REST API Design Best Practices – How to Build a REST API with JavaScript, Node.js, and Express.js
How to scale the power of AI simulation
From digital twins that provide insights into current performance to advanced simulation intelligence that evaluates future scenarios, organizations in nearly every industry are taking advantage of the evolution of AI simulation to speed up operations, reduce risk and boost better decision-making. Read More
Pulumi infrastructure-as-code goes universal to build cloud apps
Cloud engineering software maker Pulumi has come up with a new service called CrossCode, a universal translation technology that turns Pulumi infrastructure and policy into code.Read More
Learn React Router 6
Helping nontechnical execs select analytics solutions
As a non-technical decision-maker in the enterprise, selecting top-tier analytics solutions can be daunting — unless procurement, finance, revenue and operations surrounding the newly selected tool are strategic.Read More
Kinetix uses no-code AI to create 3D animations, secures $11M
No-code AI enables the creation of AI models without the need for specially trained individuals. Organizations can benefit from this because there is currently a scarcity of data science talents out there.Read More
Dennis Fong and Ryan Wyatt join Bitkraft Ventures as venture partners
Dennis Fong and Ryan Wyatt, longtime games industry players, are joining Bitkraft Ventures as venture partners.Read More
Gear from Netgear, Linksys, and 200 others has unpatched DNS poisoning flaw
Enlarge (credit: Getty Images)
Hardware and software makers are scrambling to determine if their wares suffer from a critical vulnerability recently discovered in third-party code libraries used by hundreds of vendors, including Netgear, Linksys, Axis, and the Gentoo embedded Linux distribution.
The flaw makes it possible for hackers with access to the connection between an affected device and the Internet to poison DNS requests used to translate domains to IP addresses, researchers from security firm Nozomi Networks said Monday. By feeding a vulnerable device fraudulent IP addresses repeatedly, the hackers can force end users to connect to malicious servers that pose as Google or another trusted site.
The vulnerability, which was disclosed to vendors in January and went public on Monday, resides in uClibc and uClibc fork uClibc-ng, both of which provide alternatives to the standard C library for embedded Linux. Nozomi said 200 vendors incorporate at least one of the libraries into wares that, according to the uClibc-ng maintainer, include the following:

