Trend Micro DevOps : Article

CI/CD Pipeline: How to Overcome Set-Up Challenges

CI/CD Pipeline: How to Overcome Set-Up Challenges 24/10/2023 at 06:43 By Explore the most common challenges organizations face when establishing a CI/CD pipeline and how to strategically overcome them. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

CI/CD Pipeline: How to Overcome Set-Up Challenges Read More »

Top 4 Emerging Trends in Software Engineering

Top 4 Emerging Trends in Software Engineering 24/10/2023 at 06:43 By Explore key takeaways about emerging software engineering trends from Gartner’s annual Application Innovation and Business Solutions Summit. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Top 4 Emerging Trends in Software Engineering Read More »

AWS Graviton Use Cases

AWS Graviton Use Cases 28/09/2023 at 05:02 By Discover how AWS Graviton’s optimized processors help provide a superior price-performance ratio. Available for AWS-managed services, you’ll gain insight on strategies, use cases, and insight on how to get the most out of AWS Graviton. This article is an excerpt from Trend Micro Research, News and Perspectives

React to this headline:

Loading spinner

AWS Graviton Use Cases Read More »

Azure vs. AWS Developer Tools Guide

Azure vs. AWS Developer Tools Guide 12/09/2023 at 07:02 By Azure vs. AWS — which should you use for your DevOps environment? Discover the differences, similarities, and use cases to make an informed decision. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Azure vs. AWS Developer Tools Guide Read More »

How to Protect Your CI/CD Pipeline

How to Protect Your CI/CD Pipeline 29/08/2023 at 05:04 By Continuous integration and continuous delivery/deployment (CI/CD) has won over app developers, with enterprise cybersecurity teams on the hook to protect CI/CD pipelines. OWASP’s Top 10 CI/CD Security Risks clarify what to watch for. This article is an excerpt from Trend Micro Research, News and Perspectives

React to this headline:

Loading spinner

How to Protect Your CI/CD Pipeline Read More »

How to Build a Simple Application Powered by ChatGPT

How to Build a Simple Application Powered by ChatGPT 15/08/2023 at 05:34 By OpenAI’s ChatGPT API enables applications to access and integrate ChatGPT, a large language model (LLM) that generates human-like responses to input. Learn how to build a web application that utilizes ChatGPT to generate useful output. This article is an excerpt from Trend

React to this headline:

Loading spinner

How to Build a Simple Application Powered by ChatGPT Read More »

Leverage the AWS Sustainability Pillar to Minimize Environmental Impact

Leverage the AWS Sustainability Pillar to Minimize Environmental Impact 08/08/2023 at 03:32 By One of the key pillars of the AWS Well-Architected Framework (WAF) is sustainability: the idea that cloud applications should be designed to minimize their environmental impact. Gain insight into the WAF sustainability pillar and discover best practices for architecting your cloud applications

React to this headline:

Loading spinner

Leverage the AWS Sustainability Pillar to Minimize Environmental Impact Read More »

7 Container Security Best Practices For Better Apps

7 Container Security Best Practices For Better Apps 03/08/2023 at 09:34 By Explore how to implement 7 container security best practices within a CI/CD pipeline built with tools from Amazon Web Services (AWS). This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

7 Container Security Best Practices For Better Apps Read More »

How to Leverage AWS Performance Efficiency Pillar

How to Leverage AWS Performance Efficiency Pillar 25/07/2023 at 19:18 By Explore the Performance Efficiency pillar of the AWS Well-Architected Framework and discover how to create performance efficiency in the compute, storage, database, and network elements of cloud infrastructures. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

How to Leverage AWS Performance Efficiency Pillar Read More »

AWS Reliability Pillar: Consistent Cloud Architecture

AWS Reliability Pillar: Consistent Cloud Architecture 19/07/2023 at 18:37 By Gain insight into the Reliability pillar of the AWS Well-Architected Framework and best practices for cloud-based operations, including change management and disaster recovery. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

AWS Reliability Pillar: Consistent Cloud Architecture Read More »

How to Achieve AWS Operational Excellence in Your Cloud Workload

How to Achieve AWS Operational Excellence in Your Cloud Workload 04/07/2023 at 18:48 By Explore the Operational Excellence pillar of the AWS Well-Architected Framework and examine best practices and design principles for cloud-based security operations, including CI/CD and risk management. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

How to Achieve AWS Operational Excellence in Your Cloud Workload Read More »

How to Implement a Secure API Gateway

How to Implement a Secure API Gateway 22/06/2023 at 23:27 By As you rely more on APIs to connect microservices in modern applications, these APIs become a lucrative target for bad actors. Learn how an API gateway provides an extra layer of security, helping protect your systems and data from unauthorized access. This article is

React to this headline:

Loading spinner

How to Implement a Secure API Gateway Read More »

GraphQL vs gRPC: Which One Creates More Secure APIs?

GraphQL vs gRPC: Which One Creates More Secure APIs? 20/06/2023 at 04:04 By Learn about the security capabilities of GraphQL and gRPC, how they perform authentication/authorization, and how they compare to REST. In addition, discover common attack vectors for both API frameworks and how to prevent them. This article is an excerpt from Trend Micro

React to this headline:

Loading spinner

GraphQL vs gRPC: Which One Creates More Secure APIs? Read More »

Guide to Serverless Architecture Design Patterns

Guide to Serverless Architecture Design Patterns 08/06/2023 at 18:48 By Discover the power of serverless architecture design patterns for scalable and efficient application development. Explore EDA, pub-sub, fan-out/fan-in, strangler, and saga patterns. Learn how to select, implement, and optimize them for your needs. This article is an excerpt from Trend Micro Research, News and Perspectives

React to this headline:

Loading spinner

Guide to Serverless Architecture Design Patterns Read More »

Event-Driven Architecture & the Security Implications

Event-Driven Architecture & the Security Implications 06/06/2023 at 09:09 By This article explores the benefits of event-driven architecture for developers and best practices for mitigating security concerns. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Event-Driven Architecture & the Security Implications Read More »

Scroll to Top