Agile, Scrum, ScrumBan overview presentationWednesday, September 06, 2017
Agile is usually amended to suit the exact use case in question. Most Agile projects will fail due to a lack of training and automation; changes requirements; poor code and documentation; a dedication to purity of Agile theory as opposed to results and ensuring project success. The linked presentation covers the key aspects of Agile, Scrum, Scrumban and conforming Agile methods to real world use cases.
Part 3: Cloud Security Best Practices Summarized Monday, August 21, 2017
Based on lessons learned and experience from across the cloud industry, we should consider the following best practices for your organization’s planning
Cloud Security Part 2: Automation, Identity, Certification, Data SovereigntySunday, August 13, 2017
The basic concept of cloud computing is the transformation and consolidation of traditional compute services, data, and, applications to an on-demand, automated, elastic, often third-party hosted cloud. Customers and security industry experts often ask if their cloud environment is more or less secure than a traditional behind-the-firewall enterprise network. Not surprisingly, there are two polar-opposite opinions among industry experts on this:
Cloud Security Part 1: Planning, Governance, Multi-TenancyMonday, August 07, 2017
Firms need to understand security in light of the unique pertaining to cloud environments. It is recommended to read the National Institute for Standards and Technology (NIST) Special Publication 500-299 as a good baseline cloud-security reference model and detailed specifications. Cloud computing is usually a shared model – especially as it pertains to public cloud deployments.
Mulesoft and API Middleware for Cloud architecturesMonday, July 31, 2017
If you want to migrate many applications to AWS or the Cloud, you will need a Middleware platform to manage the APIs. This middleware will decouple the client user from the back-end application and server resources. Decoupling is mandatory to design best practices and isolate the end user from system changes, so you can migrate, upgrade or deploy new versions of your applications without disrupting business usage.