Modal Title
4 Reasons to Shift Left and Add Security Earlier in the SDLC
The Need to Decouple Human Error from Incident Response
Jetstack Helps Turn Security Policies into Actions
Microsoft Power BI Gets Low-Code Datamart Feature
How to Manage Metadata in a Highly Scalable System
Low Code Does Not Mean Low Risk
Aqua Security’s Trivy Security Scanner Can Scan Anything Now
NoSQL, NoMQ: Palo Alto Networks’ New Event Streaming Paradigm
Infra-as-Data vs. Infra-as-Code: What’s the Difference?
Kubernetes Requests and Limits Demystified 
GitLab 15 Upgrades Address Security, Observability, DataOps
3 Consul Service Mesh Myths Busted
FinOps: How Kubernetes Teams Can Best Work with Finance
NASA Programmer Remembers Debugging Lisp in Deep Space
Learn React: Start of a Frontend Dev Journey
James Webb Space Telescope and 344 Single Points of Failure
How to Build an Open Source Community
Jest: Meta’s JavaScript Testing Framework Joins OpenJS
5 Ways to Prepare Your Dev Team for Technical Due Diligence
Intel to Continue Buying Spree of SaaS Vendors
SBOM Everywhere: The OpenSSF Plan for SBOMs
Support Citizen IT to Democratize Your Data 
Time Series Forecasting with TensorFlow and InfluxDB
Addressing the Challenges of Real-Time Data Sharing
How ML Defense Projects Change Approaches to Data Security
Java after Java 17: LTS Loyalty, Containers and Open Source
How to Stop Autovacuum from Sucking up Your Performance
Go Language Fuels Cloud Native Development
The State of Application Modernization, 2022
How Does HashiCorp Vault Work with Kubernetes Secrets?
Cloud Native Security Hasn’t Solved Compliance Challenges
Croquet Woos JavaScript Devs with a Web-Based Metaverse
Vanguard’s Iterative Enterprise SRE Transformation
Envoy Gateway Offers to Standardize Kubernetes Ingress
How Pinterest Tuned Memcached for Big Performance Gains
Why You Need Distributed DNS Implementation
Shrapnel Embraces Blockchain in First-Person Shooter Game
OAuth Security in a Cloud Native World
Can SRE Bring Governance and Compliance into the Future?
Scan Container Images for Vulnerabilities with Grype
The Great Security Debate: Is Patching Useless?
Snack Stack: Tapas for Valencia … and Beyond