Remote pair programming? Oh yes, you can

When the entire company is working from home, pair programming is not only possible but even more valuable. If you were practicing it face to face, why not continue remote? If you weren’t, why not try? My team did a series of remote pair programming sessions in during the last month or so, and I want to share a few tips from that experience. If you’ve never tried pair programming before, here’s a good primer.


Community Highlight: How Supralog Built an Online Incremental Machine Learning Pipeline with InfluxDB OSS for Capacity Planning

This article was written by Gregory Scafarto, Data Scientist intern at Supralog, in collaboration with InfluxData’s DevRel Anais Dotis-Georgiou. At InfluxData, we pride ourselves on our awesome InfluxDB Community. We’re grateful for all of your contributions and feedback. Whether it’s Telegraf plugins, community templates, awesome InfluxDB projects, or Third Party Flux Packages, your contributions continue to both impress and humble us.


DRY (Don't Repeat Yourself) on the cloud with Pulumi

Any enterprise working on the cloud is likely to use Infrastructure as Code as it simplifies the deployment process and makes iterative serverless applications easier to manage. There are several open source tools out there that work with most cloud providers, each of them with their own implementation processes. In this article we are going to dive into the workings of one particular tool, Pulumi.


Ways to improve conversion through website Funnel Monitoring

The Journey from Visitors to Customers Funnels are foundational-level building blocks of all digital businesses. Funnels are the path taken by visitors to a website, to become a customer. Visitors flow through a website in large numbers, but all of that traffic funnels down to just a trickle of signups, sales, or conversion. Marketing Funnel monitoring and analysis can help spot where users are leaving your website so that you can take necessary action to increase conversions.


Vulnerability management explained

Every year, thousands of new vulnerabilities are discovered, requiring organizations to patch operating systems (OS) and applications and reconfigure security settings throughout the entirety of their network environment. To proactively address vulnerabilities before they are utilized for a cyberattack, organizations serious about the security of their environment perform vulnerability management to provide the highest levels of security posture possible.


3 Steps to better cybersecurity in touchless business solutions (Part 2 of 3)

This blog was written by an independent guest blogger. Image Source In Part 1 of this series, we covered the first step to better cybersecurity in touchless business solutions, which is to practice extra caution in cashless payment solutions. We continue by discussing the second step to improve cybersecurity for touchless systems, which is to increase protocols for cybersecurity and data privacy.


High-Performing WooCommerce Hosting for E-Commerce Projects

Online shopping has got the world and became a stable, profitable, and customizable replacement for conventional stores we are used to. You are about to start making money on your site, but you have no idea how to open an online store? In this guide, we will show you how to turn a regular WordPress site into an eCommerce store using a proven WooCommerce tool.


Challenges of Going Serverless (2020 edition)

While we know the many benefits of going serverless - reduced costs via pay-per-use pricing models, less operational burden/overhead, instant scalability, increased automation - the challenges are often not addressed as comprehensively. The understandable concerns over migrating can stop any architectural decisions and actions being made for fear of getting it wrong and not having the right resources.


macOS vs. Windows - What kernels tell you about security events: Part 1

How would you compare the Windows and macOS operating systems? In what ways are they similar? Why do they each take different approaches to solving the same problem? For the last 19 years I've developed security software for Windows. Recently, I’ve started implementing similar features on macOS. Since then, people have asked me questions like this. The more experience I gained on these two operating systems, the more I realized they’re very different.


Building New Teams While Working Remotely

2020 has been a year of challenges, and across all industries, companies are working hard and fast to remain efficient in the face of a new normal. Now that hiring freezes are slowly thawing out, many companies are starting to hire new people virtually and want to create remote cohesion between new and existing teammates. The lack of physical proximity means your team will need to ramp up on communication, transparency, and accountability.