Advertisement

hyper convergence speed burning rubber tire binary fast by tao55 getty images

Ruby 3.1 arrives with new JIT compiler

Still-experimental YJIT just-in-time compiler promises faster warmup and performance improvements on most real-world Ruby software.


changing lanes / strategic shift / career change / reorientation

Cloud architecture must accommodate rapid change

Yesterday we built architectures around static requirements that changed slowly. Today's cloud-based configurations need to quickly adapt to growth and change.


periscope above the water 121226200

5 key observability trends for 2022

In the coming year, organizations will seek to simplify, optimize, and consolidate observability through a mix of new tools and practices.


Advertisement

wood block type

TypeScript 4.6 loosens up

Next version of Microsoft’s strongly typed JavaScript will will allow code in constructors before super(), improve recursion depth checks, and more.


quilt

Git alternative Pijul moves to beta

Open source distributed version control system based on a ‘theory of patches’ promises to be fast, scalable, and easier to learn and use than Git.


Chains of binary data.

So you want to be a Web3 developer

The latest industry buzzword is creating an opening for ambitious developers to contribute to an exciting emerging ecosystem, underpinned by distributed ledgers and cryptocurrency. But there are plenty of caveats on Web3 to contend...


customer service ts

Why you should buy, not build, a customer data platform

Creating a single source of truth for customer data and a 360-degree customer view is a complex undertaking. Buying a solution rather than building one streamlines the process.


3 patch training update software band aid laptop with virus binary

Of hacks and patches

It’s obvious that cybersecurity becomes a bigger concern every day. Stay in the cloud, and take responsibility for the open source software you use.


1 weakest link broken rusted chain security breach hacked

Rust 1.58.1 fixes dangerous race condition

Vulnerability would allow an attacker to trick a privileged program into deleting files and directories that the attacker otherwise could not access or delete.


rust king iron bronze crown royal queen

What’s new in Rust 1.58 and Rust 1.58.1

Rust was designed to make it easy to develop fast and safe system-level software. Here’s what’s new.


Advertisement

Upwardly pointing arrows overlay the face of Benjamin Franklin on the U.S. one hundred dollar bill.

The forces behind enterprise cloud spending trends

After a small decline in 2021, cloud spending is up again, but perhaps not for the reasons we expected, which are often based on faulty assumptions.


private public hybrid cloud technology sign

What is Google Cloud Anthos? Managed Kubernetes everywhere

Google’s Anthos promises a single, consistent way of managing Kubernetes workloads across on-prem and public cloud environments


Coffee with cream and sugar.

JDK 18: The new features in Java 18

Due in March 2022, Java 18 will incubate a vector API, preview pattern matching for switch statements, adopt UTF-8 as the default character set, and include a simple web server.


Multiple keys.

Understand Diffie-Hellman key exchange

The Diffie-Hellman algorithm was a stunning breakthrough in cryptography that showed cryptographic keys could be securely exchanged in plain sight. Here’s how it works.


Skull and crossbones emerge from a stream of digital cubes / malicious code / hacking / threat

Faker NPM package back on track after malicious coding incident

A new group of maintainers is proceeding with an ‘official’ version of the Faker JavaScript library after the previous maintainer went rogue.