Blog

Application Transformation
Database Design for High end Applications

Database design for high end applications Many applications today are data-intensive, not CPU intensive.  Raw unlimited CPU power is rarely an architectural or application limiting phenomenon for most applications.  Raw CPU power is rarely a

Read More >>
AWS Technology
AWS Migration Services summary

AWS Migration Services AWS Migration Hub AWS Application Discovery Service AWS Database Migration Service AWS Server Migration Service AWS Snowball AWS Snowball Edge AWS Snowmobile AWS DataSync AWS Transfer for SFTP     1-AWS Migration

Read More >>
Enterprise Architecture
Enterprise Architecture as a Service project example

Building a robust infrastructure and deployment model in AWS requires having a team with knowledge and skills (Agile based) including:  an Enterprise Architect, Solutions Architect, Application and Database Engineer(s), Testing, Security, Networking, a Business Owner

Read More >>
cloud security
AWS Technology
AWS Security Links and Resources

AWS Security Links and Resources to understand Security complexity   Security   AWS Cloud Adoption Framework Security Perspective https://d1.awsstatic.com/whitepapers/AWS_CAF_Security_Perspective.pdf AWS Security Documentation https://docs.aws.amazon.com/security/   Amazon Web Services: Overview of Security Processes https://d0.awsstatic.com/whitepapers/aws-security-whitepaper.pdf– AWS Well-Architected Security Labs https://wellarchitectedlabs.com/Security/README.html Security

Read More >>
AWS News
Modern Apps Live: Learn Serverless, Containers and More in May

Modern Apps Live is a series of events about modern application development that will be live-streaming on Twitch in May. Session topics include serverless, containers, and mobile and front-end development. If you’re not familiar, modern applications are those that: Can scale

Read More >>
Application Transformation
12 Factors and the Strangler Pattern

12 Factors and the Strangler Pattern     Cloud native builds will mean that legacy applications, will need to be rebuilt to fit into cloud patterns.  An example of a pattern to use to rebuild

Read More >>