
Why devops needs a better approach to cloud networking
A full-stack networking platform with machine learning, autonomous capabilities, and multicloud support allows devops engineers to focus on what matters most—building applications.

Partitioning for performance in a sharding database system
Partitioning can provide a number of benefits to a sharding system, including faster query execution. Let’s see how it works.

Why database design choices matter to developers
Rather than punt database design decisions to a cloud service or third-party provider, understand what you want to achieve and how best to deliver on that goal.

7 biggest Kubernetes security mistakes
The most dangerous security holes are often the most basic. Start improving your Kubernetes security posture by fixing these simple mistakes.

How we’ll solve software supply chain security
Security teams need a standard set of processes for locking down roots of trust for software artifacts, and developers need a clear path to balance open source selection against security policies. Open source has answers.

Software developers have a supply chain security problem
Every day, software developers implicitly trust software packages, container images, dependency maintainers, repository operators, and build systems that we don’t know anything about. It’s the opposite of Zero Trust.

5 tips for writing better API documentation
Great API documentation is essential to a good developer experience. But your documentation should be great for non-developers too.

7 key new features in SingleStoreDB
SingleStoreDB unifies transactions and analytics in the same engine to power real-time, data-intensive applications. Here’s what’s new.

How AI is changing IoT
Artificial intelligence unlocks the true potential of IoT by enabling networks and devices to learn from past decisions, predict future activity, and continuously improve performance and decision-making capabilities.

Detect cloud native security threats with Tracee
Open source Tracee uses Linux eBPF technology to trace system and applications at runtime, and analyzes collected events to detect suspicious behavioral patterns.

How enterprises can overcome the growing cloud skills shortage
The skills needed to implement and manage cloud services differ substantially from those needed for on-premises applications. This has created a major hurdle for businesses needing to innovate.

How API gateways complement ESBs
Customer-obsessed organizations should introduce API gateways alongside enterprise service buses to optimize service connectivity. Here’s how.

Only DevSecOps can save the metaverse
The vast metaverse will also be vast in terms of code, accelerating the demand for supply chain security, automated scanning and testing, and continuous updates.

9 questions you should ask about your cloud security
Businesses often lack critical insights into the security of their cloud environment. Here are nine questions business leaders need to ask—and cloud security teams need to answer.

The 9 most important new features in YugabyteDB
YugabyteDB 2.13 brings materialized views, local reads for performance, region-local backups, and much more, extending the geo-distribution capabilities of the database.

Making AI accountable: Blockchain, governance, and auditability
Recording the model development process on the blockchain can make that process more structured, transparent, and repeatable, resulting in less bias and more accountability.

Overcoming AI’s limitations
Artificial general intelligence will be able to understand or learn any intellectual task that a human can. AGI will have high costs and huge risks, but it’s coming—maybe soon.

Think of search as the application platform, not just a feature
Today we’re seeing a major evolution in how search anticipates what users want before they know they are looking for it. Developers should be tuning in.

7 ways to avoid a cloud misconfiguration attack
Cloud security is all about configuration. Here’s how to make sure the configurations of your cloud resources are correct and secure, and how to keep them that way.

Scaling throughput and performance in a sharding database system
Understand the two dimensions of scaling for database query and ingest workloads, and how sharding can make scaling elastic—or not.