Articles for category: Software (Tech & Development)

Microsoft Ships First .NET 10 Preview — Visual Studio Magazine

News Microsoft Ships First .NET 10 Preview Microsoft shipped .NET 10 Preview 1, introducing a raft of improvements and fixes across performance, libraries, and the developer experience. The JIT compiler now optimizes array interface calls and enables stack allocation for small value type arrays, reducing heap usage. Enhanced cryptographic support includes improved certificate handling and direct PEM data reading. The new CompareOptions.NumericOrdering improves string comparisons, and ZipArchive sees performance and memory enhancements. ASP.NET Core adds OpenAPI 3.1 and YAML support, along with Blazor improvements like script asset handling and QuickGrid enhancements. EF Core 10 refines LINQ-to-SQL translation and introduces batch

Duckduckgo launches its version of an AI search assistant – Computerworld

After nearly two years of intensive beta testing, Duckduckgo has launched the live version of the AI assistant previously known as Duck Assist. Similar to Google’s AI Overviews, the AI Assistant can provide quick answers to users’ questions, such as why Pluto is no longer classified as a planet. If users want more information, they can ask follow-up questions via the built-in chatbot Duck.ai; users can choose between generative AI (genAI) models, including GPT-4o mini, o3-mini, Llama 3.3, Mistral Small 3 and Claude 3 Haiku. Both the AI assistant and the chatbot are free to use, and don’t require an

JFrog unveils JFrog ML for MLOps

JFrog has released JFrog ML, an MLOps solution designed to bring devops best practices to building, deploying, managing, and monitoring AI/ML workflows. The company said that by pairing practices for developing machine learning models with traditional devsecops processes, organizations can enable development teams, data scientists, and machine learning engineers to build enterprise-ready AI applications, while ensuring that models are seamlessly deployed, secured, and maintained. JFrog ML is the first addition to the JFrog platform resulting from the company’s QWAK.ai acquisition, announced in June 2024. Announced March 4, JFrog ML helps overcome challenges to the complexity of developing machine learning models

Learn fewer skills but go deeper

On this week’s episode of the podcast, I interview Caleb Curry. He’s a software engineer and prolific computer science educator. He recently started mentoring dozens of developers directly and helping them with their skills and careers. We talk about his experience getting laid off as a dev, and how we prepared for his mid-career job search. We talk about: How Caleb got laid off and went about landing his next developer job How most people sleep on networking and recruiters, but shouldn’t Why Caleb is so serious about teaching system design concepts How Caleb pairs his deep focus with broad

Floyd’s Cycle Algorithm for Fraud Detection in Java Systems

The Floyd Cycle Detection Algorithm (Tortoise and Hare algorithm) is an efficient cycle detection within iterative structures. In addition to linked lists, it is applicable to practical problems such as fraud detection and user workflows where data is duplicated or there are cyclic dependencies in workflows or financial transactions.  This article illustrates its practical implementation with a fraudulent detection system for banking transactions. Use Case: Detecting Fraud in Money Transfers A bank regularly monitors the money transfers among customer accounts. Fraud may involve cycles of money flowing through a number of accounts and returning back to the source (usually to

Taking think-time about the future of AI for development

I’m always looking for more time and space to get things done. For every useful unit of actual hands-on-keys work time I spend writing thought leadership pieces, or time on briefing and advisory calls with innovative vendors, there must be a corresponding amount of time away from the computer to realign my thinking and grasp the connections between technology categories and their value to end customers. As humans, we never expected to be as fully engaged as we are now, with per-worker productivity at an all time high, a pocket supercomputer that constantly nags us for attention wherever we go,

Mid/ Senior Full-Stack Engineer at yhangry

Yhangry is like Airbnb, but for finding a chef to cook for an event: Their birthday, a hen party or a family Christmas gathering. We’re changing the lives of chefs: Chefs earn 3x more than working in a restaurant, whilst working fewer hours. E.g. Chefs working 60 hours per week can maintain the same income by just doing 1-2 private dining events per week. We are backed by Y Combinator (just like Airbnb, Coinbase, and other unicorns) and featured on Dragons’ Den. Why this is a great time to join? 📈 We grew 8x in the past 2 years. 💰

Vulnerability-Free Java Containers: A Practical Guide

In today’s cloud native landscape, securing Java applications isn’t just about the code we write but the entire container stack. While Java has maintained a strong security record, incidents like Log4Shell have shown us that vigilance is crucial. We need a comprehensive approach to preventing vulnerabilities, from the Java JRE base container image to our Java application dependencies and the application code itself. Last year, I worked with a client who complained about vulnerabilities in their container base image for Node.js. That triggered me to do more research on base images, including Java. The State of Java Container Images I

Secure coding beyond just memory safety

Software security expert Tanya Janca, author of Alice and Bob Learn Secure Coding and Staff DevRel at AppSec company Semgrep, joins Ryan to talk about secure coding practices. Tanya unpacks the significance of input validation, the challenges of trusting data sources, and the intersection of security and law. Bonus: what she learned trying to secure a Canadian national election. Episode notes: Semgrep is an AppSec platform that lets devs deploy static application security testing (SAST), software composition analysis (SCA), and secret scans. Explore their docs. Tanya is the author of Alice and Bob Learn Secure Coding and Alice and Bob

Video: How to run dependency audits with GitHub Copilot

Every software project faces the inevitable challenge of dependency management. Over time, dependencies become outdated, leading to security vulnerabilities. Others go unused, needlessly bloating build times. For many development teams, addressing these issues means running manual scripts, reviewing output files, and hoping nothing falls through the cracks. I recently transformed this error-prone manual process into an automated solution using a few tools on GitHub—GitHub Copilot, GitHub Actions, and Dependabot, to be specific (just in case you’re wondering). Here’s how you can do the same! So, let’s jump in (and make sure to watch the video above, too!). The problem with