Top 10 Technology Trends in coming three years, from 2024 to 2026Hephaestus | Ἥφαιστος | 赫菲斯托斯Dec 29, 2023Dec 29, 2023
Arch. Series: How to design TwitterWe use this case to learn more about how to design a better architecture, taking Twitter as a case for learning.Dec 25, 2023Dec 25, 2023
7 Key Aspects of Cyber Security for OrganisationsThis article aims to highlight seven key aspects which can help organisations set up their practices / controls to cope with the…Jan 26, 2022Jan 26, 2022
Differences between Machine Learning and Classical ProgrammingThis article explains the key difference between Machine Learning and Classical Programming. Also, it highlights THREE different types of…Jan 14, 2022Jan 14, 2022
Five Principles of DevOpsThis article summaries some core concepts of applying DevOps. AWS technologies and experiences would be taken as examples, to illustrate…Jan 11, 2022Jan 11, 2022
Mitigate Log4Shell, the Log4J FlawThe Log4j vulnerability known as Log4Shell is dangerous and must be dealt with as soon as possible. This article explains the issue and…Dec 29, 2021Dec 29, 2021