162: Innovation in Legacy with Dave Thomas
There are three groups of people around every legacy system - those who are stuck with it, those who don't want to be with it, and those who love it and see its value.
There are three groups of people around every legacy system - those who are stuck with it, those who don't want to be with it, and those who love it and see its value.
One of the reasons why it is difficult to work with legacy code is the lack of preserving the contextual reasons for past coding choices.
Mending code while it is running is risky. One wrong move and a small change can bring the entire system to a halt.
AI proves to be great at writing new code, but what are its capabilities when it comes to mending the old one? Today we talk with Ray Myers, a legacy code expert and sceptical enthusiast for AI.
Many of the largest companies rely on third-party code to run critical parts of their software. However, there's often little focus on ensuring the quality of these external dependencies.
How do the love for vintage computers and test automation come together? Can one inspire another and how?
In Kubernetes, security is a joint effort between security engineers and DevOps. A perfect tool to bring these two together is Kubescape, an open-source Kubernetes security project.
Reviewing logs for security threats and operational functions can be a cumbersome task. Attention is a finite resource, and it is easy to miss something when faced with megabytes of data.
Cyber security is not a core activity of most software development companies. It is an outsourced activity that simply has to be done so that we can deploy our core services.
How to set up developers for success? For the longest time, companies left developers to their own devices to figure out the workflows and tools they will be using.