Search
Search Results
-
Security
This chapter covers the following topics. -
Quick Start
Let’s get right down to business and have some fun in the meantime. In this first chapter, we will focus on getting you onboard and up to speed with... -
Consumption
One of the key areas which requires a significant amount of attention is the interface to the API Marketplace. Although the star of the show is the... -
The Impact of Kubernetes on Development
The last five years can safely be termed a Kubernetes Tsunami in the IT world. Kubernetes has been around since 2014, and it conquered not only the... -
Integrating Hibernate
In Chapter 11 , we showed a technique for integrating Hibernate into a servlet application, but our application... -
Deep Learning-Based Approach to Detect and Classify Signs of Crop Leaf Diseases and Pest Damage
Leaf constitutes an important part of a plant as it gives prior information about its health. Timely and proper diagnosis of different pests, fungal...
-
Log Files
In previous chapters, I discussed configuring several Apache features. But I haven’t discussed the most important Apache feature you’ll use: logging.... -
Learn FileMaker Pro 19 The Comprehensive Guide to Building Custom Databases
Discover how easy it is to create multi-user, cross-platform custom solutions with FileMaker Pro, the relational database platform published by Apple...
-
Evolving software system families in space and time with feature revisions
Software companies commonly develop and maintain variants of systems, with different feature combinations for different customers. Thus, they must...
-
Deployment
The journey of web application development culminates when you make it publicly available for users. Once you are confident that your app is... -
Contexts and Dependency Injection
Contexts and Dependency Injection (CDI) is a powerful dependency injection mechanism that is part of both the Jakarta EE and MicroProfile... -
Wasm and Kubernetes
This chapter covers the world of container orchestration via Kubernetes. It explains how to containerize the Wasm-based workloads you developed in... -
Data Analytics for Athlete Safety in Training
Data Analytics for Athlete Safety in Training (DFAST) is a system designed to improve performance and safety in athlete training. Wearable devices on... -
Prediction of Tomato Leaf Disease Plying Transfer Learning Models
The tomato has a high market value and is one of the vegetables grown in the most significant quantity globally. Tomato plants are susceptible to... -
Fitness Freaks: A System for Detecting Definite Body Posture Using OpenPose Estimation
Nowadays, because of busy schedules, people have no time to go to the gym, and even if they manage to find a gym nearby having a gym trainer besides... -
Develo** Microservices Using Payara Micro
Microservices are nothing but RESTful web services; they typically perform a single task; as such, their code bases tend to be small. In a... -
Few-Shot Learning for Plant Disease Classification Using ILP
Plant diseases are one of the main causes of crop loss in agriculture. Machine Learning, in particular statistical and neural nets (NNs) approaches,... -
Multimodal AI: Creating a Podcast Visualizer with Whisper and DALL·E 3
Now let’s introduce a new term: multimodal AI. In the most simplest of terms, generative AI models can create content in 1 of 4 formats: -
Rule Engine and Authentication
The rule engine is one of the most powerful blocks of our IoT platform or any IoT platform in general. The fact that anything happening in the... -
HTTP
The World Wide Web is a major distributed system, with millions of users. A site may become a web host by running an HTTP server. While web clients...