Ways to Avoid Dependencies: Tips for Product Engineering Teams

Dependencies cause chaos on delivery and destroy predictability. In this article, I'll share some tips for product engineering teams to avoid dependencies. Read all

Security Matters: Vulnerability Scanning Done Right!

Security has become the priority in every company these days. Let's see how vulnerability scanning is done the right way. Read all

Challenges of AI in the Media Industry and How Developers Are Facing It

As the media industry joins others by adopting AI to improve user experience, many developers are facing new challenges and higher stakes on the backend. Read all

WebRTC Security Vulnerabilities You Should Know About

Learn about Web Real-Time Communication, or WebRTC: an open-source and free technology enabling real-time communication between web browsers with APIs. Read all

Implementing Zero Trust Architecture on Azure Hybrid Cloud

The article discusses implementing NIST's Zero Trust Architecture while migrating to MS Azure, and using tools and services offered on Microsoft Azure. Read all

Web Application Pen Testing Steps, Methods, and Tools

One simple flaw in app design or a misconfigured web server can potentially cause huge revenue losses. Read on to understand how web app pen testing is ... Read all

How to Apply Patches to Mule 4.x

Although Mulesoft takes care of CloudHub customers, customers which are using Standalone, RTF, PCF, and PCE have to be taken care of by themselves. Read all

How to Build a Cryptocurrency Exchange Application and How Much It Would Cost

We take a look at how mobile developers and mobile app shops can take advantage of the growing interest in cryptocurrency and developer an app for its exchange. Read all

How to Configure TLS/SSL With PEM Files

Learn how to easily set up TLS/SSL for your favorite http client while using PEM files. Read all

Fear-Based Leadership: 9 Signs You Are Leading From Fear

Are you a leader who leads with fear? If you're not sure, check out what this article has to say about signs you're more fearful than fearless. Read all

DevOps Fast Forward with Go

Go is a perfect fit for the DevOps community. Along with some real-world cases, let's see some features that make it shine in the DevOps world. Read all

API Authentication: Implementation of Best Practices

This article addresses a number of the best practices for implementing API security, including OAuth 2.0, API keys, usernames and passwords, and more. Read all

Strategies in C to Avoid Common Buffer Overflow Errors

How can you avoid common buffer overflow errors in C? Check out this strategy to prevent future vulnerabilities and ensure better security. Read all

 

 

 

 

Top