top of page

Writing samples from awesome tech brands

#Kubernetes #Cybersecurity #Multicloud #Devops #InsurTech #FinTech #DigitalTransformation

FUME - Take The Fast Track To FHIR® Compliance [Landing Page]

Product messaging development & landing page copy | Healthcare interoperability

Healthcare

Security Remediation Game of Tag: You are It!

Ah, Security Remediation. The game of tag we all know and love. Security teams “tag” Devs, DevOps, or IT teams with a security finding to fix, and then Devs put it at the very bottom of their to-do list as an issue to get to “someday.” Finally, a Dev gets around to fixing it… but wait! Security team didn’t tell them the specifics of what needs to be done! Back to the bottom of the pile, it goes. Thus begins this endless game of Security Remediation tag that leads to long security backlogs and increased friction between Security and Dev teams.

Cybersecurity

All I want for 2023 are improved security SLAs

It’s that time of the year again. With 2022 behind us, you are probably considering your new year’s resolutions and setting your security team’s goals for 2023.

Cybersecurity

[Website Copy] Great products deserve great design

A complete messaging and website copy revamp for an amazing design studio! 🌟

Messaging & Copy

[Ebook] Database Delivery Automation Playbook

Learn everything you need to know about implementing database delivery automation in your organization [Ebook]

Database DevOps

[Ebook] Transforming forms into digital journeys 40 Questions to get you started

We've outlined 40 questions that will help you get started on your form transformation journey. By answering these questions, you'll be able to better understand what you need to do and where to start.

Digital Transformation

[Ebook] The Digital FNOL Playbook for Insurance CIOs

This in-depth playbook takes you through the digital FNOL (First Notice of Loss) process end-to-end, identifying key points where insurers can support their customers during claim initiation, and diving into industry best practices and use cases.

Digital Transformation

Database Delivery Automation Brochure

Introducing Database Delivery Automation with DBmaestro

Database Delivery Automation

[Ebook] How to Improve User Experience in Digital Claims. In-depth Guide for Insurers

We're going to take a deep dive into the importance of user experience in the digital claims world - from understanding what UX means for this industry, to making sure you have great customer service agents who are well-trained on UX best practices.

Digital Transformation

Disinformation-as-a-Service: Content Marketing’s Evil Twin

Are you tired of all the BS out there on the internet? It's about to get A LOT worse. Dirt-cheap disinformation-as-a-Service campaigns are a thing now. And threat actors can target anyone.

Cybersecurity

DevOps Expert Talks: Ask Me Anything With Moshe Belostotsky

In this Q&A session with Moshe Belostotsky, Director of DevOps at Tomorrow.io, we dive into the changing role of DevOps and how security considerations are changing the way software is being built and delivered.

DevOps

Why‌ ‌Do‌ ‌You‌ ‌Need‌ ‌Database‌ Version ‌Control‌?‌

The database is an important aspect that is left out of the agile development process. In this article, we will see what you can achieve by implementing database source control into your CI/CD pipeline.

Database DevOps

How Streamlining Access Leads To Productive Development Teams

Does your access management hurt your team's productivity? It does.How do we know? Let's look at the data.

Identity and Accesss Management

The importance of application security: keeping your web apps safe

Web application security is crucial for any organization that relies on web-based applications. Learn about the importance of web application security and best practices for keeping your organization safe.

Pentesting

EasySend Blog

Read our latest discoveries on digital transformation and building excellent customer experiences.

Digital Transformation

Effective Privilege Management in the Cloud - Mission Impossible?

TLDR: Overprivileged access is a natural consequence of manually granting and revoking access to cloud assets and environments. What DevOps teams need are tools to automate the process. Apono automatically discovers cloud resources and their standing privileges, centralizing all cloud access in a single platform so you don't have to deal with another access ticket ever again.

Identity and Access Management

Cloud agnostic strategy - the good, the bad, and the impossible

Having a cloud-agnostic strategy means your company does not rely on a single cloud vendor but instead uses multiple vendors to ensure business continuity. This approach has both benefits and drawbacks. Let’s take a look at both.

Kubernetes

K8s Declarative Infrastructure and Where Data Fits In

Can data in Kubernetes become declarative, just like its infrastructure? Uri Zaidenwerg explores.

Kubernetes

Unlocking the Benefits of Kubernetes for Multicloud

Even though multicloud has many benefits, it is less popular among K8s users. What are the challenges K8s users are facing and how can they be resolved? Michael Greenberg explores in this post.

Kubernetes

Put a PIN in that: why passwords vs. PINs comparisons are irrelevant

Both PINs and passwords suffer from the same fundamental flaws – they still rely on human beings and “something they know” to authenticate users. Ultimately there isn’t a difference since all connected services rely on passwords, and a PIN is still just “something you know.” Both methods are inferior to passwordless authentication, and here is why.

Cybersecurity

Standardization in Kubernetes – What About the Data?

Can standardization in Kubernetes apply to data as well? Is it possible to make data in Kubernetes declarative, just like the application layer? Michael Greenberg explores in this article.

Kubernetes

Managing Kubernetes complexity challenges

While Kubernetes is becoming the de-facto standard for container orchestration and management, it also has its shortcomings. According to the 2020 CNCF survey, the #1 challenge in K8s deployment is complexity. Why is Kubernetes complex to use and deploy and what are some best practices to handle its complexity? Uri Zaidenwerg explores these topics further in this article.

Cloud

Cloud adoption and business continuity in the covid-19 era

More businesses are now pursuing cloud computing and digital transformation to cope with the volatility of the times and to take advantage of the possibilities brought forward by the “new normal”.

Cloud

More Cloud Regions = Better Business Continuity

Setting up your business environment in multiple regions would assist with disaster recovery and business continuity. Unfortunately, the task of becoming cloud-agnostic is often too complex and prohibitively expensive to achieve for many organizations. Luckily, with the right tools, achieving multicloud and multi-region business continuity doesn’t have to be a difficult or expensive task.

Kubernetes

Principles of Resilience, Availability, and Data Protection for Kubernetes Deployments

Kubernetes is becoming increasingly popular among developers looking to deploy stateful apps. K8s users have to confront the issue of what to do with their data. This blog will go through three critical criteria for any deployment: resilience, availability, and data security, and how it all relates to your application state.

Kubernetes

What is High Availability in the Public Cloud?

To achieve high availability in the public cloud, most cloud providers offer SLAs with a 99.999% uptime guarantee. For many applications, this arrangement is good enough. But when latency, availability, and control are critical, enterprises are still hesitant to move their workload to the cloud. And for a good reason – the cloud still has availability and assurance problems. Can Public Clouds Reach the Same Level of Availability as On-Prem SLAs?

Kubernetes

Mission Possible: Operational Flexibility in the Public Cloud

IT operators need to know they don’t need to be bound to only one cloud offering. They can operate with more control of their data by utilizing options that allow for data flexibility and portability across multiple clouds. Here we discuss how to achieve operational freedom in the public cloud.

Kubernetes

Why RPO is the most important KPI in your data resiliency strategy

The recovery point objective (RPO) measures how frequently backups are being performed – every 5 minutes? 5 hours? A whole day? It represents how up-to-date recovered data will be.

Cloud

Kubernetes + data agility = application mobility

With Kubernetes, you can easily deploy your entire microservice infrastructure and service mesh in minutes, just by applying your configuration to a Kubernetes cluster. But what if you need to change locations or move to another cloud vendor? How can you move all your data to a new location without interrupting service for customers? We’ll discuss how you can achieve data agility and application mobility for stateful applications on Kubernetes.

Kubernetes

Database DevOps – Where Do I Start?

Most organizations have adapted automated DevOps pipelines to handle application code, deployments, testing, and infrastructure configurations. However, database development and administration are left out of the DevOps process and handled separately, creating many issues. The time has come to change that.

Database DevOps

Database delivery automation with GitLab: a deep dive

Continuous Integration and Continuous Delivery(CI/CD) has become the backbone of a good DevOps pipeline.

It stands to reason that you need to include all aspects of development into a proper DevOps pipeline with CI/CD to respond to rapidly evolving development requirements.

However, one critical aspect is often left out of a DevOps pipeline. The database.

Database DevOps

How to Improve Collaboration Between Dev and DBA Teams with Database DevOps

When it comes to application development, databases are often left out of the DevOps pipeline and managed separately. However, it is no longer possible to maintain the application and the database as two separate entities with ever-increasing application complexity and the growing need for proper data management and storage.

Database DevOps

A guide to stateful Kubenetes: fedration and multi-cluster explained

Stateless applications enjoy the true benefits of multi-cluster and federated Kubernetes, but the story is different for stateful applications. How can you ensure that your stateful applications will run consistently? Read our guide to learn more.

Kubernetes

Four most common Kubernetes challenges and how to overcome them

The ease of using Kubernetes is a huge advantage for users, but it comes with its own set of challenges. What are some of the most common problems organizations face in their Kubernetes journey?

Kubernetes

Supply-Chain Risks Reduction with Industrial IoT

The aftershocks of the ongoing pandemic make it obvious that it is impossible to properly respond to a crisis of this order of magnitude without establishing a transparent view of the multi-tier supply chain. Here is the three-step process to achieve just that.

Supply Chain

bottom of page