Related Content
Best Practices of the DevSecOps Elite: A Slack Takeover with DJ Schleen Thought leaders from the software community are taking over the TechWell Hub to answer questions and engage in conversations. DJ Schleen, a DevSecOps advocate, hosted this Slack takeover and discussed all things DevSecOps, including challenges to integrating security into your practices and getting management support. |
||
Choosing a Cloud Storage Service When choosing storage through a managed cloud service, you should consider several factors: What type of storage is needed? What is the type of application or service? What is the scale of data? What kind of accessibility, availability, and durability do you require? All these aspects should influence your decision. |
||
Cybersecurity Tips for Project Managers A project manager must be aware of the dangers the software faces if they are to be effective in its defense while managing their project. A lot of the data they're dealing with can be extremely sensitive. Let’s look at some tips that every project manager should pay attention to in order to protect their project. |
||
Features of Serverless Cloud Platforms With the advent of serverless computing, several serverless platforms have become available, precluding the requirement to provision and expose the infrastructure needed on a server-based compute environment. Let’s examine some of the features to expect in a serverless platform so you can know what to prioritize. |
||
Choosing a Cloud Computing Platform With so many options for cloud computing platforms, it can be tough to narrow them down. Focus on the most important features for your work: Do you want a server-based platform or serverless? What support do you need for your OS and software? What other services do you want integrated? These are the questions to ask. |
||
Using More Advanced Kubernetes Controllers Kubernetes is an object-oriented framework for orchestration of Docker containers. While running basic Kubernetes objects like pods and services is essential to all Kubernetes applications, what controller to use should be based on several factors. Let’s explore some advanced controller options for additional features. |
||
Continuous Risk Management in Cybersecurity Traditional cybersecurity is reactive. It responds to threats as they surface while trying to minimize the chance they will ever be an issue. Yet in an environment of constant change and evolution, this is insufficient. What your business needs to do is approach cybersecurity from the perspective of continuous risk. |
||
Making (and Keeping) Project Risk Visible Project managers recommend how much should be invested to address various risks based on their understanding of project context, but the final decision about what to do and when those efforts are sufficient belongs to the sponsor. Risk management requires executive input, so sponsors need to see all risk data you have. |