Why devops needs a better approach to cloud networking

Why devops needs a better approach to cloud networking

A full-stack networking platform with machine learning, autonomous capabilities, and multicloud support allows devops engineers to focus on what matters most—building applications.

Partitioning for performance in a sharding database system

Partitioning for performance in a sharding database system

Partitioning can provide a number of benefits to a sharding system, including faster query execution. Let’s see how it works.

Why database design choices matter to developers

Why database design choices matter to developers

Rather than punt database design decisions to a cloud service or third-party provider, understand what you want to achieve and how best to deliver on that goal.

7 biggest Kubernetes security mistakes

7 biggest Kubernetes security mistakes

The most dangerous security holes are often the most basic. Start improving your Kubernetes security posture by fixing these simple mistakes.

How we’ll solve software supply chain security

How we’ll solve software supply chain security

Security teams need a standard set of processes for locking down roots of trust for software artifacts, and developers need a clear path to balance open source selection against security policies. Open source has answers.

Software developers have a supply chain security problem

Software developers have a supply chain security problem

Every day, software developers implicitly trust software packages, container images, dependency maintainers, repository operators, and build systems that we don’t know anything about. It’s the opposite of Zero Trust.

5 tips for writing better API documentation

5 tips for writing better API documentation

Great API documentation is essential to a good developer experience. But your documentation should be great for non-developers too.

7 key new features in SingleStoreDB

7 key new features in SingleStoreDB

SingleStoreDB unifies transactions and analytics in the same engine to power real-time, data-intensive applications. Here’s what’s new.

How AI is changing IoT

How AI is changing IoT

Artificial intelligence unlocks the true potential of IoT by enabling networks and devices to learn from past decisions, predict future activity, and continuously improve performance and decision-making capabilities.

Detect cloud native security threats with Tracee

Detect cloud native security threats with Tracee

Open source Tracee uses Linux eBPF technology to trace system and applications at runtime, and analyzes collected events to detect suspicious behavioral patterns.

How enterprises can overcome the growing cloud skills shortage

How enterprises can overcome the growing cloud skills shortage

The skills needed to implement and manage cloud services differ substantially from those needed for on-premises applications. This has created a major hurdle for businesses needing to innovate.

How API gateways complement ESBs

How API gateways complement ESBs

Customer-obsessed organizations should introduce API gateways alongside enterprise service buses to optimize service connectivity. Here’s how.

Only DevSecOps can save the metaverse

Only DevSecOps can save the metaverse

The vast metaverse will also be vast in terms of code, accelerating the demand for supply chain security, automated scanning and testing, and continuous updates.

9 questions you should ask about your cloud security

9 questions you should ask about your cloud security

Businesses often lack critical insights into the security of their cloud environment. Here are nine questions business leaders need to ask—and cloud security teams need to answer.

The 9 most important new features in YugabyteDB

The 9 most important new features in YugabyteDB

YugabyteDB 2.13 brings materialized views, local reads for performance, region-local backups, and much more, extending the geo-distribution capabilities of the database.

Making AI accountable: Blockchain, governance, and auditability

Making AI accountable: Blockchain, governance, and auditability

Recording the model development process on the blockchain can make that process more structured, transparent, and repeatable, resulting in less bias and more accountability.

Overcoming AI’s limitations

Overcoming AI’s limitations

Artificial general intelligence will be able to understand or learn any intellectual task that a human can. AGI will have high costs and huge risks, but it’s coming—maybe soon.

Think of search as the application platform, not just a feature

Think of search as the application platform, not just a feature

Today we’re seeing a major evolution in how search anticipates what users want before they know they are looking for it. Developers should be tuning in.

7 ways to avoid a cloud misconfiguration attack

7 ways to avoid a cloud misconfiguration attack

Cloud security is all about configuration. Here’s how to make sure the configurations of your cloud resources are correct and secure, and how to keep them that way.

Scaling throughput and performance in a sharding database system

Scaling throughput and performance in a sharding database system

Understand the two dimensions of scaling for database query and ingest workloads, and how sharding can make scaling elastic—or not.

Load More