Sorry, the language specified is not available for this page

    Dissecting COVID-19 data using data science techniques

    Unless you have been living on top of a mountain without WiFi or hiding under a rock, you are quite familiar with the chaos that the coronavirus (COVID-19) has thrust the... Learn More

    Sungard AS Helps Support COVID-19 Research via Folding@home

    No one really knows the exact origin of the phrase “Necessity is the mother of invention,” but it is certainly not a new concept. Regardless of its origin, the concept is... Learn More

    Virtual Concierge for IT Service Tickets

    As chat bots become popular, many companies currently use them to improve the customer experience. We also see lots of movement for AR (Augmented Reality) / VR (Virtual... Learn More

    Terraform, EKS and Spot Worker Nodes

    When searching the web for how to deploy an EKS cluster, the most common thing you will find is eksctl from Weaveworks. It is a great tool, but it is mostly a tool for... Learn More

    How to Manage Data at the Edge

    Data is the lifeblood of any business. Consequently, the availability of that data is critical. The Internet of Things (IOT) produces a tremendous amount of data that a... Learn More

    An Introduction to AWS EC2 Traffic Mirroring

    This summer I had the opportunity to attend AWS’s re:Inforce security conference. There, I was able to catch up with old acquaintances, learn some new tricks, and generally... Learn More

    Radical Application Testing for Fun and Profit

    The best tests are the worst. I mean that in a good way - they are intelligent, bring together scenarios that produce unexpected behavior or may even break things that were... Learn More

    Application Authentication Using Amazon Cognito and An Introduction to Key APIs

    All web applications and mobile applications need a way to register or sign-up users and require a secured and robust mechanism to sign-in (login) users to authenticate into... Learn More

    How to Classify Emails using k-NN (k-nearest neighbors) and WordNet

    As a leading cloud & disaster recovery service provider, my company receives request emails related to IT operations daily. To support these requests, our Operations team... Learn More
    x

    SUBSCRIBE TO OUR BLOG

    Advice, stories, and expertise about work life today.

    x

    THANK YOU!

    We know your inbox is protected space, so we promise to send only the good stuff, twice a month.