Object detection Part 2 – Configuration [Tensorflow]
Looking into the configuration file and talk about what the different parameters mean
We look closer at an encryption algorithm used in communication today in order to establish secrets at two endpoints.
We look at Redis, what it is, what we can use it for and how to run different commands against a Redis instance.
In this video we’re looking into Ceph performance! We’ll be comparing different storage solutions and versions, specifically Pacific and Quincy, to see how they stack up against each other. We’ll cover everything from speed and efficiency to scalability and reliability.
In this video, we look into how to set the proper TXT records in your DNS and sign your email to show up in the inbox of all email …
We look into the very basic commands of git. Making changes and committing to a branch.
In this video series, I try to challenge myself with the Advent of Code trials. Each solution will be published to Github, and I hope you will learn something from my coding mistakes and perhaps send some code my way on how you have done these challenges. I know by reading code, so this is…