The COVID-19 pandemic has been one of the most disruptive workforce events of the century. The disruption began when organizations were forced to deal with a remote workforce, finding it was not only possible—it could be productive. The past eighteen months have significantly shifted organizations’ attitudes toward remote work, but not so much as to fully embrace such a model moving forward. Yes, there are organizations who are, and plan to continue, operating in a fully remote mode. But a more likely model is a hybrid one in which some employees work from home, others from the office, and still…
Author: Lori MacVittie
Everyone knows that Kubernetes has won the container wars. Except what Kubernetes has won is the container runtime wars. You see, the container image war was won by Docker. That can be seen in the statistic that more than 1 billion Docker containers are downloaded every two weeks according to the State of Open Source Security Report 2019. Docker Hub has become for the enterprise what Apple’s AppStore and Google Play are to consumers. Container images run the gamut from base operating systems to app stacks, from databases to middleware to app engines supporting node.js, Python, and Go. They even include ecosystem integrations for…
Despite its importance in ensuring the smooth running of apps, DNS remains one of the most underappreciated application services of today. Its failure is potentially catastrophic, and could bring the digital economy to its knees within minutes, so why is DNS not getting the attention it deserves? DNS enables us to translate domain names to IP addresses – without it, apps would stop functioning all together. Since DNS effectively underpins the entire digital economy, it is no surprise that the State of Application Services 2019 reported it to be on the verge of entering the top five application services deployed today. When…
So far this year, there have been five documented cases of organisations exposing their private data due to misconfigured S3 buckets or cloud databases. Wait, let’s fix that: due to intentionally configured S3 buckets and cloud databases. The distinction is important. In order to allow the kind of access necessary for unauthorised users to view S3 buckets or access databases, someone has to intentionally remove or degrade the default security guards placed on them. To call them misconfigured implies a mistake, the kind that everyone makes from time to time and can be forgiven. But these are not mistakes. These…