Designing Raspberry Pi 400
The author exposes his 4 years journey designing and making the new Raspberry Pi 400.
The Architect’s Path
Gregor Hohpe explores in an articles series an architectural model for a learning path for architects.
FBI hires 140 robots to retrieve sensitive information
Companies around the world are increasing their use of robots. FBI is no exception to this rule. In this article, the author explains how FBI use robots provided by Autostore to retrieve sensitive information.
CNCF End User Technology Radar: Database Storage
The CNCF has just published its database storage technology radar. Beyond the presentation of the radar, the author exposes some trends about technology adoption.
CNCF Cloud Native Security Whitepaper
The CNCF Security Special Interest Group (SIG) has just released a new Cloud Native Security Whitepaper to help educate the community about best practices for securing cloud native deployments. The whitepaper intends to provide organizations and their technical leadership with a clear understanding of cloud native security and its incorporation in lifecycle processes.
Docker for Java developers: 5 things you need to know not to fail your security
Always a good reminder about security: be mindful when using Docker. When creating an image for a Java application, some tips to avoid security holes.
The challenges of Reactive Programming
Reactive Programming may sound appealing to develop modern “state of the art” cloud-native applications. The promise is to deliver more efficient software using less threads and system resources. But this perspective is not without challenges! In this article, Clément Escoffier from Red Hat details the bad and best practices using Mutiny, a new reactive programming library.