Recent Posts

Event Sourcing

1 minute read

As a software developer, I have a strong opinion on Event Sourcing as a software design pattern and architectural style. Event Sourcing is a unique and innov...

Automated Code Reviews

less than 1 minute read

Automated code review tools are a game changer for software development. By integrating these tools into the merge request process, developers can receive re...

Sealed Secrets

2 minute read

Kubernetes uses a key-value object called a secret, but by default, they are not fully secure. They are kept separate from other data to allow for separate s...

SBOMs

2 minute read

In May 2021, the U.S. White House issued its Executive Order on Improving the Nation’s Cybersecurity and it has the potential to revolutionize software devel...

Repurposing the Operator

1 minute read

The use of the Kubernetes Operator pattern for purposes other than managing applications deployed on a cluster can be seen as a useful solution: