Related Content
![]() |
Saving Birdsong: Using Machine Learning to Monitor Kiwi Birds and Possums In an attempt to turn birdsong and predator monitoring into data that can help improve pest trapping ability, the Cacophony Project is an open-source conservation project employing technologies such as embedded systems, web applications, backend services, and machine learning pipelines. |
|
![]() |
Before Rolling Out Products, Walk a Mile in Their Shoes Beyond focus groups and surveys, different paths lead to uncovering ways to delight your customers. It is important to recognize the problems, challenges, wants, and needs of people. “Before you criticize someone, walk a mile in their shoes” is also good advice for rolling out products. |
|
![]() |
4 Reasons Your Company Should Hold a Developer Hackathon Hackathons, where developers meet up to do some collaborative programming, are a great venue for problem-solving and creativity. They give employees the potential to get ideas out there that could pay off big, work the bugs out of new technology, and increase morale—and, best of all, they can be held anywhere. |
|
![]() |
Raspberry Pi's Latest Compute Module: CM3+ They say all good things eventually come to an end. The Raspberry Pi Foundation announced the latest and last iteration of the Raspberry Pi Compute Module series: Compute Module 3+ (CM3+), designed for industrial applications and digital makers. |
|
![]() |
The Challenges with Open Source Software Using open source software is all the rage these days, and for good reason. Often teams don’t have the budget to purchase commercial tools, and without an open source solution, their productivity suffers. But open source is not a panacea. There are some challenges that can hit you hard if you aren’t careful. |
|
![]() |
Girl Scout Cookie Sales Help Fund STEM Badges, Including Cybersecurity and Programming It's officially Girl Scout cookie season, and that means you’re doing a good thing when you buy those boxes of cookies. The Girl Scouts offer science- and technology-related badges and journeys to introduce girls to computer science, robotics, mechanical engineering, space exploration, and cybersecurity. |
|
![]() |
Using Open Source Tools for Security Testing Performing a series of security tests before deployment of your application has become paramount. But that doesn't have to mean a suite of costly tools. Plenty of open source security testing tools have become viable options. Here's why you should consider open source tools for your different types of security testing. |
|
![]() |
OWASP Releases Latest Top 10 IoT Vulnerabilities The growing list of internet-connected devices bring amazing benefits, but the sharing of valuable information that brings this convenience also brings security concerns. The Open Web Application Security Project has released its Top 10 Internet of Things 2018 list of the highest-priority issues. |