When we combine the cloud with IaC tools like Terraform and continuous deployment we get the almost magical ability to create resources on demand. For all its benefits, however, the cloud has also introduced a set of difficulties, one of which is estimating cloud...
Cloud
A Brief Overview of the Spring Cloud Framework
The concept of distributed applications is certainly not new. Whoever has a long IT career certainly remembers a number of different technologies implementing distributed components even in the early years. Nowadays, is all about microservices. They are a new form by...
Differences Between Engineers in Software
The evolution of software engineering over the last decade has led to the emergence of numerous job roles. So, how different is a software engineer, DevOps engineer, site reliability engineer, and cloud engineer from each other? In this article, we drill down and...
How to Develop a Portrait Retouching Function
Portrait Retouching Importance Mobile phone camera technology is evolving—wide-angle lens and optical image stabilization to name but a few. Thanks to this, video recording and mobile image editing apps are emerging one after another, utilizing technology to foster...
Configure AWS Glue Job Using Python-Based AWS CDK
AWS Glue is a serverless data integration service that makes it easier to discover, prepare, move, and integrate data from multiple sources for analytics, machine learning (ML), and application development. This article will go into the best practices of application...
Microsoft Azure API Management Service
An overview of frequent scenarios and important Azure API Management components is given in this post. Azure API Management is a hybrid, multi-cloud management tool for APIs in all settings. API Management, a platform-as-a-service, provides the entire API lifecycle....
COMPASS Part 5: A Lack of Network Boundaries
This post is part of a series dealing with Compliance Management. The previous post analyzed three approaches to Compliance and Policy Administration Centers. Two were tailored CPAC topologies that support specialized forms of policy. The third CPAC topology was for...
How I Discovered My Security Practices Are Pretty Bad
I have a confession to make. As a software developer, I never thought much about security. It was about as important to me as the daily weather on Pluto. Admittedly, my work was mostly deployed in lab environments, but I never did much to look for CVEs, attack paths,...
What Is a SOC and How Do SOC Teams Work?
With the growing complexity of IT environments, it is essential to have robust security processes that can safeguard IT environments from cyber threats. This blog will explore how security operation centers (SOCs) help you monitor, identify and prevent cyber and...
A Complete Guide to Software Testing Life Cycle (STLC)
Software testing is the process of evaluating a software product to detect errors and failures and ensure its suitability for use. It can be performed manually (where testers use their skill, experience, intuition, and knowledge) or automatically (where the tester’s...
Improve Microservices Security by Applying Zero-Trust Principles
This is an article from DZone's 2022 Enterprise Application Security Trend Report.For more: Read the Report According to a 2020 Gartner report, it is estimated that by 2023, 75 percent of cybersecurity incidents will result from inadequate management of identities and...
Developing Cloud-Native Applications With Containerized Databases
With the advent of microservices in Kubernetes, individual developer teams now manage their own data, middleware, and databases. Automated tests and CI/CD pipelines must be revisited to include these new requirements. This session demonstrates how to use Kustomize and...