Thinking about moving on to Kubernetes v1.22? Before you do, check out the list of beta APIs that will be removed -- not deprecated -- in the new version.
Migrations became a pretty popular feature with developers after being released with Django 1.7. Unfortunately, the practice of coming up with descriptive, helpful names for Django migrations hasn’t caught on quite as well. Here’s a brief on Django migrations and why you should learn to name them.
Deploying a shiny new EKS cluster running the latest version of Kubernetes isn’t the hardest task in the world. On the other hand, setting up the authentication correctly can present all sorts of challenges. Here’s a guide to doing it right.
Documenting your policies and procedures can help improve organizational situational awareness and demonstrate organizational accountability.
Everyday, companies of all sizes partner with third-party technology vendors to solve tough technology problems. Picking the right partner for your success is important. Here's five things we've learned about doing it right.
The monumental shift organizations are undergoing toward a more technology-based structure introduces new risks to data and critical systems. Consider these five tips and their related activities you can use to strengthen your cybersecurity program and improve its effectiveness.
There’s been a lot of talk lately about zero-trust architectures in the wake of the Colonial Pipeline Ransomware attack and the White House Executive Order on cybersecurity. But what is zero trust? And how does it differ from traditional methods of architecting networks?
On May 12, the White House released the Executive Order on Improving the Nation’s Cybersecurity, focusing on Federal systems and resources in the wake of the Colonial Pipeline Ransomware attack. Here's how it impacts you.
While the brazen attack of the Colonial Pipeline is cause for alarm, it’s not surprising. One of the most important things your organization can learn from the Colonial Pipeline attack is that attacks against your organization will occur.
Designing a test suite involves constant decisions about how closely to replicate your end product. When APIs are involved, things can get even more complicated. Here’s how to use Sinatra to make things easier.
By adopting a "Left of Bang" mentality and taking some simple proactive steps, you can improve your cyber situational awareness and keep your program safe from hackers and out of the news.
Getting ready to upgrade to the latest and greatest version of Django? Want to take advantage of a recent minor release? Here's how to do it without getting into trouble.
Not every company is blessed with a huge quality assurance team. In small to medium sized companies, QA is a team sport. But automated testing can go a long way to help knock out the mundane tasks and work toward continuous integration and delivery.
We've used RuboCop to help create plenty of successful projects over the years. Check out these tips for a solid RuboCop configuration and try them in your next Rails project.
The post will show you how you can deploy your applications to Kubernetes via a CI/CD pipeline.
Rehabing older Rails projects often leads to uncovering quite a bit of technical debt. Here's the most common kinds of tech debt you run into and how to fix it.
'Am I Doing This Right?' It’s a question every software developer, project manager, or business owner asks at least once in their careers. How it’s handled can be the difference between growth and stagnation, success and failure.
In terms of work and technology, 2020 was a transformative year for companies and the country alike. Here's the DevOps trends we're tracking for 2021.
Django 3.1 provides support for asynchronous views, allowing developers to make signifcant performance improvements.
Becoming the owner of a legacy Rails app can mean inheriting a project bogged down with tech debt, bugs, and sketchy documentation. Here's how to survive it.
For companies like NextLink Labs that operate at the heart of DevOps and Security, Boundary is a game-changing infrastructure security solution.
Cybersecurity and privacy should be priorities for every company when pursuing a digital transformation to maintain security and privacy in the modern digital marketplace.
The second of our multipart series featuring Terraform. Here we will focus on some of the basics of using as Terraform to build and manage infrastructure.
Learn some memory optimization tips for working with Django QuerySets.
NextLink Labs CEO Jordan Saunders discusses maturing a software organization through looking at their DevOps and Cybersecurity Maturity Assessments
The first of our multipart series featuring Terraform. In this article we go over the benefits of infrastructure as code and introduce Terraform
DevOps is more than a buzzword, it fuels the Digital Transformation journey
NextLink Labs CEO Jordan Saunders discusses No and Low Code Platforms
Learn how to quickly set up a serverless email contact form for your website.
In this article we run through how to build and configure a CI/CD pipeline to deploy your business's website using AWS, Terraform & Gitlab
Digital Transformation is just the 2019 version Organizational Change in our increasingly digital world
NextLink Labs CEO Jordan Saunders discusses what successful software teams have in common
NextLink Labs CEO Jordan Saunders brings on special guest Will Sweeney from Cybersecurity Compliance firm Zaviant to discuss our changing security and privacy landscape.
NextLink Labs CEO Jordan Saunders talks about the basics of DevOps to drive digital transformation across IT projects.