Modern languages don’t do checked exceptions. But you don’t have to jump ship to share the experience. In this article Scott McKinney shows you how to stick with Java and completely neutralize checked exceptions with a simple new addition to the Manifold framework.
Discover the potential benefits of open source software for your business and the risks you need to be aware of. Open source has long been hailed as the future of software development, yet it’s definitely not for everyone. Darya Efimova, a digital transformation observer at Iflexion, taps into the big promise of open source along with its advantages and risks when it comes to enterprise-grade software.
A recent report revealed that real time buying in the advertising industry does not comply with the set GDPR requirements. With so much concern about privacy, how can you protect your data? In this article, Katherine Barnett examines some of the ways you can keep your data safe and keep sensitive information out of advertisers’ hands.
Manuel Bernhardt continues his series about Akka Typed, the new Akka Actor API that brings significant advantages over the classic one. This second entry goes further down the route of building typed actor systems by looking at fundamental concepts necessary for the interaction between actors.
Artificial intelligence and machine learning are changing how marketing campaigns work for many companies. They make it possible to transform datasets that allow better decision-making. However, it is not a magic solution, and there are still a few things you should not do when implementing AI and ML.
Most people reading this are likely familiar with machine learning and the relevant algorithms used to classify or predict outcomes based on data. However, it is important to understand that machine learning is not the answer to all problems. Given the usefulness of machine learning, it can be hard to accept that sometimes it is not the best solution to a problem.
Progressive Web Apps (PWAs) need proper testing before launch, in order to ensure that they run on all browsers, devices, and with a variety of network speeds and providers. This checklist will help you ensure that your progressive web app is ready, fully tested, and ready to reach mobile users.
Running software in containers is catching on, and nearly half of IT leaders plan to deploy containers in production. Containers are extremely useful and can solve many problems associated with multiple environments, but they have their limitations. What do you need to know about containerization and its pros versus con before you begin?
In the column “Stropek as a Service”, SaaS expert Rainer Stropek talks about exciting aspects of the implementation, monetization and use of software as a service offerings. This column focuses on how cloud computing could actually help reduce global warming.
Software, access, and realpolitik — How should open source communities respond to the GitHub restrictions?
What happens when open source isn’t open to all? GitHub made headlines recently when it made it difficult for developers in Cuba, Iran, North Korea, and Syria to access private repository services. This has opened up a conversation that needs to happen regarding free and open source software.
At a high level, Cloud-Native architecture implies adapting to the many new possibilities empowering innovation that paves the way for digital transformation. How did Cloud-Native approaches come to be? Time to take a tour of Cloud-Native DevOps, where it came from, where it is now, and what positives it brings to its users.
Sometimes designing a mobile app sounds simple, but it can be anything but. How do you come up with an app design that is engaging for your users? Here are some UX tips for designing better mobile apps and what developers and designers should focus on.
Container technology is more widespread than ever, but a report has found that security standards are unable to keep up with the pace. We interviewed Ali Golshan, CTO and co-founder of StackRox about what causes container security issues and how to improve the way security is approached.
When is it best to run your application with fewer instances and large memory size, or a lot of instances with a small memory size? In this article, Ram Lakshmanan discusses the differences and pricing of each module and goes over two multi-billion dollar enterprise stories.