<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Krishna Jadhav</title>
    <description>The latest articles on DEV Community by Krishna Jadhav (@krishna1412).</description>
    <link>https://dev.to/krishna1412</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1011594%2F0aded5b4-5c50-457d-9723-c6d4df822302.jpeg</url>
      <title>DEV Community: Krishna Jadhav</title>
      <link>https://dev.to/krishna1412</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/krishna1412"/>
    <language>en</language>
    <item>
      <title>Security Centre and Multi-Cloud Architecture</title>
      <dc:creator>Krishna Jadhav</dc:creator>
      <pubDate>Fri, 20 Jan 2023 06:55:30 +0000</pubDate>
      <link>https://dev.to/krishna1412/security-centre-and-multi-cloud-architecture-327k</link>
      <guid>https://dev.to/krishna1412/security-centre-and-multi-cloud-architecture-327k</guid>
      <description>&lt;p&gt;Krishna Jadhav&lt;/p&gt;

&lt;h2&gt;
  
  
  Security Centre and Multi-Cloud Architecture
&lt;/h2&gt;

&lt;p&gt;In Hyper scalers world Krishna Jadhav build successful multi-cloud solutions using VMware vSphere, AWS, Azure, and GCP.&lt;/p&gt;

&lt;p&gt;One of Azure's built-in services is Azure Security Centre. In other words, there is nothing to install or set up. Security Centre may be accessible directly from the Azure interface by activating it. When you deploy workloads on Azure, such as virtual machines, databases, storage accounts, networking components, and other Azure services, it begins to monitor those workloads (Brett, 2021).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--FAWrWL7P--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dj6xkfj62etd7v8mjigv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--FAWrWL7P--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dj6xkfj62etd7v8mjigv.png" alt="Image description" width="774" height="390"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 1: Overview of the Azure portal's Security Center blade&lt;/p&gt;

&lt;p&gt;(Source: Mulder, 2020)&lt;/p&gt;

&lt;p&gt;By turning on this setting, Microsoft will retrieve a daily list of security and critical updates available for Windows and Linux-based computers (Figure 1). These are the initial setup settings for Security Centre (Capizzi, Distefano and Mazzara, 2019). The next step is to put the security settings into action. Enable the following settings in Security Centre:&lt;/p&gt;

&lt;p&gt;●       Scanning vulnerabilities in operating systems&lt;/p&gt;

&lt;p&gt;●       Enforcing endpoint protection&lt;/p&gt;

&lt;p&gt;●       Monitoring disk encryption&lt;/p&gt;

&lt;p&gt;●       Monitoring network security groups&lt;/p&gt;

&lt;p&gt;●       Monitoring web application firewalls&lt;/p&gt;

&lt;p&gt;●       Monitoring next-generation firewalls&lt;/p&gt;

&lt;p&gt;●       Vulnerability assessment&lt;/p&gt;

&lt;p&gt;●       Monitoring blob storage encryption&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--NVYnIhUi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/y5fqnvj8bsjlp8bk8xzx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--NVYnIhUi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/y5fqnvj8bsjlp8bk8xzx.png" alt="Image description" width="730" height="796"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 2: Activating Security Command Center on the GCP cloud console&lt;/p&gt;

&lt;p&gt;(Source: Mulder, 2020)&lt;/p&gt;

&lt;p&gt;The indicated baselines and integrations will be enrolled by selecting the Enable Security Hub button (Figure 2). The CIS baseline should unquestionably be implemented as the globally recognised standard for safeguarding online environments. An explanation accompanies each CIS suggestion to implement a policy. According to Syynimaa (2022), activating the standard price tier provides stronger defence-in-depth, including threat detection offered by the Microsoft Security Response Centre (MSRC).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--RbS-1WM3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rodwoggxu442gbp39g7x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--RbS-1WM3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rodwoggxu442gbp39g7x.png" alt="Image description" width="528" height="394"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 3: Cloud Armor menu in GCP&lt;/p&gt;

&lt;p&gt;(Source: Mulder, 2020)&lt;/p&gt;

&lt;p&gt;There are a couple of things that need explaining in the preceding screenshot. The top part of the screen shows the security baselines that can be enrolled by default: Enable AWS Foundational Security Best Practices v1.0.0 and Enable CIS AWS Foundations Benchmark v1.2.0 have been ticked by default. The third one is the PCI DSS framework (Figure 3). PCI DSS stands for Payment Card Industry Data Security Standard and is specific to financial institutions. AWS Security Hub provides a unified security dashboard.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--pSO-sVJa--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/vhkh8xb44ap8hnal5mfu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--pSO-sVJa--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/vhkh8xb44ap8hnal5mfu.png" alt="Image description" width="649" height="405"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 4: Using the AWS interface to gain access to Security Hub&lt;/p&gt;

&lt;p&gt;(Source: Mulder, 2020)&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;The solution collects Krishna Jadhav’s results from Amazon GuardDuty, Amazon Inspector, Amazon Macie, AWS "Identity and Access Management (IAM)" Access Analyser, and AWS Firewall Manager, in addition to monitoring alerts from CloudWatch and CloudTrail. CloudTrail may be considered the engine that powers Security Hub as the conclusive understanding. The Security Hub makes it simple to begin monitoring all AWS activity, and it's available through the AWS console, as illustrated in the picture above (Figure 4).&lt;/p&gt;

&lt;p&gt;Want to know what DevOps are and what is their relation to Cloud Computing? Proceed to the next Article.&lt;/p&gt;

&lt;h2&gt;
  
  
  Reference List
&lt;/h2&gt;

&lt;p&gt;Brett, M. (2021). Zero trust computing through the application of information asset registers. Cyber Security: A Peer-Reviewed Journal, 5(1), 80-94. &lt;a href="https://www.ingentaconnect.com/content/hsp/jcs/2021/00000005/00000001/art00008"&gt;https://www.ingentaconnect.com/content/hsp/jcs/2021/00000005/00000001/art00008&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Capizzi, A., Distefano, S., and Mazzara, M. (2019, May). From devops to devdataops: Data management in devops processes. In International Workshop on Software Engineering Aspects of Continuous Development and New Paradigms of Software Production and Deployment (pp. 52-62). Springer, Cham. &lt;a href="https://link.springer.com/chapter/10.1007/978-3-030-39306-9_4"&gt;https://link.springer.com/chapter/10.1007/978-3-030-39306-9_4&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Mulder, J. (2020). Multi-Cloud Architecture and Governance: Leverage Azure, AWS, GCP, and VMware vSphere to build effective multi-cloud solutions. Packt Publishing Ltd. &lt;a href="https://cdn.ttgtmedia.com/rms/pdf/Multi-CloudArchitectureAndGovernance_ch14.pdf"&gt;https://cdn.ttgtmedia.com/rms/pdf/Multi-CloudArchitectureAndGovernance_ch14.pdf&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Syynimaa, N. (2022). Exploring Azure Active Directory Attack Surface: Enumerating Authentication Methods with Open-Source Intelligence Tools. In ICEIS (2) (pp. 142-147). &lt;a href="https://o365blog.com/talks/Syynimaa%20(2022).%20Exploring%20Azure%20Active%20Directory%20Attack%20Surface%20-%20Enumerating%20Authentication%20Methods%20with%20Open-Source%20Intelligence%20Tools.pdf"&gt;https://o365blog.com/talks/Syynimaa%20(2022).%20Exploring%20Azure%20Active%20Directory%20Attack%20Surface%20-%20Enumerating%20Authentication%20Methods%20with%20Open-Source%20Intelligence%20Tools.pdf&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Cloud Computing - Current Trends and recommended Network specifications</title>
      <dc:creator>Krishna Jadhav</dc:creator>
      <pubDate>Fri, 20 Jan 2023 06:52:45 +0000</pubDate>
      <link>https://dev.to/krishna1412/cloud-computing-current-trends-and-recommended-network-specifications-4o91</link>
      <guid>https://dev.to/krishna1412/cloud-computing-current-trends-and-recommended-network-specifications-4o91</guid>
      <description>&lt;p&gt;Krishna Jadhav&lt;/p&gt;

&lt;h2&gt;
  
  
  Current Cloud Computing trends for future success
&lt;/h2&gt;

&lt;p&gt;As per Krishna Jadhav Today, high-volume data generation is no more considered rocket science or a theoretical assumption, with international companies using cloud computing for their data solutions (Gedeon et al., 2019). However, storing such enormous data volumes is still an eminent challenge, for which companies are often required to invest separately in storage security(Figure 1).&lt;/p&gt;

&lt;p&gt;With the majority of industries gradually shifting to Cloud, the latest trends for future success are:&lt;/p&gt;

&lt;p&gt;●       Increase in storage capacity&lt;/p&gt;

&lt;p&gt;●       Enhancement of Internet performance&lt;/p&gt;

&lt;p&gt;●       Prioritisation of modular software&lt;/p&gt;

&lt;p&gt;●       IoT and Cloud Computing Collaboration&lt;/p&gt;

&lt;p&gt;●       Future change prediction data&lt;/p&gt;

&lt;p&gt;●       Cloud Service improvement&lt;/p&gt;

&lt;p&gt;●       Security&lt;/p&gt;

&lt;p&gt;●       Economic accessibility &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--0vyLuWoB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jflpi3vl9oi5y1vyrtyn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--0vyLuWoB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jflpi3vl9oi5y1vyrtyn.png" alt="Image description" width="557" height="467"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 1: Networking in Computer Laboratories&lt;/p&gt;

&lt;p&gt;(Source: Ouda and Yas, 2021)&lt;/p&gt;

&lt;p&gt;Now more than ever, businesses seek creative methods to expand and achieve their objectives. This company will continue to expand in the future with the aid of cloud computing. Cloud computing is solid and vast, and it will continue to expand and give numerous benefits in the future. It is important to remember that the company's owner should be updated on the newest cloud technology developments (Teoh, Gill and Parlikad, 2021). As software as a service solution will handle more than 60% of the workload, several academics have demonstrated that cloud computing will be one of the leading technologies in the future.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--1XS_oG_r--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5w4iw9gy8fovo8bujxrk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--1XS_oG_r--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5w4iw9gy8fovo8bujxrk.png" alt="Image description" width="565" height="429"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 2: Design of network architecture using private cloud servers&lt;/p&gt;

&lt;p&gt;(Source: Ouda and Yas, 2021)&lt;/p&gt;

&lt;p&gt;Private cloud computing is a gradually emerging trend focusing on access management, applications management, and security management, with newer approaches to network, server, and computer specifications (Figure 2). Private cloud computing is a service that meets a company's needs through local and internet network access. Software as a Service is used in computer laboratories to make them better and easier to control (Figueroa-Lorenzo, Añorga and Arrizabalaga, 2019).  Users of SaaS cannot arbitrarily install and update the software without getting the approval of the server, so there is no disruption of computer networks.&lt;/p&gt;

&lt;p&gt;Recommended network specifications&lt;/p&gt;

&lt;p&gt;●       Modular connection type RJ-45 Cat5&lt;/p&gt;

&lt;p&gt;●       Star topology simplifies installing, wiring, finding problems, and removing components from a built-in network.&lt;/p&gt;

&lt;p&gt;●       Category 5 cable&lt;/p&gt;

&lt;p&gt;●       NETGEAR (48 port) switches with 10/100/1000 Mbps ports&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--aJ4VvN59--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/l9rv51icccgzt0xg5v0s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--aJ4VvN59--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/l9rv51icccgzt0xg5v0s.png" alt="Image description" width="707" height="551"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 3: Server Specialisation recommendation (future prediction)&lt;/p&gt;

&lt;p&gt;(Source: Self-developed)&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;Krishna Jadhav concludes Access management is accomplished through a Secure Sockets Layer (SSL) certificate, which activates the HTTPS protocol and provides secure interactions between client and server. In conclusion, each account requires a username and password for login, requiring influential recommendation trends for service specialisation (Figure 3). Furthermore, each account has storage constraints and a maximum file size limit for uploading and downloading.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;To learn about Security Centre and Cloud Computing’s role in its, look forward to the next Article.&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Reference List
&lt;/h2&gt;

&lt;p&gt;Figueroa-Lorenzo, S., Añorga, J., and Arrizabalaga, S. (2019). A role-based access control model in modbus SCADA systems. A centralized model approach. Sensors, 19(20), 4455. &lt;a href="https://www.mdpi.com/552834"&gt;https://www.mdpi.com/552834&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Gedeon, J., Brandherm, F., Egert, R., Grube, T., and Mühlhäuser, M. (2019). What the fog? edge computing revisited: Promises, applications and future challenges. IEEE Access, 7, 152847-152878. &lt;a href="https://ieeexplore.ieee.org/abstract/document/8877785/"&gt;https://ieeexplore.ieee.org/abstract/document/8877785/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Ouda, G. K., and Yas, Q. M. (2021, February). Design of cloud computing for educational centers using private cloud computing: a case study. In Journal of Physics: Conference Series (Vol. 1804, No. 1, p. 012119). IOP Publishing. &lt;a href="https://iopscience.iop.org/article/10.1088/1742-6596/1804/1/012119/meta"&gt;https://iopscience.iop.org/article/10.1088/1742-6596/1804/1/012119/meta&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Teoh, Y. K., Gill, S. S., and Parlikad, A. K. (2021). IoT and fog computing based predictive maintenance model for effective asset management in industry 4.0 using machine learning. IEEE Internet of Things Journal. &lt;a href="https://ieeexplore.ieee.org/abstract/document/9319212/"&gt;https://ieeexplore.ieee.org/abstract/document/9319212/&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Hyperscalers and Cloud Computing services</title>
      <dc:creator>Krishna Jadhav</dc:creator>
      <pubDate>Fri, 20 Jan 2023 06:50:29 +0000</pubDate>
      <link>https://dev.to/krishna1412/hyperscalers-and-cloud-computing-services-7df</link>
      <guid>https://dev.to/krishna1412/hyperscalers-and-cloud-computing-services-7df</guid>
      <description>&lt;p&gt;Krishna Jadhav&lt;/p&gt;

&lt;h2&gt;
  
  
  Investigating different hyperscalers’ cloud computing services
&lt;/h2&gt;

&lt;p&gt;Overview&lt;/p&gt;

&lt;p&gt;In the following article Krishna Jadhav overviewed an example of Great Britain, home to “hyperscalers” Alphabet’s Google, Amazon, and Microsoft, opened an investigation on cloud services competitors, with the industry’s current revenue totalling 81% (Reuters, 2022). The key technologies underpinning the growing digital economy are advanced robotics, artificial intelligence, the Internet of Things (IoT), cloud computing, big data analytics, and three‑dimensional (3D) printing. The UK’s tech VC investment sector holds the 3rd global position, following US and China, with a record-high hit of $21bn during the covid-19 situational issues in 2020 (Wysokińska, 2021). Communications regulator Ofcom also said on 22nd September it would examine other digital markets over the next year, including messaging services such as WhatsApp, FaceTime and Zoom, and connected televisions and smart speakers.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzo09ubu8d688bzwtd6m0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzo09ubu8d688bzwtd6m0.png" alt="Image description" width="800" height="351"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 1: Cloud-native stack observable&lt;/p&gt;

&lt;p&gt;(Source: Kratzke and Siegfried, 2021)&lt;/p&gt;

&lt;h2&gt;
  
  
  Hyperscalers and cloud computing
&lt;/h2&gt;

&lt;p&gt;Cloud computing offers significant growth opportunities: almost all software companies in the UK are using the cloud, and opportunities exist in both the public and private sectors for companies offering cloud or linked services (Floerecke and Lehner, 2018). UK enterprises frequently want to use more than one vendor because each has particular strengths related to vertical solutions, pricing and other factors. The hyperscalers consistently drive costs down to drive out their local competitors since they are conscious of their position of power. As a result, there has been a rising market consolidation among local IaaS providers (Floerecke and Lehner, 2018). An illustration would be the recent acquisition of Profit Bricks by United Internet, a medium-sized IaaS provider that serves the German market. Cloud computing is a revolutionary IT operations paradigm that fundamentally alters how IT resources are created, delivered, and consumed.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd6uysihquysnm2o6jxst.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd6uysihquysnm2o6jxst.png" alt="Image description" width="758" height="419"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 2: Resource utility cloud architecture evolution POV&lt;/p&gt;

&lt;p&gt;(Source: Kratzke and Siegfried, 2021)&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;Krishna Jadhav’s analysis concluded from the article that the idea that cloud-based IT services are commoditized and distributed similarly to conventional utilities like electricity, gas, and water is becoming a reality increasingly. An often-used definition of cloud computing from the National Institute of Standards and Technology (NIST) is that it is "a paradigm for providing ubiquitous, accessible, on-demand network access to a shared pool of customizable computing resources that can be promptly supplied and released with minimum administration effort or service provider engagement". A business ecosystem is relevant for systemic innovations in which several interconnected and interdependent enterprises collaborate to provide full-scale consumer solutions. Several efforts at a formal definition have been attempted to get a thorough grasp of the business ecosystem within the context of cloud computing.&lt;/p&gt;

&lt;p&gt;To learn more about Current Market trends of Cloud Computing, proceed to the next article.&lt;/p&gt;

&lt;h2&gt;
  
  
  Reference List
&lt;/h2&gt;

&lt;p&gt;Floerecke, S., and Lehner, F. (2018, September). Business model characteristics for local iaas providers for counteracting the dominance of the hyperscalers. In International Conference on the Economics of Grids, Clouds, Systems, and Services (pp. 137-150). Springer, Cham. &lt;a href="https://link.springer.com/chapter/10.1007/978-3-030-13342-9_12" rel="noopener noreferrer"&gt;https://link.springer.com/chapter/10.1007/978-3-030-13342-9_12&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Kratzke, N., and Siegfried, R. (2021). Towards cloud-native simulations–lessons learned from the front-line of cloud computing. The Journal of Defense Modeling and Simulation, 18(1), 39-58. &lt;a href="https://journals.sagepub.com/doi/abs/10.1177/1548512919895327" rel="noopener noreferrer"&gt;https://journals.sagepub.com/doi/abs/10.1177/1548512919895327&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Reuters (2022). UK to examine cloud services dominated by Amazon, Microsoft and Google. Technology. [Online]. Available at: &lt;a href="https://www.reuters.com/technology/britain-examine-competition-cloud-services-2022-09-22/" rel="noopener noreferrer"&gt;https://www.reuters.com/technology/britain-examine-competition-cloud-services-2022-09-22/&lt;/a&gt; [Accessed on 20th October 2022]&lt;/p&gt;

&lt;p&gt;Wysokińska, Z. (2021). A Review of the Impact of the Digital Transformation on the Global and European Economy. Comparative Economic Research. Central and Eastern Europe, 24(3), 75-92. &lt;a href="https://www.econstor.eu/handle/10419/259278" rel="noopener noreferrer"&gt;https://www.econstor.eu/handle/10419/259278&lt;/a&gt;&lt;/p&gt;

</description>
      <category>career</category>
      <category>mentorship</category>
      <category>discuss</category>
      <category>productivity</category>
    </item>
    <item>
      <title>Metaverse Challenges &amp; Awareness</title>
      <dc:creator>Krishna Jadhav</dc:creator>
      <pubDate>Fri, 20 Jan 2023 06:45:25 +0000</pubDate>
      <link>https://dev.to/krishna1412/metaverse-challenges-awareness-2cic</link>
      <guid>https://dev.to/krishna1412/metaverse-challenges-awareness-2cic</guid>
      <description>&lt;p&gt;Krishna Jadhav&lt;/p&gt;

&lt;p&gt;Metaverse challenges: Issues you need to be aware of&lt;br&gt;
In the Metaverse world, Krishna Jadhav suggests with the virtual reality there are much more significant awareness required challenges it brings to the security aspects.&lt;br&gt;
Identity and reputation&lt;br&gt;
Regarding the actual world, the issue of personal identity and representation is relatively simple. However, one can ponder what constitutes an individual's identity while discussing virtual worlds or the Metaverse (Chen and Cheng, 2022). And maybe, most significantly, how to demonstrate your identity if a human impersonator or even a machine tries to imitate you. Here, reputation may be crucial for authentication and serve as evidence of the reliability and legitimacy of the entity one deals with (Figure 1).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--53K_SUUI--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/kvdp0lbqjjehqmd1eimq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--53K_SUUI--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/kvdp0lbqjjehqmd1eimq.png" alt="Image description" width="783" height="470"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 1: Metaverse taxonomy&lt;/p&gt;

&lt;p&gt;(Source: Park and Kim, 2022)&lt;/p&gt;

&lt;p&gt;Information security&lt;br&gt;&lt;br&gt;
Data privacy and security have always been a worry for consumers of any online environment, even though businesses and organisations continue to innovate their IT security systems. When entering the Metaverse, security procedures must advance to an entirely new level to keep up with the Metaverse's constant expansion (Kraus et al., 2022). Maintaining the safety of one's identity and property in the virtual world will necessitate developing new techniques for protecting personal data and privacy (Figure 2).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--oiN49X8X--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/y5142jjp0q45l4xxj2bv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--oiN49X8X--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/y5142jjp0q45l4xxj2bv.png" alt="Image description" width="880" height="216"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 2: Scene rendering for three-dimensional visual language navigation&lt;/p&gt;

&lt;p&gt;(Source: Park and Kim, 2022)&lt;/p&gt;

&lt;p&gt;Possession &amp;amp; Property&lt;br&gt;
NFTs (Non-Fungible Tokens) are gaining traction and generating headlines in 2021, bringing more investors and consumers to digital assets and tokens (Popescu, 2021). The issue will be in building a single system that may be used to authenticate the possessors of virtual goods in the Metaverse, similar to how NFTs already represent real-world things, awarding and verifying ownership rights for art, music, films, and much more.&lt;/p&gt;

&lt;p&gt;Space and time&lt;br&gt;
Comparing the actual world to a virtual environment can reveal differences in how time is perceived since people often become less conscious of their bodies when using virtual reality (Slater et al., 2020). Users may unknowingly spend more time within the Metaverse due to complete immersion. Because of a skewed sense of time, procedures that keep users in sync with the actual world are crucial.&lt;/p&gt;

&lt;p&gt;Conclusion&lt;br&gt;
So, Krishna Jadhav thinks, The fundamental difficulty is the ability to fake face characteristics, film, and voice; therefore, new verification methods will be created shortly. That being said, conclusion postulates here that, personal verification may progress to the point where users are required to supply more personal information than is now required to authenticate their identity and verify that the security system effectively protects personal information. The idea of space is the second one to consider in the Metaverse.&lt;/p&gt;

&lt;p&gt;Want to know How and why are teens' lives being negatively impacted by Metaverse? Proceed to the Next Article.&lt;/p&gt;

&lt;p&gt;Reference List&lt;br&gt;
Chen, Y., and Cheng, H. (2022). The economics of the Metaverse: A comparison with the real economy. Metaverse, 3(1), 19. &lt;a href="https://aber.apacsci.com/index.php/met/article/view/1802"&gt;https://aber.apacsci.com/index.php/met/article/view/1802&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Kraus, S., Kanbach, D. K., Krysta, P. M., Steinhoff, M. M., and Tomini, N. (2022). Facebook and the creation of the metaverse: radical business model innovation or incremental transformation?. International Journal of Entrepreneurial Behavior &amp;amp; Research. &lt;a href="https://www.emerald.com/insight/content/doi/10.1108/IJEBR-12-2021-0984/full/html"&gt;https://www.emerald.com/insight/content/doi/10.1108/IJEBR-12-2021-0984/full/html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Park, S. M., and Kim, Y. G. (2022). A Metaverse: Taxonomy, components, applications, and open challenges. Ieee Access, 10, 4209-4251. &lt;a href="https://ieeexplore.ieee.org/abstract/document/9667507/"&gt;https://ieeexplore.ieee.org/abstract/document/9667507/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Popescu, A. D. (2021). Non-Fungible Tokens (NFT)–Innovation beyond the craze. In 5th International Conference on Innovation in Business, Economics and Marketing Research. &lt;a href="https://www.academia.edu/download/68796447/PET_Journal_NFTs_Innovation_beyond_the_craze.pdf"&gt;https://www.academia.edu/download/68796447/PET_Journal_NFTs_Innovation_beyond_the_craze.pdf&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Slater, M., Gonzalez-Liencres, C., Haggard, P., Vinkers, C., Gregory-Clarke, R., Jelley, S., ... and Silver, J. (2020). The ethics of realism in virtual and augmented reality. Frontiers in Virtual Reality, 1, 1. &lt;a href="https://www.frontiersin.org/articles/10.3389/frvir.2020.00001/full"&gt;https://www.frontiersin.org/articles/10.3389/frvir.2020.00001/full&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Why Are Brands Suddenly Buzzing About Metaverse?!</title>
      <dc:creator>Krishna Jadhav</dc:creator>
      <pubDate>Fri, 20 Jan 2023 06:44:18 +0000</pubDate>
      <link>https://dev.to/krishna1412/why-are-brands-suddenly-buzzing-about-metaverse-3jjm</link>
      <guid>https://dev.to/krishna1412/why-are-brands-suddenly-buzzing-about-metaverse-3jjm</guid>
      <description>&lt;p&gt;Krishna Jadhav&lt;/p&gt;

&lt;p&gt;Why are brands suddenly buzzing about Metaverse?!&lt;br&gt;
In the goodreads of Krishna Jadhav on metaverseand market trends, According to investor Matthew Ball, the Metaverse does not exist today, although there are "proto-metaverses" that are incompatible (Henz, 2022). Software for Creating Low-Code Applications: Many companies have benefited from a reliable internet connection, particularly during lockdowns (Figure 1). Mobile applications are significant assets that every organisation may have.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbpcfjbjn4tr7lnzuftxf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbpcfjbjn4tr7lnzuftxf.png" alt="Image description" width="723" height="385"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 1: Environment metaverse, interface, interaction, security, and privacy&lt;/p&gt;

&lt;p&gt;(Source: Dwivedi et al., 2022)&lt;/p&gt;

&lt;p&gt;Virtual Presence&lt;br&gt;
One definition of the Metaverse is a massively scaled and interoperable network of real-time rendered 3D virtual worlds that may be experienced synchronously and permanently by a virtually limitless number of users with a personal feeling of presence and with continuity of data (Sun et al., 2022). According to experts, this sensation of presence in cyberspace may be the secret to luring and keeping people. Since this is where most of the innovative flare is anticipated (Figure 2), Businesses will continue to develop and iterate to achieve this ambition (Fernández Fernández, 2022).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpz58m8ca7kiceuoited9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpz58m8ca7kiceuoited9.png" alt="Image description" width="775" height="476"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 2: Threats to Security and Privacy in the Metaverse&lt;/p&gt;

&lt;p&gt;(Source: Dwivedi et al., 2022)&lt;/p&gt;

&lt;p&gt;Cybernetics&lt;br&gt;
Cybernetics, which encompasses everything from basic joysticks, headphones, and google glass to more complex features that blur the lines between human sensory-motor technology and network things and animals, is another significant force behind Metaverse interactions (Sheridan, 2022). Crypto big Grayscale projects a $1 trillion business opportunity for the Metaverse encompassing e-commerce, hardware, digital events, and advertising (Pieters, 2022). In 2025, the gaming industry will generate $400 billion in revenue due to interest.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fctu9ktypqpa9neh9aa7f.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fctu9ktypqpa9neh9aa7f.png" alt="Image description" width="777" height="495"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 3: xReality Framework: Metaverse XR Definitions&lt;/p&gt;

&lt;p&gt;(Source: Dwivedi et al., 2022)&lt;/p&gt;

&lt;p&gt;VR and AR Extended Reality (XR)&lt;br&gt;
XR devices like cameras, loudspeakers, and sensors are used to create a simulated world while enabling you to engage with reality. The increasing acceptance of virtual reality (XR) is one factor which will continue to influence the Metaverse (Figure 3).&lt;/p&gt;

&lt;p&gt;Conclusion&lt;br&gt;
So, Krihsn Jadhav mentions, The Metaverse is a simulated digital environment that incorporates augmented reality (AR), virtual reality (VR), blockchain, and social media principles to build areas for rich user interaction that resemble the actual world. In conclusion, future research will likely involve connections between the brain and computers. The greatest approach to translating an idea from our thoughts into machines and then receiving the results back is still through the development of cybernetics, which allows for speedy prototyping driven by cybernetics or an improvement over low-code platforms. The divide between the physical and digital worlds is being closed by various enterprises.&lt;/p&gt;

&lt;p&gt;Want to learn about the current Metaverse challenges? What are issues you need to be aware of? Proceed to the next Article for more information.&lt;/p&gt;

&lt;p&gt;Reference List&lt;br&gt;
Dwivedi, Y. K., Hughes, L., Baabdullah, A. M., Ribeiro-Navarrete, S., Giannakis, M., Al-Debei, M. M., ... and Wamba, S. F. (2022). Metaverse beyond the hype: Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy. International Journal of Information Management, 66, 102542. &lt;a href="https://www.sciencedirect.com/science/article/pii/S0268401222000767" rel="noopener noreferrer"&gt;https://www.sciencedirect.com/science/article/pii/S0268401222000767&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Fernández Fernández, J. L. (2022). Ethical considerations regarding biases in algorithms. &lt;a href="https://repositorio.comillas.edu/xmlui/bitstream/handle/11531/66640/JLF._Ethical%20considerations%20regarding%20baises%20in%20algoritms%20GE_EE_10_isbn9782889314423.pdf?sequence=-1" rel="noopener noreferrer"&gt;https://repositorio.comillas.edu/xmlui/bitstream/handle/11531/66640/JLF._Ethical%20considerations%20regarding%20baises%20in%20algoritms%20GE_EE_10_isbn9782889314423.pdf?sequence=-1&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Henz, P. (2022). The societal impact of the metaverse. Discover Artificial Intelligence, 2(1), 1-7. &lt;a href="https://link.springer.com/article/10.1007/s44163-022-00032-6" rel="noopener noreferrer"&gt;https://link.springer.com/article/10.1007/s44163-022-00032-6&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Pieters, D. (2022). Metaverse, new hype or Second Life fatigue?. &lt;a href="https://www.researchgate.net/profile/David-Pieters/publication/362861450_Metaverse_new_hype_or_Second_Life_fatigue_A_Content_Analysis_of_the_rise_of_the_Metaverse_juxtaposed_to_Second_Life/links/63049a8aeb7b135a0e55a083/Metaverse-new-hype-or-Second-Life-fatigue-A-Content-Analysis-of-the-rise-of-the-Metaverse-juxtaposed-to-Second-Life.pdf" rel="noopener noreferrer"&gt;https://www.researchgate.net/profile/David-Pieters/publication/362861450_Metaverse_new_hype_or_Second_Life_fatigue_A_Content_Analysis_of_the_rise_of_the_Metaverse_juxtaposed_to_Second_Life/links/63049a8aeb7b135a0e55a083/Metaverse-new-hype-or-Second-Life-fatigue-A-Content-Analysis-of-the-rise-of-the-Metaverse-juxtaposed-to-Second-Life.pdf&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Sheridan, T. B. (2022). Telepresence: Actual and Virtual: Promises and Perils of Converging New Realities. CRC Press. &lt;a href="https://books.google.com/books?hl=en&amp;amp;lr=&amp;amp;id=WWqLEAAAQBAJ&amp;amp;oi=fnd&amp;amp;pg=PT6&amp;amp;dq=Cybernetics,+which+encompasses+everything+from+basic+joysticks,+headphones,+and+google+glass+to+more+complex+features+that+blur+the+lines+between+human+sensory-motor+technology+and+network+things+and+animals,+is+another+significant+force+behind+Metaverse+i&amp;amp;ots=l-qLg6cyiU&amp;amp;sig=EsnSLdcSloYc-et4JuJOMHSZW2A" rel="noopener noreferrer"&gt;https://books.google.com/books?hl=en&amp;amp;lr=&amp;amp;id=WWqLEAAAQBAJ&amp;amp;oi=fnd&amp;amp;pg=PT6&amp;amp;dq=Cybernetics,+which+encompasses+everything+from+basic+joysticks,+headphones,+and+google+glass+to+more+complex+features+that+blur+the+lines+between+human+sensory-motor+technology+and+network+things+and+animals,+is+another+significant+force+behind+Metaverse+i&amp;amp;ots=l-qLg6cyiU&amp;amp;sig=EsnSLdcSloYc-et4JuJOMHSZW2A&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Sun, J., Gan, W., Chao, H. C., and Yu, P. S. (2022). Metaverse: Survey, Applications, Security, and Opportunities. arXiv preprint arXiv:2210.07990. &lt;a href="https://arxiv.org/abs/2210.07990" rel="noopener noreferrer"&gt;https://arxiv.org/abs/2210.07990&lt;/a&gt;&lt;/p&gt;

</description>
      <category>sql</category>
      <category>discuss</category>
      <category>productivity</category>
    </item>
    <item>
      <title>Essential Web 3.0 Trends and Benefits</title>
      <dc:creator>Krishna Jadhav</dc:creator>
      <pubDate>Fri, 20 Jan 2023 06:39:05 +0000</pubDate>
      <link>https://dev.to/krishna1412/essential-web-30-trends-and-benefits-5620</link>
      <guid>https://dev.to/krishna1412/essential-web-30-trends-and-benefits-5620</guid>
      <description>&lt;p&gt;Krishna Jadhav&lt;/p&gt;

&lt;p&gt;Essential Web 3.0 trends and their current benefits&lt;/p&gt;

&lt;p&gt;In overlooking benefits of Web3.0 trends, Krishna Jadhav presents;&lt;br&gt;
Why is Web 3.0 Beneficial?&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;     Enhanced privacy and security&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Cryptography is used in Web 3.0 to safeguard and secure user data. Additionally, the adoption of blockchain technology enables more secure interactions between users since it may provide an indelible record of all transactions and activity, serving as a trustworthy source of dataauthenticity (Figure 2).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F413vk01ev0psykrxc72i.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F413vk01ev0psykrxc72i.png" alt="Image description" width="502" height="558"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 1: Web3 Foundation’s Web 3.0 Technology&lt;br&gt;
(Source: Korpal and Scott, 2022)&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;     Improved level of flexibility and interaction&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Web 3.0 enables more engagement between different people and websites (Mozumder et al., 2020). This implies that consumers may obtain material from numerous sources while remaining on the same website. It also enables more adaptable designs since websites may be rebuilt to appear differently in different nations or throughout the world.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;     Increased global reach&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Web 3.0 can now reach a far larger audience because of its improved flexibility and engagement (Murray, Kim and Combs, 2022). This implies that companies wishing to reach a worldwide audience may do it relatively quickly by leveraging Web 3.0 technologies.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8ce9uu6ljncu0oukvijz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8ce9uu6ljncu0oukvijz.png" alt="Image description" width="581" height="447"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 2: Blockchain architecture&lt;br&gt;
(Source: Korpal and Scott, 2022)&lt;/p&gt;

&lt;p&gt;What Impact Will Web 3.0 Have on Online Businesses?&lt;/p&gt;

&lt;p&gt;As an illustration, consider the event sector. EventX questioned 1,500 event planners and specialists from major businesses and SMBs across Asia about their opinions on event settings.&lt;/p&gt;

&lt;p&gt;These experts cited "a digital footprint for analysis," "allowing digital transformation," and "providing flexibility and diversity" as the three most crucial components for a successful online experience.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn5gurvcdup1uck5o03ol.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn5gurvcdup1uck5o03ol.png" alt="Image description" width="749" height="484"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 3: Network varieties - (a) Centralised, (b) Decentralised, (c) Distributed&lt;br&gt;
(Source: Korpal and Scott, 2022)&lt;/p&gt;

&lt;p&gt;Semantic Web: Tim Berners Lee coined "Semantic Web" to describe Web 3.0. The Semantic Web employs web concepts that are expanded beyond documents to data, similar to a data web.&lt;/p&gt;

&lt;p&gt;NFTs Will Boost Web 3.0 Movement: Non-fungible tokens, digital artefacts traded with cryptocurrencies, are the primary driver of the Web 3.0 movement. Their authors can readily monetise NFTs with open standards in the decentralised Web 3.0 future (Figure 3).&lt;/p&gt;

&lt;p&gt;Conclusion&lt;/p&gt;

&lt;p&gt;As per Krishna Jadhav, A Web 3.0 represents a more decentralised version of the internet that prioritises openness and improved user usability. It differs from Web 2.0 because it is founded on crucial notions such as decentralisation. Understood as the conclusive assement, as many apps are based on blockchain, code was produced in plain sight of everyone instead of being authored and managed by a limited group of professionals. No one entity will be in command (Figure 1).&lt;/p&gt;

&lt;p&gt;To gain insights on why brands are suddenly buzzing about Metaverse, look for the next article.&lt;/p&gt;

&lt;p&gt;Reference List&lt;/p&gt;

&lt;p&gt;Korpal, G., and Scott, D. (2022). Decentralization and web3 technologies. &lt;a href="https://attachment.victorlampcdn.com/article/content/20220824/drewscott_gkorpal_web3.pdf" rel="noopener noreferrer"&gt;https://attachment.victorlampcdn.com/article/content/20220824/drewscott_gkorpal_web3.pdf&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Mozumder, M. A. I., Sheeraz, M. M., Athar, A., Aich, S., and Kim, H. C. (2022, February). Overview: technology roadmap of the future trend of metaverse based on IoT, blockchain, AI technique, and medical domain metaverse activity. In 2022 24th International Conference on Advanced Communication Technology (ICACT) (pp. 256-261). IEEE. &lt;a href="https://ieeexplore.ieee.org/abstract/document/9728808/" rel="noopener noreferrer"&gt;https://ieeexplore.ieee.org/abstract/document/9728808/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Murray, A., Kim, D., and Combs, J. (2022). The promise of a decentralized Internet: What is web 3.0 and HOW can firms prepare?. Business Horizons. &lt;a href="https://www.sciencedirect.com/science/article/pii/S0007681322000714" rel="noopener noreferrer"&gt;https://www.sciencedirect.com/science/article/pii/S0007681322000714&lt;/a&gt;&lt;/p&gt;

</description>
      <category>motivation</category>
    </item>
    <item>
      <title>Understanding How Web 3.0 Will Affect Business In The Future</title>
      <dc:creator>Krishna Jadhav</dc:creator>
      <pubDate>Fri, 20 Jan 2023 06:28:11 +0000</pubDate>
      <link>https://dev.to/krishna1412/understanding-how-web-30-will-affect-business-in-the-future-4ok0</link>
      <guid>https://dev.to/krishna1412/understanding-how-web-30-will-affect-business-in-the-future-4ok0</guid>
      <description>&lt;p&gt;Krishna Jadhav&lt;/p&gt;

&lt;p&gt;Understanding How Web 3.0 Will Affect Business in the Future&lt;br&gt;
Krishna Jadhav has observed over the previous three decades, the Web has undergone a significant transformation. Since Web 1.0's early years, when the internet primarily served as a channel for transmitting text-based information, a lot has changed (Boudlaie, Nargesian and Keshavarz Nik, 2019). Rich media content has now arrived due to the shifting tides of fast-increasing consumer requirements and the arrival of Web 3.0. Web 3.0 is the next significant advancement in how we access and exchange information online. Soon-to-be-released AI-enabled search engines are already having an impact on user behaviour. The user's experience will be personalised in this next Web generation to meet their wants and tastes (Figure 1). Data that any organisation, such as governments, cannot suppress will be accessible to users.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--yko1en5q--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/y8mz690v0oen4azp90ap.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--yko1en5q--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/y8mz690v0oen4azp90ap.png" alt="Image description" width="822" height="438"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 1: SEMIoTICS interoperability framework&lt;br&gt;
(Source: Hatzivasilis et al., 2018)&lt;/p&gt;

&lt;p&gt;Since it is on their own devices, Suffice it to say that will be the next stage of corporate development. Before delving more into Web 3.0, it is vital to clarify that Web 3.0 and Web3 are not synonymous (Bergquist Mcneil, 2022). Although Web 3.0 and Web 3 cannot be seen theoretically or practically in isolation, they should not be used interchangeably. Web3 is a more advanced decentralised blockchain-based Web (Figure 1). Semantic Online is a new type of web content in which data is arranged so that machines rather than humans can decipher it. According to the official W3C website, "Semantic Web technologies enable anyone to develop web-based data repositories, define vocabularies, and write rules."&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--4yot6epR--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1tc2gzfxj01no7y2xjof.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--4yot6epR--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1tc2gzfxj01no7y2xjof.png" alt="Image description" width="729" height="256"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 2: Interaction between two users on a platform (Web 3.0 Decentralised Application)&lt;br&gt;
(Source: Lundberg and Petrén, 2022)&lt;/p&gt;

&lt;p&gt;Personalisation: Web 3.0 pushes personalisation to new heights. Real-time data integration can help to make online interactions and interests more relevant (Figure 2). Adopting the proper business model may help firms give a considerably enhanced client experience while providing numerous advertising and promotion opportunities.&lt;/p&gt;

&lt;p&gt;Mobile-First Experiences: If you want to capitalise on Web 3.0 and better engage and reach your target audience, you must provide end users with a mobile-first experience. Businesses that do not react to this trend risk falling behind. Consumers today want not just an integrated omnichannel experience but also easier and faster access to information (Hatzivasilis et al., 2018).&lt;/p&gt;

&lt;p&gt;Conclusion&lt;br&gt;
In Krishna Jadhav’s conclusion, Web3 may be thought of as the progression of Web 3.0. This concept is built around the idea of a decentralised Web, focusing on blockchain technology, encryption, and cryptocurrencies. It also includes the application of virtual reality (VR), augmented reality (AR), and, most recently, the metaverse.&lt;/p&gt;

&lt;p&gt;With that being said, what are the Essential Web 3.0 trends and their current benefits? Want to know? The next article is meant for you.&lt;/p&gt;

&lt;p&gt;Reference List&lt;br&gt;
Bergquist Mcneil, L. (2022). Blockchains, smart contracts, and stablecoins as a global payment system: The rise of web 3.0. &lt;a href="https://www.diva-portal.org/smash/record.jsf?pid=diva2:1671071"&gt;https://www.diva-portal.org/smash/record.jsf?pid=diva2:1671071&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Boudlaie, H., Nargesian, A., and Keshavarz Nik, B. E. H. R. O. O. Z. (2019). Digital footprint in web 3.0: social media usage in recruitment. AD-minister, (34), 139-156. &lt;a href="http://www.scielo.org.co/scielo.php?pid=S1692-02792019000100139&amp;amp;script=sci_arttext&amp;amp;tlng=en"&gt;http://www.scielo.org.co/scielo.php?pid=S1692-02792019000100139&amp;amp;script=sci_arttext&amp;amp;tlng=en&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Hatzivasilis, G., Askoxylakis, I., Alexandris, G., Anicic, D., Bröring, A., Kulkarni, V., ... and Spanoudakis, G. (2018, September). The Interoperability of Things: Interoperable solutions as an enabler for IoT and Web 3.0. In 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) (pp. 1-7). IEEE. &lt;a href="https://ieeexplore.ieee.org/abstract/document/8514952/"&gt;https://ieeexplore.ieee.org/abstract/document/8514952/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Lundberg, L., and Petrén, M. (2022). DApp Revolution: An Investigation into the Nature and Business Models of Web 3.0 Decentralized Applications. &lt;a href="https://odr.chalmers.se/handle/20.500.12380/305006"&gt;https://odr.chalmers.se/handle/20.500.12380/305006&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Utility Of Web 3.0 And Technology Trends</title>
      <dc:creator>Krishna Jadhav</dc:creator>
      <pubDate>Fri, 20 Jan 2023 06:26:22 +0000</pubDate>
      <link>https://dev.to/krishna1412/utility-of-web-30-and-technology-trends-4m72</link>
      <guid>https://dev.to/krishna1412/utility-of-web-30-and-technology-trends-4m72</guid>
      <description>&lt;p&gt;Krishna Jadhav&lt;/p&gt;

&lt;p&gt;Utility of Web 3.0 in 2022 and upcoming technology trends&lt;br&gt;
In Krishna Jadhav’s research on new technological trends for upcoming 2023, The space competition, work from anywhere, and the digital workplace, mRNA biotechnology, AI, and geoengineering are just a handful of the numerous developments that dominated 2021. But Web 3.0 (or decentralisation) and the metaverse stood out as two of the most significant. The public at large, tech enthusiasts, and the media should all continue to be intrigued by these two technological advances (Elnaj, 2022). The hype around nonfungible coins has undoubtedly brought Web 3.0 and decentralisation to the fore (NFTs). Let's have a look at Web3's predecessors to comprehend it. Web 1.0 passively explored the web and consumed material in "read-only" mode.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--wwV3L8OA--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rq7paapvxr74eluobdcx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--wwV3L8OA--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rq7paapvxr74eluobdcx.png" alt="Image description" width="709" height="472"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 1:  Web 3.0 / Semantic Web Architecture&lt;br&gt;
(Source: Gurunath and Samanta, 2022)&lt;/p&gt;

&lt;p&gt;Consumers were more active and participatory due to Web 2.0, as they began to produce material on social media and connect and cooperate. This is the "version" of the web that is visible to the current technologically innovative industrial market (Chalmers et al., 2022). Web 3.0 is a decentralised paradigm in which content producers may "mint," own, sell, and get paid for their work using NFTs, all while utilising different blockchain technology components. Simply, minting NFTs entails producing an exclusive digital item that can be purchased using a token as ownership documentation.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--eya6A8nD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dn6tqthagtt8ojzuffiz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--eya6A8nD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dn6tqthagtt8ojzuffiz.png" alt="Image description" width="832" height="319"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 2: Web 3.0 and the digital economy&lt;br&gt;
(Source: Chen et al., 2022)&lt;/p&gt;

&lt;p&gt;Later, NFT file sales and payment transactions are decentralised on a blockchain. How much farther will Web3 "emerge" in 2022? Let's begin with NFTs. The blockchain technology behind Bitcoin has advanced significantly in terms of performance since the currency's launch in 2009. There has been a standardised increase in the number of transactions per second (TPS) on Solana from seven to 50,000 (Li2u et al., 2022). Aside from performance, blockchain has proven its utility in financial services, decentralised financing (Defi), supply chain management, digital health, and various other fields. We are also seeing the effective use of blockchain in social media.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--I_5lVr_V--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/necm3orjhqx4kgiyo4z3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--I_5lVr_V--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/necm3orjhqx4kgiyo4z3.png" alt="Image description" width="813" height="550"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 3: Metaverse Slicing4Meta architecture&lt;br&gt;
(Source: Liu et al., 2022)&lt;/p&gt;

&lt;p&gt;Conclusion&lt;br&gt;
In Web3.0 Despite successful blockchain deployments, the Krishna Jadhav’s conclusive outlook to the detailed discussed above shows that, technology faces several significant problems and impediments in enabling Web3. Lack of interoperability, as well as diverse operating systems and non-interoperable AR/VR devices, will stymie adoption. Web 3 is the Next generation of the World Wide Web, which revolves around "decentralisation" and "user-centric". It is speculated that Web 3.0 will pop up with decentralised immersive applications that require user-centric immersion and interaction experiences.&lt;/p&gt;

&lt;p&gt;Want to know more about How Web 3.0 Will Affect Business in the Future? The next Article is here to provide you all the correct answers.&lt;/p&gt;

&lt;p&gt;Reference List&lt;br&gt;
Chalmers, D., Fisch, C., Matthews, R., Quinn, W., and Recker, J. (2022). Beyond the bubble: Will NFTs and digital proof of ownership empower creative industry entrepreneurs?. Journal of Business Venturing Insights, 17, e00309. &lt;a href="https://www.sciencedirect.com/science/article/pii/S2352673422000075"&gt;https://www.sciencedirect.com/science/article/pii/S2352673422000075&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Chen, C., Zhang, L., Li, Y., Liao, T., Zhao, S., Huang, H., and Zheng, Z. (2022). When Digital Economy Meets Web 3.0: Applications and Challenges. arXiv preprint arXiv:2210.08993. &lt;a href="https://arxiv.org/abs/2210.08993"&gt;https://arxiv.org/abs/2210.08993&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Elnaj, S. (2022). The Top Two Tech Trends In 2022: Web 3.0 And The Metaverse. Innovation. [Online]. Available at: &lt;a href="https://www.forbes.com/sites/forbestechcouncil/2022/02/10/the-top-two-tech-trends-in-2022-web-30-and-the-metaverse/?sh=5230baf97e74"&gt;https://www.forbes.com/sites/forbestechcouncil/2022/02/10/the-top-two-tech-trends-in-2022-web-30-and-the-metaverse/?sh=5230baf97e74&lt;/a&gt; [Accessed on 20th October 2022]&lt;/p&gt;

&lt;p&gt;Gurunath, R., and Samanta, D. (2022). A novel approach for semantic web application in online education based on steganography. International Journal of Web-Based Learning and Teaching Technologies (IJWLTT), 17(4), 1-13. &lt;a href="https://www.igi-global.com/article/a-novel-approach-for-semantic-web-application-in-online-education-based-on-steganography/285569"&gt;https://www.igi-global.com/article/a-novel-approach-for-semantic-web-application-in-online-education-based-on-steganography/285569&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Liu, Y. J., Du, H., Niyato, D., Feng, G., Kang, J., and Xiong, Z. (2022). Slicing4Meta: An Intelligent Integration Framework with Multi-dimensional Network Resources for Metaverse-as-a-Service in Web 3.0. arXiv preprint arXiv:2208.06081. &lt;a href="https://arxiv.org/abs/2208.06081"&gt;https://arxiv.org/abs/2208.06081&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>DevOps To DevSecOps: The Transition Pathway</title>
      <dc:creator>Krishna Jadhav</dc:creator>
      <pubDate>Fri, 20 Jan 2023 06:22:25 +0000</pubDate>
      <link>https://dev.to/krishna1412/devops-to-devsecops-the-transition-pathway-ok2</link>
      <guid>https://dev.to/krishna1412/devops-to-devsecops-the-transition-pathway-ok2</guid>
      <description>&lt;p&gt;Krishna Jadhav&lt;/p&gt;

&lt;p&gt;DevOps to DevSecOps: The transition pathway&lt;br&gt;
As a DevOps and Agile coach Krishna Jadhav revolutionized Enterprises, DevOps have revolutionised the world of software development. The fusion has primarily made quick and efficient software releases of the operations and development teams (Dev/Ops). Organisations must adopt a DevOps culture that incorporates security due to the ongoing growth of the threat landscape for application security (Akbar et al., 2022). As a result, DevSecOps has evolved to enhance DevOps' capabilities and enable organisations to produce secure software more quickly.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--fmCuECqZ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/655851u1162f38s4r0xh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--fmCuECqZ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/655851u1162f38s4r0xh.png" alt="Image description" width="671" height="321"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 1: Building components of a software company&lt;/p&gt;

&lt;p&gt;(Source: Pendyala, 2020)&lt;/p&gt;

&lt;p&gt;Agile development approaches DevOps and DevSecOps have many similarities. Both of these strategies share several features in common, such as depending on a collaborative culture to achieve development goals like rapid iteration and deployment, utilising automation throughout the application creation process, and actively tracking and analysing data to drive changes (Figure 1). DevSecOps and DevOps, on the other hand, are distinguished by their focus. DevOps is concerned with the integration of development and operations teams.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--jkrcpiT---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/02ig6ud64au6o1394gzm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--jkrcpiT---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/02ig6ud64au6o1394gzm.png" alt="Image description" width="580" height="504"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 2: DevOps Model 6 phases&lt;br&gt;
(Source: Battina, 2021)&lt;/p&gt;

&lt;p&gt;DevSecOps highlights the need to incorporate security throughout the whole DevOps workflow, beginning with the design, coding, and deployment stages. DevSecOps incorporates securitytesting early across the development and operations pipeline instead of the conventional approach of retrofitting security into the build (Morales et al., 2020). Security is made a component of everyone's work via DevSecOps. DevOps and security teams frequently conflict in many enterprises (Figure 2). This uneasy connection frequently results in delayed rehabilitation and, in the worst cases, inferior and insecure apps.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--D_9hrv8i--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jxmqgb73jx0izqzqg3bx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--D_9hrv8i--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jxmqgb73jx0izqzqg3bx.png" alt="Image description" width="751" height="291"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 3: DevSecOps environment&lt;/p&gt;

&lt;p&gt;(Source: Schilling, 2022)&lt;/p&gt;

&lt;p&gt;The development environment may be made more secure by using automated application security testing technologies, which can aid in detecting and correcting problems earliest possible problems (Haque, Bhushan and Bhushan, 2022). Many team members may have difficulty embracing the radical shift that alters the usual method of doing things (Figure 3). Furthermore, it may increase opposition because security was treated as an afterthought in the DevOps approach.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--41DCtuJo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/7lyjk03ryh5dtcl1uzq5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--41DCtuJo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/7lyjk03ryh5dtcl1uzq5.png" alt="Image description" width="782" height="453"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 4: Continuous pipelines architecture&lt;/p&gt;

&lt;p&gt;(Source: Strazdina, 2022)&lt;/p&gt;

&lt;p&gt;Conclusion&lt;br&gt;
Throughout the development and deployment process, as per Krishna Jadhav the two teams work together to execute common objectives that dramatically improve delivery speed. It can be concluded that, security is sometimes the first victim as DevOps teams seek to boost deployment frequency. Because the shift to DevSecOps will affect everyone, all teams must participate in the process (Figure 4). Developers may easily manage security throughout development without slowing or disrupting their processes when firms invest in security testing technologies that integrate smoothly into developer environments.&lt;/p&gt;

&lt;p&gt;To know about Utility of Web 3.0 in 2022 and upcoming technology trends, give our next article a read.&lt;/p&gt;

&lt;p&gt;Reference List&lt;/p&gt;

&lt;p&gt;Akbar, M. A., Smolander, K., Mahmood, S., and Alsanad, A. (2022). Toward successful DevSecOps in software development organizations: A decision-making framework. Information and Software Technology, 147, 106894. &lt;a href="https://www.sciencedirect.com/science/article/pii/S0950584922000568"&gt;https://www.sciencedirect.com/science/article/pii/S0950584922000568&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Battina, D. S. (2021). The Challenges and Mitigation Strategies of Using DevOps during Software Development. International Journal of Creative Research Thoughts (IJCRT), ISSN, 2320-2882. &lt;a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4004335"&gt;https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4004335&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Haque, A. B., Bhushan, B., and Dhiman, G. (2022). Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends. Expert Systems, 39(5), e12753. &lt;a href="https://onlinelibrary.wiley.com/doi/abs/10.1111/exsy.12753"&gt;https://onlinelibrary.wiley.com/doi/abs/10.1111/exsy.12753&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Morales, J. A., Scanlon, T. P., Volkmann, A., Yankel, J., and Yasar, H. (2020, August). Security impacts of sub-optimal devsecops implementations in a highly regulated environment. In Proceedings of the 15th International Conference on Availability, Reliability and Security (pp. 1-8). &lt;a href="https://dl.acm.org/doi/abs/10.1145/3407023.3409186"&gt;https://dl.acm.org/doi/abs/10.1145/3407023.3409186&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Pendyala, V. (2020). Evolution of integration, build, test, and release engineering into devops and to DevSecOps. In Tools and Techniques for Software Development in Large Organizations: Emerging Research and Opportunities (pp. 1-20). IGI Global. &lt;a href="https://www.igi-global.com/chapter/evolution-of-integration-build-test-and-release-engineering-into-devops-and-to-devsecops/247537"&gt;https://www.igi-global.com/chapter/evolution-of-integration-build-test-and-release-engineering-into-devops-and-to-devsecops/247537&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Schilling, W. (2022, August). WIP: Integrating Modern Development Practices into a Software Engineering Curriculum. In 2022 ASEE Annual Conference &amp;amp; Exposition. &lt;a href="https://peer.asee.org/wip-integrating-modern-development-practices-into-a-software-engineering-curriculum"&gt;https://peer.asee.org/wip-integrating-modern-development-practices-into-a-software-engineering-curriculum&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Strazdina, V. (2022). A hybrid automated framework for testing cloud-native and virtual core network applications. &lt;a href="https://aaltodoc.aalto.fi/handle/123456789/116352"&gt;https://aaltodoc.aalto.fi/handle/123456789/116352&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>DevOps Leveraging Cloud Infrastructure</title>
      <dc:creator>Krishna Jadhav</dc:creator>
      <pubDate>Fri, 20 Jan 2023 06:20:27 +0000</pubDate>
      <link>https://dev.to/krishna1412/devops-leveraging-cloud-infrastructure-391j</link>
      <guid>https://dev.to/krishna1412/devops-leveraging-cloud-infrastructure-391j</guid>
      <description>&lt;p&gt;Krishna Jadhav&lt;/p&gt;

&lt;p&gt;DevOps leveraging cloud infrastructure&lt;br&gt;
As per author Krishna Jadhav’s research, An organisation's application delivery pipeline may be made more swift and effective by using the DevOps software development strategy, which integrates cultural ideas, tools, and practices (Figure 1). It makes it possible for "development and operations (DevOps)" organisations to produce software and services fast, enabling regular upgrades and fostering the swift creation of new products.&lt;/p&gt;

&lt;p&gt;An effective tool for implementing DevOps principles is cloud computing, which enables the necessary technological and cultural change required to compete in the contemporary software industry (Khan et al., 2022).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ISgv6yya--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/6w1gyb0ksmd4oq0d7db3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ISgv6yya--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/6w1gyb0ksmd4oq0d7db3.png" alt="Image description" width="627" height="526"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 1: DevOps cycle DZone&lt;/p&gt;

&lt;p&gt;(Source: Khan, Jumani and Farhan, 2020)&lt;/p&gt;

&lt;p&gt;When the business objectives and targets are clearly identified and resource planning and improvement are completed, the DevOps approach proceeds through the following steps (Krey et al., 2022). The organisation requires and adheres to the DevOps Cycle. The DevOps cycle is based on the method depicted in Figure 1.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--aWVLp-uF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/qhoz9o8xtx6xod8pq4tb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--aWVLp-uF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/qhoz9o8xtx6xod8pq4tb.png" alt="Image description" width="668" height="323"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 2: Continual pathway of delivery and deployment&lt;/p&gt;

&lt;p&gt;(Source: Khan, Jumani and Farhan, 2020)&lt;/p&gt;

&lt;p&gt;Your product is prepared for release deployment with the aid of continuous delivery, but the business decision on when to push the code into the production branch necessitates a manual advance for the final sending. Any updated functioning application version is immediately delivered to production using continuous deployment (Figure 3). Continuous Delivery requires Nonstop Deployment, but it is not necessary for the reverse to occur.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s---mYcXFLy--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/c535bgirt5u9j56tu3ki.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s---mYcXFLy--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/c535bgirt5u9j56tu3ki.png" alt="Image description" width="635" height="329"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 3: Automated release and deployment procedure&lt;/p&gt;

&lt;p&gt;(Source: Khan, Jumani and Farhan, 2020)&lt;/p&gt;

&lt;p&gt;Code Review System has been incorporated into the systems. By establishing and configuring the DevOps continuous integration pipeline and continuous deployment/delivery on the cloud, the DevOps pipeline aim should be accomplished (Mumbarkar and Prasad, 2022). A method for Continuous Monitoring is being configured after delivery.&lt;/p&gt;

&lt;p&gt;●       The DevOps Automate Build on Cloud.&lt;/p&gt;

&lt;p&gt;●       The DevOps Automate Testing on Cloud.&lt;/p&gt;

&lt;p&gt;●       The DevOps Automate Deployment on Cloud.&lt;/p&gt;

&lt;p&gt;●       The DevOps Automate Monitoring on Cloud.&lt;/p&gt;

&lt;p&gt;●       The DevOps Automate Issue Tracking.&lt;/p&gt;

&lt;p&gt;●       The DevOps Automate Feedbacks&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--iQwqmP_h--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/24uqtvms238vwo2x9d53.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--iQwqmP_h--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/24uqtvms238vwo2x9d53.png" alt="Image description" width="753" height="340"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Figure 4: The CI and CD processes&lt;/p&gt;

&lt;p&gt;(Source: Khan, Jumani and Farhan, 2020)&lt;/p&gt;

&lt;p&gt;Conclusion&lt;br&gt;
Krishna Jadhav’s conclusive understanding entails that the organisation requires and adheres to the DevOps Cycle (Figure 4).&lt;/p&gt;

&lt;p&gt;●       When the aims are within reach, and you accept their final approach, you are ready to assume control of the project's progress.&lt;/p&gt;

&lt;p&gt;●       The methods for developing the pertinent codes and getting them ready for the next step are established by this.&lt;/p&gt;

&lt;p&gt;●       Because DevOps is a dependable method, current code may be reused for future updates by providing continuous feedback on the development.&lt;/p&gt;

&lt;p&gt;How can one effectively transition from DevOps to a DevSecOps approach? What are the major differences? Want to build a better understanding? Read our next article on this topic.&lt;/p&gt;

&lt;p&gt;Reference List&lt;br&gt;
Battina, D. S. (2020). Devops, A New Approach To Cloud Development &amp;amp; Testing. International Journal of Emerging Technologies and Innovative Research (&lt;a href="http://www"&gt;www&lt;/a&gt;. jetir. org), ISSN, 2349-5162. &lt;a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4004330"&gt;https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4004330&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Khan, M. O., Jumani, A. K., and Farhan, W. A. (2020). Fast delivery, continuously build, testing and deployment with DevOps pipeline techniques on cloud. Indian Journal of Science and Technology, 13(05), 552-575. &lt;a href="https://www.researchgate.net/profile/Awais-Jumani/publication/339135798_Fast_Delivery_Continuously_Build_Testing_and_Deployment_with_DevOps_Pipeline_Techniques_on_Cloud/links/5e401ae0458515072d8b8fb7/Fast-Delivery-Continuously-Build-Testing-and-Deployment-with-DevOps-Pipeline-Techniques-on-Cloud.pdf"&gt;https://www.researchgate.net/profile/Awais-Jumani/publication/339135798_Fast_Delivery_Continuously_Build_Testing_and_Deployment_with_DevOps_Pipeline_Techniques_on_Cloud/links/5e401ae0458515072d8b8fb7/Fast-Delivery-Continuously-Build-Testing-and-Deployment-with-DevOps-Pipeline-Techniques-on-Cloud.pdf&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Khan, M. S., Khan, A. W., Khan, F., Khan, M. A., and Whangbo, T. K. (2022). Critical Challenges to Adopt DevOps Culture in Software Organizations: A Systematic Review. IEEE Access, 10, 14339-14349. &lt;a href="https://ieeexplore.ieee.org/document/9690862/"&gt;https://ieeexplore.ieee.org/document/9690862/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Krey, M., Soriano Ramirez, M., Christen, M., and Candreia, J. (2022, July). Development of a Model for the Implementation of Business Intelligence in SMEs. In Proceedings of the 12th International Conference on Information Communication and Management (pp. 61-68). &lt;a href="https://dl.acm.org/doi/abs/10.1145/3551690.3551700"&gt;https://dl.acm.org/doi/abs/10.1145/3551690.3551700&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Mumbarkar, P., and Prasad, S. (2022, October). Adopting DevOps: Capabilities, practices, and challenges faced by organizations. In AIP Conference Proceedings (Vol. 2519, No. 1, p. 030029). AIP Publishing LLC. &lt;a href="https://aip.scitation.org/doi/abs/10.1063/5.0110594"&gt;https://aip.scitation.org/doi/abs/10.1063/5.0110594&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
