We are finding out that as machine learning models grow larger and larger, so do their corresponding carbon footprints, especially when it comes to creating and training these complex models. | Continue reading
Google is leading a group of partners that provides open source software tools for chip designers to design, verify and test virtual versions of computer chips, and then get the physical parts manufactured in factories for free. | Continue reading
Optimization of GraphQL is important to opening up the aperture for rapid frontend development, minimizing the trips to the backend data sources. | Continue reading
Kubernetes is also becoming more embedded in other systems, so its adoption may not be as visible as it once was. | Continue reading
Not only is technical debt key to making decisions about a specific application, it is important when attempting to prioritize overall modernization work. | Continue reading
Chances are you’ve never heard of Igalia, the open source consultancy. Yet you’re almost certainly using something that Igalia helped build. | Continue reading
Chances are you’ve never heard of Igalia, the open source consultancy. Yet you’re almost certainly using something that Igalia helped build. | Continue reading
Transitioning a project from private to public development means more than just changing the visibility of the GitHub repositories. | Continue reading
Will remote working will ultimately bring a re-distribution of opportunity? Dozens of American cities are now exploring that possibility. | Continue reading
Open sourcing your core business product is a bad idea. If the project you've built starts competing too directly with your core offering, you will be left dissatisfied with it regardless of its success. | Continue reading
The US Department of Homeland Security (DHS) Cyber Safety Review Board’s (CSRB) report on the Log4Shell vulnerability found that attacks persist despite the availability of patches. | Continue reading
Bun aims to “run most of the world's JavaScript outside of browsers, bringing performance and complexity enhancements to your future infrastructure, as well as developer productivity through better, simpler tooling,” Sumner said in a YouTube interview. | Continue reading
Pyscript leverages Web Assembly to offer non-traditional programmers a browser-based framework for running Python. | Continue reading
A short breakdown of the history behind HTTP/3, how it was created, and reasons why you should adopt it for your company. | Continue reading
The foundation of putting zero trust security principles into practice is #authentication and #authorization. The two practices work differently in zero trust than in other systems. #security #zerotrust #ITculture #DevOps | Continue reading
Amazon Web Services (AWS) is offering free multi-factor authentication (MFA) keys to its U.S.-based customers to lock down their AWS accounts. | Continue reading
Because of its declarative nature, Kubernetes is a great tool where a shift-left strategy can be implemented. | Continue reading
Issues can be addressed with proper planning, an understanding of your application and its data needs, and proper caching strategy. | Continue reading
A progessive web app offers adaptive functionality based on the user's current device and configuration. | Continue reading
When designing Cerbos, we made an early decision to have structured, type-safe and serializable data and chose protobuf and gRPC to deliver it. | Continue reading
The Palo Alto Networks (PANW) Unit 42 threat research team recently found a malware file in VirusTotal, the community site for suspicious files, domains, IPs, and URLs. This one contained a malicious payload associated with Brute Ratel C4 (BRc4), the latest red-team and adversari … | Continue reading
Since April 15th, nearly two million people have watched a video uploaded by 24-year-old software engineer Namanh Kapur. The video's title? "How I Would Learn To Code (If I Could Start Over)." | Continue reading
With Copilot, is Microsoft/GitHub taking too many liberties with the open source software that has been entrusted in their repositories? | Continue reading
Cisco’s Open Source Tech Leader Julia Ferraioli shares some alternative ways to define what is and is not ‘open source.’ | Continue reading
The container orchestrator may be popular, but it's also complex. Here are the pros and cons of alternatives like Nomad, Cycle, and more. #Kubernetes #K8s #containers #cloudnative #Nomad #Cycle #Hashicorp | Continue reading
It all began in 1996, with ambitious plans for staging the largest one-day event ever held online. A creative team had assembled an army of photographers, programmers, "interactive designers" and editors to document "24 Hours in Cyberspace." It was soon usurped, however, by a mor … | Continue reading
On-call rotation could be used for tech debt work. It's not a good time for developers to be working on features, but a great time to dig into incidents. | Continue reading
For technical startups, early marketing efforts are mostly developer relations — and it's up to the founders to do it. So how should you get started? #startups #DevRel #techfounders | Continue reading
Being able to support WFA teams on a large scale has not been a core competency of most companies and their IT departments. If you are going to spearhead the WFA team, you will need to ensure IT can support your employees remotely and with ease. | Continue reading
A keynote interview at Open Source Summit North America found the Linux creator making a promise about the programming language, dissing hardware vendors and sharing credit for Git. | Continue reading
Aqua Security and the Center for Internet Security (CIS) have created Chain-Bench, an open source tool for auditing for software supply chain security. | Continue reading
While Kubernetes is now providing rock-solid foundations for running data-oriented workloads, some application-specific tasks — more specifically day 2 operations — can’t be handled natively. | Continue reading
Technology work has moved far past the idea of the code monkey or button pusher. If we are truly knowledge workers, then tech work should be as much about communication as code. And it needs to evolve past one-off trainings and university degrees and move toward continuously honi … | Continue reading
Jit, a new security-as-code provider, translates complex security plans from written documents and spreadsheets into code. | Continue reading
Disney+ Hotstar, India’s most popular streaming service, had to find a way to keep up with its rapidly expanding content library and subscriber base. | Continue reading
The true test of WebAssembly's (also known as (Wasm) worth is its business use, as companies such as Adobe, Microsoft and Cosmonic, which offers wasmCloud, are bringing Wasm solutions to the market today. | Continue reading
What is it like to be the first person to calculate the 100-trillionth decimal place of pi. | Continue reading
Researchers have discovered a parasitic #malware that affects Linux operating systems and utilizes #eBPF to hide malicious network traffic on an infected machine. Here’s what Symbiote is, and how to remediate it. #security #DevSecOps | Continue reading
At the RSA Conference this week, the Cloud Security Alliance (CSA) released its latest cloud security report: "Top Threats to Cloud Computing: The Pandemic 11." | Continue reading
Apiiro, a cloud native application security company found that there are eight times the number of exposed secrets in private repositories than in public repositories. | Continue reading
Rust is increasingly being preferred over programming languages like C and C++ — we talked to the Rust Foundation to find out why. | Continue reading
Put simply, hydration is overhead because it duplicates work. Resumability focuses on transferring all of the information (the WHERE and WHAT) from the server to the client. | Continue reading
"This talk will take the form of a story," the description read, "of adventurers who meet in tavern, and use graph algorithms to chase down a McGuffin." | Continue reading
With our modular monolith, developers can contribute enhancements to the core product, giving us tremendous leverage, unbeatable pace and scalability. | Continue reading
One of the more interesting discussions that attracted some attention during KubeCon + CloudNativeCon was how, due to its design, WebAssembly can replace Docker in many circumstances. | Continue reading
The newest exhibit at Silicon Valley's Computer History Museum is "Early computer films: 1963-1972." | Continue reading
Burdening developers with security and compliance protocols, beating them over the head with budgetary considerations, and just plain throttling their productivity all contribute to developer burnout which can be rectified simply by implementing a few new systems and processes. | Continue reading
The move to shift left in software development is on as organizations adopt DevSecOps practices, so said a group of security experts at KubeCon Europe. | Continue reading