Helping CTOs and technical decision makers running on AWS sleep better at night
How would you monitor massive changes to AWS infrastructure you just got access to?
Did you know you can skip Code Pipeline and build ECR Images directly from Code Pipeline?
Are your Docker images vulnerable to malicious hackers that can steal your source code directly from the images themselves?
Does connecting to your sharded Valkey Cluster feel like navigating a house of mirrors?
Are you interested in having your AWS infrastructure roasted by a real pro?
Do you know how to connect to a sharded Redis/Valkey cluster?
Signup for the mailing list