PAM and security in general are concerned with 2 basic concepts: 1 ) Protecting my systems and data from…
A general overview and approach of transforming Legacy using Cloud, Hybrid, Migration, Transformation in the Financial Services.
Moving complex 3 Tier architectures to the Cloud (re-platforming); can be complicated, especially when you have legacy middleware to worry…
A curious aspect of IT Architecture is that there is no single definition of Architecture. This causes real problems on…
Containers serve 3 main purposes within an application portfolio and Technology Road map: 1 ) Lift and Shift existing legacy…
There are about 10 different frameworks which may help firms scale with Scrum-Agile. The 3 most popular are: Less (Large…
Issues with Agile include scaling and not having a detailed design which considers all aspects of security, interoperability and networking.…
What is Domain Driven Design? Domain Driven Design or DDD, is a software development process, which uses Object Oriented Analysis…
AWS Network Security Features – best practices Secure network access AWS endpoints are secured with HTTPS/TLS for secure communication…