Category: News

Microservices vs Monolithic

  written by Hitesh Kumar   What is Microservice Application Architecture? Microservice application architecture comprises a combination of small and self-sufficient services where each service is self-contained. In microservice architecture, every service must be deployed as a single business component and operated independently. This architecture has become a popular choice

View Now »

Automated Kubernetes Deployment using Tanzu Kubernetes Grid

written by Billy Downing What is Tanzu Kubernetes Grid: Architecture? Tanzu Kubernetes Grid (TKG) is an implementation of several open-source projects to provide automated provisioning and lifecycle management of Kubernetes clusters. These include: ClusterAPI Calico CNI (as well as exploring Antrea at the time of writing) kubeadm vSphere CSI etcd

View Now »

AWS QuickSight for Fast Business Analytics

Written by Hitesh Kumar In the current data-driven age, the importance of data, and the potential of data-driven processes and systems continue to grow. Every Enterprise wants to take the advantage of data-driven verdicts to stay one step ahead of the competition. We use and understand the importance of data

View Now »

Continuous Integration and Continuous Delivery (CI/CD)  

written by Nathan Bennet Code updates can be very frustrating. Having spent time on the operations side of a code deploy, it is always difficult for an engineer to perform updates without the developer handy. Then, the question of who performs the code updates arises. The operations team would protest

View Now »

Securing the Healthcare Supply Chain

Who is attacking the healthcare industry?   Advancements in technology have offered healthcare an opportunity to save lives and operate efficiently.  This technology has created vulnerabilities to threats that infiltrate, steal, or hijack networks of confidential data and systems.  Whatever the reason for the threat, hospitals and medical facilities are targeted using a different variety of methods.  Ransomware, phishing, and other nefarious software loaded into medical equipment, infiltrate networks that could potentially

View Now »

A Single Source of Truth

by Nathan Bennett Having worked in vRealize automation for the past 5 years, one thing is for sure; nothing hurts as much as your blueprint or module being lost. Solutions utilizing maven to upload to GitHub never worked. So, you take a risk. Each day was spent hoping that nothing bad would

View Now »

Know Your Resellers to Ensure a Secure Supply Chain

As threats continue to grow around a secure supply chain, reducing the potential for risks is paramount when procuring products and services.  The reseller environment can be most vulnerable if risk assessment and appropriate vetting of vendors do not receive the attention it should.  Security is still the number one concern of the

View Now »

Technology Triage Saves Damaged Devices Without Warranty

It is inevitable, a device breaks just after the warranty expires or it suffers damages that are not covered. Triage is defined as “the assignment of degrees of urgency to wounds or illnesses to decide the order of treatment of a large number of patients or casualties.” Just like people,

View Now »