Exploratory Programming: Challenges and Keys to Success

Read all

Microservices With Apache Camel and Quarkus (Part 2)

Take a look at a scenario to deploy and run locally the simplified money transfer application presented in part 1 as Quarkus standalone services. Read all

iOS First, Android Later (or Never)

Read all

Kubernetes Resource Limits: How To Make Limits and Requests Work for You

Learn to define resource limits and requests in Kubernetes, a key strategy to minimize cloud waste and effectively reduce your cloud expenditure. Read all

GitHub Restore and Disaster Recovery: Better Get Ready

This article covers all the aspects concerning building a reliable and agile Disaster Recovery (DR) strategy. Read all

Commonly Occurring Errors in Microsoft Graph Integrations and How To Troubleshoot Them (Part 5)

The last article of this series covers two use cases of reading attachment content as to the resource type Microsoft To-Do Tasks and Events via MS Graph APIs. Read all

Getting Started With Kubernetes-Native CI/CD Pipelines

Setting up CI/CD for Kubernetes is challenging. In this blog, the author walks through the process of creating k8s-native CI/CD pipelines using Devtron. Read all

How To Optimize Native Android Positioning for High Precision and Low Power Consumption

In this article, I will describe how to equip an app with the power to obtain the accurate position of the user device. Read all

GitStream vs. Code Owners vs. GitHub Actions

Looking to streamline your GitHub pipeline but unsure where to start? Find out when to use gitStream vs. code owners vs. GitHub Actions. Read all

Integrating Cloud-Based Applications, Kafka Middle-Ware/Data Streams, CRM, and Snowflake Data Warehouse in IT Architecture for Small and Medium Enterprises

Read all

Why Use AWS Lambda Layers? Advantages and Considerations

If you don't use layers for your AWS Lambda function, it's time to reconsider it. This article will give you a glimpse into the implementation of Lambda layers. Read all

The Importance of Middleware in Integrating CIS and GIS Systems

Learn how middleware facilitates seamless integration between Customer Information Systems (CIS) and Geographic Information Systems (GIS) in utility management. Read all

Enhancing Cloud Cybersecurity for Critical Infrastructure Protection

Cloud computing not only enhances infrastructure but also raises security risks. Developers must secure systems with zero trust, automation, and collaboration. Read all

 

 

 

 

Top