Learn how to implement the recursive top-down and iterative bottom-up versions of Merge Sort in Python.
Also find me here:
Baeldung Author
Albert Stec
Senior Java Developer with over 8 years of experience. Working mostly with big, enterprise software like banking and e-commerce. I love to spread my knowledge. That's why I'm also leading Java boot camps, and writing computer-science-related articles. In my free time, I expand my knowledge about Cloud and Kotlin.
Here's what I've written (so far):
Baeldung on Computer Science
- All
- Programming (9)
- Security (7)
- Software Architecture (6)
- Methodology (5)
- Networking (3)
- OS (2)
- Sorting (1)
- Deep Learning (1)
- Computer Vision (1)
Inversion of Control
Filed under Programming
Explore the concept of the inversion of control to reveal how it enhances software development.
What Is Sharding?
Filed under Software Architecture
Learn the fundamentals of sharding and details of how it works.
Infrastracture as a Code
Filed under Software Architecture
Learn what Infrastructure-as-a-code means.
Microservices vs. Service-Oriented Architecture
Filed under Software Architecture
Compare microservices to service-oriented architecture (SOA).
Event-Driven Architecture
Filed under Software Architecture
Learn about the software design approach called event-driven architecture (EDA).
An Introduction to Deepfakes
Filed under Deep Learning
Explore the deepfake technology and its benefits and dangers.
Load Testing vs. Stress Testing
Filed under Programming
Learn more about the differences between load testing and stress testing.
Positive and Negative Testing
Filed under Programming
What do we use positive testing for, and how is it different from negative testing?
Rapid Application Development
Filed under Methodology
Learn more about Rapid Application Development.
Software Engineering: V-Shaped Model
Filed under Methodology
Learn more about the V-Shaped Model in Software Engineering.
Extreme Programming
Filed under Methodology
Learn more about Extreme Programming.
Software Engineering: SCRUM vs. XP
Filed under Methodology
Learn more about the difference between SCRUM and XP.
Software Engineering: The Waterfall Model
Filed under Methodology
Learn more about the waterfall model
What Is a Keylogger?
Filed under Security
Learn more about keyloggers.
An Introduction to Computer Vision
Filed under Computer Vision
Learn the basics of Computer Vision.
What Is CAPTCHA and How Does It Work?
Filed under Security
Learn about CAPTCHA security and how it works.
RSA SecurID Tokens
Filed under Security
Learn more about RSA SecurID Tokens
MD5 vs. SHA Algorithms
Filed under Security
Have a closer look at two cryptographic algorithms: MD5 (message-digest algorithm) and SHA (Secure Hash Algorithm) and how they compare.
Unit Testing vs Test-Driven Development
Filed under Programming
Learn the difference between Unit Tests and Test-Driven Development.
Introduction to SAML
Filed under Security
Learn about SAML 2.0, one of the most common standards used when implementing SSO solutions.
The REST Architecture
Filed under Software Architecture
Learn about the REST architecture and its most common applications.
Technical Debt
Filed under Programming
In this article, we’ll elaborate on technical debt and its dangers.
Symmetric Cryptography vs Asymmetric Cryptography
Filed under Networking
Learn about the difference between symmetric and asymmetric cryptography.
Database Design in a Microservices Architecture
Filed under Software Architecture
Learn about database design in a microservices architecture.
Virtual Memory
Filed under OS
Explore the virtual memory concept in detail.
SSL vs. SSH
Filed under Networking, Security
Understand how the SSH and SSL protocols compare.
Understanding BDD
Filed under Programming
Learn about Behaviour-Drive Development (BDD) and how it differs from TDD
Guide to Single Sign-On (SSO)
Filed under Security
Learn about Single Sign-On in detail.
GIT vs. SVN
Filed under Programming
Explore two most popular version control systems, namely GIT and SVN.
REST vs SOAP
Filed under Programming
Analyze the two most known approaches to building APIs called REST and SOAP.
UDP vs TCP
Filed under Networking
Explore UDP and TCP networking protocols in detail.
Deep Dive into Hashing
Filed under Programming
Dive deeply into the topic of hashing: how it works, hash functions, algorithms, and potential attacks.
How Compilers Work
Filed under OS
Understand the compilation process which converts high-level source code to low-level machine code.