Learning

The Lego Architecture Blueprint for Low-code and AI-Driven Development
In the fast-paced world of software development, simplicity and agility are key to building systems that can scale and adapt to changing requirements. A well-thought-out engineering architecture can provide this foundation. Dive into our approach to engineering architecture, which is tailored for the low-code and AI-driven world.

The Lego Architecture Blueprint for Low-code and AI-Driven Development
In the fast-paced world of software development, simplicity and agility are key to building systems that can scale and adapt to changing requirements. A well-thought-out engineering architecture can provide this foundation. Dive into our approach to engineering architecture, which is tailored for the low-code and AI-driven world.
.webp)
Optimising Deriv's trading platforms with AWS Global Accelerator
Discover how Deriv optimises its global trading infrastructure using AWS Global Accelerator. Learn about our approach to enhancing performance, ensuring reliability, and maintaining security for traders worldwide.
.webp)
Optimising Deriv's trading platforms with AWS Global Accelerator
Discover how Deriv optimises its global trading infrastructure using AWS Global Accelerator. Learn about our approach to enhancing performance, ensuring reliability, and maintaining security for traders worldwide.
.webp)
Data engineering at Deriv: Building robust infrastructure
In today’s data-driven world, have you ever felt overwhelmed by the sheer volume of information or frustrated by the lack of a unified, accessible data infrastructure?
.webp)
Data engineering at Deriv: Building robust infrastructure
In today’s data-driven world, have you ever felt overwhelmed by the sheer volume of information or frustrated by the lack of a unified, accessible data infrastructure?

Quill: The building blocks of Deriv’s seamless UX and UI design
Quill is a UX/UI design system that streamlines design for our evolving products and synergizes efforts for quicker and better results.

Quill: The building blocks of Deriv’s seamless UX and UI design
Quill is a UX/UI design system that streamlines design for our evolving products and synergizes efforts for quicker and better results.

The secret life of Chrome extension service-workers
When you install an extension, all the background work is handled by service workers. Find out how to manage these tools more effectively.

The secret life of Chrome extension service-workers
When you install an extension, all the background work is handled by service workers. Find out how to manage these tools more effectively.

Going beyond DORA metrics in DevOps performance assessment
Find out how we're using DORA metrics and other DevOps indicators to improve performance and create a culture of data-driven ownership.

Going beyond DORA metrics in DevOps performance assessment
Find out how we're using DORA metrics and other DevOps indicators to improve performance and create a culture of data-driven ownership.

Cloud protection strategies against dangling IP takeovers
Dangling IP address takeovers cause great monetary and reputation loss for companies. Learn how they happen and how to mitigate this risk.

Cloud protection strategies against dangling IP takeovers
Dangling IP address takeovers cause great monetary and reputation loss for companies. Learn how they happen and how to mitigate this risk.

Cloud-agnostic Kubernetes on AWS: A strategic guide
Explore our journey from late-night server maintenance to mastering Kubernetes on AWS, gaining valuable insight into scalability and resilience.

Cloud-agnostic Kubernetes on AWS: A strategic guide
Explore our journey from late-night server maintenance to mastering Kubernetes on AWS, gaining valuable insight into scalability and resilience.

Improving secret scanning in source code management systems
Discover how we enhanced our approach to secret detection and prevention, leading to stronger cybersecurity practices in software development.

Improving secret scanning in source code management systems
Discover how we enhanced our approach to secret detection and prevention, leading to stronger cybersecurity practices in software development.