Curated articles, resources, tips and trends from the DevOps World.
Joel Spolsky was wrong. You *can* rewrite a huge code base if you learn modern tools. Oh no! You have to rewrite that huge legacy app! You've already argued that you can fix the legacy code and you've sent the managers the Joel Spolsky "never rewrite" article.
This tutorial is the latest installment in an explanatory series on Kubeflow, Google’s popular open source machine learning platform for Kubernetes. Check back each Friday for future installments.
Tricentis sponsored this post. Tricentis just released its first How the World’s Top Organizations Test report, which analyzes how industry leaders test the software that their business and the world relies on.
AWS Elastic Beanstalk takes care of undifferentiated heavy lifting for customers by regularly providing new platform versions to update all Linux-based and Windows Server-based platforms.
More and more customers are using Infrastructure-as-Code (IaC) to design and implement their infrastructure on AWS. This is why it is essential to have pipelines with Continuous Integration/Continuous Deployment (CI/CD) for infrastructure deployment.
Many organizations are building data lakes on AWS, which provides the most secure, scalable, comprehensive, and cost-effective portfolio of services.
If you are using Internet Explorer 11 (IE 11) to access the AWS Management Console, web-based services such as Amazon Chime or Amazon Honeycode, or other parts of the AWS web site (AWS Documentation, AWS Marketing, AWS Marketplace, or AWS Support), it is time to upgrade to a more modern & secure bro
A project to bring HTTP/2 to the CloudFoundry application development platform ran into a roadblock when the keepers of the Go Language did not respond to requests, with sufficient swiftness anyway, for supporting the HTTP/2 “upgrade flow” process.
Cloud engineers are looking to policy-as-code to prevent cloud misconfigurations, according to “The State of Cloud Security 2021 Report,” which surveyed 300 US cloud engineering and security professionals.
If you haven’t been programming since fixing Y2K was the problem of the day, you may not know just how much trouble we’ve been in with supply chain software security holes and attacks. Still not sure what I mean, go read up on the Solarwinds security fiasco. I’ll wait.
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2025 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com