GoorooTHINK

Thought provoking and helpful articles
from the Gooroo community.

Do you have something to say? Contribute or create an article and add it to your Gooroo bio.

  1. Creating HSTS and Pre-load with Cloudflare

    Most people are familiar with HTTPS and the concept of secure websites. Securing websites become more and more common, which is a really good thing. Not only do we know that the data sent and received from the website is secure, but we also get a sense of knowing we will be alright. We expect that we get confidentiality, authenticity and integrity from modern websites. After all, we see sites every day with this:This is becoming more and more common, and according to Scott Helme almost 31% of the...
  2. New Technology - Should You Learn It?

    It is one of those questions you constantly struggle with throughout any technical career: Should I learn this latest and greatest technology that is out? Do I need to learn it, do I want to learn it, do I get left behind if I don't? The truth is that you can't learn everything so how do you know what to focus on?The sections below are not mutually exclusive, nor do you have to fulfill all of them. If you can say "yes" to one of them, then you are probably okay to invest time in the technology in...
  3. Keras: The Python Deep Learning library with Tensorflow and CNTK

    Hey, This is my first article, I hope you find informative.  Currently, I get interested in the AI & Machine Learning. And start learning by experimenting as well. I usually use Tensorflow and CNTK in Parallel. So, First I give a little Introduction to both like What they are and What they do?Tensorflow is an open source software library for numerical computation using data flow graphs. Nodes in the graph represent mathematical operations, while the graph edges represent the multidimensional...
  4. Introduction to Google ARCore Development

    In the past couple of years, if not more, the technology of virtual, augmented and, lately, mixed realities have taken a huge leap forward both for consumers as well as enterprise. Initially augmented reality (AR) almost entirely consisted of overlaying data on the real world, triggered by a shape, a logo, a QR code, or something else that could be easily recognised. Most of all it was very similar to a heads up display. Not really interacting with the real world, not really being part of your reality.
  5. Introduction to Progressive Web Apps

    As some people know, I have been very passionate about Windows Phone since the early days of the platform. I am still using a Windows 10 Mobile device, and I still love the operating system and the Windows 10 platform. However, I am not living in a cave, and I do realise that the future potential of the Windows mobile platform is limited. I still don't think it is "dead", but it is certainly limited. I started learning Xamarin a couple of years ago, to use my C# knowledge and skills for building...
  6. Spring Cloud and Netflix Ribbon: Client-side Load Balancing

    Eventually you'll reach a point where you need to run multiple instances of an application or a service for high availability or to manage increased load. That's what load balancers are for. There's generally two different types:What many people would call a "load balancer" is actually a server-side load balancer. It can be implemented in hardware or software. The traffic is sent to a dedicated service that decides where to send the traffic, using an algorithm like round-robin, to one of the...
  7. Securing your Exchange Online

    If your company its using Exchange Online services and you are responsible for email security, you have many options that you can implement to improve email security. By default every new Exchange Online tenant come with a defaults protections policy such as:Every default policy can be viewed, edited but not deleted. Its so recommended that you review all of this policies.As administrator, you can create additional malware or spam policies and applies it to specific users or groups.The malware filter...
  8. Custom user roles and role-based authorization in ASP.NET core

    I've recently been trying to contribute to the developer community, in more ways than I previously have. One of the areas I decided to delve into, is spending more time on tech forums and resources like StackOverflow.  Well not for asking questions or checking for answers, but more for answering as many questions as I possibly can. The aim is to provide answers primarily to questions budding developers are asking. so Let's hope I do a lot of that as time goes on. Hey, I might...
  9. Visual Studio: Creating and managing digital certificates in C#

    Digital Certificates are used for secure communication between two parties. In digital certification we ensure that the peoples who are using our apps or services are securely communicating with each other and those peoples can be individual consumers or businesses.In Digital Certification we use both Hashing and Asymmetric encryption for creating digital signatures.After encrypting the hash of data we obtain a digital signature later which is used for verification of data.As there are a lot more...
  10. An Introduction to R for Java Developers

    As a Software Engineer I'm always keeping up to date with technology and one of the things that helps me do that is book reviews. Right now, I'm reviewing The Book of R: A First Course in Programming and Statistics by Tilman M. Davies. R is a programming language used in statistical computing and has gained in popularity in the recent years due to the explosion of data and its applications like Machine Learning.
  11. Edit DRAFT Edit

    • updated