
AWS Mainframe Migration Service
https://aws.amazon.com/mainframe/ AWS announced the general availability of AWS Mainframe Modernization, a new service that makes it faster and easier for cust…
Read More »

https://aws.amazon.com/mainframe/ AWS announced the general availability of AWS Mainframe Modernization, a new service that makes it faster and easier for cust…
Read More »
APIs provide the standardized contract that was missing from the SOAP environment. SOAP messaging and related protocols were used in the monolithic Service Bus…
Read More »
There are four levels of DR protection in AWS. DR patterns: From least costly and complex to most. 1-Backup and restore. Admins typically choose this option fo…
Read More »
Both Kubernetes and Docker are used to deploy and manage containers. Often Docker Containers run applications within Kubernetes (K8s) node clusters. Usually th…
Read More »
Here are five areas where teams can add automated security checks into development pipelines. 1. Code quality (SAST) Perhaps the control that springs to mind f…
Read More »
Use Case: Migrate System APIs or SAPIs from Mule to Kong Gateway. Models: There are 2 basic deployment models when using an API gateway and SAPIs. 1-Gateway + …
Read More »
A common Cloud pattern especially with a container deployment model, is to use a side car in which we deploy components of an application into a separate proce…
Read More »
Cloud native is a target model for most firms. Cloud native refers to using the native services and API integrations, along with the platform’s native PaaS off…
Read More »
What is Amazon Athena? Amazon Athena is a cloud-based query service for large-scale data analysis. Buyers of the product can use standard SQL to prepare and an…
Read More »
Zero trust initially focused on segmenting and securing the network across location and hosting models. Today, however, to be successful, zero trust must also …
Read More »
As the above diagram indicates, there are 6 deployment options, for Containers in AWS. It is rather confusing. The deployment model will depend on use cases, s…
Read More »
Role-Based Access Control (RBAC) is a security mechanism in which each access authorization is based on roles that are assigned to a user. With this system, it…
Read More »