2015 | 2016 Academic Catalog General Information

Total Page:16

File Type:pdf, Size:1020Kb

2015 | 2016 Academic Catalog General Information 2015 | 2016 ACADEMIC CATALOG GENERAL INFORMATION Understanding this Guide ADMISSIONS 651-423-8000 | [email protected] This catalog contains sample course sequences for completing degrees, diplomas and certificates at Dakota County Technical College (DCTC). Please note that the sequence samples Students interested in exploring higher education options shown are only one of many options. You should meet with and those beginning the application process are encouraged an instructor or academic advisor to discuss a sequence that to attend DCTC’s Campus Visit (Every Tuesday 12:45-2:30 fits your schedule and meets your educational goals. For the p.m., no reservation required). At the visit, students are given most up-to-date information, visit dctc.edu. the opportunity to gather information on the college, the admissions requirements, and visit classrooms, labs and shops. Accreditation & Approvals DCTC is fully accredited by the Higher Learning Commission New Student Admission of the North Central Association of Colleges and Schools. Students pursuing a degree, diploma, or certificate must DCTC also holds occupationally specific accreditation in a complete the following admissions requirements: number of its programs. 1. Submit a DCTC Application • The Landscape Horticulture major is nationally Available in Student Services, or online at accredited the Professional Landcare Network dctc.edu/go/onlineapp (PLANET). 2. Pay a $20 non-refundable application fee • The Dental Assistant major is accredited by the Online payment is accepted with a credit Commission on Dental Accreditation of the American card at dctc.edu/go/admissions Dental Association. 3. Complete the ACCUPLACER Placement Test • The Medical Assistant Program is accredited by For a testing schedule, call 651-423-8000 or visit dctc. the Commission on Accreditation of Allied Health edu/go/accuplacer Education Programs (CAAHEP www.caahep.org; 1361 Park St. Clearwater, FL) upon the recommendation of the Medical Assisting Education Review Board 4. Complete an immunization form (MAERB). Available at DCTC or online at dctc.edu/go/admissions • The Automotive Technician program, Auto Body 5. Submit transcripts Collision Technology program, Automotive Service All students must submit a copy of their high school Educational Program, and Heavy Duty Truck program transcript or high school diploma. GED recipients must are accredited by the National Automotive Technicians provide a copy of their GED certificate. Official college Educator Foundation, Inc. (NATEF). transcripts are required from students with previous degrees or when transferring in credits. Official non-MnSCU college • The Heavy Construction Equipment program is transcripts must be sent directly from the previous college accredited by the Association of Equipment Distributors in a sealed envelope. (AED) Foundation. Note: Applicants must have a High School Diploma or GED to • The Electrical Construction Maintenance program is approved by the Minnesota Board of Electricity. apply for financial aid. • The Energy Technical Specialist – Nuclear program is In addition, applicants to specific programs must meet certified by a Challenge Board of the Nuclear Energy published, program-specific admissions requirements. Institute (NEI). DCTC meets established standards and is approved for the Returning Student Admission instruction of veterans, orphans of war veterans, state and Students in continuous programs who have been absent federal rehabilitation students, and members of the workforce for one or more terms must comply with the admission needing training or retraining. DCTC meets the definition of an requirements that are in effect when returning to DCTC. institution of higher education, and students who qualify may Contact Admissions for more information. participate in federal financial assistance programs. DAKOTA COUNTY TECHNICAL COLLEGE | 651-423-8000 | [email protected] | WWW.DCTC.EDU Transfer Student Admission Post-Secondary Enrollment Option (PSEO) A student wishing to transfer credits into Dakota County Eligibility and Admission Technical College must complete the new student admissions High school students eligible for Post-Secondary Enrollment process and designate a major field of study. Option must be in the upper half of their senior class or have a composite score of 21 or higher on the ACT. Juniors must be Only those courses that are applicable to a student’s chosen in the upper third of the their junior class, or have a composite degree, certificate, or major will be considered for transfer. score of 24 or highter on the ACT. Sohopmores may take one Transfer credits need to have a grade of C- or higher and career-technical class if they passed the MCA 8th grade reading be from a college with a regional accreditation of colleges test. PSEO applicants from alternative learning centers and/or and schools (North Central, Middle States, etc) in order to be home schools must achieve qualifying scores on the ACT. considered for transfer. DCTC PSEO applications for PSEO students are available at For an unofficial review of general education courses, contact DCTC or online at dctc.edu/go/pseo. PSEO applicants must Colleen Moser at [email protected]. For a review of also submit a PSEI Program Notice of Student Registration technical credits, contact an enrollment advisor in Student form signed by their high school counselor, high school Services. Official transcripts are not necessary for an unofficial transcript, accuplacer test, submit ACT scores(for those that review but will be required for final verification and transcription do not meet the class rank qualifier). of transfer credits. To discuss PSEO options at DCTC, call Karianne Loula at 651-423-8298, Susan Kingsbury at 651-423-8537, or email International Student Admission [email protected]. Dakota County Technical College seeks a culturally diverse campus and welcomes applications from students from other PSEO Admission Deadline countries. DCTC staff will evaluate each application and June 1 for fall semster determine whether to issue an I-20 (Certificate of Eligibility November 1 for spring semester for Non-Immigrant Student Status) form after receiving the following documentation: ACCUPLACER Placement Test 1. Submit International application form with $20 The ACCUPLACER test is an assessment of reading application fee. comprehension, sentence skills and mathematics skills. 2. Provide proof of English proficiency (Official Students entering some programs will also need an TOEFL score of 61 or higher OR Accuplacer elementary algebra assessment. The results provide advisors qualifying scores on Reading Comprehension (45 with information needed for course placement. or higher) and Sentence Skill (70 or higher) OR Official U.S. college or university transcript with an English composition/writing course with a “C” Testing is available on a walk-in basis Monday-Friday. Call or better.). 651-423-8000 or visit dctc.edu/go/accuplacer for the testing 3. Complete and submit the Financial Responsibility schedule. Students who have completed an associate’s Form. degree, bachelor’s degree or graduate degree may be 4. Provide copy of passport, birth certificate, and/or exempt from the test, but need to complete an exemption visa. form and provide official transcripts before an exemption 5. Provide proof of high school completion (copy of decision is made. high school certificate/transcript translated into English). 6. Send official U.S. college transcripts (if applicable). 7. Provide documentation of immunization and Selection of Major vaccination history. It is recommended that students declare a major upon 8. Provide F-1 Transform Form, a copy of original enrollment at the college. Majors may be changed, depending I-20, a copy of your visa, and a copy of your upon factors such as student interest and success. Before I-94 form (for students with an F-1 visa who are completing an application to attend DCTC, new students transferring to DCTC). may meet with an advisor to determine their major. International students are sent written notification of acceptance and an I-20 after all documents are received and reviewed. Undeclared Major Students not pursuing a degree, diploma, or certificate do International students pay the resident tuition rate. not need to complete the admissions process if they do not intend to: International Student Admission Deadline June 1 for Fall Semester 1. Receive veterans’ benefits November 1 for Spring Semester 2. Transfer credits toward a degree, diploma, or certificate 3. Receive financial aid DAKOTA COUNTY TECHNICAL COLLEGE | 651-423-8000 | [email protected] | WWW.DCTC.EDU Residency REGISTRATION Residency status will be as determined by Minnesota Statute 651-423-8038 | [email protected] 135A.031, subd.2. A complete explanation of state residency requirements is available in Student Services. Full-Time and/or Degree Seeking Students After new students are admitted to the college, they will Credits be invited to attend a New Student Advising/Registration Students completing 15 to 18 credits per semester will finish session. During the session students will be given necessary most programs in an average length of time. Students taking information to ensure a successful college registration 12 or more credits are considered full-time students. Check experience. Following the presentation, students will meet with Student Services on current definitions as they apply to with an advisor to select courses for the term and they will specific
Recommended publications
  • A Flexible Framework for File System Benchmarking &Pivot
    ;login SPRING 2016 VOL. 41, NO. 1 : & Filebench: A Flexible Framework for File System Benchmarking Vasily Tarasov, Erez Zadok, and Spencer Shepler & Pivot Tracing: Dynamic Causal Monitoring for Distributed Systems Jonathan Mace, Ryan Roelke, and Rodrigo Fonseca & Streaming Systems and Architectures: Kafka, Spark, Storm, and Flink Jayant Shekhar and Amandeep Khurana & BeyondCorp: Design to Deployment at Google Barclay Osborn, Justin McWilliams, Betsy Beyer, and Max Saltonstall Columns Red/Blue Functions: How Python 3.5’s Async IO Creates a Division Among Function David Beazley Using RPCs in Go Kelsey Hightower Defining Interfaces with Swagger David N. Blank-Edelman Getting Beyond the Hero Sysadmin and Monitoring Silos Dave Josephsen Betting on Growth vs Magnitude Dan Geer Supporting RFCs and Pondering New Protocols Robert G. Ferrell UPCOMING EVENTS NSDI ’16: 13th USENIX Symposium on Networked USENIX Security ’16: 25th USENIX Security Systems Design and Implementation Symposium March 16–18, 2016, Santa Clara, CA, USA August 10–12, 2016, Austin, TX, USA www.usenix.org/nsdi16 www.usenix.org/sec16 Co-located with NSDI ’16 Co-located with USENIX Security ’16 CoolDC ’16: USENIX Workshop on Cool Topics on WOOT ’16: 10th USENIX Workshop on Offensive Sustainable Data Centers Technologies March 19, 2016 August 8–9, 2016 www.usenix.org/cooldc16 Submissions due May 17, 2016 www.usenix.org/woot16 SREcon16 CSET ’16: 9th Workshop on Cyber Security April 7–8, 2016, Santa Clara, CA, USA Experimentation and Test www.usenix.org/srecon16 August 8, 2016 Submissions
    [Show full text]
  • Article 15 Phoenix Telecommunications
    The Cover The upper cover image is an artist’s concept of the Phoenix Lander with legs deployed and thrusters on just before landing on the surface of Mars. This rendition was created by Corby Waste of JPL in 2003. As the Mars program artist, he has created artwork for several Mars missions [1]. During lander surface operations, the Phoenix project generated many exotic images from Mars. One of these, the lower cover image [2], is a vertical projection that combines hundreds of exposures taken by the lander’s Surface Stereo Imager camera and projects them as if looking down from above. The black circle is where the camera itself is mounted on the lander, out of view in images taken by the camera. North is toward the top of the image. This view comprises more than 100 different Stereo Surface Imager pointings, with images taken through three different filters at each pointing. The images were taken in the period from the 13th Martian day, or sol, after landing to the 47th sol (June 5 through July 12, 2008). The lander's Robotic Arm appears cut off in this mosaic view because component images were taken when the arm was out of the frame. DESCANSO Design and Performance Summary Series Article 15 Phoenix Telecommunications J im T aylor Stan Butman C had E dwards P eter I lott R ichard K ornfeld Dennis L ee Scott Shaffer Gina Signori J et Pr opulsion L abor ator y C alifornia I nstitute of T echnology Pasadena, California National Aeronautics and Space Administr ation J et Pr opulsion L abor ator y C alifor nia I nstitute of T echnology Pasadena, California August 2010 This research was carried out at the Jet Propulsion Laboratory, California Institute of Technology, under a contract with the National Aeronautics and Space Administration.
    [Show full text]
  • TAG, It's You! a NEW SPIN on an OLD GAME
    Student Life Magazine The University of Advancing Technology Issue 5 SUMMER/FALL 2009 03 TAG, IT’S YOU A New Spin on an Old Game S N A P I T 50 D IGITAL DREAMS DO COME TRUE a Western Short FILM Destined for Greatness 24 Rise to The Surface Three Students Build a Multi-Touch Computer $6.95 SUMMER/FALL T.O.C. • • • LOOK FOR THESE MICROSOFT TAGS 04 TAG, IT'S YOU! A NEW SPIN ON AN OLD GAME TA B L E O F CON T E N T S GEEK 411 ISSUE 5 SUMMER/FALL 2009 ABOUT UAT 10 WE’RE TAKING OVER THE WORLD. JOIN US. 32 GET GEEKALICIOUS: T-SHIRT SALE 41 THE BRICKS (OUR AWESOME FACULTY) 49 THE MORTAR (OUR AWESOME STAFF) INSIDE THE TECH WORLD FEATURE 6 BIG BRAIN EVENTS STORIES 26 DEADLY TALENTED ALUMNI 35 WHAT'S YOUR GEEK IQ? 36 GO PLAY WITH YOUR DOTS 24 RISE TO THE SURFACE 38 WHAT’S HOT, WHAT’S NOT ThE RE STUDENTS BUILD A MULTI-TOUCH COMPUTER 42 DAYS OF FUTURE PAST 45 GADGETS & GIZMOS GEEK ESSENTIALS 12 GEEKS ON TOUR 18 DAY IN THE LIFE OF A DORM GEEK 30 LET THE TECH GAMES BEGIN 40 YOU KNOW YOU WANT THIS 46 HOW WE GOT SO AWESOME 47 WE GOT WHAT YOU NEED 22 GEEKILY EVER AFTER 54 GEEKS UNITE – CLUBS AND GROUPS HWTOO W UAT STUDENTS FELL IN LOVE AT FIRST SHOT STORIES ABOUT REALLY SMART PEOPLE 8 INVASION OF THE STAY PUFT BUNNY 29 RAY KURZWEIL 34 GEEK BLOGS 50 COWBOY DREAMS 20 DAVID WESSMAN IS THE MAN UAP T ROFESSOR DIRECTS FILM 16 LIVING THE GEEK DREAM 33 INTRODUCING… NEW GEEKS 14 WE DO STUFF THAT MATTERS 2 | GEEK 411 | UAT STUDENT LIFE MAGAZINE 09UT A 151 © CONTENTS COPYRIGHT BY FABCOM 20092008 LOOK FOR THESE MICROSOFT TAGS THROUGHOUT THIS S ISSUE OF GEEK 411 N AND TAG THEM A P TO GET MORE OF I THE STORY OR T BONUS CONTENT.
    [Show full text]
  • Mojolicious Web Clients Brian D Foy Mojolicious Web Clients by Brian D Foy
    Mojolicious Web Clients brian d foy Mojolicious Web Clients by brian d foy Copyright 2019-2020 © brian d foy. All rights reserved. Published by Perl School. ii | Table of contents Preface vii What You Should Already Know . viii Some eBook Notes ........................... ix Installing Mojolicious ......................... x Getting Help .............................. xii Acknowledgments . xiii Perl School ............................... xiv Changes ................................. xiv 1 Introduction 1 The Mojo Philosophy .......................... 1 Be Nice to Servers ........................... 4 How HTTP Works ........................... 6 Add to the Request ........................... 15 httpbin ................................. 16 Summary ................................ 18 2 Some Perl Features 19 Perl Program Basics .......................... 19 Declaring the Version ......................... 20 Signatures ................................ 22 Postfix Dereference ........................... 25 Indented Here Docs ........................... 25 Substitution Returns the Modified Copy . 26 Summary ................................ 27 3 Basic Utilities 29 Working with URLs .......................... 30 Decoding JSON ............................. 34 Collections ............................... 45 Random Utilities ............................ 50 TABLE OF CONTENTS | iii Events .................................. 52 Summary ................................ 55 4 The Document Object Model 57 Walking Through HTML or XML ................... 57 Modifying
    [Show full text]
  • SAPUI5 – Das Umfassende Handbuch 699 Seiten, Gebunden, November 2016 79,90 Euro, ISBN 978-3-8362-4456-5
    SAP-Wissen aus erster Hand. Leseprobe Mit diesem Buch tauchen Sie ein in die Anwendungsentwicklung mit SAPUI5 und lernen alles, was Sie über Design, Programmie- rung und Betrieb der Apps wissen müssen. In dieser Leseprobe erläutern die Autoren die allgemeine Nutzung von SAPUI5 sowie deren Modelltypen und erörtern die unterschiedlichen Formen des Data Bindings. »Modelle und Bindings« »Einleitung« Inhaltsverzeichnis Index Die Autoren Leseprobe weiterempfehlen Christiane Goebels, Denise Nepraunig, Thilo Seidel SAPUI5 – Das umfassende Handbuch 699 Seiten, gebunden, November 2016 79,90 Euro, ISBN 978-3-8362-4456-5 www.sap-press.de/4303 4456.book Seite 161 Mittwoch, 9. November 2016 10:03 10 Kapitel 5 In diesem Kapitel erörtern wir die allgemeine Nutzung von SAPUI5 und die darin enthaltenen Modelltypen sowie das Data Binding. 5 Modelle und Bindings Im vorherigen Kapitel 4, »Aufbau von MVC-Anwendungen«, haben wir er- läutert, wie Modelle als Datencontainer funktionieren, in denen sämtliche Geschäftsdaten enthalten sind, die in Ihrer Anwendung verarbeitet werden. SAPUI5 wird mit verschiedenen vordefinierten, einsatzbereiten Modellklas- sen bereitgestellt. In der Beispielanwendung haben Sie schon ein JSON- und ein Ressourcenmodell in Aktion gesehen. In diesem Kapitel erklären wir die- se Modelltypen genauer, und Sie erfahren mehr über die Bindungsfunktio- nalität, die in allen Anwendungen zum Einsatz kommt. Data Binding beinhaltet das Verbinden von Daten, die in einem bestimmten Modell in einer Anwendung verfügbar sind, mit einem bestimmten Teil der Benutzeroberfläche auf dem Bildschirm. Diese Verbindung kann entweder unidirektional oder bidirektional sein. Bei der ersten Verbindung werden die Daten aus dem Modell bereitgestellt, und die Modelldaten bleiben un- berührt, wenn sie in der Benutzeroberfläche geändert werden.
    [Show full text]
  • Phoenix Law Review
    PHOENIX LAW REVIEW VOLUME 7FALL 2013 NUMBER 1 Published by Phoenix School of Law Phoenix, Arizona 85004 Published by Phoenix Law Review, Phoenix School of Law, One North Central Avenue,14th Floor, Phoenix, Arizona 85004. Phoenix Law Review welcomes the submission of manuscripts on any legal topic and from all members of the legal community. Submissions can be made via ExpressO at http://law.bepress.com/expresso, via e-mail to [email protected], or via postal service to: Submissions Editor Phoenix Law Review Phoenix School of Law 1 North Central Avenue 14th Floor Phoenix, Arizona 85004 We regret that manuscripts cannot be returned. All submissions should conform to the rules of citation contained in the most recent edition of The Bluebook: A Uniform System of Citations, published by the Harvard Law Review Association. Phoenix Law Review is published twice each year or more by the Phoenix School of Law. Subscription rates are $50.00 per year for United States addresses and $64.00 per year for addresses in other countries. Subscriptions are renewed automatically unless notice to cancel is received. Subscriptions may be discontinued only at the expiration of the current volume. Direct all communications to the Administrative Editor at the address given above. Copyright © 2013 by Phoenix Law Review on all articles, comments, and notes, unless otherwise expressly indicated. Phoenix Law Review grants per- mission for copies of articles, comments, and notes on which it holds a copy- right to be made and used by nonprofit educational institutions, provided that the author and Phoenix Law Review are identified and proper notice is affixed to each copy.
    [Show full text]
  • Evaluation of Password Hashing Schemes in Open Source Web
    Evaluation of Password Hashing Schemes in Open Source Web Platforms Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis Department of Digital Systems, University of Piraeus, Piraeus, Greece {dadoyan, stefmal, xenakis}@unipi.gr Abstract: Nowadays, the majority of web platforms in the Internet originate either from CMS to easily deploy websites or by web applications frameworks that allow developers to design and implement web applications. Considering the fact that CMS are intended to be plug and play solutions and their main aim is to allow even non-developers to deploy websites, we argue that the default hashing schemes are not modified when deployed in the Internet. Also, recent studies suggest that even developers do not use appropriate hash functions to protect passwords, since they may not have adequate security expertise. Therefore, the default settings of CMS and web applications frameworks play an important role in the security of password storage. This paper evaluates the default hashing schemes of popular CMS and web application frameworks. First, we formulate the cost time of password guessing attacks and next we investigate the default hashing schemes of popular CMS and web applications frameworks. We also apply our framework to perform a comparative analysis of the cost time between the various CMS and web application frameworks. Finally, considering that intensive hash functions consume computational resources, we analyze hashing schemes from a different perspective. That is, we investigate if it is feasible and under what conditions to perform slow rate denial of service attacks from concurrent login attempts. Through our study we have derived a set of critical observations.
    [Show full text]
  • Winter 2016 Vol
    ;login WINTER 2016 VOL. 41, NO. 4 : & Your Cores Are Slacking Off Jean-Pierre Lozi, Baptiste Lepers, Justin Funston, Fabien Gaud, Vivien Quéma, and Alexandra Fedorova & BeyondCorp Part III: The Access Proxy Luca Cittadini, Batz Spear, Betsy Beyer, and Max Saltonstall & OpenLambda for Microservices Scott Hendrickson, Stephen Sturdevant, Edward Oakes, Tyler Harter, Venkateshwaran Venkataramani, Andrea Arpaci-Dusseau, and Remzi Arpaci-Dusseau & Tuning ZFS for Databases Allan Jude and Michael W. Lucas & Interview with Fyodor Vaskovich Rik Farrow Columns Understanding Python Metaclasses David Beazley Monitoring Your Monitoring Systems Dave Josephsen Forecasting the Weather with Dark Sky David N. Blank-Edelman Extending Go Applications with Exec Plugins Kelsey Hightower Rising Tide of IoT Devices Dan Geer Idiot-Blockers for the Internet Robert G. Ferrell UPCOMING EVENTS LISA16 USENIX ATC ’17: 2017 USENIX Annual Technical December 4–9, 2016, Boston, MA, USA Conference www.usenix.org/lisa16 July 12-14, 2017, Santa Clara, CA, USA Co-located with LISA16 Submissions due February 7, 2017 www.usenix.org/atc17 SESA ’16: 2016 USENIX Summit for Educators in System Administration Co-located with USENIX ATC ’17 December 6, 2016 HotCloud ’17: 9th USENIX Workshop on Hot Topics www.usenix.org/sesa16 in Cloud Computing July 10-11, 2017, Santa Clara, CA, USA USENIX Journal of Education in System Administration Submissions due March 14, 2017 (JESA) www.usenix.org/hotcloud17 Published in conjunction with SESA www.usenix.org/jesa HotStorage ’17: 9th USENIX Workshop
    [Show full text]
  • Nick Goepper's Slippery Slope
    DPYMONDAYEO,FEBRUARY 19,2018NGCHLATIMANES.COM/OLYMPICS G Harry How Getty Images MONIQUE LAMOUREUX-MORANDO and the United States leave Minnamari Tuominen and Finland in their wake in beating the world’s third-ranked team for a YOsecond time in these Games.URIf Canada beats the Olympic AthletesMOfrom Russia, it will play theVEU.S. for the gold for the fourth,time EH?in the past five Olympics. ticipated rematch of the previous U.S. advances to two Olympic finals will take place Thursday at Gangneung Hockey gold-medal game, Centre. Count on it happening. The Ca- a seemingly sure nadians already crushed the Rus- sians 5-0 in the opening round of this tournament. Canada rematch “We worked the last four years to put ourselves in position to win a gold medal,” captain Meghan Dug- UNITED STATES 5 gan said. FINLAND 0 These are the sixth Olympics to include women’s hockey, but the By Dylan Hernandez sport as a whole remains painfully backward, as the national pro- PYEONGCHANG, South Ko- grams outside of the Americans’ rea — None of the last10 days really and Canadians’ are in the athletic mattered and that included Mon- Stone Age. day, when the United States Finland was the perfect exam- cruised to a 5-0 victory over Fin- ple of that. The Fins are the world’s land in the semifinals of the third-ranked team but they had as Olympic women’s hockey tourna- much a chance of upsetting the ment. U.S. as they did of brokering world The 17 games played up to this peace.
    [Show full text]
  • Angularjs in 60 Minutes
    AngularJS in 60 Minutes by Dan Wahlin Transcription and Arrangement by Ian Smith © 2013 Wahlin Consulting 1 | P a g e A Quick Note About Custom Onsite/Online Training I love speaking at user groups and conferences and enjoy contributing content such as the AngularJS video and this document (that Ian Smith was kind enough to create) to the general development community. But, for my day job I run The Wahlin Group which provides custom onsite training on a variety of technologies that I love working with. We cover a wide range of technologies such as: AngularJS JavaScript JavaScript Patterns jQuery Programming Web Technology Fundamentals Node.js Responsive Design .NET Technologies C# Programming C# Design Patterns ASP.NET MVC ASP.NET Web API WCF End-to-end application development classes are also available We fly all around the world to give our training classes and train developers at companies like Intel, Microsoft, UPS, Goldman Sachs, Alliance Bernstein, Merck, various government agencies and many more. Online classes are also available. Please contact us at [email protected] if you're interested in onsite or online training for your developers. Forthcoming “AngularJS JumpStart” Book by Dan Wahlin Since this video was recorded Dan has been working on tidying up the original transcription presented here and expanding it. He’s added so much new information that this is now going to be published as a book, most probably entitled “AngularJS JumpStart The response to the original video has been phenomenal (and rightly so – it’s the best one hour training for developers new to Angular I’ve seen – and I’ve seen a LOT of Angular training!) I expect the response to the book to be even more enthusiastic and can’t wait.
    [Show full text]
  • Technology Radar Prepared by the Thoughtworks Technology Advisory Board OCTOBER 2012 Thoughtworks.Com/Radar OCTOBER 2012
    Technology Radar Prepared by the ThoughtWorks Technology Advisory Board OCTOBER 2012 thoughtworks.com/radar OCTOBER 2012 What’s new? Here are the trends highlighted in this edition: Mobile—As mobile is rapidly becoming the primary way that people access the internet, this needs to be factored in to new enterprise application strategy, product strategy and implementation – from “mobile first” design all the way through to a new breed of testing tools. Accessible Analytics—Big Data does not have to equal Big Budgets. A combination of open-source tooling and cloud-based infrastructure provides a more readily accessible analytics and visualization approach. Simple architectures—Simple continues to gain traction, including both techniques for building and composing applications, as well as infrastructure-based techniques to enable simple deployment, failover and recovery. This theme is a recurring one for us, but we have not yet seen the usage shifts we believe are necessary. Reproducible environments—Tools supporting the standardization, set-up automation and coordinated management of development, test and production environments for both internally hosted and public cloud environments feature prominently on this edition of the radar. Data persistence done right—As NoSQL databases are maturing and gaining acceptance, an understanding of the patterns for use (and abuse) becomes imperative. Introduction ThoughtWorkers are passionate about technology. We build it, research it, test it, open source it, write about it, and constantly aim to improve it – for everyone. Our mission is to champion software excellence and revolutionize IT. We create and share the ThoughtWorks Technology Radar in support of that mission. The ThoughtWorks Technology Advisory Board, a group of senior technology leaders in ThoughtWorks, creates the radar.
    [Show full text]
  • Web Scraping with Python
    www.it-ebooks.info www.it-ebooks.info Web Scraping with Python Collecting Data from the Modern Web Ryan Mitchell Boston www.it-ebooks.info Web Scraping with Python by Ryan Mitchell Copyright © 2015 Ryan Mitchell. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://safaribooksonline.com). For more information, contact our corporate/ institutional sales department: 800-998-9938 or [email protected]. Editors: Simon St. Laurent and Allyson MacDonald Indexer: Lucie Haskins Production Editor: Shiny Kalapurakkel Interior Designer: David Futato Copyeditor: Jasmine Kwityn Cover Designer: Karen Montgomery Proofreader: Carla Thornton Illustrator: Rebecca Demarest June 2015: First Edition Revision History for the First Edition 2015-06-10: First Release See http://oreilly.com/catalog/errata.csp?isbn=9781491910276 for release details. The O’Reilly logo is a registered trademark of O’Reilly Media, Inc. Web Scraping with Python, the cover image, and related trade dress are trademarks of O’Reilly Media, Inc. While the publisher and the author have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the author disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work. Use of the information and instructions contained in this work is at your own risk. If any code samples or other technology this work contains or describes is subject to open source licenses or the intellectual property rights of others, it is your responsibility to ensure that your use thereof complies with such licenses and/or rights.
    [Show full text]