Crucial Role of Brand Safety in a Cookie-less Future

In the advertising world, one rule reigns supreme: protect the brand at all costs. However, with the rise of programmatic advertising and its heavy reliance on behavioral targeting, advertisers have lost control over where their ads appear online. This exposes brands to a significant threat: ad placements next to harmful content, potentially damaging credibility and … Read more

AutofacServiceProviderFactory in ASP.NET Core – Part 1

We have plenty of awesome options for dependency injection when working in ASP.NET Core applications. For the most part, if you’re not building anything super complicated concerning your types or your software architecture, you can get by with the built-in IServiceCollection. However, we can use AutofacServiceProviderFactory in ASP.NET Core to make Autofac our dependency container … Read more

What Led to Vizualizing the COVID-19 Pandemic: The The Theoretical Background

:::info This paper is available on arxiv under CC 4.0 license. Authors: (1) Mykola Makhortykh, Institute of Communication and Media Studies, University of Bern; (2) Aleksandra Urman, Social Computing Group, University of Zurich; (3) Roberto Ulloa, GESIS – Leibniz-Institute for the Social Sciences. ::: Table of Links Author Note Abstract Theoretical background Methodology Findings Conclusion … Read more

This Is How the Covid-19 Pandemic Looks Like

:::info This paper is available on arxiv under CC 4.0 license. Authors: (1) Mykola Makhortykh, Institute of Communication and Media Studies, University of Bern; (2) Aleksandra Urman, Social Computing Group, University of Zurich; (3) Roberto Ulloa, GESIS – Leibniz-Institute for the Social Sciences. ::: Table of Links Author Note Abstract Theoretical background Methodology Findings Conclusion … Read more

This Is What a Pandemic Looks Like: An Author’s Note Before We Begin

:::info This paper is available on arxiv under CC 4.0 license. Authors: (1) Mykola Makhortykh, Institute of Communication and Media Studies, University of Bern; (2) Aleksandra Urman, Social Computing Group, University of Zurich; (3) Roberto Ulloa, GESIS – Leibniz-Institute for the Social Sciences. ::: Table of Links Author Note Abstract Theoretical background Methodology Findings Conclusion … Read more

Identifiers are better off without meaning

Once at Last.fm we had an integer overflow in an identify field. I can’t recall where exactly. But I do remember that the inconvenience of having a bunch of Hadoop jobs disrupted while we rushed to update the relevant type couldn’t spoil the collective pride for having more than 2 billion of whatever needed so … Read more

The Future of Work: Preparing for an AI and Machine Learning Dominated Economy

The rise of Machine Learning (ML) has meant the increasing automation of tasks across many industries, fundamentally altering the way we work. A recent report by the McKinsey Global Institute estimates that by 2030, up to 800 million jobs worldwide could be displaced by automation powered by ML [1]. This statistic highlights the transformative potential … Read more

Elite Teams Are Built on Strong Habits

Going from a mediocre team to an elite team can seem daunting, especially when we need to figure out where to start. The DevOps Research and Assessment (DORA) can be our north star, helping us build the habits and practices we need to be elite. We’ll look at DORA, the challenges of building habits, and … Read more

A Beginner’s Guide to Pull Request Stacking

Pull Request (PR) stacking is another name for stacked diffs, a concept that has existed for several years. We’ll discuss what it is, the tools we can use, and where PR stacking may benefit us. What Is PR Stacking? In traditional Pull Requests (PRs), the developer makes all the changes in one or more commits … Read more

What Does It Take to Get a Medical Device to Market?

If you are an entrepreneur or innovator in the healthcare industry or are considering entering the space, it’s important to understand what is involved in getting a medical device to market. This is a journey fraught with challenges, complexities, and regulatory scrutiny. For those involved in the design, development, and distribution of medical technologies, this … Read more

How I Manage Over a Dozen Startups

The headline might be a slight exaggeration — I’m not Elon Musk. However, I am bootstrapping a venture studio called Evernomic with a focus on the media industry. Our portfolio includes several newsletters, media brands, SaaS projects, service-based startups, high-authority websites, external contracts, and more. Evernomic is also quite a unique organization when it comes … Read more

Building Resilient Systems With Retry Patterns

A retry mechanism is a critical component of many modern software systems. It allows our system to automatically retry failed operations to recover from transient errors or network outages. By automatically retrying failed operations, retry mechanisms can help software systems recover from unexpected failures and continue functioning correctly. Today, we’ll take a look at these … Read more

How We Analyzed Crypto API Misuses in 895 GitHub Projects

:::info Authors: (1) Anna-Katharina Wickert, Technische Universität Darmstadt, Darmstadt, Germany (wickert@cs.tu-darmstadt.de); (2) Lars Baumgärtner, Technische Universität Darmstadt, Darmstadt, Germany (baumgaertner@cs.tu-darmstadt.de); (3) Florian Breitfelder, Technische Universität Darmstadt, Darmstadt, Germany (florian.breitfelder@tu-darmstadt.de); (4) Mira Mezini, Technische Universität Darmstadt, Darmstadt, Germany (mezini@cs.tu-darmstadt.de). ::: Table of Links Abstract and 1 Introduction 2 Background 3 Design and Implementation of Licma and … Read more

Calling All Writers: Learn What The Crypto-API Writing Contest Is All About From The CoinGecko Team

In this AMA, we discuss the ongoing writing contest, Crypto-API and the main topics for the HackerNoon writer community: whether you’re discussing the value of cryptocurrency data APIs, highlighting industry leaders like the CoinGecko API, offering tutorials, sharing integration experiences, exploring use cases, or related topics, we want to hear from you! See the writing prompts … Read more

LICMA’s Analysis of Crypto API Misuses in Python Apps: Findings and Future Directions

:::info Authors: (1) Anna-Katharina Wickert, Technische Universität Darmstadt, Darmstadt, Germany (wickert@cs.tu-darmstadt.de); (2) Lars Baumgärtner, Technische Universität Darmstadt, Darmstadt, Germany (baumgaertner@cs.tu-darmstadt.de); (3) Florian Breitfelder, Technische Universität Darmstadt, Darmstadt, Germany (florian.breitfelder@tu-darmstadt.de); (4) Mira Mezini, Technische Universität Darmstadt, Darmstadt, Germany (mezini@cs.tu-darmstadt.de). ::: Table of Links Abstract and 1 Introduction 2 Background 3 Design and Implementation of Licma and … Read more

Improving Crypto API Misuse Detection: Insights from Previous Static Analysis Approaches

:::info Authors: (1) Anna-Katharina Wickert, Technische Universität Darmstadt, Darmstadt, Germany (wickert@cs.tu-darmstadt.de); (2) Lars Baumgärtner, Technische Universität Darmstadt, Darmstadt, Germany (baumgaertner@cs.tu-darmstadt.de); (3) Florian Breitfelder, Technische Universität Darmstadt, Darmstadt, Germany (florian.breitfelder@tu-darmstadt.de); (4) Mira Mezini, Technische Universität Darmstadt, Darmstadt, Germany (mezini@cs.tu-darmstadt.de). ::: Table of Links Abstract and 1 Introduction 2 Background 3 Design and Implementation of Licma and … Read more

Python Crypto API Misuses in the Wild: Analyzing Threats to Validity

:::info Authors: (1) Anna-Katharina Wickert, Technische Universität Darmstadt, Darmstadt, Germany (wickert@cs.tu-darmstadt.de); (2) Lars Baumgärtner, Technische Universität Darmstadt, Darmstadt, Germany (baumgaertner@cs.tu-darmstadt.de); (3) Florian Breitfelder, Technische Universität Darmstadt, Darmstadt, Germany (florian.breitfelder@tu-darmstadt.de); (4) Mira Mezini, Technische Universität Darmstadt, Darmstadt, Germany (mezini@cs.tu-darmstadt.de). ::: Table of Links Abstract and 1 Introduction 2 Background 3 Design and Implementation of Licma and … Read more