Remove tag https
article thumbnail

Lessons from content marketing myself (aka blogging) for five years

Erik Bernhardsson

I started writing this blog in late 2012, partly because I felt like it would help me improve my English and my writing skills, partly because I kept having a lot of random ideas in my head and I wanted to write them down somewhere. I set up a Wordpress blog on my crappy Swedish virtual private server. A few hundred hits in a day!

Marketing 100
article thumbnail

Lessons from content marketing myself (aka blogging) for five years

Erik Bernhardsson

I started writing this blog in late 2012, partly because I felt like it would help me improve my English and my writing skills, partly because I kept having a lot of random ideas in my head and I wanted to write them down somewhere. I set up a Wordpress blog on my crappy Swedish virtual private server. A few hundred hits in a day!

Marketing 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to make your web application more secure by using Dynamic Application Security Testing (DAST) – PART 2 of Application Security Testing series

Xebia

Like I mentioned in the previous blog, during this blog series we are going to look at the different types of Application Security Testing and Software Composition Analysis. The vulnerable web application is the same one we used in the first blog of this series. You can download the source code here: vulnap p.

article thumbnail

Let’s Flink on EKS: Data Lake Primer

OpenCredo

The first part of this blog is related to the Flink and S3 infra design. The Session Job — supports a remote file system that can download files from S3, https, etc. This blog is written exclusively by the OpenCredo team. We expect applications to be deployed in a VPC, in this case, EKS, which runs Flink apps. endpoint: s3.eu-west-2.amazonaws.com

Data 59
article thumbnail

Leadership Lessons from Yoga - Next Level Blog

Next Level Blog

Anyone reading this blog doing yoga? Love your blog. https://www.examiner.com/yoga-in-san-francisco/mark-welte Posted by: mark | December 22, 2010 at 02:49 AM Well written post; I'm also 3+ months into it and finding the same benefits as you, both to my well-being and to my leadership abilities. Amazing comments.

article thumbnail

Introducing Cloud Playground: Even More Hands-On Training Features

Linux Academy

If port 22 is closed on your corporate network (as it should be), you can use the instant terminal to SSH over port 22 while only exposing port 443 (HTTPS) on your corporate network. Server Deletion Notifications & Tagging. One of our biggest requests was the ability to tag/label a server instead of using a pre-built list of terms.

article thumbnail

All Layers Are Not Created Equal

Palo Alto Networks

Everyone knows that in order for a news article, blog post or white paper to have any credibility, a writer needs to cover the “who, what, where, when, why and how” of the topic. This means that attackers can no longer use a generic application, such as web services (HTTP/HTTPS), to bypass the security control.