/images/clemens.jpg

Hi! I'm Clemens Schotte,

Enthusiastic storyteller with a passion for technology

Compliance as Code

Compliance-as-Code What is compliance as code? Compliance-as-Code can be summarized as the organizational capability to automate the implementation, verification, remediation, monitoring, and compliance status reporting. This automation comes in the form of code and is integrated into the code repositories used by Devs and Engineers. It becomes “just another piece of code.” Using code to describe, validate, (possibly) remediate, monitor, and report compliance requirements and status Measured against regulatory standards and internal governance Includes (but not limited to): Security Infrastructure configuration Privacy Policies: Government, finance, health, etc.

Cloud-native development with containers and microservices

Introduction To adopt cloud-native application patterns, companies must learn new skills and communicate effectively across team boundaries. A new architecture, platforms, and developer workflows mean evolving developer skillsets. While microservices allow teams to move independently, they also emphasize the degree to which software and the organization grow to resemble one another, also known as Conway’s law. To achieve a result in which many microservices are a cohesive system and still maintain velocity, an organization’s communication structures need to be highly functional and effective.

Zero Touch Deployment

Introduction In today’s increasingly demanding marketplace, companies are looking for ways to stay ahead of their competition. Development teams are faced with challenges preventing them from delivering solutions rapidly that meet the business’s expectations. Therefore, companies need to evolve their Application Lifecycle Management (ALM) practices to integrate business, development, QA, and operations functions in an efficient cycle for greater agility in delivering continuous value. Releasing high-quality software more frequently represents a substantial competitive advantage, and it means a significant reduction in the amount of wasted time and effort within a company.

Azure Key Vault

Introduction Azure Key Vault is a managed service that offers enhanced protection and control over secrets and keys used by applications, running both in Azure and on-premises. The Basics Service Tiers Azure Key Vault is currently offered in two service tiers: Standard and Premium. Key Vault in Standard tier is limited to secrets and software-protected keys, while Key Vault in Premium tier additionally supports keys stored in Hardware Security Modules (HSMs) and are FIPS 140-2 Level 3 validated.

WiFi Calling

Modern buildings are well isolated, which isn’t good if you are making a mobile phone call. Outside your house or office, the cellular signal is perfect, but inside it is another story, dropped calls, low-quality sound, etc. Even when your carrier has high coverage, there are situations inside buildings that prevent you from making a call. Most mobile network providers (carriers) provide a solution for this, called WiFi Calling. By utilizing the existing WiFi network in your home or office, the mobile phone can make calls.

Free and Built-In TLS/SSL certificates in Azure

Today, when a website does not have an SSL/TSL certificate, web browsers give you a warning not secure. This warning not only scares people but also gives you a disadvantage in search engine ranking. On Azure, web sites have a default https-enabled URL, like https://sitename.azurewebsites.net/, but when you have a vanity domain configured, you are missing this secure connection. Luckily there are some free SSL/TLS certificate options to explore. Let’s Encrypt Wait, there is Let’s Encrypt, its free!

Upgrading my Amiga 1200 in the year 2020

I learned all my basic computer and programming skills on Commodore computers, like the C64, Amiga 500, and 1200. Twenty-eight years ago, I upgraded my Amiga 1200 with a faster processor (Motorola 68030) and extra memory (4 megabytes). I also added an FPU (Motorola 68882), a realtime clock, and an internal hard disk (120 megabytes), which is still working correctly in 2020 (wow). At that time, this was a fast Amiga.

My solar energy and Tesla Powerwall 2 setup

Saving the planet a little bit while trying out new technology is fantastic, and in the end, it will save me also some money. When building my house last year, I invested in solar energy. The sun delivers me free electricity during the day, especially around noon, but I use it mainly at the end of the day and the beginning of the evening. Most of my solar energy goes to the public energy grid, and I need to repurchase it in the evening.