Recent Articles

Using API-First Development and API Mocking to Break Critical Path Dependencies

Teams are using API mocking to break critical path dependencies and enable what were serial executio...
Wojciech Bulaty
3 weeks ago

Building confidence in a decision

Netflix Technology Blog
3 weeks ago

Career stories: Welcoming LinkedIn’s largest engineering class

As we welcome our largest class of experienced engineers to date, we sat down with LinkedIn’s head o...
LinkedIn
3 weeks ago

Reducing Cloud Infrastructure Complexity

Cloud computing adoption has taken the world by storm, and is accelerating unabated. According to F...
Nati Shalom
3 weeks ago

Overriding Sealed Methods in C#

In this article, the author demonstrates how we can change the behavior of sealed methods in C#. Th...
Adam Furmanek
3 weeks ago

Thriving in the Complexity of Software Development Using Open Sociotechnical Systems Design

The amazing progress made in technology has led to blindly following the technical imperative at the...
Trond Hjorteland
3 weeks ago

The Renaissance of Code Documentation: Introducing Code Walkthrough

The Continuous Documentation methodology is a useful paradigm that helps ensure that high-quality do...
Omer Rosenbaum, Tom Ahi Dror
4 weeks ago

Bringing AV1 Streaming to Netflix Members’ TVs

by, …
Netflix Technology Blog
4 weeks ago

5 Things To Remember When Upgrading Your Legacy Solution

Legacy software is still employed, even though it frequently fails to meet critical demands and core...
Vlad Vahromovs
4 weeks ago

Career stories: A cross-country, family move

After years of hopping between coasts, Charles found a home for his family and his ambitions in Sili...
LinkedIn
4 weeks ago

Etsy’s Journey to TypeScript

Over the past few years, Etsy’s Web Platform team has spent a lot of time bringing our frontend code...
Salem Hilal
1 month ago

Failing Fast: The Impact of Bias When Speeding Up Application Security

This article deals with three biases people can have with establishing application security while tr...
Laura Bell
1 month ago

How to Reduce Burnout in IT Security Teams

Burnout isn't a selfcare problem. The information security industry needs to take a deeper examinati...
Chloé Messdaghi
1 month ago

My Journey to Airbnb — Elizabeth Ponce

Forging a path to a technical role at Airbnb
AirbnbEng
1 month ago

Mobius: Adopting JSX While Prioritizing User Experience

Keeping up with the latest developments in frontend architecture can be challenging, especially with...
Allie Jones
1 month ago

Are Canary Releases an Alternative to Testers?

Canary releases enable product owners to check how a new feature is getting adopted by users by roll...
Vaishali Desarda
1 month ago

Building in the cloud with remote development

Co-authors: Shivani Pai Kasturi and Swati Gambhir Imagine developing on your laptop, but with the co...
Shivani Pai Kasturi
1 month ago

#IamaGDE: Katerina Skroumpelou (Athens, Greece)

Google Developers
1 month ago

How to Harden Applications Against IIoT Security Threats

This article will explore two sides of the IIoT security equation: understanding how and why IIoT sy...
Martin Giess
1 month ago

Applying Software Delivery Metrics and Analytics to Recover a Problem Project

Problem software delivery projects can be recovered mid-flight if Value Stream Management (VSM) anal...
Charlie Ponsonby
1 month ago

Netflix Video Quality at Scale with Cosmos Microservices

Netflix Technology Blog
1 month ago

Anomaly Detection Using ML.NET

In this article, the author introduces the concepts of Anomaly Detection using the Randomized PCA me...
Robert Krzaczyński
1 month ago