An API for integrating Java applications with telephony services, enabling voice, fax, call control, and media management.
You will find this term commonly used in Telecommunications, Software Development
An API of 2D spatial predicates and functions for processing geometry.
You will find this term commonly used in GIS, Software Development
An open-source automated functional testing tool for Java and HTML applications.
You will find this term commonly used in Software Testing, Automation
A high-level, high-performance dynamic programming language for technical computing, with syntax that is familiar to users of other technical computing environments.
You will find this term commonly used in Programming, Data Science
In computer programming, an instruction that causes the execution to jump to a different part of the program.
You will find this term commonly used in Software Development, Programming
A controlled entry point into a network or between network segments, often used in secure environments as a bridge for accessing internal systems.
You will find this term commonly used in Networking, Security
Validates the candidate's understanding of networking fundamentals and core functionality of the Juniper Networks Junos OS.
You will find this term commonly used in Networking
A simple framework to write repeatable tests, with an emphasis on testing Java projects.
You will find this term commonly used in Software Testing, Software Development
The foundation for launching testing frameworks on the JVM, providing a TestEngine API for developing new testing frameworks that run on the platform.
You will find this term commonly used in Software Testing, Software Development
A component in the JUnit framework that allows for the execution of tests, supporting custom test runners for specialized testing scenarios.
You will find this term commonly used in Software Testing, Java
A collection of test cases, test classes, and other test suites combined into a single entity, so that tests can be executed together as a group.
You will find this term commonly used in Software Testing, Java
The next generation of JUnit, a new programming model for testing Java applications, with new features and improvements over its predecessor.
You will find this term commonly used in Software Testing, Software Development
An open-source project that supports interactive data science and scientific computing across all programming languages.
You will find this term commonly used in Data Science, Interactive Computing
The programming language-specific backends used by Jupyter interactive computing notebooks. Each kernel runs and interprets the code written in a notebook's cells.
You will find this term commonly used in Data Science, Interactive Computing
An open-source web application that allows you to create and share documents that contain live code, equations, visualizations, and narrative text.
You will find this term commonly used in Data Science, Machine Learning
Plugins or add-ons for Jupyter Notebooks that extend the functionality of the notebook environment with additional features, tools, and visualizations.
You will find this term commonly used in Data Science, Tooling
Interactive UI controls for Jupyter notebooks, allowing for interactive data visualization and user interfaces within Jupyter notebooks.
You will find this term commonly used in Data Science, Interactive Computing
A multi-user version of the notebook designed for classrooms, labs, and data science teams, providing user management and integration with infrastructure.
You will find this term commonly used in Data Science, Collaboration
An interactive development environment for notebooks, code, and data, extending the Jupyter Notebook project.
You will find this term commonly used in Data Science, Machine Learning
A storage strategy that combines multiple hard drives into a single logical unit, but unlike RAID, does not provide any redundancy or performance improvement.
You will find this term commonly used in Storage, Hardware
A security technology that enables delegated administration for anything that can be managed with PowerShell.
You will find this term commonly used in Security, System Administration
A minimal operating system tailored to the specific needs of an application, such as a virtual appliance.
You will find this term commonly used in Operating Systems, Virtualization
A component of the runtime environment that improves the performance of Java applications by compiling bytecode into native machine code at runtime.
You will find this term commonly used in Java, Performance Optimization
An abstract machine that enables a computer to run a Java program.
You will find this term commonly used in Software Development, Programming
The instruction set of the Java Virtual Machine. Java programs are compiled into bytecode, which JVM can interpret or JIT-compile to native machine code.
You will find this term commonly used in Programming, Java
The runtime data area in the Java Virtual Machine from which memory for all class instances and arrays is allocated.
You will find this term commonly used in Programming, Java
A compiler for languages other than Java (like Kotlin, Scala, Groovy) that targets the JVM, enabling these languages to leverage the JVM’s capabilities.
You will find this term commonly used in Programming, Compilers
Languages that are designed to run on the Java Virtual Machine, besides Java itself, such as Kotlin, Scala, and Groovy.
You will find this term commonly used in Programming, Software Development
A tool for profiling Java applications running on the Java Virtual Machine, providing insights into CPU, memory usage, and other metrics.
You will find this term commonly used in Performance Optimization, Software Development
The process of monitoring various metrics in the JVM, such as heap usage, method execution times, and thread usage, to identify bottlenecks and optimize performance.
You will find this term commonly used in Java, Performance Optimization
The portion of memory that contains method calls and local variables during runtime, with each thread in a Java application having its own stack.
You will find this term commonly used in Programming, Java
Command-line options that modify the behavior of the Java Virtual Machine, used to adjust performance characteristics and behavior of Java applications.
You will find this term commonly used in Performance Optimization, Java
An interface used by development and monitoring tools to interact with the JVM.
You will find this term commonly used in Development Tools, Java
The process of optimizing the performance of the Java Virtual Machine (JVM) parameters that affect its behavior.
You will find this term commonly used in Performance Optimization, Java
A set of APIs for creating web services in Java. It includes standards and APIs for SOAP web services, RESTful web services, and more.
You will find this term commonly used in Web Development, Java
A framework developed by Sun Microsystems that allows users to start application software for the Java Platform directly from the Internet using a web browser.
You will find this term commonly used in Software Deployment, Java
An open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object.
You will find this term commonly used in Security, Web Development
A special kind of token that can be used to obtain a renewed JWT, often used in authentication processes to allow users to stay authenticated without re-entering credentials.
You will find this term commonly used in Security, Authentication
An implementation of Python that runs on the Java platform, allowing the integration of Python and Java components.
You will find this term commonly used in Software Development, Programming
An implementation of Python that runs on the Java platform, allowing for Python scripts to interact with Java APIs and libraries.
You will find this term commonly used in Software Development, Python/Java
A property of anonymized data indicating that each record is indistinguishable from at least k-1 other records with respect to certain identifying attributes, used to protect privacy in data sets.
You will find this term commonly used in Data Privacy, Security
A simple, versatile, and easy-to-implement supervised machine learning algorithm that can be used for classification and regression tasks, based on finding the most similar data points (neighbors) in the training data.
You will find this term commonly used in AI, Machine Learning
A distributed hash table for decentralized peer-to-peer computer networks, used in various decentralized services to improve scalability and fault tolerance.
You will find this term commonly used in Networking, Peer-to-Peer
A distributed streaming platform that lets you publish and subscribe to streams of records, store records in a fault-tolerant way, and process them as they occur.
You will find this term commonly used in Big Data, Messaging Systems
A proprietary antivirus program developed by Kaspersky Lab.
You will find this term commonly used in Cybersecurity
A unit of data transfer rate equal to 1,000 bits per second, used in telecommunications and computing to measure bandwidth.
You will find this term commonly used in Networking, Internet Technology
A message sent between two devices to check if the other is still available or to prevent a connection from timing out.
You will find this term commonly used in Networking, Internet Technology
A network authentication protocol designed to provide strong authentication for client/server applications by using secret-key cryptography.
You will find this term commonly used in Security, Cybersecurity
A network authentication protocol that uses tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.
You will find this term commonly used in Security, Network Authentication
A secure method for authenticating a request for a service in a computer network. Kerberos uses secret-key cryptography and requires a trusted third party, and it is designed to authenticate users to network services securely.
You will find this term commonly used in Network Security, Authentication
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
Start for only $1. Unlock endless learning opportunities with over 2,600 hours of IT training at our lowest price ever. Plus, get all new and updated online courses for free while your subscription remains active.
Cancel at your convenience. This exceptional deal on IT training provides you access to high-quality IT education at the lowest monthly subscription rate in the market. Boost your IT skills and join our journey towards a smarter tomorrow.
ENDING THIS WEEKEND: Train for LIFE at our lowest price. Buy once and never have to pay for IT Training Again.