The RunAsCloud Blog

  • Durba Banik
    As we all know in this era of technology, manual tasks are gradually becoming obsolete. Everyone in the industry expects that processes, phases of development and deployments are expedited. The achievement of CI/CD (Continuous Integration and Continuous Deployment) plays an astounding role in automating every phase of the software development lifecycle.   The basic phases for CI/CD are CodeCommit, Build, Test and Deploy. With the help of a CI/CD pipeline, the process of delivering the Read More
  • Jake Berkowsky
    It seems the whole tech world is full of developers. Everyone and their mother (and my mother even) have learned to code and many are trying to start or change their careers to match. There are code bootcamps in every major city and it’s easy than ever to get started. Operations, however, remains a dirty word invoking images of pale nerds replacing wires in datacenters or manually parsing through log files. Companies make millions with Read More
  • Sean McDonnell
    Last week I was asked to create a 3 tier VPC (Virtual Private Cloud) from scratch and demo it to the company. This is what I learned. Using tools like AWS (Amazon Web Services) CloudFormation or Terraform can build a VPC quicker — like a microwaveable meal. However, if you’d like to learn the intricacies of a VPC like how a chef learns how to prepare a meal — you’ll have a better understanding and appreciation for your cloud Read More
  • Jake Berkowsky
    Here’s a story you’ve probably heard before: A team is using WordPress to power their web app, which works great for a while, but then they start to have performance problems. They audit their installed plugins and get rid of the ones they’re not using. They add “caching” plugins to help speed up WordPress and start to follow all the best practices, but the website is still slow. Eventually, they realize that the limitations are Read More
  • Sean McDonnell
    What is GPG? GPG stands for GNU Privacy Guard (gnupg.org). GPG is a way to securely encrypt and decrypt text. For example, say you want to share a username, password, or any other sensitive information with a trusted person via Slack, GPG allows you to send that message securely. You never know if Slack could get hacked again. To leverage this secure messaging both sender and recipient require a private key. Setup: To generate a Read More