Recent Posts

Sealed Secrets

2 minute read

Kubernetes uses a key-value object called a secret, but by default, they are not fully secure. They are kept separate from other data to allow for separate s...

SBOMs

2 minute read

In May 2021, the U.S. White House issued its Executive Order on Improving the Nation’s Cybersecurity and it has the potential to revolutionize software devel...

Repurposing the Operator

1 minute read

The use of the Kubernetes Operator pattern for purposes other than managing applications deployed on a cluster can be seen as a useful solution:

BDD in the Cloud

1 minute read

``` Scenario: User can scale a cloud native application horizontally

Conways Law

2 minute read

Conway’s Law serves as a reminder that effective communication structures are essential to successful software development. The structure of a team can enabl...