Star Wars Day: May the 4th be with you
DevOps panel discussion

DevOps – right now, or later?

How do you get started with DevOps? And more importantly when do you get started? DevOps pros Peter Roßbach (bee42 Solutions), Bethany Macri (Etsy), Paul Stack (OpenTable) and Sascha Möllering (Zanox AG) trade tips with Sebastian Meyen (S&S Media) in this video panel discussion.

Java's planned obsolescence

Even if Oracle is losing interest in Java, should you worry?

Hearing proclamations of the death of Java is everyday business for this 20-year old giant in IT. But with the recent evangelist layoffs, rumours of Oracle’s neglect and a subdued JavaOne conference, it feels like something has changed. But should Java developers care, asks Jason Whaley.

General knowledge vs. expertise

How much technology does a software architect need to understand?

Is a good software architect like an octopus, forcing its tentacles into everyone’s code? How can the architect be an authority in all technologies used by a system? We discuss the age-old problem of broad vs. focused knowledge with three veteran software architects.

Debunking common vendor security claims

Myths and realities behind security analytics

Security software vendors tend to exaggerate the potential of their tools – to put it mildy. Using real-world attack examples, Niara’s Karthik Krishnan explains why so many enterprise systems are being breached and what cyber security technology is really capable of.

You call that DevOps?

Is DevOps the new black?

DevOps is cool. Correction: DevOps is mainstream. Correction: DevOps has broken through the mainstream and is now quickly catching up on “Agile”, “Big Data” and the almighty “Cloud” as an excessively used buzzword. So how much substance is there to the hype of DevOps?

How to teach computers to learn

Machine learning – An introduction for programmers

If you search Google Scholar for “machine learning”, it returns over 1,800,000 publications. As the buzz around this technology grows, so too does its complexity. Sebastian Raschka, author of Packt’s “Python Machine Learning”, introduces us to the three types of machine learning.

Get your head out of the sand

Securing the BYOD transformation

By 2017 half of all employees with be required to bring their own device to work. Yet around a third of enterprises have yet to implement a BYOD security policy. David Goldschlag, SVP of Strategy for Pulse Secure looks at the security challenges and best practices needed for successful BYOD deployment.