Technical requirements There are a few technical requirements that may need to be fulfilled if you want to get the most out of this chapter: Well, if you can get
Read MoreCategory: Technical requirements
Python SDKs (and why everyone uses them) – Provisioning Resources
Python SDKs (and why everyone uses them) Let’s take it from the top. SDKs, or software development kits, are official programming libraries and CLIs released by a platform that allows
Read MoreContainers and where Python fits in with containers – Provisioning Resources
Containers and where Python fits in with containers Containers are small packages of software that serve as a unique runtime containing all of the necessary resources to run a small
Read MoreEdge location-based resource sharing – Manipulating Resources
Edge location-based resource sharing One of the most difficult challenges that we have with a global application is load time for resources. If a user is too far from the
Read MoreAnalyzing data – Manipulating Resources
Analyzing data I have found that – as an adult – I have increasingly become more and more responsible for myself. However, this responsibility and the person that I am
Read MoreAnalysis of historical data – Manipulating Resources
Analysis of historical data Live data can help us make adjustments; they are tactical. But to be truly strategic – to think about the big picture and to think long
Read MoreRestart – Manipulating Resources
Restart Sometimes – and I hope for your sake that that time is early in the development process – you need to throw the things you have out entirely and
Read MoreExtract and obfuscate PII – Security and DevSecOps with Python
Extract and obfuscate PII A person’s sensitive personal information is one of the most valuable things they have: financially, socially, and intimately. Compromising the security of this information can result
Read MoreIncident monitoring and response – Security and DevSecOps with Python
Incident monitoring and response How would one define an incident? Well, let me posit this to you: what would you do if a bear attacked you? Does this sound stupid?
Read MoreRunning runbooks – Security and DevSecOps with Python
Running runbooks When we talk about incident response, one of the most common responses to an incident that affects your resources is to turn it on and off again. This
Read More