Introduction In the realm of cybersecurity, zero-day vulnerabilities are the shadowy boogeymen lurking within our software, hardware, and cloud infrastructure. Like ticking timebombs, they remain undetected and unpatched, posing an imminent risk even to the most sophisticated organizations. As a senior cloud architect and DevSecOps security architect, I recognize the unique challenges zero-days bring to…
Category: architecture
Developing a scalable cloud-based application requires carefully evaluating a myriad of factors to select the optimal database solutions. The data storage layer has profound impacts on system performance, costs, and the ability to accommodate future growth. Unfortunately, the dizzying array of relational, NoSQL, distributed, and cloud databases leaves many engineers perplexed on how to make…
While Kubernetes excels at automating workload distribution, sometimes you need precise control over where your pods land. Taints and tolerations provide this, ensuring deployments align with your resource management, operational strategies, and cluster infrastructure. Let’s explore how they work and their transformative potential. Taints: The Node’s Mark of Rejection Taints are attributes applied to nodes…
What is Reverse Proxy? A reverse proxy is a type of server that usually sits on a private network behind the firewall and routes the requests from client to backend/web server. Usually, reverse proxies are introduced to help improve security, performance, and reliability. it facilitates the flow of network traffic. Reverse proxy acts as intermediary…
What is Kubernetes Ingress ? Kubernetes ingress is an API object that governs how external users access services running in a Kubernetes cluster. It defines the traffic routing rules like load balancing, SSL termination, path-based routing, protocol. It exposes HTTP and HTTPS routes from outside the cluster to services within the cluster. Kubernetes Ingress is…
Let’s refresh the topic for all the variables running in a single virtual machine “Everything in Java is pass by value”, Some newcomers may think, in java pass by value only for primitives, and pass by reference for objects, Method declaration could take primitive, object reference arguments or both. When we pass the object variable…
Few days back I posted the comparison table which describes the various features/characteristcs of different free or open source databases, this would help us to understand the various free/open source database offerings. Could help us to decide the database selection for our next project. I have used postgreSQL, MySQL and HSQLDB now looking forward to…
The following table describes the comparison between several open source databases. The comparison will cover: HSQLDB, H2, PostgresSQL, MySQL, Derby in terms of their limitations and strength. This analysis could help to select database for our next project. [TABLE=1]
I was just curious about the cloud computing and wanted to know the difference between new technical buzz(at least for me! cloud computing) and grid computing, as I have worked on a financial product based on grid computing and trust me I was really amazed about its architecture and its design. Now its time to…
The nature of the ESB is distributed; ESB is more scalable than the hub-and-spoke architecture. With ESB the ability to deploy separate integration services, scaling up and scaling out becomes easier. An ESB is based on open standards. EAI/hub-and-spoke solutions are generally based on proprietary standards.