In this article, readers are going to use a tutorial to learn how to convert a string to an enum at the cost of 50 GB with the CVE-2020-36620 vulnerability. Read all
Why is applying a methodology like SOFT important? And, even more, what risks can we encounter if we’re not doing so? This post aims to cover both aspects. Read all
In this article, readers will learn how to migrate their applications from Vuejs 2 to Vuejs 3, components communications of Vuejs, and Vuejs’ global state. Read all
Get started with deploying Alluxio as the caching layer for Trino and learn how to use Alluxio caching with the Iceberg connector and MinIO file storage. Read all
A step-by-step introduction to Apache Kafka, its install, and its implementation using .NET Core 6 with background information, code blocks, and guide pictures. Read all
As Kubernetes continues to expand, the right service mesh needs to know what services are spun up and the policies needed to be aware of status and location. Read all
Learn about SAM (superset of CloudFormation) including some special commands and shortcuts to ease Java serverless code development, testing, and deployment. Read all
SCA is an essential part of application security. Here are important factors to consider when selecting an SCA scanner to be sure it is suited to your needs. Read all
The Cucumber BDD framework is the top choice for developers. This article lists the top five best practices to follow as you implement Cucumber with Selenium. Read all