Software developers have a supply chain security problem

Software developers have a supply chain security problem

Every day, software developers implicitly trust software packages, container images, dependency maintainers, repository operators, and build systems that we don’t know anything about. It’s the opposite of Zero Trust.

5 tips for writing better API documentation

5 tips for writing better API documentation

Great API documentation is essential to a good developer experience. But your documentation should be great for non-developers too.

7 key new features in SingleStoreDB

7 key new features in SingleStoreDB

SingleStoreDB unifies transactions and analytics in the same engine to power real-time, data-intensive applications. Here’s what’s new.

How AI is changing IoT

How AI is changing IoT

Artificial intelligence unlocks the true potential of IoT by enabling networks and devices to learn from past decisions, predict future activity, and continuously improve performance and decision-making capabilities.

Detect cloud native security threats with Tracee

Detect cloud native security threats with Tracee

Open source Tracee uses Linux eBPF technology to trace system and applications at runtime, and analyzes collected events to detect suspicious behavioral patterns.

How enterprises can overcome the growing cloud skills shortage

How enterprises can overcome the growing cloud skills shortage

The skills needed to implement and manage cloud services differ substantially from those needed for on-premises applications. This has created a major hurdle for businesses needing to innovate.

How API gateways complement ESBs

How API gateways complement ESBs

Customer-obsessed organizations should introduce API gateways alongside enterprise service buses to optimize service connectivity. Here’s how.

Only DevSecOps can save the metaverse

Only DevSecOps can save the metaverse

The vast metaverse will also be vast in terms of code, accelerating the demand for supply chain security, automated scanning and testing, and continuous updates.

9 questions you should ask about your cloud security

9 questions you should ask about your cloud security

Businesses often lack critical insights into the security of their cloud environment. Here are nine questions business leaders need to ask—and cloud security teams need to answer.

The 9 most important new features in YugabyteDB

The 9 most important new features in YugabyteDB

YugabyteDB 2.13 brings materialized views, local reads for performance, region-local backups, and much more, extending the geo-distribution capabilities of the database.

Making AI accountable: Blockchain, governance, and auditability

Making AI accountable: Blockchain, governance, and auditability

Recording the model development process on the blockchain can make that process more structured, transparent, and repeatable, resulting in less bias and more accountability.

Overcoming AI’s limitations

Overcoming AI’s limitations

Artificial general intelligence will be able to understand or learn any intellectual task that a human can. AGI will have high costs and huge risks, but it’s coming—maybe soon.

Think of search as the application platform, not just a feature

Think of search as the application platform, not just a feature

Today we’re seeing a major evolution in how search anticipates what users want before they know they are looking for it. Developers should be tuning in.

7 ways to avoid a cloud misconfiguration attack

7 ways to avoid a cloud misconfiguration attack

Cloud security is all about configuration. Here’s how to make sure the configurations of your cloud resources are correct and secure, and how to keep them that way.

Scaling throughput and performance in a sharding database system

Scaling throughput and performance in a sharding database system

Understand the two dimensions of scaling for database query and ingest workloads, and how sharding can make scaling elastic—or not.

Artificial intelligence really isn’t all that intelligent

Artificial intelligence really isn’t all that intelligent

Narrow AI applications such as Google Search and Amazon Alexa are great at solving specific problems, but only as long as you stick to the script.

Orchestrating data for machine learning pipelines

Orchestrating data for machine learning pipelines

Machine learning workloads require large datasets, while machine learning workflows require high data throughput. We can optimize the data pipeline to achieve both.

5 tips for choosing the right database

5 tips for choosing the right database

Choosing the wrong database for data-intensive applications opens a door to scaling challenges and unnecessary complexity. Making the right choice is simpler.

In an evolving cloud world, Azure passes AWS

In an evolving cloud world, Azure passes AWS

Flexera 2022 State of the Cloud survey finds data warehouses, databases, and containers to be the top cloud draws, with serverless and AI/ML rising fast.

Solving complex problems with vector databases

Solving complex problems with vector databases

Vector databases unlock the insights buried in complex data including documents, videos, images, audio files, workflows, and system-generated alerts. Here’s how.

Load More