To keep up in this age of modernization, network teams need to embrace automation, or be left behind. By treating infrastructure like software, the Infrastructure as Code approach provides several benefits. Read about what goals IaC can help you achieve and what to consider when building a strategy for modernizing your network.
Women are underrepresented in the tech sector —myth or reality? Two years ago, we launched a diversity series aimed at bringing the most inspirational and powerful women in the tech scene to your attention. Today, we’d like you to meet Martina Kraus, Google Developer Expert.
AI is finding a wide variety of uses for images and video, including auto-cropping and resizing, automating image tagging, and creating video auto-previews. This article examines five examples of how AI is used to enable image and video management at scale at Cloudinary.
In this article, we’ll take a look at five principles that should be followed when coding in Java in 2020. Ideally, these principles should be integrated into a DevSecOps process, in which security is built into development from the ground up, but they are equally useful for auditing legacy code.
It’s that time of the month again, time to browse the GitHub trending page and pick the best, coolest, or most impressive open source projects for the month. In February 2020 we saw a magical TensorFlow.js experiment, an open source note-taking application, a product analysis tool for developers, and more. See what our favorites of the month were.
Studies have shown that companies are turning to open source software more and more. By embracing an open source code, companies can be more agile and implement improved services and tools in response to the individual needs of their customers. See how open source code is changing retail and adapting in the fast-changing world of e-commerce.
Working remotely is becoming an option for more people than ever, especially for developers. No office space, no daily commute, no set schedule. However, will you be able to connect with your co-workers and do you have the necessary self-discipline? This article goes over some of the pros and cons of working from home, as well as some personality types that excel at the job.
In this blog, we are going to review how cloud native application development can be simplified by moving from traditional RDBMS scaling techniques (such as vertical scaling using load balancers) to more modern distributed SQL databases such as YugabyteDB which allow horizontal scaling with cluster-aware JDBC drivers.
How justified is our faith in the cloud? While it has its advantages when everything goes well, according to Gartner, throughout 2023, 99% of cloud security failures will be the customer’s fault. In order to protect the organization, and themselves, cloud advocates need to take steps to ensure they are prepared for what could happen.
Women in Tech: “Gender bias is creating massive challenges across social, ethnic, and economic groups.”
Women are underrepresented in the tech sector —myth or reality? Two years ago, we launched a diversity series aimed at bringing the most inspirational and powerful women in the tech scene to your attention. Today, we’d like you to meet Rachel Taylor, CEO of Nubix.io.
Secure Software Development Lifecycle (Secure SDLC) is a key focus area for product engineering organizations. Adopting security as a part of the development process to reduce the risk of vulnerabilities and threats, leads to reduced security incidents and damages. This article presents an uncomplicated view of Secure SDLC for practitioners – Engineering leaders, Product Managers, and Process Leads.
The gaming industry is booming and by 2025 it is expected to be worth $300 billion. Companies looking to gain a competitive advantage in the digital world must therefore create unique and dynamic experiences based on best-in-class platforms in order to drive both customer acquisition and continued retention to power the next generation of games.
Quantum computing might initially sound like a far-fetched futuristic idea, but companies such as Amazon, Google, and IBM are putting their weight behind it and preparations have begun. With quantum computing potentially within our reach, what will happen to our current security models and modern-day encryption? See what security experts are doing to prepare for quantum threats.