Insights
Our Insights on Intelligent Digital Platforms
Meet Spade
Discover 5 essential strategies to bolster AWS database security, including encryption, access control, and serverless computing. Learn how to utilize Secrets Manager, monitor for credential leaks. Secure your company’s data today!
Writing cleaner Jest tests
Discover 5 essential strategies to bolster AWS database security, including encryption, access control, and serverless computing. Learn how to utilize Secrets Manager, monitor for credential leaks. Secure your company’s data today!
Stop using Excel to analyse your cloud costs
Scaling the IT Ladder: Tactics for Growth and Waste Minimization
Discover the secrets of successful IT scaling. Our article will guide you through the intricacies of team expansion, waste reduction, and common stumbling blocks, ensuring you’re equipped to maximize growth and minimize waste.
Establishing Clear Roles and Responsibilities: A Key to Optimizing IT Team Performance
Delve into our comprehensive guide that unveils the significance of well-defined roles and responsibilities within IT teams. Discover how clarity in roles can eliminate waste, foster accountability, and enhance decision-making processes, driving team growth and organizational success.
Empowering IT Teams through Servant Leadership: A Strategy to Boost Growth and Reduce Waste
How to Speed Up Existing Azure Infrastructure Migration to Terraform? Discover our Time-Efficient Solution – Bid Farewell to Manual Configuration! 🚀
Discover 5 essential strategies to bolster AWS database security, including encryption, access control, and serverless computing. Learn how to utilize Secrets Manager, monitor for credential leaks. Secure your company’s data today!
5 Strategies to Improve Database Security on AWS
Discover 5 essential strategies to bolster AWS database security, including encryption, access control, and serverless computing. Learn how to utilize Secrets Manager, monitor for credential leaks. Secure your company’s data today!
The Essential Areas of AWS Security: What You Need to Know
🌊 Riding the Wave: What Does a 23.45% CAGR for Serverless Mean for Business? 🌊
Serverless technology is revolutionizing the IT industry, and businesses that fail to keep up risk being left behind. Serverless CAGR of 23.45% between 2022 and 2030, is a proof that it is becoming the go-to solution for businesses looking to streamline their IT resource management. Why is it so popular among companies?
5 things that every junior Java developer should learn to find the dream job
Kickstart your Java developer career with these 5 essential skills: Core Java concepts, Version Control Systems, Java Frameworks, Testing, and mastering IDEs & tools. Learn, practice, and excel to land your dream job in the competitive programming industry.
Implementing concurrent access to Elasticsearch resources
Facebook and Clickjacking Attack – Check If Your Website is Vulnerable
In this article, we’ll take a look at some of the most valuable use cases of Hashicorp Vault and the secret engines that are used to deliver that functionality.
Tabnine & GitHub Copilot
Article compares Tabnine and GitHub Copilot – two AI-powered code completion tools. Our comparison is based on pricing, code completions, cloud/offline mode, code privacy & compliance, AI model training, and integration. How do they compare? Check out article by Piotr Leś, our Frontend Developer.
Use Cases of HashiCorp Vault
Protect your data against Cross-Site Scripting Attacks with Content Security Policy
Neglecting to implement a Content Security Policy (CSP) for your application can have unfortunate consequences for your business.
Unlock the Benefits of FinOps: Streamline Operations, Increase Efficiency and Drive Business Growth
FinOps promotes a culture of collaboration, accountability, and continuous improvement, helping organizations achieve strategic goals.
7 code testing rules you should be aware of
Mateusz Wilczyński appointed the CTO of Exlabs
We are thrilled to announce the promotion of Mateusz to the role of CTO. Mateusz will serve as a technical partner for our clients, helping them with project governance, reliability & security as well as identifying future challenges & opportunities for their projects.
Hashicorp Vault – is it worth it?
Hashicorp Vault seems to present itself as an industry leader. Let’s check if it’s the right choice for you. Let’s compare Hashicorp Vault & AWS Secrets Manager.
How to rotate Secrets using AWS Lambda?
What is CIS Benchmark?
Why should I use the CIS Benchmark standard for my AWS cloud setup? Is it difficult to get started?What is beyond CIS? AWS cybersecurity best practcies.
Introduction to Secrets Rotation
Rotation is the process of periodically updating a secret. The secret can be an API key, security credential, encryption key, or any other sensitive value. The manual rotation process can be time-consuming and human error-prone. How to automate the rotation process using the AWS Lambda service?
Terraform Module: ECS Secrets Manager
AWS Account Security Assesment
Complete a survey to grade your AWS account security level. You will receive your security score & will be eligible to a 30 minutes consultation to revisit your results.
Protecting Web Application: Cloudflare vs AWS WAF
Whatever you choose, AWS WAF or Cloudflare, both will help you in the first line of defence against SQL Injection attacks, Cross Site Scripting, CSRF and basic IP blocking. It’s definitely worth to use them. But what are the key differences, so you can pick the right tool for the job?
How to sleep well at night without experienced CISO (featuring DevSecOps, SSDLC, vCISO)
Mastering Cloud Cost Analysis with Metabase
This guide explores the transition from Excel to Metabase for efficient and secure cloud cost management. Learn how Metabase can enhance your cloud cost analysis process.
8 fallacies of distributed computing: 1. The network is reliable
You may say that the network in professional data centres is good enough, and you can treat it as a reliable asset. You are wrong.
Generate CSV file from your data and analyze them
Funds section UX for the client from fintech industry
The most urgent actions were required in the “Funds” section, where users began to keep significant transaction history logs, multiple different assets, and various currencies. The “Funds” section gives the possibility of making withdrawals, deposits, and transactions between investors. In short, this is one of the most often used sections of the entire application. What did we want to improve & what were the effects?
Transforming IT systems into agile data hubs
Read the guide on how to manage complex IT premises and still be open for innovation, use of new technologies, and don’t suffer from the maintenance burden.
Text Search & Elastic: ecosystem – more than a search engine
Elastic – its engine
Have you ever wondered how it happens that search results are delivered to a user so quickly? Even when there is a big dataset behind the search engine API, searched items are usually delivered in milliseconds. How so?
Text Search – it is not a simple problem. How to get started?
Do you sometimes wonder: where did I put it? Or when trying to remember something, do you have this thought: where did I see this? This is our life in the 21st century. Everything we know comes from the internet: what is the weather like – check online, what was the result of yesterday’s football game – check online, where to buy pink trousers – buy online. The internet is an information highway with almost no limits. How does this relate to your business?
Maximize your savings by automatizing workflows
How to generate PDF in Javascript – a step by step guide
Is it possible to programmatically generate PDF file using web technologies? You are right, it is. What’s more – it’s probably much easier than you thought.
Have db logs killed our PostgreSQL on AWS?
We have killed our PostgreSQL on AWS by accident! Learn what we have learned from case study in a post by our CTO, Krzysztof Szromek.
Static Web Pages are back in the game!
Orchestrate data pipelines with Azure Data Factory
How do you like maintaining lots of bash scripts defined in `crontab`. If you worked in a team responsible for a data flow you know what I mean. If it starts with one script it is OK. But if your crontab grows and grows it is no more fun. Or maybe you are running your BI processes which are doing well in your current warehouse but you encounter problems with the optimization and there are not enough resources to scale your workers up?
Instruction: Left Join for Advanced Rubyists
Every now and then you will need to keep a track of user activities in the system. This can be approached in several possible ways – one possible solution is to store them as an activity log in the database. This alone can create some challenges and may require you to use less common SQL statements in the Ruby on Rails apps like LEFT JOIN, hence I’ve decided to shed some light on it.
SQL is the language of Big Data
Databricks: How to upload data?
Databricks is a unified data analytics platform for massive-scale data engineering and collaborative data science. It is a powerful tool to serve so many purposes. How difficult it is to use? Fairly easy! How to upload data into it?
CQRS – Another “buzzword” or game changer?
CQRS is not as popular as it seems, especially in real-world applications. Learn how to maintain an application with frequently changing business using a pattern that is easy to understand and implement.
Process as Code – next big thing in digital transformation
Is your cloud protected against malicious file uploads?
Protecting against malicious file uploads is a must these days as most applications store and process data files in one way or another. Building a self-driven, automated and accurate pipeline for eliminating those threats is not a simple task
DevOps Transformation at DevOpsDays Warsaw
After our visit to AWS Summit London, we knew that embracing DevOps culture is important for becoming a first-class citizen of the cloud. To learn more about it, we went to DevOpsDays Warsaw.
AWS Summit London: Key takeaways for Cloud Transformation
What is Content Security Policy & how to implement it?
Is my website secure? You bet it is! I’m using HTTPS… Hang on, there’s more?
React/Redux todo app written in Ruby
This post is to help Ruby users understand ideas behind React and Redux.
When should you modernise front-end?
Code&Pizza #3 Meetup
Every month we try to spend some time after work on talking, integrating and sharing our knowledge and experiences in coding (and more as you will read later).
Choosing the right front-end for the project
There’s a handful number of front-end frameworks on the market to choose from. So which one should you give a go?
Time tracking exercise and what problems it solved
40 tools we use for efficient web development
We get asked regularly what services we prefer to use for certain tasks or problems, so we’ve created this list of products that helps us at Exlabs deliver better products.
Software: buy or build? Do both.
Interesting and useful answers to the question will help you make informed decisions, not just push a certain view.
Best practices on keeping codebase clean
Would you like to be up to date?
Keep up with Exlabs Newsletter!
By clicking “Subscribe” you accept the Privacy Policy.