One Planet York: Data Breach Update
RapidSpike would like to make a statement about how one of our developers assisted the City of York Council with a potential data breach on their One Planet York mobile app in early November.
RapidSpike would like to make a statement about how one of our developers assisted the City of York Council with a potential data breach on their One Planet York mobile app in early November.
A changelog is a chronological list of important changes users can reference as an application or service expands. Logs explain what features are added, which are changed or adjusted and what those changes do. They sometimes provide explanation or instruction. Logs are useful for preparing your user base for scheduled downtime, and giving your most loyal users something to look forward to.
Since Amazon released Lambda in late 2014, the notion of serverless applications and function-as-a-service has steadily gained steam. Being able to focus on application code and simplifying infrastructure management is alluring, but traditional monitoring methods are no longer applicable. With less visibility, it becomes even more important to take advantage of the available monitoring methods. In this post, we discuss those monitoring methods, CloudWatch Metrics and CloudWatch Logs.
As a product manager in a high-growth environment, I have come to accept that at any given time, something is on fire. Or, at the very least, smoldering. Five or so years ago, the team at Raygun, was just five people. Now, we’re building software products for businesses like Nordstrom. With this growth also comes many learning opportunities for a product manager like myself.
In this tutorial, we will walk through using Rancher to deploy and scale Jenkins on top of Kubernetes. By following steps from this article, you will create a fully functional installation of Jenkins with a master-agent architecture that we use to test real build jobs.
We have been doing a little tidying up around here, giving the website a small facelift. Our contributors have not rested with, with more pack updates including NetBox, PagerDuty, Atlassian Crowd and InfluxDB. Here’s the details.
Among all the pesky attacks that keep security administrators working late, advanced persistent threats (APTs) are possibly the most lethal. An APT is a long-term, targeted attack which involves stealthily spying on an organization’s network activity or siphoning off sensitive data, as opposed to openly damaging or locking down network resources.
Downtime happens. That’s a fact, and it’s nearly impossible to predict. But there are some days when the chances of downtime are higher. Maybe it’s higher-than-normal website traffic, or increased app sign-ups. When planned high-traffic days are on the horizon, it’s a good idea to spend some extra time preparing for the worst.