On April 20, 2021, OpenJS released the latest major version of Node.js, Node 16.
With this even-numbered release, we see a few changes to the V8 engine, support for the new Apple Silicon processors,...
The term "GitOps" first emerged in the Kubernetes community as a way for organizations to enable Ops teams to move at the pace of application development.
With improved automation and less risk,...
Thinking about upgrading to Kubernetes v1.22? There’s a number of beta APIs that will be making their exit in the new version that could have a big impact on how your code works going forward.
It...
Have you ever needed to undo, fake, or deal with migrations more deeply than the typical python manage.py migrate? Did you find yourself opening the migration files to find out what they contained?...
On April 20, 2021, OpenJS released the latest major version of Node.js, Node 16.
With this even-numbered release, we see a few changes to the V8 engine, support for the new Apple Silicon processors,...
Here’s the scenario: You want to deploy a fancy new AWS Elastic Kubernetes Service, or EKS cluster as it’s commonly called, running the latest version of Kubernetes.
You have your Terraform all set...
When building an effective cybersecurity program it’s important to determine what information should be documented, who should own the documentation, and how the documentation should be...
Modern businesses use technology on a daily basis to function, compete, operate and grow. From payroll to purchasing and lead gen to logistics, companies leverage technology to get through the day...
There’s a monumental cybersecurity shift happening in organizations across the country. Every day, companies are transforming their operations, adopting new technologies and pushing the boundaries of...
If you pay attention to cybersecurity and networking trends, you may have heard a lot of talk about zero-trust architecture. Zero-trust was even mentioned in the Executive Order on Improving the...
On May 12th, the White House released the Executive Order on Improving the Nation’s Cybersecurity.
This order comes on the heels of the Colonial Pipeline ransomware attack that shut down...