Curated articles, resources, tips and trends from the DevOps World.
Dynatrace sponsored this post. Software developers drive not only innovation and digital transformation in business today, but also fuel efficiency, operability and resiliency in modern enterprises.
The NFT boom has created a massive amount of data in a relatively short amount of time. That data is also spread far and wide, with the smart contracts that define a non-fungible tokens project stored on a blockchain, but much of the supporting metadata is elsewhere.
For the last forty years, Bloomberg has solidified itself not only as a financial media company, but also an information and technology goliath that has grown to almost 20,000 global employees.
What is Puppet Relay? Relay is an event-driven automation platform designed to make wrangling diverse operational environments easy.
Elizabeth Stark, founder of Lightning Labs and contributor to the lightning network, an example of a second-layer peer-to-peer, channel-based settlement solution.
This article is a continuation of the “What is Knative” series. For part 1, please follow this link. In part 2 of this series, we will review canary and blue-green deployments and dashboards while using no YAML! If we raise the load on our service, Knative will autoscale it even further.
Incident management is an always-on responsibility, but after your last sprint, you deserve a long rest and peace of mind. Your incident response plan may be the furthest thing from your mind and if it’s well-configured, you can finally sleep soundly.
If you have some experience with Kubernetes, you will appreciate its power but also its complexity. A no-ops world with Kubernetes seems utopian. You wish there was something simpler, finally giving developers the power to self-service.
Relay has a substantial library of external services and tools — as of March 2021 there are 60 integrations in our Github organization.
Misconfigured resources are a big contributor to compromised cloud security. If you have misconfigured Amazon S3 buckets, for example, malicious actors could access your data, then inappropriately or illegally distribute this private information, putting your company’s security at risk.
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2026 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com