Insights

NextLink Lab's blog covering issues related to DevOps, Full Stack Engineering, Cybersecurity, and more.

Using Elastic Cloud To Manage AWS CloudWatch Logs

Creating an efficient process for storing application logs is critical for cybersecurity and compliance. In this guide, we walk you through integrating your CloudWatch application logs with Elastic Cloud.

  • AWS
  • DevOps
  • DevSecOps
  • Cybersecurity

GitLab Global Survey Highlights a Continued Struggle with Software Testing

Resources, communication, and delays to the release of software continue to hinder software testing according to a global annual survey conducted by GitLab.

  • Software Testing
  • Custom Software Development
  • GitLab

How GitOps Goes Beyond Kubernetes

With improved automation and less risk, GitOps is quickly becoming the workflow of choice for infrastructure automation. And for GitLab, the approach to GitOps goes beyond Kubernetes.

  • Kubernetes
  • DevOps
  • GitLab

Beta APIs Disappearing from Kubernetes v1.22

Thinking about moving on to Kubernetes v1.22? Before you do, check out the list of beta APIs that will be removed -- not deprecated -- in the new version.

  • Kubernetes
  • DevOps

How to Name Django Migrations (and Why It's Important)

Migrations became a pretty popular feature with developers after being released with Django 1.7. Unfortunately, the practice of coming up with descriptive, helpful names for Django migrations hasn’t caught on quite as well. Here’s a brief on Django migrations and why you should learn to name them.

  • Custom Software Development
  • Django
  • Python

Node 15 vs. Node 16

On April 20, 2021 OpenJS released Node 16, the latest major version of one of the most popular JavaScript runtime environments. Here's what you need to know.

  • Custom Software Development
  • Node

Handling Auth in EKS Clusters: Setting Up Kubernetes User Access Using AWS IAM

Deploying a shiny new EKS cluster running the latest version of Kubernetes isn’t the hardest task in the world. On the other hand, setting up the authentication correctly can present all sorts of challenges. Here’s a guide to doing it right.

  • Authentication
  • AWS
  • EKS
  • Kubernetes
  • IAM

How Proper Documentation Can Help Improve the Effectiveness of Your Cybersecurity Program

Documenting your policies and procedures can help improve organizational situational awareness and demonstrate organizational accountability.

  • Cybersecurity
  • Security
  • Documentation
  • Information Security

Five Things to Consider When Selecting a Third-Party Technology Company

Everyday, companies of all sizes partner with third-party technology vendors to solve tough technology problems. Picking the right partner for your success is important. Here's five things we've learned about doing it right.

  • Business
  • Third-Party Vendors
  • Digital Transformation
  • Projects

5 Tips for an Effective Cybersecurity Program

The monumental shift organizations are undergoing toward a more technology-based structure introduces new risks to data and critical systems. Consider these five tips and their related activities you can use to strengthen your cybersecurity program and improve its effectiveness.

  • Cybersecurity
  • Security
  • Security Awareness
  • Information Security

What Is a Zero-Trust Architecture and How Does It Compare to Traditional Network Designs

There’s been a lot of talk lately about zero-trust architectures in the wake of the Colonial Pipeline Ransomware attack and the White House Executive Order on cybersecurity. But what is zero trust? And how does it differ from traditional methods of architecting networks?

  • Cybersecurity
  • Security
  • Network Architecture
  • ZeroTrust
  • Security Awareness
  • Information Security

What the Executive Order on Improving the Nation’s Cybersecurity Means to You

On May 12, the White House released the Executive Order on Improving the Nation’s Cybersecurity, focusing on Federal systems and resources in the wake of the Colonial Pipeline Ransomware attack. Here's how it impacts you.

  • Cybersecurity
  • Ransomware Attacks
  • Executive Order
  • Colonial Pipeline

What Can We Learn From the Colonial Pipeline Ransomware Attack?

While the brazen attack of the Colonial Pipeline is cause for alarm, it’s not surprising. One of the most important things your organization can learn from the Colonial Pipeline attack is that attacks against your organization will occur.

  • Cybersecurity
  • Ransomware Attacks
  • Colonial Pipeline

Using Sinatra to Mock Shopify API Calls in Rails Test Suites

Designing a test suite involves constant decisions about how closely to replicate your end product. When APIs are involved, things can get even more complicated. Here’s how to use Sinatra to make things easier.

  • Rails
  • Automated Software Testing
  • Custom Software Development

Shifting Left of Bang to Improve Your DevOps Security

By adopting a "Left of Bang" mentality and taking some simple proactive steps, you can improve your cyber situational awareness and keep your program safe from hackers and out of the news.

  • Security
  • Cybersecurity
  • DevSecOps

A Django Upgrade Guide for Major and Minor Releases

Getting ready to upgrade to the latest and greatest version of Django? Want to take advantage of a recent minor release? Here's how to do it without getting into trouble.

  • Django
  • Custom Software Development

Why Companies of All Sizes Should Consider Automated Software Testing

Not every company is blessed with a huge quality assurance team. In small to medium sized companies, QA is a team sport. But automated testing can go a long way to help knock out the mundane tasks and work toward continuous integration and delivery.

  • Automated Software Testing
  • DevOps

Our RuboCop Configuration for Successful Rails Projects

We've used RuboCop to help create plenty of successful projects over the years. Check out these tips for a solid RuboCop configuration and try them in your next Rails project.

  • Rails
  • Custom Software Development

Building a Kubernetes CI/CD Pipeline with GitLab and Helm

The post will show you how you can deploy your applications to Kubernetes via a CI/CD pipeline.

  • Digital Transformation
  • DevOps

React 16 vs. React 17

On October 20, 2020 Facebook released React 17, the latest version of one of the most popular JavaScript frontend frameworks. Here's what you need to know.

  • Custom Software Development
  • React

Most Common Types of Technical Debt in Rails

Rehabing older Rails projects often leads to uncovering quite a bit of technical debt. Here's the most common kinds of tech debt you run into and how to fix it.

  • Rails
  • Custom Software Development

Finding The Opportunity in Uncertainty in Custom Software Development

'Am I Doing This Right?' It’s a question every software developer, project manager, or business owner asks at least once in their careers. How it’s handled can be the difference between growth and stagnation, success and failure.

  • Custom Software Development

5 Emerging DevOps Trends to Watch in 2021

In terms of work and technology, 2020 was a transformative year for companies and the country alike. Here's the DevOps trends we're tracking for 2021.

  • DevSecOps
  • Digital Transformation
  • DevOps
  • Cybersecurity

Improving Django View Performance with Async Support

Django 3.1 provides support for asynchronous views, allowing developers to make signifcant performance improvements.

  • Django 3.1
  • Django
  • Python
  • API
  • Performance

6 Things to Do When Inheriting Legacy Rails Apps

Becoming the owner of a legacy Rails app can mean inheriting a project bogged down with tech debt, bugs, and sketchy documentation. Here's how to survive it.

  • Full Stack Engineering
  • Rails
  • Project Work
  • Legacy Code
  • Technical Debt

HashiCorp Boundary: A Game Changing Infrastructure Access Solution

For companies like NextLink Labs that operate at the heart of DevOps and Security, Boundary is a game-changing infrastructure security solution.

  • HashiCorps
  • Boundary
  • DevSecOps
  • Digital Transformation
  • DevOps
  • Cybersecurity

The Critical Role of Cybersecurity in the Digital Transformation

Cybersecurity and privacy should be priorities for every company when pursuing a digital transformation to maintain security and privacy in the modern digital marketplace.

  • DevSecOps
  • Digital Transformation
  • Cybersecurity

Terraform Infrastructure as Code Basics

The second of our multipart series featuring Terraform. Here we will focus on some of the basics of using as Terraform to build and manage infrastructure.

  • Digital Transformation
  • DevOps

Efficient Iteration of Big Data in Django

Learn some memory optimization tips for working with Django QuerySets.

  • Django
  • Memory
  • Big Data

Growing and Scaling a SaaS Product or Development team

NextLink Labs CEO Jordan Saunders discusses maturing a software organization through looking at their DevOps and Cybersecurity Maturity Assessments

  • Digital Transformation
  • DevOps
  • Cybersecurity

Introduction to Terraform and Infrastructure as Code

The first of our multipart series featuring Terraform. In this article we go over the benefits of infrastructure as code and introduce Terraform

  • Digital Transformation
  • DevOps

DevOps Fuels the Digital Transformation Journey

DevOps is more than a buzzword, it fuels the Digital Transformation journey

  • Digital Transformation
  • DevOps

No Code and Low Code Platforms

NextLink Labs CEO Jordan Saunders discusses No and Low Code Platforms

  • Digital Transformation
  • DevOps
  • Cybersecurity
  • NoCode

Serverless contact form using AWS Lambda, API Gateway, and SES.

Learn how to quickly set up a serverless email contact form for your website.

  • Digital Transformation
  • DevOps

Building a CI/CD pipeline for your website with GitLab.

In this article we run through how to build and configure a CI/CD pipeline to deploy your business's website using AWS, Terraform & Gitlab

  • Digital Transformation
  • DevOps

Digital Transformation Strategies for Organizational Change

Digital Transformation is just the 2019 version Organizational Change in our increasingly digital world

  • Digital Transformation
  • DevOps
  • Cybersecurity

NextLink Labs Digital Transformation Podcast Series Episode 4

NextLink Labs CEO Jordan Saunders discusses what successful software teams have in common

  • Digital Transformation
  • DevOps
  • Cybersecurity

NextLink Labs Digital Transformation Podcast Series Episode 3

NextLink Labs CEO Jordan Saunders brings on special guest Will Sweeney from Cybersecurity Compliance firm Zaviant to discuss our changing security and privacy landscape.

  • Digital Transformation
  • DevOps
  • Cybersecurity

NextLink Labs Digital Transformation Podcast Series Episode 2

NextLink Labs CEO Jordan Saunders talks about the basics of DevOps to drive digital transformation across IT projects.

  • Digital Transformation
  • DevOps

NextLink Labs Digital Transformation Podcast Series Episode 1

Jordan Saunders of NextLink Labs kicks off a new TechVibe Radio Podcast Series to explore all things Digital Transformation.

  • Digital Transformation
  • DevOps

Take our free DevOps and Cybersecurity Readiness Assessment

Take Our Assessment