ic_agile_128ic_business_128ic_agile_white_128ic_banknote_smile_128ic_business_128ic_business_128ic_checkmark_128ic_client_team_manager_128ic_code_file_128ic_code_files_128ic_corporate_cloud_platforms_128ic_crossplatform_apps_128ic_dedicated_team_128ic_developer_128ic_development_team_128ic_enterprise_128ic_faster_timeframe_128ic_fixed_price_128ic_graph_down_128ic_graph_down_128ic_hourly_128ic_hourly_white_128ic_information_finder_128ic_junior_developer_128ic_managed_team_128ic_message_128ic_mobile_app_startups_128ic_mobile_development_128ic_mobile_development_up_128ic_mobile_devices_128ic_multiplatform_128ic_multiplatform_white_128ic_pricetag_128ic_project_checklist_128ic_project_management_128ic_project_management_team_128ic_research_and_development_team_128ic_scalable_team_128ic_senior_developer_128ic_smaller_codebase_128ic_smaller_price_128ic_startup_128ic_team_manager_128ic_three_times_faster_128Arrow_Dropdownic_001_google+_16ic_002_xing_16Group 2ic_003_facebook_16ic_004_linkedIn_16Groupic_005_message_16ic_006_upload_16ic_007_remove_16ic_008_email_16ic_009_attachment_16ic_010_file_16ic_011_name_16ic_012_arrow_left_16ic_013_arrow_right_16ic_014_arrow_down_16ic_015_arrow_up_16ic_016_dropdown_arrow_down_16ic_016_dropdown_arrow_leftic_016_dropdown_arrow_rightic_017_K&C_dropdown_arrow_up_16ic_018_language_16ic_019_Quote_16ic_020_+_16ic_021_=_16ic_022_phone_16ic_023_twitter_16ic_024_position_16ic_025_company_16ic_026_search_16ic_027_mobile_16ic_028_fax_16ic_029_location_16ic_030_enlarge_16ic_031_downscale_16ic_032_contactic_download_normal_16pxic_033_skype_16ic_006_download_16 copySearchGroup 26Rss_font_awesomelinkedintwitterK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxK&C_Icons_32pxConsul_VerticalLogo_FullColorPacker_VerticalLogo_FullColorTerraform_VerticalLogo_FullColorVault_VerticalLogo_FullColorethereum_black_64ic_Interest_based_64ic_acrivate_card_64ic_api_client_64ic_application_architecture_64ic_application_architecture_ white_64ic_application_development_user_64ic_application_development_user_64ic_arrow_down_64ic_automated_backups_64ic_automated_infrastructure_provisioning_64ic_automated_infrastructure_provisioning_white_64ic_automated_storage_64ic_automated_storage_64ic_automation_64ic_microservice_architecture_64ic_avaliability_across_the_world_64ic_avaliability_across_the_world_white_64ic_blockchain_64ic_blockchain_white_64ic_brackets_64ic_brackets_64ic_build_64ic_build_64ic_build_64ic_business_64ic_business_partnership_64ic_business_partnership_white_64ic_business_64ic_calculator_64ic_calendar_64ic_calendar_64ic_car_rent_64ic_card_renewal_64ic_chat_64ic_chat_bubbles_64ic_chat_bubbles_64ic_chat_white_64ic_checklist_64ic_checkmark_64ic_blockchain_64ic_smart_development_64ic_blockchain_consulting_64ic_checkmark_white_64ic_clock_64ic_clock_white_64ic_cloud_media_64ic_cloud_solutionsic_cloud_solutions_whiteic_cluster_64ic_cluster_white_64ic_code_base_optimization_64ic_coding_64ic_coding_white_64ic_commenting_widget_64ic_commenting_widget_64ic_containers_64ic_containers_white_64ic_continious_64ic_continious_delivery_64ic_continious_delivery_white_64ic_continious_release_64ic_continious_release_white_64ic_continious_white_64ic_cost_saving_64ic_cost_saving_white_64ic_cpu_load_64ic_credit_card_64ic_crossplatform_app_development_64ic_crossplatform_app_development_white_64ic_custom_crm_64ic_custom_crm_64ic_independence_consulring_64ic_database_calls_64ic_database_calls_white_64ic_dedicated_teams_64ic_dedicated_teams_64ic_desktop_application_user_64ic_desktop_application_user_64ic_desktop_code_64ic_desktop_code_white_64ic_developer_64ic_developer_white_64ic_development_64ic_devops_64ic_devops_64ic_documents_64ic_documents_graph_64ic_documents_graph_white_64ic_documents_white_64ic_download_presentation_64ic_education_64ic_email_open_64ic_email_open_white_64ic_environment_healthcheckethereum_white_64ic_euro_64ic_euro_white_64ic_failure_solved_64ic_gdpr_64ic_globe_outlines_64ic_good_quality_64ic_high_load_websites_64ic_high_load_websites_white_64ic_hotel_booking_64ic_inability_64ic_inability_white_64ic_increase_64ic_increase_white_64ic_increasing_team_64ic_independence_64ic_integration_64ic_it_outsourcing_64ic_it_outsourcing_64ic_knowledge_sharing_64ic_mobile_devices_64ic_laptop_user_64ic_laptop_user_white_64ic_launch_64ic_launch_white_64ic_learning_64ic_learning_two_white_64ic_lighthouse_64ic_link_64ic_load_balancer_64ic_load_balancer_64ic_load_card_64ic_lock_64ic_lock_white_64ic_low_cost_64ic_low_load_websites_64ic_maintenance_tools_64ic_maintenance_tools_white_64ic_media_player_64ic_media_player_white_64ic_messaging_platforms_64ic_microservice_architecture_64ic_microservices_64ic_microservices_64ic_mobile_app_64ic_mobile_app_64ic_mobile_content_64ic_mobile_development_64ic_mobile_development_white_64ic_mobile_devices_64ic_mobile_devices_white_64ic_mobile_payments_64ic_mobile_social_media_applications_64ic_mobile_workflows_64ic_money_transfers_64ic_multimedia_sharing_64ic_multimedia_sharing_white_64ic_my_garage_64ic_no_access_64ic_no_access_white_64ic_no_oldschool_64ic_online_marketplaces_64ic_online_marketplaces_white_64ic_online_trading_64ic_online_trading_64ic_pair_device_64ic_parallels_64ic_parallels_white_64ic_passcode_64ic_payment_systems_64ic_performance_64ic_performance_issues_64ic_performance_issues_white_64ic_performance_white_64ic_plane_64ic_plane_white_64ic_plus_64ic_plus_64ic_pricetags_64ic_pricetags_64ic_product_64ic_product_search_64ic_product_white_64ic_productivity_tools_64ic_productivity_tools_64ic_project_delivery_64ic_project_delivery_white_64ic_project_management_64ic_project_management_collaboration_64ic_project_management_team_64ic_project_management_team_white_64ic_project_risks_reduced_64ic_quality_mark_64ic_quality_mark_64ic_quality_mark_white_64ic_question_64ic_react_native_64ic_response_time_64ic_response_time_white_64ic_rest_api_64ic_retail_64ic_transparency_consulting_64ic_scale_up_64ic_scale_up_white_64ic_security_64ic_security_64ic_self_healing_64ic_self_healing_64 copyic_send_money_64ic_server_64ic_server_white_64ic_shopping_64ic_shopping_white_64ic_sleep_mode_64ic_small_is_beautiful_64ic_smaller_price_64ic_social_benefits_64ic_social_connections_64ic_socket_64Group 20ic_spare_parts_for_cars_64ic_spare_parts_for_cars_white_64ic_speedometer_64ic_performance_consulting_64ic_speedometer_white_64ic_startup_64ic_startup_white _64ic_target_64ic_team_64ic_testing_64ic_testing_checklist_64ic_testing_checklist_white_64ic_testing_white_64ic_three_times_faster_64ic_touch_64ic_touch_id_64ic_touch_white_64ic_transparency_64ic_ui_design_desktop_64ic_ui_design_mobile_64ic_ui_design_mobile_white_64ic_umbrella_64ic_umbrella_64ic_umbrella_white_64ic_up_and_down_scaling_64ic_up_and_down_scaling_64ic_users_64ic_users_white_64ic_ux_design_64ic_ux_design_desktop_64ic_ux_design_64ic_ux_design_white_64ic_vehicle_64ic_web_based_search_64ic_web_based_search_white_64ic_web_browser_code_64ic_web_browser_developer_mode_64ic_web_browser_user_64ic_web_development_64ic_web_development_white_64ic_web_portals_64ic_web_portals_64ic_web_user_64ic_web_user_white64ic_workflow_64ic_workflow_steps_64ic_workflow_steps_white_64ic_workflow_white_64ic_working_environment_64solidity_blackGroup 19

Security in Kubernetes and How Your Company Can Benefit from It

Security Is An Integral Part Of Kubernetes Container Orchestration

In this instalment of our Kubernetes consulting series we take a closer look of how container orchestration fits into your app's security.


We have now realized that classic applications with monolithic architecture are not so reliable or secure. They are heavily dependant on resources and don't offer convenient scalability. Very often companies suffer from such a situation, because as applications get more complex, companies may want to connect more services to it.


When an application gets more complex, the more changes that are made, the more the chance of significant mistakes. That’s where Kubernetes comes into play, armed with the most important features that new applications require nowadays: fault tolerance, security, resource isolation and most importantly - scalability.


Kubernetes eliminates very complex monolithic architectures and breaks them down into fundamental parts called microservices, where your team, divided into small groups of people, can easily maintain and develop each microservice further. It means that teams become more effective and the company gets a reliable product faster.



Besides its timesaving benefits, there’s an even more important feature and that’s bulletproof security. In the age of cyber wars, companies need water-tight security in order to keep the application safe from hackers. So how can companies benefit from those security features that Kubernetes offer?

Isolation

Kubernetes defines a set of rules and best security practices that allow different application processes to get isolated from each other in separate containers. At the same time, the Orchestration Engine preserves the boundaries between them and allows important communication only when there’s a need for it. Containers, where micro-processes run, are fully separated from each other and if one gets compromised, the others will stay safe.


It’s important to note that Kubernetes doesn’t run multiple virtual machines when it runs microservices, instead, it runs only one Host OS with Kubernetes installed and provides a unique set of binaries and libraries for each container where the micro-processes will work.


This means that each container is given a specific amount of resources that are isolated from the other containers, resources that can be assigned to containers individually.



Isolation prevents DOS (denial of service) attacks and moreover provides data protection and privacy. Combining isolation with the auto-deployment function makes the whole ecosystem super-reliable. That is, if one host goes down, then the Kubernetes cluster services can easily move a killed process to the different host automatically, meaning the client won’t even notice a change in performance or function loss.


Furthermore, if something goes wrong with your Pod, the Replication Controller can automatically reboot a particular pod so that the microservices can get up and running again.

Authorization and Authentication

The Kubernetes API is the core of the whole security environment, as it has built-in admission controls, and authorization and authentication controls as well, which filter and regulate all requests to the API after authentication and authorization. The Kubernetes API is considered to be the central interface for users, administrators, and applications that communicate with each other. Users and services can access API in order to initiate operations.


The security environment is built very intelligently around the API, thus in order to gain access to a specific container, you must pass the three-stage process:


1.Authentication

2.Authorization

3.Admission Control


It dramatically increases the security of the environment and makes it hard for unauthorized users to gain access to the API. All users can be divided into groups and the administrator can easily assign privileges and types of access. Moreover, if there’s a need to create a couple of other extra security layers you can easily rely on OpenSSL X509 Client Certificates and Static Token Files that make it impossible to gain an unauthorized access.

Logging and Auditing

Very often things can go wrong and in order to understand what exactly went wrong you have to have detailed system logs and the Kubernetes environment offers that. In addition to classic system logs, you can record Kubernetes-specific logs that shed the light on operations that the particular user has made, a very important function that allows you to keep track of recent changes. The best part is that if there’s any unauthorized access, you are able to quickly fix the vulnerability.


Audit logging is available starting from Kubernetes version 1.9, as currently, it’s only the beta feature that allows you to record actions taken by the API. All records can be easily archived and stored for later analysis, furthermore, every administrator can choose events that must be logged by specifying an audit-policy YAML file.

Network Security

Due to complex security features that are available inside the Kubernetes environment, the ecosystem allows you to secure your application network in such a manner that it can become a “cyber-fortress”. There often needs to be a complex set of network policies that govern communication between every group of pods and other network endpoints in order to achieve this.


By default, all pods are non-isolated once created and they can receive traffic from everywhere. They can easily become isolated if the Network Policy plugin has selected them and set a number of network rules that can restrict any communication from the outside, yet at the same time, it can set a rule that allows communication only between certain pods. Pretty neat stuff.


*You might also find our article on how Heptio Ark/Velero as part of Kubernetes fits into app security*


Furthermore, Kubernetes allows complex Cluster Networking that can unite big infrastructures together and make them communicate with each other. In order to achieve that, all containers and nodes should be able to communicate without NAT over the network, and moreover, the container should know the IP that it is assigned to and it should be the IP that others see and know.

Conclusion

The Kubernetes environment offers security benefits that are hard to resist, as they save a lot of time, money and allows a company to easily avoid problems associated with cybersecurity criminals. From every standpoint, the Kubernetes environment backs your project up and makes it fault tolerant.


The various functions help you to log everything that happens in the heart of your system. Complex authorization and authentication processes won’t let any intruders get inside, isolation will save many resources and ensure the absence of DOS attacks, and network policies allow you to scale your application in a free way and ensure security at the same time.


It’s a fantastic set of features. Even from the development standpoint, applications that are made using Kubernetes technology are more reliable, stable and it allows companies to create outstanding products. Kubernetes, indeed, takes security and privacy to the next level.

SHARE WITH FRIENDS
You might find this interesting
E-book
Hiring Web Developers — The Complete Guide
E-book
Top Tools for Cost-Effective Web Development — eBook
Our cases
Reformation of Deployment Cycle for Bosch Classic Cars Portal
Our cases
Fast and Lightweight Mobile Application based on PhoneGap/ Cordova
E-book
Determining Approaches to Mobile App Development
Our cases
VAIX - Fault tolerant infrastructure for 24/7 high-load machine learning service
Testing
Qualität + Transparenz durch Agile Test Coaches
Other
ANGULAR, VUE, JQUERY, REACT ODER EMBER?
Web,Amazon Web Services
Vorteile durch Serverless Development für Startups: niedrigere Kosten, kürzere Time-to-Market
DevOps
Ist serverlose Architektur die Zukunft der Webentwicklung?
Our cases
The Platform Providing Event Organization
Testing
Fallstudie Testautomatisierung: Cucumber, Selenium und Jira Xray
DevOps
Kubernetes Beratung – Übernehmen Sie die Kontrolle über Ihre K8s!
Our cases
Liferay Portal Developers: Performance Tuning Case Study
Our cases
Reference: Major producer of auto electronics and spare parts
Web,Other
JAMSTACK IS THE NEW FACE OF STATIC SITES
Web
When Microservices Help Make Future-Ready Products
Outsourcing
Agile entwickeln mit festen Budgets | K&C Software München
Web,Outsourcing
How to Control Agile Development: Progress and Costs
Web,Amazon Web Services
CLOUD DEPLOYMENT: YOUR APPLICATION’S OPTIONS
Other
Culture eats technology for breakfast
Outsourcing
The BPM in the Microservice Environment
Web
Microservices… when do we need them?
DevOps
How We Use Ansіble for Configuration of Our Environments
DevOps
Monolith, Microservices, Serverless... Which Will You Choose and Why?
Web
Node.js 10.0.0: Everyone’s Favorite Got Even Better
Outsourcing,Other
How to Ramp up Your Team Wisely
Other
Big Data: Why Your Business Needs it ASAP
Testing
What Is Quality Assurance and Why You Need It Immediately
Other
Europe’s Big Payments Directive PSD2
Web,Outsourcing,Other
JS Frameworks: The Trendiest Frameworks You Should Know
DevOps,Outsourcing
AWS DevOps: A New Way to Run Business
Our cases,Amazon Web Services
CLOUD SOLUTION VS. BARE METAL SERVER: WHEN AND WHY
DevOps
Cloud-Trends 2019 - Hybrid, SAAS und PAAS | K&C Beratung
Web,Amazon Web Services
Your Guide To AWS Cognito For Serverless User Authentication
Web,Amazon Web Services
React Developers Munich
Web
K&C insights: how to make your workflow work for you
Web,Outsourcing,Other
How a Company Can Benefit from White Label: K&C experience
Web,Outsourcing
Angular 6 Will Be A Hit
Our cases
Bosch Classic Cars - Digital Engagement Platform for 19K Vintage Car Owners
Our cases
CLOUD-LÖSUNG VS. BARE METAL SERVER: WANN MACHT WELCHER ANSATZ SINN?
Amazon Web Services
Auswahl Cloud-Provider ohne Vendor Lockin
Other
Swimming with Sharks
Web,Amazon Web Services
Serverless vs. Hadoop & Containers In The Evolution Of Big Data & AI
Web,DevOps,Our cases
Our case: Marketplace for gaming goods
DevOps
DevOps with Puppet: Tips on Setting it up for Configuring Servers
DevOps
Kubernetes-Cluster absichern mit Hashicorp Consul/Vault
Web
How to Motivate Your Dedicated Team to Work with Legacy Projects
Web
Technologies that Foster Digital Transformation
DevOps
DevOps als DevSecOps – Integrierter Schutz vor Bedrohungen ohne Termin- und Budgetüberschreitung
DevOps
Hybrid, SAAS+PAAS: cloud solution trends to watch in 2019
Our cases
How to apply React Native while developing heavy cross-platform mobile apps
Web
Fintech Apps - A Lucrative Solution for Customers and Businesses Alike
Our cases
Drivelog.de — Web Marketplace for Car Owners and Service Providers
E-book
Digital Transformation: the Philosopher’s Stone of Economic Growth
Web,Amazon Web Services
Vue.js 2019 - not Angular / React
Web
4 Time-Saving Ways to Test Your Cross Platform Mobile App
Web
Why Serverless Development For Start-Ups: Lower Costs, Faster to Market
Our cases
Micro-service Architecture for New AngularJS Application - Case Study
DevOps
KUBERNETES-BERATUNG: SCHRITT FÜR SCHRITT ZUM HEPTIO ARK (VELERO) BACKUP
DevOps,Outsourcing
KUBERNETES ALS FÜHRENDE MICROSERVICE-ARCHITEKTUR IN PUNCTO SICHERHEIT
DevOps
How to start services on Linux
Web,Outsourcing,Other
JavaScript & WebSockets: How to Build Real-Time Applications
Web,Mobile,Outsourcing,Other
All You Wanted to Know About Chatbot Platforms
Web
Scaling software solutions - how it works
DevOps
Docker: Virtualize Your Development Environment Right
Web,Amazon Web Services
What's New In React 16.3.0 - 16.4.2 | K&C React Dev
Web,Other
How to Make Your Web Solution Rock: 7 Areas to Check
Other
The Power of the Holistic Business Analysis
Web,Mobile,Amazon Web Services
SERVERLOSE ARCHITEKTUR FÜR CLOUD-BASIERTE APPS: TECHNOLOGIE-ANBIETER UND GRENZEN
Marketing
Аudience-based Marketing
Our cases
Portal Performance Tuning For Major German Travel Agency
Web,Outsourcing,Other
Angular 5 VS React.js – Who’s Going to Set the Tone in the Upcoming Year?
DevOps
Installation and setting up: Nextcloud as a local network storage on CentOS7
DevOps
Setting Up: Traefik Balancer In Rancher Cloud
DevOps
Your DevOps Transformation Consulting Partner
Mobile
WHY THE IONIC FRAMEWORK IS THE BEST CHOICE FOR YOUR HYBRID APP
Web,Outsourcing,Testing
QA for CxOs: How to Hire and Outsource
Web,Other
GoLang: Features, Pros and Cons
Web,Outsourcing,Other
Angular vs. React vs. Vue – Let the Fight Start!
Web
Pros and Cons of Serverless Web Development
DevOps
DevOps As DevSecOps – Full Integration of Threat Protection Without Compromising Deadlines or Budgets
Web,Outsourcing
Migration from Angular 1 to Angular 5
DevOps
How to Build a Rancher & Docker Based Cloud
Web
Plan to Succeed: 4 Tips for Building Scalable Software
DevOps
Use case: how to build and run Docker containers with NVIDIA GPUs
DevOps
DevOps Consulting – Our Business Is Automating Yours
DevOps
How to setup Kubernetes cluster on AWS
Web,Other
Dedicated Teams for Web Development: Choice Criteria to be Checked
DevOps,Amazon Web Services
Kubernetes at the Forefront of Secure Microservices Future
Web,Amazon Web Services
Your Expert Angular Developers in Munich | K&C Development
Mobile
Native or Hybrid Apps: A Quick Comparison
Web
Angular 4 vs React – what to choose in 2017
Other
Don’t Treat Me Like a Fool: The worst thing you can do for your business
Web,Outsourcing
ANGULAR 6 versus REACT 16.3
DevOps
Is Serverless Architecture the Future of Web Development?
DevOps,Outsourcing,Other
ROCKET.CHAT as an internal messaging system and helpdesk platform
DevOps
Serverless Architecture Consulting Services
DevOps
Kubernetes Consulting – Take Control of Your K8s!
Web
Debunking imaginary shortcomings of cross-platform frameworks
DevOps
Serverless Providers: A Comparative Analysis of AWS Lambda, Azure Functions & Google Cloud Functions
Web,Mobile
Wann eignen sich Progressive Web Apps ?
Web,Outsourcing,Testing
Web App Security 101: Keep Calm and Do Threat Modeling
Web
Web App Security 101: How to Defend Against a Brute Force Attack
Web
A secret formula of an agile dream team
DevOps
How We Manage Our Infrastructure with Chef
Web,Outsourcing,Testing
Sicherheit für Web-Anwendungen - dank Threat Modeling
Web,Amazon Web Services
Single Page Application SEO: Tips & Tricks
Web,Our cases
White Label: A Customized Software Solution from a Business and Tech Perspective
Amazon Web Services
Hybrid Cloud Consulting Services in Munich
Web
Agile and DevOps are Key Drivers of Digital Transformation
Other,Marketing
How to Become a Leader in Your Market
DevOps
How To Launch Kubernetes Federation on Google Cloud Platform
Web
Advanced Technologies for Marketing Automation
Other
How to Convert Your Business to an Amazon-Style Market Leader
Outsourcing
SCALED AGILE FRAMEWORKS: HINTERGRÜNDE UND AUSFÜHRLICHER LEITFADEN
Testing
Test Automation Case Study: Cucumber, Selenium and Jira Xray
Web,Amazon Web Services
Cloud App Security: Three Authentication Approaches
Web
Cost efficient technologies
Web,Mobile,Back-end,Amazon Web Services
Why Enterprises Choose Serverless Architecture
Web
Centralized Logging with Logstash, Elasticsearch & Kibana
Web
Angular 2.0 vs Angular 1.4. What fits you best?
Outsourcing
SCALED AGILE FRAMEWORKS: YOUR COMPLETE GUIDE TO WHICH, WHY AND HOW
Web
JQuery vs. Angular: Ad Astra per Aspera
Web,Mobile,Outsourcing
Progressive Web Apps and Why You May Need Them
Web
Serverless Application Developers: Our Tech Talent, Your Success
DevOps
Kubernetes backup with Heptio Ark (Velero)
Other
GDPR: Smart Practices
Web
All You Need to Know About Web App Security Now
DevOps,Outsourcing
Rancher 2.0: A Quick Look at the New Version
Other
Angular vs. Vue vs. jQuery vs. React vs. Ember
Web,Outsourcing
Node.js vs. Angular.js – Two Sides of the Same Coin
Web,Outsourcing,Other
Angular 5.0.0 – A Better Version of Itself
Testing
Agile Test Coach - Ensuring Code Quality & Transparency
DevOps
What to Choose: NFS or CEPH?
DevOps
Guide for Hashicorp Consul/Vault with Kubernetes
Web,Outsourcing,Other
Golang vs. Node.js
Web
A Guidance for Keeping Your Web Development Project Within the Budget: Three Key Pillars
Outsourcing,Amazon Web Services
FUNKTIONEN VON AWS LAMBDA DEBUGGEN
Other
I’m Tired of Blockchain Hype, Are You?
Web,Outsourcing
Angular 6 vs. Ember 3
Web,Other
SSR or CSR for Progressive Web App
Web,Amazon Web Services
ANGULAR 7 OR REACT For Your App?
Outsourcing,Testing
Die Rolle des QS-Teams in Software-Projekten
Outsourcing,Testing
How the QA Team Tests Your Project
DevOps
DEBUGGING AWS LAMBDA FUNCTIONS
Web,Mobile,Back-end,Amazon Web Services
Serverless Architecture for Modern Apps: Stacks Providers & Caveats
DevOps,Outsourcing,Amazon Web Services
Information Security with AWS DevOps