DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workkloads.

Secure your stack and shape the future! Help dev teams across the globe navigate their software supply chain security challenges.

Releasing software shouldn't be stressful or risky. Learn how to leverage progressive delivery techniques to ensure safer deployments.

Avoid machine learning mistakes and boost model performance! Discover key ML patterns, anti-patterns, data strategies, and more.

Core Badge
Avatar

Josephine Eskaline Joyce

DZone Core CORE

Chief Architect at IBM

Bangalore, IN

Joined Dec 2021

Stats

Reputation: 3013
Pageviews: 210.7K
Articles: 38
Comments: 7

Expertise

Security Expertise Icon

Security

  • Articles
  • Trend Reports
  • Comments

Articles

article thumbnail
Platform Engineering for Cloud Teams
Platform engineering empowers cloud teams by streamlining infrastructure, automating workflows, and enhancing developer experience to drive efficiency and innovation.
April 21, 2025
· 4,896 Views · 8 Likes
article thumbnail
Why Rate Limiting Matters in Istio and How to Implement It
In this post, we’ll explore why rate limiting is important in Istio and show you how to set it up effectively.
April 8, 2025
· 4,298 Views · 6 Likes
article thumbnail
Achieving Zero Trust and Air-Gapped IaC in IBM Cloud With Schematics
IBM Cloud Schematics enables secure, automated, and policy-driven IaC deployments in air-gapped environments by enforcing zero-trust principles.
April 4, 2025
· 4,579 Views · 4 Likes
article thumbnail
How I Made My Liberty Microservices Load-Resilient
The journey of a cloud incident that transformed fragile Liberty microservices into a resilient, self-healing system that scales effortlessly under load.
March 3, 2025
· 3,668 Views · 5 Likes
article thumbnail
Codify Your Cloud and Kubernetes With Crossplane and IaC
Crossplane enables Kubernetes-native IaC, letting platform engineers define custom APIs for provisioning, enforcing governance, and providing self-service infrastructure.
February 24, 2025
· 4,513 Views · 4 Likes
article thumbnail
Zero Trust for AI: Building Security from the Ground Up
Zero-trust AI takes a proactive approach to security, protecting your data, workflows, and systems to keep everything safe and reliable.
December 18, 2024
· 4,501 Views · 3 Likes
article thumbnail
Security Governance Simplified: Protecting Your Microservice Applications
A practical guide to implementing effective security governance in microservices, focusing on key strategies, policies, and tools to protect distributed applications.
November 15, 2024
· 2,099 Views · 4 Likes
article thumbnail
Preventing Accidental Deletions: Secure Cloud Management With Terraform
This is a quick guide to prevent accidental deletions in cloud infrastructure in Terraform, secure critical resources, and maintain a stable environment.
November 12, 2024
· 810 Views · 4 Likes
article thumbnail
Mutable vs. Immutable: Infrastructure Models in the Cloud Era
Explore mutable infrastructure and immutable structures: learn which offers flexibility for updates, consistency, reliability, and fits different cloud needs.
October 14, 2024
· 8,803 Views · 4 Likes
article thumbnail
Security at the Onset: Stabilizing CSPM and DevSecOps
Proactively integrating CSPM with DevSecOps strengthens security by continuously monitoring and addressing vulnerabilities from development to deployment.
October 8, 2024
· 5,849 Views · 4 Likes
article thumbnail
Leveraging IBM WatsonX Data With Milvus to Build an Intelligent Slack Bot for Knowledge Retrieval
This tutorial covers populating the database with IBM WatsonX Data or open-source Milvus and connecting the bot to Slack to answer queries in real-time.
September 27, 2024
· 4,369 Views · 4 Likes
article thumbnail
Battle of the RabbitMQ Queues: Performance Insights on Classic and Quorum
When deciding between RabbitMQ’s Classic and Quorum queues, it’s important to recognize that both have their strengths and weaknesses. Learn more here.
September 19, 2024
· 10,808 Views · 8 Likes
article thumbnail
Transforming Continuous Delivery With Feature Flags
Integrate feature flags into CI/CD pipelines to mitigate deployment risks, ensure safer feature rollouts, and facilitate feature testing.
September 10, 2024
· 6,130 Views · 8 Likes
article thumbnail
Workload Protection in the Cloud: Why It Matters More Than Ever
Protecting cloud workloads is crucial as threats evolve and environments become more complex. Learn about effective Cloud Workload Protection (CWP) here.
September 3, 2024
· 4,210 Views · 4 Likes
article thumbnail
Full-Stack Security Guide: Best Practices and Challenges of Securing Modern Applications
Explore essential strategies, techniques, and tools to secure modern applications at every layer and the best practices and challenges encountered in full-stack security.
August 31, 2024
· 8,426 Views · 11 Likes
article thumbnail
Advanced Deployment Strategies
Advanced deployment strategies leverage feature flags and centralized configuration management to improve software delivery.
July 22, 2024
· 4,660 Views · 6 Likes
article thumbnail
Optimizing Your Cloud Resources, Part 2: Resource Management via IBM Cloud Projects
A collection of configurations used to organize and manage the Infrastructure as Code (IaC) deployments and related resources across multiple accounts.
June 21, 2024
· 2,786 Views · 3 Likes
article thumbnail
Optimizing Your Cloud Resources, Part 1: Strategies for Effective Management
In this article, explore options to optimize your cloud resources to enhance performance, reduce costs, and improve efficiency.
June 20, 2024
· 5,379 Views · 4 Likes
article thumbnail
Building an AI-Powered Slack Bot With IBM WatsonX
Leverage WatsonX's AI capabilities to create innovative applications that streamline processes and boost productivity, making life easier and more productive for users.
May 28, 2024
· 1,574 Views · 7 Likes
article thumbnail
Securing Secrets: A Guide To Implementing Secrets Management in DevSecOps Pipelines
Secure secrets management in DevSecOps is crucial to prevent breaches. Implement best practices, automate rotation, and use tools for robust security.
May 9, 2024
· 7,495 Views · 6 Likes
article thumbnail
Debugging Terraform Like a Pro: Strategies for Efficient Infrastructure Management
Mastering debugging in Terraform by identifying and resolving issues in Terraform configurations, states, and workflows.
April 24, 2024
· 2,380 Views · 4 Likes
article thumbnail
Deep Dive Into Terraform Provider Debugging With Delve
In this article, we will learn how to enhance debugging skills and troubleshoot issues in Terraform providers with confidence.
April 22, 2024
· 4,716 Views · 6 Likes
article thumbnail
Unlocking Personal and Professional Growth: Insights From Incident Management
By applying the principles of incident management, developers can grow both personally and professionally, leading to more fulfilling and successful lives.
April 3, 2024
· 12,566 Views · 5 Likes
article thumbnail
Building a Fortified Foundation: The Essential Guide to Secure Landing Zones in the Cloud
Explore Secure Landing Zones (SLZ), a foundational architecture in the cloud that provides a secure environment for hosting workloads.
March 29, 2024
· 2,197 Views · 5 Likes
article thumbnail
Deno Security: Building Trustworthy Applications
Deno's design philosophy prioritizes security, making it an ideal choice for building secure, reliable, and trustworthy applications.
March 28, 2024
· 2,964 Views · 4 Likes
article thumbnail
Securing Cloud Infrastructure: Leveraging Key Management Technologies
This article explores the world of secure key management, the intricacies of KMS and HSM, their benefits, use cases, key considerations, and best practices.
March 20, 2024
· 8,770 Views · 3 Likes
article thumbnail
Empowering DevOps: The Crucial Role of Platform Engineering
Learn about platform engineering, a cornerstone of DevOps that provides the foundation to build efficient, scalable, and reliable software delivery pipelines.
March 13, 2024
· 3,937 Views · 4 Likes
article thumbnail
NIST AI Risk Management Framework: Developer’s Handbook
The NIST AI Risk Management Framework offers a comprehensive approach to addressing the complex challenges associated with managing risks in AI technologies.
February 19, 2024
· 5,162 Views · 11 Likes
article thumbnail
What Is Platform Engineering?
Explore platform engineering and its fundamental principles, multifaceted functions, and pivotal role in revolutionizing streamlined development processes.
February 6, 2024
· 7,749 Views · 6 Likes
article thumbnail
Building Secure Cloud Applications: A Developer’s Companion to NIST CSF
A developer's guide to building a secure cloud environment with the NIST Cybersecurity Framework.
January 23, 2024
· 2,708 Views · 2 Likes

Trend Reports

Trend Report

Enterprise Security

Security is everywhere: Behind every highly performant application, or even detected threat, there is a powerful security system and set of processes implemented. And in the off chance there are NOT such systems in place, that fact will quickly make itself known. We are living in an entirely new world, where bad actors are growing more and more sophisticated the moment we make ourselves "comfortable." So how do you remain hypervigilant in this ever so treacherous environment?DZone's annual Enterprise Security Trend Report has you covered. The research and expert articles explore the fastest emerging techniques and nuances in the security space, diving into key topics like CSPM, full-stack security practices and challenges, SBOMs and DevSecOps for secure software supply chains, threat hunting, secrets management, zero-trust security, and more. It's time to expand your organization's tactics and put any future attackers in their place as you hear from industry leaders and experts on how they are facing these challenges in everyday scenarios — because if there is one thing we know about the cyberspace, any vulnerabilities left to chance will always be exposed.

Enterprise Security

Comments

Transforming Continuous Delivery With Feature Flags

Oct 15, 2024 · Josephine Eskaline Joyce

Hi Dave, Tx for the suggestion. Have taken care of it.

Transforming Continuous Delivery With Feature Flags

Oct 04, 2024 · Josephine Eskaline Joyce

Hi Dave Happy to know that you found the blog comprehensive and concise.

Transforming Continuous Delivery With Feature Flags

Oct 04, 2024 · Josephine Eskaline Joyce

Absolutely. Feature flags provide brings better flexibility to the deployment process and provider control to the developer, reducing the risks involved.

Battle of the RabbitMQ Queues: Performance Insights on Classic and Quorum

Oct 01, 2024 · Josephine Eskaline Joyce

Hi John, The tool used microseconds so we used the same so that we dont deviate from the actual measured performance. Please note the measured performance is for both publisher and consumer.

Building Secure Cloud Applications: A Developer’s Companion to NIST CSF

Mar 01, 2024 · Josephine Eskaline Joyce

Yes NIST is robust. Happy to share information to the developer community!

Infrastructure as Code (IaC) Tools, Part 2: Choosing the Right Tool

Jul 08, 2023 · Josephine Eskaline Joyce

Thanks Jophine Antony for your appreciation and comments.

Regarding the Mutable and Immutable, the article no where claims that they can be interchangeable. In fact it calls out they are two different approaches.

Regarding the AWS Cloud Formation like tools, yes you are right, There are few tools which are between mutable and immutable but in the case of AWS Cloud Formation, its mostly a preferred usage in Immutable scenarios. We can see many AWS usecases along this category.

Infrastructure as Code (IaC) Tools, Part 1: Overview of Tools

Jun 27, 2023 · Josephine Eskaline Joyce

Thanks William. Having gone through the difficulty of choosing the appropriate tool, thought of sharing this to the wider community. Happy to hear it is useful.

User has been successfully modified

Failed to modify user

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • [email protected]

Let's be friends: