Related Content
![]() |
Exploring Containers: Creating a Dockerfile Docker containers are launched using Docker images, which are built from layers of Dockerfiles. A Dockerfile is a text document that contains all the commands or instructions to create, copy, and run an image. Let’s look at what goes into creating a Dockerfile, which could be used to build a runnable Docker image. |
|
![]() |
Key Factors for an Efficient System Architecture Design Software architecture is all about trying to bring structure to areas that can’t be structured easily. When an architect designs a system, service, or feature, they are formulating a comprehensive solution to a unique problem. The concepts here help create a scalable, accessible, secure, and cost-friendly architecture. |
|
![]() |
Continuous Risk Management in Cybersecurity Traditional cybersecurity is reactive. It responds to threats as they surface while trying to minimize the chance they will ever be an issue. Yet in an environment of constant change and evolution, this is insufficient. What your business needs to do is approach cybersecurity from the perspective of continuous risk. |
|
![]() |
Good Process, Bad Process “Process” is a word that seems to have a lot of baggage. Depending on whom you ask, process is either essential to delivering value, or something that gets in the way. But this is the wrong way to frame the issue. A process is not inherently good or bad; it's how you use it, and whether it's right for your situation. |
|
![]() |
Does Agile Have Too Many Meetings? Because agile favors lots of short meetings, it may seem like they take up a lot more time. But when you compare it to time spent meeting in the pre-agile days, it's usually actually less. However, this doesn’t mean all meetings you attend are useful. Here are a few tips for deciding if all your meetings are necessary. |
|
![]() |
Defect Reporting: The Next Steps When a software defect is identified, best practices usually only pertain to the initial writing of the defect, not the tasks required to close it. Many factors can influence the tester's work. The solution is to add a “Next Steps” section that identifies the work remaining and the person responsible for completing it. |
|
![]() |
Shifting Security Left: The Innovation of DevSecOps The more established a product is when it is first audited for security, the harder it will be to find the time to fix problems and to refactor the software. DevSecOps was created to get application security practices into the development process as early as possible, so we can use them from the beginning of a project. |
|
![]() |
How Blockchain Technology Will Disrupt Business The security factor has made blockchain popular in finance applications—indeed, it's probably known best as the record-keeping technology behind bitcoin. But there’s more to its prospects than finance. Blockchain stands to be a disruptor in the business world because it has potential applications in so many fields. |