PORTFOLIO
Below are blog posts that I have written. I enjoy writing about WordPress and technology, living life on purpose, personal growth, online learning and remote work.
- All
- Software Development
- WordPress
- Online Learning
- Remote Work
- Personal Development

Scalable Infrastructure for Complex News Websites
Today’s news websites are more than just digital platforms that deliver up-to-date news articles. They incorporate multimedia such as live streaming, video, and audio, for content like weather updates, lifestyle, entertainment, and sports sections, to cater to a broad audience.

What is a Lateral Movement Attack and How Do You Prevent It?
In the context of network security, a lateral movement attack describes how malicious actors breach a network, then leverage that foothold to stealthily gain more access to a company’s sensitive resources. In this article, we’ll look at the ways a lateral movement attack can affect your organization, as well as how to detect and prevent it.

Replacing Shopify Plus with a Scalable E-Commerce Architecture
Shopify Plus, Shopify’s option for large-scale e-commerce merchants, is having some challenges meeting the needs of its large-scale enterprise customers. In this article, you’ll look at some weaknesses of Shopify Plus and how you can replace its underperforming components with a more flexible and scalable modular e-commerce solution.

kubectl Cheat Sheet
Kubectl is the default command-line tool for Kubernetes. It makes it easier to use the Kubernetes API and manipulate Kubernetes resources. This guide will look at how best to integrate the most common and useful kubectl commands into your workflows, as well as provide some helpful tools for further optimization.

Identity Proofing: What is it and Why Do You Need It?
As companies and users engage in more online transactions and digital services, businesses must take greater measures to confirm a person is who they say they are. Identity proofing verifies and authenticates the identity of legitimate customers to prevent fraudulent users from accessing your data an is your first line of defense against data breaches and theft.

Single Source vs. Multichannel vs. Omnichannel Publishing
Consumers engage with content through a variety of sources including social media, e-commerce sites, and SMS messaging,. Your content must be easy for consumers to find on a variety of channels and use on a variety of devices. This article looks at how a content hub can improve the reach of mobile platforms via multi- and omnichannel methods.

The Factors That Matter When Selecting an Online Video Player
With the increase in demand for video streaming services, video content needs to be delivered in a way that keeps consumers engaged without affecting user experience. This guide discusses the factors you need to consider when choosing an online video player.

Everything you Need to Know About Content Modeling
Smartphones, digital assistants, and IoT devices create new avenues for content consumption and users are demanding experiences optimized for the devices they use. Content modeling helps your organization to clarify its content creation needs so that it can be presented in several different mediums. In this post, you’ll learn how to build a flexible content model that serves your current and future content needs.

The Role of Code Coverage in Regulations and Standards
In regulated industries, it is critical for developers to maintain compliance with recommended safety standards to mitigate risks that could cause serious harm or loss of life. In this article, we look at the regulations that dictate code coverage requirements in in several industries including automotive, aerospace, and medical.

Understanding the Roles in Quality Assurance
Untested bugs and broken code are the most common bugs found in production environments. Quality assurance plays an integral part in the software development process. In this guide, we discuss QA roles and how a QA team can best support product and development teams.