When it comes to load balancing, round robin may not be the best algorithm to choose from. If auto-scaling is instrumented, it is even worse. In this article, see a simple example explaining why this is so, how the round robin algorithm works, and which load balancing algorithm you should potentially pick instead for even traffic distribution.
In this article, Kamesh Sampath shows us how to master the first steps on the journey towards a serverless application. He shows how to set up the right environment and takes us through its deployment.
The practice of chaos engineering can help unearth security problems that ordinarily, you would never discover. By utilizing chaos engineering best practices, your teams can keep up with how a potential hacker might infiltrate your network and gain a better understanding of the weaknesses in your infrastructure and what security measures to take.
IoT devices can be a weak leak and expose data to hackers. Businesses should be aware of the risks that can occur if attackers get their hands on data, and keep up with security updates and testing. How can hackers compromise sensor-generated data, and what are the best practices for IoT device security?
Women are underrepresented in the tech sector —myth or reality? Two years ago, we launched a diversity series aimed at bringing the most inspirational and powerful women in the tech scene to your attention. Today, we’d like you to meet Lina Zubyte, QA Consultant at ThoughtWorks.
GraphQL has been available to the public as an open source project since 2015. Why is it growing so fast? This article explores GraphQL, how it hides database complexities, how the ecosystem supports it, and what paid and open source libraries are compatible with it. It’s never too late to begin using GraphQL and its many available services in your projects.
Women are underrepresented in the tech sector —myth or reality? Two years ago, we launched a diversity series aimed at bringing the most inspirational and powerful women in the tech scene to your attention. Today, we’d like you to meet Reema Poddar, Chief Product Officer for Teradata.
By 2023, it is predicted that companies will have more than two containerised applications in place. Don’t go into containers without knowing what is true and what is just a myth. Read about these five big misconceptions regarding container security and overcome the challenges of planning for strong security models.
Looking for a service mesh? A service mesh can help coordinate and monitor data and microservices communications across applications. Maesh is built on top of Traefik, an open source cloud-native edge router also known for its simplicity-by-design. This article explores its architecture, how it works, and how to install it.
Another month has passed, and that means it’s time to collect our favorite GitHub repos and explore some of the coolest, most impressive, or most interesting projects that we found. October 2019 brought us plenty of projects, including an easy way to create documentation, a low-tech operating system for the end of the world, and more.
The company Cimpress recently began implementing Dev Days, a day for developers, by developers, focused on education and skill-building. Dev Days encourages innovation and allows for developers to keep up with new technology, learn new skills, and be more proactive about their learning. Setting up your own Dev Days event is easy!
Women are underrepresented in the tech sector —myth or reality? Two years ago, we launched a diversity series aimed at bringing the most inspirational and powerful women in the tech scene to your attention. Today, we’d like you to meet Sivan Nir, senior analyst in the Skybox Research Lab.
The three pillars of Scrum are transparency, inspection, and adaption. However, using documentation as the main way of achieving transparency is perhaps not as good an idea as it may seem. In this article, find out some of the reasons why documentation may still be propping up barriers between different departments and how to break down silos.
Find out the answers to some commonly asked questions about the differences between 32-bit JVM and 64-bit JVM in this article. You will learn all about things to consider when migrating between the two, which performs better, when you should ideally use either, and how to download each.