Tag: Software architecture
Cloud vendor lock-in: the good, the bad and reality
Posted on April 13, 2021, Level beginner Resource Length medium
This is the second part of a mini-series centered around cloud computing; a high-level overview of vendor lock-in and mitigation strategies. By Piotr.
How quantum computing will transform these 9 industries
Posted on April 12, 2021, Level beginner Resource Length medium
Quantum computing remains a nascent technology, but its potential is already being felt across many sectors. From healthcare to finance to artificial intelligence, we look at the industries poised to be reshaped by quantum computers. By cbinsights.com.
Tackling Java cold startup times on AWS Lambda with GraalVM
Posted on April 10, 2021, Level intermediate Resource Length medium
Have you ever tried running a Java application on AWS Lambda? Well, even the simplest Java application takes significant time to start up at first. The reason behind is simple. AWS has to prepare a runtime environment for your application when it executes the first time. This is called cold-start. By Arnold Galovics.
Illustrated guide to 12 Factor Apps
Posted on April 5, 2021, Level beginner Resource Length medium
The 12 Factor App methodology is an influential pattern to designing scalable application architecture. Here is what that means for application architects and their architecture. By Bob Reselman.
Ceph geo replication
Posted on April 4, 2021, Level beginner Resource Length short
Ceph is our go-to choice for storage clustering (creating a single storage system by linking multiple servers over a network). Ceph offers a robust feature set of native tools that constantly come in handy with routine tasks or specialized challenges you may run into. By Joe Milburn.
How database replication works
Posted on April 1, 2021, Level beginner Resource Length medium
Databases are an essential piece of almost every software product. A database is an organized place to store data. At some point, every company realizes that the amount of data they have increases over time. They cannot afford to lose all the accumulated information. By Dmytro Khmelenko.
Terraform: Create AKS cluster
Posted on March 30, 2021, Level beginner Resource Length long
While there are several ways to host container workloads in Azure, Azure Kubernetes Service (AKS) provides the easiest way to deploy Kubernetes for teams needing a full orchestration solution. By Jim Counts.
Study reveals the state of mobile application security
Posted on March 28, 2021, Level beginner Resource Length medium
The Synopsys Cybersecurity Research Center (CyRC) analyzed more than 3,000 popular Android applications to assess the state of mobile app security during the COVID-19 pandemic. By @securitymagazine.com.
Introduction to Azure's Well-Architected Framework
Posted on March 27, 2021, Level beginner Resource Length short
This blog series on Microsoft's Well-Architected Framework for Azure will equip you with the foundational knowledge and resources you need to become an expert in cloud migration best practices. By Jerry Rhoads.
How to mitigate Low-Code security risks
Posted on March 25, 2021, Level beginner Resource Length long
Gartner predicts that by the end of 2025, over 65% of development projects will use low-code builders. The field of low-code continues to expand. But what security implications does low-code introduce? By Bill Doerrfel.
How we implemented Distributed Multi-document ACID Transactions in Couchbase
Posted on March 24, 2021, Level advanced Resource Length long
ACID Transactions are a must when you have strict data consistency requirements in your application. The costs of running transactions on distributed systems can rapidly create bottlenecks at scale. By Denis Rosa, Developer Advocate, Couchbase.
Tips for Kubernetes cost optimization
Posted on March 17, 2021, Level beginner Resource Length medium
Kubernetes is ruling the container market. According to a CNCF survey, the use of Kubernetes in production in 2020 was 93%, up from 78% in 2019. However, the problems most often listed in surveys include networking, storage, tracking, surveillance, a lack of preparation, and, of course, cost management. By Sara Miteva.