Packt – Modernizing Python Applications Migrating to Python 3.x

Packt – Modernizing Python Applications Migrating to Python 3.x-XQZT
English | Size: 321.65 MB
Category: Tutorial

Are you still working with Python 2.x? Are you looking to switch to version 3.x before 2.x goes obsolete? This course will teach you how to migrate to Python 3.x from 2.x! In this course, you will learn the major differences between Python 2.x and 3.x, and, more importantly, we provide guidelines for migrating to the newer version as efficiently as possible (and why you should!). You will also learn about some libraries (such as six, modernize, tox future, and more) that will help you easily automate your migration process. By the end of this course, you will be able to accelerate the performance of your application with the new features of Python 3 and will also have a strong foundation in migrating any applications from Python 2 to 3. Please note that this course assumes prior experience working with Python 2.x. Some knowledge of Python 3.x will be beneficial.

Cloud Academy – Planning Office 365 Workloads and Applications

Cloud Academy – Planning Office 365 Workloads and Applications-STM
English | Size: 2.35 GB
Category: TUtorial

This Planning Office 365 Workloads and Applications course will teach you how to plan for Office 365 workload deployments and hybrid solutions. You will learn how to identify hybrid requirements for Exchange and SharePoint hybrid solutions, and how to plan connectivity and data flow for Office 365 services, including Exchange Online SharePoint Online, and Teams. You ll learn how to plan migration strategies for Exchange, SharePoint, and Teams and how to determine the best strategies

Leveraging Cloud-Based Machine Learning on Azure – Real-World Applications

Leveraging Cloud-Based Machine Learning on Azure – Real-World Applications
English | Size: 157.78 MB
Category: Tutorial

In order to successfully incorporate AI on the popular Azure platform, you must gain a fundamental understanding of what AI is and become familiar with the local tools Azure offers. In this course, David Linthicum covers the basics of leveraging Azure for AI-based applications, including key tools and the processes for using them correctly. After going over the basics of AI processing on Azure, creating knowledge bases, and the use of AI systems in the cloud, David presents real-world use cases across a variety of industries, including healthcare, finance, law enforcement, and manufacturing. He then shows how to work with the Azure Machine Learning (AML) cloud service to build, train, and deploy machine learning models; leverage the Azure Search (AS) tool; and build an AML application.

PluralSight – Designing and Building Enterprise Blazor Applications

PluralSight – Designing and Building Enterprise Blazor Applications-JGTiSO
English | Size: 573.44 MB
Category: Tutorial

Blazor offers promising new tools for building rich web interfaces with C#
This course, Designing and Building Enterprise Blazor Applications, will explore important architectural topics like dependency injection and routing in-depth

Linkedin Learning – CompTIA IT Fundamentals FC0-U61 Cert Prep 2 Files and Applications Networking and Security

Linkedin Learning – CompTIA IT Fundamentals FC0-U61 Cert Prep 2 Files and Applications Networking and Security-ZH
English | Size: 1.04 GB
Category: Tutorial

Learn the fundamentals you need to ace the CompTIA IT Fundamentals (FC0-U61) exam. Passing the exam earns you the ITF certification, designed for advanced users considering a career in IT. This certification is a great entry point for novices transitioning to IT pros and this three-part cert prep series provides "self-help" style guidance that you can use to study for the exam. The second course covers files and applications, networking, and security. Instructor Scott Jernigan helps you understand the ins and outs of mobile devices and then shows how to manage files, manage applications, configure networks for Wi-Fi connectivity and printing, and mitigate the most critical IT security threats