Running a DDD Design-Level Event Storming is not rocket science! It’s still crucial to start the right way: with domain events and the Picture that explains Everything! This post is the second in a series about how to build event-based systems with Design-Level Event Storming and DDD.
Archives for October 2019
A Quick and Easy Guide to tmux
I love working with the command line. Seriously, I think there’s hardly any more productive and more versatile tool for a software developer than the terminal. Maybe it’s the hacker/wizard/neckbeard kind of feeling I get when using a terminal, I don’t know.
3 ways to handle secrets in AWS ECS tasks
No matter how much time and effort we spend on application security, it is always less. But simple workflows for things like secret management, key rotation and password expiration go a long way in making our applications and infrastructure resilient against the obvious attack vectors.
Securing credentials using AWS Secrets Manager with AWS Fargate
This post is contributed by Massimo Re Ferre – Principal Developer Advocate, AWS Container Services. Cloud security at AWS is the highest priority and the work that the Containers team is doing is a testament to that.
- 1
- 2
- 3
- 4
- Next Page »