article thumbnail

Our book “Software Architecture Metrics: Case Studies to Improve the Quality of Your Architecture” is published!

Apiumhub

We are delighted to announce the release of our new book “ Software Architecture Metrics: Case Studies to Improve the Quality of Your Architecture ”. Before joining Thoughtworks, Neal was the chief technology officer at the DSW Group Ltd., Rene Weiss – Software Architect, Consultant & CTO at FINABRO.

article thumbnail

GSAS 2023: The Third Edition

Apiumhub

Silver Sponsors IsaQB The International Software Architecture Qualification Board (iSAQB®) is an international association of leading software architecture experts and companies from throughout the industry, with the aim to set global knowledge standards in software architecture for consulting, training, academia, and organizations alike.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DevOps influencers to follow this year

Apiumhub

You can find a lot of useful information about DevOps and related technology topics in his Twitter account. John is a consultant and helps companies with Devops, Puppet, Docker, Kubernetes, etc. Jez is a co-author of Continuous Delivery, Lean Enterprise and DevOps Handbook. CTO at Devops-research.com and twitter activist.

DevOps 72
article thumbnail

GSAS is taking place in CCIB, Barcelona this year

Apiumhub

He has been in the software industry since 1983 and has significant experience and expertise in application, integration, and enterprise architecture. João Rosa is Principal Consultant and Interim CTO at Xebia. George Fairbanks is a software developer, consultant, educator, and speaker. He’s got a Ph.D. About the talks.

article thumbnail

Cybersecurity Snapshot: NSA Picks Top Cloud Security Practices, while CNCF Looks at How Cloud Native Can Facilitate AI Adoption

Tenable

Secure continuous integration and continuous delivery (CI/CD) pipelines with, for example, strong IAM, log audits and secrets management. Implement network micro segmentation and end-to-end encryption. Protect cloud data via, for example, enforcing least privilege; creating immutable backups; and using object versioning.