Organizations are utilising cloud solutions at a rapid growth rate. Cloud Providers like Amazon (AWS), Google (Google Cloud), and Microsoft (Azure) have been taking advantage by providing some of the leading cloud platforms in the industry.
There are other available platforms such as Red Hat, VMWare, Rackspace, and others that offer platforms or specialised platforms as well. So with all of these platforms available, there is a strong and rapidly growing need for qualified and educated employees.
Continue reading Best Cloud Training Providers for 2019
Data protection is critical within any business and data has a lot of value. Loss of data can be detrimental to both the business holding the data and the individual who’s data has been compromised resulting in drastic consequences. Loss of data is a breach of both privacy and security and with data storage being so cheap, it has expanded massively in volume. While data breaches of sensitive data have been occurring for a long time, they have been becoming more frequent.
Continue reading Why I don’t think Googles Data Loss Prevention API is ready for use with images
Welcome to the “DNS Deep Dive” series! In this comprehensive exploration, we will immerse ourselves in the intricacies of DNS (Domain Name System), unraveling its inner workings to shed light on this fundamental aspect of the internet. Whether you’re a tech-savvy individual or someone with limited technical background, our goal is to provide clear and concise explanations that will enhance your understanding of DNS. Join us on this enlightening journey as we bridge the gap between technical and non-technical realms, empowering you to grasp the key concepts behind DNS with ease. Let’s dive in and demystify the world of DNS together.
Continue reading DNS Explained: The Backbone of the Internet
The Google Cloud Platform (GCP) has been growing in popularity over the last few years, and with good reason, the GCP has a strong competitive advantage over other cloud providers when it comes to certain aspects such as Kubernetes, Big Data, Data Pipelines, and Analytics.
This certification is a great entry point into the GCP certifications, while it is not the easiest of the GCP certifications, it will give you a good foundation and overall understanding of the services GCP has to offer as well as design for cost-effective and fault-tolerant solutions.
Continue reading How I passed the GCP Professional Cloud Architect Exam
Both Choreography or Orchestration are fascinating patterns, they are fantastic ways to manage the interactions, communication, and behavior between your Microservices and often there is not a one size fits all approach you should take.
Just because you have taken one of these approaches in a previous solution does not mean that it the right approach for your next, hopefully, this post will be able to give you a high-level overview of what you should consider and help you to manage your Architecture decision.
Continue reading Choosing Choreography or Orchestration for your Microservices Architecture
No matter your background into cloud computing, I think this certification is a great entry point into the AWS certifications, while it is one of the easiest of the AWS certifications, it will give you a good foundation and overall understanding of the services AWS has to offer as well as design for cost-effective and fault-tolerant solutions.
Continue reading How I passed the AWS Certified Solution Architect (Associate) Exam
Within the vast realm of software development, numerous companies and individuals have contributed remarkable component libraries, generously shared and readily available on GitHub. These repositories stand as testament to the collaborative nature of our industry and the collective pursuit of excellence. In this article, however, our focus is to delve deeper into the concept of component libraries. We aim to provide comprehensive guidance to those who aspire to embark on their own journey of creating and curating a component library. By exploring this topic in greater detail, we will uncover the underlying principles, best practices, and valuable insights that will empower you to build your own library with confidence. Join us on this enlightening expedition as we unlock the power of component libraries and pave the way for a more efficient, scalable, and collaborative software development landscape. Let’s embark on this enriching journey together.
Continue reading Unlocking the Power of Component Libraries: A Comprehensive Exploration
When trying to find instructions on how to publish into Github Pages, I found that is was not very clear when trying to publish a static site.
I thought it would be good to write a guide on publishing a static site into Github Pages and hopefully eliminate any confusion in trying to do so.
Continue reading Publishing a static site with Github Pages and Travis CI
Do you enjoy your work culture?
Who doesn’t want to show up to work and be in an environment with like minded and talented team members (ability, passion, desire not skill-set).
Do you enjoy your work environment?
Who doesn’t want to be part of a team that is recognised for the quality that they deliver as well as being seen as industry leaders, has the abilities to use technologies that will give the best outcome and help grow your teams skill-set and interest.
Do you want to easily be employable?
Who doesn’t want to be perceived in the communities they are part of as someone others would love to work with.
All that sounds great, right, and they are benefits that happen when working in a high performing team, however truthful speaking I think high performing teams are very rare, though while I think they are rare, I think it is also very important to strive to be a high performing team, not just for others but for yourself.
Continue reading Achieving Excellence: Understanding High Performance in Agile Teams
WebSockets with custom message security is not a topic that appears widely online, let alone example on how to make it happen, therefore I decided to present on web sockets and in particular allowing custom security on the socket level.
Continue reading WebSockets Security with Spring and Spring Security