Remove Authentication Remove Leadership Remove Systems Review Remove Technical Leadership
article thumbnail

Simplifying Kubernetes DevSecOps Through Platform Engineering

d2iq

A typical DevSecOps workflow includes the following steps: IT security integrates and begins threat modeling during the initial concept of the system. A developer writes code within a version control management system. The changes are committed within the version control management system. What Are the Benefits of DevSecOps?

article thumbnail

Sequencing Architecture Modernization: Risk Averse vs Risk Tolerant

Strategic Tech

Even a decade or more is nothing out of the ordinary for large organizations who have accumulated legacy and heritage systems over long periods of time. As a result, there can be pressure to begin modernizing a part of the system that will have a clear business impact. Modernizing an architecture usually take years.

article thumbnail

Collaboration and Notqmail with Amitai Schleier

Marcus Blankenship - Podcasts

On this episode of Programming Leadership, Marcus and his guest, Amitai Schleier, discuss a new project Amitai is working on regarding reviving an old, but useful, open-source program called qmail. But you then used your technical leadership skills to wrangle some folks together and things are now moving. Episode 35. Show Notes.