Authoritative Containers — Part 3AN IMPLEMENTATION OF A MULT-SECURITY ZONE DEVOPS PIPELINE FOR ASSURING CONTAINER IMAGESSep 18, 2021Sep 18, 2021
Authoritative Containers — Part 2HOW TO DEFINITIVELY TRUST THAT THE CONTAINERS YOU ARE DEPLOYING INTO PRODUCTION CONTAIN WHAT YOU THOUGHT THEY CONTAINEDJul 14, 2021Jul 14, 2021
What I learnt from racing hamstersDo you have a rodent friend at home ? One as a pet in a cage with a wheel, rather than one that might be lurking in your shed.Jun 27, 2021Jun 27, 2021
Authoritative Containers — Part 1BUILDING SECURE, “ASSURED” CONTAINER IMAGES FOR TRANSFER ACROSS HYBRID CLOUD ENVIRONMENTS AND BETWEEN MULTI-SECURITY ZONESJun 20, 20211Jun 20, 20211
On Premise Confidential Computing — Implementation choicesHow can you protect your data whilst it is in use ? Solutions for protecting your data whilst it is in transit or at rest have been…Jun 14, 20211Jun 14, 20211
Using Hypothesis Testing to validate features for a software productHow do you choose the best next feature for your software product ?Jul 24, 20201Jul 24, 20201
Governing a software product’s scope using User Story MapsHow do you convey and manage the scope of your software product, and what tools do you use to monitor and govern your progress towards its…Jun 15, 2020Jun 15, 2020