Blogs

Home > Blogs

Malhar Shah Malhar Shah

Stay Secure in a Multi-Cloud Environment

Security is top of mind in today’s evolving business landscape. Companies require the scalability and flexibility that a multi-cloud environment offers but securing it demands the same amount of focus. While this digital transformation trend will surely continue, what challenges may companies face and what are some ways we can work to mitigate? In this article, we’ll explore different approaches and how to stay secure in a multi-cloud environment.

Read More
Malhar Shah Malhar Shah

Public Cloud Shared Responsibility Model: Things to Know

A shared responsibility model is a cloud security structure that governs the security oversight of a cloud infrastructure and its components and dictates accountability to the vendor or customer and its users. But as companies move to Public Cloud Solutions, the security model changes and defining who is accountable for which component of the infrastructure can be complicated. Where does the vendor’s security responsibility stop and where does the customer’s obligations begin? Let's find out in this article.

Read More
Malhar Shah Malhar Shah

Top 5 Trends in Data Analytics in 2022

Data drives business decisions small and large, companies that are aware of industry trends can better innovate and be ahead of the curve. In this article, we’ll cover what Data Analytic Trends in 5 Key Areas we’ve seen gaining traction and we’d expect continued growth and industry adoption you may benefit from.

Read More
Malhar Shah Malhar Shah

Observability vs. Monitoring: A Quick Guide

Observability and monitoring defined in the simplest terms can be viewed as, monitoring is to tell you when something goes wrong in your system, and observability is to help you understand why. Despite the distinctions between these definitions, the underlying goal of both is to achieve better visibility into systems. In this article we’ll explore the differences and how both work together.

Read More
Malhar Shah Malhar Shah

Introduction to PowerBI Custom Visual Development

Introduction to PowerBI Custom Visual Development Careers Home Blogs Introduction to PowerBI Custom Visual Development PowerBI is a data visualization and data analytics service from Microsoft. You can easily create dashboards and reports with interactive

Read More
Malhar Shah Malhar Shah

Log4j Vulnerability

NIST has announced a zero-day global vulnerability (CVE-2021-44228) in the Apache Log4j logging library. The Apache Log4j utility is a popular and commonly used component for logging services.

Read More
Malhar Shah Malhar Shah

Google Chronicle Security - Threat Detection & Hunting

Chronicle Security is a cloud service, which is built as a specialized layer on the top of the Google infrastructure, designed for organizations to privately retain, analyze, and search the massive amounts of security and network logs or data they generate.

Read More
Malhar Shah Malhar Shah

Crest Data joins the Datadog Marketplace

Crest Data joins the Datadog Marketplace Home Blogs Crest Data joins the Datadog Marketplace NEW YORK — Crest Data, a market leader in building Analytics, Security and DevOps integrations, announced today a

Read More
Malhar Shah Malhar Shah

Visual Regression Testing with WebdriverIO

Visual regression testing is the process of validating visual elements of an application or website to ensure that code modifications do not introduce any unexpected issues. It prevents the user interface bugs raised due to adding the new features to your application. It speed-up the development process and it is always good to automate it!

Read More
Malhar Shah Malhar Shah

Introduction to Cypress Automation Testing

Introduction to Cypress Automation Testing: A Comparison of Testing Types “A good programmer is someone who always looks both ways before crossing a one-way street” – Doug Linder.

Read More
Malhar Shah Malhar Shah

Web Accessibility: Designing an Accessible Color Palette

Accessible content has been an increasingly important feature in various software products. To facilitate these accessibility goals, major web frameworks have been adopting accessibility design patterns into their respective libraries.

Read More
Malhar Shah Malhar Shah

Web Accessibility: How to Enable Access for Everyone

The web is fundamentally designed to work for all people, regardless of their hardware, software, language, location or ability, enabling the access to people with a diverse range of hearing, movement, sight, and cognitive ability.

Read More
Malhar Shah Malhar Shah

An introduction on using SonarQube

SonarQube is a Code Quality Assurance tool that collects and analyzes source code, and provides reports for the code quality of your project.

Read More
Malhar Shah Malhar Shah

How to use Nexus OSS User Access Management

Nexus OSS is a free artifact repository with universal format support. It provides a single source of truth for all your components, binaries, and build artifacts, as well as efficiently distribute parts and containers to developers.

Read More
Malhar Shah Malhar Shah

Introduction: DevOps & Site Reliability Engineering

Site Reliability Engineering is a branch of engineering focused on reliability of systems, services, and products. Uptime, Resource Utilization, and Forecasting, System Reliability, Change Control, Systems Integration are all at the forefront and concerns of SRE.

Read More