#programming
A fresh #report on developer ecosystem has been published from #JetBrains
https://www.jetbrains.com/lp/devecosystem-2019/
A fresh #report on developer ecosystem has been published from #JetBrains
https://www.jetbrains.com/lp/devecosystem-2019/
JetBrains
The state of Developer Ecosystem in 2019 Infographic
Almost 7,000 developers share their insights on modern technologies, programming languages, frameworks, and tools of choice for software development.
#security #email
Almost cyberpunk crime 😍
https://research.checkpoint.com/2019/incident-response-casefile-a-successful-bec-leveraging-lookalike-domains/
Almost cyberpunk crime 😍
https://research.checkpoint.com/2019/incident-response-casefile-a-successful-bec-leveraging-lookalike-domains/
Check Point Research
Incident Response Casefile – A successful BEC leveraging lookalike domains - Check Point Research
By Matan Ben David, Incident response Analyst Imagine that you’re the owner of a startup and waiting for a million-dollar seed round of funding, only it never shows up in your bank account. Or imagine you’re the head of a venture capital firm who believes…
#security #Microsoft #password
https://www.zdnet.com/article/44-million-microsoft-users-reused-passwords-in-the-first-three-months-of-2019/
https://www.zdnet.com/article/44-million-microsoft-users-reused-passwords-in-the-first-three-months-of-2019/
ZDNet
44 million Microsoft users reused passwords in the first three months of 2019
Microsoft used a database of three billion publicly leaked credentials to identify users who reused passwords.
#quote #cloud
Starting today, I’m rebranding myself. I’m not a “remote employee”. I’m a “cloud native employee”.
I expect this will help with career growth and advancement.
https://twitter.com/billwagner/status/1201883110889185281
Starting today, I’m rebranding myself. I’m not a “remote employee”. I’m a “cloud native employee”.
I expect this will help with career growth and advancement.
https://twitter.com/billwagner/status/1201883110889185281
#security #hack #camera #Ring
https://www.vice.com/en_us/article/3a88k5/how-hackers-are-breaking-into-ring-cameras
https://www.vice.com/en_us/article/3a88k5/how-hackers-are-breaking-into-ring-cameras
Vice
How Hackers Are Breaking Into Ring Cameras
After a hacker broke into a Ring camera in Tennessee and spoke to a child, Motherboard found hackers have made dedicated software for gaining access.
#cloud
#AWS Lambda vs. #Azure Functions:
https://iamondemand.com/blog/aws-lambda-vs-azure-functions-ten-major-differences/
#AWS Lambda vs. #Azure Functions:
https://iamondemand.com/blog/aws-lambda-vs-azure-functions-ten-major-differences/
IOD - The Content Engineers
AWS Lambda vs. Azure Functions: 10 Major Differences - IOD - The Content Engineers
Forget about managing virtual machines or paying for idle hardware! Serverless compute brings unlimited scale and high availability to every company in the world, from small startups to multinational corporations. At least, that’s the vision of Amazon and…