Distributed non-relational database Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS...
Given the rise in identity-focused breaches and the continuously growing number of identities, identity and access management (IAM) has emerged as a cornerstone for...
Distributed non-relational database Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors and is used at some of the most well-known, global organizations. This Refcard covers the fundamentals of Cassandra, including its data model, architecture, replication strategies, network topology, querying and indexing, operations and maintenance, and much more.
Given the rise in identity-focused breaches and the continuously growing number of identities, identity and access management (IAM) has emerged as a cornerstone for safeguarding enterprise systems. By orchestrating secure authorization and authentication, IAM serves as the digital gatekeeper, granting controlled access to diverse resources — from on-premises databases to cloud-based applications. In this Refcard, we delve deep into IAM's crucial role in modern cybersecurity. We outline the primary functions and principles that underpin IAM, highlight its significance, address common challenges faced by engineering teams, and focus on the core practices.
Advancements in AI and automation have paved the way toward agentic automation. Integrating advanced AI techniques, agentic automation enables autonomous agents to handle complex, unstructured tasks with minimal human intervention. In this Refcard, you will learn about the key components of AI agents, design principles for building intelligent agents, and practical applications of agentic automation — all demonstrated via a real-world use case.
This Refcard aims to serve as a comprehensive quick-reference guide for PostgreSQL to help both novice and experienced users understand and leverage the crucial capabilities of PostgreSQL more efficiently. Readers will explore PostgreSQL's key features, fundamentals, common commands and functions, and other essential elements.
Application containerization provides a way to combine all required app resources into a single, standardized, easily manageable package. And for Java applications, containerization helps solve the majority of challenges related to portability and consistency. This Refcard walks readers step by step through Dockerfile creation for Java apps, container image builds, deployment strategies, and more.
Securing software supply chains has become a first-class consideration — along with coding and CI/CD pipelines — when developing a software product. Far too many vulnerabilities have been subliminally introduced into software products and resulted in catastrophic breaches for us as diligent developers to treat supply chain security as an afterthought. The core practices and principles outlined in this Refcard provide a foundation for creating secure supply chains that produce deliverables and products that others can trust.
Platform engineering aims to enhance the developer experience through the establishment of secure environments, automated and self-service tools, and streamlined workflows. However, as technology and cyber threats continue to evolve, the integration of automation, security, and AI will be vital to the success of these platforms.
In this Refcard, you will learn more about the value of platform engineering, including best practices, tools, core capabilities, how to align business goals, and more.
Due to growing demands for high-performance analytics, modern businesses consider data capabilities critical to daily operations.
Enter Apache Kafka — a streaming engine for collecting, caching, and processing high volumes of data in real time. The distributed event store typically serves as a central data hub that accepts all enterprise data for aggregation, transformation, enrichment, ingestion, and analysis. The data can then be used for continuous processing or fed into other systems and applications in real time.
In this Refcard update, we'll explore the fundamentals of Apache Kafka today and delve into how Apache Flink complements Kafka as a powerful stream processing framework.
Whether you're working with on-premises, cloud, and/or third-party integrations, the questions remain the same: What is the client or user experience you need to offer? And how do you align your integration strategy with it? This Refcard explores fundamental patterns for authentication, polling, querying, and more, helping you assess your integration needs and approach the design, build, and maintenance of your API integrations in the most effective ways for your business case.
Today's cyber threat landscape necessitates a nuanced and proactive strategy for circumventing attacks due to the increasingly complex, sophisticated nature of threats. Security teams must not only have a solid understanding of the landscape but also have effective solutions for predicting and preempting security threats — those both known and unknown to their organization.
In this updated Refcard, you will learn about the evolving threat landscape as well as basic and advanced threat detection techniques, how they are similar and different to threat hunting, and key challenges of emerging technologies, all provided to help strengthen your overall security strategy.
Open-source data architectures offer organizations and teams significant benefits, ranging from reduced vendor lock-in and improved cost effectiveness to greater scalability, availability, and flexibility. In this Refcard, you'll learn core practices for building an open-source data architecture stack, along with design patterns for infrastructure components, high availability, scalability, security, and more.
As data-driven applications continue to grow, it is important for organizations to develop data-driven strategies that drive their business objectives. For modern businesses, data is invaluable, so it comes as no surprise that a majority of emerging technologies and approaches are focused on ensuring efficient data management, enhanced analytics, and robust data security. In this Refcard, we explore how data orchestration helps break down data silos, enables complex analytics, and eliminates I/O bottlenecks. We also dive into various data orchestration practices and use cases.