Code Management is usually a mess. Each developer operates a single branch in isolation, which does not include automated…
The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations. 2016. Authors: Gene Kim, Jez Humble,…
Waterfall theologies are directly responsible for the failure of ~70% of IT projects of any size and variety. Forrester estimates…
Some Key Security Patterns that can be implemented within Cloud platforms are below covering keys, encryption and data protection. Patterns…
From Cloud Strategy Magazine. Rapid Growth in Cloud Infra from 2015 to 2017. http://www.cloudstrategymag.com/articles/86795-report-public-cloud-market-is-growing “New Q2 data from Synergy Research Group shows…
Example Cloud Security Architecture Hybrid Cloud Architecture, supporting 1000s of users, using AWS with legacy DB integration User application access:…
There are some very good security models and reference architectures from NIST, COBIT and ISO. They all serve a different…
#1 Preference – Software as a Service (SaaS) Problem Statement: How can software be offered dynamically over a network? Context:…
Migration Best Practices When migrating on-premise estate into the Cloud, some practical steps are followed. The following is an overview…