Hybrid workshops were held to go over the content contained in this repository. The first workshop was held on June 20th, 2024. To watch a recording of that workshop, see Tutorial: From Jupyter ...
Please use the walkthrough.ipynb file for an interactive example that takes an existing notebook and creates a web server running in a container to display an interactive visualization. There is a ...
Applications and endpoints are one of the most vulnerable attack vectors, to the extent that 70% of all breaches originate at the endpoint, according to a report last year. With the focus on ...
State and local agencies often deal with legacy monoliths that weren’t built with portability or resiliency in mind. Agencies may operate applications that were written in five different programming ...
One term popping up more and more in the cloud space is “containerization.” If you’re-paying attention to the trends in cloud computing, you’ve probably heard about it, or at least about the most ...
Introduction of 5G services marks a major technological shift in both private and public sectors. The modern solutions give us access to ultra-low latency networking, fast download speeds, and ...