|
#OwlAboutMe: Emily Miller, Senior Impact Fund Manager
|
Twilio
|
715 |
- |
|
Celebrating Asian American and Pacific Islander Heritage Month
|
Snyk
|
1,141 |
- |
|
Monitor PlanetScale with Datadog
|
Datadog
|
577 |
- |
|
We rebuilt Cloudflare's developer documentation - here's what we learned
|
Cloudflare
|
2,240 |
5 |
|
Create a neumorphic progress bar in React
|
LogRocket
|
1,770 |
- |
|
Deploy Ethereum smart contracts on the Cosmos ecosystem
|
LogRocket
|
1,196 |
- |
|
Configuring Vim for Rust development
|
LogRocket
|
2,168 |
- |
|
Comparing logging and tracing in Rust
|
LogRocket
|
1,413 |
- |
|
[Infographic] The Life of a Machine Learning Practitioner
|
Comet
|
167 |
- |
|
Guide to Security in Kotlin
|
StackHawk
|
1,875 |
- |
|
Unleash 4.12 Release Notes
|
Unleash
|
243 |
- |
|
4 Reasons MSPs Should Monitor Their GitHub Footprint
|
GitGuardian
|
1,117 |
- |
|
How this CIO leveraged no-code to build internal apps
|
Bubble
|
1,097 |
- |
|
Talend Introduces Couchbase Capella Support on Talend Big Data Platform 8.0
|
Couchbase
|
1,372 |
- |
|
Talend Introduces Couchbase Capella Support on Talend Big Data Platform 8.0
|
Couchbase
|
1,372 |
- |
|
Graph Algorithms for Cybersecurity: A Picture Is Worth 1,000 Rows
|
Neo4j
|
2,779 |
- |
|
AIOps automates DevSecOps workflows to enable self-healing IT
|
Dynatrace
|
1,353 |
- |
|
OWASP API security – 9: Improper assets management
|
Tyk
|
842 |
- |
|
OWASP API security – 10: Insufficient logging & monitoring
|
Tyk
|
939 |
- |
|
OWASP API security – Intro
|
Tyk
|
869 |
- |
|
OWASP API security – 7: Security misconfiguration
|
Tyk
|
814 |
- |
|
OWASP API security – 1: Broken object level authorization
|
Tyk
|
1,405 |
- |
|
OWASP API security – 3: Excessive data exposure
|
Tyk
|
781 |
- |
|
OWASP API security – 2: Broken user authentication
|
Tyk
|
1,321 |
- |
|
OWASP API security – 8: Injection
|
Tyk
|
679 |
- |
|
OWASP API security – 4: Lack of resources & rate limiting
|
Tyk
|
1,392 |
- |
|
OWASP API security – 5: Broken function level authorization
|
Tyk
|
886 |
- |
|
OWASP API security – 6: Mass assignment
|
Tyk
|
724 |
- |
|
OWASP API security – 4: Lack of resources & rate limiting
|
Tyk
|
1,396 |
- |
|
How to build a better finance app: advice from a Principal Engineer at NatWest bank
|
Bitrise
|
1,267 |
- |
|
Learn Solidity, Full Stack Web3, Javascript, and Blockchain Development
|
Chainlink
|
1,589 |
- |
|
The Buzzwordless Three Tenets of the Jamstack
|
Sanity
|
1,356 |
- |
|
Give Pinia a Try: Build a Confetti Clicker Game with Us
|
Prismic
|
4,317 |
- |
|
Constraining CLIPDraw
|
Replicate
|
1,985 |
- |
|
Updates on Plan Changes
|
Railway
|
1,389 |
- |
|
CPQ Software: Our Guide to Configure, Price, and Quote
|
Lago
|
1,156 |
- |
|
Database Consistency Explained
|
Redis
|
1,267 |
- |
|
🔭 What is NER And Why It’s Hard to Get Right
|
Galileo
|
944 |
- |
|
The hidden cost of pursuing a higher salary
|
Pybites
|
124 |
- |