This post details the findings of a report focused on the role of machine identity certificates and the importance of automating them as part of DevOps security...
In this post, we take a look at a different form of DLT technology — the hashgraph — and how this new form of DLT can reap huge benefits over blockchain.
This article emphasizes the importance of properly targeting and narrowing a consumer base for your Minimum Viable Product according to a number of factors.
At Worldsensing, we create products with various infrastructure demands. Some installations are single node, distributed, clusterized, etc. but we are always ev...
How to avoid investing in the technology, software, and processes that will become obsolete in 2 years? This is a hard question, but future-proofing your busine...
Providing developers and businesses a reliable, easy-to-use cloud computing platform of virtual servers (Droplets), object storage ( Spaces), and more.
A dev gives a tutorial on how to get started logging your metadata using a combination of open source tech, namely Lua, Nginx, Logstack, and Elasticsearch.
Want to learn more about using a private blockchain network for end-to-end encryption of documents? Check out this tutorial to learn how using ONLYOFFICE.
From a talk delivered by Helen Beal, we take a look at some of her recommendations for DevSecOps and why including security requires artifact repositories.
We take a look at how to get going with the open source big data frameworks Alluxio and Spark, giving all the commands and Scala code you need to start.
Take a look at this quick and introductory article that describes how you can get a simple but useful Spring Boot application running quickly on Kubernetes.
Since 2015, we have seen a recurring, unfortunate failure pattern in many companies who want to adopt DevOps practices. The company hears about DevOps, learns a...