Related Content
Report: Connected Cars Have Weaker Security Than We Thought Today's connected cars offer many technological conveniences. But with those features come some risks. The Wi-Fi, Bluetooth, and cellular connections in these cars can fall prey to hacking attacks, which can jeopardize people’s physical safety and private information—and the security is pretty lax. |
||
The Weakest Link in Your Chain There is a saying that a chain is only as strong as its weakest link. DevOps helps establish a pipeline to automate application and systems software deployments. DevOps also has an amazing way of very quickly discovering exactly which link in the deployment chain needs to be fixed or replaced. |
||
With More Technology Comes More Malware As technology has become more embedded within our lives, so have the attempts to infect and harm our use of that technology. In the past two years, more malware has been reported and detected than the combined yield of the last ten years. Read on for some alarming stats. |
||
You Won't Get Hacked with Help of New USB Device Companies just keep getting hacked. Millions of users' data have been comprised in the last few years, so up-and-coming developer Webcloak is introducing a product that will let anyone browse the Internet “with no risk of viruses, data, or identity theft.” |
||
Software Bugs We Don’t Want to See Repeated in 2015—or Ever Again Security breaches happen, from Target to Sony, but sometimes it’s not malicious hackers causing pain points for consumers, society, and companies. Occasionally, bugs in the software are to blame. Here is a look at some of the more infamous software bugs that we hope don’t get repeated in 2015. |
||
Keeping Quality in DevOps In our drive for better quality and productivity, we are coming close to realizing full continuous application lifecycle management. Continuous testing is emerging as a best practice that focuses on developing testing procedures, primarily automated, to meet the need for fast application testing. |
||
Is Git a Good Fit for the Enterprise Git has become the version control system of choice for many developers. It is relatively easy to use, has good repository integrity, and has a distributed architecture. But Git also has some limitations and can be challenging to support for large scale enterprise use. Read on for some practices. |
||
Internet Explorer Updates Help Attract Developers and Consumers Competitors have continued to show initiative to innovate, but a fresh update for Internet Explorer 11 has patched twenty-five of the browser’s key vulnerabilities and even added new tools to entice additional developers. Microsoft is making big moves in the browser game. |