Glen Knight

NYC Based IT Professional

So Many Options, So Little Time

So many language/framework options, so little testing time, that is. Recently, two projects I was working on drove me to check out a breadth of languages and/or frameworks to handle cross-platform development. While Unity and Unreal have traditionally been my game platforms of choice and I typically use Xamarin for cross-platform (though native development is […]

0 Comments

Read More

Monitor, Evaluate, and Demonstrate Backup Compliance with AWS Backup Audit Manager

Today, I’m happy to announce the availability of AWS Backup Audit Manager, a new feature of AWS Backup that helps you monitor and evaluate the compliance status of your backups to meet business and regulatory requirements, and enables you to generate reports that help demonstrate compliance to auditors and regulators. AWS Backup is a fully […]

0 Comments

Read More

Global Demand for Developer-Centric Security Fuels Secure Code Warrior’s Continued Growth

BOSTON & SYDNEY & LONDON, August 24, 2021 — Global secure coding company Secure Code Warrior® has announced the signing of its 400th customer and strong business performance in response to an increased demand for security-aware and security-skilled developers across all industries worldwide. This milestone achievement follows the onboarding of 120 new enterprise customers across 30 […]

0 Comments

Read More

How to Successfully Scale Agile

Agile has proved its value to businesses across industries and geographies. In fact, the pandemic elevated it to an absolute necessity for organizations’ success and survival. Business leaders around the world invested aggressively in Agile transformation as they scrambled to meet changing customer demands through newly hybrid and remote workforces. Not surprisingly, the faster they […]

0 Comments

Read More

Majority of Software Engineers Want Remote Work Options

The pandemic brought unprecedented change to the digital ecosystem, impacting users, companies and software engineers alike. COVID-19 accelerated ongoing digital transformation and forced many organizations to innovate rapidly. Newfound reliance on digital experiences increased demand for software programmers, exacerbating demand in a market already short on talent. In this era, work-from-home (WFH) became commonplace and […]

0 Comments

Read More

Happy 15th Birthday Amazon EC2

Fifteen years ago today I wrote the blog post that launched the Amazon EC2 Beta. As I recall, the launch was imminent for quite some time as we worked to finalize the feature set, the pricing model, and innumerable other details. The launch date was finally chosen and it happened to fall in the middle […]

0 Comments

Read More

F5 Networks Planning Open Source Projects Beyond NGINX

F5 Networks today revealed plans to launch multiple projects in the months ahead that will extend its commitment to open source beyond the NGNIX proxy software the company acquired in 2019. The announcement was made during an online NGINX Sprint event; two of the projects are extensions of NGINIX that will address networking requirements between […]

0 Comments

Read More

Edge Computing: Tech’s Next Trillion-Dollar Opportunity 

Even as technology continues to move into the cloud, a simultaneous shift is already underway in the opposite direction as computing increasingly moves to the edge. One key reason: by 2025, the number of connected devices in use is expected to exceed 56 billion units, according to IDC. Edge computing is not a successor to […]

0 Comments

Read More

Why You Should Use GitOps to Experiment With AI

As the pace at which artificial intelligence (AI) models are being constructed and inevitably updated starts to increase, it’s becoming more apparent that the pace at which data science teams are currently experimenting also needs to dramatically quicken. Many data science teams today are fortunate if they manage to successfully deploy two AI models in […]

0 Comments

Read More

Shifting Pipeline Security Left and Left Again

Moving to the cloud creates a tremendous opportunity to get security right and reduce the risk of a data breach. Most organizations start their cloud security efforts by ‘shifting security left’ thereby addressing issues in the CI/CD pipeline. Fixing known vulnerabilities and risky configurations before pushing images to production makes sense. But there is an […]

0 Comments

Read More