Trends and Strategies in Cybersecurity: A Q&A With John Pescatore

For more than 35 years, John Pescatore has been taking on threats in the cybersecurity business. At the National Security Agency, Pescatore encrypted data in communications security. At the U.S. Secret Service, he fought currency counterfeiters that aim to make money off of stolen credentials. These days, Pescatore is director of emerging security trends for…

Cutting Dev Time in Half With Invalid User Input Prevention

In 1981 Jon Bentley, the computer scientist credited with authoring the heuristic-based partitioning algorithm k-d tree, published a technical report at Carnegie Mellon University titled, “Writing efficient code.” In it, he estimated that as much as 90 percent of a program’s code is written for housekeeping or exceptional, error-processing cases, the majority of which are…

Serving in the Military Makes for a Successful Career in Tech

Improvise, adapt and overcome. These three words — the unofficial slogan of the Marines — have particular meaning to those who serve our country. And as military personnel transition to civilian life, they’ll make an impact when applying these same words to a career in technology. Veterans acquire skills in the military that are applicable to…

How Walmart Fosters a Culture of Collaboration Through Open Source Innovation

For tech organizations like Walmart Technology, open source software provides the opportunity to accelerate time to market, attract talented professionals and ultimately enable a cost-saving experience for customers. At @WalmartLabs, the technology arm of Walmart eCommerce, open source delivers the benefit of collaboration, providing a way to share code for Walmart.com. Recent open-source efforts include…

Register for the Latest News