Programming
azw3 |eng | 2018-08-20 | Author:Blank-Edelman, David N. [Blank-Edelman, David N.]
Deep learning Machine learning Developer: Google Adversary: Fan Hui But the first game that gripped the world’s attention in AI was checkers, with the pioneer Arthur Samuel, who coined the ...
( Category:
Testing
April 6,2019 )
epub, pdf |eng | 2015-12-21 | Author:Jonathan Baier [Baier, Jonathan]
Listing 3-13: http-pd-controller.yaml Let's also create an external service, so we can see it from outside the cluster: apiVersion: v1 kind: Service metadata: name: http-pd labels: name: http-pd spec: type: ...
( Category:
Tools
April 4,2019 )
epub, pdf |eng | 2014-10-28 | Author:K. Aava Rani [Rani, K. Aava]
An example of a layer-based Collision Matrix Let's take a look at an example of setting Collision Matrix for layers: Create a new scene and name it Layer Collision. Create ...
( Category:
Game Programming
April 4,2019 )
epub, pdf |eng | | Author:Chandra, Rakesh Vidya; Varanasi, Bala Subrahmanyam
Creating an authentication Request If we remember the theme of the third chapter, we learned different kinds of authentication with requests, such as Basic authentication, Digest authentication, and OAuth authentication. ...
( Category:
Software Development
April 4,2019 )
epub, pdf |eng | 2016-11-29 | Author:Lott, Steven F. [Lott, Steven F.]
If needed, define the data structure normalization function. This almost always has to be a generator function. A structural change can't be applied via map() : from ch08_r02 import row_merge ...
( Category:
Programming
April 4,2019 )
epub |eng | 2015-12-20 | Author:Suyog Sarda & Mayur Pandey [Sarda, Suyog]
Loop processing Before getting started with loop processing and optimization, we must have a little heads up about the concepts of CFG and dominance information. A CFG is the control ...
( Category:
Software Development
April 4,2019 )
epub |eng | 2014-09-22 | Author:Josh Datko [Datko, Josh]
In the FPS_CryptoCape.ino file, this is accomplished by setting digital output 2 as an output and then pulling the line low. When a fingerprint is recognized, the pin is configured ...
( Category:
Software Development
April 4,2019 )
epub |eng | 2015-10-04 | Author:Brummel, Mark
Note When shipping a module as a product, it is recommended to add an Upgrade Codeunit to the package that creates the required settings in the database. More information can ...
( Category:
Software Development
April 4,2019 )
epub, pdf |eng | 2016-01-29 | Author:Kai Nacke [Nacke, Kai]
Every method that requires an authenticated user can now be annotated with @before!ensureAuth("_authUser"). This is a lot to type. Therefore, you define a shortcut:private enum auth = before!ensureAuth("_authUser"); The methods ...
( Category:
Software Development
April 4,2019 )
epub, pdf |eng | 2015-04-05 | Author:Daniel Reis [Reis, Daniel]
We have information on the current user ID and the language and time zone preferences for the user session. When using an action on the client, such as clicking on ...
( Category:
Enterprise Applications
April 4,2019 )
epub |eng | 2015-06-28 | Author:Raj, Pethuru & Chelladhurai, Jeeva S. & Singh, Vinod
Alternatively, you can apply the format option to the docker inspect subcommand in order to narrow down the output to very specific information. In this case, the ExposedPorts field of ...
( Category:
Linux & UNIX Administration
April 4,2019 )
mobi |eng | | Author:Second Edition
The PNG files are provided with this book in the DroidBlaster_Part6/assets directory. What just happened? Run the application and you should not see much difference. Indeed, we have loaded two ...
( Category:
Internet, Groupware, & Telecommunications
April 4,2019 )
mobi, epub |eng | | Author:A Rapid Guide to the Fundamental Features of Python
Wait. What just happened? How is this possible? As a hint, we'll need to search through the code for an object with a hidden, shared state. Earlier, we noted that ...
( Category:
Internet, Groupware, & Telecommunications
April 4,2019 )
azw3, epub |eng | 2015-04-22 | Author:Amariei, Cornel [Amariei, Cornel]
There's more… In this example, we've seen how to connect one motor directly to a digital pin. But we can also connect more than one. Multiple motors Multiple motors can ...
( Category:
Software Development
April 4,2019 )
epub, pdf |eng | 2014-01-13 | Author:Ed Wilson [Ed Wilson]
Note Keep in mind that you want to convert the contents of the passwordHash.txt file to a secure string and not the path to the passwordHash.txt file. The first time ...
( Category:
Enterprise Applications
April 1,2019 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16762)Deep Learning with Python by François Chollet(12571)
Hello! Python by Anthony Briggs(9916)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9796)
The Mikado Method by Ola Ellnestam Daniel Brolund(9778)
Dependency Injection in .NET by Mark Seemann(9340)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8298)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7763)
Grails in Action by Glen Smith Peter Ledbrook(7696)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7557)
Becoming a Dynamics 365 Finance and Supply Chain Solution Architect by Brent Dawson(7076)
Microservices with Go by Alexander Shuiskov(6843)
Practical Design Patterns for Java Developers by Miroslav Wengner(6764)
Test Automation Engineering Handbook by Manikandan Sambamurthy(6703)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6413)
Angular Projects - Third Edition by Aristeidis Bampakos(6108)
The Art of Crafting User Stories by The Art of Crafting User Stories(5638)
NetSuite for Consultants - Second Edition by Peter Ries(5570)
Demystifying Cryptography with OpenSSL 3.0 by Alexei Khlebnikov(5375)
Kotlin in Action by Dmitry Jemerov(5063)
