Hit Subscribe Digest

Hit Subscribe Digest

GitHub Search API, An Introduction With Examples GitHub is probably the most loved software used by developers all over the world. Besides code collaboration, it brings in tons of useful features, such as issue tracking and code management. And if you’ve loved...
Hit Subscribe Digest

Hit Subscribe Digest

How to Create a Docker Image From a Container In this article on Dataset’s blog, you can get a step-by-step instructions on how to create a Docker container, modify its internal state, and then save the container as an image. This is really handy when you’re...
Hit Subscribe Digest

Hit Subscribe Digest

Deployment Strategies: 6 Explained in Depth For every software development firm, there comes a time when their software will need to be changed or upgraded. It can come in the form of a total version change or fixing a bug found in the original version.Now that the...
Hit Subscribe Digest

Hit Subscribe Digest

What is Kubernetes? Everything You Need to Know Containers have become the norm for creating standard applications. Clients and engineers don’t like downtime in the production environment, and recently, several organizations have adopted containers as a solution. The...
Hit Subscribe Digest

Hit Subscribe Digest

Spring Broken Object Level Authorization Guide: Examples and Prevention If a malicious user gains access to functionality that only system administrators should have access to, there can be dire consequences. This post is about a specific type of vulnerability called...
Hit Subscribe Digest

Hit Subscribe Digest

Spring XML External Entities Guide: Examples and Prevention XML is a markup language that we use to define and categorize data. Data stored in XML format can move between multiple servers or between a client and a server. Once a server receives an XML input, it parses...
Hit Subscribe Digest

Hit Subscribe Digest

xUnit vs. NUnit Demystified: A Comprehensive Explanation Getting started with unit testing can seem like a daunting task. There’s plenty to learn, such as what unit testing is in the first place and why it’s valuable, what the best practices are when writing tests,...
Hit Subscribe Digest

Hit Subscribe Digest

Rails Broken Object Level Authorization Guide Broken object-level authorization, or BOLA, is a specific attack that targets weak or poorly implemented authorization mechanisms. It exploits endpoints that allow user input to retrieve objects (data) and have no user...
Hit Subscribe Digest

Hit Subscribe Digest

A Detailed Introduction to the Avro Data Format In this article by Manoj Mokashi on Sqream’s blog, you can take a look at Apache Avro Data Format, which is a data serialization system that converts an object in memory to a stream of bytes. Lua CORS Guide: What...
Hit Subscribe Digest

Hit Subscribe Digest

Cloud-Native Applications and Log Management Best Practices It’s easy to see how most of the issues related to traditional software applications stem from the on-premises, monolithic architecture and the siloed culture. The introduction of cloud computing enabled...