Cloud native computing grows by 200 percent

potted-plants-forming-growth-arrow

Over the last few years the way you moved applications from your data center to the cloud was lift-and-shift, refactor, or migrate to containers. The latter has gotten a kick in the pants as cloud-native techniques such as serverless computing and microservices have joined forces with containers. Still unsure what I’m talking about? Chris Aniszczyk, […]

Kubernetes is free of Google’s purse strings

escape-from-bird-cage

Kubernetes rules cloud-container orchestration. We all know that. You may also know that Google created Kubernetes and then spun the project’s management off to the Cloud Native Computing Foundation (CNCF) in 2015. But what you probably don’t know is that Google still controls all the computing resources used to manage and test Kubernetes and its […]

Comment les tests de sécurité d’applications doivent changer dans un monde DevOps world agile

security-text-on-screen

Dans le contexte actuel de la cyber sécurité, il est essentiel d’élaborer une stratégie de sécurité qui couvre tous les angles d’attaque. Les entreprises doivent en permanence évaluer leur niveau de préparation et améliorer la gestion et les processus pour avoir toujours un coup d’avance sur des individus mal intentionnés. Les applications sont une des […]

Moving applications to the cloud: Lift-and-shift, refactor, or containers

clouds-above-highway

There’s no question we’re moving our applications to the cloud. We started with Infrastructure-as-a-Service (IaaS) for our data, and now most of us are considering  Platform-as-a-Service (PaaS) for our programs. The question is, how will we move our programs to PaaS? You have three main choices: Lift-and-shift, refactor, or containers. With life-and-shift, you simply port your […]

Powerful management techniques many leaders still aren’t using

The future is already here — it’s just not very evenly distributed.            — William Gibson This post is about a set of powerful management techniques that have each been around for over a decade, but that still haven’t yet diffused into everyday use, and that hence still appear novel to […]

Insta-structure: How to deliver instant infrastructure, applications and processes

bridge-under-construction

Businesses move to the cloud to save money, add flexibility and run more efficient DevOps shops. And the companies that think more strategically about the cloud understand that they need to exit the pure infrastructure business and deliver an instantaneous end-to-end environment — consisting of infrastructure, applications, and processes — that delivers services with great […]

Tech dominates list of best jobs in U.S.

coder-at-laptop

The list of best jobs in the U.S. continues to be dominated by positions in the technology sector. The employment site Indeed recently analyzed data from its own listings, focusing on jobs that paid well (at least $75,000) and have had the most growth on Indeed in the past four years. Topping the list? Well, […]

Docker embraces Kubernetes with Docker Enterprise 2.0

two-flowers-beneath-clouds

It turns out Docker was serious about adopting Kubernetes. Docker has its own container orchestration program, Docker Swarm mode, but the company saw the wind was blowing towards Kubernetes so it added Kubernetes to its selection of orchestration tools in October 2017. But, there’s adoption and then there’s “Adoption.” With the first you announce you’ll […]

Red Hat’s system management tools join hands with its DevOps programs

figurine-handshake

For years we’ve used older system management tools such as Ivanti LANDESK, Kaseya VSA and  Dynatrace Application Monitoring. They’re still great, but as we move to the cloud, containers and continuous integration and development (CI/CD) DevOps programs such as Puppet, Chef and SaltStack have risen in importance. Red Hat, a leading business Linux distributor, has a foot […]

How application security testing needs to change in an agile, DevOps world

security-text-on-screen

In today’s dynamic cyber-attack landscape, a robust security strategy that looks at all attack surfaces is critical. Enterprises must tirelessly assess their current state of readiness and continually improve governance and processes to stay a step ahead of malicious actors. Applications are one of the preferred attack vectors with up to 90% of successful breaches […]