tools | TechWell


Exploring the Features of CodeWhisperer and Its Role in the Future of Coding Exploring the Features of CodeWhisperer and Its Role in the Future of Coding

Learn how Amazon CodeWhisperer is uniquely designed to help you develop better code faster, improve security, protect your privacy, and strengthen—not threaten—your career as a coder.

Flowing Water Using Pipelines for CI/CD

Continuous integration and continuous deployment have become very important in the daily workflow of building a product to production. We take a look at the stages necessary to have a well-functioning CI/CD pipeline.

John Agbanusi's picture
John Agbanusi
Laptop with icons for multiple web browsers Comparing 4 Top Cross-Browser Testing Frameworks

The market is flooded with cross-browser testing frameworks, with more options than ever before. How should you decide which option is best to test your application for compatibility with different web browsers? Let’s take a look at four of the top open source solutions today and compare their benefits and drawbacks.

Eran Kinsbruner's picture
Eran Kinsbruner
Illustrated data sets connecting in an AI system 5 Pitfalls to Avoid When Developing AI Tools

Developing a tool that runs on artificial intelligence is mostly about training a machine with data. But you can’t just feed it information and expect AI to wave a magic wand and produce results. The type of data sets you use and how you use them to train the tool are important. Here are five pitfalls to be wary of.

Chirag Mudsa's picture
Chirag Mudsa
Columns of the Parthenon Benefits of Using Columnar Storage in Relational Database Management Systems

Relational database management systems (RDBMS) store data in rows and columns. Most relational databases store data row-wise by default, but a few RDBMS provide the option to store data column-wise, which is a useful feature. Let’s look at the benefits of being able to use columnar storage for data and when you'd want to.

Deepak Vohra's picture
Deepak Vohra
Chess king left standing with other fallen pieces around it Choosing the Right Threat Modeling Methodology

Threat modeling‍ has transitioned from a theoretical concept into an IT security best practice. Choosing the right methodology is a combination of finding what works for your SDLC maturity and ensuring it results in the desired outputs. Let’s look at four different methodologies and assess their strengths and weaknesses.

Alan Crouch's picture
Alan Crouch
Apache logo Comparing Apache Sqoop, Flume, and Kafka

Apache Sqoop, Flume, and Kafka are tools used in data science. All three are open source, distributed platforms designed to move data and operate on unstructured data. Each also supports big data in the scale of petabytes and exabytes, and all are written in Java. But there are some differences between these platforms.

Deepak Vohra's picture
Deepak Vohra
Silhouette of person unlocking a door with keys Shifting Security Left in Your Continuous Testing Pipeline

Security is often the black sheep of testing—an afterthought that gets only a scan before release. We have to make security a first-class testing citizen with full-lifecycle support. For the best impact, introduce security testing into the early phases of the continuous testing pipeline. Here are some tools to help.

Glenn Buckholz's picture
Glenn Buckholz