Analyses

Public binoculars against cloudy sky
information exchange knowledge transfer

chain rust link heavy iron metal

How Rust can replace C, with Python's help

Four new projects make it easier to develop Rust libraries with Python bindings, allowing Rust to replace C as a low-level Python partner

teach train direct coach stop watch speed

10 essential performance tips for MySQL

From workload profiling to the three rules of indexing, these expert insights are sure to make your MySQL servers scream

night lights 99689611

What is Node.js? The JavaScript runtime explained

Node.js is a lean, fast, cross-platform JavaScript runtime environment that is useful for both servers and desktop applications

shattered rainbow tie dye

JavaScript for squares: The incredible rise of TypeScript

The web needed a freewheeling programming language like JavaScript, but now it’s time to set some rules

Talent compass pointing to the most highly skilled jobs hiring

Hiring in the age of dispersed technology spending

The tech hiring landscape is shifting now that line-of-business units command their share of technology spending. The result is a rise in hybrid positions that combine business and IT skills — and a need for a new approach to filling...

Cloud Security

Top cloud security controls you should be using

Human error is one of the top reasons for data breaches in the cloud, as administrators forget to turn on basic security controls. Whether it is Amazon Web Services, Microsoft Azure, or Google Cloud Platform, keep these rules in mind...

Lost man in a boat 149045481

Amazon Alexa is so smart it's stupid

Amazon's intelligent personal assistant has amassed more than 15,000 skills. If only we could find them

closeup of clock deadline

What IT workloads say about your true priorities

A study of IT decision makers from Spiceworks reveals that IT workers are spending too much time on maintenance, leaving little time for innovation, especially around security.

cybersecurity skills and talent shortage

Look beyond job boards to fill cybersecurity jobs

The cybersecurity staffing shortage is reaching crisis proportions, and companies are looking beyond the traditional channels of job boards and headhunters to find and hire new talent. Here are some of the unconventional ways...

cybersecurity skills and talent shortage

Why linguistics can't always identify cyber attackers' nationality

The security whodunnit: analyzing the language used in an attack is just one tool to assign attribution, and it’s not always reliable.

team teamwork global workforce

What’s a workforce marketplace? How work will get done in the future

Companies are moving from hierarchical models with defined job roles to labor platforms that allow opportunities for people to work on different things and in different ways.

keys thinkstock

8 keys to DynamoDB success

How to ensure that Amazon’s fast and scalable key-value database works for you, not against you

4 compliance

What is GRC and why do you need it?

GRC is a strategy for managing an organization's overall governance, enterprise risk management and compliance with regulations Learn how GRC can help you align IT activities to business goals, manage risk effectively and stay on top...

computer programmer or hacker

Closing the CVE gap: Is MITRE up to it?

Critics say the The Common Vulnerabilities and Exposures (CVE) program, managed by MITRE, is falling far behind in its mission to catalog and identify all known vulnerabilities. Its defenders say a new model is closing that gap.

dead end sign public domain CC0

Kubernetes's days may be numbered as open source changes

What happens if Google finds more efficient ways to drive paying customers to the Google Cloud Platform and other services?

big data consolidation

How to write event-driven IoT microservices that don’t break

Today’s IoT environments are a potential rat’s nest of asynchronous craziness just waiting to happen

shipping industry with loading binary code containers on ship representing the concept of software

What is Docker? Linux containers explained

A brief introduction to lightweight, portable, flexible Docker containers and why developers love them

threat ransomware response

The fault for ransomware attacks lies with the challenges security teams face

The realities of managing and protecting IT infrastructures puts IT and security personnel in a no-win situation when attacks like WannaCry or ExPetr occur, so stop blaming them.

Load More