Marlon Dias

250 Flips | 9 Magazines | 151 Likes | 7 Following | 50 Followers | @marlondias | tech advocate @ portugal

bliki: CircuitBreaker

tags:<p>It's common for software systems to make remote calls to software running in different processes, probably on different machines across a …

Microservices

IDG Contributor Network: From domain-driven design to microservices

As many of you may recall, the software design and architecture style known as service-oriented architecture (SOA) emerged in the mid 1990s. Since …

Compare Flow, Logic Apps, Functions, and WebJobs - Azure

6 minutes to read<p>Contributors<p>This article compares the following Microsoft cloud services:<p>All of these services can solve integration problems and …

What is Git? - Azure DevOps

4 minutes to read<p>By: Kayla Ngan<p>Git is the most commonly used version control system today and is quickly becoming <i>the</i> standard for version control. …

What is Agile? - Azure DevOps

4 minutes to read<p>By: Aaron Bjork<p>Agile is a term used to describe approaches to software development emphasizing incremental delivery, team …

What is DevOps? - Azure DevOps

5 minutes to read<p>By: Sam Guckenheimer<p>DevOps is the union of people, process, and products to enable continuous delivery of value to our end users. …

Azure Application Architecture Guide

This guide presents a structured approach for designing applications on Azure that are scalable, resilient, and highly available. It is based on …

Designing, building, and operating microservices on Azure with Kubernetes

6 minutes to read<p>Contributors<p>Microservices have become a popular architectural style for building cloud applications that are resilient, highly …

How to Become a Cloud Architect

How do you get to a senior-level cloud architect position with no experience in cloud computing? The right combination of IT certifications and an …

Skills needed to learn Microsoft Azure

Answers<p>1<p>Sign in to vote<p>Hi,<p>Azure is public platform that offers services to customers. The number of services is growing day after day, and spanned …

How to protect devices from Spectre and Meltdown chip flaws

Companies like Apple and Microsoft are rolling out fixes to protect against Spectre and Meltdown, two major flaws found in most computer chips that affect processors.<p>If you haven't already, you'll want to take action to protect your devices.<p>Researchers recently discovered these issues and unveiled …

Information Security

Cheat Sheet For Xamarin Form Controls

Improving HTTP Performance in Xamarin Applications

Any mobile application that depends greatly on HTTP requests can be a source of frustration. Mobile devices are constantly running slow connections, …

Software Development

Native Forms is Polished and Shiny in Xamarin.Forms 2.5.0

Since we previewed Native Forms in June, we’ve been working to smooth the rough edges and polish it up for Xamarin.Forms 2.5.0 by fixing bugs and …

S3 Bucket Security: More Than ACLs and Policies

Many companies are suffering data breaches because attackers gain access to data in AWS S3 buckets. I don’t want to repeat all the news articles …

KRACK Demo: Critical Key Reinstallation Attack Against Widely-Used WPA2 Wi-Fi Protocol

Do you think your wireless network is secure because you're using WPA2 encryption? If yes, think again! Security researchers have discovered several …

The Internet of Things is sending us back to the Middle Ages

Internet-enabled devices are so common, and so vulnerable, that hackers recently broke into a casino through its fish tank. The tank had internet-connected sensors measuring its temperature and cleanliness. The hackers got into the fish tank’s sensors and then to the computer used to control them, …

The Guy Who Invented Those Annoying Password Rules Now Regrets Wasting Your Time

We’ve all been forced to do it: create a password with at least so many characters, so many numbers, so many special characters, and maybe an …

Jeff Bezos

Microsoft blames U.S. stockpiled vulnerability after WannaCry ransomware attack

Microsoft on Sunday said a software vulnerability stolen from the U.S. National Security Agency has affected customers around the world, and described the spread of the WannaCry/WannaCrypt ransomware on Friday in many countries as yet another example of the problems caused by the stockpiling of …

Here's the latest trick hackers are using to hide their phishing URLs

Here's a challenge for you: you click on a link in your email, and find yourself at the website https://аррӏе.com. Your browser shows the green padlock icon, confirming it's a secure connection; and it says "Secure" next to it, for added reassurance. And yet, you've been phished. Do you know …

Someone is Using Mirai Botnet to Shut Down Internet for an Entire Country

Note — We have published an updated article on what really happened behind the alleged DDoS attack against Liberia using Mirai botnet. Someone is …

Diretor do FBI recomenda que as pessoas tapem suas webcams

Nós já sabemos que pessoas como o CEO do Facebook, Mark Zuckerberg, estão no time dos que colam um adesivo na frente da webcam do notebook para …

Quatro sinais de que você foi vítima de ransomware

... e três passos para resolver essa questão da melhor forma possível<p>A palavra “ransomware” traz consigo imagens de sequestradores e bilhetes …

Incrível — Inspiração. Criatividade. Admiração.

IoT / IoE: When It’s Got an IP Address, It Will Get Hacked

Given the recent debate and increased attention on the subject, I’d like to make a couple of points for the (hopefully) greater good of the security …

Information Security

How to tell if your Android phone has the HummingBad malware

Bad news: a malicious app has taken hold of about 10 million Android phones around the world, and it's creepy.<p>Security specialist Check Point says the software, called HummingBad, can take root in your phone, collecting your personal data and making it act like you've clicked on ads that you …

Apps

6 destinos para curtir o verão europeu (de acordo com sua personalidade)

Conheça os atuais hot spots para aproveitar o calor no Velho Continente – e qual deles mais combina com você<p><b>O destino clássico: Capri, Itália</b><p>Entra …

4 ways gamification is advancing cybersecurity

There’s no doubt that the cybersecurity industry is in dire straits.<p>Each year, data breaches are growing in size, numbers and severity while the cybersecurity talent gap is widening and there aren’t enough experts to fill vacant posts. And with internet-based services encroaching over every aspect …

Best practices for a great sign-in experience - Google I/O 2016