Microsoft wants to protect the modern web with the next evolution of its static scan tool. The company announced sonar, a linting tool and site scanner for the modern web. Microsoft first released its static scan tool within its browser in 2013. It was meant to detect optimizations for old versions of IE, missing prefixes … continue reading
The JS Foundation has announced that it is bringing on eBay’s Marko library. Marko is a library designed to streamline web development by creating UI components. eBay developed the library in 2012 in order to meet its need of supporting UI components and asynchronous rendering for Node.js applications. “eBay has been a longtime core contributor … continue reading
Amazon has announced the launch of the latest iteration of its Elastic Compute Cloud compute-optimized GPU instances, EC2 P3, running on NVIDIA’s Tesla v100 GPUs. The launch coincides with NVIDIA’s release of the NVIDIA GPU Cloud container registry for AI developers, available now on the EC2 P3 instances. The EC2 P3 instances are optimized for … continue reading
Google is bringing machine learning to Android with a newly added Neural Networks API. The NNAPI is part of the latest developer preview of Android 8.1, Oreo. According to the company, the new API will enable developers to run computationally intensive machine learning operations on mobile devices. In addition, it provides a base layer for … continue reading
Apollo Client 2.0 has been released. The Apollo Client is a GraphQL client for JavaScript platforms, allowing users to describe data requirements using a GraphQL query, and have the client find and manage the data. Apollo’s vision for the future is to eventually be able to manage all of an application’s data using GraphQL. The … continue reading
When a single breach can cause untold damage to your business, from millions in losses to reputational damage, operational disruption, and lost trust, you want to align your security budget with the actual threats you face. So why does the typical company allocate less than 3% of its security budget to application security—when a full 30% of successful breaches … continue reading
Ghost, goblins, and ghouls are not the only thing you have to worry about this month! This month, and every month, development teams fear “The Nightmare Before DevOps Testing.” There are plenty of things that can go wrong in a DevOps transition, but to help testers avoid DevOps nightmares, LogiGear has released an infographic based … continue reading
After the “Revenge of Coppersmith’s Attack,” or RoCA, vulnerability left his Yubico-provided SSH key compromised, Stanford University senior infrastructure systems engineer A. Karl Kornel found that, thanks to GitHub’s necessary but inconvenient security measures, every commit he’d signed would no longer pass certification. The Center for Research on Cryptography and security describes RoCA as a … continue reading
The Linux Foundation is releasing its 2017 Linux Kernel Development Report to examine progress that has been made to the Linux kernel as well as who is using and contributing to it. This year’s report details Linux kernel 4.13, with a focus on 4.8 to 4.13. The Linux kernel forms the core of the Linux … continue reading
Databricks has released a new unified data management system that combines the best features from data lakes, data warehouses and streaming systems. The company made the announcement at its annual Spark Summit Europe conference. Databricks Delta takes the scale and cost-efficiency from a data lake; the reliability and performance from a data warehouse, and the … continue reading
Engineers have been shuddering at the words “how hard could it be?” for hundreds and hundreds of years. After all, for every great engineering triumph, there are a thousand small failures along the way. The same is true for mobile development, where you’ll often hear this variation of the same question: “How hard could it … continue reading
Microsoft is going deeper with Kubernetes with a new managed service. Azure Container Service (AKS) aims to simplify the deployment, management and operations of Kubernetes, the open-source system for container orchestration. “We have seen customers fall in love with our current Kubernetes support on Azure Container Service, currently known as ACS, which has grown 300% … continue reading
Skyhigh has unveiled three new technologies to enable IT to better protect cloud data. The first, Autonomous Remediation, alerts users immediately when they violate an IT policy and provides them with instructions to correct the issues. They found that when given instructions, users correct issues 97% of the time. Second, Cloud Email DLP scans email … continue reading
Google wants Gmail to be more than just a place where users receive and send emails. The company is announcing new tools that will allow users to do more from their inbox. The Google G Suite team is releasing Gmail add-ons, a new extensibility framework for developers, and ten ready to use enterprise integrations. Earlier … continue reading