News
QCon London 2026: Shielding the Core: Architecting Resilience with Multi-Layer Defenses
17+ hour, 50+ min ago (861+ words) The panelists discuss the dramatic escalation of software supply chain threats, from typosquatting to AI-generated vulnerabilities. They explain how to move beyond basic scanning by adopting a zero trust mindset toward CI/CD pipelines and external dependencies. Anurag Kale discusses…...
QCon London 2026: Tools That Enable the Next 1B Developers
4+ hour, 58+ min ago (381+ words) Live Webinar and Q&A: AI Agent Swarm Patterns (March 26, 2026) Save Your Seat The panelists discuss the dramatic escalation of software supply chain threats, from typosquatting to AI-generated vulnerabilities. They explain how to move beyond basic scanning by adopting a zero…...
Uber Launches IngestionNext: Streaming-First Data Lake Cuts Latency and Compute by 25%
6+ hour, 14+ min ago (598+ words) Live Webinar and Q&A: AI Agent Swarm Patterns (March 26, 2026) Save Your Seat The panelists discuss the dramatic escalation of software supply chain threats, from typosquatting to AI-generated vulnerabilities. They explain how to move beyond basic scanning by adopting a zero…...
[Video Podcast] Agentic Systems Without Chaos: Early Operating Models for Autonomous Agents
9+ hour, 20+ min ago (1306+ words) The panelists discuss the dramatic escalation of software supply chain threats, from typosquatting to AI-generated vulnerabilities. They explain how to move beyond basic scanning by adopting a zero trust mindset toward CI/CD pipelines and external dependencies. Anurag Kale discusses…...
Panel: Security Against Modern Threats
11+ hour, 16+ min ago (994+ words) Live Webinar and Q&A: AI Agent Swarm Patterns (March 26, 2026) Save Your Seat Digital sovereignty is about maintaining control of critical systems by limiting reliance on any single vendor. Open standards and portable architectures reduce lock'in and keep migration options open,…...
.NET 11 Preview 2 Updates MAUI with Performance Improvements and Platform Refinements
11+ hour, 20+ min ago (677+ words) Live Webinar and Q&A: Portable by Design: Data Mobility & Recovery Patterns for Multi-Cloud Systems (May 21, 2026) Save Your Seat The panelists discuss the dramatic escalation of software supply chain threats, from typosquatting to AI-generated vulnerabilities. They explain how to move beyond…...
AI Coding Assistants Haven’t Sped up Delivery Because Coding Was Never the Bottleneck
1+ day, 8+ hour ago (651+ words) This article explores that question through the lens of a real-world Rust project: a system responsible for controlling fleets of autonomous mobile robots. While Rust's memory safety is a strong foundation, its true power lies in the type system and…...
Revenium Unveils Tool Registry to Expose the True Cost of AI Agents
1+ day, 8+ hour ago (332+ words) Live Webinar and Q&A: AI Agent Swarm Patterns (March 26, 2026) Save Your Seat This article explores that question through the lens of a real-world Rust project: a system responsible for controlling fleets of autonomous mobile robots. While Rust's memory safety is…...
QCon London 2026: Ethical AI Is an Engineering Problem
1+ day, 9+ hour ago (510+ words) This article explores that question through the lens of a real-world Rust project: a system responsible for controlling fleets of autonomous mobile robots. While Rust's memory safety is a strong foundation, its true power lies in the type system and…...
From Friction to Flow: How Great DevEx Makes Everything Awesome
1+ day, 10+ hour ago (511+ words) This article explores that question through the lens of a real-world Rust project: a system responsible for controlling fleets of autonomous mobile robots. While Rust's memory safety is a strong foundation, its true power lies in the type system and…...