-
+26 +1Twitter APIs Are Going Very Wrong
Twitter's most serious new annoyance is its new API pricing structure. It's both irritating developers and driving some of them out of business.
-
+29 +2What's What with Open Source Twitter
Twitter has finally — sort of, kind of — open sourced part of its code. Here's what's in there, and what's not.
-
+18 +3Groovy Datasets for Test Databases
When you experiment with a new-to-you data science skill, you need some sort of data to work with. Why be boring?
-
+21 +3GPT-4 AI-Powered Microsoft Security Copilot Arrives
What do you get when you mix OpenAI's GPT-4 generative AI with GitHub Copilot? Microsoft Security Copilot.
-
+19 +3Docker and Kubernetes founders talk about the future of cloud
The people who helped build today's open-source, cloud-native computing world talk about where we go from here.
-
+18 +2A Decade of Docker
We all use containers today, but until Docker came along, they were rarely used. Here's Docker's story.
-
+27 +1You'll Soon Be Using Vulnerability Exploitability eXchange
The Vulnerability Exploitability eXchange (VEX) is a Cybersecurity and Infrastructure Security Agency (CISA) working specification that is meant to be a machine-readable security advisory.
-
+24 +3No More Mr. Nice Guy: GitHub Demands Developers Use 2FA
GitHub has decided that starting on March 13, GitHub users must begin enrolling in two-factor authorization (2FA).
-
+20 +55 Microservices Misconceptions
Many misconceptions about microservices persist, often to the detriment of companies hoping it’s a silver bullet to solve all their problems.
-
+11 +2Techniques for Scaling Applications with a Database
Scaling is one of the hardest tasks to accomplish with a database. This article explains how scaling works, under the hood.
-
+28 +3Who writes Linux and open source software?
Developers and, more to the point, the companies that employ them
-
+25 +3Combining SBOMs With Security Data: Chainguard's OpenVEX
Chainguard has added support for Vulnerability Exploitability eXchange (VEX) to Software Bill Of Materials (SBOMs) in an implementation called OpenVEX. #cybersecurity #SBOMs #VEX
-
+31 +4Supercloud, multi-cloud, bigly cloud?
When we first heard about supercloud, we assumed it was yet another new cloud hype term with no substance – but we were wrong. (Yes, Silverlinings admits when we are wrong.) | No matter what it's called the concept of enabling architects and developers to treat multiple clouds as if it were one cloud is legit.
-
+18 +1How AWS uses eBPF to identify security risks
It's not just AWS though. The Linux kernel's eBPF is used for cloud security everywhere.
-
+18 +3A Cat Lover's Guide to Understanding JSON Databases
Learn about JSON databases and learn the benefits of human-readable, lightweight, and flexible data storage with examples from a pet cat's viewpoint.
-
+26 +310 Years of Dell XPS13 developer laptops
For a decade, Dell has been making top-of-the-line Ubuntu Linux-powered developer laptops. Here's the story behind the machines.
-
+18 +3Is cloud-native the new development normal?
In 2022, the Cloud Native Computing Foundation (CNCF) and Linux Foundation Research
-
+26 +2The Open Source Initiative improves its licensing rules
What's what with The Open Source Initiative—defenders of the open source definition—is making the approval process for new open-source licenses clearer and easier.open-source news.
-
+4 +1Optimizing Redis’ Default Compiler Flags
Redis and Intel teamed up to find out whether applying more aggressive optimization options would improve overall Redis baseline performance. Our conclusion: Yes! By changing the compiler behavior, we measured a 5.13% boost overall and more in some cases.
-
+21 +5The Marketing Buzzwords That Developers Hate
Developers know that vendors must tout their products, but they are less understanding when the marketing language is an immediate turnoff.
Submit a link
Start a discussion




















