Skip to main content
false
Shanika Wickramasinghe

Shanika Wickramasinghe is a software engineer by profession and a graduate in Information Technology. Her specialties are Web and Mobile Development. Shanika considers writing the best medium to learn and share her knowledge. She is passionate about everything she does, loves to travel and enjoys nature whenever she takes a break from her busy work schedule. She also writes for her Medium blog sometimes. You can connect with her on LinkedIn.

Learn 3 Min Read

Monitoring IaaS (Infrastructure as a Service)

Monitoring cloud services isn't easy, especially when it comes to IaaS. Read on to understand the importance of IaaS monitoring and what problems it can help you solve.
Learn 6 Min Read

CAP Theorem & Strategies for Distributed Systems

Often misunderstood, the CAP Theorem is important to get right. Learn what the CAP theorem really is about, so your distributed systems stay resilient.
Learn 4 Min Read

SaaS, PaaS & IaaS: The Ultimate Guide To Cloud Service Models

Yes, the cloud makes work better. But which cloud model is right for you? Understand how SaaS, PaaS, and IaaS works in this ultimate guide.
Learn 8 Min Read

Agile Transformation

Agile transformation shifts your organization towards a model that is customer-centric, efficient, innovative, and focused on productive product delivery.
Learn 7 Min Read

APM Metrics: The Ultimate Guide

Go beyond traditional APM and extend your monitoring strategy to include metrics that are important in cloud-native, DevOps-oriented environments.
Learn 8 Min Read

AI Risk Management in 2024: What You Need To Know

Risk management applies to AI, too! Get the full story on AI Risk Management, including the risks to know, a risk approach, and an in-depth look at NIST’s AI RMF.
Learn 7 Min Read

Penetration Testing Today: How It Works & Why You Need It

Learn about penetration testing — simulating attacks to find security weaknesses. Plus: the six pentesting stages, sample tools and hands-on examples.
Learn 7 Min Read

Defining & Improving Your Security Posture

What is your security posture? The result of all your security strategies, processes and practices. Get the total low-down on evaluating & improving yours.
Learn 7 Min Read

Continuous Threat Exposure Management (CTEM)

Attack surfaces changing daily? Cyber threats on the rise? Old ways of working ain't cutting it? CTEM may be your cyber solution. Get the full story here.
Learn 7 Min Read

Software Liability Explained

Software liability is the legal responsibility of software development companies on issues related to the software they develop. Get all the details here.
Learn 7 Min Read

Observability Engineering: A Beginner's Guide

Dive into Observability Engineering with this beginner's guide, exploring its fundamentals, tools, and impact on system performance.
Learn 7 Min Read

What is the Augmented Connected Workforce?

This article provides an overview of the Augmented Connected Workforce, detailing the use cases of AR and other key technologies, along with the key benefits and challenges associated with this concept.
Learn 6 Min Read

Risk Tolerance vs. Risk Appetite Explained

Risk Tolerance and Risk Appetite are two fundamental concepts for businesses to define today. Get the full story on these concepts here.
Learn 6 Min Read

Active vs. Passive Monitoring: What’s The Difference?

Active and passive monitoring: which one is for you? Let’s look at the two methods, along with their use cases, data volumes, and control over the data.
Learn 7 Min Read

Performance Engineering Explained

Engineering for optimized app, system & IT performance: that's how we can summarize performance engineering. Get the full story, tips & best practices here.
Learn 6 Min Read

ELT: Extract Load Transform, Explained

ELT is fundamentally different from the traditional ELT process: see what ELT offers, including massive flexibility, in this complete guide.
Learn 10 Min Read

DevOps & DORA Metrics: The Complete Guide

Choosing the right DevOps metrics isn’t easy — where to start? What’s worth measuring? We break down the best metrics, including how to use and improve them.
Learn 6 Min Read

DDoS Attacks in 2024: Distributed DoS Explained

DDoS attacks are on the rise and they can be disastrous. Get trends & stats, know indicators of attack, and learn how to prevent these jam-packed attacks.