Speech assistants are becoming increasingly popular not only in the entertainment and gaming sectors. Other industries are also facing a voice revolution, such as the hospitality industry. Gurvinder Singh is a hotel entrepreneur who has been using language technology as an early adopter for many years. In an interview, he talks about his experiences and gives insights into what makes a voice assistant successful.
Java is no spring chicken and some are even referring to it as a “vintage language”. Despite its popularity, there are some complaints about it. In our new cloud-native world, why does Java need to evolve? In order to evolve to keep up with modern, cloud-native apps, Java needs to keep all of what makes it so dependable, while also being able to function in new app environments.
What browser do you use? Depending on your browser choice, websites may be tracking you wherever you go online. Popular websites can include up to 24 pieces of tracking content from companies such as Facebook and Google. In the fight for Internet security, both Brave and Mozilla Firefox offer free to use solutions. We go over some of the benefits of both browsers.
Take a tour of ycrash in this article by Ram Lakshmanan. ycrash helps capture critical artifacts, including garbage collection logs, thread dumps, core dumps, heap dumps, disk usage, and more when the problem happens. It applies machine learning algorithms and generates a report which gives you a complete view of the problem, down to the lines of code that caused it.
The OSI (Open Systems Interconnection) networking model separates communication into seven layers: physical, data link, network, transport, session, presentation, and application. Does the OSI model need a revision? Security professionals discuss the possibility of adding more layers onto the OSI model for better protection and defense against security threats.
Blow out the candles, and make a wish. We are taking a tour of Golang’s growth from the new kid on the block to one of the most used programming languages of our era. It’s not just the cute mascot that draws in programmers (but it doesn’t hurt)! Take a look at what the language is commonly used for and what future plans are in store for the coming years in Go version 2.
Jo Jaquinta is a software developer at TsaTsaTzu, a company dedicated to Amazon Alexa and Google Assistant development. At VoiceCon, he talks about his experience in developing audio games. We asked him in advance what works well for voice recognition in gaming – and what doesn’t.
Women are underrepresented in the tech sector —myth or reality? Two years ago, we launched a diversity series aimed at bringing the most inspirational and powerful women in the tech scene to your attention. Today, we’d like you to meet Danuta Florczyk, Founder and CEO of tectumedia.
Increasingly large and diverse data sets allow us to form complex insights. With all this data, why would we limit ourselves by using data sampling instead? Sampling only works when it is put in the hands of data science specialists. In this article, learn about some of the downsides of using data sampling and how it limits and undermines business decisions. Read part one of the case against data sampling.
When it comes to load balancing, round robin may not be the best algorithm to choose from. If auto-scaling is instrumented, it is even worse. In this article, see a simple example explaining why this is so, how the round robin algorithm works, and which load balancing algorithm you should potentially pick instead for even traffic distribution.
In this article, Kamesh Sampath shows us how to master the first steps on the journey towards a serverless application. He shows how to set up the right environment and takes us through its deployment.
The practice of chaos engineering can help unearth security problems that ordinarily, you would never discover. By utilizing chaos engineering best practices, your teams can keep up with how a potential hacker might infiltrate your network and gain a better understanding of the weaknesses in your infrastructure and what security measures to take.
IoT devices can be a weak leak and expose data to hackers. Businesses should be aware of the risks that can occur if attackers get their hands on data, and keep up with security updates and testing. How can hackers compromise sensor-generated data, and what are the best practices for IoT device security?
Women are underrepresented in the tech sector —myth or reality? Two years ago, we launched a diversity series aimed at bringing the most inspirational and powerful women in the tech scene to your attention. Today, we’d like you to meet Lina Zubyte, QA Consultant at ThoughtWorks.