Blog

September 3, 2024
Meet IN4IT: This is Vasilis

My day usually starts with a morning walk around my city’s seaside, it energizes my mind and body so I can prepare for the day’s tasks...

July 26, 2024
A Practical Guide to Single Sign-On (SSO)

As businesses increasingly rely on cloud-based applications, managing access efficiently becomes a top priority...

July 3, 2024
A DevOps Guide to Observability

In today's fast-paced, cloud-driven world, managing and monitoring your applications is essential...

June 14, 2024
A Practical Guide to Essential Tools for DevOps Professionals

DevOps professionals rely on a wide array of tools to streamline workflows, manage infrastructure, and automate processes...

May 29, 2024
OpenVPN vs. WireGuard

In the fast-paced world of DevOps, security and efficiency are top priorities, especially when it comes to maintaining private networks....

May 08, 2024
The Path to Becoming an IT Professional: A Guide to Breaking into DevOps

Becoming a professional in the IT industry is an exciting journey filled with learning, curiosity, and problem-solving...

May 02, 2024
How to Become a DevOps Professional: A Step-by-Step Guide

Entering the world of DevOps can seem daunting, especially with the vast number of skills, tools, and concepts involved. But by following a structured approach, anyone with a passion for technology can successfully become a DevOps professional...

April 24, 2024
SQL vs. NoSQL and Distributed Databases: What’s the Right Choice for Your Application?

When designing the data layer of an application, one of the key decisions you’ll face is choosing the right type of database....

April 17, 2024
What's The Difference Between DevOps and Platform Engineering?

In recent years, the conversation around software development and infrastructure management has shifted from DevOps to a newer term: Platform Engineering....

April 10, 2024
Monoliths vs. Microservices in DevOps

In the world of DevOps, the debate between monolithic architectures and microservices has become a topic of significant debate....

April 4, 2024
Optimizing AWS RDS and EC2: Addressing Performance and Scaling Bottlenecks

When it comes to cloud infrastructure, two of the most frequently used Amazon Web Services (AWS), are Relational Database Service (RDS) and Elastic Compute Cloud (EC2)....

March 13, 2024
Exploring Generative AI: LLMs, RAGs, and AWS Bedrock

Generative AI is revolutionizing how businesses leverage artificial intelligence for complex tasks like text generation, problem-solving, and even code development....

March 7, 2024
The Hidden Costs of Kubernetes: What You Need to Know

Kubernetes, often hailed as a revolutionary technology for container orchestration, is increasingly becoming the go-to solution for organizations of all sizes....

March 5, 2024
A Comprehensive Analysis of AWS Athena, AWS S3, and AWS Glue

In today's data-driven world, organizations are constantly looking for ways to manage and analyze vast amounts of data efficiently and affordably....

February 26, 2024
Understanding mTLS on AWS Application Load Balancer: Enhanced Security for Your APIs

Security in today’s digital landscape is a critical priority for businesses, especially those running APIs and other backend services that require stringent access control....

February 8, 2024
Easy and Cost-Effective App Deployment on AWS

Deploying applications in the cloud has never been easier, thanks to the wide array of tools and services available on Amazon Web Services (AWS)....

Feb 14, 2022
CDK For Terraform

If you want to provision infrastructure using familiar programming languages rather than using the HashiCorp Configuration Language (HCL), you can now do so using the Cloud Development Kit for Terraform (CDKTF)...

Feb 11, 2022
Meet IN4IT: This Is Pablo

Another amazing team member who provides IN4IT with unparalleled service is Pablo Serrano Jabonero, our resident Site Reliability Engineer who has been with us for nearly three years...

February 1, 2022
How Our New York and Belgium Office Works Together

Here at IN4IT, we believe in being remote-first, since that not only allows us to attract the best talent possible but also puts us in the perfect position to service our worldwide clientele with our AWS consulting services....

February 1, 2022
Meet IN4IT: this is Andre

Here at IN4IT, we believe in being remote-first, since that not only allows us to attract the best talent possible but also puts us in the perfect position to service our worldwide clientele with our AWS consulting services....

January 27, 2022
Meet IN4IT: this is Alessandro

Alessandro Marino is one of the many wonderful team members who have given their best to the job and have ensured the delivery of high-quality work and a diligent work ethic...

January 24, 2022
Adopt A Cloud Strategy

Why Your Company Should Adopt a Container Strategy to Reduce Cost and Improve Developer Productivity...

Jan 18, 2022
Proudly Announcing AWS Advanced Consulting Partner Status

We are proud to announce that IN4IT gained AWS advanced consulting partner status. We want to thank all customers, employees, and AWS for helping us achieve the coveted standing. We are a member of this group of partners, along with a list of different incredible companies....

Dec 16, 2021
About Sweepbright

SweepBright transforms each step of the real estate transaction process into a fully digital journey. Its rich stack of features possible by an open architecture, empowers real estate agencies of any kind to become far more efficient and deliver exceptional customer experiences...

Dec 9, 2020
Kubernetes Pod Security Policies

This is the 3rd part of IN4IT’s “Kubernetes Security blog series”. In this blog we are going to cover what Pod Security Policies are. How can they help you secure your Kubernetes cluster and how to implement them....

Nov 25, 2020
Kubernetes Secrets Management

Once you start deploying applications to Kubernetes, you quickly realize Secrets Management takes a lot of time to get right. The Kubernetes Secret and ConfigMap objects don’t yet have all the features you’d expect to properly setup Secrets Management. Until Kubernetes has these capabilities built-in, you’ll have to come up with your own mechanism to deal with secrets....

Nov 18, 2020
Using Network Policies to control traffic in Kubernetes

First of all, you need to think about what kind of network traffic you want to filter. The easiest way filtering traffic is on Layer 3 and 4, which is at the IP address and port level. If you’d like to filter on http/https hostname, then you’ll need Layer 7 filtering, which is currently not supported by Kubernetes Network Policies. For that, you would need a separate proxy server within your cluster....

October 2, 2020
How IN4IT delivered Cake's banking platform

Extremely proud to show you how we helped our FinTech costumer Cake to deliver a resilient and secure banking platform using Amazon Web Services....

August 27, 2020
How do you keep up with every AWS product?

Techradar reported in early 2020 that Amazon Web Services now has 175 products. Between the start of SQS (November 2004) and August 2020, there are more than 7500 announcements made on "What’s new at AWS"....

August 25, 2020
Don't just offer infrastructure to your teams, offer building blocks instead!

Companies often fall into the trap of building standardized infrastructure themselves, then offer it to their teams to run their workloads on...

August 25, 2020
Reducing your IT operational cost by building custom software

When Amazon started rewriting its closed source software for networking devices, they started with a warning that it'll get worse first before it’ll get better...

July 30, 2020
How We Use AWS Config To Protect Our S3 Buckets From Public Access

Every time you're reading about yet another unprotected S3 bucket that has leaked, you’re probably wondering how is it possible to let this happen...

July 15, 2020
Protect your AWS access keys by using Permission Boundaries

AWS Users and Roles can have their permissions limited by a Permission Boundary. The effective permissions are at the intersection of the user or role policy and the permission boundary...

July 8, 2020
How cake.app uses Kinesis to deliver real-time insights.

Cake brings together all your existing bank accounts and transactions. The app analyses your financial data and habits, to make your life better...

July 2, 2020
Use case: Amazon WorkSpaces

Employees typically get a laptop or workstation to do their work. Contractors use their own laptops or workstations in most cases. This brings all kinds of challenges on how to manage and secure these...

June 17, 2020
Use case: How to use Envoy for JWT revocation

JWTs (JSON Web Tokens) provide an easy and scalable way to perform user access control. JWTs are often used in microservices...

June 2, 2020
Use Case: Athena Data Partitioning

Data partitioning helps to speed up your Amazon Athena queries, and also reduces your cost, as you need to query less data...

June 2, 2020
You can probably pay a lot less for your BI software solution.

Learn how we ingest, process, and visualize data at a price point you never thought was possible.​...

May 29, 2020
This is how IN4IT's emergency hotline works.

IN4IT offers 24/7 support contracts to its customers. It’s very important for us that our customers can easily and reliably reach IN4IT when they need assistance...

November 14, 2019
Use-case Cake

IN4IT has been selected to be the go-to cloud partner for a financial data analytics firm called Cake...

February 21, 2019
Migrate Legacy Java Apps To AWS Fargate

Even 5-10 year old java applications can be containerized and migrated to the cloud...

September 17, 2017
A fully automated #DevOps Pipeline in 5 Simple Steps

The prerequisite of being able to deploy through a fully automated pipeline is to have cloud native applications...

July 27, 2016
Use Case: Docker Containers In Production

My latest course is all about scaling applications on-premise and in the cloud. I just a few paragraphs I'll explain why you would want to make your application scalable and how you would do it...

June 5, 2016
Scaling Applications in the Cloud

My latest course is all about scaling applications on-premise and in the cloud. I just a few paragraphs I'll explain why you would want to make your application scalable and how you would do it...

October 12, 2015
Why You Should Use Microservices, In 7 Steps

Due to the nature of microservices the system is composed out of collaborating services, for each of these services you can, but don't need to, use a different technology...

October 9, 2015
Move Fast AND Stay Secure: AWS ReInvent Executive Summary

AWS ReInvent Executive Summary. AWS has more than 1 million active customers (2015)...

October 7, 2015
Running Microservices In 4 Steps, On-Premises Or In The Cloud

The traditional monolithic application architecture is easy to develop, test, and deploy. Unfortunately those applications tend to become large, complex, and as a team it's difficult to work together on the app...

September 29, 2015
The 5 business benefits of the twelve factor app

Today, software is often delivered as a service. 12factor is a methodology for building software-as-a-service applications. By using this methodology, you ensure best practices and lots of business benefits that come with it...

August 12, 2015
Write 12-Factor PHP Apps - And Be Loved By DevOps

Today we want to focus on the app, not on the operations involved by running a zero-downtime, scalable, resilient (web) application...

August 11, 2015
Why use Cassandra NoSQL database

NASA gathered approximately 1.73 gigabytes of data before you are able to reach the end of this sentence...

August 11, 2015
DevOps in 4 steps for busy people

The big operational cost of applications is maintenance....

July 27, 2015
DevOps in 4 steps for busy people

Implementing DevOps starts with optimizing your existing Software Development LifeCycle to bring Dev and Ops closer together...

July 22, 2015
The end of the System Administrator

The big operational cost of applications is maintenance....

July 15, 2015
5 steps to start with Big Data at a low cost

Use Cloud Storage as your Data Lake...

July 14, 2015
Avoid Cloud Vendor Lock In

Every Cloud provider wants you to sign up for their services. To do that, they will offer you some free services....

July 13, 2015
Sensitive Data On The Cloud

The cloud is not secure enough...