Want to build an app that pulls all of your RSS feeds into one location? Read this post for an in-depth look at how such an application was built using Redis.
In the previous article from this series we introduced an architecture around intelligent data as a service (iDaaS) for the healthcare industry. The process ...
The AWS CLI is a tool for managing your AWS services. This post is a quick video to teach you how to install, configure and run some commands of the AWS CLI.
In this blog post, we’ll look at the advantages of an SRE team where each member is a specialist, some crucial SRE specialist roles, and how they help.
Cloud-native debugging is a tedious process of sifting through logs and analyzing dashboards. Continuous observability enables last mile investigation.
Some time ago, back in December of 2020, I shared with you how to get started with business automation tooling on your developer machine using CodeReady Cont...
Containers from different docker-compose files can be in the same network, as long as you have the correct settings. Here's how to set up your network properly.
Become familiar with the art of object reuse by reading this article and learn the pros and cons of different reuse strategies in a multi-threaded Java application.
In this article, we will learn what Cloud Composer is in GCP and how can we set it up. We will also highlight some critical insights about the Cloud Composer.
This post describes three core types of user communication APIs and in which circumstances you should use them to create the best possible end-user experience.
Learn how to use the standard HTTPClient class as part of java.net.http and to create RestClient, send HTTP GET and POST requests, and handle the JSON response.
This tutorial aims to explain how to improve time when it is required for third-party system integration. Read below to find out how to do this yourself!
A large number of organizations were affected by the recent security breach involving Log4j. Learn here how to ensure your applications are safe and secure.
A summary of the Log4j vulnerability and key takeaways for SREs to help with security implications and planning for events that may disable critical systems.
In this article, you’ll learn what penetration testing is and why it is used. It also highlights the different types and approaches to penetration testing.
Data Mesh is an architecture paradigm, not a single technology. This post looks into this principle to explore why no single technology is fit to build a Data Mesh.