Speed up ksort() ksort()is the PHP native function that sorts an array by its keys, while maintaining the relationship with the values. It has been in the language since the beginning (last millenium!), and yet, sometimes, it is interesting to ask again some old questions: can I speed up ksort()? Let’s see. ksort(), sorting by keys To start with, let’s review what ksort() does. <?php $array = [2 => 'c', 5 => 'e', 3 => 'd', 1 => 'b', 0 => 'a']; ksort($array); //[0 => 'a', 1 => 'b', 2 => 'c', 3 => 'd', 5 => 'e', ]; ?>…
Author: drweb
Amazon Web Services (AWS) today revealed it is streamlining IT incident management by adding generative artificial intelligence (AI) capabilities to the Amazon OpenSearch service.Widely used to troubleshoot IT incidents involving AWS cloud computing environments, the generative AI capabilities are being provided via integrations with Amazon Q Developer, a set of AI agents that automate a wide range of software engineering tasks.Mukul Karnik, general manager for search services for AWS, said DevOps and platform engineering teams will now be able to use natural language queries to create a summarization of an IT incident, including a list of probable root causes.The overall…
A customer asked if they needed to restore a database from backup to compare the schema in a database. They don’t and this post shows that.This is part of a series of posts on SQL Compare. Setting Up a ComparisonWhen I open SQL Compare, I see a screen that looks like what I’ve shown below, with a database to database comparison.At the top, to the left of “Source”, there is a drop down arrow. If I pick that I see these choices: database, backup, snapshow, scripts folder, SQL Source Control, SQL Change Automation, Flyway. Those last 3 are project types…
DevOps.com is now providing a weekly DevOps jobs report through which opportunities for DevOps professionals will be highlighted as part of an effort to better serve our audience.Our goal in these challenging economic times is to make it just that much easier for DevOps professionals to advance their careers.Of course, the pool of available DevOps talent is still relatively constrained, so when one DevOps professional takes on a new role, it tends to create opportunities for others.The five job postings shared this week are selected based on the company looking to hire, the vertical industry segment and naturally, the pay…
Senior Full Stack Developer
Legit Security this week added a dashboard to its application security posture management (ASPM) platform that makes it simpler to correlate the creation of a vulnerability to a specific application development team.Company CTO Liav Caspi said the risk prevention dashboard also makes it possible to identify missing guardrails, such as a static application security testing (SAST) tool, that might not have been turned on as code moved through a DevSecOps pipeline.These insights create a teaching opportunity using, for example, gamification capabilities built into a software-as-a-service (SaaS) platform that can be used to further adoption of best DevSecOps practices, he added.Finally,…
Microsoft has taken another significant step in advancing secure virtualization technology with the release of Hyperlight Wasm, expanding the capabilities of its embedded VMM (Virtual Machine Monitor) project announced last year. This new open-source offering bridges the gap between WebAssembly and micro-VM security, creating exciting possibilities for developers across platforms.Expanding the Hyperlight EcosystemThe original Hyperlight project emerged as an innovative solution for VM-based security, specifically designed for small embedded functions within Windows and Linux applications. It offered a lightweight approach to virtualization that could be integrated directly into applications, providing isolation without the overhead of traditional VMs.Microsoft has significantly broadened…
Telegram has eventually become something more than a mere messaging app since its official release in 2013. Back then, nobody could imagine that Pavel Durov’s project would become one of the most popular instant messaging applications with 1 billion active users. If you use Telegram on your Linux desktop to communicate with other people or get information from its channels, there is a way to make the most of this platform and increase your productivity. What this means is that there exist various Telegram bots, applications that run on the platform and provide additional features. The best thing about such…
Lead Back End Engineer
Cary, North Carolina, March 27th, 2025, CyberNewsWireINE, a global leader in networking and cybersecurity training and certifications, is proud to announce it is the recipient of twelve badges in G2’s Spring 2025 Report, including Grid Leader for Cybersecurity Professional Development, Online Course Providers, and Technical Skills Development, which highlight INE’s superior performance relative to competitors. “INE solves the problem of accessible, hands-on security training with structured learning paths and real-world labs,” says SOC Analyst Sai Tharun K. “It helps bridge the gap between theory and practical skills. For me, it has been very valuable in refining my penetration testing, cloud security,…
