Articles

Please enter an article title, author, or keyword
5 Tips to Create a Secure CI/CD Pipeline 5 Tips to Create a Secure CI/CD Pipeline

The purpose of CI/CD security goes beyond identifying and remediating vulnerabilities—it also emphasizes keeping pace with other CI/CD processes. A secure CI/CD pipeline allows teams to find and fix issues without disrupting the overall CI/CD flow, achieving security without delaying or rolling back software releases.

Gilad David Maayan's picture Gilad David Maayan
Using the New Pattern Matching Feature in Java 16 Using the New Pattern Matching Feature in Java 16

A new language feature in Java 16, called Pattern Matching for instanceof, uses a type pattern instead of just a type for the instanceof operator. The benefit of this feature is that you can avoid unnecessary code that usually has to be used for casting the target object to the type and declaring a new variable for the resulting object.

Deepak Vohra's picture Deepak Vohra
New Java 18 Feature–Default Charset UTF-8 New Java 18 Feature–Default Charset UTF-8

This article discusses the new Java 18 feature of making the default charset as UTF-8, which makes software development more agile as it makes software more portable across different systems.

Deepak Vohra's picture Deepak Vohra
Top 7 Software Development Trends for 2022 Top 7 Software Development Trends for 2022

For software companies and developers, keeping up with the trends means offering state-of-the-art software products and establishing themselves as innovation leaders. Enterprises and businesses will, on the other hand, have to decide between purchasing an existing software solution or cashing in for a customized product tailored to their needs.

Frank Garnett's picture Frank Garnett
numerical password keypad Agile Authentication in Modern Applications—With OAuth 2.0

This article explains how the OAuth 2.0 authorization framework authenticates a user on a third-party HTTP website, and how this kind of social identity provider based authentication makes use of what is called authorization code grant flow.

Deepak Vohra's picture Deepak Vohra
Keeping Your Company Agile While Getting Compliant

It's not easy to implement agile compliance, considering that it breaks down structure and hierarchy, which typically inhibit trust and collaboration. However, it improves the potential for better quality and makes it easy to implement comprehensive cybersecurity strategies.

Jordan MacAvoy's picture Jordan MacAvoy
The DevOps Security Stack: Tools You'll Need to Power a DevSecOps Transformation The DevOps Security Stack: Tools You'll Need to Power a DevSecOps Transformation

In most organizations, the transition to DevSecOps cannot happen without tools. A DevSecOps stack is a set of security tools that facilitate fast, automated security checks at every stage of the software development lifecycle (SDLC). This article covers the key principles of a successful DevSecOps stack, and the primary technologies that typically comprise the stack.

Gilad David Maayan's picture Gilad David Maayan
Finding the Sweet Spot Between Order and Chaos Finding the Sweet Spot Between Order and Chaos

Agile gives us complete freedom and ownership over the development process, but without a healthy measure of self-organization and management, all of that autonomy will not amount to much. Let’s take a look at the chaos and order aspect of agile and how you can embrace both.

John Hurley's picture John Hurley
Making a Choice Is Agile Methodology Right for Your Development Projects?

An Agile approach to software development looks good on paper. However, author Rajashekar Reddy Ramasahayam argues that it may not be a fit for all projects.

Moon Communication on the Moon

While watching For All Mankind, an American science fiction series on AppleTV+, Derk-Jan has recognized 3 take-aways that will assist with agile collaboration and communication.

Derk-Jan de Grood's picture Derk-Jan de Grood

Pages

Upcoming Events

Apr 30
Jun 04
Oct 01