Metrics should be in the hands of those who can make meaningful decisions with them. In this post, we discuss how to achieve that and what to have in mind.
Explore the Scatter-Gather pattern, a cloud scalability design that can process large amounts of data and perform time-consuming, intricate computations.
This fourth article covers more case studies as to the resource type To Do Tasks. Readers will learn more about common errors and how to troubleshoot them.
Developer security practices are about adding security at each software development stage. Here’s a list of top developer security practices to follow.
Readers will migrate Terraform state to GitLab CI/CD, which is a GitOps best practice that allows multiple engineers to work together to develop infrastructure.
Which approach is better: an iterator or a materialized collection? In this article, we explore common pitfalls with both of these different approaches!
Learn how to optimize your GKE cluster with these 14 tactics across security, resource management, and networking for high availability and optimal cost.
In this article, readers will discover some tips and nice techniques that will help you build a resilient and distributed application with Kafka Streams.
Mobile app development is an evolving field, with new trends and technologies emerging every year. It's rapidly changing and evolving and taking a key role.
An IoT Gateway is a device that connects and communicates with multiple IoT devices, providing a secure and efficient platform for managing and processing data.
In this article, readers will get started with policy as code by writing an OPA (Open Policy Agent) policy for a Kubernetes environment with guide code.
Learning how to use the ScyllaDB CDC source connector to push the row-level changes events in the tables of a ScyllaDB NoSQL cluster to a Kafka server.
This article covers the biggest difficulty with the JDBC sink connector: it requires knowledge of the schema of data that has already landed on the Kafka topic.
Data poisoning facilitated by backdoor access can skew machine learning data without detection. Here are some tips to protect against backdoor data poisoning.
Sergei Golitsyn provides solutions to popular problems experienced using the two-pointers technique: Valid Palindrome, Two Sum II — Input Array Is Sorted, and 3Sum.