Software Engineering Perspectives Articles

Sorted By: Most Recent
Thomas Falk Thomas Falk
Updated on April 20, 2024

How to Solve Kubernetes’ Cost Transparency Challenge

As technology stacks become increasingly difficult to manage and scale, engineering teams are turning to Kubernetes. But seeing where to optimize versus where to save can be murky.

Dominik Serafin Dominik Serafin
Updated on April 20, 2024

How to Manage a Remote Software Engineering Team

To be effective, a distributed team needs the right people, tools and leadership to make the magic happen.

Mark Kinsella Mark Kinsella
Updated on April 20, 2024

How Engineers Should Think About Performance Reviews and Promotions

With the right preparation and framing, your performance review will help you learn, grow and achieve your career goals.

Mark Kinsella Mark Kinsella
Updated on April 20, 2024

How to Make Career Pathways Work for Your Engineering Org

To thrive and grow, engineering teams must have clear, actionable performance goals that will lead devs to the next step in their careers.

Mark Kinsella Mark Kinsella
Updated on April 20, 2024

Which Engineering Pathway Is Right for You?

While not all engineering organizations are the same, they usually have some variation of the two types of pathways in the software engineering world: the IC and the EM. But there is a third, lesser-known option.

Tammy Xu Tammy Xu
Updated on April 20, 2024

What Makes for the Best Programming Font?

Coding fonts aren’t quite like other typefaces.

Katlyn Gallo Katlyn Gallo
Updated on April 20, 2024

What Is Spear Phishing?

Spear phishing is a social engineering technique that malicious individuals use to trick targeted individuals into providing sensitive information, usually via email.

Image: Shutterstock / Built In
Brian Nordli Brian Nordli
Updated on April 20, 2024

Red Canary Explains What Happens After a Company Gets Hacked

Breaking down a breach with Red Canary’s response team.

Brian Nordli Brian Nordli
Updated on April 20, 2024

Penetration Testing: What It Is, and How to Do It Well

Here’s how penetration testers exploit security weaknesses in an effort to help companies patch them.