This article is the 2nd part of a serie of several posts where I describe how to build a 3-node Hadoop cluster on AWS.
• Part 1: Setup EC2 instances with AWS C...
In a previous blog on new approaches to security, we looked at how traditional data center defenses were designed to protect a defined perimeter by monitoring a...
Having only single container for each service is not good when it comes to the production environment since we also need high availability when one node is down...
As the founder of a small SAAS startup, CircleCI was a no-brainer for continuous deployments. But as our needs grew the financial cost of CircleCI began to outw...
Providing developers and businesses a reliable, easy-to-use cloud computing platform of virtual servers (Droplets), object storage ( Spaces), and more.
Check out this post on application access in AKS, focusing on a few specific ways to lock your app using Ingress, subnet-level NSG, and Ingress whitelisting.
DevOps integrates developers and operations teams for collaboration around software infrastructure automation, workflow automation, as well as continuous monito...
By Ankit Mehta, Alibaba Cloud Tech Share Author. Tech Share is Alibaba Cloud’s incentive program to encourage the sharing of technical knowledge and best practi...
Check out this post to learn more about using the Java keytool command, focusing on how to create a keystore, generate a CSR, import certificates, and more.
This post aims to shed light on data collected on the AWS infrastructure as well as the performance of Internet calls with special attention to latency.
Increasing popularity around cloud infrastructures and cloud-native designed applications means that more focus has to be placed on designing CI/CD processes ac...