Advertisement

A laptop user wearing a face mask works in a darkened space.

Social engineering hacks weaken cybersecurity during the pandemic

Disinformation, malware, and an array of cyberattacks are rising as fast as case counts


typewriter are you ready prepare contingency disaster recovery

TypeScript 4.0 moves to beta

Forthcoming version improves build speeds and startup times and brings editing and coding enhancements


buckets of colorful paint

What is JPMS? Introducing the Java Platform Module System

The module system introduced in Java 9 makes it easier to organize your code. Here’s a brief guide to working with modules in Java


Advertisement

Network

4 deployment strategies for resilient microservices

Turn to these cloud-native routing techniques to test and mitigate risk in your microservices deployments


The letter R as a wired alphabet light board against concentric circles of a halftone pattern.

R language rises with COVID-19 research

R language for statistical computing moves up in the Tiobe index of language popularity, while Rust and Kotlin also gain


Man sitting on surfboard on beach with laptop

Understanding .NET MAUI and the future of Xamarin

Microsoft continues to explore the future of .NET and cross-platform Xamarin development tools


data architecture

3 multicloud architecture patterns cloud pros should understand

Be aware of these emerging multicloud architecture patterns that eliminate data, service, and process silos


women spinning plates asynchronous programming synchrony multi tasking by graemenicholson getty ima

How to use ValueTask in C#

Take advantage of ValueTask in C# to avoid allocation when returning task objects from an asynchronous method


abstract fire rays 100152558

Learn PyTorch: The best free online courses and tutorials

Look no further than these excellent free resources to master the development of deep learning models using PyTorch


egg in vice grip stress strength cracked egg

What does an open source maintainer do after burnout?

Maintaining an open source project is far different from coding, which is a problem if coding is what you love


Advertisement

vault protected safe clouds breach security

Yes, it's safe to move sensitive data to the cloud

The public clouds have been safe places to store mission-critical and sensitive data for some time, but it takes a pandemic to push most enterprises over the tipping point


timoreilly1600

The unwavering optimism of Tim O'Reilly

InfoWorld finds the Silicon Valley veteran in an at once optimistic, yet fiercely critical mood, as he talks about the opportunities artificial intelligence could afford society, while also addressing the risks of such technology if...


Do More With R [video teaser/video series] - R Programming Guide - Tips & Tricks

“Do More with R” video tutorials

Search for R video tutorials by task, topic, or package. Most videos are shorter than 10 minutes


infinity symbol / continuous cycle / binary tunnel / digital transformation

Defining a continuous testing strategy

For the most business value, develop a testing program based on personas, best practices, and agile principles


python programming language snake

Microsoft unveils Pylance, its new Python extension for Visual Studio Code

Pylance works with the existing Microsoft Python extension to bring faster type checking and program analysis to Python devs