This article about the influence of AI in medicine and the creation of "AI Doctors" is based on insights from Devs Meet Ethics, a series by AI expert Mauro Bennici for Codemotion. AI: assistant or replacement? How would you feel about being … Read more
Search Results for: remote work
Automating AWS Releases Without Cloud Expertise
Are you looking for a way to streamline and standardize your cloud releases on AWS without cloud expertise? In this article, OverIT shares details on their Next-Gen FSM Platform. Learn how to break down complex workflows into simpler parts … Read more
3 Data Breaches in Web Applications and Lessons Learned
What Is a Data Breach? A data breach is a cyberattack in which sensitive, confidential or protected data is accessed or exposed in an unauthorized manner. If sensitive data is viewed or directly stolen by unauthorized persons, the organization … Read more
What is Google Earth Engine and Why It’s Key For Sustainability Data Analysis
What is Google Earth Engine? Earth Engine is Google's cloud-based platform for doing planetary-scale analysis and visualization of Earth Data. It allows its users to access large amounts of geospatial data, such as satellite imagery, while at the … Read more
Devs Meet Ethics: AI Paradoxes Involving Autonomous Cars
AI paradoxes are a hot topic. The use of Artificial Intelligence (AI) is rapidly growing and evolving – but with that comes an ever-increasing importance placed on ethical considerations. As AI becomes more intelligent, the consequences of errors … Read more
Multi-Layered Defense for Web Applications
What Is Web Application Security? A web application is an application that is stored on a remote server and delivered over the Internet, typically through a browser interface. Web application security is complex, because web applications are … Read more
This is How Mathematics Keeps Your IoT Device Safe
The Internet of Things (IoT) is a paradigm expected to bring about a new era of connectedness and collaboration, and is already revolutionizing the way we live and work. However, it comes with a number of new security challenges. Because IoT devices … Read more
Metaverse: A Hitchhiker’s Guide to the Future of Immersive Experiences
The origins of the Metaverse The initial challenges of the Metaverse are likely to be similar to the challenges faced by the Internet when it was first developed. These challenges may include technical issues, such as building the infrastructure … Read more
New Year’s Dev Resolutions for 2023
Don't take so much time making balances, better focus on your new dev resolutions for 2023! The new year is just a few weeks away and we asked some members of our communities about their projects and ideas for the future. There are many ways in … Read more
8 Tips From IT Recruiters for Your Tech Interview
Whether you're an experienced professional looking to move on or just starting on your tech career, job interviews can be a daunting prospect. However, performing well in technical interviews is essential for getting top developer jobs and … Read more
Is Apache Kafka Still Relevant?
Things change quickly in the IT industry – so quickly that what one day is relevant can be obsolete the next. So what can be expected from a system launched back in 2011, like Apache Kafka? In this article, we look at whether this platform remains … Read more
Developing Industrial IoT Applications with Blazor
Why is Blazor becoming so popular? Web applications have been developed for approximately 30 years, and during this period both hardware and software technologies have undergone drastic changes. However, the nature of web applications and websites … Read more
How to Prevent Data Loss: 13 Best Practices and Strategies
According to a report by Information Security Buzz, ransomware attacks during Black Friday 2021 rose to a staggering 495 million globally. With Black Friday 2022 just around the corner, experts predict there will be a new record this year. With … Read more
Automating Security Testing with SCA, SAST and DAST
What Is Automated Security Testing? Security testing processes and tools help identify security weaknesses and vulnerabilities in applications and software. The goal is to find issues that can potentially allow threat actors to obtain … Read more
Why Python Is a Great Tool to Build a Digital Virtual Assistant
Digital virtual assistants have a wide range of applications that make them a great asset for business and leisure users. From powering smart technology to helping with workflow automation, they can be a great asset in our day-to-day lives at home … Read more
Case Study: Implementing the Actor Model for Managing Huge Amounts of Data
Introduction MSC's core business relies heavily on data that describes every single event related to shipping, vessels, and containers. This data needs to be shared quickly and efficiently with other systems that have a similar near-live time flow … Read more
GRPC Approach for Improved Software Development
This article, developed together with Be Digitech Solutions, analyzes the gRPC architecture created by Google, the special advantages it offers compared to REST architecture, and how we can migrate from REST to gRPC in terms of microservices … Read more
Is Your Company Ready to Enter the Metaverse?
Let's dive deep into the possibilities, technologies, and challenges presented by this new digital environment in this guide created together with Deloitte. 1. Metaverse: what is it exactly? Ever since Facebook rebranded to Meta, there has … Read more
Goodbye to High-End PCs? How the Cloud is Changing Gaming
The growth of the cloud gaming industry Cloud gaming allows users to play video games without downloading the full software or accessing the latest hardware, a change that's also taking place in other industries. It is present on a wide range of … Read more
Automated Testing Guide: What And What NOT to Automate When Testing Software
Tests must be performed at every stage of the software development process, to ensure any issues are ironed out early. If your software is insufficiently tested, it may be slow, buggy, and difficult for customers to use, which could sour your … Read more