The Carbon Footprint of Machine Learning

We are finding out that as machine learning models grow larger and larger, so do their corresponding carbon footprints, especially when it comes to creating and training these complex models. | Continue reading


@thenewstack.io | 2 years ago

Google Puts Open Source in Chip Design and Manufacturing

Google is leading a group of partners that provides open source software tools for chip designers to design, verify and test virtual versions of computer chips, and then get the physical parts manufactured in factories for free. | Continue reading


@thenewstack.io | 2 years ago

GraphQL Optimization: Deduplication and Reuse

Optimization of GraphQL is important to opening up the aperture for rapid frontend development, minimizing the trips to the backend data sources. | Continue reading


@thenewstack.io | 2 years ago

Is Kubernetes Adoption Slowing?

Kubernetes is also becoming more embedded in other systems, so its adoption may not be as visible as it once was. | Continue reading


@thenewstack.io | 2 years ago

Using Machine Learning to Measure and Manage Technical Debt

Not only is technical debt key to making decisions about a specific application, it is important when attempting to prioritize overall modernization work. | Continue reading


@thenewstack.io | 2 years ago

Chances are you’ve never heard of Igalia, the open source consultancy. Yet you’re almost certainly using something that Igalia helped build. | Continue reading


@thenewstack.io | 2 years ago

Igalia: The Open Source Powerhouse You’ve Never Heard Of

Chances are you’ve never heard of Igalia, the open source consultancy. Yet you’re almost certainly using something that Igalia helped build. | Continue reading


@thenewstack.io | 2 years ago

Don’t Just Open Your Repo

Transitioning a project from private to public development means more than just changing the visibility of the GitHub repositories. | Continue reading


@thenewstack.io | 2 years ago

US cities try luring remote tech workers with cash

Will remote working will ultimately bring a re-distribution of opportunity? Dozens of American cities are now exploring that possibility. | Continue reading


@thenewstack.io | 2 years ago

Why Open Core Is Dead

Open sourcing your core business product is a bad idea. If the project you've built starts competing too directly with your core offering, you will be left dissatisfied with it regardless of its success. | Continue reading


@thenewstack.io | 2 years ago

Log4j: The Pain Just Keeps Going and Going

The US Department of Homeland Security (DHS) Cyber Safety Review Board’s (CSRB) report on the Log4Shell vulnerability found that attacks persist despite the availability of patches. | Continue reading


@thenewstack.io | 2 years ago

Bun: A JavaScript Runtime for the Whole Dev Lifecycle

Bun aims to “run most of the world's JavaScript outside of browsers, bringing performance and complexity enhancements to your future infrastructure, as well as developer productivity through better, simpler tooling,” Sumner said in a YouTube interview. | Continue reading


@thenewstack.io | 2 years ago

Pyscript: A Browser-Based Python Framework for the 99%

Pyscript leverages Web Assembly to offer non-traditional programmers a browser-based framework for running Python. | Continue reading


@thenewstack.io | 2 years ago

HTTP/3 Is Now a Standard: Why Use It and How to Get Started

A short breakdown of the history behind HTTP/3, how it was created, and reasons why you should adopt it for your company. | Continue reading


@thenewstack.io | 2 years ago

What Do Authentication and Authorization Mean in Zero Trust?

The foundation of putting zero trust security principles into practice is #authentication and #authorization. The two practices work differently in zero trust than in other systems. #security #zerotrust #ITculture #DevOps | Continue reading


@thenewstack.io | 2 years ago

AWS Customers Can Now Order a Free MFA Security Key

Amazon Web Services (AWS) is offering free multi-factor authentication (MFA) keys to its U.S.-based customers to lock down their AWS accounts. | Continue reading


@thenewstack.io | 2 years ago

Shift-Left Testing Applied to Kubernetes

Because of its declarative nature, Kubernetes is a great tool where a shift-left strategy can be implemented. | Continue reading


@thenewstack.io | 2 years ago

Reasons an Inefficient Cache Is Worse Than No Cache at All

Issues can be addressed with proper planning, an understanding of your application and its data needs, and proper caching strategy. | Continue reading


@thenewstack.io | 2 years ago

PWAs – Why and How Using Oracle?

A progessive web app offers adaptive functionality based on the user's current device and configuration. | Continue reading


@thenewstack.io | 2 years ago

Cerbos’s Secret Ingredients: Protobufs and gRPC

When designing Cerbos, we made an early decision to have structured, type-safe and serializable data and chose protobuf and gRPC to deliver it. | Continue reading


@thenewstack.io | 2 years ago

Brute Ratel C4: When PenTests Go Bad

The Palo Alto Networks (PANW) Unit 42 threat research team recently found a malware file in VirusTotal, the community site for suspicious files, domains, IPs, and URLs. This one contained a malicious payload associated with Brute Ratel C4 (BRc4), the latest red-team and adversari … | Continue reading


@thenewstack.io | 2 years ago

‘If I Could Start Over’: A Real-World Coder on How to Learn

Since April 15th, nearly two million people have watched a video uploaded by 24-year-old software engineer Namanh Kapur. The video's title? "How I Would Learn To Code (If I Could Start Over)." | Continue reading


@thenewstack.io | 2 years ago

GitHub Copilot and Open Source: A Love Story That Won’t End Well?

With Copilot, is Microsoft/GitHub taking too many liberties with the open source software that has been entrusted in their repositories? | Continue reading


@thenewstack.io | 2 years ago

The Social Model of Open Source

Cisco’s Open Source Tech Leader Julia Ferraioli shares some alternative ways to define what is and is not ‘open source.’ | Continue reading


@thenewstack.io | 2 years ago

Can you live without Kubernetes

The container orchestrator may be popular, but it's also complex. Here are the pros and cons of alternatives like Nomad, Cycle, and more. #Kubernetes #K8s #containers #cloudnative #Nomad #Cycle #Hashicorp | Continue reading


@thenewstack.io | 2 years ago

The day cyberspace declared independence

It all began in 1996, with ambitious plans for staging the largest one-day event ever held online. A creative team had assembled an army of photographers, programmers, "interactive designers" and editors to document "24 Hours in Cyberspace." It was soon usurped, however, by a mor … | Continue reading


@thenewstack.io | 2 years ago

Tech Debt, Incidents and on Call

On-call rotation could be used for tech debt work. It's not a good time for developers to be working on features, but a great time to dig into incidents. | Continue reading


@thenewstack.io | 2 years ago

Entrepreneurship for Engineers: How to DIY Your DevRel

For technical startups, early marketing efforts are mostly developer relations — and it's up to the founders to do it. So how should you get started? #startups #DevRel #techfounders | Continue reading


@thenewstack.io | 2 years ago

Build a Highly Productive Work-from-Anywhere Dev Team

Being able to support WFA teams on a large scale has not been a core competency of most companies and their IT departments. If you are going to spearhead the WFA team, you will need to ensure IT can support your employees remotely and with ease. | Continue reading


@thenewstack.io | 2 years ago

Rust in the Linux Kernel by 2023, Linus Torvalds Predicts

A keynote interview at Open Source Summit North America found the Linux creator making a promise about the programming language, dissing hardware vendors and sharing credit for Git. | Continue reading


@thenewstack.io | 2 years ago

Software Supply Chain Compliance with Aqua’s Chain-Bench

Aqua Security and the Center for Internet Security (CIS) have created Chain-Bench, an open source tool for auditing for software supply chain security. | Continue reading


@thenewstack.io | 2 years ago

Stateful Workloads on Kubernetes Are a Thing, but There Is a Twist

While Kubernetes is now providing rock-solid foundations for running data-oriented workloads, some application-specific tasks — more specifically day 2 operations — can’t be handled natively. | Continue reading


@thenewstack.io | 2 years ago

Kelsey Hightower on How to Become a Better Engineering Team

Technology work has moved far past the idea of the code monkey or button pusher. If we are truly knowledge workers, then tech work should be as much about communication as code. And it needs to evolve past one-off trainings and university degrees and move toward continuously honi … | Continue reading


@thenewstack.io | 2 years ago

JIT: Security-as-Code Pioneer Opens for Business

Jit, a new security-as-code provider, translates complex security plans from written documents and spreadsheets into code. | Continue reading


@thenewstack.io | 2 years ago

Disney+ Hotstar Simplified Its Data Architecture for Scale

Disney+ Hotstar, India’s most popular streaming service, had to find a way to keep up with its rapidly expanding content library and subscriber base. | Continue reading


@thenewstack.io | 2 years ago

What Business Problems Does WebAssembly Solve?

The true test of WebAssembly's (also known as (Wasm) worth is its business use, as companies such as Adobe, Microsoft and Cosmonic, which offers wasmCloud, are bringing Wasm solutions to the market today. | Continue reading


@thenewstack.io | 2 years ago

Google’s Emma Haruka Iwao Helped Set a New Record for Pi

What is it like to be the first person to calculate the 100-trillionth decimal place of pi. | Continue reading


@thenewstack.io | 2 years ago

The Symbiote Malware: What We Know So Far (How Symbiote Linux Malware Works)

Researchers have discovered a parasitic #malware that affects Linux operating systems and utilizes #eBPF to hide malicious network traffic on an infected machine. Here’s what Symbiote is, and how to remediate it. #security #DevSecOps | Continue reading


@thenewstack.io | 2 years ago

And the Cloud Security Alliance’s Top Threats for 2022 Are

At the RSA Conference this week, the Cloud Security Alliance (CSA) released its latest cloud security report: "Top Threats to Cloud Computing: The Pandemic 11." | Continue reading


@thenewstack.io | 2 years ago

Apiiro Finds Private Code Repos More Hackable Than Public

Apiiro, a cloud native application security company found that there are eight times the number of exposed secrets in private repositories than in public repositories. | Continue reading


@thenewstack.io | 2 years ago

Rust: What’s Next for the Fast-Growing Programming Language?

Rust is increasingly being preferred over programming languages like C and C++ — we talked to the Rust Foundation to find out why. | Continue reading


@thenewstack.io | 2 years ago

JavaScript Hydration Is a Workaround, Not a Solution

Put simply, hydration is overhead because it duplicates work. Resumability focuses on transferring all of the information (the WHERE and WHAT) from the server to the client. | Continue reading


@thenewstack.io | 2 years ago

ML Engineer Teaches Graph Algorithms with Dungeons and Dragons

"This talk will take the form of a story," the description read, "of adventurers who meet in tavern, and use graph algorithms to chase down a McGuffin." | Continue reading


@thenewstack.io | 2 years ago

Why We’re Sticking with Ruby on Rails at Gitlab

With our modular monolith, developers can contribute enhancements to the core product, giving us tremendous leverage, unbeatable pace and scalability. | Continue reading


@thenewstack.io | 2 years ago

When WebAssembly Replaces Docker

One of the more interesting discussions that attracted some attention during KubeCon + CloudNativeCon was how, due to its design, WebAssembly can replace Docker in many circumstances. | Continue reading


@thenewstack.io | 2 years ago

How They Made Films with Computers in 1963

The newest exhibit at Silicon Valley's Computer History Museum is "Early computer films: 1963-1972." | Continue reading


@thenewstack.io | 2 years ago

Don't Drive Away Your Developers: IT Processes to Defeat Burnout

Burdening developers with security and compliance protocols, beating them over the head with budgetary considerations, and just plain throttling their productivity all contribute to developer burnout which can be rectified simply by implementing a few new systems and processes. | Continue reading


@thenewstack.io | 2 years ago

Shift Left: Where Cloud Native Computing Security Is Going

The move to shift left in software development is on as organizations adopt DevSecOps practices, so said a group of security experts at KubeCon Europe. | Continue reading


@thenewstack.io | 2 years ago