Skip to main content
Author headshot

Andrew Pomponio

Associate Enterprise Architect

Latest Content from Andrew Pomponio

Blog

MySQL Overview: Key Features, Benefits, and Use Cases

In this blog, our expert gives an overview of MySQL, including what it is, how it works, potential use cases, and how it compares to other popular open source RDBMS.
Databases
Blog

MySQL vs. SQLite: Features, Use Cases, and Performance Comparison

In this blog, our expert compares MySQL vs. SQLite, including their features, relative performance, and potential use cases.
Databases, Open Source
Blog

MariaDB Overview: Key Features, Benefits, and FAQ

In this blog, our expert gives an overview of MariaDB, explaining how it works, when it should be used, and the features and benefits that make it a popular open source database.
Databases, Open Source
Blog

What Is Cassandra? Features, Benefits, and FAQ

In this blog, our expert explains how Apache Cassandra works, how it's used, and the key features that make it a popular choice among column-oriented databases.
Databases, Open Source
Blog

PostgreSQL vs. MySQL: Key Differences and Similarities

In this blog, our expert discusses the differences and similarities between PostgreSQL vs. MySQL, and when teams should consider one open source database over the other.
Databases, Open Source
Blog

Kubernetes Man-in-the-Middle Vulnerability: CVE-2020-8554

CVE-2020-8554 is a Kubernetes vulnerability that, when exploited, allows "man in the middle" attacks to be carried out against pods and nodes in a cluster.
Security, Containers
Blog

CentOS Commands Cheat Sheet

Need CentOS help? See our collection of useful CentOS commands and download a copy of our one-page CentOS commands cheat sheet.
Operating Systems, Development
Blog

Java Security Update: OpenJDK Vulnerabilities You Need to Know

Thinking of making the switch to OpenJDK but have questions and concerns about security? You’re not alone and being security-focused is a good place to start when choosing to adopt OpenJDK. Like all open source software, it’s not perfect and can be prone to issues. This blog contains noteworthy concerns about certain versions to be avoided.
Security, Java
Blog

Why Choose TLS 1.3?

Why upgrade to TLS 1.3? Learn more about the latest version of TLS, TLS 1.2 vs. 1.3, and the performance differences in today’s blog!
Open Source