IT Architecture Best Practices

In this article I will post standard patterns and best practices on certain design challenges. I aim to keep it concise which helps readability. 1. Store images in database It is possible to store images directly in an attribute of a table in your database. This can be basically done with all database, both SQL …

Read more

IT Risk Management Simply explained: Threat modelling

This is a process of preparing, identifying risks, mitigating them and regularly review the risks. Hence, this is a continuous process that requires regular review. Two well-known framework assist here: STRIDE (Spoofing, Tampering, Repudiation, Informaton Message disclosure, Denial of Service & Elevation of Privilege) PASTA Risk must be classified on the scale of risk of …

Read more

Cybersecurity: Penetration testing

Penetration testing is a technique applied by white hat hackers to test the security of their infrastructure. With penetration testing, a white hat hacker will try to exploit all existing vulnerabilities with the goal of further optimizing and securing the infrastructure of the target. Hence, penetration testing is often done by organizations to get a …

Read more

The Apache Nifi full guide

In this article I will explain the purpose of the Apache Nifi tool, when to use it and how it interacts with other applications in your landscape. Furthermore, I will explain how you can install Apache Nifi on your Ubuntu virtual machine and subsequently load data into the HBase table explained in a separate article …

Read more

The HBase full guide

Hbase is part of the Hadoop platform and can be considered a NoSQL store. A NoSQL store basically means that the database is not a SQL database. In this case it basically entails a columnar store which HBase represents. A columnar store enables to store data in columns instead of rows. It does hold rows …

Read more