The DevOps ManifestoKnowing what you want, having a vision, or a guiding light if you will, isn’t always enough. Matters can quickly get out of hand in a team…Mar 1, 2023Mar 1, 2023
10 Things I wish I’d known before building a Kubernetes CRD controllerGive me six hours to chop down a tree and I will spend the first four sharpening the axe. - A. LincolnAug 29, 20222Aug 29, 20222
Published inAWS TipIntroduction to AWS Lambda and Serverless“ Serverless computing is a cloud computing execution model in which the cloud provider allocates machine resources on demand, taking care…Jun 13, 2022Jun 13, 2022
Published inNerd For TechIntroduction to Zero Trust on AWS ECS FargateAfter a long while of researching for information on a solution I knew I wanted, it was quite hard to figure out what to choose, and how to…Sep 1, 20211Sep 1, 20211
Published inGeek CultureHow to NOT secure web payment systemsSince the tale laid here is real, I’ll refrain from using specific names or locations. It might put me in some awkward situations. If…Jul 2, 2021Jul 2, 2021
Published inNerd For TechHacking your application may be easier than you thinkTL;DR: I noticed a suspicious behavior on the weekly email from my coffee shop’s subscription; it was offering I edit my preferences…Feb 18, 2021Feb 18, 2021
Published inFAUN — Developer Community 🐾How hackers steal your keys and secretsAfter hunting for security bugs I’ve realized clients I’m working with are not familiar enough (or at all) with basic “hacking” techniques…Sep 21, 2020Sep 21, 2020
Published inProdOpsIOProtect your application from CSRF attacksCross-Site Request Forgery attack and mitigations explainedMay 28, 2020May 28, 2020
Published inThe StartupSQL injection for developersThe basics of how to test and protect your applicationMay 6, 20201May 6, 20201
Published inProdOpsIOVim: from foe to friend in 9 minutesLessons from 3-years of intensive learningJul 4, 2019Jul 4, 2019