Here is a sample of our work for some of our clients over the years. We are always adding to this list. Click on any content title to open it in a browser.
Comparison of Stream Processing Frameworks – bytewax
Part one in a two part series that looks at available stream processing technologies.
Writing Tests for Bytewax Dataflows – bytewax
Data processing frameworks are often difficult to write tests…
How to Deduplicate Events in Snowflake with dbt | Propel Data Analytics Blog
This article will demonstrate how to deduplicate events in Snowflake using dbt
Implementing Expo Push Notifications [Step-by-Step Guide]
This step-by-step tutorial (with screenshots + code snippets) will show you how to implement push notifications for your Expo app.
Persistent Distributed Kubernetes Storage Longhorn | SUSE Communities
Longhorn is a reliable cloud native storage system installed on Kubernetes that can run anywhere. In this article, you’ll learn about Longhorn and see how you can use it for Kubernetes persistent storage. Learn why Longhorn is a flexible storage solution.
Troubleshooting the “Failed to Create Pod Sandbox” Error
The “failed to create pod sandbox” error is a common problem when you’re trying to create a pod in Kubernetes. This article will explain the possible causes of the problem as well as how to fix it.
Stop Container Escape and Prevent Privilege Escalation | Teleport
Container escape is a security risk in which malicious players can leverage containerized apps. Deep-dive into the risks and how to prevent privilege escalation.
The Evolution of APIs: From Cloud Age and Beyond
APIs in the Cloud-Native World of Microservices and Kubernetes
Using a Kubernetes Service Mesh Worth It?
A Kubernetes service mesh can help you establish a reliable service-to-service network connection, but is it worth the trouble? Dive into its setup, maintenance, benefits, and drawbacks.
Prometheus Queries: 11 PromQL Examples and Tutorial
With any monitoring system it’s important that you’re able to pull out the right data. In Prometheus pulling data is done via PromQL queries and in this article we guide the reader through 11 examples that can be used for Kubernetes specifically.
Should You Run a Database on Kubernetes?
How could a database run on Kubernetes? And if so, what types of databases and data are best suited for K8s? Let’s jump in.
Troubleshooting Kubernetes FailedAttachVolume and FailedMount
When working with Persistent Volumes in Kubernetes, you might run into the FailedAttachVolume or FailedMount error. In this tutorial, we’ll show you how to troubleshoot these errors and find the root cause and fix them.
How Pingdom’s Real User Monitoring Can Help Optimize Your WordPress Website – Pingdom
Enterprise web applications or medium-to-large, consumer-facing websites are typically built by teams of engineers, administrators, web developers, and other professionals. However, once a site goes live, the operations team is responsible for keeping the site up and running at optimal performance.…
Why Developers are Embracing Modern Card Issuing and the Open API – DZone Web Dev
Modern payment card issuing processes can deliver many different types of cards in a fast, efficient, and secure way. Using open API platforms, card issuers can create customized card products and easily process hundreds of thousands of transactions. By integrating with major card processing network…
What Are Virtual Machines (VMs)?
In this article we answer the question What are Virtual Machines? A VM is a fully-fledged, standalone operating environment running on a physical computer.
AWS S3 Security: How to Easily Secure & Audit AWS S3 Buckets? XPLG
AWS S3 security aspects are very easy to overlook. Learn about best practices to help you identify and prevent most common S3 security problems.
Five Best Practices for Proactive Database Performance Monitoring | Loggly
Proactive monitoring helps identify issues before they become huge problems. See top five best practices for proactively monitoring database performance.
Win-Win Deployment Strategies for Modern Apps
These days, the biggest change to software development is the frequency of deployments. Product teams deploy releases to production earlier (and more often). Months or years-long release cycles are becoming rare—especially among those building pure software products. Today, using a service-oriented…
Windows Servers Security: How to Look for Suspicious Activities | XPLG
Windows servers security is paramount if you are running a large production environment. Learn how you can boost your servers security level in minutes.
Build Virtual Desktop for Remote Teams with Amazon Workspaces
In this article we look at how you can easily build virtual desktops that you can deploy to your teams using Amazon WorkSpaces.
What is DevSecOps (using Heroku Flow as an example)
An Overview of DevSecOps and How to Automate It With the proliferation of agile product de…