Improving the performance of your imbalanced machine learning classifiers
Posted on January 17, 2021, Level beginner Resource Length medium
A comprehensive guide to handling imbalanced datasets. By Francis Adrian Viernes.
Junit 5 tutorial for beginners
Posted on January 10, 2021, Level beginner Resource Length long
Sai Upadhyayula wrote this piece about Junit. Junit 5 is one of the popular testing frameworks in the Java Development World. Even though JUnit 5 is a successor for Junit 4, the architecture of the framework is completely different, so let's have a look at the Architecture of Junit 5.
Architect's guide to APIs: SOAP, REST, GraphQL, and gRPC
Posted on January 9, 2021, Level beginner Resource Length long
There are many strategies for data exchange. Here's a primer on four essentials. By Bob Reselman.
10 reasons to try no-code apps for your mobile workforce
Posted on January 5, 2021, Level beginner Resource Length short
Whatever your 2021 business goals are, adopting no-code apps can bring you one step closer (many steps closer, if we're being honest) to reaching them — especially if you're managing a mobile workforce. By Sam Puckett.
Open source strategy of Amazon Web Services
Posted on December 28, 2020, Level beginner Resource Length medium
Did you know that Amazon leads more than 1,200 open source projects on GitHub? That number, which author got from the Open Source at AWS web page, was confirmed by Asay (Head of Open Source Strategy and Marketing at Amazon Web Services) to represent "officially sponsored projects" — meaning they are open source projects that began inside of AWS, rather than being independent projects run by AWS employees. By Richard MacManus.
Auth0 introduces adaptive MFA
Posted on December 15, 2020, Level beginner Resource Length medium
Adaptive MFA improves security and customer experience. According to Dashlane, the average US internet user has over 150 online accounts, with that number projected to double by 2022. By Randy Nasson and Antonio Fuentes.
How payment transaction processing works
Posted on December 11, 2020, Level beginner Resource Length short
Payment transactions occur in a matter of seconds. We can easily swipe our credit card or touch to pay, and there's an instant exchange of value. But it's not as simple as it seems. Behind every digital transaction is an intricate web of processes that enables nearly $2 trillion in payment volume. By privacy.com.
Tags infosec miscellaneous learning cio
Building your own design strategy as a UX designer
Posted on September 26, 2020, Level beginner Resource Length long
Having a defined process will help you work in a more organized and fluid way. Here are the key components of a UX workflow. By Mehek Kapoor.
How do routers work, really?
Posted on September 21, 2020, Level intermediate Resource Length long
This is the inside view of how exactly a router operates. You only need to know this if you are poking inside a router implementation. If that is the case, my condolences. By Kamila Součková.
A new twist on DNA origami
Posted on September 7, 2020, Level beginner Resource Length short
A team of scientists from Arizona State University and Shanghai Jiao Tong University (SJTU) has announced the creation of a new type of meta-DNA structures that will open up the fields of optoelectronics, including information storage and encryption as well as synthetic biology. By Jenny Green.
Tags miscellaneous learning cloud
Beyond the Sandbox: Signing and distributing macOS apps outside of the Mac App Store
Posted on August 11, 2020, Level intermediate Resource Length long
Since the advent of OS X Mojave and especially Catalina and the requirement for app notarization, some of us old-time macOS developers are concerned that Apple will pull the plug on the apps that we distribute ourselves. Many of you have downloaded and installed macOS software directly from websites, i.e., not from the Mac App Store. Have you ever really considered it? By Andrew Jaffee.
Data breaches could cost you hundreds of millions
Posted on August 6, 2020, Level beginner Resource Length short
Mega breaches that compromise 50m records or more cost businesses $392m on average. By Anthony Spadafora.