Recent Stories

Softrams Wins 2022 Top Workplaces Culture Excellence Award

Zara Ikram

July 1, 2022

Softrams has earned the 2022 Top Workplaces Culture Excellence recognition for two culture excellence awards in Leadership and Innovation. This award celebrate organizations that excel in specific areas of workplace culture and is based on employee feedback.

Repeatable Jenkins Jobs for Multiple GitHub Repos

Chris Gibson

June 22, 2022

An overview on how to use Jenkins to setup repeatable pipelines for use in dozens or hundreds of Github repositories. This blog explores a couple different ways to easily manage CI/CD jobs for repos.

  • Internet Security: Only as strong as its weakest link

    Pavan Kalyan Neerukonda

    May 26, 2022

    Data is the new weapon. Data breaches can happen due to the weakest link in a company which is why cybersecurity awareness for all employees is critical. In essence, employees are the last line of defense for any company.

  • External Value Files in Argo CD With ApplicationSets

    Oreon Lothamer

    May 10, 2022

    Learn more about our experience using Argo CD to deploy to our Kubernetes clusters. While the overall experience has been great, as we get more advanced we have started to wish for additional options.

  • I Have to Log in, Again?

    Nitya Parasuramuni

    May 5, 2022

    Companies are becoming more aware of the importance of cyber security practices as they are requiring users to use multi-factor authentication methods in order to better protect user information.

  • The Second Brain


    April 21, 2022

    The Second Brain is a personal knowledge management system that can help manage the ideas and insights we experience. A second brain can be used to help reduce the amount of information juggling between functions and learning engagements using our brain.

  • Timezones with Node, MySQL, and AWS Lambda

    Chris Hand

    April 13, 2022

    How can we ensure data integrity when working across time zones? It’s impossible to know without knowing what the time zone of the database is assumed to be. Without explicitly storing the time zone with the date time stamp, it’s meaningless.

  • Why I love Nmap

    Bill Jones

    March 25, 2022

    Everyone has a favorite tool they enjoy using for one purpose or another. This blog dives into a few uses of NMap and walks over the simplicity and effectiveness of the tool itself, including a lack of alternatives.

  • Migrating a Web Application

    Chris Hand

    March 3, 2022

    Sometimes in the lifecycle of a project it is necessary to migrate a system to a new language, infrastructure, or platform. This blog covers best practices and some helpful tips to undertake the migration of an application or feature.

  • Cybersecurity Incident Response 


    February 24, 2022

    An incident can be defined as an unexpected disruption to a service. An incident can disrupt your business which will directly or indirectly impact your customers.

  • Softrams awarded Silver Medal by Inc.’s Best in Business

    Zara Ikram

    February 13, 2022

    Softrams awarded Silver medal by Inc. 2021 Best in Business in the IT Development category. Inc.’s Best in Business Awards honor companies that have gone above and beyond to make a positive impact.

  • Basics of Network Security

    Nitya Parasuramuni

    January 26, 2022

    In 2020, over 1,100 data breaches were reported, affecting nearly 300 million individuals. Designing and maintaining the network infrastructure of an organization is a vital part of security and is needed now more than ever before.

  • AI, UI, and You and I

    Paul Mullin

    January 13, 2022

    Machine learning and AI applications still most often fail because user design is not done well. This blog lists considerations for the human centered design of AI technologies in the augmentation of human performance.

  • Security via Obscurity: A Persistent Pitfall


    January 5, 2022

    A brief metaphorical monologue cautioning about the easy security pitfall that is Security via Obscurity. This strategy employs secrecy as the primary method to secure an asset- whether this is liquid wealth, documents, or data on a server somewhere.

  • Thumb Please


    December 28, 2021

    There has been a recent increase in the number of technological devices that use biometric scanners as the primary form of authentication on their devices. This blog explores whether remembering passwords is now a thing of the past.

  • Building a Bridge Between Users and Stakeholders with UX

    Yao Adantor

    December 22, 2021

    Companies from all industries have invested in the development of UX teams, realizing the advantage of a human-centered design process. However, one thing that remains is the disconnect between stakeholders and users throughout the product building process.

  • CI Workflows as Kubernetes First Class Citizens

    Oreon Lothamer

    November 22, 2021

    Leveraging the gitops methodology makes it easy to enable developers to deploy applications onto our K8s clusters. Each cluster has a repo for the app of apps where we could add a new application manifest and it would be deployed through ArgoCD.

  • Have You Ever Tried to Phish Yourself?

    Ryan Mathus

    November 17, 2021

    Everything we do online leaves a digital breadcrumb that if someone were to follow can be used against us. Staying secure online sometimes requires thinking like the adversary and trying to compromise yourself to see how susceptible you really are.

  • Do Your Part: CyberSecurity

    Larry Bensky

    November 9, 2021

    We are all responsible for our own network hardening and security. This blog post is about how to harden your network and push Advanced Persistent Threats (APTs) efforts away.

  • Mobile Security Often Overlooked

    Yusuf Richardson

    October 30, 2021

    The extensive usage of mobile devices in today’s work environment has led to a significant rise in the risk for data theft. Securing mobile devices requires a multi-layered approach and investment in enterprise solutions.