You cannot deploy into the cloud unless the security model is a part of the original design. Using Agile and…
File Server migrations from on-premise to the Cloud are not easy, especially if you are changing your LDAP or Active…
What is DevOps? Development-Operations of IT systems and software, or ‘DevOps’, has as many definitions as practitioners. Many firms say…
Containers are isolated application images from the binaries to the file disk. They are isolated in that they virtualise only…
In complex integrated environments on the cloud; security becomes the central feature not only of design; but of governance. CISO…
Introduction A typical Client Application system utilizes a number of monitoring and notification services in order to discover and resolve…
Code Management is usually a mess. Each developer operates a single branch in isolation, which does not include automated…
The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations. 2016. Authors: Gene Kim, Jez Humble,…
Waterfall theologies are directly responsible for the failure of ~70% of IT projects of any size and variety. Forrester estimates…
Some Key Security Patterns that can be implemented within Cloud platforms are below covering keys, encryption and data protection. Patterns…