- Higher-Order Functions
-
By
Cay S. Horstmann
- Mar 5, 2023
How to be productive with functions that use or return functions.
|
- Higher-Order Functions
-
By
Michel Charpentier
- Mar 5, 2023
Using higher-order functions, computations can be parameterized by other computations in powerful ways.
|
- Laying the Foundation of Requirements Engineering
-
By
Karl Wiegers, Candase Hokanson
- Mar 5, 2023
Five essential practices that collectively provide a solid foundation for both technical and business success.
|
- Maps, Options, and Tuples
-
By
Cay S. Horstmann
- Mar 5, 2023
Scala has a pleasant syntax for creating, querying, and traversing maps, including hash maps and tree maps.
|
- Regression Using Bayesian Methods
-
By
Conrad Carlberg
- Mar 5, 2023
Depending on the context, regression can imply a variety of statistical and methodological purposes.
|
- Requirements Elicitation
-
By
Karl Wiegers, Candase Hokanson
- Mar 5, 2023
How to focus on use cases when eliciting user requirements.
|
- Summary of Requirements Practices
-
By
Karl Wiegers, Candase Hokanson
- Mar 5, 2023
The 20 core practices for software requirements that are most likely to deliver superior value for both traditional and agile projects, in any application domain.
|
- Synchronization
-
By
Mark Bates, Cory LaNou
- Mar 5, 2023
The final part of concurrent programming, synchronization, involves goroutines -race3 flag, sync.Mutex4, sync.RWMutex.5, and sync.Once.
|
- Tidy Data
-
By
Daniel Y. Chen
- Mar 5, 2023
Tidy data is a framework to structure data sets so they can be easily analyzed and visualized. Once you understand what tidy data is, that knowledge will make your data analysis, visualization, and collection much easier.
|
- What Is Cybersecurity?
-
By
Eugene H. Spafford, Josiah Dykstra, Leigh Metcalf
- Mar 5, 2023
|
- How to Shape Responses to API Calls
-
By
Olaf Zimmermann, Daniel Lubke, Cesare Pautasso, Mirko Stocker, Uwe Zdun
- Mar 1, 2023
- Five design patterns for API calls are presented.
|
- Anatomy of a Ransomware Attack
-
By
Sherri Davidoff, Matt Durrin, Karen Sprenger
- Dec 17, 2022
Learn the anatomy of a cyber extortion attack from cybersecurity experts Sherri Davidoff et al.
|
- Approximate Shortcut Methods for Multicomponent Distillation
-
By
Phillip C. Wankat
- Dec 17, 2022
Develop approximate shortcut methods for binary and multicomponent distillation in Separation Process Engineering, 5th Edition.
|
- JavaScript Values and Variables
-
By
Kirupa Chinnathambi
- Dec 17, 2022
Determine the role of values and variables in JavaScript.
|
- How to Troubleshoot Code
-
By
Mark Seemann
- Nov 21, 2022
- Techniques for solving code problems.
|
- What is the Right Service Granularity in APIs?
-
By
Olaf Zimmermann, Daniel Lubke, Cesare Pautasso, Mirko Stocker, Uwe Zdun
- Nov 17, 2022
- The EMBEDDED ENTITY and LINKED INFORMATION HOLDER API design patterns are presented.
|
- Boolean Logic in SQL
-
By
Larry Rockoff
- Nov 15, 2022
- Introduces several operators that allow you to create complex logical expressions in SQL.
|
- Binary Trees
-
By
John Canning, Alan Broder, Robert Lafore
- Nov 5, 2022
Binary trees are one of the fundamental data storage structures used in programming.
|
- Organizing for Adaptability
-
By
Cesario Ramos, Ilia Pavlichenko
- Nov 5, 2022
Understand how an agile organization is designed and what drives customer value.
|
- The Challenge of SRE Transformation
-
By
Vladyslav Ukis
- Nov 5, 2022
This chapter shows the consequences of not thinking about production throughout the product creation life cycle.
|