How to Test Your Network Connection Requests in Swift Using URLProtocol
Photo by Marvin Meyer on UnsplashIn this article, we will see how to test network requests using the not-so-well-known URL Loading System, which intercepts requests made to the server. To address our problem, we’ll put some example code, assuming we have an implementation of this style in our productive code:enum HTTPResult
Read MoreI visited the dark web, and all I got was…
PODCAST VO SCRIPT, [unpublished] Haje: The dark web is a lot of things; particularly user-friendly ain’t one of them. The other day, I got an amazing tip about ‘Dark Web Gift Shop,’ which tries to at least give you a little bit of a reward for your struggles. Haje: The founders
Read MoreThe Role of Empathy in Organizational Changes
Photo by Jon Tyson on UnsplashIn the spring of 2008, all employees of the company I worked for gathered in the auditorium to hear about the company’s business goals. At the end of this festive event, we were asked to step out into the lobby and find ourselves on a giant
Read MoreFinding the imaginary part of an analytic function from the real part
A function f of a complex variable z = x + iy can be factored into real and imaginary parts: where x and y are real numbers, and u and v are real-valued functions of two real values. Suppose you are given u(x, y) and you want to find v(x, y).
Read MoreLearning Rust With SHA-3 and Friends
Photo by Jantine Doornbos on UnsplashMy first hobby project for learning Rust was implementing cryptographic hash algorithms [MD5, SHA-2, SHA-3]. The latter, SHA-3, was the most challenging implementation.That was due to a) substantial differences in algorithm design from the more familiar MD5 and SHA predecessors and b) fewer and less intuitive
Read MoreDebugging My Life as an Engineering Manager With ADHD
Image generated using Stable DiffusionI was always a software engineer first and never planned (or wanted) to become a manager. Dealing with software seemed much easier than dealing with people. Working on hard technical problems felt natural, but dealing with emotional matters and nuances in communication always bothered me.However, when I
Read MoreTop Women in Cybersecurity keynote: A cybersecurity career is harder than ChatGPT paints it — but just as rewarding
ChatGPT is good for a lot of things, but don’t ask it to create a realistic scenario for a woman who wants a career in cybersecurity. In her keynote address for this year’s IT World Canada Top Women in Cybersecurity event, Laura Payne, chief enablement officer and vice-president of security
Read MoreAs Threads soars, Twitter rival Bluesky adopts a new personalized, algorithmic feed
Bluesky, one of the many would-be Twitter replacements now on the market, is making a notable change to how users discover new content on its network. Previously, the Bluesky app would feature popular posts in a feed it called the “What’s Hot” feed — something that its users aspired to
Read More7 Ways to Recognise Deepfakes Online
Deepfake AI technology has emerged as a powerful and concerning trend in the realm of artificial intelligence. Deepfakes are manipulated audio, video, or images created using machine learning algorithms, presenting a false reality that can deceive and mislead. As this technology becomes more sophisticated, recognizing deepfakes is crucial to safeguarding
Read MoreQ&A: InterSystems Revolutionising Data Software
Henry Adams, Country Manager of InterSystems recently shared an informative opinion piece with us delving into the significant of innovation in healthcare, the obstacles faced and the importance of effective change management strategies. We felt it necessary to get a more in-depth view of InterSystems’ data software platforms and gain
Read More