Just as an architect is responsible for the visualization of buildings, this developer argues that the software architect should lead the digital transformation...
Assume you have installed Azure PowerShell already. If you don't have PowerShell install guide is in the following link. There are many ways you can filter the...
From the release of the first Serverless Security Top 10 Risks Guide and a collaboration with CSA, we look at the 12 biggest security risk for serverless apps.
This post looks at a DevOps security challenge — dealing with TLS Certificates. We focus on securing certificates, containers, and inter-service communication.
In our previous blog article, “Why a Whole Brain Approach to Secure DevOps is Critical,” we explained why a “whole brain” approach is critical to achieving a se...
A software architect explores the concept of data virtualization, explaining the main points behind it and going over a few use cases, such as data lakes.
The CIA Triad is the reason IT Security teams exist. In this post, we take a look at a real-life example and how CIA impacts IT security and company data.
Technical debt is a term that is often misunderstood but carries a negative connnotation. Learn more about its true meaning, role, and necessity in development.
Mysql has many open source backup tools out there, some of which are mysqldump, mydumper for logical backups and xtrabackup for hot physical backups. They do th...
There are a lot of examples in the web that show you how you can run Wordpress in Kubernetes. The main issue with this Examples is: Only one Pod running with wo...
This article helps you to understand what to monitor if you have or are bringing a new service to run in production. Monitoring gives us the ability to understa...