Production-tested patterns for running Apache Airflow on Kubernetes with the KubernetesExecutor. Covers architecture, deployment, auto-scaling, cost optimization, and real-world case studies achieving 40-60% cost savings.
Read more โCategory: Tech-Trends
DevSecOps: Integrating Security into DevOps – Part 2
Continuing from my previous blog, let’s dive deeper into the implementation of DevSecOps. Integrating Security into DevOps To implement DevSecOps, it is essential to integrate security into every phase of the DevOps lifecycle. The following are the key phases in DevOps and how to integrate security into each phase: DevSecOps Best Practices Here are some […]
Read more โIntroduction to NDepend : Static Code Analysis Tool
As a developer, you always have to take the pain of getting adapted to the best practices and coding guidelines to be followed as per the organizational or industrial standards. Easy way to ensure your coding style follows certain standard is to manually analyze your code or use a static code analyzer like FxCop, StyleCop […]
Read more โIoT Security–Essentials–Part 01
Security(Cyber Security) is an essential requirement for any IoT platform or devices or end users and the communication infrastructure. In order to achieve or design best possible security solutions, to avoid some external entity or hacker gaining access to your IoT device or infrastructure, every architect or system designer should do Threat Modeling exercise. As […]
Read more โMicrosoft Azure IoT Suite–Provisioned solutions for Faster Time to Market IoT enabled solutions
Microsoft Azure IoT Suite Provisioned solutions will help you create your own fully integrated solutions tailored for your specific needs in the following 3 sections. Using these ready to consume solutions will accelerate your time to market IoT(Internet of Things) requirements. Remote Monitoring – Connect and monitor your devices to analyze untapped data and improve […]
Read more โIoT Jargons – Identity of Things (IDoT)
The Identity of Things (IDoT) is an area involves assigning universal unique identifiers (UUID) with associated metadata to devices and objects (things), to identify, connect and communicate effectively with other machines over the internet or within constrained local network. The metadata included with the UUID characterizes the identity of an endpoint. Identity is an essential […]
Read more โ