days
-3
-7
hours
0
-1
minutes
-5
0
seconds
0
-7
search

Articles

How to evenly distribute traffic

Load balancing: Round robin may not be the right choice

When it comes to load balancing, round robin may not be the best algorithm to choose from. If auto-scaling is instrumented, it is even worse. In this article, see a simple example explaining why this is so, how the round robin algorithm works, and which load balancing algorithm you should potentially pick instead for even traffic distribution.

Spinning order out of chaos

Is chaos engineering the key to lockdown cybersecurity?

The practice of chaos engineering can help unearth security problems that ordinarily, you would never discover. By utilizing chaos engineering best practices, your teams can keep up with how a potential hacker might infiltrate your network and gain a better understanding of the weaknesses in your infrastructure and what security measures to take.

Is your IoT fish tank secure?

Are there any real security threats to sensor-generated data?

IoT devices can be a weak leak and expose data to hackers. Businesses should be aware of the risks that can occur if attackers get their hands on data, and keep up with security updates and testing. How can hackers compromise sensor-generated data, and what are the best practices for IoT device security?

Why developers are embracing GraphQL

GraphQL for busy web developers

GraphQL has been available to the public as an open source project since 2015. Why is it growing so fast? This article explores GraphQL, how it hides database complexities, how the ecosystem supports it, and what paid and open source libraries are compatible with it. It’s never too late to begin using GraphQL and its many available services in your projects.

Advantages of a service mesh, done simply

Maesh launches as a new lightweight and open source service mesh

Looking for a service mesh? A service mesh can help coordinate and monitor data and microservices communications across applications. Maesh is built on top of Traefik, an open source cloud-native edge router also known for its simplicity-by-design. This article explores its architecture, how it works, and how to install it.

Bringing developers together

How to supercharge innovation with a Dev Day

The company Cimpress recently began implementing Dev Days, a day for developers, by developers, focused on education and skill-building. Dev Days encourages innovation and allows for developers to keep up with new technology, learn new skills, and be more proactive about their learning. Setting up your own Dev Days event is easy!

Reaching full transparency between teams

Why documentation is not enough to reach transparency in Scrum

The three pillars of Scrum are transparency, inspection, and adaption. However, using documentation as the main way of achieving transparency is perhaps not as good an idea as it may seem. In this article, find out some of the reasons why documentation may still be propping up barriers between different departments and how to break down silos.

Answering questions about the differences

Does 32-bit or 64-bit JVM matter anymore?

Find out the answers to some commonly asked questions about the differences between 32-bit JVM and 64-bit JVM in this article. You will learn all about things to consider when migrating between the two, which performs better, when you should ideally use either, and how to download each.