NoSQL: Enhancing Speed, Reliability, and Security

Software Engineering Infrastructure projects, particularly those deemed critical, often require data management surpassing traditional relational databases’ conventional capabilities. As the world embraces digitalization and the interconnectivity of devices, data, and services, the constraints of relational databases become increasingly palpable. Transitioning to NoSQL databases can offer a resounding answer to many of these challenges. This post explores … Read more

Cloud Load Balancers

Cloud offers different types of cloud load balancers that can be divided into two categories: global and regional. The global load balancers are the HTTP(S), SSL proxy, and TCP proxy load balancers. These load balancers leverage the Cloud Front End (FE) service. FE is a software-defined, distributed system that is available from global points of … Read more

Foundations of Cloud Security

Security empowers innovation. If you put security first, everything else will follow. Designing for security is pervasive throughout the cloud infrastructure that services run on. This is vital to adopt a foundations of cloud security at the first steps of your cloud journey. Security is always paramount! Countless companies and governments have lost data because … Read more

Designing SMART key performance indicators (KPI)

With a set of requirements in place, we will now move on to consider how to measure whether the technical and business requirements have been met. To manage a service well, it is important to understand which behaviors matter, and how to measure and evaluate these behaviors. These must always be considered in the context … Read more

Security Logging in the Application Development Lifecycle

Security logging is a fundamental aspect of application development that safeguards our software against threats and vulnerabilities. Let us explore the significance of security logging in the application development lifecycle, where it should be implemented, what information should be logged, and why it is essential for the security and integrity of your applications. Why is … Read more