|
Snyk-Watcher: Keep Snyk in Sync
|
Twilio
|
365 |
- |
|
The Shifting Landscape of Business Text Messaging: The New A2P 10DLC
|
Twilio
|
929 |
- |
|
How to Add Email Notifications to Your Node.js SMS App
|
Twilio
|
2,449 |
- |
|
Vuln of the Month: CVE-2020-10148 SolarWinds Orion Authentication Bypass
|
Detectify
|
300 |
- |
|
Close the Loop with User Feedback
|
Sentry
|
427 |
- |
|
Close the Loop with User Feedback
|
Sentry
|
427 |
- |
|
Recap: Gene Kim’s Thoughts on DevOps in 2021
|
LaunchDarkly
|
1,192 |
- |
|
4 steps of the Vulnerability Remediation Process
|
Snyk
|
1,699 |
- |
|
Keep Calm and Track On: Why Heap's Script Won't Slow Down Your Site
|
Heap
|
570 |
- |
|
Six Security Considerations for Selecting an RTE PaaS Provider
|
Agora
|
1,111 |
- |
|
Fivetran Partners With Census to Close the Loop on Operational Analytics
|
Fivetran
|
594 |
- |
|
Black History Month Fivetranner Spotlight: Marnae Cooper
|
Fivetran
|
230 |
- |
|
InfluxDB Cloud is on Microsoft Azure Marketplace
|
InfluxData
|
1,597 |
- |
|
IDC Value Assessment Tool: How Much Value You Could Get With PagerDuty
|
PagerDuty
|
463 |
- |
|
Why Enterprise Audio Requirements are More “Nuanced” at Real-time Speeds
|
Deepgram
|
563 |
- |
|
Top 10+ Best Nudity Detection APIs & Alternatives (2021)
|
Rapid
|
1,771 |
- |
|
Explore and analyze your deployment costs within Elastic Cloud
|
Elastic
|
831 |
- |
|
An Intro to PromQL: Basic Concepts & Examples
|
Logz.io
|
1,699 |
- |
|
What is fault injection?
|
Gremlin
|
1,152 |
- |
|
Vue Composition API vs. React Hooks
|
LogRocket
|
1,691 |
- |
|
Using WebSocket subscriptions without queues
|
LogRocket
|
2,407 |
- |
|
RTK Query: The future of data fetching and caching for Redux
|
LogRocket
|
1,775 |
- |
|
What’s new in React Query 3
|
LogRocket
|
2,125 |
- |
|
Vercel & Next.js Experts Help Teams Build the Next Big Thing
|
Vercel
|
710 |
- |
|
Gatsby for the Green Internet
|
Gatsby
|
2,575 |
- |
|
Automated browser testing, explained in code
|
Sleuth
|
1,647 |
- |
|
Rails SQL Injection Guide: Examples and Prevention
|
StackHawk
|
1,412 |
- |
|
Breakpoint 2021 Speaker Spotlight: Rotem Mizrachi-Meidan, Wix
|
BrowserStack
|
653 |
- |
|
Aiven for PostgreSQL® 13 is now available
|
Aiven
|
957 |
- |
|
What is GraphQL? GraphQL introduction
|
Apollo
|
1,274 |
- |
|
How to “steal like a designer” and boost creativity
|
Intercom
|
1,782 |
9 |
|
Atom bank and Plaid join forces to lend SMEs a hand
|
Plaid
|
365 |
- |
|
Bubble App of the Day: Learning Circuits
|
Bubble
|
941 |
- |
|
The essential config settings you should use so you wonât drop logs in Loki
|
Grafana Labs
|
1,157 |
- |
|
Orbitvu chose FusionAuth for architectural flexibility, great support, and customizability
|
FusionAuth
|
1,410 |
- |
|
7 Tips to Evaluate and Choose the Right DevSecOps Solution
|
JFrog
|
1,016 |
- |
|
Python wheel-jacking in supply chain attacks
|
JFrog
|
1,645 |
- |
|
End-to-End Testing for Sauce Visual Solution Now Available
|
Sauce Labs
|
366 |
- |
|
Progressive Web Apps And The Future Of Mobile Web
|
TestMu AI
|
2,131 |
- |
|
Oracle CDC Source Premium Connector is Now Generally Available
|
Confluent
|
1,383 |
- |
|
Platform Updates and Software Release Notes – February 2021
|
Rescale
|
317 |
- |
|
Hands-on Migration From Relational to Collections
|
Couchbase
|
1,314 |
- |
|
Setting the right (regex) boundaries is important
|
Sonar
|
1,032 |
- |
|
Data Processing Support in Ray
|
Anyscale
|
1,178 |
2 |
|
Fivetran partnership: Completing the OA loop | Census
|
Census
|
304 |
- |
|
Syncing our Jira Tickets to our Designs
|
Codefresh
|
435 |
- |
|
GitHub Enterprise Server 3.0 is now generally available
|
GitHub
|
241 |
- |
|
Kubernetes monitoring with Prometheus, the ultimate guide
|
Sysdig
|
4,343 |
- |
|
What’s New at ScyllaDB University for February 2021
|
ScyllaDB
|
626 |
- |
|
A Bite-sized Guide to Content Modelling in Strapi
|
Strapi
|
2,565 |
- |
|
Experts on the top seven digital trends to watch
|
Contentful
|
740 |
- |
|
How to Build a Container Registry
|
Pulumi
|
1,201 |
- |
|
Complete Guide to Pentesting
|
Bugcrowd
|
1,952 |
- |
|
JWT Authentication and Securing Microservices Tutorial | Kong HQ
|
Kong
|
2,680 |
- |
|
Use automation to grow site traffic and transform your workflows
|
Zapier
|
1,601 |
- |
|
Creating social media content that sells
|
Zapier
|
1,603 |
- |
|
CircleCI vs Shippable configuration: comparing build elements
|
CircleCI
|
550 |
- |
|
Choosing the right (build) tool for the job
|
CircleCI
|
2,153 |
- |
|
How to Implement Effective DevOps Change Management
|
Coralogix
|
1,770 |
- |
|
The Coralogix Operator: A Tale of ZIO and Kubernetes
|
Coralogix
|
2,389 |
- |
|
5 Common Distractions that Risk Breaking up Your Product Focus
|
Coralogix
|
1,071 |
- |
|
Padding & Bounding Box in the Static Images API
|
Mapbox
|
637 |
- |
|
Build a ski trail map using OpenStreetMap and MTS
|
Mapbox
|
1,031 |
- |
|
Rsyslog log forwarding: Best practices and implementation with New Relic
|
New Relic
|
1,491 |
- |
|
Rsyslog log forwarding: Best practices and implementation with New Relic
|
New Relic
|
1,560 |
- |
|
Using Web Components in an Angular application: Joyful & Fun
|
Vonage
|
1,024 |
- |
|
Using approximate nearest neighbor search to find similar products
|
Vespa
|
3,197 |
- |