Curated articles, resources, tips and trends from the DevOps World.
Two-factor authentication (2FA) is a type of multi-factor authentication (MFA). Both authentication solutions provide additional account security by requiring additional factors of authentication.
Often regarded as the Californian version of the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA) aim’s to increase consumer rights by giving California residents greater control over the use of their personal data.
Shadow IT includes any unsanctioned apps or hardware used by employees that fall outside of those managed by the IT department (sanctioned apps). Shadow IT is often used as a workaround to functionality or usability gaps created by an organization’s known IT resources.
Roni Dover, founder of [Digma.ai](https://digma.ai), joins Jess to chat about continuous feedback and what's missing in every DevOps loop.
The Stop Hacks and Improve Electronic Data Security (SHIELD) Act is designed to protect the personal data of all New York residents. This act broadens the data privacy and protection standards stipulated in the Gramm-Leach-Bliley Act (GLBA) and the New York Department of Financial Services (NYDFS).
Monitoring and reporting on your most important business metrics is a fundamental part of any APM or ITIM solution. Our Retrace Power User Tips and Tricks series has already looked at “Error and Log Management” functionalities.
We will go over How To Stress Test REST API Using Python. Did you know that you can use Python to perform your load testing without any external tools or libraries?
IPv6 adoption has consistently increased over the last few years, especially among mobile networks. The main reasons to move to IPv6 are:
The number of blockchains continues to grow, along with the number of transactions on each of those blockchains, which adds to the continued complexity of querying that transaction data.
We’re back with another instalment of AWS This Week, where we sift through all the news and updates from the world of Amazon Web Services so you don’t have to! This week, we have a totally new way to define access to Lambda functions with attribute-based access control (ABAC), AWS Lambda Powerto
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2025 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com