Related Content
Explaining Hardware Virtualization and Containerization Virtualization is the abstraction of a computer resource—such as hardware, memory, storage, an operating system, a desktop machine, or a network—built on top of the physical resource. There are many types of virtualization, and here, we look at virtualization of hardware and of an operating system, or containerization. |
||
Debunking 4 Myths of DevSecOps Adoption DevSecOps means more secure applications through greater collaboration. However, many organizations hold preconceived notions and misconceptions about what DevSecOps is and why their organizations will face challenges in adopting it. Here are four common myths about DevSecOps transformation, along with the truth. |
||
What’s Different about Testing Serverless Applications? Serverless computing is a DevOps technique that uses cloud-provided runtimes to execute code components in a defined workflow. Testing is easier in some ways with this model, but more difficult in others. Let's dive into the ways testing serverless applications and components is different from traditional architecture. |
||
Detecting and Preventing Android Security Risks Even though the Android app development process involves thorough verification, there has been no preventing new malware from being developed. Here are some of the most common potential security risks Android users should watch out for, as well as some measures to take to protect your smartphone, data, and privacy. |
||
Don’t Let “Try It Now” Impede Your Test Initiative Sometimes environmentally based issues arise that impede your ability to access or test the software. Rather than addressing the problem methodically, as with defects, testers often attempt to solve it on their own. Here's why entering the problem into the defect-tracking database is a more efficient way to solve it. |
||
Building Security into DevOps: A Slack Takeover with Larry Maccherone Thought leaders from the software community are taking over the TechWell Hub to answer questions and engage in conversations. Larry Maccherone, senior director at Comcast, hosted this Slack takeover and discussed what DevSecOps means, how to get started with security, and the changing role of security specialists. |
||
How to Get Security Groups to Join Your DevSecOps Journey DevSecOps shifts security practices left and assures earlier that your application isn't vulnerable to breaches. But convincing a security group to get on board with your DevSecOps journey may not be an easy task. These four points can help you prove to your security group that DevSecOps is in everyone’s best interest. |
||
The Advantages of Serverless Cloud Providers Most cloud providers have server-based computing services. But that requires servers to be provisioned and administered, and servers have a fixed capacity to operate within. A new DevOps trend is to go serverless—however, this doesn’t mean no servers are used at all. Learn more about this model and its advantages now. |