Project management can be a fulfilling occupation unless it boils down to doing similar, mechanical tasks over and over again. Computers were invented to alleviate the burden of repetition, and they can do the same for project managers. Learn how we automated the boring part of localization management in a large translation agency.
Our client, a large nordic bank, had successfully acquired another bank along with its loan management system. System integration was necessary - ideally under a uniform, efficient, and automated platform. Among a myriad of options, Clurgo managed to identify and implement the best available solution for the client.
Edge computing is a new type of infrastructure that's been gaining traction in the tech world because it allows to cut back network latency and transfer costs. In our new article, we investigate how and why the edge can be used with Kubernetes, the world's most popular container orchestration platform.
Log4Shell - the name on everyone's lips since December 2021. It's a formidable flaw in the ubiquitous Log4J logging library that allowed attackers to compromise applications by manipulating user-controlled data. Out in the wild for an indefinite time before discovery, the bug's full ramifications may still see the light of day. Read on to find out more.
Does your Java application slow down or outright crash and you have no idea why? The prospect of searching through numerous logs gives you the heebie-jeebies? Fear no more! Async-profiler is like a private eye that follows your applications and takes note of everything they do.
“I study traffic patterns,” special agent Ethan Hunt described his fake job at the beginning of “Mission Impossible 3.” He went on to explain what fascinated him about traffic: “You hit the brakes for a second, just tap them on the freeway, you can literally track the ripple effect of that action across a two-hundred-mile stretch of road, because traffic has a memory. It's amazing. It's like a living organism.
Many web applications display various content in the browser. Many of these are only available to logged users or those with a specific role. Often API is secured by JSESSIONID or JWT cookie. While in the first case there is no problem with using the browser, in the case of JWT there is one problem. What is it?
We often receive information from a client that there was an error with the http 500 code on an application. The tester quickly creates a scenario to reproduce the error and another problem arises. Behind a nice frontend there are a dozen or so applications installed on different servers. The error information is undoubtedly in the log - just in which one? You can spend days trying to find the right file on the right server, or you can use a toolkit that allows you to aggregate logs.
Virtualizing your environment allows you to work with IT systems quickly and securely. However, not every application can be containerized and packaged in a Docker container - this is where KVM comes to the rescue. KVM, or Kernel-based Virtual Machine, is an environment on which it is possible to run a virtual machine. The association with VirtualBox is most accurate - the idea is exactly the same. There are, of course, more technologies allowing to create virtual environments - such as VMware or Hyper-V.