Articles

  • Dec 31, 2024 | dzone.com | SAEED AHMED

    Okay, so picture this: it’s 11 p.m., I’ve got a cup of coffee that’s somehow both cold and scalding (a skill I’ve mastered), and I’m spiraling down the rabbit hole of JavaScript runtimes. Yeah, I know, wild Friday night, right? But hey, when you're a software engineer, your idea of "fun" sometimes involves comparing Deno and Node.js while your cat judges you from across the room. For a little backstory on this notion, I have been juggling with Node.js for years now.

  • Nov 2, 2024 | mdpi.com | SAEED AHMED |Abdullah Altamimi |ZAFAR KHAN |Anila Kousar

    All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess.

  • Oct 28, 2024 | arxiv.org | Jacquelien M. A |SAEED AHMED |Juan Machado |Michele Cucuzzella

    arXiv:2410.21570 (math) View PDF HTML (experimental) Subjects: Optimization and Control (math.OC); Systems and Control (eess.SY) Cite as: arXiv:2410.21570 [math.OC] (or arXiv:2410.21570v1 [math.OC] for this version) https://doi.org/10.48550/arXiv.2410.21570 Submission history From: Saeed Ahmed Dr. [ view email] [v1] Mon, 28 Oct 2024 22:05:43 UTC (6,298 KB) Bibliographic Tools Bibliographic Explorer Toggle Bibliographic Explorer () Litmaps Toggle Litmaps (What is Litmaps?) scite.ai Toggle...

  • Aug 30, 2024 | hackernoon.com | SAEED AHMED

    By adhering to these best practices, companies can strengthen their security posture and protect their systems against threats. It’s imperative to fully understand SAST best practices for secure source code. Since the source code is the inception point, it’s also the gateway for repairs and mitigation. With the increasing shift from on-prem to cloud environments, securing these applications is essential for ensuring uninterrupted business growth and maintaining customer trust.

  • Aug 29, 2024 | mdpi.com | Muhammad Asad Arshed |Shahzad Mumtaz |SAEED AHMED |Neelam Urooj

    All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →