Secrets Management with .NET Core
Since the earliest attempts at application development, programmers have needed to include credentials as part of their application. Connecting an…
Since the earliest attempts at application development, programmers have needed to include credentials as part of their application. Connecting an…
The role of the developer has changed a great deal in recent years. Application architectures now include microservices, distributed systems,…
Microservices are taking the world by storm, and the movement isn’t showing signs of slowing down any time soon. The…
Over the past decade, software development and information technology operations have become more integrated, spawning a new approach, commonly called…
Ansible is an agentless management tool that can manage provisioning, configuration, and deployment of applications. RedHat acquired Ansible in 2015…
The SSH or Secure Shell protocol has become the industry standard for logging into one computer from another. Engineers use…
Over the past decade, my career has evolved from Development to DevOps and most recently to DevSecOps. DevSecOps is the result of organizations…
In this article, we’re going to talk about the problems surrounding authorization for your AWS account. We’ll define what those…
The DevOps culture shift and the move to continuous integration and deployment have required different tooling and utilities than previous…
2015 wasn’t very long ago, but when we look at significant events in computing, that was the year that the…
The Internet of Things, or IoT, is what allows us to take the power of computing beyond desktops, servers, and…
Back when I first became a programmer, it was a common practice to include database credentials right in the code…