Software Engineering Perspectives Articles

Sorted By: Most Recent
Kyle Brill Kyle Brill
Updated on July 24, 2024

What Is Database-as-a-Service (DBaaS)?

With DBaaS, users receive access to a database without the need to manage one themselves. Here’s what you need to know.

Image: Shutterstock / Built In
K. Jagathish K. Jagathish
Updated on July 22, 2024

How to Check If an Object Is Empty in JavaScript

Here are five quick and easy ways to check if an object is empty in JavaScript.

Image: Shutterstock / Built In
Zubair Zahid Zubair Zahid
Updated on July 22, 2024

How to Install cuDNN and CUDA for Windows and Linux

CUDA Deep Neural Network (cuDNN) is a GPU library for deep neural networks, while CUDA is library to access and command the GPU. Here’s how to download them.

Image: Shutterstock / Built In
Igor Irianto Igor Irianto
Updated on July 17, 2024

A Guide to Vim Visual Mode

Vim visual mode is a feature in Vim that makes it easier to target a specific group of code and make changes to them. Learn how to navigate it.

Image: Shutterstock / Built In
Rory Spanton Rory Spanton
Updated on July 16, 2024

Pipe in R: A Guide

Pipe in R (|>) is an operator that takes the output of one function and passes it into another function as an argument, linking together the steps for data analysis. 

Image: Shutterstock / Built In
Reza Lavarian Reza Lavarian
Updated on July 11, 2024

How to Fix TypeError: ‘List’ Object Is Not Callable in Python

TypeError: ‘list’ object is not callable is an error in Python that’s caused when a list is thrown as if it was a function. Here’s how to fix it.

Image: Shutterstock / Built In
KSV Muralidhar KSV Muralidhar
Updated on July 10, 2024

How to Merge Two Tables in SQL

Two tables can be merged in SQL either by rows or columns through a variety of commands, including inner join, left join, union, except and more. Here’s how with examples. 

Image: Shutterstock / Built In
Metin Kortak Metin Kortak
Updated on July 09, 2024

A Log Analysis Tutorial

Log analysis is the process of analyzing computer-generated record of events in a digital environment to identify suspicious activity. Learn how it works.

Image: Shutterstock / Built In
Sarah Gray Sarah Gray
Updated on June 25, 2024

These Cyber Attacks Could Have Been Prevented. Here’s How.

While cybersecurity threats continue to evolve, there are simple steps companies can take to protect themselves.

Image: Shutterstock / Built In
Nathan Broslawsky Nathan Broslawsky
Updated on June 25, 2024

When Designing a System, Think Evolutionarily

We may be tempted to design systems that can account for every possible eventuality so that they can run indefinitely with minimal adjustment. But the reality of the business world is more Darwinian than Newtonian.

Image: Shutterstock / Built In