My Journey To Programming

I guess everything started from the moment when my father first told me about computers. While still in his early thirties, he graduated from the Kharkiv Institute of Radioelectronics. He is just like me, the same way: passionate. I remember when he told stories about huge computers and rooms of equipment that were used to make simple calculations. I loved that time. I remember when I drew an imaginary keyboard on the piece of cardboard and pretended to be typing some text for a program and executing it.

Amazon Web Services Cloud Formation template for your VPC. Explained.

In this article we will clarify how to use AWS Cloud Formation (CF) templates in forming your Virtual Private Cloud (VPC) and its network, including private and public subnets, internet gateways, routes, security groups, network access control lists, etc. There are a lot of good articles written explaining about best practices and how to build your VPC. But if you want to use AWS Cloud Formation templates for your VPC then pay attention.

Serverless Architectures

Many companies have adopted cloud services to run applications in an effort to reduce or remove server management overhead. You may have already heard of form of cloud computing called Functions-as-a-service, or (FaaS), which provides clients a way to access serverless computing resources without having to build all the infrastructure normally required to develop and run software. Analyst estimates suggest that around 85 percent of servers are underutilized, implying a great deal of wasted computing capacity.

Microservices. Demystified

The central idea of building Microservices architecture is to split functionality into cohesive verticals which aim to solve specific issue in the domain. Microservices architectures are driven by the domain problem and not by the technology it uses. As such it might be challenging to split your monolith application because it requires complete rethinking of the architecture and the domains that are involved. Architectural Complexity needs to first be addressed. For Microservices, architectural complexity comes into play when it comes to interactions between individual services that implement specific domain.

Security Inside Docker Containers

In this article we’re going to talk about security inside Docker containers. Here at Konstankino LLC we heavily utilize Docker and would like to shed some light on security and explain why it is especially important when it comes to containers as microservices. Assuming you have a well-defined functionality that you would like to abstract and encapsulate inside your container, it is relatively easy to do. Choose a base Operating System that your container will inherit from, install dependencies, package your files and now you have new shiny container that you can deploy and use.

Escape into the Cloud with AWS Elastic Beanstalk and Docker or: How “Release On Steroids” actually looks and feels.

Convenience and efficiency are the two prime motivators that nudge reluctant teams into the world of Cloud computing. For many individuals, Computing Cloud is a buzzword that is often interpreted differently. In this article, we will show you how your release process can be dramatically improved, simplified, and streamlined. We will focus mostly on Amazon Web Services – specifically, on how to use Amazon’s Elastic Beanstalk product in combination with a Docker to enable you to take your release process up to the next level.


We like to think about technology from the point of view of what it enables you to do. How easy it is to do one thing using one set of tools that make you productive. There is no such thing as «one size fits all» and the right-thing-for-the-right-job applies all the time. This article is dedicated to regulations. One of those regulations is FERPA. Here we will shed some light on how AWS helped us to achieve desired security for our customers.

2FA and Remember Me Feature

Developers should care about a project’s security requirements, even if they don’t have them in their backlog and SOW. Security can definitely impact the product that they are building. Recently one of our customers, a project manager with a small team of in-house engineers, requested that we implement a 2-Factor Authentication (2FA) feature for their app, since their business is regulated by a state agency based on the data that their app processes and stores.

San Jose International Airport

Konstankino LLC is excited to share yet another happy story of a recent project we were privileged to work on. The system was an old-school Django monolith application that the San Jose International Airport used for managing their ads infrastructure. The system was developed to manage various devices via a dashboard, such as Projectors, Creston, and BACNet devices. When our team made its initial code review and audit, we discovered that the system did not have a solid and consistent way for devices to communicate; their interoperability was hampered by incompatible interfaces.