Cloud-native security focuses on securing cloud-native platforms, infrastructure, and applications. Let’s discuss strategies to tackle them in this article.
Take an in-depth look at the serverless model, explore different cloud computing delivery models, and learn about available serverless offerings in the market.
Learn how to package an ML model as a Docker container and deploy it on AWS Lambda and gain a deeper understanding of how to deploy ML models on the cloud.
Debugging over the network using a protocol like JDWP isn’t hard. However, there are risks that aren’t immediately intuitive and some subtle solutions.
In this article, readers/developers will follow guide code to call two API’s and learn how to send long blocking requests asynchronously with RxJava and Vertx.
Here is a socio-technical analysis of cloud cost management problems to aid in controlling costs from a resource angle and improving your cloud consumption value.
Exploring fraud detection case studies and architectures with Apache Kafka, KSQL, and Apache Flink with examples, guide images, and informative details.
[Originally published February 2022] In this post, I will share some notes from my mentoring session that can help you - a DevOps engineer or platform engineer, learn where to focus.
This article will look at best practices to efficiently ingest, normalize, and structure their AWS logs so that security teams can implement the proper detections.
This article will explore observability and inform readers about the evolution of developer roles and how developers can stay ahead of the observability game.