Industry experts offer thoughtful, insightful, and often controversial predictions on how DevOps and related technologies will evolve and impact business in 2022. Part 7 covers automation ...
Feature Articles
Industry experts offer thoughtful, insightful, and often controversial predictions on how DevOps and related technologies will evolve and impact business in 2022. Part 6 covers APIs ...
Industry experts offer thoughtful, insightful, and often controversial predictions on how DevOps and related technologies will evolve and impact business in 2022. Part 5 covers microservices and containers ...
Industry experts offer thoughtful, insightful, and often controversial predictions on how DevOps and related technologies will evolve and impact business in 2022. Part 4 covers development tools and agile development ...
Industry experts offer thoughtful, insightful, and often controversial predictions on how DevOps and related technologies will evolve and impact business in 2022. Part 3 covers developers and the developer experience ...
Industry experts offer thoughtful, insightful, and often controversial predictions on how DevOps and related technologies will evolve and impact business in 2022. Part 2 covers BizDevOps and more on DevOps ...
The Holiday Season means it is time for DEVOPSdigest's annual list of DevOps predictions. Industry experts — from analysts and consultants to the top vendors — offer thoughtful, insightful, and often controversial predictions on how DevOps and related technologies will evolve and impact business in 2023 ...
There are many issues that can contribute to developer dissatisfaction on the job — inadequate pay and work-life imbalance, for example. But increasingly there's also a troubling and growing sense of lacking ownership and feeling out of control ... One key way to increase job satisfaction is to ameliorate this sense of ownership and control whenever possible, and approaches to observability offer several ways to do this ...
Almost three-quarters of applications in the retail and hospitality sector contain security flaws, but only 25% of these are fixed, according to the State of Software Security (SoSS) report v12 from Veracode ...
Configuring application Monitoring as Code (MaC) is the next logical step in modern software development ... Let's look at some key reasons why monitoring as code is here to stay ...
Monorepos — or the use of a single repository for every part of an application — have been around since before git was invented in 2005. This is in contrast with the more recent approach of having separate repositories for each service and the underlying infrastructure. In recent years, however, they've come back in vogue thanks to top engineering organizations such as Google, Facebook, and Uber all publicly stating that they use monorepos ...
Part of the reason why securing Kubernetes can be challenging is that Kubernetes isn't a single, simple framework. It's a complex, multi-layered beast ... The good news in the face of this complexity is that it's possible to use a single methodology — infrastructure as code (IaC) — to secure all layers of Kubernetes ... this blog walks through nine Kubernetes security best practices that apply to the various layers or components of Kubernetes ...
For organizations to be successful with SRE, they must also transform the culture and human side within their organization. This cultural shift and new way of thinking must happen across IT and the business. The Global SRE Pulse 2022 report offers a deep look into the state and trends that are shaping SRE now and looking forward. With more than 460 survey responses from SRE professionals at organizations of all sizes, we've identified four top takeaways from the Global SRE Pulse report ...
Cloud adoption is a top priority for enabling innovation, becoming more agile and scaling growth, according to the 2022 Cloud Transformation Benchmark Report, commissioned by Presidio ...
Every business is in a constant battle to maximize efficiency, minimize toil, and scale sustainably in a moment of macroeconomic pressure. These goals are challenging in the best of times, but our current environment — continued staffing shortages, hiring freezes, and economic uncertainty — all make it significantly harder ...
Part of the key to Kubernetes security — and the one that is easy to overlook — is the DevOps lifecycle. Kubernetes doesn't exist in a vacuum; in most cases, it leverages infrastructure as code (IaC) and is part of a continuous integration/continuous delivery (CI/CD) pipeline that DevOps teams use to deliver software. To secure Kubernetes, then, you need to secure the code layer, the entire delivery pipeline that feeds into it, and all the elements at each phase ...
The speed and complexity created by using multicloud environments, multiple coding languages, and open source software libraries are making vulnerability management more difficult, according to Observability and security must converge to enable effective vulnerability management, a new report from Dynatrace, based on an independent global survey of 1,300 chief information security officers (CISOs) in large-size organizations ...
Aligning development, security, and operations teams is not an easy feat, as teams' goals are often at odds with one another. Engineers want to work on high-impact projects. Security wants to avoid incidents at all costs, which often slows down other teams. Operations exist to deploy features and improvements as fast as possible. Breaking those silos and fostering collaboration in the name of shared security responsibility is key to success. Here are some considerations to consider to build a DevSecOps culture ...
Building a DevSecOps strategy requires not only the right tooling but also the right culture. In this 2-part post, we'll introduce you to several principles to keep in mind when developing a Kubernetes infrastructure strategy or improving an existing one ...
Pages
