patpitchaya - Fotolia
At the heart of all large-scale software development projects are the communications patterns required to keep everyone on the same page. The dawn of Git as a distributed version control system ...
When I used to work for a big computer manufacturing company, I once had a boss with an interesting hiring philosophy. He divided technical talent into two groups: technicians and artists. If he ...
In most enterprise organizations, UX designers and content managers are separate roles filled by different people. As a person who has worked in both capacities, I'm constantly reminded of the ...
Follow these code review best practices to identify security vulnerabilities before your applications are released into production.
More often than not, technical training misses the mark. You need to better understand how we ingest information through Bloom's educational taxonomy to get the most value out of your training ...
An Alexa vulnerability, combined with improper record retention in Amazon cloud servers, could expose a consumer or business developer to hacks that target private data.
A June 2019 NIST report identified hypervisor vulnerabilities in type 1 and type 2 hypervisors. Through the use of forensic analysis, you can start to close gaps in these vulnerabilities and ...
In need of a quick fix for the Eclipse "No Java virtual machine was found" error during an Ubuntu or Windows installation? Here's how to fix the Eclipse JRE and JDK errors.
If you're in San Francisco for Oracle Code One 2019, here are 10 sessions to visit to make the most out of your conference experience and chat with TheServerSide's Cameron McKenzie.
There's a lot to digest at Oracle Code One 2019. Here's some sage advice from a conference veteran to make the most out of your experience in San Francisco.
How do you deploy a JAR file to Tomcat? Typically you deploy WAR files, not JARs. But if you need to link to a JAR file from a Java web app on Apache Tomcat, here's how to do it.
A Cisco firewall vulnerability stems from improper user input validation. Here is how to fix the problem, and other ways to stem firewall vulnerability issues in your environment.
With the HSTS header, your organization can ensure that communications are secure across your networks. Here is how to implement the header, and some parameters to set for proper security.
Hackers don't always infiltrate your production systems with sophisticated attacks. Sometimes, they view overlooked IT security best practices as the best way to gain access to your data.
Don't get caught up in all the microservices oriented architecture hype just yet. Make sure you ask some key questions, and examine potential design issues before you say yes.