Articles

10/04/24
By: Elizaveta Andrushkevich

Programming with a Turing Machine

In this article I will talk about the Turing machine for programmers. A Turing machine is an imaginary computer which is made as simple as possible - it's hard to imagine a simpler computer! A Turing machine doesn’t even know how to do simple arithmetic operations: addition, multiplication, subtraction, and division. To do any of these operations, like adding two numbers, you need to write a program. The simplicity of the Turing Machine makes it convenient to build a mathematical model of it and to use that to analyze algorithms written for it. Although I am interested in the mathematical component, in this article I will focus on programming. …
read more
05/25/23

Do you know what is the best for your project: Scrum or Kanban?

Sometimes, it's hard for project managers to know what makes these styles different and which one is the best. In this article, we're going to answer these questions and more. …
read more
11/01/21

Visualising Neural Network Learning of Boolean Functions

This article describes the implementation of software that provides a visual demonstration of a neural network as it learns to emulate different boolean functions, which can be useful to understand the learning process. …
read more
07/30/21

React Native VS Flutter

Having worked with both React Native and Flutter for about the same amount of time, our tech lead Dmitry Z would like to share his experience of both with the community. This article is for people who might not be familiar with these frameworks yet, but who want to understand the fundamental differences between them. …
read more
03/23/21

How to encrypt data in .NET Core applications on macOS without DPAPI

This article talks about data encryption in a .NET Core application on macOS. It assumes that you've heard of DPAPI, a popular approach to encrypting data on Windows, and that you want to use it on macOS. Using DPAPI on macOS isn't possible, and the article presents a modern approach to data encryption on macOS. …
read more
03/17/21

How do SQL queries work? How do you use INNER JOIN and LEFT JOIN? Review how SQL works for beginners in practice.

This article talks about the very basics of writing SQL queries, but we assume that you have already read the formal description of the structure of SQL queries somewhere. It is assumed that you know what the query “SELECT * FROM Students” returns, but that you do not feel very confident when you need to write a SQL query that receives data from multiple tables using multiple INNER JOINs or LEFT JOINs. Let's take a look at how SQL works in practice. …
read more
03/15/21

AESD Lab Programming Best Practices

This document presents the set of C# best practices we maintain across all our projects at AESD Lab. Lets’ dive straight in. …
read more
01/29/21

AESD Lab C# coding conventions

The document presents the set of C# coding standards we maintain across all our projects at AESD Lab. …
read more
01/21/21

How to reduce costs of Azure subscription

This article describes a way to reduce the cost of a Pay As You Go Azure subscription if you host several applications and the capabilities of the virtual machines (VM) used (CPU and Memory) are excessive to the small load on these applications. It is often useful for early-stage startups hosted on Azure. …
read more
12/25/20

Obtaining debugging information from released application

There are situations when a developer needs debugging information from an application without the use of the IDE (Integrated Development Environment) debugger tools. The techniques described in the article could be implemented into the application and could help the developer to obtain information without debugging. At the end, an example application, which implements the described functionality, will be observed. …
read more
11/23/20

How to set up group policy scripts programmatically

If you are reading this article, you may already know that Windows does not provide a convenient API for configuring Group Policy scripts (startup / shutdown / logon / logoff). It is pretty easy to configure Group Policy with the GUI , but sometimes this process requires automation. In this article we'll cover: manual configuration of Group Policy script, algorithm for Programmatic Configuration of Group Policy Scripts, Powershell Code example. …
read more
08/05/20

Converting Non-Tail Recursion to Iteration

In this article, we are using a specific example to analyze a scenario when the use of recursion can lead to unexpected and disastrous results. And if you find troublesome recursion inside your code, this article will help you avoid negative consequences. …
read more
04/25/20

Testing interaction with external services API

Modern web applications have multiple integrations with external systems, from simple notification services to complex payment providers, CRM and BI systems. This article will help software engineer to plan and implement testing strategy for interactions between the application and external systems. …
read more