Security and patching in AWS, a real-world example. Firewalls AWS WAF (Web Application Firewall) is a web application firewall that…
The vast majority of enterprises still employ manual processes, silos, and have a lack of documentation and resources who understand…
Ansible and Jenkins – Configuration and Orchestration A common approach to create an automated pipeline is to combine 2 platforms…
Agile-Scrum is an iterative delivery and deployment methodology, directly opposed to Waterfall. IT is fungible, changeable, malleable and by design…
PAM and security in general are concerned with 2 basic concepts: 1 ) Protecting my systems and data from…
A general overview and approach of transforming Legacy using Cloud, Hybrid, Migration, Transformation in the Financial Services.
Moving complex 3 Tier architectures to the Cloud (re-platforming); can be complicated, especially when you have legacy middleware to worry…
A curious aspect of IT Architecture is that there is no single definition of Architecture. This causes real problems on…
Containers serve 3 main purposes within an application portfolio and Technology Road map: 1 ) Lift and Shift existing legacy…