How to Implement Security HTTP Headers to Prevent Vulnerabilities?

by Chandan Kumar | September 18, 2019 | Security Do you know most the security vulnerabilities can be fixed...


Atari VCS Q&A with COO Michael Arzt

Atari VCSNov 28 · 11 min read Answers to some of the most commonly asked questions about the Atari...


Connect to an AWS EC2 Linux Instances via SSH from Windows

1 Install PuTTY. First of all, you will have to install PuTTy, you can use mobaxterm, KiTTy or whatever,...


Cloud Migration with An Automated DataOps and DevOps Platform

Author Hubert Yoshida Published Friday, September 27, 2019. Cloud computing has become a critical element in every company’s strategic...


AWS S3 CLI usage

AWS Command Line Interface (AWS CLI) is an open-source tool that enables you to interact with AWS services using...


And you say “What…Smartdust ?”

Smart Dust entered 2013 Hype Cycle on Gartner’s emerging technologies as the most speculative. Not so far of the...


And what is a certificate?

Hackers are very active on Internet, it is important to have the guarantee that we are well connected to...


Container terminology

You might think containers seem like a pretty straightforward concept, so why do I need to read about container...


Kubernetes became the solution for migrating legacy application

In the early days of the internet, if you wanted to launch an application, you had to buy or...


The 17th version of OpenStack ‘Queens’ is upon us

“Queens” landed on March 1st, with virtual GPU support in the Nova virtualization module the headline feature. Virtual GPUs...