Joao Grassi — a .NET developer, front-end hobbyist, and friend of Sentry — likes .NET very much. So do we. With the help of one of Sentry’s top 10 SDKs, .NET developer teams process roughly half a billion .NET events every month. In this post, we strive for app security with Azure Key Vault and Sentry. By now, it’s not big news that ASP.NET Core is the future of web development with .NET.
AWS recently launched a new feature for EC2 users: Optimization Recommendations. This feature operates, they explained, by “calculating ideal configurations based on your past usage.
One of the most common uses cases for serverless is when it is used in web applications. And if we imagine a simple web app, the first thing that comes to mind is user authentication. User authentication is very important in serverless web applications because we don’t want to expose our endpoints to the external world and we want to know who and when did what.
Remember when the “cloud” was just a buzzword? 10 years ago, many people thought that cloud technology was overhyped. Now, the cloud is a given. There’s a similar discussion about AIOps today. Once again, some people are sceptical. However, I predict that AIOps is destined to follow the cloud, with widespread adoption across industries. Organizations will quickly learn that they can’t remain competitive without AIOps. Just like the cloud, AIOps is going to rewire IT.
Serverless computing is becoming more popular as organizations look for new ways to deploy their applications in the cloud. With higher levels of abstraction, easier maintenance, a focus on high performance, and ephemeral workloads, serverless computing solutions like Lambda are finding a permanent place in the mix of cloud infrastructure options.
We live in a culture of rapid innovation, but that innovation can result in a variety of security mistakes. Businesses must innovate quickly to compete in today’s markets, and software and public cloud infrastructure, or IaaS, are significant enablers of that innovation. Software is a fast mechanism to deliver innovation, and public cloud infrastructure is an agile way to support rapid software development and delivery. Both of which can lead to significant security mistakes.
We’re quickly approaching an important inflection point in the cloud migration timeline. 451 Research estimates that by the end of next year, company-owned data centers will dip below 50% of primary IT environments as organizations move their IT investments to the cloud. They’re deciding overwhelmingly that they no longer want pets running their critical applications, they want herds of cattle.
In part one, I made the case that AWS Fargate is both a compliment to AWS Lambda and a simpler alternative to Kubernetes. But nothing makes a better case than getting our hands dirty. In this blog post, I’ll introduce a CLI tool that is Fargate’s equivalent to Kubernetes’ kubectl, and we’ll deploy a simple Flask app to demonstrate how easy it is to get started with Fargate.
Some say you have to move all of your server infrastructure into the cloud. Others counter that you should keep your data safe and secure in your own datacenter. And then there are many people in between who use cloud services as an addition to their self-hosted servers. In fact, there’s no right or wrong, because as always in IT: It depends. We at Icinga always try to find a way to make everyone happy with their monitoring – be it in the cloud or on premise.