Tech Directory (New Additions)

Share on:
    Architectural Principles and Design Patterns

  • Doherty Threshold: The statement, attributed to IBM’s Walter Doherty, that an application’s response time that is below 400ms increases productivity. It has been popularised by the AMC Studio’s TV show called Halt and Catch Fire. (29/10/2020)
  • Local-First Software: A set of principles for software that enables both collaboration and ownership for users. Local-first ideals include the ability to work offline and collaborate across multiple devices, while also improving the security, privacy, long-term preservation, and user control of data. (19/10/2020)

  • Enterprise Software (Payments)

  • Tink: A payments and personal finance platform for European banking that is fully open banking compliant (PSD2). It also has account aggregation and data enrichment capabilities. (19/10/2020)

  • Big Data and Analytics

  • BigQuery Omni: A multi-cloud (AWS, Azure, etc.) solution based on Google Anthos to access and analyse data using the BigQuery user interface. (18/10/2020)

  • CI/CD Tooling

  • Polaris: The Synopsis Polaris Software Integrity Platform is an end-to-end SDLC, DevSecOps solution which includes IDE plug-ins, SAST and IAST tools, and integration with popular CI/CD tools such as Jenkins, GitHub, etc. (17/10/2020)
  • NextGen Code Analysis: ShiftLeft NextGen Static Analysis (NG SAST) is a solution based on the notion of a workflow that inserts into pull requests and enables developers to find and fix vulnerabilities without ever leaving their development environment. (17/10/2020)
  • Secure Code Warrior: A platform that trains and equips developers to think and act with a security mindset as they build and verify their skills, gain real-time advice and monitor skill development. This is different from the approach taken by SAST tools that apply only after the code is written. (17/10/2020)
  • Muse: A SAST solution that covers a range of bug categories including performance, reliability, security, and style/standards and is especially focused on finding deep inter-procedural bugs. (17/10/2020)
  • WebScanner: DefenseCode WebScanner DAST is solution for security audits of active web applications (websites). WebScanner will test a website’s security by carrying out attacks (SQL Injection, XSS, etc.) including OWASP Top 10. (17/10/2020)
  • Thunderscan: DefenseCode Thunderscan SAST is a solution that, in addition to static code analysis of the selected code base, it also scans dependencies for known vulnerabilities and associated CVE entries. It has a focus on compliance including PCI-DSS and HIPPA, among others. (17/10/2020)
  • CodeScan: An end-to-end static code analysis solution built exclusively to maintain quality and security for the Salesforce platform. (17/10/2020)
  • Veracode: A platform that includes security feedback in the IDE as well as an end-to-end stack consisting of SAST, DAST, SCA, as well as manual penetration testing capabilities, all in one centralised view. (17/10/2020)
  • Xanitizer: A SAST solution that performs security analysis directly on one’s GitHub repository provides the results on GitHub’s ecurity tab. (17/10/2020)

  • Ops, Monitoring, and Application Performance Management

  • M3: A solution by Uber Labs to scale Prometheus’ storage backend from a single node default configuration to one that supports several petabytes of data. (16/10/2020)

  • NoSQL Databases

  • Bigtable: A managed, column-based database in the GCP ecosystem. It is wire-compatible with HBase. (15/10/2020)
  • Apache Hbase: An open-source, Java-based column database, modelled after Google's Bigtable. It runs on top of HDFS or Alluxio. (15/10/2020)

  • Relational Databases

  • CockroachDB: A distributed SQL database built on a transactional and strongly-consistent key-value store. It scales horizontally; survives disk, machine, rack, and even datacenter failures with minimal latency disruption and no manual intervention; supports strongly-consistent ACID transactions; and provides a familiar SQL API for structuring, manipulating, and querying data. (15/10/2020)
  • YugaByteDB: A free and open-source, distributed, relational, RDBMS designed to handle large amounts of data spanning across multiple availability zones and geographic regions while providing single-digit latency, high availability, and no single point of failure. (15/10/2020)

  • Kubernetes Platforms

  • AKS: Azure Kubernetes Service (AKS) the de facto managed Kubernetes service offering the Microsoft's ecosystem. (14/10/2020)

  • Architectural Principles and Design Patterns

  • The 4+1 View Model of Software Architecture: A model for describing the architecture of software-intensive systems, based on the use of multiple, concurrent views (local, process, physical, development) plus scenarios (or use cases). (14/10/2020)

  • PaaS and Serverless

  • App Engine: Google's serverless managed platform. It provides popular runtimes such as Node.js, Java, Ruby, C#, Python, and PHP as well as the ability to bring customer runtimes too. (14/10/2020)

  • Kubernetes Platforms

  • EKS: Amazon Elastic Kubernetes Service (EKS) is a managed Kubernetes service that is tightly integrated with the AWS ecosystem and its primitives, especially IAM. (14/10/2020)

  • PaaS and Serverless

  • Cloud Functions: Google's response to AWS Lambda, in spite of having a serverless product already, in the form of App Engine. (14/10/2020)

  • Kubernetes Platforms

  • GKE: Google Kubernetes Engine (GKE) is one of the first and still the industry's reference managed Kubernetes implementation. (14/10/2020)

  • Container Technology

  • OPA: Open Policy Agent (OPA) is an open source, general-purpose policy engine that unifies policy enforcement across cloud native stacks. It is a CNCF project and geared primarily at Kubernetes use cases. (13/10/2020)

  • Compute Virtualisation Platform

  • Compute Engine: Google's capability for launching and managing VMs. (13/10/2020)

  • Testing (Load)

  • Distributed Load Testing on AWS: An AWS solution that automatically launches and configures containers running on AWS Fargate to create and simulate connected users generating a select number of transactions per second without having to provision servers. (12/10/2020)

  • Security (Containers)

  • Snyk: A vulnerability scanning solution for open source libraries and containers. (11/10/2020)

  • Payment Systems and Networks

  • SWIFT gpi: SWIFT global payments innovation (GPI), is a closed private blockchain for cross-border payments. (10/10/2020)
ALL BY CATEGORY