The blockchain professional of the future

The crossover skills of tomorrow’s blockchain developer

As enterprises invest in blockchain, many developers are adding blockchain skills to their long list of disciplines. This article explores some of the requirements that the blockchain developer of tomorrow will need, including a strong security background, and a vast understanding of global finance. Find out how the evolution of blockchain will affect professional credentials.

Analyzing memory wastage and duplicate strings

Memory wasted by Spring Boot PetClinic application

How much memory are you wasting with duplicate strings? In this article, Ram Lakshmanan goes through a Spring Boot PetClinic application and notes how much memory it wastes. If you can reduce the number of objects that are created to service new incoming requests, your response time will get a lot better.

Fortifying mobile apps

App shielding vs. bug bounty programs: In pursuit of fortified mobile applications

Make no mistake, all software has bugs; the industry standard ranges from 15 to 50 errors per 1,000 of code. Code review and bug bounty programs cannot find all of them. For better security against vulnerabilities, companies should add a layer of protection with app shielding. App shielding is an approach to application security using a three-pronged approach.

Foundations of success with Kubernetes

Chaos engineering with Kubernetes

Kubernetes makes it easy to give engineers the ability to deploy their apps to dedicated, isolated namespaces. In this article you will learn what Kubernetes is and how to use Chaos Engineering to help you reach your company’s objectives. Discover what containers, monoliths, and microservices are, why containers are useful, and how to lay down the foundations of success with Kubernetes.

The edge factor

Intelligent edge or cloud computing: Which is the killer app for IoT?

Is cloud computing getting “Edged” out? Edge computing is becoming a viable reality since the cost of IoT hardware and sensors is dropping and devices continue to get smarter (and smaller). With new connectivity technologies such as 5G on their way, edge architectures will lay the foundation for a faster, more efficient Internet of Things.

High performing individuals lift each other up

Your team works better from the office rather than from home. Science says so.

Many developers prefer to work remotely from the comfort of their own home. However there may be a benefit to working in an office with other employees. Science says that high performers at the office are more effective when seated next to other high performers. Take caution: When high performers are paired up with weaker individuals, their work plummets.

Profile: Hanna Stacey, Business Manager at Rackspace EMEA

Women in Tech: “Diversity drives innovation.”

Women are underrepresented in the tech sector —myth or reality? Two years ago, we launched a diversity series aimed at bringing the most inspirational and powerful women in the tech scene to your attention. Today, we’d like you to meet Hanna Stacey, Business Manager at Rackspace EMEA.

Interview with Gurvinder Singh

How voice technologies are changing the hospitality industry

Speech assistants are becoming increasingly popular not only in the entertainment and gaming sectors. Other industries are also facing a voice revolution, such as the hospitality industry. Gurvinder Singh is a hotel entrepreneur who has been using language technology as an early adopter for many years. In an interview, he talks about his experiences and gives insights into what makes a voice assistant successful.

Scaling the modern app world

Modernizing Java to keep pace in a cloud-native world

Java is no spring chicken and some are even referring to it as a “vintage language”. Despite its popularity, there are some complaints about it. In our new cloud-native world, why does Java need to evolve? In order to evolve to keep up with modern, cloud-native apps, Java needs to keep all of what makes it so dependable, while also being able to function in new app environments.

Be brave, stay secure.

Is your browser tracking you? Brave and Mozilla Firefox offer privacy solutions

What browser do you use? Depending on your browser choice, websites may be tracking you wherever you go online. Popular websites can include up to 24 pieces of tracking content from companies such as Facebook and Google. In the fight for Internet security, both Brave and Mozilla Firefox offer free to use solutions. We go over some of the benefits of both browsers.

360-degree view of your problems

Overview of ycrash – finding the source of your problem

Take a tour of ycrash in this article by Ram Lakshmanan. ycrash helps capture critical artifacts, including garbage collection logs, thread dumps, core dumps, heap dumps, disk usage, and more when the problem happens. It applies machine learning algorithms and generates a report which gives you a complete view of the problem, down to the lines of code that caused it.

Building up security

The need for Layer 8: Why the OSI model isn’t enough for application security

The OSI (Open Systems Interconnection) networking model separates communication into seven layers: physical, data link, network, transport, session, presentation, and application. Does the OSI model need a revision? Security professionals discuss the possibility of adding more layers onto the OSI model for better protection and defense against security threats.

Here's to 100 more

Go turns 10: What does the next decade have in store?


Blow out the candles, and make a wish. We are taking a tour of Golang’s growth from the new kid on the block to one of the most used programming languages of our era. It’s not just the cute mascot that draws in programmers (but it doesn’t hurt)! Take a look at what the language is commonly used for and what future plans are in store for the coming years in Go version 2.