Glen Knight

NYC Based IT Professional

What Is User Acceptance Testing and Why Is it so Important?

Anyone involved in software development knows how important it is to ensure a positive end-user experience. One way to do that is through the use of user acceptance testing (UAT).  UAT is one of the types of testing that you can execute as part of your overall quality assurance process.  Source It’s essential in helping […]

0 Comments

Read More

Bugs and Features

The post Bugs and Features appeared first on DevOps.com. Source: DevOps.com

0 Comments

Read More

TechStrong Con: Open Source Software Community Needs Security Help

The only way to make significant improvements in the state of open source security is if more organizations that benefit from open source projects commit to making more resources available to achieve that goal. At the virtual TechStong Con event, executives on an Open Source and DevOps panel called for more contributions from enterprise IT […]

0 Comments

Read More

Developer’s Guide to Web Application Security

When it comes to security, there are many vulnerabilities that can leave your website or web app open to attack. In this article, we’ll go over 15 common web application security vulnerabilities and how you can prevent them. 1. Insufficient Cryptography Cryptography is a critical security measure that is used to protect data in transit […]

0 Comments

Read More

Cloudflare Outage Outrage | Yet More FAA 5G Stupidity

In this week’s The Long View: Cloudflare suffers another huge outage while the FAA and FCC still disagree over 5G/NR near airports. The post Cloudflare Outage Outrage | Yet More FAA 5G Stupidity appeared first on DevOps.com. Source: DevOps.com

0 Comments

Read More

New – Amazon SageMaker Ground Truth Now Supports Synthetic Data Generation

Today, I am happy to announce that you can now use Amazon SageMaker Ground Truth to generate labeled synthetic image data. Building machine learning (ML) models is an iterative process that, at a high level, starts with data collection and preparation, followed by model training and model deployment. And especially the first step, collecting large, […]

0 Comments

Read More

Now in Preview – Amazon CodeWhisperer- ML-Powered Coding Companion

As I was getting ready to write this post I spent some time thinking about some of the coding tools that I have used over the course of my career. This includes the line-oriented editor that was an intrinsic part of the BASIC interpreter that I used in junior high school, the IBM keypunch that […]

0 Comments

Read More

ShiftLeft Report Reveals State of Application Security

A report published today by automated application security testing platform ShiftLeft found only one in three applications has an attackable vulnerability. The report also found organizations that prioritized their remediation efforts based on the level of actual threat are fixing 76% of those vulnerabilities within two sprints lasting 12 days, on average. Based on millions […]

0 Comments

Read More

Survey Sees Alternative Cloud Service Providers Gaining Ground

A survey of 458 development professionals, managers and senior leaders conducted by Techstrong Research, a sister entity of DevOps.com, found 43% are considering adding additional cloud service providers in the next 12 months. In total, nearly two-thirds said they are at least considering, evaluating or are ready to buy from a trusted alternative cloud vendor, […]

0 Comments

Read More

What the New OWASP Top 10 Changes Mean to Devs

The open web application security project (OWASP) recently updated its top 10 list of the most critical security risks to web applications after four years. It represents the most radical shake-up since the list was introduced in 2003. The changes will undoubtedly have a big impact on how businesses address application security going forward and […]

0 Comments

Read More