Ikoh Sylvaikohsylva.hashnode.dev·Jul 24, 2024Fortifying the Citadel: Mastering PCI-DSS Compliance on AWS for Uncompromising Payment Card Data SecurityToday, we embark on a quest to unravel the intricacies of achieving Payment Card Industry Data Security Standard (PCI-DSS) compliance on Amazon Web Services (AWS), an essential endeavour for any organization that processes, transmits, or stores cardh...DiscussCloud
Marino WijayforEmpathyOpsblog.empathyops.io·Jul 23, 2024You Get A Namespace And You Get One Too! Namespaces For Everyone!Back in the early 2000s, whenever a Developer asked for something, we [painfully] gave it to them. The painful part wasn't about them, it was simply about procurement. What is Procurement 🤔 In tech, I need to buy something from a vendor. I either ca...Discuss·10 likesNaaS
Nipun Hegdecodecloudcapital.hashnode.dev·Jul 23, 2024Implementing the 15-Factor Methodology in Spring BootIntroduction The 15-factor methodology provides a comprehensive framework for building cloud-native applications. By adhering to these principles, developers can create scalable, maintainable, and resilient applications. In this blog, we’ll explore h...DiscussCloud
Ferris Hallferrishall.dev·Jul 22, 2024Flux CD Vs Argo CDI'm trying out both to find the winner of Continuous Delivery to a Kubernetes Cluster. Disclaimer: There isn't a winner only you, you're the winner for choosing to automate your deployments (Terribly diplomatic and lame of me I know, but there you go...DiscussArgoCD
Ikoh Sylvaikohsylva.hashnode.dev·Jul 21, 2024Unleashing the Sentinel's Might: Mastering Centralized Security with AWS Security Hub – Your Cloud Fortress GuardianToday, we embark on a journey that shall illuminate the inner workings of AWS Security Hub, equipping you with the knowledge and strategies to harness its power and elevate your centralized security monitoring capabilities to new heights of dominance...DiscussCloud
Nipun Hegdecodecloudcapital.hashnode.dev·Jul 21, 2024Exploring the 15-Factor Methodology: History, Importance, and Detailed AnalysisIntroduction As modern software development continues to evolve, methodologies that ensure the creation of scalable, maintainable, and resilient applications are crucial. One such methodology is the 15-factor methodology, an extension of the well-kno...Discusscloud native
Nishank Koulnishankkoul.hashnode.dev·Jul 21, 2024Kubernetes Architecture: Mastering Container OrchestrationKubernetes, often called K8s, is an open-source platform designed to automate containerized applications' deployment, scaling, and management. Understanding its architecture is fundamental for effectively managing and deploying applications at scale....Discuss·1 likeKubernetes
Lwin Ko Kolwinkoko.hashnode.dev·Jul 20, 2024What is Cloud Computing?What is Cloud Computing? Cloud computing is the delivery of computing services like servers, storage, databases, networking, and software over the internet. It allows users to access and use these resources without having to manage the underlying inf...Discuss·1 likeCloud Computing
Abhiramcloudbuddy.hashnode.dev·Jul 19, 2024The Cat-and-Mouse Game: Generative AI in Adversarial Security for the CloudThe cloud has become the cornerstone of modern technology, offering unparalleled scalability, agility, and cost-effectiveness for businesses of all sizes. However, this digital haven also presents a significant challenge: security. In the cloud, a co...Discussai security
Shridharkubecentral.hashnode.dev·Jul 19, 2024Kubernetes Ingress ChroniclesIngress is a powerful Kubernetes resource that helps manage how external HTTP and HTTPS traffic gets routed to services within your cluster. Think of it as a traffic cop for your Kubernetes services, deciding which requests get routed where based on ...DiscussKubernetes