Articles

13204 Items

Sort by Date | Title

Higher-Order Functions
By Cay S. Horstmann
Mar 5, 2023

How to be productive with functions that use or return functions.

Higher-Order Functions
By Michel Charpentier
Mar 5, 2023

Using higher-order functions, computations can be parameterized by other computations in powerful ways.

Laying the Foundation of Requirements Engineering
By Karl Wiegers, Candase Hokanson
Mar 5, 2023

Five essential practices that collectively provide a solid foundation for both technical and business success.

Maps, Options, and Tuples
By Cay S. Horstmann
Mar 5, 2023

Scala has a pleasant syntax for creating, querying, and traversing maps, including hash maps and tree maps.

Regression Using Bayesian Methods
By Conrad Carlberg
Mar 5, 2023

Depending on the context, regression can imply a variety of statistical and methodological purposes.

Requirements Elicitation
By Karl Wiegers, Candase Hokanson
Mar 5, 2023

How to focus on use cases when eliciting user requirements.

Summary of Requirements Practices
By Karl Wiegers, Candase Hokanson
Mar 5, 2023

The 20 core practices for software requirements that are most likely to deliver superior value for both traditional and agile projects, in any application domain.

Synchronization
By Mark Bates, Cory LaNou
Mar 5, 2023

The final part of concurrent programming, synchronization, involves goroutines -race3 flag, sync.Mutex4, sync.RWMutex.5, and sync.Once.

Tidy Data
By Daniel Y. Chen
Mar 5, 2023

Tidy data is a framework to structure data sets so they can be easily analyzed and visualized. Once you understand what tidy data is, that knowledge will make your data analysis, visualization, and collection much easier.

What Is Cybersecurity?
By Eugene H. Spafford, Josiah Dykstra, Leigh Metcalf
Mar 5, 2023
How to Shape Responses to API Calls
By Olaf Zimmermann, Daniel Lubke, Cesare Pautasso, Mirko Stocker, Uwe Zdun
Mar 1, 2023
Five design patterns for API calls are presented.
Anatomy of a Ransomware Attack
By Sherri Davidoff, Matt Durrin, Karen Sprenger
Dec 17, 2022

Learn the anatomy of a cyber extortion attack from cybersecurity experts Sherri Davidoff et al.

Approximate Shortcut Methods for Multicomponent Distillation
By Phillip C. Wankat
Dec 17, 2022

Develop approximate shortcut methods for binary and multicomponent distillation in Separation Process Engineering, 5th Edition.

JavaScript Values and Variables
By Kirupa Chinnathambi
Dec 17, 2022

Determine the role of values and variables in JavaScript.

How to Troubleshoot Code
By Mark Seemann
Nov 21, 2022
Techniques for solving code problems.
What is the Right Service Granularity in APIs?
By Olaf Zimmermann, Daniel Lubke, Cesare Pautasso, Mirko Stocker, Uwe Zdun
Nov 17, 2022
The EMBEDDED ENTITY and LINKED INFORMATION HOLDER API design patterns are presented.
Boolean Logic in SQL
By Larry Rockoff
Nov 15, 2022
Introduces several operators that allow you to create complex logical expressions in SQL.
Binary Trees
By John Canning, Alan Broder, Robert Lafore
Nov 5, 2022

Binary trees are one of the fundamental data storage structures used in programming.

Organizing for Adaptability
By Cesario Ramos, Ilia Pavlichenko
Nov 5, 2022

Understand how an agile organization is designed and what drives customer value.

The Challenge of SRE Transformation
By Vladyslav Ukis
Nov 5, 2022

This chapter shows the consequences of not thinking about production throughout the product creation life cycle.

<< < Prev Page 1 2 3 4 5 Next >

Become an InformIT Member

Take advantage of special member promotions, everyday discounts, quick access to saved content, and more! Join Today.