days
-6
-5
hours
-1
-7
minutes
0
0
seconds
0
-8
search

Articles

Interview with Gurvinder Singh

How voice technologies are changing the hospitality industry

Speech assistants are becoming increasingly popular not only in the entertainment and gaming sectors. Other industries are also facing a voice revolution, such as the hospitality industry. Gurvinder Singh is a hotel entrepreneur who has been using language technology as an early adopter for many years. In an interview, he talks about his experiences and gives insights into what makes a voice assistant successful.

Scaling the modern app world

Modernizing Java to keep pace in a cloud-native world

Java is no spring chicken and some are even referring to it as a “vintage language”. Despite its popularity, there are some complaints about it. In our new cloud-native world, why does Java need to evolve? In order to evolve to keep up with modern, cloud-native apps, Java needs to keep all of what makes it so dependable, while also being able to function in new app environments.

Be brave, stay secure.

Is your browser tracking you? Brave and Mozilla Firefox offer privacy solutions

What browser do you use? Depending on your browser choice, websites may be tracking you wherever you go online. Popular websites can include up to 24 pieces of tracking content from companies such as Facebook and Google. In the fight for Internet security, both Brave and Mozilla Firefox offer free to use solutions. We go over some of the benefits of both browsers.

360-degree view of your problems

Overview of ycrash – finding the source of your problem

Take a tour of ycrash in this article by Ram Lakshmanan. ycrash helps capture critical artifacts, including garbage collection logs, thread dumps, core dumps, heap dumps, disk usage, and more when the problem happens. It applies machine learning algorithms and generates a report which gives you a complete view of the problem, down to the lines of code that caused it.

Building up security

The need for Layer 8: Why the OSI model isn’t enough for application security

The OSI (Open Systems Interconnection) networking model separates communication into seven layers: physical, data link, network, transport, session, presentation, and application. Does the OSI model need a revision? Security professionals discuss the possibility of adding more layers onto the OSI model for better protection and defense against security threats.

Here's to 100 more

Go turns 10: What does the next decade have in store?

#go

Blow out the candles, and make a wish. We are taking a tour of Golang’s growth from the new kid on the block to one of the most used programming languages of our era. It’s not just the cute mascot that draws in programmers (but it doesn’t hurt)! Take a look at what the language is commonly used for and what future plans are in store for the coming years in Go version 2.

Where the concept of sampling began

Are you stuck in the past? A case against data sampling Part I

Increasingly large and diverse data sets allow us to form complex insights. With all this data, why would we limit ourselves by using data sampling instead? Sampling only works when it is put in the hands of data science specialists. In this article, learn about some of the downsides of using data sampling and how it limits and undermines business decisions. Read part one of the case against data sampling.

How to evenly distribute traffic

Load balancing: Round robin may not be the right choice

When it comes to load balancing, round robin may not be the best algorithm to choose from. If auto-scaling is instrumented, it is even worse. In this article, see a simple example explaining why this is so, how the round robin algorithm works, and which load balancing algorithm you should potentially pick instead for even traffic distribution.

Spinning order out of chaos

Is chaos engineering the key to lockdown cybersecurity?

The practice of chaos engineering can help unearth security problems that ordinarily, you would never discover. By utilizing chaos engineering best practices, your teams can keep up with how a potential hacker might infiltrate your network and gain a better understanding of the weaknesses in your infrastructure and what security measures to take.

Is your IoT fish tank secure?

Are there any real security threats to sensor-generated data?

IoT devices can be a weak leak and expose data to hackers. Businesses should be aware of the risks that can occur if attackers get their hands on data, and keep up with security updates and testing. How can hackers compromise sensor-generated data, and what are the best practices for IoT device security?