Category Archives: Affiliate Article

Distributed Systems for Cloud and Big Data – a Guide to Consistent Hashing

BY JUAN PABLO CARZOLIO – Freelance Software Engineer @ TOPTAL In recent years, with the advent of concepts such as cloud computing and big data, distributed systems have gained popularity and relevance. One such type of system, distributed caches that power many high-traffic dynamic websites and web applications, typically consist of a particular case of

Java in the Cloud: Continuous Integration Setup Tutorial

BY MATKO ŠUFLAJ – FREELANCE SOFTWARE ENGINEER @ TOPTAL Year after year, we bear witness to the increasingly rapid evolution of the IT industry. It has now been more than two decades since the groundbreaking slogan ”Write once, run anywhere“ set a whole new level of expectation for the software development community. And here we

A Data Engineer’s Guide To Non-Traditional Data Storages

BY KEN HU – DATA SCIENTIST @ TOPTAL (WhatMatrix Affiliate) Data Engineering With the rise of big data and data science, many engineering roles are being challenged and expanded. One new-age role is data engineering. Originally, the purpose of data engineering was the loading of external data sources and the designing of databases (designing and developing

Google Cloud Source Repositories vs. Bitbucket vs. GitHub: A Worthy Alternative?

Without much fanfare, Google introduced a new version control platform, hosted on its vast cloud. If this sounds somewhat familiar, you may be thinking of Google Code, which is now defunct. The big difference is that Google’s new Cloud Source Repositories is a git platform, which means it is a lot more flexible (and useful)

The Pleasure and Peril of IT Comparison Shopping

This article was originally published at virtualizationpractise.com (thanks to TVP Strategy & Alastair Cooke)Great insight, honest analysis, constructive criticism – so we decided to re-publish it Making decisions about IT infrastructure purchases is hard. There are many interlocked decisions to be made, each of which has multiple requirements. Often, a collection of compromises must occur. For the business project

10 Most Common Web Security Vulnerabilities

(This is a Technical Affiliate Article, bringing you additional in-depth technical content – enjoy!)For all too many companies, it’s not until after a breach has occurred that web security becomes a priority. During my years working as an IT Security professional, I have seen time and time again how obscure the world of IT Security

Members Registration X

Registered, but not activated? click here (resend activation link)

By signing up your agree to our Terms of services
Receive new comparison alerts