Curated articles, resources, tips and trends from the DevOps World.
Databases are often the biggest performance bottleneck in an application. They are also hard to migrate from once being used in production, so making the right choice for your application’s database is crucial.
Amazon CodeCatalyst reports contain details about tests that occur during a workflow run. You can create tests such as unit tests, integration tests, configuration tests, and functional tests. You can use a test report to help troubleshoot a problem during a workflow.
One of the key announcements at AnsibleFest 2022 was the introduction of the Event-Driven Ansible developer preview. This technology is currently available on GitHub and accessible by technology providers and end users to provide feedback and drive the ecosystem.
The release of the AI-powered ChatGPT in late 2022 piqued the interest of millions of users around the world, as they used the tool to instantly generate Shakespearean-like sonnets, or lines of programming code.
The HECVAT (Higher Education Community Vendor Assessment Toolkit) was developed by the Higher Education Information Security Council (HEISC) as an initiative to help higher education institutions better protect their data, prevent the risk of data breaches, and measure the cyber risk of third-party
Over the course of more than one hundred years, the telecom industry has become standardized and regulated, and has developed methods, technologies, and an entire vocabulary (chock full of interesting acronyms) along the way.
This month Matt Welsh, a former professor of computer science at Harvard, spoke at a virtual meetup of the Chicago Association for Computing Machinery (ACM), explaining his thesis that ChatGPI and GitHub Copilot represent the beginning of the end of programming.
SEATTLE — When we first started developing open source software, recalled Brian Behlendorf, Open Source Security Foundation (OpenSSF) general manager, at CloudNativeSecurityCon, we really didn’t consider security. That, as we all now realize, was a mistake.
These days, if you are producing software as containers, you have someone downstream scanning your container images for vulnerabilities, and that makes your job harder than it was in the past. The world has plenty of vulnerability scanners, many of them great.
Container adoption in enterprises continues to grow, and Kubernetes has become the de facto standard for deploying and operating containerized applications. At the same time, security is shifting left and should be addressed earlier in the software development lifecycle (SDLC).
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2025 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com