The U.S. Cybersecurity and Infrastructure Security Agency (CISA), an operational and support component of the Department of Homeland Security, defines 16 critical infrastructure sectors “whose assets, systems, and…

Successful Scrum implementations involve a handful of important sprint events (also called sprint meetings or sprint ceremonies. This includes meetings such as sprint planning, sprint review, daily scrum,…

Ganesh Datta, CTO and cofounder of Cortex, joins SE Radio’s Priyanka Raghavan to discuss site reliability engineering (SRE) vs DevOps. They examine the similarities and differences and how…

Richard L. Sites discusses his new book Understanding Software Dynamics, which offers expert methods and advanced tools for understanding complex, time-constrained software dynamics in order to improve reliability…

Streaming data platforms like Kafka, Pulsar, and Kinesis are now common in mainstream enterprise architectures, providing low-latency real-time messaging for analytics and applications. However, stream processing – the…

The Kubernetes ecosystem has drastically changed how development teams ship software. While Kubernetes has provided many advancements in cloud infrastructure, it has also left organizations with massive security…

In software engineering, telemetry is the data that is collected about your applications. Unlike logging, which is used in the development of apps to pinpoint errors and code…

When I was brought in as a product manager by an early-stage payment processing company, the business was struggling to create and deliver an inventory management system in…

Cloud native applications utilizing microservice architectures has grown into one of the most popular application architectural patterns in recent years. The value of leveraging dynamic cloud resources, along…

Passwordless Authentication is a technique in which users are given access to an environment without entering a password or answering a security question. This allows users to access…