Cloud What Is Stride Methodology in Threat Modelling? Microsoft’s STRIDE methodology aims to ensure that an application meets the security requirements of Confidentiality, Integrity, and Availability (CIA), besides Authorisation, Authentication, and Non-Repudiation.
Cloud Efficient Microservices Communication: Role Of RPC Framework In A Cloud-Native Ecosystem RPC is a communication protocol that allows a program to call a subroutine or function on a remote system across a network.
DevOps GUIDE TO AUTOMATED VULNERABILITY SCANNERS – TYPES AND BENEFITS Vulnerability scanning involves using applications that help teams create an inventory of all systems and devices connected to the organization’s network.
DevOps What is Personally Identifiable Information (PII)? Personally identifiable information (PII) is data that could identify a specific individual. Information that can be used to distinguish an individual’s identity from another or be used to deanonymize anonymous data is also considered PII.
Cloud Overcoming Security Pitfalls of a Microservice Architecture A Microservice Architecture allows the design and development of applications to be broken down into multiple smaller applications (known as Services), which aided faster development, easy maintenance, and efficient scaling.
DevOps The Future of DevOps: 5 Predictions for 2021 In recent years, there has been an increase in the mix of cloud services that have led to Hybrid and multi-cloud infrastructures. As a result, companies should devise unique DevOps strategies for the latest application deployments and collaboration processes.
Cloud The Two Million Container Challenge In March 2016, HashiCorp demonstrated how Nomad could run 1 million containers across 5,000 hosts. Four years and 10 major releases later Hashicorp replicated the original challenge at a higher scale.
Cloud Guide to Debugging Serverless Applications Debugging in serverless brings in a host of unique issues. These include – highly distributed components, the inherent lack of remote debugging tools, ephemeral design of containerized applications, and a lack of local setup frameworks.
Cloud What Is a Man-In-The-Middle Attack? A man-in-the-middle attack (MitM) is a form of data eavesdropping and theft where an attacker intercepts data from a sender to the recipient, and then from the recipient back to the sender.
DevOps What is SRE (site reliability engineering)? Site reliability engineering (SRE) is a software engineering approach to IT operations. SRE teams use the software as a tool to manage systems, solve problems, and automate operations tasks.
DevOps DevSecOps: Agile Security in the Face of Rapid Change In this article, we’ll look at the challenges organizations face with standard SDLC procedures, and how secure SDLC can be of benefit to your business.
DevOps Best Practices for Writing a Dockerfile Docker has revolutionized the way we use Containers. This is mainly due to the simplicity Docker brings in. It allows anyone to use it without dealing with any advanced topics related to Containers.
DevOps Continuous Automation vs Continuous Testing - What Do They Mean? Continuous Automation is automating every aspect of an application’s lifecycle to build and deploy software and changes quickly, consistently, and safely. While, Continuous Testing (CT) is a software development process in which applications are tested continuously for software development.
DevOps Automating Hadoop Cluster Setup Using Ansible Ansible is an open-source automation tool, or platform, used for IT tasks such as configuration management, application deployment, intraservice orchestration, and provisioning.
DevOps DataOps: what it is and why bother In this article I’d like to start the series of texts which are intended to describe the DataOps practice and framework from its basic definition to application and best practices.
DevOps Reasons I Switched to VS Code The top reasons I decided to switch to VS Code as my editor of choice. To give some additional context, my previous text editor of choice was Sublime Text 3. I swore by it (mostly due to ignorance) and used it for all of my code editings.
DevOps How to exploit a Microservice Architecture With an emerging pattern of organizations embracing the DevOps framework, adopting Microservice Architecture is steadily gaining the respect it deserves.
DevOps What Is Ansible, How It Works, and Its Use Cases Ansible is the simplest way to automate apps and IT infrastructure. Application Deployment + Configuration Management + Continuous Delivery.
DevOps The Practical Guide to A/B Testing I spent a lot of time on A/B testing during my time as a data scientist at Squarespace. A lot of people shrug off experimentation as “analyst-work” and don’t get super excited about it.
DevOps 4 Ways Emerging Tech Is Changing the Nature of Business For business leaders, it’s important not only to be up-to-date with the latest changes in technology, but to also understand how this affects your business and how best to take advantage.
Cloud Solution Architects Guide to Event Driven Integration As a solution architect, you need to keep an eye on technology trends and decide when is the right time for your organisation to get involved.
Cloud Demystifying the Tech Startup Experience Recently, I co-founded a startup, Critiq, with two other people. For the past one year, I have been engineering, marketing, and managing, and I have learned a lot. Here is what I have to tell you.
DevOps How To Contribute To Open-Source Projects As A Beginner? When I was learning to code, I wanted to make open-source contributions, but I had no idea where and how.
DevOps What is a Don't Repeat Yourself Principle in Programming? Many processes in software development are repetitive and easily automated. The DRY principle applies in these contexts as well as in the source code of the application.