Software Developers

Cracking the Code: How To Decode Vague API Errors Like a Pro Cracking the Code: How To Decode Vague API Errors Like a Pro

HTTP status codes are three-digit numbers returned by the server to indicate the status of the..
Comparing the Performance of Hashing Techniques for Similar Function Detection Comparing the Performance of Hashing Techniques for Similar Function Detection

This blog post explores the challenges of code comparison and presents a solution to the problem.
Cost-Effective AI Infrastructure: 5 Lessons Learned Cost-Effective AI Infrastructure: 5 Lessons Learned

This post details challenges and state of the art of cost-effective AI infrastructure and five..
Measurement Challenges in  Software Assurance and Supply Chain Risk Management Measurement Challenges in Software Assurance and Supply Chain Risk Management

This SEI Blog post examines the current state of measurement in software assurance and supply chain ..
Versioning with Git Tags and Conventional Commits Versioning with Git Tags and Conventional Commits

This blog post explores extending the conventional commit paradigm to enable automatic semantic..
Updating to .NET 8, updating to IHostBuilder, and running Playwright Tests within NUnit headless or .. Updating to .NET 8, updating to IHostBuilder, and running Playwright Tests within NUnit headless or ..

I've been doing not just Unit Testing for my sites but full on Integration Testing and Browser..
The 13 Key Elements of an Insider Threat Program The 13 Key Elements of an Insider Threat Program

COVID-19 changed the nature of the workplace. In this evolving climate, organizations need to be..
Batch Processing vs. Stream Processing: Why Batch Is Dying and Streaming Takes Over Batch Processing vs. Stream Processing: Why Batch Is Dying and Streaming Takes Over

In the digital age, data is the new currency and is being used everywhere. From social media to IoT ..
Introduction to Web Audio API Introduction to Web Audio API

A critical part of WebRTC is the transmission of audio. Web Audio API is all about processing and..
CERT Releases 2 Tools to Assess Insider Risk CERT Releases 2 Tools to Assess Insider Risk

The average insider risk incident costs organizations more than $600,000. To help organizations..
Monitoring SpringBoot2 Metrics with HertzBeat Monitoring SpringBoot2 Metrics with HertzBeat

Use the open-source real-time monitoring tool HertzBeat to monitor and alarm the SpringBoot2..
The Impact of Artificial Intelligence on Field Service Management The Impact of Artificial Intelligence on Field Service Management

Field service management has come a long way in recent years, from the days of pen and paper-based..
Testing Repository Adapters With Hexagonal Architecture Testing Repository Adapters With Hexagonal Architecture

When applying hexagonal architecture (ports and adapters) with access to infrastructure elements..
The Exponential Growth of Generative AI: Opportunities and Challenges The Exponential Growth of Generative AI: Opportunities and Challenges

While the opportunities offered by generative AI are significant, there are also major challenges,..
Creating a Large Language Model Application Using Gradio Creating a Large Language Model Application Using Gradio

This post explains how to build a large language model across three primary use cases: basic..
11 Observability Tools You Should Know 11 Observability Tools You Should Know

When organizations move toward the cloud, their systems also lean toward distributed architectures. ..
Dependency Injection and Ways to Inject It Using .NET Core API Dependency Injection and Ways to Inject It Using .NET Core API

In this article, we are going to discuss dependency injection and its usage and benefits. We will..
Correcting My Misconceptions With REGIONAL BY ROW Tables Correcting My Misconceptions With REGIONAL BY ROW Tables

Previous Articles on Multi-RegionCockroachDB Multi-Region Abstractions for MongoDB Developers With..
Shallow and Deep Copies in JavaScript: What’s the Difference? Shallow and Deep Copies in JavaScript: What’s the Difference?

Have you ever tried to create a duplicate of an object in JavaScript, but the output wasn’t what..
Building Micronaut Microservices Using MicrostarterCLI Building Micronaut Microservices Using MicrostarterCLI

MicrostarterCLI is a rapid development tool. It helps you as a developer generate standard reusable ..
When to Use Decision Trees vs. Random Forests in Machine Learning When to Use Decision Trees vs. Random Forests in Machine Learning

The development of sophisticated algorithms has Completely changed how data is handled and choices..
Join the SEI and White House OSTP to Explore the Future of Software and AI Engineering Join the SEI and White House OSTP to Explore the Future of Software and AI Engineering

The SEI and the White House OSTP will co-host a workshop to inform a community strategy for..
Whats Going On in My Program? 12 Rules for Conducting Assessments Whats Going On in My Program? 12 Rules for Conducting Assessments

This post provides 12 rules for successful program or project assessments.
Continuous Development: Building the Thing Right, to Build the Right Thing Continuous Development: Building the Thing Right, to Build the Right Thing

Test automation is vital to any organization wanting to adopt Agile or DevOps, or simply wanting to ..
8 Areas of Future Research in Zero Trust 8 Areas of Future Research in Zero Trust

The National Cybersecurity Strategy was released on March 1st, 2023 to improve federal..
How to Develop an AR-Based Home Decoration App How to Develop an AR-Based Home Decoration App

BackgroundAround half a year ago, I decided to start decorating my new house. Before getting..
Stream Processing vs. Batch Processing: What to Know Stream Processing vs. Batch Processing: What to Know

Big data is at the center of all business decisions these days. It refers to large volumes of data..
2 Approaches to Risk and Resilience: Asset-Based and Service-Based 2 Approaches to Risk and Resilience: Asset-Based and Service-Based

There are benefits and challenges of the two approaches to risk and resilience management: one..
What Makes ReactJS Good for Logistics Applications in 2023? What Makes ReactJS Good for Logistics Applications in 2023?

As the logistics industry continues to grow and become increasingly complex, businesses are looking ..
Better Performance and Security by Monitoring Logs, Metrics, and More Better Performance and Security by Monitoring Logs, Metrics, and More

In the previous article in this series—The Everything Guide to Data Collection in DevSecOps—we..
Redis: What It Is, What It Does, and Why You Should Care Redis: What It Is, What It Does, and Why You Should Care

Redis is an open-source in-memory data store that can be used as a database, cache, or message..
Simulating and Troubleshooting StackOverflowError in Kotlin Simulating and Troubleshooting StackOverflowError in Kotlin

In this series of simulating and troubleshooting performance problems in Kotlin, let’s discuss how..
Visual Network Mapping Your K8s Clusters To Assess Performance Visual Network Mapping Your K8s Clusters To Assess Performance

Building performant services and systems is at the core of every business. Tons of technologies..
How to Mitigate Insider Threats by Learning from Past Incidents How to Mitigate Insider Threats by Learning from Past Incidents

This post summarizes a new best practice added to the new 7th edition of the Common Sense Guide to..
Debugging Threads and Asynchronous Code Debugging Threads and Asynchronous Code

This week, we’ll discuss one of the harder problems in programming: threading. For many cases,..
Bridging the Gap between Requirements Engineering and Model Evaluation in Machine Learning Bridging the Gap between Requirements Engineering and Model Evaluation in Machine Learning

Requirements engineering for machine learning (ML) is not standardized and considered one of the..
The Top 10 Blog Posts of 2022 The Top 10 Blog Posts of 2022

This post presents the 10 most visited posts of 2022 highlighting our work in deepfakes, artificial ..
Efficiently Computing Permissions at Scale: Our Engineering Approach Efficiently Computing Permissions at Scale: Our Engineering Approach

A few weeks ago, we introduced a new Role-based Access Management (RBAC) feature in the GitGuardian ..
Use your own user @ domain for Mastodon discoverability with the WebFinger Protocol without hosting .. Use your own user @ domain for Mastodon discoverability with the WebFinger Protocol without hosting ..

Mastodon is a free, open-source social networking service that is decentralized and distributed. It ..
Unleashing the Power of JavaScript Modules: A Beginner’s Guide Unleashing the Power of JavaScript Modules: A Beginner’s Guide

JavaScript is a powerful programming language that is widely used for web development. One of the..