Related Content
Cybersecurity Consciousness during COVID-19 As we all deal with COVID-19 across the globe—medically, economically, and professionally—there are plenty of lessons to discover. There is also a lot to learn when it comes to cybersecurity. More people moving toward working from home means more opportunities for hackers to strike, so we must be smart and vigilant. |
||
Should You Use XML or Protocol Buffers to Store and Exchange Data? XML is a flexible text format used for a wide variety of applications, including data serialization and exchange of data. More recently, protocol buffers were also introduced for data exchange and data serialization. Even though their purpose is the same, these are very different technologies. Which is better for you? |
||
Best Practices of the DevSecOps Elite: A Slack Takeover with DJ Schleen Thought leaders from the software community are taking over the TechWell Hub to answer questions and engage in conversations. DJ Schleen, a DevSecOps advocate, hosted this Slack takeover and discussed all things DevSecOps, including challenges to integrating security into your practices and getting management support. |
||
Choosing a Cloud Storage Service When choosing storage through a managed cloud service, you should consider several factors: What type of storage is needed? What is the type of application or service? What is the scale of data? What kind of accessibility, availability, and durability do you require? All these aspects should influence your decision. |
||
Cybersecurity Tips for Project Managers A project manager must be aware of the dangers the software faces if they are to be effective in its defense while managing their project. A lot of the data they're dealing with can be extremely sensitive. Let’s look at some tips that every project manager should pay attention to in order to protect their project. |
||
An Evolutionary Approach to Risk Management Risk management is identifying, analyzing, mitigating, and monitoring risks to a project. Humans do this all the time with life experiences, so there are parts of risk management that come naturally to us. What needs to be learned is recognizing our biases and limits to our visualization. Ask these questions to help. |
||
8 Questions to Ask before Fixing a Defect Some defects require a fix, without a doubt. But not all defects are created equal, so careful thought should be applied before a defect is fixed. The goal isn’t to fix every reported defect; it’s to return value to the customer and profit to the company. These eight questions can help in the decision-making process. |
||
What’s New in Apache Cassandra 4.0 Apache Cassandra is an open source, distributed NoSQL database based on the wide column model. The highly scalable, highly available database is great for handling large amounts of data. There is no set release date yet for the next version, Cassandra 4.0, but we do already know about several new features. |