Security Threats

In computing, security threats are possibilities of danger that might exploit a vulnerability to breach security, causing damage. The vulnerability is the weakness which allows an attacker to reduce a system’s information assurance; It occurs due to the presence of a...

AWS vs Azure vs Google vs IBM Cloud, which is the best for me?

Cloud Computing is the delivery of on-demand computing resources (computer power, database storage, applications as well as other IT resources) over the internet. This is achieved by using a network of remote servers hosted on the internet rather than a local...

Docker

Docker is a tool designed to make it easier to create, deploy and run applications using containers. Containers allow a developer to package up an application with all of the parts it needs, such as libraries and other dependencies, and ship it all out as one package....

Container based and Kubernetes based PaaS

Containers have everything needed to run it – code, run-time, system tools, system libraries, and settings. It’s available for both Windows and Linux based applications. Containers are based on operation-level virtualisation rather than hardware-virtualisation. They...