Tag: Software architecture
-
Advantages and disadvantages of distributed systems
Posted on October 4, 2024, Level beginner Resource Length short
Distributed systems offer numerous benefits such as scalability and fault tolerance but also present challenges like complexity and data consistency. This article explores both the advantages and disadvantages of distributed systems, providing insights into their impact on modern computing environments. By geeksforgeeks.org.
Tags distributed aws software-architecture cloud
-
Oracle lauds customers and cloud collaboration at CloudWorld '24
Posted on September 16, 2024, Level beginner Resource Length short
The Memorystore team is thrilled to announce the preview launch of Valkey 7.2 support on Memorystore to provide users with a truly open-source and high performance key-value service. The introduction of Memorystore for Valkey into the Memorystore portfolio alongside Memorystore for Redis Cluster and Memorystore for Redis is a direct response to customer demand, and is a game-changer for organizations seeking high-performance data management solutions relying on 100% open source software. By Kyle Meggs, Ping Xie.
Tags cloud microservices cio software-architecture
-
Google Cloud launches Memorystore for Valkey
Posted on September 10, 2024, Level beginner Resource Length medium
The Memorystore team is thrilled to announce the preview launch of Valkey 7.2 support on Memorystore to provide users with a truly open-source and high performance key-value service. The introduction of Memorystore for Valkey into the Memorystore portfolio alongside Memorystore for Redis Cluster and Memorystore for Redis is a direct response to customer demand, and is a game-changer for organizations seeking high-performance data management solutions relying on 100% open source software. By Kyle Meggs, Ping Xie.
Tags database microservices google software-architecture
-
What is AI security?
Posted on August 19, 2024, Level beginner Resource Length medium
Short for artificial intelligence (AI) security, AI security is the process of using AI to enhance an organization's security posture. With AI systems, organizations can automate threat detection, prevention and remediation to better combat cyberattacks and data breaches. By Annie Badman, Matthew Kosinski.
Tags infosec ai ibm cloud software-architecture cio
-
Identity threat detection and response solution guide
Posted on August 15, 2024, Level intermediate Resource Length medium
Identity Threat Detection and Response (ITDR) has emerged as a critical component to effectively detect and respond to identity-based attacks. Threat actors have shown their ability to compromise the identity infrastructure and move laterally into IaaS, Saas, PaaS and CI/CD environments. Identity Threat Detection and Response solutions help organizations better detect suspicious or malicious activity in their environment. By The Hacker News.
Tags infosec devops cloud software-architecture learning cio
-
Cloud design patterns that support reliability
Posted on April 28, 2024, Level beginner Resource Length medium
When you design workload architectures, you should use industry patterns that address common challenges. Patterns can help you make intentional tradeoffs within workloads and optimize for your desired outcome. By ckittel and ShannonLeavitt.
Tags devops cloud software-architecture cio
-
Nginx Proxy Manager: A complete guide
Posted on April 24, 2024, Level intermediate Resource Length long
Nginx Proxy Manager (NPM) is an open-source and free application designed to simplify the management of Nginx's proxy, SSL, Access Lists, and more. It is built with a user-friendly dashboard that aims to help those users who aren't exactly Nginx CLI experts. Plus, it also provides free SSL via Let's Encrypt, Docker integration, and support for multiple users. By Diego Asturias.
Tags nginx web-development cloud software-architecture devops
-
Apache web server hardening and security guide
Posted on April 21, 2024, Level intermediate Resource Length medium
The Web Server is a crucial part of web-based applications. Apache Web Server is often placed at the edge of the network; hence it becomes one of the most vulnerable services to attack. A practical guide to secure and harden Apache HTTP Server. By Chandan Kumar.
Tags apache web-development cloud software-architecture infosec
-
Build an API for your front end using Pages Functions
Posted on April 17, 2024, Level intermediate Resource Length short
In this tutorial, you will build a full-stack Pages application. Your application will contain a front end, built using Cloudflare Pages and the React framework and a JSON API, built with Pages Functions, that returns blog posts that can be retrieved and rendered in your front end. By @cloudflare.com.
Tags cloud microservices serverless software-architecture apis devops
-
How to build a custom API Gateway with Node.js
Posted on April 16, 2024, Level intermediate Resource Length short
In the era of microservices, where applications are divided into smaller, independently deployable services, managing and securing the communication between these services becomes crucial. This is where an API gateway comes into play. By Iroro Chadere.
Tags devops microservices software-architecture apis learning
-
Scientists transform everyday materials into conductors for Quantum computers
Posted on March 23, 2024, Level beginner Resource Length short
Researchers at the University of California, Irvine and Los Alamos National Laboratory, publishing in the latest issue of Nature Communications, describe the discovery of a new method that transforms everyday materials like glass into materials scientists can use to make quantum computers. The advance will allow researchers to transform everyday materials into conductors for use in quantum computers. By technologynetworks.com.
Tags ai fintech servers cloud miscellaneous big-data software-architecture
-
DevOps security: Definition, best practices
Posted on March 22, 2024, Level beginner Resource Length long
DevOps has revolutionized the way organizations develop, deploy, and maintain applications. However, upholding security in a DevOps environment is a serious concern organizations must address in order to keep software development isolated from cyber threats while maintaining agility, production speed, and cross-team collaboration. By Anastazija Spasojevic.
Tags devops infosec cloud software-architecture learning