It is critical for organizations to develop a comprehensive application security strategy that includes the security of applications currently under development and legacy applications. Tim Buntel explains how.
It may seem like yesterday, but we have already reached the one-year mark since the enforcement of GDPR. Are you performing your due diligence? In this article, Chris Jordan explains why developers need always respect GDPR.
In case you haven’t heard, there is a new MicroProfile implementation in town, called Quarkus! In this article, MicroProfile co-founder John Clingan gives an introduction to Quarkus and its functions.
Just how robust and effective are your testing checkpoints? Does one of the checkpoints include that kind of a load test? Do the checkpoints test for how updates affect all the moving parts? To solve issues like these, Avi Aharon discusses three elements that are essential to testing.
When it comes to API security, even companies with world-class security teams like Facebook and Google are getting caught off guard. In this article, Bernard Harguindeguy offers 12 must-have best practices for protecting API infrastructure from hacking and abuses.
Patching can be manually intensive and time-consuming, requiring large amounts of coordination and processes. In this article Tony Green, a UNIX sysadmin for over 25 years, gives the best tips to take the frustration out of patching for Linux and Windows systems.
The usage and importance of Python have been growing year after year, especially with the data analytics and data science community. In this article, Disha Gupta offers a quick demo of how to implement Python libraries.
It becomes more and more evident that companies need to look for ways to optimize testing processes and improve speed without compromising quality. For startups with limited manpower, skills, budgets, and other resources, the test case management software comes particularly in handy.
Modern navigation apps have many pitfalls, including security concerns, and advertisers paying their way to prominence. Mansoor Ahmed addresses the biases in navigation systems and what the potential, decentralized solution may be in the digital world.
The Agile manifesto states: “Our highest priority is to satisfy the customer through early and continuous delivery of valuable software”. Agile itself is currently in a unique position. In this article, Charlie Ponsonby discusses the “second age of Agile”, as agile methodology approaches late-adoption maturity.
Java has a robust and lively ecosystem of support features. How can developers sort through the dizzying number of options to find the perfect tool for their project? Kayla Matthews explains how developers can find exactly what they are looking for.
Maven’s rich ecosystem of plugins can be used for automating all kinds of mundane, repetitive tasks. In this tutorial, you can learn how building and deployment of Docker containerized OSGi applications on Kubernetes can be automated.
It can be difficult to sort between the hype and the real potential of blockchain. In this article, Dr. Srinath Perera and his colleagues take a systematic approach to evaluate the technology.