence and place of technology in their lives.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.