Category Archives: Affiliate Article

Java in the Cloud: Continuous Integration Setup Tutorial

BY MATKO ŠUFLAJ – FREELANCE SOFTWARE ENGINEER @ TOPTAL Year after year, we bear witness to the increasingly rapid evolution of the IT industry. It has now been more than two decades since the groundbreaking slogan ”Write once, run anywhere“ set a whole new level of expectation for the software development community. And here we

A Data Engineer’s Guide To Non-Traditional Data Storages

BY KEN HU – DATA SCIENTIST @ TOPTAL (WhatMatrix Affiliate) Data Engineering With the rise of big data and data science, many engineering roles are being challenged and expanded. One new-age role is data engineering. Originally, the purpose of data engineering was the loading of external data sources and the designing of databases (designing and developing

Google Cloud Source Repositories vs. Bitbucket vs. GitHub: A Worthy Alternative?

Without much fanfare, Google introduced a new version control platform, hosted on its vast cloud. If this sounds somewhat familiar, you may be thinking of Google Code, which is now defunct. The big difference is that Google’s new Cloud Source Repositories is a git platform, which means it is a lot more flexible (and useful)

The Pleasure and Peril of IT Comparison Shopping

This article was originally published at virtualizationpractise.com (thanks to TVP Strategy & Alastair Cooke)Great insight, honest analysis, constructive criticism – so we decided to re-publish it Making decisions about IT infrastructure purchases is hard. There are many interlocked decisions to be made, each of which has multiple requirements. Often, a collection of compromises must occur. For the business project

10 Most Common Web Security Vulnerabilities

(This is a Technical Affiliate Article, bringing you additional in-depth technical content – enjoy!)For all too many companies, it’s not until after a breach has occurred that web security becomes a priority. During my years working as an IT Security professional, I have seen time and time again how obscure the world of IT Security