Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Docker for Data Science: Building Scalable and Extensible Data Infrastructure Around the Jupyter Notebook Server

Buy
Learn Docker "infrastructure as code" technology to define a system for performing standard but non-trivial data tasks on medium- to large-scale data sets, using Jupyter as the master controller.

It is not uncommon for a real-world data set to fail to be easily managed. The set may not fit well into access memory or may require prohibitively long processing. These are significant challenges to skilled software engineers and they can render the standard Jupyter system unusable. 

As a solution to this problem, Docker for Data Science proposes using Docker. You will learn how to use existing pre-compiled public images created by the major open-source technologies―Python, Jupyter, Postgres―as well as using the Dockerfile to extend these images to suit your specific purposes. The Docker-Compose technology is examined and you will learn how it can be used to build a linked system with Python churning data behind the scenes and Jupyter managing these background tasks. Best practices in using existing images are explored as well as developing your own images to deploy state-of-the-art machine learning and optimization algorithms.


What  You'll Learn 
  • Master interactive development using the Jupyter platform
  • Run and build Docker containers from scratch and from publicly available open-source images
  • Write infrastructure as code using the docker-compose tool and its docker-compose.yml file type
  • Deploy a multi-service data science application across a cloud-based system


Who This Book Is For


Data scientists, machine learning engineers, artificial intelligence researchers, Kagglers, and software developers


(HTML tags aren't allowed.)

Cloud Computing and Virtualization
Cloud Computing and Virtualization

The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) migration and its security concerns. The book then tackles design, implementation of...

Windows Server 2012 R2 Pocket Consultant Volume 2: Storage, Security, & Networking
Windows Server 2012 R2 Pocket Consultant Volume 2: Storage, Security, & Networking

Portable and precise, this pocket-sized guide delivers ready answers for administering storage, security, and networking features in Windows Server 2012 R2. Zero in on core tasks through quick-reference tables, instructions, and lists. You'll get the focused information you need to save time and get the job done - whether at your desk or...

Swift in the Cloud
Swift in the Cloud

Write and run Swift language programs in the Cloud

Written by the team of developers that has helped bring the Swift language to Cloud computing, this is the definitive guide to writing and running Swift language programs for cloud environment. In Swift in the Cloud, you'll find full coverage of all aspects...


From IT Pro to Cloud Pro Microsoft Office 365 and SharePoint Online (IT Best Practices - Microsoft Press)
From IT Pro to Cloud Pro Microsoft Office 365 and SharePoint Online (IT Best Practices - Microsoft Press)

Modernize your IT skills for the new world of cloud computing!

Whether you are an IT administrator, developer, or architect, cloud technologies are transforming your role. This guide brings together the knowledge you need to transition smoothly to Microsoft Office 365 cloud-only and...

Mastering Windows Server 2016 Hyper-V
Mastering Windows Server 2016 Hyper-V

Build a seamless, flexible, full-service datacenter solution

Microsoft Windows Server 2016 Hyper-V is the IT administrator's guide to this rising datacenter solution. Hyper-V has already surpassed VMWare in datacenter management, identity service for multiple devices, and more; this book shows you how to harness...

Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy