This blog entry is about the OWASP Top 10 - 2017 and is primarily intended as an introduction for people commonly involved in software development and acquisition projects.
This blog entry introduces the OWASP Application Security Verification Standard (ASVS), which is a community-driven project to provide a framework of security requirements and controls for designing, developing and testing modern web applications and services. This text is primarily intended as an introduction for people commonly involved in software acquisition and development projects.
This is an article about C++ programmer’s entry to machine learning by implementing a feed forward neural network. I started to write this publication as a blog post, but along the journey I found more aspects I had to cover. This is not an attempt to be any kind of research paper and purposefully breaks many golden rules of making science. Along with the blog writing best practices the conclusions here are rather subjective opinions, or at least should be taken as so. The implementation demo is available at Neuropia Live.
The previous blog post of the Deep Learning in Process Optimization series concerned building a deep recurrent neural network. This blog post is about the final stage: finding the optimal process values.
The previous blog post of the Deep Learning in Process Optimization series concerned data collection, exploratory data analysis and data preprocessing stages. This blog post is about the next stage: building a deep neural network.
If a plant produces too high emissions, the environment suffers from that and it will cause significant direct and indirect financial losses for the company. The emissions are usually caused by unbalanced process and therefore high emission is usually also a sign of bad efficiency.
The tools for creating a Mobile AR application are more advanced than ever before, but developing for AR still involves many challenges. This article is an overview of the major challenges I faced while creating a modern mobile AR application.
If you are worried about the state of security in your company but don’t really know where to start, then you should consider performing a security assessment to review the current state of your environment.