$filter: The expression specified with $filter is evaluated for each resource in the collection, and only items where the expression evaluates to true are included in the response.
serviceRoot/People?$filter=FirstName eq 'Scott'
$orderby: The $orderby system query option allows clients to request resources in either ascending order using asc or descending order using desc.
$count: The $count system query option allows clients to request a count of the matching resources included with the resources in the response.
$select: The $select system query option allows the clients to requests a limited set of properties for each entity
$top & $skip: The $top system query option requests the number of items in the queried collection to be included in the result. The $skip query option requests the number of items in the queried collection that are to be skipped and not included in the result.
$expand: The $expand system query option specifies the related resources to be included in line with retrieved resources.
Accenture, Microsoft Team Up on Blockchain-Based Digital ID Network
Blockchain, first developed as a public ledger of all transactions in the digital currency bitcoin, is increasingly being used to securely track data in other fields.
"Without an identity you can't access education, financial services, healthcare, you name it. You are disenfranchised and marginalized from society," David Treat, a managing director in Accenture's financial services practice, said in an interview.
"Having a digital identity is a basic human right."
RSS: Residual Sum of Squares
It is a measure of the discrepancy between the data and an estimation model.
A small RSS indicates a tight fit of the model to the data. It is used as an optimality criterion in parameter selection and model selection.
RSS is the sum of the squares of residuals (deviations predicted from actual empirical values of data).
In statistics and optimization, errors and residuals are two closely related and easily confused measures of the deviation of an observed value of an element of a statistical sample from its "theoretical value".
Residual of an observed value is the difference between the observed value and the estimated value of the quantity of interest.
Language Understanding Intelligent Service (LUIS) enables developers to build smart applications that can understand human language and react accordingly to user requests.
LUIS uses the power of machine learning to solve the difficult problem of extracting meaning from natural language input, so that your application doesn't have to.
Any client application that converses with users, like a dialog system or a chat bot, can pass user input to a LUIS app and receive results that provide natural language understanding.
A distributed ledger (also called shared ledger) is a consensus of replicated, shared, and synchronized digital data geographically spread across multiple sites, countries, or institutions.
There is no central administrator or centralised data storage.
A peer-to-peer network is required as well as consensus algorithms to ensure replication across nodes is undertaken.
One distributed ledger design is through implementation of a public or private blockchain system. But all distributed ledgers do not have to necessarily employ a chain of blocks to successfully provide secure and valid achievement of distributed consensus, a Blockchain is only one type of data structure considered to be a distributed ledger.
The Duck test is a humorous term for a form of abductive reasoning.
If it looks like a duck, swims like a duck, and quacks like a duck, then it probably is a duck.
The test implies that a person can identify an unknown subject by observing that subject's habitual characteristics. It is sometimes used to counter abstruse, or even valid, arguments that something is not what it appears to be.
In computer programming, duck typing is an application of the duck test in type safety. It requires that type checking be deferred to runtime, and is implemented by means of dynamic typing or reflection.
Duck typing is concerned with establishing the suitability of an object for some purpose. With normal typing, suitability is assumed to be determined by an object's type only. In duck typing, an object's suitability is determined by the presence of certain methods and properties (with appropriate meaning), rather than the actual type of the object.
using static System.Console;
public void Quack() => WriteLine("Quaaaaaack!");
public void Feathers() => WriteLine("The duck has white and gray feathers.");
public void Quack() => WriteLine("The person imitates a duck.");
public void Feathers() => WriteLine("The person takes a feather from the ground and shows it.");
static void InTheForest(dynamic obj)
static void Game()
Duck donald = new Duck();
Person john = new Person();
static void Main()
You allocate to the stack when you’re defining things in a local scope where you know exactly the memory block size you need, such as primitive data types, arrays of a set size, etc.
The stack is a self-managing memory store that you don’t have to worry about – it’s super fast at allocating and clearing memory all by itself.
For other memory allocations, such as objects, buffers, strings, or global variables, you allocate to the heap.
Compared to the stack, the heap is not self-managing. Memory allocated to the heap will sit there throughout the duration of the program and can change state at any point in time as you manually allocate/deallocate to it.
Bayesian inference is a method of statistical inference in which Bayes' theorem is used to update the probability for a hypothesis as more evidence or information becomes available.
Contains methods to create types of objects locally or remotely, or obtain references to existing remote objects.
This class cannot be inherited.
Assembly: mscorlib (in mscorlib.dll)
A package to perform background processing in .NET and .NET Core applications. No Windows Service or separate process required.
Backed by persistent storage.
Open and free for commercial use.
Asymptotic Notations are languages that allow us to analyze an algorithm’s running time by identifying its behavior as the input size for the algorithm increases. This is also known as an algorithm’s growth rate.
Microsoft DevSkim is a framework of IDE plugins and Language analyzers that provide inline security analysis in the dev environment as the developer writes code. It is designed to work with multiple IDEs (VS, VS Code, Sublime Text, etc.), and has a flexible rule model that supports multiple programming languages.
The idea is to give the developer notification as they are introducing a security vulnerability in order to fix the issue at the point of introduction, and to help build awareness for the developer.
Fuzzing or fuzz testing is an automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program.
The program is then monitored for exceptions such as crashes, or failing built-in code assertions or for finding potential memory leaks. Typically, fuzzers are used to test programs that take structured inputs.
Scalable tabular (SFrame, SArray) and graph (SGraph) data-structures built for out-of-core data analysis.
The SFrame package provides the complete implementation of:
The SFrame contains the open source components GraphLab Create from Turi.
Turi is a graph-based, high performance, distributed computation framework written in C++.
The GraphLab project was started by Prof. Carlos Guestrin of Carnegie Mellon University in 2009.
It is an open source project using an Apache License. While GraphLab was originally developed for Machine Learning tasks, it has found great success at a broad range of other data-mining tasks; out-performing other abstractions by orders of magnitude.
Turi company (formerly Dato and before that GraphLab Inc.) was founded by Prof. Carlos Guestrin from University of Washington on May 2013.
On August 5, 2016, Turi was acquired by Apple Inc.
Active Directory Federation Services (ADFS) is a software component developed by Microsoft that can be installed on Windows Server operating systems to provide users with single sign-on access to systems and applications located across organizational boundaries.
It uses a claims-based access-control authorization model to maintain application security and to implement federated identity.
Claims-based authentication involves authenticating a user based on a set of claims about that user's identity contained in a trusted token.
204 - No Content