AWS | Cloud | Security What happens when you leak AWS credentials and how AWS minimizes the damage Tibor Hercz 05 Apr, 2023
Google Cloud Platform | Cloud | Cloud Native Architecture | DevOps | Secure Software Development | Software Development The Future of Developer Workstations Jorge Liauw Calo 04 Apr, 2023
Cloud | Google Cloud Platform | Security How to block DNS exfiltration on Google Cloud Laurens Knoll 29 Mar, 2023
Security | Secure Software Development Habit #2: We make sure security and compliance are done at the end of every project Xebia | Xpirit 27 Mar, 2023
DevOps and SRE | Chaos Engineering | Continuous Delivery | Secure Software Development | Security | SRE Monitoring levels and Monitoring Maturity Edzo Botjes 24 Mar, 2023
Low Code | Global | Software Development Using OutSystems UI Components in the right way William Antunes 24 Mar, 2023
Kotlin | Functional Programming Functional Domain Modeling in Kotlin - Validation Simon Vergauwen 23 Mar, 2023
Microsoft Services | Digital Transformation | IT Strategy 4 IT Trends That Will Simplify, Fast-Track and Anchor Change in Your Business Xebia | Xpirit 22 Mar, 2023
Cloud | AWS | Cloud Security AWS Open Source Observability - Amazon Neptune and Security Graphs (Part 2) Martin Perez Rodriguez 21 Mar, 2023
Frontend | Chrome | Mobile Development Fixing scroll issues with your site on mobile Mike Woudenberg 10 Mar, 2023
Microsoft Services | GitHub | Secure Software Development | Security What Is Supply Chain Security? Xebia | Xpirit 10 Mar, 2023
Kotlin | Software Development | Software Technology 7 common mistakes in Kotlin Jeroen Rosenberg 10 Mar, 2023