Three Key Performance Indicators

Garbage Collection tuning success story – reducing young gen size

This article will take a look at a successful garbage collection tuning case study. Simply by making a minor change, it resulted in a dramatic improvement in garbage collection behavior for a popular application. Additionally, you will learn what Key Performance Indicators (KPIs) you should be focusing on.

Collect data, analyze, and respond

Strategies for the Cloud Threat Hunter

Threat hunting, like all cloud security, is rendered additionally difficult by high volumes of transactions and the high velocity of deployments. Security professionals face constantly evolving landscapes as their company infrastructures change and cloud providers offer new tools. While standard and cloud threat modeling share basic methodologies and joint purposes, there are meaningful differences.

Look out for the signs

Managing burnout in innovative, fast paced industries

In this article, organisational psychologists, consultants and co-founders of award-winning Monkey Puzzle Training and Consultancy Karen Meager and John McLachlan discuss burnout mental health in tech. How can burnout be avoided and what are the warning signs?

Change and growth

Three trends in enterprise open source

What is the current state of enterprise open source, and how has this been changed with the pace of digital transformation? This article looks at Red Hat’s State of Enterprise Open Source report and digs into the top trends in the enterprise open source community during this time of change and growth.

Overcome technical skills gaps and scale automation

Making DevSecOps an automated reality

It’s no secret that DevSecOps with its speedy delivery and reduction in risk can accelerate the pace of digital transformation. In this article, Michelle Sebek, Senior Product Marketing Manager at Progress discusses the role of DevSecOps in digital transformation and policy-based DevSecOps automation architecture.

Use cases for the future

Facing the Future: Emerging AI Facial Recognition


With new technologies like AI, opportunities have emerged to adopt facial recognition in a variety of different domains. Today, there are many success stories where AI has provided reliable and accurate face recognition technology. This article examines some of its potential use cases.

Evolving with threats

From DevOps to FieldOps: Going beyond Secure by Design

In this article, Mike Nelson is the VP of IoT Security at DigiCert, discusses Secure By Design and IoT security after DevOps. The IoT needs to be Secure By Design – it’s an oft-repeated and fundamental best practice for IoT security. However – it’s not enough. Secure By Design is a necessary but insufficient step to reach the goal of a secure IoT.

Improving performance metrics

How GitOps Meant Fewer App Stalls and Failures for an Online Bank

This article examines GitOps in a real-world environment with issues and lessons on improving performance metrics for developers. GitOps provides an essential framework for DevSecOps, for security checks that extend throughout CI/CD, as well during the post-deployment stages of application management on Kubernetes clusters.

Profile: Hamida Rebaï Trabelsi, Senior Cloud Application Architect at Revenu Quebec

Women in Tech: “Learning is my way of having fun”

Four years ago, we launched a diversity series aimed at bringing the most inspirational and powerful women in the tech scene to your attention. Today, we’d like you to meet Hamida Rebaï Trabelsi, Senior Cloud Application Architect at Revenu Quebec.