Search
Close this search box.
Search
Close this search box.

Author name: Aziz Ur Rehman

5 Foundational Elements of Modern Application Development

No matter what level of developer you are or whether you’re just starting out, you’d have to be hiding under some rock to avoid hearing about the cloud and modernizing application development. “Build apps quickly!” and iterate frequently to stay up with the ever-changing world of user requirements. When it comes to modern approaches, it […]

5 Foundational Elements of Modern Application Development Read More »

What Is a Web Application Attack and How to Defend Against It?

Let’s look at what a web application or widget is before we get into the specifics of a web application attack. Many businesses have discovered that the internet is a low-cost way to communicate with potential clients and conduct business with existing ones over the past decade or two. Marketers, for example, can use the

What Is a Web Application Attack and How to Defend Against It? Read More »

What Are Application-Level Attacks?

Using Agile and DevOps, application development is booming. To take advantage of the growing attack surface, cybercriminals are turning to exploits. Because of the growing number of vulnerabilities left by outdated application security solutions, applications are a desirable target for hackers. According to modern software developers at IT firms, the average application includes more than

What Are Application-Level Attacks? Read More »

What is SIEM software? How Does it Work and How to Choose the Right Tool

There has been a shift in the focus of SIEM vendors from log management to more advanced statistical analysis and machine learning. What is SIEM Software Security, information, and event management (SIEM) is a term used to describe the management of these three areas. To provide real-time analysis for security monitoring, SIEM technology aggregates log

What is SIEM software? How Does it Work and How to Choose the Right Tool Read More »

Single-Page Application: How SPA Works and How it differs from MPA

A terrific moment to be a cloud computing company right now! According to Statista, the market is predicted to grow to $101.3 billion by 2022. There is no better time than now to begin thinking about developing an app. Prior to investing your time and resources in architecture, you must first decide which one to

Single-Page Application: How SPA Works and How it differs from MPA Read More »

Do Network Layer and Application Layer DDoS Attacks Differ?

DDoS attacks on the application and network layers both pose serious dangers. However, they are extremely dissimilar. What can we do to lessen the impact of these attacks and how do they differ? In a distributed denial-of-service (DDoS) attack, many legitimate or illegitimate requests are sent to your service at the same time, causing it

Do Network Layer and Application Layer DDoS Attacks Differ? Read More »

How to Build Apps with Serverless Architecture

Serverless apps necessitate team members to re-learn about Cloud architecture. A serverless application model is described in this book, and we will examine the steps of front- and back-end development in the serverless application model as well as its advantages and drawbacks. We will also point out the best examples. What is serverless architecture? Developers

How to Build Apps with Serverless Architecture Read More »

What is Dimensional Modeling in Data Warehouse?

Dimensional Modeling Dimensional Modeling is a data structure approach specifically designed for data warehouse storage. The goal of dimensional modeling is to speed up the retrieval of data in the database. Ralph Kimball came up with the idea of “fact” and “dimension” tables when he established Dimensional Modelling. To read, summarize, and analyze numerical data

What is Dimensional Modeling in Data Warehouse? Read More »

Integrating Applications and Cloud Services with CI/CD Pipelines

Continuous integration, continuous delivery, and continuous deployment (CI/CD) are the practices that make up the pipeline. The CI/CD pipeline is a mechanism for building, testing, and deploying code that is frequently used by DevOps teams. DevOps teams will see more frequent and dependable upgrades to their software and applications, as well as a more collaborative

Integrating Applications and Cloud Services with CI/CD Pipelines Read More »

Position: Continuous Delivery of GCP Google App Engine

Position: VMware Engineer

Position: Senior Storage & Cloud Data Protection Expert

Position: Data Specialist

Position: Technical Project Manager

Position: Data Privacy Consulting Manager (Arabic-Speaking)

Position: Private Cloud Architect- presales

Position: Guardium Engineer

Position: ArcSight Platform Engineer

Position: Technical Associate Project Manager

Position: AI Engineer (Sales Forecasting)

Position: Junior AI Engineer (Sales Forecasting)

Position: Archer GRC Expert (Arabic Speaker)

Position: Inside Sales Representative

Position: Cyber Security Consultant

Position: DLP Engineer

Position: Senior Network Architect

Position: L1 Desktop Support

Position: Cloud Engineer

Position: Associate Project Manager

Position: Field Engineer L2 (Only Saudi Nationals Can Apply)

Position: Helpdesk Engineer L1 (Only Saudi Nationals Can Apply)

Position: SOC L1/L2

Position: Full Stack Developer

Position: Advisory of Cloud Systems

Position: Business Continuity & Disaster Recovery Specialist

Position: Cloud Network Specialist

Position: Senior Expert of Cloud Systems

Position: Senior Expert of Storage & Cloud Data Protection

Position:

Continuous Delivery of GCP Google App Engine

Position: UI/UX Designer

Scale Your Dreams, Secure Your Data

Reliable Cloud Infrastructure. Infinite Possibilities.