Ransomware: When to pay (and when not to)
While most security professionals argue against paying the ransom, there are some cases where paying is the right choice for an organization. Learn what to consider, and how to decide.
Practical resources for getting things done.
While most security professionals argue against paying the ransom, there are some cases where paying is the right choice for an organization. Learn what to consider, and how to decide.
Understand the latest ransomware delivery methods, use the latest network indicators, and detect the latest behavioral indicators.
This report surveys 30 Python web frameworks that have more than 1,000 monthly downloads and provides a deeper look into six of the most widely used.
An informative, visual, and interactive MNIST tutorial.
Go beyond basic concepts and frameworks to get started with Docker the right way.
Find three signs that you should be aware of for maintainable CSS. Catch them early and plan accordingly.
Why bother with quality control when building a website?
Machine learning to generate attack data and improve security analytics.
A deep dive into the technical aspects of reactive.
Binu Ramakrishnan highlights current security risks and CI/CD threat modeling and presents security patterns-based techniques to mitigate these risks, including a novel idea called auth events to delegate user privileges to CI/CD workflow jobs.
This report examines the best ways to delegate work so you not only end up with successfully completed tasks, but also a team of cheerful people—including a cheerful you.
Learn how to ship, parse, store, and analyze logs.
Sasha Goldshtein reviews the modern tracing landscape—ftrace, perf_events, kprobes, uprobes, eBPF—uncovering what insight into system activity these tools can offer.
An efficient, fast, and repeatable selection method that works on very large data sets.
With this excerpt from Head First Ruby, you’ll learn about Ruby blocks by looking at each concept from different angles.
Learn how to sketch out your electronic designs as schematics and understand how they map to real-world circuits.
Learn how to clone an object in JavaScript using the JSON.stringify, and Object.assign methods.
Learn how to simplify your visibility search by nesting methods within CSS classes.
Learn how Datadog integrated Consul into its environment. Darron Froese outlines mistakes made and lessons learned, plus tips for successful implementation in your own environment.
A define-by-run approach allows for flexibility and simplicity when building deep learning networks.
Learn how your team can implement a change-management pipeline to create a fast, reliable process for testing and hosting infrastructure for your microservices-based system.
Open source software is everywhere, but do you know where to start if you want to contribute, convince your manager your next project should be open source, or avoid recreating the wheel?
Learn about MIME types and how the browser and your JSON code interacts.
Learn the best practices for adding JavaScript links to your code using buttons and divs.
Learn to serve web pages from the inexpensive and tiny ESP8266 module in a few lines of Arduino code.
A hands-on guide that demonstrates several storage APIs in action.
Open source software is everywhere, but do you know where to start if you want to contribute, convince your manager your next project should be open source, or avoid recreating the wheel?
Jim Kalbach explains how he uses maps as collaborative tools, highlighting the importance of value alignment, and demonstrates how to engage others in workshops and exercises.
Running your image classifier in your own iOS application.
Cracking the misconception that hacks are sophisticated and complex by breaking down the most common attack categories.
Learn how to fix a mistake using the “git commit -amend” command and understand when it is appropriate to force push a changed commit.
Combining two switches to look like one can be daunting and complex. Not with Arista. Learn how Arista's MLAG makes accomplishing this task very simple.
Learn eight methods for determining if a string contains a substring in JavaScript.
Learn how to verify if a checkbox or radio button is checked using the .checked property in JavaScript.
Erlang/OTP is unique among programming languages and frameworks in the breadth, depth, and consistency of the features it provides for scalable, fault-tolerant systems with requirements for high availability.
This chapter from Learning Agile lays out the 12 principles that every agile practitioner should use when working on a software project team.
Tim Frick offers simple tactics to make your own digital products and services more sustainable.
Learn why animating SVG is different from animating in CSS, and work around some common hiccups you might experience along the way.
Using RUM to analyze HTTP vs. HTTPS in different world regions and across wireline, rural wireline, and wireless ISPs.
Understand how Capital One embraced continuous testing and learn the core principles, tools, and best practices behind the transformation.
In this video, Brian L. Gorman uncovers the relationship between efficiency and branch prediction when executing arrays in Java.
A common misconception is that Java is a pass by reference language. In this video Brian L. Gorman exposes the inner workings of pass by value.
Lessons learned at Fastly: How to build a robust system that identifies, mitigates, contains, and properly communicates incidents to prevent recurrence.
Take deep learning mobile.
Word embedding in natural language processing.
Learn how Capital One implemented continuous delivery, streamlined and automated the release management process, and overcame common roadblocks.
This chapter from Lean UX, 2nd Edition discusses how blending Lean UX and Agile can create a more productive team and a more collaborative process.
Learn how to redirect from one page to another in JavaScript using the window.location object.
Learn three methods for managing multiple scripts within a JavaScript project.
Learn how to create a JavaScript function that will parse the query string into its constituent parts.
Learn how “use strict” can introduce more robust error reporting to your JavaScript code and cut down on logical errors.
Jake VanderPlas explains Python’s essential syntax and semantics, built-in data types and structures, function definitions, control flow statements, and more, using Python 3 syntax.
A look at the tools and patterns for accessing and processing data in Hadoop.
Max Shron and Sasha Laundy explore tactics for need-finding and problem scoping that make it possible to put investments in data to profitable use.
In this report, you’ll learn to address two main challenges: How to organize your own life as a telecommuter, and how to work as part of a larger team.
Learn the difference between == and ===, and understand which you should be using in your code.
Learn how to account for time discontinuities in Java and use the new Java Time API to calculate durations accurately.
How web design standards can help make the Internet more environmentally friendly.
Learn how to build scalable, adaptive, complex systems that help your business adjust to rapidly changing competitive markets.
Lukasz Langa uses asyncio source code to explain the event loop, blocking calls, coroutines, tasks, futures, thread pool executors, and process pool executors.
From spinning up containers to shipping software as a team.
Learn how security can be enforced at the browser level through a combination of optimization techniques and security enhancements.
Adventures in deep learning, cheap hardware, and object recognition.