Login to your Account
Create Affiliate Account
Trouble Signing In?
Enter your email below to request a Reset Password Link
-
Anaconda + Potsdam Institute for Climate Impact Research (PIK)
The Potsdam Institute for Climate Impact Research (PIK), a leading global change research institute, relies on Anaconda to empower its scientists in stewarding a brighter future. With over 100 Anaconda users across diverse scientific disciplines, PIK leverages Anaconda within its high-performance computing (HPC) cluster, ranked among the world's fastest supercomputers. Anaconda grants PIK scientists unprecedented freedom in software choices, versions, and environments, accelerating their model runs and ensuring scientific reproducibility. Ciaron Linstead, HPC Software Support Engineer at PIK, highlights how Anaconda allows system administrators to focus on performance optimization rather than building modules from scratch. Furthermore, practitioners across Python, C, C++, Fortran, and R benefit from Anaconda's fast and flexible package management, enabling quick environment creation, seamless sharing, and efficient utilization of cutting-edge tools like PyTorch for machine learning models. Anaconda is not just a tool; it's a vital enabler for PIK's critical work in climate impact and sustainable development.
-
API Security Testing: What it is, Why it Matters
APIs power modern applications but also expose critical vulnerabilities that attackers often exploit. This article explores why API security testing is essential, how breaches like MOVEit happened, and what organizations can do to protect their APIs. It also highlights the differences between REST, SOAP, and GraphQL security, and how tools like OX Security help ensure complete visibility and protection across the API landscape.
-
ASPM is for Everyone
ASPM isn't just for security teams anymore! Discover why developers are the new frontline in AppSec and how Checkmarx is bringing powerful Application Security Posture Management (ASPM) directly into their IDEs, unifying insights and focusing on exploitable risks for friction-free, AI-powered security.
-
Atlas is out to make database schema management declarative and compliant
Explore Atlas with Rotem Tamir, CTO at Ariga: a modern, declarative tool revolutionizing database schema management for developers and platform engineers.
-
Automatic Rollbacks are a Last Resort
Automatic rollbacks might sound like a safe fallback for failed deployments, but modern software delivery tells a different story. This article explores why human-driven resilience, Continuous Delivery, and progressive delivery strategies are far more effective. Learn how deploying in small batches, using canary or blue/green strategies, and leveraging feature flags can help you respond smarter—and faster—when things go wrong.
-
Automating Cloud Network Infrastructure with Kubernetes CNI Plugins
How to manage cloud network infrastructures with Kubernetes CNI plugins
-
Autosoft eliminated manual deployments with Octopus
Autosoft was using TeamCity to deploy to its QA environments by uploading the build artifacts to the proper locations.
-
Aviatrix and the surprising upside of better cloud firewalls
Scott Leatherman of Aviatrix discusses securing cloud-native environments, modern Kubernetes firewalls, reducing IP exhaustion, and how better security enables application modernization.
-
Aviatrix Kubernetes Firewall: Evolving Security for Cloud-Native Environment
Learn how Aviatrix identifies Kubernetes as a central element in ensuring cloud-native security.
-
AWS Unveils New Tools to Power the Next Generation of AI Agents at AWS Summit New York 2025
At AWS Summit New York 2025, AWS announces Bedrock AgentCore, a new AI agent marketplace, and a $100M boost to accelerate enterprise AI adoption.
-
AWS VPN: Types, Benefits, and Troubleshooting Tips
Unlock seamless, secure cloud connectivity! Explore AWS VPN types (Site-to-Site, Client VPN), their benefits, and essential setup tips. Learn how to troubleshoot common issues and discover how tools like Netmaker offer robust alternatives for building scalable, resilient networks.
-
BERT Ransomware Shuts Down ESXi Virtual Machines to Block Recovery
BERT ransomware shuts down VMware ESXi virtual machines before encryption, blocking recovery efforts and targeting hybrid IT environments across continents.