What to consider if you use SignalR and want to scale your .Net application?
Disclaimer: I do not claim to be a discovery in this article, but only want to help avoid mistakes when creating applications. We all love the “magic” that a tool like SignalR gives us and are happy to implement it in our projects. Of course,…
Best Practices to Create a Website in Azure
In today’s digital age, having an online presence is crucial for businesses and individuals alike. Choosing the right platform for creating your website is a decision that significantly impacts its success. In this article, we’ll explore the best practices to create a website in Azure,…
Apple and Google are required to allow the installation of applications from third-party sites in the EU: what does this mean for the user
The other day, many technology media literally thundered the news – the European Union adopted two new laws that regulate the activities of large technology companies. The news says that these two laws will have far-reaching consequences for large corporations such as Apple and Google. In particular, they…
Protection against hacker attacks on deep learning models
Like anything else in computing, deep learning models can be hacked. The IBM team has identified threats and developed techniques to protect AI models called deep generative models (DGMs). DGM models are an emerging AI technology that can synthesize data from complex, high-dimensional arrays, be…
CRM: systematization or automation?
Did you write cheat sheets at school? Surely yes. Probably, they noticed that some spurs were a monolithic rewriting of a textbook, while others were real clues: I opened it, grabbed the diagrams, lists, paragraphs with my eye, and quickly removed it because the information…
Why is IT outsourcing profitable and what are its advantages
Guys, has anyone thought about how who chooses a contractor company or a person for a team to perform certain works with their it-infrastructure? So you have your own product, project, or maybe you work in some large company, but one way or another, if…
Research: over 2 million Microsoft web servers are running vulnerable versions of IIS
CyberNews researchers said they have identified over 2 million web servers running on outdated, out-of-service and vulnerable Microsoft Internet Information Services (IIS). Since outdated versions of IIS are no longer supported by Microsoft, the researchers said they could easily compromise them, inject all sorts of…
Update Tuesday: Microsoft has released August security updates
Microsoft released planned security updates covering 44 vulnerabilities (51 vulnerabilities, including closed vulnerabilities in Microsoft Edge browser), 7 of which were classified as critical, 3 were of the zero-day (0-day) vulnerability, and 1 vulnerability was exploited in real attacks. In this article, I will cover…
How Serverless Computing (Function-as-a-Service) works and where it is used
Serverless computing and the Function-as-a-Service solutions that work on their basis help developers develop products with a focus on business features. We experimented with these technologies and came to the conclusion that the existing solutions are damp for combat use. Let’s go in order. The…
Stable instability – an oxymoron or a necessity?
Industrialization is raging in the IT field. There is nothing wrong with that, and even sometimes it is justified. Division of labor, planning, etc. The problem is that the industrial era has provoked the emergence of a large number of narrow specialists in IT who…
Service
Categories
- DEVELOPMENT (100)
- DEVOPS (53)
- FRAMEWORKS (24)
- IT (23)
- QA (14)
- SECURITY (13)
- SOFTWARE (13)
- UI/UX (6)
- Uncategorized (8)