| AI-Driven Threat Intelligence ByOmar Santos, Petar RadanlievFeb 25, 2026 |
| Automating a Bug Hunt and Leveraging the Power of AIFeb 25, 2026 |
| Becoming the Orchestrator BySadie Kay St LawrenceFeb 25, 2026 |
| CRE Tooling ByMariya Breyter, Carlos RojasFeb 25, 2026 |
| Exploring the Problem Space with Strategic Domain-Driven Design and Wardley Mapping BySusanne KaiserFeb 25, 2026 |
| First Steps with AI Agents and Multi-Agent Workloads BySinan OzdemirFeb 25, 2026 |
| Fundamental Programming Structures in Java ByCay S. HorstmannFeb 25, 2026 |
| Introduction ByLoredana Abramo, Vijay Kanabar, Rich Maltzman, Dave SilbermanFeb 25, 2026 |
| Mole Balances ByH. Scott Fogler, Bryan R. Goldsmith, Eranda Nikolla, Nirala SinghFeb 25, 2026 |
| Optics and Cable Management ByMahesh Subramaniam, Michal Styszynski, Himanshu TambakuwalaFeb 25, 2026 |
| Oracle IaaS-Cloud-Native Technologies ByErik Benner, Ahmed Aboulnaga, Dhrumil PatelFeb 25, 2026 |
| Projects, Life Cycles, and Processes ByVijay KanabarFeb 25, 2026 |
| Stakeholders and Stakeholder Activism ByDavid Larcker, Brian TayanFeb 25, 2026 |
| Streams ByCay S. HorstmannFeb 25, 2026 |
| The Anatomy of a Perfect Prompt ByMichael MillerFeb 25, 2026 |
| The Machinery of Learning ByRobert Barton, Jerome HenryFeb 25, 2026 |
| The Opportunities and Risks Related to Artificial General Intelligence (AGI) in Cybersecurity ByPetar RadanlievFeb 25, 2026 |
| Thinking Test-Driven ByRob MyersFeb 25, 2026 |
| Virtual Threads ByKhalid A. Mughal, Vasily A. StrelnikovFeb 25, 2026 |