Today I’m going to show you how to setup a local Apache Kafka cluster for development using Docker and Docker Compose.I assume you have a basic understanding of Docker and Docker Compose and already got it installed. So let’s get started. What is Apache Kafka?Kafka was initially developed at LinkedIn as a messaging queue. It […]
In this blogpost I describe a transformer project, how I proceeded, the results, the pitfalls and more. At the end of the post I will repeat all salient points in a TL;DR, so if you are short of time, just skip ahead. The transformer is currently the hottest Deep Learning model. Introduced in 2017, it […]
Dr. Philipp Bongartz
Path traversal is a security vulnerability (CWE-23: Relative Path Traversal), that can be abused by attackers to get unauthorized access to files.Web applications often include or offer downloading files that are stored on the web server. These files can be referenced by a relative or absolute path. For example, an URL with a reference to […]
You are using React? You want to implement the functionality to draw on a map? You are already using react-leaflet-draw, but want to customize some things?When your answer to the first two questions is yes, the next section of this article will give you advice which possibilities react-leaflet-draw and leaflet-draw offer you, but other frameworks […]
Open redirect is a security vulnerability (CWE-601: URL redirection to untrusted site), that can be abused by attackers to forward users to dangerous pages.A web application receives a query parameter with a location, which is normally some kind of internal resource or URL, and sends a HTTP response with status code 301 or 302 with […]
The usual way of dependency injection with CDI using @Inject offers an extremely efficient mechanism to supply an object with its dependencies. However, there are scenarios where a dynamic version of dependency injection is required. For those cases, CDI offers javax.enterprise.inject.Instance, an interface that allows for the dynamic injection of new instances at runtime on […]
This blog post is a data exploration in the context of an internship. We will apply data science methods to Covid-19 data to give a little insight into both data science and the Covid-epidemic. We will present some simple methods and encounter some typical pitfalls – and hopefully unearth some interesting facts.The Covid-19 data we […]
Dr. Philipp Bongartz
A typical Machine Learning (ML) problem is about prediction such as in Forecasting for data-driven decision making or Credit Risk Analysis Using Machine Learning. If the predicted value is a real number, we use regression. For discrete labels (like TRUE and FALSE or WARM and COLD) we use classification. In order to train a machine […]
This guide shows the use of the HashiCorp Vault with Spring Boot and works on two separate docker containers that communicate secure.
Approving loans without proper scientific evaluation increases the risk of default. This can lead to bankruptcy of lending agencies and consequently the destabilization of the banking system. This is what happened in the 2008 financial crisis which affected the world economy adversely. Three components decide the amount of loss that a firm faces as a […]
Dr. Dibyajyoti Dutta
Transforming raw text into applicable business insights for data-driven decision making is not a trivial task. Following the Natural Language Processing (NLP) breakthrough of a Google research team on Word Embeddings, words or even sentences are efficiently represented as vectors (please refer to Mikolov et al., 2013a, and Mikolov et al., 2013b).Given these vectors, unstructured […]
SDLC stands for Software Development Lifecycle. An SDLC is essentially a series of steps or phases that provide a framework for developing software and managing it throughout its lifecycle. Although there is no specific technique or a single way to develop applications and software components, there are established methods used by enterprises and there are models available to manage different challenges and goals.