Unlike usual performance metrics, fairness, safety and transparency in machine learning models are much harder if not impossible to quantify. Here are some techniques (and examples) to provide interpretability, to make decision systems understandable not only for their creators, but also for their customers and users.
Machine learning has a great potential to improve data products and business processes. It is used to propose products and news articles that we might be interested i
Building complex applications in Flutter demands a basic understanding of the core concepts. Those concepts include the navigation between screens or saving simple key-values pairs . In this article I will show three of the most common concepts every developer should know.
Building complex applications in Flutter demands a basic understanding of the core concepts. Those concepts include the navigation between screens or saving simple ke
We chose some interesting new topics we wanted to dive into and created a compressed, easy-to-read summary with some practical code snippets. To top it off, we discussed the topics in a podcast where you can get additional information about the posts from the authors. We hope you enjoy!
We're developers working on projects with technology we love every day. We must keep an eye on the ever changing web eco system. New tools and libraries popping up every
Von Viet Duc Mai| 2019-04-02T13:37:47+00:00 30. Januar 2019|
In diesem Blog Post gebe ich einen Überblick, wie erste Tests für BackstopJS geschrieben werden. Darüber hinaus erkläre ich, wie man BackstopJS in Docker ausführt, welche Befehle zur Verfügung stehen und wie visuelle Tests in einer Gitlab-Pipeline ausgeführt werden können.
BackstopJS ist ein Testing Tool, das bei Web-Frontends zum Einsatz kommt. Mit seiner Hilfe können schnell und einfach visuelle Regressionstests zu einer bereits beste
In 2014 the Fast Identity Online (FIDO) alliance announced the Universal Second Factor (U2F) specification which provides 2FA based on security keys, resistant to phishing, man-in-the-middle attacks (MitM) or stolen passwords. Let's have a look at its current state and browser support for WebAuthn!
Use complex passwords they said! It will be secure they said! This meme may be part of a humoristic view on the harsh reality. According to Google's study 1.9 billion pa
Von Arne Maier| 2019-04-02T13:38:02+00:00 30. Januar 2019|
Since the web is evolving and becoming more mature, a new HTML Dialog element is being standardized to meet developers' needs. Today the implementation can be used directly in Chrome already—here's what you need to know.
An HTML dialog is a container for content which overlaps the rest of the site and is in the foreground. From a designer’s perspective a dialog catches the focus
CSS Scroll snapping is a method of defining snap points to tell the browser where it should stop scrolling. The process of snapping to the edge of an element (e.g. section, image, box, etc.) when coming close to it is used in order to achieve optimized scrolling positions and emphasise certain content.
In the past few years a recognizable trend of single page websites emerged (not to be confused with the term ‘single page application’). These sites consist of mainly
Flutter is an open source Google project to build cross-platform applications. So—what does Flutter do better than established frameworks like Ionic, Xamarin, NativeScript and React Native? Let's find out in this first post of our new blog series.
Since early 2018, Google’s Flutter has been hyped by the community. Google claims that it provides the opportunity to build cross-platform applications for Andr
Eignen sich hybride DWH-Architekturen für Szenarien mit global verteilten Daten? Wie wird die Ausfallsicherheit in der Cloud sichergestellt und welche Herausforderungen und Risiken ergeben sich? Unser Fazit zu hybriden DWH-Architekturen.
Kürzlich wurde das Buch BI & Analytics in der Cloud im dpunkt Verlag veröffentlicht, in dem von verschiedenen Fachautoren des TDWI die Besonderheiten zu Cloud Bus
This is the first part of the OpenPGP blog series. It briefly explains how to generate a new GnuPG key that can be used for encryption, signing and authentication. GnuPG is the open implementation of the OpenPGP standard defined in RFC 4880, allowing you to encrypt and sign data and to authenticate.
This is the first part of the OpenPGP blog series. It briefly explains how to generate a new GnuPG key that can be used for encryption, signing and authentication. <