Distributed data processing and storage requires a strategy for mapping tasks or data across availab...
Otmar Ertl
April 10, 2024
Kubernetes Security — Part 3: Security ContextIn this blog post series, we will further deepe...
Renate Schosser
October 19, 2023
The SimHash algorithm, introduced in 2002 by Moses Charikar, can compute fingerprints of sets with t...
October 9, 2023
Businesses in all sectors introduce novel approaches to innovate with generative...
Wolfgang Beer
June 6, 2023
This post explains how to report and capture business grade data using AWS Lambd...
Adam Gardner
April 24, 2023
We talked to Dynatracer Magdalena about her remarkable career trajectory and bre...
Anna Martschini
March 16, 2023
Dynatracer Tatiana shares her inspiring leadership journey and key learnings bas...
March 8, 2023
Looking to future-proof your programming career? Start with mastering these seve...
March 2, 2023
Hear from Maria, who brings together technology and people in her field of softw...
February 27, 2023
How do you scan multiple applications for security issues while filtering out fa...
Simon Ammer
February 22, 2023
Unlocking the soul of user experience through type designAs a communication desi...
Denise Yingqiu Dou
February 16, 2023
Capturing and playing back a user’s interactions involves specific software desi...
Salvador Subarroca
December 20, 2022