Software Developers

Pros Of Hiring An IT Support Company That Provides Top Cloud Computing And VOIP Services In Houston,.. Pros Of Hiring An IT Support Company That Provides Top Cloud Computing And VOIP Services In Houston,..

Hiring an IT support company that specializes in cloud computing and VOIP services can transform..
Temperature Converter — Unique Online Tools - Online Utility Website - Cool Free Converters Temperature Converter — Unique Online Tools - Online Utility Website - Cool Free Converters

Type a value in any of the fields to convert between temperature measurements. Easily convert..
The Security Concerns with Cloud Computing The Security Concerns with Cloud Computing

In this article, an expert delves into the various security concerns associated with cloud..
Ensuring Compliance with Regulations in Cloud Computing Ensuring Compliance with Regulations in Cloud Computing

Learn about the importance of compliance in cloud computing, challenges companies face, best..
Example Case: Using DevSecOps to Redefine Minimum Viable Product Example Case: Using DevSecOps to Redefine Minimum Viable Product

This SEI blog post, authored by SEI interns, describes their work on a microservices-based software ..
Applying Large Language Models to DoD Software Acquisition: An Initial Experiment Applying Large Language Models to DoD Software Acquisition: An Initial Experiment

This SEI Blog post illustrates examples of using LLMs for software acquisition in the context of a..
How To Add Chatbot To React Native How To Add Chatbot To React Native

Building a chatbot on a React Native app may have been a complicated affair in the past, but not so ..
How To Manage Vulnerabilities in Modern Cloud Native Applications How To Manage Vulnerabilities in Modern Cloud Native Applications

Vulnerability management is a proactive approach to identifying, managing, and mitigating..
Updating SwiftUI Views From Objective-C Using MVVM Updating SwiftUI Views From Objective-C Using MVVM

On the internet, in the Apple documentation, and on Medium, there is a ton of information about..
Getting Started With Web Components Using Stencil Getting Started With Web Components Using Stencil

Web components (or Custom Elements) are a set of standardized APIs that allow you to create..
Building Multiple Barcode, QR Code and Datamatrix Scanner With Flutter for Inventory Management Building Multiple Barcode, QR Code and Datamatrix Scanner With Flutter for Inventory Management

Barcode scanning is an essential tool for modern inventory management. It improves accuracy,..
What “The Rings of Power” Taught Me About a Career in Tech (Part 4) What “The Rings of Power” Taught Me About a Career in Tech (Part 4)

At last comes their answer through cold and through frost, That not all who wonder or wander are..
Deploying Prometheus and Grafana as Applications using ArgoCD — Including Dashboards Deploying Prometheus and Grafana as Applications using ArgoCD — Including Dashboards

If you're tired of managing your infrastructure manually, ArgoCD is the perfect tool to streamline..
Unlocking the Potential of IoT Applications With Real-Time Alerting Using Apache Kafka Data Streams .. Unlocking the Potential of IoT Applications With Real-Time Alerting Using Apache Kafka Data Streams ..

IoT devices have revolutionized the way businesses collect and utilize data. IoT devices generate..
Node.js vs Python: Which Suits Your Application? Node.js vs Python: Which Suits Your Application?

Would you like to know the best technology for your web application? Have a glance at Node.js and..
Secure APIs: Best Practices and Measures Secure APIs: Best Practices and Measures

An API (Application Programming Interface) acts as an intermediary between two distinct software..
The Top 10 Blog Posts of 2023 The Top 10 Blog Posts of 2023

Every January on the SEI Blog, we present the 10 most-visited posts of the previous year. This..
Socket Programming in Python: Client, Server, and Peer-to-Peer Libraries Socket Programming in Python: Client, Server, and Peer-to-Peer Libraries

In this tutorial, you'll learn how to exchange data between a client and a server using Python..
The SEI SBOM Framework: Informing Third-Party Software Management in Your Supply Chain The SEI SBOM Framework: Informing Third-Party Software Management in Your Supply Chain

This post presents a framework to promote the use of SBOMs and establish practices and processes..
Generative AI Q&A: Applications in Software Engineering Generative AI Q&A: Applications in Software Engineering

This post explores the transformative impacts of generative AI on software engineering as well as..
Explainability in Cybersecurity Data Science Explainability in Cybersecurity Data Science

This post provides an overview of explainability in machine learning and includes illustrations of..
Secure by Design at CERT Secure by Design at CERT

The national cybersecurity strategy calls on tech providers to ensure that all their products are..
Assuring Cyber-Physical Systems in an Age of Rising Autonomy Assuring Cyber-Physical Systems in an Age of Rising Autonomy

This post discusses research by the SEI and Georgia Tech to address a number of challenges related..
How to Monitor Apache Flink With OpenTelemetry How to Monitor Apache Flink With OpenTelemetry

Apache Flink monitoring support is now available in the open-source OpenTelemetry collector. You..
Configure Kubernetes Health Checks Configure Kubernetes Health Checks

Kubernetes is an open-source container orchestration platform that helps manage and deploy..
The Need for Quantum Software Architecture The Need for Quantum Software Architecture

This post explores concerns software architects are likely to have when integrating quantum..
How to Tackle Mobile CI/CD: A Hands-on Guide for Mobile App Developers How to Tackle Mobile CI/CD: A Hands-on Guide for Mobile App Developers

React Native is a popular framework for developing cross-platform mobile apps using JavaScript and..
A Repository of Common Penetration-Testing Weaknesses A Repository of Common Penetration-Testing Weaknesses

Penetration testing is an important step in identifying weaknesses in an organizations IT..
Places Of Interest In Houston Texas Places Of Interest In Houston Texas

Places of Interest In Houston Photo Courtesy of: Alfonso Perez Discovery Green Address: 1500..
How to Quickly Build an Audio Editor With UI How to Quickly Build an Audio Editor With UI

Audio is the soul of media, and for mobile apps in particular, it engages with users more, adds..
An Introduction to Data Mesh An Introduction to Data Mesh

As more and more teams have started to look for solutions that can help them unlock the full..
Security Analytics: Using SiLK and Mothra to Identify Data Exfiltration via the Domain Name Service Security Analytics: Using SiLK and Mothra to Identify Data Exfiltration via the Domain Name Service

This post explores how the DNS protocol can be abused to exfiltrate data by adding bytes of data..
RabbitMQ vs. Memphis.dev RabbitMQ vs. Memphis.dev

What Is RabbitMQ?RabbitMQ is a lightweight and easy-to-deploy messaging queue for on-premises and..
Designing Great Challenges for Cybersecurity Competitions Designing Great Challenges for Cybersecurity Competitions

This blog post highlights the SEIs experience developing cybersecurity challenges for the..
Dialogflow CX CLI: The Missing CLI To Interact With Your Agents Dialogflow CX CLI: The Missing CLI To Interact With Your Agents

Previous RequisitesHere are the technologies used in this projectGoogle Cloud AccountDialogflow API ..
How to Start a Party Rental Business How to Start a Party Rental Business

If you want to know how to start a party rental business, the experts at Event Rental Systems can..
Play it Again Sam! or How I Learned to Love Large Language Models Play it Again Sam! or How I Learned to Love Large Language Models

This post explores what new advancements in AI and large language models mean for software..
The Latest Work from the SEI: Zero Trust, DevSecOps, and Software Resilience The Latest Work from the SEI: Zero Trust, DevSecOps, and Software Resilience

This blog highlights recent SEI publications in the areas of zero trust, DevSecOps, and software..
Hackerman [Comic] Hackerman [Comic]

In this latest Daniel Stori comic, discover the latest new character in the programming world:..
Tackling Collaboration Challenges in the Development of ML-Enabled Systems Tackling Collaboration Challenges in the Development of ML-Enabled Systems

This SEI blog post highlights research examining the collaboration challenges inherent in the..