IT Transformation Principals (Part 1)

Over the past 15 years, I’ve had the privilege of helping hundreds of companies in the USA and Europe with their journey on catching up with technology and transforming their business, so they are able to achieve greatness and stay competitive. Within that time I realized that there are certain patterns in every engagement which Read more about IT Transformation Principals (Part 1)[…]

Best practices for securing the container life cycle

IT organizations are using container technology and DevOps processes to bring new-found agility to delivering applications that create business value. However, enterprise use requires strong security at every stage of the life cycle. Nothing is secure by default—security takes work. You need defense in depth. Red Hat delivers multiple layers of security controls throughout your Read more about Best practices for securing the container life cycle[…]


Hit Counter provided by laptop reviews