Home2020-04-07T17:08:03+00:00

How Does a Remote Virtual Training Work?

Von |26. Oktober 2020|

Since the start of the pandemic, we have begun offering our trainings virtually. As a virtual training experience is quite different from a classroom training, I'll give you an overview of how a virtual training works and some of the (design) choices we made.

Since the start of the pandemic, we have begun offering our trainings virtually. As a virtual training experience is quite different from the experience a classroom t

Deep Learning on Bad Time Series Data: Corrupt, Sparse, Irregular and Ugly

Von |21. Oktober 2020|

How do you train neural networks on time series that are non-uniformly sampled,  irregularly sampled, have non-equidistant timesteps, or have missing or corrupt values? In the following post, I try to summarize and point to effective methods for dealing with such data.

How do you train neural networks on time series that are non-uniformly sampled, irregularly sampled, have non-equidistant timesteps, or have missing or corrupt values

Hybrid Methods for Time Series Forecasting

Von |19. Oktober 2020|

Hybrid time series forecasting methods promise to advance time series forecasting by combining the best aspects of statistics and machine learning. This blog post gives a deeper understanding of the different approaches to forecasting and seeks to give hints on choosing an appropriate algorithm.

Time series forecasting is a crucial task in various fields of business and science. There are two co-existing approaches to time series forecasting, statistical meth

Using Artificial Intelligence in Mobile Web Apps

Von |12. Oktober 2020|

As the evaluation of a prototype shows, artificial intelligence is currently only of limited use in the context of a mobile web application. However, it is quite conceivable to already use smaller models for simple use cases, which produce consistently correct results with only a small amount of training data.

For my bachelor’s thesis, I evaluated the applicability of artificial intelligence within a mobile web application. Therefore, a prototype for classifying handwritten

JavaScript Proxies: Changing the core functionality of Objects

Von |07. Oktober 2020|

Proxies in JavaScript allow you to intercept core functionality on JavaScript Objects so you can tweak the behaviour of existing features – even of objects you haven't created! This article shows some examples and includes snippets to try it out yourself!

JavaScript Proxies allow you to intercept core functionality on JavaScript Objects so you can tweak the behaviour of existing features. And it is not limited to objec

Systematic Collaborative Analyses of Experimental Data in a Federated Environment

Von |05. Oktober 2020|

For a successful experimental, scientific research project, especially when handling vast amounts of data, many people need to be able to contribute at the same time. This makes a centrally accessibledata analysis platform inevitable.

For a successful scientific research project, especially when handling vast amounts of experimental data, many people need to be able to contribute at the same time.

Announcing @inovex.de/elements 1.0: Our Open Source UI Library! 🎉

Von |30. September 2020|

Today we are proud to announce our very first open source UI library @inovex.de/elements on npm and GitHub with a total of 46 core components. inovex elements is the last interoperable UI library you’ll ever need for any web framework.

We’re public, we’re live! Today we are proud to announce our very first open source UI library for any framework, @inovex.de/elements, on npm and GitHub with a total

RecSys 2020: Highlights of a Special Conference

Von |28. September 2020|

Read my take on the highlights of the 14th ACM Conference on Recommender Systems, such as the winners of the best long and short paper awards as well as an assortment of the best workshops and tutorials.

The 14th ACM Conference on Recommender Systems was special in many ways: a fully virtual conference that did an amazing job to keep social interaction alive – e

The Web Cryptography API: Security Analysis [Part 2]

Von |23. September 2020|

After getting the basics out of the way in the last article this blog dives deep and assesses the security mechanisms of the Web Cryptography API.

The first article of the blog series „The Web Cryptography API: Do not trust anybody!” explains the Web Cryptography specification. If you haven’t already, read

A Case for Isolated Virtual Environments with PySpark

Von |17. September 2020|

This blogpost motivates the use of virtual environments with Python and then shows how they can be a handy tool when deploying PySpark jobs to managed clusters.

This blog post motivates the use of virtual environments with Python and then shows how they can be a handy tool when deploying PySpark jobs to managed clusters.

The Web Cryptography API: Do not Trust Anybody! [Part 1]

Von |14. September 2020|

The goal of this series of blog articles is to evaluate the Web Cryptography specification before analysing the Web Cryptography API. Finally a sample application using the new API is implemented, which extends existing cloud storage services with the option to encrypt all files on the client side by WCA prior upload.

IT systems are of central importance in (almost) every area. Particularly in the context of critical infrastructures or sensitive personal data, IT security is of par

Mehr Beiträge laden