
Surviving Ransomware attacks
Understanding infrastructure ransomware Ransomware is a type of malware that targets anything it can get into — including backups — to steal or loc…
Read More »

Understanding infrastructure ransomware Ransomware is a type of malware that targets anything it can get into — including backups — to steal or loc…
Read More »
What are they? Backend cloud services are the operations and routines end users don’t see but are essential to provide resilience and secure access to ba…
Read More »
Resiliency in the Cloud is composed of many areas including: Failover (instances, servers) High Availability (multi-zones, regions) Backup Disaster Recovery (p…
Read More »
Many large firms, especially Banks and Financial Institutions are moving to a Mainframe-Multi Cloud model of computing. This is a long term effort still in tra…
Read More »
APIs provide the standardized contract that was missing from the SOAP environment. SOAP messaging and related protocols were used in the monolithic Service Bus…
Read More »
There are four levels of DR protection in AWS. DR patterns: From least costly and complex to most. 1-Backup and restore. Admins typically choose this option fo…
Read More »
A common Cloud pattern especially with a container deployment model, is to use a side car in which we deploy components of an application into a separate proce…
Read More »
Cloud native is a target model for most firms. Cloud native refers to using the native services and API integrations, along with the platform’s native PaaS off…
Read More »
Cloud is King, but at times the myths around the King are difficult to comprehend. The ‘Cloud’ is a complete OSI stack and platform and there are extraordinari…
Read More »