Technical and Product News and Insights from Rackspace
In the current fast-moving business environment, successful organizations are always looking for ways to enhance their product offerings, improve business efficiency, and anticipate customer behavior. From supply chain optimization to fraud detection, there are opportunities in every industry, including retail, healthcare, and finance. Artificial Intelligence and Machine Learning (AI/ML) let businesses leverage data to make automated recommendations, take preemptive action, and streamline decision-making.
Maintaining infrastructure, managing the back-end data environment, and tuning databases while keeping your data secure can be a major drain on IT resources. Luckily, recent additions to the Rackspace Service Block offerings can help. The all-new database administration (DBA) service blocks remove the burden of day-to-day database management while ensuring your environment is healthy, available, secure, and optimized for performance.
Rackspace is launching production-tested datastores in ObjectRocket, a simple-to-use and dependable cloud Database-as-a-Service (DBaaS) platform.
For a few years now, I’ve had an interest in the concepts of machine learning (ML) and wanted to know more. When I came across the Google® Cloud Professional Data Engineer certification exam, I was intrigued about how ML concepts intertwine with cloud concepts, especially in the Google Cloud Platform (GCP).
Rackspace sponsored the 2019 Google Cloud Platform (GCP®) Summits in Stockholm and Amsterdam and challenged the attendees to a game of Kubertetris.
A proxy server is a computer system that sits between the client that requests a web document and the target server (another computer system) that serves the document. In its simplest form, a proxy server facilitates communication between the client and the target server without modifying requests or replies.
User authentication is a common application requirement that has been solved numerous times in the past - why trouble yourself with implementing and managing it yet again, when you could be working on exciting new features in your application instead? The AWS Application Load Balancer (ALB) can greatly simplify user authentication with several different social media, SAML 2.0, and OpenID Connect identity providers (IdP).
In this post, we’ll walk through the entire process of setting up ALB authentication using Amazon Cognito against a Microsoft Active Directory Federation Services SAML IdP.
This year’s AWS re:Invent was a nonstop, high-powered firehose of exciting new features and products. Native PHP support on Lambda wasn’t one of those features, but the new AWS Lambda runtime API and layers capabilities gives us the ability to build a clean, supportable implementation of PHP on Lambda of our own. In this post, we’ll take a brief look at the overall workflow and runtime lifecycle, and then I will show you one way to build a PHP runtime to start powering your PHP applications on AWS Lambda.
In Rackspace’s VMware Practice Area, we value the quality of our products very much, and we believe that quality is a team effort. The Quality Engineering (QE) team works with the Development team, Project Management team, Product Engineering team and DevOps team to improve the quality of developed products. Our quality standard has three key pillars: functionality, performance, and security. Our goal is to identify and fix defects as early as possible so that we can deliver secure functional products that perform well for our customers.
Our customers require us to develop software that is trustworthy and secure. Privacy also demands attention. To ignore the privacy concerns of users is to invite blocked deployments, litigation, negative media coverage, and mistrust. The Quality Engineering (QE) Security team’s goal is to minimize security- and privacy-related defects in design, code, documentation, and to detect and eliminate these defects as early as possible in the software development life cycle (SDLC). Developers who most effectively address security threats and protect privacy earn users’ loyalties and distinguish themselves from their competitors.