Cloud | Cloud Security | UK First Steps in Developing a Cloud Security Architecture Michał Brygidyn 21 Oct, 2021
Cloud | Golang | Google Cloud Platform | Terraform How to configure a Google Pub/Sub push subscription within a VPC Service control perimeter Mark van Holsteijn 17 Oct, 2021
Azure | Cloud | Technology | Terraform Calculate Start and End IP address of a CIDR-block using Terraform Laurens Knoll 17 Oct, 2021
Kotlin | Software Development Structured concurrency: will Java Loom beat Kotlin's coroutines? Joachim Bargsten , Jeroen Willemsen , Urs Peter 14 Oct, 2021
UK | Software Technology Microcopy 101 – Everything You Need to Know About Writing for UX Kevin Dabrowski 14 Oct, 2021
Digital Transformation co-Creation - The key to Survive in a Disruptive Digital World Divya Prathima 14 Oct, 2021
Threat Modelling | DevSecOps | Sociotechnical | Software Quality Using Wardley Mapping for optimizing your Threat Modeling strategy Dave van Stein 13 Oct, 2021
Cloud | Uncategorized Configure Impersonated GKE Cluster Access For kubectl Laurens Knoll 07 Oct, 2021
AWS | Cloud | Technology | Terraform How to bootstrap an AWS account with Terraform state backend Tibor Hercz 06 Oct, 2021
Product Development | Product Innovation 3 Critical Questions for a Successful Product Innovation Divya Prathima 06 Oct, 2021
Uncategorized Microsoft Gold Partner Xpirit crosses the border into Germany Vivian Andringa 04 Oct, 2021