The structure and siloing of a large enterprise organization can thwart security efforts. Here is a tip on how to overcome.
Keeping deployed web applications up-to-date is imperative to prevent data breaches. Here's how to use automated testing of custom web application software to patch quickly after a support chain vulnerability is publicly disclosed.
How Rietta planned and implemented a multi-step process to fully migrate a monolithic on-prem Rails application to the the AWS cloud using Docker, AWS Elastic Container Service, the AWS Secrets Manager, and more.
How Rietta built a complex document solution that seamlessly deploys to AWS using purely open source technology.
A five tips and tricks I've built up working daily with Docker professionally for three years.
Systematic investment in Docker is paying off big time. From a agency owner's perspective this is why the up front investment was worth it.
Running multiple Docker images locally can eat up a lot of disk space. Computers with smaller hard drives will have a problem keeping up. We can mitigate this issue by setting up an encrypted external ssd to run our Docker images and free up local disk space
Learning object-oriented programming is a fundamental piece of computer science education. But is C/C++ the best environment to do it in?
Technology changes, application functionalities will be deprecated and vulnerable to security threats. This is why consistent, and proper maintenance is essential.
Stay on top of vulnerabilities by automating security scans with workflow schedules