Cloud vendor lock-in: the good, the bad and reality
Posted on April 13, 2021, Level beginner Resource Length medium
This is the second part of a mini-series centered around cloud computing; a high-level overview of vendor lock-in and mitigation strategies. By Piotr.
How quantum computing will transform these 9 industries
Posted on April 12, 2021, Level beginner Resource Length medium
Quantum computing remains a nascent technology, but its potential is already being felt across many sectors. From healthcare to finance to artificial intelligence, we look at the industries poised to be reshaped by quantum computers. By cbinsights.com.
Malicious PDFs: Revealing the techniques behind the attacks
Posted on April 9, 2021, Level beginner Resource Length medium
Most of us are no strangers to phishing attempts, and over the years we've kept you informed about the latest tricks used by attackers in the epidemic of phishing and spear-phishing campaigns that plague, in particular, email users. This is an older but useful article by Phil Stokes.
In-depth dive into security features of Intel/Windows platform secure boot process
Posted on April 7, 2021, Level advanced Resource Length long
This blog post is an in-depth dive into the security features of the Intel/Windows platform boot process. In this post I'll explain the startup process through security focused lenses, next post we'll dive into several known attacks and how they were handled by Intel and Microsoft. By Igor Bogdanov.
Illustrated guide to 12 Factor Apps
Posted on April 5, 2021, Level beginner Resource Length medium
The 12 Factor App methodology is an influential pattern to designing scalable application architecture. Here is what that means for application architects and their architecture. By Bob Reselman.
Ceph geo replication
Posted on April 4, 2021, Level beginner Resource Length short
Ceph is our go-to choice for storage clustering (creating a single storage system by linking multiple servers over a network). Ceph offers a robust feature set of native tools that constantly come in handy with routine tasks or specialized challenges you may run into. By Joe Milburn.
Progressive delivery, the future of software development: Ship faster with less risk
Posted on April 2, 2021, Level beginner Resource Length long
So far, Continuous Integration/Continuous Delivery (CI/CD) has been at the centre stage of DevOps Services, steering the modern software development industry forward. However, the current and future demands of the industry require new practices that make the deployment process progressive. By Tapan Vora @cuelogic.
Tags devops cicd app-development cloud cio
How database replication works
Posted on April 1, 2021, Level beginner Resource Length medium
Databases are an essential piece of almost every software product. A database is an organized place to store data. At some point, every company realizes that the amount of data they have increases over time. They cannot afford to lose all the accumulated information. By Dmytro Khmelenko.
Study reveals the state of mobile application security
Posted on March 28, 2021, Level beginner Resource Length medium
The Synopsys Cybersecurity Research Center (CyRC) analyzed more than 3,000 popular Android applications to assess the state of mobile app security during the COVID-19 pandemic. By @securitymagazine.com.
Introduction to Azure's Well-Architected Framework
Posted on March 27, 2021, Level beginner Resource Length short
This blog series on Microsoft's Well-Architected Framework for Azure will equip you with the foundational knowledge and resources you need to become an expert in cloud migration best practices. By Jerry Rhoads.
How to mitigate Low-Code security risks
Posted on March 25, 2021, Level beginner Resource Length long
Gartner predicts that by the end of 2025, over 65% of development projects will use low-code builders. The field of low-code continues to expand. But what security implications does low-code introduce? By Bill Doerrfel.
How we implemented Distributed Multi-document ACID Transactions in Couchbase
Posted on March 24, 2021, Level advanced Resource Length long
ACID Transactions are a must when you have strict data consistency requirements in your application. The costs of running transactions on distributed systems can rapidly create bottlenecks at scale. By Denis Rosa, Developer Advocate, Couchbase.