Continue on a journey into the world of cloud-native observability: go out onto the playing field to understand who the players are and what teams they form.
Explore the difference between two well-known Auth building methods: AWS Cognito and JSON Web Token. Plus, take a look at the AWS Cognito application process.
Some great links about technical debt: Technical Debt - from metaphor to theory and practice (presentation) Special IEEE Explore issue on Technical Debt (Nov 2012) Must read if you're passionate about quality and have seen or heard some of the issues mentioned in these materials.
Kubernetes monitoring helps to identify problems within a Kubernetes cluster. Know more about Kubernetes monitoring and why it is important here in this blog!
Gain context of three separate API solutions which can be used to validate name input fields within an application as you follow along with this demonstration.
Its primary focus is to automate the deployment of applications inside software containers and the automation of operating system-level virtualization on Linux.
Monitoring your “important” data only gets you so far. If you really want data quality coverage, it's time to go deep and broad with your data monitors.
A service mesh is a technology pattern for managing networked communication between services. Here are some of the popular tools for deploying a service mesh.
The Merge led to the development of a new programming language, which will make it easier for developers to be part of the network. Read more in this post.