Bravin Wasike
Some of Bravin's Work
AccelData
- Data Quality Dimensions
- Digital Transformation Platforms
- Best Data Catalog Tools
- Stale Data: What It Is and How to Avoid It
Acronis
Autify
Blink Ops
DevZero
- Serverless vs Microservices: Definition and Comparison Guide
- Docker Microservice Architecture: How to Build One
- Microservices Patterns: A Guide
- Useful Backstage Plugins
- Cycle Time in Agile: A Detailed Introduction
- Using GPU With Docker: A How-to Guide
- How to Fix "failed to solve with frontend dockerfile.v0" Error
- A Guide to Microservice Best Practices
InfluxData
- Getting Started with InfluxDB and Grafana
- The Role of Time Series Databases in Industrial Process Optimization
SentinelOne
- EDR vs NGAV: An In-depth Comparison
- Agent vs. Agentless Security: Which to Choose?
- EDR vs SIEM vs SOAR: Which Is Right for You?
- N Types of Endpoint Security and How to Implement Them
- What is Cybersecurity Architecture?
- SIEM Log Monitoring: Definition and How to Manage It
- EDR vs NDR vs XDR: How to Pick a Detection Response Solution
- Cybersecurity Forensics: Definition and Best Practice
SolarWinds
- 491: Active Directory Auditing Software - AD Audit Tool | SolarWinds
- 492: Active Directory Management Software - AD User Tools | SolarWinds
- #503: Best Remote Support Software
- What is Enterprise Service Management? 10 Best ESM Software
- 494: What is a DDoS Attack? Distributed Denial-of-Service Meaning - IT Glossary | SolarWinds
Spin.AI
- How to Back Up Google Workspace™ Data: A Business Guide
- How to Migrate from Microsoft 365 to Google Workspace
- Cybersecurity Policy Secops Template
- How To Recover Deleted Files From Google Drive
- Expert Insights: How to Select a SaaS Backup Solution
- Best Hipaa Compliant Cloud Backup Solutions
- 5 Popular Options for Running a Sharepoint Backup
- Cloud SaaS Backup Policies Guide: What, Why, When, How
- Google Workspace™ DLP Best Practices for Businesses
- Top 4 Browser Security Tools to Protect You in 2025
- Mobile Ransomware Attacks. Device Security
- Top 7 Disaster Recovery Solutions
Splunk
- Audit Logging 101: Everything To Know About Audit Logs & Trails
- The RCE Attack Guide: Remote Code Execution & Prevention
- Cyber Kill Chains Explained: Phases, Pros/Cons & Security Tactics
- How Structured, Unstructured & Semi-Structured Data Change Your Data Analytics Practice
- Roles: SRE Interview
- Incident Severity Levels
Stackify
- What are Linux Logs? How to View Them, Most Important Directories & More
- Display All PHP Errors: Basic & Advanced Usage
- Node.js Error Handling Best Practices: Ship With Confidence
- A Guide to Java Streams in Java 8: In-Depth Tutorial With Examples
- Event Streaming: The What, Why, and How
Testim.io
- Protractor Testing
- Selenium Wait For Page To Load
- Safari Driver
- Sonarqube Code Coverage
- React Native Testing
- Artillery Load Testing
- Apex Class
Tricentis
- Web Stress Testing All of Your Web & Mobile Applications
- Mobile Test Automation A Practical Introduction
- Understanding Date Formats in Oracle SQL
- Jira Testing Workflow: How to Use Jira for Testing
- Top iPhone Emulators for App Development
Workato
- Zendesk Salesforce Integration
- 5 reasons why point-to-point integration falls short of your business needs
- What is IT automation? Plus 6 examples
- Netsuite Hubspot Integration
- What is integration middleware? And how can your organization use it?
- What is an ESB? And how does it fall short of your integration needs?
- What to prioritize when evaluating integration solutions
- An Introduction to the SAP Order-to-Cash Process