Hong Huainsecjuice™Edge Cloud Services for the Modern ApplicationF5 Inc. brings Volterra, the next-generation application delivery and security solution, to the front door of modern applications on the…·5 min read·May 20, 2021----
Hong HuaManaging Software through the Operator FrameworkSoftware used to be installed using a manifest file in the form a shellscript. Then, the cloud-native container platform arrived, and the…·2 min read·Sep 20, 2020----
Hong HuaCheck out my presentation “Advanced Microservices Architectures” @ FOSSAsia Summit 2020, Singapore·1 min read·Mar 21, 2020----
Hong HuaIn remembranceIn the first two months of 2020, the world felt the loss of three towering figures of our lifetime. They embodied the humanity, courage…·3 min read·Feb 9, 2020----
Hong HuaArchitectural Design Considerations for Security in IoT SolutionsOne of my dissertations for the MS in Cybersecurity Risk and Strategy course that I am a graduate from. I highly recommend the course for…9 min read·Aug 4, 2019----
Hong HuaHunting for Software Bugs, and getting rich doing itPart of my work involves helping corporations adopt a set of software development best practices known as Continuous Integration and…2 min read·Jul 12, 2018----
Hong HuaKubernetes pod and cluster limitsSo I was trying to install an xPaaS on Red Hat OpenShift. And I hit a pod and cluster limit as you can see here, specifically regarding…1 min read·Jul 9, 2018----
Hong HuaPermission DeniedEver encountered the above mentioned error while attempting to ssh into a remote server or cloud instance? Well, I did while in the midst…2 min read·Jan 10, 2018----
Hong Huainsecjuice™Who let the cat out of the bag?You want to know what I think about the recent security brouhaha at Google, Uber, Yahoo, Apple and Intel ?4 min read·Dec 3, 2017----
Hong HuaRecovering from a failed OS patch jobSo my operating system repeatedly asks for my approval to proceed with a critical patch.2 min read·Nov 23, 2017--1--1