In this post, we highlight the most important practices to keep in mind during software development, particularly relating to outsourcing and data security.
The Internet of Things (IoT) is becoming mainstream. Companies are seeing market-making benefits from IoT and deploying at scale – from transforming operations...
As data scientists, we’re not always good at the “other parts” of the development cycle — this is why I am always thankful for the Data Engineers, DevOps and ot...
For installing safe Linux distributions, Kali Linux is one of the best when it comes to downloading operating systems that are great for cybersecurity.
A developer and DZone Zone Leader reflects on some of the UI fails he has seen over the years that should have been corrected by the QA and/or dev team.
When looking at the importance of database release automation, many times we’re greeted with responses ranging from “Why do I need that” to “That sounds great,...
Like in any growing product startup, tech stack also evolves with time. It’s iterated over and over (sometimes from scratch) as it scales to achieve it’s engine...
A new standard issued by the PCI Security Standards Council holds companies accountable for having a clear and secure view of their open source components.
Our website uses cookies.
By continuing to browse the website you are agreeing to our use of cookies.
For more information on how we use cookies and how you can...
As data scientists, we’re not always good at the “other parts” of the development cycle — this is why I am always thankful for the Data Engineers, DevOps and ot...
Observability of the system in production comes as a requirement when we design complex systems. Some says being able to monitor your system in production is mo...
DevOps is becoming popular term in IT industry now a days. I thought of sharing few key aspects based on experience for teams moving to DevOps practices. We wil...