Category Archives: Affiliate Article

Java in the Cloud: Continuous Integration Setup Tutorial

aa

BY MATKO ŠUFLAJ – FREELANCE SOFTWARE ENGINEER @ TOPTAL Year after year, we bear witness to the increasingly rapid evolution of the IT industry. It has now been more than two decades since the groundbreaking slogan ”Write once, run anywhere“ set a whole new level of expectation for the software development community. And here we are today, with a resulting, ever-expanding set of tools that have collectively taken Java development in particular, and software development

A Data Engineer’s Guide To Non-Traditional Data Storages

BY KEN HU – DATA SCIENTIST @ TOPTAL (WhatMatrix Affiliate) Data Engineering With the rise of big data and data science, many engineering roles are being challenged and expanded. One new-age role is data engineering. Originally, the purpose of data engineering was the loading of external data sources and the designing of databases (designing and developing pipelines to collect, manipulate, store, and analyze data). It has since grown to support the volume and complexity of big

Google Cloud Source Repositories vs. Bitbucket vs. GitHub: A Worthy Alternative?

toptal-blog-image-1436775458120-71c0e3f9eebf62704e12f7a3bdb4b6bc

Without much fanfare, Google introduced a new version control platform, hosted on its vast cloud. If this sounds somewhat familiar, you may be thinking of Google Code, which is now defunct. The big difference is that Google’s new Cloud Source Repositories is a git platform, which means it is a lot more flexible (and useful) than Google Code. Google Code was launched back in 2006, a couple of years before GitHub and Bitbucket appeared on

The Pleasure and Peril of IT Comparison Shopping

Good Better Best Choices

This article was originally published at virtualizationpractise.com (thanks to TVP Strategy & Alastair Cooke)Great insight, honest analysis, constructive criticism – so we decided to re-publish it Making decisions about IT infrastructure purchases is hard. There are many interlocked decisions to be made, each of which has multiple requirements. Often, a collection of compromises must occur. For the business project owner with little IT knowledge, it may seem far too complicated. It would be great to have tools that simplify these decisions

10 Most Common Web Security Vulnerabilities

toptal-blog-image-1401310620338

(This is a Technical Affiliate Article, bringing you additional in-depth technical content – enjoy!)For all too many companies, it’s not until after a breach has occurred that web security becomes a priority. During my years working as an IT Security professional, I have seen time and time again how obscure the world of IT Security is to so many of my fellow programmers. An effective approach to IT security must, by definition, be proactive and