Software Developers

How To Install Oceanbase on an AWS EC2 Instance How To Install Oceanbase on an AWS EC2 Instance

In the world of big data, distributed databases play an important role. As data generated and..
My Evaluation of the Scaleway Cloud Provider My Evaluation of the Scaleway Cloud Provider

A couple of years ago, I developed an app that helped me manage my conference submission workflow...
Top 11 Git Commands That Every Developer Should Know Top 11 Git Commands That Every Developer Should Know

Git is a version control system that has become an essential tool for developers worldwide. It..
The Latest Work from the SEI The Latest Work from the SEI

This SEI Blog post summarizes some recent publications from the SEI in the areas of supply chain..
10 Benefits and 10 Challenges of Applying Large Language Models to DoD Software Acquisition 10 Benefits and 10 Challenges of Applying Large Language Models to DoD Software Acquisition

This post presents 10 benefits and 10 challenges of applying LLMs to the software acquisition..
The Top 10 Skills CISOs Need in 2024 The Top 10 Skills CISOs Need in 2024

This post outlines the top 10 skills that CISOs need in 2024 and beyond.
Write Optimized Spark Code for Big Data Applications Write Optimized Spark Code for Big Data Applications

Apache Spark is a powerful open-source distributed computing framework that provides a variety of..
The Three Daily Scrum Questions Won’t Die The Three Daily Scrum Questions Won’t Die

The Daily Scrum serves a single purpose: inspecting the progress toward the Sprint Goal by..
Managing Multiple APIs Using an Adapter Pattern Managing Multiple APIs Using an Adapter Pattern

Let's imagine the problem: Your company creates a B2B product that provides a service for some..
Acquisition Archetypes Seen in the Wild, DevSecOps Edition: Clinging to the Old Ways Acquisition Archetypes Seen in the Wild, DevSecOps Edition: Clinging to the Old Ways

This SEI blog post draws on SEI experiences conducting independent technical assessments to examine ..
Open Source Maintenance Is Community Organizing Open Source Maintenance Is Community Organizing

About six months ago, I wrote a piece about the state of open-source commercialization that..
Understanding and Solving the AWS Lambda Cold Start Problem Understanding and Solving the AWS Lambda Cold Start Problem

What Is the AWS Lambda Cold Start Problem?AWS Lambda is a serverless computing platform that..
The 13 Key Elements of an Insider Threat Program The 13 Key Elements of an Insider Threat Program

COVID-19 changed the nature of the workplace. In this evolving climate, organizations need to be..
DevSecOps: The Broken or Blurred Lines of Defense DevSecOps: The Broken or Blurred Lines of Defense

With the modern patterns and practices of DevOps and DevSecOps, it’s not clear who the front-line..
Harnessing the Power of Large Language Models For Economic and Social Good: 4 Case Studies Harnessing the Power of Large Language Models For Economic and Social Good: 4 Case Studies

This blog post, the second in a series, outlines four case studies, that explore the potential of..
Extending Agile and DevSecOps to Improve Efforts Tangential to Software Product Development Extending Agile and DevSecOps to Improve Efforts Tangential to Software Product Development

The modern software engineering practices of Agile and DevSecOps have revolutionized the practice..
Netflow in the Era of EDR and Cloud: Helicopter Parenting for Your Network Netflow in the Era of EDR and Cloud: Helicopter Parenting for Your Network

Despite well-defined security policies, technical safeguards, and extensive user education, people..
Kubernetes Cluster Setup on Ubuntu, Explained Kubernetes Cluster Setup on Ubuntu, Explained

IntroductionThe purpose of this article is to provide guidelines for those who are interested in..
Product Managements Role in Software: A Fools Game or an Evolving Adventure? Product Managements Role in Software: A Fools Game or an Evolving Adventure?

Understanding the origins and intentions behind software product management is a key enabler to..
Why and How To Create an Event Bus in Vuejs 3 Why and How To Create an Event Bus in Vuejs 3

Since I’m working on the 2.0 version of my product’s UI (to be released in May), I’m publishing..
Chaos Data Engineering Manifesto: 5 Laws for Successful Failures Chaos Data Engineering Manifesto: 5 Laws for Successful Failures

It's midnight in the dim and cluttered office of TheNew York Times, currently serving as the..
5 Challenges Every Engineering Manager Must Overcome 5 Challenges Every Engineering Manager Must Overcome

Transitioning to a managerial role could be hard. One day, you are developing and reviewing code...
Detecting and Grouping Malware Using Section Hashes Detecting and Grouping Malware Using Section Hashes

Current malware detection systems evaluate elements in a file or evaluate the file as a whole. New..
Security Architecture Review on a SASE Solution Security Architecture Review on a SASE Solution

Vendor security assessments can be very complex, especially when it comes to analyzing modern..
Why Open Source Is Much More Than Just a Free Tier Why Open Source Is Much More Than Just a Free Tier

Open source has been on the rise for the past few decades. From small startups to large enterprises,..
Access Programmer In Torrance California Access Programmer In Torrance California

Access Programmer Services Torrance CA Microsoft Access Programmer Services In Torrance CA From MS..
Torrance California Parks Torrance California Parks

  Torrance California Parks Hours of Operation The 30 city parks in Torrance are maintained and..
Microsoft Access Programmer Los Angeles California Microsoft Access Programmer Los Angeles California

Top 5 PHP REST API Frameworks Top 5 PHP REST API Frameworks

PHP (Hypertext Preprocessor) is a programming language that is primarily used for web development...
Home Home

Event Rental Systems is the #1 party rental software on the market. ERS offers a complete business..
Express Hibernate Queries as Type-Safe Java Streams Express Hibernate Queries as Type-Safe Java Streams

As much as the JPA Criteria builder is expressive, JPA queries are often equally verbose, and the..
Connecting Your Devs' Work to the Business Connecting Your Devs' Work to the Business

Is my team solving the right problem? To answer this seemingly simple question, we assembled a..
Software Isolation: Why It Matters to Software Evolution and Why Everybody Puts It Off Software Isolation: Why It Matters to Software Evolution and Why Everybody Puts It Off

This SEI Blog post discusses the practice of software isolation, which is one of the steps in..
Tech Layoffs [Comic] Tech Layoffs [Comic]

In this timely comic from Daniel Stori, explore the thought process behind Mr. C-Level as..
How to Use Docker and NS-3 to Create Realistic Network Simulations How to Use Docker and NS-3 to Create Realistic Network Simulations

This post provides a tutorial with code samples on using Docker and NS-3 to Create Realistic..
Problems of Cloud Cost Management: A Socio-Technical Analysis Problems of Cloud Cost Management: A Socio-Technical Analysis

According to Flexera’s State of Cloud reports, for the sixth year in a row, “optimizing the..
5 Best Practices from Industry for Implementing a Zero Trust Architecture 5 Best Practices from Industry for Implementing a Zero Trust Architecture

This blog post presents 5 best practices from industry on implementing a zero trust architecture..
The Data Leakage Nightmare in AI The Data Leakage Nightmare in AI

Nowadays, we think of artificial intelligence as the solution to many problems and as a tool that..
5 Data Mesh Best Practices From 4 Data Leaders 5 Data Mesh Best Practices From 4 Data Leaders

Data leaders across industries are embracing data mesh. However, it’s easy to be skeptical based on ..
Rust Vulnerability Analysis and Maturity Challenges Rust Vulnerability Analysis and Maturity Challenges

This post explores tools for understanding vulnerabilities in the Rust programming language as well ..