Understanding Kubernetes Resource Types

Before we dive into Kubernetes resources, let’s clarify what the term “resource” refers to here. Anything we create in a Kubernetes cluster is considered a resource: deployments, pods, services, and more. However, Kubernetes’s primary resources are CPU and RAM. Kubernetes also includes some other resource types, like ephemeral storage and extended resources. One aspect of […]

Use Hazelcast to Share Data Between Legacy ASP.NET Apps and ASP.NET Core Apps

Many enterprises spent millions of dollars developing what have become legacy ASP.NET applications. They can’t afford to abandon them. But porting the code to ASP.NET Core, the only web framework Microsoft will continue developing and supporting, requires a substantial rewrite. As a result, many enterprises with .NET teams have started building new functionality in an […]

How to Set Up Detectron2 in SageMaker

Object detection is a computer vision task that detects an object’s type and location in an image. It surrounds a detected object with a bounding box and assigns it a class label. Segmentation and object detection has many use cases in industries ranging from retail to healthcare to self-driving vehicles. Despite their wide range of […]

SAST vs. DAST: Differences and when to use them

Security threats are becoming commonplace as digital transformation accelerates and more organizations use software solutions to facilitate work operations. Cybercriminals continually develop ways to exploit software application vulnerabilities to enter a target organization’s network. A notable example is the 2017 Equifax data breach, which exposed the personal details of 145 million Americans. Testing ensures software […]

Developing Unique Customizations with TomTom APIs

Digital mapping SDKs and APIs are great. They let us embed maps in our web and mobile apps with only a few lines of code. And, with just a few lines more, we can add trip routing and even live traffic to our apps. But what if we want to do something out of the […]

Quickly Spin Up New Development Projects with Awesome Compose

Containers optimize our daily development work. Containerized applications are standardized so we can easily switch between development environments, migrating to a test or reusing the same container images for our production workloads. However, a challenge arises when we need to use more than a single container. For instance, we may develop a web front end […]

Presenting Headless Content as Print Mail

Headless content management systems (CMSs) are ideal for businesses to decouple content from presentation. A headless CMS often reformats the same content for display across a variety of channels. The headless CMS stores content separate from the code that builds the presentation layer (head) and delivers content to any channel, usually using a REST API. […]

Is Multi-Cloud a Cost-Effective Approach?

As the use of cloud technology has expanded over the past several years, so has the number of vendors. This trend has provided us with a wide variety of services and providers. Some of these providers offer specialized services or focus on a geographic region to differentiate themselves from their competition. This is one reason […]

How to Approach Multi-Clouds: Cloud-Native or Cloud-Agnostic?

As the IT industry transitions into the cloud, organizational decision-makers face the challenge of committing resources in a rapidly changing field. Investments might decay into obsolescence in only years. Developers working to advance state-of-the-art technologies in this environment deploy various new strategies for creating flexible, resilient, and portable services. But, the pace of innovation has […]

5 Unexpected Insights You Can Learn from an Access Management Audit

Modern systems and applications, particularly within the cloud, rely heavily on access and privileges to ensure that the correct users and systems have the access they require. However, users change roles over time, while organizations add and remove systems and components. As a result, these access controls can easily become stale or unsuitable. Auditing the […]