featured

Turn your Raspberry Pi 5 into a Cybersecurity Gadget

The world of cybersecurity is constantly evolving, and with it, the tools and technologies used by professionals in the field. The...

Read more

All Stories

Network Ad Blocker with Pi-hole

Personally, I’m not really against online marketing on websites in the form of ads. The problem comes when some...

Using Terraform to deploy AWS EKS with NGINX

EKS (Elastic Kubernetes Service) is AWS’s managed containers orchestration solution that simplifies Kubernetes cluster management. This article presents a...

Aug 14 · 2 min read >

Deploying MuleSoft apps on Azure AKS

This article is a quick guide to demonstrate how to deploy a MuleSoft (Mule) app in a container on...

Extending Sparx EA Schema Composer

In my previous post, I presented an overview of the new Sparx EA Schema Composer. I have also highlighted...

Sparx EA Schema Composer Overview

When Sparx Enterprise 12 was release few months ago, I didn’t really rush to see what were the new...

Deriving XML schemas from your Enterprise Information Model

Following my post regarding Class Specialisation concept implementation in XML schemas,  I decided to give an overview of the end-to-end...

An approach to implement Class specialisation in XML schemas (XSD)

I’ve decided to write this quick post to share a practical approach that I suggested to a client in...

Service Catalogue Importer Tool for Sparx EA

It is not unusual for SOA projects to start to create a list of services using a spreadsheet. However,...

Feb 24 · 1 min read >

Parallels and Office 2013 performance tips

Parallels and Office 2013 issues After installing Office 2013 into my Parallels Desktop (Win 7) I’ve realised that performance...

Jul 10 · 35 sec read >

Pimp your mac

After a bit more than one year without a PC laptop, I can finally say out loud that I...

Feb 12 · 2 min read >