Aging is a very interesting phenomenon. I don’t mean medically, but from how we look at the process. When we are young (say under 10) we know our ages down to the month. In our twentie… Read More
I was recently speaking to a University Academic and we got into the discussion of practical assessments for Data Science Students, One of the key principles students learn is how to impleme… Read More
Arrays are one of the basic building blocks of every applications. Even if you do not use arrays directly every day you definitely use them indirectly as part of almost any library.
C# has a… Read More
Guest blog by Christo Lolov, Microsoft Student Partner at Imperial College London
What is R
R is a statistical computer language which allows you to achieve your analytical goals by writin… Read More
By using a Dynamics 365 connector for Microsoft Flow or Azure Logic Apps, you can create flows that initiate when an event occurs in Dynamics 365, or some other service, which then performs… Read More
Guest blog by Eric Chamoun Microsoft Student Partner at University College London
About Me
Hello, my name is Eric Chamoun and I am a second year Mathematical Computation student at Universi… Read More
Visual Novels
A visual novel is an interactive game style introduced in Japan in the early 1990s, featuring mostly static graphics, most often using anime-style… Read More
I have written numerous articles about ASP.NET and creating memory dumps, but noticed I had not written one specifically about capturing an ASP.NET Core memory dump on an Azure App Service… Read More
TypeScript 3.2 is here today!
If you're unfamiliar with TypeScript, it's a language that brings static type-checking to JavaScript so that you can catch issues before you even run your code… Read More
Introduction
This is another blog post in the series about warehouse mobile devices in Dynamics 365 for Finance and Operations. In the last blog post, the difference between customizing for… Read More
AMD just launched the first wave of 3rd Gen Threadripper chips today to tackle Intel’s Cascade Lake parts. Although traditionally Intel’s HEDT lineup has been rather dismal, the… Read More
If you’re ever tasked with implementing a cryptography feature–whether a high-level protocol or a low-level primitive–you will have to take special care to ensure you&rsquo… Read More
Cryptographers and cryptography engineers love to talk about the latest attacks and how to mitigate them. LadderLeak breaks ECDSA with less than 1 bit of nonce leakage? Raccoon attack brings… Read More
The Collatz conjecture is an allegedly-unsolved problem in mathematics.
I say allegedly there because, reading those words, I feel like mathematicians are going to jump out from my closet… Read More