Site Overlay

Our guide to the AWS Reliability Pillar

Reading Time: 5 minutes Mark, Mike and Dave share their thoughts on the AWS Reliability Pillar that forms part of the Well Architected Framework. This is the third part of a series of talks. All engineers need to design their systems for reliability but the team show how Serverless can free up thinking timeContinue readingOur guide to the AWS Reliability Pillar

Is it time to combine Serverless and SaaS?

Reading Time: 4 minutes There were a number of fantastic SaaS talks at AWS re:Invent 2021, with strong Serverless content throughout. So we thought it was a good time to talk about SaaS and how combining Serverless and SaaS can really give your business its Serverless Edge. What is SaaS? SaaS or Software-as-a-service isContinue readingIs it time to combine Serverless and SaaS?

Our guide to the AWS Security Pillar

Reading Time: 7 minutes Mark, Mike and Dave do a walkthrough the AWS Security pillar that forms part of the Well Architected Framework. This is the second part of a series of talks. The team share their insights into how to manage this vital but often complicated aspect of modern architecture. Dave Anderson   GoodContinue readingOur guide to the AWS Security Pillar

What is the Operational Excellence Pillar for Well Architected?

Reading Time: 6 minutes The Serverless Edge Team talk through their experiences of working through the Operational Excellence Pillar on their well architected journeys. This is the first of a series of conversations on well architected. Well Architected Dave Anderson   So we figured there’s been a lot of good conversation about well architected andContinue readingWhat is the Operational Excellence Pillar for Well Architected?

Stride Threat Model and security threat modeling tools

Reading Time: 7 minutes Stride Threat Model and other security threat modelling tools and techniques have fired the discussion this week: ‘Threat modelling, as a technique has been awesome, not only for good application design, but also for having conversations with security partners/teams on the threats we have identified and what we’re doing toContinue readingStride Threat Model and security threat modeling tools

Translate »
%d bloggers like this: