Curated articles, resources, tips and trends from the DevOps World.
In the last six months, the open source Mastodon platform has attracted millions of new users and made organizations contemplate creating their own servers (called instances, in Mastodon parlance). It’s not hard to set up a Mastodon instance to support a handful of users.
IBM’s former executive chairman and CEO, Ginni Rometty — who created a 6000-strong Security Business Unit at IBM to counter cybercrime in 2015 — described data as a game-changing source of competitive advantage for the 21st century.
Imagine opening your laptop to get some work done and not needing a screen to view it. Instead, you slip on a pair of glasses connected to the unit and observe your desktop workspace — complete with all your websites and apps — floating in the air before you.
One of the biggest risks to data is letting people use it. Data is generally very safe if it’s stored, but no one has access. And setting up users is very safe if you don’t authorize them to access any data. It’s at the nexus of data and users that the real danger lies.
Right about now every company is trying to figure out how to get a competitive hand with ChatGPT. For observability platform provider Honeycomb, the OpenAI technology promises to make querying easier for its users.
With the rise of Kubernetes adoption and overall expansion of the cloud native landscape, DevOps certainly isn’t dead, but it is definitely changing. The rise of roles like platform engineer is clearly trying to address this strange adolescence that DevOps is going through in the cloud native era.
Components are a significant force in software development now, but can you use them in conjunction with accessibility testing? The answer is probably yes. Here’s an approach that’s worth trying.
A well-architected landing zone gets you off to the best possible start in the cloud. This post looks at how to use landing zones to leverage practical benefits related to security, compliance and cost management.
With 1.3 billion disabled people in the world, they are not edge cases. Yet, while there’s an effort and even requirements to embrace accessibility in the end-user experience, it remains incredibly rare to see accessibility guidelines for the developer experience.
Securing secrets — keys and passwords and so on needed to gain access to your critical applications, data and infrastructure — has never been more important or urgent. Security breaches are costly, in terms of both money and reputation; hackers are getting more creative, and more brazen.
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2025 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com