-
Notifications
You must be signed in to change notification settings - Fork 3
/
Links.txt
26 lines (26 loc) · 1.84 KB
/
Links.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
http://www.hcpro.com/QPS-331486-234/Cleanliness-sensors-Using-technology-to-improve-hand-hygiene-compliance.html
https://link.springer.com/chapter/10.1007/978-981-10-8575-8_9
http://www.figarosensor.com/
https://electronza.com/hydrogen-sulfide-sensing-arduino-due/2/
https://electronza.com/h2s-sensing-revisited-tutorial-arduino-uno/
https://acadpubl.eu/hub/2018-119-14/articles/1/67.pdf
https://stackoverflow.com/questions/6041811/close-all-tabs-in-visual-studio
https://www.itprotoday.com/net/swimming-net-connection-pool
https://www.c-sharpcorner.com/article/introduction-to-angular-7-animations-using-bootstrap-4/
https://simpledns.com/kb/163/how-to-bind-an-ssl-certificate-to-the-http-api
https://www.teradata.com/Blogs/AI-without-machine-learning
http://techgenix.com/ai-machine-learning/
https://msdn.microsoft.com/en-us/magazine/mt422577.aspx
https://docs.microsoft.com/en-us/azure/architecture/patterns/cqrs
https://exceptionnotfound.net/implementing-cqrs-in-net-part-2-handling-commands-and-events/
https://radekmaziarka.pl/2018/01/08/cqrs-third-step-simple-read-model/
https://dev.to/barryosull/projection-building-blocks-what-youll-need-to-build-projections--5g1n
https://medium.com/@hugo.oliveira.rocha/what-they-dont-tell-you-about-event-sourcing-6afc23c69e9a
https://martinfowler.com/eaaDev/EventSourcing.html
https://martinfowler.com/bliki/CQRS.html
https://www.nexocode.com/blog/posts/cqrs-and-event-sourcing/
https://www.oreilly.com/library/view/developing-reactive-microservices/9781491975640/ch04.html
https://www.bouvet.no/bouvet-deler/utbrudd/a-simple-todo-application-a-comparison-on-traditional-vs-cqrs-es-architecture
https://www.nexocode.com/blog/posts/cqrs-and-event-sourcing/
https://rubikscode.net/2019/02/18/ultimate-guide-to-machine-learning-with-ml-net/
https://devblogs.microsoft.com/premier-developer/angular-how-to-implement-role-based-security/