Related Content
Microsoft Calls for Federal Regulation of Facial Recognition Microsoft has called for federal regulation of facial-recognition software, arguing that such artificial intelligence abilities are too significant and potentially dangerous for its purveyors to police themselves. The move comes amid public criticism of several tech giants over their use—and misuse—of the technology. |
||
It's Time to Be Cautiously Optimistic about Artificial Intelligence Artificial intelligence (AI) is an ongoing trend today. However, the picture is not all rosy—even for the insiders who are heavily invested in this space. They are being cautiously optimistic about the potential it holds and the potential adverse impact if the threshold is exceeded. |
||
5 Myths about API Security APIs are designed to provide interfaces between multiple applications, allowing them to work together. From a security perspective, this is a powerful tool to have. Unfortunately, the effectiveness of APIs diminishes if they are misunderstood. Here are five common myths about API security, along with the facts. |
||
Hurricane Season 2018: Enhanced Forecasting and More Prep Time The 2017 Atlantic hurricane season saw three devastating major hurricanes. Like any team after a release that conducts reviews to see how they can improve, the National Hurricane Center found ways to enhance future communication to the public regarding where a tropical storm is headed and the potential impact. |
||
A Definition of Done for DevSecOps In DevOps, we have a software delivery pipeline that checks, deploys, and tests every build. The goal is to produce a viable candidate for production, so we have to look at many different aspects of quality, including security. To be sure we hit all the crucial marks, we should have a definition of done for DevSecOps. |
||
6 Ways to Protect Your Organization from DDoS Attacks During a DDoS attack, no one can use your application, which will result in loss of business. Brand reputation also tumbles if customers can't access your site or become casualties of the data breaches. However, there are some proven practices for preventing DDoS attacks—and for what to do if you fall victim to one. |
||
What the Future Holds for Cloud Computing Thanks to the development of cloud architecture away from a server-client pattern, those in the software industry will be able to embrace heterogenous cloud services that can only run when needed. Consequently, we are due for a cloud renaissance. Here are some predictions for what the future holds for cloud computing. |
||
Are You Reluctant to Venture into Accessibility Engineering? Organizations are beginning to give a lot of attention and importance to accessibility engineering as part of their usability efforts; however, this has not translated into implementation strategies that have reached the market. Why is there a reluctance to venture into full-fledged accessibility engineering? |