TL;DR: After covering the basics of getting set up on the Ethereum Blockchain, we will cover some of the most useful & popular tools and resources for Ðapp development.
TL;DR Building your first Crypto application can be a very daunting experience. Most likely, due to the fact that building the financial and Blockchain underpinning is indeed rather difficult. Happily for us developers, however, the heavy lifting can be shifted onto someone else, and we can simply piggyback on top of their technology.
TL;DR Goodfellow mainstreamed the idea of GANs a few years ago, initially whilst trying to problem solve as a favour for a friend. There’s nothing new about training machine learning models and algorithms - Arthur Samuel’s checkers agent back in 1959 was the original example of reinforcement learning. However, with the introduction of Generative Adversarial Networks, Goodfellow has pioneered another class of super exciting algorithms for Semi / Unsupervised ML.
TL;DR: Machine Learning consists of a variety of techniques used to make our machines absorb knowledge in a similar way to humans. Machine Learning is such a broad, ubiquitous term and contains so many sub-topics, that explaining it becomes a more difficult task day by day. With innovations advancing ML on an ongoing basis, the task of explaining the ever-expanding concepts advances at the same rate! In this article I will attempt to clarify an overview of Machine Learning in simple, linear terms.
TL;DR: We at Auth0 recently hosted a webinar that covered modern identity management and what it takes to implement both Authentication and Authorisation to support your Digital Transformation. In this article, we’ll cover these implementations ranging from basic authentication, to an OpenID Connect server, and API authentication.
TL;DR: Web Application Security is not just a consideration for Back end Developers, but for Front end Developers too. In this article we’ll cover a comprehensive security strategy for Web Apps, from Front to Back end.
TL;DR: In this article we will cover building your first web application in Crystal. The application will utilise JSON Web Tokens (JWTs) to authenticate our users around the restricted resources of our app. The completed sample application can be found in this GitHub repo. I’d encourage you to check out the repo to follow, aside this tutorial.
TL;DR: Part one of a three part series on non-interactive Auth0 clients. Today, we’re going to build a Command Line Interface in Elixir that authenticates a user, using the Resource Owner Password Grant flow, demonstrating using Auth0 in a non-web app manner. The completed app can be found on GitHub.
TL;DR: A new security vulnerability has been found in WPA2 (the protocol that secures almost every modern WiFi connection). The security weakness potentially allows a sinister agent, within range of the network, to hijack traffic and view any sensitive communication that is not encrypted. In this article we’ll take a look at the vulnerability, the risk it poses to you, and how to mitigate it.
Crystal is a statically-typed, compiled, systems programming language with the aims of being as fast as c/c++, while having a syntax as readable as Ruby. This article is an introduction to the Crystal Language, through the eyes of a polyglot programmer. Being a former programmer of both C and Ruby, I have been able to explore the ins-and-outs of Crystal with an objective mindset and give an unbiased opinion on its features; from it’s low-level primitives to its familiar syntax, and much in-between.
subscribe via RSS