As enterprises invest in blockchain, many developers are adding blockchain skills to their long list of disciplines. This article explores some of the requirements that the blockchain developer of tomorrow will need, including a strong security background, and a vast understanding of global finance. Find out how the evolution of blockchain will affect professional credentials.
How much memory are you wasting with duplicate strings? In this article, Ram Lakshmanan goes through a Spring Boot PetClinic application and notes how much memory it wastes. If you can reduce the number of objects that are created to service new incoming requests, your response time will get a lot better.
Make no mistake, all software has bugs; the industry standard ranges from 15 to 50 errors per 1,000 of code. Code review and bug bounty programs cannot find all of them. For better security against vulnerabilities, companies should add a layer of protection with app shielding. App shielding is an approach to application security using a three-pronged approach.
Kubernetes makes it easy to give engineers the ability to deploy their apps to dedicated, isolated namespaces. In this article you will learn what Kubernetes is and how to use Chaos Engineering to help you reach your company’s objectives. Discover what containers, monoliths, and microservices are, why containers are useful, and how to lay down the foundations of success with Kubernetes.
Is cloud computing getting “Edged” out? Edge computing is becoming a viable reality since the cost of IoT hardware and sensors is dropping and devices continue to get smarter (and smaller). With new connectivity technologies such as 5G on their way, edge architectures will lay the foundation for a faster, more efficient Internet of Things.
Modern technology can help free yourself from data sampling. Current computing power has made scalability vastly and available and machine learning algorithms have made the discovery of data quality issues automated and easy. Move on from the old ways of data sampling and learn how to enter the new world of big, smart data.
Many developers prefer to work remotely from the comfort of their own home. However there may be a benefit to working in an office with other employees. Science says that high performers at the office are more effective when seated next to other high performers. Take caution: When high performers are paired up with weaker individuals, their work plummets.
Women are underrepresented in the tech sector —myth or reality? Two years ago, we launched a diversity series aimed at bringing the most inspirational and powerful women in the tech scene to your attention. Today, we’d like you to meet Hanna Stacey, Business Manager at Rackspace EMEA.
Speech assistants are becoming increasingly popular not only in the entertainment and gaming sectors. Other industries are also facing a voice revolution, such as the hospitality industry. Gurvinder Singh is a hotel entrepreneur who has been using language technology as an early adopter for many years. In an interview, he talks about his experiences and gives insights into what makes a voice assistant successful.
Java is no spring chicken and some are even referring to it as a “vintage language”. Despite its popularity, there are some complaints about it. In our new cloud-native world, why does Java need to evolve? In order to evolve to keep up with modern, cloud-native apps, Java needs to keep all of what makes it so dependable, while also being able to function in new app environments.
What browser do you use? Depending on your browser choice, websites may be tracking you wherever you go online. Popular websites can include up to 24 pieces of tracking content from companies such as Facebook and Google. In the fight for Internet security, both Brave and Mozilla Firefox offer free to use solutions. We go over some of the benefits of both browsers.
Take a tour of ycrash in this article by Ram Lakshmanan. ycrash helps capture critical artifacts, including garbage collection logs, thread dumps, core dumps, heap dumps, disk usage, and more when the problem happens. It applies machine learning algorithms and generates a report which gives you a complete view of the problem, down to the lines of code that caused it.
The OSI (Open Systems Interconnection) networking model separates communication into seven layers: physical, data link, network, transport, session, presentation, and application. Does the OSI model need a revision? Security professionals discuss the possibility of adding more layers onto the OSI model for better protection and defense against security threats.
Blow out the candles, and make a wish. We are taking a tour of Golang’s growth from the new kid on the block to one of the most used programming languages of our era. It’s not just the cute mascot that draws in programmers (but it doesn’t hurt)! Take a look at what the language is commonly used for and what future plans are in store for the coming years in Go version 2.