What is DevOps? Development-Operations of IT systems and software, or ‘DevOps’, has as many definitions as practitioners. Many firms say…
Containers are isolated application images from the binaries to the file disk. They are isolated in that they virtualise only…
In complex integrated environments on the cloud; security becomes the central feature not only of design; but of governance. CISO…
Introduction A typical Client Application system utilizes a number of monitoring and notification services in order to discover and resolve…
Code Management is usually a mess. Each developer operates a single branch in isolation, which does not include automated…
The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations. 2016. Authors: Gene Kim, Jez Humble,…
Waterfall theologies are directly responsible for the failure of ~70% of IT projects of any size and variety. Forrester estimates…
Some Key Security Patterns that can be implemented within Cloud platforms are below covering keys, encryption and data protection. Patterns…
Example Cloud Security Architecture Hybrid Cloud Architecture, supporting 1000s of users, using AWS with legacy DB integration User application access:…
#1 Preference – Software as a Service (SaaS) Problem Statement: How can software be offered dynamically over a network? Context:…