The Problem With Heroes In Software Development

All too often a company relies on a single developer to keep things running smoothly. This developer is that company’s hero. However, this reliance can be harmful for all parties involved.

Source: The Problem With Heroes In Software Development

Posted in Uncategorized | Leave a comment

Eight Of The Most Common Challenges Testers Face with Selenium – DZone Agile

We explore the open source testing framework, Selenium, and the common problems that Agile teams face when using Selenium to test their web applications.

Source: Eight Of The Most Common Challenges Testers Face with Selenium – DZone Agile

Posted in Uncategorized | Leave a comment

Red Hat Secures Networking Flaws in OpenStack, the Linux Kernel

Red Hat has fixed an important vulnerability in the OpenStack subsystem that’s used to manage network connectivity to and from virtual machines. If left unpatched, it could allow an attacker to access network resources from virtual machines. The vulnerability, tracked as CVE-2017-7543 in the Common Vulnerabilities and Exposures (CVE) database, is located in openstack-neutron, a…

Source: Red Hat Secures Networking Flaws in OpenStack, the Linux Kernel

Posted in Uncategorized | Leave a comment

Meet the fifth grader turning water bottles into light bulbs to brighten communities

Believing that every community deserves access to commodities as basic as lighting, 12-year-old Bryan decided to turn his annual school science project into a mission to defeat darkness.

Source: Meet the fifth grader turning water bottles into light bulbs to brighten communities

Ed: Awesome 🙂

Posted in Uncategorized | Leave a comment

4 container adoption patterns: What you need to know

How are IT organizations using containers, what’s the best adoption pattern for you – and what speed bumps should you avoid?

Source: 4 container adoption patterns: What you need to know

Posted in Uncategorized | Leave a comment

Forging an SHA-1 MAC Using a Length-Extension Attack in Python – DZone Security

A security expert explains the background and use of SHA-1 and MACs, and shows how they can be easily broken using a few lines of Python-based code. Read on!

Source: Forging an SHA-1 MAC Using a Length-Extension Attack in Python – DZone Security

Posted in Uncategorized | Leave a comment

5 Things We’ve Learned About Monitoring Containers – DZone Cloud

Let’s examine how containers have changed monitoring with looks at instrumentation, data mapping, orchestration, data storage, and troubleshooting.

Source: 5 Things We’ve Learned About Monitoring Containers – DZone Cloud

Posted in Uncategorized | Leave a comment

8 Examples of Hardware That Make Me Despair of IoT – DZone IoT

Whether it’s privacy or practicality, sometimes, smart devices aren’t the answer. Here are some lessons to keep in mind when designing a consumer IoT product.

Source: 8 Examples of Hardware That Make Me Despair of IoT – DZone IoT

 

Ed: OMG, is it the first day of April or something…?

Posted in Uncategorized | Leave a comment

MongoDB: Evaluate Query Performance Using Indexes – DZone Database

Learn why you should create indexes, the different types of indexes, how to manage indexes, and how to examine query performance.

Source: MongoDB: Evaluate Query Performance Using Indexes – DZone Database

Posted in Uncategorized | Leave a comment

The Serverless Performance Shootout – DZone Cloud

This comparison of AWS Lambda, Google Cloud Functions, and Microsoft Azure Functions measures each serverless offering’s performance when running functions.

Source: The Serverless Performance Shootout – DZone Cloud

Posted in Uncategorized | Leave a comment