Related Content
Using Pipelines for CI/CD Continuous integration and continuous deployment have become very important in the daily workflow of building a product to production. We take a look at the stages necessary to have a well-functioning CI/CD pipeline. |
||
3 Serverless Strategies to Look for in 2021 In this article, we examine the three serverless applications deployment and development approaches that are transforming the application development process and acting as a catalyst for fast adoption of the DevOps practice across the board. |
||
What Exactly Is Serverless? The word serverless—it’s everywhere. The word has been Googled an average of 100 times daily in 2020. Is serverless just a buzzword? A facade? Or a world where we won’t need servers anymore? |
||
Agile+DevOps Culture in a Virtual World Transforming and maintaining culture is hard enough when team members are somewhat co-located and in physical spaces—even harder when the majority are working from home. |
||
Operationalizing Cloud Security with Policy-as-Code Josh Stella explores why PaC is critical to validate that large, complex cloud infrastructure environments adhere to industry compliance standard and internal policies.
|
||
A Physical Metaphor for Quick Fixes and Root Cause Analysis If you deal with legacy code you’ve likely found yourself struggling to debug and fix a mysterious, intermittent problem. Along the way you may have discovered some code that didn’t quite make sense. |
||
Schedule Risk Analysis Building schedules for complex projects is challenging. While the results are never perfect, credible schedules are a useful communication and coordination device. Incredible schedules are a dangerous waste of time and energy that damage a project manager’s credibility and cost an enterprise a fortune. |
||
3 Critical Considerations for Technical Due Diligence Technical due diligence is the process of verifying a company’s technical capabilities, quality, and processes. It is typically performed by investors or buyers before a contract. There are many aspects you can investigate, but three are crucial: a code review, security evaluation, and open source components compliance. |