Curated articles, resources, tips and trends from the DevOps World.
Sylvain Kalache Sylvain Kalache is an entrepreneur and software engineer currently working at Holberton School — which he co-founded. Kubernetes is becoming an industry standard; Cockroach Labs and Red Hat had found that 94% of organizations surveyed deploy services and applications on Kubernetes.
Torq sponsored this post. When you hear the term “chatbot,” your mind may at first turn to things like robotic customer support services on retail websites — a relatively mundane use case for chatbots and one that is probably hard to get excited about if you’re a security engineer.
StepZen sponsored this post. GraphQL was introduced to ease the access to backend data for frontend developers. It gives frontend developers the paradigm they need to simplify the specification of the data for their applications.
With the recent release of the ansible.netcommon Collection version 3.0.0, we have promoted two features as standard: libssh transport and import_modules. These features provide increased performance and resiliency for your network automation.
The metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world.
Security is a top priority for any organisation in the cloud, but it is a complex discipline. We recently published a blog post looking at how vendor services can take cloud security to a higher level. That piece focused on examples from AWS.
Network security is of the utmost importance when it comes to protecting servers. An organization's servers contains a lot of sensitive data (e.g., clients’ personal data) that can greatly harm your business in the blink of an eye if compromised.
Data leaks are a popular attack vector for cybercriminals. They’re considered a shortcut to accessing valuable sensitive data without needing to carry out sophisticated cyber attacks. Once an attacker discovers a data leak, they can exploit it immediately.
Attack surface management (ASM) software is a set of automated tools that monitor and manage external digital assets that contain, transmit, or process sensitive data.
Phishing attacks make up over 90% of all data breaches (according to Cisco's 2021 Cybersecurity Threat Trends Report), far outnumbering malware and ransomware attacks, affecting millions of users yearly.
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2025 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com