This article is intended to present a concise illustration of how to configure a CI/CD process for Mule Applications using AWS Source Code engines. Read all
The hacker world can be contingently divided into three groups: the “skids”, “buyers”, and “black had coders”. Find out how to utilize your skills! Read all
We explore several Amazon Web Services (AWS) billing disasters and introduce risk mitigation tools including budgets, alarms, and AWS Single Sign-On (SSO). Read all
In this post I describe the various steps that allowed me to reach 3.6 million queries per second on a single VM using MySQL 8.0 with the help of Dynimize. Read all