Articles : Featured

8 MINUTES

Best Back-End Frameworks For Security

by Mark Trent on Security • May 19, 2022

In previous articles, we reviewed some popular high-performance front-end and back-end frameworks. These articles focus on how these frameworks have been developed for high-performance. Here we will look at back-end frameworks that offer developers and product managers highly secure features for application development.

Read More →
5 MINUTES

Do I Need Kubernetes?

by Dave Blakey on DevOps • May 18, 2022

Kubernetes is a popular tool for container orchestration. But why are so many companies choosing to use Kubernetes, and what benefit does it offer software development and DevOps teams?

Read More →
6 MINUTES

Best Practices for Building Scalable Applications

by Iwan Price-Evans on Scalability • May 10, 2022

The Internet and web applications have enabled businesses to scale like never before. Previously, a business’s physical footprint restricted it to a particular market, and simple logistics limited the number of transactions per day. A similar company can now create web applications that serve a global audience and process thousands of concurrent transactions. But is this scale available to every business?

Read More →
7 MINUTES

Efficient GRC with cybersecurity tooling

by Iwan Price-Evans on Security • May 5, 2022

“Governance, risk, and compliance” (GRC) might be dirty words for many people working in application development and delivery. Strict rules and processes can be obstacles to innovation or meeting project deadlines. However, with security failures causing downtime, lost revenue, leaked customer and proprietary information, and hefty regulatory fines, application teams cannot afford to ignore GRC measures designed to limit the probability and potential for harm.

Read More →
4 MINUTES

How To Test Application Security

by Craig Risi on Security • April 20, 2022

We constantly read about leaks and security attacks that hit well-known applications. Businesses cannot take security for granted. With so much critical data in play, they must prioritize application security and the process of identifying security flaws to ensure apps are safe. 

Read More →
5 MINUTES

Designing Secure Applications

by Iwan Price-Evans on Tips and Tricks • April 7, 2022

Hackers, malware, cybercriminals, and more threaten modern applications constantly. Malicious actors will try to uncover and exploit any vulnerabilities to steal private data, disrupt your service, and more. When designing our applications, we must prevent or mitigate these potential vulnerabilities as early as possible. Identifying and fixing security gaps late in the development process can be very expensive. Many of the biggest vulnerabilities arise from poor design and require significant effort to resolve. You can avoid wasting time and resources by following the correct principles in the application design phase.

Read More →
12 MINUTES

Load Balancing For Blue-Green, Rolling, and Canary Deployment

by Armand Sultantono on DevOps • March 29, 2022

The most significant difference in software development today compared to the past is the rate of deployments: development teams release software to production earlier and more frequently. Customers want more, and they want it now. However, they are quick to leave you for the competition when things go wrong. According to research, 32% of all customers would desert a company they liked after one bad experience.

Read More →

Subscribe via Email

Get daily blog updates straight to your email inbox.

We care about the protection of your data. Read our Privacy Policy.

You have successfully been subscribed!