gears

Everyone’s back to business and the new year has officially set in. Spend some time gearing up to learn new things this year by reading some insights from our authors in posts below.

Top Test Data Challenges

In the last few years, people have started to rely less on manual work and more on automation. Internet banking and online shopping portals are some examples of this growing trend of digitalization. Want to find out more? Check out this post from Arnab Roy Chowdhury on Enov8’s blog. 

What Is Flow in JavaScript? A Simple Introduction

Flow is a static type checker that allows a developer to check for type errors while developing code. This means a developer receives faster feedback about the code, which they can use to improve its quality. So what is flow in JavaScript? Michel Mulders can answer that for you on Testim’s blog. 

Kubernetes Day 2: What Happens Now?

Everyone is talking about Kubernetes, and people’s interest in learning and using Kubernetes continues to grow. You might already be convinced that you need Kubernetes features like self-healing, autoscaling, and progressive rollouts. However, Kubernetes is still not easy, and many questions may arise once you start using it. And that’s why Christian Melendez is here to help on ASPE’s blog. 

Securing Data by Masking

With the cost of data breaches increasing every year, there’s a huge need for higher security standards. And Michiel Mulders is here to fill you in on Enov8’s blog. 

Digital Risk: What It Is And How to Manage It in Your Org

Is your organization becoming increasingly dependent on technology? If so, your organization is also becoming vulnerable to certain digital threats and risks. Daniel de Oliveira can give you some solutions on Plutora’s blog. 

What Is Business Analytics? A Comprehensive Definition

In today’s world, knowledge is power. Therefore, if you have it, you have the power to make informed decisions. Those will change the way you build a product or how you deliver a service. They can even change the way you currently make your business work. Find out more from Juan Pablo Macias Gonzalez on Plutora’s blog. 

Memory Leak Detection – How to Find, Eliminate, and Avoid

As a software developer, you might not be used to thinking about the memory usage of your applications. In today’s development world, memory is plentiful and usually quite fast. Odds are, the programming language you use doesn’t require you to allocate your own memory, or free it when you’re done. That doesn’t mean that you’re in the clear when it comes to memory leaks though. And Eric Boersma is here to help you out on Raygun’s blog.

How to Get Started With Nexus Repository Manager OSS

If you plan on developing software and keep it going for a long time, repository managers play an important role. Repository managers help you optimize the storage of the packages required for the software. Learn more from Omkar Hiremath on Sonatype’s blog. 

How to Use Sonatype OSS Index to Identify Security Vulnerabilities

It’s nearly impossible to build a modern application without relying on third-party libraries. Open-source software has been an amazing boom to software development. It’s been instrumental in allowing developers to build increasingly more complex applications that make the internet what it is today. However, third-party libraries also present a few problems from a security perspective. And Casey Dunham is here to fill you in on Sonatype’s blog. 

What Does Data Management Include? Introductory Guide

Data management helps you and your organization capture data in a structured and organized way. Also, data management helps improve data quality and makes the data easier to discover. Correct data management implementation brings many advantages to your organization, allowing you and your team to make more informed decisions and improve inefficient processes. But what does data management include? Michiel Mulders can answer that on DataOps’ blog. 

What Is the Primary Objective Of Data Security Controls?

When you develop a data security architecture and strategy for your organization, your main objective is to protect the organization’s data. To do that, you first need to identify all threats and vulnerabilities associated with that data and inform the business about the security risks you identified. Next, you need to introduce appropriate countermeasures to manage those risks based on the risk appetite of the organization. To do that successfully, you need data security controls and you need to have a firm grasp on what the primary objective of data security control is. Janos Zold is here to answer your thoughts on DataOps’ blog. 

We also updated a few posts this week. In this post, you get a chance to learn how to use logging techniques in yet another very popular language: PHP. Find out more on Scalyr’s blog. 

Kubernetes Monitoring Developer’s Guide

Finally, we updated a post on Kubernetes. Balancing the demands of shipping with assuring quality presents challenges. Also, you must have an eye on keeping code readable and maintainable. It’s not easy. Beyond mere development, maintaining a running application is still harder. Serving users requires responding to problems in a timely fashion. In order to respond to problems, you need to know they exist. In short: writing software is hard; running software is often harder. And that’s what this post on Stackify’s blog is all about.