
Software developers have a supply chain security problem
Every day, software developers implicitly trust software packages, container images, dependency maintainers, repository operators, and build systems that we don’t know anything about. It’s the opposite of Zero Trust.

5 tips for writing better API documentation
Great API documentation is essential to a good developer experience. But your documentation should be great for non-developers too.

7 key new features in SingleStoreDB
SingleStoreDB unifies transactions and analytics in the same engine to power real-time, data-intensive applications. Here’s what’s new.
How AI is changing IoT
Artificial intelligence unlocks the true potential of IoT by enabling networks and devices to learn from past decisions, predict future activity, and continuously improve performance and decision-making capabilities.

Detect cloud native security threats with Tracee
Open source Tracee uses Linux eBPF technology to trace system and applications at runtime, and analyzes collected events to detect suspicious behavioral patterns.

How enterprises can overcome the growing cloud skills shortage
The skills needed to implement and manage cloud services differ substantially from those needed for on-premises applications. This has created a major hurdle for businesses needing to innovate.

How API gateways complement ESBs
Customer-obsessed organizations should introduce API gateways alongside enterprise service buses to optimize service connectivity. Here’s how.

Only DevSecOps can save the metaverse
The vast metaverse will also be vast in terms of code, accelerating the demand for supply chain security, automated scanning and testing, and continuous updates.

9 questions you should ask about your cloud security
Businesses often lack critical insights into the security of their cloud environment. Here are nine questions business leaders need to ask—and cloud security teams need to answer.

The 9 most important new features in YugabyteDB
YugabyteDB 2.13 brings materialized views, local reads for performance, region-local backups, and much more, extending the geo-distribution capabilities of the database.

Making AI accountable: Blockchain, governance, and auditability
Recording the model development process on the blockchain can make that process more structured, transparent, and repeatable, resulting in less bias and more accountability.

Overcoming AI’s limitations
Artificial general intelligence will be able to understand or learn any intellectual task that a human can. AGI will have high costs and huge risks, but it’s coming—maybe soon.

Think of search as the application platform, not just a feature
Today we’re seeing a major evolution in how search anticipates what users want before they know they are looking for it. Developers should be tuning in.

7 ways to avoid a cloud misconfiguration attack
Cloud security is all about configuration. Here’s how to make sure the configurations of your cloud resources are correct and secure, and how to keep them that way.

Scaling throughput and performance in a sharding database system
Understand the two dimensions of scaling for database query and ingest workloads, and how sharding can make scaling elastic—or not.

Artificial intelligence really isn’t all that intelligent
Narrow AI applications such as Google Search and Amazon Alexa are great at solving specific problems, but only as long as you stick to the script.

Orchestrating data for machine learning pipelines
Machine learning workloads require large datasets, while machine learning workflows require high data throughput. We can optimize the data pipeline to achieve both.

5 tips for choosing the right database
Choosing the wrong database for data-intensive applications opens a door to scaling challenges and unnecessary complexity. Making the right choice is simpler.

In an evolving cloud world, Azure passes AWS
Flexera 2022 State of the Cloud survey finds data warehouses, databases, and containers to be the top cloud draws, with serverless and AI/ML rising fast.

Solving complex problems with vector databases
Vector databases unlock the insights buried in complex data including documents, videos, images, audio files, workflows, and system-generated alerts. Here’s how.