Working with Azure brings a very familiar challenge: the naming convention. Who remembers inheriting servers named after cartoons, vegetables, scientists or random jokes? It’s always funny until it starts scaling.
In recent years the Event Sourcing pattern has become increasingly popular. By storing a history of events it enables us to decouple the storage of data from the implementation of
Credit Strategy Fireside Chat – Vulnerable data with Ryan Pullen At this years’ Vulnerability Summit, Stripe OLT’s Ryan Pullen, provides an insightful overview of Vulnerable Data and what it means
We are aware of the fact that most individuals and companies have embraced cloud computing nowadays and all the benefits it provides as such. The number of cloud users, especially