In this tutorial we are going to see about, how to configure Log4j in web application. - See... more »
Why we should use Character Array for storing sensitive information(like passwords ) instead... more »
Make sure you didn't miss anything with this list of the Best of the Week in the DevOps Zone... more »
Working on IAM you might have heard of the "Open Identity Stack": here's some Open Source alternatives.
Red Hat, the world's open source leader, is a billion dollar company, but it began in a sewing... more »
Part of the CIO-CMO problem is the siloes departments tend to work within. Recommended are not... more »