Related Content
Best Practices of the DevSecOps Elite: A Slack Takeover with DJ Schleen Thought leaders from the software community are taking over the TechWell Hub to answer questions and engage in conversations. DJ Schleen, a DevSecOps advocate, hosted this Slack takeover and discussed all things DevSecOps, including challenges to integrating security into your practices and getting management support. |
||
Choosing a Cloud Storage Service When choosing storage through a managed cloud service, you should consider several factors: What type of storage is needed? What is the type of application or service? What is the scale of data? What kind of accessibility, availability, and durability do you require? All these aspects should influence your decision. |
||
Exploring Containers: Creating a Dockerfile Docker containers are launched using Docker images, which are built from layers of Dockerfiles. A Dockerfile is a text document that contains all the commands or instructions to create, copy, and run an image. Let’s look at what goes into creating a Dockerfile, which could be used to build a runnable Docker image. |
||
Features of Serverless Cloud Platforms With the advent of serverless computing, several serverless platforms have become available, precluding the requirement to provision and expose the infrastructure needed on a server-based compute environment. Let’s examine some of the features to expect in a serverless platform so you can know what to prioritize. |
||
Choosing a Cloud Computing Platform With so many options for cloud computing platforms, it can be tough to narrow them down. Focus on the most important features for your work: Do you want a server-based platform or serverless? What support do you need for your OS and software? What other services do you want integrated? These are the questions to ask. |
||
Using More Advanced Kubernetes Controllers Kubernetes is an object-oriented framework for orchestration of Docker containers. While running basic Kubernetes objects like pods and services is essential to all Kubernetes applications, what controller to use should be based on several factors. Let’s explore some advanced controller options for additional features. |
||
Continuous Risk Management in Cybersecurity Traditional cybersecurity is reactive. It responds to threats as they surface while trying to minimize the chance they will ever be an issue. Yet in an environment of constant change and evolution, this is insufficient. What your business needs to do is approach cybersecurity from the perspective of continuous risk. |
||
Quality Engineering in Agile and DevOps Ensuring that quality is advocated for at every step along the lifecycle can be tough. One easy response is, “Quality is everyone’s job”—after all, whole-team accountability is a key tenet of agile. But what does this really mean in practice? What approaches and roles help us embrace a culture of quality engineering? |