Holistic web protection: industry recognition for a prolific 2020
Introduction I love building products that solve real problems for our customers. These days I don’t get to do so
Continue readingNews for slackers
Introduction I love building products that solve real problems for our customers. These days I don’t get to do so
Continue readingServing more than approximately 25 million Internet properties is not an easy thing, and neither is serving 20 million requests
Continue readingIt’s been …a year. Nonetheless, while you were busy homeschooling, baking, or well, working longer hours, so were we, and
Continue readingAt Zendesk, Apache Kafka® is one of our foundational services for distributing events among different internal systems. We have pods,
Continue readingWhen it comes to the container world, it is common to have an application deployed to a cluster that needs
Continue readingEvery journey starts with one step. Whether that step is the first toward climbing a mountain or launching the campaign
Continue readingAs per the design, Keycloak imports all users into its local database if the users are authenticated via any third-party
Continue readingThis article describes the integration of Red Hat Single Sign-On (SSO) with Red Hat Directory Server 11 (LDAP). It also
Continue readingPhoto by bradhoc on Flickr tldr: lock images to sha digests instead e.g. [email protected]:{{SHA…}} It’s pretty common to start off a
Continue readingWe’re excited to announce that you can now set up your Access policies to require that all user traffic to
Continue reading
Recent Comments