Writing samples from awesome tech brands
#Kubernetes #Cybersecurity #Multicloud #Devops #InsurTech #FinTech #DigitalTransformation
FUME - Take The Fast Track To FHIR® Compliance [Landing Page]
Product messaging development & landing page copy | Healthcare interoperability
Security Remediation Game of Tag: You are It!
Ah, Security Remediation. The game of tag we all know and love. Security teams “tag” Devs, DevOps, or IT teams with a security finding to fix, and then Devs put it at the very bottom of their to-do list as an issue to get to “someday.” Finally, a Dev gets around to fixing it… but wait! Security team didn’t tell them the specifics of what needs to be done! Back to the bottom of the pile, it goes. Thus begins this endless game of Security Remediation tag that leads to long security backlogs and increased friction between Security and Dev teams.
All I want for 2023 are improved security SLAs
It’s that time of the year again. With 2022 behind us, you are probably considering your new year’s resolutions and setting your security team’s goals for 2023.
[Website Copy] Great products deserve great design
A complete messaging and website copy revamp for an amazing design studio! 🌟
Messaging & Copy
[Ebook] Database Delivery Automation Playbook
Learn everything you need to know about implementing database delivery automation in your organization [Ebook]
[Ebook] Transforming forms into digital journeys 40 Questions to get you started
We've outlined 40 questions that will help you get started on your form transformation journey. By answering these questions, you'll be able to better understand what you need to do and where to start.
[Ebook] The Digital FNOL Playbook for Insurance CIOs
This in-depth playbook takes you through the digital FNOL (First Notice of Loss) process end-to-end, identifying key points where insurers can support their customers during claim initiation, and diving into industry best practices and use cases.
Database Delivery Automation Brochure
Introducing Database Delivery Automation with DBmaestro
Database Delivery Automation
[Ebook] How to Improve User Experience in Digital Claims. In-depth Guide for Insurers
We're going to take a deep dive into the importance of user experience in the digital claims world - from understanding what UX means for this industry, to making sure you have great customer service agents who are well-trained on UX best practices.
Disinformation-as-a-Service: Content Marketing’s Evil Twin
Are you tired of all the BS out there on the internet? It's about to get A LOT worse. Dirt-cheap disinformation-as-a-Service campaigns are a thing now. And threat actors can target anyone.
DevOps Expert Talks: Ask Me Anything With Moshe Belostotsky
In this Q&A session with Moshe Belostotsky, Director of DevOps at Tomorrow.io, we dive into the changing role of DevOps and how security considerations are changing the way software is being built and delivered.
Why Do You Need Database Version Control?
The database is an important aspect that is left out of the agile development process. In this article, we will see what you can achieve by implementing database source control into your CI/CD pipeline.
How Streamlining Access Leads To Productive Development Teams
Does your access management hurt your team's productivity? It does.How do we know? Let's look at the data.
Identity and Accesss Management
The importance of application security: keeping your web apps safe
Web application security is crucial for any organization that relies on web-based applications. Learn about the importance of web application security and best practices for keeping your organization safe.
Read our latest discoveries on digital transformation and building excellent customer experiences.
Effective Privilege Management in the Cloud - Mission Impossible?
TLDR: Overprivileged access is a natural consequence of manually granting and revoking access to cloud assets and environments. What DevOps teams need are tools to automate the process. Apono automatically discovers cloud resources and their standing privileges, centralizing all cloud access in a single platform so you don't have to deal with another access ticket ever again.
Identity and Access Management
Cloud agnostic strategy - the good, the bad, and the impossible
Having a cloud-agnostic strategy means your company does not rely on a single cloud vendor but instead uses multiple vendors to ensure business continuity. This approach has both benefits and drawbacks. Let’s take a look at both.
K8s Declarative Infrastructure and Where Data Fits In
Can data in Kubernetes become declarative, just like its infrastructure? Uri Zaidenwerg explores.
Unlocking the Benefits of Kubernetes for Multicloud
Even though multicloud has many benefits, it is less popular among K8s users. What are the challenges K8s users are facing and how can they be resolved? Michael Greenberg explores in this post.
Put a PIN in that: why passwords vs. PINs comparisons are irrelevant
Both PINs and passwords suffer from the same fundamental flaws – they still rely on human beings and “something they know” to authenticate users. Ultimately there isn’t a difference since all connected services rely on passwords, and a PIN is still just “something you know.” Both methods are inferior to passwordless authentication, and here is why.
Standardization in Kubernetes – What About the Data?
Can standardization in Kubernetes apply to data as well? Is it possible to make data in Kubernetes declarative, just like the application layer? Michael Greenberg explores in this article.
Managing Kubernetes complexity challenges
While Kubernetes is becoming the de-facto standard for container orchestration and management, it also has its shortcomings. According to the 2020 CNCF survey, the #1 challenge in K8s deployment is complexity. Why is Kubernetes complex to use and deploy and what are some best practices to handle its complexity? Uri Zaidenwerg explores these topics further in this article.
Cloud adoption and business continuity in the covid-19 era
More businesses are now pursuing cloud computing and digital transformation to cope with the volatility of the times and to take advantage of the possibilities brought forward by the “new normal”.
More Cloud Regions = Better Business Continuity
Setting up your business environment in multiple regions would assist with disaster recovery and business continuity. Unfortunately, the task of becoming cloud-agnostic is often too complex and prohibitively expensive to achieve for many organizations. Luckily, with the right tools, achieving multicloud and multi-region business continuity doesn’t have to be a difficult or expensive task.
Principles of Resilience, Availability, and Data Protection for Kubernetes Deployments
Kubernetes is becoming increasingly popular among developers looking to deploy stateful apps. K8s users have to confront the issue of what to do with their data. This blog will go through three critical criteria for any deployment: resilience, availability, and data security, and how it all relates to your application state.
What is High Availability in the Public Cloud?
To achieve high availability in the public cloud, most cloud providers offer SLAs with a 99.999% uptime guarantee. For many applications, this arrangement is good enough. But when latency, availability, and control are critical, enterprises are still hesitant to move their workload to the cloud. And for a good reason – the cloud still has availability and assurance problems. Can Public Clouds Reach the Same Level of Availability as On-Prem SLAs?
Mission Possible: Operational Flexibility in the Public Cloud
IT operators need to know they don’t need to be bound to only one cloud offering. They can operate with more control of their data by utilizing options that allow for data flexibility and portability across multiple clouds. Here we discuss how to achieve operational freedom in the public cloud.
Why RPO is the most important KPI in your data resiliency strategy
The recovery point objective (RPO) measures how frequently backups are being performed – every 5 minutes? 5 hours? A whole day? It represents how up-to-date recovered data will be.
Kubernetes + data agility = application mobility
With Kubernetes, you can easily deploy your entire microservice infrastructure and service mesh in minutes, just by applying your configuration to a Kubernetes cluster. But what if you need to change locations or move to another cloud vendor? How can you move all your data to a new location without interrupting service for customers? We’ll discuss how you can achieve data agility and application mobility for stateful applications on Kubernetes.
Database DevOps – Where Do I Start?
Most organizations have adapted automated DevOps pipelines to handle application code, deployments, testing, and infrastructure configurations. However, database development and administration are left out of the DevOps process and handled separately, creating many issues. The time has come to change that.
Database delivery automation with GitLab: a deep dive
Continuous Integration and Continuous Delivery(CI/CD) has become the backbone of a good DevOps pipeline.
It stands to reason that you need to include all aspects of development into a proper DevOps pipeline with CI/CD to respond to rapidly evolving development requirements.
However, one critical aspect is often left out of a DevOps pipeline. The database.
How to Improve Collaboration Between Dev and DBA Teams with Database DevOps
When it comes to application development, databases are often left out of the DevOps pipeline and managed separately. However, it is no longer possible to maintain the application and the database as two separate entities with ever-increasing application complexity and the growing need for proper data management and storage.
A guide to stateful Kubenetes: fedration and multi-cluster explained
Stateless applications enjoy the true benefits of multi-cluster and federated Kubernetes, but the story is different for stateful applications. How can you ensure that your stateful applications will run consistently? Read our guide to learn more.
Four most common Kubernetes challenges and how to overcome them
The ease of using Kubernetes is a huge advantage for users, but it comes with its own set of challenges. What are some of the most common problems organizations face in their Kubernetes journey?
Supply-Chain Risks Reduction with Industrial IoT
The aftershocks of the ongoing pandemic make it obvious that it is impossible to properly respond to a crisis of this order of magnitude without establishing a transparent view of the multi-tier supply chain. Here is the three-step process to achieve just that.