Sudip's Blog on Cloud, DevOps, Cybersecurity and ITSM

Sudip's Blog on Cloud, DevOps, Cybersecurity and ITSM

Follow
Follow
homebadges

What Are Common Misconceptions About Agile and DevOps

May 2, 202312 min read

Agile and DevOps are software development methodologies that prioritize collaboration, communication, and continuous improvement. Agile focuses on...

What Are Common Misconceptions About Agile and DevOps

DevOps: The Art Of Balancing Chaos And Control

Apr 29, 20236 min read

DevOps: the fusion of development and operations, like peanut butter and jelly, Batman and Robin, or Bert and Ernie - except with less singing and...

DevOps: The Art Of Balancing Chaos And Control

Phishing vs Spear Phishing: Which One Is More Dangerous?

Apr 24, 202311 min read

Phishing and spear phishing are two common cyber threats that rely on social engineering to trick individuals into providing sensitive information or...

Phishing vs Spear Phishing: Which One Is More Dangerous?

Reverse Engineering Malware: Techniques And Tools For Analyzing And Dissecting Malicious Software

Apr 21, 20238 min read

Cybercriminals commonly employ malicious programs to obtain unauthorized system access, exfiltrate sensitive information, or disrupt essential...

Reverse Engineering Malware: Techniques And Tools For Analyzing And Dissecting Malicious Software

Efficient Microservices Communication: Role of RPC Framework in a Cloud-Native Ecosystem

Apr 18, 20237 min read

In modern software development, cloud-native ecosystems have become increasingly popular due to their ability to deliver applications quickly and at...

Efficient Microservices Communication: Role of RPC Framework in a Cloud-Native Ecosystem

Active/Passive And Active/Active Configuration In Storage Management

Mar 3, 20233 min read

Storage management is a critical aspect of IT infrastructure that plays a crucial role in ensuring the availability and reliability of data. Two of...

Active/Passive And Active/Active Configuration In Storage Management