and perform code review for code quality and introduce best practices. 3. Perform security review regularly to comply with ISOIntroduce CI automation. - eslint, unit test (Jest), e2e (playwright), i18n automation (Machine Translation), fortify scan, blackduck scan. 5. Host study group to encourage self-learning and knowledge sharing. 6. Product: XDR (includes Workbench, Observed Attack Techniques, and Managed XDR). - Visualization with SVG(d3) and canvas (pixi) to draw a graph for attack root cause analysis. - T able Virtualization to display big data with non-fixed height and a smooth UI. - UI
Feng-Chia University・
Computer Science