Glen Knight

NYC Based IT Professional

AWS Fargate Enables Faster Container Startup using Seekable OCI

While developing with containers is becoming an increasingly popular way for deploying and scaling applications, there are still areas where improvements can be made. One of the main issues with scaling containerized applications is the long startup time, especially during scale up when newer instances need to be added. This issue can have a negative […]

0 Comments

Read More

Getting Data Architecture Right in Cloud-Native Apps

An incomplete, inappropriate or ill-considered data architecture can have serious consequences on your application and your company. Source: DevOps.com

0 Comments

Read More

Evolution of DevSecOps

Source: DevOps.com

0 Comments

Read More

State of API Report Highlights Productization and Generative AI

Postman’s fifth annual State of the API report sheds light on the ongoing API productization movement and API developers’ use of generative AI. Source: DevOps.com

0 Comments

Read More

Graduation Days

Source: DevOps.com

0 Comments

Read More

Run Event-Driven Workflows With Amazon EKS and AWS Step Functions

This post demonstrates a proof-of-concept implementation that uses Kubernetes to execute code in response to an event. Source: DevOps.com

0 Comments

Read More

How to Use Application Load Balancer and Amazon Cognito to Authenticate Users for Your Kubernetes Web Apps

This post describes how to use Amazon Cognito to authenticate users for web apps running in an Amazon Elastic Kubernetes Services (Amazon EKS) cluster. Source: DevOps.com

0 Comments

Read More

A DevOps Guide to IoT Technology

Internet-of-things (IoT) is a term used to describe the network of physical devices—from everyday household items to sophisticated industrial tools—connected to the internet, sharing and collecting data. With the advent of cheap computer chips and the ubiquity of wireless networks, it’s possible to make anything a part of the IoT. Add to that the exponential […]

0 Comments

Read More

Communicating Common Web App Security Threats to Developers

Shift left involves providing developers with the context they need to prioritize and remediate threats appropriately. Source: DevOps.com

0 Comments

Read More

Armory Ebook

To download, please fill out the form below: Source: DevOps.com

0 Comments

Read More