O'Reilly Programming Newsletter

How to set up and run your own Architectural Katas

One of the problems of a burgeoning software architect is the ability to practice doing software architecture. That's where architectural katas come in. Neal Ford explains the ground rules for setting up and running your own Architectural Katas.

Build interactive workflows for C++ with Jupyter

Until recently, we've lacked a good story for interactive computing in C++. The QuantStack folks detail the tooling enabling zeus-cling, a pure C++ kernel for Jupyter Notebook.

New Release: Learning TensorFlow

Learning TensorFlow Roughly inspired by the human brain, deep neural networks trained with large amounts of data can solve complex tasks with unprecedented accuracy. Learning Tensorflow provides an end-to-end guide to TensorFlow, the leading open source software library that helps you build and train neural networks for computer vision, natural language processing (NLP), speech recognition, and general predictive analytics.
Learn More →

Visual Studio Code can do that?

Microsoft's open source Visual Studio Code editor is a popular choice among developers interested in a tool with debugging support and code completion out of the box. But often, when picking up a new tool, you just want to get the job done and overlook the little things. Luckily, Burke Holland has compiled a list of all the best things about Visual Studio Code that nobody ever bothered to tell you.

Applying cloud architecture patterns

If you want to implement key design patterns and concepts in enterprise projects, there are clear architectural concepts and patterns that you can use as guideposts on your journey to the cloud. Join Matt Stine for this hands-on, two day training in New York February 25–28.
Learn More →
In collaboration with Akamai

Free Chapters: Zero Trust Networks

Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. In Zero Trust Networks, you'll get a comprehensive overview of the zero trust model a method that turns the concept of the traditional network perimeter on its head. Download chapters 1 and 10 for free, courtesy of Akamai.
Download chapters for free →

O'Reilly Java Humble Book Bundle

The holiday season is a great time to dig into a personal project or learn a new language. If that happens to involve Java or the JVM, consider our Java Humble Book Bundle in support of Code for America. There are three tiers to choose from and all Java ebooks are DRM-free. Be quick about it, though. Time is running out!

Katharine Jarmul talks Python for data analysis

In the latest episode of the O'Reilly Programming Podcast, Katharine Jarmul (co-author of "Data Wrangling with Python") talks about why Python has become a preferred language for use in data science.
Listen now →

Understanding how groups work on Linux

On the surface, groups on Linux appear to adhere to a straightforward set of rules, but as Julia Evans found out, there is subtle nuance and depth under the surface that's worth exploring if you want to understand what's really going on.
In collaboration with Split

Free Report: Managing Feature Flags

Developers have long used configuration options or flags to control what their software programs do at runtime. Feature flags are a modern application of this concept, focused on accelerating software delivery. In Managing Feature Flags, you'll learn how teams can successfully apply feature flags—aka toggles, flips, gates, or switches—to accelerate software delivery.
Grab your copy now →

Dirty coding tricks revisited

Developers love sharing ingenious hacks. Despite a tendency towards gratuitous self-promotion, it's a great way to pick up useful techniques and learn what to watch out for as a project progresses. Brandon Sheffield chronicles some of the best solutions to interesting problems as developers share their most memorable dirty coding tricks.

tail -f /dev/newsletter

Vision Kit enables you to build a very hackable image recognition device that can see and identify objects, powered by TensorFlow's machine learning models. All you need is a Raspberry Pi Zero W, a Raspberry Pi Camera 2, and a blank SD card. Raspberry Pi Camera 2
Read more about programming at oreilly.com →