Browse Results

Showing 2,676 through 2,700 of 100,000 results

sinhabahu - සිංහබාහු

by Ediriweera Sarachchandra - එදිරිවීර සරච්චන්ද්‍ර

කිසියම් රටක ගීත නාටක කලාව, සජීව ජාතික කලා මාධ්‍යයක් වශයෙන් පැවැතීමට නම්, ඒ රටෙහි නාට්‍ය රචකයන් මෙන්ම ගීත ස්වර රචකයන් ද සිටිය යුතුය. දහ නව වෙනි ශත වර්ශයේ මුල් අවධියෙහි සිට මෙහි පැවතිණැයි සිතිය හැකි නාඩගම් නම් ගීත නාටක සම්ප්‍රදාය පිරිහීමටත් මුළුමනින් ම වාගේ අතුරුදහන් වී යාමටත් එක් හේතුවක් වශයෙන් දැක්විය හැක්කේ, මෙහි ගීත ස්වර රචකයන් විරල වීම යයි හඟිමි. භාරතය හෝ චීනය හෝ යුරෝපය මෙන්, චිරාගත සංගීත සම්ප්‍රදායක් නොමැති ලක්දිවට , කිසියම් අවධියක දී ප්‍රවේශ වූ මේ ගීත නාටක සම්ප්‍රදාය මෙහි පැලපදියම් නොවීම ගැන අප පුදුමයට පත් නොවිය යුතු ය. නාඩගම් හෝ නූර්ති රචනා කළ බොහෝ අය, කලින් රචනා කර තිබුණු නාඩගම් හෝ නූර්ති සිංදු රාග තම කෘති සඳහා උපුටා ගත්හ. එකල වැඩි දෙනෙකු නාට්‍ය බලන්ට ගියේ සින්දු ඇසීමට පමණක් වූ හෙයින් ද , එකල රචිත නාට්‍ය වල සින්දු හැරුණු විට අන් කිසි ගත යුත්තක් නුවූ හෙයින් ද , හැමදාම එකම සින්දු අසන්ට සිදුවූ රසිකයන්ට ගීත නාටක කලාව එපා වන්ට ඇතැයි සිතිය හැකි ය.

sifting through the madness for the word, the line, the way: New Poems

by Charles Bukowski

from "neither Shakespeare nor Mickey Spillane"young young young, only wanting the Word, going mad in the streets and in the bars,brutal fights, broken glass, crazy women screaming inyour cheap room,you a familiar guest at the drunk tank, NorthAvenue 21, Lincoln Heightssifting through the madness for the Word, the line the way,hoping for a check from somewhere,dreaming of a letter from a great editor:"Chinaski, you don't know how long we've beenwaiting for you!"no chance at all.

sicher & mobil

by Wolfgang W. Osterhage

Die Verlinkung von Computern und ihren Komponenten hat mit den Möglichkeiten der drahtlosen Kommunikation eine neue Qualität erreicht. Die Frage, wie diese Entwicklung die IT-Sicherheit herausfordert, steht im Mittelpunkt des Buchs. Der Autor behandelt die gesamte Bandbreite der drahtlosen Kommunikation (WLAN, Bluetooth, Mobiltelefonie), liefert detaillierte Beschreibungen der Technologie, der Standards, der Verschlüsselung und Konfiguration. Der Band enthält eine Checkliste, die auf den neuesten Sicherheits- und Kommunikationsstandards basiert.

siRNA and miRNA Gene Silencing

by Mouldy Sioud

RNA interference has become a key method in the suppression of gene expression and the development of therapeutic agents, yet there is still the problem of delivery, stability, and the danger of off-target effects such as the silencing of unwanted genes and activation of innate immunity. In siRNA and miRNA Gene Silencing: From Bench to Bedside, expert researchers explore the most recent advances in siRNA design, expression, delivery, in vivo imaging, and methods to minimize siRNA's unwanted effects and promote successful use in patients. As part of the highly successful Methods in Molecular BiologyTM series, the chapters focus on their respective subjects with easy-to-use, up-to-date information, including several step-by-step laboratory protocols on topics such as new delivery formulations and strategies with promising applications in vitro and in vivo, validated therapeutic target genes, and components of miRNA function, biogenesis, and interference with virus infection. Comprehensive and cutting-edge, siRNA and miRNA Gene Silencing: From Bench to Bedside offers an excellent collection of chapters to aid all those with an interest in RNAi, gene regulation, and new therapies.

siRNA Design

by Debra J. Taxman

The discovery of RNA interference (RNAi) as a methodology for gene silencing has revolutionized biological research, providing an invaluable avenue for therapeutics, and small interfering RNA (siRNA) is the most common strategy utilized for enacting RNAi. siRNA Design: Methods and Protocols offers expertly crafted guidelines and protocols for the selection of siRNA targeting sequences, for the strategic incorporation of chemical modifications, and for advantageous structural modifications to the classic siRNA design. Protocols are provided for using endogenous cellular machinery to produce siRNA from optimized precursor short hairpin RNA (shRNA) and artificial microRNA (amiRNA) molecules. Strategies are also described for specific applications such as immunostimulatory siRNA that may provide therapeutic benefit against viral infections in mammals, the simultaneous targeting of multiple siRNAs, and siRNA-mediated crop virus resistance. The design of RNAi for gene silencing in embryonic, invertebrate, and plant systems requires a variety of unique approaches, several of which are described towards the end of this volume. Written for the highly successful Methods in Molecular BiologyTM series, this work contains the kind of detailed description and implementation advice that guarantees successful results. Authoritative and easy to use, siRNA Design: Methods and Protocols will provide researchers, educators, clinicians, and biotech specialists with a broad understanding of the issues in RNAi and how they can be overcome strategically through design.

shopkick: The Game of Shopping

by Allison M. Ciechanover John Deighton

Case

shiny gods: finding freedom from things that distract us (first)

by Mike Slaughter

What happens when we truly put God first in all aspects of our lives? In a culture guided chiefly by shiny, life-promising distractions, "enough" seems elusive and keeps us indebted to that next source of satisfaction. What if the Giver of Life offered freedom from this downward spiral--would you take it? In shiny gods, pastor and author Mike Slaughter, lead pastor of Ginghamsburg United Methodist Church and popular author of Christmas Is Not Your Birthday, helps readers reassess priorities and create a culture and a lifestyle of giving with a special emphasis on missions.

shima: Poems

by sho yamagushiku

A vivid, expansive vision of intergenerational witness and repair.The village is tilting on its axis. It is turning. All its organs are spilling into the bay.shima is a mosaic of the emotional, psychic, and generational toll that exile from a pillaged culture impresses on a poet and his community. Come to haunt yamagushiku&’s practice of ancestor veneration are photographs and a narrative that spans his own life and a mythic parallel filled with a voice as spare as it is present, yearning as it is precise. The poet says, I am taking the sharpest stick and poking the root ancestor. I am insisting that if he awakens I will have something useful to say.Speaking through a cultural amnesia collected between a sunken past and a sensed, ghostly-dreamed future, shima anchors this interrogation of the relationship between father and son in the fragile connective tissue of memory where the poet&’s homeland is an impossible destination.

share: Delicious Dishes from Foodshare and Friends

by Adrienne De Francesco Marion Kane

Featuring local produce and seasonal selections, share showcases the joy of healthy, affordable, culturally-diverse cooking and highlights the power of good food to bring people together. Celebrate fresh food and home-cooked meals with Adrienne De Francesco and Marion Kane, as they guide you through recipes that are thoughtfully selected, thoroughly tested, and thoroughly delicious. Foreword written by Frances Moore Lappé.

serafina67 *urgently requires life*

by Susie Day

This hilarious debut is now available in paperback!Serafina doesn't have a boyfriend, doesn't have a best friend, and her parents fight all the time. But she does have a shiny new laptop (a present from her guilt-ridden and therefore overly generous dad). And with the shiny new laptop comes a shiny new identity: serafina67, blogging (and kissing) addict.But in a year when the secrets turn serious, and friends and parents might not be what they seem, is spilling your whole life on the Internet such a bright idea? It might just lead to tears, trouble, hilarious online adventures and a fresh new take on writing---a novel told as a blog.

sendmail, 4th Edition

by Bryan Costales Claus Assmann George Jansen Gregory Shapiro

A classic O'Reilly title since 1993, sendmail now covers Versions 8.10 through 8.14 of this email routing program, including dozens of new features, options, and macros. This edition also takes a more nuts-and-bolts approach than its predecessors. It includes both an administration handbook and a reference guide that provide you with clear options for installing, configuring and managing sendmail's latest versions and companion programs. The sendmail program has withstood the test of time because of its ability to solve the mail-routing needs of all sites large or small, complex or simple. But it's also difficult to configure and even more difficult to understand. That's why this book has proven valuable since the dawn of email. With it, you will be able to configure the program to meet any need, so that you never again have to call in a sendmail guru to bail you out. sendmail includes the following sections: * Some Basics is especially useful for people new to the program. It covers the basic concepts underlying mail delivery and the roles sendmail plays in that delivery * Administration covers all aspects of handling sendmail, from downloading and installing new releases to managing mailing lists and aliases * Configuration Reference contains a heavily cross-referenced guide for configuring and tuning sendmail. Every arcane detail of sendmail is listed alphabetically * Appendices contain more detail about sendmail than you may ever need This edition also includes new material on SSL and AUTH and a new chapter on Mitlers. If you're interested in what has changed since the last edition, one appendix categorizes the many improvements of sendmail's intervening versions by chapter, complete with references to the appropriate sections and page numbers in the book. With sendmail, system administrators, programmers, network engineers, and even inexperienced users will be able to match this challenging but necessary utility to the needs of their network. This edition also takes a more nuts-and-bolts approach than its predecessors. It includes both an administration handbook and a reference guide that provide you with clear options for installing, configuring and managing sendmail's latest versions and companion programs. The sendmail program has withstood the test of time because of its ability to solve the mail-routing needs of all sites large or small, complex or simple. But it's also difficult to configure and even more difficult to understand. That's why this book has proven valuable since the dawn of email. With it, you will be able to configure the program to meet any need, so that you never again have to call in a sendmail guru to bail you out. sendmail includes the following sections: * Some Basics is especially useful for people new to the program. It covers the basic concepts underlying mail delivery and the roles sendmail plays in that delivery * Administration covers all aspects of handling sendmail, from downloading and installing new releases to managing mailing lists and aliases * Configuration Reference contains a heavily cross-referenced guide for configuring and tuning sendmail. Every arcane detail of sendmail is listed alphabetically * Appendices contain more detail about sendmail than you may ever need This edition also includes new material on SSL and AUTH and a new chapter on Mitlers. If you're interested in what has changed since the last edition, one appendix categorizes the many improvements of sendmail's intervening versions by chapter, complete with references to the appropriate sections and page numbers in the book. With sendmail, system administrators, programmers, network engineers, and even inexperienced users will be able to match this challenging but necessary utility to the needs of their network.

sendmail Cookbook: Administering, Securing & Spam-Fighting

by Craig Hunt

More often than not, the words "sendmail configuration" strike dread in the hearts of sendmail and system administrators--and not without reason. sendmail configuration languages are as complex as any other programming languages, but used much more infrequently--only when sendmail is installed or configured. The average system administrator doesn't get enough practice to truly master this inscrutable technology.Fortunately, there's help. The sendmail Cookbook provides step-by-step solutions for the administrator who needs to solve configuration problems fast. Say you need to configure sendmail to relay mail for your clients without creating an open relay that will be abused by spammers. A recipe in the Cookbook shows you how to do just that. No more wading through pages of dense documentation and tutorials and creating your own custom solution--just go directly to the recipe that addresses your specific problem.Each recipe in the sendmail Cookbook outlines a configuration problem, presents the configuration code that solves that problem, and then explains the code in detail. The discussion of the code is critical because it provides the insight you need to tweak the code for your own circumstances.The sendmail Cookbook begins with an overview of the configuration languages, offering a quick how-to for downloading and compiling the sendmail distribution. Next, you'll find a baseline configuration recipe upon which many of the subsequent configurations, or recipes, in the book are based. Recipes in the following chapters stand on their own and offer solutions for properly configuring important sendmail functions such as:Delivering and forwarding mailRelayingMasqueradingRouting mailControlling spamStrong authenticationSecuring the mail transportManaging the queueSecuring sendmailsendmail Cookbook is more than just a new approach to discussing sendmail configuration. The book also provides lots of new material that doesn't get much coverage elsewhere--STARTTLS and AUTH are given entire chapters, and LDAP is covered in recipes throughout the book. But most of all, this book is about saving time--something that most system administrators have in short supply. Pick up the sendmail Cookbook and say good-bye to sendmail dread.

sendmail

by Bryan Costales Claus Assmann George Jansen Gregory Neil Shapiro

A classic O'Reilly title since 1993, sendmail now covers Versions 8.10 through 8.14 of this email routing program, including dozens of new features, options, and macros. This edition also takes a more nuts-and-bolts approach than its predecessors. It includes both an administration handbook and a reference guide that provide you with clear options for installing, configuring and managing sendmail's latest versions and companion programs. The sendmail program has withstood the test of time because of its ability to solve the mail-routing needs of all sites large or small, complex or simple. But it's also difficult to configure and even more difficult to understand. That's why this book has proven valuable since the dawn of email. With it, you will be able to configure the program to meet any need, so that you never again have to call in a sendmail guru to bail you out.sendmail includes the following sections: Some Basics is especially useful for people new to the program. It covers the basic concepts underlying mail delivery and the roles sendmail plays in that deliveryAdministration covers all aspects of handling sendmail, from downloading and installing new releases to managing mailing lists and aliasesConfiguration Reference contains a heavily cross-referenced guide for configuring and tuning sendmail. Every arcane detail of sendmail is listed alphabeticallyAppendices contain more detail about sendmail than you may ever need This edition also includes new material on SSL and AUTH and a new chapter on Mitlers. If you're interested in what has changed since the last edition, one appendix categorizes the many improvements of sendmail's intervening versions by chapter, complete with references to the appropriate sections and page numbers in the book. With sendmail, system administrators, programmers, network engineers, and even inexperienced users will be able to match this challenging but necessary utility to the needs of their network.

semigroup theory and applications

by Phillipe Clement

This book contains articles on maximal regulatory problems, interpolation spaces, multiplicative perturbations of generators, linear and nonlinear evolution equations, integrodifferential equations, dual semigroups, positive semigroups, applications to control theory, and boundary value problems.

semiautomatic (Wesleyan Poetry Series)

by Evie Shockley

Winner of Hurston/Wright Foundation's Legacy Award for Poetry, given by the Zora Neale Hurston/Richard Wright Foundation, 2018Art can't shield our bodies or stabilize the earth's climate, but Evie Shockley's semiautomatic insists that it can feed the spirit and reawaken the imagination. The volume responds primarily to the twenty-first century's inescapable evidence of the terms of black life—not so much new as newly visible. The poems trace a whole web of connections between the kinds of violence that affect people across the racial, ethnic, gender, class, sexual, national, and linguistic boundaries that do and do not divide us. How do we protect our humanity, our ability to feel deeply and think freely, in the face of a seemingly endless onslaught of physical, social, and environmental abuses? Where do we find language to describe, process, and check the attacks and injuries we see and suffer? What actions can break us out of the soul-numbing cycle of emotions, moving through outrage, mourning, and despair, again and again? In poems that span fragment to narrative and quiz to constraint, from procedure to prose and sequence to song, semiautomatic culls past and present for guides to a hoped-for future.

seeing into the earth: Noninvasive Characterization of the Shallow Subsurface for Environmental and Engineering Applications

by Board on Earth Sciences Resources

Just below our feet is an environment that supports our infrastructure, yields water, provides for agriculture, and receives our waste. Our capacity to describe, or characterize, this environment is crucial to the solution of many resource, environmental, and engineering problems. And just as medical imaging technologies have reduced the need for exploratory surgeries, a variety of technologies hold the promise for rapid, relatively inexpensive noninvasive characterization of the Earth's subsurface.Seeing into the Earth examines why noninvasive characterization is important and how improved methods can be developed and disseminated. Looking at the issues from both the commercial and public perspectives, the volume makes recommendations for linking characterization and cost savings, closing the gap between the state of science and the state of the practice, and helping practitioners make the best use of the best methods. The book provides background on: The role of noninvasive subsurface characterization in contaminant cleanup, resource management, civil engineering, and other areas. The physical, chemical, biological, and geological properties that are characterized. Methods of characterization and prospects for technological improvement.Certain to be important for earth scientists and engineers alike, this book is also accessible to interested lay readers.

sed and awk Pocket Reference: Text Processing with Regular Expressions

by Arnold Robbins

For people who create and modify text files, sed and awk are power tools for editing. sed, awk, and regular expressions allow programmers and system administrators to automate editing tasks that need to be performed on one or more files, to simplify the task of performing the same edits on multiple files, and to write conversion programs.The sed & awk Pocket Reference is a companion volume to sed & awk, Second Edition, Unix in a Nutshell, Third Edition, and Effective awk Programming, Third Edition. This new edition has expanded coverage of gawk (GNU awk), and includes sections on:An overview of sed and awk?s command line syntaxAlphabetical summaries of commands, including nawk and gawkProfiling with pgawkCoprocesses and sockets with gawkInternationalization with gawkA listing of resources for sed and awk usersThis small book is a handy reference guide to the information presented in the larger volumes. It presents a concise summary of regular expressions and pattern matching, and summaries of sed and awk.Arnold Robbins, an Atlanta native now happily living in Israel, is a professional programmer and technical author and coauthor of various O'Reilly Unix titles. He has been working with Unix systems since 1980, and currently maintains gawk and its documentation.

sed & awk: UNIX Power Tools

by Arnold Robbins Dale Dougherty

sed & awk describes two text processing programs that are mainstays of the UNIX programmer's toolbox.sed is a "stream editor" for editing streams of text that might be too large to edit as a single file, or that might be generated on the fly as part of a larger data processing step. The most common operation done with sed is substitution, replacing one block of text with another.awk is a complete programming language. Unlike many conventional languages, awk is "data driven" -- you specify what kind of data you are interested in and the operations to be performed when that data is found. awk does many things for you, including automatically opening and closing data files, reading records, breaking the records up into fields, and counting the records. While awk provides the features of most conventional programming languages, it also includes some unconventional features, such as extended regular expression matching and associative arrays. sed & awk describes both programs in detail and includes a chapter of example sed and awk scripts.This edition covers features of sed and awk that are mandated by the POSIX standard. This most notably affects awk, where POSIX standardized a new variable, CONVFMT, and new functions, toupper() and tolower(). The CONVFMT variable specifies the conversion format to use when converting numbers to strings (awk used to use OFMT for this purpose). The toupper() and tolower() functions each take a (presumably mixed case) string argument and return a new version of the string with all letters translated to the corresponding case.In addition, this edition covers GNU sed, newly available since the first edition. It also updates the first edition coverage of Bell Labs nawk and GNU awk (gawk), covers mawk, an additional freely available implementation of awk, and briefly discusses three commercial versions of awk, MKS awk, Thompson Automation awk (tawk), and Videosoft (VSAwk).

sed & awk Pocket Reference, 2nd Edition

by Arnold Robbins

This handy little book is an indispensable reference to information presented in O'Reilly's larger volumes, sed & awk, 2nd Edition and Effective awk Programming. A perfect pocket- sized guide, sed & awk Pocket Reference offers a concise summary of regular expressions and pattern matching, and summaries of sed and awk. The book emphasizes the kinds of practical problems that sed and awk can help users solve, with many example scripts and programs. Also included is a summary of sed and awk's functions and commands, with expanded coverage of TCP/IP networking and internationalization with gawk.

secrets to DRAWING REALISTIC CHILDREN

by Carrie Stuart Parks Rick Parks

You can capture your most cherished moments in a way no ordinary photograph can! This book will tell you everything you need to know to create incredibly true-to-life pencil portraits of the children you love.

scikit-learn: Machine Learning Simplified

by Trent Hauck Raul Garreta Guillermo Moncecchi Gavin Hackeling

Implement scikit-learn into every step of the data science pipeline About This Book • Use Python and scikit-learn to create intelligent applications • Discover how to apply algorithms in a variety of situations to tackle common and not-so common challenges in the machine learning domain • A practical, example-based guide to help you gain expertise in implementing and evaluating machine learning systems using scikit-learn Who This Book Is For If you are a programmer and want to explore machine learning and data-based methods to build intelligent applications and enhance your programming skills, this is the course for you. No previous experience with machine-learning algorithms is required. What You Will Learn • Review fundamental concepts including supervised and unsupervised experiences, common tasks, and performance metrics • Classify objects (from documents to human faces and flower species) based on some of their features, using a variety of methods from Support Vector Machines to Naive Bayes • Use Decision Trees to explain the main causes of certain phenomena such as passenger survival on the Titanic • Evaluate the performance of machine learning systems in common tasks • Master algorithms of various levels of complexity and learn how to analyze data at the same time • Learn just enough math to think about the connections between various algorithms • Customize machine learning algorithms to fit your problem, and learn how to modify them when the situation calls for it • Incorporate other packages from the Python ecosystem to munge and visualize your dataset • Improve the way you build your models using parallelization techniques In Detail Machine learning, the art of creating applications that learn from experience and data, has been around for many years. Python is quickly becoming the go-to language for analysts and data scientists due to its simplicity and flexibility; moreover, within the Python data space, scikit-learn is the unequivocal choice for machine learning. The course combines an introduction to some of the main concepts and methods in machine learning with practical, hands-on examples of real-world problems. The course starts by walking through different methods to prepare your data—be it a dataset with missing values or text columns that require the categories to be turned into indicator variables. After the data is ready, you'll learn different techniques aligned with different objectives—be it a dataset with known outcomes such as sales by state, or more complicated problems such as clustering similar customers. Finally, you'll learn how to polish your algorithm to ensure that it's both accurate and resilient to new datasets. You will learn to incorporate machine learning in your applications. Ranging from handwritten digit recognition to document classification, examples are solved step-by-step using scikit-learn and Python. By the end of this course you will have learned how to build applications that learn from experience, by applying the main concepts and techniques of machine learning. Style and Approach Implement scikit-learn using engaging examples and fun exercises, and with a gentle and friendly but comprehensive "learn-by-doing" approach. This is a practical course, which analyzes compelling data about life, health, and death with the help of tutorials. It offers you a useful way of interpreting the data that's specific to this course, but that can also be applied to any other data. This course is designed to be both a guide and a reference for moving beyond the basics of scikit-learn.

scikit-learn Cookbook - Second Edition

by Julian Avila

Learn to use scikit-learn operations and functions for Machine Learning and deep learning applications. About This Book • Handle a variety of machine learning tasks effortlessly by leveraging the power of scikit-learn • Perform supervised and unsupervised learning with ease, and evaluate the performance of your model • Practical, easy to understand recipes aimed at helping you choose the right machine learning algorithm Who This Book Is For Data Analysts already familiar with Python but not so much with scikit-learn, who want quick solutions to the common machine learning problems will find this book to be very useful. If you are a Python programmer who wants to take a dive into the world of machine learning in a practical manner, this book will help you too. What You Will Learn • Build predictive models in minutes by using scikit-learn • Understand the differences and relationships between Classification and Regression, two types of Supervised Learning. • Use distance metrics to predict in Clustering, a type of Unsupervised Learning • Find points with similar characteristics with Nearest Neighbors. • Use automation and cross-validation to find a best model and focus on it for a data product • Choose among the best algorithm of many or use them together in an ensemble. • Create your own estimator with the simple syntax of sklearn • Explore the feed-forward neural networks available in scikit-learn In Detail Python is quickly becoming the go-to language for analysts and data scientists due to its simplicity and flexibility, and within the Python data space, scikit-learn is the unequivocal choice for machine learning. This book includes walk throughs and solutions to the common as well as the not-so-common problems in machine learning, and how scikit-learn can be leveraged to perform various machine learning tasks effectively. The second edition begins with taking you through recipes on evaluating the statistical properties of data and generates synthetic data for machine learning modelling. As you progress through the chapters, you will comes across recipes that will teach you to implement techniques like data pre-processing, linear regression, logistic regression, K-NN, Naive Bayes, classification, decision trees, Ensembles and much more. Furthermore, you'll learn to optimize your models with multi-class classification, cross validation, model evaluation and dive deeper in to implementing deep learning with scikit-learn. Along with covering the enhanced features on model section, API and new features like classifiers, regressors and estimators the book also contains recipes on evaluating and fine-tuning the performance of your model. By the end of this book, you will have explored plethora of features offered by scikit-learn for Python to solve any machine learning problem you come across. Style and Approach This book consists of practical recipes on scikit-learn that target novices as well as intermediate users. It goes deep into the technical issues, covers additional protocols, and many more real-live examples so that you are able to implement it in your daily life scenarios.

scikit-learn Cookbook

by Trent Hauck

If you're a data scientist already familiar with Python but not Scikit-Learn, or are familiar with other programming languages like R and want to take the plunge with the gold standard of Python machine learning libraries, then this is the book for you.

sbt in Action: The simple Scala build tool

by Josh Suereth Matthew Farwell

SummaryA tutorial about effectively building Scala projects, sbt in Action introduces the sbt tool with a simple project that establishes the fundamentals of running commands and tasks. Next, it shows you how to use the peripheral libraries in sbt to make common tasks simpler. Finally, it covers how to deploy software effectively. You'll learn to appreciate how sbt improves the process of developing software, not just running builds.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the Technologysbt is a build tool native to Scala that can transform any build scenario into a streamlined, automated, and repeatable process. Its interactive shell lets you customize your builds on the fly, and with sbt's unique incremental compilation feature, you can update only the parts of your project that change, without having to rebuild everything. Mastering sbt, along with the right patterns and best practices, is guaranteed to save you time and trouble on every project.About the Booksbt in Action, first and foremost, teaches you how to build Scala projects effectively. It introduces the sbt tool with a simple project that establishes the fundamentals of running commands and tasks. Next, it shows you how to use the peripheral libraries in sbt to make common tasks simpler. Along the way, you'll work through real projects that demonstrate how to build and deploy your projects regardless of development methodology or process.What's InsideMaster sbt's loosely coupled librariesEffectively manage dependenciesAutomate and simplify your buildsCustomize builds and tasksAbout the ReaderReaders should be comfortable reading Scala code. No experience with sbt required.About the AuthorsJosh Suereth is an engineer at Typesafe and the author of Manning's Scala in Depth. Matthew Farwell is a senior developer and the author of the Scalastyle style checker.Table of ContentsPART 1 WHY SBT?Why sbt?Getting startedPART 2 UNDERSTANDING SBT'S CORE CONCEPTSCore conceptsThe default buildPART 3 WORKING WITH SBTTestingThe IO and Process librariesAccepting user inputUsing plugins and external librariesDebugging your buildPART 4 EXTENDING SBTAutomating workflows with commandsDefining a pluginPART 5 DEPLOYING YOUR PROJECTSDistributing your projects

savings time: Poems

by Roya Marsh

The Bronx born activist and poet Roya Marsh returns with a riveting exploration of Black joy, collective action, and healing. what will come of what you leave behind?do youremember that timeyou survived?The poems in Roya Marsh’s second collection, savings time, wear their raw feeling and revolutionary forcefulness on their sleeves. Alternating between confrontation and celebration, Marsh trains her unsparing eye on the twinned subjects of Black rage and Black healing with practiced, musical intention.In poems flitting between breathless prose and measured lyricism, Marsh contemplates the contradictions and challenges of Black life in America, tackling everything from police brutality and urban gentrification to queer identity, presidential elections, and pop culture, all while calling for a world where self-care, especially for Black women, is not just encouraged but mandated. “no one told the Black girl,” she writes, “‘see you later’ was a prayer / begging us survive our own erasure.”As unforgettable on the page as when recited in Marsh’s legendary spoken-word performances, the poems in savings time are focused on both revolution and self-love, at once holding society accountable for its exploitation of Black life and honoring the joy of persisting nonetheless.

Refine Search

Showing 2,676 through 2,700 of 100,000 results