The Moonshot Game: Adventures of an Indian Venture Capitalist


Rahul Chandra - 2019
    The second wave came in 2006 when home-grown VCs raised large amounts of capital and funded products and services companies for Indian consumers.This is a gripping behind-the-scenes story of a VC's journey, right from the beginning of the second start-up revolution in India in 2006 until the end of the funding frenzy in 2016. A story about how global conditions, local consumers, founder ambition and good old greed shaped the start-up story in India.Rahul Chandra is the co-founder of Helion Ventures, and in this candid memoir he tells us about his journey building one of India's oldest VC firms. In a remarkably gripping account, he recounts his adventures in India's hyper-funded start-up ecosystem.The Moonshot Game gives readers an insight into the secret world of a VC, with unguarded stories involving large bets and big mistakes, and tales of how one juggles several investments at the same time.Rahul shows why being a VC is a constant journey of ups and downs, why building value is a long-term business, and why no amount of failure can be an excuse to lose optimism in the power of entrepreneurship.

Get Your Hands Dirty on Clean Architecture: A hands-on guide to creating clean web applications with code examples in Java


Tom Hombergs - 2019
    

Advanced Scala with Cats


Noel Welsh - 2017
    This means designing systems as small composable units, expressing constraints and interactions via the type system, and using composition to guide the construction of large systems in a way that maintains the original architectural vision.The book also serves as an introduction to the Cats library. We use abstractions from Cats, and we explain the structure of Cats so you can use it without fear in your own code base. The broad ideas are not specific to Cats, but Cats provides an excellent implementation that is beneficial to learn in its own right.

What's New in Java 7?


Madhusudhan Konda - 2011
    Madhusudhan Konda provides an overview of these, including strings in switch statements, multi-catch exception handling, try-with-resource statements, the new File System API, extensions of the JVM, support for dynamically-typed languages, and the fork and join framework for task parallelism.

21 Lessons: What I've Learned from Falling Down the Bitcoin Rabbit Hole


Gigi - 2020
    Like many others, I feel like I have learned more in the last couple of years studying Bitcoin than I have during two decades of formal education. The following lessons are a distillation of what I’ve learned. First published as an article series titled “What I’ve Learned From Bitcoin,” what follows can be seen as a third edition of the original series. Like Bitcoin, these lessons aren’t a static thing. I plan to work on them periodically, releasing updated versions and additional material in the future.Bitcoin is an inexhaustible teacher, which is why I do not claim that these lessons are all-encompassing or complete. They are a reflection of my personal journey down the rabbit hole. There are many more lessons to be learned, and every person will learn something different from entering the world of Bitcoin. I hope that you will find these lessons useful and that the process of learning them by reading won’t be as arduous and painful as learning them firsthand.

Windows Sysinternals Administrator's Reference


Mark E. Russinovich - 2009
    Guided by Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis, you’ll drill into the features and functions of dozens of free file, disk, process, security, and Windows management tools. And you’ll learn how to apply the book’s best practices to help resolve your own technical issues the way the experts do.Diagnose. Troubleshoot. Optimize.Analyze CPU spikes, memory leaks, and other system problems Get a comprehensive view of file, disk, registry, process/thread, and network activity Diagnose and troubleshoot issues with Active Directory® Easily scan, disable, and remove autostart applications and components Monitor application debug output Generate trigger-based memory dumps for application troubleshooting Audit and analyze file digital signatures, permissions, and other security information Execute Sysinternals management tools on one or more remote computers Master Process Explorer, Process Monitor, and Autoruns

Journey to Mars: What Our Journey To the Red Planet Might Look Like ?


Peter Thiel - 2019
    Putting people into places and situations unprecedented in history is stirred the imagination while the human experience was expanding and redefining. Yet, space exploration compels humans to confront a hostile environment of cosmic radiations, radical changes in the gravity and magnetic fields, as well as social isolation. Therefore, any space traveller is submitted to relevant health-related threats. In the twenty-first century, human space flight is poised to continue, but it will enjoy the ongoing developments in science and technology. It will become more networked, more global, and more oriented toward primary goals. A novel international human space flight policy could help achieve these objectives by clarifying the rationale, the ethics of acceptable risk, the role of remote presence, and the need for balance between funding and ambition to justify the risk of human lives. In order to address such a challenge, a preliminary careful survey of the available scientific data is mandatory to set forth adequate countermeasures. Envisaged solutions should provide a sound and technically feasible approach for counteracting microgravity and cosmic rays effects, which represent the main health risk for space crews. This objective must necessarily be sustained by national/international space agencies, which would coordinate their common efforts into a defined international spaceflight program.

Backtrack 5 Wireless Penetration Testing Beginner's Guide


Vivek Ramachandran - 2011
    Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along. If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.

Building Mobile Apps at Scale: 39 Engineering Challenges


Gergely Orosz - 2021
    By scale, we mean having numbers of users in the millions and being built by large engineering teams.For mobile engineers, this book is a blueprint for modern app engineering approaches. For non-mobile engineers and managers, it is a resource with which to build empathy and appreciation for the complexity of world-class mobile engineering.

Advanced Swift


Chris Eidhof - 2016
    If you have read the Swift Programming Guide, and want to explore more, this book is for you.Swift is a great language for systems programming, but also lends itself for very high-level programming. We'll explore both high-level topics (for example, programming with generics and protocols), as well as low-level topics (for example, wrapping a C library and string internals).

Exploring Internet


Sai Satish - 2014
    Exploring InternetBook target is to explore useful resources in internet for Researchers,Entrepreneurs,Students,TeachersDescriptionExploring Internet Order it online 1. Ch 1 Internet Introduction2. Ch 2 Communication tools3. Ch 3 internet for research4. Ch 4 Career booster5. Ch 5 Entrepreneur6. Ch 6 Build your website now7. Ch 7 SEO SNO8. Ch 8 Earning Money online9. Ch 9 Internet for U10. Ch 10 hidden resources11. Ch 11 Online Frauds12. Ch 12 Additional Chapter13. Ch 13 Tips n tricks

The REST API Design Handbook


George Reese - 2012
    The RESTful approach to web services design is rapidly become the approach of choice. Unfortunately, too few people have truly solid REST API design skills, and discussions of REST can become bogged down in dry theory.The REST API Design Handbook is a simple, practical guide to aid software engineers and software architects create lasting, scalable APIs based on REST architectural principles. The book provides a sound foundation in discussing the constraints that define a REST API. It quickly goes beyond that into the practical aspects of implementing such an API in the real world.Written by cloud computing expert George Reese, The REST API Design Handbook reflects hands on work in consuming many different third party APIs as well the development of REST-based web services APIs. It addresses all of the debates the commonly arise while creating these APIs. Subjects covered include:* REST architectural constraints* Using HTTP methods and response codes in an API* Authenticating RESTful API calls* Versioning* Asynchronous Operations* Pagination and Streaming* Polling and Push Notifications* Rate Limiting

Kindle Fire HD User Manual: The Complete User Guide With Instructions, Tutorial to Unlock The True Potential of Your Device in 30 Minutes (OCT 2015)


Jake Jacobs - 2013
    You'll also learn tips and tricks to help you unlock the true potential of your device. Here are just some of the essentials you'll learn from this book: - Master the settings of your Kindle Fire HD device - Drastically reduce charge time & boost battery life - Setting up and using wireless networks - Utilizing security features to safeguard your device - Increase productivity: Skype, Email, Cloud Storage, Reading Documents, File Explorer - Sync your Kindle Fire HD to your computer, transfer your music and video seamlessly - Enhance your shopping and entertainment experience on Amazon and more... Kindle Fire HD Manual: The Complete Guide To Getting The Most Out Of Your Kindle Device is a comprehensive step-by-step, no fluff guide to help you master your device in no time. Get it while it's still available at this low price! **Scroll to the top of the page and click the buy button on the right to download this book now!**

Making Games with Python & Pygame


Al Sweigart - 2012
    Each chapter gives you the complete source code for a new game and teaches the programming concepts from these examples. The book is available under a Creative Commons license and can be downloaded in full for free from http: //inventwithpython.com/pygame This book was written to be understandable by kids as young as 10 to 12 years old, although it is great for anyone of any age who has some familiarity with Python.

AWS Lambda: A Guide to Serverless Microservices


Matthew Fuller - 2016
    Lambda enables users to develop code that executes in response to events - API calls, file uploads, schedules, etc - and upload it without worrying about managing traditional server metrics such as disk space, memory, or CPU usage. With its "per execution" cost model, Lambda can enable organizations to save hundreds or thousands of dollars on computing costs. With in-depth walkthroughs, large screenshots, and complete code samples, the reader is guided through the step-by-step process of creating new functions, responding to infrastructure events, developing API backends, executing code at specified intervals, and much more. Introduction to AWS Computing Evolution of the Computing Workload Lambda Background The Internals The Basics Functions Languages Resource Allocation Getting Set Up Hello World Uploading the Function Working with Events AWS Events Custom Events The Context Object Properties Methods Roles and Permissions Policies Trust Relationships Console Popups Cross Account Access Dependencies and Resources Node Modules OS Dependencies OS Resources OS Commands Logging Searching Logs Testing Your Function Lambda Console Tests Third-Party Testing Libraries Simulating Context Hello S3 Object The Bucket The Role The Code The Event The Trigger Testing When Lambda Isn’t the Answer Host Access Fine-Tuned Configuration Security Long-Running Tasks Where Lambda Excels AWS Event-Driven Tasks Scheduled Events (Cron) Offloading Heavy Processing API Endpoints Infrequently Used Services Real-World Use Cases S3 Image Processing Shutting Down Untagged Instances Triggering CodeDeploy with New S3 Uploads Processing Inbound Email Enforcing Security Policies Detecting Expiring Certificates Utilizing the AWS API Execution Environment The Code Pipeline Cold vs. Hot Execution What is Saved in Memory Scaling and Container Reuse From Development to Deployment Application Design Development Patterns Testing Deployment Monitoring Versioning and Aliasing Costs Short Executions Long-Running Processes High-Memory Applications Free Tier Calculating Pricing CloudFormation Reusable Template with Minimum Permissions Cross Account Access CloudWatch Alerts AWS API Gateway API Gateway Event Creating the Lambda Function Creating a New API, Resource, and Method Initial Configuration Mapping Templates Adding a Query String Using HTTP Request Information Within Lambda Deploying the API Additional Use Cases Lambda Competitors Iron.io StackHut WebTask.io Existing Cloud Providers The Future of Lambda More Resources Conclusion